id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.07734 | Stationary sets and asymptotic behavior of the mean curvature flow with
forcing in the plane | We consider the flat flow solutions of the mean curvature equation with a
forcing term in the plane. We prove that for every constant forcing term the
stationary sets are given by a finite union of disks with equal radii and
disjoint closures. On the other hand for every bounded forcing term tangent
disks are never stationary. Finally in the case of an asymptotically constant
forcing term we show that the only possible long time limit sets are given by
disjoint unions of disks with equal radii and possibly tangent.
| We consider constant mean curvature surfaces of finite topology, properly
embedded in three-space in the sense of Alexandrov. Such surfaces with three
ends and genus zero were constructed and completely classified by the authors
in arXiv:math.DG/0102183. Here we extend the arguments to the case of an
arbitrary number of ends, under the assumption that the asymptotic axes of the
ends lie in a common plane: we construct and classify the entire family of
these genus-zero coplanar constant mean curvature surfaces.
| 0.9198 | 0.755516 | 0.164284 |
2004.07735 | Maximum likelihood degree and space of orbits of a ${\mathbb C}^*$
action | We study the maximum likelihood (ML) degree of linear concentration models in
algebraic statistics. We relate it to an intersection problem on a smooth
compact moduli space of orbits of a ${\mathbb C}^*$ action on the Lagrangian
Grassmannian which we call Gaussian moduli. This allows us to provide an
explicit, basic, albeit of high computational complexity, formula for the
ML-degree. The Gaussian moduli is an exact analog for symmetric matrices of the
permutohedron variety for the diagonal matrices.
| The main theme of this paper is the connection between the existence of
infinitely many periodic orbits for a Hamiltonian system and the behavior of
its action or index spectrum under iterations. We use the action and index
spectra to show that any Hamiltonian diffeomorphism of a closed, rational
manifold with zero first Chern class has infinitely many periodic orbits and
that, for a general rational manifold, the number of geometrically distinct
periodic orbits is bounded from below by the ratio of the minimal Chern number
and half of the dimension. These generalizations of the Conley conjecture
follow from another result proved here asserting that a Hamiltonian
diffeomorphism with a symplectically degenerate maximum on a closed rational
manifold has infinitely many periodic orbits.
We also show that for a broad class of manifolds and/or Hamiltonian
diffeomorphisms the minimal action--index gap remains bounded for some infinite
sequence of iterations and, as a consequence, whenever a Hamiltonian
diffeomorphism has finitely many periodic orbits, the actions and mean indices
of these orbits must satisfy a certain relation. Furthermore, for Hamiltonian
diffeomorphisms of the n-dimensional complex projective space with exactly n+1
periodic orbits a stronger result holds. Namely, for such a Hamiltonian
diffeomorphism, the difference of the action and the mean index on a periodic
orbit is independent of the orbit, provided that the symplectic structure on
the projective space is normalized to be in the same cohomology class as the
first Chern class.
| 0.840548 | 0.79795 | 0.042598 |
2004.07736 | Machine learning for multiple yield curve markets: fast calibration in
the Gaussian affine framework | Calibration is a highly challenging task, in particular in multiple yield
curve markets. This paper is a first attempt to study the chances and
challenges of the application of machine learning techniques for this. We
employ Gaussian process regression, a machine learning methodology having many
similarities with extended Kalman filtering - a technique which has been
applied many times to interest rate markets and term structure models.
We find very good results for the single curve markets and many challenges
for the multi curve markets in a Vasicek framework. The Gaussian process
regression is implemented with the Adam optimizer and the non-linear conjugate
gradient method, where the latter performs best. We also point towards future
research.
| The conformalClassification package implements Transductive Conformal
Prediction (TCP) and Inductive Conformal Prediction (ICP) for classification
problems. Conformal Prediction (CP) is a framework that complements the
predictions of machine learning algorithms with reliable measures of
confidence. TCP gives results with higher validity than ICP, however ICP is
computationally faster than TCP. The package conformalClassification is built
upon the random forest method, where votes of the random forest for each class
are considered as the conformity scores for each data point. Although the main
aim of the conformalClassification package is to generate CP errors (p-values)
for classification problems, the package also implements various diagnostic
measures such as deviation from validity, error rate, efficiency, observed
fuzziness and calibration plots. In future releases, we plan to extend the
package to use other machine learning algorithms, (e.g. support vector
machines) for model fitting.
| 0.919289 | 0.664379 | 0.254911 |
2004.07737 | Cross-lingual Contextualized Topic Models with Zero-shot Learning | Many data sets in a domain (reviews, forums, news, etc.) exist in parallel
languages. They all cover the same content, but the linguistic differences make
it impossible to use traditional, bag-of-word-based topic models. Models have
to be either single-language or suffer from a huge, but extremely sparse
vocabulary. Both issues can be addressed by transfer learning. In this paper,
we introduce a zero-shot cross-lingual topic model, i.e., our model learns
topics on one language (here, English), and predicts them for documents in
other languages. By using the text of the same document in different languages,
we can evaluate the quality of the predictions. Our results show that topics
are coherent and stable across languages, which suggests exciting future
research directions.
| A recent research line has obtained strong results on bilingual lexicon
induction by aligning independently trained word embeddings in two languages
and using the resulting cross-lingual embeddings to induce word translation
pairs through nearest neighbor or related retrieval methods. In this paper, we
propose an alternative approach to this problem that builds on the recent work
on unsupervised machine translation. This way, instead of directly inducing a
bilingual lexicon from cross-lingual embeddings, we use them to build a
phrase-table, combine it with a language model, and use the resulting machine
translation system to generate a synthetic parallel corpus, from which we
extract the bilingual lexicon using statistical word alignment techniques. As
such, our method can work with any word embedding and cross-lingual mapping
technique, and it does not require any additional resource besides the
monolingual corpus used to train the embeddings. When evaluated on the exact
same cross-lingual embeddings, our proposed method obtains an average
improvement of 6 accuracy points over nearest neighbor and 4 points over CSLS
retrieval, establishing a new state-of-the-art in the standard MUSE dataset.
| 0.905286 | 0.749735 | 0.155551 |
2004.07738 | Inversion of a SIR-based model: a critical analysis about the
application to COVID-19 epidemic | Calibration of a SIR (Susceptibles-Infected-Recovered) model with official
data at international level for the COVID-19 pandemics provides a good example
of the difficulties inherent the solution of inverse problems. Inverse modeling
is set up in a framework of discrete inverse problems, which explicitly
considers the role and the relevance of data. Together with a physical vision
of the model, this is very useful to discuss the uncertainties on the data and
how they influence the reliability of calibrated model parameters and,
ultimately, of model predictions.
| We study the phase transition from the persistence phase to the extinction
phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of
diseases spreading on the networks. We derive an analytical expression of the
probability for the descendants nodes to re-infect their ancestors nodes. We
find that, in the case of the recovery time $\tau_R$ is larger than the
infection time $\tau_I$, the infection will flow directionally from the
ancestors to the descendants however, the descendants will not able to reinfect
their ancestors during their infection time. This behavior leads us to deduce
that, for this case and when the infection rate $\lambda$ is high enough in
such that, any infected node on the network infects all of its neighbors during
its infection time, SIRS model on the network evolves to extinction state,
where all the nodes on the network become susceptible. Moreover, we assert
that, in order to the infection occurs repeatedly inside the network, the loops
on the network are necessary, which means the clustering coefficient will play
an important role for this model. Hence, unlike the other models such as SIS
model and SIR model, SIRS model has a two critical threshold which separate the
persistence phase from the extinction phase when $\tau_I<\tau_R$. That means,
for fixed values of $\tau_I$ and $\tau_R$ there are a two critical points for
infection rate $\lambda_1$ and $\lambda_2$, where epidemic persists in between
of those two points. We confirm those results numerically by the simulation of
regular one dimensional SIRS system.
| 0.843613 | 0.715192 | 0.12842 |
2004.07739 | Quantum-classical hybrid algorithm using an error-mitigating
$N$-representability condition to compute the Mott metal-insulator transition | Quantum algorithms for molecular electronic structure have been developed
with lower computational scaling than their classical counterparts, but
emerging quantum hardware is far from being capable of the
coherence,connectivity and gate errors required for their experimental
realization. Here we propose a class of quantum-classical hybrid algorithms
that compute the energy from a two-electron reduced density matrix (2-RDM). The
2-RDM is constrained by $N$-representability conditions, conditions for
representing an $N$-electron wavefunction, that mitigates noise from the
quantum circuit. We compute the strongly correlated dissociation of doublet
H$_{3}$ into three hydrogen atoms. The hybrid quantum-classical computer
matches the energies from full configuration interaction to 0.1 kcal/mol,
one-tenth of "chemical accuracy," even in the strongly correlated limit of
dissociation. Furthermore, the spatial locality of the computed one-electron
RDM reveals that the quantum computer accurately predicts the Mott
metal-insulator transition.
| Heterointerfaces in complex oxide systems open new arenas in which to test
models of strongly correlated material, explore the role of dimensionality in
metal-insulator-transitions (MITs) and small polaron formation. Close to the
quantum critical point Mott MITs depend on band filling controlled by random
disordered substitutional doping. Delta-doped Mott insulators are potentially
free of random disorder and introduce a new arena in which to explore the
effect of electron correlations and dimensionality. Epitaxial films of the
prototypical Mott insulator GdTiO3 are delta-doped by substituting a single
(GdO)+1 plane with a monolayer of charge neutral SrO to produce a
two-dimensional system with high planar doping density. Unlike metallic SrTiO3
quantum wells in GdTiO3 the single SrO delta-doped layer exhibits thermally
activated DC and optical conductivity that agree in a quantitative manner with
predictions of small polaron transport but with an extremely high
two-dimensional density of polarons, ~ 7E14 cm-2
| 0.898445 | 0.777674 | 0.120771 |
2004.07740 | Really Useful Synthetic Data -- A Framework to Evaluate the Quality of
Differentially Private Synthetic Data | Recent advances in generating synthetic data that allow to add principled
ways of protecting privacy -- such as Differential Privacy -- are a crucial
step in sharing statistical information in a privacy preserving way. But while
the focus has been on privacy guarantees, the resulting private synthetic data
is only useful if it still carries statistical information from the original
data. To further optimise the inherent trade-off between data privacy and data
quality, it is necessary to think closely about the latter. What is it that
data analysts want? Acknowledging that data quality is a subjective concept, we
develop a framework to evaluate the quality of differentially private synthetic
data from an applied researcher's perspective. Data quality can be measured
along two dimensions. First, quality of synthetic data can be evaluated against
training data or against an underlying population. Second, the quality of
synthetic data depends on general similarity of distributions or specific tasks
such as inference or prediction. It is clear that accommodating all goals at
once is a formidable challenge. We invite the academic community to jointly
advance the privacy-quality frontier.
| An important use of private data is to build machine learning classifiers.
While there is a burgeoning literature on differentially private classification
algorithms, we find that they are not practical in real applications due to two
reasons. First, existing differentially private classifiers provide poor
accuracy on real world datasets. Second, there is no known differentially
private algorithm for empirically evaluating the private classifier on a
private test dataset.
In this paper, we develop differentially private algorithms that mirror real
world empirical machine learning workflows. We consider the private classifier
training algorithm as a blackbox. We present private algorithms for selecting
features that are input to the classifier. Though adding a preprocessing step
takes away some of the privacy budget from the actual classification process
(thus potentially making it noisier and less accurate), we show that our novel
preprocessing techniques significantly increase classifier accuracy on three
real-world datasets. We also present the first private algorithms for
empirically constructing receiver operating characteristic (ROC) curves on a
private test set.
| 0.925215 | 0.760848 | 0.164367 |
2004.07741 | On the bounds of coefficients of Daubechie's orthonormal wavelets | In the present work we provide the bounds for Daubechies orthonormal wavelet
coefficients for function spaces $\mathcal{A}_k^p:=\{f: \|(i
\omega)^k\hat{f}(\omega)\|_p< \infty\}$, $k\in\mathbf{N}\cup\{0\}$,
$p\in(1,\infty)$.
| In this paper we compare several properties and constructions of the Carlitz
polynomials and digit derivatives for continuous functions on $\F_q[[T]].$ In
particular, we show a close relation between them as orthonormal bases.
Moreover, parallel to Carlitz's coefficient formula, we give the closed formula
for the expansion coefficients in terms of the digit derivatives.
| 0.904772 | 0.702311 | 0.202461 |
2004.07742 | CO.ME.T.A. -- covid-19 media textual analysis. A dashboard for media
monitoring | The focus of this paper is to trace how mass media, particularly newspapers,
have addressed the issues about the containment of contagion or the explanation
of epidemiological evolution. We propose an interactive dashboard: CO.ME.T.A..
During crises it is important to shape the best communication strategies in
order to respond to critical situations. In this regard, it is important to
monitor the information that mass media and social platforms convey. The
dashboard allows to explore the mining of contents extracted and study the
lexical structure that links the main discussion topics. The dashboard merges
together four methods: text mining, sentiment analysis, textual network
analysis and latent topic models. Results obtained on a subset of documents
show not only a health-related semantic dimension, but it also extends to
social-economic dimensions.
| In this work, we construct and release a multi-domain and multi-modality
event dataset (MMED), containing 25,165 textual news articles collected from
hundreds of news media sites (e.g., Yahoo News, Google News, CNN News.) and
76,516 image posts shared on Flickr social media, which are annotated according
to 412 real-world events. The dataset is collected to explore the problem of
organizing heterogeneous data contributed by professionals and amateurs in
different data domains, and the problem of transferring event knowledge
obtained from one data domain to heterogeneous data domain, thus summarizing
the data with different contributors. We hope that the release of the MMED
dataset can stimulate innovate research on related challenging problems, such
as event discovery, cross-modal (event) retrieval, and visual question
answering, etc.
| 0.77036 | 0.697375 | 0.072985 |
2004.07743 | BETS: The dangers of selection bias in early analyses of the coronavirus
disease (COVID-19) pandemic | The coronavirus disease 2019 (COVID-19) has quickly grown from a regional
outbreak in Wuhan, China to a global pandemic. Early estimates of the epidemic
growth and incubation period of COVID-19 may have been severely biased due to
sample selection. Using detailed case reports from 14 locations in and outside
mainland China, we obtained 378 Wuhan-exported cases who left Wuhan before an
abrupt travel quarantine. We developed a generative model we call BETS for four
key epidemiological events---Beginning of exposure, End of exposure, time of
Transmission, and time of Symptom onset (BETS)---and derived explicit formulas
to correct for the sample selection. We gave a detailed illustration of why
some early and highly influential analyses of the COVID-19 pandemic were
severely biased. All our analyses, regardless of which subsample and model were
being used, point to an epidemic doubling time of 2 to 2.5 days during the
early outbreak in Wuhan. A Bayesian nonparametric analysis further suggests
that 5% of the symptomatic cases may not develop symptoms within 14 days since
infection.
| Public information search data from sources such as Google Trends affords
researchers a perspective on what society does not know, or what society wants
to find out prompted by, or in response to, developments in societal
communication and news media events. In times of crisis, online public
information search thus offers a window into the most urgent concerns of, and
demands by society. By extension, such data offers a window into upcoming, and
currently pressing demands on businesses, policymakers and researchers. This
research note aims to illustrate some of these themes with a visual-based
overview of the current COVID-19 / Coronavirus crisis.
| 0.872932 | 0.707765 | 0.165167 |
2004.07746 | Magnetic resonance imaging of spin-wave transport and interference in a
magnetic insulator | Spin waves - the elementary excitations of magnetic materials - are prime
candidate signal carriers for low dissipation information processing. Being
able to image coherent spin-wave transport is crucial for developing
interference-based spin-wave devices. We introduce a platform for probing
coherent spin waves based on magnetic resonance imaging with electron spins in
diamond. Focusing on a thin-film magnetic insulator, we quantify spin-wave
amplitudes, visualize the dispersion, and demonstrate time-domain measurements
of spin-wave packets. We use our platform to study spin-wave interference,
revealing uni-directional, autofocused spin-wave patterns with
frequency-controlled numerical apertures. A theoretical analysis explains the
patterns in terms of chiral spin-wave excitation and stray-field coupling to
the sensor spins. These results pave the way for probing spin waves in
atomically thin magnets, even when embedded between opaque materials.
| Using graphene resonator, we perform electromechanical measurements in
quantum Hall regime to probe the coupling between a quantum Hall (QH) system
and its mechanical motion. Mechanically perturbing the QH state through
resonance modifies the DC resistance of the system and results in a
Fano-lineshape due to electronic interference. Magnetization of the system
modifies the resonator's equilibrium position and effective stiffness leading
to changes in resonant frequency. Our experiments show that there is an
intimate coupling between the quantum Hall state and mechanics - electron
transport is affected by physical motion and in turn the magnetization modifies
the electromechanical response.
| 0.889711 | 0.724972 | 0.164739 |
2004.07747 | Helical velocity fluctuations and large-scale circulation in turbulent
thermal convection | It is shown that helicity dynamics dominates spectral distribution of the
velocity fluctuations in turbulent thermal convection at moderate and large
values of the Rayleigh number (distributed chaos and scaling respectively). The
large-scale circulation (wind) in the turbulent Rayleigh-B\'{e}nard convection
is especially sensitive to the helicity dynamics and its chaotic reversals can
be associated with the reversals of the mean helicity sign (the ergodic
restoration of the reflectional symmetry in a long run). Results of the
laboratory experiments and measurements in the free atmospheric convection have
been used in order to support the theoretical considerations based on the
adiabatic invariance of the second order moment of the helicity distribution.
| Motivated by recent observations of distinct parallel and perpendicular
signatures in magnetic helicity measurements segregated by wave period and
angle between the local magnetic field and the solar wind velocity, this paper
undertakes a comparison of three intervals of \emph{Ulysses} data with
synthetic time series generated from a physically motivated turbulence model.
From these comparisons, it is hypothesized that the observed signatures result
from a perpendicular cascade of \Alfvenic fluctuations and a local,
non-turbulent population of ion cyclotron or whistler waves generated by
temperature anisotropy instabilities. By constraining the model's free
parameters through comparison to \emph{in situ} data, it is found that, on
average, $ \sim 95\%$ of the power near dissipative scales is contained in a
perpendicular \Alfvenic cascade and that the parallel fluctuations are
propagating nearly unidirectionally. The effects of aliasing on magnetic
helicity measurements are considered and shown to be significant near the
Nyquist frequency.
| 0.900465 | 0.792529 | 0.107935 |
2004.07748 | Light-matter interactions with photonic quasiparticles | Interactions between light and matter play an instrumental role in many
fields of science, giving rise to important applications in spectroscopy,
sensing, quantum information processing, and lasers. In most of these
applications, light is considered in terms of electromagnetic plane waves that
propagate at the speed of light in vacuum. As a result, light-matter
interactions can usually be treated as very weak, and captured at the lowest
order in quantum electrodynamics (QED). However, recent progress in coupling
photons to material quasiparticles (e.g., plasmons, phonons, and excitons)
forces us to generalize the way we picture the photon at the core of every
light-matter interaction. In this new picture, the photon, now of partly
matter-character, can have greatly different polarization and dispersion, and
be confined to the scale of a few nanometers. Such photonic quasiparticles
enable a wealth of light-matter interaction phenomena that could not have been
observed before, both in interactions with bound electrons and with free
electrons. This Review focuses on exciting theoretical and experimental
developments in realizing new light-matter interactions with photonic
quasiparticles. As just a few examples, we discuss how photonic quasiparticles
enable room-temperature strong coupling, ultrafast "forbidden transitions" in
atoms, and new applications of the Cherenkov effect, as well as breakthroughs
in ultrafast electron microscopy and new concepts for compact X-ray sources.
| One of the most successful paradigms of many-body physics is the concept of
quasiparticles: excitations in strongly interacting matter behaving like weakly
interacting particles in free space. Quasiparticles in metals are very robust
objects. Yet, when a system's ground state undergoes a qualitative change at a
quantum critical point (QCP), the quasiparticles may disintegrate and give way
to an exotic quantum-fluid state of matter. The nature of this breakdown is
intensely debated, because the emergent quantum fluid dominates the material
properties up to high temperature and might even be related to the occurence of
superconductivity in some compounds. Here we trace the dynamics of
heavy-fermion quasiparticles in CeCu$_{6-x}$Au$_{x}$ and monitor their
evolution towards the QCP in time-resolved experiments, supported by many-body
calculations. A terahertz pulse disrupts the many-body heavy-fermion state.
Under emission of a delayed, phase-coherent terahertz reflex the heavy-fermion
state recovers, with a coherence time 100 times longer than typically
associated with correlated metals. The quasiparticle weight collapses towards
the QCP, yet its formation temperature remains constant -- phenomena believed
to be mutually exclusive. Coexistence in the same experiment calls for
revisions in our view on quantum criticality.
| 0.929263 | 0.742589 | 0.186674 |
2004.07749 | Removing Algebraic Data Types from Constrained Horn Clauses Using
Difference Predicates | We address the problem of proving the satisfiability of Constrained Horn
Clauses (CHCs) with Algebraic Data Types (ADTs), such as lists and trees. We
propose a new technique for transforming CHCs with ADTs into CHCs where
predicates are defined over basic types, such as integers and booleans, only.
Thus, our technique avoids the explicit use of inductive proof rules during
satisfiability proofs. The main extension over previous techniques for ADT
removal is a new transformation rule, called differential replacement, which
allows us to introduce auxiliary predicates corresponding to the lemmas that
are often needed when making inductive proofs. We present an algorithm that
uses the new rule, together with the traditional folding/unfolding
transformation rules, for the automatic removal of ADTs. We prove that if the
set of the transformed clauses is satisfiable, then so is the set of the
original clauses. By an experimental evaluation, we show that the use of the
differential replacement rule significantly improves the effectiveness of ADT
removal, and we show that our transformation-based approach is competitive with
respect to a well-established technique that extends the CVC4 solver with
induction.
| This paper presents general syntactic conditions ensuring the strong
normalization and the logical consistency of the Calculus of Algebraic
Constructions, an extension of the Calculus of Constructions with functions and
predicates defined by higher-order rewrite rules. On the one hand, the Calculus
of Constructions is a powerful type system in which one can formalize the
propositions and natural deduction proofs of higher-order logic. On the other
hand, rewriting is a simple and powerful computation paradigm. The combination
of both allows, among other things, to develop formal proofs with a reduced
size and more automation compared with more traditional proof assistants. The
main novelty is to consider a general form of rewriting at the predicate-level
which generalizes the strong elimination of the Calculus of Inductive
Constructions.
| 0.86774 | 0.769374 | 0.098367 |
2004.07750 | Extracting the effective contact rate of COVID-19 pandemic | In the absence of any available vaccines or drugs, prevention of the spread
of Coronavirus Disease 2019 (COVID-19) pandemic is being achieved by putting
many mitigation measures in place. It is indispensable to have robust and
reliable ways of evaluating the effectiveness of these measures. In this work,
we assume that, at a very coarse-grained level of description, the overall
effect of all the mitigation measures is that we can still describe the spread
of the pandemic using the most basic Susceptible-Exposed-Infectious-Removed
($SEIR$) model but with an "effective contact rate" ($\beta$) which is
time-dependent. We then use the time series data of the number of infected
individuals in the population to extract the instantaneous effective contact
rate which is the result of various social interventions put in place. This
approach has the potential to be significantly useful while evaluating the
impact of mitigation measures on the spread of COVID-19 in near future.
| Objective: To conduct a meta-analysis of current studies that examined sex
differences in severity and mortality in patients with COVID-19, and identify
potential mechanisms underpinning these differences. Methods: We performed a
systematic review to collate data from observational studies examining
associations of sex differences with clinical outcomes of COVID-19. PubMed, Web
of Science and four preprint servers were searched for relevant studies. Data
were extracted and analyzed using meta-analysis where possible, with summary
data presented otherwise. Publicly available bulk RNA sequencing (RNA-seq),
single-cell RNA sequencing (scRNA-seq), and chromatin immunoprecipitation
sequencing (ChIP-seq) data were analyzed to explore the potential mechanisms
underlying the observed association. Results: 39 studies met inclusion
criteria, representing 77932 patients, of which 41510 (53.3%) were males. Men
were at a markedly increased risk of developing severe cases compared with
women. Furthermore, the pooled odds ratio (OR) of mortality for male group
compared with the female group indicated significant higher mortality rate for
male. Data from scRNA-seq suggest that men have a higher amount of
ACE2-expressing pulmonary alveolar type II cells than women. Sex-based
immunological differences exist. The expression of androgen receptor (AR) is
positively correlated with ACE2, and there is evidence that AR may directly
regulate the expression of ACE2. Conclusions: This meta-analysis detected an
increased severity and mortality rate in the male populations with COVID-19,
which might be attributable to the sex-based differences in cellular
compositions and immunological microenvironments of the lung. The host cell
receptor ACE2 is likely regulated by AR signaling pathway, which is identified
as a potential target for prevention and treatment of SARS-Cov-2 infections in
men.
| 0.851717 | 0.689795 | 0.161922 |
2004.07751 | Strichartz estimates for mixed homogeneous surfaces in three dimensions | We obtain sharp mixed norm Strichartz estimates associated to mixed
homogeneous surfaces in $\mathbb{R}^3$. Both cases with and without a damping
factor are considered. In the case when a damping factor is considered our
results yield a wide generalization of a result of Carbery, Kenig, and Ziesler
[CKZ13]. The approach we use is to first classify all possible singularities
locally, after which one can tackle the problem by appropriately modifying the
methods from the paper of Ginibre and Velo [GV92], and by using the recently
developed methods by Ikromov and M\"uller [IM16].
| A reservoir computer is a complex dynamical system, often created by coupling
nonlinear nodes in a network. The nodes are all driven by a common driving
signal. In this work, three dimension estimation methods, false nearest
neighbor, covariance and Kaplan-Yorke dimensions, are used to estimate the
dimension of the reservoir dynamical system. It is shown that the signals in
the reservoir system exist on a relatively low dimensional surface. Changing
the spectral radius of the reservoir network can increase the fractal dimension
of the reservoir signals, leading to an increase in testing error.
| 0.892868 | 0.704492 | 0.188376 |
2004.07752 | Higher derivative scalar-tensor theory and spatially covariant gravity:
the correspondence | We investigate the correspondence between generally covariant higher
derivative scalar-tensor theory and spatially covariant gravity theory. The
building blocks are the scalar field and spacetime curvature tensor together
with their generally covariant derivatives for the former, and the spatially
covariant geometric quantities together with their spatially covariant
derivatives for the later. In the case of a single scalar degree of freedom,
they are transformed to each other by gauge fixing and recovering procedures,
of which we give the explicit expressions. We make a systematic classification
of all the scalar monomials in the spatially covariant gravity according to the
total number of derivatives up to $d=4$, and their correspondence to the
scalar-tensor monomials. We discusse the possibility of using spatially
covariant monomials to generate ghostfree higher derivative scalar-tensor
theories. We also derive the covariant 3+1 decomposition without fixing any
specific coordinate, which will be useful when performing a covariant
Hamiltonian analysis.
| In this Letter, we consider original Nash theory of gravity. In terms of the
scalar fields representation, Nash gravity is equivalent to the action of
bi-scalar tensor gravity with four derivative terms of metric tensor. We then
quantify the ghost in the theory. In order to study the gravitational wave
modes of the theory, we perform a small perturbation over a fixed Minkowski
background. We discover the standard wave equation and obtain the solutions as
those of the standard general relativity. In order to satisfy the GR in the
weak field limit, we further modify the original Nash theory by adding the
Einstein-Hibert term called modified Nash gravity. In this theory, we once
study the gravitational wave modes. We derive equations of motion and examine
the solutions. We discover the two-mode solutions: the massless graviton and
the massive one. Using a uniform prior probability on the graviton mass, we can
constrain mass parameter.
| 0.93475 | 0.804767 | 0.129983 |
2004.07753 | The Impact of 5G Channel Models on the Performance of Intelligent
Reflecting Surfaces and Decode-and-Forward Relaying | An intelligent reflecting surface (IRS) is an array of discrete elements with
configurable scattering properties. It has the capability to beamform arriving
radio waves to an intended receiver, making it an attractive candidate
technology for fifth-generation (5G) communications. A recent study debunked
the notion that IRSs can replace relays, because a large number of IRS elements
is required to even approach the performance of simple single-antenna
decode-and-forward (DF) relays. The study introduced 4G channel models into a
theoretical framework to obtain simulation results, based on which comparisons
between the two schemes were carried out. In this paper, we consider 5G channel
models, reflect on the revised results, and argue that IRSs and DF relays can
complement each other's strengths and can both have a place in 5G and beyond 5G
architectures.
| This is the second in a two part series of papers on incorporation of the
broadcast approach into oblivious protocols for the relay channel where the
source and the relay are collocated. Part I described the broadcast approach
and its benefits in terms of achievable rates when used with the sequential
decode- and-forward (SDF) scheme. Part II investigates yet another oblivious
scheme, the Block-Markov decode- and-forward (BMDF) under the single and
two-layered transmissions. For the single layer, previously reported results
are enhanced and a conjecture regarding the optimal correlation coefficient
between the source and the relay's transmission is established. For the
discrete multi-layer transmission of two or more layers, it is shown that
perfect cooperation (2x1 MISO) rates are attained even with low collocation
gains at the expense of a longer delay, improving upon those achievable by the
SDF.
| 0.912531 | 0.741044 | 0.171486 |
2004.07754 | Investigating Efficient Learning and Compositionality in Generative LSTM
Networks | When comparing human with artificial intelligence, one major difference is
apparent: Humans can generalize very broadly from sparse data sets because they
are able to recombine and reintegrate data components in compositional manners.
To investigate differences in efficient learning, Joshua B. Tenenbaum and
colleagues developed the character challenge: First an algorithm is trained in
generating handwritten characters. In a next step, one version of a new type of
character is presented. An efficient learning algorithm is expected to be able
to re-generate this new character, to identify similar versions of this
character, to generate new variants of it, and to create completely new
character types. In the past, the character challenge was only met by complex
algorithms that were provided with stochastic primitives. Here, we tackle the
challenge without providing primitives. We apply a minimal recurrent neural
network (RNN) model with one feedforward layer and one LSTM layer and train it
to generate sequential handwritten character trajectories from one-hot encoded
inputs. To manage the re-generation of untrained characters, when presented
with only one example of them, we introduce a one-shot inference mechanism: the
gradient signal is backpropagated to the feedforward layer weights only,
leaving the LSTM layer untouched. We show that our model is able to meet the
character challenge by recombining previously learned dynamic substructures,
which are visible in the hidden LSTM states. Making use of the compositional
abilities of RNNs in this way might be an important step towards bridging the
gap between human and artificial intelligence.
| Human actions captured in video sequences are three-dimensional signals
characterizing visual appearance and motion dynamics. To learn action patterns,
existing methods adopt Convolutional and/or Recurrent Neural Networks (CNNs and
RNNs). CNN based methods are effective in learning spatial appearances, but are
limited in modeling long-term motion dynamics. RNNs, especially Long Short-Term
Memory (LSTM), are able to learn temporal motion dynamics. However, naively
applying RNNs to video sequences in a convolutional manner implicitly assumes
that motions in videos are stationary across different spatial locations. This
assumption is valid for short-term motions but invalid when the duration of the
motion is long.
In this work, we propose Lattice-LSTM (L2STM), which extends LSTM by learning
independent hidden state transitions of memory cells for individual spatial
locations. This method effectively enhances the ability to model dynamics
across time and addresses the non-stationary issue of long-term motion dynamics
without significantly increasing the model complexity. Additionally, we
introduce a novel multi-modal training procedure for training our network.
Unlike traditional two-stream architectures which use RGB and optical flow
information as input, our two-stream model leverages both modalities to jointly
train both input gates and both forget gates in the network rather than
treating the two streams as separate entities with no information about the
other. We apply this end-to-end system to benchmark datasets (UCF-101 and
HMDB-51) of human action recognition. Experiments show that on both datasets,
our proposed method outperforms all existing ones that are based on LSTM and/or
CNNs of similar model complexities.
| 0.768479 | 0.73384 | 0.034639 |
2004.07755 | Accelerating complex control schemes on a heterogeneous MPSoC platform
for quantum computing | Control and readout of superconducting quantum bits (qubits) require
microwave pulses with gigahertz frequencies and nanosecond precision. To
generate and analyze these microwave pulses, we developed a versatile
FPGA-based electronics platform. While basic functionality is directly handled
within the FPGA, guaranteeing highest accuracy on the nanosecond timescale,
more complex control schemes render impractical to implement in hardware.
To provide deterministic timing and low latency with high flexibility, we
developed the Taskrunner framework. It enables the execution of complex control
schemes, so-called user tasks, on the real-time processing unit (RPU) of a
heterogeneous Multiprocessor System-on-Chip (MPSoC). These user tasks are
specified conveniently using standard C language and are compiled automatically
by the MPSoC platform when loaded onto the RPU. We present the architecture of
the Taskrunner framework as well as timing benchmarks and discuss applications
in the field of quantum computing.
| We analyse a linear lattice Boltzmann (LB) formulation for simulation of
linear acoustic wave propagation in heterogeneous media. We employ the
single-relaxation-time Bhatnagar-Gross-Krook (BGK) as well as the general
multi-relaxation-time (MRT) collision operators. By calculating the dispersion
relation for various 2D lattices, we show that the D2Q5 lattice is the most
suitable model for the linear acoustic problem. We also implement a
grid-refinement algorithm for the LB scheme to simulate waves propagating in a
heterogeneous medium with velocity contrasts. Our results show that the LB
scheme performance is comparable to the classical second-order
finite-difference schemes. Given its efficiency for parallel computation, the
LB method can be a cost effective tool for the simulation of linear acoustic
waves in complex geometries and multiphase media.
| 0.868585 | 0.637641 | 0.230944 |
2004.07756 | Light-Front Holography and Supersymmetric Conformal Algebra: A Novel
Approach to Hadron Spectroscopy, Structure, and Dynamics | We give an overview of recent progress into the infrared structure of QCD
based on the gauge/gravity correspondence and light-front quantization, where
the color confining interaction for mesons and baryons is determined by an
underlying superconformal algebraic structure. This new approach to hadron
physics gives remarkable connections and predictions across the entire mass
spectrum of hadrons and also describes the infrared behavior of the strong
coupling. More recently, an extensive study of form factors, polarized and
unpolarized parton distributions and the sea quark contribution to the nucleon
has been carried out by extending the holographic formalism to incorporate the
nonperturbative structure of Veneziano amplitudes. Contribution to the report
"Strong QCD from Hadron Structure Experiments" Jefferson Lab Workshop, 5-9
November, 2019
| We propose a unified new approach to describe polarized and unpolarized quark
distributions in the proton based on the gauge-gravity correspondence,
light-front holography, and the generalized Veneziano model. We find that the
spin-dependent quark distributions are uniquely determined in terms of the
unpolarized distributions by chirality separation without the introduction of
additional free parameters. The predictions are consistent with existing
experimental data and agree with perturbative QCD constraints at large
longitudinal momentum $x$. In particular, we predict the sign reversal of the
polarized down-quark distribution in the proton at $x=0.8\pm0.03$, a key
property of nucleon substructure which will be tested very soon in upcoming
experiments.
| 0.851613 | 0.747892 | 0.103721 |
2004.07757 | Gaussian Process Learning-based Probabilistic Optimal Power Flow | In this letter, we present a novel Gaussian Process Learning-based
Probabilistic Optimal Power Flow (GP-POPF) for solving POPF under renewable and
load uncertainties of arbitrary distribution. The proposed method relies on a
non-parametric Bayesian inference-based uncertainty propagation approach,
called Gaussian Process (GP). We also suggest a new type of sensitivity called
Subspace-wise Sensitivity, using observations on the interpretability of
GP-POPF hyperparameters. The simulation results on 14-bus and 30-bus systems
show that the proposed method provides reasonably accurate solutions when
compared with Monte-Carlo Simulations (MCS) solutions at different levels of
uncertain renewable penetration as well as load uncertainties, while requiring
much less number of samples and elapsed time.
| We introduce an ensemble learning post-processing methodology for
probabilistic hydrological modelling. This methodology generates numerous point
predictions by applying a single hydrological model, yet with different
parameter values drawn from the respective simulated posterior distribution. We
call these predictions "sister predictions". Each sister prediction extending
in the period of interest is converted into a probabilistic prediction using
information about the hydrological model's errors. This information is obtained
from a preceding period for which observations are available, and is exploited
using a flexible quantile regression model. All probabilistic predictions are
finally combined via simple quantile averaging to produce the output
probabilistic prediction. The idea is inspired by the ensemble learning methods
originating from the machine learning literature. The proposed methodology
offers larger robustness in performance than basic post-processing
methodologies using a single hydrological point prediction. It is also
empirically proven to "harness the wisdom of the crowd" in terms of average
interval score, i.e., the obtained quantile predictions score no worse --
usually better -- than the average score of the combined individual
predictions. This proof is provided within toy examples, which can be used for
gaining insight on how the methodology works and under which conditions it can
optimally convert point hydrological predictions to probabilistic ones. A
large-scale hydrological application is made in a companion paper.
| 0.908001 | 0.700415 | 0.207586 |
2004.07758 | Darboux transformation and multi-soliton solutions of discrete
sine-Gordon equation | We study a discrete Darboux transformation and construct the multi-soliton
solutions in terms of ratio of determinants for integrable discrete sine-Gordon
equation. We also calculate explicit expressions of single, double, triple,
quad soliton solutions as well as single and double breather solutions of
discrete sine-Gordon equation. Dynamical features of discrete kinks and
breathers have also been illustrated.
| We consider the interactions of traveling localized wave solutions with a
vertex in a star graph domain that describes multiple Josephson junctions with
a common/branch point (i.e., tricrystal junctions). The system is modeled by
the sine-Gordon equation. The vertex is represented by boundary conditions that
are determined by the continuity of the magnetic field and vanishing total
fluxes. When one considers small-amplitude breather solutions, the system can
be reduced into the nonlinear Schr\"odinger equation posed on a star graph.
Using the equation, we show that a high-velocity incoming soliton is split into
a transmitted component and a reflected one. The transmission is shown to be in
good agreement with the transmission rate of plane waves in the linear
Schr\"odinger equation on the same graph (i.e., a quantum graph). In the
context of the sine-Gordon equation, small-amplitude breathers show similar
qualitative behaviors, while large-amplitude ones produce complex dynamics.
| 0.94278 | 0.762609 | 0.180172 |
2004.07759 | Spectral Index of OAM-Carrying Ultrafast Localized Pulses | We investigate the spectral degree of freedom of OAM-carrying localized
waves, and its influence on their transverse intensity distribution. In
particular, we focus our attention on two different families of spectra, namely
exponentially decaying spectra, which are very tightly connected to fundamental
X-waves, and Bessel-modulated spectra. For each class we show how it is
possible, by suitable manipulating their spectrum, to structure their
transverse intensity distribution, thus creating a radial structure similar to
that of Laguerre-Gaussian beams. To complete our analysis, we investigate the
impact of the two spectral functions on linear and angular momentum of such
localized waves.
| The ultrafast photoinduced insulator-metal transition in VO2 is studied at
different temperatures and excitation fluences using multi-THz probe pulses.
The spectrally resolved mid-infrared response allows us to trace separately the
dynamics of lattice and electronic degrees of freedom with a time resolution of
40 fs. The critical fluence of the optical pump pulse which drives the system
into a long-lived metallic state is found to increase with decreasing
temperature. Under all measurement conditions we observe a modulation of the
eigenfrequencies of the optical phonon modes induced by their anharmonic
coupling to the coherent wave packet motion of V-V dimers at 6.1 THz.
Furthermore, we find a weak quadratic coupling of the electronic response to
the coherent dimer oscillation resulting in a modulation of the electronic
conductivity at twice the frequency of the wave packet motion. The findings are
discussed in the framework of a qualitative model based on an approximation of
local photoexcitation of the vanadium dimers from the insulating state.
| 0.792944 | 0.731466 | 0.061478 |
2004.07760 | Decoding Probability Analysis of Network-Coded Data Collection and
Delivery by Relay Drones | Relay drones in delay-tolerant applications are dispatched to remote
locations in order to gather data transmitted by a source node. Collected data
are stored on the drones and delivered to one or multiple bases. This paper
considers two schemes for broadcasting data to drones when feedback channels
are not available: a data carousel and systematic random linear network coding
(RLNC). We propose a theoretical framework for the calculation of the
probability that a base will fully or partially recover the transmitted data
and the probability that all involved bases will successfully obtain the data,
when the bases are either isolated or interconnected. Theoretical results are
validated through simulations. Design considerations are also discussed,
including the relationship among the field size used by RLNC, the number of
relay drones and the requirement for full data recovery or the retrieval of at
least part of the data.
| This paper studies the outage probability and the throughput of
amplify-and-forward relay networks with wireless information and energy
transfer. We use some recent results on finite block-length codes to analyze
the system performance in the cases with short codewords. Specifically, the
time switching relaying and the power splitting relaying protocols are
considered for energy and information transfer. We derive tight approximations
for the outage probability/throughput. Then, we analyze the outage probability
in asymptotically high signal-to-noise ratios. Finally, we use numerical
results to confirm the accuracy of our analysis and to evaluate the system
performance in different scenarios. Our results indicate that, in
delay-constrained scenarios, the codeword length affects the outage
probability/throughput of the joint energy and information transfer systems
considerably.
| 0.901649 | 0.748735 | 0.152914 |
2004.07761 | Deep Generation of Coq Lemma Names Using Elaborated Terms | Coding conventions for naming, spacing, and other essentially stylistic
properties are necessary for developers to effectively understand, review, and
modify source code in large software projects. Consistent conventions in
verification projects based on proof assistants, such as Coq, increase in
importance as projects grow in size and scope. While conventions can be
documented and enforced manually at high cost, emerging approaches
automatically learn and suggest idiomatic names in Java-like languages by
applying statistical language models on large code corpora. However, due to its
powerful language extension facilities and fusion of type checking and
computation, Coq is a challenging target for automated learning techniques. We
present novel generation models for learning and suggesting lemma names for Coq
projects. Our models, based on multi-input neural networks, are the first to
leverage syntactic and semantic information from Coq's lexer (tokens in lemma
statements), parser (syntax trees), and kernel (elaborated terms) for naming;
the key insight is that learning from elaborated terms can substantially boost
model performance. We implemented our models in a toolchain, dubbed Roosterize,
and applied it on a large corpus of code derived from the Mathematical
Components family of projects, known for its stringent coding conventions. Our
results show that Roosterize substantially outperforms baselines for suggesting
lemma names, highlighting the importance of using multi-input models and
elaborated terms.
| R-CNN style methods are sorts of the state-of-the-art object detection
methods, which consist of region proposal generation and deep CNN
classification. However, the proposal generation phase in this paradigm is
usually time consuming, which would slow down the whole detection time in
testing. This paper suggests that the value discrepancies among features in
deep convolutional feature maps contain plenty of useful spatial information,
and proposes a simple approach to extract the information for fast region
proposal generation in testing. The proposed method, namely Relief R-CNN
(R2-CNN), adopts a novel region proposal generator in a trained R-CNN style
model. The new generator directly generates proposals from convolutional
features by some simple rules, thus resulting in a much faster proposal
generation speed and a lower demand of computation resources. Empirical studies
show that R2-CNN could achieve the fastest detection speed with comparable
accuracy among all the compared algorithms in testing.
| 0.843712 | 0.634375 | 0.209337 |
2004.07762 | Adaptive BEM for elliptic PDE systems, Part I: Abstract framework for
weakly-singular integral equations | In the present work, we consider weakly-singular integral equations arising
from linear second-order strongly-elliptic PDE systems with constant
coefficients, including, e.g., linear elasticity. We introduce a general
framework for optimal convergence of adaptive Galerkin BEM. We identify certain
abstract properties for the underlying meshes, the corresponding
mesh-refinement strategy, and the ansatz spaces that guarantee convergence at
optimal algebraic rate of an adaptive algorithm driven by the weighted-residual
error. These properties are satisfied, e.g., for discontinuous piecewise
polynomials on simplicial meshes as well as certain ansatz spaces used for
isogeometric analysis. Technical contributions include local inverse estimates
for the (non-local) boundary integral operators associated to the PDE system.
| We consider a system of weakly coupled singularly perturbed semilinear
elliptic equations. First, we obtain a Lipschitz regularity result for the
associated ground energy function $\Sigma$ as well as representation formulas
for the left and the right derivatives. Then, we show that the concentration
points of the solutions locate close to the critical points of $\Sigma$ in the
sense of subdifferential calculus.
| 0.914406 | 0.763253 | 0.151153 |
2004.07763 | A Magnon Scattering Platform | Scattering experiments have revolutionized our understanding of nature.
Examples include the discovery of the nucleus, crystallography, and the
discovery of the double helix structure of DNA. Scattering techniques differ by
the type of the particles used, the interaction these particles have with
target materials and the range of wavelengths used. Here, we demonstrate a new
2-dimensional table-top scattering platform for exploring magnetic properties
of materials on mesoscopic length scales. Long lived, coherent magnonic
excitations are generated in a thin film of YIG and scattered off a magnetic
target deposited on its surface. The scattered waves are then recorded using a
scanning NV center magnetometer that allows sub-wavelength imaging and
operation under conditions ranging from cryogenic to ambient environment. While
most scattering platforms measure only the intensity of the scattered waves,
our imaging method allows for spatial determination of both amplitude and phase
of the scattered waves thereby allowing for a systematic reconstruction of the
target scattering potential. Our experimental results are consistent with
theoretical predictions for such a geometry and reveal several unusual features
of the magnetic response of the target, including suppression near the target
edges and gradient in the direction perpendicular to the direction of surface
wave propagation. Our results establish magnon scattering experiments as a new
platform for studying correlated many-body systems.
| We use the matrix product state formalism to construct stationary scattering
states of elementary excitations in generic one-dimensional quantum lattice
systems. Our method is applied to the spin-1 Heisenberg antiferromagnet, for
which we calculate the full magnon-magnon S matrix for arbitrary momenta and
spin, the two-particle contribution to the spectral function and the
magnetization curve. As our method provides an accurate microscopic
representation of the interaction between elementary excitations, we envisage
the description of low-energy dynamics of one-dimensional spin chains in terms
of these particlelike excitations.
| 0.857281 | 0.735553 | 0.121728 |
2004.07765 | Cost-effectiveness Analysis of Antiepidemic Policies and Global
Situation Assessment of COVID-19 | With a two-layer contact-dispersion model and data in China, we analyze the
cost-effectiveness of three types of antiepidemic measures for COVID-19:
regular epidemiological control, local social interaction control, and
intercity travel restriction. We find that: 1) intercity travel restriction has
minimal or even negative effect compared to the other two at the national
level; 2) the time of reaching turning point is independent of the current
number of cases, and only related to the enforcement stringency of
epidemiological control and social interaction control measures; 3) strong
enforcement at the early stage is the only opportunity to maximize both
antiepidemic effectiveness and cost-effectiveness; 4) mediocre stringency of
social interaction measures is the worst choice. Subsequently, we cluster
countries/regions into four groups based on their control measures and provide
situation assessment and policy suggestions for each group.
| In this short note we model the region-wise trends of the evolution to
COVID-19 infections using a stochastic SIR model. The SIR dynamics are
expressed using \textit{It\^o-stochastic differential equations}. We first
derive the parameters of the model from the available daily data from European
regions based on a 24-day history of infections, recoveries and deaths. The
derived parameters have been aggregated to project future trends for the Indian
subcontinent, which is currently at an early stage in the infection cycle. The
projections are meant to serve as a guideline for strategizing the
socio-political counter measures to mitigate COVID-19.
| 0.855398 | 0.770321 | 0.085077 |
2004.07767 | Sliding Window Polar Codes | We propose a novel coupling technique for the design of polar codes of length
N, making them decodable through a sliding window of size M < N. This feature
allows to reduce the computational complexity of the decoder, an important
possibility in wireless communication downlink scenarios. Our approach is based
on the design of an ad-hoc kernel to be inserted in a multi-kernel polar code
framework; this structure enables the sliding window decoding of the code.
Simulation results show that the proposed sliding window polar codes outperform
the independent blocks transmission in the proposed scenario, at the cost of a
negligible decoding overhead.
| An extension of polar codes is proposed, which allows some of the frozen
symbols, called dynamic frozen symbols, to be data-dependent. A construction of
polar codes with dynamic frozen symbols, being subcodes of extended BCH codes,
is proposed. The proposed codes have higher minimum distance than classical
polar codes, but still can be efficiently decoded using the successive
cancellation algorithm and its extensions. The codes with Arikan, extended BCH
and Reed-Solomon kernel are considered. The proposed codes are shown to
outperform LDPC and turbo codes, as well as polar codes with CRC.
| 0.840277 | 0.776703 | 0.063575 |
2004.07768 | HST/FGS Trigonometric Parallaxes of M-dwarf Eclipsing Binaries | Hubble Space Telescope (HST) Fine Guidance Sensor (FGS) trigonometric
parallax observations were obtained to directly determine distances to five
nearby M-dwarf / M-dwarf eclipsing binary systems. These systems are
intrinsically interesting as benchmark systems for establishing basic physical
parameters for low-mass stars, such as luminosity L, and radius R. HST/FGS
distances are also one of the few direct checks on Gaia trigonometric
parallaxes, given the comparable sensitivity in both magnitude limit and
determination of parallactic angles. A spectral energy distribution (SED) fit
of each system's blended flux output was carried out, allowing for estimation
of the bolometric flux from the primary and secondary components of each
system. From the stellar M, L, and R values, the low-mass star relationships
between L and M, and R and M, are compared against idealized expectations for
such stars. An examination on the inclusion of these close M-dwarf/M-dwarf
pairs in higher-order common proper motion (CPM) pairs is analysed; each of the
5 systems has indications of being part of a CPM system. Unexpected distances
on interesting objects found within the grid of parallactic reference stars are
also presented, including a nearby M dwarf and a white dwarf.
| We have observed the eclipsing, post-common envelope white dwarf-brown dwarf
binary, SDSS141126.20+200911.1, in the near-IR with the HAWK-I imager, and
present here the first direct detection of the dark side of an irradiated brown
dwarf in the $H$ band, and a tentative detection in the $K_s$ band. Our
analysis of the lightcurves and indicates that the brown dwarf is likely to
have an effective temperature of 1300 K, which is not consistent with the
effective temperature of 800 K suggested by its mass and radius. As the brown
dwarf is already absorbing almost all the white dwarf emission in the $K_s$
band we suggest that this inconsistency may be due to the UV-irradiation from
the white dwarf inducing an artificial brightening in the $K_s$ band, similar
to that seen for the similar system WD0137-349B, suggesting this brightening
may be characteristic of these UV-irradiated binaries.
| 0.907467 | 0.755609 | 0.151859 |
2004.07769 | SCOUT: Self-aware Discriminant Counterfactual Explanations | The problem of counterfactual visual explanations is considered. A new family
of discriminant explanations is introduced. These produce heatmaps that
attribute high scores to image regions informative of a classifier prediction
but not of a counter class. They connect attributive explanations, which are
based on a single heat map, to counterfactual explanations, which account for
both predicted class and counter class. The latter are shown to be computable
by combination of two discriminant explanations, with reversed class pairs. It
is argued that self-awareness, namely the ability to produce classification
confidence scores, is important for the computation of discriminant
explanations, which seek to identify regions where it is easy to discriminate
between prediction and counter class. This suggests the computation of
discriminant explanations by the combination of three attribution maps. The
resulting counterfactual explanations are optimization free and thus much
faster than previous methods. To address the difficulty of their evaluation, a
proxy task and set of quantitative metrics are also proposed. Experiments under
this protocol show that the proposed counterfactual explanations outperform the
state of the art while achieving much higher speeds, for popular networks. In a
human-learning machine teaching experiment, they are also shown to improve mean
student accuracy from chance level to 95\%.
| The semantics for counterfactuals due to David Lewis has been challenged on
the basis of unlikely, or impossible, events. Such events may skew a given
similarity order in favour of those possible worlds which exhibit them. By
updating the relational structure of a model according to a ceteris paribus
clause one forces out, in a natural manner, those possible worlds which do not
satisfy the requirements of the clause. We develop a ceteris paribus logic for
counterfactual reasoning capable of performing such actions, and offer several
alternative (relaxed) interpretations of ceteris paribus. We apply this
framework in a way which allows us to reason counterfactually without having
our similarity order skewed by unlikely events. This continues the
investigation of formal ceteris paribus reasoning, which has previously been
applied to preferences, logics of game forms, and questions in decision-making,
among other areas.
| 0.859472 | 0.752751 | 0.106721 |
2004.07770 | Reinforcement learning approach to non-equilibrium quantum
thermodynamics | We use a reinforcement learning approach to reduce entropy production in a
closed quantum system brought out of equilibrium. Our strategy makes use of an
external control Hamiltonian and a policy gradient technique. Our approach
bears no dependence on the quantitative tool chosen to characterize the degree
of thermodynamic irreversibility induced by the dynamical process being
considered, require little knowledge of the dynamics itself and does not need
the tracking of the quantum state of the system during the evolution, thus
embodying an experimentally non-demanding approach to the control of
non-equilibrium quantum thermodynamics. We successfully apply our methods to
the case of single- and two-particle systems subjected to time-dependent
driving potentials.
| Transfer learning is an important new subfield of multiagent reinforcement
learning that aims to help an agent learn about a problem by using knowledge
that it has gained solving another problem, or by using knowledge that is
communicated to it by an agent who already knows the problem. This is useful
when one wishes to change the architecture or learning algorithm of an agent
(so that the new knowledge need not be built "from scratch"), when new agents
are frequently introduced to the environment with no knowledge, or when an
agent must adapt to similar but different problems. Great progress has been
made in the agent-to-agent case using the Teacher/Student framework proposed by
(Torrey and Taylor 2013). However, that approach requires that learning from a
teacher be treated differently from learning in every other reinforcement
learning context. In this paper, I propose a method which allows the
teacher/student framework to be applied in a way that fits directly and
naturally into the more general reinforcement learning framework by integrating
the teacher feedback into the reward signal received by the learning agent. I
show that this approach can significantly improve the rate of learning for an
agent playing a one-player stochastic game; I give examples of potential
pitfalls of the approach; and I propose further areas of research building on
this framework.
| 0.909303 | 0.723054 | 0.186249 |
2004.07772 | QZE and IZE in a simple approach and the neutron decay | We discuss a simple and analytically solvable measurement model which
describes the famous Quantum Zeno Effect (QZE) and Inverse Zeno Effect (IZE),
that correspond to the slow down and to the increase of the decay rate caused
by measurements (or, more in general, by the interaction of an unstable state
with the detector and the environment). Within this model one can understand
quite general features of the QZE and IZE: by considering an unstable quantum
state, such as an unstable particle, whose decay width as function of energy is
$\Gamma(\omega)=g^{2}\omega^{\alpha},$ then -- under quite general assumptions
-- the QZE occurs for $\alpha\in(0,1)$, while the IZE for $\alpha
\in(-\infty,0)\cup(1,\infty).$ This result is valid also for more realistic
measurement models than the one described in this work. We then apply these
considerations to the decay of the neutron, for which $\alpha=5.$ Hence, the
realization of the IZE for the neutron decay (and for the majority of weak
decays) is in principle possible. Indeed, trap experiments find a lifetime that
is $8.7\pm2.1$ s shorter than beam experiments, suggesting that the IZE could
have taken place.
| In this work we studied $\beta$-decay properties for deformed neutron-rich
nuclei in the region Z=36-43. We use the deformed pn-QRPA methods with the
realistic CD-Bonn forces, and include both the Gamow-Teller and first-forbidden
types of decays in the calculation. The obtained $\beta$-decay half-lives and
neutron-emission probabilities of deformed isotopes are compared with
experiment as well as with previous calculations. The advantages and
disadvantages of the method are discussed.
| 0.88036 | 0.757437 | 0.122923 |
2004.07773 | Accelerated multimodel Newton-type algorithms for faster convergence of
ground and excited state coupled cluster equations | We introduce a multimodel approach to solve coupled cluster equations,
employing a quasi Newton algorithm for the ground state and an Olsen algorithm
for the excited states. In these algorithms, both of which can be viewed as
Newton algorithms, the Jacobian matrix of a lower level coupled cluster model
is used in Newton equations associated with the target model. Improvements in
convergence then implies savings for sufficiently large molecular systems,
since the computational cost of macroiterations scales more steeply with system
size than the cost of microiterations. The multimodel approach is suitable when
there is a lower level Jacobian matrix that is much more accurate than the
zeroth order approximation. Applying the approach to the CC3 equations, using
the CCSD approximation of the Jacobian, we show that the time spent to
determine the ground and valence excited states can be significantly reduced.
We also find improved convergence for core excited states, indicating that
similar savings will be obtained with an explicit implementation of the
core-valence separated CCSD Jacobian transformation.
| We report inelastic neutron scattering measurements that provide a distinct
dynamical "fingerprint" for the multiferroic ground state of 3.5% Ga-doped
CuFeO_2. The complex ground state is stabilized by the displacement of the
oxygen atoms, which are also responsible for the multiferroic coupling
predicted by Arima. By comparing the observed and calculated spectrum of spin
excitations, we conclude that the magnetic ground state is a distorted
screw-type spin configuration that requires a mechanism for magnetoelectric
coupling different from the generally accepted spin-current model.
| 0.90224 | 0.63592 | 0.26632 |
2004.07774 | Computing all identifiable functions for ODE models | Parameter identifiability is a structural property of an ODE model for
recovering the values of parameters from the data (i.e., from the input and
output variables). This property is a prerequisite for meaningful parameter
identification in practice. In the presence of nonidentifiability, it is
important to find all functions of the parameters that are identifiable. The
existing algorithms check whether a given function of parameters is
identifiable or, under the solvability condition, find all identifiable
functions. Our first main result is an algorithm that computes all identifiable
functions without any additional assumptions. Our second main result concerns
the identifiability from multiple experiments. For this problem, we show that
the set of functions identifiable from multiple experiments is what would
actually be computed by input-output equation-based algorithms if the
solvability condition is not fulfilled. We give an algorithm that not only
finds these functions but also provides an upper bound for the number of
experiments to be performed to identify these functions.
| In this work we analyze the resort to high order exponential solvers for
stiff ODEs in the context of cardiac electrophysiology modeling. The
exponential Adams-Bashforth and the Rush-Larsen schemes will be considered up
to order 4. These methods are explicit multistep schemes.The accuracy and the
cost of these methods are numerically analyzed in this paper and benchmarked
with several classical explicit and implicit schemes at various orders. This
analysis has been led considering data of high particular interest in cardiac
electrophysiology : the activation time ($t\_a$ ), the recovery time ($t\_r $)
and the action potential duration ($APD$). The Beeler Reuter ionic model,
especially designed for cardiac ventricular cells, has been used for this
study. It is shown that, in spite of the stiffness of the considered model,
exponential solvers allow computation at large time steps, as large as for
implicit methods. Moreover, in terms of cost for a given accuracy, a
significant gain is achieved with exponential solvers. We conclude that
accurate computations at large time step are possible with explicit high order
methods. This is a quite important feature when considering stiff non linear
ODEs.
| 0.843844 | 0.740484 | 0.10336 |
2004.07775 | Quantification of plasticity via particle dynamics above and below yield
in a 2D jammed suspension | Failure of amorphous materials is characterized by the emergence of
dissipation. The connection between particle dynamics, dissipation, and overall
material rheology, however, has still not been elucidated. Here, we take a new
approach relating trajectories to yielding, using a custom built interfacial
stress rheometer, which allows for measurement of shear moduli (G',G'') of a
dense athermal suspension's microstructure while simultaneously tracking
particle trajectories undergoing cyclic shear. We find an increase in total
area traced by particle trajectories as the system is stressed well below to
well above yield. Trajectories may be placed into three categories: reversibly
elastic paths; reversibly plastic paths, associated with smooth limit cycles;
and irreversibly plastic paths, in which particles do not return to their
original position. We find that above yield, reversibly plastic trajectories
are predominantly found near to the shearing surface, whereas reversibly
elastic paths are more prominent near the stationary wall. This spatial
transition between particles acting as solids to those acting as liquids is
characteristic of a 'melting front', which is observed to shift closer to the
wall with increasing strain. We introduce a non-dimensional measure of plastic
dissipation based on particle trajectories that scales linearly with strain
amplitude both above and below yield, and that is unity at the rheological
yield point. Surprisingly, this relation collapses for three systems of varying
degrees of disorder.
| We use a confocal microscope to examine the motion of individual particles in
a dense colloidal suspension. Close to the glass transition, particle motion is
strongly spatially correlated. The correlations decay exponentially with
particle separation, yielding a dynamic length scale of O(2-3 sigma) (in terms
of particle diameter sigma). This length scale grows modestly as the glass
transition is approached. Further, the correlated motion exhibits a strong
spatial dependence on the pair correlation function g(r). Motion within glassy
samples is weakly correlated, but with a larger spatial scale for this
correlation.
| 0.855057 | 0.781848 | 0.07321 |
2004.07776 | Kvistur 2.0: a BiLSTM Compound Splitter for Icelandic | In this paper, we present a character-based BiLSTM model for splitting
Icelandic compound words, and show how varying amounts of training data affects
the performance of the model. Compounding is highly productive in Icelandic,
and new compounds are constantly being created. This results in a large number
of out-of-vocabulary (OOV) words, negatively impacting the performance of many
NLP tools. Our model is trained on a dataset of 2.9 million unique word forms
and their constituent structures from the Database of Icelandic Morphology. The
model learns how to split compound words into two parts and can be used to
derive the constituent structure of any word form. Knowing the constituent
structure of a word form makes it possible to generate the optimal split for a
given task, e.g., a full split for subword tokenization, or, in the case of
part-of-speech tagging, splitting an OOV word until the largest known
morphological head is found. The model outperforms other previously published
methods when evaluated on a corpus of manually split word forms. This method
has been integrated into Kvistur, an Icelandic compound word analyzer.
| Within the framework of density functional theory, the electronic structure
and magnetic properties have been studied for the
Ti\raisebox{-.2ex}{\scriptsize 2}FeSn full-Heusler compound. The ferromagnetic
state is found to be energetically more favorable than paramagnetic and
antiferromagnetic states. The spin-polarized results show that
Ti\raisebox{-.2ex}{\scriptsize 2}FeSn compound has half-metallic ferromagnetic
character with a total spin moment of $2 \mu_{B}$ and a band gap in the
minority spin channel of 0.489 eV, at the equilibrium lattice constant a=6.342
A.
| 0.850015 | 0.582946 | 0.267069 |
2004.07777 | Gaze-Net: Appearance-Based Gaze Estimation using Capsule Networks | Recent studies on appearance based gaze estimation indicate the ability of
Neural Networks to decode gaze information from facial images encompassing pose
information. In this paper, we propose Gaze-Net: A capsule network capable of
decoding, representing, and estimating gaze information from ocular region
images. We evaluate our proposed system using two publicly available datasets,
MPIIGaze (200,000+ images in the wild) and Columbia Gaze (5000+ images of users
with 21 gaze directions observed at 5 camera angles/positions). Our model
achieves a Mean Absolute Error (MAE) of 2.84$^\circ$ for Combined angle error
estimate within dataset for MPI-IGaze dataset. Further, model achieves a MAE of
10.04$^\circ$ for across dataset gaze estimation error for Columbia gaze
dataset. Through transfer learning, the error is reduced to 5.9$^\circ$. The
results show this approach is promising with implications towards using
commodity webcams to develop low-cost multi-user gaze tracking systems.
| An adaptive guidance system that supports equipment operators requires a
comprehensive model of task and user behavior that considers different skill
and knowledge levels as well as diverse situations. In this study, we
investigated the relationships between user behaviors and skill levels under
operational conditions. We captured sixty samples of two sewing tasks performed
by five operators using a head-mounted RGB-d camera and a static gaze tracker.
We examined the operators' gaze and head movements, and hand interactions to
essential regions (hotspots on machine surface) to determine behavioral
differences among continuous skill improving experiences. We modeled the
variety of user behaviors to an extensive task model with a two-step automatic
approach, baseline model selection and experience integration. The experimental
results indicate that some features, such as task execution time and user head
movements, are good indexes for skill level and provide valuable information
that can be applied to obtain an effective task model. Operators with varying
knowledge and operating habits demonstrate different operational features,
which can contribute to the design of user-specific guidance.
| 0.887569 | 0.68396 | 0.203609 |
2004.07778 | Privacy-Preserving Policy Synthesis in Markov Decision Processes | In decision-making problems, the actions of an agent may reveal sensitive
information that drives its decisions. For instance, a corporation's investment
decisions may reveal its sensitive knowledge about market dynamics. To prevent
this type of information leakage, we introduce a policy synthesis algorithm
that protects the privacy of the transition probabilities in a Markov decision
process. We use differential privacy as the mathematical definition of privacy.
The algorithm first perturbs the transition probabilities using a mechanism
that provides differential privacy. Then, based on the privatized transition
probabilities, we synthesize a policy using dynamic programming. Our main
contribution is to bound the "cost of privacy," i.e., the difference between
the expected total rewards with privacy and the expected total rewards without
privacy. We also show that computing the cost of privacy has time complexity
that is polynomial in the parameters of the problem. Moreover, we establish
that the cost of privacy increases with the strength of differential privacy
protections, and we quantify this increase. Finally, numerical experiments on
two example environments validate the established relationship between the cost
of privacy and the strength of data privacy protections.
| We establish geometric and topological properties of the space of value
functions in finite state-action Markov decision processes. Our main
contribution is the characterization of the nature of its shape: a general
polytope (Aigner et al., 2010). To demonstrate this result, we exhibit several
properties of the structural relationship between policies and value functions
including the line theorem, which shows that the value functions of policies
constrained on all but one state describe a line segment. Finally, we use this
novel perspective to introduce visualizations to enhance the understanding of
the dynamics of reinforcement learning algorithms.
| 0.883818 | 0.738477 | 0.145341 |
2004.07779 | Grothendieck-Witt groups of some singular schemes | We establish some structural results for the Witt and Grothendieck-Witt
groups of schemes over $\mathbb{Z}[1/2]$, including homotopy invariance for
Witt groups and a formula for the Witt and Grothendieck-Witt groups of
punctured affine spaces over a scheme. All these results hold for singular
schemes and at the level of spectra.
| We prove a formula, originally due to Feit and Fine, for the class of the
commuting variety in the Grothendieck group of varieties. Our method, which
uses a power structure on the Grothendieck group of stacks, allows us to prove
several refinements and generalizations of the Feit-Fine formula. Our main
application is to motivic Donaldson-Thomas theory.
| 0.928392 | 0.851714 | 0.076678 |
2004.07780 | Shortcut Learning in Deep Neural Networks | Deep learning has triggered the current rise of artificial intelligence and
is the workhorse of today's machine intelligence. Numerous success stories have
rapidly spread all over science, industry and society, but its limitations have
only recently come into focus. In this perspective we seek to distil how many
of deep learning's problem can be seen as different symptoms of the same
underlying problem: shortcut learning. Shortcuts are decision rules that
perform well on standard benchmarks but fail to transfer to more challenging
testing conditions, such as real-world scenarios. Related issues are known in
Comparative Psychology, Education and Linguistics, suggesting that shortcut
learning may be a common characteristic of learning systems, biological and
artificial alike. Based on these observations, we develop a set of
recommendations for model interpretation and benchmarking, highlighting recent
advances in machine learning to improve robustness and transferability from the
lab to real-world applications.
| Modern deep learning enabled artificial neural networks, such as Deep Neural
Network (DNN) and Convolutional Neural Network (CNN), have achieved a series of
breaking records on a broad spectrum of recognition applications. However, the
enormous computation and storage requirements associated with such deep and
complex neural network models greatly challenge their implementations on
resource-limited platforms. Time-based spiking neural network has recently
emerged as a promising solution in Neuromorphic Computing System designs for
achieving remarkable computing and power efficiency within a single chip.
However, the relevant research activities have been narrowly concentrated on
the biological plausibility and theoretical learning approaches, causing
inefficient neural processing and impracticable multilayer extension thus
significantly limitations on speed and accuracy when handling the realistic
cognitive tasks. In this work, a practical multilayer time-based spiking
neuromorphic architecture, namely "MT-Spike", is developed to fill this gap.
With the proposed practical time-coding scheme, average delay response model,
temporal error backpropagation algorithm, and heuristic loss function,
"MT-Spike" achieves more efficient neural processing through flexible neural
model size reduction while offering very competitive classification accuracy
for realistic recognition tasks. Simulation results well validated that the
algorithmic power of deep multi-layer learning can be seamlessly merged with
the efficiency of time-based spiking neuromorphic architecture, demonstrating
great potentials of "MT-Spike" in resource and power constrained embedded
platforms.
| 0.845655 | 0.680617 | 0.165038 |
2004.07781 | A New Perspective on Dependence in High-Dimensional Functional/Scalar
Time Series: Finite Sample Theory and Applications | Statistical analysis of high-dimensional functional times series arises in
various applications. Under this scenario, in addition to the intrinsic
infinite-dimensionality of functional data, the number of functional variables
can grow with the number of serially dependent functional observations. In this
paper, we focus on the theoretical analysis of relevant estimated
cross-(auto)covariance terms between two multivariate functional time series or
a mixture of multivariate functional and scalar time series beyond the
Gaussianity assumption. We introduce a new perspective on dependence by
proposing functional cross-spectral stability measure to characterize the
effect of dependence on these estimated cross terms, which are essential in the
estimates for additive functional linear regressions. With the proposed
functional cross-spectral stability measure, we develop useful concentration
inequalities for estimated cross-(auto)covariance matrix functions to
accommodate more general sub-Gaussian functional linear processes and,
furthermore, establish finite sample theory for relevant estimated terms under
a commonly adopted functional principal component analysis framework. Using our
derived non-asymptotic results, we investigate the convergence properties of
the regularized estimates for two additive functional linear regression
applications under sparsity assumptions including functional linear lagged
regression and partially functional linear regression in the context of
high-dimensional functional/scalar time series.
| When testing for the mean vector in a high dimensional setting, it is
generally assumed that the observations are independently and identically
distributed. However if the data are dependent, the existing test procedures
fail to preserve type I error at a given nominal significance level. We propose
a new test for the mean vector when the dimension increases linearly with
sample size and the data is a realization of an M -dependent stationary
process. The order M is also allowed to increase with the sample size.
Asymptotic normality of the test statistic is derived by extending the central
limit theorem result for M -dependent processes using two dimensional
triangular arrays. Finite sample simulation results indicate the cost of
ignoring dependence amongst observations.
| 0.872636 | 0.81093 | 0.061706 |
2004.07782 | Network-principled deep generative models for designing drug
combinations as graph sets | Combination therapy has shown to improve therapeutic efficacy while reducing
side effects. Importantly, it has become an indispensable strategy to overcome
resistance in antibiotics, anti-microbials, and anti-cancer drugs. Facing
enormous chemical space and unclear design principles for small-molecule
combinations, the computational drug-combination design has not seen generative
models to meet its potential to accelerate resistance-overcoming drug
combination discovery. We have developed the first deep generative model for
drug combination design, by jointly embedding graph-structured domain knowledge
and iteratively training a reinforcement learning-based chemical graph-set
designer. First, we have developed Hierarchical Variational Graph Auto-Encoders
(HVGAE) trained end-to-end to jointly embed gene-gene, gene-disease, and
disease-disease networks. Novel attentional pooling is introduced here for
learning disease-representations from associated genes' representations.
Second, targeting diseases in learned representations, we have recast the
drug-combination design problem as graph-set generation and developed a deep
learning-based model with novel rewards. Specifically, besides chemical
validity rewards, we have introduced a novel generative adversarial award,
being generalized sliced Wasserstein, for chemically diverse molecules with
distributions similar to known drugs. We have also designed a network
principle-based reward for drug combinations. Numerical results indicate that,
compared to graph embedding methods, HVGAE learns more informative and
generalizable disease representations. Case studies on four diseases show that
network-principled drug combinations tend to have low toxicity. The generated
drug combinations collectively cover the disease module similar to FDA-approved
drug combinations and could potentially suggest novel systems-pharmacology
strategies.
| Deep learning is a machine learning methodology using multi-layer neural
network. A multi-layer neural network can be regarded as a chain of complete
bipartite graphs. The nodes of the first partita is the input layer and the
last is the output layer. The edges of a bipartite graph function as weights
which are represented as a matrix. The values of i-th partita are computed by
multiplication of the weight matrix and values of (i-1)-th partita. Using mass
training and teacher data, the weight parameters are estimated little by
little. Overfitting (or Overlearning) refers to a model that models the
`training data` too well. It then becomes difficult for the model to generalize
to new data which were not in the training set. The most popular method to
avoid overfitting is called dropout. Dropout deletes a random sample of
activations (nodes) to zero during the training process. A random sample of
nodes causes more irregular frequency of dropout edges. There is a similar
sampling concept in the area of design of experiments. We propose a
combinatorial design on dropout nodes from each partita which balances the
frequency of edges. We analyze and construct such designs in this paper.
| 0.891409 | 0.714226 | 0.177183 |
2004.07783 | TOI-1338: TESS' First Transiting Circumbinary Planet | We report the detection of the first circumbinary planet found by TESS. The
target, a known eclipsing binary, was observed in sectors 1 through 12 at
30-minute cadence and in sectors 4 through 12 at two-minute cadence. It
consists of two stars with masses of 1.1 MSun and 0.3 MSun on a slightly
eccentric (0.16), 14.6-day orbit, producing prominent primary eclipses and
shallow secondary eclipses. The planet has a radius of ~6.9 REarth and was
observed to make three transits across the primary star of roughly equal depths
(~0.2%) but different durations -- a common signature of transiting
circumbinary planets. Its orbit is nearly circular (e ~ 0.09) with an orbital
period of 95.2 days. The orbital planes of the binary and the planet are
aligned to within ~1 degree. To obtain a complete solution for the system, we
combined the TESS photometry with existing ground-based radial-velocity
observations in a numerical photometric-dynamical model. The system
demonstrates the discovery potential of TESS for circumbinary planets, and
provides further understanding of the formation and evolution of planets
orbiting close binary stars.
| We report parallaxes and proper motions from the Hawaii Infrared Parallax
Program for eight nearby M dwarf stars with transiting exoplanets discovered by
Kepler. We combine our directly measured distances with mass-luminosity and
radius-luminosity relationships to significantly improve constraints on the
host stars' properties. Our astrometry enables the identification of wide
stellar companions to the planet hosts. Within our limited sample, all the
multi-transiting planet hosts (three of three) appear to be single stars, while
nearly all (four of five) of the systems with a single detected planet have
wide stellar companions. By applying strict priors on average stellar density
from our updated radius and mass in our transit fitting analysis, we measure
the eccentricity probability distributions for each transiting planet. Planets
in single-star systems tend to have smaller eccentricities than those in
binaries, although this difference is not significant in our small sample. In
the case of Kepler-42bcd, where the eccentricities are known to be $\simeq$0,
we demonstrate that such systems can serve as powerful tests of M dwarf
evolutionary models by working in $L_*-\rho_*$ space. The transit-fit density
for Kepler-42bcd is inconsistent with model predictions at 2.1$\sigma$ (22%),
but matches more empirical estimates at 0.2$\sigma$ (2%), consistent with
earlier results showing model radii of M dwarfs are under-inflated. Gaia will
provide high precision parallaxes for the entire Kepler M dwarf sample, and
TESS will identify more planets transiting nearby, late-type stars, enabling
significant improvements in our understanding of the eccentricity distribution
of small planets and the parameters of late-type dwarfs.
| 0.893314 | 0.78004 | 0.113274 |
2004.07784 | Stability and instability issues of the Weinstock inequality | Given two planar, conformal, smooth open sets $\Omega$ and $\omega$, we prove
the existence of a sequence of smooth sets $\Omega_n$ which geometrically
converges to $\Omega$ and such that the (perimeter normalized) Steklov
eigenvalues of $\Omega_n$ converge to the ones of $\omega$. As a consequence,
we answer a question raised by Girouard and Polterovich on the stability of the
Weinstock inequality and prove that the inequality is genuinely unstable.
However, under some a priori knowledge of the geometry related to the
oscillations of the boundaries, stability may occur.
| Primarily motivated by the stability analysis of nonlinear waves in
second-order in time Hamiltonian systems, in this paper we develop an
instability index theory for quadratic operator pencils acting on a Hilbert
space. In an extension of the known theory for linear pencils, explicit
connections are made between the number of eigenvalues of a given quadratic
operator pencil with positive real parts to spectral information about the
individual operators comprising the coefficients of the spectral parameter in
the pencil. As an application, we apply the general theory developed here to
yield spectral and nonlinear stability/instability results for abstract
second-order in time wave equations. More specifically, we consider the problem
of the existence and stability of spatially periodic waves for the "good"
Boussinesq equation. In the analysis our instability index theory provides an
explicit, and somewhat surprising, connection between the stability of a given
periodic traveling wave solution of the "good" Boussinesq equation and the
stability of the same periodic profile, but with different wavespeed, in the
nonlinear dynamics of a related generalized Korteweg-de Vries equation.
| 0.807792 | 0.750919 | 0.056874 |
2004.07785 | Quantum erasing of laser emission in N$_2^+$ | Cavity-free lasing of N$_2^+$ induced by a femtosecond laser pulse at 800~nm
is nearly totally suppressed by a delayed twin pump pulse. We explain this
surprising effect within the V-scheme of lasing without population inversion. A
fast transfer of population between nitrogen ionic states X$^2\Sigma_g^+$ and
A$^2\Pi_u$, induced by the second pulse, terminates the conditions for
amplification in the system. Appearance of short lasing bursts at delays
corresponding to revivals of rotational wave packets are explained along the
same lines.
| Thermal effects are critical constrains for developing high-power
thulium-doped fiber lasers (TDFLs). In this paper, we numerically investigate
the lasing and thermal characteristics of the TDFLs under different pump
transitions. Our results show, the widely-used pump transition
$^3H_6\rightarrow^3H_4$, taking advantages of high-power high-efficiency laser
diodes at $\sim$0.8 $\mu$m, may not be a superior choice for directly
outputting multi-kilowatt at 2 $\mu$m because of severe thermal problems.
Meanwhile, using other pump transitions resulting 2-$\mu$m emissions,
especially the in-band pump transition $^3H_6\rightarrow^3F_4$, will decrease
the generated heat to a large extent. By optimizing the power filling factor of
the gain fiber, we find a 2-$\mu$m TDFL cladding-pumped at 1.9 $\mu$m will lead
to the laser slope efficiency close to its quantum efficiency (95\%). The
induced ultra-low quantum defect would be of great importance for power
scaling. We thus propose tandem-pumped TDFLs for reducing the heat at high
powers and discuss the related issues of design. Besides, we also explore the
differences of the thermal characteristics between laser and superfluorescent
operations, which will contribute to deepening the understanding of the thermal
effects in high-power thulium-doped fiber amplifiers.
| 0.78631 | 0.660302 | 0.126007 |
2004.07786 | Multi-Object Tracking with Siamese Track-RCNN | Multi-object tracking systems often consist of a combination of a detector, a
short term linker, a re-identification feature extractor and a solver that
takes the output from these separate components and makes a final prediction.
Differently, this work aims to unify all these in a single tracking system.
Towards this, we propose Siamese Track-RCNN, a two stage detect-and-track
framework which consists of three functional branches: (1) the detection branch
localizes object instances; (2) the Siamese-based track branch estimates the
object motion and (3) the object re-identification branch re-activates the
previously terminated tracks when they re-emerge. We test our tracking system
on two popular datasets of the MOTChallenge. Siamese Track-RCNN achieves
significantly higher results than the state-of-the-art, while also being much
more efficient, thanks to its unified design.
| We describe an end-to-end framework for learning parameters of min-cost flow
multi-target tracking problem with quadratic trajectory interactions including
suppression of overlapping tracks and contextual cues about cooccurrence of
different objects. Our approach utilizes structured prediction with a
tracking-specific loss function to learn the complete set of model parameters.
In this learning framework, we evaluate two different approaches to finding an
optimal set of tracks under a quadratic model objective, one based on an LP
relaxation and the other based on novel greedy variants of dynamic programming
that handle pairwise interactions. We find the greedy algorithms achieve almost
equivalent accuracy to the LP relaxation while being up to 10x faster than a
commercial LP solver. We evaluate trained models on three challenging
benchmarks. Surprisingly, we find that with proper parameter learning, our
simple data association model without explicit appearance/motion reasoning is
able to achieve comparable or better accuracy than many state-of-the-art
methods that use far more complex motion features or appearance affinity metric
learning.
| 0.901099 | 0.777035 | 0.124064 |
2004.07787 | Bifurcation of perturbations of non-generic closed self-shrinkers | We discover a bifurcation of the perturbations of non-generic closed
self-shrinkers. If the generic perturbation is outward, then the next mean
curvature flow singularity is cylindrical and collapsing from outside; if the
generic perturbation is inward, then the next mean curvature flow singularity
is cylindrical and collapsing from inside.
| We construct many self-similar and translating solitons for Lagrangian mean
curvature flow, including self-expanders and translating solitons with
arbitrarily small oscillation on the Lagrangian angle. Our translating solitons
play the same role as cigar solitons in Ricci flow, and are important in
studying the regularity of Lagrangian mean curvature flow.
Given two transverse Lagrangian planes R^n in C^n with sum of characteristic
angles less than pi, we show there exists a Lagrangian self-expander asymptotic
to this pair of planes. The Maslov class of these self-expanders is zero. Thus
they can serve as local models for surgeries on Lagrangian mean curvature flow.
Families of self-shrinkers and self-expanders with different topologies are
also constructed. This paper generalizes the work of Anciaux, Joyce, Lawlor,
and Lee and Wang.
| 0.884505 | 0.73506 | 0.149444 |
2004.07789 | The onset of instability in resonant chains | There is evidence that most chains of mean motion resonances of type
$k$:$k-1$ among exoplanets become unstable once the dissipative action from the
gas is removed from the system, particularly for large $N$ (the number of
planets) and $k$ (indicating how compact the chain is). We present a novel
dynamical mechanism that can explain the origin of these instabilities and thus
the dearth of resonant systems in the exoplanet sample. It relies on the
emergence of secondary resonances between a fraction of the synodic frequency
$2 \pi (1/P_1-1/P_2)$ and the libration frequencies in the mean motion
resonance. These secondary resonances excite the amplitudes of libration of the
mean motion resonances thus leading to an instability. We detail the emergence
of these secondary resonances by carrying out an explicit perturbative scheme
to second order in the planetary masses and isolating the harmonic terms that
are associated with them. Focusing on the case of three planets in the 3:2 --
3:2 mean motion resonance as an example, a simple but general analytical model
of one of these resonances is obtained which describes the initial phase of the
activation of one such secondary resonance. The dynamics of the excited system
is also briefly described. This scheme shows how one can obtain analytical
insight into the emergence of these resonances, and into the dynamics that they
trigger. Finally, a generalisation of this dynamical mechanism is obtained for
arbitrary $N$ and $k$. This leads to an explanation of previous numerical
experiments on the stability of resonant chains, showing why the critical
planetary mass allowed for stability decreases with increasing $N$ and $k$.
| We show how to treat supply networks as physical transport problems governed
by balance equations and equations for the adaptation of production speeds.
Although the non-linear behaviour is different, the linearized set of coupled
differential equations is formally related to those of mechanical or electrical
oscillator networks. Supply networks possess interesting new features due to
their complex topology and directed links. We derive analytical conditions for
absolute and convective instabilities. The empirically observed "bull-whip
effect" in supply chains is explained as a form of convective instability based
on resonance effects. Moreover, it is generalized to arbitrary supply networks.
Their related eigenvalues are usually complex, depending on the network
structure (even without loops). Therefore, their generic behavior is
characterized by oscillations. We also show that regular distribution networks
possess two negative eigenvalues only, but perturbations generate a spectrum of
complex eigenvalues.
| 0.784362 | 0.748042 | 0.03632 |
2004.07790 | There is Strength in Numbers: Avoiding the Hypothesis-Only Bias in
Natural Language Inference via Ensemble Adversarial Training | Natural Language Inference (NLI) datasets contain annotation artefacts
resulting in spurious correlations between the natural language utterances and
their respective entailment classes. These artefacts are exploited by neural
networks even when only considering the hypothesis and ignoring the premise,
leading to unwanted biases. Previous work proposed tackling this problem via
adversarial training, but this leads to learned sentence representations that
still suffer from the same biases. As a solution, we propose using an ensemble
of adversaries during the training, encouraging the model to jointly decrease
the accuracy of these different adversaries while fitting the data. We show
that using an ensemble of adversaries can prevent the bias from being relearned
after the model training is completed, further improving how well the model
generalises to different NLI datasets. In particular, these models outperformed
previous approaches when tested on 12 different NLI datasets not used in the
model training. Finally, the optimal number of adversarial classifiers depends
on the dimensionality of the sentence representations, with larger dimensional
representations benefiting when trained with a greater number of adversaries.
| We introduce DeepProbLog, a probabilistic logic programming language that
incorporates deep learning by means of neural predicates. We show how existing
inference and learning techniques can be adapted for the new language. Our
experiments demonstrate that DeepProbLog supports both symbolic and subsymbolic
representations and inference, 1) program induction, 2) probabilistic (logic)
programming, and 3) (deep) learning from examples. To the best of our
knowledge, this work is the first to propose a framework where general-purpose
neural networks and expressive probabilistic-logical modeling and reasoning are
integrated in a way that exploits the full expressiveness and strengths of both
worlds and can be trained end-to-end based on examples.
| 0.917742 | 0.729242 | 0.1885 |
2004.07791 | Investigation of background electron emission in the LUX detector | Dual-phase xenon detectors, as currently used in direct detection dark matter
experiments, have observed elevated rates of signals from electron emission
processes in the low energy region. While this background negatively impacts
detector performance in various ways, its origins have only been partially
studied. In this paper, we report a systematic investigation of the electron
pathologies observed in the LUX dark matter experiment. We characterize
different electron populations based on their emission intensities and their
correlations with preceding energy depositions in the detector. By studying
these electron backgrounds under different experimental conditions, we
identified the possible mechanisms that may contribute to the electron
emission. We report the observed electron event rate in LUX after background
rejection, and discuss how such backgrounds can be further mitigated in ongoing
and future xenon-based dark matter experiments.
| A new detector array, Solenogam, has been developed at the Australian
National University Heavy Ion Accelerator Facility. Coupled initially to the
SOLITAIRE 6.5 T, gas-filled, solenoidal separator, and later to an 8 T
solenoid, the system enables the study of long-lived nuclear states through
$\gamma$-ray and conversion-electron spectroscopy in a low-background
environment. The detector system is described and results from the
commissioning experiments are presented.
| 0.836803 | 0.745173 | 0.091631 |
2004.07792 | Scalar Field Wave (Fuzzy) Dark Matter and the Formation of Galaxies | We investigate Scalar Field Wave Dark Matter in the context of galactic Dark
Matter halos. In particular, we offer an analysis of the Baryonic Tully-Fisher
Relation (BTFR). We detail a particular family of excited state solutions to
the Einstein-Klein-Gordon equations, and use it to provide a novel theoretical
model for producing the BTFR. We then solve this model computationally to
simulate the BTFR. Interpreting the Dark Matter scalar field as an ultralight
boson, this returns a conservative mass constraint of $m\geq 10^{-23}eV$.
Assuming slightly stronger conditions suggests $m\geq 10^{-22}eV$ to be more
compatible with the BTFR. We provide a discussion of Scalar Field Dark Matter
rotation curves and the structure of Scalar Field Dark Matter halos.
Compatibility with the BTFR requires the excited state solutions to obey
particular boundary conditions; this may have implications for the behavior of
Dark Matter halos and the formation of galaxies.
| We consider alternative theories of gravity with a direct coupling between
matter and the Ricci scalar We study the relation between these theories and
ordinary scalar-tensor gravity, or scalar-tensor theories which include
non-standard couplings between the scalar and matter. We then analyze the
motion of matter in such theories, its implications for the Equivalence
Principle, and the recent claim that they can alleviate the dark matter problem
in galaxies.
| 0.793611 | 0.728836 | 0.064775 |
2004.07793 | Trajectory Planning and Control for Automatic Docking of ASVs with
Full-Scale Experiments | We propose a method for performing automatic docking of a small autonomous
surface vehicle (ASV) by interconnecting an optimization-based trajectory
planner with a dynamic positioning (DP) controller for trajectory tracking. The
trajectory planner provides collision-free trajectories by considering a map
with static obstacles, and produces feasible trajectories through inclusion of
a mathematical model of the ASV and its actuators. The DP controller tracks the
time-parametrized position, velocity and acceleration produced by the
trajectory planner using proportional-integral-derivative feedback with
velocity and acceleration feed forward. The method's performance is tested on a
small ASV in confined waters in Trondheim, Norway. The ASV performs
collision-free docking maneuvers with respect to static obstacles when tracking
the generated reference trajectories and achieves successful docking.
| We present a method for fast and accurate physics-based predictions during
non-prehensile manipulation planning and control. Given an initial state and a
sequence of controls, the problem of predicting the resulting sequence of
states is a key component of a variety of model-based planning and control
algorithms. We propose combining a coarse (i.e. computationally cheap but not
very accurate) predictive physics model, with a fine (i.e. computationally
expensive but accurate) predictive physics model, to generate a hybrid model
that is at the required speed and accuracy for a given manipulation task. Our
approach is based on the Parareal algorithm, a parallel-in-time integration
method used for computing numerical solutions for general systems of ordinary
differential equations. We adapt Parareal to combine a coarse pushing model
with an off-the-shelf physics engine to deliver physics-based predictions that
are as accurate as the physics engine but run in substantially less wall-clock
time, thanks to parallelization across time. We use these physics-based
predictions in a model-predictive-control framework based on trajectory
optimization, to plan pushing actions that avoid an obstacle and reach a goal
location. We show that with hybrid physics models, we can achieve the same
success rates as the planner that uses the off-the-shelf physics engine
directly, but significantly faster. We present experiments in simulation and on
a real robotic setup. Videos are available here: https://youtu.be/5e9oTeu4JOU
| 0.907609 | 0.719197 | 0.188412 |
2004.07794 | Optimal Regularizing Estimate of Linearized Boltzmann equation without
cut-off for Hard Potential | In this article, we present a pseudo-differential calculus method for
deriving the regularizing estimate, with respect to velocity $v$, on the
semigroup generated by linearized Boltzmann operator. To this goals, we write
the spatially inhomogeneous linearized Boltzmann operator as
$B=-v\cdot\nabla_x-A+K$ and its Fourier transform on $x$ as
$\widehat{B}(y)=\widehat{A}(y)+K$, where $-v\cdot\nabla_x-A$, $\widehat{A}(y)$
are dissipative and hypoelliptic, $K$ is compact. These good properties yields
that $B$ generates strongly continuous semigroup. As a consequence, in the case
of hard potential, we obtain the optimal regular estimate, with respect to
velocity, on the semigroup $e^{tB}$ from $H(\tilde{a}^{-1/2}\langle
y\rangle^l)$ into $H(\tilde{a}^{1/2}\langle y \rangle^l)$ with a sharp large
time decay, building on weighted Sobolev space. Our analysis provides a further
study of pseudo-differential calculus as well as semigroup theory to linearized
Boltzmann equation.
| This paper focuses on unconditionally optimal error analysis of an uncoupled
and linearized Crank--Nicolson Galerkin finite element method for the
time-dependent nonlinear thermistor equations in $d$-dimensional space,
$d=2,3$. We split the error function into two parts, one from the spatial
discretization and one from the temporal discretization, by introducing a
corresponding time-discrete (elliptic) system. We present a rigorous analysis
for the regularity of the solution of the time-discrete system and error
estimates of the time discretization. With these estimates and the proved
regularity, optimal error estimates of the fully discrete Crank--Nicolson
Galerkin method are obtained unconditionally. Numerical results confirm our
analysis and show the efficiency of the method.
| 0.827303 | 0.705286 | 0.122017 |
2004.07796 | Detecting many-body Bell non-locality by solving Ising models | Bell non-locality represents the ultimate consequence of quantum
entanglement, fundamentally undermining the classical tenet that
spatially-separated degrees of freedom possess objective attributes
independently of the act of their measurement. Despite its importance, probing
Bell non-locality in many-body systems is considered to be a formidable
challenge, with a computational cost scaling exponentially with system size.
Here we propose and validate an efficient variational scheme, based on the
solution of inverse Ising problems, which in polynomial time can probe whether
an arbitrary set of quantum data is compatible with a local theory; and, if
not, it delivers a many-body Bell inequality violated by the quantum data. We
use our approach to unveil new many-body Bell inequalities, violated by
suitable measurements on paradigmatic quantum states (the low-energy states of
Heisenberg antiferromagnets), paving the way to systematic Bell tests in the
many-body realm.
| Quantum interference lies at the heart of several surprising equilibrium and
non-equilibrium phenomena in many-body Physics. Here we discuss two recently
explored non-equilibrium scenarios where external periodic drive applied to
closed (i.e., not attached to any external bath) quantum many-body systems have
apparently opposite effects in respective cases. In one case it
freezes/localizes a disorder free system dynamically, while in the other it
delocalizes a disordered many-body localized system, and quantum interference
is responsible for both the effects. We review these in the perspective of more
general questions of ergodicity, energy absorption, asymptotic behavior, and
finally the essential role of quantum mechanics in understanding these issues
in periodically driven closed many-body systems. In this article we intend to
deliver a non-technical account of some recent developments in this field in a
manner accessible to a broad readership.
| 0.887958 | 0.690635 | 0.197323 |
2004.07797 | Non-Gaussian correlations imprinted by local dephasing in fermionic
wires | We study the behavior of an extended fermionic wire coupled to a local
stochastic field. Since the quantum jump operator is Hermitian and quadratic in
fermionic operators, it renders the model soluble, allowing investigation of
the properties of the non-equilibrium steady-state and the role of
dissipation-induced fluctuations. We derive a closed set of equations of motion
solely for the two-point correlator; on the other hand, we find, surprisingly,
that the many-body state exhibits non-Gaussian correlations. Density-density
correlation function demonstrates a crossover from a regime of weak dissipation
characterized by moderate heating and stimulated fluctuations to a quantum Zeno
regime ruled by strong dissipation, which tames quantum fluctuations. Instances
of soluble dissipative impurities represent an experimentally viable platform
to understand the interplay between dissipation and Hamiltonian dynamics in
many-body quantum systems.
| We present the first 2+1 flavour lattice QCD calculations of pseudoscalar
flavour-singlet propagators using improved staggered fermions. We explore the
relevant techniques and discuss prospects for the larger scale studies now in
progress. The disconnected correlator is shown to have a highly non-Gaussian
distribution and reliable estimates of the errors require care.
| 0.838103 | 0.690945 | 0.147159 |
2004.07798 | The Dimensions of Hyperspaces | We use the theory of computing to prove general hyperspace dimension theorems
for three important fractal dimensions. Let $X$ be a separable metric space,
and let $\mathcal{K}(X)$ be the \emph{hyperspace} of $X$, i.e., the set of all
nonempty compact subsets of $X$, endowed with the Hausdorff metric. For the
lower and upper Minkowski (i.e., box-counting) dimensions, we give precise
formulas for the dimension of $\mathcal{K}(E)$, where $E$ is any subset of $X$.
For packing dimension, we give a tight bound on the dimension of
$\mathcal{K}(E)$ in terms of the dimension of $E$, where $E$ is any analytic
(i.e., $\mathbf{\Sigma}^1_1$) subset of $X$. These results also hold for a
large class of gauge families (Hausdorff families of gauge functions).
The logical structures of our proofs are of particular interest. We first
extend two algorithmic fractal dimensions--computability-theoretic versions of
classical Hausdorff and packing dimensions that assign dimensions $\dim(x)$ and
$\textrm{Dim}(x)$ to individual points $x \in X$--to arbitrary separable metric
spaces and to arbitrary gauge families. We then extend the point-to-set
principle of J. Lutz and N. Lutz (2018) to arbitrary separable metric spaces
and to a large class of gauge families. Finally, we use this principle to prove
our hyperspace packing dimension theorem. This is one of a handful of
cases--all very recent and all using the point-to-set principle--in which the
theory of computing has been used to prove new theorems in classical geometric
measure theory, theorems whose statements do not involve computation or logic.
| The possibility that higher dimensional field theories are broken
spontaneously, through the usual Nambu-Goldstone mechanism, to 4-dimension is
explored. As a consequence, vector Goldstone bosons can arise in this breaking
of Lorentzian symmetry from higher dimension to 4-dimension. This can provide a
simple mechanism for reduction to 4-dimension in theories with extra
dimensions.
| 0.822298 | 0.675769 | 0.146529 |
2004.07800 | Leveraging GANs to Improve Continuous Path Keyboard Input Models | Continuous path keyboard input has higher inherent ambiguity than standard
tapping, because the path trace may exhibit not only local
overshoots/undershoots (as in tapping) but also, depending on the user,
substantial mid-path excursions. Deploying a robust solution thus requires a
large amount of high-quality training data, which is difficult to
collect/annotate. In this work, we address this challenge by using GANs to
augment our training corpus with user-realistic synthetic data. Experiments
show that, even though GAN-generated data does not capture all the
characteristics of real user data, it still provides a substantial boost in
accuracy at a 5:1 GAN-to-real ratio. GANs therefore inject more robustness in
the model through greatly increased word coverage and path diversity.
| Facial expression recognition is a challenging task due to two major
problems: the presence of inter-subject variations in facial expression
recognition dataset and impure expressions posed by human subjects. In this
paper we present a novel Human-to-Animation conditional Generative Adversarial
Network (HA-GAN) to overcome these two problems by using many (human faces) to
one (animated face) mapping. Specifically, for any given input human expression
image, our HA-GAN transfers the expression information from the input image to
a fixed animated identity. Stylized animated characters from the Facial
Expression Research Group-Database (FERGDB) are used for the generation of
fixed identity. By learning this many-to-one identity mapping function using
our proposed HA-GAN, the effect of inter-subject variations can be reduced in
Facial Expression Recognition(FER). We also argue that the expressions in the
generated animated images are pure expressions and since FER is performed on
these generated images, the performance of facial expression recognition is
improved. Our initial experimental results on the state-of-the-art datasets
show that facial expression recognition carried out on the generated animated
images using our HA-GAN framework outperforms the baseline deep neural network
and produces comparable or even better results than the state-of-the-art
methods for facial expression recognition.
| 0.909984 | 0.668274 | 0.241711 |
2004.07801 | $L^p-L^q$ boundedness of Fourier multipliers associated with the
aharmonic Oscillator | In this paper we study the boundedness of the Fourier multipliers associated
with the eigenfunctions expansions of the aharmonic oscillator. Using the
notion of a global symbol we extend a classical condition of H\"ormander to
guarantee the $L^p$-$L^q$ boundedness of operators for the range $1<p \leq 2
\leq q <\infty$. As a consequence, we obtain a boundedness of spectral
multipliers of the aharmonic oscillator. We apply it to get embedding theorems
and time asymptotic for the $L^p$-$L^q$ norms of heat kernels for the aharmonic
oscillator. We acquire our main objective by investigating Paley-type
inequality and the Hausdorff-Young-Paley-type inequality in this context. We
also prove the $r$-nuclearity of functions of the aharmonic oscillator on
modulation spaces and present a trace formula.
| The Hausdorff-Young inequality confirms the continuity of the Fourier
transform $\mathcal{F}$ from $L^{p}(\mathbb{R}^{d})$ to $L^{q}(\mathbb{R}^{d})$
exclusively when $1\leq p\leq 2$ and $q$ is its conjugate Lebesgue exponent.
Let $\Omega$ be a Lebesgue measurable bounded subset of $\mathbb{R}^{d}$.
We show that $\mathcal{F}$ is bounded from $L^{p}(\mathbb{R}^{d})$ to
$L^{q}(\Omega)$ precisely when $\frac{1}{p}+\frac{1}{q}\geq 1$ and $1\leq p\leq
2$. Let $N>>1$ be arbitrarily large. We construct concrete counterexamples that
prove the unboundedness of $\mathcal{F}$ from $L^{p}(\mathbb{R}^{d})$ to
$L^{q}\left(\left\{|x|>>N\right\}\right)$ outside the admissible range of the
Hausdorff-Young inequality.
| 0.938768 | 0.798704 | 0.140064 |
2004.07802 | Geometry-Aware Gradient Algorithms for Neural Architecture Search | Many recent state-of-the-art methods for neural architecture search (NAS)
relax the NAS problem into a joint continuous optimization over architecture
parameters and their shared-weights, enabling the application of standard
gradient-based optimizers. However, this training process remains poorly
understood, as evidenced by the multitude of gradient-based heuristics that
have been recently proposed. Invoking the theory of mirror descent, we present
a unifying framework for designing and analyzing gradient-based NAS methods
that exploit the underlying problem structure to quickly find high-performance
architectures. Our geometry-aware framework leads to simple yet novel
algorithms that (1) enjoy faster convergence guarantees than existing
gradient-based methods and (2) achieve state-of-the-art accuracy on the latest
NAS benchmarks in computer vision. Notably, we exceed the best published
results for both CIFAR and ImageNet on both the DARTS search space and
NAS-Bench-201; on the latter benchmark we achieve close to oracle-optimal
performance on CIFAR-10 and CIFAR-100. Together, our theory and experiments
demonstrate a principled way to co-design optimizers and continuous
parameterizations of discrete NAS search spaces.
| Pure acoustic neural models, particularly the LSTM-RNN model, have shown
great potential in language identification (LID). However, the phonetic
information has been largely overlooked by most of existing neural LID models,
although this information has been used in the conventional phonetic LID
systems with a great success. We present a phone-aware neural LID architecture,
which is a deep LSTM-RNN LID system but accepts output from an RNN-based ASR
system. By utilizing the phonetic knowledge, the LID performance can be
significantly improved. Interestingly, even if the test language is not
involved in the ASR training, the phonetic knowledge still presents a large
contribution. Our experiments conducted on four languages within the Babel
corpus demonstrated that the phone-aware approach is highly effective.
| 0.878217 | 0.659115 | 0.219101 |
2004.07803 | Refining the Uluzzian through a new lithic assemblage from Roccia San
Sebastiano (Mondragone, southern Italy) | Roccia San Sebastiano is a tectonic-karstic cave located at the foot of the
southern slope of Mt. Massico, in the territory of Mondragone (Caserta) in
Campania (southern Italy). Systematic excavation has been carried out since
2001, leading to the partial exploration of an important Pleistocene deposit,
extraordinarily rich in lithic and faunal remains. The aim of this paper is to
(1) present the stratigraphic sequence of Roccia San Sebastiano, and (2)
technologically describe the lithic materials of squares F14 t18, t19, t20; E16
t16, t17, t18 recently recognised as Uluzzian. The stratigraphic sequence is
more than 3 metres thick and dates from the Middle to the Upper Palaeolithic.
It contains different techno-complexes: Gravettian, Aurignacian, Uluzzian and
Mousterian. In the Uluzzian lithic assemblage mostly local pebbles of chert
were used in order to produce small-sized objects. The concept of debitage
mainly deals with unidirectional debitage with absent or fairly accurate
management of the convexities and angles; the striking platforms are usually
natural or made by one stroke. It is attested the use of both direct freehand
percussion and bipolar technique on anvil in the same reduction sequence.
Amongst the retouched tools the presence of two lunates is of note. This study
of the Roccia San Sebastiano Uluzzian lithic complexes is significant for
understanding the dynamics of the transition from Middle to Upper Palaeolithic
in the Tyrrhenian margin of southern Italy.
| We present a comprehensive structural characterization of two different
highly pure nuclear graphites that compasses all relevant length scales from
nanometers to sub-mm. This has been achieved by combining several experiments
and neutron techniques: Small Angle Neutron Scattering (SANS), high-resolution
Spin Echo SANS (SESANS) and neutron imaging. In this way it is possible to
probe an extraordinary broad range of 6 orders of magnitude in length from
microscopic to macroscopic length scales. The results reveal a fractal
structure that extends from $ \sim $ 0.6 nm to 0.6 mm and has surface and mass
fractal dimensions both very close to 2.5, a value found for percolating
clusters and fractured ranked surfaces in 3D.
| 0.884685 | 0.593748 | 0.290936 |
2004.07804 | A Game Theoretic Framework for Model Based Reinforcement Learning | Model-based reinforcement learning (MBRL) has recently gained immense
interest due to its potential for sample efficiency and ability to incorporate
off-policy data. However, designing stable and efficient MBRL algorithms using
rich function approximators have remained challenging. To help expose the
practical challenges in MBRL and simplify algorithm design from the lens of
abstraction, we develop a new framework that casts MBRL as a game between: (1)
a policy player, which attempts to maximize rewards under the learned model;
(2) a model player, which attempts to fit the real-world data collected by the
policy player. For algorithm development, we construct a Stackelberg game
between the two players, and show that it can be solved with approximate
bi-level optimization. This gives rise to two natural families of algorithms
for MBRL based on which player is chosen as the leader in the Stackelberg game.
Together, they encapsulate, unify, and generalize many previous MBRL
algorithms. Furthermore, our framework is consistent with and provides a clear
basis for heuristics known to be important in practice from prior works.
Finally, through experiments we validate that our proposed algorithms are
highly sample efficient, match the asymptotic performance of model-free policy
gradient, and scale gracefully to high-dimensional tasks like dexterous hand
manipulation.
| We study the problem of Reinforcement Learning (RL) using as few real-world
samples as possible. A naive application of RL can be inefficient in large and
continuous state spaces. We present two versions of Multi-Fidelity
Reinforcement Learning (MFRL), model-based and model-free, that leverage
Gaussian Processes (GPs) to learn the optimal policy in a real-world
environment. In the MFRL framework, an agent uses multiple simulators of the
real environment to perform actions. With increasing fidelity in a simulator
chain, the number of samples used in successively higher simulators can be
reduced. By incorporating GPs in the MFRL framework, we empirically observe up
to $40\%$ reduction in the number of samples for model-based RL and $60\%$
reduction for the model-free version. We examine the performance of our
algorithms through simulations and through real-world experiments for
navigation with a ground robot.
| 0.876696 | 0.813183 | 0.063513 |
2004.07805 | Quantifying uncertainties and correlations in the nuclear-matter
equation of state | We perform statistically rigorous uncertainty quantification (UQ) for chiral
effective field theory ($\chi$EFT) applied to infinite nuclear matter up to
twice nuclear saturation density. The equation of state (EOS) is based on
high-order many-body perturbation theory calculations with consistent
nucleon-nucleon and three-nucleon interactions up to fourth order in the
$\chi$EFT expansion. From these calculations our newly developed Bayesian
machine-learning approach extracts the size and smoothness properties of the
correlated EFT truncation error. We then propose a novel extension that uses
multi-task machine learning to reveal correlations between the EOS at different
proton fractions. The inferred in-medium $\chi$EFT breakdown scale in pure
neutron matter and symmetric nuclear matter is consistent with that from
free-space nucleon-nucleon scattering. These significant advances allow us to
provide posterior distributions for the nuclear saturation point and propagate
theoretical uncertainties to derived quantities: the pressure and
incompressibility of symmetric nuclear matter, the nuclear symmetry energy, and
its derivative. Our results, which are validated by statistical diagnostics,
demonstrate that an understanding of truncation-error correlations between
different densities and different observables is crucial for reliable UQ. The
methods developed here are publicly available as annotated Jupyter notebooks.
| A mean field calculation for obtaining the equation of state (EOS) for
symmetric nuclear matter from a density dependent M3Y interaction supplemented
by a zero-range potential is described. The energy per nucleon is minimized to
obtain the ground state of symmetric nuclear matter. The saturation energy per
nucleon used for nuclear matter calculations is determined from the
co-efficient of the volume term of Bethe-Weizs\"acker mass formula which is
evaluated by fitting the recent experimental and estimated atomic mass excesses
from Audi-Wapstra-Thibault atomic mass table by minimizing the mean square
deviation. The constants of density dependence of the effective interaction are
obtained by reproducing the saturation energy per nucleon and the saturation
density of spin and isospin symmetric cold infinite nuclear matter. The EOS of
symmetric nuclear matter, thus obtained, provide reasonably good estimate of
nuclear incompressibility. Once the consants of density dependence are
determined, EOS for asymmetric nuclear matter is calculated by adding to the
isoscalar part, the isovector component of the M3Y interaction that do not
contribute to the EOS of symmetric nuclear matter. These EOS are then used to
calculate the pressure, the energy density and the velocity of sound in
symmetric as well as isospin asymmetric nuclear matter.
| 0.866557 | 0.823285 | 0.043272 |
2004.07806 | MobiAxis: An Embodied Learning Task for Teaching Multiplication with a
Social Robot | The use of robots in educational settings is growing increasingly popular.
Yet, many of the learning tasks involving social robots do not take full
advantage of their physical embodiment. MobiAxis is a proposed learning task
which uses the physical capabilities of a Pepper robot to teach the concepts of
positive and negative multiplication along a number line. The robot is embodied
with a number of multi-modal socially intelligent features and behaviours which
are designed to enhance learning. This paper is a position paper describing the
technical and theoretical implementation of the task, as well as proposed
directions for future studies.
| Multi-task learning is a very challenging problem in reinforcement learning.
While training multiple tasks jointly allow the policies to share parameters
across different tasks, the optimization problem becomes non-trivial: It is
unclear what parameters in the network should be reused across tasks, and the
gradients from different tasks may interfere with each other. Thus, instead of
naively sharing parameters across tasks, we introduce an explicit
modularization technique on policy representation to alleviate this
optimization issue. Given a base policy network, we design a routing network
which estimates different routing strategies to reconfigure the base network
for each task. Instead of creating a concrete route for each task, our
task-specific policy is represented by a soft combination of all possible
routes. We name this approach soft modularization. We experiment with multiple
robotics manipulation tasks in simulation and show our method improves sample
efficiency and performance over baselines by a large margin.
| 0.909245 | 0.711018 | 0.198227 |
2004.07807 | Classification Benchmarks for Under-resourced Bengali Language based on
Multichannel Convolutional-LSTM Network | Exponential growths of social media and micro-blogging sites not only provide
platforms for empowering freedom of expressions and individual voices but also
enables people to express anti-social behaviour like online harassment,
cyberbullying, and hate speech. Numerous works have been proposed to utilize
these data for social and anti-social behaviours analysis, document
characterization, and sentiment analysis by predicting the contexts mostly for
highly resourced languages such as English. However, there are languages that
are under-resources, e.g., South Asian languages like Bengali, Tamil, Assamese,
Telugu that lack of computational resources for the NLP tasks. In this paper,
we provide several classification benchmarks for Bengali, an
\texttt{under-resourced language}. We prepared three datasets of expressing
hate, commonly used topics, and opinions for hate speech detection, document
classification, and sentiment analysis, respectively. We built the largest
Bengali word embedding models to date based on 250 million articles, which we
call \texttt{BengFastText}. We perform three different experiments, covering
document classification, sentiment analysis, and hate speech detection. We
incorporate word embeddings into a Multichannel
Convolutional-LSTM~(\texttt{MConv-LSTM}) network for predicting different types
of hate speech, document classification, and sentiment analysis. Experiments
demonstrate that \texttt{BengFastText} can capture the semantics of words from
respective contexts correctly. Evaluations against several baseline embedding
models, e.g., Word2Vec and GloVe yield up to 92.30\%, 82.25\%, and 90.45\%
F1-scores in case of document classification, sentiment analysis, and hate
speech detection, respectively during 5-fold cross-validation tests.
| In spite of achieving revolutionary successes in machine learning, deep
convolutional neural networks have been recently found to be vulnerable to
adversarial attacks and difficult to generalize to novel test images with
reasonably large geometric transformations. Inspired by a recent neuroscience
discovery revealing that primate brain employs disentangled shape and
appearance representations for object recognition, we propose a general
disentangled deep autoencoding regularization framework that can be easily
applied to any deep embedding based classification model for improving the
robustness of deep neural networks. Our framework effectively learns
disentangled appearance code and geometric code for robust image
classification, which is the first disentangling based method defending against
adversarial attacks and complementary to standard defense methods. Extensive
experiments on several benchmark datasets show that, our proposed
regularization framework leveraging disentangled embedding significantly
outperforms traditional unregularized convolutional neural networks for image
classification on robustness against adversarial attacks and generalization to
novel test data.
| 0.759317 | 0.670381 | 0.088936 |
2004.07808 | Mathematical analysis of the acoustic imaging modality using bubbles as
contrast agents at nearly resonating frequencies | We analyze mathematically the acoustic imaging modality using bubbles as
contrast agents. These bubbles are modeled by mass densities and bulk moduli
enjoying contrasting scales. These contrasting scales allow them to resonate at
certain incident frequencies. We consider two types of such contrasts. In the
first one, the bubbles are light with small bulk modulus, as compared to the
ones of the background, so that they generate the Minnaert resonance
(corresponding to a local surface wave). In the second one, the bubbles have
moderate mass density but still with small bulk modulus so that they generate a
sequence of resonances (corresponding to local body waves).
We propose to use as measurements the far-fields collected before and after
injecting a bubble, set at a given location point in the target domain,
generated at a band of incident frequencies and at a fixed single
backscattering direction. Then, we scan the target domain with such bubbles and
collect the corresponding far-fields. The goal is to reconstruct both the,
variable, mass density and bulk modulus of the background in the target region.
1. We show that, for each fixed used bubble, the contrasted far-fields reach
their maximum value at, incident, frequencies close to the Minneart resonance
(or the body-wave resonances depending on the types of bubbles we use). Hence,
we can reconstruct this resonance from our data. The explicit dependence of the
Minnaert resonance in terms of the background mass density of the background
allows us to recover it, i.e. the mass density, in a straightforward way.
2. In addition, this measured contrasted far-fields allow us to recover the
total field at the location points of the bubbles (i.e. the total field in the
absence of the bubbles). A numerical differentiation argument, for instance,
allows us to recover the bulk modulus of the targeted region as well.
| Multimodal medical image fusion helps in combining contrasting features from
two or more input imaging modalities to represent fused information in a single
image. One of the pivotal clinical applications of medical image fusion is the
merging of anatomical and functional modalities for fast diagnosis of malignant
tissues. In this paper, we present a novel end-to-end unsupervised
learning-based Convolutional Neural Network (CNN) for fusing the high and low
frequency components of MRI-PET grayscale image pairs, publicly available at
ADNI, by exploiting Structural Similarity Index (SSIM) as the loss function
during training. We then apply color coding for the visualization of the fused
image by quantifying the contribution of each input image in terms of the
partial derivatives of the fused image. We find that our fusion and
visualization approach results in better visual perception of the fused image,
while also comparing favorably to previous methods when applying various
quantitative assessment metrics.
| 0.890648 | 0.663335 | 0.227313 |
2004.07809 | Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case | The detection-efficiency mismatch is a common problem in practical quantum
key distribution (QKD) systems. The security of quantum key distribution in
this case is proved only under the assumption that either the output of the
sender side or the input to the receiver side are single-photon signals, which
impose a restriction over the class of possible eavesdropping strategies. Here
we present a security proof without such a restriction and, thus, solve this
important problem and prove the security of quantum key distribution with
detection-efficiency mismatch against general attacks. In particular, we
propose an adaptation of the decoy state method to the case of
detection-efficiency mismatch.
| Secure quantum conferencing refers to a protocol where a number of trusted
users generate exactly the same secret key to confidentially broadcast private
messages. By a simple modification of the techniques first introduced in
[Pirandola, arXiv:1601.00966], we derive single-letter upper bounds for the
maximal rate for secure conferencing in a quantum network of arbitrary
topology, where the users are allowed to perform the most powerful local
operations assisted by two-way classical communications, and where the quantum
systems are routed through the network according to the most efficient
multipath flooding strategies. More precisely, our analysis allows us to bound
the ultimate rates that are achievable by general multiple-multicast protocols,
where N senders distribute N independent secret keys, and each key is to be
shared with an ensemble of M receivers.
| 0.919223 | 0.823119 | 0.096103 |
2004.07810 | Harmonic based model predictive control for set-point tracking | This paper presents a novel model predictive control (MPC) formulation for
set-point tracking. Stabilizing predictive controllers based on terminal
ingredients may exhibit stability and feasibility issues in the event of a
reference change for small to moderate prediction horizons. In the MPC for
tracking formulation, these issues are solved by the addition of an artificial
equilibrium point as a new decision variable, providing a significantly
enlarged domain of attraction and guaranteeing recursive feasibility for any
reference change. However, it may suffer from performance issues if the
prediction horizon is not large enough. This paper presents an extension of
this formulation where a harmonic artificial reference is used in place of the
equilibrium point. The proposed formulation achieves even greater domains of
attraction and can significantly outperform other MPC formulations when the
prediction horizon is small. We prove the asymptotic stability and recursive
feasibility of the proposed controller, as well as provide guidelines for the
design of its main ingredients. Finally, we highlight its advantages with a
case study of a ball and plate system.
| An optimal trade-off design for fractional order (FO)-PID controller is
proposed in this paper with a Linear Quadratic Regulator (LQR) based technique
using two conflicting time domain control objectives. The deviation of the
state trajectories and control signal are automatically enforced by the LQR. A
class of delayed FO systems with single non-integer order element has been
controlled here which exhibit both sluggish and oscillatory open loop
responses. The FO time delay processes are controlled within a multi-objective
optimization (MOO) formulation of LQR based FOPID design. The time delays in
the FO models are handled by two analytical formulations of designing optimal
quadratic regulator for delayed systems. A comparison is made between the two
approaches of LQR design for the stabilization of time-delay systems in the
context of FOPID controller tuning. The MOO control design methodology yields
the Pareto optimal trade-off solutions between the tracking performance for
unit set-point change and total variation (TV) of the control signal. Numerical
simulations are provided to compare the merits of the two delay handling
techniques in the multi-objective LQR-FOPID design, while also showing the
capability of load disturbance suppression using these optimal controllers.
Tuning rules are then formed for the optimal LQR-FOPID controller knobs, using
the median of the non-dominated Pareto solution to handle delays FO processes.
| 0.874975 | 0.676825 | 0.19815 |
2004.07811 | Minimising the impact of scale-dependent galaxy bias on the joint
cosmological analysis of large scale structures | We present a mitigation strategy to reduce the impact of non-linear galaxy
bias on the joint `$3 \times 2 $pt' cosmological analysis of weak lensing and
galaxy surveys. The $\Psi$-statistics that we adopt are based on Complete
Orthogonal Sets of E/B Integrals (COSEBIs). As such they are designed to
minimise the contributions to the observable from the smallest physical scales
where models are highly uncertain. We demonstrate that $\Psi$-statistics carry
the same constraining power as the standard two-point galaxy clustering and
galaxy-galaxy lensing statistics, but are significantly less sensitive to
scale-dependent galaxy bias. Using two galaxy bias models, motivated by
halo-model fits to data and simulations, we quantify the error in a standard $3
\times 2$pt analysis where constant galaxy bias is assumed. Even when adopting
conservative angular scale cuts, that degrade the overall cosmological
parameter constraints, we find of order $1 \sigma$ biases for Stage III surveys
on the cosmological parameter $S_8 = \sigma_8(\Omega_{\rm m}/0.3)^{\alpha}$.
This arises from a leakage of the smallest physical scales to all angular
scales in the standard two-point correlation functions. In contrast, when
analysing $\Psi$-statistics under the same approximation of constant galaxy
bias, we show that the bias on the recovered value for $S_8$ can be decreased
by a factor of $\sim 2$, with less conservative scale cuts. Given the
challenges in determining accurate galaxy bias models in the highly non-linear
regime, we argue that $3 \times 2$pt analyses should move towards new
statistics that are less sensitive to the smallest physical scales.
| We study the effect of large-scale tidal fields on internal halo properties
using a set of N-body simulations. We measure significant cross-correlations
between large-scale tidal fields and several non-scalar halo properties:
shapes, velocity dispersion, and angular momentum. Selection effects that
couple to these non-scalar halo properties can produce anisotropic clustering
even in real-space. We investigate the size of this effect and show that it can
produce a non-zero quadrupole similar in size to the one generated by linear
redshift-space distortions (RSD). Finally, we investigate the clustering
properties of halos identified in redshift-space and find enormous deviations
from the standard linear RSD model, again caused by anisotropic assembly bias.
These effects could contaminate the values of cosmological parameters inferred
from the observed redshift-space clustering of galaxies, groups, or 21cm
emission from atomic hydrogen, if their selection depends on properties
affected by halo assembly bias. We briefly discuss ways in which this effect
can be measured in existing and future large-scale structure surveys.
| 0.876136 | 0.800374 | 0.075762 |
2004.07812 | Bus Frequency Optimization: When Waiting Time Matters in User
Satisfaction | Reorganizing bus frequency to cater for the actual travel demand can save the
cost of the public transport system significantly. Many, if not all, existing
studies formulate this as a bus frequency optimization problem which tries to
minimize passengers' average waiting time. However, many investigations have
confirmed that the user satisfaction drops faster as the waiting time
increases. Consequently, this paper studies the bus frequency optimization
problem considering the user satisfaction. Specifically, for the first time to
our best knowledge, we study how to schedule the buses such that the total
number of passengers who could receive their bus services within the waiting
time threshold is maximized. We prove that this problem is NP-hard, and present
an index-based algorithm with $(1-1/e)$ approximation ratio. By exploiting the
locality property of routes in a bus network, we propose a partition-based
greedy method which achieves a $(1-\rho)(1-1/e)$ approximation ratio. Then we
propose a progressive partition-based greedy method to further improve the
efficiency while achieving a $(1-\rho)(1-1/e-\varepsilon)$ approximation ratio.
Experiments on a real city-wide bus dataset in Singapore verify the efficiency,
effectiveness, and scalability of our methods.
| This work addresses the distributed frequency control problem in power
systems considering controllable load with a nonsmooth cost. The nonsmoothness
exists widely in power systems, such as tiered price, greatly challenging the
design of distributed optimal controllers. In this regard, we first formulate
an optimization problem that minimizes the nonsmooth regulation cost, where
both capacity limits of controllable load and tie-line flow are considered.
Then, a distributed controller is derived using the Clark generalized gradient.
We also prove the optimality of the equilibrium of the closed-loop system as
well as its asymptotic stability. Simulations carried out on the IEEE 68-bus
system verifies the effectiveness of the proposed method.
| 0.837153 | 0.621434 | 0.215719 |
2004.07813 | Electromagnetic radiation generated by a charged particle falling
radially into a Schwarzschild black hole: A complex angular momentum
description | By using complex angular momentum techniques, we study the electromagnetic
radiation generated by a charged particle falling radially from infinity into a
Schwarzschild black hole. We consider both the case of a particle initially at
rest and that of a particle projected with a relativistic velocity and we
construct complex angular momentum representations and Regge pole
approximations of the partial wave expansions defining the Maxwell scalar
$\phi_2$ and the energy spectrum $dE/d\omega$ observed at spatial infinity. We
show, in particular, that Regge pole approximations involving only one Regge
pole provide effective ressumations of these partial wave expansions permitting
us (i) to reproduce with very good agreement the black hole ringdown without
requiring a starting time, (ii) to describe with rather good agreement the tail
of the signal and sometimes the pre-ringdown phase and (iii) to explain the
oscillations in the electromagnetic energy spectrum radiated by the charged
particle. The present work as well as a previous one concerning the
gravitational radiation generated by a massive particle falling into a
Schwarzschild black hole [A. Folacci and M. Ould El Hadj, Phys, Rev,
D$\textbf{98}$, 064052, (2018), arXiv:1807.09056 [gr-qc]] highlight the
benefits of studying radiation from black holes in the complex angular momentum
framework (they obviously appear when the approximations obtained involve a
small number of Regge poles and have a clear physical interpretation) but also
to exhibit the limits of this approach (this is the case when it is necessary
to take into account background integral contributions).
| We study the shadow cast or silhouette generated by a Kerr-Newman-Kasuya
(KNK) spacetime (rotating dyon black hole). It is shown that in addition to the
angular momentum of the black hole, the dyon charge also affects the shadow
image of the KNK black hole. Moreover, we analyze the weak gravitational
lensing by the KNK black hole by using the Gauss-Bonnet theorem. Finally, we
find that extra dyon charge decreases both the deflection angle and shadow of
the KNK black hole.
| 0.910742 | 0.740028 | 0.170714 |
2004.07814 | Induced Innovation and Economic Environment | The Hicks induced innovation hypothesis states that a price increase of a
production factor is a spur to invention. We propose an alternative hypothesis
restating that a spur to invention require not only an increase of one factor
but also a decrease of at least one other factor to offset the companies' cost.
We illustrate the need for our alternative hypthesis in a historical example of
the industrial revolution in the United Kingdom. Furthermore, we
econometrically evaluate both hypotheses in a case study of research and
development (R&D) in 29 OECD countries from 2003 to 2017. Specifically, we
investigate dependence of investments to R&D on economic environment
represented by average wages and oil prices using panel regression. We find
that our alternative hypothesis is supported for R&D funded and/or performed by
business enterprises while the original Hicks hypothesis holds for R&D funded
by the government and R&D performed by universities.
| We describe challenges in the risk management of smart card based electronic
cash industry and describe a method to evaluate the effectiveness of
distributed intelligence on the smart card. More specifically, we discuss the
evaluation of distributed intelligence function called "on-chip risk
management" of the smart card for the global electronic cash payment
application using micro dynamic simulation. Handling of uncertainty related to
future economic environment, various potential counterfeit attack scenarios,
requires simulation of such environment to evaluate on-chip performance.
Creation of realistic simulation of electronic cash economy, transaction
environment, consumers, merchants, banks are challenge themselves. In addition,
we shows examples of detection capability of off-chip, host based counterfeit
detection systems based on the micro dynamic simulation model generated data
set.
| 0.827075 | 0.614608 | 0.212467 |
2004.07815 | Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure
Mode under Attacks | As the Routing Protocol for Low Power and Lossy Networks (RPL) became the
standard for routing in the Internet of Things (IoT) networks, many researchers
had investigated the security aspects of this protocol. However, no work (to
the best of our knowledge) has investigated the use of the security mechanisms
included in RPL standard, mainly because there was no implementation for these
features in any IoT operating systems yet. A partial implementation of RPL
security mechanisms was presented recently for the Contiki operating system (by
Perazzo et al.), which provided us with an opportunity to examine RPL security
mechanisms. In this paper, we investigate the effects and challenges of using
RPL security mechanisms under common routing attacks. First, a comparison of
RPL performance, with and without its security mechanisms, under four routing
attacks (Blackhole, Selective-Forward, Neighbor, and Wormhole attacks) is
conducted using several metrics (e.g., average data packet delivery rate,
average data packet delay, average power consumption, etc.). This comparison is
performed using two commonly used Radio Duty-Cycle protocols. Secondly, and
based on the observations from this comparison, we propose two techniques that
could reduce the effects of such attacks, without having added security
mechanisms for RPL. An evaluation of these techniques shows improved
performance of RPL under the investigated attacks, except for the Wormhole
attack.
| The rapid evolution of Internet-of-Things (IoT) technologies has led to an
emerging need to make it smarter. A variety of applications now run
simultaneously on an ARM-based processor. For example, devices on the edge of
the Internet are provided with higher horsepower to be entrusted with storing,
processing and analyzing data collected from IoT devices. This significantly
improves efficiency and reduces the amount of data that needs to be transported
to the cloud for data processing, analysis and storage. However, commodity OSes
are prone to compromise. Once they are exploited, attackers can access the data
on these devices. Since the data stored and processed on the devices can be
sensitive, left untackled, this is particularly disconcerting.
In this paper, we propose a new system, TrustShadow that shields legacy
applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone
technology and partitions resources into the secure and normal worlds. In the
secure world, TrustShadow constructs a trusted execution environment for
security-critical applications. This trusted environment is maintained by a
lightweight runtime system that coordinates the communication between
applications and the ordinary OS running in the normal world. The runtime
system does not provide system services itself. Rather, it forwards requests
for system services to the ordinary OS, and verifies the correctness of the
responses. To demonstrate the efficiency of this design, we prototyped
TrustShadow on a real chip board with ARM TrustZone support, and evaluated its
performance using both microbenchmarks and real-world applications. We showed
TrustShadow introduces only negligible overhead to real-world applications.
| 0.906102 | 0.728344 | 0.177758 |
2004.07816 | The Dilemma of Quantum Individuality Beyond Particle Metaphysics | It is commonly claimed that quantum mechanics makes reference to a
microscopic realm constituted by elementary particles. However, as first
famously noticed by Erwin Schr\"odinger, it is not at all clear what these
quantum particles really are. According to the specialized literature, it is
not even clear if each of these microscopic entities possess their own
identity. Recently, Jonas Arenhart proposed a distinction of quantum objects in
terms of a dilemma which forces a choice between their characterization either
as individuals or as non-individuals. In this work we attempt to address the
(metaphysical) presuppositions involved within Arenhart's dilemma which ground
the question of individuality in QM on a strong presupposition regarding the
existence of quantum objects. After providing a reconsideration of the role
played by metaphysics within physics we attempt to propose, not only a complete
redefinition of the dilemma beyond particle metaphysics, but also a possible
realist solution grounded on the provision of a new (non-classical) conceptual
framework which seeks to develop an invariant-objective representation of the
theory of quanta.
| We begin by surveying the historical positions in different attempts to
understand the material world since the rise of modern science, with specific
focus on the role of Cartesian primary qualities in explanatory
conceptualisation. Moreover the opening chapter argues that although
explanatory narratives are essentially epistemological constructions, they
require a general metaphysical backing through the explainer's and explainee's
commitments to take the concepts and higher structures composed of them as
directly referential. Two methodological perspectives on theory construction,
Einstein's division into principle and constructive theories, are then
delineated along the lines of their metaphysical and explanatory potential, and
presented as the research instrument with which to approach the
specific-case-study instances of quantum theory reconstruction. A specific
strategy of arguing for scientific realism ('the simple transcendental
strategy') is then presented and connected to the challenges that the phenomena
(EPR correlations and 'teleportation') from the domain of contemporary quantum
theory pose for it. The opening chapter concludes with a survey of the general
models of explanation and their position with respect to the
principle-constructive dichotomy introduced above. Finally, an explanatory
model containing extended material-like entities along with further primitives,
universal laws of temporal evolution, is argued for. Consequently, in the
interest of a wholesome realistic response to the sceptical challenge about the
explanatory aims of science, we recommend that even the common sense conceptual
framework replaces the extended material structure with 'generalised things' as
re-identifiable invariants through change as the fundamental unit of the
realist ontology.
| 0.868883 | 0.739469 | 0.129414 |
2004.07817 | Dynamic transition approaching jetting singularity during the collapse
of drop-impact craters | Understanding the dynamical transition from capillary-driven to pure inertial
focusing is important to revealing the mechanism underlying the most singular
micro-jetting produced from drop-impact craters. Herein we study dimple
dynamics from the collapse of these craters when the drop is of a different
immiscible liquid than the pool. The parameter space is considerably more
complex than for identical liquids, revealing intricate compound-dimple shapes.
In contrast to the universal capillary-inertial drop pinch-off regime, where
the neck radius scales as $R\sim t^{2/3}$, a purely inertial collapse of the
air-dimple portrays $R \sim t^{1/2}$ and is sensitive to initial and boundary
conditions. Capillary waves can therefore mold the dimple into different
collapse shapes. We observe a clear cross-over in the nature of the dynamics
from capillary-inertial to purely inertial immediately before the pinch-off.
Notably, for singular jetting the cross-over time occurs much earlier,
irrespective of the Weber number.
| It is known that the gravitational collapse of a dust ball results in naked
singularity formation from an initial density profile which is physically
reasonable. In this paper, we show that explosive radiation is emitted during
the formation process of the naked singularity.
| 0.864277 | 0.750732 | 0.113546 |
2004.07818 | Backward Propagation | The document covers the fundamental algorithm of backward propagation from
the point of view of reconstructing the wavefield captured by a "screen" in an
imaging system. Owing to a property of the Helmholtz equation, wavefields have
an inherent propagation symmetry which can be exploited for image formation. In
traditional presentations of this topic the link between this "reciprocity" and
the reconstruction procedure are motivated only at an intuitive level. I
propose to make this more rigorous by using a technique called "plane-to-plane"
propagation which is also known as "beam propagation method" in more advanced
settings.
| Many statistical properties of X-ray aperiodic variability from accreting
compact objects can be explained by the propagating fluctuations model applied
to the accretion disc. The mass accretion rate fluctuations originate from
variability of viscosity, which arises at every radius and causes local
fluctuations of the density. The fluctuations diffuse through the disc and
result in local variability of the mass accretion rate, which modulates the
X-ray flux from the inner disc in the case of black holes, or from the surface
in the case of neutron stars. A key role in the theoretical explanation of fast
variability belongs to the description of the diffusion process. The
propagation and evolution of the fluctuations is described by the diffusion
equation, which can be solved by the method of Green functions. We implement
Green functions in order to accurately describe the propagation of fluctuations
in the disc. For the first time we consider both forward and backward
propagation. We show that (i) viscous diffusion efficiently suppress
variability at time scales shorter than the viscous time, (ii) local
fluctuations of viscosity affect the mass accretion rate variability both in
the inner and the outer parts of accretion disc, (iii) propagating fluctuations
give rise not only to hard time lags as previously shown, but also produce soft
lags at high frequency similar to those routinely attributed to reprocessing,
(iv) deviation from the linear rms-flux relation is predicted for the case of
very large initial perturbations. Our model naturally predicts bumpy power
spectra.
| 0.789329 | 0.625178 | 0.164151 |
2004.07819 | Quantifying Excess Power from Radio Frequency Interference in Epoch of
Reionization Measurements | We quantify the effect of radio frequency interference (RFI) on Epoch of
Reionization (EoR) power spectra. Specifically, we investigate how the
frequency structure of source emission generates contamination in higher-order
wave modes that is much more problematic than smooth-spectrum foreground
sources. We find that even a single relatively dim RFI source can overwhelm
typical estimates of the EoR power spectrum signal on cosmological modes of
interest. If total apparent RFI flux density in an integration is kept below 1
mJy, an EoR detection should be feasible given no other systematic. These
results emphasize the need for highly effective RFI mitigation strategies for
telescopes used to search for the EoR.
| In these proceedings I discuss various extragalactic surveys which will be
undertaken over the next few years and which will be complementary to any HI
and/or continuum surveys with the SKA-precursor telescopes. I concentrate on
the near-infrared public surveys which will be undertaken with the Visible and
Infrared Survey Telscope for Astronomy (VISTA), and in particular the VISTA
Deep Extragalactic Observations (VIDEO) survey which will provide the ideal
data set to combine with any deep SKA-precursor observations of the
extragalactic sky. After highlighting the links that the SKA precursors have
with the various VISTA surveys, I briefly describe two forthcoming Herschel
surveys, Herschel-ATLAS survey and HerMES which have a large scientific overlap
with the SKA-precursor telescopes. Finally, I present a case study in combining
multi-wavelength data sets with radio-frequency surveys to find the highest
redshift radio sources with the aim of probing the epoch of reionization.
| 0.870315 | 0.699876 | 0.170438 |
2004.07820 | Speaker Recognition in Bengali Language from Nonlinear Features | At present Automatic Speaker Recognition system is a very important issue due
to its diverse applications. Hence, it becomes absolutely necessary to obtain
models that take into consideration the speaking style of a person, vocal tract
information, timbral qualities of his voice and other congenital information
regarding his voice. The study of Bengali speech recognition and speaker
identification is scarce in the literature. Hence the need arises for involving
Bengali subjects in modelling our speaker identification engine. In this work,
we have extracted some acoustic features of speech using non linear
multifractal analysis. The Multifractal Detrended Fluctuation Analysis reveals
essentially the complexity associated with the speech signals taken. The source
characteristics have been quantified with the help of different techniques like
Correlation Matrix, skewness of MFDFA spectrum etc. The Results obtained from
this study gives a good recognition rate for Bengali Speakers.
| Automatic emotion recognition in speech is a research area with a wide range
of applications in human interactions. The basic mathematical tool used for
emotion recognition is Pattern recognition which involves three operations,
namely, pre-processing, feature extraction and classification. This paper
introduces a procedure for emotion recognition using Hidden Markov Models
(HMM), which is used to divide five emotional states: anger, surprise,
happiness, sadness and neutral state. The approach is based on standard speech
recognition technology using hidden continuous markov model by selection of low
level features and the design of the recognition system. Emotional Speech
Database from Telugu Rural Dialects of Andhra Pradesh (TRDAP) was designed
using several speaker's voices comprising the emotional states. The accuracy of
recognizing five different emotions for both genders of classification is 80%
for anger-emotion which is achieved by using the best combination of
39-dimensioanl feature vector for every frame (13 MFCCs, 13 Delta Coefficients
and 13 Acceleration Coefficients) and a classifier using HMM. This outcome very
much matches with that acquired with the same database with subjective
evaluation by human judges. Both gender-dependent and gender-independent
experiments are conducted on TRDAP emotional speech database.
| 0.841086 | 0.729632 | 0.111453 |
2004.07821 | Parameter Selection Methods in Inverse Problem Formulation | We discuss methods for {\em a priori} selection of parameters to be estimated
in inverse problem formulations (such as Maximum Likelihood, Ordinary and
Generalized Least Squares) for dynamical systems with numerous state variables
and an even larger number of parameters. We illustrate the ideas with an
in-host model for HIV dynamics which has been successfully validated with
clinical data and used for prediction.
| Recent advances in 3D vision have demonstrated the strengths of photometric
bundle adjustment. By directly minimizing reprojected pixel errors, instead of
geometric reprojection errors, such methods can achieve sub-pixel alignment
accuracy in both high and low textured regions. Typically, these problems are
solved using a forwards compositional Lucas-Kanade formulation parameterized by
6-DoF rigid camera poses and a depth per point in the structure. For large
problems the most CPU-intensive component of the pipeline is the creation and
factorization of the Hessian matrix at each iteration. For many warps, the
inverse compositional formulation can offer significant speed-ups since the
Hessian need only be inverted once. In this paper, we show that an ordinary
inverse compositional formulation does not work for warps of this type of
parameterization due to ill-conditioning of its partial derivatives. However,
we show that it is possible to overcome this limitation by introducing the
concept of a proxy template image. We show an order of magnitude improvement in
speed, with little effect on quality, going from forwards to inverse
compositional in our own photometric bundle adjustment method designed for
object-centric structure from motion. This means less processing time for large
systems or denser reconstructions under the same real-time constraints. We
additionally show that this theory can be readily applied to existing methods
by integrating it with the recently released Direct Sparse Odometry SLAM
algorithm.
| 0.812117 | 0.723849 | 0.088269 |
2004.07822 | Order Matters: Generating Progressive Explanations for Planning Tasks in
Human-Robot Teaming | Prior work on generating explanations has been focused on providing the
rationale behind the robot's decision making. While these approaches provide
the right explanations from the explainer's perspective, they fail to heed the
cognitive requirement of understanding an explanation from the explainee's
perspective. In this work, we set out to address this issue from a planning
context by considering the order of information provided in an explanation,
which is referred to as the progressiveness of explanations. Progressive
explanations contribute to a better understanding by minimizing the cumulative
cognitive effort required for understanding all the information in an
explanation. As a result, such explanations are easier to understand. Given the
sequential nature of communicating information, a general formulation based on
goal-based Markov Decision Processes for generating progressive explanation is
presented. The reward function of this MDP is learned via inverse reinforcement
learning based on explanations that are provided by human subjects. Our method
is evaluated in an escape-room domain. The results show that our progressive
explanation generation method reduces the cognitive load over two baselines.
| Many robotic planning applications involve continuous actions with highly
non-linear constraints, which cannot be modeled using modern planners that
construct a propositional representation. We introduce STRIPStream: an
extension of the STRIPS language which can model these domains by supporting
the specification of blackbox generators to handle complex constraints. The
outputs of these generators interact with actions through possibly infinite
streams of objects and static predicates. We provide two algorithms which both
reduce STRIPStream problems to a sequence of finite-domain planning problems.
The representation and algorithms are entirely domain independent. We
demonstrate our framework on simple illustrative domains, and then on a
high-dimensional, continuous robotic task and motion planning domain.
| 0.85077 | 0.783608 | 0.067162 |
2004.07823 | Polynomial-delay Enumeration Algorithms in Set Systems | We consider a set system $(V, {\mathcal C}\subseteq 2^V)$ on a finite set $V$
of elements, where we call a set $C\in {\mathcal C}$ a component. We assume
that two oracles $\mathrm{L}_1$ and $\mathrm{L}_2$ are available, where given
two subsets $X,Y\subseteq V$, $\mathrm{L}_1$ returns a maximal component $C\in
{\mathcal C}$ with $X\subseteq C\subseteq Y$; and given a set $Y\subseteq V$,
$\mathrm{L}_2$ returns all maximal components $C\in {\mathcal C}$ with
$C\subseteq Y$. Given a set $I$ of attributes and a function $\sigma:V\to 2^I$
in a transitive system, a component $C\in {\mathcal C}$ is called a solution if
the set of common attributes in $C$ is inclusively maximal; i.e.,
$\bigcap_{v\in C}\sigma(v)\supsetneq \bigcap_{v\in X}\sigma(v)$ for any
component $X\in{\mathcal C}$ with $C\subsetneq X$. We prove that there exists
an algorithm of enumerating all solutions (or all components) in delay bounded
by a polynomial with respect to the input size and the running times of the
oracles.
| We give a combinatorial interpretation of a Pieri formula for double
Grothendieck polynomials in terms of an interval of the Bruhat order. Another
description had been given by Lenart and Postnikov in terms of chain
enumerations. We use Lascoux's interpretation of a product of Grothendieck
polynomials as a product of two kinds of generators of the 0-Hecke algebra, or
sorting operators. In this way we obtain a direct proof of the result of Lenart
and Postnikov and then prove that the set of permutations occuring in the
result is actually an interval of the Bruhat order.
| 0.785957 | 0.701348 | 0.084609 |
2004.07824 | Non-orientable branched coverings, $b$-Hurwitz numbers, and positivity
for multiparametric Jack expansions | We introduce a one-parameter deformation of the 2-Toda tau-function of
(weighted) Hurwitz numbers, obtained by deforming Schur functions into Jack
symmetric functions. We show that its coefficients are polynomials in the
deformation parameter $b$ with nonnegative integer coefficients. These
coefficients count generalized branched coverings of the sphere by an arbitrary
surface, orientable or not, with an appropriate $b$-weighting that "measures"
in some sense their non-orientability. Notable special cases include
non-orientable dessins d'enfants for which we prove the most general result so
far towards the Matching-Jack conjecture and the "$b$-conjecture" of Goulden
and Jackson from 1996, expansions of the $\beta$-ensemble matrix model,
deformations of the HCIZ integral, and $b$-Hurwitz numbers that we introduce
here and that are $b$-deformations of classical (single or double) Hurwitz
numbers obtained for $b=0$. A key role in our proof is played by a
combinatorial model of non-orientable constellations equipped with a suitable
$b$-weighting, whose partition function satisfies an infinite set of PDEs.
These PDEs have two definitions, one given by Lax equations, the other one
following an explicit combinatorial decomposition.
| Starting from a beautiful idea of Kanev, we construct a uniformization of the
moduli space A_6 of principally polarized abelian 6-folds in terms of curves
and monodromy data. We show that the general ppav of dimension 6 is a
Prym-Tyurin variety corresponding to a degree 27 cover of the projective line
having monodromy the Weyl group of the E_6 lattice. Along the way, we establish
numerous facts concerning the geometry of the Hurwitz space of such E_6-covers,
including: (1) a proof that the canonical class of the Hurwitz space is big,
(2) a concrete geometric description of the Hodge-Hurwitz eigenbundles with
respect to the Kanev correspondence and (3) a description of the ramification
divisor of the Prym-Tyurin map from the Hurwitz space to A_6 in the terms of
syzygies of the Abel-Prym-Tyurin curve.
| 0.839366 | 0.757616 | 0.08175 |
2004.07825 | Network rewiring in the $r$-$K$ plane | We generate correlated scale-free networks in the configuration model through
a new rewiring algorithm which allows to tune the Newman assortativity
coefficient $r$ and the average degree of the nearest neighbors $K$ (in the
range $-1\le r \le 1$, $K\ge \langle k \rangle$). At each attempted rewiring
step, local variations $\Delta r$ and $\Delta K$ are computed and then the step
is accepted according to a standard Metropolis probability $ \exp(\pm\Delta
r/T)$, where $T$ is a variable temperature. We prove a general relation between
$\Delta r$ and $\Delta K$, thus finding a connection between two variables
which have very different definitions and topological meaning. We describe
rewiring trajectories in the $r$-$K$ plane and explore the limits of maximally
assortative and disassortative networks, including the case of small minimum
degree ($k_{min} \ge 1$) which has previously not been considered. The size of
the giant component and the entropy of the network are monitored in the
rewiring. The average number of second neighbours in the branching
approximation $\bar{z}_{2,B}$ is proven to be constant in the rewiring, and
independent from the correlations for Markovian networks. As a function of the
degree, however, the number of second neighbors gives useful information on the
network connectivity and is also monitored.
| We give a new solvability criterion for the boundary
Carath\'{e}odory-Fej\'{e}r problem: given a point $x \in \R$ and, a finite set
of target values $a^0,a^1,...,a^n \in \R$, to construct a function $f$ in the
Pick class such that the limit of $f^{(k)}(z)/k!$ as $z \to x$ nontangentially
in the upper half plane is $a^k$ for $k= 0,1,...,n$. The criterion is in terms
of positivity of an associated Hankel matrix. The proof is based on a reduction
method due to Julia and Nevanlinna.
| 0.844707 | 0.708936 | 0.135771 |
2004.07827 | COVID-19: $R_0$ is lower where outbreak is larger | We use daily data from Lombardy, the Italian region most affected by the
COVID-19 outbreak, to calibrate a SIR model individually on each municipality.
These are all covered by the same health system and, in the post-lockdown phase
we focus on, all subject to the same social distancing regulations. We find
that municipalities with a higher number of cases at the beginning of the
period analyzed have a lower rate of diffusion, which cannot be imputed to herd
immunity. In particular, there is a robust and strongly significant negative
correlation between the estimated basic reproduction number ($R_0$) and the
initial outbreak size, in contrast with the role of $R_0$ as a \emph{predictor}
of outbreak size. We explore different possible explanations for this
phenomenon and conclude that a higher number of cases causes changes of
behavior, such as a more strict adoption of social distancing measures among
the population, that reduce the spread. This result calls for a transparent,
real-time distribution of detailed epidemiological data, as such data affects
the behavior of populations in areas affected by the outbreak.
| This paper describes how mobile phone data can guide government and public
health authorities in determining the best course of action to control the
COVID-19 pandemic and in assessing the effectiveness of control measures such
as physical distancing. It identifies key gaps and reasons why this kind of
data is only scarcely used, although their value in similar epidemics has
proven in a number of use cases. It presents ways to overcome these gaps and
key recommendations for urgent action, most notably the establishment of mixed
expert groups on national and regional level, and the inclusion and support of
governments and public authorities early on. It is authored by a group of
experienced data scientists, epidemiologists, demographers and representatives
of mobile network operators who jointly put their work at the service of the
global effort to combat the COVID-19 pandemic.
| 0.783953 | 0.70362 | 0.080333 |
2004.07828 | Further studies on the physics potential of an experiment using LHC
neutrinos | We discuss an experiment to investigate neutrino physics at the LHC in Run 3,
with emphasis on tau flavour. As described in our previous paper
[arXiv:1903.06564v1], the detector can be installed in the decommissioned TI18
tunnel, about 480 m downstream the ATLAS cavern, after the first bending
dipoles of the LHC arc. In that location, the prolongation of the beam
Line-of-Sight from Interaction Point IP1 to TI18 traverses about 100 m of rock.
The detector intercepts the intense neutrino flux, generated by the LHC beams
colliding in IP1, at large pseudorapidity eta, where neutrino energies can
exceed a TeV. This paper focuses on optimizing global features of the
experiment, like detector mass and acceptance. Since the neutrino-nucleon
interaction cross section grows almost linearly with energy, the detector can
be light and still collect a considerable sample of neutrino events; in the
present study it weighs less than 3 tons. The detector is positioned off the
beam axis, slightly above the ideal prolongation of the LHC beam from the
straight section, covering 7.4 < eta < 9.2. In this configuration, the flux at
high energies (0.5-1.5 TeV and beyond) is found to be dominated by neutrinos
originating directly from IP1, mostly from charm decays, of which about 50% are
electron neutrinos and about 5% are tau neutrinos. The contribution of pion and
kaon decays to the muon neutrino flux is studied by means of simulations that
embed the LHC optics and found small at high energies. The above studies
indicate that with 150 /fb of delivered LHC luminosity in Run 3 the experiment
can record a few thousand very high energy neutrino charged current
interactions and over 50 tau neutrino charged current events.
| The CMS collaboration used the past year to greatly improve the level of
detector readiness for the first collisions data. The acquired operational
experience over this year, large gains in understanding the detector and
improved preparedness for early physics will be instrumental in minimizing the
time from the first collisions to first LHC physics. The following describes
the status of the CMS experiment and outlines early physics plans with the
first LHC data.
| 0.843608 | 0.733762 | 0.109846 |
2004.07829 | Variational principles for fluid dynamics on rough paths | In this paper, we introduce a new framework for parametrization schemes (PS)
in GFD. Using the theory of controlled rough paths, we derive a class of rough
geophysical fluid dynamics (RGFD) models as critical points of rough action
functionals. These RGFD models characterize Lagrangian trajectories in fluid
dynamics as geometric rough paths (GRP) on the manifold of diffeomorphic maps.
Three constrained variational approaches are formulated for the derivation of
these models. The first is the Clebsch formulation, in which the constraints
are imposed as rough advection laws. The second is the Hamilton-Pontryagin
formulation, in which the constraints are imposed as right-invariant rough
vector fields. The third is the Euler--Poincar\'e formulation in which the
variations are constrained. These variational principles lead directly to the
Lie--Poisson Hamiltonian formulation of fluid dynamics on geometric rough
paths. The GRP framework preserves the geometric structure of fluid dynamics
obtained by using Lie group reduction to pass from Lagrangian to Eulerian
variational principles, thereby yielding a rough formulation of the Kelvin
circulation theorem. The rough-path variational approach includes non-Markovian
perturbations of the Lagrangian fluid trajectories. In particular, memory
effects can be introduced through this formulation through a judicious choice
of the rough path (e.g. a realization of a fractional Brownian motion). In the
special case when the rough path is a realization of a semimartingale, we
recover the SGFD models in Holm (2015). However, by eliminating the need for
stochastic variational tools, we retain a pathwise interpretation of the
Lagrangian trajectories. In contrast, the Lagrangian trajectories in the
stochastic framework are described by stochastic integrals which do not have a
pathwise interpretation. Thus, the rough path formulation restores this
property.
| The evolution equations for a plasma comprising multiple species of charged
fluids with relativistic bulk and thermal motion are derived. It is shown that
a minimal fluid coupling model allows a natural casting of the evolution
equations in terms of generalized vorticity which treats the fluid motion and
electromagnetic fields equally. Equilibria can be found using a variational
principle based on minimizing the total enstrophy subject to energy and
helicity constraints. A subset of these equilibria correspond to minimum
energy. The equations for these states are presented with example solutions
showing the structure of the relaxed states.
| 0.865643 | 0.704597 | 0.161046 |
2004.07830 | On some properties of entropy solutions of degenerate non-linear
anisotropic parabolic equations | We prove existence of the largest and the smallest entropy solutions to the
Cauchy problem for a nonlinear degenerate anisotropic parabolic equation.
Applying this result, we establish the comparison principle in the case when at
least one of the initial functions is periodic. In the case when initial
function vanishes at infinity (in the sense of strong average) we prove the
long time decay of an entropy solution under exact nonlinearity-diffusivity
condition.
| We consider linear inhomogeneous non-autonomous parabolic problems associated
to sesquilinear forms, with discontinuous dependence of time. We show that for
these problems, the property of maximal parabolic regularity can be
extrapolated to time integrability exponents $r\neq 2$. This allows us to prove
maximal parabolic $L^r$-regularity for discontinuous non-autonomous
second-order divergence form operators in very general geometric settings and
to prove existence results for related quasilinear equations.
| 0.918736 | 0.821084 | 0.097652 |
2004.07831 | Eigenvalues multiplicity in hypergraphs and spectral clustering | The purpose of this paper is to investigate the relation between spectrum
characteristics and hypergraph structure, giving particular relevance to
uniform hypergraphs, widely used in applications. We extend the structure of
(m,k)-stars on graphs to the hypergraphs: the (m,k)-hyperstars on hypergraphs,
and by giving suitable conditions on the hyperedge weights we prove the
existence of matrix eigenvalues of computable values and multiplicities, where
the matrices considered are Laplacian, adjacency and transition matrices. By
considering separately the case of generic hypergraphs and the uniform
hypergraphs, we prove that two kind of vertex set reductions on hypergraphs
with (m,k)-hyperstar are feasible, keeping the same eigenvalues with reduced
multiplicity. Finally, some useful eigenvectors properties are derived up to a
product with a suitable matrix, and we relate these results with Fiedler
spectral partitioning on the hypergraph.
| The eigenvalues of the normalized Laplacian matrix of a network plays an
important role in its structural and dynamical aspects associated with the
network. In this paper, we study the spectra and their applications of
normalized Laplacian matrices of a family of fractal trees and dendrimers
modeled by Cayley trees, both of which are built in an iterative way. For the
fractal trees, we apply the spectral decimation approach to determine
analytically all the eigenvalues and their corresponding multiplicities, with
the eigenvalues provided by a recursive relation governing the eigenvalues of
networks at two successive generations. For Cayley trees, we show that all
their eigenvalues can be obtained by computing the roots of several
small-degree polynomials defined recursively. By using the relation between
normalized Laplacian spectra and eigentime identity, we derive the explicit
solution to the eigentime identity for random walks on the two treelike
networks, the leading scalings of which follow quite different behaviors. In
addition, we corroborate the obtained eigenvalues and their degeneracies
through the link between them and the number of spanning trees.
| 0.870686 | 0.803723 | 0.066964 |
2004.07832 | Knowledge-and-Data-Driven Amplitude Spectrum Prediction for Hierarchical
Neural Vocoders | In our previous work, we have proposed a neural vocoder called HiNet which
recovers speech waveforms by predicting amplitude and phase spectra
hierarchically from input acoustic features. In HiNet, the amplitude spectrum
predictor (ASP) predicts log amplitude spectra (LAS) from input acoustic
features. This paper proposes a novel knowledge-and-data-driven ASP (KDD-ASP)
to improve the conventional one. First, acoustic features (i.e., F0 and
mel-cepstra) pass through a knowledge-driven LAS recovery module to obtain
approximate LAS (ALAS). This module is designed based on the combination of
STFT and source-filter theory, in which the source part and the filter part are
designed based on input F0 and mel-cepstra, respectively. Then, the recovered
ALAS are processed by a data-driven LAS refinement module which consists of
multiple trainable convolutional layers to get the final LAS. Experimental
results show that the HiNet vocoder using KDD-ASP can achieve higher quality of
synthetic speech than that using conventional ASP and the WaveRNN vocoder on a
text-to-speech (TTS) task.
| Recently, hashing methods have been widely used in large-scale image
retrieval. However, most existing hashing methods did not consider the
hierarchical relation of labels, which means that they ignored the rich
information stored in the hierarchy. Moreover, most of previous works treat
each bit in a hash code equally, which does not meet the scenario of
hierarchical labeled data. In this paper, we propose a novel deep hashing
method, called supervised hierarchical deep hashing (SHDH), to perform hash
code learning for hierarchical labeled data. Specifically, we define a novel
similarity formula for hierarchical labeled data by weighting each layer, and
design a deep convolutional neural network to obtain a hash code for each data
point. Extensive experiments on several real-world public datasets show that
the proposed method outperforms the state-of-the-art baselines in the image
retrieval task.
| 0.875703 | 0.634255 | 0.241448 |
2004.07833 | Accurate closed-form solution of the SIR epidemic model | An accurate closed-form solution is obtained to the SIR Epidemic Model
through the use of Asymptotic Approximants (Barlow et. al, 2017, Q. Jl Mech.
Appl. Math, 70 (1), 21-48). The solution is created by analytically continuing
the divergent power series solution such that it matches the long-time
asymptotic behavior of the epidemic model. The utility of the analytical form
is demonstrated through its application to the COVID-19 pandemic.
| This paper presents a discrete time probabilistic dynamic for simulating a
contact-based epidemic spreading based on discrete time Markov chain process,
in particular the attention is addressed to the susceptible-infectious-removed
(SIR) model and the phase diagram of such model will be presented. Then, this
report presents the set of equations that represent the optimal control
strategies, by the means of Pontryagin's maximum principle, in two different
cases a vaccination policy and a combined vaccination-hospitalization policy
and show a numerical simulation, with the standard forward-backward sweep
procedure, for these equations.
| 0.867439 | 0.796466 | 0.070972 |
2004.07834 | CAB: Towards the RNA-world in the interstellar medium -- detection of
urea, and search of 2-amino-oxazole and simple sugars | In the past decade, Astrochemistry has witnessed an impressive increase in
the number of detections of complex organic molecules. Some of these species
are of prebiotic interest such as glycolaldehyde, the simplest sugar, or amino
acetonitrile, a possible precursor of glycine. Recently, we have reported the
detection of two new nitrogen-bearing complex organics, glycolonitrile and
Z-cyanomethanimine, known to be intermediate species in the formation process
of ribonucleotides within theories of a primordial ribonucleic acid (RNA)-world
for the origin of life. In this paper, we present deep and high-sensitivity
observations toward two of the most chemically rich sources in the Galaxy: a
Giant Molecular Cloud in the center of the Milky Way (G+0.693-0.027) and a
proto-Sun (IRAS16293-2422 B). Our aim is to explore whether the key precursors
considered to drive the primordial RNA-world chemistry, are also found in
space. Our high-sensitivity observations reveal that urea is present in
G+0.693-0.027 with an abundance of about 5x10-11. This is the first detection
of this prebiotic species outside a star-forming region. Urea remains
undetected toward the proto-Sun IRAS16293-2422 B (upper limit to its abundance
of less than 2x10-11). Other precursors of the RNA-world chemical scheme such
as glycolaldehyde or cyanamide are abundant in space, but key prebiotic species
such as 2- amino-oxazole, glyceraldehyde or dihydroxyacetone are not detected
in either source. Future more sensitive observations targeting the brightest
transitions of these species will be needed to disentangle whether these large
prebiotic organics are certainly present in space.
| Gunasekaran et al (Pramana J. Phys. 75 683-690 (2010)) report to have grown
the nonlinear optical crystals urea thiourea mercuric chloride (UTHC) and urea
thiourea mercuric sulphate (UTHS). We argue that UTHC and UTHS are dubious
crystals and are not what the authors propose.
| 0.857434 | 0.71335 | 0.144084 |
2004.07835 | Some martingale characterizations of compound mixed Poisson processes | Some martingale characterizations of compound mixed Poisson processes are
proven, extending S. Watanabe's (1964) martingale characterization of Poisson
processes as well as the main result of Lyberopoulos and Macheras (2012),
concerning martingale characterizations of mixed Poisson processes.
| In this paper we consider an equilibrium last-passage percolation model on an
environment given by a compound two-dimensional Poisson process. We prove an
$\LL^2$-formula relating the initial measure with the last-passage percolation
time. This formula turns out to be a useful tool to analyze the fluctuations of
the last-passage times along non-characteristic directions.
| 0.874363 | 0.771321 | 0.103042 |
2004.07837 | Framed motivic Donaldson-Thomas invariants of small crepant resolutions | For an arbitrary integer $r\geq 1$, we compute $r$-framed motivic PT and DT
invariants of small crepant resolutions of toric Calabi-Yau $3$-folds,
establishing a "higher rank" version of the motivic DT/PT wall-crossing
formula. This generalises the work of Morrison and Nagao.
| In analogy with the Gopakumar-Vafa conjecture on CY 3-folds, Klemm and
Pandharipande defined GV type invariants on Calabi-Yau 4-folds using
Gromov-Witten theory and conjectured their integrality. In this paper, we
propose a sheaf-theoretic interpretation of their genus zero invariants using
Donaldson-Thomas theory on CY 4-folds. More specifically, we conjecture genus
zero GV type invariants are $\mathrm{DT_{4}}$ invariants for one-dimensional
stable sheaves on CY 4-folds. Some examples are computed for both compact and
non-compact CY 4-folds to support our conjectures. We also propose an
equivariant version of the conjectures for local curves and verify them in
certain cases.
| 0.890042 | 0.757731 | 0.132311 |
2004.07838 | Dirac Particles in Transparent Quantum Graphs: Tunable transport of
relativistic quasiparticles in branched structures | We consider the dynamics of relativistic spin-half particles in quantum
graphs with transparent branching points. The system is modeled by combining
the quantum graph concept with the one of transparent boundary conditions
applied to the Dirac equation on metric graphs. Within such an approach, we
derive simple constraints, which turn the usual Kirchhoff-type boundary
conditions at the vertex equivalent to the transparent ones. Our method is
applied to quantum star graph. An extension to more complicated graph
topologies is straightforward.
| The low energy electronic excitations in single layer and bilayer graphite
(graphene) resemble quantum-relativistic particles also known as Dirac Fermions
(DF). They possess an internal degree of freedom, chirality, that leads to
unusual Landau Level (LL) energy sequences in a magnetic field and profoundly
alters the magneto-transport properties. One of the consequences is an
anomalous Quantum-Hall effect, recently detected in both single layer and
bi-layer graphene. However the underlying cause, the unusual LL sequence, was
never observed. Here we report the direct observation of LL of DF by means of
low temperature Scanning-Tunnelling-Spectroscopy (STS) on the surface of
graphite in fields up to 12 Tesla. We find evidence of coexistence of massless
and massive DF, and identify the zero-energy LL which is a unique consequence
of their quantum-relativistic nature. Surprisingly these strictly
two-dimensional properties emerge even on bulk graphite in samples where the
interlayer coupling is weak.
| 0.868425 | 0.832089 | 0.036336 |
2004.07839 | Private Learning of Halfspaces: Simplifying the Construction and
Reducing the Sample Complexity | We present a differentially private learner for halfspaces over a finite grid
$G$ in $\mathbb{R}^d$ with sample complexity $\approx d^{2.5}\cdot
2^{\log^*|G|}$, which improves the state-of-the-art result of [Beimel et al.,
COLT 2019] by a $d^2$ factor. The building block for our learner is a new
differentially private algorithm for approximately solving the linear
feasibility problem: Given a feasible collection of $m$ linear constraints of
the form $Ax\geq b$, the task is to privately identify a solution $x$ that
satisfies most of the constraints. Our algorithm is iterative, where each
iteration determines the next coordinate of the constructed solution $x$.
| In several applications, input samples are more naturally represented in
terms of similarities between each other, rather than in terms of feature
vectors. In these settings, machine-learning algorithms can become very
computationally demanding, as they may require matching the test samples
against a very large set of reference prototypes. To mitigate this issue,
different approaches have been developed to reduce the number of required
reference prototypes. Current reduction approaches select a small subset of
representative prototypes in the space induced by the similarity measure, and
then separately train the classification function on the reduced subset.
However, decoupling these two steps may not allow reducing the number of
prototypes effectively without compromising accuracy. We overcome this
limitation by jointly learning the classification function along with an
optimal set of virtual prototypes, whose number can be either fixed a priori or
optimized according to application-specific criteria. Creating a super-sparse
set of virtual prototypes provides much sparser solutions, drastically reducing
complexity at test time, at the expense of a slightly increased complexity
during training. A much smaller set of prototypes also results in
easier-to-interpret decisions. We empirically show that our approach can reduce
up to ten times the complexity of Support Vector Machines, LASSO and ridge
regression at test time, without almost affecting their classification
accuracy.
| 0.866648 | 0.716459 | 0.150189 |
2004.07840 | Unveiling the distinctive traits of a nation's research performance: the
case of Italy and Norway | In this study we are analysing the research performance of Italian and
Norwegian professors using constituent components of the Fractional Scientific
Strength (FSS) indicator. The main focus is on differences across fields in
publication output and citation impact. The overall performance (FSS) of the
two countries, which differ considerably in research size and profile, is
remarkedly similar. However, an in-depth analysis shows that there are large
underlying performance differences. An average Italian professor publishes more
papers than a Norwegian, while the citation impact of the research output is
higher for the Norwegians. In addition, at field level the pattern varies along
both dimensions, and we analyse in which fields each country have their
relative strengths. Overall, this study contributes to further insights on how
the research performance of different countries may be analysed and compared,
to inform research policy.
| Over the past decade, national research evaluation exercises, traditionally
conducted using the peer review method, have begun opening to bibliometric
indicators. The citations received by a publication are assumed as proxy for
its quality, but they require standardization prior to use in comparative
evaluation of organizations or individual scientists: the citation data must be
standardized, due to the varying citation behavior across research fields. The
objective of this paper is to compare the effectiveness of the different
methods of normalizing citations, in order to provide useful indications to
research assessment practitioners. Simulating a typical national research
assessment exercise, he analysis is conducted for all subject categories in the
hard sciences and is based on the Thomson Reuters Science Citation
Index-Expanded. Comparisons show that the citations average is the most
effective scaling parameter, when the average is based only on the publications
actually cited.
| 0.877737 | 0.769429 | 0.108308 |
2004.07841 | Neutrino Masses and Noncyclic Geometric Phase of Entangled Charged
Lepton-Neutrino Pair in External Magnetic Field | In this paper, we consider a pair of entangled charged lepton-neutrino
embedded in a constant magnetic field, which can be produced in the purely
leptonic decay of charged pseudoscalar mesons. Particles with nonzero magnetic
dipole moment will precess in the present of external magnetic field and induce
a nontrivial noncyclic geometric phase. The dependence of this geometric phase
on neutrino mass can be used to determine the Dirac/Majorana nature of massive
neutrinos.
| To one loop the effective neutrino photon interaction takes place through the
vector-vector type and the axialvector-vector type amplitude. In this work we
explicitly write down the form of the axialvector-vector amplitude to all
orders in the external magnetic field in a medium. We then infer upon its zero
external momentum limit which contributes to the effective charge of the
neutrinos inside a magnetized medium. We further show its gauge invariance
properties.
| 0.939067 | 0.794928 | 0.14414 |
2004.07842 | Towards a unitary, renormalizable and ultraviolet-complete quantum
theory of gravity | For any fundamental quantum field theory, unitarity, renormalizability, and
relativistic invariance are considered to be essential properties. Unitarity is
inevitably connected to the probabilistic interpretation of the quantum theory,
while renormalizability guarantees its completeness. Relativistic invariance,
in turn, is a symmetry which derives from the structure of spacetime. So far,
the perturbative attempt to formulate a fundamental local quantum field theory
of gravity based on the metric field seems to be in conflict with at least one
of these properties. In quantum Ho\v{r}ava gravity, a quantum Lifshitz field
theory of gravity characterized by an anisotropic scaling between space and
time, unitarity and renormalizability can be retained while Lorentz invariance
is sacrificed at high energies and must emerge only as approximate symmetry at
low energies. I review various approaches to perturbative quantum gravity with
a particular focus on recent progress in the quantization of Ho\v{r}ava
gravity, supporting its theoretical status as a unitary, renormalizable and
ultraviolet-complete quantum theory of gravity.
| We propose a partial answer to the question of what kind of ultrahigh-energy
physics has to be taken into account to circumvent the appearance of
ultraviolet divergencies; a more than sixty years old open question in quantum
electrodynamics. To this end we introduce a new theoretical concept to the
theory of quantum scattering: Perturbative S-matrices that depend on parameters
of a realistic regularization--realistic in the sense of Pauli and Villars
[Rev. Mod. Phys. 21, 434 (1949)]. We expect that these additional parameters
may provide some new information about the physics of quantum scattering. There
are such perturbative S-matrices also in the presence of non-renormalizable
interaction terms with no counterterms.
| 0.872992 | 0.794491 | 0.078501 |
2004.07843 | Holography and unitarity | If holography is an equivalence between quantum theories, one might expect it
to be described by a map that is a bijective isometry between bulk and boundary
Hilbert spaces, preserving the hamiltonian and symmetries. Holography has been
believed to be a property of gravitational (or string) theories, but not of
non-gravitational theories; specifically Marolf has argued that it originates
from the gauge symmetries and constraints of gravity. These observations
suggest study of the assumed holographic map as a function of the gravitational
coupling $G$. The zero coupling limit gives ordinary quantum field theory, and
is therefore not necessarily expected to be holographic. This, and the
structure of gravity at non-zero $G$, raises important questions about the full
map. In particular, construction of a holographic map appears to require as
input a solution of the nonperturbative analog of the bulk gravitational
constraints, that is, the unitary bulk evolution. Moreover, examination of the
candidate boundary algebra, including the boundary hamiltonian, reveals
commutators that don't close in the usual fashion expected for a boundary
theory.
| The octant of the atmospheric mixing angle $\theta_{23}$ is still
undetermined by neutrino oscillation experiments. Long-baseline experiments
like NO$\nu$A, T2K and DUNE offer good prospects for determining the octant of
$\theta_{23}$. However, their capability to do so may be compromised by the
possible presence of non-unitarity in the leptonic mixing matrix. In this
paper, we study in detail the octant degeneracy with and without non-unitarity
at the level of oscillation probabilities and events for these experiments. We
also analyze their octant sensitivity and discovery reach and show that they
are hampered in the presence of non-unitarity.
| 0.793285 | 0.680389 | 0.112896 |