_id
sequence
label
stringlengths
5
77
text
stringlengths
78
3.43k
[ 35 ]
math.RA
Stable functors and cohomology theory in Grothendieck categories. In this paper, we introduce and study a relative complete cohomology theory in Grothendieck categories. Some properties of this cohomology including vanishing and balancedness are given. As an application of our approach, we prove a new balanced result for Tate cohomology in Grothendieck categories.
[ 1, 2 ]
cs.AI cs.LG
Learning Bayesian networks from demographic and health survey data. Child mortality from preventable diseases such as pneumonia and diarrhoea in low and middle income countries remains a serious global challenge. We combine knowledge with available Demographic and Health Survey (DHS) data from India, to construct Causal Bayesian Networks (CBNs) and investigate the factors associated with childhood diarrhoea. We make use of freeware tools to learn the graphical structure of the DHS data with score based, constraint based, and hybrid structure learning algorithms. We investigate the effect of missing values, sample size, and knowledge based constraints on each of the structure learning algorithms and assess their accuracy with multiple scoring functions. Weaknesses in the survey methodology and data available, as well as the variability in the CBNs generated by the different algorithms, mean that it is not possible to learn a definitive CBN from data. However, knowledge based constraints are found to be useful in reducing the variation in the graphs produced by the different algorithms, and produce graphs which are more reflective of the likely influential relationships in the data. Furthermore, valuable insights are gained into the performance and characteristics of the structure learning algorithms. Two score based algorithms in particular, TABU and FGES, demonstrate many desirable qualities a) with sufficient data, they produce a graph which is similar to the reference graph, b) they are relatively insensitive to missing values, and c) behave well with knowledge based constraints. The results provide a basis for further investigation of the DHS data and for a deeper understanding of the behaviour of the structure learning algorithms when applied to real world settings.
[ 89 ]
q-bio.CB
Non equilibrium statistical physics, transitory epigenetic landscapes, and cell fate decision dynamics. Statistical physics provides a useful perspective for the analysis of many complex systems it allows us to relate microscopic fluctuations to macroscopic observations. Developmental biology, but also cell biology more generally, are examples where apparently robust behaviour emerges from highly complex and stochastic sub cellular processes. Here we attempt to make connections between different theoretical perspectives to gain qualitative insights into the types of cell fate decision making processes that are at the heart of stem cell and developmental biology. We discuss both dynamical systems as well as statistical mechanics perspectives on the classical Waddington or epigenetic landscape. We find that non equilibrium approaches are required to overcome some of the shortcomings of classical equilibrium statistical thermodynamics or statistical mechanics in order to shed light on biological processes, which, almost by definition, are typically far from equilibrium.
[ 51, 36, 7 ]
physics.chem-ph physics.bio-ph physics.comp-ph
A Scalable Molecular Force Field Parameterization Method Based on Density Functional Theory and Quantum Level Machine Learning. Fast and accurate molecular force field (FF) parameterization is still an unsolved problem. Accurate FFs are not generally available for all molecules, like novel druglike molecules. While methods based on quantum mechanics (QM) exist to parameterize them with better accuracy, they are computationally expensive and slow, which limits applicability to a small number of molecules. Here, we present an automated FF parameterization method which can utilize either DFT calculations or approximate QM energies produced by different neural network potentials (NNPs), to obtain improved parameters for molecules. We demonstrate that for the case of torchani ANI 1x NNP, we can parameterize small molecules in a fraction of time compared with an equivalent parameterization using DFT QM calculations while producing more accurate parameters than FF (GAFF2). We expect our method to be of critical importance in computational structure based drug discovery. The current version is available at PlayMolecule (www.playmolecule.org) and implemented in HTMD, allowing to parameterize molecules with different QM and NNP options.
[ 0 ]
cs.CV
Forensic Scanner Identification Using Machine Learning. Due to the increasing availability and functionality of image editing tools, many forensic techniques such as digital image authentication, source identification and tamper detection are important for forensic image analysis. In this paper, we describe a machine learning based system to address the forensic analysis of scanner devices. The proposed system uses deep learning to automatically learn the intrinsic features from various scanned images. Our experimental results show that high accuracy can be achieved for source scanner identification. The proposed system can also generate a reliability map that indicates the manipulated regions in an scanned image.
[ 8, 33, 11 ]
physics.app-ph physics.ins-det physics.optics
Long wavelength infrared photovoltaic heterodyne receivers using patch antenna quantum cascade detectors. Quantum cascade detectors (QCD) are unipolar infrared devices where the transport of the photo excited carriers takes place through confined electronic states, without an applied bias. In this photovoltaic mode, the detector's noise is not dominated by a dark shot noise process, therefore, performances are less degraded at high temperature with respect to photoconductive detectors. This work describes a 9 um QCD embedded into a patch antenna metamaterial which operates with state of the art performances. The metamaterial gathers photons on a collection area, Acoll, much bigger than the geometrical area of the detector, improving the signal to noise ratio up to room temperature. The background limited detectivity at 83 K is 5.5 x 10 10 cm Hz 1 2 W 1, while at room temperature, the responsivity is 50 mA W at 0 V bias. Patch antenna QCD is an ideal receiver for a heterodyne detection set up, where a signal at a frequency 1.4 GHz and T 295 K is reported as first demonstration of uncooled 9um photovoltaic receivers with GHz electrical bandwidth. These findings guide the research towards uncooled IR quantum limited detection.
[ 64, 40, 59, 63 ]
physics.soc-ph cs.DL cs.IR cs.SI
Twenty Years of Network Science A Bibliographic and Co Authorship Network Analysis. Two decades ago three pioneering papers turned the attention to complex networks and initiated a new era of research, establishing an interdisciplinary field called network science. Namely, these highly cited seminal papers were written by Watts Strogatz, Barab 'asi Albert, and Girvan Newman on small world networks, on scale free networks and on the community structure of complex networks, respectively. In the past 20 years due to the multidisciplinary nature of the field a diverse but not divided network science community has emerged. In this paper, we investigate how this community has evolved over time with respect to speed, diversity and interdisciplinary nature as seen through the growing co authorship network of network scientists (here the notion refers to a scholar with at least one paper citing at least one of the three aforementioned milestone papers). After providing a bibliographic analysis of 31,763 network science papers, we construct the co authorship network of 56,646 network scientists and we analyze its topology and dynamics. We shed light on the collaboration patterns of the last 20 years of network science by investigating numerous structural properties of the co authorship network and by using enhanced data visualization techniques. We also identify the most central authors, the largest communities, investigate the spatiotemporal changes, and compare the properties of the network to scientometric indicators.
[ 17 ]
cs.DC
KNN DBSCAN a DBSCAN in high dimensions. Clustering is a fundamental task in machine learning. One of the most successful and broadly used algorithms is DBSCAN, a density based clustering algorithm. DBSCAN requires epsilon nearest neighbor graphs of the input dataset, which are computed with range search algorithms and spatial data structures like KD trees. Despite many efforts to design scalable implementations for DBSCAN, existing work is limited to low dimensional datasets, as constructing epsilon nearest neighbor graphs is expensive in high dimensions. In this paper, we modify DBSCAN to enable use of kappa nearest neighbor graphs of the input dataset. The kappa nearest neighbor graphs are constructed using approximate algorithms based on randomized projections. Although these algorithms can become inaccurate or expensive in high dimensions, they possess a much lower memory overhead than constructing epsilon nearest neighbor graphs ( mathcal O (nk) vs. mathcal O (n 2) ). We delineate the conditions under which k NN DBSCAN produces the same clustering as DBSCAN. We also present an efficient parallel implementation of the overall algorithm using OpenMP for shared memory and MPI for distributed memory parallelism. We present results on up to 16 billion points in 20 dimensions, and perform weak and strong scaling studies using synthetic data. Our code is efficient in both low and high dimensions. We can cluster one billion points in 3D in less than one second on 28K cores on the Frontera system at the Texas Advanced Computing Center (TACC). In our largest run, we cluster 65 billion points in 20 dimensions in less than 40 seconds using 114,688 x86 cores on TACC's Frontera system. Also, we compare with a state of the art parallel DBSCAN code on 20d 4M point dataset, our code is up to 37 times faster.
[ 40 ]
cs.IR
CAFE Coarse to Fine Neural Symbolic Reasoning for Explainable Recommendation. Recent research explores incorporating knowledge graphs (KG) into e commerce recommender systems, not only to achieve better recommendation performance, but more importantly to generate explanations of why particular decisions are made. This can be achieved by explicit KG reasoning, where a model starts from a user node, sequentially determines the next step, and walks towards an item node of potential interest to the user. However, this is challenging due to the huge search space, unknown destination, and sparse signals over the KG, so informative and effective guidance is needed to achieve a satisfactory recommendation quality. To this end, we propose a CoArse to FinE neural symbolic reasoning approach (CAFE). It first generates user profiles as coarse sketches of user behaviors, which subsequently guide a path finding process to derive reasoning paths for recommendations as fine grained predictions. User profiles can capture prominent user behaviors from the history, and provide valuable signals about which kinds of path patterns are more likely to lead to potential items of interest for the user. To better exploit the user profiles, an improved path finding algorithm called Profile guided Path Reasoning (PPR) is also developed, which leverages an inventory of neural symbolic reasoning modules to effectively and efficiently find a batch of paths over a large scale KG. We extensively experiment on four real world benchmarks and observe substantial gains in the recommendation performance compared with state of the art methods.
[ 84, 7 ]
physics.acc-ph physics.comp-ph
Direct Vlasov solvers. In these proceedings we will describe the theory and practical steps required to build Vlasov solvers such as those commonly used to compute coherent instabilities in synchrotrons. Thanks to a Hamiltonian formalism, we will derive a compact and general form of the linearized Vlasov equation, written using Poisson brackets. This in turn will be the basis of a procedure to build Vlasov solvers, applied to the specific example of transverse instabilities arising from beam coupling impedance.
[ 17 ]
cs.DC
On the correctness of Egalitarian Paxos. This paper identifies a problem in both the TLA specification and the implementation of the Egalitarian Paxos protocol. It is related to how replicas switch from one ballot to another when computing the dependencies of a command. The problem may lead replicas to diverge and break the linearizability of the replicated service.
[ 64 ]
physics.soc-ph
A Data Driven and Integrated Evaluation of Area wide Impacts of Double Parking Using Macroscopic and Microscopic Models. Double parking that often negatively affects traffic operations and safety is not a new phenomenon on urban streets. This study proposes a novel data driven integrated framework for estimating the actual frequency of double parking so that both microscopic and macroscopic models can be utilized to quantify area wide impacts in the presence of double parking. The findings of the study can provide transportation agencies with useful insights on identifying locations that will experience the greatest benefits by removing problematic double parking. As a result, various parking enforcement and management strategies can be planned more effectively.
[ 19 ]
cs.CR
Putting Together the Pieces A Concept for Holistic Industrial Intrusion Detection. Besides the advantages derived from the ever present communication properties, it increases the attack surface of a network as well. As industrial protocols and systems were not designed with security in mind, spectacular attacks on industrial systems occurred over the last years. Most industrial communication protocols do not provide means to ensure authentication or encryption. This means attackers with access to a network can read and write information. Originally not meant to be connected to public networks, the use cases of Industry 4.0 require interconnectivity, often through insecure public networks. This lead to an increasing interest in information security products for industrial applications. In this work, the concept for holistic intrusion detection methods in an industrial context is presented. It is based on different works considering several aspects of industrial environments and their capabilities to identify intrusions as an anomaly in network or process data. These capabilities are based on preceding experiments on real and synthetic data. In order to justify the concept, an overview of potential and actual attack vectors and attacks on industrial systems is provided. It is shown that different aspects of industrial facilities, e.g. office IT, shop floor OT, firewalled connections to customers and partners are analysed as well as the different layers of the automation pyramid require different methods to detect attacks. Additionally, the singular steps of an attack on industrial applications are characterised. Finally, a resulting concept for integration of these methods is proposed, providing the means to detect the different stages of an attack by different means.
[ 41 ]
cs.RO
Relevant Region Exploration On General Cost maps For Sampling Based Motion Planning. Asymptotically optimal sampling based planners require an intelligent exploration strategy to accelerate convergence. After an initial solution is found, a necessary condition for improvement is to generate new samples in the so called "Informed Set". However, Informed Sampling can be ineffective in focusing search if the chosen heuristic fails to provide a good estimate of the solution cost. This work proposes an algorithm to sample the "Relevant Region" instead, which is a subset of the Informed Set. The Relevant Region utilizes cost to come information from the planner's tree structure, reduces dependence on the heuristic, and further focuses the search. Benchmarking tests in uniform and general cost space settings demonstrate the efficacy of Relevant Region sampling.
[ 1, 20, 49 ]
math.NA cs.LG cs.NA math.OC
Two Layer Neural Networks for Partial Differential Equations Optimization and Generalization Theory. The problem of solving partial differential equations (PDEs) can be formulated into a least squares minimization problem, where neural networks are used to parametrize PDE solutions. A global minimizer corresponds to a neural network that solves the given PDE. In this paper, we show that the gradient descent method can identify a global minimizer of the least squares optimization for solving second order linear PDEs with two layer neural networks under the assumption of over parametrization. We also analyze the generalization error of the least squares optimization for second order linear PDEs and two layer neural networks, when the right hand side function of the PDE is in a Barron type space and the least squares optimization is regularized with a Barron type norm, without the over parametrization assumption.
[ 18 ]
math.GT
Stated skein modules of marked 3 manifolds surfaces, a survey. We give a survey of some old and new results about the stated skein modules algebras of 3 manifolds surfaces. For generic quantum parameter, we discuss the splitting homomorphism for the 3 manifold case, general structures of the stated skein algebras of marked surfaces (or bordered punctured surfaces) and their embeddings into quantum tori. For roots of 1 quantum parameter, we discuss the Frobenius homomorphism (for both marked 3 manifolds and marked surfaces), describe the center of the skein algebra of marked surfaces, the dimension of the skein algebra over the center, and the representation theory of the skein algebra. In particular, we show that the skein algebra of non closed marked surface at any root of 1 is a maximal order. We give a full description of the Azumaya locus of the skein algebra of the puncture torus and give partial results for closed surfaces.
[ 46 ]
math.AG
On certain self orthogonal AG codes with applications to Quantum error correcting codes. In this paper a construction of quantum codes from self orthogonal algebraic geometry codes is provided. Our method is based on the CSS construction as well as on some peculiar properties of the underlying algebraic curves, named Swiss curves. Several classes of well known algebraic curves with many rational points turn out to be Swiss curves. Examples are given by Castle curves, GK curves, generalized GK curves and the Abdon Bezerra Quoos maximal curves. Applications of our method to these curves are provided. Our construction extends a previous one due to Hernando, McGuire, Monserrat, and Moyano Fernandez.
[ 65, 15 ]
cs.NI cs.IT math.IT
AoI Delay Tradeoff in Mobile Edge Caching with Freshness Aware Content Refreshing. Mobile edge caching can effectively reduce service delay but may introduce information staleness, calling for timely content refreshing. However, content refreshing consumes additional transmission resources and may degrade the delay performance of mobile systems. In this work, we propose a freshness aware refreshing scheme to balance the service delay and content freshness measured by Age of Information (AoI). Specifically, the cached content items will be refreshed to the up to date version upon user requests if the AoI exceeds a certain threshold (named as refreshing window). The average AoI and service delay are derived in closed forms approximately, which reveals an AoI delay tradeoff relationship with respect to the refreshing window. In addition, the refreshing window is optimized to minimize the average delay while meeting the AoI requirements, and the results indicate to set a smaller refreshing window for the popular content items. Extensive simulations are conducted on the OMNeT platform to validate the analytical results. The results indicate that the proposed scheme can restrain frequent refreshing as the request arrival rate increases, whereby the average delay can be reduced by around 80 while maintaining the AoI below one second in heavily loaded scenarios.
[ 42 ]
math.DG
Lightlike manifolds and Cartan geometries. Lightlike Cartan geometries are introduced as Cartan geometries modelled on the future lightlike cone in Lorentz Minkowski spacetime. Then, we provide an approach to the study of lightlike manifolds from this point of view. It is stated that every lightlike Cartan geometry on a manifold N provides a lightlike metric h with radical distribution globally spanned by a vector field Z . For lightlike hypersurfaces of a Lorentz manifold, we give the condition that characterizes when the pull back of the Levi Civita connection form of the ambient manifold is a lightlike Cartan connection on such hypersurface. In the particular case that a lightlike hypersurface is properly totally umbilical, this construction essentially returns the original lightlike metric. From the intrinsic point of view, starting from a given lightlike manifold (N,h) , we show a method to construct a family of ambient Lorentzian manifolds that realize (N,h) as a hypersurface. This method is inspired on the Feffermann Graham ambient metric construction in conformal geometry and provides a lightlike Cartan geometry on the original manifold when (N,h) is generic.
[ 2, 39 ]
cs.AI cs.CY
An Expert System Approach for determine the stage of UiTM Perlis Palapes Cadet Performance and Ranking Selection. The palapes cadets are one of the uniform organizations in UiTM Perlis for extra curricular activities. The palapes cadets arrange their organization in a hierarchy according to grade. Senior uniform officer (SUO) is the highest rank, followed by a junior uniform officer (JUO), sergeant, corporal, lance corporal, and lastly, cadet officer, which is the lowest rank. The palapes organization has several methods to measure performance toward promotion to a higher rank, whether individual performance or in a group. Cadets are selected for promotion based on demonstrated leadership abilities, acquired skills, physical fitness, and comprehension of information as measured through standardized testing. However, this method is too complicated when manually assessed by a trainer or coach. Therefore, this study will propose an expert system, which is one of the artificial intelligence techniques that can recognize the readiness and progression of a palapes cadet.
[ 56 ]
cs.LO
Universal Algebra in UniMath. We present an ongoing effort to implement Universal Algebra in the UniMath system. Our aim is to develop a general framework for formalizing and studying Universal Algebra in a proof assistant. By constituting a formal system for isolating the invariants of the theory we are interested in that is, general algebraic structures modulo isomorphism Univalent Mathematics seems to provide a suitable environment to carry on our endeavour.
[ 21 ]
math.CO
Monochromatic Equilateral Triangles in the Unit Distance Graph. Let chi Delta ( mathbb R n ) denote the minimum number of colors needed to color mathbb R n so that there will not be a monochromatic equilateral triangle with side length 1 . Using the slice rank method, we reprove a result of Frankl and Rodl, and show that chi Delta left( mathbb R n right) grows exponentially with n . This technique substantially improves upon the best known quantitative lower bounds for chi Delta left( mathbb R n right) , and we obtain chi Delta left( mathbb R n right) (1.01446 o(1)) n .
[ 1, 41, 7 ]
physics.comp-ph cs.LG cs.RO
Evaluation of Surrogate Models for Multi fin Flapping Propulsion Systems. The aim of this study is to develop surrogate models for quick, accurate prediction of thrust forces generated through flapping fin propulsion for given operating conditions and fin geometries. Different network architectures and configurations are explored to model the training data separately for the lead fin and rear fin of a tandem fin setup. We progressively improve the data representation of the input parameter space for model predictions. The models are tested on three unseen fin geometries and the predictions validated with computational fluid dynamics (CFD) data. Finally, the orders of magnitude gains in computational performance of these surrogate models, compared to experimental and CFD runs, vs their tradeoff with accuracy is discussed within the context of this tandem fin configuration.
[ 25 ]
math.PR
How far do Activated Random Walkers spread from a single source?. Unlike many particle systems, Activated Random Walk has nontrivial behavior even in one spatial dimension. We prove inner and outer bounds on the spread of n activated random walkers from a single source in Z. The inner bound involves a comparison with the stationary distribution of activated random walkers on a finite interval, while the outer bound involves a comparison with the stabilization of an infinite Bernoulli configuration of activated random walkers on Z.
[ 9 ]
math.AP
Concentration versus oscillation effects in brittle damage. This work is concerned with an asymptotic analysis, in the sense of Gamma convergence, of a sequence of variational models of brittle damage in the context of linearized elasticity. The study is performed as the damaged zone concentrates into a set of zero volume and, at the same time and to the same order varepsilon , the stiffness of the damaged material becomes small. Three main features make the analysis highly nontrivial at varepsilon fixed, minimizing sequences of each brittle damage model oscillate and develop microstructures as varepsilon to 0 , concentration and saturation of damage are favoured and the competition of these phenomena translates into a degeneration of the growth of the elastic energy, which passes from being quadratic (at varepsilon fixed) to being of linear growth type (in the limit). Consequently, homogenization effects interact with singularity formation in a nontrivial way, which requires new methods of analysis. In particular, the interaction of homogenization with singularity formation in the framework of linearized elasticity appears to not have been considered in the literature so far. We explicitly identify the Gamma limit in two and three dimensions for isotropic Hooke tensors. The expression of the limit effective energy turns out to be of Hencky plasticity type. We further consider the regime where the divergence remains square integrable in the limit, which leads to a Tresca type model.
[ 25 ]
math.PR
Asymptotic stability of controlled differential equations. Part I Young integrals. We provide a unified analytic approach to study stationary states of controlled differential equations driven by rough paths, using the framework of random dynamical systems and random attractors. Part I deals with driving paths of finite p variations with 1 leq p 2 so that the integrals are interpreted in the Young sense. Our method helps to generalize recent results cite GAKLBSch2010 , cite ducGANSch18 , cite duchongcong18 on the existence of the global pullback attractors for the generated random dynamical systems. We also prove sufficient conditions for the attractor to be a singleton, thus the pathwise convergence is in both pullback and forward senses.
[ 20 ]
math.NA cs.NA
An ensemble Kalman filter approach based on level set parameterization for acoustic source identification using multiple frequency information. The spatial dependent unknown acoustic source is reconstructed according noisy multiple frequency data on a remote closed surface. Assume that the unknown function is supported on a bounded domain. To determine the support, we present a statistical inversion algorithm, which combines the ensemble Kalman filter approach with level set technique. Several numerical examples show that the proposed method give good numerical reconstruction.
[ 21 ]
math.CO
Recurrence relation for plethysm. We describe a recurrence formula for the plethysm h 3 h n . The proof is based on the original formula by Thrall.
[ 53, 45, 54 ]
q-fin.PR q-fin.MF q-fin.RM
How Safe are European Safe Bonds? An Analysis from the Perspective of Modern Portfolio Credit Risk Models. Several proposals for the reform of the euro area advocate the creation of a market in synthetic securities backed by portfolios of sovereign bonds. Most debated are the so called European Safe Bonds or ESBies proposed by Brunnermeier, Langfield, Pagano,Reis, Van Nieuwerburgh and Vayanos (2017). The potential benefits of ESBies and other bond backed securities hinge on the assertion that these products are really safe. In this paper we provide a comprehensive quantitative study of the risks associated with ESBies and related products, using an affine credit risk model with regime switching as vehicle for our analysis. We discuss a recent proposal of Standard and Poors for the rating of ESBies, we analyse the impact of model parameters and attachment points on the size and the volatility of the credit spread of ESBies and we consider several approaches to assess the market risk of ESBies. Moreover, we compare ESBies to synthetic securities created by pooling the senior tranche of national bonds as suggested by Leandro and Zettelmeyer(2019). The paper concludes with a brief discussion of the policy implications from our analysis.
[ 91 ]
q-bio.GN
A Common Gene Expression Signature Analysis Method for Multiple Types of Cancer. Mining gene expression profiles has proven valuable for identifying signatures serving as surrogates of cancer phenotypes. However, the similarities of such signatures across different cancer types have not been strong enough to conclude that they represent a universal biological mechanism shared among multiple cancer types. Here we describe a network based approach that explores gene to gene connections in multiple cancer datasets while maximizing the overall association of the subnetwork with clinical outcomes. With the dataset of The Cancer Genome Atlas (TCGA), we studied the characteristics of common gene expression of three types of cancers Rectum adenocarcinoma (READ), Breast invasive carcinoma (BRCA) and Colon adenocarcinoma (COAD). By analyzing several pairs of highly correlated genes after filtering and clustering work, we found that the co expressed genes across multiple types of cancers point to particular biological mechanisms related to cancer cell progression , suggesting that they represent important attributes of cancer in need of being elucidated for potential applications in diagnostic, prognostic and therapeutic products applicable to multiple cancer types.
[ 3 ]
cs.CL
A Morpho Syntactically Informed LSTM CRF Model for Named Entity Recognition. We propose a morphologically informed model for named entity recognition, which is based on LSTM CRF architecture and combines word embeddings, Bi LSTM character embeddings, part of speech (POS) tags, and morphological information. While previous work has focused on learning from raw word input, using word and character embeddings only, we show that for morphologically rich languages, such as Bulgarian, access to POS information contributes more to the performance gains than the detailed morphological information. Thus, we show that named entity recognition needs only coarse grained POS tags, but at the same time it can benefit from simultaneously using some POS information of different granularity. Our evaluation results over a standard dataset show sizable improvements over the state of the art for Bulgarian NER.
[ 25, 74, 23 ]
math.OA math.FA math.PR
Hunt's Formula for SU q(N) and U q(N) . We provide a Hunt type formula for the infinitesimal generators of L 'evy process on the quantum groups SU q(N) and U q(N) . In particular, we obtain a decomposition of such generators into a gaussian part and a jump type' part determined by a linear functional that resembles the functional induced by the L 'evy measure. The jump part on SU q(N) decomposes further into parts that live on the quantum subgroups SU q(n) , n le N . Like in the classical Hunt formula for locally compact Lie groups, the ingredients become unique once a certain projection is chosen. There are analogous result for U q(N) .
[ 0 ]
cs.CV
Transformer Encoder Detector Module Using Context to Improve Robustness to Adversarial Attacks on Object Detection. Deep neural network approaches have demonstrated high performance in object recognition (CNN) and detection (Faster RCNN) tasks, but experiments have shown that such architectures are vulnerable to adversarial attacks (FFF, UAP) low amplitude perturbations, barely perceptible by the human eye, can lead to a drastic reduction in labeling performance. This article proposes a new context module, called textit Transformer Encoder Detector Module , that can be applied to an object detector to (i) improve the labeling of object instances and (ii) improve the detector's robustness to adversarial attacks. The proposed model achieves higher mAP, F1 scores and AUC average score of up to 13 compared to the baseline Faster RCNN detector, and an mAP score 8 points higher on images subjected to FFF or UAP attacks due to the inclusion of both contextual and visual features extracted from scene and encoded into the model. The result demonstrates that a simple ad hoc context module can improve the reliability of object detectors significantly.
[ 20 ]
math.NA cs.NA
A hierarchical approach to the a posteriori error estimation of isogeometric Kirchhoff plates and Kirchhoff Love shells. This work focuses on the development of a posteriori error estimates for fourth order, elliptic, partial differential equations. In particular, we propose a novel algorithm to steer an adaptive simulation in the context of Kirchhoff plates and Kirchhoff Love shells by exploiting the local refinement capabilities of hierarchical B splines. The method is based on the solution of an auxiliary residual like variational problem, formulated by means of a space of localized spline functions. This space is characterized by C 1 continuous B splines with compact support on each active element of the hierarchical mesh. We demonstrate the applicability of the proposed estimator to Kirchhoff plates and Kirchhoff Love shells by studying several benchmark problems which exhibit both smooth and singular solutions. In all cases, we obtain optimal asymptotic rates of convergence for the error measured in the energy norm and an excellent approximation of the true error.
[ 9, 42 ]
math.DG math.AP
Asymptotic expansions of solutions of the Yamabe equation and the sigma k Yamabe equation near isolated singular points. We study asymptotic behaviors of positive solutions to the Yamabe equation and the sigma k Yamabe equation near isolated singular points and establish expansions up to arbitrary orders. Such results generalize an earlier pioneering work by Caffarelli, Gidas, and Spruck, and a work by Korevaar, Mazzeo, Pacard, and Schoen, on the Yamabe equation, and a work by Han, Li, and Teixeira on the sigma k Yamabe equation. The study is based on a combination of classification of global singular solutions and an analysis of linearized operators at these global singular solutions. Such linearized equations are uniformly elliptic near singular points for 1 leq k leq n 2 and become degenerate for n 2 k leq n . In a significant portion of the paper, we establish a degree 1 expansion for the sigma k Yamabe equation for n 2 k n , generalizing a similar result for k 1 by Korevaar, Mazzeo, Pacard, and Schoen and for 2 leq k leq n 2 by Han, Li, and Teixeira.
[ 65, 1 ]
cs.NI cs.LG
ConfigTron Tackling network diversity with heterogeneous configurations. The web serving protocol stack is constantly changing and evolving to tackle technological shifts in networking infrastructure and website complexity. As a result of this evolution, the web serving stack includes a plethora of protocols and configuration parameters that enable the web serving stack to address a variety of realistic network conditions. Yet, today, most content providers have adopted a "one size fits all" approach to configuring the networking stack of their user facing web servers (or at best employ moderate tuning), despite the significant diversity in end user networks and devices. In this paper, we revisit this problem and ask a more fundamental question Are there benefits to tuning the network stack? If so, what system design choices and algorithmic ensembles are required to enable modern content provider to dynamically and flexibly tune their protocol stacks. We demonstrate through substantial empirical evidence that this "one size fits all" approach results in sub optimal performance and argue for a novel framework that extends existing CDN architectures to provide programmatic control over the configuration options of the CDN serving stack. We designed ConfigTron a data driven framework that leverages data from all connections to identify their network characteristics and learn the optimal configuration parameters to improve end user performance. ConfigTron uses contextual multi arm bandit based learning algorithm to find optimal configurations in minimal time, enabling a content providers to systematically explore heterogeneous configurations while improving end user page load time by as much as 19 (upto 750ms) on median.
[ 1, 30 ]
q-fin.ST cs.LG
Feature Engineering for Mid Price Prediction with Deep Learning. Mid price movement prediction based on limit order book (LOB) data is a challenging task due to the complexity and dynamics of the LOB. So far, there have been very limited attempts for extracting relevant features based on LOB data. In this paper, we address this problem by designing a new set of handcrafted features and performing an extensive experimental evaluation on both liquid and illiquid stocks. More specifically, we implement a new set of econometrical features that capture statistical properties of the underlying securities for the task of mid price prediction. Moreover, we develop a new experimental protocol for online learning that treats the task as a multi objective optimization problem and predicts i) the direction of the next price movement and ii) the number of order book events that occur until the change takes place. In order to predict the mid price movement, the features are fed into nine different deep learning models based on multi layer perceptrons (MLP), convolutional neural networks (CNN) and long short term memory (LSTM) neural networks. The performance of the proposed method is then evaluated on liquid and illiquid stocks, which are based on TotalView ITCH US and Nordic stocks, respectively. For some stocks, results suggest that the correct choice of a feature set and a model can lead to the successful prediction of how long it takes to have a stock price movement.
[ 38 ]
math.NT
On quadratic approximation for hyperquadratic continued fractions. We study quadratic approximations for two families of hyperquadratic continued fractions in the field of Laurent series over a finite field. As the first application, we give the answer to a question of the second author concerning Diophantine exponents for algebraic Laurent series. As the second application, we determine the degrees of these families in particular case.
[ 17, 2 ]
cs.AI cs.DC
GPU based parallelism for ASP solving. Answer Set Programming (ASP) has become, the paradigm of choice in the field of logic programming and non monotonic reasoning. Thanks to the availability of efficient solvers, ASP has been successfully employed in a large number of application domains. The term GPU computing indicates a recent programming paradigm aimed at enabling the use of modern parallel Graphical Processing Units (GPUs) for general purpose computing. In this paper we describe an approach to ASP solving that exploits GPU parallelism. The design of a GPU based solver poses various challenges due to the peculiarities of GPUs' software and hardware architectures and to the intrinsic nature of the satisfiability problem.
[ 32, 17 ]
cs.DC cs.DS
An O( log 3 2 n) Parallel Time Population Protocol for Majority with O( log n) States. In population protocols, the underlying distributed network consists of n nodes (or agents), denoted by V , and a scheduler that continuously selects uniformly random pairs of nodes to interact. When two nodes interact, their states are updated by applying a state transition function that depends only on the states of the two nodes prior to the interaction. The efficiency of a population protocol is measured in terms of both time (which is the number of interactions until the nodes collectively have a valid output) and the number of possible states of nodes used by the protocol. By convention, we consider the parallel time cost, which is the time divided by n . In this paper we consider the majority problem, where each node receives as input a color that is either black or white, and the goal is to have all of the nodes output the color that is the majority of the input colors. We design a population protocol that solves the majority problem in O( log 3 2 n) parallel time, both with high probability and in expectation, while using O( log n) states. Our protocol improves on a recent protocol of Berenbrink et al. that runs in O( log 5 3 n) parallel time, both with high probability and in expectation, using O( log n) states.
[ 13, 71 ]
math.SG math.DS
Dynamical convexity and closed orbits on symmetric spheres. The main theme of this paper is the dynamics of Reeb flows with symmetries on the standard contact sphere. We introduce the notion of strong dynamical convexity for contact forms invariant under a group action, supporting the standard contact structure, and prove that in dimension 2n 1 any such contact form satisfying a condition slightly weaker than strong dynamical convexity has at least n 1 simple closed Reeb orbits. For contact forms with antipodal symmetry, we prove that strong dynamical convexity is a consequence of ordinary convexity. In dimension five or greater, we construct examples of antipodally symmetric dynamically convex contact forms which are not strongly dynamically convex, and thus not contactomorphic to convex ones via a contactomorphism commuting with the antipodal map. Finally, we relax this condition on the contactomorphism furnishing a condition that has non empty C 1 interior.
[ 21 ]
math.CO
Symmetric contact systems of segments, pseudotriangulations and inductive constructions for corresponding surface graphs. We characterise the quotient surface graphs arising from symmetric contact systems of line segments in the plane and also from symmetric pointed pseudotriangulations in the case where the group of symmetries is generated by a translation or a rotation of finite order. These results generalise well known results of Thomassen, in the case of line segments, and of Streinu and Haas et al., in the case of pseudotriangulations. Our main tool is a new inductive characterisation of the appropriate classes of surface graphs. We also discuss some consequences of our results in the area of geometric rigidity theory.
[ 49 ]
math.OC
Abstraction based branch and bound approach to Q learning for hybrid optimal control. In this paper, we design a theoretical framework allowing to apply model predictive control on hybrid systems. For this, we develop a theory of approximate dynamic programming by leveraging the concept of alternating simulation. We show how to combine these notions in a branch and bound algorithm that can further refine the Q functions using Lagrangian duality. We illustrate the approach on a numerical example.
[ 1, 2, 3, 4 ]
cs.CL cs.AI cs.LG cs.NE
NUIG Shubhanker Dravidian CodeMix FIRE2020 Sentiment Analysis of Code Mixed Dravidian text using XLNet. Social media has penetrated into multilingual societies, however most of them use English to be a preferred language for communication. So it looks natural for them to mix their cultural language with English during conversations resulting in abundance of multilingual data, call this code mixed data, available in todays' world.Downstream NLP tasks using such data is challenging due to the semantic nature of it being spread across multiple languages.One such Natural Language Processing task is sentiment analysis, for this we use an auto regressive XLNet model to perform sentiment analysis on code mixed Tamil English and Malayalam English datasets.
[ 34, 23 ]
math.CV math.FA
Bergman projections induced by doubling weights on the unit ball of Cn. The boundedness of P omega L infty( mathbb B ) to mathcal B ( mathbb B ) and P omega(P omega ) L p( mathbb B , upsilon dV) to L p( mathbb B , upsilon dV) on the unit ball of mathbb C n with p 1 and omega, upsilon in mathcal D are investigated in this paper.
[ 41 ]
cs.RO
Toward Asymptotically Optimal Inspection Planning via Efficient Near Optimal Graph Search. Inspection planning, the task of planning motions that allow a robot to inspect a set of points of interest, has applications in domains such as industrial, field, and medical robotics. Inspection planning can be computationally challenging, as the search space over motion plans that inspect the points of interest grows exponentially with the number of inspected points. We propose a novel method, Incremental Random Inspection roadmap Search (IRIS), that computes inspection plans whose length and set of inspected points asymptotically converge to those of an optimal inspection plan. IRIS incrementally densifies a motion planning roadmap using sampling based algorithms, and performs efficient near optimal graph search over the resulting roadmap as it is generated. We demonstrate IRIS's efficacy on a simulated planar 5DOF manipulator inspection task and on a medical endoscopic inspection task for a continuum parallel surgical robot in anatomy segmented from patient CT data. We show that IRIS computes higher quality inspection paths orders of magnitudes faster than a prior state of the art method.
[ 1, 2, 3 ]
cs.CL cs.AI cs.LG
Neural Machine Translation with Monte Carlo Tree Search. Recent algorithms in machine translation have included a value network to assist the policy network when deciding which word to output at each step of the translation. The addition of a value network helps the algorithm perform better on evaluation metrics like the BLEU score. After training the policy and value networks in a supervised setting, the policy and value networks can be jointly improved through common actor critic methods. The main idea of our project is to instead leverage Monte Carlo Tree Search (MCTS) to search for good output words with guidance from a combined policy and value network architecture in a similar fashion as AlphaZero. This network serves both as a local and a global look ahead reference that uses the result of the search to improve itself. Experiments using the IWLST14 German to English translation dataset show that our method outperforms the actor critic methods used in recent machine translation papers.
[ 75, 46, 47 ]
math.KT math.AG math.AT
The zeroth P 1 stable homotopy sheaf of a motivic space. We establish a kind of "degree zero Freudenthal Gm suspension theorem" in motivic homotopy theory. From this we deduce results about the conservativity of the P 1 stabilization functor. In order to establish these results, we show how to compute certain pullbacks in the cohomology of a strictly homotopy invariant sheaf in terms of the Rost Schmid complex. This establishes the main conjecture of BY18 , which easily implies the aforementioned results.
[ 13 ]
math.DS
On The Entropy of Continuous Flows With Uniformly Expansive Points and The Globalness of Shadowable Points With Gaps. In this work we study the problem of positiveness of topological entropy for flows using pointwise dynamics. We show that the existence of a non periodic nonwandering point of an expansive and non singular flow with shadowing is a sufficient condition to to obtain positive topological entropy. Moreover, we can deal with flows with singularities, showing that the existence of a non wandering, non critical, strongly shadowable, and uniform expansive point implies the existence of a symbolic subshift. Finally, we discuss pointwise versions of some shadowing type properties.
[ 35 ]
math.RA
A note on generic Clifford algebras of binary cubic forms. We study the representation theoretic results of the binary cubic generic Clifford algebra mathcal C , which is an Artin Schelter regular algebra of global dimension five. In particular, we show that mathcal C is a PI algebra of PI degree three and compute its point variety and discriminant ideals. As a consequence, we give a necessary and sufficient condition on a binary cubic form f for the associated Clifford algebra mathcal C f to be an Azumaya algebra.
[ 8 ]
physics.optics
Relativistic aberration and null Doppler shift within the framework of superluminal and subluminal nondiffracting waves. The relativistic aberration of a wavevector and the corresponding Doppler shift are examined in connection with superluminal and subluminal spatiotemporally localized pulsed optical waves. The requirement of a null Doppler shift is shown to give rise to a speed associated with the relativistic velocity composition law of a double (two step) Lorentz transformation. The effects of such a transformation are examined both in terms of four coordinates and in the spectral domain. It is established that a subluminal pulse reverses its direction. In addition to a change in direction, the propagation term of a superluminal pulse becomes negative. The aberration due to a double Lorentz transformation is examined in detail for propagation invariant superluminal waves (X wave, Bessel X wave), as well as intensity invariant superluminal and subluminal waves. Detailed symmetry considerations are provided for the superluminal focus X wave and the subluminal MacKinnon wavepacket.
[ 49, 19 ]
math.OC cs.CR
An optimization problem for continuous submodular functions. Real continuous submodular functions, as a generalization of the corresponding discrete notion to the continuous domain, gained considerable attention recently. The analog notion for entropy functions requires additional properties a real function defined on the non negative orthant of mathbb R n is entropy like (EL) if it is submodular, takes zero at zero, non decreasing, and has the Diminishing Returns property. Motivated by problems concerning the Shannon complexity of multipartite secret sharing, a special case of the following general optimization problem is considered find the minimal cost of those EL functions which satisfy certain constraints. In our special case the cost of an EL function is the maximal value of the n partial derivatives at zero. Another possibility could be the supremum of the function range. The constraints are specified by a smooth bounded surface S cutting off a downward closed subset. An EL function is feasible if at the internal points of S the left and right partial derivatives of the function differ by at least one. A general lower bound for the minimal cost is given in terms of the normals of the surface S . The bound is tight when S is linear. In the two dimensional case the same bound is tight for convex or concave S . It is shown that the optimal EL function is not necessarily unique. The paper concludes with several open problems.
[ 24 ]
math.MG
On semiconvex sets in the plane. The present work considers the properties of classes of generally convex sets in the plane known as 1 semiconvex and weakly 1 semiconvex. More specifically, the examples of open and closed weakly 1 semiconvex but non 1 semiconvex sets with smooth boundary in the plane are constructed. It is proved that such sets consist of minimum four connected components. In addition, the example of closed, weakly 1 semiconvex, and non 1 semiconvex set in the plane consisting of three connected components is constructed. It is proved that such a number of components is minimal for any closed, weakly 1 semiconvex, and non 1 semiconvex set in the plane.
[ 1 ]
cs.LG
A Metric for Linear Symmetry Based Disentanglement. The definition of Linear Symmetry Based Disentanglement (LSBD) proposed by (Higgins et al., 2018) outlines the properties that should characterize a disentangled representation that captures the symmetries of data. However, it is not clear how to measure the degree to which a data representation fulfills these properties. We propose a metric for the evaluation of the level of LSBD that a data representation achieves. We provide a practical method to evaluate this metric and use it to evaluate the disentanglement of the data representations obtained for three datasets with underlying SO(2) symmetries.
[ 64 ]
physics.soc-ph
Random hyperbolic graphs in d 1 dimensions. We generalize random hyperbolic graphs to arbitrary dimensionality. We find the rescaling of network parameters that allows to reduce random hyperbolic graphs of arbitrary dimensionality to a single mathematical framework. Our results indicate that RHGs exhibit similar topological properties, regardless of the dimensionality of their latent hyperbolic spaces.
[ 42 ]
math.DG
Metallic structures on the tangent bundle of a P Sasakian manifold. In this article, we introduce some metallic structures on the tangent bundle of a P Sasakian manifold by complete lift, horizontal lift and vertical lift of a P Sasakian structure ( phi, eta, xi) on tangent bundle. Then we investigate the integrability and parallelity of these metallic structures.
[ 58 ]
q-bio.NC
The NonHuman Primate Neuroimaging Neuroanatomy Project. Multi modal neuroimaging projects are advancing our understanding of human brain architecture, function, connectivity using high quality non invasive data from many subjects. However, ground truth validation of connectivity using invasive tracers is not feasible in humans. Our NonHuman Primate Neuroimaging Neuroanatomy Project (NHP NNP) is an international effort (6 laboratories in 5 countries) to (i) acquire and analyze high quality multi modal brain imaging data of macaque and marmoset monkeys using protocols and methods adapted from the HCP (ii) acquire quantitative invasive tract tracing data for cortical and subcortical projections to cortical areas and (iii) map the distributions of different brain cell types with immunocytochemical stains to better define brain areal boundaries. We are acquiring high resolution structural, functional, and diffusion MRI data together with behavioral measures from over 100 individual macaques and marmosets in order to generate non invasive measures of brain architecture such as myelin and cortical thickness maps, as well as functional and diffusion tractography based connectomes. We are using classical and next generation anatomical tracers to generate quantitative connectivity maps based on brain wide counting of labeled cortical and subcortical neurons, providing ground truth measures of connectivity. Advanced statistical modeling techniques address the consistency of both kinds of data across individuals, allowing comparison of tracer based and non invasive MRI based connectivity measures. We aim to develop improved cortical and subcortical areal atlases by combining histological and imaging methods. Finally, we are collecting genetic and sociality associated behavioral data in all animals in an effort to understand how genetic variation shapes the connectome and behavior.
[ 47 ]
math.AT
A v 1 banded vanishing line for the mod 2 Moore spectrum. The mod 2 Moore spectrum C(2) is the cofiber of the self map 2 mathbb S to mathbb S . Building on work of Burklund, Hahn, and Senger, we prove that above a line of slope frac 1 5 , the Adams spectral sequence for C(2) collapses at its E 5 page and characterize the surviving classes. This completes the proof of a result of Mahowald, announced in 1970, but never proven.
[ 9 ]
math.AP
Positive multi peak solutions for a logarithmic Schrodinger equation. In this manuscript, we consider the logarithmic Schr " o dinger equation begin eqnarray varepsilon 2 Delta u V(x)u u log u 2 , , , ,u 0, text in , , , mathbb R N , end eqnarray where N geq3 , varepsilon 0 is a small parameter. Under some assumptions on V(x) , we show the existence of positive multi peak solutions by Lyapunov Schmidt reduction. It seems to be the first time to study singularly perturbed logarithmic Schr " o dinger problem by reduction. And here using a new norm is the crucial technique to overcome the difficulty caused by the logarithmic nonlinearity. At the same time, we consider the local uniqueness of the multi peak solutions by using a type of local Pohozaev identities.
[ 34 ]
math.CV
A general coefficient theorem for univalent functions. Using the Bers isomorphism theorem for Teichmuller spaces of punctured Riemann surfaces and some of their other complex geometric features, we prove a general theorem on maximization of homogeneous polynomial (in fact, more general holomorphic) coefficient functionals J(f) J(a m 1 , a m 2 , dots, a m n ) on some classes of univalent functions in the unit disk naturally connected with the canonical class S . The given functional J is lifted to the Teichmuller space mathbf T 1 of the punctured disk mathbb D 0 z 1 which is biholomorphically equivalent to the Bers fiber space over the universal Teichmuller space. This generates a positive subharmonic function on the disk t 4 with sup t 4 u(t) max mathbf T 1 J attaining this maximal value only on the boundary circle, which correspond to rotations of the Koebe function. This theorem implies new sharp distortion estimates for univalent functions giving explicitly the extremal functions, and creates a new bridge between Teichm " u ller space theory and geometric complex analysis. In particular, it provides an alternate and direct proof of the Bieberbach conjecture.
[ 94 ]
physics.ed-ph
Investigating student understanding of heat engine a case study of Stirling engine. We report on the study of student difficulties regarding heat engine in the context of Stirling cycle within upper division undergraduate thermal physics course. An in class test about a Stirling engine with a regenerator was taken by three classes, and the students were asked to perform one of the most basic activities calculate the efficiency of the heat engine. Our data suggest that quite a few students have not developed a robust conceptual understanding of basic engineering knowledge of the heat engine, including the function of the regenerator and the influence of piston movements on the heat and work involved in the engine. Most notably, although the science error ratios of the three classes were similar ( sim 10 ), the engineering error ratios of the three classes were high (above 50 ), and the class that was given a simple tutorial of engineering knowledge of heat engine exhibited significantly smaller engineering error ratio by about 20 than the other two classes. In addition, both the written answers and post test interviews show that most of the students can only associate Carnot's theorem with Carnot cycle, but not with other reversible cycles working between two heat reservoirs, probably because no enough cycles except Carnot cycle were covered in the traditional Thermodynamics textbook. Our results suggest that both scientific and engineering knowledge are important and should be included in instructional approaches, especially in the Thermodynamics course taught in the countries and regions with a tradition of not paying much attention to experimental education or engineering training.
[ 29, 21, 47 ]
math.CO math.AT math.GR
On PM mapping class monoids. In this paper, we introduce PM mapping class monoids. Braid groups and mapping class groups have many features in common. Similarly to the notion of braid PM monoid, PM mapping class monoid is defined. This construction is an analogy of inverse mapping class monoid defined by R. Karoui and V. V. Vershinin. As the main result, we give the analog of the Dehn Nilsen Baer theorem.
[ 2, 52, 22 ]
cs.SE cs.AI cs.MA
Semantic Web Environments for Multi Agent Systems Enabling agents to use Web of Things via semantic web. The Web is ubiquitous, increasingly populated with interconnected data, services, people, and objects. Semantic web technologies (SWT) promote uniformity of data formats, as well as modularization and reuse of specifications (e.g., ontologies), by allowing them to include and refer to information provided by other ontologies. In such a context, multi agent system (MAS) technologies are the right abstraction for developing decentralized and open Web applications in which agents discover, reason and act on Web resources and cooperate with each other and with people. The aim of the project is to propose an approach to transform "Agent and artifact (A A) meta model" into a Web readable format with ontologies in line with semantic web formats and to reuse already existing ontologies in order to provide uniform access for agents to things.
[ 0 ]
cs.CV
Multi Spectral Facial Biometrics in Access Control. This study demonstrates how facial biometrics, acquired using multi spectral sensors, such as RGB, depth, and infrared, assist the data accumulation in the process of authorizing users of automated and semi automated access systems. This data serves the purposes of person authentication, as well as facial temperature estimation. We utilize depth data taken using an inexpensive RGB D sensor to find the head pose of a subject. This allows the selection of video frames containing a frontal view head pose for face recognition and face temperature reading. Usage of the frontal view frames improves the efficiency of face recognition while the corresponding synchronized IR video frames allow for more efficient temperature estimation for facial regions of interest. In addition, this study reports emerging applications of biometrics in biomedical and health care solutions. Including surveys of recent pilot projects, involving new sensors of biometric data and new applications of human physiological and behavioral biometrics. It also shows the new and promising horizons of using biometrics in natural and contactless control interfaces for surgical control, rehabilitation and accessibility.
[ 35, 27 ]
math.CT math.RA
A characterization of weakly Schreier extensions of monoids. A split extension of monoids with kernel k colon N to G , cokernel e colon G to H and splitting s colon H to G is Schreier if there exists a unique set theoretic map q colon G to N such that for all g in G , g kq(g) cdot se(g) . Schreier extensions have a complete characterization and have been shown to correspond to monoid actions of H on N . If the uniqueness requirement of q is relaxed, the resulting split extension is called weakly Schreier. A natural example of these is the Artin glueings of frames. In this paper we provide a complete characterization of the weakly Schreier extensions of H by N , proving them to be equivalent to certain quotients of N times H paired with a function that behaves like an action with respect to the quotient. Furthermore, we demonstrate the failure of the split short lemma in this setting and provide a full characterization of the morphisms that occur between weakly Schreier extensions. Finally, we use the characterization to construct some classes of examples of weakly Schreier extensions.
[ 68 ]
cs.DM
Cubic spline approximation of the reliability polynomials of two dual hammock networks. The property of preserving the convexity and concavity of the Bernstein polynomial and of the B ' e zier curves is used to generate a method of approximating the reliability polynomial of a hammock network. The mutual behaviour of the reliability polynomials of two dual hammock networks is used to generate a system of constraints since the initial information is not enough for using a classical approximation scheme. A cubic spline function is constructed to generate approximations of the coefficients of the two reliability polynomials. As consequence, an approximation algorithm is described and tested through simulations on hammocks with known reliability, comparing the results with the results of approximations attempts from literature.
[ 17 ]
cs.DC
TRIX Low Skew Pulse Propagation for Fault Tolerant Hardware. The vast majority of hardware architectures use a carefully timed reference signal to clock their computational logic. However, standard distribution solutions are not fault tolerant. In this work, we present a simple grid structure as a more reliable clock propagation method and study it by means of simulation experiments. Fault tolerance is achieved by forwarding clock pulses on arrival of the second of three incoming signals from the previous layer. A key question is how well neighboring grid nodes are synchronized, even without faults. Analyzing the clock skew under typical case conditions is highly challenging. Because the forwarding mechanism involves taking the median, standard probabilistic tools fail, even when modeling link delays just by unbiased coin flips. Our statistical approach provides substantial evidence that this system performs surprisingly well. Specifically, in an "infinitely wide" grid of height H , the delay at a pre selected node exhibits a standard deviation of O(H 1 4 ) ( approx 2.7 link delay uncertainties for H 2000 ) and skew between adjacent nodes of o( log log H) ( approx 0.77 link delay uncertainties for H 2000 ). We conclude that the proposed system is a very promising clock distribution method. This leads to the open problem of a stochastic explanation of the tight concentration of delays and skews. More generally, we believe that understanding our very simple abstraction of the system is of mathematical interest in its own right.
[ 35, 38 ]
math.NT math.RA
On parameters of orders of quartic fields and essential pairs extended version. Classes of pairs of ternary quadratic forms parametrize quartic rings by a result of Bhargava. We give an algorithm for finding a pair of ternary quadratic forms that parametrize a given order of a quartic field. We examine a new technique, essential pairs, for obtaining parameters of orders of quartic fields from a number field database. Essential pairs for maximal orders of quartic fields are very common and provide a simple means of obtaining an integral basis for the ring of integers.
[ 19 ]
cs.CR
Another Look at ALGORAND. ALGORAND is a celebrated public ledger technology. In this paper, we identify several design flaws of the ALGORAND protocol. In particular, we show that the claimed (proved) fork free property is not true and several assumptions in ALGORAND are not realistic in practice. The ALGORAND wiki page https golden.com wiki Algorand claims that "the probability of a fork in the protocol is estimated at 1 1,000,000,000 and therefore blocks can be considered final upon validation". However, our first attack in this paper shows that a malicious adversary who controls less than 1 3 of the users (or money units) could fork the ALGORAND chain very easily. Our second attack shows that a malicious adversary could use a bribery attack to fork the ALGORAND chain very easily also. Furthermore, we show that the celebrated Byzantine Agreement component in ALGORAND is not necessary. The Byzantine Agreement is the most expensive part and one of the most innovative parts in the ALGORAND protocol. It is used to avoid forks in ALGORAND. We show that a simple majority vote could be used to achieve the same property that Byzantine Agreement achieves in ALGORAND under the same network assumption.
[ 9, 34 ]
math.CV math.AP
Bounds on the growth of subharmonic frequently oscillating functions. We present a Phragm 'en Lindel "of type theorem with a flavor of Nevanlinna's theorem for subharmonic functions with frequent oscillations between zero and one. We use a technique inspired by a paper of Jones and Makarov.
[ 36 ]
physics.chem-ph
Getting the Right Twist Influence of Donor Acceptor Dihedral Angle on Exciton Kinetics and Singlet Triplet Gap in Deep Blue Thermally Activated Delayed Fluorescence Emitter. Here, a novel deep blue emitter SBABz4 for use in organic light emitting diodes (OLED) is investigated. The molecular design of the emitter enables thermally activated delayed fluorescence (TADF), which we examine by temperature dependent time resolved electroluminescence (trEL) and photoluminescence (trPL). We show that the dihedral angle between donor and acceptor strongly affects the oscillator strength of the charge transfer state alongside the singlet triplet gap. The angular dependence of the singlet triplet gap is calculated by time dependent density functional theory (TD DFT). A gap of 15 meV is calculated for the relaxed ground state configuration of SBABz4 with a dihedral angle between the donor and acceptor moieties of 86 deg . Surprisingly, an experimentally obtained energy gap of 72 5 meV can only be explained by torsion angles in the range of 70 deg 75 deg . Molecular dynamics (MD) simulations showed that SBABz4 evaporated at high temperature acquires a distribution of torsion angles, which immediately leads to the experimentally obtained energy gap. Moreover, the emitter orientation anisotropy in a host matrix shows an 80 ratio of horizontally oriented dipoles, which is highly desirable for efficient light outcoupling. Understanding intramolecular donor acceptor geometry in evaporated films is crucial for OLED applications, because it affects oscillator strength and TADF efficiency.
[ 28 ]
cs.CG
Minimum Cuts in Geometric Intersection Graphs. Let mathcal D be a set of n disks in the plane. The disk graph G mathcal D for mathcal D is the undirected graph with vertex set mathcal D in which two disks are joined by an edge if and only if they intersect. The directed transmission graph G rightarrow mathcal D for mathcal D is the directed graph with vertex set mathcal D in which there is an edge from a disk D 1 in mathcal D to a disk D 2 in mathcal D if and only if D 1 contains the center of D 2 . Given mathcal D and two non intersecting disks s, t in mathcal D , we show that a minimum s t vertex cut in G mathcal D or in G rightarrow mathcal D can be found in O(n 3 2 text polylog n) expected time. To obtain our result, we combine an algorithm for the maximum flow problem in general graphs with dynamic geometric data structures to manipulate the disks. As an application, we consider the barrier resilience problem in a rectangular domain. In this problem, we have a vertical strip S bounded by two vertical lines, L ell and L r , and a collection mathcal D of disks. Let a be a point in S above all disks of mathcal D , and let b a point in S below all disks of mathcal D . The task is to find a curve from a to b that lies in S and that intersects as few disks of mathcal D as possible. Using our improved algorithm for minimum cuts in disk graphs, we can solve the barrier resilience problem in O(n 3 2 text polylog n) expected time.
[ 2, 3, 39 ]
cs.CL cs.AI cs.CY
Persuasion for Good Towards a Personalized Persuasive Dialogue System for Social Good. Developing intelligent persuasive conversational agents to change people's opinions and actions for social good is the frontier in advancing the ethical development of automated dialogue systems. To do so, the first step is to understand the intricate organization of strategic disclosures and appeals employed in human persuasion conversations. We designed an online persuasion task where one participant was asked to persuade the other to donate to a specific charity. We collected a large dataset with 1,017 dialogues and annotated emerging persuasion strategies from a subset. Based on the annotation, we built a baseline classifier with context information and sentence level features to predict the 10 persuasion strategies used in the corpus. Furthermore, to develop an understanding of personalized persuasion processes, we analyzed the relationships between individuals' demographic and psychological backgrounds including personality, morality, value systems, and their willingness for donation. Then, we analyzed which types of persuasion strategies led to a greater amount of donation depending on the individuals' personal backgrounds. This work lays the ground for developing a personalized persuasive dialogue system.
[ 1, 3 ]
cs.CL cs.LG
VCDM Leveraging Variational Bi encoding and Deep Contextualized Word Representations for Improved Definition Modeling. In this paper, we tackle the task of definition modeling, where the goal is to learn to generate definitions of words and phrases. Existing approaches for this task are discriminative, combining distributional and lexical semantics in an implicit rather than direct way. To tackle this issue we propose a generative model for the task, introducing a continuous latent variable to explicitly model the underlying relationship between a phrase used within a context and its definition. We rely on variational inference for estimation and leverage contextualized word embeddings for improved performance. Our approach is evaluated on four existing challenging benchmarks with the addition of two new datasets, "Cambridge" and the first non English corpus "Robert", which we release to complement our empirical study. Our Variational Contextual Definition Modeler (VCDM) achieves state of the art performance in terms of automatic and human evaluation metrics, demonstrating the effectiveness of our approach.
[ 9, 26, 76 ]
math.AP math.RT math.SP
Observability and Controllability for the Schr "o dinger Equation on Quotients of Groups of Heisenberg Type. We give necessary and sufficient conditions for the controllability of a Schr ''odinger equation involving the sub Laplacian of a nilmanifold obtained by taking the quotient of a group of Heisenberg type by one of its discrete sub groups.This class of nilpotent Lie groups is a major example of stratified Lie groups of step 2. The sub Laplacian involved in these Schr ''odinger equations is subelliptic, and, contrarily to what happens for the usual elliptic Schr ''odinger equation for example on flat tori or on negatively curved manifolds, there exists a minimal time of controllability. The main tools used in the proofs are (operator valued) semi classical measures constructed by use of representation theory and a notion of semi classical wave packets that we introduce here in the context of groups of Heisenberg type.
[ 0, 1, 2 ]
cs.CV cs.AI cs.LG
MGML Multi Granularity Multi Level Feature Ensemble Network for Remote Sensing Scene Classification. Remote sensing (RS) scene classification is a challenging task to predict scene categories of RS images. RS images have two main characters large intra class variance caused by large resolution variance and confusing information from large geographic covering area. To ease the negative influence from the above two characters. We propose a Multi granularity Multi Level Feature Ensemble Network (MGML FENet) to efficiently tackle RS scene classification task in this paper. Specifically, we propose Multi granularity Multi Level Feature Fusion Branch (MGML FFB) to extract multi granularity features in different levels of network by channel separate feature generator (CS FG). To avoid the interference from confusing information, we propose Multi granularity Multi Level Feature Ensemble Module (MGML FEM) which can provide diverse predictions by full channel feature generator (FC FG). Compared to previous methods, our proposed networks have ability to use structure information and abundant fine grained features. Furthermore, through ensemble learning method, our proposed MGML FENets can obtain more convincing final predictions. Extensive classification experiments on multiple RS datasets (AID, NWPU RESISC45, UC Merced and VGoogle) demonstrate that our proposed networks achieve better performance than previous state of the art (SOTA) networks. The visualization analysis also shows the good interpretability of MGML FENet.
[ 21 ]
math.CO
On strictly Deza graphs derived from the Berlekamp van Lint Seidel graph. In this paper, we find strictly Deza graphs that can be obtained from the Berlekamp van Lint Seidel graph by applying dual Seidel switching.
[ 32, 17, 68 ]
cs.DC cs.DM cs.DS
Singletons for Simpletons Revisiting Windowed Backoff using Chernoff Bounds. Backoff algorithms are used in many distributed systems where multiple devices contend for a shared resource. For the classic balls into bins problem, the number of singletons those bins with a single ball is important to the analysis of several backoff algorithms however, existing analyses employ advanced probabilistic tools to obtain concentration bounds. Here, we show that standard Chernoff bounds can be used instead, and the simplicity of this approach is illustrated by re analyzing some well known backoff algorithms.
[ 78 ]
math.AC
A class of multiplicative lattices. We study the multiplicative lattices L which satisfy the condition a (a (a b))(a b) for all a,b in L.
[ 19 ]
cs.CR
Beyond Cookie Monster Amnesia Real World Persistent Online Tracking. Browser fingerprinting is a relatively new method of uniquely identifying browsers that can be used to track web users. In some ways it is more privacy threatening than tracking via cookies, as users have no direct control over it. A number of authors have considered the wide variety of techniques that can be used to fingerprint browsers however, relatively little information is available on how widespread browser fingerprinting is, and what information is collected to create these fingerprints in the real world. To help address this gap, we crawled the 10,000 most popular websites this gave insights into the number of websites that are using the technique, which websites are collecting fingerprinting information, and exactly what information is being retrieved. We found that approximately 69 of websites are, potentially, involved in first party or third party browser fingerprinting. We further found that third party browser fingerprinting, which is potentially more privacy damaging, appears to be predominant in practice. We also describe textit FingerprintAlert , a freely available browser extension we developed that detects and, optionally, blocks fingerprinting attempts by visited websites.
[ 16, 64, 59 ]
q-bio.QM cs.SI physics.soc-ph
Generating a Heterosexual Bipartite Network Embedded in Social Network. We describe how to generate a heterosexual network with a prescribed joint degree distribution that is embedded in a prescribed large scale social contact network. The structure of a sexual network plays an important role in how sexually transmitted infections (STIs) spread. Generating an ensemble of networks that mimics the real world is crucial to evaluating robust mitigation strategies for controling STIs. Most of the current algorithms to generate sexual networks only use sexual activity data, such as the number of partners per month, to generate the sexual network. Real world sexual networks also depend on biased mixing based on age, location, and social and work activities. We describe an approach to use a broad range of social activity data to generate possible heterosexual networks. We start with a large scale simulation of thousands of people in a city as they go through their daily activities, including work, school, shopping, and activities at home. We extract a social network from these activities where the nodes are the people and the edges indicate a social interaction, such as working in the same location. This social network captures the correlations between people of different ages, living in different locations, their economic status, and other demographic factors. We use the social contact network to define a bipartite heterosexual network that is embedded within an extended social network. The resulting sexual network captures the biased mixing inherent in the social network, and models based on this pairing of networks can be used to investigate novel intervention strategies based on the social contacts of infected people. We illustrate the approach in a model for the spread of Chlamydia in the heterosexual network representing the young sexually active community in New Orleans.
[ 1, 2 ]
cs.LG cs.AI
Neural Online Graph Exploration. Can we learn how to explore unknown spaces efficiently? To answer this question, we study the problem of Online Graph Exploration, the online version of the Traveling Salesperson Problem. We reformulate graph exploration as a reinforcement learning problem and apply Direct Future Prediction (Dosovitskiy and Koltun, 2017) to solve it. As the graph is discovered online, the corresponding Markov Decision Process entails a dynamic state space, namely the observable graph and a dynamic action space, namely the nodes forming the graph's frontier. To the best of our knowledge, this is the first attempt to solve online graph exploration in a data driven way. We conduct experiments on six data sets of procedurally generated graphs and three real city road networks. We demonstrate that our agent can learn strategies superior to many well known graph traversal algorithms, confirming that exploration can be learned.
[ 21 ]
math.CO
On leaky forcing and resilience. A leak is a vertex that is not allowed to perform a force during the zero forcing process. Leaky forcing was recently introduced as a new variation of zero forcing in order to analyze how leaks in a network disrupt the zero forcing process. The ell leaky forcing number of a graph is the size of the smallest zero forcing set that can force a graph despite ell leaks. A graph G is ell resilient if its zero forcing number is the same as its ell leaky forcing number. In this paper, we analyze ell leaky forcing and show that if an ( ell 1) leaky forcing set B is robust enough, then B is an ell leaky forcing set. This provides the framework for characterizing ell leaky forcing sets. Furthermore, we consider structural implications of ell resilient graphs. We apply these results to bound the ell leaky forcing number of several graph families including trees, supertriangles, and grid graphs. In particular, we resolve a question posed by Dillman and Kenter concerning the upper bound on the 1 leaky forcing number of grid graphs.
[ 9 ]
math.AP
A mean value formula for the variational p Laplacian. We prove a new asymptotic mean value formula for the p Laplace operator, Delta p u text div ( nabla u p 2 nabla u), valid in the viscosity sense. In the plane, and for a certain range of p , the mean value formula holds in the pointwise sense. We also study the existence, uniqueness and convergence of the related dynamic programming principle.
[ 49 ]
math.OC
Navigation in Unknown Environments Using Safety Velocity Cones. We rely on Nagumo's invariance theorem to develop a new approach for navigation in unknown environments of arbitrary dimension. The idea consists in projecting the nominal velocities (that would drive the robot to the target in the absence of obstacles) onto Bouligand's tangent cones (referred to as the safety velocity cones) when the robot is close to the boundary of the free space. The proposed projection based controller is explicitly constructed to guarantee safety and convergence to a set of Lebesgue measure zero that contains the target. For specific free spaces such as Euclidean sphere worlds, the convergence to the target is guaranteed from almost all initial conditions in the free space. We provide a version of the controller (generating a continuous and piecewise smooth closed loop vector field) relying on the robot's current position and local range measurements (e.g., from LiDAR or stereo vision) without global prior knowledge about the environment.
[ 1, 39 ]
cs.CY cs.LG
Extending the Machine Learning Abstraction Boundary A Complex Systems Approach to Incorporate Societal Context. Machine learning (ML) fairness research tends to focus primarily on mathematically based interventions on often opaque algorithms or models and or their immediate inputs and outputs. Such oversimplified mathematical models abstract away the underlying societal context where ML models are conceived, developed, and ultimately deployed. As fairness itself is a socially constructed concept that originates from that societal context along with the model inputs and the models themselves, a lack of an in depth understanding of societal context can easily undermine the pursuit of ML fairness. In this paper, we outline three new tools to improve the comprehension, identification and representation of societal context. First, we propose a complex adaptive systems (CAS) based model and definition of societal context that will help researchers and product developers to expand the abstraction boundary of ML fairness work to include societal context. Second, we introduce collaborative causal theory formation (CCTF) as a key capability for establishing a sociotechnical frame that incorporates diverse mental models and associated causal theories in modeling the problem and solution space for ML based products. Finally, we identify community based system dynamics (CBSD) as a powerful, transparent and rigorous approach for practicing CCTF during all phases of the ML product development process. We conclude with a discussion of how these systems theoretic approaches to understand the societal context within which sociotechnical systems are embedded can improve the development of fair and inclusive ML based products.
[ 26, 21, 46 ]
math.CO math.AG math.RT
K theoretic crystals for set valued tableaux of rectangular shapes. In earlier work with C. Monical, we introduced the notion of a K crystal, with applications to K theoretic Schubert calculus and the study of Lascoux polynomials. We conjectured that such a K crystal structure existed on the set of semistandard set valued tableaux of any fixed rectangular shape. Here, we establish this conjecture by explicitly constructing the K crystal operators. As a consequence, we establish the first combinatorial formula for Lascoux polynomials L w lambda when lambda is a multiple of a fundamental weight as the sum over flagged set valued tableaux. Using this result, we then prove corresponding cases of conjectures of Ross Yong (2015) and Monical (2016) by constructing bijections with the respective combinatorial objects.
[ 29, 18, 13 ]
math.DS math.GR math.GT
Circle packings, kissing reflection groups and critically fixed anti rational maps. In this paper, we establish an explicit correspondence between kissing reflection groups and critically fixed anti rational maps. The correspondence, which is expressed using simple planar graphs, has several dynamical consequences. As an application of this correspondence, we give complete answers to geometric mating problems for critically fixed anti rational maps.
[ 9, 23 ]
math.AP math.FA
Tent space well posedness for parabolic Cauchy problems with rough coefficients. We study the well posedness of Cauchy problems on the upper half space mathbb R n 1 associated to higher order systems partial t u ( 1) m 1 mbox div m A nabla m u with bounded measurable and uniformly elliptic coefficients. We address initial data lying in L p ( 1 p infty ) and BMO ( p infty ) spaces and work with weak solutions. Our main result is the identification of a new well posedeness class, given for p in(1, infty by distributions satisfying nabla m u in T p,2 m , where T p,2 m is a parabolic version of the tent space of Coifman Meyer Stein. In the range p in 2, infty , this holds without any further constraints on the operator and for p infty it provides a Carleson measure characterization of BMO with non autonomous operators. We also prove higher order L p well posedness, previously only known for the case m 1 . The uniform L p boundedness of propagators of energy solutions plays an important role in the well podesness theory and we discover that such bounds hold for p close to 2 . This is a consequence of local weak solutions being locally H "older continuous with values in spatial L p loc for some p 2 , what is also new for the case m 1 .
[ 2 ]
cs.AI
Methods of ranking for aggregated fuzzy numbers from interval valued data. This paper primarily presents two methods of ranking aggregated fuzzy numbers from intervals using the Interval Agreement Approach (IAA). The two proposed ranking methods within this study contain the combination and application of previously proposed similarity measures, along with attributes novel to that of aggregated fuzzy numbers from interval valued data. The shortcomings of previous measures, along with the improvements of the proposed methods, are illustrated using both a synthetic and real world application. The real world application regards the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) algorithm, modified to include both the previous and newly proposed methods.
[ 68, 21 ]
cs.DM math.CO
Parametrised Algorithms for Directed Modular Width. Many well known NP hard algorithmic problems on directed graphs resist efficient parametrisations with most known width measures for directed graphs, such as directed treewidth, DAG width, Kelly width and many others. While these focus on measuring how close a digraph is to an oriented tree resp. a directed acyclic graph, in this paper, we investigate directed modular width as a parameter, which is closer to the concept of clique width. We investigate applications of modular decompositions of directed graphs to a wide range of algorithmic problems and derive FPT algorithms for several well known digraph specific NP hard problems, namely minimum (weight) directed feedback vertex set, minimum (weight) directed dominating set, digraph colouring, directed Hamiltonian path cycle, partitioning into paths, (capacitated) vertex disjoint directed paths, and the directed subgraph homeomorphism problem. The latter yields a polynomial time algorithm for detecting topological minors in digraphs of bounded directed modular width. Finally we illustrate that also other structural digraph parameters, such as the directed pathwidth and the cycle rank can be computed efficiently using directed modular width as a parameter.
[ 0, 1, 14 ]
cs.CV cs.HC cs.LG
Gaze Sensing LEDs for Head Mounted Displays. We introduce a new gaze tracker for Head Mounted Displays (HMDs). We modify two off the shelf HMDs to be gaze aware using Light Emitting Diodes (LEDs). Our key contribution is to exploit the sensing capability of LEDs to create low power gaze tracker for virtual reality (VR) applications. This yields a simple approach using minimal hardware to achieve good accuracy and low latency using light weight supervised Gaussian Process Regression (GPR) running on a mobile device. With our hardware, we show that Minkowski distance measure based GPR implementation outperforms the commonly used radial basis function based support vector regression (SVR) without the need to precisely determine free parameters. We show that our gaze estimation method does not require complex dimension reduction techniques, feature extraction, or distortion corrections due to off axis optical paths. We demonstrate two complete HMD prototypes with a sample eye tracked application, and report on a series of subjective tests using our prototypes.
[ 11 ]
physics.app-ph
Accessing MHz Operation at 2 V with Field Effect Transistors Based on Printed Polymers on Plastic. Organic printed electronics is proving its suitability for the development of wearable, lightweight, distributed applications in combination with cost effective production processes. Nonetheless, some necessary features for several envisioned disruptive mass produced products are still lacking among these radio frequency (RF) communication capability, which requires high operational speed combined with low supply voltage in electronic devices processed on cheap plastic foils. Here, we demonstrate that high frequency, low voltage, polymer field effect transistors can be fabricated on plastic with the sole use of a combination of scalable printing and digital laser based techniques. These devices reach an operational frequency in excess of 1 MHz at the challengingly low bias voltage of 2 V, and exceed 14 MHz operation at 7 V. In addition, when integrated into a rectifying circuit, they can provide a DC voltage at an input frequency of 13.56 MHz, opening the way for the implementation of RF devices and tags with cost effective production processes.
[ 14, 39 ]
cs.HC cs.CY
Using Experimental Vignettes to Study Early Stage Automation Adoption. When discussing the future of work and in detail the concerns of workers within and beyond established workplace settings, technology wise we act on rather new ground. Especially preserving a meaningful work environment gains new importance when introducing disruptive technologies. We sometimes do not even have the technology which effects we are willing to discuss. To measure implications for employees and thus create meaningful design variants we need to test systems and their effects before developing them. Confronted with the same problem we used the experimental vignette method to study the effects of AI use in work contexts. During the workshop, we will report our experiences.
[ 38, 15 ]
math.NT cs.IT math.IT
On functions with the maximal number of bent components. A function F mathbb F 2 n rightarrow mathbb F 2 n , n 2m , can have at most 2 n 2 m bent component functions. Trivial examples are obtained as F(x) (f 1(x), ldots,f m(x),a 1(x), ldots, a m(x)) , where tilde F (x) (f 1(x), ldots,f m(x)) is a vectorial bent function from mathbb F 2 n to mathbb F 2 m , and a i , 1 le i le m , are affine Boolean functions. A class of nontrivial examples is given in univariate form with the functions F(x) x 2 r rm Tr n m ( Lambda(x)) , where Lambda is a linearized permutation of mathbb F 2 m . In the first part of this article it is shown that plateaued functions with 2 n 2 m bent components can have nonlinearity at most 2 n 1 2 lfloor frac n m 2 rfloor , a bound which is attained by the example x 2 r rm Tr n m (x) , 1 le r m (Pott et al. 2018). This partially solves Question 5 in Pott et al. 2018. We then analyse the functions of the form x 2 r rm Tr n m ( Lambda(x)) . We show that for odd m , only x 2 r rm Tr n m (x) , 1 le r m , has maximal nonlinearity, whereas there are more of them for even m , of which we present one more infinite class explicitly. In detail, we investigate Walsh spectrum, differential spectrum and their relations for the functions x 2 r rm Tr n m ( Lambda(x)) . Our results indicate that this class contains many nontrivial EA equivalence classes of functions with the maximal number of bent components, if m is even, several with maximal possible nonlinearity.
[ 38 ]
math.NT
Short effective intervals containing primes in arithmetic progressions and the seven cubes problem. Let q ge 3 be a non exceptional modulus q ge3 , and let a be a positive integer coprime with q . For any epsilon 0 , there exists alpha 0 (computable), such that for all x ge alpha ( log q) 2 , the interval left e x,e x epsilon right contains a prime p in the arithmetic progression a bmod q . This gives the bound for the least prime in this arithmetic progression P(a,q) le e alpha ( log q) 2 . For instance for all q ge 10 30 , P(a,q) le e 4.401( log q) 2 . Finally, we apply this result to establish that every integer larger than e 71 ,000 is a sum of seven cubes.
[ 1, 2, 52 ]
cs.AI cs.LG cs.MA
Intelligent Coordination among Multiple Traffic Intersections Using Multi Agent Reinforcement Learning. We use Asynchronous Advantage Actor Critic (A3C) for implementing an AI agent in the controllers that optimize flow of traffic across a single intersection and then extend it to multiple intersections by considering a multi agent setting. We explore three different methodologies to address the multi agent problem (1) use of asynchronous property of A3C to control multiple intersections using a single agent (2) utilise self competitive play among independent agents across multiple intersections and (3) ingest a global reward function among agents to introduce cooperative behavior between intersections. We observe that (1) (2) leads to a reduction in traffic congestion. Additionally the use of (3) with (1) (2) led to a further reduction in congestion.
[ 49 ]
math.OC
Credible Interdiction for Transmission Systems. This paper presents novel formulations and algorithms for N k interdiction problem in transmission networks. In particular, it formulates spatial and topological resource constraints on attackers for N k interdiction problems and illustrates the formulation with two new classes of N k attacks (i) Spatial N k attacks where the attack is constrained by geographic distance of a bus chosen by an attacker and (ii) Topological N k attacks where the attack is constrained to connected components. These two specific types of N k attacks compute interdiction plans designed to better model localized attacks, such as those induced by natural disasters or physical attacks. We then formulate these two resource constrained interdiction problems as bilevel, max min optimization problems and present a novel constraint generation algorithm to solve these formulations. Detailed case studies analyzing the behavior of spatially and topologically resource constrained problems and comparing them to the traditional N k interdiction problem are also presented.
[ 41 ]
cs.RO
Control of Separable Subsystems with Application to Prostheses. Nonlinear control methodologies have successfully realized stable human like walking on powered prostheses. However, these methods are typically restricted to model independent controllers due to the unknown human dynamics acting on the prosthesis. This paper overcomes this restriction by introducing the notion of a separable subsystem control law, independent of the full system dynamics. By constructing an equivalent subsystem, we calculate the control law with local information. We build a subsystem model of a general open chain manipulator to demonstrate the control method's applicability. Employing these methods for an amputee prosthesis model, we develop a model dependent prosthesis controller that relies solely on measurable states and inputs but is equivalent to a controller developed with knowledge of the human dynamics and states. We demonstrate the results through simulating an amputee prosthesis system and show the model dependent prosthesis controller performs identically to a feedback linearizing controller based on the whole system, confirming the equivalency.
[ 0, 1, 2, 4 ]
cs.LG cs.AI cs.CV cs.NE
NPAS A Compiler aware Framework of Unified Network Pruning and Architecture Search for Beyond Real Time Mobile Acceleration. With the increasing demand to efficiently deploy DNNs on mobile edge devices, it becomes much more important to reduce unnecessary computation and increase the execution speed. Prior methods towards this goal, including model compression and network architecture search (NAS), are largely performed independently and do not fully consider compiler level optimizations which is a must do for mobile acceleration. In this work, we first propose (i) a general category of fine grained structured pruning applicable to various DNN layers, and (ii) a comprehensive, compiler automatic code generation framework supporting different DNNs and different pruning schemes, which bridge the gap of model compression and NAS. We further propose NPAS, a compiler aware unified network pruning, and architecture search. To deal with large search space, we propose a meta modeling procedure based on reinforcement learning with fast evaluation and Bayesian optimization, ensuring the total number of training epochs comparable with representative NAS frameworks. Our framework achieves 6.7ms, 5.9ms, 3.9ms ImageNet inference times with 78.2 , 75 (MobileNet V3 level), and 71 (MobileNet V2 level) Top 1 accuracy respectively on an off the shelf mobile phone, consistently outperforming prior work.