id
stringlengths
5
16
query
stringlengths
1
382
pos
stringlengths
7
5.09k
neg
stringlengths
23
5.09k
qp
float64
0.4
1
qn
float64
0.34
0.91
margin
float64
0.02
0.3
2004.07844
Gravitational waves from the fragmentation of axion-like particle dark matter
The misalignment mechanism allows for the efficient, and usually very cold, production of light scalar bosons, such as axion-like particles (ALPs), making them an appealing dark matter candidate. However, in certain cases, such as in the presence of a monodromy, the self-interactions of ALPs can be sufficiently strong such that the homogeneous field fragments soon after the onset of oscillations. The resulting large inhomogeneities can lead to the production of gravitational waves (GWs). We investigate the nonlinear dynamics of fragmentation, as well as of the subsequent turbulent regime, and calculate the stochastic GW background that is produced from this process. The GW background can be enhanced if the time evolution features an extended intermediate phase of ultrarelativistic dynamics due to a small mass at the bottom of the potential. Yet, this enhancement is limited by the requirement that the dark matter remains sufficiently cold. In some cases the resulting GWs may be within reach of future GW detectors, allowing a complementary probe of this type of dark matter.
The detection of particles with only gravitational interactions (Newtorites) in gravitational bar detectors was studied in 1984 by Bernard, De Rujula and Lautrup. The negative results of dark matter searches suggest to look to exotic possibilities like Newtorites. The limits obtained with the Nautilus bar detector will be presented and the possible improvements will be discussed. Since the gravitational coupling is very weak, the possible limits are very far from what is needed for dark matter, but for large masses are the best limits obtained on the Earth. An update of limits for MACRO particles will be given.
0.87835
0.750305
0.128045
2004.07845
Combined Zeeman and orbital effect on the Josephson effect in rippled graphene
The two-dimensional nature of graphene Josephson junctions offers the possibility of creating effective superconductor-ferromagnet-superconductor junctions with tunable Zeeman splitting caused by an in-plane magnetic field. Such junctions would be able to alternate between a conventional superconducting ground state and a ground state with an intrinsic phase difference, making them controllable $0-\pi$ Josephson junctions. However, in addition to the Zeeman splitting, an in-plane magnetic field will in general also produce an orbital effect because of height variations in graphene, colloquially known as ripples. Both the Zeeman and orbital effect will thus affect the critical current, so to be able to identify $0-\pi$ transitions it is necessary to understand their combined effect. From both analytical and numerical solutions of the Usadel equation we find that ripples can in fact produce a current response similar to that which is characteristic of a $0-\pi$ transition. Hence, additional analysis is required in order to reveal the presence of a $0-\pi$ transition caused by spin-splitting in graphene with ripples. We provide a closed form analytical expression for the critical current in the presence of exchange field and ripple effects as well as an expression for the scaling of critical current zeroes with junction parameters.
Monolayer transition metal dichalcogenides (TMDs) hold great promise for future information processing applications utilizing a combination of electron spin and valley pseudospin. This unique spin system has led to observation of the valley Zeeman effect in neutral and charged excitonic resonances under applied magnetic fields. However, reported values of the trion valley Zeeman splitting remain highly inconsistent across studies. Here, we utilize high quality hBN encapsulated monolayer WSe$_2$ to enable simultaneous measurement of both intervalley and intravalley trion photoluminescence. We find the valley Zeeman splitting of each trion state to be describable only by a combination of three distinct g-factors, one arising from the exciton-like valley Zeeman effect, the other two, trion specific, g-factors associated with recoil of the excess electron. This complex picture goes significantly beyond the valley Zeeman effect reported for neutral excitons, and eliminates the ambiguity surrounding the magneto-optical response of trions in tungsten based TMD monolayers.
0.867124
0.764283
0.102841
2004.07846
The Angular Momentum of the Circumgalactic Medium in the TNG100 Simulation
We present an analysis of the angular momentum content of the circumgalactic medium (CGM) using TNG100, one of the flagship runs of the IllustrisTNG project. We focus on Milky Way-mass halos ($\sim 10^{12} \; M_{\odot}$) at $z=0$ but also analyze other masses and redshifts up to $z=5$. We find that the CGM angular momentum properties are strongly correlated with the stellar angular momentum of the corresponding galaxy: the CGM surrounding high-angular momentum galaxies has systematically higher angular momentum and is better aligned to the rotational axis of the galaxy itself than the CGM surrounding low-angular momentum galaxies. Both the hot and cold phases of the CGM show this dichotomy, though it is stronger for colder gas. The CGM of high-angular momentum galaxies is characterized by a large wedge of cold gas with rotational velocities at least $\sim1/2$ of the halo's virial velocity extending out to $\sim 1/2$ of the virial radius, and by biconical polar regions dominated by radial velocities suggestive of galactic fountains; both of these features are absent from the CGM of low-angular momentum galaxies. These conclusions are general to halo masses $\lesssim 10^{12} \; M_{\odot}$ and for $z \lesssim 2$, but do not apply for more massive halos or at the highest redshift studied. By comparing simulations run with alterations to the fiducial feedback model, we identify the better alignment of the CGM to high-angular momentum galaxies as a feedback-independent effect and the galactic winds as a dominant influence on the CGM's angular momentum.
Black holes can be practically located (e.g. in numerical simulations) by trapping horizons, hypersurfaces foliated by marginal surfaces, and one desires physically sound measures of their mass and angular momentum. A generically unique angular momentum can be obtained from the Komar integral by demanding that it satisfy a simple conservation law. With the irreducible (Hawking) mass as the measure of energy, the conservation laws of energy and angular momentum take a similar form, expressing the rate of change of mass and angular momentum of a black hole in terms of fluxes of energy and angular momentum, obtained from the matter energy tensor and an effective energy tensor for gravitational radiation. Adding charge conservation for generality, one can use Kerr-Newman formulas to define combined energy, surface gravity, angular speed and electric potential, and derive a dynamical version of the so-called "first law" for black holes. A generalization of the "zeroth law" to local equilibrium follows. Combined with an existing version of the "second law", all the key quantities and laws of the classical paradigm for black holes (in terms of Killing or event horizons) have now been formulated coherently in a general dynamical paradigm in terms of trapping horizons.
0.861176
0.668535
0.192641
2004.07847
The Stellar Mass Fundamental Plane: The virial relation and a very thin plane for slow-rotators
Early-type galaxies -- slow and fast rotating ellipticals (E-SRs and E-FRs) and S0s/lenticulars -- define a Fundamental Plane (FP) in the space of half-light radius $R_e$, enclosed surface brightness $I_e$ and velocity dispersion $\sigma_e$. Since $I_e$ and $\sigma_e$ are distance-independent measurements, the thickness of the FP is often expressed in terms of the accuracy with which $I_e$ and $\sigma_e$ can be used to estimate sizes $R_e$. We show that: 1) The thickness of the FP depends strongly on morphology. If the sample only includes E-SRs, then the observed scatter in $R_e$ is $\sim 16\%$, of which only $\sim 9\%$ is intrinsic. Removing galaxies with $M_*<10^{11}M_\odot$ further reduces the observed scatter to $\sim 13\%$ ($\sim 4\%$ intrinsic). The observed scatter increases to the $\sim 25\%$ usually quoted in the literature if E-FRs and S0s are added. If the FP is defined using the eigenvectors of the covariance matrix of the observables, then the E-SRs again define an exceptionally thin FP, with intrinsic scatter of only $5\%$ orthogonal to the plane. 2) The structure within the FP is most easily understood as arising from the fact that $I_e$ and $\sigma_e$ are nearly independent, whereas the $R_e-I_e$ and $R_e-\sigma_e$ correlations are nearly equal and opposite. 3) If the coefficients of the FP differ from those associated with the virial theorem the plane is said to be `tilted'. If we multiply $I_e$ by the global stellar mass-to-light ratio $M_*/L$ and we account for non-homology across the population by using S\'ersic photometry, then the resulting stellar mass FP is less tilted. Accounting self-consistently for $M_*/L$ gradients will change the tilt. The tilt we currently see suggests that the efficiency of turning baryons into stars increases and/or the dark matter fraction decreases as stellar surface brightness increases.
For early-type galaxies, the ability to sustain a corona of hot, X-ray emitting gas could have played a key role in quenching their star-formation history. Yet, it is still unclear what drives the precise amount of hot gas around these galaxies. By combining photometric and spectroscopic measurements for the early-type galaxies observed during the Atlas3D integral-field survey with measurements of their X-ray luminosity based on X-ray data of both low and high spatial resolution we conclude that the hot-gas content of early-type galaxies can depend on their dynamical structure. Specifically, whereas slow rotators generally have X-ray halos with luminosity L_X,gas and temperature T values that are in line with what is expected if the hot-gas emission is sustained by the thermalisaton of the kinetic energy carried by the stellar-mass loss material, fast rotators tend to display L_X,gas values that fall consistently below the prediction of this model, with similar T values that do not scale with the stellar kinetic energy as observed in the case of slow rotators. Considering that fast rotators are likely to be intrinsically flatter than slow rotators, and that the few L_X,gas-deficient slow rotators also happen to be relatively flat, the observed L_X,gas deficiency in these objects would support the hypothesis whereby flatter galaxies have a harder time in retaining their hot gas. We discuss the implications that a different hot-gas content could have on the fate of both acquired and internally-produced gaseous material, considering in particular how the L_X,gas deficiency of fast rotators would make them more capable to recycle the stellar-mass loss material into new stars than slow rotators. This is consistent with the finding that molecular gas and young stars are detected only in fast rotators in the Atlas3D sample, and that fast rotators tend to dustier than slow rotators. [Abridged]
0.808587
0.74928
0.059307
2004.07848
The evolution of stellar triples: The most common evolutionary pathways
Many stars do not live alone, but instead have one or more stellar companions. Observations show that these binaries, triples and higher-order multiples are common. Whereas the evolution of single stars and binaries have been studied extensively, the same is not true for the evolution of stellar triples. To fill this gap in our general understanding of stellar lives, we aim to systematically explore the long-term evolution of triples and to map out the most common evolutionary pathways that triples go through. We quantitatively study how triples evolve, which processes are most relevant, and how this differs from binary evolution. We simulate the evolution of several large populations of triples with a population synthesis approach. We make use of the triple evolution code TRES to simulate the evolution of each triple in a consistent way; including three-body dynamics (based on the secular approach), stellar evolution and their mutual influences. We simulate the evolution of the system up until mass transfer starts, the system becomes dynamically unstable, or a Hubble time has passed. We find that stellar interactions are common in triples. Compared to a binary population, we find that the fraction of systems that can undergo mass transfer is about 2 to 3 times larger in triples. Moreover, whereas in binaries the orbits typically reach circularisation before Roche-lobe overflow, this is not true anymore in triples. In our simulations, about 40% of systems retain an eccentric orbit. Additionally, we discuss various channels of triple evolution in detail such as those where the secondary or the tertiary is the first star to initiate a mass transfer event.
Darwin's hypothesis that all extant life forms are descendants of a last common ancestor cell and diversification of life forms results from gradual mutation plus natural selection represents a mainstream view that has influenced biology and even society for over a century. However, this Darwinian view on life is contradicted by many observations and lacks a plausible physico-chemical explanation. Strong evidence suggests that the common ancestor cell hypothesis is the most fundamental flaw of Darwinism. By contrast, a totally different perspective on origin and evolution of life claims that cellular life forms were descendants of already diversified acellular life forms. Independently originated life forms evolve largely in some parallel ways even though they also interact with each other. Some evolutionary "gaps" naturally exist among evolutionary lines. Similarity may not be the only result of phylogenetic inheritance but may be a result of a convergent mechanism of origin and evolution. Evolution is not a random process but follows some basic physico-chemical principles as a result of the interplay of both energy and entropy on matter.
0.913918
0.61552
0.298399
2004.07849
Analytic bootstrap and Witten diagrams for the ABJM Wilson line as defect CFT$_1$
We study local operator insertions on 1/2-BPS line defects in ABJM theory. Specifically, we consider a class of four-point correlators in the CFT$_1$ with SU$(1, 1|3)$ superconformal symmetry defined on the 1/2-BPS Wilson line. The relevant insertions belong to the short supermultiplet containing the displacement operator and correspond to fluctuations of the dual fundamental string in AdS$_4 \times \mathbb{C}\textrm{P}^3$ ending on the line at the boundary. We use superspace techniques to represent the displacement supermultiplet and we show that superconformal symmetry determines the four-point correlators of its components in terms of a single function of the one-dimensional cross-ratio. Such function is highly constrained by crossing and internal consistency, allowing us to use an analytical bootstrap approach to find the first subleading correction at strong coupling. Finally, we use AdS/CFT to compute the same four-point functions through tree-level AdS$_2$ Witten diagrams, producing a result that is perfectly consistent with the bootstrap solution.
We study the cusped Wilson line operators and Bremsstrahlung functions associated to particles transforming in the rank-$k$ symmetric representation of the gauge group $U(N)$ for ${\cal N} = 4$ super Yang-Mills. We find the holographic D3-brane description for Wilson loops with internal cusps in two different limits: small cusp angle and $k\sqrt{\lambda}\gg N$. This allows for a non-trivial check of a conjectured relation between the Bremsstrahlung function and the expectation value of the 1/2 BPS circular loop in the case of a representation other than the fundamental. Moreover, we observe that in the limit of $k\gg N$, the cusped Wilson line expectation value is simply given by the exponential of the 1-loop diagram. Using group theory arguments, this eikonal exponentiation is conjectured to take place for all Wilson loop operators in symmetric representations with large $k$, independently of the contour on which they are supported.
0.86822
0.797163
0.071058
2004.07850
Restoring number conservation in quadratic bosonic Hamiltonians with dualities
Number-non-conserving terms in quadratic bosonic Hamiltonians can induce unwanted dynamical instabilities. By exploiting the pseudo-Hermitian structure built in to these Hamiltonians, we show that as long as dynamical stability holds, one may always construct a nontrivial dual (unitarily equivalent) number-conserving quadratic bosonic Hamiltonian. We exemplify this construction for a gapped harmonic chain and a bosonic analogue to Kitaev's Majorana chain. Our duality may be used to identify local number-conserving models that approximate stable bosonic Hamiltonians without the need for parametric amplification and to implement non-Hermitian $\mathcal{P}\mathcal{T}$-symmetric dynamics in non-dissipative number-conserving bosonic systems. Implications for computing topological invariants are addressed.
We present a nontrivial model system of interacting electrons that can be solved analytically in the GW approximation. We obtain the particle number from the GW Green's function strictly analytically, and prove that there is a genuine violation of particle number conservation if the self-energy is calculated non-self-consistently from a zeroth order Green's function, as done in virtually all practical implementations. We also show that a simple shift of the self-energy that partially restores self-consistency reduces the numerical deviation significantly.
0.887832
0.727343
0.160489
2004.07851
Flatbands and Mechanical Deformation Effects in the Moir\'e Superlattice of MoS$_2$-WSe$_2$ Heterobilayers
It has recently been shown that quantum-confined states can appear in epitaxially grown van der Waals material heterobilayers without a rotational misalignment ($\theta=0^\circ$), associated with flat bands in the Brillouin zone of the moir\'e pattern formed due to the lattice mismatch of the two layers. Peaks in the local density of states and confinement in a MoS$_2$/WSe$_2$ system was qualitatively described only considering local stacking arrangements, which cause band edge energies to vary spatially. In this work, we report the presence of large in-plane strain variation across the moir\'e unit cell of a $\theta=0^\circ$ MoS$_2$/WSe$_2$ heterobilayer, and show that inclusion of strain variation and out-of-plane displacement in density functional theory calculations greatly improves their agreement with the experimental data. We further explore the role of twist-angle by showing experimental data for a twisted MoS$_2$/WSe$_2$ heterobilayer structure with twist angle of $\theta=15^\circ$, that exhibits a moir\'e pattern but no confinement.
In this study, terahertz (THz) absorption and transmission of monolayer MoS$_{2}$ was calculated under different carrier concentrations. Results showed that the THz absorption of monolayer MoS$_{2}$ is very small even under high carrier concentrations and large incident angle. Equivalent loss of the THz absorption is the total sum of reflection and absorption that is one to three grades lower than that of graphene. The monolayer MoS$_{2}$ transmission is much larger than that of the traditional GaAs and InAs two-dimensional electron gas. The field-effect tubular structure formed by the monolayer MoS$_{2}$-insulation-layer-graphene is investigated. In this structure the THz absorption of graphene to reach saturation under low voltage. Meantime, the maximum THz absorption of monolayer MoS$_{2}$ was limited to approximately 5\%. Thus, monolayer MoS$_{2}$ is a kind of ideal THz Transparent Electrodes.
0.89664
0.720409
0.176231
2004.07854
SCORCH. III. Analytical Models of Reionization with Varying Clumping Factors
In the Simulations and Constructions of the Reionization of Cosmic Hydrogen (SCORCH) project, we compare analytical models of the hydrogen ionization fraction with radiation-hydrodynamic simulations. We derive analytical models of the mass-weighted hydrogen ionization fraction from the local ionization balance equations as a more accurate alternative to the widely adopted model based on the volume filling factor. In particular, our model has a recombination term quadratic in the ionization fraction, which is consistent with the two-body interaction nature of recombination. Then, we use the radiation-hydrodynamic simulations to study the clumping factors needed to solve the analytical equations, and provide accurate fitting functions. We find that the ionized hydrogen clumping factors from our radiative transfer simulations are significantly different than those from other simulations that use a uniform photoionization background. In addition to redshift dependence, we also see the dependence of ionized hydrogen clumping factor on ionization fraction, and we incorporate this into our fits. We calculate the reionization histories using our analytical models and clumping factors and compare with widely adopted models, and all of our models achieve $<7\%$ difference from simulation results while the other models have $>20\%$ deviations. The Thomson optical depths from reionization calculated from our analytical models result in $<5\%$ deviation from simulations, while the previous analytical models have $>20\%$ difference in and could result in biased conclusions of the IGM reionization.
Our understanding of population III star formation is still in its infancy. They are formed in dark matter minihalos of $\rm 10^5-10^6 M_{\odot}$ at $z=20-30$. Recent high resolution cosmological simulations show that a protostellar disk forms as a consequence of gravitational collapse and fragments into multiple clumps. However, it is not entirely clear if these clumps will be able to survive to form multiple stars as simulations are unable to follow the disk evolution for longer times. In this study, we employ a simple analytical model to derive the properties of marginally stable steady-state disks. Our results show that the stability of the disk depends on the critical value of the viscous parameter $\alpha$. For $\alpha_{crit} = 1$, the disk is stable for an accretion rate of $\rm \leq 10^{-3} M_{\odot}/yr$ and becomes unstable at radii about $\rm \geq 100 AU$ in the presence of an accretion rate of $\rm 10^{-2} M_{\odot}/yr$. For $0.06 < \alpha_{crit} < 1$, the disk can be unstable for both accretion rates. The comparison of the migration and the Kelvin-Helmholtz time scales shows that clumps are expected to migrate inward before reaching the main sequence. Furthermore, in the presence of a massive central star the clumps within the central 1 AU will be tidally disrupted. We also find that UV feedback from the central star is unable to disrupt the disk, and that photo-evaporation becomes important only once the accretion rate has dropped to $\rm 2 \times 10^{-4} M_{\odot}/yr$. As a result, the central star may reach a mass of 100 $\rm M_{\odot}$ or even higher.
0.841464
0.698381
0.143083
2004.07855
Spherical Bayesian mass-mapping with uncertainties: full sky observations on the celestial sphere
To date weak gravitational lensing surveys have typically been restricted to small fields of view, such that the $\textit{flat-sky approximation}$ has been sufficiently satisfied. However, with Stage IV surveys ($\textit{e.g. LSST}$ and $\textit{Euclid}$) imminent, extending mass-mapping techniques to the sphere is a fundamental necessity. As such, we extend the sparse hierarchical Bayesian mass-mapping formalism presented in previous work to the spherical sky. For the first time, this allows us to construct $\textit{maximum a posteriori}$ spherical weak lensing dark-matter mass-maps, with principled Bayesian uncertainties, without imposing or assuming Gaussianty. We solve the spherical mass-mapping inverse problem in the analysis setting adopting a sparsity promoting Laplace-type wavelet prior, though this theoretical framework supports all log-concave posteriors. Our spherical mass-mapping formalism facilitates principled statistical interpretation of reconstructions. We apply our framework to convergence reconstruction on high resolution N-body simulations with pseudo-Euclid masking, polluted with a variety of realistic noise levels, and show a dramatic increase in reconstruction fidelity compared to standard approaches. Furthermore we perform the largest joint reconstruction to date of all publically available shear observational datasets (combining DESY1, KiDS450 and CFHTLens) and find that our formalism recovers a convergence map with significantly enhanced small-scale detail. Within our Bayesian framework we validate, in a statistically rigourous manner, the community's intuition regarding the need to smooth spherical Kaiser-Squies estimates to provide physically meaningful convergence maps. Such approaches cannot reveal the small-scale physical structures that we recover within our framework.
The data reduction procedure for radio interferometers can be viewed as a combined calibration and imaging problem. We present an algorithm that unifies cross-calibration, self-calibration, and imaging. Being a Bayesian method, that algorithm does not only calculate an estimate of the sky brightness distribution, but also provides an estimate of the joint uncertainty which entails both the uncertainty of the calibration and the one of the actual observation. The algorithm is formulated in the language of information field theory and uses Metric Gaussian Variational Inference (MGVI) as the underlying statistical method. So far only direction-independent antenna-based calibration is considered. This restriction may be released in future work. An implementation of the algorithm is contributed as well.
0.840315
0.795903
0.044411
2004.07857
Ultimate limit on time signal generation
The generation of time signals is a fundamental task in science. Here we study the relation between the quality of a time signal and the physics of the system that generates it. According to quantum theory, any time signal can be decomposed into individual quanta that lead to single detection events. Our main result is a bound on how sharply peaked in time these events can be, which depends on the dimension of the signal generator. This result promises applications in various directions, including information theory, quantum clocks, and process simulation.
In recent years cosmology has undergone a revolution, with precise measurements of the microwave background radiation, large galaxy redshift surveys, and the discovery of the recent accelerated expansion of the Universe using observations of distant supernovae. In this light, the SKA enables us to do an ultimate test in cosmology by measuring the expansion rate of the Universe in real time. This can be done by a rather simple experiment of observing the neutral hydrogen (HI) signal of galaxies at two different epochs. The signal will encounter a change in frequency imprinted as the Universe expands over time and thus monitoring the drift in frequencies will provide a real time measure of the cosmic acceleration. Over a period of 12 years one would expected a frequency shift of the order of 0.1 Hz assuming a standard Lambda-CDM cosmology. Based on the sensitivity estimates of the SKA and the number counts of the expected HI galaxies, it is shown that the number counts are sufficiently high to compensate for the observational uncertainties of the measurements and hence allow a statistical detection of the frequency shift. [abstract abridged]
0.807697
0.620965
0.186732
2004.07858
A Green function approach to topological insulator junctions with magnetic and superconducting regions
In this work we present a Green function approach, originally implemented in graphene with well-defined edges, to the surface of a strong 3D topological insulator (TI) with a sequence of proximitized superconducting (S) and magnetic (F) surfaces. This approach consist in the calculation of the Green functions of the system by the analytical derivation of the McMillan's Green functions for each region and their coupling by a tight-binding Hamiltonian with the Dyson equation. These functions allow the direct calculation of the momentum-resolved spectral density of states, the identification of subgap interface states, and the derivation of the differential conductance for a wide variety of configurations of the junctions. We illustrate the application of this method for some simple systems with two and three regions, finding the characteristic chiral state of the anomalous quantum Hall effect (AQHE) at the N/F interfaces, and the chiral Majorana modes at the N/S interfaces. Finally we discuss some geometrical effects present in the three-region junctions such as weak Fabry-P\'erot resonances and Andreev bound states.
We consider a Josephson bijunction consisting of a thin $SIS$ $\pi$-Josephson junction sandwiched between two-dimensional semiconducting layers with strong Rashba spin-orbit interaction. Each of these layers forms an $SNS$ junction due to proximity-induced superconductivity. The $SIS$ junction is assumed to be thin enough such that the two Rashba layers are tunnel-coupled. We show that, by tuning external gates, this system can be controllably brought into a time-reversal invariant topological superconducting phase with a Kramers pair of Majorana bound states being localized at the end of the normal region for a large parameter phase space. In particular, in the strong spin-orbit interaction limit, the topological phase can be accessed already in the regime of small tunneling amplitudes.
0.911067
0.800453
0.110614
2004.07859
Coronavirus (COVID-19): ARIMA based time-series analysis to forecast near future
COVID-19, a novel coronavirus, is currently a major worldwide threat. It has infected more than a million people globally leading to hundred-thousands of deaths. In such grave circumstances, it is very important to predict the future infected cases to support prevention of the disease and aid in the healthcare service preparation. Following that notion, we have developed a model and then employed it for forecasting future COVID-19 cases in India. The study indicates an ascending trend for the cases in the coming days. A time series analysis also presents an exponential increase in the number of cases. It is supposed that the present prediction models will assist the government and medical personnel to be prepared for the upcoming conditions and have more readiness in healthcare systems.
Purpose: To present a method that automatically detects and quantifies abnormal tomographic patterns commonly present in COVID-19, namely Ground Glass Opacities (GGO) and consolidations. Given that high opacity abnormalities (i.e., consolidations) were shown to correlate with severe disease, the paper introduces two combined severity measures (Percentage of Opacity, Percentage of High Opacity) and (Lung Severity Score, Lung High Opacity Score). They quantify the extent of overall COVID-19 abnormalities and the presence of high opacity abnormalities, global and lobe-wise, respectively, being computed based on 3D segmentations of lesions, lungs, and lobes. Materials and Methods: The proposed method takes as input a non-contrasted Chest CT and segments the lesions, lungs, and lobes in 3D. It outputs two combined measures of the severity of lung/lobe involvement, quantifying both the extent of COVID-19 abnormalities and presence of high opacities, based on deep learning and deep reinforcement learning. The first measure (POO, POHO) is global, while the second (LSS, LHOS) is lobe-wise. Evaluation is reported on CTs of 100 subjects (50 COVID-19 confirmed and 50 controls) from institutions from Canada, Europe and US. Ground truth is established by manual annotations of lesions, lungs, and lobes. Results: Pearson Correlation Coefficient between method prediction and ground truth is 0.97 (POO), 0.98 (POHO), 0.96 (LSS), 0.96 (LHOS). Automated processing time to compute the severity scores is 10 seconds/case vs 30 mins needed for manual annotations. Conclusion: A new method identifies regions of abnormalities seen in COVID-19 non-contrasted Chest CT and computes (POO, POHO) and (LSS, LHOS) severity scores.
0.83044
0.715233
0.115206
2004.07860
On the Performance of Non-Orthogonal Multiple Access over Composite Fading Channels
This paper analyzes the performance of a cooperative relaying non-orthogonal multiple access (NOMA) network over Fisher-Snedecor F composite fading channels. Specifically, one base station (BS) is assumed to communicate with two receiving mobile users with one acting also as a decode-and-forward (DF) relay. To highlight the achievable performance gains of the NOMA scheme, conventional relaying with orthogonal multiple access (OMA) is also analyzed. For the two systems under consideration, we derive novel exact closed-form expressions for the ergodic capacity along with the corresponding asymptotic representations. The derived expressions are then used to assess the influence of various system parameters, including the fading and shadowing parameters, on the performance of both the NOMA and OMA systems. Monte-Carlo simulation are provided throughout to verify the accuracy of our analysis. Results reveal that the NOMA system can considerably outperform the OMA approach when the power allocation factor is carefully selected. It is also shown that as the fading and/or shadowing parameters are increased, the ergodic capacity performance enhances.
Intelligent reflecting surface (IRS) is a promising technology to enhance the coverage and performance of wireless networks. We consider the application of IRS to non-orthogonal multiple access (NOMA), where a base station transmits superposed signals to multiple users by the virtue of an IRS. The performance of an IRS-assisted NOMA networks with imperfect successive interference cancellation (ipSIC) and perfect successive interference cancellation (pSIC) is investigated by invoking 1-bit coding scheme. In particular, we derive new exact and asymptotic expressions for both outage probability and ergodic rate of the m-th user with ipSIC/pSIC. Based on analytical results, the diversity order of the m-th user with pSIC is in connection with the number of reflecting elements and channel ordering. The high signal-to-noise radio (SNR) slope of ergodic rate for the $m$-th user is obtained. The throughput and energy efficiency of non-orthogonal users for IRS-NOMA are discussed both in delay-limited and delay-tolerant transmission modes. Additionally, we derive new exact expressions of outage probability and ergodic rate for IRS-assisted orthogonal multiple access (IRS-OMA). Numerical results are presented to substantiate our analyses and demonstrate that: i) The outage behaviors of IRS-NOMA are superior to that of IRS-OMA and relaying schemes; ii) With increasing the number of reflecting elements, IRS-NOMA is capable of achieving enhanced outage performance; and iii) The M-th user has a larger ergodic rate compared to IRS-OMA and benchmarks. However, the ergodic performance of the $m$-th user exceeds relaying schemes in the low SNR regime.
0.862419
0.826142
0.036276
2004.07861
The Co-Production of Service: Modeling Service Times in Contact Centers Using Hawkes Processes
In customer support centers, a successful service interaction involves a dialogue between a customer and an agent. Both parties depend on one another for information and problem solving, and this interaction defines a co-produced service process. In this paper, we propose, develop, and compare new stochastic models for the co-production of service in a contact center. Using insights from service communication data, we model the service interactions using self-exciting and mutually exciting bivariate Hawkes processes, so that a correspondence from one party increases the likelihood of a response from the other party soon after. Moreover, our models incorporate both dynamic busyness factors that depend on the agent workload as well as dynamic factors that depend on the inner-mechanics of the interaction. To understand how well our Hawkes models describe the message-timestamps, we compare the goodness-of-fit of these models on contact center data from industry. We show that the word-count bivariate Hawkes model, which takes into account the mutual interaction and the amount of information provided by each party, fits the data the best. In addition to a great goodness-of-fit, the Hawkes models allow us to construct explicit expressions for the relationship between the correspondence rates of each party and the conversation progress. These formulae illustrate that the agent is more dominant in pacing the service along in the short term, but that the customer has a more profound effect on the duration of the conversation in the long run. Finally, we use our models to predict the future level of activity within a given conversation, through which we find that the bivariate Hawkes processes that incorporate the amount of information provided by each party or the sentiment expressed by the customer give us the most accurate predictions.
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service responds the user request independently, it is essential to compose them for delivering a compound value-added service. Since, there may be a number of compositions to create the requested service, it is important to find one which its properties are close to user's desires and meet some non-functional constraints and optimize criteria such as overall cost or response time. In this paper, a user-centric approach is presented for evaluating the service compositions which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem. Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of web service composition easier and more efficient.
0.887554
0.698182
0.189371
2004.07862
Pursuing quantum difference equations I: stable envelopes of subvarieties
Let $X$ be a symplectic variety equipped with an action of a torus $A$. Let $\nu \subset A$ be a finite cyclic subgroup. We show that K-theoretic stable envelope of subvarieties $X^{\nu}\subset X$ can be obtained via various limits of the elliptic stable envelopes of $X$. An example of $X$ given by the Hilbert scheme of points in the complex plane is considered in details.
In the moduli space of degree d polynomials, the special subvarieties are those cut out by critical orbit relations, and then the special points are the post-critically finite polynomials. It was conjectured that in the moduli space of degree d polynomials, the subvarieties containing a Zariski-dense set of special points are exactly these special subvarieties. In this article, we prove the first non-trivial case for this conjecture: the case of cubic polynomials.
0.771601
0.679315
0.092286
2004.07863
Degenerate Fermion Dark Matter from a Broken $U(1)_{\rm B-L}$ Gauge Symmetry
The extension of the Standard model by assuming $U(1)_{\rm B-L}$ gauge symmetry is very well-motivated since it naturally explains the presence of heavy right-handed neutrinos required to account for the small active neutrino masses via the seesaw mechanism and thermal leptogenesis. Traditionally, we introduce three right handed neutrinos to cancel the $[U(1)_{\rm B-L}]^3$ anomaly. However, it suffices to introduce two heavy right-handed neutrinos for these purposes and therefore we can replace one right-handed neutrino by new chiral fermions to cancel the $U(1)_{\rm B-L}$ gauge anomaly. Then, one of the chiral fermions can naturally play a role of a dark matter candidate. In this paper, we demonstrate how this framework produces a dark matter candidate which can address the so-called "core-cusp problem". As one of the small scale problems that $\Lambda$CDM paradigm encounters, it may imply an important clue for a nature of dark matter. One of resolutions among many is hypothesizing that sub-keV fermion dark matter halos in dwarf spheroidal galaxies are in (quasi) degenerate configuration. We show how the degenerate sub-keV fermion dark matter candidate can be non-thermally originated in our model and thus can be consistent with Lyman-$\alpha$ forest observation. Thereby, the small neutrino mass, baryon asymmetry, and the sub-keV dark matter become consequences of the broken B-L gauge symmetry.
We argue that, in the presence of anomalous $U(1)$ symmetries, the invariance of Lagrangian including the standard model (SM) under the axionic shift symmetries requires a necessary condition $\sum_i\delta^{\rm GS}_{i}\leq2N_f$, where $N_f$ stands for the number of families in the SM and $\delta^{\rm GS}_i$ (Green-Schwarz parameter) characterizes the coupling of the anomalous $U(1)$ gauge boson to the corresponding axion. In turn, we show that in order for the usual $B+L$ violating sphaleron process to be valid a necessary condition $\sum_i\delta^{\rm GS}_{i}<2N_f$ is required, where $B(L)$ stands for the baryon(lepton) number.
0.834361
0.80435
0.030011
2004.07864
A Neural Architecture Search based Framework for Liquid State Machine Design
Liquid State Machine (LSM), also known as the recurrent version of Spiking Neural Networks (SNN), has attracted great research interests thanks to its high computational power, biological plausibility from the brain, simple structure and low training complexity. By exploring the design space in network architectures and parameters, recent works have demonstrated great potential for improving the accuracy of LSM model with low complexity. However, these works are based on manually-defined network architectures or predefined parameters. Considering the diversity and uniqueness of brain structure, the design of LSM model should be explored in the largest search space possible. In this paper, we propose a Neural Architecture Search (NAS) based framework to explore both architecture and parameter design space for automatic dataset-oriented LSM model. To handle the exponentially-increased design space, we adopt a three-step search for LSM, including multi-liquid architecture search, variation on the number of neurons and parameters search such as percentage connectivity and excitatory neuron ratio within each liquid. Besides, we propose to use Simulated Annealing (SA) algorithm to implement the three-step heuristic search. Three datasets, including image dataset of MNIST and NMNIST and speech dataset of FSDD, are used to test the effectiveness of our proposed framework. Simulation results show that our proposed framework can produce the dataset-oriented optimal LSM models with high accuracy and low complexity. The best classification accuracy on the three datasets is 93.2%, 92.5% and 84% respectively with only 1000 spiking neurons, and the network connections can be averagely reduced by 61.4% compared with a single LSM. Moreover, we find that the total quantity of neurons in optimal LSM models on three datasets can be further reduced by 20% with only about 0.5% accuracy loss.
Neural machine translation aims at building a single large neural network that can be trained to maximize translation performance. The encoder-decoder architecture with an attention mechanism achieves a translation performance comparable to the existing state-of-the-art phrase-based systems on the task of English-to-French translation. However, the use of large vocabulary becomes the bottleneck in both training and improving the performance. In this paper, we propose an efficient architecture to train a deep character-level neural machine translation by introducing a decimator and an interpolator. The decimator is used to sample the source sequence before encoding while the interpolator is used to resample after decoding. Such a deep model has two major advantages. It avoids the large vocabulary issue radically; at the same time, it is much faster and more memory-efficient in training than conventional character-based models. More interestingly, our model is able to translate the misspelled word like human beings.
0.834277
0.623505
0.210772
2004.07865
PRASSE -- The Pulsar Automated Search Script Ensemble
The search for pulsars produces a massive amount of data which needs to be processed and analyzed. The limited speed of manual observation necessitates the involvement of large numbers of people to keep up with data collection. This paper turns to the automated alternative by examining the methodology of an algorithm built to automatically filter through processed and reduced data, which then presents the most promising data to human observers for confirmation and more complex analysis. The benefits and shortcomings of this algorithm are examined while explaining plans for future testing.
Today's JavaScript applications are composed of scripts from different origins that are loaded at run time. As not all of these origins are equally trusted, the execution of these scripts should be isolated from one another. However, some scripts must access the application state and some may be allowed to change it, while preserving the confidentiality and integrity constraints of the application. This paper presents design and implementation of DecentJS, a language-embedded sandbox for full JavaScript. It enables scripts to run in a configurable degree of isolation with fine-grained access control. It provides a transactional scope in which effects are logged for review by the access control policy. After inspection of the log, effects can be committed to the application state or rolled back. The implementation relies on JavaScript proxies to guarantee full interposition for the full language and for all code, including dynamically loaded scripts and code injected via eval. Its only restriction is that scripts must be compliant with JavaScript's strict mode.
0.838892
0.608616
0.230276
2004.07866
The XXL Survey XLIV. Sunyaev-Zel'dovich mapping of a low-mass cluster at z~1: a multi-wavelength approach
In this paper, we present resolved observations of the Sunyaev-Zel'dovich (SZ) effect, obtained with the NIKA2 camera, towards the cluster of galaxies XLSSC102, a relatively low-mass system ($M_{500} \sim 2 \times 10^{14}$ M$_{\odot}$) at $z = 0.97$ detected from the XXL survey. We combine NIKA2 SZ data, XMM-Newton X-ray data, and Megacam optical data to explore, respectively, the spatial distribution of the gas electron pressure, the gas density, and the galaxies themselves. We find significant offsets between the X-ray peak, the SZ peak, the brightest cluster galaxy, and the peak of galaxy density. Additionally, the galaxy distribution and the gas present elongated morphologies. This is interpreted as the sign of a recent major merging event, which induced a local boost of the gas pressure towards the north of XLSSC102 and stripped the gas out of the galaxy group. The NIKA2 data are also combined with XXL data to construct the thermodynamic profiles of XLSSC102, obtaining relatively tight constraints up to about $\sim r_{500}$, and revealing properties that are typical of disturbed systems. We also explore the impact of the cluster centre definition and the implication of local pressure substructure on the recovered profiles. Finally, we derive the global properties of XLSSC102 and compare them to those of high-mass-and-low-redshift systems, finding no strong evidence for non-standard evolution. We also use scaling relations to obtain alternative mass estimates from our profiles. The variation between these different mass estimates reflects the difficulty to accurately measure the mass of low-mass clusters at z$\sim$1, especially with low signal-to-noise ratio (S/N) data and for a disturbed system. However, it also highlights the strength of resolved SZ observations alone and in combination with survey-like X-ray data.
We introduce a new statistic to measure more accurately the cosmic sound speed of clusters of galaxies at different redshifts. This statistic is evaluated by cross-correlating cosmic microwave background (CMB) fluctuations caused by the Sunyaev-Zel'dovich effect from observed clusters of galaxies with their redshifts. When clusters are distributed in redshift bins of narrow width, one could measure the mean squared cluster peculiar velocity with an error \sigma_{C_S^2}\lsim (300{\rm km/s})^2. This can be done around z>0.3 with clusters of flux above 200 mJy which will be detected by PLANCK, coupled with high resolution microwave images to eliminate the cosmological part of the CMB fluctuations. The latter can be achieved with observations by the planned ALMA array or the NSF South Pole telescope and other surveys. By measuring the cosmic sound speed and the bulk flow in, e.g., 4 spheres of ~ 100h^{-1}Mpc at z=0.3, we could have a direct measurement of the matter density 0.21<\Omega_m<0.47 at 95 % confidence level.
0.850665
0.772203
0.078462
2004.07867
Testing $F(Q)$ gravity with redshift space distortions
A Bayesian statistical analysis using redshift space distortions data is performed to test a model of Symmetric Teleparallel Gravity where gravity is non-metrical. The cosmological background mimics a $\Lambda$CDM evolution but differences arise in the perturbations. The linear matter fluctuations are numerically evolved and the study of the growth rate of structures is analysed in this cosmological setting. The best fit parameters reveal that the $\sigma_8$ tension between Planck and Large Scale Structure data can be alleviated within this framework.
Under a condition of the Calderon type on $\varphi$, we show that a homeomorphism $f$ of finite distortion in $W^{1,\varphi}_{\rm loc}$ and, in particular, $f\in W^{1,q}_{\rm loc}$ for $q>n-1$ in ${\Bbb R}^n$, $n\ge 3$, is a lower $Q$-homeomorphisms with respect to the $p$-modulus with $\left[ K_{I,\alpha}(x,f)\right]^{\beta}$, $p>n-1$ and a ring $Q_{*}$-homeomorphism with respect to the $\frac{p}{p-n+1}$-modulus with $Q_{*}(x)=K_{I,\alpha}(x,f)$ where $ K_{I,\alpha}(x,f)$ is its inner $\alpha$-dilatation and $\alpha=\frac{p}{p-n+1}$, $\beta=\frac{p-n+1}{n-1}$.
0.794064
0.646797
0.147267
2004.07869
Entanglement is Necessary for Optimal Quantum Property Testing
There has been a surge of progress in recent years in developing algorithms for testing and learning quantum states that achieve optimal copy complexity. Unfortunately, they require the use of entangled measurements across many copies of the underlying state and thus remain outside the realm of what is currently experimentally feasible. A natural question is whether one can match the copy complexity of such algorithms using only independent---but possibly adaptively chosen---measurements on individual copies. We answer this in the negative for arguably the most basic quantum testing problem: deciding whether a given $d$-dimensional quantum state is equal to or $\epsilon$-far in trace distance from the maximally mixed state. While it is known how to achieve optimal $O(d/\epsilon^2)$ copy complexity using entangled measurements, we show that with independent measurements, $\Omega(d^{4/3}/\epsilon^2)$ is necessary, even if the measurements are chosen adaptively. This resolves a question of Wright. To obtain this lower bound, we develop several new techniques, including a chain-rule style proof of Paninski's lower bound for classical uniformity testing, which may be of independent interest.
In quantum networking, repeater hijacking menaces the security and utility of quantum applications. To deal with this problem, it is important to take a measure of the impact of quantum repeater hijacking. First, we quantify the workload of each quantum repeater with regards to each quantum communication. Based on this, we show the costs for repeater hijacking detection using distributed quantum state tomography and the amount of work loss and rerouting penalties caused by hijacking. This quantitive evaluation covers both purification-entanglement swapping and quantum error correction repeater networks. Naive implementation of the checks necessary for correct network operation can be subverted by a single hijacker to bring down an entire network. Fortunately, the simple fix of randomly assigned testing can prevent such an attack.
0.84421
0.75578
0.08843
2004.07870
Effects of Non-Conformal Boundary on Entanglement Entropy
Spacetime boundaries with canonical Neuman or Dirichlet conditions preserve conformal invarience, but "mixed" boundary conditions which interpolate linearly between them can break conformal symmetry and generate interesting Renormalization Group flows even when a theory is free, providing soluble models with nontrivial scale dependence. We compute the (Rindler) entanglement entropy for a free scalar field with mixed boundary conditions in half Minkowski space and in Anti-de Sitter space. In the latter case we also compute an additional geometric contribution, which according to a recent proposal then collectively give the 1/N corrections to the entanglement entropy of the conformal field theory dual. We obtain some perturbatively exact results in both cases which illustrate monotonic interpolation between ultraviolet and infrared fixed points. This is consistent with recent work on the irreversibility of renormalization group, allowing some assessment of the aforementioned proposal for holographic entanglement entropy and illustrating the generalization of the g-theorem for boundary conformal field theory.
Using the Ryu-Takayanagi conjectured formula for entanglement entropy in the context of gauge-gravity duality, we investigate properties of mutual information between two disjoint rectangular sub-systems in finite temperature relativistic conformal field theories in d-spacetime dimensions and non-relativistic scale-invariant theories in some generic examples. In all these cases mutual information undergoes a transition beyond which it is identically zero. We study this transition in detail and find universal qualitative features for the above class of theories which has holographic dual descriptions. We also obtain analytical results for mutual information in the specific regime of the parameter space. This demonstrates that mutual information contains the quantum entanglement part of the entanglement entropy, which is otherwise dominated by the thermal entropy at large temperatures.
0.845746
0.813883
0.031863
2004.07871
Parameterizing uncertainty by deep invertible networks, an application to reservoir characterization
Uncertainty quantification for full-waveform inversion provides a probabilistic characterization of the ill-conditioning of the problem, comprising the sensitivity of the solution with respect to the starting model and data noise. This analysis allows to assess the confidence in the candidate solution and how it is reflected in the tasks that are typically performed after imaging (e.g., stratigraphic segmentation following reservoir characterization). Classically, uncertainty comes in the form of a probability distribution formulated from Bayesian principles, from which we seek to obtain samples. A popular solution involves Monte Carlo sampling. Here, we propose instead an approach characterized by training a deep network that "pushes forward" Gaussian random inputs into the model space (representing, for example, density or velocity) as if they were sampled from the actual posterior distribution. Such network is designed to solve a variational optimization problem based on the Kullback-Leibler divergence between the posterior and the network output distributions. This work is fundamentally rooted in recent developments for invertible networks. Special invertible architectures, besides being computational advantageous with respect to traditional networks, do also enable analytic computation of the output density function. Therefore, after training, these networks can be readily used as a new prior for a related inversion problem. This stands in stark contrast with Monte-Carlo methods, which only produce samples. We validate these ideas with an application to angle-versus-ray parameter analysis for reservoir characterization.
For discrete-time systems, governed by Kraus maps, the work of D. Petz has characterized the set of universal contraction metrics. In the present paper, we use this characterization to derive a set of quadratic Lyapunov functions for continuous-time systems, governed by Lindblad differential equations, that have a steady-state with full rank. An extremity of this set is given by the Bures metric, for which the quadratic Lyapunov function is obtained by inverting a Sylvester equation. We illustrate the method by providing a strict Lyapunov function for a Lindblad equation designed to stabilize a quantum electrodynamic "cat" state by reservoir engineering. In fact we prove that any Lindblad equation on the Hilbert space of the (truncated) harmonic oscillator, which has a full-rank equilibrium and which has, among its decoherence channels, a channel corresponding to the photon loss operator, globally converges to that equilibrium.
0.872618
0.629978
0.24264
2004.07872
Discrete symmetries in the cluster shell model
The role of discrete (or point-group) symmetries is discussed in the framework of the Cluster Shell Model which describes the splitting of single-particle levels in the deformed field of cluster potentials. We discuss the classification of the eigenstates for the cases of a triangular and tetrahedral configuration of alpha-particles in terms of the irreducible representations of the double point groups D'(3h) and T'(d), respectively, and show how the discrete symmetry of a given eigenstate can be determined. Finally, we derive the Coriolis coupling for each one of these geometrical configurations.
It is shown that during the motion of two initially gravitationally bound spherical shells, consisting of point particles moving along ballistic trajectories, one of the shell may be expelled to infinity at subrelativistic speed $v_{exp}\leq 0.25 c$. The problem is solved in Newtonian gravity. Motion of two intersecting shells in the case when they do not runaway shows a chaotic behaviour. We hope that this toy and oversimplyfied model can give nevertheless a qualitative idea on the nature of the mechanism of matter outbursts from the dense stellar clusters.
0.889024
0.692431
0.196593
2004.07873
A Heuristics-based Home Energy Management System for Demand Response
The so-called Internet of Things (IoT) and advanced communication technologies have already demonstrated a great potential to manage residential energy resources via demand-side management. This work presents a home energy management system in that focused on the energy reallocation problem where consumers shall shift their energy consumption patterns away from peak periods and/or high electricity prices. Our solution differentiates residential loads into two categories: (i) fixed power appliances and (ii) flexible ones. Therefrom, we formulate our problem as a constraint optimization problem, which is non-linear and cannot be mathematically solved in closed-form. We then employ and compare two well-known heuristics, the genetic algorithm (GA) and the harmony search algorithm (HSA), to minimize electricity expense and peak to average ratio. These two approaches are compared to the case where no reallocation happens. Our numerical results show that both methods; GAand HSA can effectively reduce the electricity cost by 0.9%, 3.98%, and PAR by 15%, 5.8%, respectively
We propose a contextual-bandit approach for demand side management by offering price incentives. More precisely, a target mean consumption is set at each round and the mean consumption is modeled as a complex function of the distribution of prices sent and of some contextual variables such as the temperature, weather, and so on. The performance of our strategies is measured in quadratic losses through a regret criterion. We offer $T^{2/3}$ upper bounds on this regret (up to poly-logarithmic terms)---and even faster rates under stronger assumptions---for strategies inspired by standard strategies for contextual bandits (like LinUCB, see Li et al., 2010). Simulations on a real data set gathered by UK Power Networks, in which price incentives were offered, show that our strategies are effective and may indeed manage demand response by suitably picking the price levels.
0.853685
0.713967
0.139717
2004.07874
Statistical mechanical constitutive theory of polymer networks: the inextricable links between distribution, behavior, and ensemble
A fundamental theory is presented for the mechanical response of polymer networks undergoing large deformation which seamlessly integrates statistical mechanical principles with macroscopic thermodynamic constitutive theory. Our formulation permits the consideration of arbitrary polymer chain behaviors when interactions among chains may be neglected. This careful treatment highlights the naturally occurring correspondence between single-chain mechanical behavior and the equilibrium distribution of chains in the network, as well as the correspondences between different single-chain thermodynamic ensembles. We demonstrate these important distinctions with the extensible freely jointed chain model. This statistical mechanical theory is then extended to the continuum scale, where we utilize traditional macroscopic constitutive theory to ultimately retrieve the Cauchy stress in terms of the deformation and polymer network statistics. Once again using the extensible freely jointed chain model, we illustrate the importance of the naturally occurring statistical correspondences through their effects on the stress-stretch response of the network. We additionally show that these differences vanish when the number of links in the chain becomes sufficiently large enough, and discuss why certain methods perform better than others before this limit is reached.
A polymer-chain network is a collection of interconnected polymer-chains, made themselves of the repetition of a single pattern called a monomer. Our first main result establishes that, for a class of models for polymer-chain networks, the thermodynamic limit in the canonical ensemble yields a hyperelastic model in continuum mechanics. In particular, the discrete Helmholtz free energy of the network converges to the infimum of a continuum integral functional (of an energy density depending only on the local deformation gradient) and the discrete Gibbs measure converges (in the sense of a large deviation principle) to a measure supported on minimizers of the integral functional. Our second main result establishes the small temperature limit of the obtained continuum model (provided the discrete Hamiltonian is itself independent of the temperature), and shows that it coincides with the $\Gamma$-limit of the discrete Hamiltonian, thus showing that thermodynamic and small temperature limits commute. We eventually apply these general results to a standard model of polymer physics from which we derive nonlinear elasticity. We moreover show that taking the $\Gamma$-limit of the Hamiltonian is a good approximation of the thermodynamic limit at finite temperature in the regime of large number of monomers per polymer-chain (which turns out to play the role of an effective inverse temperature in the analysis).
0.927142
0.861004
0.066137
2004.07875
Statistical learning in Wasserstein space
We seek a generalization of regression and principle component analysis (PCA) in a metric space where data points are distributions metrized by the Wasserstein metric. We recast these analyses as multimarginal optimal transport problems. The particular formulation allows efficient computation, ensures existence of optimal solutions, and admits a probabilistic interpretation over the space of paths (line segments). Application of the theory to the interpolation of empirical distributions, images, power spectra, as well as assessing uncertainty in experimental designs, is envisioned.
We define a simple obstruction to Yu's property A that we call $k$-prisms. This structure allows for a straightforward proof that the space of persistence diagrams fails to have property A in a Wasserstein metric.
0.807598
0.639061
0.168537
2004.07876
Reach-SDP: Reachability Analysis of Closed-Loop Systems with Neural Network Controllers via Semidefinite Programming
There has been an increasing interest in using neural networks in closed-loop control systems to improve performance and reduce computational costs for on-line implementation. However, providing safety and stability guarantees for these systems is challenging due to the nonlinear and compositional structure of neural networks. In this paper, we propose a novel forward reachability analysis method for the safety verification of linear time-varying systems with neural networks in feedback interconnection. Our technical approach relies on abstracting the nonlinear activation functions by quadratic constraints, which leads to an outer-approximation of forward reachable sets of the closed-loop system. We show that we can compute these approximate reachable sets using semidefinite programming. We illustrate our method in a quadrotor example, in which we first approximate a nonlinear model predictive controller via a deep neural network and then apply our analysis tool to certify finite-time reachability and constraint satisfaction of the closed-loop system.
To perform multi-user multiple-input and multiple-output transmission in millimeter-wave(mmWave) cellular systems, the high-dimensional channels need to be estimated for designing the multi-user precoder. Conventional grid-based compressed sensing (CS) methods for mmWave channel estimation suffer from the basis mismatch problem, which prevents accurate channel reconstruction and degrades the precoding performance. This paper formulates mmWave channel estimation as an Atomic Norm Minimization (ANM) problem. In contrast to grid-based CS methods which use discrete dictionaries, ANM uses a continuous dictionary for representing the mmWave channel. We consider a continuous dictionary based on sub-sampling in the antenna domain via a small number of radio frequency chains. We show that mmWave channel estimation using ANM can be formulated as a semidefinite programming (SDP) problem, and the user channel can be accurately estimated via off-the-shelf SDP solvers in polynomial time. Simulation results indicate that ANM can achieve much better estimation accuracy compared to grid-based CS, and significantly improves the spectral efficiency provided by multi-user precoding.
0.873392
0.593575
0.279817
2004.07877
AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning
The authentication field is evolving towards mechanisms able to keep users continuously authenticated without the necessity of remembering or possessing authentication credentials. While existing continuous authentication systems have demonstrated their suitability for single-device scenarios, the Internet of Things and next generation of mobile networks (5G) are enabling novel multi-device scenarios -- such as Smart Offices -- where continuous authentication is still an open challenge. The paper at hand, proposes an AI-based, privacy-preserving and multi-device continuous authentication architecture called AuthCODE. A realistic Smart Office scenario with several users, interacting with their mobile devices and personal computer, has been used to create a set of single- and multi-device behavioural datasets and validate AuthCODE. A pool of experiments with machine and deep learning classifiers measured the impact of time in authentication accuracy and improved the results of single-device approaches by considering multi-device behaviour profiles. The f1-score average reached for XGBoost on multi-device profiles based on 1-minute windows was 99.33%, while the best performance achieved for single devices was lower than 97.39%. The inclusion of temporal information in the form of vector sequences classified by a Long-Short Term Memory Network, allowed the identification of additional complex behaviour patterns associated to each user, resulting in an average f1-score of 99.02% on identification of long-term behaviours.
Performance of the existing physical layer authentication schemes could be severely affected by the imperfect estimates and variations of the communication link attributes used. The commonly adopted static hypothesis testing for physical layer authentication faces significant challenges in time-varying communication channels due to the changing propagation and interference conditions, which are typically unknown at the design stage. To circumvent this impediment, we propose an adaptive physical layer authentication scheme based on machine-learning as an intelligent process to learn and utilize the complex and time-varying environment, and hence to improve the reliability and robustness of physical layer authentication. Explicitly, a physical layer attribute fusion model based on a kernel machine is designed for dealing with multiple attributes without requiring the knowledge of their statistical properties. By modeling the physical layer authentication as a linear system, the proposed technique directly reduces the authentication scope from a combined N-dimensional feature space to a single dimensional (scalar) space, hence leading to reduced authentication complexity. By formulating the learning (training) objective of the physical layer authentication as a convex problem, an adaptive algorithm based on kernel least-mean-square is then proposed as an intelligent process to learn and track the variations of multiple attributes, and therefore to enhance the authentication performance. Both the convergence and the authentication performance of the proposed intelligent authentication process are theoretically analyzed. Our simulations demonstrate that our solution significantly improves the authentication performance in time-varying environments.
0.878036
0.737098
0.140939
2004.07878
History matching with probabilistic emulators and active learning
The scientific understanding of real-world processes has dramatically improved over the years through computer simulations. Such simulators represent complex mathematical models that are implemented as computer codes which are often expensive. The validity of using a particular simulator to draw accurate conclusions relies on the assumption that the computer code is correctly calibrated. This calibration procedure is often pursued under extensive experimentation and comparison with data from a real-world process. The problem is that the data collection may be so expensive that only a handful of experiments are feasible. History matching is a calibration technique that, given a simulator, it iteratively discards regions of the input space using an implausibility measure. When the simulator is computationally expensive, an emulator is used to explore the input space. In this paper, a Gaussian process provides a complete probabilistic output that is incorporated into the implausibility measure. The identification of regions of interest is accomplished with recently developed annealing sampling techniques. Active learning functions are incorporated into the history matching procedure to refocus on the input space and improve the emulator. The efficiency of the proposed framework is tested in well-known examples from the history matching literature, as well as in a proposed testbed of functions of higher dimensions.
In this paper we study the problem of identifying active subcarriers in an OFDM signal from compressive measurements sampled at sub-Nyquist rate. The problem is of importance in Cognitive Radio systems when secondary users (SUs) are looking for available spectrum opportunities to communicate over them while sensing at Nyquist rate sampling can be costly or even impractical in case of very wide bandwidth. We first study the effect of timing offset and derive the necessary and sufficient conditions for signal recovery in the oracle-assisted case when the true active sub-carriers are assumed known. Then we propose an Orthogonal Matching Pursuit (OMP)-based joint sparse recovery method for identifying active subcarriers when the timing offset is known. Finally we extend the problem to the case of unknown timing offset and develop a joint dictionary learning and sparse approximation algorithm, where in the dictionary learning phase the timing offset is estimated and in the sparse approximation phase active subcarriers are identified. The obtained results demonstrate that active subcarrier identification can be carried out reliably, by using the developed framework.
0.80621
0.60777
0.198439
2004.07880
A Common Origin of Neutrino Masses and $R_{D^{(\ast)}}$, $R_{K^{(\ast)}}$ Anomalies
In this work, we present a solution to the persistent tensions in the decay observables $R_{D^{(\ast)}}$ and $R_{K^{(\ast)}}$ by introducing a $SU(2)_L$ doublet and a $SU(2)_L$ triplet scalar leptoquarks (LQs) that reside at the TeV energy scale. Neutrinos that remain massless in the Standard Model receive naturally small masses at one-loop level via the propagation of the same LQs inside the loop. Such a common origin of apparently disjoint phenomenological observations is appealing, and we perform a comprehensive analysis of this set-up. We identify the minimal Yukawa textures required to accommodate these flavor anomalies and to successfully incorporate neutrino oscillation data while being consistent with all experimental constraints. This scenario can be experimentally probed and has the potential to be discovered or falsified by future improved measurements in the lepton flavor violating processes. Proper explanations of these flavor anomalies predict TeV scale LQs that are directly accessible at the LHC.
We discuss the possibility of using the observables deduced from the angular distribution of the $B\to D^{(\ast)} \ell\bar{\nu}$ decays to test the effects of lepton flavor universality violation (LFUV). We show that the measurement of even a subset of these observables could be very helpful in distinguishing the Lorentz structure of the New Physics contributions to these decays. To do so we use the low energy effective theory in which besides the Standard Model contribution we add all possible Lorentz structures with the couplings (Wilson coefficients) that are determined by matching theory with the measured ratios $R{(D^{(\ast)})}^\mathrm{exp}$. We argue that even in the situation in which the measured $R{(D^{(\ast)})}^\mathrm{exp}$ becomes fully compatible with the Standard Model, one can still have significant New Physics contributions the size of which could be probed by measuring the observables discussed in this paper and comparing them with their Standard Model predictions.
0.845538
0.780787
0.06475
2004.07881
A Transformation-free Linear Regression for Compositional Outcomes and Predictors
Compositional data are common in many fields, both as outcomes and predictor variables. The inventory of models for the case when both the outcome and predictor variables are compositional is limited and the existing models are difficult to interpret, due to their use of complex log-ratio transformations. We develop a transformation-free linear regression model where the expected value of the compositional outcome is expressed as a single Markov transition from the compositional predictor. Our approach is based on generalized method of moments thereby not requiring complete specification of data likelihood and is robust to different data generating mechanism. Our model is simple to interpret, allows for 0s and 1s in both the compositional outcome and covariates, and subsumes several interesting subcases of interest. We also develop a permutation test for linear independence. Finally, we show that despite its simplicity, our model accurately captures the relationship between compositional data from education and medical research.
Quantile regression relates the quantile of the response to a linear predictor. For a discrete response distributions, like the Poission, Binomial and the negative Binomial, this approach is not feasible as the quantile function is not bijective. We argue to use a continuous model-aware interpolation of the quantile function, allowing for proper quantile inference while retaining model interpretation. This approach allows for proper uncertainty quantification and mitigates the issue of quantile crossing. Our reanalysis of hospitalisation data considered in Congdon (2017) shows the advantages of our proposal as well as introducing a novel method to exploit quantile regression in the context of disease mapping.
0.903185
0.73735
0.165835
2004.07882
Models Genesis
Transfer learning from natural image to medical image has been established as one of the most practical paradigms in deep learning for medical image analysis. To fit this paradigm, however, 3D imaging tasks in the most prominent imaging modalities (e.g., CT and MRI) have to be reformulated and solved in 2D, losing rich 3D anatomical information, thereby inevitably compromising its performance. To overcome this limitation, we have built a set of models, called Generic Autodidactic Models, nicknamed Models Genesis, because they are created ex nihilo (with no manual labeling), self-taught (learnt by self-supervision), and generic (served as source models for generating application-specific target models). Our extensive experiments demonstrate that our Models Genesis significantly outperform learning from scratch in all five target 3D applications covering both segmentation and classification. More importantly, learning a model from scratch simply in 3D may not necessarily yield performance better than transfer learning from ImageNet in 2D, but our Models Genesis consistently top any 2D/2.5D approaches including fine-tuning the models pre-trained from ImageNet as well as fine-tuning the 2D versions of our Models Genesis, confirming the importance of 3D anatomical information and significance of Models Genesis for 3D medical imaging. This performance is attributed to our unified self-supervised learning framework, built on a simple yet powerful observation: the sophisticated and recurrent anatomy in medical images can serve as strong yet free supervision signals for deep models to learn common anatomical representation automatically via self-supervision. As open science, all codes and pre-trained Models Genesis are available at https://github.com/MrGiovanni/ModelsGenesis
The problem of the physical nature and the cosmological constant genesis is discussed. This problem can't be solved in terms of the current quantum field theory which operates with Higgs and nonperturbative vacuum condensates and takes into account the changes of these condensates during relativistic phase transitions. The problem can't be completely solved also in terms of the conventional global quantum theory: Wheeler-DeWitt quantum geometrodynamics does not describe the evolution of the Universe in time (RPT in particular). We have investigated this problem in the context of energies density of different vacuum subsystems characteristic scales of which pervaid all energetic scale of the Universe. At first the phemenological solution of the cosmological constant problem and then the hypothesis about the possible structure of a new global quantum theory are proposed. The main feature of this theory is the irreversible evolution of geometry and vacuum condensates in time in the regime of their selforganization. The transformation of the cosmological constant in dynamical variable is inevitably.
0.73639
0.62701
0.109379
2004.07883
Weak magnetic field corrections to light vector or axial mesons mixings and vector meson dominance
Weak magnetic field induced corrections to effective coupling constants describing light vector mesons mixings and vector meson dominance (VMD) are derived. The magnetic field must be weak with respect to an effective quark mass $M^*$ such that: $eB_0/{M^*}^2< 1$ or $eB_0/{M^*}^2<<1$.For that, a flavor SU(2) quark-quark interaction due to non perturbative one gluon exchange is considered. By means of methods usually applied to the Nambu Jona Lasinio (NJL) and Global Color Models (GCM), leading light vector/axial mesons couplings to a background electromagnetic field are derived. The corresponding effective coupling constants are resolved in the structureless mesons and longwavelength limits. Some of the resulting coupling constants are redefined such as to become magnetic field induced corrections to vector or axial mesons couplings. Due to the approximated chiral symmetry of the model, light axial mesons mixings induced by the magnetic field are also obtained. Some numerical estimates are presented for the coupling constants and for some of the corresponding momentum dependent vertices. The contributions of the induced VMD and vector mesons mixing couplings for the low momentum pion electromagnetic form factor and for the (off shell) charge symmetry violation potential at the constituent quark level are estimated. The relative overall weak magnetic field-induced anisotropic corrections are of the order of $(eB_0/{M^*}^2)^n$, where $n=2$ or $n=1$ respectively.
A generalization of the effective meson Lagrangian possessing the heavy quark symmetry to finite meson masses is employed to study the meson mass dependence of the spectrum of S-- and P wave baryons containing one heavy quark or anti-quark. These baryons are described as respectively heavy mesons or anti-mesons bound in the background of a soliton, which is constructed from light mesons. No further approximation is made to solve the bound state equation. For special cases it is shown that the boundary conditions, which have to be satisfied by the bound state wave--functions and stem from the interaction with the light mesons, may impose additional constraints on the existence of bound states when finite masses are assumed. Two types of models supporting soliton solutions for the light mesons are considered: the Skyrme model of pseudoscalars only as well as an extension containing also light vector mesons. It is shown that only the Skyrme model with vector mesons provides a reasonable description of both light and heavy baryons. Kinematical corrections to the bound state equations are included in the discussion.
0.929117
0.79501
0.134107
2004.07884
No quantum Ramsey theorem for stabilizer codes
In this paper we study the quantum graphs of mixed-unitary channels generated by tensor products of Pauli operators, which we call Pauli channels. We show that most quantum graphs arising from Pauli channels have non-trivial quantum cliques or quantum anticliques which are stabilizer codes. However, a reformulation of Nik Weaver's quantum Ramsey theorem in terms of stabilizer codes and Pauli channels fails. Specifically, for every positive integer $n$, there exists an $n$-qubit Pauli channel for which any non-trivial quantum clique or quantum anticlique fails to be a stabilizer code.
Codeword stabilized (CWS) codes are a general class of quantum codes that includes stabilizer codes and many families of non-additive codes with good parameters. For such a non-additive code correcting all t-qubit errors, we propose an algorithm that employs a single measurement to test all errors located on a given set of t qubits. Compared with exhaustive error screening, this reduces the total number of measurements required for error recovery by a factor of about 3^t.
0.858353
0.837109
0.021244
2004.07885
Photometric Redshifts with the LSST II: The Impact of Near-Infrared and Near-Ultraviolet Photometry
Accurate photometric redshift (photo-$z$) estimates are essential to the cosmological science goals of the Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST). In this work we use simulated photometry for mock galaxy catalogs to explore how LSST photo-$z$ estimates can be improved by the addition of near-infrared (NIR) and/or ultraviolet (UV) photometry from the Euclid, WFIRST, and/or CASTOR space telescopes. Generally, we find that deeper optical photometry can reduce the standard deviation of the photo-$z$ estimates more than adding NIR or UV filters, but that additional filters are the only way to significantly lower the fraction of galaxies with catastrophically under- or over-estimated photo-$z$. For Euclid, we find that the addition of ${JH}$ $5{\sigma}$ photometric detections can reduce the standard deviation for galaxies with $z>1$ ($z>0.3$) by ${\sim}20\%$ (${\sim}10\%$), and the fraction of outliers by ${\sim}40\%$ (${\sim}25\%$). For WFIRST, we show how the addition of deep ${YJHK}$ photometry could reduce the standard deviation by ${\gtrsim}50\%$ at $z>1.5$ and drastically reduce the fraction of outliers to just ${\sim}2\%$ overall. For CASTOR, we find that the addition of its ${UV}$ and $u$-band photometry could reduce the standard deviation by ${\sim}30\%$ and the fraction of outliers by ${\sim}50\%$ for galaxies with $z<0.5$. We also evaluate the photo-$z$ results within sky areas that overlap with both the NIR and UV surveys, and when spectroscopic training sets built from the surveys' small-area deep fields are used.
We present photometric redshifts and spectral energy distribution (SED) classifications for a sample of 1542 optically identified sources detected with XMM in the COSMOS field. Our template fitting classifies 46 sources as stars and 464 as non-active galaxies, while the remaining 1032 require templates with an AGN contribution. High accuracy in the derived photometric redshifts was accomplished as the result of 1) photometry in up to 30 bands with high significance detections, 2) a new set of SED templates including 18 hybrids covering the far-UV to mid-infrared, which have been constructed by the combination of AGN and non-active galaxies templates, and 3) multi-epoch observations that have been used to correct for variability (most important for type 1 AGN). The reliability of the photometric redshifts is evaluated using the sub-sample of 442 sources with measured spectroscopic redshifts. We achieved an accuracy of $\sigma_{\Delta z/(1+z_{spec})} = 0.014$ for i$_{AB}^*<$22.5 ($\sigma_{\Delta z/(1+z_{spec})} \sim0.015$ for i$_{AB}^*<$24.5). The high accuracies were accomplished for both type 2 (where the SED is often dominated by the host galaxy) and type 1 AGN and QSOs out to $z=4.5$. The number of outliers is a large improvement over previous photometric redshift estimates for X-ray selected sources (4.0% and 4.8% outliers for i$_{AB}^*<$22.5 and i$_{AB}^*<$24.5, respectively). We show that the intermediate band photometry is vital to achieving accurate photometric redshifts for AGN, whereas the broad SED coverage provided by mid infrared (Spitzer/IRAC) bands is important to reduce the number of outliers for normal galaxies.
0.871661
0.843839
0.027822
2004.07886
Maximizing Determinants under Matroid Constraints
Given vectors $v_1,\dots,v_n\in\mathbb{R}^d$ and a matroid $M=([n],I)$, we study the problem of finding a basis $S$ of $M$ such that $\det(\sum_{i \in S}v_i v_i^\top)$ is maximized. This problem appears in a diverse set of areas such as experimental design, fair allocation of goods, network design, and machine learning. The current best results include an $e^{2k}$-estimation for any matroid of rank $k$ and a $(1+\epsilon)^d$-approximation for a uniform matroid of rank $k\ge d+\frac d\epsilon$, where the rank $k\ge d$ denotes the desired size of the optimal set. Our main result is a new approximation algorithm with an approximation guarantee that depends only on the dimension $d$ of the vectors and not on the size $k$ of the output set. In particular, we show an $(O(d))^{d}$-estimation and an $(O(d))^{d^3}$-approximation for any matroid, giving a significant improvement over prior work when $k\gg d$. Our result relies on the existence of an optimal solution to a convex programming relaxation for the problem which has sparse support; in particular, no more than $O(d^2)$ variables of the solution have fractional values. The sparsity results rely on the interplay between the first-order optimality conditions for the convex program and matroid theory. We believe that the techniques introduced to show sparsity of optimal solutions to convex programs will be of independent interest. We also give a randomized algorithm that rounds a sparse fractional solution to a feasible integral solution to the original problem. To show the approximation guarantee, we utilize recent works on strongly log-concave polynomials and show new relationships between different convex programs studied for the problem. Finally, we use the estimation algorithm and sparsity results to give an efficient deterministic approximation algorithm with an approximation guarantee that depends solely on the dimension $d$.
The class of quasi-graphic matroids recently introduced by Geelen, Gerards, and Whittle generalises each of the classes of frame matroids and lifted-graphic matroids introduced earlier by Zaslavsky. For each biased graph $(G, \mathcal B)$ Zaslavsky defined a unique lift matroid $L(G, \mathcal B)$ and a unique frame matroid $F(G, \mathcal B)$, each on ground set $E(G)$. We show that in general there may be many quasi-graphic matroids on $E(G)$ and describe them all. We provide cryptomorphic descriptions in terms of subgraphs corresponding to circuits, cocircuits, independent sets, and bases. Equipped with these descriptions, we prove some results about quasi-graphic matroids. In particular, we provide alternate proofs that do not require 3-connectivity of two results of Geelen, Gerards, and Whittle for 3-connected matroids from their introductory paper: namely, that every quasi-graphic matroid linearly representable over a field is either lifted-graphic or frame, and that if a matroid $M$ has a framework with a loop that is not a loop of $M$ then $M$ is either lifted-graphic or frame. We also provide sufficient conditions for a quasi-graphic matroid to have a unique framework. Zaslavsky has asked for those matroids whose independent sets are contained in the collection of independent sets of $F(G, \mathcal B)$ while containing those of $L(G, \mathcal B)$, for some biased graph $(G, \mathcal B)$. Adding a natural (and necessary) non-degeneracy condition defines a class of matroids, which we call biased graphic. We show that the class of biased graphic matroids almost coincides with the class of quasi-graphic matroids: every quasi-graphic matroid is biased graphic, and if $M$ is a biased graphic matroid that is not quasi-graphic then $M$ is a 2-sum of a frame matroid with one or more lifted-graphic matroids.
0.848965
0.74902
0.099945
2004.07887
Smaller $p$-values in genomics studies using distilled historical information
Medical research institutions have generated massive amounts of biological data by genetically profiling hundreds of cancer cell lines. In parallel, academic biology labs have conducted genetic screens on small numbers of cancer cell lines under custom experimental conditions. In order to share information between these two approaches to scientific discovery, this article proposes a "frequentist assisted by Bayes" (FAB) procedure for hypothesis testing that allows historical information from massive genomics datasets to increase the power of hypothesis tests in specialized studies. The exchange of information takes place through a novel probability model for multimodal genomics data, which distills historical information pertaining to cancer cell lines and genes across a wide variety of experimental contexts. If the relevance of the historical information for a given study is high, then the resulting FAB tests can be more powerful than the corresponding classical tests. If the relevance is low, then the FAB tests yield as many discoveries as the classical tests. Simulations and practical investigations demonstrate that the FAB testing procedure can increase the number of effects discovered in genomics studies while still maintaining strict control of type I error and false discovery rates.
Phytophthora infestans, the cause of potato late blight, is infamous for having triggered the Irish Great Famine in the 1840s. Until the late 1970s, P. infestans diversity outside of its Mexican center of origin was low, and one scenario held that a single strain, US-1, had dominated the global population for 150 years; this was later challenged based on DNA analysis of historical herbarium specimens. We have compared the genomes of 11 herbarium and 15 modern strains. We conclude that the nineteenth century epidemic was caused by a unique genotype, HERB-1, that persisted for over 50 years. HERB-1 is distinct from all examined modern strains, but it is a close relative of US-1, which replaced it outside of Mexico in the twentieth century. We propose that HERB-1 and US-1 emerged from a metapopulation that was established in the early 1800s outside of the species' center of diversity.
0.821766
0.707034
0.114732
2004.07888
Experimental observation of magnetic domain wall skyrmions
Topological magnetic excitations called skyrmions exhibit striking spin configurations with deterministic chirality stabilized by the Dzyaloshinskii-Moriya interaction (DMI). These objects come in many forms depending on the symmetry and dimensionality of the system under consideration. Here, for the first time, we experimentally observe a new topological excitation called a magnetic domain wall (DW) skyrmion using Lorentz transmission electron microscopy (LTEM). LTEM contrast matches images simulated from micromagnetic calculations and their expected pinning behavior is observed through \textit{in situ} application of a perpendicular magnetic field. Calculations of the energy barrier to DW skyrmion annihilation using the micromagnetic geodesic nudged elastic band (GNEB) model support this observed metastability of DW skyrmions at room temperature.
We measure and analyze the chirality of the Dzyaloshinskii-Moriya interaction (DMI) stabilized spin textures in multilayers of Ta/Co$_{20}$Fe$_{60}$B$_{20}$/MgO. The effective DMI is measured experimentally using domain wall motion measurements, both in the presence (using spin orbit torques) and absence of driving currents (using magnetic fields). We observe that the current-induced domain wall motion yields a change in effective DMI magnitude and opposite domain wall chirality when compared to field-induced domain wall motion (without current). We explore this effect, which we refer to as current-induced DMI, by providing possible explanations for its emergence, and explore the possibilty of its manifestation in the framework of recent theoretical predictions of DMI modifications due to spin currents.
0.876471
0.781599
0.094873
2004.07889
Optimal control of atmospheric pollution because of urban traffic flow by means of Stackelberg strategies
Two major problems in modern cities are air contamination and road congestion. They are closely related and present a similar origin: traffic flow. To face these problems, local governments impose traffic restrictions to prevent the entry of vehicles into sensitive areas, with the final aim of dropping down air pollution levels. However, these restrictions force drivers to look for alternative routes that usually generate congestions, implying both longer travel times and higher levels of air pollution. In this work, combining optimal control of partial differential equations and computational modelling, we formulate a multi-objective control problem with air pollution and drivers' travel time as objectives and look for its optimal solutions in the sense of Stackelberg. In this problem, local government (the leader) implements traffic restrictions meanwhile the set of drivers (the follower) acts choosing travel preferences against leader constraints. Numerically, the discretized problem is solved by combining genetic-elitist algorithms and interior-point methods, and computational results for a realistic case posed in the Guadalajara Metropolitan Area (Mexico) are shown.
Here we present a ground-breaking new postulate for game theory. The first part of this postulate contains the axiomatic observation that all games are created by a designer, whether they are: e.g., (dynamic/static) or (stationary/non-stationary) or (sequential/one-shot) non-cooperative games, and importantly, whether or not they are intended to represent a non-cooperative Stackelberg game, they can be mapped to a Stackelberg game. I.e., the game designer is the leader who is totally rational and honest, and the followers are mapped to the players of the designed game. If now the game designer, or "the leader" in the Stackelberg context, adopts a pure strategy, we postulate the following second part following from axiomatic observation of ultimate game leadership, where empirical insight leads to the second part of this postulate. Importantly, implementing a non-cooperative Stackelberg game, with a very honest and rational leader results in social optimality for all players (followers), assuming pure strategy across all followers and leader, and that the leader is totally rational, honest, and is able to achieve a minimum amount of competency in leading this game, with any finite number of iterations of leading this finite game.
0.876222
0.650252
0.225969
2004.07890
Coarse entropy
Coarse geometry studies metric spaces on the large scale. Our goal here is to study dynamics from a coarse point of view. To this end we introduce a coarse version of topological entropy, suitable for unbounded metric spaces, consistent with the coarse perspective on such spaces. As is the case with the usual topological entropy, the coarse entropy measures the divergence of orbits. Following Bowen's ideas, we use $(n,\varepsilon)$-separated or $(n,\varepsilon)$-spanning sets. However, we have to let $\varepsilon$ go to infinity rather than to zero.
The $K$-theory of the stable Higson corona of a coarse space carries a canonical ring structure. This ring is the domain of an unreduced version of the coarse co-assembly map of Emerson and Meyer. We show that the target also carries a ring structure and co-assembly is a ring homomorphism, provided that the given coarse space is contractible in a coarse sense.
0.813981
0.668199
0.145782
2004.07891
Degeneracy theorems for meromorphic mappings of a complete K\"{a}hler manifold sharing hyperplanes in a projective space
Let $M$ be a complete K\"{a}hler manifold, whose universal covering is biholomorphic to a ball $\mathbb B^m(R_0)$ in $\mathbb C^m$ ($0<R_0\le +\infty$). In this article, we will show that if three meromorphic mappings $f^1,f^2,f^3$ of $M$ into $\mathbb P^n(\mathbb C)\ (n\ge 2)$ satisfying the condition $(C_\rho)$ and sharing $q\ (q> C+\rho K)$ hyperplanes in general position regardless of multiplicity with certain positive constants $K$ and $C <2n$ (explicitly estimated), then there are some algebraic relation between them. A degeneracy theorem for $k\ (2\le k\le n+1)$ meromorphic mappings sharing hyperplanes is also given. Our result generalize the previous result in the case where the mappings from $\mathbb C^m$ into $\mathbb P^n(\mathbb C)$.
We prove extension results for meromorphic functions by combining the Kohn-Rossi extension theorems with Andreotti's theory on the algebraic and analytic dependence of meromorphic functions on pseudoconcave manifolds. Versions of Kohn-Rossi theorems for pseudoconvex domains are included.
0.924677
0.817607
0.10707
2004.07892
Redshift Horizon for the Origins Space Telescope from Primordial Dust Emission
We explore the possibility of detecting the first galaxies with the next generation Origins Space Telescope (OST) by applying an analytical model of primordial dust emission. By analysing source densities as a function of redshift (z), and considering deep-field exposures with the Origins Survey Spectrometer, we estimate that the redshift horizon for detecting one individual source would be above z~7 for systems with dust-to-metal ratios higher than those expected for typical primeval galaxies. On the other hand, if confusion limits could be overcome, the Far-infrared Imager and Polarimeter would enable the detection of more typical fainter systems at z>7. Given the dependence of the obtained results with the properties of primeval dust, we conclude that the OST could provide important clues to the nature of the interestellar medium in the early Universe.
We have studied the diffuse radiation in the surroundings of M42 using photometric data from the Galaxy Evolution Explorer (GALEX) in the far-ultraviolet (FUV) and infrared observations of the AKARI space telescope. The main source of the FUV diffuse emission is the starlight from the Trapezium stars scattered by dust in front of the nebula. We initially compare the diffuse FUV with the far-infrared (FIR) observations at the same locations. The FUV-IR correlations enable us to determine the type of dust contributing to this emission. We then use an existing model for studying the FUV dust scattering in Orion to check if it can be extended to regions away from the centre in a 10 deg radius. We obtain an albedo, {\alpha} = 0.7 and scattering phase function asymmetry factor, g = 0.6 as the median values for our dust locations on different sides of the central Orion region. We find a uniform value of optical parameters across our sample of locations with the dust properties varying significantly from those at the centre of the nebula.
0.905328
0.750959
0.154369
2004.07893
Variable Length Memory Chains: characterization of stationary probability measures
Variable Length Memory Chains (VLMC), which are generalizations of finite order Markov chains, turn out to be an essential tool to modelize random sequences in many domains, as well as an interesting object in contemporary probability theory. The question of the existence of stationary probability measures leads us to introduce a key combinatorial structure for words produced by a VLMC: the Longest Internal Suffix. This notion allows us to state a necessary and sufficient condition for a general VLMC to admit a unique invariant probability measure. This condition turns out to get a much simpler form for a subclass of VLMC: the stable VLMC. This natural subclass, unlike the general case, enjoys a renewal property. Namely, a stable VLMC induces a semi-Markov chain on an at most countable state space. Unfortunately, this discrete time renewal process does not contain the whole information of the VLMC, preventing the study of a stable VLMC to be reduced to the study of its induced semi-Markov chain. For a subclass of stable VLMC, the convergence in distribution of a VLMC towards its stationary probability measure is established. Finally, finite state space semi-Markov chains turn out to be very special stable VLMC, shedding some new light on their limit distributions.
Lossless variable-length source coding with codeword cost is considered for general sources. The problem setting, where we impose on unequal costs on code symbols, is called the variable-length coding with codeword cost. In this problem, the infimum of average codeword cost have been determined for general sources. On the other hand, overflow probability, which is defined as the probability of codeword cost being above a threshold, have not been considered yet. In this paper, we determine the infimum of achievable threshold in the first-order sense and the second-order sense for general sources and compute it for some special sources such as i.i.d. sources and mixed sources. A relationship between the overflow probability of variable-length coding and the error probability of fixed-length coding is also revealed. Our analysis is based on the information-spectrum methods.
0.873661
0.741345
0.132317
2004.07894
Crystallizations of compact 4-manifolds minimizing combinatorially defined PL-invariants
The present paper is devoted to present a unifying survey about some special classes of crystallizations of compact PL $4$-manifolds with empty or connected boundary, called {\it semi-simple} and {\it weak semi-simple crystallizations}, with a particular attention to their properties of minimizing combinatorially defined PL-invariants, such as the {\it regular genus}, the {\it Gurau degree}, the {\it gem-complexity} and the {\it (gem-induced) trisection genus}. The main theorem, yielding a summarizing result on the topic, is an original contribution. Moreover, in the present paper the additivity of regular genus with respect to connected sum is proved to hold for all compact $4$-manifolds with empty or connected boundary which admit weak semi-simple crystallizations.
Suppose a compact torus $T$ acts on a closed smooth manifold $M$. Under certain conditions, Guillemin and Zara associate to $(M, T)$ a labeled graph $\mG_M$ where the labels lie in $H^2(BT)$. They also define the subring $H_T^*(\mG_M)$ of $\bigoplus_{v\in V(\mG_M)}H^*(BT)$, where $V(\mG_M)$ is the set of vertices of $\mG_M$ and we call $H_T^*(\mG_M)$ the "graph cohomology" ring of $\mG_M$. It is known that the equivariant cohomology ring of $M$ can be described by using combinatorial data of the labeled graph. The main result of this paper is to determine the ring structure of equivariant cohomology ring of a flag manifold of type $G_2$ directly, using combinatorial techniques on the graph $\mG_M$. This gives a new computation of the equivariant cohomology ring of a flag manifold of type $G_2$.
0.884054
0.693469
0.190585
2004.07895
On the Exponential decay for Compressible Navier-Stokes-Korteweg equations with a Drag Term
In this paper, we consider global weak solutions to com-pressible Navier-Stokes-Korteweg equations with density dependent viscosities , in a periodic domain $\Omega = \mathbb T^3$, with a linear drag term with respect to the velocity. The main result concerns the exponential decay to equilibrium of such solutions using log-sobolev type inequalities. In order to show such a result, the starting point is a global weak-entropy solutions definition introduced in D. Bresch, A. Vasseur and C. Yu [arXiv:1905.02701 (2019)]. Assuming extra assumptions on the shear viscosity when the density is close to vacuum and when the density tends to infinity, we conclude the exponential decay to equilibrium. Note that our result covers the quantum Navier-Stokes system with a drag term.
We approximate a two--phase model by the compressible Navier-Stokes equations with a singular pressure term. Up to a subsequence, these solutions are shown to converge to a global weak solution of the compressible system with the congestion constraint studied for instance by P.L. Lions and N. Masmoudi [ Annales I.H.P., 1999]. The paper is an extension of the previous result obtained in one-dimensional setting by D. Bresch et al. [ C. R. Acad. Sciences Paris, 2014] to the multi-dimensional case with heterogeneous barrier for the density.
0.887662
0.837706
0.049956
2004.07896
Generalized Sachs Form Factors and the Possibility of Their Measurement in Processes without and with Proton Spin Flip
The differential cross section for elastic electron proton scattering has been calculated taking into account the two photon exchange within the phenomenological description of the electromagnetic electron proton interactions. The calculation is based on the consistent evaluation of the matrix elements of the proton current in a diagonal spin basis, which makes it possible to naturally obtain expressions for the generalized Sachs form factors. A new method has been proposed to independently measure these form factors in the elastic $e \vec{p} \to e \vec{p}$ process in the case where the initial proton at rest is fully polarized along the direction of the motion of the final proton.
Neutron diffraction measurements have been carried out to investigate the magnetic form factor of the parent SrFe2As2 system of the iron-based superconductors. The general feature is that the form factor is approximately isotropic in wave vector, indicating that multiple d-orbitals of the iron atoms are occupied as expected based on band theory. Inversion of the diffraction data suggests that there is some elongation of the spin density toward the As atoms. We have also extended the diffraction measurements to investigate a possible jump in the c-axis lattice parameter at the structural phase transition, but find no detectable change within the experimental uncertainties.
0.841691
0.680347
0.161344
2004.07897
Intertwined density waves in a metallic nickelate
Nickelates are a rich class of materials, ranging from insulating magnets to superconductors. But for stoichiometric materials, insulating behavior is the norm, as for most late transition metal oxides. Notable exceptions are the 3D perovskite LaNiO$_3$, an unconventional paramagnetic metal, and the layered Ruddlesden-Popper phases R$_4$Ni$_3$O$_{10}$, (R=La, Pr, Nd). The latter are particularly intriguing because they exhibit an unusual metal-to-metal transition. Here, we demonstrate that this transition results from an incommensurate density wave with both charge and magnetic character that lies intermediate in behavior between the metallic density wave seen in chromium metal and the insulating stripes typically found in layered nickelates. As such, R$_4$Ni$_3$O$_{10}$, which appears to be the first known example of an itinerant spin density wave in a 3d transition metal oxide, represents an important bridge between the paramagnetism of 3D metallic LaNiO$_3$ at higher nickel valence and the polaronic behavior of quasi-2D R$_{2-x}$Sr$_x$NiO$_4$ at lower nickel valence.
We discuss the role of striction in the intertwined magnetic and structural phase transitions in the underdoped iron-pnictides. The magneto-elastic coupling to acoustic modes is then derived and estimated in framework of the multiband spectrum for itinerant electrons with nesting features. We argue that the 1-st order character of the magneto-elastic phase transition originates from the lattice instabilities near the onset of spin-density wave order introducing, thus, a shear acoustic mode as a new order parameter. Taking non-harmonic termis in the lattice energy into account may explain the splitting of the structural and magnetic transitions in some oxypnictides. Fluctuations of the magnetic order parameter show up in the precursory temperature dependence of the elastic moduli.
0.822955
0.748489
0.074466
2004.07899
On Local Continuous Solvability of Equations Associated to Elliptic and Canceling Linear Differential Operators
Consider $A(x,D):C^{\infty}(\Omega,E) \rightarrow C^\infty(\Omega,F)$ an elliptic and canceling linear differential operator of order $\nu$ with smooth complex coefficients in $\Omega \subset \mathbb{R}^{N}$ from a finite dimension complex vector space $E$ to a finite dimension complex vector space $F$ and $A^{*}(x,D)$ {its} adjoint. In this work we characterize the (local) continuous solvability of the partial differential equation $A^{*}(x,D)v=f$ (in the distribution sense) for a given distribution $f$; more precisely we show that any $x_0\in\Omega$ is contained in a neighborhood $U\subset \Omega$ in which its continuous solvability is characterized by the following condition on $f$: for every $\epsilon>0$ and any compact set $K \subset \subset U$, there exists $\theta=\theta(K,\epsilon)>0$ such that the following holds for all smooth function $\varphi$ supported in $K$: \begin{equation}\nonumber \left| f(\varphi) \right| \leq \theta\|\varphi\|_{W^{\nu-1,1}} + \epsilon\|A(x,D) \varphi\|_{L^{1}}, \end{equation} where $W^{\nu-1,1}$ stands for the homogenous Sobolev space of all $L^1$ functions whose derivatives of order $\nu-1$ belongs to $L^{1}(U)$. This characterization implies and extends results obtained before for operators associated to elliptic complex of vector fields (see \cite{MP}); we also provide local analogues, for a large range of differential operators, to global results obtained for the classical divergence operator in [4] and [9].
We use lower and upper solutions to investigate the existence of the greatest and the least solutions for quasimonotone systems of measure differential equations. The established results are then used to study the solvability of Stieltjes differential equations; a recent unification of discrete, continuous and impulsive systems. The applicability of our results is illustrated in a simple model for bacteria population.
0.898258
0.773307
0.124951
2004.07900
Identification of a class of index models: A topological approach
We establish nonparametric identification in a class of so-called index models using a novel approach that relies on general topological results. Our proof strategy requires substantially weaker conditions on the functions and distributions characterizing the model compared to existing strategies; in particular, it does not require any large support conditions on the regressors of our model. We apply the general identification result to additive random utility and competing risk models.
A class of two-dimensional topological conformal field theories (TCFTs) is studied within the framework of gauged WZW models in order to gain some insights on the global geometrical nature of TCFTs. The BRST quantizations of topological G/H gauged WZW models (the twisted versions of SUSY gauged WZW models) are given under fixed back-ground gauge fields. The BRST-cohomology of the system is investigated and the correlation functions among these physical observables are considered under the instanton back-grounds. As a consequence, two-dimensional BF gauge theoretical aspects of TCFTs are revealed. Especially it is shown that two correlation functions under the different instanton back-grounds can change to each other. This process of transmutation is described by the spectral flow. The flow is formulated as a "singular" gauge transformation which creates an appropriate back-ground charge on the physical vacuum of the system. The field identification problem of the system is also discussed from the above point of view.
0.881747
0.590361
0.291385
2004.07901
Evidence for variability timescale dependent UV/X-ray delay in Seyfert 1 AGN NGC 7469
Using a month-long X-ray lightcurve from ${\it RXTE}$/PCA and 1.5 month long UV continuum lightcurves from ${\it IUE}$ spectra in 1220$-$1970 $\r{A}$, we performed a detailed time-lag study of the Seyfert 1 galaxy NGC 7469. Our cross-correlation analysis confirms previous results showing that the X-rays are delayed relative to the UV continuum at 1315 $\r{A}$ by 3.49 $\pm$ 0.22 days which is possibly caused by either propagating fluctuation or variable comptonisation. However, if variations slower than 5 days are removed from the X-ray lightcurve, the UV variations then lag behind the X-rays variations by 0.37$\pm$0.14 day, consistent with reprocessing of the X-rays by a surrounding accretion disc. A very similar reverberation delay is observed between ${\it Swift}$/XRT X-ray and ${\it Swift}$/UVOT UVW2, U lightcurves. Continuum lightcurves extracted from the ${\it Swift}$/GRISM spectra show delays with respect to X-rays consistent with reverberation. Separating the UV continuum variations faster and slower than 5 days, the slow variations at 1825 $\r{A}$ lag those at 1315 $\r{A}$ by $0.29\pm0.06$ day, while the fast variations are coincident ($0.04\pm0.12$ day). The UV/optical continuum reverberation lag from ${\it IUE}$, ${\it Swift}$ and other optical telescopes at different wavelengths are consistent with the relationship: $\tau \propto \lambda^{4/3}$, predicted for the standard accretion disc theory while the best-fit X-ray delay from ${\it RXTE}$ and ${\it Swift}$/XRT shows a negative X-ray offset of $\sim$0.38 days from the standard disc delay prediction.
We present initial results from an exploratory X-ray monitoring project of two groups of comparably luminous radio-quiet quasars (RQQs). The first consists of four sources at 4.10 <= z <= 4.35, monitored by Chandra, and the second is a comparison sample of three sources at 1.33 <= z <= 2.74, monitored by Swift. Together with archival X-ray data, the total rest-frame temporal baseline spans ~2-4 yr and ~5-13 yr for the first and second group, respectively. Six of these sources show significant X-ray variability over rest-frame timescales of ~10^2 - 10^3 d; three of these also show significant X-ray variability on rest-frame timescales of ~1-10 d. The X-ray variability properties of our variable sources are similar to those exhibited by nearby and far less luminous active galactic nuclei (AGNs). While we do not directly detect a trend of increasing X-ray variability with redshift, we do confirm previous reports of luminous AGNs exhibiting X-ray variability above that expected from their luminosities, based on simplistic extrapolation from lower luminosity sources. This result may be attributed to luminous sources at the highest redshifts having relatively high accretion rates. Complementary UV-optical monitoring of our sources shows that variations in their optical-X-ray spectral energy distribution are dominated by the X-ray variations. We confirm previous reports of X-ray spectral variations in one of our sources, HS 1700+6416, but do not detect such variations in any of our other sources in spite of X-ray flux variations of up to a factor of ~4. This project is designed to provide a basic assessment of the X-ray variability properties of RQQs at the highest accessible redshifts that will serve as a benchmark for more systematic monitoring of such sources with future X-ray missions.
0.896828
0.787912
0.108916
2004.07902
Active and inactive quarantine in epidemic spreading on adaptive activity-driven networks
We consider an epidemic process on adaptive activity-driven temporal networks, with adaptive behaviour modelled as a change in activity and attractiveness due to infection. By using a mean-field approach, we derive an analytical estimate of the epidemic threshold for SIS and SIR epidemic models for a general adaptive strategy, which strongly depends on the correlations between activity and attractiveness in the susceptible and infected states. We focus on a strong adaptive behaviour, implementing two types of quarantine inspired by recent real case studies: an active quarantine, in which the population compensates the loss of links rewiring the ineffective connections towards non-quarantining nodes, and an inactive quarantine, in which the links with quarantined nodes are not rewired. Both strategies feature the same epidemic threshold but they strongly differ in the dynamics of active phase. We show that the active quarantine is extremely less effective in reducing the impact of the epidemic in the active phase compared to the inactive one, and that in SIR model a late adoption of measures requires inactive quarantine to reach containment.
Motivated with various responses of world governments to COVID-19, here we develop a toy model of the dependence epidemics spreading on the availability of tests for disease. Our model, that we call SUDR+K, is based on usual SIR model, but it splits the total fraction of infected individuals into two components: those that are undetected and those that are detected through tests. Moreover, we assume that available tests increase at a constant rate from the beginning of epidemics but are consumed to detect infected individuals. Strikingly we find a bi-stable behavior between a phase with a giant fraction of infected and a phase with a very small fraction. We show that the separation between these two regimes is governed by a match between the rate of testing and a rate of infection spread at given time. We also show that the existence of two phases does not depend on the mathematical choice of the form of the term describing the rate at which undetected individuals are tested and detected. Presented research implies that a vigorous early testing activity, before the epidemics enters into its giant phase, can potentially keep epidemics under control, and that even a very small change in rate of testing can increase or decrease the size of the whole epidemics of various orders of magnitude. For the real application of realistic model to ongoing epidemics, we would gladly collaborate with field epidemiologists in order to develop quantitative models of testing process.
0.918243
0.741839
0.176404
2004.07903
Divergent Search for Few-Shot Image Classification
When data is unlabelled and the target task is not known a priori, divergent search offers a strategy for learning a wide range of skills. Having such a repertoire allows a system to adapt to new, unforeseen tasks. Unlabelled image data is plentiful, but it is not always known which features will be required for downstream tasks. We propose a method for divergent search in the few-shot image classification setting and evaluate with Omniglot and Mini-ImageNet. This high-dimensional behavior space includes all possible ways of partitioning the data. To manage divergent search in this space, we rely on a meta-learning framework to integrate useful features from diverse tasks into a single model. The final layer of this model is used as an index into the `archive' of all past behaviors. We search for regions in the behavior space that the current archive cannot reach. As expected, divergent search is outperformed by models with a strong bias toward the evaluation tasks. But it is able to match and sometimes exceed the performance of models that have a weak bias toward the target task or none at all. This demonstrates that divergent search is a viable approach, even in high-dimensional behavior spaces.
Prevailing deep convolutional neural networks (CNNs) for person re-IDentification (reID) are usually built upon ResNet or VGG backbones, which were originally designed for classification. Because reID is different from classification, the architecture should be modified accordingly. We propose to automatically search for a CNN architecture that is specifically suitable for the reID task. There are three aspects to be tackled. First, body structural information plays an important role in reID but it is not encoded in backbones. Second, Neural Architecture Search (NAS) automates the process of architecture design without human effort, but no existing NAS methods incorporate the structure information of input images. Third, reID is essentially a retrieval task but current NAS algorithms are merely designed for classification. To solve these problems, we propose a retrieval-based search algorithm over a specifically designed reID search space, named Auto-ReID. Our Auto-ReID enables the automated approach to find an efficient and effective CNN architecture for reID. Extensive experiments demonstrate that the searched architecture achieves state-of-the-art performance while reducing 50% parameters and 53% FLOPs compared to others.
0.848147
0.732058
0.11609
2004.07904
About the unification types of the modal logics determined by classes of deterministic frames
The unification problem in a propositional logic is to determine, given a formula F, whether there exists a substitution s such that s(F) is in that logic. In that case, s is a unifier of F. When a unifiable formula has minimal complete sets of unifiers, the formula is either infinitary, finitary, or unitary, depending on the cardinality of its minimal complete sets of unifiers. In this paper, we study the unification types of some modal logics determined by classes of deterministic frames.
In 1933, G\"odel introduced a provability interpretation of the propositional intuitionistic logic to establish a formalization for the BHK interpretation. He used the modal system, $\mathbf{S4}$, as a formalization of the intuitive concept of provability and then translated $\mathbf{IPC}$ to $\mathbf{S4}$. His work suggested the problem to find a concrete provability interpretation of the modal logic $\mathbf{S4}$. In this paper, we will try to answer this problem. In fact, we will generalize Solovay's provability interpretation of the modal logic $\mathbf{GL}$ to capture other modal logics such as $\mathbf{K4}$, $\mathbf{KD4}$ and $\mathbf{S4}$. Then we will use these results to find a formalization for the BHK interpretation and we will show that with different interpretations of the BHK interpretation, we can capture some of the propositional logics such as Intuitionistic logic, minimal logic and Visser-Ruitenburg's basic logic. Moreover, we will show that there is no provability interpretation for any extension of $\mathbf{KD45}$ and also there is no BHK interpretation for the classical propositional logic.
0.919299
0.793399
0.1259
2004.07905
Capturing Subdiffusive Solute Dynamics and Predicting Selectivity in Nanoscale Pores with Time Series Modeling
Mathematically modeling complex transport phenomena at the molecular level can be a powerful tool for identifying transport mechanisms and predicting macroscopic properties. We use two different stochastic time series models, parameterized from long molecular dynamics (MD) simulation trajectories of a cross-linked H$_{II}$ phase lyotropic liquid crystal (LLC) membrane, in order to predict solute mean squared displacements (MSDs) and solute flux, and thus solute selectivity, in macroscopic length pores. First, using anomalous diffusion theory, we show how solute dynamics can be modeled as a fractional diffusion process subordinate to a continuous time random walk. From the MD simulations, we parameterize the distribution of dwell times, hop lengths between dwells and correlation between hops. We explore two variations of the anomalous diffusion modeling approach. The first applies a single set of parameters to the solute displacements and the second applies two sets of parameters based on the solute's radial distance from the closest pore center. Next, we generalize Markov state models, treating the configurational states of the system as a Markov process where each state has distinct transport properties. For each state and transition between states, we parameterize the distribution and temporal correlation structure of positional fluctuations as a means of characterization and to allow us to predict solute MSDs. Qualitative differences between MD and Markov state dependent model-generated trajectories may limit its usefulness. Finally, we demonstrate how one can use these models to estimate flux of a solute across a macroscopic-length pore and, based on those quantities, the membrane's selectivity towards each solute. This work helps to connect microscopic chemically-dependent solute motions that do not follow simple diffusive behavior with macroscopic membrane performance.
In this work, we propose a novel probabilistic sequence model that excels at capturing high variability in time series data, both across sequences and within an individual sequence. Our method uses temporal latent variables to capture information about the underlying data pattern and dynamically decodes the latent information into modifications of weights of the base decoder and recurrent model. The efficacy of the proposed method is demonstrated on a range of synthetic and real-world sequential data that exhibit large scale variations, regime shifts, and complex dynamics.
0.858773
0.679692
0.179081
2004.07906
Development and Interpretation of a Neural Network-Based Synthetic Radar Reflectivity Estimator Using GOES-R Satellite Observations
The objective of this research is to develop techniques for assimilating GOES-R Series observations in precipitating scenes for the purpose of improving short-term convective-scale forecasts of high impact weather hazards. Whereas one approach is radiance assimilation, the information content of GOES-R radiances from its Advanced Baseline Imager (ABI) saturates in precipitating scenes, and radiance assimilation does not make use of lightning observations from the GOES Lightning Mapper (GLM). Here, a convolutional neural network (CNN) is developed to transform GOES-R radiances and lightning into synthetic radar reflectivity fields to make use of existing radar assimilation techniques. We find that the ability of CNNs to utilize spatial context is essential for this application and offers breakthrough improvement in skill compared to traditional pixel-by-pixel based approaches. To understand the improved performance, we use a novel analysis methodology that combines several techniques, each providing different insights into the network's reasoning. Channel withholding experiments and spatial information withholding experiments are used to show that the CNN achieves skill at high reflectivity values from the information content in radiance gradients and the presence of lightning. The attribution method, layer-wise relevance propagation, demonstrates that the CNN uses radiance and lightning information synergistically, where lightning helps the CNN focus on which neighboring locations are most important. Synthetic inputs are used to quantify the sensitivity to radiance gradients, showing that sharper gradients produce a stronger response in predicted reflectivity. Finally, geostationary lightning observations are found to be uniquely valuable for their ability to pinpoint locations of strong radar echoes.
Predicting the time to build software is a very complex task for software engineering managers. There are complex factors that can directly interfere with the productivity of the development team. Factors directly related to the complexity of the system to be developed drastically change the time necessary for the completion of the works with the software factories. This work proposes the use of a hybrid system based on artificial neural networks and fuzzy systems to assist in the construction of an expert system based on rules to support in the prediction of hours destined to the development of software according to the complexity of the elements present in the same. The set of fuzzy rules obtained by the system helps the management and control of software development by providing a base of interpretable estimates based on fuzzy rules. The model was submitted to tests on a real database, and its results were promissory in the construction of an aid mechanism in the predictability of the software construction.
0.786286
0.564415
0.221872
2004.07907
Supermassive black holes as possible sources of ultra high energy cosmic rays
Production and acceleration mechanisms of ultra-high-energy cosmic rays (UHECRs) of energy $>10^{20}$eV, clearly beyond the GZK-cutoff limit remain unclear that points to exotic nature of the phenomena. Recent observations of extragalactic neutrino may indicate the source of UHECRs being an extragalactic supermassive black hole (SMBH). We demonstrate that ultra-efficient energy extraction from rotating SMBH driven by the magnetic Penrose process (MPP) could indeed foot the bill. We envision ionization of neutral particles, such as neutron beta-decay, skirting close to the black hole horizon that energizes protons to over $10^{20}$eV for SMBH of mass $10^9 M_{\odot}$ and magnetic field of strength $10^4$G. Applied to Galactic center SMBH we have proton energy of order $\approx 10^{15.6}$eV that coincides with the knee of the cosmic ray spectra. We show that large $\gamma_z$ factors of high-energy particles along the escaping directions occur only in the presence of induced charge of the black hole that is known as the Wald charge in the case of uniform magnetic field. It is remarkable that the process neither requires extended acceleration zone, nor fine-tuning of accreting matter parameters. Further, this leads to certain verifiable constraints on SMBH's mass and magnetic field strength as UHECRs sources. This clearly makes ultra-efficient regime of MPP one of the most promising mechanisms for fueling UHECRs powerhouse.
The cosmic ray spectrum has been shown to extend well beyond 10^20 eV. With nearly 20 events observed in the last 40 years, it is now established that particles are accelerated or produced in the universe with energy near 10^21 eV. In all production models neutrinos and photons are part of the cosmic ray flux. In acceleration models (bottom-up models), they are produced as secondaries of the possible interactions of the accelerated charged particle, in direct production models (top-down models) they are a dominant fraction of the decay chain. In addition, hadrons above the GZK threshold energy will also produce, along their path in the Universe, neutrinos and photons as secondaries of the pion photo-production processes. Therefore, photons and in particular neutrinos, are very distinctive signatures of the nature and distribution of the potential sources of ultra high energy cosmic rays. In the following we expose the identification capabilities of the Auger observatories. In the hypothesis of nu_mu-->nu_tau oscillations with full mixing, special emphasis is placed on the observation of tau neutrinos, with which Auger is able to establish the GZK cutoff as well as to provide a strong and model independant constraint on the top-down sources of ultra high energy cosmic rays.
0.875507
0.792921
0.082585
2004.07908
The hydrogen Balmer lines and jump in absorption in accretion disc modeling -- an ultraviolet-optical spectral analysis of the dwarf novae UZ Serpentis and CY Lyrae
The spectra of disc-dominated cataclysmic variables (CVs) often deviate from the spectra of accretion disc models; in particular, the Balmer jump and absorption lines are found to be shallower in the observations than in the models. We carried out a combined ultraviolet-optical spectral analysis of two dwarf novae: UZ Ser in outburst, decline, and quiescence, and CY Lyr on the rise to outburst and in outburst. We fit the Balmer jump and absorption lines, the continuum flux level and slope by adjusting the accretion rate, inclination, and disc outer radius. For both systems we find an accretion rate $\dot{M} \approx 8 \times 10^{-9}M_\odot$/yr in outburst, and $\dot{M} \approx 2-3 \times 10^{-9}M_\odot$/yr for the rise and decline phases. The outer disc radius we derive is smaller than expected ($R_{\rm disc} \approx 0.2a$, where $a$ is the binary separation), except during late rise (for CY Lyr) where $R_{\rm disc}=0.3a$. UZ Ser also reveals a 60,000~K white dwarf. These results show that during a dwarf nova cycle the radius of the disc is the largest just before the peak of the outburst, in qualitative agreement with the disc instability model for dwarf nova outbursts. We suspect that an additional emitting component (e.g. disc wind) is also at work to reduce the slope of the continuum and size of the Balmer jump and absorption lines. We stress that both the outer disc radius and disc wind need to be taken into account for more realistic disc modeling of CVs.
We study the stability of disc accretion in the recurrent nova RS Ophiuchi. We construct a one-dimensional time-dependent model of the binary-disc system, which includes viscous heating and radiative cooling and a self-consistent treatment of the binary potential. We find that the extended accretion disc in this system is always unstable to the thermal-viscous instability, and undergoes repeated disc outbursts on ~10-20yr time-scales. This is similar to the recurrence time-scale of observed outbursts in the RS Oph system, but we show that the disc's accretion luminosity during outburst is insufficient to explain the observed outbursts. We explore a range of models, and find that in most cases the accretion rate during outbursts reaches or exceeds the critical accretion rate for stable nuclear burning on the white dwarf surface. Consequently we suggest that a surface nuclear burning triggered by disc instability may be responsible for the observed outbursts. This allows the white dwarf mass to grow over time, and we suggest that disc instability in RS Oph and similar systems may represent a path to Type Ia supernovae.
0.902716
0.790981
0.111734
2004.07909
Broken SU(6) symmetry and massive hybrid stars
In this work we revisit the quantum hadrodynamics (QHD) formalism to investigate hyperonic and hybrid stars with hyperon-meson couplings fixed via broken SU(6) group, in favor of a more general flavor group SU(3). This allows us to restrict a large number of free parameters to only one - the $\alpha_v$ - for the vector mesons, while the scalar meson can be constrained by the hyperon potential depth. We also employ an additional channel, the strangeness-hidden $\phi$ meson, which couples only to the hyperons and has a crucial role in the description of massive neutron stars. In hybrid stars, the quark phase is built with the SU(3) NJL model also with an additional vector channel in the Lagrangian, which enters as a free parameter within the limit imposed by the lattice QCD. We are able to reproduce 2.21 $M_\odot$ hyperonic star and 2.10 $M_\odot$ hybrid star. Both results are in agreement with the recently detected hyper massive pulsar MSP J0740+6620. With the models used in the present work, the minimum and the maximum masses of a hybrid star are very close to each other, indicating that if they exist, they are probably very rare in the universe.
We show that a flavour symmetry a la Froggatt-Nielsen can be naturally incorporated in models with gauge-Higgs unification, by exploiting the heavy fermions that are anyhow needed to realize realistic Yukawa couplings. The case of the minimal five-dimensional model, in which the SU(2)_L x U(1)_Y electroweak group is enlarged to an SU(3)_W group, and then broken to U(1)_em by the combination of an orbifold projection and a Scherk-Schwarz twist, is studied in detail. We show that the minimal way of incorporating a U(1)_F flavour symmetry is to enlarge it to an SU(2)_F group, which is then completely broken by the same orbifold projection and Scherk-Schwarz twist. The general features of this construction, where ordinary fermions live on the branes defined by the orbifold fixed-points and messenger fermions live in the bulk, are compared to those of ordinary four-dimensional flavour models, and some explicit examples are constructed.
0.833151
0.737711
0.09544
2004.07911
A Deep Reinforcement Learning Approach for Dynamic Contents Caching in HetNets
The recent development in Internet of Things necessitates caching of dynamic contents, where new versions of contents become available around-the-clock and thus timely update is required to ensure their relevance. The age of information (AoI) is a performance metric that evaluates the freshness of contents. Existing works on AoI-optimization of cache content update algorithms focus on minimizing the long-term average AoI of all cached contents. Sometimes user requests that need to be served in the future are known in advance and can be stored in user request queues. In this paper, we propose dynamic cache content update scheduling algorithms that exploit the user request queues. We consider a special use case where the trained neural networks (NNs) from deep learning models are being cached in a heterogeneous network. A queue-aware cache content update scheduling algorithm based on Markov decision process (MDP) is developed to minimize the average AoI of the NNs delivered to the users plus the cost related to content updating. By using deep reinforcement learning (DRL), we propose a low complexity suboptimal scheduling algorithm. Simulation results show that, under the same update frequency, our proposed algorithms outperform the periodic cache content update scheme and reduce the average AoI by up to 35%.
In device-to-device (D2D)-enabled caching cellular networks, the user terminals (UTs) collaboratively store and share a large volume of popular contents from the base station (BS) for traffic offloading and delivery delay reduction. In this article, the multi-winner auction based caching placement in D2D-enabled caching cellular networks is investigated for UT edge caching incentive and content caching redundancy reduction. Firstly, a multi-winner once auction for UT edge caching is modeled which auctions multiple contents for multiple UTs. Then the optimization problem for content caching revenue maximization is formulated. Specifically, the "cache conflict" restriction relationship among UTs is used as one of the constraints in the problem to reduce the content caching redundancy in a UT movement scenario. The problem is solved by semidefinite programming (SDP) relaxation to obtain an approximate optimal caching placement. Moreover, the payment strategy of the auction is developed as a Nash bargaining game for personal profit fairness among the UTs who win the auction for content caching. Subsequently, a multi-winner once auction based caching (MOAC) placement algorithm is proposed. In addition, due to the high complexity of MOAC, we further propose a heuristic multi-winner repeated auction based caching placement (MRAC) algorithm, which can greatly reduce the complexity with only tiny performance loss. Simulation results show that the proposed algorithms can reduce the traffic load and average content access delay effectively compared with the existing caching placement algorithms.
0.834933
0.744975
0.089958
2004.07912
Uniformly branching trees
A quasiconformal tree $T$ is a (compact) metric tree that is doubling and of bounded turning. We call $T$ trivalent if every branch point of $T$ has exactly three branches. If the set of branch points is uniformly relatively separated and uniformly relatively dense, we say that $T$ is uniformly branching. We prove that a metric space $T$ is quasisymmetrically equivalent to the continuum self-similar tree if and only if it is a trivalent quasiconformal tree that is uniformly branching. In particular, any two trees of this type are quasisymmetrically equivalent.
Given a directed graph $G=(V,A)$, the Directed Maximum Leaf Spanning Tree problem asks to compute a directed spanning tree (i.e., an out-branching) with as many leaves as possible. By designing a Branch-and-Reduced algorithm combined with the Measure & Conquer technique for running time analysis, we show that the problem can be solved in time $\Oh^*(1.9043^n)$ using polynomial space. Hitherto, there have been only few examples. Provided exponential space this run time upper bound can be lowered to $\Oh^*(1.8139^n)$.
0.804411
0.7704
0.034011
2004.07913
Optical validation and characterisation of Planck PSZ1 sources at the Canary Islands observatories. II. Second year of ITP13 observations
We report new galaxy clusters previously unknown included in the PSZ1 catalogue. The results here presented have been achieved during the second year of a 2-year observational programme, the ITP13, developed at the Roque de los Muchachos Observatory (La Palma, Spain). We characterise 75 SZ sources with low SZ significance, SZ S/N$<5.32$ by performing deep optical imaging and spectroscopy in order to associate actual galaxy clusters to the SZ Planck source. We adopt robust criteria, based on the 2D-spatial distribution, richness and velocity dispersions to confirm actual optical counterparts up to $z<0.85$. At the end of the ITP13 observational programme, we study 256 SZ sources with $Dec \geq -15^{\circ}$ (212 of them completely unknown), finding optical counterparts for 152 SZ sources. The ITP13 validation programme has allowed us to update the PSZ1 purity, which is now more refined, increasing from 72\% to 83\% in the low SZ S/N regime. Our results are consistent with the predicted purity curve for the full PSZ1 catalogue and with the expected fraction of false detections caused by the non-Gaussian noise of foreground signals. Indeed, we find a strong correlation between the number of unconfirmed sources and the thermal emission of diffuse galactic dust at 857 GHz, thus increasing the fraction of false Planck SZ detections at low galactic latitudes.
The Joint European X-ray Telescope (JET-X) was the core instrument of the Russian Spectrum-X-gamma space observatory. It consisted of two identical soft X-ray (0.3 - 10 keV) telescopes with focusing optical modules having a measured angular resolution of nearly 15 arcsec. Soon after the payload completion, the mission was cancelled and the two optical flight modules (FM) were brought to the Brera Astronomical Observatory where they had been manufactured. After 16 years of storage, we have utilized the JET-X FM2 to test at the PANTER X-ray facility a prototype of a novel X-ray polarimetric telescope, using a Gas Pixel Detector (GPD) with polarimetric capabilities in the focal plane of the FM2. The GPD was developed by a collaboration between INFN-Pisa and INAF-IAPS. In the first phase of the test campaign, we have re-tested the FM2 at PANTER to have an up-to-date characterization in terms of angular resolution and effective area, while in the second part of the test the GPD has been placed in the focal plane of the FM2. In this paper we report the results of the tests of the sole FM2, using an unpolarized X-ray source, comparing the results with the calibration done in 1996.
0.84603
0.694271
0.15176
2004.07914
High-resolution VLA Imaging of Obscured Quasars: Young Radio Jets Caught in a Dense ISM
We present new sub-arcsecond-resolution Karl G. Jansky Very Large Array (VLA) imaging at 10 GHz of 155 ultra-luminous ($L_{\rm bol}\sim10^{11.7-14.2} L_\odot$) and heavily obscured quasars with redshifts $z \sim0.4-3$. The sample was selected to have extremely red mid-infrared (MIR)-optical color ratios based on data from Wide-Field Infrared Survey Explorer (WISE) along with a detection of bright, unresolved radio emission from the NRAO VLA Sky Survey (NVSS) or Faint Images of the Radio Sky at Twenty-Centimeters (FIRST) Survey. Our high-resolution VLA observations have revealed that the majority of the sources in our sample (93 out of 155) are compact on angular scales $<0.2^{\prime \prime}$ ($\leq 1.7$ kpc at $z \sim2$). The radio luminosities, linear extents, and lobe pressures of our sources are similar to young radio active galactic nuclei (AGN; e.g., Gigahertz Peaked Spectrum, GPS, and Compact Steep Spectrum, CSS, sources), but their space density is considerably lower. Application of a simple adiabatic lobe expansion model suggests relatively young dynamical ages ($\sim10^{4-7}$ years), relatively high ambient ISM densities ($\sim1-10^4$ cm$^{-3}$), and modest lobe expansion speeds ($\sim30-10,000$ km s$^{-1}$). Thus, we find our sources to be consistent with a population of newly triggered, young jets caught in a unique evolutionary stage in which they still reside within the dense gas reservoirs of their hosts. Based on their radio luminosity function and dynamical ages, we estimate only $\sim20\%$ of classical large scale FRI/II radio galaxies could have evolved directly from these objects. We speculate that the WISE-NVSS sources might first become GPS or CSS sources, of which some might ultimately evolve into larger radio galaxies.
We report on two programs to address differential evolution between the radio-loud and radio-quiet quasar populations at high (z>4) redshift. Both programs entail studying the radio properties of optically-selected quasars. First, we have observed 32 optically-selected, high-redshift (z>4) quasars with the VLA at 6 cm (5 GHz). These sources comprise a statistically complete and well-understood sample. We detect four quasars above our 3-sigma limit of ~0.15 mJy, which is sufficiently sensitive to detect all radio-loud quasars at the probed redshift range. Second, we have correlated 134 z>4 quasars, comprising all such sources that we are aware of as of mid-1999, with FIRST and NVSS. These two recent 1.4 GHz VLA sky surveys reach 3-sigma limits of approximately 0.6 mJy and 1.4 mJy respectively. We identify a total of 15 z>4 quasars, of which six were not previously known to be radio-loud. The depth of these surveys does not reach the radio-loud/radio-quiet demarcation luminosity density (L(1.4 GHz) = 10^32.5 h(50)^(-2) ergs/s/Hz) at the redshift range considered; this correlation therefore only provides a lower limit to the radio-loud fraction of quasars at high-redshift. The two programs together identify eight new radio-loud quasars at z>4, a significant increase over the seven currently in the published literature. We find no evidence for radio-loud fraction depending on optical luminosity for -25 > M_B > -28 at z~2, or for -26>M_B>-28 at z>4. Our results also show no evolution in the radio-loud fraction between z~2 and z>4 (-26>M_B>-28).
0.854462
0.801858
0.052604
2004.07915
Temporal Plasmonics: Fano and Rabi resonances in the time domain in metal nanostructures
The Fano and Rabi models represent remarkably common effects in optics. Here we study the coherent time dynamics of plasmonic systems exhibiting Fano and Rabi resonances. We demonstrate that these systems show fundamentally different dynamics. A system with a Fano resonance displays at most one temporal beat under pulsed excitation, whereas a system in the Rabi regime may have any number of beats. Remarkably, the Fano-like systems show time dynamics with very characteristic coherent tails despite the strong decoherence that is intrinsic for such systems. The coherent Fano and Rabi dynamics that we predicted can be observed in plasmonic nanocrystal dimers in time-resolved experiments. Our study demonstrates that such coherent temporal plasmonics includes nontrivial and characteristic relaxation behaviors and presents an interesting direction to develop with further research.
Fano resonance with a special ultra-sharp, asymmetric line shape and high quality factor Q, is a wide spread resonance has a large variety of optical, plasmonic and microwave applications. In this paper, we explore the characteristic robustness of the Fano resonance mode which is topologically protected by the band inversion induced by breaking the mirror symmetry of a two-dimensional honeycomb photonic crystal (HPC) associated with C_6 point group symmetry. So, the dark and bright topological edge modes have been appeared in the complete band gap made by opening of the Dirac cone. Destructive and constructive interaction of the dark and bright modes leads to the asymmetric line shape of the Fano resonance wave. Fano resonance mode which is so sensitive to the environmental and geometrical perturbations, can be applied for designing proficient sensors. Here we demonstrate that the topological Fano resonance mode preserves its asymmetric, ultra-sharp line shape during the disorders, defects and cavities, makes a platform for wave based experimental applications such as low threshold lasers, and extremely precise interferometers.
0.912628
0.759983
0.152645
2004.07916
The relativistic galaxy number counts in the weak field approximation
We present a novel approach to compute systematically the relativistic projection effects at any order in perturbation theory within the weak field approximation. In this derivation the galaxy number counts is written completely in terms of the redshift perturbation. The relativistic effects break the symmetry along the line-of-sight and they source, contrarily to the standard perturbation theory, the odd multipoles of the matter power spectrum or 2-point correlation function, providing a unique signature for their detection in Large Scale Structure surveys. We show that our approach agrees with previous derivations (up to third order) of relativistic effects and, for the first time, we derive a model for the transverse Doppler effect. Moreover, we proof that in the Newtonian limit this approach is consistent with standard perturbation theory at any order.
This work discusses the possible empirical verification of the geometrical concept of homogeneity of the standard relativistic cosmology considering its various definitions of distance. We study the physical consequences of the distinction between the usual concept of spatial homogeneity (SH), as defined by the Cosmological Principle, and the concept of observational homogeneity (OH), arguing that OH is in principle falsifiable by means of astronomical observations, whereas verifying SH is only possible indirectly. Simulated counts of cosmological sources are produced by means of a generalized number-distance expression that can be specialized to produce either the counts of the Einstein-de Sitter (EdS) cosmology, which has SH by construction, or other types of counts, which do, or do not, have OH by construction. Expressions for observational volumes and differential densities are derived with the various cosmological distance definitions in the EdS model. Simulated counts that have OH by construction do not always exhibit SH features. The reverse situation is also true. Besides, simulated counts with no OH features at low redshift start showing OH characteristics at high redshift. The comoving distance seems to be the only distance definition where both SH and OH appear simultaneously. The results show that observations indicating possible lack of OH do not necessarily falsify the standard Friedmannian cosmology, meaning that this cosmology will not necessarily always produce observable homogeneous densities. The general conclusion is that the use of different cosmological distances in the characterization of the galaxy distribution lead to significant ambiguities in reaching conclusions about the behavior of the large-scale galaxy distribution in the Universe.
0.855656
0.800649
0.055007
2004.07917
Knowledge Scientists: Unlocking the data-driven organization
Organizations across all sectors are increasingly undergoing deep transformation and restructuring towards data-driven operations. The central role of data highlights the need for reliable and clean data. Unreliable, erroneous, and incomplete data lead to critical bottlenecks in processing pipelines and, ultimately, service failures, which are disastrous for the competitive performance of the organization. Given its central importance, those organizations which recognize and react to the need for reliable data will have the advantage in the coming decade. We argue that the technologies for reliable data are driven by distinct concerns and expertise which complement those of the data scientist and the data engineer. Those organizations which identify the central importance of meaningful, explainable, reproducible, and maintainable data will be at the forefront of the democratization of reliable data. We call the new role which must be developed to fill this critical need the Knowledge Scientist. The organizational structures, tools, methodologies and techniques to support and make possible the work of knowledge scientists are still in their infancy. As organizations not only use data but increasingly rely on data, it is time to empower the people who are central to this transformation.
Recommending personalized learning materials for online language learning is challenging because we typically lack data about the student's ability and the relative difficulty of learning materials. This makes it hard to recommend appropriate content that matches the student's prior knowledge. In this paper, we propose a refined hierarchical knowledge structure to model vocabulary knowledge, which enables us to automatically organize the authentic and up-to-date learning materials collected from the internet. Based on this knowledge structure, we then introduce a hybrid approach to recommend learning materials that adapts to a student's language level. We evaluate our work with an online Japanese learning tool and the results suggest adding adaptivity into material recommendation significantly increases student engagement.
0.84351
0.669259
0.174251
2004.07918
An upper bound for the $k$-power domination number in $r$-uniform hypergraphs
The generalization of power domination, $k$-power domination, is a graph parameter denoted $\gamma_p^k$. The study of power domination was introduced to study electric power grids. Chang and Roussel introduced $k$-power domination in hypergraphs and conjectured the upper bound for the $k$-power domination number for $r$-uniform hypergraphs on $n$ vertices was $\frac{n}{r+k}$. This upper bound was shown to be true for simple graphs ($r=2$) and it was further conjectured that only a family of hypergraphs, known as the squid hypergraphs attained this upper bound. In this paper, the conjecture is proven to hold for hypergraphs with $r=3$ or $4$; but is shown to be false, by a counterexample, for $r\geq 7$. A new upper bound is also proven for $r\geq 3$.
For a graph $F$, a hypergraph $\mathcal{H}$ is a Berge copy of $F$ (or a Berge-$F$ in short), if there is a bijection $f : E(F) \rightarrow E(\mathcal{H})$ such that for each $e \in E(F)$ we have $e \subset f(e)$. A hypergraph is Berge-$F$-free if it does not contain a Berge copy of $F$. We denote the maximum number of hyperedges in an $n$-vertex $r$-uniform Berge-$F$-free hypergraph by $\mathrm{ex}_r(n,\textrm{Berge-}F).$ In this paper we prove two general lemmas concerning the maximum size of a Berge-$F$-free hypergraph and use them to establish new results and improve several old results. In particular, we give bounds on $\mathrm{ex}_r(n,\textrm{Berge-}F)$ when $F$ is a path (reproving a result of Gy\H{o}ri, Katona and Lemons), a cycle (extending a result of F\"uredi and \"Ozkahya), a theta graph (improving a result of He and Tait), or a $K_{2,t}$ (extending a result of Gerbner, Methuku and Vizer). We also establish new bounds when $F$ is a clique (which implies extensions of results by Maherani and Shahsiah and by Gy\'arf\'as) and when $F$ is a general tree.
0.931565
0.803406
0.128159
2004.07919
Enhancing Deep Neural Networks Against Adversarial Malware Examples
Machine learning based malware detection is known to be vulnerable to adversarial evasion attacks. The state-of-the-art is that there are no effective countermeasures against these attacks. Inspired by the AICS'2019 Challenge organized by the MIT Lincoln Lab, we systematize a number of principles for enhancing the robustness of neural networks against adversarial malware evasion attacks. Some of these principles have been scattered in the literature, but others are proposed in this paper for the first time. Under the guidance of these principles, we propose a framework for defending against adversarial malware evasion attacks. We validated the framework using the Drebin dataset of Android malware. We applied the defense framework to the AICS'2019 Challenge and won, without knowing how the organizers generated the adversarial examples. However, we see a ~22\% difference between the accuracy in the experiment with the Drebin dataset (for binary classification) and the accuracy in the experiment with respect to the AICS'2019 Challenge (for multiclass classification). We attribute this gap to a fundamental barrier that without knowing the attacker's manipulation set, the defender cannot do effective Adversarial Training.
Adversarial examples are slight perturbations that are designed to fool artificial neural networks when fed as an input. In this work the usability of the Fisher information for the detection of such adversarial attacks is studied. We discuss various quantities whose computation scales well with the network size, study their behavior on adversarial examples and show how they can highlight the importance of single input neurons, thereby providing a visual tool for further analyzing (un-)reasonable behavior of a neural network. The potential of our methods is demonstrated by applications to the MNIST, CIFAR10 and Fruits-360 datasets.
0.854087
0.816793
0.037294
2004.07921
A Two-Stage Service Restoration Method for Electric Power Distribution Systems
Improving the reliability of power distribution systems is critically important for both utilities and customers. This calls for an efficient service restoration module within a distribution management system to support the implementation of self-healing smart grid networks. The emerging smart grid technologies, including distributed generators (DGs) and remote-controlled switches, although enhance the self-healing capability and allow faster recovery, pose additional complexity to the service restoration problem, especially under cold load pickup (CLPU) conditions. In this paper, we propose a novel two-stage restoration framework to generate restoration solutions with a sequence of control actions. The first stage generates a restoration plan that supports both the traditional service restoration using feeder reconfiguration and the grid-forming DG-assisted intentional islanding methods. The second stage generates an optimal sequence of switching operations to bring the outaged system quickly to the final restored configuration. The problem is formulated as a mixed-integer linear program that incorporates system connectivity, operating constraints, and CLPU models. It is demonstrated using a multi-feeder test case that the proposed framework is effective in utilizing all available resources to quickly restore the service and generates an optimal sequence of switching actions to be used by the operator to reach the desired optimal configuration.
A key objective of the smart grid is to improve reliability of utility services to end users. This requires strengthening resilience of distribution networks that lie at the edge of the grid. However, distribution networks are exposed to external disturbances such as hurricanes and snow storms where electricity service to customers is disrupted repeatedly. External disturbances cause large-scale power failures that are neither well-understood, nor formulated rigorously, nor studied systematically. This work studies resilience of power distribution networks to large-scale disturbances in three aspects. First, a non-stationary random process is derived to characterize an entire life cycle of large-scale failure and recovery. Second, resilience is defined based on the non-stationary random process. Close form analytical expressions are derived under specific large-scale failure scenarios. Third, the non-stationary model and the resilience metric are applied to a real life example of large-scale disruptions due to Hurricane Ike. Real data on large-scale failures from an operational network is used to learn time-varying model parameters and resilience metrics.
0.860504
0.763572
0.096932
2004.07923
Deep Neural Network (DNN) for Water/Fat Separation: Supervised Training, Unsupervised Training, and No Training
Purpose: To use a deep neural network (DNN) for solving the optimization problem of water/fat separation and to compare supervised and unsupervised training. Methods: The current T2*-IDEAL algorithm for solving fat/water separation is dependent on initialization. Recently, deep neural networks (DNN) have been proposed to solve fat/water separation without the need for suitable initialization. However, this approach requires supervised training of DNN (STD) using the reference fat/water separation images. Here we propose two novel DNN water/fat separation methods 1) unsupervised training of DNN (UTD) using the physical forward problem as the cost function during training, and 2) no-training of DNN (NTD) using physical cost and backpropagation to directly reconstruct a single dataset. The STD, UTD and NTD methods were compared with the reference T2*-IDEAL. Results: All DNN methods generated consistent water/fat separation results that agreed well with T2*-IDEAL under proper initialization. Conclusion: The water/fat separation problem can be solved using unsupervised deep neural networks.
Homography estimation between multiple aerial images can provide relative pose estimation for collaborative autonomous exploration and monitoring. The usage on a robotic system requires a fast and robust homography estimation algorithm. In this study, we propose an unsupervised learning algorithm that trains a Deep Convolutional Neural Network to estimate planar homographies. We compare the proposed algorithm to traditional feature-based and direct methods, as well as a corresponding supervised learning algorithm. Our empirical results demonstrate that compared to traditional approaches, the unsupervised algorithm achieves faster inference speed, while maintaining comparable or better accuracy and robustness to illumination variation. In addition, on both a synthetic dataset and representative real-world aerial dataset, our unsupervised method has superior adaptability and performance compared to the supervised deep learning method.
0.943557
0.664253
0.279304
2004.07924
Impact of Nematicity on the Relationship between Antiferromagnetic Fluctuations and Superconductivity in FeSe0.91S0.09 Under Pressure
The sulfur substituted FeSe system, FeSe$_{1-x}$S$_{x}$, provides a versatile platform for studying the relationship between nematicity, antiferromagnetism, and superconductivity. Here, by nuclear magnetic resonance (NMR) and resistivity measurements up to 4.73 GPa on FeSe$_{0.91}$S$_{0.09}$, we established the pressure($p$)-temperature($T$) phase diagram in which the nematic state is suppressed with pressure showing a nematic quantum phase transition (QPT) around $p$ = 0.5 GPa, two SC regions, separated by the QPT, appear and antiferromagnetic (AFM) phase emerges above $\sim$3.3 GPa. From the NMR results up to 2.1 GPa, AFM fluctuations are revealed to be characterized by the stripe-type wavevector which remains the same for the two SC regions. Furthermore, the electronic state is found to change in character from non-Fermi liquid to Fermi liquid around the nematic QPT and persists up to $\sim$ 2.1 GPa. In addition, although the AFM fluctuations correlate with $T_{\rm c}$ in both SC states, demonstrating the importance of the AFM fluctuations for the appearance of SC in the system, we found that, when nematic order is absent, $T_{\rm c}$ is strongly correlated with the AFM fluctuations, whereas $T_{\rm c}$ weakly depends on the AFM fluctuations when nematic order is present. Our findings on FeSe$_{0.91}$S$_{0.09}$ were shown to be applied to the whole FeSe$_{1-x}$S$_{x}$ system and also provide a new insight into the relationship between AFM fluctuations and SC in Fe-based superconductors.
We report the discovery of pressure-induced superconductivity, with T_c=2 K, in the heavy-fermion antiferromagnet Ce_2RhIn_8, where superconductivity and magnetic order coexist over an extended pressure interval. A T-linear resistivity in the normal state, accessed by an applied magnetic field, does not appear to derive from the existence of a 2D quantum-critical spin-density wave.
0.900271
0.802218
0.098053
2004.07925
Anisotropic Spherical Solutions through Extended Gravitational Decoupling Approach
This paper is devoted to evaluating exact anisotropic spherical solutions for static self-gravitating systems through extended geometric deformation decoupling technique. For this purpose, we consider an isotropic Tolman IV solution and extend it to anisotropic domain by transforming both temporal as well as radial metric potentials. To examine the physical viability and stability of interior anisotropic solutions, we plot energy bounds, TOV equation, causality condition and adiabatic index for the stars Her X-I and PSR J 1416-2230. It is found that both obtained models show realistic behavior as they fulfill all physical constraints as well as stability criterion. We conclude that the extended gravitational decoupling approach provides more proficient results to discuss the interior configuration of stellar structures.
We provide all basic equations and concepts required to carry out a general study on axially symmetric static sources. The Einstein equations and the conservation equations are written down for a general anisotropic static fluid endowed with axial symmetry. The structure scalars are calculated and the inhomogeneity factors are identified. Finally some exact analytical solutions were found. One of these solutions describes an incompressible spheroid with isotropic pressure and becomes the well known interior Schwarzschild solution in the spherically symmetric limit, however it cannot be matched smoothly to any Weyl exterior metric. Another family of solutions was found that corresponds to an anisotropic fluid distribution and can in principle be matched to a Weyl exterior.
0.856173
0.751396
0.104777
2004.07927
Primordial plasma: influence of non-ideality on equilibrium radiation
The asymptotic behavior of the equilibrium radiation in Maxwellian plasma is investigated for the region of low frequencies. It is shown, that already for a weakly non-ideal plasma the equilibrium radiation can essentially deviate from the Planck law. The deviation from the Planck distribution is described by the transverse dielectric permittivity which takes into account both frequency and spatial dispersion. The influence of plasma non-ideality increases with increase of the non-ideality parameter in the in the dielectric permittivity. The spectral energy distribution of the equilibrium radiation essentially changes in the region of observable frequencies. At asymptotically low frequencies there is transfer from logarithmic to power behavior of the equilibrium radiation. The results indicate that in the primordial plasma of Early Universe the spectral energy distribution of radiation could be different then the Planck one.
Modeling the variability of the solar spectral irradiance is a key factor for understanding the solar influence on the climate of the Earth. As a first step to calculating the solar spectral irradiance variations we reproduce the solar spectrum for the quiet Sun over a broad wavelength range with an emphasis on the UV. We introduce the radiative transfer code COSI which calculates solar synthetic spectra under conditions of non-local thermodynamic equilibrium (NLTE). A self-consistent simultaneous solution of the radiative transfer and the statistical equation for the level populations guarantees that the correct physics is considered for wavelength regions where the assumption of local thermodynamic equilibrium (LTE) breaks down. The new concept of iterated opacity distribution functions (NLTE-ODFs), through which all line opacities are included in the NLTE radiative transfer calculation, is presented. We show that it is essential to include the line opacities in the radiative transfer to reproduce the solar spectrum in the UV. Through the implemented scheme of NLTE-ODFs the COSI code is successful in reproducing the spectral energy distribution of the quiet Sun.
0.879065
0.722572
0.156493
2004.07928
MARLeME: A Multi-Agent Reinforcement Learning Model Extraction Library
Multi-Agent Reinforcement Learning (MARL) encompasses a powerful class of methodologies that have been applied in a wide range of fields. An effective way to further empower these methodologies is to develop libraries and tools that could expand their interpretability and explainability. In this work, we introduce MARLeME: a MARL model extraction library, designed to improve explainability of MARL systems by approximating them with symbolic models. Symbolic models offer a high degree of interpretability, well-defined properties, and verifiable behaviour. Consequently, they can be used to inspect and better understand the underlying MARL system and corresponding MARL agents, as well as to replace all/some of the agents that are particularly safety and security critical.
Deep reinforcement learning (DRL) has made great achievements since proposed. Generally, DRL agents receive high-dimensional inputs at each step, and make actions according to deep-neural-network-based policies. This learning mechanism updates the policy to maximize the return with an end-to-end method. In this paper, we survey the progress of DRL methods, including value-based, policy gradient, and model-based algorithms, and compare their main techniques and properties. Besides, DRL plays an important role in game artificial intelligence (AI). We also take a review of the achievements of DRL in various video games, including classical Arcade games, first-person perspective games and multi-agent real-time strategy games, from 2D to 3D, and from single-agent to multi-agent. A large number of video game AIs with DRL have achieved super-human performance, while there are still some challenges in this domain. Therefore, we also discuss some key points when applying DRL methods to this field, including exploration-exploitation, sample efficiency, generalization and transfer, multi-agent learning, imperfect information, and delayed spare rewards, as well as some research directions.
0.899428
0.768391
0.131037
2004.07930
Large-scale frequency-domain seismic wave modeling on {\it{h}}-adaptive tetrahedral meshes with iterative solver and multi-level domain-decomposition preconditioners
Frequency-domain full-waveform inversion (FWI) is suitable for long-offset stationary-recording acquisition, since reliable subsurface models can be reconstructed with a few frequencies and attenuation is easily implemented without computational overhead. In the frequency domain, wave modeling is a Helmholtz-type boundary-value problem which requires to solve a large and sparse system of linear equations per frequency with multiple right-hand sides (sources). This system can be solved with direct or iterative methods. While the former are suitable for FWI application on 3D dense OBC acquisitions covering spatial domains of moderate size, the later should be the approach of choice for sparse node acquisitions covering large domains (more than 50 millions of unknowns). Fast convergence of iterative solvers for Helmholtz problems remains however challenging in high frequency regime due to the non definiteness of the Helmholtz operator, on one side and on the discretization constraints in order to minimize the dispersion error for a given frequency, on the other side, hence requiring efficient preconditioners. In this study, we use the Krylov subspace GMRES iterative solver combined with a two-level domain-decomposition preconditioner. Discretization relies on continuous Lagrange finite elements of order 3 on unstructured tetrahedral meshes to comply with complex geometries and adapt the size of the elements to the local wavelength ($h$-adaptivity). We assess the accuracy, the convergence and the scalability of our method with the acoustic 3D SEG/EAGE Overthrust model up to a frequency of 20~Hz.
A zero-frequency seismic metamaterial (ZFSM) consisting of a three-component seismic metamaterial plate and a half space is proposed to attenuate ultra-low frequency seismic surface waves. The design concept and models are verified firstly by lab-scale experiments on the seismic metamaterial consisting of a two-component seismic metamaterial plate and a half space. Then we calculate the band structures of the one-dimensional and two-dimensional ZFSMs, and evaluate their attenuation ability to Rayleigh waves. A wide band gap and a zero-frequency band gap (ZFBG) can be found as the band structure of the seismic metamaterial is almost equal to the band structure of the seismic metamaterial plate plus the sound cone. It is found that the Rayleigh waves in the ZFSM are deflected and converted into bulk waves. When the number of the unit cells of the ZFSM is sufficient, the transmission distance and deflection angle of the Rayleigh waves in the ZFSM are constant at the same frequency. This discovery is expected to open up the possibility of seismic protection for large nuclear power plants, ancient buildings and metropolitan areas.
0.898111
0.70627
0.191841
2004.07931
Eigendecomposition-Free Training of Deep Networks for Linear Least-Square Problems
Many classical Computer Vision problems, such as essential matrix computation and pose estimation from 3D to 2D correspondences, can be tackled by solving a linear least-square problem, which can be done by finding the eigenvector corresponding to the smallest, or zero, eigenvalue of a matrix representing a linear system. Incorporating this in deep learning frameworks would allow us to explicitly encode known notions of geometry, instead of having the network implicitly learn them from data. However, performing eigendecomposition within a network requires the ability to differentiate this operation. While theoretically doable, this introduces numerical instability in the optimization process in practice. In this paper, we introduce an eigendecomposition-free approach to training a deep network whose loss depends on the eigenvector corresponding to a zero eigenvalue of a matrix predicted by the network. We demonstrate that our approach is much more robust than explicit differentiation of the eigendecomposition using two general tasks, outlier rejection and denoising, with several practical examples including wide-baseline stereo, the perspective-n-point problem, and ellipse fitting. Empirically, our method has better convergence properties and yields state-of-the-art results.
Dropout and other feature noising schemes have shown promising results in controlling over-fitting by artificially corrupting the training data. Though extensive theoretical and empirical studies have been performed for generalized linear models, little work has been done for support vector machines (SVMs), one of the most successful approaches for supervised learning. This paper presents dropout training for both linear SVMs and the nonlinear extension with latent representation learning. For linear SVMs, to deal with the intractable expectation of the non-smooth hinge loss under corrupting distributions, we develop an iteratively re-weighted least square (IRLS) algorithm by exploring data augmentation techniques. Our algorithm iteratively minimizes the expectation of a re-weighted least square problem, where the re-weights are analytically updated. For nonlinear latent SVMs, we consider learning one layer of latent representations in SVMs and extend the data augmentation technique in conjunction with first-order Taylor-expansion to deal with the intractable expected non-smooth hinge loss and the nonlinearity of latent representations. Finally, we apply the similar data augmentation ideas to develop a new IRLS algorithm for the expected logistic loss under corrupting distributions, and we further develop a non-linear extension of logistic regression by incorporating one layer of latent representations. Our algorithms offer insights on the connection and difference between the hinge loss and logistic loss in dropout training. Empirical results on several real datasets demonstrate the effectiveness of dropout training on significantly boosting the classification accuracy of both linear and nonlinear SVMs. In addition, the nonlinear SVMs further improve the prediction performance on several image datasets.
0.89676
0.739786
0.156974
2004.07933
Existence and uniqueness of time-fractional diffusion equation on a metric star graph
In this paper, we study the time-fractional diffusion equation on a metric star graph. The existence and uniqueness of the weak solution are investigated and the proof is based on eigenfunction expansions. Some priori estimates and regularity results of the solution are proved.
Fractional extensions of the cable equation have been proposed in the literature to describe transmembrane potential in spiny dendrites. The anomalous behavior has been related in the literature to the geometrical properties of the system, in particular, the density of spines, by experiments, computer simulations, and in comb-like models.~The same PDE can be related to more than one stochastic process leading to anomalous diffusion behavior. The time-fractional diffusion equation can be associated to a continuous time random walk (CTRW) with power-law waiting time probability or to a special case of the Erd\'ely-Kober fractional diffusion, described by the ggBm. In this work, we show that time fractional generalization of the cable equation arises naturally in the CTRW by considering a superposition of Markovian processes and in a {\it ggBm-like} construction of the random variable.
0.96444
0.786788
0.177652
2004.07934
Weak cosmic censorship conjecture for the novel $4D$ charged Einstein-Gauss-Bonnet black hole with test scalar field and particle
Motivated by the recent research of black holes in $4D$ Einstein-Gauss-Bonnet (EGB) gravity, we investigate the possibility of destroying the event horizon of a charged $4D$ EGB black hole with a test massive complex scalar field and a test charged particle, respectively. For the scalar field scattering gedanken experiment, we consider an infinitesimal time interval process. The result shows that both extremal and near-extremal $4D$ charged EGB black holes cannot be overcharged. For the test particle thought experiment, the study suggests that extremal $4D$ charged EGB black hole cannot be overcharged to first order and can be overcharged to second order due to the existence of the Gauss-Bonnet coupling constant. While, near-extremal $4D$ EGB black hole can be overcharged to both first and second order.
The cosmic censorship conjecture essentially states that naked singularities should not form from generic initial conditions. Since black hole parameters can change their values under Hawking evaporation, one has to ask whether it is possible to reach extremality by simply waiting for the black hole to evaporate. If so a slight perturbation would likely render the singularity naked. Fortunately, at least for the case of asymptotically flat 4-dimensional Reissner-Nordstr\"om black hole, Hiscock and Weems showed that it can never reach extremality despite the fact that for a sufficiently massive black hole, its charge-to-mass ratio can increase during Hawking evaporation. Hence cosmic censorship is never violated by Hawking emission. However, we know that under some processes, it is easier to violate cosmic censorship in higher dimensions, therefore it is crucial to generalize Hiscock and Weems model to dimensions above four to check cosmic censorship. We found that Hawking evaporation cannot lead to violation of cosmic censorship even in higher dimensional Reissner-Nordstr\"om spacetimes. Morerover, it seems to be more difficult to reach extremality as number of dimension increases.
0.85141
0.813422
0.037988
2004.07935
Decodable quantum LDPC codes beyond the $\sqrt{n}$ distance barrier using high dimensional expanders
Constructing quantum LDPC codes with a minimum distance that grows faster than a square root of the length has been a major challenge of the field. With this challenge in mind, we investigate constructions that come from high-dimensional expanders, in particular Ramanujan complexes. These naturally give rise to very unbalanced quantum error correcting codes that have a large $X$-distance but a much smaller $Z$-distance. However, together with a classical expander LDPC code and a tensoring method that generalises a construction of Hastings and also the Tillich-Zemor construction of quantum codes, we obtain quantum LDPC codes whose minimum distance exceeds the square root of the code length and whose dimension comes close to a square root of the code length. When the ingredient is a 3-dimensional Ramanujan complex, we show that its 2-systole behaves like a square of the log of the complex size, which results in an overall quantum code of minimum distance $n^{1/2}\log n$, and sets a new record for quantum LDPC codes. When we use a 2-dimensional Ramanujan complex, or the 2-skeleton of a 3-dimensional Ramanujan complex, we obtain a quantum LDPC code of minimum distance $n^{1/2}\log^{1/2}n$. We then exploit the expansion properties of the complex to devise the first polynomial time algorithm that decodes above the square root barrier for quantum LDPC codes.
This paper outlines a three-step procedure for determining the low bit error rate performance curve of a wide class of LDPC codes of moderate length. The traditional method to estimate code performance in the higher SNR region is to use a sum of the contributions of the most dominant error events to the probability of error. These dominant error events will be both code and decoder dependent, consisting of low-weight codewords as well as non-codeword events if ML decoding is not used. For even moderate length codes, it is not feasible to find all of these dominant error events with a brute force search. The proposed method provides a convenient way to evaluate very low bit error rate performance of an LDPC code without requiring knowledge of the complete error event weight spectrum or resorting to a Monte Carlo simulation. This new method can be applied to various types of decoding such as the full belief propagation version of the message passing algorithm or the commonly used min-sum approximation to belief propagation. The proposed method allows one to efficiently see error performance at bit error rates that were previously out of reach of Monte Carlo methods. This result will provide a solid foundation for the analysis and design of LDPC codes and decoders that are required to provide a guaranteed very low bit error rate performance at certain SNRs.
0.909358
0.772461
0.136897
2004.07936
Unsupervised Learning of Landmarks based on Inter-Intra Subject Consistencies
We present a novel unsupervised learning approach to image landmark discovery by incorporating the inter-subject landmark consistencies on facial images. This is achieved via an inter-subject mapping module that transforms original subject landmarks based on an auxiliary subject-related structure. To recover from the transformed images back to the original subject, the landmark detector is forced to learn spatial locations that contain the consistent semantic meanings both for the paired intra-subject images and between the paired inter-subject images. Our proposed method is extensively evaluated on two public facial image datasets (MAFL, AFLW) with various settings. Experimental results indicate that our method can extract the consistent landmarks for both datasets and achieve better performances compared to the previous state-of-the-art methods quantitatively and qualitatively.
Compared to abstract features, significant objects, so-called landmarks, are a more natural means for vehicle localization and navigation, especially in challenging unstructured environments. The major challenge is to recognize landmarks in various lighting conditions and changing environment (growing vegetation) while only having few training samples available. We propose a new method which leverages Deep Learning as well as model-based methods to overcome the need of a large data set. Using RGB images and light detection and ranging (LiDAR) point clouds, our approach combines state-of-the-art classification results of Convolutional Neural Networks (CNN), with robust model-based methods by taking prior knowledge of previous time steps into account. Evaluations on a challenging real-wold scenario, with trees and bushes as landmarks, show promising results over pure learning-based state-of-the-art 3D detectors, while being significant faster.
0.885098
0.726368
0.15873
2004.07937
Principle components analysis for seizures prediction using wavelet transform
Epilepsy is a disease in which frequent seizures occur due to abnormal activity of neurons. Patients affected by this disease can be treated with the help of medicines or surgical procedures. However, both of these methods are not quite useful. The only method to treat epilepsy patients effectively is to predict the seizure before its onset. It has been observed that abnormal activity in the brain signals starts before the occurrence of seizure known as the preictal state. Many researchers have proposed machine learning models for prediction of epileptic seizures by detecting the start of preictal state. However, pre-processing, feature extraction and classification remains a great challenge in the prediction of preictal state. Therefore, we propose a model that uses common spatial pattern filtering and wavelet transform for preprocessing, principal component analysis for feature extraction and support vector machines for detecting preictal state. We have applied our model on 23 subjects and an average sensitivity of 93.1% has been observed for 84 seizures.
In 2005, Nagler and Claussen (Phys. Rev. E 71 (2005) 067103) investigated the time series of the elementary cellular automata (ECA) for possible (multi)fractal behavior. They eliminated the polynomial background at^b through the direct fitting of the polynomial coefficients a and b. We here reconsider their work eliminating the polynomial trend by means of the multifractal-based detrended fluctuation analysis (MF-DFA) in which the wavelet multiresolution property is employed to filter out the trend in a more speedy way than the direct polynomial fitting and also with respect to the wavelet transform modulus maxima (WTMM) procedure. In the algorithm, the discrete fast wavelet transform is used to calculate the trend as a local feature that enters the so-called details signal. We illustrate our result for three representative ECA rules: 90, 105, and 150. We confirm their multifractal behavior and provide our results for the scaling parameters
0.825602
0.677044
0.148557
2004.07938
Propagation of the Free Dirac Wavefunctions
The free time evolution of a Dirac wavefunction is studied in detail. One finds that at any time the border of a bounded localized wavefunction moves at the speed of light. There is no zitterbewegung, but there is a period of trembling of the carrier, which is limited in time and space in the order of the diameter of the carrier at its minimal extension. Before the phase of trembling the carrier shrinks isotropicly and similarly it expands afterwards. The various parts of the border reverse their move only once, but they do it abruptly and not simultaneously, thus creating the trembling. Asymptotically, regarding the past and the future as well, the probability of position concentrates up to 1 within any spherical shell whose outer radius increases at light speed. The mathematical tools employed for the proofs are the Fourier analysis of entire functions of exponential type and the non-stationary phase method.
We have studied the null-plane hamiltonian structure of the free Yang-Mills fields and the scalar chromodynamics ($SQCD_{4}$). Following the Dirac's procedure for constrained systems we have performed a detailed analysis of the constraint structure of both models and we give the generalized Dirac brackets for the physical variables. In the free Yang-Mills case, using the correspondence principle in the Dirac's brackets we obtain the same commutators present in the literature.
0.839968
0.805567
0.034401
2004.07939
Explaining B decays anomalies in SUSY models
Recent measurements of certain B decays indicate deviations from Standard Model (SM) predictions. We show that Supersymmetric effects can increase the Branching Ratios (BRs) of both $B\to D {\tau} {\nu}_{\tau}$ and $B\to D^\ast {\tau} {\nu}_{\tau}$ with respect to the SM rates, thereby approaching their newest experimentally measured values.
Recently, several $B$-physics experiments have reported an appreciable deviation from the Standard Model (SM) in the tree-level observables $R_{D^{(*)}}$; the combined weighted average now stands at $\approx 4 \sigma$. We first show the anomaly necessarily implies model-independent collider signals of the form $pp \to b \tau \nu$ that should be expediously searched for at ATLAS/CMS as a complementary test of the anomaly. Next we suggest a possible interconnection of the anomaly with the radiative stability of the Standard Model Higgs boson and point to a minimal effective supersymmetric scenario with $R$-parity violation as the underlying cause. We also comment on the possibility of simultaneously explaining the recently reported $R_{K^{(*)}}$ anomaly in this setup.
0.876508
0.843333
0.033175
2004.07940
Solving bitvectors with MCSAT: explanations from bits and pieces (long version)
We present a decision procedure for the theory of fixed-sized bitvectors in the MCSAT framework. MCSAT is an alternative to CDCL(T) for SMT solving and can be seen as an extension of CDCL to domains other than the Booleans. Our procedure uses BDDs to record and update the sets of feasible values of bitvector variables. For explaining conflicts and propagations, we develop specialized word-level interpolation for two common fragments of the theory. For full generality, explaining conflicts outside of the covered fragments resorts to local bitblasting. The approach is implemented in the Yices 2 SMT solver and we present experimental results.
Skew polynomials, which have a noncommutative multiplication rule between coefficients and an indeterminate, are the most general polynomial concept that admits the degree function with desirable properties. This paper presents the first algorithms to compute the maximum degree of the Dieudonn\'e determinant of a $k \times k$ submatrix in a matrix $A$ whose entries are skew polynomials over a skew field $F$. Our algorithms make use of the discrete Legendre conjugacy between the sequences of the maximum degrees and the ranks of block matrices over $F$ obtained from coefficient matrices of $A$. Three applications of our algorithms are provided: (i) computing the dimension of the solution spaces of linear differential and difference equations, (ii) determining the Smith-McMillan form of transfer function matrices of linear time-varying systems and (iii) solving the "weighted" version of noncommutative Edmonds' problem with polynomial bit complexity. We also show that the deg-det computation for matrices over sparse polynomials is at least as hard as solving commutative Edmonds' problem.
0.91526
0.708039
0.207221
2004.07941
Continual Learning for Anomaly Detection in Surveillance Videos
Anomaly detection in surveillance videos has been recently gaining attention. A challenging aspect of high-dimensional applications such as video surveillance is continual learning. While current state-of-the-art deep learning approaches perform well on existing public datasets, they fail to work in a continual learning framework due to computational and storage issues. Furthermore, online decision making is an important but mostly neglected factor in this domain. Motivated by these research gaps, we propose an online anomaly detection method for surveillance videos using transfer learning and continual learning, which in turn significantly reduces the training complexity and provides a mechanism for continually learning from recent data without suffering from catastrophic forgetting. Our proposed algorithm leverages the feature extraction power of neural network-based models for transfer learning, and the continual learning capability of statistical detection methods.
Different from salient object detection methods for still images, a key challenging for video saliency detection is how to extract and combine spatial and temporal features. In this paper, we present a novel and effective approach for salient object detection for video sequences based on 3D convolutional neural networks. First, we design a 3D convolutional network (Conv3DNet) with the input as three video frame to learn the spatiotemporal features for video sequences. Then, we design a 3D deconvolutional network (Deconv3DNet) to combine the spatiotemporal features to predict the final saliency map for video sequences. Experimental results show that the proposed saliency detection model performs better in video saliency prediction compared with the state-of-the-art video saliency detection methods.
0.926791
0.672569
0.254222
2004.07942
Sharp pointwise estimates for solutions of weakly coupled second order parabolic system in a layer
We deal with $m$-component vector-valued solutions to the Cauchy problem for linear both homogeneous and nonhomogeneous weakly coupled second order parabolic system in the layer ${\mathbb R}^{n+1}_T={\mathbb R}^n\times (0, T)$. We assume that coefficients of the system are real and depending only on $t$, $n\geq 1$ and $T<\infty$. The homogeneous system is considered with initial data in $[L^p({\mathbb R}^n)]^m$, $1\leq p \leq \infty $. For the nonhomogeneous system we suppose that the initial function is equal to zero and the right-hand side belongs to $[L^p({\mathbb R}^{n+1}_T)]^m\cap [C^\alpha \big (\overline{{\mathbb R}^{n+1}_T} \big )]^m $, $\alpha \in (0, 1)$. Explicit formulas for the sharp coefficients in pointwise estimates for solutions of these problems and their directional derivative are obtained.
We study a 4+1 dimensional pure Abelian Gauge model on the lattice with two anisotropic couplings independent of each other and of the coordinates. A first exploration of the phase diagram using mean field approximation and monte carlo techniques has demonstrated the existence of a new phase, the so called Layer phase, in which the forces in the 4-D subspace are Coulomb-like while in the transverse direction (fifth dimension) the force is confining. This allows the possibility of a gauge field localization scheme. In this work the use of bigger lattice volumes and higher statistics confirms the existence of the Layer phase and furthermore clarifies the issue of the phase transitions' order. We show that the Layer phase is separated from the strongly coupled phase by a weak first order phase transition. Also we provide evidence that the Layer phase is separated by the five-dimensional Coulomb phase with a second order phase transition and we give a first estimation of the critical exponents.
0.887082
0.631155
0.255927
2004.07943
Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms
Characteristics and way of behavior of attacks and infiltrators on computer networks are usually very difficult and need an expert In addition; the advancement of computer networks, the number of attacks and infiltrations are also increasing. In fact, the knowledge coming from an expert will lose its value over time and must be updated and made available to the system and this makes the need for the expert person always felt. In machine learning techniques, knowledge is extracted from the data itself which has diminished the role of the expert. Various methods used to detect intrusions, such as statistical models, safe system approach, neural networks, etc., all weaken the fact that it uses all the features of an information packet rotating in the network for intrusion detection. Also, the huge volume of information and the unthinkable state space is also an important issue in the detection of intrusion. Therefore, the need for automatic identification of new and suspicious patterns in an attempt for intrusion with the use of more efficient methods Lower cost and higher performance is needed more than before. The purpose of this study is to provide a new method based on intrusion detection systems and its various architectures aimed at increasing the accuracy of intrusion detection in cloud computing. Keywords : intrusion detection, feature Selection, classification Algorithm, machine learning, neural network.
Recent research shows that colluded malware in different VMs sharing a single physical host may use a resource as a channel to leak critical information. Covert channels employ time or storage characteristics to transmit confidential information to attackers leaving no trail.These channels were not meant for communication and hence control mechanisms do not exist. This means these remain undetected by traditional security measures employed in firewalls etc in a network. The comprehensive survey to address the issue highlights that accurate methods for fast detection in cloud are very expensive in terms of storage and processing. The proposed framework builds signature by extracting features which accurately classify the regular from covert traffic in cloud and estimates difference in distribution of data under analysis by means of scores. It then adds context to the signature and finally using machine learning (Support Vector Machines),a model is built and trained for deploying in cloud. The results show that the framework proposed is high in accuracy while being low cost and robust as it is tested after adding noise which is likely to exist in public cloud environments.
0.857151
0.804212
0.052939
2004.07944
Cityscapes-Panoptic-Parts and PASCAL-Panoptic-Parts datasets for Scene Understanding
In this technical report, we present two novel datasets for image scene understanding. Both datasets have annotations compatible with panoptic segmentation and additionally they have part-level labels for selected semantic classes. This report describes the format of the two datasets, the annotation protocols, the merging strategies, and presents the datasets statistics. The datasets labels together with code for processing and visualization will be published at https://github.com/tue-mps/panoptic_parts.
Recent years have witnessed rapid progress in detecting and recognizing individual object instances. To understand the situation in a scene, however, computers need to recognize how humans interact with surrounding objects. In this paper, we tackle the challenging task of detecting human-object interactions (HOI). Our core idea is that the appearance of a person or an object instance contains informative cues on which relevant parts of an image to attend to for facilitating interaction prediction. To exploit these cues, we propose an instance-centric attention module that learns to dynamically highlight regions in an image conditioned on the appearance of each instance. Such an attention-based network allows us to selectively aggregate features relevant for recognizing HOIs. We validate the efficacy of the proposed network on the Verb in COCO and HICO-DET datasets and show that our approach compares favorably with the state-of-the-arts.
0.855023
0.737864
0.117159
2004.07945
ALCN: Adaptive Local Contrast Normalization
To make Robotics and Augmented Reality applications robust to illumination changes, the current trend is to train a Deep Network with training images captured under many different lighting conditions. Unfortunately, creating such a training set is a very unwieldy and complex task. We therefore propose a novel illumination normalization method that can easily be used for different problems with challenging illumination conditions. Our preliminary experiments show that among current normalization methods, the Difference-of Gaussians method remains a very good baseline, and we introduce a novel illumination normalization model that generalizes it. Our key insight is then that the normalization parameters should depend on the input image, and we aim to train a Convolutional Neural Network to predict these parameters from the input image. This, however, cannot be done in a supervised manner, as the optimal parameters are not known a priori. We thus designed a method to train this network jointly with another network that aims to recognize objects under different illuminations: The latter network performs well when the former network predicts good values for the normalization parameters. We show that our method significantly outperforms standard normalization methods and would also be appear to be universal since it does not have to be re-trained for each new application. Our method improves the robustness to light changes of state-of-the-art 3D object detection and face recognition methods.
We introduce the Region Adaptive Graph Fourier Transform (RA-GFT) for compression of 3D point cloud attributes. We assume the points are organized by a family of nested partitions represented by a tree. The RA-GFT is a multiresolution transform, formed by combining spatially localized block transforms. At each resolution level, attributes are processed in clusters by a set of block transforms. Each block transform produces a single approximation (DC) coefficient, and various detail (AC) coefficients. The DC coefficients are promoted up the tree to the next (lower resolution) level, where the process can be repeated until reaching the root. Since clusters may have a different numbers of points, each block transform must incorporate the relative importance of each coefficient. For this, we introduce the $\mathbf{Q}$-normalized graph Laplacian, and propose using its eigenvectors as the block transform. The RA-GFT outperforms the Region Adaptive Haar Transform (RAHT) by up to 2.5 dB, with a small complexity overhead.
0.747615
0.699946
0.04767
2004.07946
Beyond Tree Embeddings -- a Deterministic Framework for Network Design with Deadlines or Delay
We consider network design problems with deadline or delay. All previous results for these models are based on randomized embedding of the graph into a tree (HST) and then solving the problem on this tree. We show that this is not necessary. In particular, we design a deterministic framework for these problems which is not based on embedding. This enables us to provide deterministic $\text{poly-log}(n)$-competitive algorithms for Steiner tree, generalized Steiner tree, node weighted Steiner tree, (non-uniform) facility location and directed Steiner tree with deadlines or with delay (where $n$ is the number of nodes). Our deterministic algorithms also give improved guarantees over some previous randomized results. In addition, we show a lower bound of $\text{poly-log}(n)$ for some of these problems, which implies that our framework is optimal up to the power of the poly-log. Our algorithms and techniques differ significantly from those in all previous considerations of these problems.
Chinese word segmentation is a fundamental task for Chinese language processing. The granularity mismatch problem is the main cause of the errors. This paper showed that the binary tree representation can store outputs with different granularity. A binary tree based framework is also designed to overcome the granularity mismatch problem. There are two steps in this framework, namely tree building and tree pruning. The tree pruning step is specially designed to focus on the granularity problem. Previous work for Chinese word segmentation such as the sequence tagging can be easily employed in this framework. This framework can also provide quantitative error analysis methods. The experiments showed that after using a more sophisticated tree pruning function for a state-of-the-art conditional random field based baseline, the error reduction can be up to 20%.
0.863204
0.628973
0.234231
2004.07947
The socio-economic determinants of the coronavirus disease (COVID-19) pandemic
The magnitude of the coronavirus disease (COVID-19) pandemic has an enormous impact on the social life and the economic activities in almost every country in the world. Besides the biological and epidemiological factors, a multitude of social and economic criteria also govern the extent of the coronavirus disease spread in the population. Consequently, there is an active debate regarding the critical socio-economic determinants that contribute to the resulting pandemic. In this paper, we contribute towards the resolution of the debate by leveraging Bayesian model averaging techniques and country level data to investigate the potential of 35 determinants, describing a diverse set of socio-economic characteristics, in explaining the coronavirus pandemic outcome.
Research significance: During the epidemic prevention and control period, our study can be helpful in prognosis, diagnosis and screening for the patients infected with COVID-19 (the novel coronavirus) based on breathing characteristics. According to the latest clinical research, the respiratory pattern of COVID-19 is different from the respiratory patterns of flu and the common cold. One significant symptom that occurs in the COVID-19 is Tachypnea. People infected with COVID-19 have more rapid respiration. Our study can be utilized to distinguish various respiratory patterns and our device can be preliminarily put to practical use. Demo videos of this method working in situations of one subject and two subjects can be downloaded online. Research details: Accurate detection of the unexpected abnormal respiratory pattern of people in a remote and unobtrusive manner has great significance. In this work, we innovatively capitalize on depth camera and deep learning to achieve this goal. The challenges in this task are twofold: the amount of real-world data is not enough for training to get the deep model; and the intra-class variation of different types of respiratory patterns is large and the outer-class variation is small. In this paper, considering the characteristics of actual respiratory signals, a novel and efficient Respiratory Simulation Model (RSM) is first proposed to fill the gap between the large amount of training data and scarce real-world data. Subsequently, we first apply a GRU neural network with bidirectional and attentional mechanisms (BI-AT-GRU) to classify 6 clinically significant respiratory patterns (Eupnea, Tachypnea, Bradypnea, Biots, Cheyne-Stokes and Central-Apnea). The proposed deep model and the modeling ideas have the great potential to be extended to large scale applications such as public places, sleep scenario, and office environment.
0.917156
0.707611
0.209545
2004.07948
Sound of Guns: Digital Forensics of Gun Audio Samples meets Artificial Intelligence
Classifying a weapon based on its muzzle blast is a challenging task that has significant applications in various security and military fields. Most of the existing works rely on ad-hoc deployment of spatially diverse microphone sensors to capture multiple replicas of the same gunshot, which enables accurate detection and identification of the acoustic source. However, carefully controlled setups are difficult to obtain in scenarios such as crime scene forensics, making the aforementioned techniques inapplicable and impractical. We introduce a novel technique that requires zero knowledge about the recording setup and is completely agnostic to the relative positions of both the microphone and shooter. Our solution can identify the category, caliber, and model of the gun, reaching over 90% accuracy on a dataset composed of 3655 samples that are extracted from YouTube videos. Our results demonstrate the effectiveness and efficiency of applying Convolutional Neural Network (CNN) in gunshot classification eliminating the need for an ad-hoc setup while significantly improving the classification performance.
Today, the volume of evidence collected per case is growing exponentially, to address this problem forensics investigators are looking for investigation process with tools built on new technologies like big data, cloud services, and Deep Learning (DL) techniques. Consequently, the accuracy of artifacts found also relies on the performance of techniques used, especially DL models. Recently, \textbf{D}eep \textbf{N}eural \textbf{N}ets (\textbf{DNN}) have achieved state of the art performance in the tasks of classification and recognition. In the context of digital forensics, DNN has been applied to the domains of cybercrime investigation such as child abuse investigations, malware classification, steganalysis and image forensics. However, the robustness of DNN models in the context of digital forensics is never studied before. Hence, in this research, we design and implement a domain-independent Adversary Testing Framework (ATF) to test the security robustness of black-box DNN's. By using ATF, we also methodically test a commercially available DNN service used in forensic investigations and bypass the detection, where published methods fail in control settings.
0.834296
0.731588
0.102708
2004.07949
A Resource Allocation and Coordinated Transmission Scheme for Large Cellular Networks
With the increasing number of user equipment (UE) and data demands, denser access points (APs) are being employed. Resource allocation problems have been extensively researched with interference treated as noise. It is well understood that the overall spectral efficiency can be significantly improved if multiple terminals coordinate their transmissions either coherently or non-coherently.The focus of this paper is to study how to select pairs of APs for coordination and allocate resources accordingly. An optimization problem is formulated to maximize the network utility function by optimizing AP paring, spectrum allocation, user association, and power management in a flexible manner. A scalable and efficient algorithm is proposed based on iterative scheme pursuit and fractional programming. Numerical results demonstrate substantial gains in the network utility due to coordinated transmission in a network of 128 APs and 384 UE.
Two-tier networks, comprising a conventional cellular network overlaid with shorter range hotspots (e.g. femtocells, distributed antennas, or wired relays), offer an economically viable way to improve cellular system capacity. The capacity-limiting factor in such networks is interference. The cross-tier interference between macrocells and femtocells can suffocate the capacity due to the near-far problem, so in practice hotspots should use a different frequency channel than the potentially nearby high-power macrocell users. Centralized or coordinated frequency planning, which is difficult and inefficient even in conventional cellular networks, is all but impossible in a two-tier network. This paper proposes and analyzes an optimum decentralized spectrum allocation policy for two-tier networks that employ frequency division multiple access (including OFDMA). The proposed allocation is optimal in terms of Area Spectral Efficiency (ASE), and is subjected to a sensible Quality of Service (QoS) requirement, which guarantees that both macrocell and femtocell users attain at least a prescribed data rate. Results show the dependence of this allocation on the QoS requirement, hotspot density and the co-channel interference from the macrocell and surrounding femtocells. Design interpretations of this result are provided.
0.820573
0.786802
0.033771
2004.07950
Learning visual policies for building 3D shape categories
Manipulation and assembly tasks require non-trivial planning of actions depending on the environment and the final goal. Previous work in this domain often assembles particular instances of objects from known sets of primitives. In contrast, we here aim to handle varying sets of primitives and to construct different objects of the same shape category. Given a single object instance of a category, e.g. an arch, and a binary shape classifier, we learn a visual policy to assemble other instances of the same category. In particular, we propose a disassembly procedure and learn a state policy that discovers new object instances and their assembly plans in state space. We then render simulated states in the observation space and learn a heatmap representation to predict alternative actions from a given input image. To validate our approach, we first demonstrate its efficiency for building object categories in state space. We then show the success of our visual policies for building arches from different primitives. Moreover, we demonstrate (i) the reactive ability of our method to re-assemble objects using additional primitives and (ii) the robust performance of our policy for unseen primitives resembling building blocks used during training. Our visual assembly policies are trained with no real images and reach up to 95% success rate when evaluated on a real robot.
Finding point-wise correspondences between images is a long-standing problem in computer vision. Corresponding sketch images is particularly challenging due to the varying nature of human style, projection distortions and viewport changes. In this paper we present a feature descriptor targeting line drawings learned from a 3D shape data set. Our descriptors are designed to locally match image pairs where the object of interest belongs to the same semantic category, yet still differ drastically in shape and projection angle. We build our descriptors by means of a Convolutional Neural Network (CNN) trained in a triplet fashion. The goal is to embed semantically similar anchor points close to one another, and to pull the embeddings of different points far apart. To learn the descriptors space, the network is fed with a succession of zoomed views from the input sketches. We have specifically crafted a data set of synthetic sketches using a non-photorealistic rendering algorithm over a large collection of part-based registered 3D models. Once trained, our network can generate descriptors for every pixel in an input image. Furthermore, our network is able to generalize well to unseen sketches hand-drawn by humans, outperforming state-of-the-art descriptors on the evaluated matching tasks. Our descriptors can be used to obtain sparse and dense correspondences between image pairs. We evaluate our method against a baseline of correspondences data collected from expert designers, in addition to comparisons with descriptors that have been proven effective in sketches. Finally, we demonstrate applications showing the usefulness of our multi-view descriptors.
0.822037
0.773192
0.048844
2004.07951
Measuring Fluxes of Meteor Showers with the NASA All-Sky Fireball Network
We present an algorithm developed to measure the fluxes of major meteor showers as observed in NASA's All-Sky Fireball Network cameras. Measurements of fluxes from the All-Sky cameras not only improve the Meteoroid Environment Office's (MEO's) ability to provide accurate risk assessments from major showers, but also allows the mass distribution of meteoroids within the shower to be constrained. This algorithm accounts for the shower-specific and event-specific exposure time and collecting area of the sky for nights where sufficiently large samples of shower meteors ($\sim 30$ or more from the shower) are observed. The fluxes derived from the All-Sky Fireball Network for the 2015 Geminid, 2016 Perseid and Quadrantid, 2017 Orionid, and 2018 Leonid shower peaks are calculated. All five of these shower fluxes show excellent agreement with expectations from independent measurements at different mass and luminosity limits. For four of these five showers, the measured mass indices are significantly shallower than what is currently assumed by the NASA Meteoroid Environment Office's (MEO's) annual meteor shower forecast. A direct comparison between forecasted and measured fluxes at limiting masses of $\sim 1 \thinspace \mathrm{g}$ shows good agreement for the three showers for which the observations took place near their peak activity.
We report a new observation of the Jupiter-family comet 209P/LINEAR during its 2014 return. The comet is recognized as a dust source of a new meteor shower, the May Camelopardalids. 209P/LINEAR was apparently inactive at a heliocentric distance rh = 1.6 au and showed weak activity at rh < 1.4 au. We found an active region of <0.001% of the entire nuclear surface during the comet's dormant phase. An edge-on image suggests that particles up to 1 cm in size (with an uncertainty of factor 3-5) were ejected following a differential power-law size distribution with index q=-3.25+-0.10. We derived a mass loss rate of 2-10 kg/s during the active phase and a total mass of ~5x10^7 kg during the 2014 return. The ejection terminal velocity of millimeter- to centimeter-sized particles was 1-4 m/s, which is comparable to the escape velocity from the nucleus (1.4 m/s). These results imply that such large meteoric particles marginally escaped from the highly dormant comet nucleus via the gas drag force only within a few months of the perihelion passage.
0.913462
0.721696
0.191766
2004.07952
Envelope Theory for Systems with Different Particles
The eigensolutions of many-body quantum systems are always difficult to compute. The envelope theory is a method to easily obtain approximate, but reliable, solutions in the case of identical particles. It is extended here to treat systems with different particles (bosons or fermions). The accuracy is tested for several systems composed of identical particles plus a different one.
Starting with an operator in the universal enveloping algebra of a semi-simple, complex Lie group the nearest neighbor statistics of the spectra of this operator along a sequence of representations are discussed. After a short introduction in chapter 1 this problem is motivated by a general construction of the classical limit for quantum mechanical systems, which is adopted to this setting, in chapter 2. In chapter 3 it is shown that for simple operators, i.e., operators of the Lie algebra the nearest neighbor statistics along a sequence of irreducible representations converge to the Dirac measure. After a suitable completion of the universal enveloping algebra the convergence to Poisson statistics is proved in chapter 4 for the exponentials of generic operators. The proof makes use of a combinatorial inequality of the Katz-Sarnak type for tori, which is proved in chapter 5. In the appendix the necessary facts from group theory and the theory of nearest neighbor distributions are gathered.
0.897067
0.724091
0.172975
2004.07953
Exploring laser-driven neutron sources for neutron capture cascades and the production of neutron-rich isotopes
The production of neutron-rich isotopes and the occurrence of neutron capture cascades via laser-driven (pulsed) neutron sources are investigated theoretically. The considered scenario involves the interaction of a laser-driven neutron beam with a target made of a single type of seed nuclide. We present a comprehensive study over $95$ seed nuclides in the range $3\le Z \le 100$ from $^7_3$Li to $^{255}_{100}$Fm. For each element, the heaviest sufficiently-long-lived (half life $> 1$ h) isotope whose data is available in the recent ENDF-B-VIII.0 neutron sublibrary is considered. We identify interesting seed nuclides with good performance in the production of neutron-rich isotopes where neutron capture cascades may occur. The effects of the neutron number per pulse, the neutron-target interaction size and the number of neutron pulses are also analyzed. Our results show the possibility of observing up to $4$ successive neutron capture events leading to neutron-rich isotopes with $4$ more neutrons than the original seed nuclide. This hints at new experimental possibilities to produce neutron-rich isotopes and simulate neutron capture nucleosynthesis in the laboratory. With several selected interesting seed nuclides in the region of the branching point of the $s$-process ($^{126}_{51}$Sb, $^{176}_{71}$Lu and $^{187}_{75}$Re) or the waiting point of the $r$-process (Lu, Re, Os, Tm, Ir and Au), we expect that laser-driven experiments can shed light on our understanding of nucleosynthesis.
Neutron rich Zr nuclei with number of neutrons between $N$= 50 and 82 are investigated in the relativistic mean field approach in co-ordinate space. The resonant levels in the positive energy continuum have been explicitly included in the calculation. Odd nuclei have been treated in the blocking approximation. Our calculation indicates that the dripline for odd mass isotopes is far away from that for the even mass ones. Pairing interaction plays a significant role in stabilizing the even isotopes, thus extending the dripline for them.
0.903857
0.699068
0.20479
2004.07954
A novel method for constructing high accurate and robust WENO-Z type scheme
A novel method for constructing robust and high-order accurate weighted essentially non-oscillatory (WENO) scheme is proposed in this paper. The method is mainly based on the WENO-Z type scheme, in which, an eighth-order global smoothness indicator (the square of the approximation of the fourth-order derivative on the five-point stencil used by the fifth-order WENO scheme) is used, and in order to keep the ENO property and robustness, the constant 1 used to calculate the un-normalized weights is replaced by a function of local smoothness indicators of candidate sub-stencils. This function is designed to have following adaptive property: if the five-point stencil contains a discontinuity, then the function approaches to a small value, otherwise, it approaches to a large value. Analysis and numerical results show that the resulted WENO-Z type (WENO-ZN) scheme is robust for capturing shock waves and, in smooth regions, achieves fifth-order accuracy at first-order critical point and fourth-order accuracy at second-order critical point.
Inspired by the well-known permutation entropy (PE), an effective image encoding scheme for chaotic time series, Triad State Space Construction (TSSC), is proposed. The TSSC image can recognize higher-order temporal patterns and identify new forbidden regions in time series motifs beyond the Bandt-Pompe probabilities. The Convolutional Neural Network (ConvNet) is widely used in image classification. The ConvNet classifier based on TSSC images (TSSC-ConvNet) are highly accurate and very robust in the chaotic signal classification.
0.854725
0.673797
0.180927
2004.07955
Targeted Attack for Deep Hashing based Retrieval
The deep hashing based retrieval method is widely adopted in large-scale image and video retrieval. However, there is little investigation on its security. In this paper, we propose a novel method, dubbed deep hashing targeted attack (DHTA), to study the targeted attack on such retrieval. Specifically, we first formulate the targeted attack as a point-to-set optimization, which minimizes the average distance between the hash code of an adversarial example and those of a set of objects with the target label. Then we design a novel component-voting scheme to obtain an anchor code as the representative of the set of hash codes of objects with the target label, whose optimality guarantee is also theoretically derived. To balance the performance and perceptibility, we propose to minimize the Hamming distance between the hash code of the adversarial example and the anchor code under the $\ell^\infty$ restriction on the perturbation. Extensive experiments verify that DHTA is effective in attacking both deep hashing based image retrieval and video retrieval.
Deep learning has gained tremendous success and great popularity in the past few years. However, recent research found that it is suffering several inherent weaknesses, which can threaten the security and privacy of the stackholders. Deep learning's wide use further magnifies the caused consequences. To this end, lots of research has been conducted with the purpose of exhaustively identifying intrinsic weaknesses and subsequently proposing feasible mitigation. Yet few is clear about how these weaknesses are incurred and how effective are these attack approaches in assaulting deep learning. In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we are devoted to undertaking a comprehensive investigation on attacks towards deep learning, and extensively evaluating these attacks in multiple views. In particular, we focus on four types of attacks associated with security and privacy of deep learning: model extraction attack, model inversion attack, poisoning attack and adversarial attack. For each type of attack, we construct its essential workflow as well as adversary capabilities and attack goals. Many pivot metrics are devised for evaluating the attack approaches, by which we perform a quantitative and qualitative analysis. From the analysis, we have identified significant and indispensable factors in an attack vector, \eg, how to reduce queries to target models, what distance used for measuring perturbation. We spot light on 17 findings covering these approaches' merits and demerits, success probability, deployment complexity and prospects. Moreover, we discuss other potential security weaknesses and possible mitigation which can inspire relevant researchers in this area.
0.912448
0.750821
0.161628