id
stringlengths 10
10
| submitter
stringlengths 3
64
⌀ | authors
stringlengths 5
23.3k
| title
stringlengths 3
246
| comments
stringlengths 1
465
⌀ | journal-ref
stringlengths 4
282
⌀ | doi
stringlengths 12
120
⌀ | report-no
stringlengths 2
226
⌀ | categories
stringlengths 5
101
| license
stringclasses 6
values | abstract
stringlengths 6
3.32k
| versions
list | update_date
timestamp[s] | authors_parsed
sequence |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2401.08909 | Renchunzi Xie | Renchunzi Xie, Ambroise Odonnat, Vasilii Feofanov, Ievgen Redko,
Jianfeng Zhang, Bo An | Characterising Gradients for Unsupervised Accuracy Estimation under
Distribution Shift | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Estimating test accuracy without access to the ground-truth test labels under
varying test environments is a challenging, yet extremely important problem in
the safe deployment of machine learning algorithms. Existing works rely on the
information from either the outputs or the extracted features of neural
networks to formulate an estimation score correlating with the ground-truth
test accuracy. In this paper, we investigate--both empirically and
theoretically--how the information provided by the gradients can be predictive
of the ground-truth test accuracy even under a distribution shift.
Specifically, we use the norm of classification-layer gradients, backpropagated
from the cross-entropy loss after only one gradient step over test data. Our
key idea is that the model should be adjusted with a higher magnitude of
gradients when it does not generalize to the test dataset with a distribution
shift. We provide theoretical insights highlighting the main ingredients of
such an approach ensuring its empirical success. Extensive experiments
conducted on diverse distribution shifts and model structures demonstrate that
our method significantly outperforms state-of-the-art algorithms.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:33:23 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Xie",
"Renchunzi",
""
],
[
"Odonnat",
"Ambroise",
""
],
[
"Feofanov",
"Vasilii",
""
],
[
"Redko",
"Ievgen",
""
],
[
"Zhang",
"Jianfeng",
""
],
[
"An",
"Bo",
""
]
] |
2401.08910 | Eric Baxter | Eric J. Baxter and Shivam Pandey | Inferring galaxy cluster masses from cosmic microwave background lensing
with neural simulation based inference | 11 pages, 2 figures | null | null | null | astro-ph.CO astro-ph.IM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gravitational lensing by massive galaxy clusters distorts the observed cosmic
microwave background (CMB) on arcminute scales, and these distortions carry
information about cluster masses. Standard approaches to extracting cluster
mass constraints from the CMB cluster lensing signal are either sub-optimal,
ignore important physical or observational effects, are computationally
intractable, or require additional work to turn the lensing measurements into
constraints on cluster masses. We apply simulation based inference (SBI) using
neural likelihood models to the problem. We show that in circumstances where
the exact likelihood can be computed, the SBI constraints on cluster masses are
in agreement with the exact likelihood, demonstrating that the SBI constraints
are close to optimal. In scenarios where the exact likelihood cannot be
feasibly computed, SBI still recovers unbiased estimates of individual cluster
masses and combined constraints from multiple clusters. SBI will be a powerful
tool for constraining the masses of galaxy clusters detected by future cosmic
surveys. Code to run the analyses presented here will be made publicly
available.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:35:15 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Baxter",
"Eric J.",
""
],
[
"Pandey",
"Shivam",
""
]
] |
2401.08911 | Connor Devitt | Connor Devitt, Sudhanshu Tiwari, Sunil A. Bhave, Renyuan Wang | A Distributed Magnetostatic Resonator | null | null | null | null | physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | This work reports the design, fabrication, and characterization of
coupling-enhanced magnetostatic forward volume wave resonators with significant
spur suppression. The fabrication is based on surface micro-machining of
yttrium iron garnet (YIG) film on a gadolinium gallium garnet (GGG) substrate
with thick gold transducers. A distributed resonator is used to excite forward
volume waves in YIG to realize a frequency dependent coupling boost. Fabricated
devices at 18 GHz and 7 GHz show coupling coefficients as high as 13$\%$ and
quality factors above 1000. Higher-order magnetostatic mode suppression is
experimentally demonstrated through a combination of transducer and YIG
geometry design. An edge-coupling filter topology is proposed and simulated
which utilizes this novel distributed magnetostatic resonator.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:44:20 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Devitt",
"Connor",
""
],
[
"Tiwari",
"Sudhanshu",
""
],
[
"Bhave",
"Sunil A.",
""
],
[
"Wang",
"Renyuan",
""
]
] |
2401.08912 | Yunsoo Ha | Yunsoo Ha, Sara Shashaani, Matt Menickelly | Two-Stage Estimation and Variance Modeling for Latency-Constrained
Variational Quantum Algorithms | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Quantum Approximate Optimization Algorithm (QAOA) has enjoyed increasing
attention in noisy intermediate-scale quantum computing due to its application
to combinatorial optimization problems. Because combinatorial optimization
problems are NP-hard, QAOA could serve as a potential demonstration of quantum
advantage in the future. As a hybrid quantum-classical algorithm, the classical
component of QAOA resembles a simulation optimization problem, in which the
simulation outcomes are attainable only through the quantum computer. The
simulation that derives from QAOA exhibits two unique features that can have a
substantial impact on the optimization process: (i) the variance of the
stochastic objective values typically decreases in proportion to the optimality
gap, and (ii) querying samples from a quantum computer introduces an additional
latency overhead. In this paper, we introduce a novel stochastic trust-region
method, derived from a derivative-free adaptive sampling trust-region
optimization (ASTRO-DF) method, intended to efficiently solve the classical
optimization problem in QAOA, by explicitly taking into account the two
mentioned characteristics. The key idea behind the proposed algorithm involves
constructing two separate local models in each iteration: a model of the
objective function, and a model of the variance of the objective function.
Exploiting the variance model allows us to both restrict the number of
communications with the quantum computer, and also helps navigate the nonconvex
objective landscapes typical in the QAOA optimization problems. We numerically
demonstrate the superiority of our proposed algorithm using the SimOpt library
and Qiskit, when we consider a metric of computational burden that explicitly
accounts for communication costs.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:54:24 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Ha",
"Yunsoo",
""
],
[
"Shashaani",
"Sara",
""
],
[
"Menickelly",
"Matt",
""
]
] |
2401.08913 | Jing Hu | Chengxu Wu, Qinrui Fan, Shu Hu, Xi Wu, Xin Wang, Jing Hu | Efficient Image Super-Resolution via Symmetric Visual Attention Network | 13 pages,4 figures | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important development direction in the Single-Image Super-Resolution
(SISR) algorithms is to improve the efficiency of the algorithms. Recently,
efficient Super-Resolution (SR) research focuses on reducing model complexity
and improving efficiency through improved deep small kernel convolution,
leading to a small receptive field. The large receptive field obtained by large
kernel convolution can significantly improve image quality, but the
computational cost is too high. To improve the reconstruction details of
efficient super-resolution reconstruction, we propose a Symmetric Visual
Attention Network (SVAN) by applying large receptive fields. The SVAN
decomposes a large kernel convolution into three different combinations of
convolution operations and combines them with an attention mechanism to form a
Symmetric Large Kernel Attention Block (SLKAB), which forms a symmetric
attention block with a bottleneck structure by the size of the receptive field
in the convolution combination to extract depth features effectively as the
basic component of the SVAN. Our network gets a large receptive field while
minimizing the number of parameters and improving the perceptual ability of the
model. The experimental results show that the proposed SVAN can obtain
high-quality super-resolution reconstruction results using only about 30% of
the parameters of existing SOTA methods.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:55:59 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Wu",
"Chengxu",
""
],
[
"Fan",
"Qinrui",
""
],
[
"Hu",
"Shu",
""
],
[
"Wu",
"Xi",
""
],
[
"Wang",
"Xin",
""
],
[
"Hu",
"Jing",
""
]
] |
2401.08914 | Sabrina Berger | Sabrina C. Berger, Madeline A. Marshall, J. Stuart B. Wyithe, Tiziana
di Matteo, Yueying Ni, and Stephen M. Wilkins | Simulated host galaxy analogs of high-z quasars observed with JWST | Submitted to MNRAS. 15 pages, 11 figures. Comments welcome! | null | null | null | astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The hosts of two low-luminosity high-z quasars, J2255+0251 and J2236+0032,
were recently detected using JWST's NIRCam instrument. These represent the
first high-z quasar host galaxy stellar detections and open a new window into
studying high-z quasars. We examine the implications of the measured properties
of J2255+0251 and J2236+0032 within the context of the hydrodynamic simulation
BlueTides at z = 6.5. We find that these observed quasars fall on the BlueTides
stellar to black hole mass relation and have similar luminosities to the
brightest simulated quasars. We predict their star formation rates, estimating
approximately $10^{2-3}$ $M_{\odot}/ \rm yr$ for both quasar hosts. J2255+0251
and J2236+0032's host galaxy radii also fall within estimates of the radii of
the simulated host galaxies of similar luminosity quasars. We generate mock
JWST NIRCam images of analogs to the observed quasars within BlueTides and
perform a point source removal to illustrate both a qualitative and
quantitative comparison of the measured and simulated radii and magnitudes. The
quasar subtraction works well for similar luminosity quasars, and the recovered
host images are consistent with what was observed for J2255+0251 and
J2236+0032, further supporting the success of those observations. We also use
our mock imaging pipeline to make predictions for the detection of J2255+0251
and J2236+0032's hosts in upcoming JWST observations. We anticipate that the
simulation analogs of future high-z quasar host discoveries will allow us to
make accurate predictions of their properties beyond the capabilities of JWST.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:57:10 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Berger",
"Sabrina C.",
""
],
[
"Marshall",
"Madeline A.",
""
],
[
"Wyithe",
"J. Stuart B.",
""
],
[
"di Matteo",
"Tiziana",
""
],
[
"Ni",
"Yueying",
""
],
[
"Wilkins",
"Stephen M.",
""
]
] |
2401.08915 | Yiheng Qian | Yiheng Qian, Tejaswi Polimetla, Thomas W. Sanchez, Xiang Yan | How do transportation professionals perceive the impacts of AI
applications in transportation? A latent class cluster analysis | null | null | null | null | stat.AP cs.CY | http://creativecommons.org/licenses/by/4.0/ | Recent years have witnessed an increasing number of artificial intelligence
(AI) applications in transportation. As a new and emerging technology, AI's
potential to advance transportation goals and the full extent of its impacts on
the transportation sector is not yet well understood. As the transportation
community explores these topics, it is critical to understand how
transportation professionals, the driving force behind AI Transportation
applications, perceive AI's potential efficiency and equity impacts. Toward
this goal, we surveyed transportation professionals in the United States and
collected a total of 354 responses. Based on the survey responses, we conducted
both descriptive analysis and latent class cluster analysis (LCCA). The former
provides an overview of prevalent attitudes among transportation professionals,
while the latter allows the identification of distinct segments based on their
latent attitudes toward AI. We find widespread optimism regarding AI's
potential to improve many aspects of transportation (e.g., efficiency, cost
reduction, and traveler experience); however, responses are mixed regarding
AI's potential to advance equity. Moreover, many respondents are concerned that
AI ethics are not well understood in the transportation community and that AI
use in transportation could exaggerate existing inequalities. Through LCCA, we
have identified four latent segments: AI Neutral, AI Optimist, AI Pessimist,
and AI Skeptic. The latent class membership is significantly associated with
respondents' age, education level, and AI knowledge level. Overall, the study
results shed light on the extent to which the transportation community as a
whole is ready to leverage AI systems to transform current practices and inform
targeted education to improve the understanding of AI among transportation
professionals.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 01:59:59 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Qian",
"Yiheng",
""
],
[
"Polimetla",
"Tejaswi",
""
],
[
"Sanchez",
"Thomas W.",
""
],
[
"Yan",
"Xiang",
""
]
] |
2401.08916 | Aparna Khare | Anirudh Raju, Aparna Khare, Di He, Ilya Sklyar, Long Chen, Sam
Alptekin, Viet Anh Trinh, Zhe Zhang, Colin Vaz, Venkatesh Ravichandran,
Roland Maas, Ariya Rastrow | Two-pass Endpoint Detection for Speech Recognition | ASRU 2023 | null | null | null | eess.AS cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Endpoint (EP) detection is a key component of far-field speech recognition
systems that assist the user through voice commands. The endpoint detector has
to trade-off between accuracy and latency, since waiting longer reduces the
cases of users being cut-off early. We propose a novel two-pass solution for
endpointing, where the utterance endpoint detected from a first pass endpointer
is verified by a 2nd-pass model termed EP Arbitrator. Our method improves the
trade-off between early cut-offs and latency over a baseline endpointer, as
tested on datasets including voice-assistant transactional queries,
conversational speech, and the public SLURP corpus. We demonstrate that our
method shows improvements regardless of the first-pass EP model used.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:00:07 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Raju",
"Anirudh",
""
],
[
"Khare",
"Aparna",
""
],
[
"He",
"Di",
""
],
[
"Sklyar",
"Ilya",
""
],
[
"Chen",
"Long",
""
],
[
"Alptekin",
"Sam",
""
],
[
"Trinh",
"Viet Anh",
""
],
[
"Zhang",
"Zhe",
""
],
[
"Vaz",
"Colin",
""
],
[
"Ravichandran",
"Venkatesh",
""
],
[
"Maas",
"Roland",
""
],
[
"Rastrow",
"Ariya",
""
]
] |
2401.08917 | Subhojit Roy | Subhojit Roy, Carlos E.M. Wagner | Dark Matter searches with photons at the LHC | 37 pages, 3 figures and 3 tables | null | null | EFI 24-1 | hep-ph hep-th | http://creativecommons.org/publicdomain/zero/1.0/ | We unveil blind spot regions in dark matter (DM) direct detection (DMDD), for
weakly interacting massive particles with a mass around a few hundred~GeV that
may reveal interesting photon signals at the LHC. We explore a scenario where
the DM primarily originates from the singlet sector within the $Z_3$-symmetric
Next-to-Minimal Supersymmetric Standard Model (NMSSM). A novel DMDD
spin-independent blind spot condition is revealed for singlino-dominated DM, in
cases where the mass parameters of the higgsino and the singlino-dominated
lightest supersymmetric particle (LSP) exhibit opposite relative signs (i.e.,
$\kappa < 0$), emphasizing the role of nearby bino and higgsino-like states in
tempering the singlino-dominated LSP. Additionally, proximate bino and/or
higgsino states can act as co-annihilation partner(s) for singlino-dominated
DM, ensuring agreement with the observed relic abundance of DM. Remarkably, in
scenarios involving singlino-higgsino co-annihilation, higgsino-like
neutralinos can distinctly favor radiative decay modes into the
singlino-dominated LSP and a photon, as opposed to decays into leptons/hadrons.
In exploring this region of parameter space within the singlino-higgsino
compressed scenario, we study the signal associated with at least one
relatively soft photon alongside a lepton, accompanied by substantial missing
transverse energy and a hard initial state radiation jet at the LHC. In the
context of singlino-bino co-annihilation, the bino state, as the next-to-LSP,
exhibits significant radiative decay into a soft photon and the LSP, enabling
the possible exploration at the LHC through the triggering of this soft photon
alongside large missing transverse energy and relatively hard leptons/jets
resulting from the decay of heavier higgsino-like states.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:04:22 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Roy",
"Subhojit",
""
],
[
"Wagner",
"Carlos E. M.",
""
]
] |
2401.08918 | Massimo Pica Ciamarra | Shivam Mahajan, Massimo Pica Ciamarra | Heterogeneous attenuation of sound waves in three-dimensional amorphous
solids | To appear in Physical Review E | null | null | null | cond-mat.soft | http://creativecommons.org/licenses/by/4.0/ | Sound waves are attenuated as they propagate in amorphous materials. We
investigate the mechanism driving sound attenuation in the Rayleigh scattering
regime by resolving the dynamics of an excited phonon in time and space via
numerical simulations. We find sound attenuation is spatiotemporal
heterogeneous. It starts in localised regions, which identify soft regions
within the material and correlate with low-frequency vibrational modes. As time
progresses, the regions where sound is primarily attenuated invade the system
via an apparent diffusive process.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:04:44 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Mahajan",
"Shivam",
""
],
[
"Ciamarra",
"Massimo Pica",
""
]
] |
2401.08919 | Muhammad ElNokrashy | Muhammad ElNokrashy, Badr AlKhamissi | Partial Diacritization: A Context-Contrastive Inference Approach | 13 equations, 5 tables, 5 figures | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diacritization plays a pivotal role in improving readability and
disambiguating the meaning of Arabic texts. Efforts have so far focused on
marking every eligible character (Full Diacritization). Comparatively
overlooked, Partial Diacritzation (PD) is the selection of a subset of
characters to be marked to aid comprehension where needed. Research has
indicated that excessive diacritic marks can hinder skilled readers--reducing
reading speed and accuracy. We conduct a behavioral experiment and show that
partially marked text is often easier to read than fully marked text, and
sometimes easier than plain text. In this light, we introduce
Context-Contrastive Partial Diacritization (CCPD)--a novel approach to PD which
integrates seamlessly with existing Arabic diacritization systems. CCPD
processes each word twice, once with context and once without, and diacritizes
only the characters with disparities between the two inferences. Further, we
introduce novel indicators for measuring partial diacritization quality (SR,
PDER, HDER, ERE), essential for establishing this as a machine learning task.
Lastly, we introduce TD2, a Transformer-variant of an established model which
offers a markedly different per formance profile on our proposed indicators
compared to all other known systems.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:04:59 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"ElNokrashy",
"Muhammad",
""
],
[
"AlKhamissi",
"Badr",
""
]
] |
2401.08920 | Tongda Xu | Tongda Xu, Ziran Zhu, Dailan He, Yanghao Li, Lina Guo, Yuanyuan Wang,
Zhe Wang, Hongwei Qin, Yan Wang, Jingjing Liu, Ya-Qin Zhang | Idempotence and Perceptual Image Compression | ICLR 2024 | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | Idempotence is the stability of image codec to re-compression. At the first
glance, it is unrelated to perceptual image compression. However, we find that
theoretically: 1) Conditional generative model-based perceptual codec satisfies
idempotence; 2) Unconditional generative model with idempotence constraint is
equivalent to conditional generative codec. Based on this newfound equivalence,
we propose a new paradigm of perceptual image codec by inverting unconditional
generative model with idempotence constraints. Our codec is theoretically
equivalent to conditional generative codec, and it does not require training
new models. Instead, it only requires a pre-trained mean-square-error codec and
unconditional generative model. Empirically, we show that our proposed approach
outperforms state-of-the-art methods such as HiFiC and ILLM, in terms of
Fr\'echet Inception Distance (FID). The source code is provided in
https://github.com/tongdaxu/Idempotence-and-Perceptual-Image-Compression.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:05:21 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Xu",
"Tongda",
""
],
[
"Zhu",
"Ziran",
""
],
[
"He",
"Dailan",
""
],
[
"Li",
"Yanghao",
""
],
[
"Guo",
"Lina",
""
],
[
"Wang",
"Yuanyuan",
""
],
[
"Wang",
"Zhe",
""
],
[
"Qin",
"Hongwei",
""
],
[
"Wang",
"Yan",
""
],
[
"Liu",
"Jingjing",
""
],
[
"Zhang",
"Ya-Qin",
""
]
] |
2401.08921 | Cheng-Xiang Wang | Cheng-Xiang Wang, Yue Yang, Jie Huang, Xiqi Gao, Tie Jun Cui, Lajos
Hanzo | Electromagnetic Information Theory: Fundamentals and Applications for 6G
Wireless Communication Systems | null | null | null | null | cs.IT cs.SY eess.SP eess.SY math.IT | http://creativecommons.org/licenses/by/4.0/ | In wireless communications, electromagnetic theory and information theory
constitute a pair of fundamental theories, bridged by antenna theory and
wireless propagation channel modeling theory. Up to the fifth generation (5G)
wireless communication networks, these four theories have been developing
relatively independently. However, in sixth generation (6G)
space-air-ground-sea wireless communication networks, seamless coverage is
expected in the three-dimensional (3D) space, potentially necessitating the
acquisition of channel state information (CSI) and channel capacity calculation
at anywhere and any time. Additionally, the key 6G technologies such as
ultra-massive multiple-input multiple-output (MIMO) and holographic MIMO
achieves intricate interaction of the antennas and wireless propagation
environments, which necessitates the joint modeling of antennas and wireless
propagation channels. To address the challenges in 6G, the integration of the
above four theories becomes inevitable, leading to the concept of the so-called
electromagnetic information theory (EIT). In this article, a suite of 6G key
technologies is highlighted. Then, the concepts and relationships of the four
theories are unveiled. Finally, the necessity and benefits of integrating them
into the EIT are revealed.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:06:27 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Wang",
"Cheng-Xiang",
""
],
[
"Yang",
"Yue",
""
],
[
"Huang",
"Jie",
""
],
[
"Gao",
"Xiqi",
""
],
[
"Cui",
"Tie Jun",
""
],
[
"Hanzo",
"Lajos",
""
]
] |
2401.08922 | Ronnie de Souza Santos Dr | Ronnie de Souza Santos, Willian Grillo, Djafran Cabral, Catarina de
Castro, Nicole Albuquerque, Cesar Fran\c{c}a | Post-Pandemic Hybrid Work in Software Companies: Findings from an
Industrial Case Study | null | null | null | null | cs.SE | http://creativecommons.org/licenses/by/4.0/ | Context. Software professionals learned from their experience during the
pandemic that most of their work can be done remotely, and now software
companies are expected to adopt hybrid work models to avoid the resignation of
talented professionals who require more flexibility and work-life balance.
However, hybrid work is a spectrum of flexible work arrangements, and
currently, there are no well-established hybrid work configurations to be
followed in the post-pandemic period. Goal. We investigated how software
engineers are experiencing the post-pandemic hybrid work landscape, aiming to
understand the factors that influence their choices between remote and
in-office work. Method. We explored a large South American company by
collecting quantitative and qualitative data from 545 software professionals
who are currently navigating diverse hybrid work arrangements tailored to their
individual and team requirements. Findings. Our study revealed an array of
factors that significantly impact hybrid work within the software industry,
including individual preferences, work-life balance, commute time, social
interactions, productivity, and more. Team dynamics, project demands, client
expectations, and organizational strategies also play an important role in
shaping the complex landscape of hybrid work configurations in software
engineering. Conclusions. In summary, the success of hybrid work models depends
on balancing individual preferences, team dynamics, and organizational
strategies. Our study demonstrated that, at present, there is no
one-size-fits-all individual approach to hybrid work in the software industry.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:08:37 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Santos",
"Ronnie de Souza",
""
],
[
"Grillo",
"Willian",
""
],
[
"Cabral",
"Djafran",
""
],
[
"de Castro",
"Catarina",
""
],
[
"Albuquerque",
"Nicole",
""
],
[
"França",
"Cesar",
""
]
] |
2401.08923 | Aydogan Ozcan | Jingtian Hu, Kun Liao, Niyazi Ulas Dinc, Carlo Gigli, Bijie Bai,
Tianyi Gan, Xurong Li, Hanlong Chen, Xilin Yang, Yuhang Li, Cagatay Isil, Md
Sadman Sakib Rahman, Jingxi Li, Xiaoyong Hu, Mona Jarrahi, Demetri Psaltis,
and Aydogan Ozcan | Subwavelength Imaging using a Solid-Immersion Diffractive Optical
Processor | 32 Pages, 9 Figures | null | null | null | physics.optics cs.CV physics.app-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Phase imaging is widely used in biomedical imaging, sensing, and material
characterization, among other fields. However, direct imaging of phase objects
with subwavelength resolution remains a challenge. Here, we demonstrate
subwavelength imaging of phase and amplitude objects based on all-optical
diffractive encoding and decoding. To resolve subwavelength features of an
object, the diffractive imager uses a thin, high-index solid-immersion layer to
transmit high-frequency information of the object to a spatially-optimized
diffractive encoder, which converts/encodes high-frequency information of the
input into low-frequency spatial modes for transmission through air. The
subsequent diffractive decoder layers (in air) are jointly designed with the
encoder using deep-learning-based optimization, and communicate with the
encoder layer to create magnified images of input objects at its output,
revealing subwavelength features that would otherwise be washed away due to
diffraction limit. We demonstrate that this all-optical collaboration between a
diffractive solid-immersion encoder and the following decoder layers in air can
resolve subwavelength phase and amplitude features of input objects in a highly
compact design. To experimentally demonstrate its proof-of-concept, we used
terahertz radiation and developed a fabrication method for creating monolithic
multi-layer diffractive processors. Through these monolithically fabricated
diffractive encoder-decoder pairs, we demonstrated phase-to-intensity
transformations and all-optically reconstructed subwavelength phase features of
input objects by directly transforming them into magnified intensity features
at the output. This solid-immersion-based diffractive imager, with its compact
and cost-effective design, can find wide-ranging applications in bioimaging,
endoscopy, sensing and materials characterization.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:12:57 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Hu",
"Jingtian",
""
],
[
"Liao",
"Kun",
""
],
[
"Dinc",
"Niyazi Ulas",
""
],
[
"Gigli",
"Carlo",
""
],
[
"Bai",
"Bijie",
""
],
[
"Gan",
"Tianyi",
""
],
[
"Li",
"Xurong",
""
],
[
"Chen",
"Hanlong",
""
],
[
"Yang",
"Xilin",
""
],
[
"Li",
"Yuhang",
""
],
[
"Isil",
"Cagatay",
""
],
[
"Rahman",
"Md Sadman Sakib",
""
],
[
"Li",
"Jingxi",
""
],
[
"Hu",
"Xiaoyong",
""
],
[
"Jarrahi",
"Mona",
""
],
[
"Psaltis",
"Demetri",
""
],
[
"Ozcan",
"Aydogan",
""
]
] |
2401.08924 | Z Yan | Weifang Weng, Zhenya Yan | Soliton gas for the focusing Hirota equation via Riemann-Hilbert
problems: Large-space and long-time asymptotic behaviors | 41 pages, 8 figures, | null | null | null | nlin.SI math-ph math.AP math.MP nlin.PS physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Hirota equation is one of the integrable higher-order extensions of the
nonlinear Schr\"odinger equation, and can describe the ultra-short optical
pulse propagation in the form $iq_t+\alpha(q_{xx}+ 2|q|^2q)+i\beta (q_{xxx}+
6|q|^2q_x)=0,\, (x,t)\in\mathbb{R}^2\, (\alpha,\,\beta\in\mathbb{R})$. In this
paper, we analytically explore the asymptotic behaviors of a soliton gas for
the Hirota equation including the complex modified KdV equation, in which the
soliton gas is regarded as the limit $N\to \infty$ of $N$-soliton solutions,
and characterized using the Riemann-Hilbert problem with discrete spectra
restricted in the intervals $(ia, ib)\cup (-ib, -ia)\, (0<a<b)$. We find that
this soliton gas tends slowly to the Jaocbian elliptic wave solution with an
error $\mathcal{O}(|x|^{-1})$ (zero exponentially quickly ) as $x\to -\infty$
($x\to +\infty$). We also present the long-time asymptotics of the soliton gas
under the different velocity conditions: $x/t>4\beta b^2,\, \xi_c<x/t<4\beta
b^2,\, x/t<\xi_c$. Moreover, we analyze the property of the soliton gas for the
case of the discrete spectra filling uniformly a quadrature domain.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:15:42 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Weng",
"Weifang",
""
],
[
"Yan",
"Zhenya",
""
]
] |
2401.08925 | Saleh Khalaj Monfared | Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik | RandOhm: Mitigating Impedance Side-channel Attacks using Randomized
Circuit Configurations | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Physical side-channel attacks can compromise the security of integrated
circuits. Most of the physical side-channel attacks (e.g., power or
electromagnetic) exploit the dynamic behavior of a chip, typically manifesting
as changes in current consumption or voltage fluctuations where algorithmic
countermeasures, such as masking, can effectively mitigate the attacks.
However, as demonstrated recently, these mitigation techniques are not entirely
effective against backscattered side-channel attacks such as impedance
analysis. In the case of an impedance attack, an adversary exploits the
data-dependent impedance variations of chip power delivery network (PDN) to
extract secret information. In this work, we introduce RandOhm, which exploits
moving target defense (MTD) strategy based on partial reconfiguration of
mainstream FPGAs, to defend against impedance side-channel attacks. We
demonstrate that the information leakage through the PDN impedance could be
reduced via run-time reconfiguration of the secret-sensitive parts of the
circuitry. Hence, by constantly randomizing the placement and routing of the
circuit, one can decorrelate the data-dependent computation from the impedance
value. To validate our claims, we present a systematic approach equipped with
two different partial reconfiguration strategies on implementations of the AES
cipher realized on 28-nm FPGAs. We investigate the overhead of our mitigation
in terms of delay and performance and provide security analysis by performing
non-profiled and profiled impedance analysis attacks against these
implementations to demonstrate the resiliency of our approach.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:22:28 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Monfared",
"Saleh Khalaj",
""
],
[
"Forte",
"Domenic",
""
],
[
"Tajik",
"Shahin",
""
]
] |
2401.08926 | Songlin Fan | Songlin Fan, Zixuan Guo, Wei Gao, Ge Li | Uncertainty-aware No-Reference Point Cloud Quality Assessment | null | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The evolution of compression and enhancement algorithms necessitates an
accurate quality assessment for point clouds. Previous works consistently
regard point cloud quality assessment (PCQA) as a MOS regression problem and
devise a deterministic mapping, ignoring the stochasticity in generating MOS
from subjective tests. Besides, the viewpoint switching of 3D point clouds in
subjective tests reinforces the judging stochasticity of different subjects
compared with traditional images. This work presents the first probabilistic
architecture for no-reference PCQA, motivated by the labeling process of
existing datasets. The proposed method can model the quality judging
stochasticity of subjects through a tailored conditional variational
autoencoder (CVAE) and produces multiple intermediate quality ratings. These
intermediate ratings simulate the judgments from different subjects and are
then integrated into an accurate quality prediction, mimicking the generation
process of a ground truth MOS. Specifically, our method incorporates a Prior
Module, a Posterior Module, and a Quality Rating Generator, where the former
two modules are introduced to model the judging stochasticity in subjective
tests, while the latter is developed to generate diverse quality ratings.
Extensive experiments indicate that our approach outperforms previous
cutting-edge methods by a large margin and exhibits gratifying cross-dataset
robustness.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:25:42 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Fan",
"Songlin",
""
],
[
"Guo",
"Zixuan",
""
],
[
"Gao",
"Wei",
""
],
[
"Li",
"Ge",
""
]
] |
2401.08927 | J. E. Hirsch | J. E. Hirsch | Comment on arXiv:2312.04495 by M. I. Eremets and coauthors | null | null | null | null | cond-mat.supr-con | http://creativecommons.org/licenses/by/4.0/ | In the recently posted arXiv:2312.04495v3 [1], its authors used a computer
code written by me supplied to them by the authors of Ref. [2], and claimed
that the results that they obtained invalidate the results and conclusions
presented in the paper J. Supercond. Nov. Mag. 35, 3141-3145 (2022) by F.
Marsiglio and myself [2]. Here I point out that the authors' claim (i) resulted
from improper unauthorized use of my computer code, (ii) is wrong, and (iii) is
misleading to the scientific community.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2024 03:34:59 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Hirsch",
"J. E.",
""
]
] |
2401.08928 | Vera Roshchina | Alexander Plakhov and Vera Roshchina | The problem of optimal camouflaging | null | null | null | null | math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of camouflaging for bodies with specular surface in
the framework of geometric optics. The index of visibility introduced in
[Plakhov 2017] measures the mean deviation of light rays incident on the body's
surface. We study the problem of minimal visibility index for bodies with fixed
volume contained in the unit sphere. This problem is reduced to a special
vector-valued problem of optimal mass transfer, which is solved partly
analytically and partly numerically. This paper is a continuation of the study
started in [Plakhov 2009], [Plakhov 2017], and [Plakhov and Roshchina 2011].
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:37:45 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Plakhov",
"Alexander",
""
],
[
"Roshchina",
"Vera",
""
]
] |
2401.08929 | Van-Quy Nguyen | Antoine Mandel, Van-Quy Nguyen, and Bach Dong-Xuan | Strategic formation of production networks | null | null | null | null | econ.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a strategic model of the formation of production networks that
subsumes the standard general equilibrium approach. The objective of firms in
our setting is to choose their supply relationships so as to maximize their
profit at the general equilibrium that unfolds. We show that this objective is
equivalent to the maximization by the firms of their eigenvector centrality in
the production network. As is common in network formation games based on
centrality, there are multiple Nash equilibria in our setting. We have
investigated the characteristics and the social efficiency of these equilibria
in a stylized version of our model representing international trade networks.
We show that the impact of network structure on social welfare is firstly
determined by a trade-off between costs of increasing process complexity and
positive spillovers on productivity induced by the diversification of the input
mix. We further analyze a variant of our model that accounts for the risks of
disruption of supply relationships. In this setting, we characterize how social
welfare depends on the structure of the production network, the spatial
distribution of risks, and the process of shock aggregation in supply chains.
We finally show that simple trade policies characterized by sets of links that
are either prevented or catalyzed can be a powerful equilibrium selection
device.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:55:35 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Mandel",
"Antoine",
""
],
[
"Nguyen",
"Van-Quy",
""
],
[
"Dong-Xuan",
"Bach",
""
]
] |
2401.08930 | Haorui Ji | Haorui Ji, Hongdong Li | 3D Human Pose Analysis via Diffusion Synthesis | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models have demonstrated remarkable success in generative modeling.
In this paper, we propose PADS (Pose Analysis by Diffusion Synthesis), a novel
framework designed to address various challenges in 3D human pose analysis
through a unified pipeline. Central to PADS are two distinctive strategies: i)
learning a task-agnostic pose prior using a diffusion synthesis process to
effectively capture the kinematic constraints in human pose data, and ii)
unifying multiple pose analysis tasks like estimation, completion, denoising,
etc, as instances of inverse problems. The learned pose prior will be treated
as a regularization imposing on task-specific constraints, guiding the
optimization process through a series of conditional denoising steps. PADS
represents the first diffusion-based framework for tackling general 3D human
pose analysis within the inverse problem framework. Its performance has been
validated on different benchmarks, signaling the adaptability and robustness of
this pipeline.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 02:59:34 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Ji",
"Haorui",
""
],
[
"Li",
"Hongdong",
""
]
] |
2401.08931 | Chang Liu | Yilin Guo, Chang Liu, Xu Guo | Shell-infill composite structure design based on a hybrid
explicit-implicit topology optimization method | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present paper introduces a hybrid explicit-implicit topology optimization
method for shell-infill composite structure design. The proposed approach
effectively combines the advantages of the explicit Moving Morphable Component
(MMC) method, which describes structural topology only using a set of geometric
parameters, and the implicit Solid Isotropic Material with Penalization (SIMP)
method, which offers greater design freedom for characterizing the structural
features. Compared to the existing methods for shell-infill structure design,
the proposed approach can obtain optimized shell-infill structures with complex
infill topology without resorting to complex filtering/projection operations.
Numerical examples demonstrate the effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:01:14 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Guo",
"Yilin",
""
],
[
"Liu",
"Chang",
""
],
[
"Guo",
"Xu",
""
]
] |
2401.08932 | Zili Liu | Zili Liu, Hao Chen, Wenyuan Li, Keyan Chen, Zipeng Qi, Chenyang Liu,
Zhengxia Zou, Zhenwei Shi | Learning to detect cloud and snow in remote sensing images from noisy
labels | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting clouds and snow in remote sensing images is an essential
preprocessing task for remote sensing imagery. Previous works draw inspiration
from semantic segmentation models in computer vision, with most research
focusing on improving model architectures to enhance detection performance.
However, unlike natural images, the complexity of scenes and the diversity of
cloud types in remote sensing images result in many inaccurate labels in cloud
and snow detection datasets, introducing unnecessary noises into the training
and testing processes. By constructing a new dataset and proposing a novel
training strategy with the curriculum learning paradigm, we guide the model in
reducing overfitting to noisy labels. Additionally, we design a more
appropriate model performance evaluation method, that alleviates the
performance assessment bias caused by noisy labels. By conducting experiments
on models with UNet and Segformer, we have validated the effectiveness of our
proposed method. This paper is the first to consider the impact of label noise
on the detection of clouds and snow in remote sensing images.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:02:31 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Liu",
"Zili",
""
],
[
"Chen",
"Hao",
""
],
[
"Li",
"Wenyuan",
""
],
[
"Chen",
"Keyan",
""
],
[
"Qi",
"Zipeng",
""
],
[
"Liu",
"Chenyang",
""
],
[
"Zou",
"Zhengxia",
""
],
[
"Shi",
"Zhenwei",
""
]
] |
2401.08933 | Nathan Hagen | Nathan Hagen | Graduate education in optics in Japan and the United States: impact of
funding levels on educational structure | null | null | null | null | physics.ed-ph | http://creativecommons.org/licenses/by/4.0/ | We compare the optical science & engineering educational environments at two
universities in two countries: Utsunomiya University in Japan, and the
University of Arizona in the United States. Because the university education
systems in the two countries are so different, we also explain how financial
arrangements drive many of these differences and discuss how these impact
student and faculty life.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:02:53 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Hagen",
"Nathan",
""
]
] |
2401.08934 | Ensuo Ma | E. S. Ma and Z. Song | Topological charge pumping in dimerized Kitaev chains | null | null | null | null | cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigated the topological pumping charge of a dimerized Kitaev chain
with spatially modulated chemical potential, which hosts nodal loops in
parameter space and violates particle number conservation. In the simplest
case, with alternatively assigned hopping and pairing terms, we show that the
model can be mapped into the Rice-Mele model by a partial particle-hole
transformation and subsequently supports topological charge pumping as a
demonstration of the Chern number for the ground state. Beyond this special
case, analytic analysis shows that the nodal loops are conic curves. Numerical
simulation of a finite-size chain indicates that the pumping charge is zero for
a quasiadiabatic loop within the nodal loop and is $\pm 1$ for a quasiadiabatic
passage enclosing the nodal loop. Our findings unveil a hidden topology in a
class of Kitaev chains.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:04:27 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Ma",
"E. S.",
""
],
[
"Song",
"Z.",
""
]
] |
2401.08935 | Egon Zhu | Yingen Zhu, Jia Huang, Hongzhou Lu, Wenjin Wang | Privacy Protected Contactless Cardio-respiratory Monitoring using
Defocused Cameras during Sleep | null | null | null | null | eess.SP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The monitoring of vital signs such as heart rate (HR) and respiratory rate
(RR) during sleep is important for the assessment of sleep quality and
detection of sleep disorders. Camera-based HR and RR monitoring gained
popularity in sleep monitoring in recent years. However, they are all facing
with serious privacy issues when using a video camera in the sleeping scenario.
In this paper, we propose to use the defocused camera to measure vital signs
from optically blurred images, which can fundamentally eliminate the privacy
invasion as face is difficult to be identified in obtained blurry images. A
spatial-redundant framework involving living-skin detection is used to extract
HR and RR from the defocused camera in NIR, and a motion metric is designed to
exclude outliers caused by body motions. In the benchmark, the overall Mean
Absolute Error (MAE) for HR measurement is 4.4 bpm, for RR measurement is 5.9
bpm. Both have quality drops as compared to the measurement using a focused
camera, but the degradation in HR is much less, i.e. HR measurement has strong
correlation with the reference ($R \geq 0.90$). Preliminary experiments suggest
that it is feasible to use a defocused camera for cardio-respiratory monitoring
while protecting the privacy. Further improvement is needed for robust RR
measurement, such as by PPG-modulation based RR extraction.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:05:24 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Zhu",
"Yingen",
""
],
[
"Huang",
"Jia",
""
],
[
"Lu",
"Hongzhou",
""
],
[
"Wang",
"Wenjin",
""
]
] |
2401.08936 | Aida Afshar | Aida Afshar, Wenchao Li | DeLF: Designing Learning Environments with Foundation Models | AAAI 2024 Workshop on Synergy of Reinforcement Learning and Large
Language Models | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reinforcement learning (RL) offers a capable and intuitive structure for the
fundamental sequential decision-making problem. Despite impressive
breakthroughs, it can still be difficult to employ RL in practice in many
simple applications. In this paper, we try to address this issue by introducing
a method for designing the components of the RL environment for a given,
user-intended application. We provide an initial formalization for the problem
of RL component design, that concentrates on designing a good representation
for observation and action space. We propose a method named DeLF: Designing
Learning Environments with Foundation Models, that employs large language
models to design and codify the user's intended learning scenario. By testing
our method on four different learning environments, we demonstrate that DeLF
can obtain executable environment codes for the corresponding RL problems.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:14:28 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Afshar",
"Aida",
""
],
[
"Li",
"Wenchao",
""
]
] |
2401.08937 | Weiyao Wang | Weiyao Wang, Pierre Gleize, Hao Tang, Xingyu Chen, Kevin J Liang, Matt
Feiszli | ICON: Incremental CONfidence for Joint Pose and Radiance Field
Optimization | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural Radiance Fields (NeRF) exhibit remarkable performance for Novel View
Synthesis (NVS) given a set of 2D images. However, NeRF training requires
accurate camera pose for each input view, typically obtained by
Structure-from-Motion (SfM) pipelines. Recent works have attempted to relax
this constraint, but they still often rely on decent initial poses which they
can refine. Here we aim at removing the requirement for pose initialization. We
present Incremental CONfidence (ICON), an optimization procedure for training
NeRFs from 2D video frames. ICON only assumes smooth camera motion to estimate
initial guess for poses. Further, ICON introduces ``confidence": an adaptive
measure of model quality used to dynamically reweight gradients. ICON relies on
high-confidence poses to learn NeRF, and high-confidence 3D structure (as
encoded by NeRF) to learn poses. We show that ICON, without prior pose
initialization, achieves superior performance in both CO3D and HO3D versus
methods which use SfM pose.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:18:02 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Wang",
"Weiyao",
""
],
[
"Gleize",
"Pierre",
""
],
[
"Tang",
"Hao",
""
],
[
"Chen",
"Xingyu",
""
],
[
"Liang",
"Kevin J",
""
],
[
"Feiszli",
"Matt",
""
]
] |
2401.08938 | Paul Nikolaev | Paul Nikolaev, David J. Pr\"omel | Quantitative relative entropy estimates on the whole space for
convolution interaction forces | null | null | null | null | math.PR math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantitative estimates are derived, on the whole space, for the relative
entropy between the joint law of random interacting particles and the
tensorized law at the limiting systeme. The developed method combines the
relative entropy method under the moderated interaction scaling introduced by
Oeschl\"ager, and the propagation of chaos in probability. The result includes
the case that the interaction force does not need to be a potential field.
Furthermore, if the interaction force is a potential field, with a
convolutional structure, then the developed estimate also provides the
modulated energy estimates. Moreover, we demonstrate propagation of chaos for
large stochastic systems of interacting particles and discuss possible
applications to various interacting particle systems, including the Coulomb
interaction case.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:19:11 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Nikolaev",
"Paul",
""
],
[
"Prömel",
"David J.",
""
]
] |
2401.08939 | Yingbing Chen | Yingbing Chen, Jie Cheng, Sheng Wang, Hongji Liu, Xiaodong Mei,
Xiaoyang Yan, Mingkai Tang, Ge Sun, Ya Wen, Junwei Cai, Xupeng Xie, Lu Gan,
Mandan Chao, Ren Xin, Ming Liu, Jianhao Jiao, Kangcheng Liu, and Lujia Wang | Enhancing Campus Mobility: Achievements and Challenges of Autonomous
Shuttle "Snow Lion'' | 9 pages, 9 figures | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapid evolution of autonomous vehicles (AVs) has significantly influenced
global transportation systems. In this context, we present ``Snow Lion'', an
autonomous shuttle meticulously designed to revolutionize on-campus
transportation, offering a safer and more efficient mobility solution for
students, faculty, and visitors. The primary objective of this research is to
enhance campus mobility by providing a reliable, efficient, and eco-friendly
transportation solution that seamlessly integrates with existing infrastructure
and meets the diverse needs of a university setting. To achieve this goal, we
delve into the intricacies of the system design, encompassing sensing,
perception, localization, planning, and control aspects. We evaluate the
autonomous shuttle's performance in real-world scenarios, involving a
1146-kilometer road haul and the transportation of 442 passengers over a
two-month period. These experiments demonstrate the effectiveness of our system
and offer valuable insights into the intricate process of integrating an
autonomous vehicle within campus shuttle operations. Furthermore, a thorough
analysis of the lessons derived from this experience furnishes a valuable
real-world case study, accompanied by recommendations for future research and
development in the field of autonomous driving.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:20:30 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Chen",
"Yingbing",
""
],
[
"Cheng",
"Jie",
""
],
[
"Wang",
"Sheng",
""
],
[
"Liu",
"Hongji",
""
],
[
"Mei",
"Xiaodong",
""
],
[
"Yan",
"Xiaoyang",
""
],
[
"Tang",
"Mingkai",
""
],
[
"Sun",
"Ge",
""
],
[
"Wen",
"Ya",
""
],
[
"Cai",
"Junwei",
""
],
[
"Xie",
"Xupeng",
""
],
[
"Gan",
"Lu",
""
],
[
"Chao",
"Mandan",
""
],
[
"Xin",
"Ren",
""
],
[
"Liu",
"Ming",
""
],
[
"Jiao",
"Jianhao",
""
],
[
"Liu",
"Kangcheng",
""
],
[
"Wang",
"Lujia",
""
]
] |
2401.08940 | Abdur Rasool | Saba Aslam, Abdur Rasool, Hongyan Wu, Xiaoli Li | CEL: A Continual Learning Model for Disease Outbreak Prediction by
Leveraging Domain Adaptation via Elastic Weight Consolidation | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Continual learning, the ability of a model to learn over time without
forgetting previous knowledge and, therefore, be adaptive to new data, is
paramount in dynamic fields such as disease outbreak prediction. Deep neural
networks, i.e., LSTM, are prone to error due to catastrophic forgetting. This
study introduces a novel CEL model for continual learning by leveraging domain
adaptation via Elastic Weight Consolidation (EWC). This model aims to mitigate
the catastrophic forgetting phenomenon in a domain incremental setting. The
Fisher Information Matrix (FIM) is constructed with EWC to develop a
regularization term that penalizes changes to important parameters, namely, the
important previous knowledge. CEL's performance is evaluated on three distinct
diseases, Influenza, Mpox, and Measles, with different metrics. The high
R-squared values during evaluation and reevaluation outperform the other
state-of-the-art models in several contexts, indicating that CEL adapts to
incremental data well. CEL's robustness and reliability are underscored by its
minimal 65% forgetting rate and 18% higher memory stability compared to
existing benchmark studies. This study highlights CEL's versatility in disease
outbreak prediction, addressing evolving data with temporal patterns. It offers
a valuable model for proactive disease control with accurate, timely
predictions.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:26:04 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Aslam",
"Saba",
""
],
[
"Rasool",
"Abdur",
""
],
[
"Wu",
"Hongyan",
""
],
[
"Li",
"Xiaoli",
""
]
] |
2401.08941 | Jiaqi Gu | Jiaqi Gu and Zihuai He | A Powerful and Precise Feature-level Filter using Group Knockoffs | 34 pages, 5 figures | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Selecting important features that have substantial effects on the response
with provable type-I error rate control is a fundamental concern in statistics,
with wide-ranging practical applications. Existing knockoff filters, although
shown to provide theoretical guarantee on false discovery rate (FDR) control,
often struggle to strike a balance between high power and precision in
pinpointing important features when there exist large groups of strongly
correlated features. To address this challenge, we develop a new filter using
group knockoffs to achieve both powerful and precise selection of important
features. Via experiments of simulated data and analysis of a real Alzheimer's
disease genetic dataset, it is found that the proposed filter can not only
control the proportion of false discoveries but also identify important
features with comparable power and greater precision than the existing group
knockoffs filter.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:32:27 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Gu",
"Jiaqi",
""
],
[
"He",
"Zihuai",
""
]
] |
2401.08942 | Ping Li | Ping Li, Yaping Mao, Ingo Schiermeyer, Yifan Yao | Ramsey and Gallai-Ramsey numbers for linear forests and kipas | null | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For two graphs $G,H$, the \emph{Ramsey number} $r(G,H)$ is the minimum
integer $n$ such that any red/blue edge-coloring of $K_n$ contains either a red
copy of $G$ or a blue copy of $H$. For two graphs $G,H$, the
\emph{Gallai-Ramsey number} $\operatorname{gr}_k(G:H)$ is defined as the
minimum integer $n$ such that any $k$-edge-coloring of $K_n$ must contain
either a rainbow copy of $G$ or a monochromatic copy of $H$. In this paper, the
classical Ramsey numbers of linear forest versus kipas are obtained. We obtain
the exact values of $\operatorname{gr}_k(G:H)$, where $H$ is either a path or a
kipas and $G\in\{K_{1,3},P_4^+,P_5\}$ and $P_4^+$ is the graph consisting of
$P_4$ with one extra edge incident with inner vertex.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:32:27 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Li",
"Ping",
""
],
[
"Mao",
"Yaping",
""
],
[
"Schiermeyer",
"Ingo",
""
],
[
"Yao",
"Yifan",
""
]
] |
2401.08943 | Lei Xun | Lei Xun, Mingyu Hu, Hengrui Zhao, Amit Kumar Singh, Jonathon Hare,
Geoff V. Merrett | Fluid Dynamic DNNs for Reliable and Adaptive Distributed Inference on
Edge Devices | Accepted at Design, Automation & Test in Europe Conference (DATE)
2024 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Distributed inference is a popular approach for efficient DNN inference at
the edge. However, traditional Static and Dynamic DNNs are not
distribution-friendly, causing system reliability and adaptability issues. In
this paper, we introduce Fluid Dynamic DNNs (Fluid DyDNNs), tailored for
distributed inference. Distinct from Static and Dynamic DNNs, Fluid DyDNNs
utilize a novel nested incremental training algorithm to enable independent and
combined operation of its sub-networks, enhancing system reliability and
adaptability. Evaluation on embedded Arm CPUs with a DNN model and the MNIST
dataset, shows that in scenarios of single device failure, Fluid DyDNNs ensure
continued inference, whereas Static and Dynamic DNNs fail. When devices are
fully operational, Fluid DyDNNs can operate in either a High-Accuracy mode and
achieve comparable accuracy with Static DNNs, or in a High-Throughput mode and
achieve 2.5x and 2x throughput compared with Static and Dynamic DNNs,
respectively.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:34:38 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Xun",
"Lei",
""
],
[
"Hu",
"Mingyu",
""
],
[
"Zhao",
"Hengrui",
""
],
[
"Singh",
"Amit Kumar",
""
],
[
"Hare",
"Jonathon",
""
],
[
"Merrett",
"Geoff V.",
""
]
] |
2401.08944 | Zhaofeng Su | Zhaofeng Su, Nina Sukhodoeva | Optimal local filtering operation for enhancing quantum entanglement | 11 pages, 1 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Quantum entanglement is an indispensable resource for many significant
quantum information processing tasks. Thus, distilling more entanglement from
less entangled resource is a task of practical significance and has been
investigated for decades. The literature [Verstraete \textit{et al}.,
\href{https://link.aps.org/doi/10.1103/PhysRevA.64.010101}{Phys. Rev. A 64,
010101(2001)}] considered a scenario to increase the entanglement by local
filtering operation and qualitatively derived the variance relation of
entanglement. We investigate the scenario with general two-qubit resources to
find the optimal strategy of filtering operations. We obtain the upper bound
for the ratio of entanglement increase and find the corresponding optimal local
filtering operation to achieve the maximal ratio. Our analysis shows that the
upper bound ratio grows with the length of local Bloch vector while the success
probability decrease with it. We further extend the research to investigate the
optimal measurement strategy by considering general measurement. Our result
shows that local measurement can not increase the expectation of quantum
entanglement, which gives more analytical evidence to the well known fact that
local operation can not create quantum entanglement.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:36:46 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Su",
"Zhaofeng",
""
],
[
"Sukhodoeva",
"Nina",
""
]
] |
2401.08945 | Ergin Sezgin | Mehmet Ozkan, Yi Pang and Ergin Sezgin | Higher Derivative Supergravities in Diverse Dimensions | 142 pages | null | null | MI-HET-826 | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey on-shell and off-shell higher derivative supergravities in
dimensions $1\le D\le 11$. Various approaches to their construction, including
the Noether procedure, (harmonic) superspace, superform method, superconformal
tensor calculus, $S$-matrix and dimensional reduction, are summarized.
Primarily the bosonic parts of the invariants and the supertransformations of
the fermionic fields are provided. The process of going on-shell, solutions to
the Killing spinor equations, typical supersymmetric solutions, and the role of
duality symmetries in the context of $R^4, D^4 R^4$ and $D^6 R^4$ invariants
are reviewed.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:40:01 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Ozkan",
"Mehmet",
""
],
[
"Pang",
"Yi",
""
],
[
"Sezgin",
"Ergin",
""
]
] |
2401.08946 | Dmitry Prokhorov | D. A. Prokhorov, A. Moraghan | A blind search for intraday gamma-ray transients with Fermi-LAT:
detections of GRB and solar emissions | 11 pages, 3 figures, submitted to A&A on January 17, 2024 | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a search for intraday transient gamma-ray signals using 15 years
of the Fermi Large Area Telescope data. The search is based on a recently
developed variable-size sliding-time-window (VSSTW) analysis and aimed at
studying variable gamma-ray emission from gamma-ray bursts and the Sun. We
refined the algorithm for searches for transient sources in order to solve the
search problem within a reasonable amount of CPU time. These refinements
allowed us to increase the number of gamma-ray bursts, solar flares, and
quiescent solar events detected with the VSSTW technique by several times
compared to the previous VSSTW search. The current search revealed a new
gamma-ray signal recorded with Fermi-LAT on 2018 January 12. This signal is
probably from a GRB and deserves an exploration of the existing archival
multi-wavelength observations in order to identify it in an unambiguous way. We
furthermore report a gamma-ray signal from the solar flare on 2023 December 31
which occurred during the 25th solar cycle.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:43:27 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Prokhorov",
"D. A.",
""
],
[
"Moraghan",
"A.",
""
]
] |
2401.08947 | Abdur Rasool | Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized
Phishing URLs Detection | null | null | null | null | cs.CR cs.LG | http://creativecommons.org/licenses/by/4.0/ | The escalating reliance on revolutionary online web services has introduced
heightened security risks, with persistent challenges posed by phishing despite
extensive security measures. Traditional phishing systems, reliant on machine
learning and manual features, struggle with evolving tactics. Recent advances
in deep learning offer promising avenues for tackling novel phishing challenges
and malicious URLs. This paper introduces a two-phase stack generalized model
named AntiPhishStack, designed to detect phishing sites. The model leverages
the learning of URLs and character-level TF-IDF features symmetrically,
enhancing its ability to combat emerging phishing threats. In Phase I, features
are trained on a base machine learning classifier, employing K-fold
cross-validation for robust mean prediction. Phase II employs a two-layered
stacked-based LSTM network with five adaptive optimizers for dynamic
compilation, ensuring premier prediction on these features. Additionally, the
symmetrical predictions from both phases are optimized and integrated to train
a meta-XGBoost classifier, contributing to a final robust prediction. The
significance of this work lies in advancing phishing detection with
AntiPhishStack, operating without prior phishing-specific feature knowledge.
Experimental validation on two benchmark datasets, comprising benign and
phishing or malicious URLs, demonstrates the model's exceptional performance,
achieving a notable 96.04% accuracy compared to existing studies. This research
adds value to the ongoing discourse on symmetry and asymmetry in information
security and provides a forward-thinking solution for enhancing network
security in the face of evolving cyber threats.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:44:27 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Aslam",
"Saba",
""
],
[
"Aslam",
"Hafsa",
""
],
[
"Manzoor",
"Arslan",
""
],
[
"Hui",
"Chen",
""
],
[
"Rasool",
"Abdur",
""
]
] |
2401.08948 | Ramkumar Natarajan | Ramkumar Natarajan, Shohin Mukherjee, Howie Choset and Maxim Likhachev | PINSAT: Parallelized Interleaving of Graph Search and Trajectory
Optimization for Kinodynamic Motion Planning | Under review | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | Trajectory optimization is a widely used technique in robot motion planning
for letting the dynamics and constraints on the system shape and synthesize
complex behaviors. Several previous works have shown its benefits in
high-dimensional continuous state spaces and under differential constraints.
However, long time horizons and planning around obstacles in non-convex spaces
pose challenges in guaranteeing convergence or finding optimal solutions. As a
result, discrete graph search planners and sampling-based planers are preferred
when facing obstacle-cluttered environments. A recently developed algorithm
called INSAT effectively combines graph search in the low-dimensional subspace
and trajectory optimization in the full-dimensional space for global
kinodynamic planning over long horizons. Although INSAT successfully reasoned
about and solved complex planning problems, the numerous expensive calls to an
optimizer resulted in large planning times, thereby limiting its practical use.
Inspired by the recent work on edge-based parallel graph search, we present
PINSAT, which introduces systematic parallelization in INSAT to achieve lower
planning times and higher success rates, while maintaining significantly lower
costs over relevant baselines. We demonstrate PINSAT by evaluating it on 6 DoF
kinodynamic manipulation planning with obstacles.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:50:16 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Natarajan",
"Ramkumar",
""
],
[
"Mukherjee",
"Shohin",
""
],
[
"Choset",
"Howie",
""
],
[
"Likhachev",
"Maxim",
""
]
] |
2401.08949 | Shangbin Yang Dr. | Cui Zhao, Shangbin Yang, Tingmei Wang, Haiyan Zhao, Shiyuan Liu,
Fangyuan He, Zhengkun Hu | An Automatic Approach for Grouping Sunspots and Calculating Relative
Sunspot Number on SDO/HMI Continuum Images | 11 pages,5 figures | Published in Astronomical Journal 2024,167,52 | 10.3847/1538-3881/ad11e2 | null | astro-ph.SR | http://creativecommons.org/licenses/by/4.0/ | Relative Sunspot Number is one of the major parameters for the study of
long-term solar activity. The automatic calculation of the Relative Sunspot
Number is more stable and accurate as compared to manual methods. In this
paper, we propose an algorithm that can detect sunspots and divide them into
groups, to automatically calculate the Relative Sunspot Number. Mathematical
Morphology was adopted to detect sunspots then group them. The dataset used
were the continuum images from SDO/HMI. The process was carried out on the
overall HMI data available on the timespan from January 2022 to May 2023 with a
time cadence of one day. The experimental results indicated that the method
achieved high accuracy of 85.3\%. It was well fitted with the international
Relative Sunspot Number provided by Solar Influences Data Analysis Center
(SIDC) (CC=0.91). We calculated the conversion factor K value of SDO/HMI for
calculating the Relative Sunspots Number(K=1.03).
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:52:02 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Zhao",
"Cui",
""
],
[
"Yang",
"Shangbin",
""
],
[
"Wang",
"Tingmei",
""
],
[
"Zhao",
"Haiyan",
""
],
[
"Liu",
"Shiyuan",
""
],
[
"He",
"Fangyuan",
""
],
[
"Hu",
"Zhengkun",
""
]
] |
2401.08950 | Priyanka Mukhopadhyay Dr | Priyanka Mukhopadhyay | Synthesizing Toffoli-optimal quantum circuits for arbitrary multi-qubit
unitaries | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | In this paper we study the Clifford+Toffoli universal fault-tolerant gate
set. We introduce a generating set in order to represent any unitary
implementable by this gate set and with this we derive a bound on the
Toffoli-count of arbitrary multi-qubit unitaries. We analyse the channel
representation of the generating set elements, with the help of which we infer
$|\mathcal{J}_n^{Tof}|<|\mathcal{J}_n^T|$, where $\mathcal{J}_n^{Tof}$ and
$\mathcal{J}_n^T$ are the set of unitaries exactly implementable by the
Clifford+Toffoli and Clifford+T gate set, respectively. We develop
Toffoli-count optimal synthesis algorithms for both approximately and exactly
implementable multi-qubit unitaries. With the help of these we prove
$|\mathcal{J}_n^{Tof}|=|\mathcal{J}_n^{CS}|$, where $\mathcal{J}_n^{CS}$ is the
set of unitaries exactly implementable by the Clifford+CS gate set.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:53:37 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Mukhopadhyay",
"Priyanka",
""
]
] |
2401.08951 | Hongxia Yang | Hongxia Yang, Wentian Wang, Farzane Zangane, Kevin Cheevers, Logan
Maley, Matei Radulescu | Detonation attenuation and quenching in hydrogen mixtures after the
interaction with cylinders | Paper presented at the 34th International Symposium on Shock Waves | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The attenuation and quenching of H$_2$/O$_2$ detonations transmitted across a
column of cylinders were studied experimentally and analytically at
sub-atmospheric pressures. Two distinct transmission regimes were observed:
successful transmission and complete quenching. The transition between the two
regimes was found to correlate with the ratio of inter-cylinder separation
distance (b) to a characteristic detonation scale for large blockage ratios
(BRs), with critical limits comparable with those previously reported for
detonation diffraction from slots. Based on available cell size measurements,
the critical transmission limit was $b/\lambda=4.5\pm3$. The proposed
theoretical model based on Whitham's geometric shock dynamics confirmed the
equivalence between the detonation diffraction at abrupt area changes and
around cylinders with large BRs. Complete quenching observed experimentally was
accounted for by the weak transmitted shock strength upon detonation failure.
For the tested BRs, the transmitted shock speed ranged between 50% and 60% of
the Chapman-Jouguet detonation speed. As a result, the post-shock temperatures
fell below the cross-over regime for hydrogen ignition, leading to very long
ignition delay times ($t_i$) despite the temperature rise induced by Mach
reflection. The long $t_i$ suppressed auto-ignition, while the high isentropic
exponent prevented further convective mixing required for re-initiation. This
explained the fundamental difference between arresting hydrogen and hydrocarbon
detonations, for which transmitted fast flames punctuated by auto-ignition
events were always observed. The transmitted shock strength was found to be
well-predicted by our previous self-similar multiple discontinuity gas-dynamic
model. Over a very narrow range near the critical conditions, both hot spot
re-ignition and detonation re-initiation from Mach shock reflections were
observed.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 03:54:03 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Yang",
"Hongxia",
""
],
[
"Wang",
"Wentian",
""
],
[
"Zangane",
"Farzane",
""
],
[
"Cheevers",
"Kevin",
""
],
[
"Maley",
"Logan",
""
],
[
"Radulescu",
"Matei",
""
]
] |
2401.08952 | Toshihiro Fujii | Toshihiro Fujii | The past and future 20-years endeavor for discovering origins of
ultra-high energy cosmic rays -- Rapporteur's summary of cosmic ray indirect | 27 pages, 11 figures, Rapporteur talk in the 38th International
Cosmic Ray Conference (ICRC2023) | null | 10.22323/1.444.0031 | PoS (ICRC2023) 031 | astro-ph.HE astro-ph.IM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article is the rapporteur's summary of the cosmic ray indirect sessions
of the 38th International Cosmic Ray Conference in Nagoya, Japan. The
rapporteur highlights cosmic ray indirect observatories around the world, and
reviews a selection of the latest results regarding the cosmic ray energy
spectrum, mass composition, anisotropy, hadronic interaction models, theory,
geophysics, interdisciplinary research, and future projects.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:00:00 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jan 2024 09:35:21 GMT"
}
] | 2024-01-19T00:00:00 | [
[
"Fujii",
"Toshihiro",
""
]
] |
2401.08953 | Faisal Haque Bappy | Tariqul Islam, Faisal Haque Bappy, Md Nafis Ul Haque Shifat, Farhan
Ahmad, Kamrul Hasan, Tarannum Shaila Zaman | An Efficient and Scalable Auditing Scheme for Cloud Data Storage using
an Enhanced B-tree | null | null | null | null | cs.CR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An efficient, scalable, and provably secure dynamic auditing scheme is highly
desirable in the cloud storage environment for verifying the integrity of the
outsourced data. Most of the existing work on remote integrity checking focuses
on static archival data and therefore cannot be applied to cases where dynamic
data updates are more common. Additionally, existing auditing schemes suffer
from performance bottlenecks and scalability issues. To address these issues,
in this paper, we present a novel dynamic auditing scheme for centralized cloud
environments leveraging an enhanced version of the B-tree. Our proposed scheme
achieves the immutable characteristic of a decentralized system (i.e.,
blockchain technology) while effectively addressing the synchronization and
performance challenges of such systems. Unlike other static auditing schemes,
our scheme supports dynamic insert, update, and delete operations. Also, by
leveraging an enhanced B-tree, our scheme maintains a balanced tree after any
alteration to a certain file, improving performance significantly. Experimental
results show that our scheme outperforms both traditional Merkle Hash
Tree-based centralized auditing and decentralized blockchain-based auditing
schemes in terms of block modifications (e.g., insert, delete, update), block
retrieval, and data verification time.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:01:18 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Islam",
"Tariqul",
""
],
[
"Bappy",
"Faisal Haque",
""
],
[
"Shifat",
"Md Nafis Ul Haque",
""
],
[
"Ahmad",
"Farhan",
""
],
[
"Hasan",
"Kamrul",
""
],
[
"Zaman",
"Tarannum Shaila",
""
]
] |
2401.08954 | William Sands | Andrew J. Christlieb, William A. Sands, Stephen White | A Particle-in-cell Method for Plasmas with a Generalized Momentum
Formulation, Part II: Enforcing the Lorenz Gauge Condition | 18 pages, 4 figures, 3 tables,1 algorithm. arXiv admin note: text
overlap with arXiv:2208.11291 | null | null | null | physics.plasm-ph cs.NA math.NA physics.comp-ph | http://creativecommons.org/licenses/by/4.0/ | In a previous paper, we developed a new particle-in-cell method for the
Vlasov-Maxwell system in which the electromagnetic fields and the equations of
motion for the particles were cast in terms of scalar and vector potentials
through a Hamiltonian formulation. This paper extends this new class of methods
by focusing on the enforcement the Lorenz gauge condition in both exact and
approximate forms using co-located meshes. A time-consistency property of the
proposed field solver for the vector potential form of Maxwell's equations is
established, which is shown to preserve the equivalence between the
semi-discrete Lorenz gauge condition and the analogous semi-discrete continuity
equation. Using this property, we present three methods to enforce a
semi-discrete gauge condition. The first method introduces an update for the
continuity equation that is consistent with the discretization of the Lorenz
gauge condition. The second approach we propose enforces a semi-discrete
continuity equation using the boundary integral solution to the field
equations. The third approach introduces a gauge correcting method that makes
direct use of the gauge condition to modify the scalar potential and uses local
maps for both the charge and current densities. The vector potential coming
from the current density is taken to be exact, and using the Lorenz gauge, we
compute a correction to the scalar potential that makes the two potentials
satisfy the gauge condition. We demonstrate two of the proposed methods in the
context of periodic domains. Problems defined on bounded domains, including
those with complex geometric features remain an ongoing effort. However, this
work shows that it is possible to design computationally efficient methods that
can effectively enforce the Lorenz gauge condition in an non-staggered PIC
formulation.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:06:19 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Christlieb",
"Andrew J.",
""
],
[
"Sands",
"William A.",
""
],
[
"White",
"Stephen",
""
]
] |
2401.08955 | Jimreeves David M | Jimreeves David M and Victor Steinberg | Elastic waves in a Hele-Shaw cell with a co-moving Kelvin-Helmholtz-like
parallel shear flow | null | null | null | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report the presence of traveling Elastic Waves in experiments featuring a
shear flow in the very low Reynolds number regime (Re < 0.1) with no external
curvatures or internal perturbations in the channel design. The classic
Kelvin-Helmholtz type shear flow with an inflection point in its velocity
profile is generated by co-moving dilute polymeric solutions moving at
different speeds within a Hele-Shaw cell. Notably, this is the first
observation of Elastic waves in straight channels, with no internal or external
wall curvatures or physical perturbation sources present in the flow or on the
channel walls, making the differential velocity of the parallel streams the
only possible source of generation of Elastic Waves. The interface between the
co-moving streams displays a wavy and unsteady nature for all studied cases.
Furthermore, the frequency and wave speed of the Elastic Waves are found to
scale with the Weissenberg number, which is based on the velocity difference
between the streams. This finding contributes to the emerging body of evidence
regarding the presence of Elastic Waves in straight channels with minimal
perturbation sources (Steinberg 2022).
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:08:32 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"M",
"Jimreeves David",
""
],
[
"Steinberg",
"Victor",
""
]
] |
2401.08956 | Xuyang Zhang | Xuyang Zhang, Xinwei Yue, Tian Li, Zhihao Han, Yafei Wang, Yong Ding
and Rongke Liu | A Unified NOMA Framework in Beam-Hopping Satellite Communication Systems | null | IEEE Transactions on Aerospace and Electronic Systems, vol. 59,
no. 5, pp. 5390-5404, Oct. 2023 | 10.1109/TAES.2023.3260059 | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the application of a unified non-orthogonal multiple
access framework in beam hopping (U-NOMA-BH) based satellite communication
systems. More specifically, the proposed U-NOMA-BH framework can be applied to
code-domain NOMA based BH (CD-NOMA-BH) and power-domain NOMA based BH
(PD-NOMA-BH) systems. To satisfy dynamic-uneven traffic demands, we formulate
the optimization problem to minimize the square of discrete difference by
jointly optimizing power allocation, carrier assignment and beam scheduling.
The non-convexity of the objective function and the constraint condition is
solved through Dinkelbach's transform and variable relaxation. As a further
development, the closed-from and asymptotic expressions of outage probability
are derived for CD/PD-NOMA-BH systems. Based on approximated results, the
diversity orders of a pair of users are obtained in detail. In addition, the
system throughput of U-NOMA-BH is discussed in delay-limited transmission mode.
Numerical results verify that: i) The gap between traffic requests of
CD/PD-NOMA-BH systems appears to be more closely compared with orthogonal
multiple access based BH (OMA-BH); ii) The CD-NOMA-BH system is capable of
providing the enhanced traffic request and capacity provision; and iii) The
outage behaviors of CD/PD-NOMA-BH are better than that of OMA-BH.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:11:28 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Zhang",
"Xuyang",
""
],
[
"Yue",
"Xinwei",
""
],
[
"Li",
"Tian",
""
],
[
"Han",
"Zhihao",
""
],
[
"Wang",
"Yafei",
""
],
[
"Ding",
"Yong",
""
],
[
"Liu",
"Rongke",
""
]
] |
2401.08957 | Kun Wu | Kun Wu, Ning Liu, Zhen Zhao, Di Qiu, Jinming Li, Zhengping Che,
Zhiyuan Xu, Qinru Qiu, Jian Tang | SWBT: Similarity Weighted Behavior Transformer with the Imperfect
Demonstration for Robotic Manipulation | 8 pages, 5 figures | null | null | null | cs.RO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Imitation learning (IL), aiming to learn optimal control policies from expert
demonstrations, has been an effective method for robot manipulation tasks.
However, previous IL methods either only use expensive expert demonstrations
and omit imperfect demonstrations or rely on interacting with the environment
and learning from online experiences. In the context of robotic manipulation,
we aim to conquer the above two challenges and propose a novel framework named
Similarity Weighted Behavior Transformer (SWBT). SWBT effectively learn from
both expert and imperfect demonstrations without interaction with environments.
We reveal that the easy-to-get imperfect demonstrations, such as forward and
inverse dynamics, significantly enhance the network by learning fruitful
information. To the best of our knowledge, we are the first to attempt to
integrate imperfect demonstrations into the offline imitation learning setting
for robot manipulation tasks. Extensive experiments on the ManiSkill2 benchmark
built on the high-fidelity Sapien simulator and real-world robotic manipulation
tasks demonstrated that the proposed method can extract better features and
improve the success rates for all tasks. Our code will be released upon
acceptance of the paper.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:15:56 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Wu",
"Kun",
""
],
[
"Liu",
"Ning",
""
],
[
"Zhao",
"Zhen",
""
],
[
"Qiu",
"Di",
""
],
[
"Li",
"Jinming",
""
],
[
"Che",
"Zhengping",
""
],
[
"Xu",
"Zhiyuan",
""
],
[
"Qiu",
"Qinru",
""
],
[
"Tang",
"Jian",
""
]
] |
2401.08958 | Michael Fuchs | Yu-Sheng Chang, Michael Fuchs | Counting Phylogenetic Networks with Few Reticulation Vertices: Galled
and Reticulation-Visible Networks | 17 pages | null | null | null | math.CO | http://creativecommons.org/licenses/by/4.0/ | We give exact and asymptotic counting results for the number of galled
networks and reticulation-visible networks with few reticulation vertices. Our
results are obtained with the component graph method, which was introduced by
L. Zhang and his coauthors, and generating function techniques. For galled
networks, we in addition use analytic combinatorics. Moreover, in an appendix,
we consider maximally reticulated reticulation-visible networks and derive
their number, too.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:18:26 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Chang",
"Yu-Sheng",
""
],
[
"Fuchs",
"Michael",
""
]
] |
2401.08959 | Teng Xiao | Teng Xiao, Suhang Wang | Towards Off-Policy Reinforcement Learning for Ranking Policies with
Human Feedback | null | null | 10.1609/aaai.v36i8.20849 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Probabilistic learning to rank (LTR) has been the dominating approach for
optimizing the ranking metric, but cannot maximize long-term rewards.
Reinforcement learning models have been proposed to maximize user long-term
rewards by formulating the recommendation as a sequential decision-making
problem, but could only achieve inferior accuracy compared to LTR counterparts,
primarily due to the lack of online interactions and the characteristics of
ranking. In this paper, we propose a new off-policy value ranking (VR)
algorithm that can simultaneously maximize user long-term rewards and optimize
the ranking metric offline for improved sample efficiency in a unified
Expectation-Maximization (EM) framework. We theoretically and empirically show
that the EM process guides the leaned policy to enjoy the benefit of
integration of the future reward and ranking metric, and learn without any
online interactions. Extensive offline and online experiments demonstrate the
effectiveness of our methods.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:19:33 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Xiao",
"Teng",
""
],
[
"Wang",
"Suhang",
""
]
] |
2401.08960 | Subigya Nepal | Subigya Nepal, Javier Hernandez, Talie Massachi, Kael Rowan, Judith
Amores, Jina Suh, Gonzalo Ramos, Brian Houck, Shamsi T. Iqbal, Mary
Czerwinski | From User Surveys to Telemetry-Driven Agents: Exploring the Potential of
Personalized Productivity Solutions | null | null | null | null | cs.HC cs.AI cs.CY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We present a comprehensive, user-centric approach to understand preferences
in AI-based productivity agents and develop personalized solutions tailored to
users' needs. Utilizing a two-phase method, we first conducted a survey with
363 participants, exploring various aspects of productivity, communication
style, agent approach, personality traits, personalization, and privacy.
Drawing on the survey insights, we developed a GPT-4 powered personalized
productivity agent that utilizes telemetry data gathered via Viva Insights from
information workers to provide tailored assistance. We compared its performance
with alternative productivity-assistive tools, such as dashboard and narrative,
in a study involving 40 participants. Our findings highlight the importance of
user-centric design, adaptability, and the balance between personalization and
privacy in AI-assisted productivity tools. By building on the insights
distilled from our study, we believe that our work can enable and guide future
research to further enhance productivity solutions, ultimately leading to
optimized efficiency and user experiences for information workers.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:20:10 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Nepal",
"Subigya",
""
],
[
"Hernandez",
"Javier",
""
],
[
"Massachi",
"Talie",
""
],
[
"Rowan",
"Kael",
""
],
[
"Amores",
"Judith",
""
],
[
"Suh",
"Jina",
""
],
[
"Ramos",
"Gonzalo",
""
],
[
"Houck",
"Brian",
""
],
[
"Iqbal",
"Shamsi T.",
""
],
[
"Czerwinski",
"Mary",
""
]
] |
2401.08961 | Yihan Du | Yihan Du, R. Srikant, Wei Chen | Cascading Reinforcement Learning | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Cascading bandits have gained popularity in recent years due to their
applicability to recommendation systems and online advertising. In the
cascading bandit model, at each timestep, an agent recommends an ordered subset
of items (called an item list) from a pool of items, each associated with an
unknown attraction probability. Then, the user examines the list, and clicks
the first attractive item (if any), and after that, the agent receives a
reward. The goal of the agent is to maximize the expected cumulative reward.
However, the prior literature on cascading bandits ignores the influences of
user states (e.g., historical behaviors) on recommendations and the change of
states as the session proceeds. Motivated by this fact, we propose a
generalized cascading RL framework, which considers the impact of user states
and state transition into decisions. In cascading RL, we need to select items
not only with large attraction probabilities but also leading to good successor
states. This imposes a huge computational challenge due to the combinatorial
action space. To tackle this challenge, we delve into the properties of value
functions, and design an oracle BestPerm to efficiently find the optimal item
list. Equipped with BestPerm, we develop two algorithms CascadingVI and
CascadingBPI, which are both computationally-efficient and sample-efficient,
and provide near-optimal regret and sample complexity guarantees. Furthermore,
we present experiments to show the improved computational and sample
efficiencies of our algorithms compared to straightforward adaptations of
existing RL algorithms in practice.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:20:26 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Du",
"Yihan",
""
],
[
"Srikant",
"R.",
""
],
[
"Chen",
"Wei",
""
]
] |
2401.08962 | Hyunju Kim | Hyunju Kim and Geon Kim and Taehoon Lee and Kisoo Kim and Dongman Lee | DOO-RE: A dataset of ambient sensors in a meeting room for activity
recognition | null | null | null | null | cs.HC cs.LG cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the advancement of IoT technology, recognizing user activities with
machine learning methods is a promising way to provide various smart services
to users. High-quality data with privacy protection is essential for deploying
such services in the real world. Data streams from surrounding ambient sensors
are well suited to the requirement. Existing ambient sensor datasets only
support constrained private spaces and those for public spaces have yet to be
explored despite growing interest in research on them. To meet this need, we
build a dataset collected from a meeting room equipped with ambient sensors.
The dataset, DOO-RE, includes data streams from various ambient sensor types
such as Sound and Projector. Each sensor data stream is segmented into activity
units and multiple annotators provide activity labels through a
cross-validation annotation process to improve annotation quality. We finally
obtain 9 types of activities. To our best knowledge, DOO-RE is the first
dataset to support the recognition of both single and group activities in a
real meeting room with reliable annotations.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:21:04 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Kim",
"Hyunju",
""
],
[
"Kim",
"Geon",
""
],
[
"Lee",
"Taehoon",
""
],
[
"Kim",
"Kisoo",
""
],
[
"Lee",
"Dongman",
""
]
] |
2401.08963 | Liang Zhao | Liang Zhao, Jichao Fan, Chenchi Gong, Alexis Dyke, Weilu Gao, Bo Li | A critical review on recent progress of solution-processed monolayer
assembly of nanomaterials and applications | null | null | null | null | physics.app-ph cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | The rapid development in nanotechnology has necessitated accurate and
efficient assembly strategies for nanomaterials. Monolayer assembly of
nanomaterials (MAN) represents an extreme challenge in manufacturing and is
critical in understanding interactions among nanomaterials, solvents, and
substrates. MAN enables highly tunable performance in electronic and photonic
devices. This review summarizes the recent progress on the methods to achieve
MAN and discusses important control factors. Moreover, the importance of MAN is
elaborated by a broad range of applications in electronics and photonics. In
the end, we outlook the opportunities as well as challenges in manufacturing
and new applications.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:35:46 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Zhao",
"Liang",
""
],
[
"Fan",
"Jichao",
""
],
[
"Gong",
"Chenchi",
""
],
[
"Dyke",
"Alexis",
""
],
[
"Gao",
"Weilu",
""
],
[
"Li",
"Bo",
""
]
] |
2401.08964 | Yixin Cheng | Yixin Cheng, Kayley Lyons, Guanliang Chen, Dragan Gasevic and Zachari
Swiecki | Evidence-centered Assessment for Writing with Generative AI | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | We propose a learning analytics-based methodology for assessing the
collaborative writing of humans and generative artificial intelligence. Framed
by the evidence-centered design, we used elements of knowledge-telling,
knowledge transformation, and cognitive presence to identify assessment claims;
we used data collected from the CoAuthor writing tool as potential evidence for
these claims; and we used epistemic network analysis to make inferences from
the data about the claims. Our findings revealed significant differences in the
writing processes of different groups of CoAuthor users, suggesting that our
method is a plausible approach to assessing human-AI collaborative writing.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:36:06 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Cheng",
"Yixin",
""
],
[
"Lyons",
"Kayley",
""
],
[
"Chen",
"Guanliang",
""
],
[
"Gasevic",
"Dragan",
""
],
[
"Swiecki",
"Zachari",
""
]
] |
2401.08965 | Lei Xun | Lei Xun, Jonathon Hare, Geoff V. Merrett | Dynamic DNNs and Runtime Management for Efficient Inference on
Mobile/Embedded Devices | Accepted at Design, Automation & Test in Europe Conference (DATE)
2024, PhD Forum | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Deep neural network (DNN) inference is increasingly being executed on mobile
and embedded platforms due to several key advantages in latency, privacy and
always-on availability. However, due to limited computing resources, efficient
DNN deployment on mobile and embedded platforms is challenging. Although many
hardware accelerators and static model compression methods were proposed by
previous works, at system runtime, multiple applications are typically executed
concurrently and compete for hardware resources. This raises two main
challenges: Runtime Hardware Availability and Runtime Application Variability.
Previous works have addressed these challenges through either dynamic neural
networks that contain sub-networks with different performance trade-offs or
runtime hardware resource management. In this thesis, we proposed a combined
method, a system was developed for DNN performance trade-off management,
combining the runtime trade-off opportunities in both algorithms and hardware
to meet dynamically changing application performance targets and hardware
constraints in real time. We co-designed novel Dynamic Super-Networks to
maximise runtime system-level performance and energy efficiency on
heterogeneous hardware platforms. Compared with SOTA, our experimental results
using ImageNet on the GPU of Jetson Xavier NX show our model is 2.4x faster for
similar ImageNet Top-1 accuracy, or 5.1% higher accuracy at similar latency. We
also designed a hierarchical runtime resource manager that tunes both dynamic
neural networks and DVFS at runtime. Compared with the Linux DVFS governor
schedutil, our runtime approach achieves up to a 19% energy reduction and a 9%
latency reduction in single model deployment scenario, and an 89% energy
reduction and a 23% latency reduction in a two concurrent model deployment
scenario.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:40:30 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Xun",
"Lei",
""
],
[
"Hare",
"Jonathon",
""
],
[
"Merrett",
"Geoff V.",
""
]
] |
2401.08966 | Che Chun Huang | Seng Ghee Tan, Che Chun Huang, Mansoor B.A.Jalil, Zhuobin Siu | Spin Orbit Torque on a Curved Surface | 14 pages, 5 figures | null | null | null | cond-mat.mes-hall quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a general formulation of the spin-orbit coupling on a 2D curved
surface. Considering the wide applicability of spin-orbit effect in
spinor-based condensed matter physics, a general spin-orbit formulation could
aid the study of spintronics, Dirac graphene, topological systems, and quantum
information on curved surfaces. Particular attention is then devoted to the
development of an important spin-orbit quantity known as the spin-orbit torque.
As devices trend smaller in dimension, the physics of local geometries on
spin-orbit torque, hence spin and magnetic dynamics shall not be neglected. We
derived the general expression of a spin-orbit anisotropy field for the curved
surfaces and provided explicit solutions in the special contexts of the
spherical, cylindrical and flat coordinates. Our expressions allow spin-orbit
anisotropy fields and hence spin-orbit torque to be computed over the entire
surfaces of devices of any geometry.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:42:07 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Tan",
"Seng Ghee",
""
],
[
"Huang",
"Che Chun",
""
],
[
"Jalil",
"Mansoor B. A.",
""
],
[
"Siu",
"Zhuobin",
""
]
] |
2401.08967 | Zhanming Jie | Trung Quoc Luong, Xinbo Zhang, Zhanming Jie, Peng Sun, Xiaoran Jin,
Hang Li | ReFT: Reasoning with Reinforced Fine-Tuning | 13 pages | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | One way to enhance the reasoning capability of Large Language Models (LLMs)
is to conduct Supervised Fine-Tuning (SFT) using Chain-of-Thought (CoT)
annotations. This approach does not show sufficiently strong generalization
ability, however, because the training only relies on the given CoT data. In
math problem-solving, for example, there is usually only one annotated
reasoning path for each question in the training data. Intuitively, it would be
better for the algorithm to learn from multiple annotated reasoning paths given
a question. To address this issue, we propose a simple yet effective approach
called Reinforced Fine-Tuning (ReFT) to enhance the generalizability of
learning LLMs for reasoning, with math problem-solving as an example. ReFT
first warmups the model with SFT, and then employs on-line reinforcement
learning, specifically the PPO algorithm in this paper, to further fine-tune
the model, where an abundance of reasoning paths are automatically sampled
given the question and the rewards are naturally derived from the ground-truth
answers. Extensive experiments on GSM8K, MathQA, and SVAMP datasets show that
ReFT significantly outperforms SFT, and the performance can be potentially
further boosted by combining inference-time strategies such as majority voting
and re-ranking. Note that ReFT obtains the improvement by learning from the
same training questions as SFT, without relying on extra or augmented training
questions. This indicates a superior generalization ability for ReFT.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:43:21 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Luong",
"Trung Quoc",
""
],
[
"Zhang",
"Xinbo",
""
],
[
"Jie",
"Zhanming",
""
],
[
"Sun",
"Peng",
""
],
[
"Jin",
"Xiaoran",
""
],
[
"Li",
"Hang",
""
]
] |
2401.08968 | Xiaotian Han | Xiaotian Han, Yiqi Wang, Bohan Zhai, Quanzeng You, Hongxia Yang | COCO is "ALL'' You Need for Visual Instruction Fine-tuning | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Multi-modal Large Language Models (MLLMs) are increasingly prominent in the
field of artificial intelligence. Visual instruction fine-tuning (IFT) is a
vital process for aligning MLLMs' output with user's intentions. High-quality
and diversified instruction following data is the key to this fine-tuning
process. Recent studies propose to construct visual IFT datasets through a
multifaceted approach: transforming existing datasets with rule-based
templates, employing GPT-4 for rewriting annotations, and utilizing GPT-4V for
visual dataset pseudo-labeling. LLaVA-1.5 adopted similar approach and
construct LLaVA-mix-665k, which is one of the simplest, most widely used, yet
most effective IFT datasets today. Notably, when properly fine-tuned with this
dataset, MLLMs can achieve state-of-the-art performance on several benchmarks.
However, we noticed that models trained with this dataset often struggle to
follow user instructions properly in multi-round dialog. In addition, tradition
caption and VQA evaluation benchmarks, with their closed-form evaluation
structure, are not fully equipped to assess the capabilities of modern
open-ended generative MLLMs. This problem is not unique to the LLaVA-mix-665k
dataset, but may be a potential issue in all IFT datasets constructed from
image captioning or VQA sources, though the extent of this issue may vary. We
argue that datasets with diverse and high-quality detailed instruction
following annotations are essential and adequate for MLLMs IFT. In this work,
we establish a new IFT dataset, with images sourced from the COCO dataset along
with more diverse instructions. Our experiments show that when fine-tuned with
out proposed dataset, MLLMs achieve better performance on open-ended evaluation
benchmarks in both single-round and multi-round dialog setting.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:43:45 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Han",
"Xiaotian",
""
],
[
"Wang",
"Yiqi",
""
],
[
"Zhai",
"Bohan",
""
],
[
"You",
"Quanzeng",
""
],
[
"Yang",
"Hongxia",
""
]
] |
2401.08969 | Ritam Mallick | Anshuman Verma, Saksham Chandna and Ritam Mallick | Effect of relativistic equation of state and diffusion coefficient on
diffusive shock acceleration | 18 pages, 11 figures | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusive Shock Acceleration, resulting from first-order Fermi acceleration
occurring near Magnetohydrodynamic shock waves, is essential in explaining the
power law spectrum in various astrophysical radiation and cosmic rays. We
perform Monte Carlo simulations to model the stochastic scattering process in
Fermi acceleration, capturing the confinement of particles around the shock
within the ambient fluid. The model is tested and validated by comparing it
with the spectral index obtained with analytical calculation. Assuming a
relativistic EoS, we calculate the power-law spectral index for different
diffusion coefficients. With constant diffusion co-efficient and stiffer EoS,
the observed range of the spectral index is very narrow; however, as the EoS
becomes softer, the range increases. With varying diffusion co-efficient
stiffer EoS fails to give a well-defined spectral index (no linear spectrum);
however, as the EoS becomes softer, the spectral index lies between $2-4$. For
ultra-relativistic shocks, we consistently obtained a linear spectrum; however,
the spectral index range varied considerably with the diffusion coefficient.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:45:03 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Verma",
"Anshuman",
""
],
[
"Chandna",
"Saksham",
""
],
[
"Mallick",
"Ritam",
""
]
] |
2401.08970 | QingChang Zhao | Qingchang Zhao, Lian Tao, Hancheng Li, Shuangnan Zhang, Hua Feng,
Mingyu Ge, Long Ji, Yanan Wang, Yue Huang, Xiang Ma, Liang Zhang, Jinlu Qu,
Yanjun Xu, Shu Zhang, Qianqing Yin, Qingcang Shui, Ruican Ma, Shujie Zhao,
Panping Li, Zixu Yang, Hexin Liu and WeiYu | The First Polarimetric View on Quasi-Periodic Oscillations in a Black
Hole X-ray Binary | Accepted for publication in APJL | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the first polarimetric analysis of Quasi-Periodic Oscillations
(QPO) in a black hole binary utilizing \textit{IXPE} data. Our study focuses on
Swift J1727.8--1613, which experienced a massive outburst that was observed by
various telescopes across different wavelengths. The \textit{IXPE} observation
we studied was conducted during the Hard-Intermediate state. The polarization
degree (PD) and polarization angle (PA) were measured at 4.28$\pm$0.20\% and
$1.9^{\circ}\pm1.4^{\circ}$, respectively. Remarkably, significant QPO signals
were detected during this observation, with a QPO frequency of approximately
1.34 Hz and a fractional root-mean-square (RMS) amplitude of about 12.3\%.
Furthermore, we conducted a phase-resolved analysis of the QPO using the
Hilbert-Huang transform technique. The photon index showed a strong modulation
with respect to the QPO phase. In contrast, the PD and PA exhibit no
modulations in relation to the QPO phase, which is inconsistent with the
expectation of the Lense-Thirring precession of the inner flow. Further
theoretical studies are needed to conform with the observational results.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:46:15 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Zhao",
"Qingchang",
""
],
[
"Tao",
"Lian",
""
],
[
"Li",
"Hancheng",
""
],
[
"Zhang",
"Shuangnan",
""
],
[
"Feng",
"Hua",
""
],
[
"Ge",
"Mingyu",
""
],
[
"Ji",
"Long",
""
],
[
"Wang",
"Yanan",
""
],
[
"Huang",
"Yue",
""
],
[
"Ma",
"Xiang",
""
],
[
"Zhang",
"Liang",
""
],
[
"Qu",
"Jinlu",
""
],
[
"Xu",
"Yanjun",
""
],
[
"Zhang",
"Shu",
""
],
[
"Yin",
"Qianqing",
""
],
[
"Shui",
"Qingcang",
""
],
[
"Ma",
"Ruican",
""
],
[
"Zhao",
"Shujie",
""
],
[
"Li",
"Panping",
""
],
[
"Yang",
"Zixu",
""
],
[
"Liu",
"Hexin",
""
],
[
"WeiYu",
"",
""
]
] |
2401.08971 | Ilyse Clark | Ilyse Clark, Danielle A. Berg, Claus Leitherer, Karla Z.
Arellano-Cordova, Andreas A. C. Sander | Aperture and Resolution Effects on Ultraviolet Star-Forming Properties:
Insights from Local Galaxies and Implications for High-Redshift Observations | This paper has 31 pages total, 11 figures, and a figureset. Accepted
for publication in ApJ | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | We present an analysis of the effects of spectral resolution and aperture
scales on derived galaxy properties using far-ultraviolet (FUV) spectra of
local star-forming galaxies from the International Ultraviolet Explorer (R~250,
FOV~10"x20") and Cosmic Origins Spectrograph on the Hubble Space Telescope
(R~15,000, FOV~2.5"). Using these spectra, we measured FUV luminosities,
spectral slopes, dust attenuation, and equivalent widths. We find that galaxies
with one dominant stellar cluster have FUV properties that are independent of
aperture size, while galaxies with multiple bright clusters are sensitive to
the total light fraction captured by the aperture. Additionally, we find
significant correlations between the strength of stellar and interstellar
absorption-lines and metallicity, indicating metallicity-dependent line-driven
stellar winds and interstellar macroscopic gas flows shape the stellar and
interstellar spectral lines, respectively. The observed line-strength versus
metallicity relation of stellar-wind lines agrees with the prediction of
population synthesis models for young starbursts. In particular, measurements
of the strong stellar CIV 1548,1550 line provide an opportunity to determine
stellar abundances as a complement to gas-phase abundances. We provide a
relation between the equivalent width of the CIV line and the oxygen abundance
of the galaxy. We discuss this relation in terms of the stellar-wind properties
of massive stars. As the driving lines in stellar winds are mostly ionized iron
species, the CIV line may eventually offer a method to probe
alpha-element-to-iron ratios in star-forming galaxies once consistent models
with non-solar abundance ratios are available. These results have important
implications for the galaxy-scale, low-resolution observations of high-redshift
galaxies from JWST (R~100-3,500).
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:46:39 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Clark",
"Ilyse",
""
],
[
"Berg",
"Danielle A.",
""
],
[
"Leitherer",
"Claus",
""
],
[
"Arellano-Cordova",
"Karla Z.",
""
],
[
"Sander",
"Andreas A. C.",
""
]
] |
2401.08972 | Yufeng Yin | Yufeng Yin, Ishwarya Ananthabhotla, Vamsi Krishna Ithapu, Stavros
Petridis, Yu-Hsiang Wu, Christi Miller | Hearing Loss Detection from Facial Expressions in One-on-one
Conversations | Accepted by ICASSP 2024 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Individuals with impaired hearing experience difficulty in conversations,
especially in noisy environments. This difficulty often manifests as a change
in behavior and may be captured via facial expressions, such as the expression
of discomfort or fatigue. In this work, we build on this idea and introduce the
problem of detecting hearing loss from an individual's facial expressions
during a conversation. Building machine learning models that can represent
hearing-related facial expression changes is a challenge. In addition, models
need to disentangle spurious age-related correlations from hearing-driven
expressions. To this end, we propose a self-supervised pre-training strategy
tailored for the modeling of expression variations. We also use adversarial
representation learning to mitigate the age bias. We evaluate our approach on a
large-scale egocentric dataset with real-world conversational scenarios
involving subjects with hearing loss and show that our method for hearing loss
detection achieves superior performance over baselines.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:52:32 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Yin",
"Yufeng",
""
],
[
"Ananthabhotla",
"Ishwarya",
""
],
[
"Ithapu",
"Vamsi Krishna",
""
],
[
"Petridis",
"Stavros",
""
],
[
"Wu",
"Yu-Hsiang",
""
],
[
"Miller",
"Christi",
""
]
] |
2401.08973 | Aditya Sharma | Aditya Sharma, Luke Yoffe, Tobias H\"ollerer | OCTO+: A Suite for Automatic Open-Vocabulary Object Placement in Mixed
Reality | 2024 IEEE International Conference on Artificial Intelligence and
eXtended and Virtual Reality (AIXVR) | null | null | null | cs.CV cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One key challenge in Augmented Reality is the placement of virtual content in
natural locations. Most existing automated techniques can only work with a
closed-vocabulary, fixed set of objects. In this paper, we introduce and
evaluate several methods for automatic object placement using recent advances
in open-vocabulary vision-language models. Through a multifaceted evaluation,
we identify a new state-of-the-art method, OCTO+. We also introduce a benchmark
for automatically evaluating the placement of virtual objects in augmented
reality, alleviating the need for costly user studies. Through this, in
addition to human evaluations, we find that OCTO+ places objects in a valid
region over 70% of the time, outperforming other methods on a range of metrics.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:52:40 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Sharma",
"Aditya",
""
],
[
"Yoffe",
"Luke",
""
],
[
"Höllerer",
"Tobias",
""
]
] |
2401.08974 | Lipeng Zhu | Lipeng Zhu, Wenyan Ma, Zhenyu Xiao, and Rui Zhang | Performance Analysis and Optimization for Movable Antenna Aided Wideband
Communications | null | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Movable antenna (MA) has emerged as a promising technology to enhance
wireless communication performance by enabling the local movement of antennas
at the transmitter (Tx) and/or receiver (Rx) for achieving more favorable
channel conditions. As the existing studies on MA-aided wireless communications
have mainly considered narrow-band transmission in flat fading channels, we
investigate in this paper the MA-aided wideband communications employing
orthogonal frequency division multiplexing (OFDM) in frequency-selective fading
channels. Under the general multi-tap field-response channel model, the
wireless channel variations in both space and frequency are characterized with
different positions of the MAs. Unlike the narrow-band transmission where the
optimal MA position at the Tx/Rx simply maximizes the single-tap channel
amplitude, the MA position in the wideband case needs to balance the amplitudes
and phases over multiple channel taps in order to maximize the OFDM
transmission rate over multiple frequency subcarriers. First, we derive an
upper bound on the OFDM achievable rate in closed form when the size of the
Tx/Rx region for antenna movement is arbitrarily large. Next, we develop a
parallel greedy ascent (PGA) algorithm to obtain locally optimal solutions to
the MAs' positions for OFDM rate maximization subject to finite-size Tx/Rx
regions. To reduce computational complexity, a simplified PGA algorithm is also
provided to optimize the MAs' positions more efficiently. Simulation results
demonstrate that the proposed PGA algorithms can approach the OFDM rate upper
bound closely with the increase of Tx/Rx region sizes and outperform
conventional systems with fixed-position antennas (FPAs) under the wideband
channel setup.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 04:54:47 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Zhu",
"Lipeng",
""
],
[
"Ma",
"Wenyan",
""
],
[
"Xiao",
"Zhenyu",
""
],
[
"Zhang",
"Rui",
""
]
] |
2401.08975 | Seungyeon Oh | Seungyeon Oh and Hoyoung Park | Nonparametric Mean and Variance Adaptive Classification Rule for
High-Dimensional Data with Heteroscedastic Variances | 25 pages and 7 figures | null | null | null | stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, we introduce an innovative methodology aimed at enhancing
Fisher's Linear Discriminant Analysis (LDA) in the context of high-dimensional
data classification scenarios, specifically addressing situations where each
feature exhibits distinct variances. Our approach leverages Nonparametric
Maximum Likelihood Estimation (NPMLE) techniques to estimate both the mean and
variance parameters. By accommodating varying variances among features, our
proposed method leads to notable improvements in classification performance. In
particular, unlike numerous prior studies that assume the distribution of
heterogeneous variances follows a right-skewed inverse gamma distribution, our
proposed method demonstrates excellent performance even when the distribution
of heterogeneous variances takes on left-skewed, symmetric, or right-skewed
forms. We conducted a series of rigorous experiments to empirically validate
the effectiveness of our approach. The results of these experiments demonstrate
that our proposed methodology excels in accurately classifying high-dimensional
data characterized by heterogeneous variances.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:00:52 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Oh",
"Seungyeon",
""
],
[
"Park",
"Hoyoung",
""
]
] |
2401.08976 | Qiang Zhou | Chen Qi, Yang Jingjing, Huang Ming, Zhou Qiang | ACT-GAN: Radio map construction based on generative adversarial networks
with ACT blocks | 11 pages, 10 figures | null | null | null | cs.LG eess.SP | http://creativecommons.org/licenses/by/4.0/ | The radio map, serving as a visual representation of electromagnetic spatial
characteristics, plays a pivotal role in assessment of wireless communication
networks and radio monitoring coverage. Addressing the issue of low accuracy
existing in the current radio map construction, this paper presents a novel
radio map construction method based on generative adversarial network (GAN) in
which the Aggregated Contextual-Transformation (AOT) block, Convolutional Block
Attention Module (CBAM), and Transposed Convolution (T-Conv) block are applied
to the generator, and we name it as ACT-GAN. It significantly improves the
reconstruction accuracy and local texture of the radio maps. The performance of
ACT-GAN across three different scenarios is demonstrated. Experiment results
reveal that in the scenario without sparse discrete observations, the proposed
method reduces the root mean square error (RMSE) by 14.6% in comparison to the
state-of-the-art models. In the scenario with sparse discrete observations, the
RMSE is diminished by 13.2%. Furthermore, the predictive results of the
proposed model show a more lucid representation of electromagnetic spatial
field distribution. To verify the universality of this model in radio map
construction tasks, the scenario of unknown radio emission source is
investigated. The results indicate that the proposed model is robust radio map
construction and accurate in predicting the location of the emission source.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:03:53 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Qi",
"Chen",
""
],
[
"Jingjing",
"Yang",
""
],
[
"Ming",
"Huang",
""
],
[
"Qiang",
"Zhou",
""
]
] |
2401.08977 | Zikai Xiao | Zikai Xiao, Zihan Chen, Liyinglan Liu, Yang Feng, Jian Wu, Wanlu Liu,
Joey Tianyi Zhou, Howard Hao Yang, Zuozhu Liu | FedLoGe: Joint Local and Generic Federated Learning under Long-tailed
Data | Accepted by ICLR 2024 | null | null | null | cs.LG cs.AI | http://creativecommons.org/publicdomain/zero/1.0/ | Federated Long-Tailed Learning (Fed-LT), a paradigm wherein data collected
from decentralized local clients manifests a globally prevalent long-tailed
distribution, has garnered considerable attention in recent times. In the
context of Fed-LT, existing works have predominantly centered on addressing the
data imbalance issue to enhance the efficacy of the generic global model while
neglecting the performance at the local level. In contrast, conventional
Personalized Federated Learning (pFL) techniques are primarily devised to
optimize personalized local models under the presumption of a balanced global
data distribution. This paper introduces an approach termed Federated Local and
Generic Model Training in Fed-LT (FedLoGe), which enhances both local and
generic model performance through the integration of representation learning
and classifier alignment within a neural collapse framework. Our investigation
reveals the feasibility of employing a shared backbone as a foundational
framework for capturing overarching global trends, while concurrently employing
individualized classifiers to encapsulate distinct refinements stemming from
each client's local features. Building upon this discovery, we establish the
Static Sparse Equiangular Tight Frame Classifier (SSE-C), inspired by neural
collapse principles that naturally prune extraneous noisy features and foster
the acquisition of potent data representations. Furthermore, leveraging
insights from imbalance neural collapse's classifier norm patterns, we develop
Global and Local Adaptive Feature Realignment (GLA-FR) via an auxiliary global
classifier and personalized Euclidean norm transfer to align global features
with client preferences. Extensive experimental results on CIFAR-10/100-LT,
ImageNet, and iNaturalist demonstrate the advantage of our method over
state-of-the-art pFL and Fed-LT approaches.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:04:33 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Xiao",
"Zikai",
""
],
[
"Chen",
"Zihan",
""
],
[
"Liu",
"Liyinglan",
""
],
[
"Feng",
"Yang",
""
],
[
"Wu",
"Jian",
""
],
[
"Liu",
"Wanlu",
""
],
[
"Zhou",
"Joey Tianyi",
""
],
[
"Yang",
"Howard Hao",
""
],
[
"Liu",
"Zuozhu",
""
]
] |
2401.08978 | Debarghya Mukherjee | Nabarun Deb and Debarghya Mukherjee | Trade-off Between Dependence and Complexity for Nonparametric Learning
-- an Empirical Process Approach | 94 pages, 1 figure | null | null | null | math.ST stat.ML stat.TH | http://creativecommons.org/licenses/by/4.0/ | Empirical process theory for i.i.d. observations has emerged as a ubiquitous
tool for understanding the generalization properties of various statistical
problems. However, in many applications where the data exhibit temporal
dependencies (e.g., in finance, medical imaging, weather forecasting etc.), the
corresponding empirical processes are much less understood. Motivated by this
observation, we present a general bound on the expected supremum of empirical
processes under standard $\beta/\rho$-mixing assumptions. Unlike most prior
work, our results cover both the long and the short-range regimes of
dependence. Our main result shows that a non-trivial trade-off between the
complexity of the underlying function class and the dependence among the
observations characterizes the learning rate in a large class of nonparametric
problems. This trade-off reveals a new phenomenon, namely that even under
long-range dependence, it is possible to attain the same rates as in the i.i.d.
setting, provided the underlying function class is complex enough. We
demonstrate the practical implications of our findings by analyzing various
statistical estimators in both fixed and growing dimensions. Our main examples
include a comprehensive case study of generalization error bounds in
nonparametric regression over smoothness classes in fixed as well as growing
dimension using neural nets, shape-restricted multivariate convex regression,
estimating the optimal transport (Wasserstein) distance between two probability
distributions, and classification under the Mammen-Tsybakov margin condition --
all under appropriate mixing assumptions. In the process, we also develop
bounds on $L_r$ ($1\le r\le 2$)-localized empirical processes with dependent
observations, which we then leverage to get faster rates for (a) tuning-free
adaptation, and (b) set-structured learning problems.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:08:37 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Deb",
"Nabarun",
""
],
[
"Mukherjee",
"Debarghya",
""
]
] |
2401.08979 | Dimitrios Skiathas | Dimitrios Skiathas, Konstantinos N. Gourgouliatos | Combined magnetic field evolution in neutron star cores and crusts:
Ambipolar diffusion, Hall effect and Ohmic dissipation | 11 pages, 8 figures, accepted by MNRAS | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neutron star magnetic field evolution is mediated through the Hall effect and
Ohmic dissipation in the crust while ambipolar diffusion is taking place in the
core. These effects have been studied in detail in either part of the star,
however, their combined, simultaneous evolution and interplay has not been
explored in detail yet. Here, we present simulation results of the simultaneous
evolution of the magnetic field in the core due to ambipolar diffusion and the
crust due to Hall effect and Ohmic decay, under the assumption of axial
symmetry. We find that a purely poloidal field generates a toroidal field in
the crust, due to the Hall effect, that sinks into the core. A purely toroidal
field remains toroidal and spreads into the core and the crust. Finally, for a
mixed poloidal-toroidal field, the north-south symmetry is broken due to the
Hall effect in the crust, however, ambipolar diffusion, tends to restore it. We
examine the role of ambipolar diffusion to the magnetic field decay and we
compare the rate of the conversion of magnetic field energy into heat, finding
that it enhances the magnetic field decay in neutron stars.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:09:45 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Skiathas",
"Dimitrios",
""
],
[
"Gourgouliatos",
"Konstantinos N.",
""
]
] |
2401.08980 | Runze Chi | Runze Chi, Josephine J. Yu, Chaitanya Murthy and T. Xiang | Luttinger Liquid phase in the Aubry-Andr\'e Hubbard chain | null | null | null | null | cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the interplay between an on-site Hubbard repulsion and quasiperiodic
potential in one-dimensional fermion chains using the density matrix
renormalization group. We find that, at half-filling, the quasiperiodic
potential can destroy the Mott gap, leading to a metallic Luttinger liquid
phase between the gapped Mott insulator at strong repulsion and localized
gapless Aubry- Andr\'e insulator at strong quasiperiodic potential. Away from
half-filing, the metallic phase of the interacting model persists to larger
critical strengths of the potential than in the non-interacting case,
suggesting interaction-stabilized delocalization at finite doping. We
characterize the Luttinger liquid through its charge and spin correlations,
structure factors, and entanglement entropy.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:18:51 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Chi",
"Runze",
""
],
[
"Yu",
"Josephine J.",
""
],
[
"Murthy",
"Chaitanya",
""
],
[
"Xiang",
"T.",
""
]
] |
2401.08981 | Zongliang Du | Zongliang Dua, Xinyu Ma, Wenyu Hao, Yuan Liang, Xiaoyu Zhang, Hongzhi
Luo and Xu Guo | Real-time generative design of diverse, "truly" optimized structures
with controllable structural complexities | null | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compared with traditional design methods, generative design significantly
attracts engineers in various disciplines. In thiswork, howto achieve the
real-time generative design of optimized structures with various diversities
and controllable structural complexities is investigated. To this end, a
modified Moving Morphable Component (MMC) method together with novel strategies
are adopted to generate high-quality dataset. The complexity level of optimized
structures is categorized by the topological invariant. By improving the cost
function, the WGAN is trained to produce optimized designs with the input of
loading position and complexity level in real time. It is found that, diverse
designs with a clear load transmission path and crisp boundary, even not
requiring further optimization and different from any reference in the dataset,
can be generated by the proposed model. This method holds great potential for
future applications of machine learning enhanced intelligent design.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:25:34 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Dua",
"Zongliang",
""
],
[
"Ma",
"Xinyu",
""
],
[
"Hao",
"Wenyu",
""
],
[
"Liang",
"Yuan",
""
],
[
"Zhang",
"Xiaoyu",
""
],
[
"Luo",
"Hongzhi",
""
],
[
"Guo",
"Xu",
""
]
] |
2401.08982 | Wan Shou | Nahid Tushar, Rencheng Wu, Yu She, Wenchao Zhou, Wan Shou | Robot Tape Manipulation for 3D Printing | null | null | null | null | cs.RO cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 3D printing has enabled various applications using different forms of
materials, such as filaments, sheets, and inks. Typically, during 3D printing,
feedstocks are transformed into discrete building blocks and placed or
deposited in a designated location similar to the manipulation and assembly of
discrete objects. However, 3D printing of continuous and flexible tape (with
the geometry between filaments and sheets) without breaking or transformation
remains underexplored and challenging. Here, we report the design and
implementation of a customized end-effector, i.e., tape print module (TPM), to
realize robot tape manipulation for 3D printing by leveraging the tension
formed on the tape between two endpoints. We showcase the feasibility of
manufacturing representative 2D and 3D structures while utilizing conductive
copper tape for various electronic applications, such as circuits and sensors.
We believe this manipulation strategy could unlock the potential of other tape
materials for manufacturing, including packaging tape and carbon fiber prepreg
tape, and inspire new mechanisms for robot manipulation, 3D printing, and
packaging.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:26:30 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Tushar",
"Nahid",
""
],
[
"Wu",
"Rencheng",
""
],
[
"She",
"Yu",
""
],
[
"Zhou",
"Wenchao",
""
],
[
"Shou",
"Wan",
""
]
] |
2401.08983 | Gururaj Kadiri Dr | Gururaj Kadiri | Scouring Parrondo's Paradox in Discrete-Time Quantum Walks | 19 pages, 8 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We propose a quantum game based on coin-based quantum walks. Given a quantum
walk and a Hermitian operator on the coin-position composite space, winning
this game involves choosing an initial coin state such that the given quantum
walk leads to a composite state in which the expectation value of the given
Hermitian operator is greater than a certain value. Parrondo's paradox is a
phenomenon where a combination of losing strategies becomes a winning strategy.
We give a deterministic scheme for identifying Parrondo's paradox in our game,
in the sense that, given a collection of distinct quantum steps, we identify
initial coin states which happen to be losing states for all quantum walks
comprising solely of these steps individually, but turn out to be winning
states for a quantum walk comprising of all the given steps taken in a
sequence. Unlike traditional quantum steps that allow for equal magnitude
forward and backward strides based on the outcome of the coin-toss, the steps
of the quantum walks employed here, though still contingent upon coin-toss,
permit the strides to be of unequal magnitude, and not necessarily in opposite
directions. We believe the results presented here will contribute to a deeper
understanding of evolution of expectation values of observables in quantum
walks, and facilitate the development of novel quantum algorithms.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:31:02 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Kadiri",
"Gururaj",
""
]
] |
2401.08984 | Xiaolin Chen | Xiaolin Chen, Daoguang Zan, Wei Li, Bei Guan, Yongji Wang | A GAN-based data poisoning framework against anomaly detection in
vertical federated learning | 6 pages, 7 figures. This work has been submitted to the IEEE for
possible publication. Copyright may be transferred without notice, after
which this version may no longer be accessible | null | null | null | cs.LG cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In vertical federated learning (VFL), commercial entities collaboratively
train a model while preserving data privacy. However, a malicious participant's
poisoning attack may degrade the performance of this collaborative model. The
main challenge in achieving the poisoning attack is the absence of access to
the server-side top model, leaving the malicious participant without a clear
target model. To address this challenge, we introduce an innovative end-to-end
poisoning framework P-GAN. Specifically, the malicious participant initially
employs semi-supervised learning to train a surrogate target model.
Subsequently, this participant employs a GAN-based method to produce
adversarial perturbations to degrade the surrogate target model's performance.
Finally, the generator is obtained and tailored for VFL poisoning. Besides, we
develop an anomaly detection algorithm based on a deep auto-encoder (DAE),
offering a robust defense mechanism to VFL scenarios. Through extensive
experiments, we evaluate the efficacy of P-GAN and DAE, and further analyze the
factors that influence their performance.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:31:08 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Chen",
"Xiaolin",
""
],
[
"Zan",
"Daoguang",
""
],
[
"Li",
"Wei",
""
],
[
"Guan",
"Bei",
""
],
[
"Wang",
"Yongji",
""
]
] |
2401.08985 | Kuo-Chuan Pan | Hao-Sheng Wang, Kuo-Chuan Pan | The Influence of Stellar Rotation in Binary Systems on Core-Collapse
Supernova Progenitors and Multi-messenger Signals | 19 pages, 16 figures, accepted by ApJ | null | null | null | astro-ph.HE astro-ph.SR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The detailed structure of core-collapse supernova progenitors is crucial for
studying supernova explosion engines and the corresponding multimessenger
signals. In this paper, we investigate the influence of stellar rotation on
binary systems consisting of a 30 solar mass donor star and a 20 solar mass
accretor using the MESA stellar evolution code. We find that through mass
transfer in binary systems, fast-rotating red- and blue-supergiant progenitors
can be formed within a certain range of initial orbital periods, albeit the
correlation is not linear. We also find that even with the same initial mass
ratio of the binary system, the resulting final masses of the collapsars, the
iron core masses, the compactness parameters, and the final rotational rates
can vary widely and are sensitive to the initial orbital periods. For instance,
the progenitors with strong convection form a thinner Si-shell and a wider
O-shell compared to those in single-star systems. In addition, we conduct
two-dimensional self-consistent core-collapse supernova simulations with
neutrino transport for these rotating progenitors derived from binary stellar
evolution. We find that the neutrino and gravitational-wave signatures of these
binary progenitors could exhibit significant variations. Progenitors with
larger compactness parameters produce more massive proto-neutron stars, have
higher mass-accretion rates, and emit brighter neutrino luminosity and louder
gravitational emissions. Finally, we observe stellar-mass black hole formation
in some of our failed exploding models.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:34:53 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Wang",
"Hao-Sheng",
""
],
[
"Pan",
"Kuo-Chuan",
""
]
] |
2401.08986 | Ziyang Yu | Ziyang Yu, Wenbing Huang, Yang Liu | Rigid Protein-Protein Docking via Equivariant Elliptic-Paraboloid
Interface Prediction | ICLR 2024 | null | null | null | cs.LG q-bio.BM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The study of rigid protein-protein docking plays an essential role in a
variety of tasks such as drug design and protein engineering. Recently, several
learning-based methods have been proposed for the task, exhibiting much faster
docking speed than those computational methods. In this paper, we propose a
novel learning-based method called ElliDock, which predicts an elliptic
paraboloid to represent the protein-protein docking interface. To be specific,
our model estimates elliptic paraboloid interfaces for the two input proteins
respectively, and obtains the roto-translation transformation for docking by
making two interfaces coincide. By its design, ElliDock is independently
equivariant with respect to arbitrary rotations/translations of the proteins,
which is an indispensable property to ensure the generalization of the docking
process. Experimental evaluations show that ElliDock achieves the fastest
inference time among all compared methods and is strongly competitive with
current state-of-the-art learning-based models such as DiffDock-PP and Multimer
particularly for antibody-antigen docking.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:39:03 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Yu",
"Ziyang",
""
],
[
"Huang",
"Wenbing",
""
],
[
"Liu",
"Yang",
""
]
] |
2401.08987 | Neha Sharma | Neha Sharma and Vikas Saxena | The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication | null | null | null | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum cryptography is the study of delivering secret communications across
a quantum channel. Recently, Quantum Key Distribution (QKD) has been recognized
as the most important breakthrough in quantum cryptography. This process
facilitates two distant parties to share secure communications based on
physical laws. The BB84 protocol was developed in 1984 and remains the most
widely used among BB92, Ekert91, COW, and SARG04 protocols. However the
practical security of QKD with imperfect devices have been widely discussed,
and there are many ways to guarantee that generated key by QKD still provides
unconditional security. This paper proposed a novel method that allows users to
communicate while generating the secure keys as well as securing the
transmission without any leakage of the data. In this approach sender will
never reveal her basis, hence neither the receiver nor the intruder will get
knowledge of the fundamental basis.Further to detect Eve, polynomial
interpolation is also used as a key verification technique. In order to fully
utilize the quantum computing capabilities provided by IBM quantum computers,
the protocol is executed using the Qiskit backend for 45 qubits. This article
discusses a plot of % error against alpha (strength of eavesdropping). As a
result, different types of noise have been included, and the success
probability of the desired key bits has been determined. Furthermore, the
success probability under depolarizing noise is explained for different qubit
counts.Last but not least, even when the applied noise is increased to maximum
capacity, a 50% probability of successful key generation is still observed in
an experiment.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:41:17 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Sharma",
"Neha",
""
],
[
"Saxena",
"Vikas",
""
]
] |
2401.08988 | Varul Srivastava | Varul Srivastava and Sujit Gujar | DECENT-BRM: Decentralization through Block Reward Mechanisms | null | null | null | null | cs.GT | http://creativecommons.org/licenses/by/4.0/ | Proof-of-Work is a consensus algorithm where miners solve cryptographic
puzzles to mine blocks and obtain a reward through some Block Reward Mechanism
(BRM). PoW blockchain faces the problem of centralization due to the formation
of mining pools, where miners mine blocks as a group and distribute rewards.
The rationale is to reduce the risk (variance) in reward while obtaining the
same expected block reward. In this work, we address the problem of
centralization due to mining pools in PoW blockchain. We propose a two-player
game between the new miner joining the system and the PoW blockchain system.
We model the utility for the incoming miner as a combination of (i) expected
block reward, (ii) risk, and (iii) cost of switching between different mining
pools. With this utility structure, we analyze the equilibrium strategy of the
incoming miner for different BRMs: (a) memoryless -- block reward is history
independent (e.g., Bitcoin) (b) retentive: block reward is history-dependent
(e.g., Fruitchains). For memoryless BRMs, we show that depending on the
coefficient of switching cost $c$, the protocol is decentralized when $c = 0$
and centralized when $c > \underline{c}$. In addition, we show the
impossibility of constructing a memoryless BRM where solo mining gives a higher
payoff than forming/joining mining pools. While retentive BRM in Fruitchains
reduces risk in solo mining, the equilibrium strategy for incoming miners is
still to join mining pools, leading to centralization. We then propose our
novel retentive BRM -- \textsf{Decent-BRM}. We show that under
\textsf{Decent-BRM}, incoming miners obtain higher utility in solo mining than
joining mining pools. Therefore, no mining pools are formed, and the Pow
blockchain using \textsf{Decent-BRM} is decentralized.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:43:02 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Srivastava",
"Varul",
""
],
[
"Gujar",
"Sujit",
""
]
] |
2401.08989 | Arul Mazumder | Arul Mazumder and Sridhar Tayur | Five Starter Problems: Solving Quadratic Unconstrained Binary
Optimization Models on Quantum Computers | 25 pages, 34 Figures | null | null | null | quant-ph math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several articles and books adequately cover quantum computing concepts, such
as gate/circuit model (and Quantum Approximate Optimization Algorithm, QAOA),
Adiabatic Quantum Computing (AQC), and Quantum Annealing (QA). However, they
typically stop short of accessing quantum hardware and solve numerical problem
instances. This tutorial offers a quick hands-on introduction to solving
Quadratic Unconstrained Binary Optimization (QUBO) problems on currently
available quantum computers. We cover both IBM and D-Wave machines: IBM
utilizes a gate/circuit architecture, and D-Wave is a quantum annealer. We
provide examples of three canonical problems (Number Partitioning, Max-Cut,
Minimum Vertex Cover), and two models from practical applications (from cancer
genomics and a hedge fund portfolio manager, respectively). An associated
GitHub repository provides the codes in five companion notebooks. Catering to
undergraduate and graduate students in computationally intensive disciplines,
this article also aims to reach working industry professionals seeking to
explore the potential of near-term quantum applications.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:47:42 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Mazumder",
"Arul",
""
],
[
"Tayur",
"Sridhar",
""
]
] |
2401.08990 | Evan Patterson | Evan Patterson | Products in double categories, revisited | 52 pages | null | null | null | math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Products in double categories, as found in cartesian double categories, are
an elegant concept with numerous applications, yet also have a few puzzling
aspects. In this paper, we revisit double-categorical products from an unbiased
perspective, following up an original idea by Par\'e to employ a
double-categorical analogue of the family construction, or free product
completion. Defined in this way, double categories with finite products are
strictly more expressive than cartesian double categories, while being governed
by a single universal property that is no more difficult to work with. We
develop the basic theory and examples of such products and, by duality, of
coproducts in double categories. As an application, we introduce finite-product
double theories, a categorification of finite-product theories that extends
recent work by Lambert and the author on cartesian double theories, and we
construct the virtual double category of models of a finite-product double
theory.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:53:40 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Patterson",
"Evan",
""
]
] |
2401.08991 | John O'Connor | Andrew Ajemian and John Knight and Tommy Nguyen and John O'Connor | Knight Watch: Ubiquitous Computing Enhancements To Sleep Quality With
Acoustic Analysis | 6 Pages, 3 Figures | null | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This project introduces a wearable, non-intrusive device for snoring
detection and remediation, designed to be placed under or alongside a pillow.
The device uses sensors and machine learning algorithms to detect snoring and
employs gentle vibrations to prompt positional changes, thereby reducing
snoring episodes. The device is capable of connecting via an API to a
cloud-based platform for the analysis of snoring sleep patterns and
environmental context. The paper details the development from concept to
prototype, emphasizing the technical challenges, solutions, and alignment with
ubiquitous computing in sleep quality improvement.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 05:58:25 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Ajemian",
"Andrew",
""
],
[
"Knight",
"John",
""
],
[
"Nguyen",
"Tommy",
""
],
[
"O'Connor",
"John",
""
]
] |
2401.08992 | Junwen Bai | Junwen Bai, Bo Li, Qiujia Li, Tara N. Sainath, Trevor Strohman | Efficient Adapter Finetuning for Tail Languages in Streaming
Multilingual ASR | Accepted to ICASSP 2024 | null | null | null | cs.CL cs.LG cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The end-to-end ASR model is often desired in the streaming multilingual
scenario since it is easier to deploy and can benefit from pre-trained speech
models such as powerful foundation models. Meanwhile, the heterogeneous nature
and imbalanced data abundance of different languages may cause performance
degradation, leading to asynchronous peak performance for different languages
during training, especially on tail ones. Sometimes even the data itself may
become unavailable as a result of the enhanced privacy protection. Existing
work tend to significantly increase the model size or learn language-specific
decoders to accommodate each language separately. In this study, we explore
simple yet effective Language-Dependent Adapter (LDA) finetuning under a
cascaded Conformer transducer framework enhanced by teacher pseudo-labeling for
tail languages in the streaming multilingual ASR. The adapter only accounts for
0.4% of the full model per language. It is plugged into the frozen foundation
model and is the only trainable module during the finetuning process with noisy
student training. The final model merges the adapter parameters from different
checkpoints for different languages. The model performance is validated on a
challenging multilingual dictation dataset, which includes 39 tail languages
across Latin, Greek, Arabic, etc. Our proposed method brings 12.2% word error
rate reduction on average and up to 37.5% on a single locale. Furthermore, we
show that our parameter-efficient LDA can match the quality of the full model
finetuning, thus greatly alleviating the asynchronous peak performance issue.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:01:16 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Bai",
"Junwen",
""
],
[
"Li",
"Bo",
""
],
[
"Li",
"Qiujia",
""
],
[
"Sainath",
"Tara N.",
""
],
[
"Strohman",
"Trevor",
""
]
] |
2401.08993 | Gianluca Demartini | Hrishikesh Patel, Tianwa Chen, Ivano Bongiovanni, Gianluca Demartini | Estimating Gender Completeness in Wikipedia | null | null | null | null | cs.CY cs.IR | http://creativecommons.org/licenses/by/4.0/ | Gender imbalance in Wikipedia content is a known challenge which the editor
community is actively addressing. The aim of this paper is to provide the
Wikipedia community with instruments to estimate the magnitude of the problem
for different entity types (also known as classes) in Wikipedia. To this end,
we apply class completeness estimation methods based on the gender attribute.
Our results show not only which gender for different sub-classes of Person is
more prevalent in Wikipedia, but also an idea of how complete the coverage is
for difference genders and sub-classes of Person.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:03:31 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Patel",
"Hrishikesh",
""
],
[
"Chen",
"Tianwa",
""
],
[
"Bongiovanni",
"Ivano",
""
],
[
"Demartini",
"Gianluca",
""
]
] |
2401.08994 | Jiaying Liu | Jiaying Liu, Yan Zhang | Understanding and Facilitating Mental Health Help-Seeking of Young
Adults: A Socio-technical Ecosystem Framework | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Prior research on young adults' mental health help-seeking mostly focuses on
one particular resource such as a mobile app or digital platform, paying less
attention to their lived experiences interacting with the ecosystem of
resources. We conducted in-depth interviews with 18 participants about their
help-seeking and non-help-seeking experiences. Guided by Social Ecological
Theory, we proposed a Socio-technical Ecosystem Framework for mental health
care, consisting of four levels of resources, including technological-,
interpersonal-, community-, and societal level resources. Using this framework,
we identified two types of support systems for help-seeking, single-resource
support system and multi-resource support system. These resources support young
adults' help-seeking via three mechanisms, \textit{care-giving},
\textit{care-mediating}, and \textit{care-outreaching}, forming various
pathways to care. We then pointed out the barriers to resource use at each
level and the general challenges in finding a support system. Our findings
contributed to a conceptual framework to categorize mental health care. It also
serves as a practical framework to identify challenges in the pathways to care
and discover design implications.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:09:05 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Liu",
"Jiaying",
""
],
[
"Zhang",
"Yan",
""
]
] |
2401.08995 | Zongliang Du | Yibo Jia, Wen Meng, Zongliang Du, Chang Liu, Shanwei Li, Conglei Wang,
Zhifu Ge, Ruiyi Su, Xu Guo | Explicit design optimization of air rudders for maximizing stiffness and
fundamental frequency | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In aerospace engineering, there is a growing demand for lightweight design
through topology optimization. This paper presents a novel design optimization
method for stiffened air rudders, commonly used for aircraft attitude control,
based on the Moving Morphable Components (MMC) method. The stiffeners within
the irregular enclosed design domain are modeled as MMCs and discretized by
shell elements, accurately capturing their geometry and evolution during
optimization process using explicit parameters. In order to maximize the
stiffness and fundamental frequency of the rudder structures, numerical
analysis algorithms were developed with shape sensitivity analysis conducted.
To comply with the manufacturing requirement, a minimum thickness is prescribed
for the stiffeners. Penalty strategies were developed for the thickness and
density of stiffeners with thickness smaller than the threshold to meet the
thickness requirement and suppress spurious modes. The method's effectiveness
was demonstrated through optimization examples of two typical air rudders,
illustrating the significance of stiffener's distribution on design objectives.
The explicit modeling characteristics allow for directly importing the
optimization results into CAD systems, significantly enhancing the engineering
applicability.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:09:33 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Jia",
"Yibo",
""
],
[
"Meng",
"Wen",
""
],
[
"Du",
"Zongliang",
""
],
[
"Liu",
"Chang",
""
],
[
"Li",
"Shanwei",
""
],
[
"Wang",
"Conglei",
""
],
[
"Ge",
"Zhifu",
""
],
[
"Su",
"Ruiyi",
""
],
[
"Guo",
"Xu",
""
]
] |
2401.08996 | Ye Qiao | Ye Qiao, Haocheng Xu, Yifan Zhang, Sitao Huang | MicroNAS: Zero-Shot Neural Architecture Search for MCUs | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural Architecture Search (NAS) effectively discovers new Convolutional
Neural Network (CNN) architectures, particularly for accuracy optimization.
However, prior approaches often require resource-intensive training on super
networks or extensive architecture evaluations, limiting practical
applications. To address these challenges, we propose MicroNAS, a
hardware-aware zero-shot NAS framework designed for microcontroller units
(MCUs) in edge computing. MicroNAS considers target hardware optimality during
the search, utilizing specialized performance indicators to identify optimal
neural architectures without high computational costs. Compared to previous
works, MicroNAS achieves up to 1104x improvement in search efficiency and
discovers models with over 3.23x faster MCU inference while maintaining similar
accuracy
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:17:42 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Qiao",
"Ye",
""
],
[
"Xu",
"Haocheng",
""
],
[
"Zhang",
"Yifan",
""
],
[
"Huang",
"Sitao",
""
]
] |
2401.08997 | David Broadhurst | David Broadhurst | Five families of rapidly convergent evaluations of zeta values | 13 pages | null | null | null | math.NT hep-th | http://creativecommons.org/licenses/by-sa/4.0/ | This work derives 5 methods to evaluate families of odd zeta values by
combining a power of $\pi$ with Lambert series whose ratios of successive terms
tend to $e^{-\pi\sqrt{a}}$ with integer $a>4$. Families with $a=7$ and $a=8$
evaluate $\zeta(2n+1)$. Families with $a=9$ and $a=16$ evaluate $\zeta(4n+1)$
with faster convergence. A fifth family with $a=12$ evaluates $\zeta(6n+1)$ and
hence gives the fastest convergence for $\zeta(12n+7)$. Members of three of the
5 families were discovered empirically by Simon Plouffe. An intensive new
search identified two more families and strongly suggests that there are no
more than 5 such families. Quasi-modular transformations of Lambert series are
used to resolve intriguing rational sequences that were discovered empirically.
Expansions of Lambert series in terms of polylogarithms, familiar from quantum
field theory, yield identities that provide proofs for the 5 families.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:21:22 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Broadhurst",
"David",
""
]
] |
2401.08998 | Yoonhwa Jung | Yoonhwa Jung and Ikhyun Cho and Shun-Hsiang Hsu and Julia Hockenmaier | Attack and Reset for Unlearning: Exploiting Adversarial Noise toward
Machine Unlearning through Parameter Re-initialization | null | null | null | null | cs.LG cs.CR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With growing concerns surrounding privacy and regulatory compliance, the
concept of machine unlearning has gained prominence, aiming to selectively
forget or erase specific learned information from a trained model. In response
to this critical need, we introduce a novel approach called Attack-and-Reset
for Unlearning (ARU). This algorithm leverages meticulously crafted adversarial
noise to generate a parameter mask, effectively resetting certain parameters
and rendering them unlearnable. ARU outperforms current state-of-the-art
results on two facial machine-unlearning benchmark datasets, MUFAC and MUCAC.
In particular, we present the steps involved in attacking and masking that
strategically filter and re-initialize network parameters biased towards the
forget set. Our work represents a significant advancement in rendering data
unexploitable to deep learning models through parameter re-initialization,
achieved by harnessing adversarial noise to craft a mask.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:22:47 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Jung",
"Yoonhwa",
""
],
[
"Cho",
"Ikhyun",
""
],
[
"Hsu",
"Shun-Hsiang",
""
],
[
"Hockenmaier",
"Julia",
""
]
] |
2401.08999 | Yesoda Bhargava | Hugo Laurencon, Yesoda Bhargava, Riddhi Zantye, Charbel-Rapha\"el
S\'egerie, Johann Lussange, Veeky Baths, Boris Gutkin | Continuous Time Continuous Space Homeostatic Reinforcement Learning
(CTCS-HRRL) : Towards Biological Self-Autonomous Agent | This work is a result of the ongoing collaboration between Cognitive
Neuroscience Lab, BITS Pilani K K Birla Goa Campus and Ecole Normale
Superieure, Paris France. This work is jointly supervised by Prof. Boris
Gutkin and Prof. Veeky Baths. arXiv admin note: substantial text overlap with
arXiv:2109.06580 | null | null | null | cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Homeostasis is a biological process by which living beings maintain their
internal balance. Previous research suggests that homeostasis is a learned
behaviour. Recently introduced Homeostatic Regulated Reinforcement Learning
(HRRL) framework attempts to explain this learned homeostatic behavior by
linking Drive Reduction Theory and Reinforcement Learning. This linkage has
been proven in the discrete time-space, but not in the continuous time-space.
In this work, we advance the HRRL framework to a continuous time-space
environment and validate the CTCS-HRRL (Continuous Time Continuous Space HRRL)
framework. We achieve this by designing a model that mimics the homeostatic
mechanisms in a real-world biological agent. This model uses the
Hamilton-Jacobian Bellman Equation, and function approximation based on neural
networks and Reinforcement Learning. Through a simulation-based experiment we
demonstrate the efficacy of this model and uncover the evidence linked to the
agent's ability to dynamically choose policies that favor homeostasis in a
continuously changing internal-state milieu. Results of our experiments
demonstrate that agent learns homeostatic behaviour in a CTCS environment,
making CTCS-HRRL a promising framework for modellng animal dynamics and
decision-making.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:29:34 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Laurencon",
"Hugo",
""
],
[
"Bhargava",
"Yesoda",
""
],
[
"Zantye",
"Riddhi",
""
],
[
"Ségerie",
"Charbel-Raphaël",
""
],
[
"Lussange",
"Johann",
""
],
[
"Baths",
"Veeky",
""
],
[
"Gutkin",
"Boris",
""
]
] |
2401.09000 | Mateja Dumbovi\'c | M. Dumbovic, L. Kramaric, I. Benko, B. Heber, and B. Vrsnak | A new method of measuring Forbush decreases | 14 pages, 10 figures, A&A | null | null | null | astro-ph.SR astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | Forbush decreases (FDs) are short-term depressions in the galactic cosmic ray
flux and one of the common signatures of coronal mass ejections (CMEs) in the
heliosphere. They often show a two-step profile, the second one associated with
the CMEs magnetic structure (flux rope, FR), which can be described by the
recently developed model ForbMod. The aim of this study is to utilise ForbMod
to develop a best-fit procedure to be applied on FR-related FDs as a convenient
measurement tool. We develop a best-fit procedure that can be applied to a data
series from an arbitrary detector. Thus, the basic procedure facilitates
measurement estimation of the magnitude of the FR-related FD, with the
possibility of being adapted for the energy response of a specific detector for
a more advanced analysis. The non-linear fitting was performed by calculating
all possible ForbMod curves constrained within the FR borders to the designated
dataset and minimising the mean square error (MSE). In order to evaluate the
performance of the ForbMod best-fit procedure, we used synthetic measurements
produced by calculating the theoretical ForbMod curve for a specific example
CME and then applying various effects to the data to mimic the imperfection of
the real measurements. We also tested the ForbMod best-fit function on the real
data, measured by detector F of the SOHO-EPHIN instrument on a sample
containing 30 events, all of which have a distinct FD corresponding to the CMEs
magnetic structure. Overall, we find that the ForbMod best-fit procedure
performs similar to the traditional algorithm-based observational method, but
with slightly smaller values for the FD amplitude, as it is taking into account
the noise in the data. Furthermore, we find that the best-fit procedure has an
advantage compared to the traditional method as it can estimate the FD
amplitude even when there is a data gap at the onset of the FD.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:33:31 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Dumbovic",
"M.",
""
],
[
"Kramaric",
"L.",
""
],
[
"Benko",
"I.",
""
],
[
"Heber",
"B.",
""
],
[
"Vrsnak",
"B.",
""
]
] |
2401.09001 | Hashini Gunatilake | Hashini Gunatilake, John Grundy, Rashina Hoda, Ingo Mueller | Enablers and Barriers of Empathy in Software Developer and User
Interaction: A Mixed Methods Case Study | null | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Software engineering (SE) requires developers to collaborate with
stakeholders, and understanding their emotions and perspectives is often vital.
Empathy is a concept characterising a person's ability to understand and share
the feelings of another. However, empathy continues to be an under-researched
human aspect in SE. We studied how empathy is practised between developers and
end users using a mixed methods case study. We used an empathy test,
observations and interviews to collect data, and socio technical grounded
theory and descriptive statistics to analyse data. We identified the nature of
awareness required to trigger empathy and enablers of empathy. We discovered
barriers to empathy and a set of potential strategies to overcome these
barriers. We report insights on emerging relationships and present a set of
recommendations and potential future works on empathy and SE for software
practitioners and SE researchers.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:42:21 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Gunatilake",
"Hashini",
""
],
[
"Grundy",
"John",
""
],
[
"Hoda",
"Rashina",
""
],
[
"Mueller",
"Ingo",
""
]
] |
2401.09002 | Mingyu Jin | Dong shu, Mingyu Jin, Suiyuan Zhu, Beichen Wang, Zihao Zhou, Chong
Zhang, Yongfeng Zhang | AttackEval: How to Evaluate the Effectiveness of Jailbreak Attacking on
Large Language Models | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | In our research, we pioneer a novel approach to evaluate the effectiveness of
jailbreak attacks on Large Language Models (LLMs), such as GPT-4 and LLaMa2,
diverging from traditional robustness-focused binary evaluations. Our study
introduces two distinct evaluation frameworks: a coarse-grained evaluation and
a fine-grained evaluation. Each framework, using a scoring range from 0 to 1,
offers a unique perspective, enabling a more comprehensive and nuanced
evaluation of attack effectiveness and empowering attackers to refine their
attack prompts with greater understanding. Furthermore, we have developed a
comprehensive ground truth dataset specifically tailored for jailbreak tasks.
This dataset not only serves as a crucial benchmark for our current study but
also establishes a foundational resource for future research, enabling
consistent and comparative analyses in this evolving field. Upon meticulous
comparison with traditional evaluation methods, we discovered that our
evaluation aligns with the baseline's trend while offering a more profound and
detailed assessment. We believe that by accurately evaluating the effectiveness
of attack prompts in the Jailbreak task, our work lays a solid foundation for
assessing a wider array of similar or even more complex tasks in the realm of
prompt injection, potentially revolutionizing this field.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:42:44 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"shu",
"Dong",
""
],
[
"Jin",
"Mingyu",
""
],
[
"Zhu",
"Suiyuan",
""
],
[
"Wang",
"Beichen",
""
],
[
"Zhou",
"Zihao",
""
],
[
"Zhang",
"Chong",
""
],
[
"Zhang",
"Yongfeng",
""
]
] |
2401.09003 | Haoxiong Liu | Haoxiong Liu, Andrew Chi-Chih Yao | Augmenting Math Word Problems via Iterative Question Composing | null | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Despite recent progress in improving the mathematical reasoning ability of
large language models(LLMs), solving competition-level math problems without
the use of external tools remains challenging for open-source LLMs. In this
work, we introduce the MMIQC dataset, a mixture of processed web data and
synthetic question-response pairs, to equip base models with better
mathematical reasoning skills. Mistral-7B-MMIQC, the model obtained by
fine-tuning Mistral-7B(arXiv:2310.06825) on MMIQC, achieves 36.0\% accuracy on
MATH(arXiv:2103.03874), 5.8\% higher than the previous (model size $\sim$7B)
SOTA. Our experiments also show that a large part of the improvement attributes
to our novel augmentation method IQC(Iterative Question Composing), where we
iteratively ask an LLM to compose new questions from the given seed problems
and do rejection sampling from another LLM. MMIQC has now been released on
https://huggingface.co/datasets/Vivacem/MMIQC.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:48:16 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Liu",
"Haoxiong",
""
],
[
"Yao",
"Andrew Chi-Chih",
""
]
] |
2401.09004 | Parth Shah Dr. | Pooja Vishwakarma, Parth Shah | Stability analysis of f(Q) gravity models using dynamical systems | 12 pages, 6 figures | Int.J.Mod.Phys.D 32 (2023) 11, 2350071 | 10.1142/S0218271823500712 | null | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | In recent years, the modified theory of gravity known as $f(Q)$ gravity has
drawn interest as a potential alternative to general relativity. According to
this theory, the gravitational force is determined by a function of the
so-called ``non-metricity" tensor $Q$, which expresses how far a particle
space-time is from the metric geometry. In contrast to general relativity,
which describes the gravitational field using the curvature tensor, $f(Q)$
gravity builds a theory of gravity using the non-metricity tensor. For this
class of theories, dynamical system analysis of the background and perturbation
equations has been carried out in this work to determine how various models
behave cosmologically. Here, the critical points are determined for two $f(Q)$
models from the literature: the power law, $ f(Q)=Q+mQ^{n} $, and the
logarithmic, $ f(Q)=\alpha+\beta log Q $ models. The stability behaviour and
corresponding cosmology are displayed for each critical point. For the power
law model, we achieve a matter-dominated saddle point with the right matter
perturbation growth rate. For the logarithmic model, we get a saddle point
dominated by the geometric component of the $ f(Q)$ model with perturbations in
the decomposition of matter. For both models, we later achieved a stable and
accelerating Universe with constant matter perturbations.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:51:23 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Vishwakarma",
"Pooja",
""
],
[
"Shah",
"Parth",
""
]
] |
2401.09005 | Wang Jian | Xin Chen, Jian Wang | Sharp two-sided heat kernel estimates for Schr\"{o}dinger operators with
decaying potentials | 29 pages | null | null | null | math.AP math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish global two-sided heat kernel estimates (for full time and space)
of the Schr\"odinger operator $-\frac{1}{2}\Delta+V$ on $\R^d$, where the
potential $V(x)$ is locally bounded and behaves like $c|x|^{-\alpha}$ near
infinity with $\alpha\in (0,2)$ and $c> 0$, or with $\alpha>0$ and $c<0$.Our
results improve all known results in the literature, and it seems that the
current paper is the first one where consistent two-sided heat kernel bounds
for the long range potentials are established.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:54:13 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Chen",
"Xin",
""
],
[
"Wang",
"Jian",
""
]
] |
2401.09006 | Xingming Long | Xingming Long, Shiguang Shan and Jie Zhang | Generalized Face Liveness Detection via De-spoofing Face Generator | v1 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous Face Anti-spoofing (FAS) works face the challenge of generalizing in
unseen domains. One of the major problems is that most existing FAS datasets
are relatively small and lack data diversity. However, we find that there are
numerous real faces that can be easily achieved under various conditions, which
are neglected by previous FAS works. In this paper, we conduct an Anomalous cue
Guided FAS (AG-FAS) method, which leverages real faces for improving model
generalization via a De-spoofing Face Generator (DFG). Specifically, the DFG
trained only on the real faces gains the knowledge of what a real face should
be like and can generate a "real" version of the face corresponding to any
given input face. The difference between the generated "real" face and the
input face can provide an anomalous cue for the downstream FAS task. We then
propose an Anomalous cue Guided FAS feature extraction Network (AG-Net) to
further improve the FAS feature generalization via a cross-attention
transformer. Extensive experiments on a total of nine public datasets show our
method achieves state-of-the-art results under cross-domain evaluations with
unseen scenarios and unknown presentation attacks.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 06:59:32 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Long",
"Xingming",
""
],
[
"Shan",
"Shiguang",
""
],
[
"Zhang",
"Jie",
""
]
] |
2401.09007 | Chusei Kiumi | Chusei Kiumi, Akito Suzuki | Quantum singular value transformation for an arbitrary bounded operator
embedded in a unitary operator | 14 pages | null | null | null | quant-ph math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This research extends quantum singular value transformation (QSVT) for
general bounded operators embedded in unitary operators on possibly
infinite-dimensional Hilbert spaces. Through in-depth mathematical exploration,
we have achieved a refined operator-theoretic understanding of QSVT, leading to
a more streamlined approach. One of the key discoveries is that polynomial
transformations in QSVT inherently apply to the entire operator, rather than
being contingent on the selection of a specific basis. We expect that this
research will pave the way for applying these insights to a broader range of
problems in quantum information processing and provide analytical tools for
quantum dynamics, such as quantum walks.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 07:06:31 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Kiumi",
"Chusei",
""
],
[
"Suzuki",
"Akito",
""
]
] |
2401.09008 | Sulthan Rafif | Sulthan Rafif, Mochamad Arfan Ravy Wahyu Pratama, Mohammad Faris
Azhar, Ahmad Mustafidul Ibad, Lailil Muflikhah, Novanto Yudistira | Hybrid of DiffStride and Spectral Pooling in Convolutional Neural
Networks | null | CSIAM Transactions on Applied Mathematics; R. Riad et al,
"Learning strides in convolutional neural networks," pp. 1-16, 2022.
[Online]; | 10.1145/3626641.3626930 | null | cs.CV cs.AI | http://creativecommons.org/publicdomain/zero/1.0/ | Stride determines the distance between adjacent filter positions as the
filter moves across the input. A fixed stride causes important information
contained in the image can not be captured, so that important information is
not classified. Therefore, in previous research, the DiffStride Method was
applied, namely the Strided Convolution Method with which it can learn its own
stride value. Severe Quantization and a constraining lower bound on preserved
information are arises with Max Pooling Downsampling Method. Spectral Pooling
reduce the constraint lower bound on preserved information by cutting off the
representation in the frequency domain. In this research a CNN Model is
proposed with the Downsampling Learnable Stride Technique performed by
Backpropagation combined with the Spectral Pooling Technique. Diffstride and
Spectral Pooling techniques are expected to maintain most of the information
contained in the image. In this study, we compare the Hybrid Method, which is a
combined implementation of Spectral Pooling and DiffStride against the Baseline
Method, which is the DiffStride implementation on ResNet 18. The accuracy
result of the DiffStride combination with Spectral Pooling improves over
DiffStride which is baseline method by 0.0094. This shows that the Hybrid
Method can maintain most of the information by cutting of the representation in
the frequency domain and determine the stride of the learning result through
Backpropagation.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 07:06:56 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"Rafif",
"Sulthan",
""
],
[
"Pratama",
"Mochamad Arfan Ravy Wahyu",
""
],
[
"Azhar",
"Mohammad Faris",
""
],
[
"Ibad",
"Ahmad Mustafidul",
""
],
[
"Muflikhah",
"Lailil",
""
],
[
"Yudistira",
"Novanto",
""
]
] |