id
stringlengths
10
10
submitter
stringlengths
3
64
authors
stringlengths
5
23.3k
title
stringlengths
3
246
comments
stringlengths
1
465
journal-ref
stringlengths
4
282
doi
stringlengths
12
120
report-no
stringlengths
2
226
categories
stringlengths
5
101
license
stringclasses
6 values
abstract
stringlengths
6
3.32k
versions
list
update_date
timestamp[s]
authors_parsed
sequence
2401.08909
Renchunzi Xie
Renchunzi Xie, Ambroise Odonnat, Vasilii Feofanov, Ievgen Redko, Jianfeng Zhang, Bo An
Characterising Gradients for Unsupervised Accuracy Estimation under Distribution Shift
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Estimating test accuracy without access to the ground-truth test labels under varying test environments is a challenging, yet extremely important problem in the safe deployment of machine learning algorithms. Existing works rely on the information from either the outputs or the extracted features of neural networks to formulate an estimation score correlating with the ground-truth test accuracy. In this paper, we investigate--both empirically and theoretically--how the information provided by the gradients can be predictive of the ground-truth test accuracy even under a distribution shift. Specifically, we use the norm of classification-layer gradients, backpropagated from the cross-entropy loss after only one gradient step over test data. Our key idea is that the model should be adjusted with a higher magnitude of gradients when it does not generalize to the test dataset with a distribution shift. We provide theoretical insights highlighting the main ingredients of such an approach ensuring its empirical success. Extensive experiments conducted on diverse distribution shifts and model structures demonstrate that our method significantly outperforms state-of-the-art algorithms.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:33:23 GMT" } ]
2024-01-18T00:00:00
[ [ "Xie", "Renchunzi", "" ], [ "Odonnat", "Ambroise", "" ], [ "Feofanov", "Vasilii", "" ], [ "Redko", "Ievgen", "" ], [ "Zhang", "Jianfeng", "" ], [ "An", "Bo", "" ] ]
2401.08910
Eric Baxter
Eric J. Baxter and Shivam Pandey
Inferring galaxy cluster masses from cosmic microwave background lensing with neural simulation based inference
11 pages, 2 figures
null
null
null
astro-ph.CO astro-ph.IM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gravitational lensing by massive galaxy clusters distorts the observed cosmic microwave background (CMB) on arcminute scales, and these distortions carry information about cluster masses. Standard approaches to extracting cluster mass constraints from the CMB cluster lensing signal are either sub-optimal, ignore important physical or observational effects, are computationally intractable, or require additional work to turn the lensing measurements into constraints on cluster masses. We apply simulation based inference (SBI) using neural likelihood models to the problem. We show that in circumstances where the exact likelihood can be computed, the SBI constraints on cluster masses are in agreement with the exact likelihood, demonstrating that the SBI constraints are close to optimal. In scenarios where the exact likelihood cannot be feasibly computed, SBI still recovers unbiased estimates of individual cluster masses and combined constraints from multiple clusters. SBI will be a powerful tool for constraining the masses of galaxy clusters detected by future cosmic surveys. Code to run the analyses presented here will be made publicly available.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:35:15 GMT" } ]
2024-01-18T00:00:00
[ [ "Baxter", "Eric J.", "" ], [ "Pandey", "Shivam", "" ] ]
2401.08911
Connor Devitt
Connor Devitt, Sudhanshu Tiwari, Sunil A. Bhave, Renyuan Wang
A Distributed Magnetostatic Resonator
null
null
null
null
physics.app-ph
http://creativecommons.org/licenses/by/4.0/
This work reports the design, fabrication, and characterization of coupling-enhanced magnetostatic forward volume wave resonators with significant spur suppression. The fabrication is based on surface micro-machining of yttrium iron garnet (YIG) film on a gadolinium gallium garnet (GGG) substrate with thick gold transducers. A distributed resonator is used to excite forward volume waves in YIG to realize a frequency dependent coupling boost. Fabricated devices at 18 GHz and 7 GHz show coupling coefficients as high as 13$\%$ and quality factors above 1000. Higher-order magnetostatic mode suppression is experimentally demonstrated through a combination of transducer and YIG geometry design. An edge-coupling filter topology is proposed and simulated which utilizes this novel distributed magnetostatic resonator.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:44:20 GMT" } ]
2024-01-18T00:00:00
[ [ "Devitt", "Connor", "" ], [ "Tiwari", "Sudhanshu", "" ], [ "Bhave", "Sunil A.", "" ], [ "Wang", "Renyuan", "" ] ]
2401.08912
Yunsoo Ha
Yunsoo Ha, Sara Shashaani, Matt Menickelly
Two-Stage Estimation and Variance Modeling for Latency-Constrained Variational Quantum Algorithms
null
null
null
null
math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Quantum Approximate Optimization Algorithm (QAOA) has enjoyed increasing attention in noisy intermediate-scale quantum computing due to its application to combinatorial optimization problems. Because combinatorial optimization problems are NP-hard, QAOA could serve as a potential demonstration of quantum advantage in the future. As a hybrid quantum-classical algorithm, the classical component of QAOA resembles a simulation optimization problem, in which the simulation outcomes are attainable only through the quantum computer. The simulation that derives from QAOA exhibits two unique features that can have a substantial impact on the optimization process: (i) the variance of the stochastic objective values typically decreases in proportion to the optimality gap, and (ii) querying samples from a quantum computer introduces an additional latency overhead. In this paper, we introduce a novel stochastic trust-region method, derived from a derivative-free adaptive sampling trust-region optimization (ASTRO-DF) method, intended to efficiently solve the classical optimization problem in QAOA, by explicitly taking into account the two mentioned characteristics. The key idea behind the proposed algorithm involves constructing two separate local models in each iteration: a model of the objective function, and a model of the variance of the objective function. Exploiting the variance model allows us to both restrict the number of communications with the quantum computer, and also helps navigate the nonconvex objective landscapes typical in the QAOA optimization problems. We numerically demonstrate the superiority of our proposed algorithm using the SimOpt library and Qiskit, when we consider a metric of computational burden that explicitly accounts for communication costs.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:54:24 GMT" } ]
2024-01-18T00:00:00
[ [ "Ha", "Yunsoo", "" ], [ "Shashaani", "Sara", "" ], [ "Menickelly", "Matt", "" ] ]
2401.08913
Jing Hu
Chengxu Wu, Qinrui Fan, Shu Hu, Xi Wu, Xin Wang, Jing Hu
Efficient Image Super-Resolution via Symmetric Visual Attention Network
13 pages,4 figures
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important development direction in the Single-Image Super-Resolution (SISR) algorithms is to improve the efficiency of the algorithms. Recently, efficient Super-Resolution (SR) research focuses on reducing model complexity and improving efficiency through improved deep small kernel convolution, leading to a small receptive field. The large receptive field obtained by large kernel convolution can significantly improve image quality, but the computational cost is too high. To improve the reconstruction details of efficient super-resolution reconstruction, we propose a Symmetric Visual Attention Network (SVAN) by applying large receptive fields. The SVAN decomposes a large kernel convolution into three different combinations of convolution operations and combines them with an attention mechanism to form a Symmetric Large Kernel Attention Block (SLKAB), which forms a symmetric attention block with a bottleneck structure by the size of the receptive field in the convolution combination to extract depth features effectively as the basic component of the SVAN. Our network gets a large receptive field while minimizing the number of parameters and improving the perceptual ability of the model. The experimental results show that the proposed SVAN can obtain high-quality super-resolution reconstruction results using only about 30% of the parameters of existing SOTA methods.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:55:59 GMT" } ]
2024-01-18T00:00:00
[ [ "Wu", "Chengxu", "" ], [ "Fan", "Qinrui", "" ], [ "Hu", "Shu", "" ], [ "Wu", "Xi", "" ], [ "Wang", "Xin", "" ], [ "Hu", "Jing", "" ] ]
2401.08914
Sabrina Berger
Sabrina C. Berger, Madeline A. Marshall, J. Stuart B. Wyithe, Tiziana di Matteo, Yueying Ni, and Stephen M. Wilkins
Simulated host galaxy analogs of high-z quasars observed with JWST
Submitted to MNRAS. 15 pages, 11 figures. Comments welcome!
null
null
null
astro-ph.GA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The hosts of two low-luminosity high-z quasars, J2255+0251 and J2236+0032, were recently detected using JWST's NIRCam instrument. These represent the first high-z quasar host galaxy stellar detections and open a new window into studying high-z quasars. We examine the implications of the measured properties of J2255+0251 and J2236+0032 within the context of the hydrodynamic simulation BlueTides at z = 6.5. We find that these observed quasars fall on the BlueTides stellar to black hole mass relation and have similar luminosities to the brightest simulated quasars. We predict their star formation rates, estimating approximately $10^{2-3}$ $M_{\odot}/ \rm yr$ for both quasar hosts. J2255+0251 and J2236+0032's host galaxy radii also fall within estimates of the radii of the simulated host galaxies of similar luminosity quasars. We generate mock JWST NIRCam images of analogs to the observed quasars within BlueTides and perform a point source removal to illustrate both a qualitative and quantitative comparison of the measured and simulated radii and magnitudes. The quasar subtraction works well for similar luminosity quasars, and the recovered host images are consistent with what was observed for J2255+0251 and J2236+0032, further supporting the success of those observations. We also use our mock imaging pipeline to make predictions for the detection of J2255+0251 and J2236+0032's hosts in upcoming JWST observations. We anticipate that the simulation analogs of future high-z quasar host discoveries will allow us to make accurate predictions of their properties beyond the capabilities of JWST.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:57:10 GMT" } ]
2024-01-18T00:00:00
[ [ "Berger", "Sabrina C.", "" ], [ "Marshall", "Madeline A.", "" ], [ "Wyithe", "J. Stuart B.", "" ], [ "di Matteo", "Tiziana", "" ], [ "Ni", "Yueying", "" ], [ "Wilkins", "Stephen M.", "" ] ]
2401.08915
Yiheng Qian
Yiheng Qian, Tejaswi Polimetla, Thomas W. Sanchez, Xiang Yan
How do transportation professionals perceive the impacts of AI applications in transportation? A latent class cluster analysis
null
null
null
null
stat.AP cs.CY
http://creativecommons.org/licenses/by/4.0/
Recent years have witnessed an increasing number of artificial intelligence (AI) applications in transportation. As a new and emerging technology, AI's potential to advance transportation goals and the full extent of its impacts on the transportation sector is not yet well understood. As the transportation community explores these topics, it is critical to understand how transportation professionals, the driving force behind AI Transportation applications, perceive AI's potential efficiency and equity impacts. Toward this goal, we surveyed transportation professionals in the United States and collected a total of 354 responses. Based on the survey responses, we conducted both descriptive analysis and latent class cluster analysis (LCCA). The former provides an overview of prevalent attitudes among transportation professionals, while the latter allows the identification of distinct segments based on their latent attitudes toward AI. We find widespread optimism regarding AI's potential to improve many aspects of transportation (e.g., efficiency, cost reduction, and traveler experience); however, responses are mixed regarding AI's potential to advance equity. Moreover, many respondents are concerned that AI ethics are not well understood in the transportation community and that AI use in transportation could exaggerate existing inequalities. Through LCCA, we have identified four latent segments: AI Neutral, AI Optimist, AI Pessimist, and AI Skeptic. The latent class membership is significantly associated with respondents' age, education level, and AI knowledge level. Overall, the study results shed light on the extent to which the transportation community as a whole is ready to leverage AI systems to transform current practices and inform targeted education to improve the understanding of AI among transportation professionals.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 01:59:59 GMT" } ]
2024-01-18T00:00:00
[ [ "Qian", "Yiheng", "" ], [ "Polimetla", "Tejaswi", "" ], [ "Sanchez", "Thomas W.", "" ], [ "Yan", "Xiang", "" ] ]
2401.08916
Aparna Khare
Anirudh Raju, Aparna Khare, Di He, Ilya Sklyar, Long Chen, Sam Alptekin, Viet Anh Trinh, Zhe Zhang, Colin Vaz, Venkatesh Ravichandran, Roland Maas, Ariya Rastrow
Two-pass Endpoint Detection for Speech Recognition
ASRU 2023
null
null
null
eess.AS cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Endpoint (EP) detection is a key component of far-field speech recognition systems that assist the user through voice commands. The endpoint detector has to trade-off between accuracy and latency, since waiting longer reduces the cases of users being cut-off early. We propose a novel two-pass solution for endpointing, where the utterance endpoint detected from a first pass endpointer is verified by a 2nd-pass model termed EP Arbitrator. Our method improves the trade-off between early cut-offs and latency over a baseline endpointer, as tested on datasets including voice-assistant transactional queries, conversational speech, and the public SLURP corpus. We demonstrate that our method shows improvements regardless of the first-pass EP model used.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:00:07 GMT" } ]
2024-01-18T00:00:00
[ [ "Raju", "Anirudh", "" ], [ "Khare", "Aparna", "" ], [ "He", "Di", "" ], [ "Sklyar", "Ilya", "" ], [ "Chen", "Long", "" ], [ "Alptekin", "Sam", "" ], [ "Trinh", "Viet Anh", "" ], [ "Zhang", "Zhe", "" ], [ "Vaz", "Colin", "" ], [ "Ravichandran", "Venkatesh", "" ], [ "Maas", "Roland", "" ], [ "Rastrow", "Ariya", "" ] ]
2401.08917
Subhojit Roy
Subhojit Roy, Carlos E.M. Wagner
Dark Matter searches with photons at the LHC
37 pages, 3 figures and 3 tables
null
null
EFI 24-1
hep-ph hep-th
http://creativecommons.org/publicdomain/zero/1.0/
We unveil blind spot regions in dark matter (DM) direct detection (DMDD), for weakly interacting massive particles with a mass around a few hundred~GeV that may reveal interesting photon signals at the LHC. We explore a scenario where the DM primarily originates from the singlet sector within the $Z_3$-symmetric Next-to-Minimal Supersymmetric Standard Model (NMSSM). A novel DMDD spin-independent blind spot condition is revealed for singlino-dominated DM, in cases where the mass parameters of the higgsino and the singlino-dominated lightest supersymmetric particle (LSP) exhibit opposite relative signs (i.e., $\kappa < 0$), emphasizing the role of nearby bino and higgsino-like states in tempering the singlino-dominated LSP. Additionally, proximate bino and/or higgsino states can act as co-annihilation partner(s) for singlino-dominated DM, ensuring agreement with the observed relic abundance of DM. Remarkably, in scenarios involving singlino-higgsino co-annihilation, higgsino-like neutralinos can distinctly favor radiative decay modes into the singlino-dominated LSP and a photon, as opposed to decays into leptons/hadrons. In exploring this region of parameter space within the singlino-higgsino compressed scenario, we study the signal associated with at least one relatively soft photon alongside a lepton, accompanied by substantial missing transverse energy and a hard initial state radiation jet at the LHC. In the context of singlino-bino co-annihilation, the bino state, as the next-to-LSP, exhibits significant radiative decay into a soft photon and the LSP, enabling the possible exploration at the LHC through the triggering of this soft photon alongside large missing transverse energy and relatively hard leptons/jets resulting from the decay of heavier higgsino-like states.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:04:22 GMT" } ]
2024-01-18T00:00:00
[ [ "Roy", "Subhojit", "" ], [ "Wagner", "Carlos E. M.", "" ] ]
2401.08918
Massimo Pica Ciamarra
Shivam Mahajan, Massimo Pica Ciamarra
Heterogeneous attenuation of sound waves in three-dimensional amorphous solids
To appear in Physical Review E
null
null
null
cond-mat.soft
http://creativecommons.org/licenses/by/4.0/
Sound waves are attenuated as they propagate in amorphous materials. We investigate the mechanism driving sound attenuation in the Rayleigh scattering regime by resolving the dynamics of an excited phonon in time and space via numerical simulations. We find sound attenuation is spatiotemporal heterogeneous. It starts in localised regions, which identify soft regions within the material and correlate with low-frequency vibrational modes. As time progresses, the regions where sound is primarily attenuated invade the system via an apparent diffusive process.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:04:44 GMT" } ]
2024-01-18T00:00:00
[ [ "Mahajan", "Shivam", "" ], [ "Ciamarra", "Massimo Pica", "" ] ]
2401.08919
Muhammad ElNokrashy
Muhammad ElNokrashy, Badr AlKhamissi
Partial Diacritization: A Context-Contrastive Inference Approach
13 equations, 5 tables, 5 figures
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diacritization plays a pivotal role in improving readability and disambiguating the meaning of Arabic texts. Efforts have so far focused on marking every eligible character (Full Diacritization). Comparatively overlooked, Partial Diacritzation (PD) is the selection of a subset of characters to be marked to aid comprehension where needed. Research has indicated that excessive diacritic marks can hinder skilled readers--reducing reading speed and accuracy. We conduct a behavioral experiment and show that partially marked text is often easier to read than fully marked text, and sometimes easier than plain text. In this light, we introduce Context-Contrastive Partial Diacritization (CCPD)--a novel approach to PD which integrates seamlessly with existing Arabic diacritization systems. CCPD processes each word twice, once with context and once without, and diacritizes only the characters with disparities between the two inferences. Further, we introduce novel indicators for measuring partial diacritization quality (SR, PDER, HDER, ERE), essential for establishing this as a machine learning task. Lastly, we introduce TD2, a Transformer-variant of an established model which offers a markedly different per formance profile on our proposed indicators compared to all other known systems.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:04:59 GMT" } ]
2024-01-18T00:00:00
[ [ "ElNokrashy", "Muhammad", "" ], [ "AlKhamissi", "Badr", "" ] ]
2401.08920
Tongda Xu
Tongda Xu, Ziran Zhu, Dailan He, Yanghao Li, Lina Guo, Yuanyuan Wang, Zhe Wang, Hongwei Qin, Yan Wang, Jingjing Liu, Ya-Qin Zhang
Idempotence and Perceptual Image Compression
ICLR 2024
null
null
null
eess.IV cs.CV
http://creativecommons.org/licenses/by/4.0/
Idempotence is the stability of image codec to re-compression. At the first glance, it is unrelated to perceptual image compression. However, we find that theoretically: 1) Conditional generative model-based perceptual codec satisfies idempotence; 2) Unconditional generative model with idempotence constraint is equivalent to conditional generative codec. Based on this newfound equivalence, we propose a new paradigm of perceptual image codec by inverting unconditional generative model with idempotence constraints. Our codec is theoretically equivalent to conditional generative codec, and it does not require training new models. Instead, it only requires a pre-trained mean-square-error codec and unconditional generative model. Empirically, we show that our proposed approach outperforms state-of-the-art methods such as HiFiC and ILLM, in terms of Fr\'echet Inception Distance (FID). The source code is provided in https://github.com/tongdaxu/Idempotence-and-Perceptual-Image-Compression.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:05:21 GMT" } ]
2024-01-18T00:00:00
[ [ "Xu", "Tongda", "" ], [ "Zhu", "Ziran", "" ], [ "He", "Dailan", "" ], [ "Li", "Yanghao", "" ], [ "Guo", "Lina", "" ], [ "Wang", "Yuanyuan", "" ], [ "Wang", "Zhe", "" ], [ "Qin", "Hongwei", "" ], [ "Wang", "Yan", "" ], [ "Liu", "Jingjing", "" ], [ "Zhang", "Ya-Qin", "" ] ]
2401.08921
Cheng-Xiang Wang
Cheng-Xiang Wang, Yue Yang, Jie Huang, Xiqi Gao, Tie Jun Cui, Lajos Hanzo
Electromagnetic Information Theory: Fundamentals and Applications for 6G Wireless Communication Systems
null
null
null
null
cs.IT cs.SY eess.SP eess.SY math.IT
http://creativecommons.org/licenses/by/4.0/
In wireless communications, electromagnetic theory and information theory constitute a pair of fundamental theories, bridged by antenna theory and wireless propagation channel modeling theory. Up to the fifth generation (5G) wireless communication networks, these four theories have been developing relatively independently. However, in sixth generation (6G) space-air-ground-sea wireless communication networks, seamless coverage is expected in the three-dimensional (3D) space, potentially necessitating the acquisition of channel state information (CSI) and channel capacity calculation at anywhere and any time. Additionally, the key 6G technologies such as ultra-massive multiple-input multiple-output (MIMO) and holographic MIMO achieves intricate interaction of the antennas and wireless propagation environments, which necessitates the joint modeling of antennas and wireless propagation channels. To address the challenges in 6G, the integration of the above four theories becomes inevitable, leading to the concept of the so-called electromagnetic information theory (EIT). In this article, a suite of 6G key technologies is highlighted. Then, the concepts and relationships of the four theories are unveiled. Finally, the necessity and benefits of integrating them into the EIT are revealed.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:06:27 GMT" } ]
2024-01-18T00:00:00
[ [ "Wang", "Cheng-Xiang", "" ], [ "Yang", "Yue", "" ], [ "Huang", "Jie", "" ], [ "Gao", "Xiqi", "" ], [ "Cui", "Tie Jun", "" ], [ "Hanzo", "Lajos", "" ] ]
2401.08922
Ronnie de Souza Santos Dr
Ronnie de Souza Santos, Willian Grillo, Djafran Cabral, Catarina de Castro, Nicole Albuquerque, Cesar Fran\c{c}a
Post-Pandemic Hybrid Work in Software Companies: Findings from an Industrial Case Study
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
Context. Software professionals learned from their experience during the pandemic that most of their work can be done remotely, and now software companies are expected to adopt hybrid work models to avoid the resignation of talented professionals who require more flexibility and work-life balance. However, hybrid work is a spectrum of flexible work arrangements, and currently, there are no well-established hybrid work configurations to be followed in the post-pandemic period. Goal. We investigated how software engineers are experiencing the post-pandemic hybrid work landscape, aiming to understand the factors that influence their choices between remote and in-office work. Method. We explored a large South American company by collecting quantitative and qualitative data from 545 software professionals who are currently navigating diverse hybrid work arrangements tailored to their individual and team requirements. Findings. Our study revealed an array of factors that significantly impact hybrid work within the software industry, including individual preferences, work-life balance, commute time, social interactions, productivity, and more. Team dynamics, project demands, client expectations, and organizational strategies also play an important role in shaping the complex landscape of hybrid work configurations in software engineering. Conclusions. In summary, the success of hybrid work models depends on balancing individual preferences, team dynamics, and organizational strategies. Our study demonstrated that, at present, there is no one-size-fits-all individual approach to hybrid work in the software industry.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:08:37 GMT" } ]
2024-01-18T00:00:00
[ [ "Santos", "Ronnie de Souza", "" ], [ "Grillo", "Willian", "" ], [ "Cabral", "Djafran", "" ], [ "de Castro", "Catarina", "" ], [ "Albuquerque", "Nicole", "" ], [ "França", "Cesar", "" ] ]
2401.08923
Aydogan Ozcan
Jingtian Hu, Kun Liao, Niyazi Ulas Dinc, Carlo Gigli, Bijie Bai, Tianyi Gan, Xurong Li, Hanlong Chen, Xilin Yang, Yuhang Li, Cagatay Isil, Md Sadman Sakib Rahman, Jingxi Li, Xiaoyong Hu, Mona Jarrahi, Demetri Psaltis, and Aydogan Ozcan
Subwavelength Imaging using a Solid-Immersion Diffractive Optical Processor
32 Pages, 9 Figures
null
null
null
physics.optics cs.CV physics.app-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Phase imaging is widely used in biomedical imaging, sensing, and material characterization, among other fields. However, direct imaging of phase objects with subwavelength resolution remains a challenge. Here, we demonstrate subwavelength imaging of phase and amplitude objects based on all-optical diffractive encoding and decoding. To resolve subwavelength features of an object, the diffractive imager uses a thin, high-index solid-immersion layer to transmit high-frequency information of the object to a spatially-optimized diffractive encoder, which converts/encodes high-frequency information of the input into low-frequency spatial modes for transmission through air. The subsequent diffractive decoder layers (in air) are jointly designed with the encoder using deep-learning-based optimization, and communicate with the encoder layer to create magnified images of input objects at its output, revealing subwavelength features that would otherwise be washed away due to diffraction limit. We demonstrate that this all-optical collaboration between a diffractive solid-immersion encoder and the following decoder layers in air can resolve subwavelength phase and amplitude features of input objects in a highly compact design. To experimentally demonstrate its proof-of-concept, we used terahertz radiation and developed a fabrication method for creating monolithic multi-layer diffractive processors. Through these monolithically fabricated diffractive encoder-decoder pairs, we demonstrated phase-to-intensity transformations and all-optically reconstructed subwavelength phase features of input objects by directly transforming them into magnified intensity features at the output. This solid-immersion-based diffractive imager, with its compact and cost-effective design, can find wide-ranging applications in bioimaging, endoscopy, sensing and materials characterization.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:12:57 GMT" } ]
2024-01-18T00:00:00
[ [ "Hu", "Jingtian", "" ], [ "Liao", "Kun", "" ], [ "Dinc", "Niyazi Ulas", "" ], [ "Gigli", "Carlo", "" ], [ "Bai", "Bijie", "" ], [ "Gan", "Tianyi", "" ], [ "Li", "Xurong", "" ], [ "Chen", "Hanlong", "" ], [ "Yang", "Xilin", "" ], [ "Li", "Yuhang", "" ], [ "Isil", "Cagatay", "" ], [ "Rahman", "Md Sadman Sakib", "" ], [ "Li", "Jingxi", "" ], [ "Hu", "Xiaoyong", "" ], [ "Jarrahi", "Mona", "" ], [ "Psaltis", "Demetri", "" ], [ "Ozcan", "Aydogan", "" ] ]
2401.08924
Z Yan
Weifang Weng, Zhenya Yan
Soliton gas for the focusing Hirota equation via Riemann-Hilbert problems: Large-space and long-time asymptotic behaviors
41 pages, 8 figures,
null
null
null
nlin.SI math-ph math.AP math.MP nlin.PS physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Hirota equation is one of the integrable higher-order extensions of the nonlinear Schr\"odinger equation, and can describe the ultra-short optical pulse propagation in the form $iq_t+\alpha(q_{xx}+ 2|q|^2q)+i\beta (q_{xxx}+ 6|q|^2q_x)=0,\, (x,t)\in\mathbb{R}^2\, (\alpha,\,\beta\in\mathbb{R})$. In this paper, we analytically explore the asymptotic behaviors of a soliton gas for the Hirota equation including the complex modified KdV equation, in which the soliton gas is regarded as the limit $N\to \infty$ of $N$-soliton solutions, and characterized using the Riemann-Hilbert problem with discrete spectra restricted in the intervals $(ia, ib)\cup (-ib, -ia)\, (0<a<b)$. We find that this soliton gas tends slowly to the Jaocbian elliptic wave solution with an error $\mathcal{O}(|x|^{-1})$ (zero exponentially quickly ) as $x\to -\infty$ ($x\to +\infty$). We also present the long-time asymptotics of the soliton gas under the different velocity conditions: $x/t>4\beta b^2,\, \xi_c<x/t<4\beta b^2,\, x/t<\xi_c$. Moreover, we analyze the property of the soliton gas for the case of the discrete spectra filling uniformly a quadrature domain.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:15:42 GMT" } ]
2024-01-18T00:00:00
[ [ "Weng", "Weifang", "" ], [ "Yan", "Zhenya", "" ] ]
2401.08925
Saleh Khalaj Monfared
Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Physical side-channel attacks can compromise the security of integrated circuits. Most of the physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or voltage fluctuations where algorithmic countermeasures, such as masking, can effectively mitigate the attacks. However, as demonstrated recently, these mitigation techniques are not entirely effective against backscattered side-channel attacks such as impedance analysis. In the case of an impedance attack, an adversary exploits the data-dependent impedance variations of chip power delivery network (PDN) to extract secret information. In this work, we introduce RandOhm, which exploits moving target defense (MTD) strategy based on partial reconfiguration of mainstream FPGAs, to defend against impedance side-channel attacks. We demonstrate that the information leakage through the PDN impedance could be reduced via run-time reconfiguration of the secret-sensitive parts of the circuitry. Hence, by constantly randomizing the placement and routing of the circuit, one can decorrelate the data-dependent computation from the impedance value. To validate our claims, we present a systematic approach equipped with two different partial reconfiguration strategies on implementations of the AES cipher realized on 28-nm FPGAs. We investigate the overhead of our mitigation in terms of delay and performance and provide security analysis by performing non-profiled and profiled impedance analysis attacks against these implementations to demonstrate the resiliency of our approach.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:22:28 GMT" } ]
2024-01-18T00:00:00
[ [ "Monfared", "Saleh Khalaj", "" ], [ "Forte", "Domenic", "" ], [ "Tajik", "Shahin", "" ] ]
2401.08926
Songlin Fan
Songlin Fan, Zixuan Guo, Wei Gao, Ge Li
Uncertainty-aware No-Reference Point Cloud Quality Assessment
null
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The evolution of compression and enhancement algorithms necessitates an accurate quality assessment for point clouds. Previous works consistently regard point cloud quality assessment (PCQA) as a MOS regression problem and devise a deterministic mapping, ignoring the stochasticity in generating MOS from subjective tests. Besides, the viewpoint switching of 3D point clouds in subjective tests reinforces the judging stochasticity of different subjects compared with traditional images. This work presents the first probabilistic architecture for no-reference PCQA, motivated by the labeling process of existing datasets. The proposed method can model the quality judging stochasticity of subjects through a tailored conditional variational autoencoder (CVAE) and produces multiple intermediate quality ratings. These intermediate ratings simulate the judgments from different subjects and are then integrated into an accurate quality prediction, mimicking the generation process of a ground truth MOS. Specifically, our method incorporates a Prior Module, a Posterior Module, and a Quality Rating Generator, where the former two modules are introduced to model the judging stochasticity in subjective tests, while the latter is developed to generate diverse quality ratings. Extensive experiments indicate that our approach outperforms previous cutting-edge methods by a large margin and exhibits gratifying cross-dataset robustness.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:25:42 GMT" } ]
2024-01-18T00:00:00
[ [ "Fan", "Songlin", "" ], [ "Guo", "Zixuan", "" ], [ "Gao", "Wei", "" ], [ "Li", "Ge", "" ] ]
2401.08927
J. E. Hirsch
J. E. Hirsch
Comment on arXiv:2312.04495 by M. I. Eremets and coauthors
null
null
null
null
cond-mat.supr-con
http://creativecommons.org/licenses/by/4.0/
In the recently posted arXiv:2312.04495v3 [1], its authors used a computer code written by me supplied to them by the authors of Ref. [2], and claimed that the results that they obtained invalidate the results and conclusions presented in the paper J. Supercond. Nov. Mag. 35, 3141-3145 (2022) by F. Marsiglio and myself [2]. Here I point out that the authors' claim (i) resulted from improper unauthorized use of my computer code, (ii) is wrong, and (iii) is misleading to the scientific community.
[ { "version": "v1", "created": "Mon, 15 Jan 2024 03:34:59 GMT" } ]
2024-01-18T00:00:00
[ [ "Hirsch", "J. E.", "" ] ]
2401.08928
Vera Roshchina
Alexander Plakhov and Vera Roshchina
The problem of optimal camouflaging
null
null
null
null
math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of camouflaging for bodies with specular surface in the framework of geometric optics. The index of visibility introduced in [Plakhov 2017] measures the mean deviation of light rays incident on the body's surface. We study the problem of minimal visibility index for bodies with fixed volume contained in the unit sphere. This problem is reduced to a special vector-valued problem of optimal mass transfer, which is solved partly analytically and partly numerically. This paper is a continuation of the study started in [Plakhov 2009], [Plakhov 2017], and [Plakhov and Roshchina 2011].
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:37:45 GMT" } ]
2024-01-18T00:00:00
[ [ "Plakhov", "Alexander", "" ], [ "Roshchina", "Vera", "" ] ]
2401.08929
Van-Quy Nguyen
Antoine Mandel, Van-Quy Nguyen, and Bach Dong-Xuan
Strategic formation of production networks
null
null
null
null
econ.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a strategic model of the formation of production networks that subsumes the standard general equilibrium approach. The objective of firms in our setting is to choose their supply relationships so as to maximize their profit at the general equilibrium that unfolds. We show that this objective is equivalent to the maximization by the firms of their eigenvector centrality in the production network. As is common in network formation games based on centrality, there are multiple Nash equilibria in our setting. We have investigated the characteristics and the social efficiency of these equilibria in a stylized version of our model representing international trade networks. We show that the impact of network structure on social welfare is firstly determined by a trade-off between costs of increasing process complexity and positive spillovers on productivity induced by the diversification of the input mix. We further analyze a variant of our model that accounts for the risks of disruption of supply relationships. In this setting, we characterize how social welfare depends on the structure of the production network, the spatial distribution of risks, and the process of shock aggregation in supply chains. We finally show that simple trade policies characterized by sets of links that are either prevented or catalyzed can be a powerful equilibrium selection device.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:55:35 GMT" } ]
2024-01-18T00:00:00
[ [ "Mandel", "Antoine", "" ], [ "Nguyen", "Van-Quy", "" ], [ "Dong-Xuan", "Bach", "" ] ]
2401.08930
Haorui Ji
Haorui Ji, Hongdong Li
3D Human Pose Analysis via Diffusion Synthesis
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diffusion models have demonstrated remarkable success in generative modeling. In this paper, we propose PADS (Pose Analysis by Diffusion Synthesis), a novel framework designed to address various challenges in 3D human pose analysis through a unified pipeline. Central to PADS are two distinctive strategies: i) learning a task-agnostic pose prior using a diffusion synthesis process to effectively capture the kinematic constraints in human pose data, and ii) unifying multiple pose analysis tasks like estimation, completion, denoising, etc, as instances of inverse problems. The learned pose prior will be treated as a regularization imposing on task-specific constraints, guiding the optimization process through a series of conditional denoising steps. PADS represents the first diffusion-based framework for tackling general 3D human pose analysis within the inverse problem framework. Its performance has been validated on different benchmarks, signaling the adaptability and robustness of this pipeline.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 02:59:34 GMT" } ]
2024-01-18T00:00:00
[ [ "Ji", "Haorui", "" ], [ "Li", "Hongdong", "" ] ]
2401.08931
Chang Liu
Yilin Guo, Chang Liu, Xu Guo
Shell-infill composite structure design based on a hybrid explicit-implicit topology optimization method
null
null
null
null
math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper introduces a hybrid explicit-implicit topology optimization method for shell-infill composite structure design. The proposed approach effectively combines the advantages of the explicit Moving Morphable Component (MMC) method, which describes structural topology only using a set of geometric parameters, and the implicit Solid Isotropic Material with Penalization (SIMP) method, which offers greater design freedom for characterizing the structural features. Compared to the existing methods for shell-infill structure design, the proposed approach can obtain optimized shell-infill structures with complex infill topology without resorting to complex filtering/projection operations. Numerical examples demonstrate the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:01:14 GMT" } ]
2024-01-18T00:00:00
[ [ "Guo", "Yilin", "" ], [ "Liu", "Chang", "" ], [ "Guo", "Xu", "" ] ]
2401.08932
Zili Liu
Zili Liu, Hao Chen, Wenyuan Li, Keyan Chen, Zipeng Qi, Chenyang Liu, Zhengxia Zou, Zhenwei Shi
Learning to detect cloud and snow in remote sensing images from noisy labels
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting clouds and snow in remote sensing images is an essential preprocessing task for remote sensing imagery. Previous works draw inspiration from semantic segmentation models in computer vision, with most research focusing on improving model architectures to enhance detection performance. However, unlike natural images, the complexity of scenes and the diversity of cloud types in remote sensing images result in many inaccurate labels in cloud and snow detection datasets, introducing unnecessary noises into the training and testing processes. By constructing a new dataset and proposing a novel training strategy with the curriculum learning paradigm, we guide the model in reducing overfitting to noisy labels. Additionally, we design a more appropriate model performance evaluation method, that alleviates the performance assessment bias caused by noisy labels. By conducting experiments on models with UNet and Segformer, we have validated the effectiveness of our proposed method. This paper is the first to consider the impact of label noise on the detection of clouds and snow in remote sensing images.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:02:31 GMT" } ]
2024-01-18T00:00:00
[ [ "Liu", "Zili", "" ], [ "Chen", "Hao", "" ], [ "Li", "Wenyuan", "" ], [ "Chen", "Keyan", "" ], [ "Qi", "Zipeng", "" ], [ "Liu", "Chenyang", "" ], [ "Zou", "Zhengxia", "" ], [ "Shi", "Zhenwei", "" ] ]
2401.08933
Nathan Hagen
Nathan Hagen
Graduate education in optics in Japan and the United States: impact of funding levels on educational structure
null
null
null
null
physics.ed-ph
http://creativecommons.org/licenses/by/4.0/
We compare the optical science & engineering educational environments at two universities in two countries: Utsunomiya University in Japan, and the University of Arizona in the United States. Because the university education systems in the two countries are so different, we also explain how financial arrangements drive many of these differences and discuss how these impact student and faculty life.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:02:53 GMT" } ]
2024-01-18T00:00:00
[ [ "Hagen", "Nathan", "" ] ]
2401.08934
Ensuo Ma
E. S. Ma and Z. Song
Topological charge pumping in dimerized Kitaev chains
null
null
null
null
cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigated the topological pumping charge of a dimerized Kitaev chain with spatially modulated chemical potential, which hosts nodal loops in parameter space and violates particle number conservation. In the simplest case, with alternatively assigned hopping and pairing terms, we show that the model can be mapped into the Rice-Mele model by a partial particle-hole transformation and subsequently supports topological charge pumping as a demonstration of the Chern number for the ground state. Beyond this special case, analytic analysis shows that the nodal loops are conic curves. Numerical simulation of a finite-size chain indicates that the pumping charge is zero for a quasiadiabatic loop within the nodal loop and is $\pm 1$ for a quasiadiabatic passage enclosing the nodal loop. Our findings unveil a hidden topology in a class of Kitaev chains.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:04:27 GMT" } ]
2024-01-18T00:00:00
[ [ "Ma", "E. S.", "" ], [ "Song", "Z.", "" ] ]
2401.08935
Egon Zhu
Yingen Zhu, Jia Huang, Hongzhou Lu, Wenjin Wang
Privacy Protected Contactless Cardio-respiratory Monitoring using Defocused Cameras during Sleep
null
null
null
null
eess.SP
http://creativecommons.org/licenses/by-nc-nd/4.0/
The monitoring of vital signs such as heart rate (HR) and respiratory rate (RR) during sleep is important for the assessment of sleep quality and detection of sleep disorders. Camera-based HR and RR monitoring gained popularity in sleep monitoring in recent years. However, they are all facing with serious privacy issues when using a video camera in the sleeping scenario. In this paper, we propose to use the defocused camera to measure vital signs from optically blurred images, which can fundamentally eliminate the privacy invasion as face is difficult to be identified in obtained blurry images. A spatial-redundant framework involving living-skin detection is used to extract HR and RR from the defocused camera in NIR, and a motion metric is designed to exclude outliers caused by body motions. In the benchmark, the overall Mean Absolute Error (MAE) for HR measurement is 4.4 bpm, for RR measurement is 5.9 bpm. Both have quality drops as compared to the measurement using a focused camera, but the degradation in HR is much less, i.e. HR measurement has strong correlation with the reference ($R \geq 0.90$). Preliminary experiments suggest that it is feasible to use a defocused camera for cardio-respiratory monitoring while protecting the privacy. Further improvement is needed for robust RR measurement, such as by PPG-modulation based RR extraction.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:05:24 GMT" } ]
2024-01-18T00:00:00
[ [ "Zhu", "Yingen", "" ], [ "Huang", "Jia", "" ], [ "Lu", "Hongzhou", "" ], [ "Wang", "Wenjin", "" ] ]
2401.08936
Aida Afshar
Aida Afshar, Wenchao Li
DeLF: Designing Learning Environments with Foundation Models
AAAI 2024 Workshop on Synergy of Reinforcement Learning and Large Language Models
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reinforcement learning (RL) offers a capable and intuitive structure for the fundamental sequential decision-making problem. Despite impressive breakthroughs, it can still be difficult to employ RL in practice in many simple applications. In this paper, we try to address this issue by introducing a method for designing the components of the RL environment for a given, user-intended application. We provide an initial formalization for the problem of RL component design, that concentrates on designing a good representation for observation and action space. We propose a method named DeLF: Designing Learning Environments with Foundation Models, that employs large language models to design and codify the user's intended learning scenario. By testing our method on four different learning environments, we demonstrate that DeLF can obtain executable environment codes for the corresponding RL problems.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:14:28 GMT" } ]
2024-01-18T00:00:00
[ [ "Afshar", "Aida", "" ], [ "Li", "Wenchao", "" ] ]
2401.08937
Weiyao Wang
Weiyao Wang, Pierre Gleize, Hao Tang, Xingyu Chen, Kevin J Liang, Matt Feiszli
ICON: Incremental CONfidence for Joint Pose and Radiance Field Optimization
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural Radiance Fields (NeRF) exhibit remarkable performance for Novel View Synthesis (NVS) given a set of 2D images. However, NeRF training requires accurate camera pose for each input view, typically obtained by Structure-from-Motion (SfM) pipelines. Recent works have attempted to relax this constraint, but they still often rely on decent initial poses which they can refine. Here we aim at removing the requirement for pose initialization. We present Incremental CONfidence (ICON), an optimization procedure for training NeRFs from 2D video frames. ICON only assumes smooth camera motion to estimate initial guess for poses. Further, ICON introduces ``confidence": an adaptive measure of model quality used to dynamically reweight gradients. ICON relies on high-confidence poses to learn NeRF, and high-confidence 3D structure (as encoded by NeRF) to learn poses. We show that ICON, without prior pose initialization, achieves superior performance in both CO3D and HO3D versus methods which use SfM pose.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:18:02 GMT" } ]
2024-01-18T00:00:00
[ [ "Wang", "Weiyao", "" ], [ "Gleize", "Pierre", "" ], [ "Tang", "Hao", "" ], [ "Chen", "Xingyu", "" ], [ "Liang", "Kevin J", "" ], [ "Feiszli", "Matt", "" ] ]
2401.08938
Paul Nikolaev
Paul Nikolaev, David J. Pr\"omel
Quantitative relative entropy estimates on the whole space for convolution interaction forces
null
null
null
null
math.PR math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantitative estimates are derived, on the whole space, for the relative entropy between the joint law of random interacting particles and the tensorized law at the limiting systeme. The developed method combines the relative entropy method under the moderated interaction scaling introduced by Oeschl\"ager, and the propagation of chaos in probability. The result includes the case that the interaction force does not need to be a potential field. Furthermore, if the interaction force is a potential field, with a convolutional structure, then the developed estimate also provides the modulated energy estimates. Moreover, we demonstrate propagation of chaos for large stochastic systems of interacting particles and discuss possible applications to various interacting particle systems, including the Coulomb interaction case.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:19:11 GMT" } ]
2024-01-18T00:00:00
[ [ "Nikolaev", "Paul", "" ], [ "Prömel", "David J.", "" ] ]
2401.08939
Yingbing Chen
Yingbing Chen, Jie Cheng, Sheng Wang, Hongji Liu, Xiaodong Mei, Xiaoyang Yan, Mingkai Tang, Ge Sun, Ya Wen, Junwei Cai, Xupeng Xie, Lu Gan, Mandan Chao, Ren Xin, Ming Liu, Jianhao Jiao, Kangcheng Liu, and Lujia Wang
Enhancing Campus Mobility: Achievements and Challenges of Autonomous Shuttle "Snow Lion''
9 pages, 9 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid evolution of autonomous vehicles (AVs) has significantly influenced global transportation systems. In this context, we present ``Snow Lion'', an autonomous shuttle meticulously designed to revolutionize on-campus transportation, offering a safer and more efficient mobility solution for students, faculty, and visitors. The primary objective of this research is to enhance campus mobility by providing a reliable, efficient, and eco-friendly transportation solution that seamlessly integrates with existing infrastructure and meets the diverse needs of a university setting. To achieve this goal, we delve into the intricacies of the system design, encompassing sensing, perception, localization, planning, and control aspects. We evaluate the autonomous shuttle's performance in real-world scenarios, involving a 1146-kilometer road haul and the transportation of 442 passengers over a two-month period. These experiments demonstrate the effectiveness of our system and offer valuable insights into the intricate process of integrating an autonomous vehicle within campus shuttle operations. Furthermore, a thorough analysis of the lessons derived from this experience furnishes a valuable real-world case study, accompanied by recommendations for future research and development in the field of autonomous driving.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:20:30 GMT" } ]
2024-01-18T00:00:00
[ [ "Chen", "Yingbing", "" ], [ "Cheng", "Jie", "" ], [ "Wang", "Sheng", "" ], [ "Liu", "Hongji", "" ], [ "Mei", "Xiaodong", "" ], [ "Yan", "Xiaoyang", "" ], [ "Tang", "Mingkai", "" ], [ "Sun", "Ge", "" ], [ "Wen", "Ya", "" ], [ "Cai", "Junwei", "" ], [ "Xie", "Xupeng", "" ], [ "Gan", "Lu", "" ], [ "Chao", "Mandan", "" ], [ "Xin", "Ren", "" ], [ "Liu", "Ming", "" ], [ "Jiao", "Jianhao", "" ], [ "Liu", "Kangcheng", "" ], [ "Wang", "Lujia", "" ] ]
2401.08940
Abdur Rasool
Saba Aslam, Abdur Rasool, Hongyan Wu, Xiaoli Li
CEL: A Continual Learning Model for Disease Outbreak Prediction by Leveraging Domain Adaptation via Elastic Weight Consolidation
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Continual learning, the ability of a model to learn over time without forgetting previous knowledge and, therefore, be adaptive to new data, is paramount in dynamic fields such as disease outbreak prediction. Deep neural networks, i.e., LSTM, are prone to error due to catastrophic forgetting. This study introduces a novel CEL model for continual learning by leveraging domain adaptation via Elastic Weight Consolidation (EWC). This model aims to mitigate the catastrophic forgetting phenomenon in a domain incremental setting. The Fisher Information Matrix (FIM) is constructed with EWC to develop a regularization term that penalizes changes to important parameters, namely, the important previous knowledge. CEL's performance is evaluated on three distinct diseases, Influenza, Mpox, and Measles, with different metrics. The high R-squared values during evaluation and reevaluation outperform the other state-of-the-art models in several contexts, indicating that CEL adapts to incremental data well. CEL's robustness and reliability are underscored by its minimal 65% forgetting rate and 18% higher memory stability compared to existing benchmark studies. This study highlights CEL's versatility in disease outbreak prediction, addressing evolving data with temporal patterns. It offers a valuable model for proactive disease control with accurate, timely predictions.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:26:04 GMT" } ]
2024-01-18T00:00:00
[ [ "Aslam", "Saba", "" ], [ "Rasool", "Abdur", "" ], [ "Wu", "Hongyan", "" ], [ "Li", "Xiaoli", "" ] ]
2401.08941
Jiaqi Gu
Jiaqi Gu and Zihuai He
A Powerful and Precise Feature-level Filter using Group Knockoffs
34 pages, 5 figures
null
null
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
Selecting important features that have substantial effects on the response with provable type-I error rate control is a fundamental concern in statistics, with wide-ranging practical applications. Existing knockoff filters, although shown to provide theoretical guarantee on false discovery rate (FDR) control, often struggle to strike a balance between high power and precision in pinpointing important features when there exist large groups of strongly correlated features. To address this challenge, we develop a new filter using group knockoffs to achieve both powerful and precise selection of important features. Via experiments of simulated data and analysis of a real Alzheimer's disease genetic dataset, it is found that the proposed filter can not only control the proportion of false discoveries but also identify important features with comparable power and greater precision than the existing group knockoffs filter.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:32:27 GMT" } ]
2024-01-18T00:00:00
[ [ "Gu", "Jiaqi", "" ], [ "He", "Zihuai", "" ] ]
2401.08942
Ping Li
Ping Li, Yaping Mao, Ingo Schiermeyer, Yifan Yao
Ramsey and Gallai-Ramsey numbers for linear forests and kipas
null
null
null
null
math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For two graphs $G,H$, the \emph{Ramsey number} $r(G,H)$ is the minimum integer $n$ such that any red/blue edge-coloring of $K_n$ contains either a red copy of $G$ or a blue copy of $H$. For two graphs $G,H$, the \emph{Gallai-Ramsey number} $\operatorname{gr}_k(G:H)$ is defined as the minimum integer $n$ such that any $k$-edge-coloring of $K_n$ must contain either a rainbow copy of $G$ or a monochromatic copy of $H$. In this paper, the classical Ramsey numbers of linear forest versus kipas are obtained. We obtain the exact values of $\operatorname{gr}_k(G:H)$, where $H$ is either a path or a kipas and $G\in\{K_{1,3},P_4^+,P_5\}$ and $P_4^+$ is the graph consisting of $P_4$ with one extra edge incident with inner vertex.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:32:27 GMT" } ]
2024-01-18T00:00:00
[ [ "Li", "Ping", "" ], [ "Mao", "Yaping", "" ], [ "Schiermeyer", "Ingo", "" ], [ "Yao", "Yifan", "" ] ]
2401.08943
Lei Xun
Lei Xun, Mingyu Hu, Hengrui Zhao, Amit Kumar Singh, Jonathon Hare, Geoff V. Merrett
Fluid Dynamic DNNs for Reliable and Adaptive Distributed Inference on Edge Devices
Accepted at Design, Automation & Test in Europe Conference (DATE) 2024
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Distributed inference is a popular approach for efficient DNN inference at the edge. However, traditional Static and Dynamic DNNs are not distribution-friendly, causing system reliability and adaptability issues. In this paper, we introduce Fluid Dynamic DNNs (Fluid DyDNNs), tailored for distributed inference. Distinct from Static and Dynamic DNNs, Fluid DyDNNs utilize a novel nested incremental training algorithm to enable independent and combined operation of its sub-networks, enhancing system reliability and adaptability. Evaluation on embedded Arm CPUs with a DNN model and the MNIST dataset, shows that in scenarios of single device failure, Fluid DyDNNs ensure continued inference, whereas Static and Dynamic DNNs fail. When devices are fully operational, Fluid DyDNNs can operate in either a High-Accuracy mode and achieve comparable accuracy with Static DNNs, or in a High-Throughput mode and achieve 2.5x and 2x throughput compared with Static and Dynamic DNNs, respectively.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:34:38 GMT" } ]
2024-01-18T00:00:00
[ [ "Xun", "Lei", "" ], [ "Hu", "Mingyu", "" ], [ "Zhao", "Hengrui", "" ], [ "Singh", "Amit Kumar", "" ], [ "Hare", "Jonathon", "" ], [ "Merrett", "Geoff V.", "" ] ]
2401.08944
Zhaofeng Su
Zhaofeng Su, Nina Sukhodoeva
Optimal local filtering operation for enhancing quantum entanglement
11 pages, 1 figures
null
null
null
quant-ph
http://creativecommons.org/licenses/by-nc-sa/4.0/
Quantum entanglement is an indispensable resource for many significant quantum information processing tasks. Thus, distilling more entanglement from less entangled resource is a task of practical significance and has been investigated for decades. The literature [Verstraete \textit{et al}., \href{https://link.aps.org/doi/10.1103/PhysRevA.64.010101}{Phys. Rev. A 64, 010101(2001)}] considered a scenario to increase the entanglement by local filtering operation and qualitatively derived the variance relation of entanglement. We investigate the scenario with general two-qubit resources to find the optimal strategy of filtering operations. We obtain the upper bound for the ratio of entanglement increase and find the corresponding optimal local filtering operation to achieve the maximal ratio. Our analysis shows that the upper bound ratio grows with the length of local Bloch vector while the success probability decrease with it. We further extend the research to investigate the optimal measurement strategy by considering general measurement. Our result shows that local measurement can not increase the expectation of quantum entanglement, which gives more analytical evidence to the well known fact that local operation can not create quantum entanglement.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:36:46 GMT" } ]
2024-01-18T00:00:00
[ [ "Su", "Zhaofeng", "" ], [ "Sukhodoeva", "Nina", "" ] ]
2401.08945
Ergin Sezgin
Mehmet Ozkan, Yi Pang and Ergin Sezgin
Higher Derivative Supergravities in Diverse Dimensions
142 pages
null
null
MI-HET-826
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey on-shell and off-shell higher derivative supergravities in dimensions $1\le D\le 11$. Various approaches to their construction, including the Noether procedure, (harmonic) superspace, superform method, superconformal tensor calculus, $S$-matrix and dimensional reduction, are summarized. Primarily the bosonic parts of the invariants and the supertransformations of the fermionic fields are provided. The process of going on-shell, solutions to the Killing spinor equations, typical supersymmetric solutions, and the role of duality symmetries in the context of $R^4, D^4 R^4$ and $D^6 R^4$ invariants are reviewed.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:40:01 GMT" } ]
2024-01-18T00:00:00
[ [ "Ozkan", "Mehmet", "" ], [ "Pang", "Yi", "" ], [ "Sezgin", "Ergin", "" ] ]
2401.08946
Dmitry Prokhorov
D. A. Prokhorov, A. Moraghan
A blind search for intraday gamma-ray transients with Fermi-LAT: detections of GRB and solar emissions
11 pages, 3 figures, submitted to A&A on January 17, 2024
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a search for intraday transient gamma-ray signals using 15 years of the Fermi Large Area Telescope data. The search is based on a recently developed variable-size sliding-time-window (VSSTW) analysis and aimed at studying variable gamma-ray emission from gamma-ray bursts and the Sun. We refined the algorithm for searches for transient sources in order to solve the search problem within a reasonable amount of CPU time. These refinements allowed us to increase the number of gamma-ray bursts, solar flares, and quiescent solar events detected with the VSSTW technique by several times compared to the previous VSSTW search. The current search revealed a new gamma-ray signal recorded with Fermi-LAT on 2018 January 12. This signal is probably from a GRB and deserves an exploration of the existing archival multi-wavelength observations in order to identify it in an unambiguous way. We furthermore report a gamma-ray signal from the solar flare on 2023 December 31 which occurred during the 25th solar cycle.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:43:27 GMT" } ]
2024-01-18T00:00:00
[ [ "Prokhorov", "D. A.", "" ], [ "Moraghan", "A.", "" ] ]
2401.08947
Abdur Rasool
Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool
AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URLs Detection
null
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/4.0/
The escalating reliance on revolutionary online web services has introduced heightened security risks, with persistent challenges posed by phishing despite extensive security measures. Traditional phishing systems, reliant on machine learning and manual features, struggle with evolving tactics. Recent advances in deep learning offer promising avenues for tackling novel phishing challenges and malicious URLs. This paper introduces a two-phase stack generalized model named AntiPhishStack, designed to detect phishing sites. The model leverages the learning of URLs and character-level TF-IDF features symmetrically, enhancing its ability to combat emerging phishing threats. In Phase I, features are trained on a base machine learning classifier, employing K-fold cross-validation for robust mean prediction. Phase II employs a two-layered stacked-based LSTM network with five adaptive optimizers for dynamic compilation, ensuring premier prediction on these features. Additionally, the symmetrical predictions from both phases are optimized and integrated to train a meta-XGBoost classifier, contributing to a final robust prediction. The significance of this work lies in advancing phishing detection with AntiPhishStack, operating without prior phishing-specific feature knowledge. Experimental validation on two benchmark datasets, comprising benign and phishing or malicious URLs, demonstrates the model's exceptional performance, achieving a notable 96.04% accuracy compared to existing studies. This research adds value to the ongoing discourse on symmetry and asymmetry in information security and provides a forward-thinking solution for enhancing network security in the face of evolving cyber threats.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:44:27 GMT" } ]
2024-01-18T00:00:00
[ [ "Aslam", "Saba", "" ], [ "Aslam", "Hafsa", "" ], [ "Manzoor", "Arslan", "" ], [ "Hui", "Chen", "" ], [ "Rasool", "Abdur", "" ] ]
2401.08948
Ramkumar Natarajan
Ramkumar Natarajan, Shohin Mukherjee, Howie Choset and Maxim Likhachev
PINSAT: Parallelized Interleaving of Graph Search and Trajectory Optimization for Kinodynamic Motion Planning
Under review
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
Trajectory optimization is a widely used technique in robot motion planning for letting the dynamics and constraints on the system shape and synthesize complex behaviors. Several previous works have shown its benefits in high-dimensional continuous state spaces and under differential constraints. However, long time horizons and planning around obstacles in non-convex spaces pose challenges in guaranteeing convergence or finding optimal solutions. As a result, discrete graph search planners and sampling-based planers are preferred when facing obstacle-cluttered environments. A recently developed algorithm called INSAT effectively combines graph search in the low-dimensional subspace and trajectory optimization in the full-dimensional space for global kinodynamic planning over long horizons. Although INSAT successfully reasoned about and solved complex planning problems, the numerous expensive calls to an optimizer resulted in large planning times, thereby limiting its practical use. Inspired by the recent work on edge-based parallel graph search, we present PINSAT, which introduces systematic parallelization in INSAT to achieve lower planning times and higher success rates, while maintaining significantly lower costs over relevant baselines. We demonstrate PINSAT by evaluating it on 6 DoF kinodynamic manipulation planning with obstacles.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:50:16 GMT" } ]
2024-01-18T00:00:00
[ [ "Natarajan", "Ramkumar", "" ], [ "Mukherjee", "Shohin", "" ], [ "Choset", "Howie", "" ], [ "Likhachev", "Maxim", "" ] ]
2401.08949
Shangbin Yang Dr.
Cui Zhao, Shangbin Yang, Tingmei Wang, Haiyan Zhao, Shiyuan Liu, Fangyuan He, Zhengkun Hu
An Automatic Approach for Grouping Sunspots and Calculating Relative Sunspot Number on SDO/HMI Continuum Images
11 pages,5 figures
Published in Astronomical Journal 2024,167,52
10.3847/1538-3881/ad11e2
null
astro-ph.SR
http://creativecommons.org/licenses/by/4.0/
Relative Sunspot Number is one of the major parameters for the study of long-term solar activity. The automatic calculation of the Relative Sunspot Number is more stable and accurate as compared to manual methods. In this paper, we propose an algorithm that can detect sunspots and divide them into groups, to automatically calculate the Relative Sunspot Number. Mathematical Morphology was adopted to detect sunspots then group them. The dataset used were the continuum images from SDO/HMI. The process was carried out on the overall HMI data available on the timespan from January 2022 to May 2023 with a time cadence of one day. The experimental results indicated that the method achieved high accuracy of 85.3\%. It was well fitted with the international Relative Sunspot Number provided by Solar Influences Data Analysis Center (SIDC) (CC=0.91). We calculated the conversion factor K value of SDO/HMI for calculating the Relative Sunspots Number(K=1.03).
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:52:02 GMT" } ]
2024-01-18T00:00:00
[ [ "Zhao", "Cui", "" ], [ "Yang", "Shangbin", "" ], [ "Wang", "Tingmei", "" ], [ "Zhao", "Haiyan", "" ], [ "Liu", "Shiyuan", "" ], [ "He", "Fangyuan", "" ], [ "Hu", "Zhengkun", "" ] ]
2401.08950
Priyanka Mukhopadhyay Dr
Priyanka Mukhopadhyay
Synthesizing Toffoli-optimal quantum circuits for arbitrary multi-qubit unitaries
null
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
In this paper we study the Clifford+Toffoli universal fault-tolerant gate set. We introduce a generating set in order to represent any unitary implementable by this gate set and with this we derive a bound on the Toffoli-count of arbitrary multi-qubit unitaries. We analyse the channel representation of the generating set elements, with the help of which we infer $|\mathcal{J}_n^{Tof}|<|\mathcal{J}_n^T|$, where $\mathcal{J}_n^{Tof}$ and $\mathcal{J}_n^T$ are the set of unitaries exactly implementable by the Clifford+Toffoli and Clifford+T gate set, respectively. We develop Toffoli-count optimal synthesis algorithms for both approximately and exactly implementable multi-qubit unitaries. With the help of these we prove $|\mathcal{J}_n^{Tof}|=|\mathcal{J}_n^{CS}|$, where $\mathcal{J}_n^{CS}$ is the set of unitaries exactly implementable by the Clifford+CS gate set.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:53:37 GMT" } ]
2024-01-18T00:00:00
[ [ "Mukhopadhyay", "Priyanka", "" ] ]
2401.08951
Hongxia Yang
Hongxia Yang, Wentian Wang, Farzane Zangane, Kevin Cheevers, Logan Maley, Matei Radulescu
Detonation attenuation and quenching in hydrogen mixtures after the interaction with cylinders
Paper presented at the 34th International Symposium on Shock Waves
null
null
null
physics.flu-dyn
http://creativecommons.org/licenses/by-nc-sa/4.0/
The attenuation and quenching of H$_2$/O$_2$ detonations transmitted across a column of cylinders were studied experimentally and analytically at sub-atmospheric pressures. Two distinct transmission regimes were observed: successful transmission and complete quenching. The transition between the two regimes was found to correlate with the ratio of inter-cylinder separation distance (b) to a characteristic detonation scale for large blockage ratios (BRs), with critical limits comparable with those previously reported for detonation diffraction from slots. Based on available cell size measurements, the critical transmission limit was $b/\lambda=4.5\pm3$. The proposed theoretical model based on Whitham's geometric shock dynamics confirmed the equivalence between the detonation diffraction at abrupt area changes and around cylinders with large BRs. Complete quenching observed experimentally was accounted for by the weak transmitted shock strength upon detonation failure. For the tested BRs, the transmitted shock speed ranged between 50% and 60% of the Chapman-Jouguet detonation speed. As a result, the post-shock temperatures fell below the cross-over regime for hydrogen ignition, leading to very long ignition delay times ($t_i$) despite the temperature rise induced by Mach reflection. The long $t_i$ suppressed auto-ignition, while the high isentropic exponent prevented further convective mixing required for re-initiation. This explained the fundamental difference between arresting hydrogen and hydrocarbon detonations, for which transmitted fast flames punctuated by auto-ignition events were always observed. The transmitted shock strength was found to be well-predicted by our previous self-similar multiple discontinuity gas-dynamic model. Over a very narrow range near the critical conditions, both hot spot re-ignition and detonation re-initiation from Mach shock reflections were observed.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 03:54:03 GMT" } ]
2024-01-18T00:00:00
[ [ "Yang", "Hongxia", "" ], [ "Wang", "Wentian", "" ], [ "Zangane", "Farzane", "" ], [ "Cheevers", "Kevin", "" ], [ "Maley", "Logan", "" ], [ "Radulescu", "Matei", "" ] ]
2401.08952
Toshihiro Fujii
Toshihiro Fujii
The past and future 20-years endeavor for discovering origins of ultra-high energy cosmic rays -- Rapporteur's summary of cosmic ray indirect
27 pages, 11 figures, Rapporteur talk in the 38th International Cosmic Ray Conference (ICRC2023)
null
10.22323/1.444.0031
PoS (ICRC2023) 031
astro-ph.HE astro-ph.IM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article is the rapporteur's summary of the cosmic ray indirect sessions of the 38th International Cosmic Ray Conference in Nagoya, Japan. The rapporteur highlights cosmic ray indirect observatories around the world, and reviews a selection of the latest results regarding the cosmic ray energy spectrum, mass composition, anisotropy, hadronic interaction models, theory, geophysics, interdisciplinary research, and future projects.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:00:00 GMT" }, { "version": "v2", "created": "Thu, 18 Jan 2024 09:35:21 GMT" } ]
2024-01-19T00:00:00
[ [ "Fujii", "Toshihiro", "" ] ]
2401.08953
Faisal Haque Bappy
Tariqul Islam, Faisal Haque Bappy, Md Nafis Ul Haque Shifat, Farhan Ahmad, Kamrul Hasan, Tarannum Shaila Zaman
An Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree
null
null
null
null
cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An efficient, scalable, and provably secure dynamic auditing scheme is highly desirable in the cloud storage environment for verifying the integrity of the outsourced data. Most of the existing work on remote integrity checking focuses on static archival data and therefore cannot be applied to cases where dynamic data updates are more common. Additionally, existing auditing schemes suffer from performance bottlenecks and scalability issues. To address these issues, in this paper, we present a novel dynamic auditing scheme for centralized cloud environments leveraging an enhanced version of the B-tree. Our proposed scheme achieves the immutable characteristic of a decentralized system (i.e., blockchain technology) while effectively addressing the synchronization and performance challenges of such systems. Unlike other static auditing schemes, our scheme supports dynamic insert, update, and delete operations. Also, by leveraging an enhanced B-tree, our scheme maintains a balanced tree after any alteration to a certain file, improving performance significantly. Experimental results show that our scheme outperforms both traditional Merkle Hash Tree-based centralized auditing and decentralized blockchain-based auditing schemes in terms of block modifications (e.g., insert, delete, update), block retrieval, and data verification time.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:01:18 GMT" } ]
2024-01-18T00:00:00
[ [ "Islam", "Tariqul", "" ], [ "Bappy", "Faisal Haque", "" ], [ "Shifat", "Md Nafis Ul Haque", "" ], [ "Ahmad", "Farhan", "" ], [ "Hasan", "Kamrul", "" ], [ "Zaman", "Tarannum Shaila", "" ] ]
2401.08954
William Sands
Andrew J. Christlieb, William A. Sands, Stephen White
A Particle-in-cell Method for Plasmas with a Generalized Momentum Formulation, Part II: Enforcing the Lorenz Gauge Condition
18 pages, 4 figures, 3 tables,1 algorithm. arXiv admin note: text overlap with arXiv:2208.11291
null
null
null
physics.plasm-ph cs.NA math.NA physics.comp-ph
http://creativecommons.org/licenses/by/4.0/
In a previous paper, we developed a new particle-in-cell method for the Vlasov-Maxwell system in which the electromagnetic fields and the equations of motion for the particles were cast in terms of scalar and vector potentials through a Hamiltonian formulation. This paper extends this new class of methods by focusing on the enforcement the Lorenz gauge condition in both exact and approximate forms using co-located meshes. A time-consistency property of the proposed field solver for the vector potential form of Maxwell's equations is established, which is shown to preserve the equivalence between the semi-discrete Lorenz gauge condition and the analogous semi-discrete continuity equation. Using this property, we present three methods to enforce a semi-discrete gauge condition. The first method introduces an update for the continuity equation that is consistent with the discretization of the Lorenz gauge condition. The second approach we propose enforces a semi-discrete continuity equation using the boundary integral solution to the field equations. The third approach introduces a gauge correcting method that makes direct use of the gauge condition to modify the scalar potential and uses local maps for both the charge and current densities. The vector potential coming from the current density is taken to be exact, and using the Lorenz gauge, we compute a correction to the scalar potential that makes the two potentials satisfy the gauge condition. We demonstrate two of the proposed methods in the context of periodic domains. Problems defined on bounded domains, including those with complex geometric features remain an ongoing effort. However, this work shows that it is possible to design computationally efficient methods that can effectively enforce the Lorenz gauge condition in an non-staggered PIC formulation.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:06:19 GMT" } ]
2024-01-18T00:00:00
[ [ "Christlieb", "Andrew J.", "" ], [ "Sands", "William A.", "" ], [ "White", "Stephen", "" ] ]
2401.08955
Jimreeves David M
Jimreeves David M and Victor Steinberg
Elastic waves in a Hele-Shaw cell with a co-moving Kelvin-Helmholtz-like parallel shear flow
null
null
null
null
physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report the presence of traveling Elastic Waves in experiments featuring a shear flow in the very low Reynolds number regime (Re < 0.1) with no external curvatures or internal perturbations in the channel design. The classic Kelvin-Helmholtz type shear flow with an inflection point in its velocity profile is generated by co-moving dilute polymeric solutions moving at different speeds within a Hele-Shaw cell. Notably, this is the first observation of Elastic waves in straight channels, with no internal or external wall curvatures or physical perturbation sources present in the flow or on the channel walls, making the differential velocity of the parallel streams the only possible source of generation of Elastic Waves. The interface between the co-moving streams displays a wavy and unsteady nature for all studied cases. Furthermore, the frequency and wave speed of the Elastic Waves are found to scale with the Weissenberg number, which is based on the velocity difference between the streams. This finding contributes to the emerging body of evidence regarding the presence of Elastic Waves in straight channels with minimal perturbation sources (Steinberg 2022).
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:08:32 GMT" } ]
2024-01-18T00:00:00
[ [ "M", "Jimreeves David", "" ], [ "Steinberg", "Victor", "" ] ]
2401.08956
Xuyang Zhang
Xuyang Zhang, Xinwei Yue, Tian Li, Zhihao Han, Yafei Wang, Yong Ding and Rongke Liu
A Unified NOMA Framework in Beam-Hopping Satellite Communication Systems
null
IEEE Transactions on Aerospace and Electronic Systems, vol. 59, no. 5, pp. 5390-5404, Oct. 2023
10.1109/TAES.2023.3260059
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the application of a unified non-orthogonal multiple access framework in beam hopping (U-NOMA-BH) based satellite communication systems. More specifically, the proposed U-NOMA-BH framework can be applied to code-domain NOMA based BH (CD-NOMA-BH) and power-domain NOMA based BH (PD-NOMA-BH) systems. To satisfy dynamic-uneven traffic demands, we formulate the optimization problem to minimize the square of discrete difference by jointly optimizing power allocation, carrier assignment and beam scheduling. The non-convexity of the objective function and the constraint condition is solved through Dinkelbach's transform and variable relaxation. As a further development, the closed-from and asymptotic expressions of outage probability are derived for CD/PD-NOMA-BH systems. Based on approximated results, the diversity orders of a pair of users are obtained in detail. In addition, the system throughput of U-NOMA-BH is discussed in delay-limited transmission mode. Numerical results verify that: i) The gap between traffic requests of CD/PD-NOMA-BH systems appears to be more closely compared with orthogonal multiple access based BH (OMA-BH); ii) The CD-NOMA-BH system is capable of providing the enhanced traffic request and capacity provision; and iii) The outage behaviors of CD/PD-NOMA-BH are better than that of OMA-BH.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:11:28 GMT" } ]
2024-01-18T00:00:00
[ [ "Zhang", "Xuyang", "" ], [ "Yue", "Xinwei", "" ], [ "Li", "Tian", "" ], [ "Han", "Zhihao", "" ], [ "Wang", "Yafei", "" ], [ "Ding", "Yong", "" ], [ "Liu", "Rongke", "" ] ]
2401.08957
Kun Wu
Kun Wu, Ning Liu, Zhen Zhao, Di Qiu, Jinming Li, Zhengping Che, Zhiyuan Xu, Qinru Qiu, Jian Tang
SWBT: Similarity Weighted Behavior Transformer with the Imperfect Demonstration for Robotic Manipulation
8 pages, 5 figures
null
null
null
cs.RO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Imitation learning (IL), aiming to learn optimal control policies from expert demonstrations, has been an effective method for robot manipulation tasks. However, previous IL methods either only use expensive expert demonstrations and omit imperfect demonstrations or rely on interacting with the environment and learning from online experiences. In the context of robotic manipulation, we aim to conquer the above two challenges and propose a novel framework named Similarity Weighted Behavior Transformer (SWBT). SWBT effectively learn from both expert and imperfect demonstrations without interaction with environments. We reveal that the easy-to-get imperfect demonstrations, such as forward and inverse dynamics, significantly enhance the network by learning fruitful information. To the best of our knowledge, we are the first to attempt to integrate imperfect demonstrations into the offline imitation learning setting for robot manipulation tasks. Extensive experiments on the ManiSkill2 benchmark built on the high-fidelity Sapien simulator and real-world robotic manipulation tasks demonstrated that the proposed method can extract better features and improve the success rates for all tasks. Our code will be released upon acceptance of the paper.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:15:56 GMT" } ]
2024-01-18T00:00:00
[ [ "Wu", "Kun", "" ], [ "Liu", "Ning", "" ], [ "Zhao", "Zhen", "" ], [ "Qiu", "Di", "" ], [ "Li", "Jinming", "" ], [ "Che", "Zhengping", "" ], [ "Xu", "Zhiyuan", "" ], [ "Qiu", "Qinru", "" ], [ "Tang", "Jian", "" ] ]
2401.08958
Michael Fuchs
Yu-Sheng Chang, Michael Fuchs
Counting Phylogenetic Networks with Few Reticulation Vertices: Galled and Reticulation-Visible Networks
17 pages
null
null
null
math.CO
http://creativecommons.org/licenses/by/4.0/
We give exact and asymptotic counting results for the number of galled networks and reticulation-visible networks with few reticulation vertices. Our results are obtained with the component graph method, which was introduced by L. Zhang and his coauthors, and generating function techniques. For galled networks, we in addition use analytic combinatorics. Moreover, in an appendix, we consider maximally reticulated reticulation-visible networks and derive their number, too.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:18:26 GMT" } ]
2024-01-18T00:00:00
[ [ "Chang", "Yu-Sheng", "" ], [ "Fuchs", "Michael", "" ] ]
2401.08959
Teng Xiao
Teng Xiao, Suhang Wang
Towards Off-Policy Reinforcement Learning for Ranking Policies with Human Feedback
null
null
10.1609/aaai.v36i8.20849
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic learning to rank (LTR) has been the dominating approach for optimizing the ranking metric, but cannot maximize long-term rewards. Reinforcement learning models have been proposed to maximize user long-term rewards by formulating the recommendation as a sequential decision-making problem, but could only achieve inferior accuracy compared to LTR counterparts, primarily due to the lack of online interactions and the characteristics of ranking. In this paper, we propose a new off-policy value ranking (VR) algorithm that can simultaneously maximize user long-term rewards and optimize the ranking metric offline for improved sample efficiency in a unified Expectation-Maximization (EM) framework. We theoretically and empirically show that the EM process guides the leaned policy to enjoy the benefit of integration of the future reward and ranking metric, and learn without any online interactions. Extensive offline and online experiments demonstrate the effectiveness of our methods.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:19:33 GMT" } ]
2024-01-18T00:00:00
[ [ "Xiao", "Teng", "" ], [ "Wang", "Suhang", "" ] ]
2401.08960
Subigya Nepal
Subigya Nepal, Javier Hernandez, Talie Massachi, Kael Rowan, Judith Amores, Jina Suh, Gonzalo Ramos, Brian Houck, Shamsi T. Iqbal, Mary Czerwinski
From User Surveys to Telemetry-Driven Agents: Exploring the Potential of Personalized Productivity Solutions
null
null
null
null
cs.HC cs.AI cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
We present a comprehensive, user-centric approach to understand preferences in AI-based productivity agents and develop personalized solutions tailored to users' needs. Utilizing a two-phase method, we first conducted a survey with 363 participants, exploring various aspects of productivity, communication style, agent approach, personality traits, personalization, and privacy. Drawing on the survey insights, we developed a GPT-4 powered personalized productivity agent that utilizes telemetry data gathered via Viva Insights from information workers to provide tailored assistance. We compared its performance with alternative productivity-assistive tools, such as dashboard and narrative, in a study involving 40 participants. Our findings highlight the importance of user-centric design, adaptability, and the balance between personalization and privacy in AI-assisted productivity tools. By building on the insights distilled from our study, we believe that our work can enable and guide future research to further enhance productivity solutions, ultimately leading to optimized efficiency and user experiences for information workers.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:20:10 GMT" } ]
2024-01-18T00:00:00
[ [ "Nepal", "Subigya", "" ], [ "Hernandez", "Javier", "" ], [ "Massachi", "Talie", "" ], [ "Rowan", "Kael", "" ], [ "Amores", "Judith", "" ], [ "Suh", "Jina", "" ], [ "Ramos", "Gonzalo", "" ], [ "Houck", "Brian", "" ], [ "Iqbal", "Shamsi T.", "" ], [ "Czerwinski", "Mary", "" ] ]
2401.08961
Yihan Du
Yihan Du, R. Srikant, Wei Chen
Cascading Reinforcement Learning
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Cascading bandits have gained popularity in recent years due to their applicability to recommendation systems and online advertising. In the cascading bandit model, at each timestep, an agent recommends an ordered subset of items (called an item list) from a pool of items, each associated with an unknown attraction probability. Then, the user examines the list, and clicks the first attractive item (if any), and after that, the agent receives a reward. The goal of the agent is to maximize the expected cumulative reward. However, the prior literature on cascading bandits ignores the influences of user states (e.g., historical behaviors) on recommendations and the change of states as the session proceeds. Motivated by this fact, we propose a generalized cascading RL framework, which considers the impact of user states and state transition into decisions. In cascading RL, we need to select items not only with large attraction probabilities but also leading to good successor states. This imposes a huge computational challenge due to the combinatorial action space. To tackle this challenge, we delve into the properties of value functions, and design an oracle BestPerm to efficiently find the optimal item list. Equipped with BestPerm, we develop two algorithms CascadingVI and CascadingBPI, which are both computationally-efficient and sample-efficient, and provide near-optimal regret and sample complexity guarantees. Furthermore, we present experiments to show the improved computational and sample efficiencies of our algorithms compared to straightforward adaptations of existing RL algorithms in practice.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:20:26 GMT" } ]
2024-01-18T00:00:00
[ [ "Du", "Yihan", "" ], [ "Srikant", "R.", "" ], [ "Chen", "Wei", "" ] ]
2401.08962
Hyunju Kim
Hyunju Kim and Geon Kim and Taehoon Lee and Kisoo Kim and Dongman Lee
DOO-RE: A dataset of ambient sensors in a meeting room for activity recognition
null
null
null
null
cs.HC cs.LG cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advancement of IoT technology, recognizing user activities with machine learning methods is a promising way to provide various smart services to users. High-quality data with privacy protection is essential for deploying such services in the real world. Data streams from surrounding ambient sensors are well suited to the requirement. Existing ambient sensor datasets only support constrained private spaces and those for public spaces have yet to be explored despite growing interest in research on them. To meet this need, we build a dataset collected from a meeting room equipped with ambient sensors. The dataset, DOO-RE, includes data streams from various ambient sensor types such as Sound and Projector. Each sensor data stream is segmented into activity units and multiple annotators provide activity labels through a cross-validation annotation process to improve annotation quality. We finally obtain 9 types of activities. To our best knowledge, DOO-RE is the first dataset to support the recognition of both single and group activities in a real meeting room with reliable annotations.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:21:04 GMT" } ]
2024-01-18T00:00:00
[ [ "Kim", "Hyunju", "" ], [ "Kim", "Geon", "" ], [ "Lee", "Taehoon", "" ], [ "Kim", "Kisoo", "" ], [ "Lee", "Dongman", "" ] ]
2401.08963
Liang Zhao
Liang Zhao, Jichao Fan, Chenchi Gong, Alexis Dyke, Weilu Gao, Bo Li
A critical review on recent progress of solution-processed monolayer assembly of nanomaterials and applications
null
null
null
null
physics.app-ph cond-mat.mtrl-sci
http://creativecommons.org/licenses/by/4.0/
The rapid development in nanotechnology has necessitated accurate and efficient assembly strategies for nanomaterials. Monolayer assembly of nanomaterials (MAN) represents an extreme challenge in manufacturing and is critical in understanding interactions among nanomaterials, solvents, and substrates. MAN enables highly tunable performance in electronic and photonic devices. This review summarizes the recent progress on the methods to achieve MAN and discusses important control factors. Moreover, the importance of MAN is elaborated by a broad range of applications in electronics and photonics. In the end, we outlook the opportunities as well as challenges in manufacturing and new applications.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:35:46 GMT" } ]
2024-01-18T00:00:00
[ [ "Zhao", "Liang", "" ], [ "Fan", "Jichao", "" ], [ "Gong", "Chenchi", "" ], [ "Dyke", "Alexis", "" ], [ "Gao", "Weilu", "" ], [ "Li", "Bo", "" ] ]
2401.08964
Yixin Cheng
Yixin Cheng, Kayley Lyons, Guanliang Chen, Dragan Gasevic and Zachari Swiecki
Evidence-centered Assessment for Writing with Generative AI
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
We propose a learning analytics-based methodology for assessing the collaborative writing of humans and generative artificial intelligence. Framed by the evidence-centered design, we used elements of knowledge-telling, knowledge transformation, and cognitive presence to identify assessment claims; we used data collected from the CoAuthor writing tool as potential evidence for these claims; and we used epistemic network analysis to make inferences from the data about the claims. Our findings revealed significant differences in the writing processes of different groups of CoAuthor users, suggesting that our method is a plausible approach to assessing human-AI collaborative writing.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:36:06 GMT" } ]
2024-01-18T00:00:00
[ [ "Cheng", "Yixin", "" ], [ "Lyons", "Kayley", "" ], [ "Chen", "Guanliang", "" ], [ "Gasevic", "Dragan", "" ], [ "Swiecki", "Zachari", "" ] ]
2401.08965
Lei Xun
Lei Xun, Jonathon Hare, Geoff V. Merrett
Dynamic DNNs and Runtime Management for Efficient Inference on Mobile/Embedded Devices
Accepted at Design, Automation & Test in Europe Conference (DATE) 2024, PhD Forum
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Deep neural network (DNN) inference is increasingly being executed on mobile and embedded platforms due to several key advantages in latency, privacy and always-on availability. However, due to limited computing resources, efficient DNN deployment on mobile and embedded platforms is challenging. Although many hardware accelerators and static model compression methods were proposed by previous works, at system runtime, multiple applications are typically executed concurrently and compete for hardware resources. This raises two main challenges: Runtime Hardware Availability and Runtime Application Variability. Previous works have addressed these challenges through either dynamic neural networks that contain sub-networks with different performance trade-offs or runtime hardware resource management. In this thesis, we proposed a combined method, a system was developed for DNN performance trade-off management, combining the runtime trade-off opportunities in both algorithms and hardware to meet dynamically changing application performance targets and hardware constraints in real time. We co-designed novel Dynamic Super-Networks to maximise runtime system-level performance and energy efficiency on heterogeneous hardware platforms. Compared with SOTA, our experimental results using ImageNet on the GPU of Jetson Xavier NX show our model is 2.4x faster for similar ImageNet Top-1 accuracy, or 5.1% higher accuracy at similar latency. We also designed a hierarchical runtime resource manager that tunes both dynamic neural networks and DVFS at runtime. Compared with the Linux DVFS governor schedutil, our runtime approach achieves up to a 19% energy reduction and a 9% latency reduction in single model deployment scenario, and an 89% energy reduction and a 23% latency reduction in a two concurrent model deployment scenario.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:40:30 GMT" } ]
2024-01-18T00:00:00
[ [ "Xun", "Lei", "" ], [ "Hare", "Jonathon", "" ], [ "Merrett", "Geoff V.", "" ] ]
2401.08966
Che Chun Huang
Seng Ghee Tan, Che Chun Huang, Mansoor B.A.Jalil, Zhuobin Siu
Spin Orbit Torque on a Curved Surface
14 pages, 5 figures
null
null
null
cond-mat.mes-hall quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a general formulation of the spin-orbit coupling on a 2D curved surface. Considering the wide applicability of spin-orbit effect in spinor-based condensed matter physics, a general spin-orbit formulation could aid the study of spintronics, Dirac graphene, topological systems, and quantum information on curved surfaces. Particular attention is then devoted to the development of an important spin-orbit quantity known as the spin-orbit torque. As devices trend smaller in dimension, the physics of local geometries on spin-orbit torque, hence spin and magnetic dynamics shall not be neglected. We derived the general expression of a spin-orbit anisotropy field for the curved surfaces and provided explicit solutions in the special contexts of the spherical, cylindrical and flat coordinates. Our expressions allow spin-orbit anisotropy fields and hence spin-orbit torque to be computed over the entire surfaces of devices of any geometry.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:42:07 GMT" } ]
2024-01-18T00:00:00
[ [ "Tan", "Seng Ghee", "" ], [ "Huang", "Che Chun", "" ], [ "Jalil", "Mansoor B. A.", "" ], [ "Siu", "Zhuobin", "" ] ]
2401.08967
Zhanming Jie
Trung Quoc Luong, Xinbo Zhang, Zhanming Jie, Peng Sun, Xiaoran Jin, Hang Li
ReFT: Reasoning with Reinforced Fine-Tuning
13 pages
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
One way to enhance the reasoning capability of Large Language Models (LLMs) is to conduct Supervised Fine-Tuning (SFT) using Chain-of-Thought (CoT) annotations. This approach does not show sufficiently strong generalization ability, however, because the training only relies on the given CoT data. In math problem-solving, for example, there is usually only one annotated reasoning path for each question in the training data. Intuitively, it would be better for the algorithm to learn from multiple annotated reasoning paths given a question. To address this issue, we propose a simple yet effective approach called Reinforced Fine-Tuning (ReFT) to enhance the generalizability of learning LLMs for reasoning, with math problem-solving as an example. ReFT first warmups the model with SFT, and then employs on-line reinforcement learning, specifically the PPO algorithm in this paper, to further fine-tune the model, where an abundance of reasoning paths are automatically sampled given the question and the rewards are naturally derived from the ground-truth answers. Extensive experiments on GSM8K, MathQA, and SVAMP datasets show that ReFT significantly outperforms SFT, and the performance can be potentially further boosted by combining inference-time strategies such as majority voting and re-ranking. Note that ReFT obtains the improvement by learning from the same training questions as SFT, without relying on extra or augmented training questions. This indicates a superior generalization ability for ReFT.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:43:21 GMT" } ]
2024-01-18T00:00:00
[ [ "Luong", "Trung Quoc", "" ], [ "Zhang", "Xinbo", "" ], [ "Jie", "Zhanming", "" ], [ "Sun", "Peng", "" ], [ "Jin", "Xiaoran", "" ], [ "Li", "Hang", "" ] ]
2401.08968
Xiaotian Han
Xiaotian Han, Yiqi Wang, Bohan Zhai, Quanzeng You, Hongxia Yang
COCO is "ALL'' You Need for Visual Instruction Fine-tuning
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Multi-modal Large Language Models (MLLMs) are increasingly prominent in the field of artificial intelligence. Visual instruction fine-tuning (IFT) is a vital process for aligning MLLMs' output with user's intentions. High-quality and diversified instruction following data is the key to this fine-tuning process. Recent studies propose to construct visual IFT datasets through a multifaceted approach: transforming existing datasets with rule-based templates, employing GPT-4 for rewriting annotations, and utilizing GPT-4V for visual dataset pseudo-labeling. LLaVA-1.5 adopted similar approach and construct LLaVA-mix-665k, which is one of the simplest, most widely used, yet most effective IFT datasets today. Notably, when properly fine-tuned with this dataset, MLLMs can achieve state-of-the-art performance on several benchmarks. However, we noticed that models trained with this dataset often struggle to follow user instructions properly in multi-round dialog. In addition, tradition caption and VQA evaluation benchmarks, with their closed-form evaluation structure, are not fully equipped to assess the capabilities of modern open-ended generative MLLMs. This problem is not unique to the LLaVA-mix-665k dataset, but may be a potential issue in all IFT datasets constructed from image captioning or VQA sources, though the extent of this issue may vary. We argue that datasets with diverse and high-quality detailed instruction following annotations are essential and adequate for MLLMs IFT. In this work, we establish a new IFT dataset, with images sourced from the COCO dataset along with more diverse instructions. Our experiments show that when fine-tuned with out proposed dataset, MLLMs achieve better performance on open-ended evaluation benchmarks in both single-round and multi-round dialog setting.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:43:45 GMT" } ]
2024-01-18T00:00:00
[ [ "Han", "Xiaotian", "" ], [ "Wang", "Yiqi", "" ], [ "Zhai", "Bohan", "" ], [ "You", "Quanzeng", "" ], [ "Yang", "Hongxia", "" ] ]
2401.08969
Ritam Mallick
Anshuman Verma, Saksham Chandna and Ritam Mallick
Effect of relativistic equation of state and diffusion coefficient on diffusive shock acceleration
18 pages, 11 figures
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diffusive Shock Acceleration, resulting from first-order Fermi acceleration occurring near Magnetohydrodynamic shock waves, is essential in explaining the power law spectrum in various astrophysical radiation and cosmic rays. We perform Monte Carlo simulations to model the stochastic scattering process in Fermi acceleration, capturing the confinement of particles around the shock within the ambient fluid. The model is tested and validated by comparing it with the spectral index obtained with analytical calculation. Assuming a relativistic EoS, we calculate the power-law spectral index for different diffusion coefficients. With constant diffusion co-efficient and stiffer EoS, the observed range of the spectral index is very narrow; however, as the EoS becomes softer, the range increases. With varying diffusion co-efficient stiffer EoS fails to give a well-defined spectral index (no linear spectrum); however, as the EoS becomes softer, the spectral index lies between $2-4$. For ultra-relativistic shocks, we consistently obtained a linear spectrum; however, the spectral index range varied considerably with the diffusion coefficient.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:45:03 GMT" } ]
2024-01-18T00:00:00
[ [ "Verma", "Anshuman", "" ], [ "Chandna", "Saksham", "" ], [ "Mallick", "Ritam", "" ] ]
2401.08970
QingChang Zhao
Qingchang Zhao, Lian Tao, Hancheng Li, Shuangnan Zhang, Hua Feng, Mingyu Ge, Long Ji, Yanan Wang, Yue Huang, Xiang Ma, Liang Zhang, Jinlu Qu, Yanjun Xu, Shu Zhang, Qianqing Yin, Qingcang Shui, Ruican Ma, Shujie Zhao, Panping Li, Zixu Yang, Hexin Liu and WeiYu
The First Polarimetric View on Quasi-Periodic Oscillations in a Black Hole X-ray Binary
Accepted for publication in APJL
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the first polarimetric analysis of Quasi-Periodic Oscillations (QPO) in a black hole binary utilizing \textit{IXPE} data. Our study focuses on Swift J1727.8--1613, which experienced a massive outburst that was observed by various telescopes across different wavelengths. The \textit{IXPE} observation we studied was conducted during the Hard-Intermediate state. The polarization degree (PD) and polarization angle (PA) were measured at 4.28$\pm$0.20\% and $1.9^{\circ}\pm1.4^{\circ}$, respectively. Remarkably, significant QPO signals were detected during this observation, with a QPO frequency of approximately 1.34 Hz and a fractional root-mean-square (RMS) amplitude of about 12.3\%. Furthermore, we conducted a phase-resolved analysis of the QPO using the Hilbert-Huang transform technique. The photon index showed a strong modulation with respect to the QPO phase. In contrast, the PD and PA exhibit no modulations in relation to the QPO phase, which is inconsistent with the expectation of the Lense-Thirring precession of the inner flow. Further theoretical studies are needed to conform with the observational results.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:46:15 GMT" } ]
2024-01-18T00:00:00
[ [ "Zhao", "Qingchang", "" ], [ "Tao", "Lian", "" ], [ "Li", "Hancheng", "" ], [ "Zhang", "Shuangnan", "" ], [ "Feng", "Hua", "" ], [ "Ge", "Mingyu", "" ], [ "Ji", "Long", "" ], [ "Wang", "Yanan", "" ], [ "Huang", "Yue", "" ], [ "Ma", "Xiang", "" ], [ "Zhang", "Liang", "" ], [ "Qu", "Jinlu", "" ], [ "Xu", "Yanjun", "" ], [ "Zhang", "Shu", "" ], [ "Yin", "Qianqing", "" ], [ "Shui", "Qingcang", "" ], [ "Ma", "Ruican", "" ], [ "Zhao", "Shujie", "" ], [ "Li", "Panping", "" ], [ "Yang", "Zixu", "" ], [ "Liu", "Hexin", "" ], [ "WeiYu", "", "" ] ]
2401.08971
Ilyse Clark
Ilyse Clark, Danielle A. Berg, Claus Leitherer, Karla Z. Arellano-Cordova, Andreas A. C. Sander
Aperture and Resolution Effects on Ultraviolet Star-Forming Properties: Insights from Local Galaxies and Implications for High-Redshift Observations
This paper has 31 pages total, 11 figures, and a figureset. Accepted for publication in ApJ
null
null
null
astro-ph.GA
http://creativecommons.org/licenses/by/4.0/
We present an analysis of the effects of spectral resolution and aperture scales on derived galaxy properties using far-ultraviolet (FUV) spectra of local star-forming galaxies from the International Ultraviolet Explorer (R~250, FOV~10"x20") and Cosmic Origins Spectrograph on the Hubble Space Telescope (R~15,000, FOV~2.5"). Using these spectra, we measured FUV luminosities, spectral slopes, dust attenuation, and equivalent widths. We find that galaxies with one dominant stellar cluster have FUV properties that are independent of aperture size, while galaxies with multiple bright clusters are sensitive to the total light fraction captured by the aperture. Additionally, we find significant correlations between the strength of stellar and interstellar absorption-lines and metallicity, indicating metallicity-dependent line-driven stellar winds and interstellar macroscopic gas flows shape the stellar and interstellar spectral lines, respectively. The observed line-strength versus metallicity relation of stellar-wind lines agrees with the prediction of population synthesis models for young starbursts. In particular, measurements of the strong stellar CIV 1548,1550 line provide an opportunity to determine stellar abundances as a complement to gas-phase abundances. We provide a relation between the equivalent width of the CIV line and the oxygen abundance of the galaxy. We discuss this relation in terms of the stellar-wind properties of massive stars. As the driving lines in stellar winds are mostly ionized iron species, the CIV line may eventually offer a method to probe alpha-element-to-iron ratios in star-forming galaxies once consistent models with non-solar abundance ratios are available. These results have important implications for the galaxy-scale, low-resolution observations of high-redshift galaxies from JWST (R~100-3,500).
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:46:39 GMT" } ]
2024-01-18T00:00:00
[ [ "Clark", "Ilyse", "" ], [ "Berg", "Danielle A.", "" ], [ "Leitherer", "Claus", "" ], [ "Arellano-Cordova", "Karla Z.", "" ], [ "Sander", "Andreas A. C.", "" ] ]
2401.08972
Yufeng Yin
Yufeng Yin, Ishwarya Ananthabhotla, Vamsi Krishna Ithapu, Stavros Petridis, Yu-Hsiang Wu, Christi Miller
Hearing Loss Detection from Facial Expressions in One-on-one Conversations
Accepted by ICASSP 2024
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Individuals with impaired hearing experience difficulty in conversations, especially in noisy environments. This difficulty often manifests as a change in behavior and may be captured via facial expressions, such as the expression of discomfort or fatigue. In this work, we build on this idea and introduce the problem of detecting hearing loss from an individual's facial expressions during a conversation. Building machine learning models that can represent hearing-related facial expression changes is a challenge. In addition, models need to disentangle spurious age-related correlations from hearing-driven expressions. To this end, we propose a self-supervised pre-training strategy tailored for the modeling of expression variations. We also use adversarial representation learning to mitigate the age bias. We evaluate our approach on a large-scale egocentric dataset with real-world conversational scenarios involving subjects with hearing loss and show that our method for hearing loss detection achieves superior performance over baselines.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:52:32 GMT" } ]
2024-01-18T00:00:00
[ [ "Yin", "Yufeng", "" ], [ "Ananthabhotla", "Ishwarya", "" ], [ "Ithapu", "Vamsi Krishna", "" ], [ "Petridis", "Stavros", "" ], [ "Wu", "Yu-Hsiang", "" ], [ "Miller", "Christi", "" ] ]
2401.08973
Aditya Sharma
Aditya Sharma, Luke Yoffe, Tobias H\"ollerer
OCTO+: A Suite for Automatic Open-Vocabulary Object Placement in Mixed Reality
2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIXVR)
null
null
null
cs.CV cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One key challenge in Augmented Reality is the placement of virtual content in natural locations. Most existing automated techniques can only work with a closed-vocabulary, fixed set of objects. In this paper, we introduce and evaluate several methods for automatic object placement using recent advances in open-vocabulary vision-language models. Through a multifaceted evaluation, we identify a new state-of-the-art method, OCTO+. We also introduce a benchmark for automatically evaluating the placement of virtual objects in augmented reality, alleviating the need for costly user studies. Through this, in addition to human evaluations, we find that OCTO+ places objects in a valid region over 70% of the time, outperforming other methods on a range of metrics.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:52:40 GMT" } ]
2024-01-18T00:00:00
[ [ "Sharma", "Aditya", "" ], [ "Yoffe", "Luke", "" ], [ "Höllerer", "Tobias", "" ] ]
2401.08974
Lipeng Zhu
Lipeng Zhu, Wenyan Ma, Zhenyu Xiao, and Rui Zhang
Performance Analysis and Optimization for Movable Antenna Aided Wideband Communications
null
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Movable antenna (MA) has emerged as a promising technology to enhance wireless communication performance by enabling the local movement of antennas at the transmitter (Tx) and/or receiver (Rx) for achieving more favorable channel conditions. As the existing studies on MA-aided wireless communications have mainly considered narrow-band transmission in flat fading channels, we investigate in this paper the MA-aided wideband communications employing orthogonal frequency division multiplexing (OFDM) in frequency-selective fading channels. Under the general multi-tap field-response channel model, the wireless channel variations in both space and frequency are characterized with different positions of the MAs. Unlike the narrow-band transmission where the optimal MA position at the Tx/Rx simply maximizes the single-tap channel amplitude, the MA position in the wideband case needs to balance the amplitudes and phases over multiple channel taps in order to maximize the OFDM transmission rate over multiple frequency subcarriers. First, we derive an upper bound on the OFDM achievable rate in closed form when the size of the Tx/Rx region for antenna movement is arbitrarily large. Next, we develop a parallel greedy ascent (PGA) algorithm to obtain locally optimal solutions to the MAs' positions for OFDM rate maximization subject to finite-size Tx/Rx regions. To reduce computational complexity, a simplified PGA algorithm is also provided to optimize the MAs' positions more efficiently. Simulation results demonstrate that the proposed PGA algorithms can approach the OFDM rate upper bound closely with the increase of Tx/Rx region sizes and outperform conventional systems with fixed-position antennas (FPAs) under the wideband channel setup.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 04:54:47 GMT" } ]
2024-01-18T00:00:00
[ [ "Zhu", "Lipeng", "" ], [ "Ma", "Wenyan", "" ], [ "Xiao", "Zhenyu", "" ], [ "Zhang", "Rui", "" ] ]
2401.08975
Seungyeon Oh
Seungyeon Oh and Hoyoung Park
Nonparametric Mean and Variance Adaptive Classification Rule for High-Dimensional Data with Heteroscedastic Variances
25 pages and 7 figures
null
null
null
stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we introduce an innovative methodology aimed at enhancing Fisher's Linear Discriminant Analysis (LDA) in the context of high-dimensional data classification scenarios, specifically addressing situations where each feature exhibits distinct variances. Our approach leverages Nonparametric Maximum Likelihood Estimation (NPMLE) techniques to estimate both the mean and variance parameters. By accommodating varying variances among features, our proposed method leads to notable improvements in classification performance. In particular, unlike numerous prior studies that assume the distribution of heterogeneous variances follows a right-skewed inverse gamma distribution, our proposed method demonstrates excellent performance even when the distribution of heterogeneous variances takes on left-skewed, symmetric, or right-skewed forms. We conducted a series of rigorous experiments to empirically validate the effectiveness of our approach. The results of these experiments demonstrate that our proposed methodology excels in accurately classifying high-dimensional data characterized by heterogeneous variances.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:00:52 GMT" } ]
2024-01-18T00:00:00
[ [ "Oh", "Seungyeon", "" ], [ "Park", "Hoyoung", "" ] ]
2401.08976
Qiang Zhou
Chen Qi, Yang Jingjing, Huang Ming, Zhou Qiang
ACT-GAN: Radio map construction based on generative adversarial networks with ACT blocks
11 pages, 10 figures
null
null
null
cs.LG eess.SP
http://creativecommons.org/licenses/by/4.0/
The radio map, serving as a visual representation of electromagnetic spatial characteristics, plays a pivotal role in assessment of wireless communication networks and radio monitoring coverage. Addressing the issue of low accuracy existing in the current radio map construction, this paper presents a novel radio map construction method based on generative adversarial network (GAN) in which the Aggregated Contextual-Transformation (AOT) block, Convolutional Block Attention Module (CBAM), and Transposed Convolution (T-Conv) block are applied to the generator, and we name it as ACT-GAN. It significantly improves the reconstruction accuracy and local texture of the radio maps. The performance of ACT-GAN across three different scenarios is demonstrated. Experiment results reveal that in the scenario without sparse discrete observations, the proposed method reduces the root mean square error (RMSE) by 14.6% in comparison to the state-of-the-art models. In the scenario with sparse discrete observations, the RMSE is diminished by 13.2%. Furthermore, the predictive results of the proposed model show a more lucid representation of electromagnetic spatial field distribution. To verify the universality of this model in radio map construction tasks, the scenario of unknown radio emission source is investigated. The results indicate that the proposed model is robust radio map construction and accurate in predicting the location of the emission source.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:03:53 GMT" } ]
2024-01-18T00:00:00
[ [ "Qi", "Chen", "" ], [ "Jingjing", "Yang", "" ], [ "Ming", "Huang", "" ], [ "Qiang", "Zhou", "" ] ]
2401.08977
Zikai Xiao
Zikai Xiao, Zihan Chen, Liyinglan Liu, Yang Feng, Jian Wu, Wanlu Liu, Joey Tianyi Zhou, Howard Hao Yang, Zuozhu Liu
FedLoGe: Joint Local and Generic Federated Learning under Long-tailed Data
Accepted by ICLR 2024
null
null
null
cs.LG cs.AI
http://creativecommons.org/publicdomain/zero/1.0/
Federated Long-Tailed Learning (Fed-LT), a paradigm wherein data collected from decentralized local clients manifests a globally prevalent long-tailed distribution, has garnered considerable attention in recent times. In the context of Fed-LT, existing works have predominantly centered on addressing the data imbalance issue to enhance the efficacy of the generic global model while neglecting the performance at the local level. In contrast, conventional Personalized Federated Learning (pFL) techniques are primarily devised to optimize personalized local models under the presumption of a balanced global data distribution. This paper introduces an approach termed Federated Local and Generic Model Training in Fed-LT (FedLoGe), which enhances both local and generic model performance through the integration of representation learning and classifier alignment within a neural collapse framework. Our investigation reveals the feasibility of employing a shared backbone as a foundational framework for capturing overarching global trends, while concurrently employing individualized classifiers to encapsulate distinct refinements stemming from each client's local features. Building upon this discovery, we establish the Static Sparse Equiangular Tight Frame Classifier (SSE-C), inspired by neural collapse principles that naturally prune extraneous noisy features and foster the acquisition of potent data representations. Furthermore, leveraging insights from imbalance neural collapse's classifier norm patterns, we develop Global and Local Adaptive Feature Realignment (GLA-FR) via an auxiliary global classifier and personalized Euclidean norm transfer to align global features with client preferences. Extensive experimental results on CIFAR-10/100-LT, ImageNet, and iNaturalist demonstrate the advantage of our method over state-of-the-art pFL and Fed-LT approaches.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:04:33 GMT" } ]
2024-01-18T00:00:00
[ [ "Xiao", "Zikai", "" ], [ "Chen", "Zihan", "" ], [ "Liu", "Liyinglan", "" ], [ "Feng", "Yang", "" ], [ "Wu", "Jian", "" ], [ "Liu", "Wanlu", "" ], [ "Zhou", "Joey Tianyi", "" ], [ "Yang", "Howard Hao", "" ], [ "Liu", "Zuozhu", "" ] ]
2401.08978
Debarghya Mukherjee
Nabarun Deb and Debarghya Mukherjee
Trade-off Between Dependence and Complexity for Nonparametric Learning -- an Empirical Process Approach
94 pages, 1 figure
null
null
null
math.ST stat.ML stat.TH
http://creativecommons.org/licenses/by/4.0/
Empirical process theory for i.i.d. observations has emerged as a ubiquitous tool for understanding the generalization properties of various statistical problems. However, in many applications where the data exhibit temporal dependencies (e.g., in finance, medical imaging, weather forecasting etc.), the corresponding empirical processes are much less understood. Motivated by this observation, we present a general bound on the expected supremum of empirical processes under standard $\beta/\rho$-mixing assumptions. Unlike most prior work, our results cover both the long and the short-range regimes of dependence. Our main result shows that a non-trivial trade-off between the complexity of the underlying function class and the dependence among the observations characterizes the learning rate in a large class of nonparametric problems. This trade-off reveals a new phenomenon, namely that even under long-range dependence, it is possible to attain the same rates as in the i.i.d. setting, provided the underlying function class is complex enough. We demonstrate the practical implications of our findings by analyzing various statistical estimators in both fixed and growing dimensions. Our main examples include a comprehensive case study of generalization error bounds in nonparametric regression over smoothness classes in fixed as well as growing dimension using neural nets, shape-restricted multivariate convex regression, estimating the optimal transport (Wasserstein) distance between two probability distributions, and classification under the Mammen-Tsybakov margin condition -- all under appropriate mixing assumptions. In the process, we also develop bounds on $L_r$ ($1\le r\le 2$)-localized empirical processes with dependent observations, which we then leverage to get faster rates for (a) tuning-free adaptation, and (b) set-structured learning problems.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:08:37 GMT" } ]
2024-01-18T00:00:00
[ [ "Deb", "Nabarun", "" ], [ "Mukherjee", "Debarghya", "" ] ]
2401.08979
Dimitrios Skiathas
Dimitrios Skiathas, Konstantinos N. Gourgouliatos
Combined magnetic field evolution in neutron star cores and crusts: Ambipolar diffusion, Hall effect and Ohmic dissipation
11 pages, 8 figures, accepted by MNRAS
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neutron star magnetic field evolution is mediated through the Hall effect and Ohmic dissipation in the crust while ambipolar diffusion is taking place in the core. These effects have been studied in detail in either part of the star, however, their combined, simultaneous evolution and interplay has not been explored in detail yet. Here, we present simulation results of the simultaneous evolution of the magnetic field in the core due to ambipolar diffusion and the crust due to Hall effect and Ohmic decay, under the assumption of axial symmetry. We find that a purely poloidal field generates a toroidal field in the crust, due to the Hall effect, that sinks into the core. A purely toroidal field remains toroidal and spreads into the core and the crust. Finally, for a mixed poloidal-toroidal field, the north-south symmetry is broken due to the Hall effect in the crust, however, ambipolar diffusion, tends to restore it. We examine the role of ambipolar diffusion to the magnetic field decay and we compare the rate of the conversion of magnetic field energy into heat, finding that it enhances the magnetic field decay in neutron stars.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:09:45 GMT" } ]
2024-01-18T00:00:00
[ [ "Skiathas", "Dimitrios", "" ], [ "Gourgouliatos", "Konstantinos N.", "" ] ]
2401.08980
Runze Chi
Runze Chi, Josephine J. Yu, Chaitanya Murthy and T. Xiang
Luttinger Liquid phase in the Aubry-Andr\'e Hubbard chain
null
null
null
null
cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the interplay between an on-site Hubbard repulsion and quasiperiodic potential in one-dimensional fermion chains using the density matrix renormalization group. We find that, at half-filling, the quasiperiodic potential can destroy the Mott gap, leading to a metallic Luttinger liquid phase between the gapped Mott insulator at strong repulsion and localized gapless Aubry- Andr\'e insulator at strong quasiperiodic potential. Away from half-filing, the metallic phase of the interacting model persists to larger critical strengths of the potential than in the non-interacting case, suggesting interaction-stabilized delocalization at finite doping. We characterize the Luttinger liquid through its charge and spin correlations, structure factors, and entanglement entropy.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:18:51 GMT" } ]
2024-01-18T00:00:00
[ [ "Chi", "Runze", "" ], [ "Yu", "Josephine J.", "" ], [ "Murthy", "Chaitanya", "" ], [ "Xiang", "T.", "" ] ]
2401.08981
Zongliang Du
Zongliang Dua, Xinyu Ma, Wenyu Hao, Yuan Liang, Xiaoyu Zhang, Hongzhi Luo and Xu Guo
Real-time generative design of diverse, "truly" optimized structures with controllable structural complexities
null
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compared with traditional design methods, generative design significantly attracts engineers in various disciplines. In thiswork, howto achieve the real-time generative design of optimized structures with various diversities and controllable structural complexities is investigated. To this end, a modified Moving Morphable Component (MMC) method together with novel strategies are adopted to generate high-quality dataset. The complexity level of optimized structures is categorized by the topological invariant. By improving the cost function, the WGAN is trained to produce optimized designs with the input of loading position and complexity level in real time. It is found that, diverse designs with a clear load transmission path and crisp boundary, even not requiring further optimization and different from any reference in the dataset, can be generated by the proposed model. This method holds great potential for future applications of machine learning enhanced intelligent design.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:25:34 GMT" } ]
2024-01-18T00:00:00
[ [ "Dua", "Zongliang", "" ], [ "Ma", "Xinyu", "" ], [ "Hao", "Wenyu", "" ], [ "Liang", "Yuan", "" ], [ "Zhang", "Xiaoyu", "" ], [ "Luo", "Hongzhi", "" ], [ "Guo", "Xu", "" ] ]
2401.08982
Wan Shou
Nahid Tushar, Rencheng Wu, Yu She, Wenchao Zhou, Wan Shou
Robot Tape Manipulation for 3D Printing
null
null
null
null
cs.RO cs.SY eess.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3D printing has enabled various applications using different forms of materials, such as filaments, sheets, and inks. Typically, during 3D printing, feedstocks are transformed into discrete building blocks and placed or deposited in a designated location similar to the manipulation and assembly of discrete objects. However, 3D printing of continuous and flexible tape (with the geometry between filaments and sheets) without breaking or transformation remains underexplored and challenging. Here, we report the design and implementation of a customized end-effector, i.e., tape print module (TPM), to realize robot tape manipulation for 3D printing by leveraging the tension formed on the tape between two endpoints. We showcase the feasibility of manufacturing representative 2D and 3D structures while utilizing conductive copper tape for various electronic applications, such as circuits and sensors. We believe this manipulation strategy could unlock the potential of other tape materials for manufacturing, including packaging tape and carbon fiber prepreg tape, and inspire new mechanisms for robot manipulation, 3D printing, and packaging.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:26:30 GMT" } ]
2024-01-18T00:00:00
[ [ "Tushar", "Nahid", "" ], [ "Wu", "Rencheng", "" ], [ "She", "Yu", "" ], [ "Zhou", "Wenchao", "" ], [ "Shou", "Wan", "" ] ]
2401.08983
Gururaj Kadiri Dr
Gururaj Kadiri
Scouring Parrondo's Paradox in Discrete-Time Quantum Walks
19 pages, 8 figures
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
We propose a quantum game based on coin-based quantum walks. Given a quantum walk and a Hermitian operator on the coin-position composite space, winning this game involves choosing an initial coin state such that the given quantum walk leads to a composite state in which the expectation value of the given Hermitian operator is greater than a certain value. Parrondo's paradox is a phenomenon where a combination of losing strategies becomes a winning strategy. We give a deterministic scheme for identifying Parrondo's paradox in our game, in the sense that, given a collection of distinct quantum steps, we identify initial coin states which happen to be losing states for all quantum walks comprising solely of these steps individually, but turn out to be winning states for a quantum walk comprising of all the given steps taken in a sequence. Unlike traditional quantum steps that allow for equal magnitude forward and backward strides based on the outcome of the coin-toss, the steps of the quantum walks employed here, though still contingent upon coin-toss, permit the strides to be of unequal magnitude, and not necessarily in opposite directions. We believe the results presented here will contribute to a deeper understanding of evolution of expectation values of observables in quantum walks, and facilitate the development of novel quantum algorithms.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:31:02 GMT" } ]
2024-01-18T00:00:00
[ [ "Kadiri", "Gururaj", "" ] ]
2401.08984
Xiaolin Chen
Xiaolin Chen, Daoguang Zan, Wei Li, Bei Guan, Yongji Wang
A GAN-based data poisoning framework against anomaly detection in vertical federated learning
6 pages, 7 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
cs.LG cs.AI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In vertical federated learning (VFL), commercial entities collaboratively train a model while preserving data privacy. However, a malicious participant's poisoning attack may degrade the performance of this collaborative model. The main challenge in achieving the poisoning attack is the absence of access to the server-side top model, leaving the malicious participant without a clear target model. To address this challenge, we introduce an innovative end-to-end poisoning framework P-GAN. Specifically, the malicious participant initially employs semi-supervised learning to train a surrogate target model. Subsequently, this participant employs a GAN-based method to produce adversarial perturbations to degrade the surrogate target model's performance. Finally, the generator is obtained and tailored for VFL poisoning. Besides, we develop an anomaly detection algorithm based on a deep auto-encoder (DAE), offering a robust defense mechanism to VFL scenarios. Through extensive experiments, we evaluate the efficacy of P-GAN and DAE, and further analyze the factors that influence their performance.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:31:08 GMT" } ]
2024-01-18T00:00:00
[ [ "Chen", "Xiaolin", "" ], [ "Zan", "Daoguang", "" ], [ "Li", "Wei", "" ], [ "Guan", "Bei", "" ], [ "Wang", "Yongji", "" ] ]
2401.08985
Kuo-Chuan Pan
Hao-Sheng Wang, Kuo-Chuan Pan
The Influence of Stellar Rotation in Binary Systems on Core-Collapse Supernova Progenitors and Multi-messenger Signals
19 pages, 16 figures, accepted by ApJ
null
null
null
astro-ph.HE astro-ph.SR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The detailed structure of core-collapse supernova progenitors is crucial for studying supernova explosion engines and the corresponding multimessenger signals. In this paper, we investigate the influence of stellar rotation on binary systems consisting of a 30 solar mass donor star and a 20 solar mass accretor using the MESA stellar evolution code. We find that through mass transfer in binary systems, fast-rotating red- and blue-supergiant progenitors can be formed within a certain range of initial orbital periods, albeit the correlation is not linear. We also find that even with the same initial mass ratio of the binary system, the resulting final masses of the collapsars, the iron core masses, the compactness parameters, and the final rotational rates can vary widely and are sensitive to the initial orbital periods. For instance, the progenitors with strong convection form a thinner Si-shell and a wider O-shell compared to those in single-star systems. In addition, we conduct two-dimensional self-consistent core-collapse supernova simulations with neutrino transport for these rotating progenitors derived from binary stellar evolution. We find that the neutrino and gravitational-wave signatures of these binary progenitors could exhibit significant variations. Progenitors with larger compactness parameters produce more massive proto-neutron stars, have higher mass-accretion rates, and emit brighter neutrino luminosity and louder gravitational emissions. Finally, we observe stellar-mass black hole formation in some of our failed exploding models.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:34:53 GMT" } ]
2024-01-18T00:00:00
[ [ "Wang", "Hao-Sheng", "" ], [ "Pan", "Kuo-Chuan", "" ] ]
2401.08986
Ziyang Yu
Ziyang Yu, Wenbing Huang, Yang Liu
Rigid Protein-Protein Docking via Equivariant Elliptic-Paraboloid Interface Prediction
ICLR 2024
null
null
null
cs.LG q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study of rigid protein-protein docking plays an essential role in a variety of tasks such as drug design and protein engineering. Recently, several learning-based methods have been proposed for the task, exhibiting much faster docking speed than those computational methods. In this paper, we propose a novel learning-based method called ElliDock, which predicts an elliptic paraboloid to represent the protein-protein docking interface. To be specific, our model estimates elliptic paraboloid interfaces for the two input proteins respectively, and obtains the roto-translation transformation for docking by making two interfaces coincide. By its design, ElliDock is independently equivariant with respect to arbitrary rotations/translations of the proteins, which is an indispensable property to ensure the generalization of the docking process. Experimental evaluations show that ElliDock achieves the fastest inference time among all compared methods and is strongly competitive with current state-of-the-art learning-based models such as DiffDock-PP and Multimer particularly for antibody-antigen docking.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:39:03 GMT" } ]
2024-01-18T00:00:00
[ [ "Yu", "Ziyang", "" ], [ "Huang", "Wenbing", "" ], [ "Liu", "Yang", "" ] ]
2401.08987
Neha Sharma
Neha Sharma and Vikas Saxena
The Quantum Cryptography Approach: Unleashing the Potential of Quantum Key Reconciliation Protocol for Secure Communication
null
null
null
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum cryptography is the study of delivering secret communications across a quantum channel. Recently, Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography. This process facilitates two distant parties to share secure communications based on physical laws. The BB84 protocol was developed in 1984 and remains the most widely used among BB92, Ekert91, COW, and SARG04 protocols. However the practical security of QKD with imperfect devices have been widely discussed, and there are many ways to guarantee that generated key by QKD still provides unconditional security. This paper proposed a novel method that allows users to communicate while generating the secure keys as well as securing the transmission without any leakage of the data. In this approach sender will never reveal her basis, hence neither the receiver nor the intruder will get knowledge of the fundamental basis.Further to detect Eve, polynomial interpolation is also used as a key verification technique. In order to fully utilize the quantum computing capabilities provided by IBM quantum computers, the protocol is executed using the Qiskit backend for 45 qubits. This article discusses a plot of % error against alpha (strength of eavesdropping). As a result, different types of noise have been included, and the success probability of the desired key bits has been determined. Furthermore, the success probability under depolarizing noise is explained for different qubit counts.Last but not least, even when the applied noise is increased to maximum capacity, a 50% probability of successful key generation is still observed in an experiment.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:41:17 GMT" } ]
2024-01-18T00:00:00
[ [ "Sharma", "Neha", "" ], [ "Saxena", "Vikas", "" ] ]
2401.08988
Varul Srivastava
Varul Srivastava and Sujit Gujar
DECENT-BRM: Decentralization through Block Reward Mechanisms
null
null
null
null
cs.GT
http://creativecommons.org/licenses/by/4.0/
Proof-of-Work is a consensus algorithm where miners solve cryptographic puzzles to mine blocks and obtain a reward through some Block Reward Mechanism (BRM). PoW blockchain faces the problem of centralization due to the formation of mining pools, where miners mine blocks as a group and distribute rewards. The rationale is to reduce the risk (variance) in reward while obtaining the same expected block reward. In this work, we address the problem of centralization due to mining pools in PoW blockchain. We propose a two-player game between the new miner joining the system and the PoW blockchain system. We model the utility for the incoming miner as a combination of (i) expected block reward, (ii) risk, and (iii) cost of switching between different mining pools. With this utility structure, we analyze the equilibrium strategy of the incoming miner for different BRMs: (a) memoryless -- block reward is history independent (e.g., Bitcoin) (b) retentive: block reward is history-dependent (e.g., Fruitchains). For memoryless BRMs, we show that depending on the coefficient of switching cost $c$, the protocol is decentralized when $c = 0$ and centralized when $c > \underline{c}$. In addition, we show the impossibility of constructing a memoryless BRM where solo mining gives a higher payoff than forming/joining mining pools. While retentive BRM in Fruitchains reduces risk in solo mining, the equilibrium strategy for incoming miners is still to join mining pools, leading to centralization. We then propose our novel retentive BRM -- \textsf{Decent-BRM}. We show that under \textsf{Decent-BRM}, incoming miners obtain higher utility in solo mining than joining mining pools. Therefore, no mining pools are formed, and the Pow blockchain using \textsf{Decent-BRM} is decentralized.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:43:02 GMT" } ]
2024-01-18T00:00:00
[ [ "Srivastava", "Varul", "" ], [ "Gujar", "Sujit", "" ] ]
2401.08989
Arul Mazumder
Arul Mazumder and Sridhar Tayur
Five Starter Problems: Solving Quadratic Unconstrained Binary Optimization Models on Quantum Computers
25 pages, 34 Figures
null
null
null
quant-ph math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several articles and books adequately cover quantum computing concepts, such as gate/circuit model (and Quantum Approximate Optimization Algorithm, QAOA), Adiabatic Quantum Computing (AQC), and Quantum Annealing (QA). However, they typically stop short of accessing quantum hardware and solve numerical problem instances. This tutorial offers a quick hands-on introduction to solving Quadratic Unconstrained Binary Optimization (QUBO) problems on currently available quantum computers. We cover both IBM and D-Wave machines: IBM utilizes a gate/circuit architecture, and D-Wave is a quantum annealer. We provide examples of three canonical problems (Number Partitioning, Max-Cut, Minimum Vertex Cover), and two models from practical applications (from cancer genomics and a hedge fund portfolio manager, respectively). An associated GitHub repository provides the codes in five companion notebooks. Catering to undergraduate and graduate students in computationally intensive disciplines, this article also aims to reach working industry professionals seeking to explore the potential of near-term quantum applications.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:47:42 GMT" } ]
2024-01-18T00:00:00
[ [ "Mazumder", "Arul", "" ], [ "Tayur", "Sridhar", "" ] ]
2401.08990
Evan Patterson
Evan Patterson
Products in double categories, revisited
52 pages
null
null
null
math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Products in double categories, as found in cartesian double categories, are an elegant concept with numerous applications, yet also have a few puzzling aspects. In this paper, we revisit double-categorical products from an unbiased perspective, following up an original idea by Par\'e to employ a double-categorical analogue of the family construction, or free product completion. Defined in this way, double categories with finite products are strictly more expressive than cartesian double categories, while being governed by a single universal property that is no more difficult to work with. We develop the basic theory and examples of such products and, by duality, of coproducts in double categories. As an application, we introduce finite-product double theories, a categorification of finite-product theories that extends recent work by Lambert and the author on cartesian double theories, and we construct the virtual double category of models of a finite-product double theory.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:53:40 GMT" } ]
2024-01-18T00:00:00
[ [ "Patterson", "Evan", "" ] ]
2401.08991
John O'Connor
Andrew Ajemian and John Knight and Tommy Nguyen and John O'Connor
Knight Watch: Ubiquitous Computing Enhancements To Sleep Quality With Acoustic Analysis
6 Pages, 3 Figures
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-nd/4.0/
This project introduces a wearable, non-intrusive device for snoring detection and remediation, designed to be placed under or alongside a pillow. The device uses sensors and machine learning algorithms to detect snoring and employs gentle vibrations to prompt positional changes, thereby reducing snoring episodes. The device is capable of connecting via an API to a cloud-based platform for the analysis of snoring sleep patterns and environmental context. The paper details the development from concept to prototype, emphasizing the technical challenges, solutions, and alignment with ubiquitous computing in sleep quality improvement.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 05:58:25 GMT" } ]
2024-01-18T00:00:00
[ [ "Ajemian", "Andrew", "" ], [ "Knight", "John", "" ], [ "Nguyen", "Tommy", "" ], [ "O'Connor", "John", "" ] ]
2401.08992
Junwen Bai
Junwen Bai, Bo Li, Qiujia Li, Tara N. Sainath, Trevor Strohman
Efficient Adapter Finetuning for Tail Languages in Streaming Multilingual ASR
Accepted to ICASSP 2024
null
null
null
cs.CL cs.LG cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The end-to-end ASR model is often desired in the streaming multilingual scenario since it is easier to deploy and can benefit from pre-trained speech models such as powerful foundation models. Meanwhile, the heterogeneous nature and imbalanced data abundance of different languages may cause performance degradation, leading to asynchronous peak performance for different languages during training, especially on tail ones. Sometimes even the data itself may become unavailable as a result of the enhanced privacy protection. Existing work tend to significantly increase the model size or learn language-specific decoders to accommodate each language separately. In this study, we explore simple yet effective Language-Dependent Adapter (LDA) finetuning under a cascaded Conformer transducer framework enhanced by teacher pseudo-labeling for tail languages in the streaming multilingual ASR. The adapter only accounts for 0.4% of the full model per language. It is plugged into the frozen foundation model and is the only trainable module during the finetuning process with noisy student training. The final model merges the adapter parameters from different checkpoints for different languages. The model performance is validated on a challenging multilingual dictation dataset, which includes 39 tail languages across Latin, Greek, Arabic, etc. Our proposed method brings 12.2% word error rate reduction on average and up to 37.5% on a single locale. Furthermore, we show that our parameter-efficient LDA can match the quality of the full model finetuning, thus greatly alleviating the asynchronous peak performance issue.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:01:16 GMT" } ]
2024-01-18T00:00:00
[ [ "Bai", "Junwen", "" ], [ "Li", "Bo", "" ], [ "Li", "Qiujia", "" ], [ "Sainath", "Tara N.", "" ], [ "Strohman", "Trevor", "" ] ]
2401.08993
Gianluca Demartini
Hrishikesh Patel, Tianwa Chen, Ivano Bongiovanni, Gianluca Demartini
Estimating Gender Completeness in Wikipedia
null
null
null
null
cs.CY cs.IR
http://creativecommons.org/licenses/by/4.0/
Gender imbalance in Wikipedia content is a known challenge which the editor community is actively addressing. The aim of this paper is to provide the Wikipedia community with instruments to estimate the magnitude of the problem for different entity types (also known as classes) in Wikipedia. To this end, we apply class completeness estimation methods based on the gender attribute. Our results show not only which gender for different sub-classes of Person is more prevalent in Wikipedia, but also an idea of how complete the coverage is for difference genders and sub-classes of Person.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:03:31 GMT" } ]
2024-01-18T00:00:00
[ [ "Patel", "Hrishikesh", "" ], [ "Chen", "Tianwa", "" ], [ "Bongiovanni", "Ivano", "" ], [ "Demartini", "Gianluca", "" ] ]
2401.08994
Jiaying Liu
Jiaying Liu, Yan Zhang
Understanding and Facilitating Mental Health Help-Seeking of Young Adults: A Socio-technical Ecosystem Framework
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Prior research on young adults' mental health help-seeking mostly focuses on one particular resource such as a mobile app or digital platform, paying less attention to their lived experiences interacting with the ecosystem of resources. We conducted in-depth interviews with 18 participants about their help-seeking and non-help-seeking experiences. Guided by Social Ecological Theory, we proposed a Socio-technical Ecosystem Framework for mental health care, consisting of four levels of resources, including technological-, interpersonal-, community-, and societal level resources. Using this framework, we identified two types of support systems for help-seeking, single-resource support system and multi-resource support system. These resources support young adults' help-seeking via three mechanisms, \textit{care-giving}, \textit{care-mediating}, and \textit{care-outreaching}, forming various pathways to care. We then pointed out the barriers to resource use at each level and the general challenges in finding a support system. Our findings contributed to a conceptual framework to categorize mental health care. It also serves as a practical framework to identify challenges in the pathways to care and discover design implications.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:09:05 GMT" } ]
2024-01-18T00:00:00
[ [ "Liu", "Jiaying", "" ], [ "Zhang", "Yan", "" ] ]
2401.08995
Zongliang Du
Yibo Jia, Wen Meng, Zongliang Du, Chang Liu, Shanwei Li, Conglei Wang, Zhifu Ge, Ruiyi Su, Xu Guo
Explicit design optimization of air rudders for maximizing stiffness and fundamental frequency
null
null
null
null
math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In aerospace engineering, there is a growing demand for lightweight design through topology optimization. This paper presents a novel design optimization method for stiffened air rudders, commonly used for aircraft attitude control, based on the Moving Morphable Components (MMC) method. The stiffeners within the irregular enclosed design domain are modeled as MMCs and discretized by shell elements, accurately capturing their geometry and evolution during optimization process using explicit parameters. In order to maximize the stiffness and fundamental frequency of the rudder structures, numerical analysis algorithms were developed with shape sensitivity analysis conducted. To comply with the manufacturing requirement, a minimum thickness is prescribed for the stiffeners. Penalty strategies were developed for the thickness and density of stiffeners with thickness smaller than the threshold to meet the thickness requirement and suppress spurious modes. The method's effectiveness was demonstrated through optimization examples of two typical air rudders, illustrating the significance of stiffener's distribution on design objectives. The explicit modeling characteristics allow for directly importing the optimization results into CAD systems, significantly enhancing the engineering applicability.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:09:33 GMT" } ]
2024-01-18T00:00:00
[ [ "Jia", "Yibo", "" ], [ "Meng", "Wen", "" ], [ "Du", "Zongliang", "" ], [ "Liu", "Chang", "" ], [ "Li", "Shanwei", "" ], [ "Wang", "Conglei", "" ], [ "Ge", "Zhifu", "" ], [ "Su", "Ruiyi", "" ], [ "Guo", "Xu", "" ] ]
2401.08996
Ye Qiao
Ye Qiao, Haocheng Xu, Yifan Zhang, Sitao Huang
MicroNAS: Zero-Shot Neural Architecture Search for MCUs
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural Architecture Search (NAS) effectively discovers new Convolutional Neural Network (CNN) architectures, particularly for accuracy optimization. However, prior approaches often require resource-intensive training on super networks or extensive architecture evaluations, limiting practical applications. To address these challenges, we propose MicroNAS, a hardware-aware zero-shot NAS framework designed for microcontroller units (MCUs) in edge computing. MicroNAS considers target hardware optimality during the search, utilizing specialized performance indicators to identify optimal neural architectures without high computational costs. Compared to previous works, MicroNAS achieves up to 1104x improvement in search efficiency and discovers models with over 3.23x faster MCU inference while maintaining similar accuracy
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:17:42 GMT" } ]
2024-01-18T00:00:00
[ [ "Qiao", "Ye", "" ], [ "Xu", "Haocheng", "" ], [ "Zhang", "Yifan", "" ], [ "Huang", "Sitao", "" ] ]
2401.08997
David Broadhurst
David Broadhurst
Five families of rapidly convergent evaluations of zeta values
13 pages
null
null
null
math.NT hep-th
http://creativecommons.org/licenses/by-sa/4.0/
This work derives 5 methods to evaluate families of odd zeta values by combining a power of $\pi$ with Lambert series whose ratios of successive terms tend to $e^{-\pi\sqrt{a}}$ with integer $a>4$. Families with $a=7$ and $a=8$ evaluate $\zeta(2n+1)$. Families with $a=9$ and $a=16$ evaluate $\zeta(4n+1)$ with faster convergence. A fifth family with $a=12$ evaluates $\zeta(6n+1)$ and hence gives the fastest convergence for $\zeta(12n+7)$. Members of three of the 5 families were discovered empirically by Simon Plouffe. An intensive new search identified two more families and strongly suggests that there are no more than 5 such families. Quasi-modular transformations of Lambert series are used to resolve intriguing rational sequences that were discovered empirically. Expansions of Lambert series in terms of polylogarithms, familiar from quantum field theory, yield identities that provide proofs for the 5 families.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:21:22 GMT" } ]
2024-01-18T00:00:00
[ [ "Broadhurst", "David", "" ] ]
2401.08998
Yoonhwa Jung
Yoonhwa Jung and Ikhyun Cho and Shun-Hsiang Hsu and Julia Hockenmaier
Attack and Reset for Unlearning: Exploiting Adversarial Noise toward Machine Unlearning through Parameter Re-initialization
null
null
null
null
cs.LG cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With growing concerns surrounding privacy and regulatory compliance, the concept of machine unlearning has gained prominence, aiming to selectively forget or erase specific learned information from a trained model. In response to this critical need, we introduce a novel approach called Attack-and-Reset for Unlearning (ARU). This algorithm leverages meticulously crafted adversarial noise to generate a parameter mask, effectively resetting certain parameters and rendering them unlearnable. ARU outperforms current state-of-the-art results on two facial machine-unlearning benchmark datasets, MUFAC and MUCAC. In particular, we present the steps involved in attacking and masking that strategically filter and re-initialize network parameters biased towards the forget set. Our work represents a significant advancement in rendering data unexploitable to deep learning models through parameter re-initialization, achieved by harnessing adversarial noise to craft a mask.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:22:47 GMT" } ]
2024-01-18T00:00:00
[ [ "Jung", "Yoonhwa", "" ], [ "Cho", "Ikhyun", "" ], [ "Hsu", "Shun-Hsiang", "" ], [ "Hockenmaier", "Julia", "" ] ]
2401.08999
Yesoda Bhargava
Hugo Laurencon, Yesoda Bhargava, Riddhi Zantye, Charbel-Rapha\"el S\'egerie, Johann Lussange, Veeky Baths, Boris Gutkin
Continuous Time Continuous Space Homeostatic Reinforcement Learning (CTCS-HRRL) : Towards Biological Self-Autonomous Agent
This work is a result of the ongoing collaboration between Cognitive Neuroscience Lab, BITS Pilani K K Birla Goa Campus and Ecole Normale Superieure, Paris France. This work is jointly supervised by Prof. Boris Gutkin and Prof. Veeky Baths. arXiv admin note: substantial text overlap with arXiv:2109.06580
null
null
null
cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Homeostasis is a biological process by which living beings maintain their internal balance. Previous research suggests that homeostasis is a learned behaviour. Recently introduced Homeostatic Regulated Reinforcement Learning (HRRL) framework attempts to explain this learned homeostatic behavior by linking Drive Reduction Theory and Reinforcement Learning. This linkage has been proven in the discrete time-space, but not in the continuous time-space. In this work, we advance the HRRL framework to a continuous time-space environment and validate the CTCS-HRRL (Continuous Time Continuous Space HRRL) framework. We achieve this by designing a model that mimics the homeostatic mechanisms in a real-world biological agent. This model uses the Hamilton-Jacobian Bellman Equation, and function approximation based on neural networks and Reinforcement Learning. Through a simulation-based experiment we demonstrate the efficacy of this model and uncover the evidence linked to the agent's ability to dynamically choose policies that favor homeostasis in a continuously changing internal-state milieu. Results of our experiments demonstrate that agent learns homeostatic behaviour in a CTCS environment, making CTCS-HRRL a promising framework for modellng animal dynamics and decision-making.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:29:34 GMT" } ]
2024-01-18T00:00:00
[ [ "Laurencon", "Hugo", "" ], [ "Bhargava", "Yesoda", "" ], [ "Zantye", "Riddhi", "" ], [ "Ségerie", "Charbel-Raphaël", "" ], [ "Lussange", "Johann", "" ], [ "Baths", "Veeky", "" ], [ "Gutkin", "Boris", "" ] ]
2401.09000
Mateja Dumbovi\'c
M. Dumbovic, L. Kramaric, I. Benko, B. Heber, and B. Vrsnak
A new method of measuring Forbush decreases
14 pages, 10 figures, A&A
null
null
null
astro-ph.SR astro-ph.HE
http://creativecommons.org/licenses/by/4.0/
Forbush decreases (FDs) are short-term depressions in the galactic cosmic ray flux and one of the common signatures of coronal mass ejections (CMEs) in the heliosphere. They often show a two-step profile, the second one associated with the CMEs magnetic structure (flux rope, FR), which can be described by the recently developed model ForbMod. The aim of this study is to utilise ForbMod to develop a best-fit procedure to be applied on FR-related FDs as a convenient measurement tool. We develop a best-fit procedure that can be applied to a data series from an arbitrary detector. Thus, the basic procedure facilitates measurement estimation of the magnitude of the FR-related FD, with the possibility of being adapted for the energy response of a specific detector for a more advanced analysis. The non-linear fitting was performed by calculating all possible ForbMod curves constrained within the FR borders to the designated dataset and minimising the mean square error (MSE). In order to evaluate the performance of the ForbMod best-fit procedure, we used synthetic measurements produced by calculating the theoretical ForbMod curve for a specific example CME and then applying various effects to the data to mimic the imperfection of the real measurements. We also tested the ForbMod best-fit function on the real data, measured by detector F of the SOHO-EPHIN instrument on a sample containing 30 events, all of which have a distinct FD corresponding to the CMEs magnetic structure. Overall, we find that the ForbMod best-fit procedure performs similar to the traditional algorithm-based observational method, but with slightly smaller values for the FD amplitude, as it is taking into account the noise in the data. Furthermore, we find that the best-fit procedure has an advantage compared to the traditional method as it can estimate the FD amplitude even when there is a data gap at the onset of the FD.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:33:31 GMT" } ]
2024-01-18T00:00:00
[ [ "Dumbovic", "M.", "" ], [ "Kramaric", "L.", "" ], [ "Benko", "I.", "" ], [ "Heber", "B.", "" ], [ "Vrsnak", "B.", "" ] ]
2401.09001
Hashini Gunatilake
Hashini Gunatilake, John Grundy, Rashina Hoda, Ingo Mueller
Enablers and Barriers of Empathy in Software Developer and User Interaction: A Mixed Methods Case Study
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by-nc-nd/4.0/
Software engineering (SE) requires developers to collaborate with stakeholders, and understanding their emotions and perspectives is often vital. Empathy is a concept characterising a person's ability to understand and share the feelings of another. However, empathy continues to be an under-researched human aspect in SE. We studied how empathy is practised between developers and end users using a mixed methods case study. We used an empathy test, observations and interviews to collect data, and socio technical grounded theory and descriptive statistics to analyse data. We identified the nature of awareness required to trigger empathy and enablers of empathy. We discovered barriers to empathy and a set of potential strategies to overcome these barriers. We report insights on emerging relationships and present a set of recommendations and potential future works on empathy and SE for software practitioners and SE researchers.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:42:21 GMT" } ]
2024-01-18T00:00:00
[ [ "Gunatilake", "Hashini", "" ], [ "Grundy", "John", "" ], [ "Hoda", "Rashina", "" ], [ "Mueller", "Ingo", "" ] ]
2401.09002
Mingyu Jin
Dong shu, Mingyu Jin, Suiyuan Zhu, Beichen Wang, Zihao Zhou, Chong Zhang, Yongfeng Zhang
AttackEval: How to Evaluate the Effectiveness of Jailbreak Attacking on Large Language Models
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
In our research, we pioneer a novel approach to evaluate the effectiveness of jailbreak attacks on Large Language Models (LLMs), such as GPT-4 and LLaMa2, diverging from traditional robustness-focused binary evaluations. Our study introduces two distinct evaluation frameworks: a coarse-grained evaluation and a fine-grained evaluation. Each framework, using a scoring range from 0 to 1, offers a unique perspective, enabling a more comprehensive and nuanced evaluation of attack effectiveness and empowering attackers to refine their attack prompts with greater understanding. Furthermore, we have developed a comprehensive ground truth dataset specifically tailored for jailbreak tasks. This dataset not only serves as a crucial benchmark for our current study but also establishes a foundational resource for future research, enabling consistent and comparative analyses in this evolving field. Upon meticulous comparison with traditional evaluation methods, we discovered that our evaluation aligns with the baseline's trend while offering a more profound and detailed assessment. We believe that by accurately evaluating the effectiveness of attack prompts in the Jailbreak task, our work lays a solid foundation for assessing a wider array of similar or even more complex tasks in the realm of prompt injection, potentially revolutionizing this field.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:42:44 GMT" } ]
2024-01-18T00:00:00
[ [ "shu", "Dong", "" ], [ "Jin", "Mingyu", "" ], [ "Zhu", "Suiyuan", "" ], [ "Wang", "Beichen", "" ], [ "Zhou", "Zihao", "" ], [ "Zhang", "Chong", "" ], [ "Zhang", "Yongfeng", "" ] ]
2401.09003
Haoxiong Liu
Haoxiong Liu, Andrew Chi-Chih Yao
Augmenting Math Word Problems via Iterative Question Composing
null
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Despite recent progress in improving the mathematical reasoning ability of large language models(LLMs), solving competition-level math problems without the use of external tools remains challenging for open-source LLMs. In this work, we introduce the MMIQC dataset, a mixture of processed web data and synthetic question-response pairs, to equip base models with better mathematical reasoning skills. Mistral-7B-MMIQC, the model obtained by fine-tuning Mistral-7B(arXiv:2310.06825) on MMIQC, achieves 36.0\% accuracy on MATH(arXiv:2103.03874), 5.8\% higher than the previous (model size $\sim$7B) SOTA. Our experiments also show that a large part of the improvement attributes to our novel augmentation method IQC(Iterative Question Composing), where we iteratively ask an LLM to compose new questions from the given seed problems and do rejection sampling from another LLM. MMIQC has now been released on https://huggingface.co/datasets/Vivacem/MMIQC.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:48:16 GMT" } ]
2024-01-18T00:00:00
[ [ "Liu", "Haoxiong", "" ], [ "Yao", "Andrew Chi-Chih", "" ] ]
2401.09004
Parth Shah Dr.
Pooja Vishwakarma, Parth Shah
Stability analysis of f(Q) gravity models using dynamical systems
12 pages, 6 figures
Int.J.Mod.Phys.D 32 (2023) 11, 2350071
10.1142/S0218271823500712
null
gr-qc hep-th
http://creativecommons.org/licenses/by/4.0/
In recent years, the modified theory of gravity known as $f(Q)$ gravity has drawn interest as a potential alternative to general relativity. According to this theory, the gravitational force is determined by a function of the so-called ``non-metricity" tensor $Q$, which expresses how far a particle space-time is from the metric geometry. In contrast to general relativity, which describes the gravitational field using the curvature tensor, $f(Q)$ gravity builds a theory of gravity using the non-metricity tensor. For this class of theories, dynamical system analysis of the background and perturbation equations has been carried out in this work to determine how various models behave cosmologically. Here, the critical points are determined for two $f(Q)$ models from the literature: the power law, $ f(Q)=Q+mQ^{n} $, and the logarithmic, $ f(Q)=\alpha+\beta log Q $ models. The stability behaviour and corresponding cosmology are displayed for each critical point. For the power law model, we achieve a matter-dominated saddle point with the right matter perturbation growth rate. For the logarithmic model, we get a saddle point dominated by the geometric component of the $ f(Q)$ model with perturbations in the decomposition of matter. For both models, we later achieved a stable and accelerating Universe with constant matter perturbations.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:51:23 GMT" } ]
2024-01-18T00:00:00
[ [ "Vishwakarma", "Pooja", "" ], [ "Shah", "Parth", "" ] ]
2401.09005
Wang Jian
Xin Chen, Jian Wang
Sharp two-sided heat kernel estimates for Schr\"{o}dinger operators with decaying potentials
29 pages
null
null
null
math.AP math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish global two-sided heat kernel estimates (for full time and space) of the Schr\"odinger operator $-\frac{1}{2}\Delta+V$ on $\R^d$, where the potential $V(x)$ is locally bounded and behaves like $c|x|^{-\alpha}$ near infinity with $\alpha\in (0,2)$ and $c> 0$, or with $\alpha>0$ and $c<0$.Our results improve all known results in the literature, and it seems that the current paper is the first one where consistent two-sided heat kernel bounds for the long range potentials are established.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:54:13 GMT" } ]
2024-01-18T00:00:00
[ [ "Chen", "Xin", "" ], [ "Wang", "Jian", "" ] ]
2401.09006
Xingming Long
Xingming Long, Shiguang Shan and Jie Zhang
Generalized Face Liveness Detection via De-spoofing Face Generator
v1
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous Face Anti-spoofing (FAS) works face the challenge of generalizing in unseen domains. One of the major problems is that most existing FAS datasets are relatively small and lack data diversity. However, we find that there are numerous real faces that can be easily achieved under various conditions, which are neglected by previous FAS works. In this paper, we conduct an Anomalous cue Guided FAS (AG-FAS) method, which leverages real faces for improving model generalization via a De-spoofing Face Generator (DFG). Specifically, the DFG trained only on the real faces gains the knowledge of what a real face should be like and can generate a "real" version of the face corresponding to any given input face. The difference between the generated "real" face and the input face can provide an anomalous cue for the downstream FAS task. We then propose an Anomalous cue Guided FAS feature extraction Network (AG-Net) to further improve the FAS feature generalization via a cross-attention transformer. Extensive experiments on a total of nine public datasets show our method achieves state-of-the-art results under cross-domain evaluations with unseen scenarios and unknown presentation attacks.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 06:59:32 GMT" } ]
2024-01-18T00:00:00
[ [ "Long", "Xingming", "" ], [ "Shan", "Shiguang", "" ], [ "Zhang", "Jie", "" ] ]
2401.09007
Chusei Kiumi
Chusei Kiumi, Akito Suzuki
Quantum singular value transformation for an arbitrary bounded operator embedded in a unitary operator
14 pages
null
null
null
quant-ph math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research extends quantum singular value transformation (QSVT) for general bounded operators embedded in unitary operators on possibly infinite-dimensional Hilbert spaces. Through in-depth mathematical exploration, we have achieved a refined operator-theoretic understanding of QSVT, leading to a more streamlined approach. One of the key discoveries is that polynomial transformations in QSVT inherently apply to the entire operator, rather than being contingent on the selection of a specific basis. We expect that this research will pave the way for applying these insights to a broader range of problems in quantum information processing and provide analytical tools for quantum dynamics, such as quantum walks.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 07:06:31 GMT" } ]
2024-01-18T00:00:00
[ [ "Kiumi", "Chusei", "" ], [ "Suzuki", "Akito", "" ] ]
2401.09008
Sulthan Rafif
Sulthan Rafif, Mochamad Arfan Ravy Wahyu Pratama, Mohammad Faris Azhar, Ahmad Mustafidul Ibad, Lailil Muflikhah, Novanto Yudistira
Hybrid of DiffStride and Spectral Pooling in Convolutional Neural Networks
null
CSIAM Transactions on Applied Mathematics; R. Riad et al, "Learning strides in convolutional neural networks," pp. 1-16, 2022. [Online];
10.1145/3626641.3626930
null
cs.CV cs.AI
http://creativecommons.org/publicdomain/zero/1.0/
Stride determines the distance between adjacent filter positions as the filter moves across the input. A fixed stride causes important information contained in the image can not be captured, so that important information is not classified. Therefore, in previous research, the DiffStride Method was applied, namely the Strided Convolution Method with which it can learn its own stride value. Severe Quantization and a constraining lower bound on preserved information are arises with Max Pooling Downsampling Method. Spectral Pooling reduce the constraint lower bound on preserved information by cutting off the representation in the frequency domain. In this research a CNN Model is proposed with the Downsampling Learnable Stride Technique performed by Backpropagation combined with the Spectral Pooling Technique. Diffstride and Spectral Pooling techniques are expected to maintain most of the information contained in the image. In this study, we compare the Hybrid Method, which is a combined implementation of Spectral Pooling and DiffStride against the Baseline Method, which is the DiffStride implementation on ResNet 18. The accuracy result of the DiffStride combination with Spectral Pooling improves over DiffStride which is baseline method by 0.0094. This shows that the Hybrid Method can maintain most of the information by cutting of the representation in the frequency domain and determine the stride of the learning result through Backpropagation.
[ { "version": "v1", "created": "Wed, 17 Jan 2024 07:06:56 GMT" } ]
2024-01-18T00:00:00
[ [ "Rafif", "Sulthan", "" ], [ "Pratama", "Mochamad Arfan Ravy Wahyu", "" ], [ "Azhar", "Mohammad Faris", "" ], [ "Ibad", "Ahmad Mustafidul", "" ], [ "Muflikhah", "Lailil", "" ], [ "Yudistira", "Novanto", "" ] ]