id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.07844 | Gravitational waves from the fragmentation of axion-like particle dark
matter | The misalignment mechanism allows for the efficient, and usually very cold,
production of light scalar bosons, such as axion-like particles (ALPs), making
them an appealing dark matter candidate. However, in certain cases, such as in
the presence of a monodromy, the self-interactions of ALPs can be sufficiently
strong such that the homogeneous field fragments soon after the onset of
oscillations. The resulting large inhomogeneities can lead to the production of
gravitational waves (GWs). We investigate the nonlinear dynamics of
fragmentation, as well as of the subsequent turbulent regime, and calculate the
stochastic GW background that is produced from this process. The GW background
can be enhanced if the time evolution features an extended intermediate phase
of ultrarelativistic dynamics due to a small mass at the bottom of the
potential. Yet, this enhancement is limited by the requirement that the dark
matter remains sufficiently cold. In some cases the resulting GWs may be within
reach of future GW detectors, allowing a complementary probe of this type of
dark matter.
| The detection of particles with only gravitational interactions (Newtorites)
in gravitational bar detectors was studied in 1984 by Bernard, De Rujula and
Lautrup. The negative results of dark matter searches suggest to look to exotic
possibilities like Newtorites. The limits obtained with the Nautilus bar
detector will be presented and the possible improvements will be discussed.
Since the gravitational coupling is very weak, the possible limits are very far
from what is needed for dark matter, but for large masses are the best limits
obtained on the Earth. An update of limits for MACRO particles will be given.
| 0.87835 | 0.750305 | 0.128045 |
2004.07845 | Combined Zeeman and orbital effect on the Josephson effect in rippled
graphene | The two-dimensional nature of graphene Josephson junctions offers the
possibility of creating effective superconductor-ferromagnet-superconductor
junctions with tunable Zeeman splitting caused by an in-plane magnetic field.
Such junctions would be able to alternate between a conventional
superconducting ground state and a ground state with an intrinsic phase
difference, making them controllable $0-\pi$ Josephson junctions. However, in
addition to the Zeeman splitting, an in-plane magnetic field will in general
also produce an orbital effect because of height variations in graphene,
colloquially known as ripples. Both the Zeeman and orbital effect will thus
affect the critical current, so to be able to identify $0-\pi$ transitions it
is necessary to understand their combined effect. From both analytical and
numerical solutions of the Usadel equation we find that ripples can in fact
produce a current response similar to that which is characteristic of a $0-\pi$
transition. Hence, additional analysis is required in order to reveal the
presence of a $0-\pi$ transition caused by spin-splitting in graphene with
ripples. We provide a closed form analytical expression for the critical
current in the presence of exchange field and ripple effects as well as an
expression for the scaling of critical current zeroes with junction parameters.
| Monolayer transition metal dichalcogenides (TMDs) hold great promise for
future information processing applications utilizing a combination of electron
spin and valley pseudospin. This unique spin system has led to observation of
the valley Zeeman effect in neutral and charged excitonic resonances under
applied magnetic fields. However, reported values of the trion valley Zeeman
splitting remain highly inconsistent across studies. Here, we utilize high
quality hBN encapsulated monolayer WSe$_2$ to enable simultaneous measurement
of both intervalley and intravalley trion photoluminescence. We find the valley
Zeeman splitting of each trion state to be describable only by a combination of
three distinct g-factors, one arising from the exciton-like valley Zeeman
effect, the other two, trion specific, g-factors associated with recoil of the
excess electron. This complex picture goes significantly beyond the valley
Zeeman effect reported for neutral excitons, and eliminates the ambiguity
surrounding the magneto-optical response of trions in tungsten based TMD
monolayers.
| 0.867124 | 0.764283 | 0.102841 |
2004.07846 | The Angular Momentum of the Circumgalactic Medium in the TNG100
Simulation | We present an analysis of the angular momentum content of the circumgalactic
medium (CGM) using TNG100, one of the flagship runs of the IllustrisTNG
project. We focus on Milky Way-mass halos ($\sim 10^{12} \; M_{\odot}$) at
$z=0$ but also analyze other masses and redshifts up to $z=5$. We find that the
CGM angular momentum properties are strongly correlated with the stellar
angular momentum of the corresponding galaxy: the CGM surrounding high-angular
momentum galaxies has systematically higher angular momentum and is better
aligned to the rotational axis of the galaxy itself than the CGM surrounding
low-angular momentum galaxies. Both the hot and cold phases of the CGM show
this dichotomy, though it is stronger for colder gas. The CGM of high-angular
momentum galaxies is characterized by a large wedge of cold gas with rotational
velocities at least $\sim1/2$ of the halo's virial velocity extending out to
$\sim 1/2$ of the virial radius, and by biconical polar regions dominated by
radial velocities suggestive of galactic fountains; both of these features are
absent from the CGM of low-angular momentum galaxies. These conclusions are
general to halo masses $\lesssim 10^{12} \; M_{\odot}$ and for $z \lesssim 2$,
but do not apply for more massive halos or at the highest redshift studied. By
comparing simulations run with alterations to the fiducial feedback model, we
identify the better alignment of the CGM to high-angular momentum galaxies as a
feedback-independent effect and the galactic winds as a dominant influence on
the CGM's angular momentum.
| Black holes can be practically located (e.g. in numerical simulations) by
trapping horizons, hypersurfaces foliated by marginal surfaces, and one desires
physically sound measures of their mass and angular momentum. A generically
unique angular momentum can be obtained from the Komar integral by demanding
that it satisfy a simple conservation law. With the irreducible (Hawking) mass
as the measure of energy, the conservation laws of energy and angular momentum
take a similar form, expressing the rate of change of mass and angular momentum
of a black hole in terms of fluxes of energy and angular momentum, obtained
from the matter energy tensor and an effective energy tensor for gravitational
radiation. Adding charge conservation for generality, one can use Kerr-Newman
formulas to define combined energy, surface gravity, angular speed and electric
potential, and derive a dynamical version of the so-called "first law" for
black holes. A generalization of the "zeroth law" to local equilibrium follows.
Combined with an existing version of the "second law", all the key quantities
and laws of the classical paradigm for black holes (in terms of Killing or
event horizons) have now been formulated coherently in a general dynamical
paradigm in terms of trapping horizons.
| 0.861176 | 0.668535 | 0.192641 |
2004.07847 | The Stellar Mass Fundamental Plane: The virial relation and a very thin
plane for slow-rotators | Early-type galaxies -- slow and fast rotating ellipticals (E-SRs and E-FRs)
and S0s/lenticulars -- define a Fundamental Plane (FP) in the space of
half-light radius $R_e$, enclosed surface brightness $I_e$ and velocity
dispersion $\sigma_e$. Since $I_e$ and $\sigma_e$ are distance-independent
measurements, the thickness of the FP is often expressed in terms of the
accuracy with which $I_e$ and $\sigma_e$ can be used to estimate sizes $R_e$.
We show that: 1) The thickness of the FP depends strongly on morphology. If the
sample only includes E-SRs, then the observed scatter in $R_e$ is $\sim 16\%$,
of which only $\sim 9\%$ is intrinsic. Removing galaxies with
$M_*<10^{11}M_\odot$ further reduces the observed scatter to $\sim 13\%$ ($\sim
4\%$ intrinsic). The observed scatter increases to the $\sim 25\%$ usually
quoted in the literature if E-FRs and S0s are added. If the FP is defined using
the eigenvectors of the covariance matrix of the observables, then the E-SRs
again define an exceptionally thin FP, with intrinsic scatter of only $5\%$
orthogonal to the plane. 2) The structure within the FP is most easily
understood as arising from the fact that $I_e$ and $\sigma_e$ are nearly
independent, whereas the $R_e-I_e$ and $R_e-\sigma_e$ correlations are nearly
equal and opposite. 3) If the coefficients of the FP differ from those
associated with the virial theorem the plane is said to be `tilted'. If we
multiply $I_e$ by the global stellar mass-to-light ratio $M_*/L$ and we account
for non-homology across the population by using S\'ersic photometry, then the
resulting stellar mass FP is less tilted. Accounting self-consistently for
$M_*/L$ gradients will change the tilt. The tilt we currently see suggests that
the efficiency of turning baryons into stars increases and/or the dark matter
fraction decreases as stellar surface brightness increases.
| For early-type galaxies, the ability to sustain a corona of hot, X-ray
emitting gas could have played a key role in quenching their star-formation
history. Yet, it is still unclear what drives the precise amount of hot gas
around these galaxies. By combining photometric and spectroscopic measurements
for the early-type galaxies observed during the Atlas3D integral-field survey
with measurements of their X-ray luminosity based on X-ray data of both low and
high spatial resolution we conclude that the hot-gas content of early-type
galaxies can depend on their dynamical structure. Specifically, whereas slow
rotators generally have X-ray halos with luminosity L_X,gas and temperature T
values that are in line with what is expected if the hot-gas emission is
sustained by the thermalisaton of the kinetic energy carried by the
stellar-mass loss material, fast rotators tend to display L_X,gas values that
fall consistently below the prediction of this model, with similar T values
that do not scale with the stellar kinetic energy as observed in the case of
slow rotators. Considering that fast rotators are likely to be intrinsically
flatter than slow rotators, and that the few L_X,gas-deficient slow rotators
also happen to be relatively flat, the observed L_X,gas deficiency in these
objects would support the hypothesis whereby flatter galaxies have a harder
time in retaining their hot gas. We discuss the implications that a different
hot-gas content could have on the fate of both acquired and internally-produced
gaseous material, considering in particular how the L_X,gas deficiency of fast
rotators would make them more capable to recycle the stellar-mass loss material
into new stars than slow rotators. This is consistent with the finding that
molecular gas and young stars are detected only in fast rotators in the Atlas3D
sample, and that fast rotators tend to dustier than slow rotators. [Abridged]
| 0.808587 | 0.74928 | 0.059307 |
2004.07848 | The evolution of stellar triples: The most common evolutionary pathways | Many stars do not live alone, but instead have one or more stellar
companions. Observations show that these binaries, triples and higher-order
multiples are common. Whereas the evolution of single stars and binaries have
been studied extensively, the same is not true for the evolution of stellar
triples. To fill this gap in our general understanding of stellar lives, we aim
to systematically explore the long-term evolution of triples and to map out the
most common evolutionary pathways that triples go through. We quantitatively
study how triples evolve, which processes are most relevant, and how this
differs from binary evolution. We simulate the evolution of several large
populations of triples with a population synthesis approach. We make use of the
triple evolution code TRES to simulate the evolution of each triple in a
consistent way; including three-body dynamics (based on the secular approach),
stellar evolution and their mutual influences. We simulate the evolution of the
system up until mass transfer starts, the system becomes dynamically unstable,
or a Hubble time has passed. We find that stellar interactions are common in
triples. Compared to a binary population, we find that the fraction of systems
that can undergo mass transfer is about 2 to 3 times larger in triples.
Moreover, whereas in binaries the orbits typically reach circularisation before
Roche-lobe overflow, this is not true anymore in triples. In our simulations,
about 40% of systems retain an eccentric orbit. Additionally, we discuss
various channels of triple evolution in detail such as those where the
secondary or the tertiary is the first star to initiate a mass transfer event.
| Darwin's hypothesis that all extant life forms are descendants of a last
common ancestor cell and diversification of life forms results from gradual
mutation plus natural selection represents a mainstream view that has
influenced biology and even society for over a century. However, this Darwinian
view on life is contradicted by many observations and lacks a plausible
physico-chemical explanation. Strong evidence suggests that the common ancestor
cell hypothesis is the most fundamental flaw of Darwinism. By contrast, a
totally different perspective on origin and evolution of life claims that
cellular life forms were descendants of already diversified acellular life
forms. Independently originated life forms evolve largely in some parallel ways
even though they also interact with each other. Some evolutionary "gaps"
naturally exist among evolutionary lines. Similarity may not be the only result
of phylogenetic inheritance but may be a result of a convergent mechanism of
origin and evolution. Evolution is not a random process but follows some basic
physico-chemical principles as a result of the interplay of both energy and
entropy on matter.
| 0.913918 | 0.61552 | 0.298399 |
2004.07849 | Analytic bootstrap and Witten diagrams for the ABJM Wilson line as
defect CFT$_1$ | We study local operator insertions on 1/2-BPS line defects in ABJM theory.
Specifically, we consider a class of four-point correlators in the CFT$_1$ with
SU$(1, 1|3)$ superconformal symmetry defined on the 1/2-BPS Wilson line. The
relevant insertions belong to the short supermultiplet containing the
displacement operator and correspond to fluctuations of the dual fundamental
string in AdS$_4 \times \mathbb{C}\textrm{P}^3$ ending on the line at the
boundary. We use superspace techniques to represent the displacement
supermultiplet and we show that superconformal symmetry determines the
four-point correlators of its components in terms of a single function of the
one-dimensional cross-ratio. Such function is highly constrained by crossing
and internal consistency, allowing us to use an analytical bootstrap approach
to find the first subleading correction at strong coupling. Finally, we use
AdS/CFT to compute the same four-point functions through tree-level AdS$_2$
Witten diagrams, producing a result that is perfectly consistent with the
bootstrap solution.
| We study the cusped Wilson line operators and Bremsstrahlung functions
associated to particles transforming in the rank-$k$ symmetric representation
of the gauge group $U(N)$ for ${\cal N} = 4$ super Yang-Mills. We find the
holographic D3-brane description for Wilson loops with internal cusps in two
different limits: small cusp angle and $k\sqrt{\lambda}\gg N$. This allows for
a non-trivial check of a conjectured relation between the Bremsstrahlung
function and the expectation value of the 1/2 BPS circular loop in the case of
a representation other than the fundamental. Moreover, we observe that in the
limit of $k\gg N$, the cusped Wilson line expectation value is simply given by
the exponential of the 1-loop diagram. Using group theory arguments, this
eikonal exponentiation is conjectured to take place for all Wilson loop
operators in symmetric representations with large $k$, independently of the
contour on which they are supported.
| 0.86822 | 0.797163 | 0.071058 |
2004.07850 | Restoring number conservation in quadratic bosonic Hamiltonians with
dualities | Number-non-conserving terms in quadratic bosonic Hamiltonians can induce
unwanted dynamical instabilities. By exploiting the pseudo-Hermitian structure
built in to these Hamiltonians, we show that as long as dynamical stability
holds, one may always construct a nontrivial dual (unitarily equivalent)
number-conserving quadratic bosonic Hamiltonian. We exemplify this construction
for a gapped harmonic chain and a bosonic analogue to Kitaev's Majorana chain.
Our duality may be used to identify local number-conserving models that
approximate stable bosonic Hamiltonians without the need for parametric
amplification and to implement non-Hermitian $\mathcal{P}\mathcal{T}$-symmetric
dynamics in non-dissipative number-conserving bosonic systems. Implications for
computing topological invariants are addressed.
| We present a nontrivial model system of interacting electrons that can be
solved analytically in the GW approximation. We obtain the particle number from
the GW Green's function strictly analytically, and prove that there is a
genuine violation of particle number conservation if the self-energy is
calculated non-self-consistently from a zeroth order Green's function, as done
in virtually all practical implementations. We also show that a simple shift of
the self-energy that partially restores self-consistency reduces the numerical
deviation significantly.
| 0.887832 | 0.727343 | 0.160489 |
2004.07851 | Flatbands and Mechanical Deformation Effects in the Moir\'e Superlattice
of MoS$_2$-WSe$_2$ Heterobilayers | It has recently been shown that quantum-confined states can appear in
epitaxially grown van der Waals material heterobilayers without a rotational
misalignment ($\theta=0^\circ$), associated with flat bands in the Brillouin
zone of the moir\'e pattern formed due to the lattice mismatch of the two
layers. Peaks in the local density of states and confinement in a
MoS$_2$/WSe$_2$ system was qualitatively described only considering local
stacking arrangements, which cause band edge energies to vary spatially. In
this work, we report the presence of large in-plane strain variation across the
moir\'e unit cell of a $\theta=0^\circ$ MoS$_2$/WSe$_2$ heterobilayer, and show
that inclusion of strain variation and out-of-plane displacement in density
functional theory calculations greatly improves their agreement with the
experimental data. We further explore the role of twist-angle by showing
experimental data for a twisted MoS$_2$/WSe$_2$ heterobilayer structure with
twist angle of $\theta=15^\circ$, that exhibits a moir\'e pattern but no
confinement.
| In this study, terahertz (THz) absorption and transmission of monolayer
MoS$_{2}$ was calculated under different carrier concentrations. Results showed
that the THz absorption of monolayer MoS$_{2}$ is very small even under high
carrier concentrations and large incident angle. Equivalent loss of the THz
absorption is the total sum of reflection and absorption that is one to three
grades lower than that of graphene. The monolayer MoS$_{2}$ transmission is
much larger than that of the traditional GaAs and InAs two-dimensional electron
gas. The field-effect tubular structure formed by the monolayer
MoS$_{2}$-insulation-layer-graphene is investigated. In this structure the THz
absorption of graphene to reach saturation under low voltage. Meantime, the
maximum THz absorption of monolayer MoS$_{2}$ was limited to approximately 5\%.
Thus, monolayer MoS$_{2}$ is a kind of ideal THz Transparent Electrodes.
| 0.89664 | 0.720409 | 0.176231 |
2004.07854 | SCORCH. III. Analytical Models of Reionization with Varying Clumping
Factors | In the Simulations and Constructions of the Reionization of Cosmic Hydrogen
(SCORCH) project, we compare analytical models of the hydrogen ionization
fraction with radiation-hydrodynamic simulations. We derive analytical models
of the mass-weighted hydrogen ionization fraction from the local ionization
balance equations as a more accurate alternative to the widely adopted model
based on the volume filling factor. In particular, our model has a
recombination term quadratic in the ionization fraction, which is consistent
with the two-body interaction nature of recombination. Then, we use the
radiation-hydrodynamic simulations to study the clumping factors needed to
solve the analytical equations, and provide accurate fitting functions. We find
that the ionized hydrogen clumping factors from our radiative transfer
simulations are significantly different than those from other simulations that
use a uniform photoionization background. In addition to redshift dependence,
we also see the dependence of ionized hydrogen clumping factor on ionization
fraction, and we incorporate this into our fits. We calculate the reionization
histories using our analytical models and clumping factors and compare with
widely adopted models, and all of our models achieve $<7\%$ difference from
simulation results while the other models have $>20\%$ deviations. The Thomson
optical depths from reionization calculated from our analytical models result
in $<5\%$ deviation from simulations, while the previous analytical models have
$>20\%$ difference in and could result in biased conclusions of the IGM
reionization.
| Our understanding of population III star formation is still in its infancy.
They are formed in dark matter minihalos of $\rm 10^5-10^6 M_{\odot}$ at
$z=20-30$. Recent high resolution cosmological simulations show that a
protostellar disk forms as a consequence of gravitational collapse and
fragments into multiple clumps. However, it is not entirely clear if these
clumps will be able to survive to form multiple stars as simulations are unable
to follow the disk evolution for longer times. In this study, we employ a
simple analytical model to derive the properties of marginally stable
steady-state disks. Our results show that the stability of the disk depends on
the critical value of the viscous parameter $\alpha$. For $\alpha_{crit} = 1$,
the disk is stable for an accretion rate of $\rm \leq 10^{-3} M_{\odot}/yr$ and
becomes unstable at radii about $\rm \geq 100 AU$ in the presence of an
accretion rate of $\rm 10^{-2} M_{\odot}/yr$. For $0.06 < \alpha_{crit} < 1$,
the disk can be unstable for both accretion rates. The comparison of the
migration and the Kelvin-Helmholtz time scales shows that clumps are expected
to migrate inward before reaching the main sequence. Furthermore, in the
presence of a massive central star the clumps within the central 1 AU will be
tidally disrupted. We also find that UV feedback from the central star is
unable to disrupt the disk, and that photo-evaporation becomes important only
once the accretion rate has dropped to $\rm 2 \times 10^{-4} M_{\odot}/yr$. As
a result, the central star may reach a mass of 100 $\rm M_{\odot}$ or even
higher.
| 0.841464 | 0.698381 | 0.143083 |
2004.07855 | Spherical Bayesian mass-mapping with uncertainties: full sky
observations on the celestial sphere | To date weak gravitational lensing surveys have typically been restricted to
small fields of view, such that the $\textit{flat-sky approximation}$ has been
sufficiently satisfied. However, with Stage IV surveys ($\textit{e.g. LSST}$
and $\textit{Euclid}$) imminent, extending mass-mapping techniques to the
sphere is a fundamental necessity. As such, we extend the sparse hierarchical
Bayesian mass-mapping formalism presented in previous work to the spherical
sky. For the first time, this allows us to construct $\textit{maximum a
posteriori}$ spherical weak lensing dark-matter mass-maps, with principled
Bayesian uncertainties, without imposing or assuming Gaussianty. We solve the
spherical mass-mapping inverse problem in the analysis setting adopting a
sparsity promoting Laplace-type wavelet prior, though this theoretical
framework supports all log-concave posteriors. Our spherical mass-mapping
formalism facilitates principled statistical interpretation of reconstructions.
We apply our framework to convergence reconstruction on high resolution N-body
simulations with pseudo-Euclid masking, polluted with a variety of realistic
noise levels, and show a dramatic increase in reconstruction fidelity compared
to standard approaches. Furthermore we perform the largest joint reconstruction
to date of all publically available shear observational datasets (combining
DESY1, KiDS450 and CFHTLens) and find that our formalism recovers a convergence
map with significantly enhanced small-scale detail. Within our Bayesian
framework we validate, in a statistically rigourous manner, the community's
intuition regarding the need to smooth spherical Kaiser-Squies estimates to
provide physically meaningful convergence maps. Such approaches cannot reveal
the small-scale physical structures that we recover within our framework.
| The data reduction procedure for radio interferometers can be viewed as a
combined calibration and imaging problem. We present an algorithm that unifies
cross-calibration, self-calibration, and imaging. Being a Bayesian method, that
algorithm does not only calculate an estimate of the sky brightness
distribution, but also provides an estimate of the joint uncertainty which
entails both the uncertainty of the calibration and the one of the actual
observation. The algorithm is formulated in the language of information field
theory and uses Metric Gaussian Variational Inference (MGVI) as the underlying
statistical method. So far only direction-independent antenna-based calibration
is considered. This restriction may be released in future work. An
implementation of the algorithm is contributed as well.
| 0.840315 | 0.795903 | 0.044411 |
2004.07857 | Ultimate limit on time signal generation | The generation of time signals is a fundamental task in science. Here we
study the relation between the quality of a time signal and the physics of the
system that generates it. According to quantum theory, any time signal can be
decomposed into individual quanta that lead to single detection events. Our
main result is a bound on how sharply peaked in time these events can be, which
depends on the dimension of the signal generator. This result promises
applications in various directions, including information theory, quantum
clocks, and process simulation.
| In recent years cosmology has undergone a revolution, with precise
measurements of the microwave background radiation, large galaxy redshift
surveys, and the discovery of the recent accelerated expansion of the Universe
using observations of distant supernovae. In this light, the SKA enables us to
do an ultimate test in cosmology by measuring the expansion rate of the
Universe in real time. This can be done by a rather simple experiment of
observing the neutral hydrogen (HI) signal of galaxies at two different epochs.
The signal will encounter a change in frequency imprinted as the Universe
expands over time and thus monitoring the drift in frequencies will provide a
real time measure of the cosmic acceleration. Over a period of 12 years one
would expected a frequency shift of the order of 0.1 Hz assuming a standard
Lambda-CDM cosmology. Based on the sensitivity estimates of the SKA and the
number counts of the expected HI galaxies, it is shown that the number counts
are sufficiently high to compensate for the observational uncertainties of the
measurements and hence allow a statistical detection of the frequency shift.
[abstract abridged]
| 0.807697 | 0.620965 | 0.186732 |
2004.07858 | A Green function approach to topological insulator junctions with
magnetic and superconducting regions | In this work we present a Green function approach, originally implemented in
graphene with well-defined edges, to the surface of a strong 3D topological
insulator (TI) with a sequence of proximitized superconducting (S) and magnetic
(F) surfaces. This approach consist in the calculation of the Green functions
of the system by the analytical derivation of the McMillan's Green functions
for each region and their coupling by a tight-binding Hamiltonian with the
Dyson equation. These functions allow the direct calculation of the
momentum-resolved spectral density of states, the identification of subgap
interface states, and the derivation of the differential conductance for a wide
variety of configurations of the junctions. We illustrate the application of
this method for some simple systems with two and three regions, finding the
characteristic chiral state of the anomalous quantum Hall effect (AQHE) at the
N/F interfaces, and the chiral Majorana modes at the N/S interfaces. Finally we
discuss some geometrical effects present in the three-region junctions such as
weak Fabry-P\'erot resonances and Andreev bound states.
| We consider a Josephson bijunction consisting of a thin $SIS$ $\pi$-Josephson
junction sandwiched between two-dimensional semiconducting layers with strong
Rashba spin-orbit interaction. Each of these layers forms an $SNS$ junction due
to proximity-induced superconductivity. The $SIS$ junction is assumed to be
thin enough such that the two Rashba layers are tunnel-coupled. We show that,
by tuning external gates, this system can be controllably brought into a
time-reversal invariant topological superconducting phase with a Kramers pair
of Majorana bound states being localized at the end of the normal region for a
large parameter phase space. In particular, in the strong spin-orbit
interaction limit, the topological phase can be accessed already in the regime
of small tunneling amplitudes.
| 0.911067 | 0.800453 | 0.110614 |
2004.07859 | Coronavirus (COVID-19): ARIMA based time-series analysis to forecast
near future | COVID-19, a novel coronavirus, is currently a major worldwide threat. It has
infected more than a million people globally leading to hundred-thousands of
deaths. In such grave circumstances, it is very important to predict the future
infected cases to support prevention of the disease and aid in the healthcare
service preparation. Following that notion, we have developed a model and then
employed it for forecasting future COVID-19 cases in India. The study indicates
an ascending trend for the cases in the coming days. A time series analysis
also presents an exponential increase in the number of cases. It is supposed
that the present prediction models will assist the government and medical
personnel to be prepared for the upcoming conditions and have more readiness in
healthcare systems.
| Purpose: To present a method that automatically detects and quantifies
abnormal tomographic patterns commonly present in COVID-19, namely Ground Glass
Opacities (GGO) and consolidations. Given that high opacity abnormalities
(i.e., consolidations) were shown to correlate with severe disease, the paper
introduces two combined severity measures (Percentage of Opacity, Percentage of
High Opacity) and (Lung Severity Score, Lung High Opacity Score). They quantify
the extent of overall COVID-19 abnormalities and the presence of high opacity
abnormalities, global and lobe-wise, respectively, being computed based on 3D
segmentations of lesions, lungs, and lobes. Materials and Methods: The proposed
method takes as input a non-contrasted Chest CT and segments the lesions,
lungs, and lobes in 3D. It outputs two combined measures of the severity of
lung/lobe involvement, quantifying both the extent of COVID-19 abnormalities
and presence of high opacities, based on deep learning and deep reinforcement
learning. The first measure (POO, POHO) is global, while the second (LSS, LHOS)
is lobe-wise. Evaluation is reported on CTs of 100 subjects (50 COVID-19
confirmed and 50 controls) from institutions from Canada, Europe and US. Ground
truth is established by manual annotations of lesions, lungs, and lobes.
Results: Pearson Correlation Coefficient between method prediction and ground
truth is 0.97 (POO), 0.98 (POHO), 0.96 (LSS), 0.96 (LHOS). Automated processing
time to compute the severity scores is 10 seconds/case vs 30 mins needed for
manual annotations. Conclusion: A new method identifies regions of
abnormalities seen in COVID-19 non-contrasted Chest CT and computes (POO, POHO)
and (LSS, LHOS) severity scores.
| 0.83044 | 0.715233 | 0.115206 |
2004.07860 | On the Performance of Non-Orthogonal Multiple Access over Composite
Fading Channels | This paper analyzes the performance of a cooperative relaying non-orthogonal
multiple access (NOMA) network over Fisher-Snedecor F composite fading
channels. Specifically, one base station (BS) is assumed to communicate with
two receiving mobile users with one acting also as a decode-and-forward (DF)
relay. To highlight the achievable performance gains of the NOMA scheme,
conventional relaying with orthogonal multiple access (OMA) is also analyzed.
For the two systems under consideration, we derive novel exact closed-form
expressions for the ergodic capacity along with the corresponding asymptotic
representations. The derived expressions are then used to assess the influence
of various system parameters, including the fading and shadowing parameters, on
the performance of both the NOMA and OMA systems. Monte-Carlo simulation are
provided throughout to verify the accuracy of our analysis. Results reveal that
the NOMA system can considerably outperform the OMA approach when the power
allocation factor is carefully selected. It is also shown that as the fading
and/or shadowing parameters are increased, the ergodic capacity performance
enhances.
| Intelligent reflecting surface (IRS) is a promising technology to enhance the
coverage and performance of wireless networks. We consider the application of
IRS to non-orthogonal multiple access (NOMA), where a base station transmits
superposed signals to multiple users by the virtue of an IRS. The performance
of an IRS-assisted NOMA networks with imperfect successive interference
cancellation (ipSIC) and perfect successive interference cancellation (pSIC) is
investigated by invoking 1-bit coding scheme. In particular, we derive new
exact and asymptotic expressions for both outage probability and ergodic rate
of the m-th user with ipSIC/pSIC. Based on analytical results, the diversity
order of the m-th user with pSIC is in connection with the number of reflecting
elements and channel ordering. The high signal-to-noise radio (SNR) slope of
ergodic rate for the $m$-th user is obtained. The throughput and energy
efficiency of non-orthogonal users for IRS-NOMA are discussed both in
delay-limited and delay-tolerant transmission modes. Additionally, we derive
new exact expressions of outage probability and ergodic rate for IRS-assisted
orthogonal multiple access (IRS-OMA). Numerical results are presented to
substantiate our analyses and demonstrate that: i) The outage behaviors of
IRS-NOMA are superior to that of IRS-OMA and relaying schemes; ii) With
increasing the number of reflecting elements, IRS-NOMA is capable of achieving
enhanced outage performance; and iii) The M-th user has a larger ergodic rate
compared to IRS-OMA and benchmarks. However, the ergodic performance of the
$m$-th user exceeds relaying schemes in the low SNR regime.
| 0.862419 | 0.826142 | 0.036276 |
2004.07861 | The Co-Production of Service: Modeling Service Times in Contact Centers
Using Hawkes Processes | In customer support centers, a successful service interaction involves a
dialogue between a customer and an agent. Both parties depend on one another
for information and problem solving, and this interaction defines a co-produced
service process. In this paper, we propose, develop, and compare new stochastic
models for the co-production of service in a contact center. Using insights
from service communication data, we model the service interactions using
self-exciting and mutually exciting bivariate Hawkes processes, so that a
correspondence from one party increases the likelihood of a response from the
other party soon after. Moreover, our models incorporate both dynamic busyness
factors that depend on the agent workload as well as dynamic factors that
depend on the inner-mechanics of the interaction. To understand how well our
Hawkes models describe the message-timestamps, we compare the goodness-of-fit
of these models on contact center data from industry. We show that the
word-count bivariate Hawkes model, which takes into account the mutual
interaction and the amount of information provided by each party, fits the data
the best. In addition to a great goodness-of-fit, the Hawkes models allow us to
construct explicit expressions for the relationship between the correspondence
rates of each party and the conversation progress. These formulae illustrate
that the agent is more dominant in pacing the service along in the short term,
but that the customer has a more profound effect on the duration of the
conversation in the long run. Finally, we use our models to predict the future
level of activity within a given conversation, through which we find that the
bivariate Hawkes processes that incorporate the amount of information provided
by each party or the sentiment expressed by the customer give us the most
accurate predictions.
| Service-Oriented Applications (SOA) are being regarded as the main pragmatic
solution for distributed environments. In such systems, however each service
responds the user request independently, it is essential to compose them for
delivering a compound value-added service. Since, there may be a number of
compositions to create the requested service, it is important to find one which
its properties are close to user's desires and meet some non-functional
constraints and optimize criteria such as overall cost or response time. In
this paper, a user-centric approach is presented for evaluating the service
compositions which attempts to obtain the user desires. This approach uses
fuzzy logic in order to inference based on quality criteria ranked by user and
Genetic Algorithms to optimize the QoS-aware composition problem. Results show
that the Fuzzy-based Genetic algorithm system enables user to participate in
the process of web service composition easier and more efficient.
| 0.887554 | 0.698182 | 0.189371 |
2004.07862 | Pursuing quantum difference equations I: stable envelopes of
subvarieties | Let $X$ be a symplectic variety equipped with an action of a torus $A$. Let
$\nu \subset A$ be a finite cyclic subgroup. We show that K-theoretic stable
envelope of subvarieties $X^{\nu}\subset X$ can be obtained via various limits
of the elliptic stable envelopes of $X$. An example of $X$ given by the Hilbert
scheme of points in the complex plane is considered in details.
| In the moduli space of degree d polynomials, the special subvarieties are
those cut out by critical orbit relations, and then the special points are the
post-critically finite polynomials. It was conjectured that in the moduli space
of degree d polynomials, the subvarieties containing a Zariski-dense set of
special points are exactly these special subvarieties. In this article, we
prove the first non-trivial case for this conjecture: the case of cubic
polynomials.
| 0.771601 | 0.679315 | 0.092286 |
2004.07863 | Degenerate Fermion Dark Matter from a Broken $U(1)_{\rm B-L}$ Gauge
Symmetry | The extension of the Standard model by assuming $U(1)_{\rm B-L}$ gauge
symmetry is very well-motivated since it naturally explains the presence of
heavy right-handed neutrinos required to account for the small active neutrino
masses via the seesaw mechanism and thermal leptogenesis. Traditionally, we
introduce three right handed neutrinos to cancel the $[U(1)_{\rm B-L}]^3$
anomaly. However, it suffices to introduce two heavy right-handed neutrinos for
these purposes and therefore we can replace one right-handed neutrino by new
chiral fermions to cancel the $U(1)_{\rm B-L}$ gauge anomaly. Then, one of the
chiral fermions can naturally play a role of a dark matter candidate. In this
paper, we demonstrate how this framework produces a dark matter candidate which
can address the so-called "core-cusp problem". As one of the small scale
problems that $\Lambda$CDM paradigm encounters, it may imply an important clue
for a nature of dark matter. One of resolutions among many is hypothesizing
that sub-keV fermion dark matter halos in dwarf spheroidal galaxies are in
(quasi) degenerate configuration. We show how the degenerate sub-keV fermion
dark matter candidate can be non-thermally originated in our model and thus can
be consistent with Lyman-$\alpha$ forest observation. Thereby, the small
neutrino mass, baryon asymmetry, and the sub-keV dark matter become
consequences of the broken B-L gauge symmetry.
| We argue that, in the presence of anomalous $U(1)$ symmetries, the invariance
of Lagrangian including the standard model (SM) under the axionic shift
symmetries requires a necessary condition $\sum_i\delta^{\rm GS}_{i}\leq2N_f$,
where $N_f$ stands for the number of families in the SM and $\delta^{\rm GS}_i$
(Green-Schwarz parameter) characterizes the coupling of the anomalous $U(1)$
gauge boson to the corresponding axion. In turn, we show that in order for the
usual $B+L$ violating sphaleron process to be valid a necessary condition
$\sum_i\delta^{\rm GS}_{i}<2N_f$ is required, where $B(L)$ stands for the
baryon(lepton) number.
| 0.834361 | 0.80435 | 0.030011 |
2004.07864 | A Neural Architecture Search based Framework for Liquid State Machine
Design | Liquid State Machine (LSM), also known as the recurrent version of Spiking
Neural Networks (SNN), has attracted great research interests thanks to its
high computational power, biological plausibility from the brain, simple
structure and low training complexity. By exploring the design space in network
architectures and parameters, recent works have demonstrated great potential
for improving the accuracy of LSM model with low complexity. However, these
works are based on manually-defined network architectures or predefined
parameters. Considering the diversity and uniqueness of brain structure, the
design of LSM model should be explored in the largest search space possible. In
this paper, we propose a Neural Architecture Search (NAS) based framework to
explore both architecture and parameter design space for automatic
dataset-oriented LSM model. To handle the exponentially-increased design space,
we adopt a three-step search for LSM, including multi-liquid architecture
search, variation on the number of neurons and parameters search such as
percentage connectivity and excitatory neuron ratio within each liquid.
Besides, we propose to use Simulated Annealing (SA) algorithm to implement the
three-step heuristic search. Three datasets, including image dataset of MNIST
and NMNIST and speech dataset of FSDD, are used to test the effectiveness of
our proposed framework. Simulation results show that our proposed framework can
produce the dataset-oriented optimal LSM models with high accuracy and low
complexity. The best classification accuracy on the three datasets is 93.2%,
92.5% and 84% respectively with only 1000 spiking neurons, and the network
connections can be averagely reduced by 61.4% compared with a single LSM.
Moreover, we find that the total quantity of neurons in optimal LSM models on
three datasets can be further reduced by 20% with only about 0.5% accuracy
loss.
| Neural machine translation aims at building a single large neural network
that can be trained to maximize translation performance. The encoder-decoder
architecture with an attention mechanism achieves a translation performance
comparable to the existing state-of-the-art phrase-based systems on the task of
English-to-French translation. However, the use of large vocabulary becomes the
bottleneck in both training and improving the performance. In this paper, we
propose an efficient architecture to train a deep character-level neural
machine translation by introducing a decimator and an interpolator. The
decimator is used to sample the source sequence before encoding while the
interpolator is used to resample after decoding. Such a deep model has two
major advantages. It avoids the large vocabulary issue radically; at the same
time, it is much faster and more memory-efficient in training than conventional
character-based models. More interestingly, our model is able to translate the
misspelled word like human beings.
| 0.834277 | 0.623505 | 0.210772 |
2004.07865 | PRASSE -- The Pulsar Automated Search Script Ensemble | The search for pulsars produces a massive amount of data which needs to be
processed and analyzed. The limited speed of manual observation necessitates
the involvement of large numbers of people to keep up with data collection.
This paper turns to the automated alternative by examining the methodology of
an algorithm built to automatically filter through processed and reduced data,
which then presents the most promising data to human observers for confirmation
and more complex analysis. The benefits and shortcomings of this algorithm are
examined while explaining plans for future testing.
| Today's JavaScript applications are composed of scripts from different
origins that are loaded at run time. As not all of these origins are equally
trusted, the execution of these scripts should be isolated from one another.
However, some scripts must access the application state and some may be allowed
to change it, while preserving the confidentiality and integrity constraints of
the application.
This paper presents design and implementation of DecentJS, a
language-embedded sandbox for full JavaScript. It enables scripts to run in a
configurable degree of isolation with fine-grained access control. It provides
a transactional scope in which effects are logged for review by the access
control policy. After inspection of the log, effects can be committed to the
application state or rolled back.
The implementation relies on JavaScript proxies to guarantee full
interposition for the full language and for all code, including dynamically
loaded scripts and code injected via eval. Its only restriction is that scripts
must be compliant with JavaScript's strict mode.
| 0.838892 | 0.608616 | 0.230276 |
2004.07866 | The XXL Survey XLIV. Sunyaev-Zel'dovich mapping of a low-mass cluster at
z~1: a multi-wavelength approach | In this paper, we present resolved observations of the Sunyaev-Zel'dovich
(SZ) effect, obtained with the NIKA2 camera, towards the cluster of galaxies
XLSSC102, a relatively low-mass system ($M_{500} \sim 2 \times 10^{14}$
M$_{\odot}$) at $z = 0.97$ detected from the XXL survey. We combine NIKA2 SZ
data, XMM-Newton X-ray data, and Megacam optical data to explore, respectively,
the spatial distribution of the gas electron pressure, the gas density, and the
galaxies themselves. We find significant offsets between the X-ray peak, the SZ
peak, the brightest cluster galaxy, and the peak of galaxy density.
Additionally, the galaxy distribution and the gas present elongated
morphologies. This is interpreted as the sign of a recent major merging event,
which induced a local boost of the gas pressure towards the north of XLSSC102
and stripped the gas out of the galaxy group. The NIKA2 data are also combined
with XXL data to construct the thermodynamic profiles of XLSSC102, obtaining
relatively tight constraints up to about $\sim r_{500}$, and revealing
properties that are typical of disturbed systems. We also explore the impact of
the cluster centre definition and the implication of local pressure
substructure on the recovered profiles. Finally, we derive the global
properties of XLSSC102 and compare them to those of high-mass-and-low-redshift
systems, finding no strong evidence for non-standard evolution. We also use
scaling relations to obtain alternative mass estimates from our profiles. The
variation between these different mass estimates reflects the difficulty to
accurately measure the mass of low-mass clusters at z$\sim$1, especially with
low signal-to-noise ratio (S/N) data and for a disturbed system. However, it
also highlights the strength of resolved SZ observations alone and in
combination with survey-like X-ray data.
| We introduce a new statistic to measure more accurately the cosmic sound
speed of clusters of galaxies at different redshifts. This statistic is
evaluated by cross-correlating cosmic microwave background (CMB) fluctuations
caused by the Sunyaev-Zel'dovich effect from observed clusters of galaxies with
their redshifts. When clusters are distributed in redshift bins of narrow
width, one could measure the mean squared cluster peculiar velocity with an
error \sigma_{C_S^2}\lsim (300{\rm km/s})^2. This can be done around z>0.3 with
clusters of flux above 200 mJy which will be detected by PLANCK, coupled with
high resolution microwave images to eliminate the cosmological part of the CMB
fluctuations. The latter can be achieved with observations by the planned ALMA
array or the NSF South Pole telescope and other surveys. By measuring the
cosmic sound speed and the bulk flow in, e.g., 4 spheres of ~ 100h^{-1}Mpc at
z=0.3, we could have a direct measurement of the matter density
0.21<\Omega_m<0.47 at 95 % confidence level.
| 0.850665 | 0.772203 | 0.078462 |
2004.07867 | Testing $F(Q)$ gravity with redshift space distortions | A Bayesian statistical analysis using redshift space distortions data is
performed to test a model of Symmetric Teleparallel Gravity where gravity is
non-metrical. The cosmological background mimics a $\Lambda$CDM evolution but
differences arise in the perturbations. The linear matter fluctuations are
numerically evolved and the study of the growth rate of structures is analysed
in this cosmological setting. The best fit parameters reveal that the
$\sigma_8$ tension between Planck and Large Scale Structure data can be
alleviated within this framework.
| Under a condition of the Calderon type on $\varphi$, we show that a
homeomorphism $f$ of finite distortion in $W^{1,\varphi}_{\rm loc}$ and, in
particular, $f\in W^{1,q}_{\rm loc}$ for $q>n-1$ in ${\Bbb R}^n$, $n\ge 3$, is
a lower $Q$-homeomorphisms with respect to the $p$-modulus with $\left[
K_{I,\alpha}(x,f)\right]^{\beta}$, $p>n-1$ and a ring $Q_{*}$-homeomorphism
with respect to the $\frac{p}{p-n+1}$-modulus with $Q_{*}(x)=K_{I,\alpha}(x,f)$
where $ K_{I,\alpha}(x,f)$ is its inner $\alpha$-dilatation and
$\alpha=\frac{p}{p-n+1}$, $\beta=\frac{p-n+1}{n-1}$.
| 0.794064 | 0.646797 | 0.147267 |
2004.07869 | Entanglement is Necessary for Optimal Quantum Property Testing | There has been a surge of progress in recent years in developing algorithms
for testing and learning quantum states that achieve optimal copy complexity.
Unfortunately, they require the use of entangled measurements across many
copies of the underlying state and thus remain outside the realm of what is
currently experimentally feasible. A natural question is whether one can match
the copy complexity of such algorithms using only independent---but possibly
adaptively chosen---measurements on individual copies.
We answer this in the negative for arguably the most basic quantum testing
problem: deciding whether a given $d$-dimensional quantum state is equal to or
$\epsilon$-far in trace distance from the maximally mixed state. While it is
known how to achieve optimal $O(d/\epsilon^2)$ copy complexity using entangled
measurements, we show that with independent measurements,
$\Omega(d^{4/3}/\epsilon^2)$ is necessary, even if the measurements are chosen
adaptively. This resolves a question of Wright. To obtain this lower bound, we
develop several new techniques, including a chain-rule style proof of
Paninski's lower bound for classical uniformity testing, which may be of
independent interest.
| In quantum networking, repeater hijacking menaces the security and utility of
quantum applications. To deal with this problem, it is important to take a
measure of the impact of quantum repeater hijacking. First, we quantify the
workload of each quantum repeater with regards to each quantum communication.
Based on this, we show the costs for repeater hijacking detection using
distributed quantum state tomography and the amount of work loss and rerouting
penalties caused by hijacking. This quantitive evaluation covers both
purification-entanglement swapping and quantum error correction repeater
networks. Naive implementation of the checks necessary for correct network
operation can be subverted by a single hijacker to bring down an entire
network. Fortunately, the simple fix of randomly assigned testing can prevent
such an attack.
| 0.84421 | 0.75578 | 0.08843 |
2004.07870 | Effects of Non-Conformal Boundary on Entanglement Entropy | Spacetime boundaries with canonical Neuman or Dirichlet conditions preserve
conformal invarience, but "mixed" boundary conditions which interpolate
linearly between them can break conformal symmetry and generate interesting
Renormalization Group flows even when a theory is free, providing soluble
models with nontrivial scale dependence. We compute the (Rindler) entanglement
entropy for a free scalar field with mixed boundary conditions in half
Minkowski space and in Anti-de Sitter space. In the latter case we also compute
an additional geometric contribution, which according to a recent proposal then
collectively give the 1/N corrections to the entanglement entropy of the
conformal field theory dual. We obtain some perturbatively exact results in
both cases which illustrate monotonic interpolation between ultraviolet and
infrared fixed points. This is consistent with recent work on the
irreversibility of renormalization group, allowing some assessment of the
aforementioned proposal for holographic entanglement entropy and illustrating
the generalization of the g-theorem for boundary conformal field theory.
| Using the Ryu-Takayanagi conjectured formula for entanglement entropy in the
context of gauge-gravity duality, we investigate properties of mutual
information between two disjoint rectangular sub-systems in finite temperature
relativistic conformal field theories in d-spacetime dimensions and
non-relativistic scale-invariant theories in some generic examples. In all
these cases mutual information undergoes a transition beyond which it is
identically zero. We study this transition in detail and find universal
qualitative features for the above class of theories which has holographic dual
descriptions. We also obtain analytical results for mutual information in the
specific regime of the parameter space. This demonstrates that mutual
information contains the quantum entanglement part of the entanglement entropy,
which is otherwise dominated by the thermal entropy at large temperatures.
| 0.845746 | 0.813883 | 0.031863 |
2004.07871 | Parameterizing uncertainty by deep invertible networks, an application
to reservoir characterization | Uncertainty quantification for full-waveform inversion provides a
probabilistic characterization of the ill-conditioning of the problem,
comprising the sensitivity of the solution with respect to the starting model
and data noise. This analysis allows to assess the confidence in the candidate
solution and how it is reflected in the tasks that are typically performed
after imaging (e.g., stratigraphic segmentation following reservoir
characterization). Classically, uncertainty comes in the form of a probability
distribution formulated from Bayesian principles, from which we seek to obtain
samples. A popular solution involves Monte Carlo sampling. Here, we propose
instead an approach characterized by training a deep network that "pushes
forward" Gaussian random inputs into the model space (representing, for
example, density or velocity) as if they were sampled from the actual posterior
distribution. Such network is designed to solve a variational optimization
problem based on the Kullback-Leibler divergence between the posterior and the
network output distributions. This work is fundamentally rooted in recent
developments for invertible networks. Special invertible architectures, besides
being computational advantageous with respect to traditional networks, do also
enable analytic computation of the output density function. Therefore, after
training, these networks can be readily used as a new prior for a related
inversion problem. This stands in stark contrast with Monte-Carlo methods,
which only produce samples. We validate these ideas with an application to
angle-versus-ray parameter analysis for reservoir characterization.
| For discrete-time systems, governed by Kraus maps, the work of D. Petz has
characterized the set of universal contraction metrics. In the present paper,
we use this characterization to derive a set of quadratic Lyapunov functions
for continuous-time systems, governed by Lindblad differential equations, that
have a steady-state with full rank. An extremity of this set is given by the
Bures metric, for which the quadratic Lyapunov function is obtained by
inverting a Sylvester equation. We illustrate the method by providing a strict
Lyapunov function for a Lindblad equation designed to stabilize a quantum
electrodynamic "cat" state by reservoir engineering. In fact we prove that any
Lindblad equation on the Hilbert space of the (truncated) harmonic oscillator,
which has a full-rank equilibrium and which has, among its decoherence
channels, a channel corresponding to the photon loss operator, globally
converges to that equilibrium.
| 0.872618 | 0.629978 | 0.24264 |
2004.07872 | Discrete symmetries in the cluster shell model | The role of discrete (or point-group) symmetries is discussed in the
framework of the Cluster Shell Model which describes the splitting of
single-particle levels in the deformed field of cluster potentials. We discuss
the classification of the eigenstates for the cases of a triangular and
tetrahedral configuration of alpha-particles in terms of the irreducible
representations of the double point groups D'(3h) and T'(d), respectively, and
show how the discrete symmetry of a given eigenstate can be determined.
Finally, we derive the Coriolis coupling for each one of these geometrical
configurations.
| It is shown that during the motion of two initially gravitationally bound
spherical shells, consisting of point particles moving along ballistic
trajectories, one of the shell may be expelled to infinity at subrelativistic
speed $v_{exp}\leq 0.25 c$. The problem is solved in Newtonian gravity. Motion
of two intersecting shells in the case when they do not runaway shows a chaotic
behaviour. We hope that this toy and oversimplyfied model can give nevertheless
a qualitative idea on the nature of the mechanism of matter outbursts from the
dense stellar clusters.
| 0.889024 | 0.692431 | 0.196593 |
2004.07873 | A Heuristics-based Home Energy Management System for Demand Response | The so-called Internet of Things (IoT) and advanced communication
technologies have already demonstrated a great potential to manage residential
energy resources via demand-side management. This work presents a home energy
management system in that focused on the energy reallocation problem where
consumers shall shift their energy consumption patterns away from peak periods
and/or high electricity prices. Our solution differentiates residential loads
into two categories: (i) fixed power appliances and (ii) flexible ones.
Therefrom, we formulate our problem as a constraint optimization problem, which
is non-linear and cannot be mathematically solved in closed-form. We then
employ and compare two well-known heuristics, the genetic algorithm (GA) and
the harmony search algorithm (HSA), to minimize electricity expense and peak to
average ratio. These two approaches are compared to the case where no
reallocation happens. Our numerical results show that both methods; GAand HSA
can effectively reduce the electricity cost by 0.9%, 3.98%, and PAR by 15%,
5.8%, respectively
| We propose a contextual-bandit approach for demand side management by
offering price incentives. More precisely, a target mean consumption is set at
each round and the mean consumption is modeled as a complex function of the
distribution of prices sent and of some contextual variables such as the
temperature, weather, and so on. The performance of our strategies is measured
in quadratic losses through a regret criterion. We offer $T^{2/3}$ upper bounds
on this regret (up to poly-logarithmic terms)---and even faster rates under
stronger assumptions---for strategies inspired by standard strategies for
contextual bandits (like LinUCB, see Li et al., 2010). Simulations on a real
data set gathered by UK Power Networks, in which price incentives were offered,
show that our strategies are effective and may indeed manage demand response by
suitably picking the price levels.
| 0.853685 | 0.713967 | 0.139717 |
2004.07874 | Statistical mechanical constitutive theory of polymer networks: the
inextricable links between distribution, behavior, and ensemble | A fundamental theory is presented for the mechanical response of polymer
networks undergoing large deformation which seamlessly integrates statistical
mechanical principles with macroscopic thermodynamic constitutive theory. Our
formulation permits the consideration of arbitrary polymer chain behaviors when
interactions among chains may be neglected. This careful treatment highlights
the naturally occurring correspondence between single-chain mechanical behavior
and the equilibrium distribution of chains in the network, as well as the
correspondences between different single-chain thermodynamic ensembles. We
demonstrate these important distinctions with the extensible freely jointed
chain model. This statistical mechanical theory is then extended to the
continuum scale, where we utilize traditional macroscopic constitutive theory
to ultimately retrieve the Cauchy stress in terms of the deformation and
polymer network statistics. Once again using the extensible freely jointed
chain model, we illustrate the importance of the naturally occurring
statistical correspondences through their effects on the stress-stretch
response of the network. We additionally show that these differences vanish
when the number of links in the chain becomes sufficiently large enough, and
discuss why certain methods perform better than others before this limit is
reached.
| A polymer-chain network is a collection of interconnected polymer-chains,
made themselves of the repetition of a single pattern called a monomer. Our
first main result establishes that, for a class of models for polymer-chain
networks, the thermodynamic limit in the canonical ensemble yields a
hyperelastic model in continuum mechanics. In particular, the discrete
Helmholtz free energy of the network converges to the infimum of a continuum
integral functional (of an energy density depending only on the local
deformation gradient) and the discrete Gibbs measure converges (in the sense of
a large deviation principle) to a measure supported on minimizers of the
integral functional. Our second main result establishes the small temperature
limit of the obtained continuum model (provided the discrete Hamiltonian is
itself independent of the temperature), and shows that it coincides with the
$\Gamma$-limit of the discrete Hamiltonian, thus showing that thermodynamic and
small temperature limits commute. We eventually apply these general results to
a standard model of polymer physics from which we derive nonlinear elasticity.
We moreover show that taking the $\Gamma$-limit of the Hamiltonian is a good
approximation of the thermodynamic limit at finite temperature in the regime of
large number of monomers per polymer-chain (which turns out to play the role of
an effective inverse temperature in the analysis).
| 0.927142 | 0.861004 | 0.066137 |
2004.07875 | Statistical learning in Wasserstein space | We seek a generalization of regression and principle component analysis (PCA)
in a metric space where data points are distributions metrized by the
Wasserstein metric. We recast these analyses as multimarginal optimal transport
problems. The particular formulation allows efficient computation, ensures
existence of optimal solutions, and admits a probabilistic interpretation over
the space of paths (line segments). Application of the theory to the
interpolation of empirical distributions, images, power spectra, as well as
assessing uncertainty in experimental designs, is envisioned.
| We define a simple obstruction to Yu's property A that we call $k$-prisms.
This structure allows for a straightforward proof that the space of persistence
diagrams fails to have property A in a Wasserstein metric.
| 0.807598 | 0.639061 | 0.168537 |
2004.07876 | Reach-SDP: Reachability Analysis of Closed-Loop Systems with Neural
Network Controllers via Semidefinite Programming | There has been an increasing interest in using neural networks in closed-loop
control systems to improve performance and reduce computational costs for
on-line implementation. However, providing safety and stability guarantees for
these systems is challenging due to the nonlinear and compositional structure
of neural networks. In this paper, we propose a novel forward reachability
analysis method for the safety verification of linear time-varying systems with
neural networks in feedback interconnection. Our technical approach relies on
abstracting the nonlinear activation functions by quadratic constraints, which
leads to an outer-approximation of forward reachable sets of the closed-loop
system. We show that we can compute these approximate reachable sets using
semidefinite programming. We illustrate our method in a quadrotor example, in
which we first approximate a nonlinear model predictive controller via a deep
neural network and then apply our analysis tool to certify finite-time
reachability and constraint satisfaction of the closed-loop system.
| To perform multi-user multiple-input and multiple-output transmission in
millimeter-wave(mmWave) cellular systems, the high-dimensional channels need to
be estimated for designing the multi-user precoder. Conventional grid-based
compressed sensing (CS) methods for mmWave channel estimation suffer from the
basis mismatch problem, which prevents accurate channel reconstruction and
degrades the precoding performance. This paper formulates mmWave channel
estimation as an Atomic Norm Minimization (ANM) problem. In contrast to
grid-based CS methods which use discrete dictionaries, ANM uses a continuous
dictionary for representing the mmWave channel. We consider a continuous
dictionary based on sub-sampling in the antenna domain via a small number of
radio frequency chains. We show that mmWave channel estimation using ANM can be
formulated as a semidefinite programming (SDP) problem, and the user channel
can be accurately estimated via off-the-shelf SDP solvers in polynomial time.
Simulation results indicate that ANM can achieve much better estimation
accuracy compared to grid-based CS, and significantly improves the spectral
efficiency provided by multi-user precoding.
| 0.873392 | 0.593575 | 0.279817 |
2004.07877 | AuthCODE: A Privacy-preserving and Multi-device Continuous
Authentication Architecture based on Machine and Deep Learning | The authentication field is evolving towards mechanisms able to keep users
continuously authenticated without the necessity of remembering or possessing
authentication credentials. While existing continuous authentication systems
have demonstrated their suitability for single-device scenarios, the Internet
of Things and next generation of mobile networks (5G) are enabling novel
multi-device scenarios -- such as Smart Offices -- where continuous
authentication is still an open challenge. The paper at hand, proposes an
AI-based, privacy-preserving and multi-device continuous authentication
architecture called AuthCODE. A realistic Smart Office scenario with several
users, interacting with their mobile devices and personal computer, has been
used to create a set of single- and multi-device behavioural datasets and
validate AuthCODE. A pool of experiments with machine and deep learning
classifiers measured the impact of time in authentication accuracy and improved
the results of single-device approaches by considering multi-device behaviour
profiles. The f1-score average reached for XGBoost on multi-device profiles
based on 1-minute windows was 99.33%, while the best performance achieved for
single devices was lower than 97.39%. The inclusion of temporal information in
the form of vector sequences classified by a Long-Short Term Memory Network,
allowed the identification of additional complex behaviour patterns associated
to each user, resulting in an average f1-score of 99.02% on identification of
long-term behaviours.
| Performance of the existing physical layer authentication schemes could be
severely affected by the imperfect estimates and variations of the
communication link attributes used. The commonly adopted static hypothesis
testing for physical layer authentication faces significant challenges in
time-varying communication channels due to the changing propagation and
interference conditions, which are typically unknown at the design stage. To
circumvent this impediment, we propose an adaptive physical layer
authentication scheme based on machine-learning as an intelligent process to
learn and utilize the complex and time-varying environment, and hence to
improve the reliability and robustness of physical layer authentication.
Explicitly, a physical layer attribute fusion model based on a kernel machine
is designed for dealing with multiple attributes without requiring the
knowledge of their statistical properties. By modeling the physical layer
authentication as a linear system, the proposed technique directly reduces the
authentication scope from a combined N-dimensional feature space to a single
dimensional (scalar) space, hence leading to reduced authentication complexity.
By formulating the learning (training) objective of the physical layer
authentication as a convex problem, an adaptive algorithm based on kernel
least-mean-square is then proposed as an intelligent process to learn and track
the variations of multiple attributes, and therefore to enhance the
authentication performance. Both the convergence and the authentication
performance of the proposed intelligent authentication process are
theoretically analyzed. Our simulations demonstrate that our solution
significantly improves the authentication performance in time-varying
environments.
| 0.878036 | 0.737098 | 0.140939 |
2004.07878 | History matching with probabilistic emulators and active learning | The scientific understanding of real-world processes has dramatically
improved over the years through computer simulations. Such simulators represent
complex mathematical models that are implemented as computer codes which are
often expensive. The validity of using a particular simulator to draw accurate
conclusions relies on the assumption that the computer code is correctly
calibrated. This calibration procedure is often pursued under extensive
experimentation and comparison with data from a real-world process. The problem
is that the data collection may be so expensive that only a handful of
experiments are feasible. History matching is a calibration technique that,
given a simulator, it iteratively discards regions of the input space using an
implausibility measure. When the simulator is computationally expensive, an
emulator is used to explore the input space. In this paper, a Gaussian process
provides a complete probabilistic output that is incorporated into the
implausibility measure. The identification of regions of interest is
accomplished with recently developed annealing sampling techniques. Active
learning functions are incorporated into the history matching procedure to
refocus on the input space and improve the emulator. The efficiency of the
proposed framework is tested in well-known examples from the history matching
literature, as well as in a proposed testbed of functions of higher dimensions.
| In this paper we study the problem of identifying active subcarriers in an
OFDM signal from compressive measurements sampled at sub-Nyquist rate. The
problem is of importance in Cognitive Radio systems when secondary users (SUs)
are looking for available spectrum opportunities to communicate over them while
sensing at Nyquist rate sampling can be costly or even impractical in case of
very wide bandwidth. We first study the effect of timing offset and derive the
necessary and sufficient conditions for signal recovery in the oracle-assisted
case when the true active sub-carriers are assumed known. Then we propose an
Orthogonal Matching Pursuit (OMP)-based joint sparse recovery method for
identifying active subcarriers when the timing offset is known. Finally we
extend the problem to the case of unknown timing offset and develop a joint
dictionary learning and sparse approximation algorithm, where in the dictionary
learning phase the timing offset is estimated and in the sparse approximation
phase active subcarriers are identified. The obtained results demonstrate that
active subcarrier identification can be carried out reliably, by using the
developed framework.
| 0.80621 | 0.60777 | 0.198439 |
2004.07880 | A Common Origin of Neutrino Masses and $R_{D^{(\ast)}}$,
$R_{K^{(\ast)}}$ Anomalies | In this work, we present a solution to the persistent tensions in the decay
observables $R_{D^{(\ast)}}$ and $R_{K^{(\ast)}}$ by introducing a $SU(2)_L$
doublet and a $SU(2)_L$ triplet scalar leptoquarks (LQs) that reside at the TeV
energy scale. Neutrinos that remain massless in the Standard Model receive
naturally small masses at one-loop level via the propagation of the same LQs
inside the loop. Such a common origin of apparently disjoint phenomenological
observations is appealing, and we perform a comprehensive analysis of this
set-up. We identify the minimal Yukawa textures required to accommodate these
flavor anomalies and to successfully incorporate neutrino oscillation data
while being consistent with all experimental constraints. This scenario can be
experimentally probed and has the potential to be discovered or falsified by
future improved measurements in the lepton flavor violating processes. Proper
explanations of these flavor anomalies predict TeV scale LQs that are directly
accessible at the LHC.
| We discuss the possibility of using the observables deduced from the angular
distribution of the $B\to D^{(\ast)} \ell\bar{\nu}$ decays to test the effects
of lepton flavor universality violation (LFUV). We show that the measurement of
even a subset of these observables could be very helpful in distinguishing the
Lorentz structure of the New Physics contributions to these decays. To do so we
use the low energy effective theory in which besides the Standard Model
contribution we add all possible Lorentz structures with the couplings (Wilson
coefficients) that are determined by matching theory with the measured ratios
$R{(D^{(\ast)})}^\mathrm{exp}$. We argue that even in the situation in which
the measured $R{(D^{(\ast)})}^\mathrm{exp}$ becomes fully compatible with the
Standard Model, one can still have significant New Physics contributions the
size of which could be probed by measuring the observables discussed in this
paper and comparing them with their Standard Model predictions.
| 0.845538 | 0.780787 | 0.06475 |
2004.07881 | A Transformation-free Linear Regression for Compositional Outcomes and
Predictors | Compositional data are common in many fields, both as outcomes and predictor
variables. The inventory of models for the case when both the outcome and
predictor variables are compositional is limited and the existing models are
difficult to interpret, due to their use of complex log-ratio transformations.
We develop a transformation-free linear regression model where the expected
value of the compositional outcome is expressed as a single Markov transition
from the compositional predictor. Our approach is based on generalized method
of moments thereby not requiring complete specification of data likelihood and
is robust to different data generating mechanism. Our model is simple to
interpret, allows for 0s and 1s in both the compositional outcome and
covariates, and subsumes several interesting subcases of interest. We also
develop a permutation test for linear independence. Finally, we show that
despite its simplicity, our model accurately captures the relationship between
compositional data from education and medical research.
| Quantile regression relates the quantile of the response to a linear
predictor. For a discrete response distributions, like the Poission, Binomial
and the negative Binomial, this approach is not feasible as the quantile
function is not bijective. We argue to use a continuous model-aware
interpolation of the quantile function, allowing for proper quantile inference
while retaining model interpretation. This approach allows for proper
uncertainty quantification and mitigates the issue of quantile crossing. Our
reanalysis of hospitalisation data considered in Congdon (2017) shows the
advantages of our proposal as well as introducing a novel method to exploit
quantile regression in the context of disease mapping.
| 0.903185 | 0.73735 | 0.165835 |
2004.07882 | Models Genesis | Transfer learning from natural image to medical image has been established as
one of the most practical paradigms in deep learning for medical image
analysis. To fit this paradigm, however, 3D imaging tasks in the most prominent
imaging modalities (e.g., CT and MRI) have to be reformulated and solved in 2D,
losing rich 3D anatomical information, thereby inevitably compromising its
performance. To overcome this limitation, we have built a set of models, called
Generic Autodidactic Models, nicknamed Models Genesis, because they are created
ex nihilo (with no manual labeling), self-taught (learnt by self-supervision),
and generic (served as source models for generating application-specific target
models). Our extensive experiments demonstrate that our Models Genesis
significantly outperform learning from scratch in all five target 3D
applications covering both segmentation and classification. More importantly,
learning a model from scratch simply in 3D may not necessarily yield
performance better than transfer learning from ImageNet in 2D, but our Models
Genesis consistently top any 2D/2.5D approaches including fine-tuning the
models pre-trained from ImageNet as well as fine-tuning the 2D versions of our
Models Genesis, confirming the importance of 3D anatomical information and
significance of Models Genesis for 3D medical imaging. This performance is
attributed to our unified self-supervised learning framework, built on a simple
yet powerful observation: the sophisticated and recurrent anatomy in medical
images can serve as strong yet free supervision signals for deep models to
learn common anatomical representation automatically via self-supervision. As
open science, all codes and pre-trained Models Genesis are available at
https://github.com/MrGiovanni/ModelsGenesis
| The problem of the physical nature and the cosmological constant genesis is
discussed. This problem can't be solved in terms of the current quantum field
theory which operates with Higgs and nonperturbative vacuum condensates and
takes into account the changes of these condensates during relativistic phase
transitions. The problem can't be completely solved also in terms of the
conventional global quantum theory: Wheeler-DeWitt quantum geometrodynamics
does not describe the evolution of the Universe in time (RPT in particular). We
have investigated this problem in the context of energies density of different
vacuum subsystems characteristic scales of which pervaid all energetic scale of
the Universe. At first the phemenological solution of the cosmological constant
problem and then the hypothesis about the possible structure of a new global
quantum theory are proposed. The main feature of this theory is the
irreversible evolution of geometry and vacuum condensates in time in the regime
of their selforganization. The transformation of the cosmological constant in
dynamical variable is inevitably.
| 0.73639 | 0.62701 | 0.109379 |
2004.07883 | Weak magnetic field corrections to light vector or axial mesons mixings
and vector meson dominance | Weak magnetic field induced corrections to effective coupling constants
describing light vector mesons mixings and vector meson dominance (VMD) are
derived. The magnetic field must be weak with respect to an effective quark
mass $M^*$ such that: $eB_0/{M^*}^2< 1$ or $eB_0/{M^*}^2<<1$.For that, a flavor
SU(2) quark-quark interaction due to non perturbative one gluon exchange is
considered. By means of methods usually applied to the Nambu Jona Lasinio (NJL)
and Global Color Models (GCM), leading light vector/axial mesons couplings to a
background electromagnetic field are derived. The corresponding effective
coupling constants are resolved in the structureless mesons and longwavelength
limits. Some of the resulting coupling constants are redefined such as to
become magnetic field induced corrections to vector or axial mesons couplings.
Due to the approximated chiral symmetry of the model, light axial mesons
mixings induced by the magnetic field are also obtained. Some numerical
estimates are presented for the coupling constants and for some of the
corresponding momentum dependent vertices. The contributions of the induced VMD
and vector mesons mixing couplings for the low momentum pion electromagnetic
form factor and for the (off shell) charge symmetry violation potential at the
constituent quark level are estimated. The relative overall weak magnetic
field-induced anisotropic corrections are of the order of $(eB_0/{M^*}^2)^n$,
where $n=2$ or $n=1$ respectively.
| A generalization of the effective meson Lagrangian possessing the heavy quark
symmetry to finite meson masses is employed to study the meson mass dependence
of the spectrum of S-- and P wave baryons containing one heavy quark or
anti-quark. These baryons are described as respectively heavy mesons or
anti-mesons bound in the background of a soliton, which is constructed from
light mesons. No further approximation is made to solve the bound state
equation. For special cases it is shown that the boundary conditions, which
have to be satisfied by the bound state wave--functions and stem from the
interaction with the light mesons, may impose additional constraints on the
existence of bound states when finite masses are assumed. Two types of models
supporting soliton solutions for the light mesons are considered: the Skyrme
model of pseudoscalars only as well as an extension containing also light
vector mesons. It is shown that only the Skyrme model with vector mesons
provides a reasonable description of both light and heavy baryons. Kinematical
corrections to the bound state equations are included in the discussion.
| 0.929117 | 0.79501 | 0.134107 |
2004.07884 | No quantum Ramsey theorem for stabilizer codes | In this paper we study the quantum graphs of mixed-unitary channels generated
by tensor products of Pauli operators, which we call Pauli channels. We show
that most quantum graphs arising from Pauli channels have non-trivial quantum
cliques or quantum anticliques which are stabilizer codes. However, a
reformulation of Nik Weaver's quantum Ramsey theorem in terms of stabilizer
codes and Pauli channels fails. Specifically, for every positive integer $n$,
there exists an $n$-qubit Pauli channel for which any non-trivial quantum
clique or quantum anticlique fails to be a stabilizer code.
| Codeword stabilized (CWS) codes are a general class of quantum codes that
includes stabilizer codes and many families of non-additive codes with good
parameters. For such a non-additive code correcting all t-qubit errors, we
propose an algorithm that employs a single measurement to test all errors
located on a given set of t qubits. Compared with exhaustive error screening,
this reduces the total number of measurements required for error recovery by a
factor of about 3^t.
| 0.858353 | 0.837109 | 0.021244 |
2004.07885 | Photometric Redshifts with the LSST II: The Impact of Near-Infrared and
Near-Ultraviolet Photometry | Accurate photometric redshift (photo-$z$) estimates are essential to the
cosmological science goals of the Vera C. Rubin Observatory Legacy Survey of
Space and Time (LSST). In this work we use simulated photometry for mock galaxy
catalogs to explore how LSST photo-$z$ estimates can be improved by the
addition of near-infrared (NIR) and/or ultraviolet (UV) photometry from the
Euclid, WFIRST, and/or CASTOR space telescopes. Generally, we find that deeper
optical photometry can reduce the standard deviation of the photo-$z$ estimates
more than adding NIR or UV filters, but that additional filters are the only
way to significantly lower the fraction of galaxies with catastrophically
under- or over-estimated photo-$z$. For Euclid, we find that the addition of
${JH}$ $5{\sigma}$ photometric detections can reduce the standard deviation for
galaxies with $z>1$ ($z>0.3$) by ${\sim}20\%$ (${\sim}10\%$), and the fraction
of outliers by ${\sim}40\%$ (${\sim}25\%$). For WFIRST, we show how the
addition of deep ${YJHK}$ photometry could reduce the standard deviation by
${\gtrsim}50\%$ at $z>1.5$ and drastically reduce the fraction of outliers to
just ${\sim}2\%$ overall. For CASTOR, we find that the addition of its ${UV}$
and $u$-band photometry could reduce the standard deviation by ${\sim}30\%$ and
the fraction of outliers by ${\sim}50\%$ for galaxies with $z<0.5$. We also
evaluate the photo-$z$ results within sky areas that overlap with both the NIR
and UV surveys, and when spectroscopic training sets built from the surveys'
small-area deep fields are used.
| We present photometric redshifts and spectral energy distribution (SED)
classifications for a sample of 1542 optically identified sources detected with
XMM in the COSMOS field. Our template fitting classifies 46 sources as stars
and 464 as non-active galaxies, while the remaining 1032 require templates with
an AGN contribution. High accuracy in the derived photometric redshifts was
accomplished as the result of 1) photometry in up to 30 bands with high
significance detections, 2) a new set of SED templates including 18 hybrids
covering the far-UV to mid-infrared, which have been constructed by the
combination of AGN and non-active galaxies templates, and 3) multi-epoch
observations that have been used to correct for variability (most important for
type 1 AGN). The reliability of the photometric redshifts is evaluated using
the sub-sample of 442 sources with measured spectroscopic redshifts. We
achieved an accuracy of $\sigma_{\Delta z/(1+z_{spec})} = 0.014$ for
i$_{AB}^*<$22.5 ($\sigma_{\Delta z/(1+z_{spec})} \sim0.015$ for
i$_{AB}^*<$24.5). The high accuracies were accomplished for both type 2 (where
the SED is often dominated by the host galaxy) and type 1 AGN and QSOs out to
$z=4.5$. The number of outliers is a large improvement over previous
photometric redshift estimates for X-ray selected sources (4.0% and 4.8%
outliers for i$_{AB}^*<$22.5 and i$_{AB}^*<$24.5, respectively). We show that
the intermediate band photometry is vital to achieving accurate photometric
redshifts for AGN, whereas the broad SED coverage provided by mid infrared
(Spitzer/IRAC) bands is important to reduce the number of outliers for normal
galaxies.
| 0.871661 | 0.843839 | 0.027822 |
2004.07886 | Maximizing Determinants under Matroid Constraints | Given vectors $v_1,\dots,v_n\in\mathbb{R}^d$ and a matroid $M=([n],I)$, we
study the problem of finding a basis $S$ of $M$ such that $\det(\sum_{i \in
S}v_i v_i^\top)$ is maximized. This problem appears in a diverse set of areas
such as experimental design, fair allocation of goods, network design, and
machine learning. The current best results include an $e^{2k}$-estimation for
any matroid of rank $k$ and a $(1+\epsilon)^d$-approximation for a uniform
matroid of rank $k\ge d+\frac d\epsilon$, where the rank $k\ge d$ denotes the
desired size of the optimal set. Our main result is a new approximation
algorithm with an approximation guarantee that depends only on the dimension
$d$ of the vectors and not on the size $k$ of the output set. In particular, we
show an $(O(d))^{d}$-estimation and an $(O(d))^{d^3}$-approximation for any
matroid, giving a significant improvement over prior work when $k\gg d$.
Our result relies on the existence of an optimal solution to a convex
programming relaxation for the problem which has sparse support; in particular,
no more than $O(d^2)$ variables of the solution have fractional values. The
sparsity results rely on the interplay between the first-order optimality
conditions for the convex program and matroid theory. We believe that the
techniques introduced to show sparsity of optimal solutions to convex programs
will be of independent interest. We also give a randomized algorithm that
rounds a sparse fractional solution to a feasible integral solution to the
original problem. To show the approximation guarantee, we utilize recent works
on strongly log-concave polynomials and show new relationships between
different convex programs studied for the problem. Finally, we use the
estimation algorithm and sparsity results to give an efficient deterministic
approximation algorithm with an approximation guarantee that depends solely on
the dimension $d$.
| The class of quasi-graphic matroids recently introduced by Geelen, Gerards,
and Whittle generalises each of the classes of frame matroids and
lifted-graphic matroids introduced earlier by Zaslavsky. For each biased graph
$(G, \mathcal B)$ Zaslavsky defined a unique lift matroid $L(G, \mathcal B)$
and a unique frame matroid $F(G, \mathcal B)$, each on ground set $E(G)$. We
show that in general there may be many quasi-graphic matroids on $E(G)$ and
describe them all. We provide cryptomorphic descriptions in terms of subgraphs
corresponding to circuits, cocircuits, independent sets, and bases. Equipped
with these descriptions, we prove some results about quasi-graphic matroids. In
particular, we provide alternate proofs that do not require 3-connectivity of
two results of Geelen, Gerards, and Whittle for 3-connected matroids from their
introductory paper: namely, that every quasi-graphic matroid linearly
representable over a field is either lifted-graphic or frame, and that if a
matroid $M$ has a framework with a loop that is not a loop of $M$ then $M$ is
either lifted-graphic or frame. We also provide sufficient conditions for a
quasi-graphic matroid to have a unique framework.
Zaslavsky has asked for those matroids whose independent sets are contained
in the collection of independent sets of $F(G, \mathcal B)$ while containing
those of $L(G, \mathcal B)$, for some biased graph $(G, \mathcal B)$. Adding a
natural (and necessary) non-degeneracy condition defines a class of matroids,
which we call biased graphic. We show that the class of biased graphic matroids
almost coincides with the class of quasi-graphic matroids: every quasi-graphic
matroid is biased graphic, and if $M$ is a biased graphic matroid that is not
quasi-graphic then $M$ is a 2-sum of a frame matroid with one or more
lifted-graphic matroids.
| 0.848965 | 0.74902 | 0.099945 |
2004.07887 | Smaller $p$-values in genomics studies using distilled historical
information | Medical research institutions have generated massive amounts of biological
data by genetically profiling hundreds of cancer cell lines. In parallel,
academic biology labs have conducted genetic screens on small numbers of cancer
cell lines under custom experimental conditions. In order to share information
between these two approaches to scientific discovery, this article proposes a
"frequentist assisted by Bayes" (FAB) procedure for hypothesis testing that
allows historical information from massive genomics datasets to increase the
power of hypothesis tests in specialized studies. The exchange of information
takes place through a novel probability model for multimodal genomics data,
which distills historical information pertaining to cancer cell lines and genes
across a wide variety of experimental contexts. If the relevance of the
historical information for a given study is high, then the resulting FAB tests
can be more powerful than the corresponding classical tests. If the relevance
is low, then the FAB tests yield as many discoveries as the classical tests.
Simulations and practical investigations demonstrate that the FAB testing
procedure can increase the number of effects discovered in genomics studies
while still maintaining strict control of type I error and false discovery
rates.
| Phytophthora infestans, the cause of potato late blight, is infamous for
having triggered the Irish Great Famine in the 1840s. Until the late 1970s, P.
infestans diversity outside of its Mexican center of origin was low, and one
scenario held that a single strain, US-1, had dominated the global population
for 150 years; this was later challenged based on DNA analysis of historical
herbarium specimens. We have compared the genomes of 11 herbarium and 15 modern
strains. We conclude that the nineteenth century epidemic was caused by a
unique genotype, HERB-1, that persisted for over 50 years. HERB-1 is distinct
from all examined modern strains, but it is a close relative of US-1, which
replaced it outside of Mexico in the twentieth century. We propose that HERB-1
and US-1 emerged from a metapopulation that was established in the early 1800s
outside of the species' center of diversity.
| 0.821766 | 0.707034 | 0.114732 |
2004.07888 | Experimental observation of magnetic domain wall skyrmions | Topological magnetic excitations called skyrmions exhibit striking spin
configurations with deterministic chirality stabilized by the
Dzyaloshinskii-Moriya interaction (DMI). These objects come in many forms
depending on the symmetry and dimensionality of the system under consideration.
Here, for the first time, we experimentally observe a new topological
excitation called a magnetic domain wall (DW) skyrmion using Lorentz
transmission electron microscopy (LTEM). LTEM contrast matches images simulated
from micromagnetic calculations and their expected pinning behavior is observed
through \textit{in situ} application of a perpendicular magnetic field.
Calculations of the energy barrier to DW skyrmion annihilation using the
micromagnetic geodesic nudged elastic band (GNEB) model support this observed
metastability of DW skyrmions at room temperature.
| We measure and analyze the chirality of the Dzyaloshinskii-Moriya interaction
(DMI) stabilized spin textures in multilayers of
Ta/Co$_{20}$Fe$_{60}$B$_{20}$/MgO. The effective DMI is measured experimentally
using domain wall motion measurements, both in the presence (using spin orbit
torques) and absence of driving currents (using magnetic fields). We observe
that the current-induced domain wall motion yields a change in effective DMI
magnitude and opposite domain wall chirality when compared to field-induced
domain wall motion (without current). We explore this effect, which we refer to
as current-induced DMI, by providing possible explanations for its emergence,
and explore the possibilty of its manifestation in the framework of recent
theoretical predictions of DMI modifications due to spin currents.
| 0.876471 | 0.781599 | 0.094873 |
2004.07889 | Optimal control of atmospheric pollution because of urban traffic flow
by means of Stackelberg strategies | Two major problems in modern cities are air contamination and road
congestion. They are closely related and present a similar origin: traffic
flow. To face these problems, local governments impose traffic restrictions to
prevent the entry of vehicles into sensitive areas, with the final aim of
dropping down air pollution levels. However, these restrictions force drivers
to look for alternative routes that usually generate congestions, implying both
longer travel times and higher levels of air pollution. In this work, combining
optimal control of partial differential equations and computational modelling,
we formulate a multi-objective control problem with air pollution and drivers'
travel time as objectives and look for its optimal solutions in the sense of
Stackelberg. In this problem, local government (the leader) implements traffic
restrictions meanwhile the set of drivers (the follower) acts choosing travel
preferences against leader constraints. Numerically, the discretized problem is
solved by combining genetic-elitist algorithms and interior-point methods, and
computational results for a realistic case posed in the Guadalajara
Metropolitan Area (Mexico) are shown.
| Here we present a ground-breaking new postulate for game theory. The first
part of this postulate contains the axiomatic observation that all games are
created by a designer, whether they are: e.g., (dynamic/static) or
(stationary/non-stationary) or (sequential/one-shot) non-cooperative games, and
importantly, whether or not they are intended to represent a non-cooperative
Stackelberg game, they can be mapped to a Stackelberg game. I.e., the game
designer is the leader who is totally rational and honest, and the followers
are mapped to the players of the designed game. If now the game designer, or
"the leader" in the Stackelberg context, adopts a pure strategy, we postulate
the following second part following from axiomatic observation of ultimate game
leadership, where empirical insight leads to the second part of this postulate.
Importantly, implementing a non-cooperative Stackelberg game, with a very
honest and rational leader results in social optimality for all players
(followers), assuming pure strategy across all followers and leader, and that
the leader is totally rational, honest, and is able to achieve a minimum amount
of competency in leading this game, with any finite number of iterations of
leading this finite game.
| 0.876222 | 0.650252 | 0.225969 |
2004.07890 | Coarse entropy | Coarse geometry studies metric spaces on the large scale. Our goal here is to
study dynamics from a coarse point of view. To this end we introduce a coarse
version of topological entropy, suitable for unbounded metric spaces,
consistent with the coarse perspective on such spaces. As is the case with the
usual topological entropy, the coarse entropy measures the divergence of
orbits. Following Bowen's ideas, we use $(n,\varepsilon)$-separated or
$(n,\varepsilon)$-spanning sets. However, we have to let $\varepsilon$ go to
infinity rather than to zero.
| The $K$-theory of the stable Higson corona of a coarse space carries a
canonical ring structure. This ring is the domain of an unreduced version of
the coarse co-assembly map of Emerson and Meyer. We show that the target also
carries a ring structure and co-assembly is a ring homomorphism, provided that
the given coarse space is contractible in a coarse sense.
| 0.813981 | 0.668199 | 0.145782 |
2004.07891 | Degeneracy theorems for meromorphic mappings of a complete K\"{a}hler
manifold sharing hyperplanes in a projective space | Let $M$ be a complete K\"{a}hler manifold, whose universal covering is
biholomorphic to a ball $\mathbb B^m(R_0)$ in $\mathbb C^m$ ($0<R_0\le
+\infty$). In this article, we will show that if three meromorphic mappings
$f^1,f^2,f^3$ of $M$ into $\mathbb P^n(\mathbb C)\ (n\ge 2)$ satisfying the
condition $(C_\rho)$ and sharing $q\ (q> C+\rho K)$ hyperplanes in general
position regardless of multiplicity with certain positive constants $K$ and $C
<2n$ (explicitly estimated), then there are some algebraic relation between
them. A degeneracy theorem for $k\ (2\le k\le n+1)$ meromorphic mappings
sharing hyperplanes is also given. Our result generalize the previous result in
the case where the mappings from $\mathbb C^m$ into $\mathbb P^n(\mathbb C)$.
| We prove extension results for meromorphic functions by combining the
Kohn-Rossi extension theorems with Andreotti's theory on the algebraic and
analytic dependence of meromorphic functions on pseudoconcave manifolds.
Versions of Kohn-Rossi theorems for pseudoconvex domains are included.
| 0.924677 | 0.817607 | 0.10707 |
2004.07892 | Redshift Horizon for the Origins Space Telescope from Primordial Dust
Emission | We explore the possibility of detecting the first galaxies with the next
generation Origins Space Telescope (OST) by applying an analytical model of
primordial dust emission. By analysing source densities as a function of
redshift (z), and considering deep-field exposures with the Origins Survey
Spectrometer, we estimate that the redshift horizon for detecting one
individual source would be above z~7 for systems with dust-to-metal ratios
higher than those expected for typical primeval galaxies. On the other hand, if
confusion limits could be overcome, the Far-infrared Imager and Polarimeter
would enable the detection of more typical fainter systems at z>7. Given the
dependence of the obtained results with the properties of primeval dust, we
conclude that the OST could provide important clues to the nature of the
interestellar medium in the early Universe.
| We have studied the diffuse radiation in the surroundings of M42 using
photometric data from the Galaxy Evolution Explorer (GALEX) in the
far-ultraviolet (FUV) and infrared observations of the AKARI space telescope.
The main source of the FUV diffuse emission is the starlight from the Trapezium
stars scattered by dust in front of the nebula. We initially compare the
diffuse FUV with the far-infrared (FIR) observations at the same locations. The
FUV-IR correlations enable us to determine the type of dust contributing to
this emission. We then use an existing model for studying the FUV dust
scattering in Orion to check if it can be extended to regions away from the
centre in a 10 deg radius. We obtain an albedo, {\alpha} = 0.7 and scattering
phase function asymmetry factor, g = 0.6 as the median values for our dust
locations on different sides of the central Orion region. We find a uniform
value of optical parameters across our sample of locations with the dust
properties varying significantly from those at the centre of the nebula.
| 0.905328 | 0.750959 | 0.154369 |
2004.07893 | Variable Length Memory Chains: characterization of stationary
probability measures | Variable Length Memory Chains (VLMC), which are generalizations of finite
order Markov chains, turn out to be an essential tool to modelize random
sequences in many domains, as well as an interesting object in contemporary
probability theory. The question of the existence of stationary probability
measures leads us to introduce a key combinatorial structure for words produced
by a VLMC: the Longest Internal Suffix. This notion allows us to state a
necessary and sufficient condition for a general VLMC to admit a unique
invariant probability measure. This condition turns out to get a much simpler
form for a subclass of VLMC: the stable VLMC. This natural subclass, unlike the
general case, enjoys a renewal property. Namely, a stable VLMC induces a
semi-Markov chain on an at most countable state space. Unfortunately, this
discrete time renewal process does not contain the whole information of the
VLMC, preventing the study of a stable VLMC to be reduced to the study of its
induced semi-Markov chain. For a subclass of stable VLMC, the convergence in
distribution of a VLMC towards its stationary probability measure is
established. Finally, finite state space semi-Markov chains turn out to be very
special stable VLMC, shedding some new light on their limit distributions.
| Lossless variable-length source coding with codeword cost is considered for
general sources. The problem setting, where we impose on unequal costs on code
symbols, is called the variable-length coding with codeword cost. In this
problem, the infimum of average codeword cost have been determined for general
sources. On the other hand, overflow probability, which is defined as the
probability of codeword cost being above a threshold, have not been considered
yet. In this paper, we determine the infimum of achievable threshold in the
first-order sense and the second-order sense for general sources and compute it
for some special sources such as i.i.d. sources and mixed sources. A
relationship between the overflow probability of variable-length coding and the
error probability of fixed-length coding is also revealed. Our analysis is
based on the information-spectrum methods.
| 0.873661 | 0.741345 | 0.132317 |
2004.07894 | Crystallizations of compact 4-manifolds minimizing combinatorially
defined PL-invariants | The present paper is devoted to present a unifying survey about some special
classes of crystallizations of compact PL $4$-manifolds with empty or connected
boundary, called {\it semi-simple} and {\it weak semi-simple crystallizations},
with a particular attention to their properties of minimizing combinatorially
defined PL-invariants, such as the {\it regular genus}, the {\it Gurau degree},
the {\it gem-complexity} and the {\it (gem-induced) trisection genus}. The main
theorem, yielding a summarizing result on the topic, is an original
contribution. Moreover, in the present paper the additivity of regular genus
with respect to connected sum is proved to hold for all compact $4$-manifolds
with empty or connected boundary which admit weak semi-simple crystallizations.
| Suppose a compact torus $T$ acts on a closed smooth manifold $M$. Under
certain conditions, Guillemin and Zara associate to $(M, T)$ a labeled graph
$\mG_M$ where the labels lie in $H^2(BT)$. They also define the subring
$H_T^*(\mG_M)$ of $\bigoplus_{v\in V(\mG_M)}H^*(BT)$, where $V(\mG_M)$ is the
set of vertices of $\mG_M$ and we call $H_T^*(\mG_M)$ the "graph cohomology"
ring of $\mG_M$. It is known that the equivariant cohomology ring of $M$ can be
described by using combinatorial data of the labeled graph. The main result of
this paper is to determine the ring structure of equivariant cohomology ring of
a flag manifold of type $G_2$ directly, using combinatorial techniques on the
graph $\mG_M$. This gives a new computation of the equivariant cohomology ring
of a flag manifold of type $G_2$.
| 0.884054 | 0.693469 | 0.190585 |
2004.07895 | On the Exponential decay for Compressible Navier-Stokes-Korteweg
equations with a Drag Term | In this paper, we consider global weak solutions to com-pressible
Navier-Stokes-Korteweg equations with density dependent viscosities , in a
periodic domain $\Omega = \mathbb T^3$, with a linear drag term with respect to
the velocity. The main result concerns the exponential decay to equilibrium of
such solutions using log-sobolev type inequalities. In order to show such a
result, the starting point is a global weak-entropy solutions definition
introduced in D. Bresch, A. Vasseur and C. Yu [arXiv:1905.02701 (2019)].
Assuming extra assumptions on the shear viscosity when the density is close to
vacuum and when the density tends to infinity, we conclude the exponential
decay to equilibrium. Note that our result covers the quantum Navier-Stokes
system with a drag term.
| We approximate a two--phase model by the compressible Navier-Stokes equations
with a singular pressure term. Up to a subsequence, these solutions are shown
to converge to a global weak solution of the compressible system with the
congestion constraint studied for instance by P.L. Lions and N. Masmoudi [
Annales I.H.P., 1999]. The paper is an extension of the previous result
obtained in one-dimensional setting by D. Bresch et al. [ C. R. Acad. Sciences
Paris, 2014] to the multi-dimensional case with heterogeneous barrier for the
density.
| 0.887662 | 0.837706 | 0.049956 |
2004.07896 | Generalized Sachs Form Factors and the Possibility of Their Measurement
in Processes without and with Proton Spin Flip | The differential cross section for elastic electron proton scattering has
been calculated taking into account the two photon exchange within the
phenomenological description of the electromagnetic electron proton
interactions. The calculation is based on the consistent evaluation of the
matrix elements of the proton current in a diagonal spin basis, which makes it
possible to naturally obtain expressions for the generalized Sachs form
factors. A new method has been proposed to independently measure these form
factors in the elastic $e \vec{p} \to e \vec{p}$ process in the case where the
initial proton at rest is fully polarized along the direction of the motion of
the final proton.
| Neutron diffraction measurements have been carried out to investigate the
magnetic form factor of the parent SrFe2As2 system of the iron-based
superconductors. The general feature is that the form factor is approximately
isotropic in wave vector, indicating that multiple d-orbitals of the iron atoms
are occupied as expected based on band theory. Inversion of the diffraction
data suggests that there is some elongation of the spin density toward the As
atoms. We have also extended the diffraction measurements to investigate a
possible jump in the c-axis lattice parameter at the structural phase
transition, but find no detectable change within the experimental
uncertainties.
| 0.841691 | 0.680347 | 0.161344 |
2004.07897 | Intertwined density waves in a metallic nickelate | Nickelates are a rich class of materials, ranging from insulating magnets to
superconductors. But for stoichiometric materials, insulating behavior is the
norm, as for most late transition metal oxides. Notable exceptions are the 3D
perovskite LaNiO$_3$, an unconventional paramagnetic metal, and the layered
Ruddlesden-Popper phases R$_4$Ni$_3$O$_{10}$, (R=La, Pr, Nd). The latter are
particularly intriguing because they exhibit an unusual metal-to-metal
transition. Here, we demonstrate that this transition results from an
incommensurate density wave with both charge and magnetic character that lies
intermediate in behavior between the metallic density wave seen in chromium
metal and the insulating stripes typically found in layered nickelates. As
such, R$_4$Ni$_3$O$_{10}$, which appears to be the first known example of an
itinerant spin density wave in a 3d transition metal oxide, represents an
important bridge between the paramagnetism of 3D metallic LaNiO$_3$ at higher
nickel valence and the polaronic behavior of quasi-2D R$_{2-x}$Sr$_x$NiO$_4$ at
lower nickel valence.
| We discuss the role of striction in the intertwined magnetic and structural
phase transitions in the underdoped iron-pnictides. The magneto-elastic
coupling to acoustic modes is then derived and estimated in framework of the
multiband spectrum for itinerant electrons with nesting features. We argue that
the 1-st order character of the magneto-elastic phase transition originates
from the lattice instabilities near the onset of spin-density wave order
introducing, thus, a shear acoustic mode as a new order parameter. Taking
non-harmonic termis in the lattice energy into account may explain the
splitting of the structural and magnetic transitions in some oxypnictides.
Fluctuations of the magnetic order parameter show up in the precursory
temperature dependence of the elastic moduli.
| 0.822955 | 0.748489 | 0.074466 |
2004.07899 | On Local Continuous Solvability of Equations Associated to Elliptic and
Canceling Linear Differential Operators | Consider $A(x,D):C^{\infty}(\Omega,E) \rightarrow C^\infty(\Omega,F)$ an
elliptic and canceling linear differential operator of order $\nu$ with smooth
complex coefficients in $\Omega \subset \mathbb{R}^{N}$ from a finite dimension
complex vector space $E$ to a finite dimension complex vector space $F$ and
$A^{*}(x,D)$ {its} adjoint. In this work we characterize the (local) continuous
solvability of the partial differential equation $A^{*}(x,D)v=f$ (in the
distribution sense) for a given distribution $f$; more precisely we show that
any $x_0\in\Omega$ is contained in a neighborhood $U\subset \Omega$ in which
its continuous solvability is characterized by the following condition on $f$:
for every $\epsilon>0$ and any compact set $K \subset \subset U$, there exists
$\theta=\theta(K,\epsilon)>0$ such that the following holds for all smooth
function $\varphi$ supported in $K$: \begin{equation}\nonumber \left|
f(\varphi) \right| \leq \theta\|\varphi\|_{W^{\nu-1,1}} + \epsilon\|A(x,D)
\varphi\|_{L^{1}}, \end{equation} where $W^{\nu-1,1}$ stands for the homogenous
Sobolev space of all $L^1$ functions whose derivatives of order $\nu-1$ belongs
to $L^{1}(U)$. This characterization implies and extends results obtained
before for operators associated to elliptic complex of vector fields (see
\cite{MP}); we also provide local analogues, for a large range of differential
operators, to global results obtained for the classical divergence operator in
[4] and [9].
| We use lower and upper solutions to investigate the existence of the greatest
and the least solutions for quasimonotone systems of measure differential
equations. The established results are then used to study the solvability of
Stieltjes differential equations; a recent unification of discrete, continuous
and impulsive systems. The applicability of our results is illustrated in a
simple model for bacteria population.
| 0.898258 | 0.773307 | 0.124951 |
2004.07900 | Identification of a class of index models: A topological approach | We establish nonparametric identification in a class of so-called index
models using a novel approach that relies on general topological results. Our
proof strategy requires substantially weaker conditions on the functions and
distributions characterizing the model compared to existing strategies; in
particular, it does not require any large support conditions on the regressors
of our model. We apply the general identification result to additive random
utility and competing risk models.
| A class of two-dimensional topological conformal field theories (TCFTs) is
studied within the framework of gauged WZW models in order to gain some
insights on the global geometrical nature of TCFTs. The BRST quantizations of
topological G/H gauged WZW models (the twisted versions of SUSY gauged WZW
models) are given under fixed back-ground gauge fields. The BRST-cohomology of
the system is investigated and the correlation functions among these physical
observables are considered under the instanton back-grounds. As a consequence,
two-dimensional BF gauge theoretical aspects of TCFTs are revealed. Especially
it is shown that two correlation functions under the different instanton
back-grounds can change to each other. This process of transmutation is
described by the spectral flow. The flow is formulated as a "singular" gauge
transformation which creates an appropriate back-ground charge on the physical
vacuum of the system. The field identification problem of the system is also
discussed from the above point of view.
| 0.881747 | 0.590361 | 0.291385 |
2004.07901 | Evidence for variability timescale dependent UV/X-ray delay in Seyfert 1
AGN NGC 7469 | Using a month-long X-ray lightcurve from ${\it RXTE}$/PCA and 1.5 month long
UV continuum lightcurves from ${\it IUE}$ spectra in 1220$-$1970 $\r{A}$, we
performed a detailed time-lag study of the Seyfert 1 galaxy NGC 7469. Our
cross-correlation analysis confirms previous results showing that the X-rays
are delayed relative to the UV continuum at 1315 $\r{A}$ by 3.49 $\pm$ 0.22
days which is possibly caused by either propagating fluctuation or variable
comptonisation. However, if variations slower than 5 days are removed from the
X-ray lightcurve, the UV variations then lag behind the X-rays variations by
0.37$\pm$0.14 day, consistent with reprocessing of the X-rays by a surrounding
accretion disc. A very similar reverberation delay is observed between ${\it
Swift}$/XRT X-ray and ${\it Swift}$/UVOT UVW2, U lightcurves. Continuum
lightcurves extracted from the ${\it Swift}$/GRISM spectra show delays with
respect to X-rays consistent with reverberation. Separating the UV continuum
variations faster and slower than 5 days, the slow variations at 1825 $\r{A}$
lag those at 1315 $\r{A}$ by $0.29\pm0.06$ day, while the fast variations are
coincident ($0.04\pm0.12$ day). The UV/optical continuum reverberation lag from
${\it IUE}$, ${\it Swift}$ and other optical telescopes at different
wavelengths are consistent with the relationship: $\tau \propto \lambda^{4/3}$,
predicted for the standard accretion disc theory while the best-fit X-ray delay
from ${\it RXTE}$ and ${\it Swift}$/XRT shows a negative X-ray offset of
$\sim$0.38 days from the standard disc delay prediction.
| We present initial results from an exploratory X-ray monitoring project of
two groups of comparably luminous radio-quiet quasars (RQQs). The first
consists of four sources at 4.10 <= z <= 4.35, monitored by Chandra, and the
second is a comparison sample of three sources at 1.33 <= z <= 2.74, monitored
by Swift. Together with archival X-ray data, the total rest-frame temporal
baseline spans ~2-4 yr and ~5-13 yr for the first and second group,
respectively. Six of these sources show significant X-ray variability over
rest-frame timescales of ~10^2 - 10^3 d; three of these also show significant
X-ray variability on rest-frame timescales of ~1-10 d. The X-ray variability
properties of our variable sources are similar to those exhibited by nearby and
far less luminous active galactic nuclei (AGNs). While we do not directly
detect a trend of increasing X-ray variability with redshift, we do confirm
previous reports of luminous AGNs exhibiting X-ray variability above that
expected from their luminosities, based on simplistic extrapolation from lower
luminosity sources. This result may be attributed to luminous sources at the
highest redshifts having relatively high accretion rates. Complementary
UV-optical monitoring of our sources shows that variations in their
optical-X-ray spectral energy distribution are dominated by the X-ray
variations. We confirm previous reports of X-ray spectral variations in one of
our sources, HS 1700+6416, but do not detect such variations in any of our
other sources in spite of X-ray flux variations of up to a factor of ~4. This
project is designed to provide a basic assessment of the X-ray variability
properties of RQQs at the highest accessible redshifts that will serve as a
benchmark for more systematic monitoring of such sources with future X-ray
missions.
| 0.896828 | 0.787912 | 0.108916 |
2004.07902 | Active and inactive quarantine in epidemic spreading on adaptive
activity-driven networks | We consider an epidemic process on adaptive activity-driven temporal
networks, with adaptive behaviour modelled as a change in activity and
attractiveness due to infection. By using a mean-field approach, we derive an
analytical estimate of the epidemic threshold for SIS and SIR epidemic models
for a general adaptive strategy, which strongly depends on the correlations
between activity and attractiveness in the susceptible and infected states. We
focus on a strong adaptive behaviour, implementing two types of quarantine
inspired by recent real case studies: an active quarantine, in which the
population compensates the loss of links rewiring the ineffective connections
towards non-quarantining nodes, and an inactive quarantine, in which the links
with quarantined nodes are not rewired. Both strategies feature the same
epidemic threshold but they strongly differ in the dynamics of active phase. We
show that the active quarantine is extremely less effective in reducing the
impact of the epidemic in the active phase compared to the inactive one, and
that in SIR model a late adoption of measures requires inactive quarantine to
reach containment.
| Motivated with various responses of world governments to COVID-19, here we
develop a toy model of the dependence epidemics spreading on the availability
of tests for disease. Our model, that we call SUDR+K, is based on usual SIR
model, but it splits the total fraction of infected individuals into two
components: those that are undetected and those that are detected through
tests. Moreover, we assume that available tests increase at a constant rate
from the beginning of epidemics but are consumed to detect infected
individuals. Strikingly we find a bi-stable behavior between a phase with a
giant fraction of infected and a phase with a very small fraction. We show that
the separation between these two regimes is governed by a match between the
rate of testing and a rate of infection spread at given time. We also show that
the existence of two phases does not depend on the mathematical choice of the
form of the term describing the rate at which undetected individuals are tested
and detected. Presented research implies that a vigorous early testing
activity, before the epidemics enters into its giant phase, can potentially
keep epidemics under control, and that even a very small change in rate of
testing can increase or decrease the size of the whole epidemics of various
orders of magnitude. For the real application of realistic model to ongoing
epidemics, we would gladly collaborate with field epidemiologists in order to
develop quantitative models of testing process.
| 0.918243 | 0.741839 | 0.176404 |
2004.07903 | Divergent Search for Few-Shot Image Classification | When data is unlabelled and the target task is not known a priori, divergent
search offers a strategy for learning a wide range of skills. Having such a
repertoire allows a system to adapt to new, unforeseen tasks. Unlabelled image
data is plentiful, but it is not always known which features will be required
for downstream tasks. We propose a method for divergent search in the few-shot
image classification setting and evaluate with Omniglot and Mini-ImageNet. This
high-dimensional behavior space includes all possible ways of partitioning the
data. To manage divergent search in this space, we rely on a meta-learning
framework to integrate useful features from diverse tasks into a single model.
The final layer of this model is used as an index into the `archive' of all
past behaviors. We search for regions in the behavior space that the current
archive cannot reach. As expected, divergent search is outperformed by models
with a strong bias toward the evaluation tasks. But it is able to match and
sometimes exceed the performance of models that have a weak bias toward the
target task or none at all. This demonstrates that divergent search is a viable
approach, even in high-dimensional behavior spaces.
| Prevailing deep convolutional neural networks (CNNs) for person
re-IDentification (reID) are usually built upon ResNet or VGG backbones, which
were originally designed for classification. Because reID is different from
classification, the architecture should be modified accordingly. We propose to
automatically search for a CNN architecture that is specifically suitable for
the reID task. There are three aspects to be tackled. First, body structural
information plays an important role in reID but it is not encoded in backbones.
Second, Neural Architecture Search (NAS) automates the process of architecture
design without human effort, but no existing NAS methods incorporate the
structure information of input images. Third, reID is essentially a retrieval
task but current NAS algorithms are merely designed for classification. To
solve these problems, we propose a retrieval-based search algorithm over a
specifically designed reID search space, named Auto-ReID. Our Auto-ReID enables
the automated approach to find an efficient and effective CNN architecture for
reID. Extensive experiments demonstrate that the searched architecture achieves
state-of-the-art performance while reducing 50% parameters and 53% FLOPs
compared to others.
| 0.848147 | 0.732058 | 0.11609 |
2004.07904 | About the unification types of the modal logics determined by classes of
deterministic frames | The unification problem in a propositional logic is to determine, given a
formula F, whether there exists a substitution s such that s(F) is in that
logic. In that case, s is a unifier of F. When a unifiable formula has minimal
complete sets of unifiers, the formula is either infinitary, finitary, or
unitary, depending on the cardinality of its minimal complete sets of unifiers.
In this paper, we study the unification types of some modal logics determined
by classes of deterministic frames.
| In 1933, G\"odel introduced a provability interpretation of the propositional
intuitionistic logic to establish a formalization for the BHK interpretation.
He used the modal system, $\mathbf{S4}$, as a formalization of the intuitive
concept of provability and then translated $\mathbf{IPC}$ to $\mathbf{S4}$. His
work suggested the problem to find a concrete provability interpretation of the
modal logic $\mathbf{S4}$. In this paper, we will try to answer this problem.
In fact, we will generalize Solovay's provability interpretation of the modal
logic $\mathbf{GL}$ to capture other modal logics such as $\mathbf{K4}$,
$\mathbf{KD4}$ and $\mathbf{S4}$. Then we will use these results to find a
formalization for the BHK interpretation and we will show that with different
interpretations of the BHK interpretation, we can capture some of the
propositional logics such as Intuitionistic logic, minimal logic and
Visser-Ruitenburg's basic logic. Moreover, we will show that there is no
provability interpretation for any extension of $\mathbf{KD45}$ and also there
is no BHK interpretation for the classical propositional logic.
| 0.919299 | 0.793399 | 0.1259 |
2004.07905 | Capturing Subdiffusive Solute Dynamics and Predicting Selectivity in
Nanoscale Pores with Time Series Modeling | Mathematically modeling complex transport phenomena at the molecular level
can be a powerful tool for identifying transport mechanisms and predicting
macroscopic properties. We use two different stochastic time series models,
parameterized from long molecular dynamics (MD) simulation trajectories of a
cross-linked H$_{II}$ phase lyotropic liquid crystal (LLC) membrane, in order
to predict solute mean squared displacements (MSDs) and solute flux, and thus
solute selectivity, in macroscopic length pores.
First, using anomalous diffusion theory, we show how solute dynamics can be
modeled as a fractional diffusion process subordinate to a continuous time
random walk. From the MD simulations, we parameterize the distribution of dwell
times, hop lengths between dwells and correlation between hops. We explore two
variations of the anomalous diffusion modeling approach. The first applies a
single set of parameters to the solute displacements and the second applies two
sets of parameters based on the solute's radial distance from the closest pore
center.
Next, we generalize Markov state models, treating the configurational states
of the system as a Markov process where each state has distinct transport
properties. For each state and transition between states, we parameterize the
distribution and temporal correlation structure of positional fluctuations as a
means of characterization and to allow us to predict solute MSDs. Qualitative
differences between MD and Markov state dependent model-generated trajectories
may limit its usefulness.
Finally, we demonstrate how one can use these models to estimate flux of a
solute across a macroscopic-length pore and, based on those quantities, the
membrane's selectivity towards each solute. This work helps to connect
microscopic chemically-dependent solute motions that do not follow simple
diffusive behavior with macroscopic membrane performance.
| In this work, we propose a novel probabilistic sequence model that excels at
capturing high variability in time series data, both across sequences and
within an individual sequence. Our method uses temporal latent variables to
capture information about the underlying data pattern and dynamically decodes
the latent information into modifications of weights of the base decoder and
recurrent model. The efficacy of the proposed method is demonstrated on a range
of synthetic and real-world sequential data that exhibit large scale
variations, regime shifts, and complex dynamics.
| 0.858773 | 0.679692 | 0.179081 |
2004.07906 | Development and Interpretation of a Neural Network-Based Synthetic Radar
Reflectivity Estimator Using GOES-R Satellite Observations | The objective of this research is to develop techniques for assimilating
GOES-R Series observations in precipitating scenes for the purpose of improving
short-term convective-scale forecasts of high impact weather hazards. Whereas
one approach is radiance assimilation, the information content of GOES-R
radiances from its Advanced Baseline Imager (ABI) saturates in precipitating
scenes, and radiance assimilation does not make use of lightning observations
from the GOES Lightning Mapper (GLM). Here, a convolutional neural network
(CNN) is developed to transform GOES-R radiances and lightning into synthetic
radar reflectivity fields to make use of existing radar assimilation
techniques. We find that the ability of CNNs to utilize spatial context is
essential for this application and offers breakthrough improvement in skill
compared to traditional pixel-by-pixel based approaches. To understand the
improved performance, we use a novel analysis methodology that combines several
techniques, each providing different insights into the network's reasoning.
Channel withholding experiments and spatial information withholding experiments
are used to show that the CNN achieves skill at high reflectivity values from
the information content in radiance gradients and the presence of lightning.
The attribution method, layer-wise relevance propagation, demonstrates that the
CNN uses radiance and lightning information synergistically, where lightning
helps the CNN focus on which neighboring locations are most important.
Synthetic inputs are used to quantify the sensitivity to radiance gradients,
showing that sharper gradients produce a stronger response in predicted
reflectivity. Finally, geostationary lightning observations are found to be
uniquely valuable for their ability to pinpoint locations of strong radar
echoes.
| Predicting the time to build software is a very complex task for software
engineering managers. There are complex factors that can directly interfere
with the productivity of the development team. Factors directly related to the
complexity of the system to be developed drastically change the time necessary
for the completion of the works with the software factories. This work proposes
the use of a hybrid system based on artificial neural networks and fuzzy
systems to assist in the construction of an expert system based on rules to
support in the prediction of hours destined to the development of software
according to the complexity of the elements present in the same. The set of
fuzzy rules obtained by the system helps the management and control of software
development by providing a base of interpretable estimates based on fuzzy
rules. The model was submitted to tests on a real database, and its results
were promissory in the construction of an aid mechanism in the predictability
of the software construction.
| 0.786286 | 0.564415 | 0.221872 |
2004.07907 | Supermassive black holes as possible sources of ultra high energy cosmic
rays | Production and acceleration mechanisms of ultra-high-energy cosmic rays
(UHECRs) of energy $>10^{20}$eV, clearly beyond the GZK-cutoff limit remain
unclear that points to exotic nature of the phenomena. Recent observations of
extragalactic neutrino may indicate the source of UHECRs being an extragalactic
supermassive black hole (SMBH). We demonstrate that ultra-efficient energy
extraction from rotating SMBH driven by the magnetic Penrose process (MPP)
could indeed foot the bill. We envision ionization of neutral particles, such
as neutron beta-decay, skirting close to the black hole horizon that energizes
protons to over $10^{20}$eV for SMBH of mass $10^9 M_{\odot}$ and magnetic
field of strength $10^4$G. Applied to Galactic center SMBH we have proton
energy of order $\approx 10^{15.6}$eV that coincides with the knee of the
cosmic ray spectra. We show that large $\gamma_z$ factors of high-energy
particles along the escaping directions occur only in the presence of induced
charge of the black hole that is known as the Wald charge in the case of
uniform magnetic field. It is remarkable that the process neither requires
extended acceleration zone, nor fine-tuning of accreting matter parameters.
Further, this leads to certain verifiable constraints on SMBH's mass and
magnetic field strength as UHECRs sources. This clearly makes ultra-efficient
regime of MPP one of the most promising mechanisms for fueling UHECRs
powerhouse.
| The cosmic ray spectrum has been shown to extend well beyond 10^20 eV. With
nearly 20 events observed in the last 40 years, it is now established that
particles are accelerated or produced in the universe with energy near 10^21
eV. In all production models neutrinos and photons are part of the cosmic ray
flux. In acceleration models (bottom-up models), they are produced as
secondaries of the possible interactions of the accelerated charged particle,
in direct production models (top-down models) they are a dominant fraction of
the decay chain. In addition, hadrons above the GZK threshold energy will also
produce, along their path in the Universe, neutrinos and photons as secondaries
of the pion photo-production processes. Therefore, photons and in particular
neutrinos, are very distinctive signatures of the nature and distribution of
the potential sources of ultra high energy cosmic rays. In the following we
expose the identification capabilities of the Auger observatories. In the
hypothesis of nu_mu-->nu_tau oscillations with full mixing, special emphasis is
placed on the observation of tau neutrinos, with which Auger is able to
establish the GZK cutoff as well as to provide a strong and model independant
constraint on the top-down sources of ultra high energy cosmic rays.
| 0.875507 | 0.792921 | 0.082585 |
2004.07908 | The hydrogen Balmer lines and jump in absorption in accretion disc
modeling -- an ultraviolet-optical spectral analysis of the dwarf novae UZ
Serpentis and CY Lyrae | The spectra of disc-dominated cataclysmic variables (CVs) often deviate from
the spectra of accretion disc models; in particular, the Balmer jump and
absorption lines are found to be shallower in the observations than in the
models. We carried out a combined ultraviolet-optical spectral analysis of two
dwarf novae: UZ Ser in outburst, decline, and quiescence, and CY Lyr on the
rise to outburst and in outburst. We fit the Balmer jump and absorption lines,
the continuum flux level and slope by adjusting the accretion rate,
inclination, and disc outer radius. For both systems we find an accretion rate
$\dot{M} \approx 8 \times 10^{-9}M_\odot$/yr in outburst, and $\dot{M} \approx
2-3 \times 10^{-9}M_\odot$/yr for the rise and decline phases. The outer disc
radius we derive is smaller than expected ($R_{\rm disc} \approx 0.2a$, where
$a$ is the binary separation), except during late rise (for CY Lyr) where
$R_{\rm disc}=0.3a$. UZ Ser also reveals a 60,000~K white dwarf. These results
show that during a dwarf nova cycle the radius of the disc is the largest just
before the peak of the outburst, in qualitative agreement with the disc
instability model for dwarf nova outbursts. We suspect that an additional
emitting component (e.g. disc wind) is also at work to reduce the slope of the
continuum and size of the Balmer jump and absorption lines. We stress that both
the outer disc radius and disc wind need to be taken into account for more
realistic disc modeling of CVs.
| We study the stability of disc accretion in the recurrent nova RS Ophiuchi.
We construct a one-dimensional time-dependent model of the binary-disc system,
which includes viscous heating and radiative cooling and a self-consistent
treatment of the binary potential. We find that the extended accretion disc in
this system is always unstable to the thermal-viscous instability, and
undergoes repeated disc outbursts on ~10-20yr time-scales. This is similar to
the recurrence time-scale of observed outbursts in the RS Oph system, but we
show that the disc's accretion luminosity during outburst is insufficient to
explain the observed outbursts. We explore a range of models, and find that in
most cases the accretion rate during outbursts reaches or exceeds the critical
accretion rate for stable nuclear burning on the white dwarf surface.
Consequently we suggest that a surface nuclear burning triggered by disc
instability may be responsible for the observed outbursts. This allows the
white dwarf mass to grow over time, and we suggest that disc instability in RS
Oph and similar systems may represent a path to Type Ia supernovae.
| 0.902716 | 0.790981 | 0.111734 |
2004.07909 | Broken SU(6) symmetry and massive hybrid stars | In this work we revisit the quantum hadrodynamics (QHD) formalism to
investigate hyperonic and hybrid stars with hyperon-meson couplings fixed via
broken SU(6) group, in favor of a more general flavor group SU(3). This allows
us to restrict a large number of free parameters to only one - the $\alpha_v$ -
for the vector mesons, while the scalar meson can be constrained by the hyperon
potential depth. We also employ an additional channel, the strangeness-hidden
$\phi$ meson, which couples only to the hyperons and has a crucial role in the
description of massive neutron stars. In hybrid stars, the quark phase is built
with the SU(3) NJL model also with an additional vector channel in the
Lagrangian, which enters as a free parameter within the limit imposed by the
lattice QCD. We are able to reproduce 2.21 $M_\odot$ hyperonic star and 2.10
$M_\odot$ hybrid star. Both results are in agreement with the recently detected
hyper massive pulsar MSP J0740+6620. With the models used in the present work,
the minimum and the maximum masses of a hybrid star are very close to each
other, indicating that if they exist, they are probably very rare in the
universe.
| We show that a flavour symmetry a la Froggatt-Nielsen can be naturally
incorporated in models with gauge-Higgs unification, by exploiting the heavy
fermions that are anyhow needed to realize realistic Yukawa couplings. The case
of the minimal five-dimensional model, in which the SU(2)_L x U(1)_Y
electroweak group is enlarged to an SU(3)_W group, and then broken to U(1)_em
by the combination of an orbifold projection and a Scherk-Schwarz twist, is
studied in detail. We show that the minimal way of incorporating a U(1)_F
flavour symmetry is to enlarge it to an SU(2)_F group, which is then completely
broken by the same orbifold projection and Scherk-Schwarz twist. The general
features of this construction, where ordinary fermions live on the branes
defined by the orbifold fixed-points and messenger fermions live in the bulk,
are compared to those of ordinary four-dimensional flavour models, and some
explicit examples are constructed.
| 0.833151 | 0.737711 | 0.09544 |
2004.07911 | A Deep Reinforcement Learning Approach for Dynamic Contents Caching in
HetNets | The recent development in Internet of Things necessitates caching of dynamic
contents, where new versions of contents become available around-the-clock and
thus timely update is required to ensure their relevance. The age of
information (AoI) is a performance metric that evaluates the freshness of
contents. Existing works on AoI-optimization of cache content update algorithms
focus on minimizing the long-term average AoI of all cached contents. Sometimes
user requests that need to be served in the future are known in advance and can
be stored in user request queues. In this paper, we propose dynamic cache
content update scheduling algorithms that exploit the user request queues. We
consider a special use case where the trained neural networks (NNs) from deep
learning models are being cached in a heterogeneous network. A queue-aware
cache content update scheduling algorithm based on Markov decision process
(MDP) is developed to minimize the average AoI of the NNs delivered to the
users plus the cost related to content updating. By using deep reinforcement
learning (DRL), we propose a low complexity suboptimal scheduling algorithm.
Simulation results show that, under the same update frequency, our proposed
algorithms outperform the periodic cache content update scheme and reduce the
average AoI by up to 35%.
| In device-to-device (D2D)-enabled caching cellular networks, the user
terminals (UTs) collaboratively store and share a large volume of popular
contents from the base station (BS) for traffic offloading and delivery delay
reduction. In this article, the multi-winner auction based caching placement in
D2D-enabled caching cellular networks is investigated for UT edge caching
incentive and content caching redundancy reduction. Firstly, a multi-winner
once auction for UT edge caching is modeled which auctions multiple contents
for multiple UTs. Then the optimization problem for content caching revenue
maximization is formulated. Specifically, the "cache conflict" restriction
relationship among UTs is used as one of the constraints in the problem to
reduce the content caching redundancy in a UT movement scenario. The problem is
solved by semidefinite programming (SDP) relaxation to obtain an approximate
optimal caching placement. Moreover, the payment strategy of the auction is
developed as a Nash bargaining game for personal profit fairness among the UTs
who win the auction for content caching. Subsequently, a multi-winner once
auction based caching (MOAC) placement algorithm is proposed. In addition, due
to the high complexity of MOAC, we further propose a heuristic multi-winner
repeated auction based caching placement (MRAC) algorithm, which can greatly
reduce the complexity with only tiny performance loss. Simulation results show
that the proposed algorithms can reduce the traffic load and average content
access delay effectively compared with the existing caching placement
algorithms.
| 0.834933 | 0.744975 | 0.089958 |
2004.07912 | Uniformly branching trees | A quasiconformal tree $T$ is a (compact) metric tree that is doubling and of
bounded turning. We call $T$ trivalent if every branch point of $T$ has exactly
three branches. If the set of branch points is uniformly relatively separated
and uniformly relatively dense, we say that $T$ is uniformly branching. We
prove that a metric space $T$ is quasisymmetrically equivalent to the continuum
self-similar tree if and only if it is a trivalent quasiconformal tree that is
uniformly branching. In particular, any two trees of this type are
quasisymmetrically equivalent.
| Given a directed graph $G=(V,A)$, the Directed Maximum Leaf Spanning Tree
problem asks to compute a directed spanning tree (i.e., an out-branching) with
as many leaves as possible. By designing a Branch-and-Reduced algorithm
combined with the Measure & Conquer technique for running time analysis, we
show that the problem can be solved in time $\Oh^*(1.9043^n)$ using polynomial
space. Hitherto, there have been only few examples. Provided exponential space
this run time upper bound can be lowered to $\Oh^*(1.8139^n)$.
| 0.804411 | 0.7704 | 0.034011 |
2004.07913 | Optical validation and characterisation of Planck PSZ1 sources at the
Canary Islands observatories. II. Second year of ITP13 observations | We report new galaxy clusters previously unknown included in the PSZ1
catalogue. The results here presented have been achieved during the second year
of a 2-year observational programme, the ITP13, developed at the Roque de los
Muchachos Observatory (La Palma, Spain). We characterise 75 SZ sources with low
SZ significance, SZ S/N$<5.32$ by performing deep optical imaging and
spectroscopy in order to associate actual galaxy clusters to the SZ Planck
source. We adopt robust criteria, based on the 2D-spatial distribution,
richness and velocity dispersions to confirm actual optical counterparts up to
$z<0.85$. At the end of the ITP13 observational programme, we study 256 SZ
sources with $Dec \geq -15^{\circ}$ (212 of them completely unknown), finding
optical counterparts for 152 SZ sources. The ITP13 validation programme has
allowed us to update the PSZ1 purity, which is now more refined, increasing
from 72\% to 83\% in the low SZ S/N regime. Our results are consistent with the
predicted purity curve for the full PSZ1 catalogue and with the expected
fraction of false detections caused by the non-Gaussian noise of foreground
signals. Indeed, we find a strong correlation between the number of unconfirmed
sources and the thermal emission of diffuse galactic dust at 857 GHz, thus
increasing the fraction of false Planck SZ detections at low galactic
latitudes.
| The Joint European X-ray Telescope (JET-X) was the core instrument of the
Russian Spectrum-X-gamma space observatory. It consisted of two identical soft
X-ray (0.3 - 10 keV) telescopes with focusing optical modules having a measured
angular resolution of nearly 15 arcsec. Soon after the payload completion, the
mission was cancelled and the two optical flight modules (FM) were brought to
the Brera Astronomical Observatory where they had been manufactured. After 16
years of storage, we have utilized the JET-X FM2 to test at the PANTER X-ray
facility a prototype of a novel X-ray polarimetric telescope, using a Gas Pixel
Detector (GPD) with polarimetric capabilities in the focal plane of the FM2.
The GPD was developed by a collaboration between INFN-Pisa and INAF-IAPS. In
the first phase of the test campaign, we have re-tested the FM2 at PANTER to
have an up-to-date characterization in terms of angular resolution and
effective area, while in the second part of the test the GPD has been placed in
the focal plane of the FM2. In this paper we report the results of the tests of
the sole FM2, using an unpolarized X-ray source, comparing the results with the
calibration done in 1996.
| 0.84603 | 0.694271 | 0.15176 |
2004.07914 | High-resolution VLA Imaging of Obscured Quasars: Young Radio Jets Caught
in a Dense ISM | We present new sub-arcsecond-resolution Karl G. Jansky Very Large Array (VLA)
imaging at 10 GHz of 155 ultra-luminous ($L_{\rm bol}\sim10^{11.7-14.2}
L_\odot$) and heavily obscured quasars with redshifts $z \sim0.4-3$. The sample
was selected to have extremely red mid-infrared (MIR)-optical color ratios
based on data from Wide-Field Infrared Survey Explorer (WISE) along with a
detection of bright, unresolved radio emission from the NRAO VLA Sky Survey
(NVSS) or Faint Images of the Radio Sky at Twenty-Centimeters (FIRST) Survey.
Our high-resolution VLA observations have revealed that the majority of the
sources in our sample (93 out of 155) are compact on angular scales
$<0.2^{\prime \prime}$ ($\leq 1.7$ kpc at $z \sim2$). The radio luminosities,
linear extents, and lobe pressures of our sources are similar to young radio
active galactic nuclei (AGN; e.g., Gigahertz Peaked Spectrum, GPS, and Compact
Steep Spectrum, CSS, sources), but their space density is considerably lower.
Application of a simple adiabatic lobe expansion model suggests relatively
young dynamical ages ($\sim10^{4-7}$ years), relatively high ambient ISM
densities ($\sim1-10^4$ cm$^{-3}$), and modest lobe expansion speeds
($\sim30-10,000$ km s$^{-1}$). Thus, we find our sources to be consistent with
a population of newly triggered, young jets caught in a unique evolutionary
stage in which they still reside within the dense gas reservoirs of their
hosts. Based on their radio luminosity function and dynamical ages, we estimate
only $\sim20\%$ of classical large scale FRI/II radio galaxies could have
evolved directly from these objects. We speculate that the WISE-NVSS sources
might first become GPS or CSS sources, of which some might ultimately evolve
into larger radio galaxies.
| We report on two programs to address differential evolution between the
radio-loud and radio-quiet quasar populations at high (z>4) redshift. Both
programs entail studying the radio properties of optically-selected quasars.
First, we have observed 32 optically-selected, high-redshift (z>4) quasars with
the VLA at 6 cm (5 GHz). These sources comprise a statistically complete and
well-understood sample. We detect four quasars above our 3-sigma limit of ~0.15
mJy, which is sufficiently sensitive to detect all radio-loud quasars at the
probed redshift range. Second, we have correlated 134 z>4 quasars, comprising
all such sources that we are aware of as of mid-1999, with FIRST and NVSS.
These two recent 1.4 GHz VLA sky surveys reach 3-sigma limits of approximately
0.6 mJy and 1.4 mJy respectively. We identify a total of 15 z>4 quasars, of
which six were not previously known to be radio-loud. The depth of these
surveys does not reach the radio-loud/radio-quiet demarcation luminosity
density (L(1.4 GHz) = 10^32.5 h(50)^(-2) ergs/s/Hz) at the redshift range
considered; this correlation therefore only provides a lower limit to the
radio-loud fraction of quasars at high-redshift. The two programs together
identify eight new radio-loud quasars at z>4, a significant increase over the
seven currently in the published literature. We find no evidence for radio-loud
fraction depending on optical luminosity for -25 > M_B > -28 at z~2, or for
-26>M_B>-28 at z>4. Our results also show no evolution in the radio-loud
fraction between z~2 and z>4 (-26>M_B>-28).
| 0.854462 | 0.801858 | 0.052604 |
2004.07915 | Temporal Plasmonics: Fano and Rabi resonances in the time domain in
metal nanostructures | The Fano and Rabi models represent remarkably common effects in optics. Here
we study the coherent time dynamics of plasmonic systems exhibiting Fano and
Rabi resonances. We demonstrate that these systems show fundamentally different
dynamics. A system with a Fano resonance displays at most one temporal beat
under pulsed excitation, whereas a system in the Rabi regime may have any
number of beats. Remarkably, the Fano-like systems show time dynamics with very
characteristic coherent tails despite the strong decoherence that is intrinsic
for such systems. The coherent Fano and Rabi dynamics that we predicted can be
observed in plasmonic nanocrystal dimers in time-resolved experiments. Our
study demonstrates that such coherent temporal plasmonics includes nontrivial
and characteristic relaxation behaviors and presents an interesting direction
to develop with further research.
| Fano resonance with a special ultra-sharp, asymmetric line shape and high
quality factor Q, is a wide spread resonance has a large variety of optical,
plasmonic and microwave applications. In this paper, we explore the
characteristic robustness of the Fano resonance mode which is topologically
protected by the band inversion induced by breaking the mirror symmetry of a
two-dimensional honeycomb photonic crystal (HPC) associated with C_6 point
group symmetry. So, the dark and bright topological edge modes have been
appeared in the complete band gap made by opening of the Dirac cone.
Destructive and constructive interaction of the dark and bright modes leads to
the asymmetric line shape of the Fano resonance wave. Fano resonance mode which
is so sensitive to the environmental and geometrical perturbations, can be
applied for designing proficient sensors. Here we demonstrate that the
topological Fano resonance mode preserves its asymmetric, ultra-sharp line
shape during the disorders, defects and cavities, makes a platform for wave
based experimental applications such as low threshold lasers, and extremely
precise interferometers.
| 0.912628 | 0.759983 | 0.152645 |
2004.07916 | The relativistic galaxy number counts in the weak field approximation | We present a novel approach to compute systematically the relativistic
projection effects at any order in perturbation theory within the weak field
approximation. In this derivation the galaxy number counts is written
completely in terms of the redshift perturbation. The relativistic effects
break the symmetry along the line-of-sight and they source, contrarily to the
standard perturbation theory, the odd multipoles of the matter power spectrum
or 2-point correlation function, providing a unique signature for their
detection in Large Scale Structure surveys. We show that our approach agrees
with previous derivations (up to third order) of relativistic effects and, for
the first time, we derive a model for the transverse Doppler effect. Moreover,
we proof that in the Newtonian limit this approach is consistent with standard
perturbation theory at any order.
| This work discusses the possible empirical verification of the geometrical
concept of homogeneity of the standard relativistic cosmology considering its
various definitions of distance. We study the physical consequences of the
distinction between the usual concept of spatial homogeneity (SH), as defined
by the Cosmological Principle, and the concept of observational homogeneity
(OH), arguing that OH is in principle falsifiable by means of astronomical
observations, whereas verifying SH is only possible indirectly. Simulated
counts of cosmological sources are produced by means of a generalized
number-distance expression that can be specialized to produce either the counts
of the Einstein-de Sitter (EdS) cosmology, which has SH by construction, or
other types of counts, which do, or do not, have OH by construction.
Expressions for observational volumes and differential densities are derived
with the various cosmological distance definitions in the EdS model. Simulated
counts that have OH by construction do not always exhibit SH features. The
reverse situation is also true. Besides, simulated counts with no OH features
at low redshift start showing OH characteristics at high redshift. The comoving
distance seems to be the only distance definition where both SH and OH appear
simultaneously. The results show that observations indicating possible lack of
OH do not necessarily falsify the standard Friedmannian cosmology, meaning that
this cosmology will not necessarily always produce observable homogeneous
densities. The general conclusion is that the use of different cosmological
distances in the characterization of the galaxy distribution lead to
significant ambiguities in reaching conclusions about the behavior of the
large-scale galaxy distribution in the Universe.
| 0.855656 | 0.800649 | 0.055007 |
2004.07917 | Knowledge Scientists: Unlocking the data-driven organization | Organizations across all sectors are increasingly undergoing deep
transformation and restructuring towards data-driven operations. The central
role of data highlights the need for reliable and clean data. Unreliable,
erroneous, and incomplete data lead to critical bottlenecks in processing
pipelines and, ultimately, service failures, which are disastrous for the
competitive performance of the organization. Given its central importance,
those organizations which recognize and react to the need for reliable data
will have the advantage in the coming decade. We argue that the technologies
for reliable data are driven by distinct concerns and expertise which
complement those of the data scientist and the data engineer. Those
organizations which identify the central importance of meaningful, explainable,
reproducible, and maintainable data will be at the forefront of the
democratization of reliable data. We call the new role which must be developed
to fill this critical need the Knowledge Scientist. The organizational
structures, tools, methodologies and techniques to support and make possible
the work of knowledge scientists are still in their infancy. As organizations
not only use data but increasingly rely on data, it is time to empower the
people who are central to this transformation.
| Recommending personalized learning materials for online language learning is
challenging because we typically lack data about the student's ability and the
relative difficulty of learning materials. This makes it hard to recommend
appropriate content that matches the student's prior knowledge. In this paper,
we propose a refined hierarchical knowledge structure to model vocabulary
knowledge, which enables us to automatically organize the authentic and
up-to-date learning materials collected from the internet. Based on this
knowledge structure, we then introduce a hybrid approach to recommend learning
materials that adapts to a student's language level. We evaluate our work with
an online Japanese learning tool and the results suggest adding adaptivity into
material recommendation significantly increases student engagement.
| 0.84351 | 0.669259 | 0.174251 |
2004.07918 | An upper bound for the $k$-power domination number in $r$-uniform
hypergraphs | The generalization of power domination, $k$-power domination, is a graph
parameter denoted $\gamma_p^k$. The study of power domination was introduced to
study electric power grids. Chang and Roussel introduced $k$-power domination
in hypergraphs and conjectured the upper bound for the $k$-power domination
number for $r$-uniform hypergraphs on $n$ vertices was $\frac{n}{r+k}$. This
upper bound was shown to be true for simple graphs ($r=2$) and it was further
conjectured that only a family of hypergraphs, known as the squid hypergraphs
attained this upper bound. In this paper, the conjecture is proven to hold for
hypergraphs with $r=3$ or $4$; but is shown to be false, by a counterexample,
for $r\geq 7$. A new upper bound is also proven for $r\geq 3$.
| For a graph $F$, a hypergraph $\mathcal{H}$ is a Berge copy of $F$ (or a
Berge-$F$ in short), if there is a bijection $f : E(F) \rightarrow
E(\mathcal{H})$ such that for each $e \in E(F)$ we have $e \subset f(e)$. A
hypergraph is Berge-$F$-free if it does not contain a Berge copy of $F$. We
denote the maximum number of hyperedges in an $n$-vertex $r$-uniform
Berge-$F$-free hypergraph by $\mathrm{ex}_r(n,\textrm{Berge-}F).$
In this paper we prove two general lemmas concerning the maximum size of a
Berge-$F$-free hypergraph and use them to establish new results and improve
several old results. In particular, we give bounds on
$\mathrm{ex}_r(n,\textrm{Berge-}F)$ when $F$ is a path (reproving a result of
Gy\H{o}ri, Katona and Lemons), a cycle (extending a result of F\"uredi and
\"Ozkahya), a theta graph (improving a result of He and Tait), or a $K_{2,t}$
(extending a result of Gerbner, Methuku and Vizer).
We also establish new bounds when $F$ is a clique (which implies extensions
of results by Maherani and Shahsiah and by Gy\'arf\'as) and when $F$ is a
general tree.
| 0.931565 | 0.803406 | 0.128159 |
2004.07919 | Enhancing Deep Neural Networks Against Adversarial Malware Examples | Machine learning based malware detection is known to be vulnerable to
adversarial evasion attacks. The state-of-the-art is that there are no
effective countermeasures against these attacks. Inspired by the AICS'2019
Challenge organized by the MIT Lincoln Lab, we systematize a number of
principles for enhancing the robustness of neural networks against adversarial
malware evasion attacks. Some of these principles have been scattered in the
literature, but others are proposed in this paper for the first time. Under the
guidance of these principles, we propose a framework for defending against
adversarial malware evasion attacks. We validated the framework using the
Drebin dataset of Android malware. We applied the defense framework to the
AICS'2019 Challenge and won, without knowing how the organizers generated the
adversarial examples. However, we see a ~22\% difference between the accuracy
in the experiment with the Drebin dataset (for binary classification) and the
accuracy in the experiment with respect to the AICS'2019 Challenge (for
multiclass classification). We attribute this gap to a fundamental barrier that
without knowing the attacker's manipulation set, the defender cannot do
effective Adversarial Training.
| Adversarial examples are slight perturbations that are designed to fool
artificial neural networks when fed as an input. In this work the usability of
the Fisher information for the detection of such adversarial attacks is
studied. We discuss various quantities whose computation scales well with the
network size, study their behavior on adversarial examples and show how they
can highlight the importance of single input neurons, thereby providing a
visual tool for further analyzing (un-)reasonable behavior of a neural network.
The potential of our methods is demonstrated by applications to the MNIST,
CIFAR10 and Fruits-360 datasets.
| 0.854087 | 0.816793 | 0.037294 |
2004.07921 | A Two-Stage Service Restoration Method for Electric Power Distribution
Systems | Improving the reliability of power distribution systems is critically
important for both utilities and customers. This calls for an efficient service
restoration module within a distribution management system to support the
implementation of self-healing smart grid networks. The emerging smart grid
technologies, including distributed generators (DGs) and remote-controlled
switches, although enhance the self-healing capability and allow faster
recovery, pose additional complexity to the service restoration problem,
especially under cold load pickup (CLPU) conditions. In this paper, we propose
a novel two-stage restoration framework to generate restoration solutions with
a sequence of control actions. The first stage generates a restoration plan
that supports both the traditional service restoration using feeder
reconfiguration and the grid-forming DG-assisted intentional islanding methods.
The second stage generates an optimal sequence of switching operations to bring
the outaged system quickly to the final restored configuration. The problem is
formulated as a mixed-integer linear program that incorporates system
connectivity, operating constraints, and CLPU models. It is demonstrated using
a multi-feeder test case that the proposed framework is effective in utilizing
all available resources to quickly restore the service and generates an optimal
sequence of switching actions to be used by the operator to reach the desired
optimal configuration.
| A key objective of the smart grid is to improve reliability of utility
services to end users. This requires strengthening resilience of distribution
networks that lie at the edge of the grid. However, distribution networks are
exposed to external disturbances such as hurricanes and snow storms where
electricity service to customers is disrupted repeatedly. External disturbances
cause large-scale power failures that are neither well-understood, nor
formulated rigorously, nor studied systematically. This work studies resilience
of power distribution networks to large-scale disturbances in three aspects.
First, a non-stationary random process is derived to characterize an entire
life cycle of large-scale failure and recovery. Second, resilience is defined
based on the non-stationary random process. Close form analytical expressions
are derived under specific large-scale failure scenarios. Third, the
non-stationary model and the resilience metric are applied to a real life
example of large-scale disruptions due to Hurricane Ike. Real data on
large-scale failures from an operational network is used to learn time-varying
model parameters and resilience metrics.
| 0.860504 | 0.763572 | 0.096932 |
2004.07923 | Deep Neural Network (DNN) for Water/Fat Separation: Supervised Training,
Unsupervised Training, and No Training | Purpose: To use a deep neural network (DNN) for solving the optimization
problem of water/fat separation and to compare supervised and unsupervised
training.
Methods: The current T2*-IDEAL algorithm for solving fat/water separation is
dependent on initialization. Recently, deep neural networks (DNN) have been
proposed to solve fat/water separation without the need for suitable
initialization. However, this approach requires supervised training of DNN
(STD) using the reference fat/water separation images. Here we propose two
novel DNN water/fat separation methods 1) unsupervised training of DNN (UTD)
using the physical forward problem as the cost function during training, and 2)
no-training of DNN (NTD) using physical cost and backpropagation to directly
reconstruct a single dataset. The STD, UTD and NTD methods were compared with
the reference T2*-IDEAL.
Results: All DNN methods generated consistent water/fat separation results
that agreed well with T2*-IDEAL under proper initialization.
Conclusion: The water/fat separation problem can be solved using unsupervised
deep neural networks.
| Homography estimation between multiple aerial images can provide relative
pose estimation for collaborative autonomous exploration and monitoring. The
usage on a robotic system requires a fast and robust homography estimation
algorithm. In this study, we propose an unsupervised learning algorithm that
trains a Deep Convolutional Neural Network to estimate planar homographies. We
compare the proposed algorithm to traditional feature-based and direct methods,
as well as a corresponding supervised learning algorithm. Our empirical results
demonstrate that compared to traditional approaches, the unsupervised algorithm
achieves faster inference speed, while maintaining comparable or better
accuracy and robustness to illumination variation. In addition, on both a
synthetic dataset and representative real-world aerial dataset, our
unsupervised method has superior adaptability and performance compared to the
supervised deep learning method.
| 0.943557 | 0.664253 | 0.279304 |
2004.07924 | Impact of Nematicity on the Relationship between Antiferromagnetic
Fluctuations and Superconductivity in FeSe0.91S0.09 Under Pressure | The sulfur substituted FeSe system, FeSe$_{1-x}$S$_{x}$, provides a versatile
platform for studying the relationship between nematicity, antiferromagnetism,
and superconductivity. Here, by nuclear magnetic resonance (NMR) and
resistivity measurements up to 4.73 GPa on FeSe$_{0.91}$S$_{0.09}$, we
established the pressure($p$)-temperature($T$) phase diagram in which the
nematic state is suppressed with pressure showing a nematic quantum phase
transition (QPT) around $p$ = 0.5 GPa, two SC regions, separated by the QPT,
appear and antiferromagnetic (AFM) phase emerges above $\sim$3.3 GPa. From the
NMR results up to 2.1 GPa, AFM fluctuations are revealed to be characterized by
the stripe-type wavevector which remains the same for the two SC regions.
Furthermore, the electronic state is found to change in character from
non-Fermi liquid to Fermi liquid around the nematic QPT and persists up to
$\sim$ 2.1 GPa. In addition, although the AFM fluctuations correlate with
$T_{\rm c}$ in both SC states, demonstrating the importance of the AFM
fluctuations for the appearance of SC in the system, we found that, when
nematic order is absent, $T_{\rm c}$ is strongly correlated with the AFM
fluctuations, whereas $T_{\rm c}$ weakly depends on the AFM fluctuations when
nematic order is present. Our findings on FeSe$_{0.91}$S$_{0.09}$ were shown to
be applied to the whole FeSe$_{1-x}$S$_{x}$ system and also provide a new
insight into the relationship between AFM fluctuations and SC in Fe-based
superconductors.
| We report the discovery of pressure-induced superconductivity, with T_c=2 K,
in the heavy-fermion antiferromagnet Ce_2RhIn_8, where superconductivity and
magnetic order coexist over an extended pressure interval. A T-linear
resistivity in the normal state, accessed by an applied magnetic field, does
not appear to derive from the existence of a 2D quantum-critical spin-density
wave.
| 0.900271 | 0.802218 | 0.098053 |
2004.07925 | Anisotropic Spherical Solutions through Extended Gravitational
Decoupling Approach | This paper is devoted to evaluating exact anisotropic spherical solutions for
static self-gravitating systems through extended geometric deformation
decoupling technique. For this purpose, we consider an isotropic Tolman IV
solution and extend it to anisotropic domain by transforming both temporal as
well as radial metric potentials. To examine the physical viability and
stability of interior anisotropic solutions, we plot energy bounds, TOV
equation, causality condition and adiabatic index for the stars Her X-I and PSR
J 1416-2230. It is found that both obtained models show realistic behavior as
they fulfill all physical constraints as well as stability criterion. We
conclude that the extended gravitational decoupling approach provides more
proficient results to discuss the interior configuration of stellar structures.
| We provide all basic equations and concepts required to carry out a general
study on axially symmetric static sources. The Einstein equations and the
conservation equations are written down for a general anisotropic static fluid
endowed with axial symmetry. The structure scalars are calculated and the
inhomogeneity factors are identified. Finally some exact analytical solutions
were found. One of these solutions describes an incompressible spheroid with
isotropic pressure and becomes the well known interior Schwarzschild solution
in the spherically symmetric limit, however it cannot be matched smoothly to
any Weyl exterior metric. Another family of solutions was found that
corresponds to an anisotropic fluid distribution and can in principle be
matched to a Weyl exterior.
| 0.856173 | 0.751396 | 0.104777 |
2004.07927 | Primordial plasma: influence of non-ideality on equilibrium radiation | The asymptotic behavior of the equilibrium radiation in Maxwellian plasma is
investigated for the region of low frequencies. It is shown, that already for a
weakly non-ideal plasma the equilibrium radiation can essentially deviate from
the Planck law. The deviation from the Planck distribution is described by the
transverse dielectric permittivity which takes into account both frequency and
spatial dispersion. The influence of plasma non-ideality increases with
increase of the non-ideality parameter in the in the dielectric permittivity.
The spectral energy distribution of the equilibrium radiation essentially
changes in the region of observable frequencies. At asymptotically low
frequencies there is transfer from logarithmic to power behavior of the
equilibrium radiation. The results indicate that in the primordial plasma of
Early Universe the spectral energy distribution of radiation could be different
then the Planck one.
| Modeling the variability of the solar spectral irradiance is a key factor for
understanding the solar influence on the climate of the Earth. As a first step
to calculating the solar spectral irradiance variations we reproduce the solar
spectrum for the quiet Sun over a broad wavelength range with an emphasis on
the UV. We introduce the radiative transfer code COSI which calculates solar
synthetic spectra under conditions of non-local thermodynamic equilibrium
(NLTE). A self-consistent simultaneous solution of the radiative transfer and
the statistical equation for the level populations guarantees that the correct
physics is considered for wavelength regions where the assumption of local
thermodynamic equilibrium (LTE) breaks down. The new concept of iterated
opacity distribution functions (NLTE-ODFs), through which all line opacities
are included in the NLTE radiative transfer calculation, is presented. We show
that it is essential to include the line opacities in the radiative transfer to
reproduce the solar spectrum in the UV. Through the implemented scheme of
NLTE-ODFs the COSI code is successful in reproducing the spectral energy
distribution of the quiet Sun.
| 0.879065 | 0.722572 | 0.156493 |
2004.07928 | MARLeME: A Multi-Agent Reinforcement Learning Model Extraction Library | Multi-Agent Reinforcement Learning (MARL) encompasses a powerful class of
methodologies that have been applied in a wide range of fields. An effective
way to further empower these methodologies is to develop libraries and tools
that could expand their interpretability and explainability. In this work, we
introduce MARLeME: a MARL model extraction library, designed to improve
explainability of MARL systems by approximating them with symbolic models.
Symbolic models offer a high degree of interpretability, well-defined
properties, and verifiable behaviour. Consequently, they can be used to inspect
and better understand the underlying MARL system and corresponding MARL agents,
as well as to replace all/some of the agents that are particularly safety and
security critical.
| Deep reinforcement learning (DRL) has made great achievements since proposed.
Generally, DRL agents receive high-dimensional inputs at each step, and make
actions according to deep-neural-network-based policies. This learning
mechanism updates the policy to maximize the return with an end-to-end method.
In this paper, we survey the progress of DRL methods, including value-based,
policy gradient, and model-based algorithms, and compare their main techniques
and properties. Besides, DRL plays an important role in game artificial
intelligence (AI). We also take a review of the achievements of DRL in various
video games, including classical Arcade games, first-person perspective games
and multi-agent real-time strategy games, from 2D to 3D, and from single-agent
to multi-agent. A large number of video game AIs with DRL have achieved
super-human performance, while there are still some challenges in this domain.
Therefore, we also discuss some key points when applying DRL methods to this
field, including exploration-exploitation, sample efficiency, generalization
and transfer, multi-agent learning, imperfect information, and delayed spare
rewards, as well as some research directions.
| 0.899428 | 0.768391 | 0.131037 |
2004.07930 | Large-scale frequency-domain seismic wave modeling on {\it{h}}-adaptive
tetrahedral meshes with iterative solver and multi-level domain-decomposition
preconditioners | Frequency-domain full-waveform inversion (FWI) is suitable for long-offset
stationary-recording acquisition, since reliable subsurface models can be
reconstructed with a few frequencies and attenuation is easily implemented
without computational overhead. In the frequency domain, wave modeling is a
Helmholtz-type boundary-value problem which requires to solve a large and
sparse system of linear equations per frequency with multiple right-hand sides
(sources). This system can be solved with direct or iterative methods. While
the former are suitable for FWI application on 3D dense OBC acquisitions
covering spatial domains of moderate size, the later should be the approach of
choice for sparse node acquisitions covering large domains (more than 50
millions of unknowns). Fast convergence of iterative solvers for Helmholtz
problems remains however challenging in high frequency regime due to the non
definiteness of the Helmholtz operator, on one side and on the discretization
constraints in order to minimize the dispersion error for a given frequency, on
the other side, hence requiring efficient preconditioners. In this study, we
use the Krylov subspace GMRES iterative solver combined with a two-level
domain-decomposition preconditioner. Discretization relies on continuous
Lagrange finite elements of order 3 on unstructured tetrahedral meshes to
comply with complex geometries and adapt the size of the elements to the local
wavelength ($h$-adaptivity). We assess the accuracy, the convergence and the
scalability of our method with the acoustic 3D SEG/EAGE Overthrust model up to
a frequency of 20~Hz.
| A zero-frequency seismic metamaterial (ZFSM) consisting of a three-component
seismic metamaterial plate and a half space is proposed to attenuate ultra-low
frequency seismic surface waves. The design concept and models are verified
firstly by lab-scale experiments on the seismic metamaterial consisting of a
two-component seismic metamaterial plate and a half space. Then we calculate
the band structures of the one-dimensional and two-dimensional ZFSMs, and
evaluate their attenuation ability to Rayleigh waves. A wide band gap and a
zero-frequency band gap (ZFBG) can be found as the band structure of the
seismic metamaterial is almost equal to the band structure of the seismic
metamaterial plate plus the sound cone. It is found that the Rayleigh waves in
the ZFSM are deflected and converted into bulk waves. When the number of the
unit cells of the ZFSM is sufficient, the transmission distance and deflection
angle of the Rayleigh waves in the ZFSM are constant at the same frequency.
This discovery is expected to open up the possibility of seismic protection for
large nuclear power plants, ancient buildings and metropolitan areas.
| 0.898111 | 0.70627 | 0.191841 |
2004.07931 | Eigendecomposition-Free Training of Deep Networks for Linear
Least-Square Problems | Many classical Computer Vision problems, such as essential matrix computation
and pose estimation from 3D to 2D correspondences, can be tackled by solving a
linear least-square problem, which can be done by finding the eigenvector
corresponding to the smallest, or zero, eigenvalue of a matrix representing a
linear system. Incorporating this in deep learning frameworks would allow us to
explicitly encode known notions of geometry, instead of having the network
implicitly learn them from data. However, performing eigendecomposition within
a network requires the ability to differentiate this operation. While
theoretically doable, this introduces numerical instability in the optimization
process in practice. In this paper, we introduce an eigendecomposition-free
approach to training a deep network whose loss depends on the eigenvector
corresponding to a zero eigenvalue of a matrix predicted by the network. We
demonstrate that our approach is much more robust than explicit differentiation
of the eigendecomposition using two general tasks, outlier rejection and
denoising, with several practical examples including wide-baseline stereo, the
perspective-n-point problem, and ellipse fitting. Empirically, our method has
better convergence properties and yields state-of-the-art results.
| Dropout and other feature noising schemes have shown promising results in
controlling over-fitting by artificially corrupting the training data. Though
extensive theoretical and empirical studies have been performed for generalized
linear models, little work has been done for support vector machines (SVMs),
one of the most successful approaches for supervised learning. This paper
presents dropout training for both linear SVMs and the nonlinear extension with
latent representation learning. For linear SVMs, to deal with the intractable
expectation of the non-smooth hinge loss under corrupting distributions, we
develop an iteratively re-weighted least square (IRLS) algorithm by exploring
data augmentation techniques. Our algorithm iteratively minimizes the
expectation of a re-weighted least square problem, where the re-weights are
analytically updated. For nonlinear latent SVMs, we consider learning one layer
of latent representations in SVMs and extend the data augmentation technique in
conjunction with first-order Taylor-expansion to deal with the intractable
expected non-smooth hinge loss and the nonlinearity of latent representations.
Finally, we apply the similar data augmentation ideas to develop a new IRLS
algorithm for the expected logistic loss under corrupting distributions, and we
further develop a non-linear extension of logistic regression by incorporating
one layer of latent representations. Our algorithms offer insights on the
connection and difference between the hinge loss and logistic loss in dropout
training. Empirical results on several real datasets demonstrate the
effectiveness of dropout training on significantly boosting the classification
accuracy of both linear and nonlinear SVMs. In addition, the nonlinear SVMs
further improve the prediction performance on several image datasets.
| 0.89676 | 0.739786 | 0.156974 |
2004.07933 | Existence and uniqueness of time-fractional diffusion equation on a
metric star graph | In this paper, we study the time-fractional diffusion equation on a metric
star graph. The existence and uniqueness of the weak solution are investigated
and the proof is based on eigenfunction expansions. Some priori estimates and
regularity results of the solution are proved.
| Fractional extensions of the cable equation have been proposed in the
literature to describe transmembrane potential in spiny dendrites. The
anomalous behavior has been related in the literature to the geometrical
properties of the system, in particular, the density of spines, by experiments,
computer simulations, and in comb-like models.~The same PDE can be related to
more than one stochastic process leading to anomalous diffusion behavior. The
time-fractional diffusion equation can be associated to a continuous time
random walk (CTRW) with power-law waiting time probability or to a special case
of the Erd\'ely-Kober fractional diffusion, described by the ggBm. In this
work, we show that time fractional generalization of the cable equation arises
naturally in the CTRW by considering a superposition of Markovian processes and
in a {\it ggBm-like} construction of the random variable.
| 0.96444 | 0.786788 | 0.177652 |
2004.07934 | Weak cosmic censorship conjecture for the novel $4D$ charged
Einstein-Gauss-Bonnet black hole with test scalar field and particle | Motivated by the recent research of black holes in $4D$ Einstein-Gauss-Bonnet
(EGB) gravity, we investigate the possibility of destroying the event horizon
of a charged $4D$ EGB black hole with a test massive complex scalar field and a
test charged particle, respectively. For the scalar field scattering gedanken
experiment, we consider an infinitesimal time interval process. The result
shows that both extremal and near-extremal $4D$ charged EGB black holes cannot
be overcharged. For the test particle thought experiment, the study suggests
that extremal $4D$ charged EGB black hole cannot be overcharged to first order
and can be overcharged to second order due to the existence of the Gauss-Bonnet
coupling constant. While, near-extremal $4D$ EGB black hole can be overcharged
to both first and second order.
| The cosmic censorship conjecture essentially states that naked singularities
should not form from generic initial conditions. Since black hole parameters
can change their values under Hawking evaporation, one has to ask whether it is
possible to reach extremality by simply waiting for the black hole to
evaporate. If so a slight perturbation would likely render the singularity
naked. Fortunately, at least for the case of asymptotically flat 4-dimensional
Reissner-Nordstr\"om black hole, Hiscock and Weems showed that it can never
reach extremality despite the fact that for a sufficiently massive black hole,
its charge-to-mass ratio can increase during Hawking evaporation. Hence cosmic
censorship is never violated by Hawking emission. However, we know that under
some processes, it is easier to violate cosmic censorship in higher dimensions,
therefore it is crucial to generalize Hiscock and Weems model to dimensions
above four to check cosmic censorship. We found that Hawking evaporation cannot
lead to violation of cosmic censorship even in higher dimensional
Reissner-Nordstr\"om spacetimes. Morerover, it seems to be more difficult to
reach extremality as number of dimension increases.
| 0.85141 | 0.813422 | 0.037988 |
2004.07935 | Decodable quantum LDPC codes beyond the $\sqrt{n}$ distance barrier
using high dimensional expanders | Constructing quantum LDPC codes with a minimum distance that grows faster
than a square root of the length has been a major challenge of the field. With
this challenge in mind, we investigate constructions that come from
high-dimensional expanders, in particular Ramanujan complexes. These naturally
give rise to very unbalanced quantum error correcting codes that have a large
$X$-distance but a much smaller $Z$-distance. However, together with a
classical expander LDPC code and a tensoring method that generalises a
construction of Hastings and also the Tillich-Zemor construction of quantum
codes, we obtain quantum LDPC codes whose minimum distance exceeds the square
root of the code length and whose dimension comes close to a square root of the
code length. When the ingredient is a 3-dimensional Ramanujan complex, we show
that its 2-systole behaves like a square of the log of the complex size, which
results in an overall quantum code of minimum distance $n^{1/2}\log n$, and
sets a new record for quantum LDPC codes. When we use a 2-dimensional Ramanujan
complex, or the 2-skeleton of a 3-dimensional Ramanujan complex, we obtain a
quantum LDPC code of minimum distance $n^{1/2}\log^{1/2}n$. We then exploit the
expansion properties of the complex to devise the first polynomial time
algorithm that decodes above the square root barrier for quantum LDPC codes.
| This paper outlines a three-step procedure for determining the low bit error
rate performance curve of a wide class of LDPC codes of moderate length. The
traditional method to estimate code performance in the higher SNR region is to
use a sum of the contributions of the most dominant error events to the
probability of error. These dominant error events will be both code and decoder
dependent, consisting of low-weight codewords as well as non-codeword events if
ML decoding is not used. For even moderate length codes, it is not feasible to
find all of these dominant error events with a brute force search. The proposed
method provides a convenient way to evaluate very low bit error rate
performance of an LDPC code without requiring knowledge of the complete error
event weight spectrum or resorting to a Monte Carlo simulation. This new method
can be applied to various types of decoding such as the full belief propagation
version of the message passing algorithm or the commonly used min-sum
approximation to belief propagation. The proposed method allows one to
efficiently see error performance at bit error rates that were previously out
of reach of Monte Carlo methods. This result will provide a solid foundation
for the analysis and design of LDPC codes and decoders that are required to
provide a guaranteed very low bit error rate performance at certain SNRs.
| 0.909358 | 0.772461 | 0.136897 |
2004.07936 | Unsupervised Learning of Landmarks based on Inter-Intra Subject
Consistencies | We present a novel unsupervised learning approach to image landmark discovery
by incorporating the inter-subject landmark consistencies on facial images.
This is achieved via an inter-subject mapping module that transforms original
subject landmarks based on an auxiliary subject-related structure. To recover
from the transformed images back to the original subject, the landmark detector
is forced to learn spatial locations that contain the consistent semantic
meanings both for the paired intra-subject images and between the paired
inter-subject images. Our proposed method is extensively evaluated on two
public facial image datasets (MAFL, AFLW) with various settings. Experimental
results indicate that our method can extract the consistent landmarks for both
datasets and achieve better performances compared to the previous
state-of-the-art methods quantitatively and qualitatively.
| Compared to abstract features, significant objects, so-called landmarks, are
a more natural means for vehicle localization and navigation, especially in
challenging unstructured environments. The major challenge is to recognize
landmarks in various lighting conditions and changing environment (growing
vegetation) while only having few training samples available. We propose a new
method which leverages Deep Learning as well as model-based methods to overcome
the need of a large data set. Using RGB images and light detection and ranging
(LiDAR) point clouds, our approach combines state-of-the-art classification
results of Convolutional Neural Networks (CNN), with robust model-based methods
by taking prior knowledge of previous time steps into account. Evaluations on a
challenging real-wold scenario, with trees and bushes as landmarks, show
promising results over pure learning-based state-of-the-art 3D detectors, while
being significant faster.
| 0.885098 | 0.726368 | 0.15873 |
2004.07937 | Principle components analysis for seizures prediction using wavelet
transform | Epilepsy is a disease in which frequent seizures occur due to abnormal
activity of neurons. Patients affected by this disease can be treated with the
help of medicines or surgical procedures. However, both of these methods are
not quite useful. The only method to treat epilepsy patients effectively is to
predict the seizure before its onset. It has been observed that abnormal
activity in the brain signals starts before the occurrence of seizure known as
the preictal state. Many researchers have proposed machine learning models for
prediction of epileptic seizures by detecting the start of preictal state.
However, pre-processing, feature extraction and classification remains a great
challenge in the prediction of preictal state. Therefore, we propose a model
that uses common spatial pattern filtering and wavelet transform for
preprocessing, principal component analysis for feature extraction and support
vector machines for detecting preictal state. We have applied our model on 23
subjects and an average sensitivity of 93.1% has been observed for 84 seizures.
| In 2005, Nagler and Claussen (Phys. Rev. E 71 (2005) 067103) investigated the
time series of the elementary cellular automata (ECA) for possible
(multi)fractal behavior. They eliminated the polynomial background at^b through
the direct fitting of the polynomial coefficients a and b. We here reconsider
their work eliminating the polynomial trend by means of the multifractal-based
detrended fluctuation analysis (MF-DFA) in which the wavelet multiresolution
property is employed to filter out the trend in a more speedy way than the
direct polynomial fitting and also with respect to the wavelet transform
modulus maxima (WTMM) procedure. In the algorithm, the discrete fast wavelet
transform is used to calculate the trend as a local feature that enters the
so-called details signal. We illustrate our result for three representative ECA
rules: 90, 105, and 150. We confirm their multifractal behavior and provide our
results for the scaling parameters
| 0.825602 | 0.677044 | 0.148557 |
2004.07938 | Propagation of the Free Dirac Wavefunctions | The free time evolution of a Dirac wavefunction is studied in detail. One
finds that at any time the border of a bounded localized wavefunction moves at
the speed of light. There is no zitterbewegung, but there is a period of
trembling of the carrier, which is limited in time and space in the order of
the diameter of the carrier at its minimal extension. Before the phase of
trembling the carrier shrinks isotropicly and similarly it expands afterwards.
The various parts of the border reverse their move only once, but they do it
abruptly and not simultaneously, thus creating the trembling. Asymptotically,
regarding the past and the future as well, the probability of position
concentrates up to 1 within any spherical shell whose outer radius increases at
light speed. The mathematical tools employed for the proofs are the Fourier
analysis of entire functions of exponential type and the non-stationary phase
method.
| We have studied the null-plane hamiltonian structure of the free Yang-Mills
fields and the scalar chromodynamics ($SQCD_{4}$). Following the Dirac's
procedure for constrained systems we have performed a detailed analysis of the
constraint structure of both models and we give the generalized Dirac brackets
for the physical variables. In the free Yang-Mills case, using the
correspondence principle in the Dirac's brackets we obtain the same commutators
present in the literature.
| 0.839968 | 0.805567 | 0.034401 |
2004.07939 | Explaining B decays anomalies in SUSY models | Recent measurements of certain B decays indicate deviations from Standard
Model (SM) predictions. We show that Supersymmetric effects can increase the
Branching Ratios (BRs) of both $B\to D {\tau} {\nu}_{\tau}$ and $B\to D^\ast
{\tau} {\nu}_{\tau}$ with respect to the SM rates, thereby approaching their
newest experimentally measured values.
| Recently, several $B$-physics experiments have reported an appreciable
deviation from the Standard Model (SM) in the tree-level observables
$R_{D^{(*)}}$; the combined weighted average now stands at $\approx 4 \sigma$.
We first show the anomaly necessarily implies model-independent collider
signals of the form $pp \to b \tau \nu$ that should be expediously searched for
at ATLAS/CMS as a complementary test of the anomaly. Next we suggest a possible
interconnection of the anomaly with the radiative stability of the Standard
Model Higgs boson and point to a minimal effective supersymmetric scenario with
$R$-parity violation as the underlying cause. We also comment on the
possibility of simultaneously explaining the recently reported $R_{K^{(*)}}$
anomaly in this setup.
| 0.876508 | 0.843333 | 0.033175 |
2004.07940 | Solving bitvectors with MCSAT: explanations from bits and pieces (long
version) | We present a decision procedure for the theory of fixed-sized bitvectors in
the MCSAT framework. MCSAT is an alternative to CDCL(T) for SMT solving and can
be seen as an extension of CDCL to domains other than the Booleans. Our
procedure uses BDDs to record and update the sets of feasible values of
bitvector variables. For explaining conflicts and propagations, we develop
specialized word-level interpolation for two common fragments of the theory.
For full generality, explaining conflicts outside of the covered fragments
resorts to local bitblasting. The approach is implemented in the Yices 2 SMT
solver and we present experimental results.
| Skew polynomials, which have a noncommutative multiplication rule between
coefficients and an indeterminate, are the most general polynomial concept that
admits the degree function with desirable properties. This paper presents the
first algorithms to compute the maximum degree of the Dieudonn\'e determinant
of a $k \times k$ submatrix in a matrix $A$ whose entries are skew polynomials
over a skew field $F$. Our algorithms make use of the discrete Legendre
conjugacy between the sequences of the maximum degrees and the ranks of block
matrices over $F$ obtained from coefficient matrices of $A$. Three applications
of our algorithms are provided: (i) computing the dimension of the solution
spaces of linear differential and difference equations, (ii) determining the
Smith-McMillan form of transfer function matrices of linear time-varying
systems and (iii) solving the "weighted" version of noncommutative Edmonds'
problem with polynomial bit complexity. We also show that the deg-det
computation for matrices over sparse polynomials is at least as hard as solving
commutative Edmonds' problem.
| 0.91526 | 0.708039 | 0.207221 |
2004.07941 | Continual Learning for Anomaly Detection in Surveillance Videos | Anomaly detection in surveillance videos has been recently gaining attention.
A challenging aspect of high-dimensional applications such as video
surveillance is continual learning. While current state-of-the-art deep
learning approaches perform well on existing public datasets, they fail to work
in a continual learning framework due to computational and storage issues.
Furthermore, online decision making is an important but mostly neglected factor
in this domain. Motivated by these research gaps, we propose an online anomaly
detection method for surveillance videos using transfer learning and continual
learning, which in turn significantly reduces the training complexity and
provides a mechanism for continually learning from recent data without
suffering from catastrophic forgetting. Our proposed algorithm leverages the
feature extraction power of neural network-based models for transfer learning,
and the continual learning capability of statistical detection methods.
| Different from salient object detection methods for still images, a key
challenging for video saliency detection is how to extract and combine spatial
and temporal features. In this paper, we present a novel and effective approach
for salient object detection for video sequences based on 3D convolutional
neural networks. First, we design a 3D convolutional network (Conv3DNet) with
the input as three video frame to learn the spatiotemporal features for video
sequences. Then, we design a 3D deconvolutional network (Deconv3DNet) to
combine the spatiotemporal features to predict the final saliency map for video
sequences. Experimental results show that the proposed saliency detection model
performs better in video saliency prediction compared with the state-of-the-art
video saliency detection methods.
| 0.926791 | 0.672569 | 0.254222 |
2004.07942 | Sharp pointwise estimates for solutions of weakly coupled second order
parabolic system in a layer | We deal with $m$-component vector-valued solutions to the Cauchy problem for
linear both homogeneous and nonhomogeneous weakly coupled second order
parabolic system in the layer ${\mathbb R}^{n+1}_T={\mathbb R}^n\times (0, T)$.
We assume that coefficients of the system are real and depending only on $t$,
$n\geq 1$ and $T<\infty$. The homogeneous system is considered with initial
data in $[L^p({\mathbb R}^n)]^m$, $1\leq p \leq \infty $. For the
nonhomogeneous system we suppose that the initial function is equal to zero and
the right-hand side belongs to $[L^p({\mathbb R}^{n+1}_T)]^m\cap [C^\alpha \big
(\overline{{\mathbb R}^{n+1}_T} \big )]^m $, $\alpha \in (0, 1)$. Explicit
formulas for the sharp coefficients in pointwise estimates for solutions of
these problems and their directional derivative are obtained.
| We study a 4+1 dimensional pure Abelian Gauge model on the lattice with two
anisotropic couplings independent of each other and of the coordinates. A first
exploration of the phase diagram using mean field approximation and monte carlo
techniques has demonstrated the existence of a new phase, the so called Layer
phase, in which the forces in the 4-D subspace are Coulomb-like while in the
transverse direction (fifth dimension) the force is confining. This allows the
possibility of a gauge field localization scheme. In this work the use of
bigger lattice volumes and higher statistics confirms the existence of the
Layer phase and furthermore clarifies the issue of the phase transitions'
order. We show that the Layer phase is separated from the strongly coupled
phase by a weak first order phase transition. Also we provide evidence that the
Layer phase is separated by the five-dimensional Coulomb phase with a second
order phase transition and we give a first estimation of the critical
exponents.
| 0.887082 | 0.631155 | 0.255927 |
2004.07943 | Feature Selection and Intrusion Detection in Cloud Environment based on
Machine Learning Algorithms | Characteristics and way of behavior of attacks and infiltrators on computer
networks are usually very difficult and need an expert In addition; the
advancement of computer networks, the number of attacks and infiltrations are
also increasing. In fact, the knowledge coming from an expert will lose its
value over time and must be updated and made available to the system and this
makes the need for the expert person always felt. In machine learning
techniques, knowledge is extracted from the data itself which has diminished
the role of the expert. Various methods used to detect intrusions, such as
statistical models, safe system approach, neural networks, etc., all weaken the
fact that it uses all the features of an information packet rotating in the
network for intrusion detection. Also, the huge volume of information and the
unthinkable state space is also an important issue in the detection of
intrusion. Therefore, the need for automatic identification of new and
suspicious patterns in an attempt for intrusion with the use of more efficient
methods Lower cost and higher performance is needed more than before. The
purpose of this study is to provide a new method based on intrusion detection
systems and its various architectures aimed at increasing the accuracy of
intrusion detection in cloud computing. Keywords : intrusion detection, feature
Selection, classification Algorithm, machine learning, neural network.
| Recent research shows that colluded malware in different VMs sharing a single
physical host may use a resource as a channel to leak critical information.
Covert channels employ time or storage characteristics to transmit confidential
information to attackers leaving no trail.These channels were not meant for
communication and hence control mechanisms do not exist. This means these
remain undetected by traditional security measures employed in firewalls etc in
a network. The comprehensive survey to address the issue highlights that
accurate methods for fast detection in cloud are very expensive in terms of
storage and processing. The proposed framework builds signature by extracting
features which accurately classify the regular from covert traffic in cloud and
estimates difference in distribution of data under analysis by means of scores.
It then adds context to the signature and finally using machine learning
(Support Vector Machines),a model is built and trained for deploying in cloud.
The results show that the framework proposed is high in accuracy while being
low cost and robust as it is tested after adding noise which is likely to exist
in public cloud environments.
| 0.857151 | 0.804212 | 0.052939 |
2004.07944 | Cityscapes-Panoptic-Parts and PASCAL-Panoptic-Parts datasets for Scene
Understanding | In this technical report, we present two novel datasets for image scene
understanding. Both datasets have annotations compatible with panoptic
segmentation and additionally they have part-level labels for selected semantic
classes. This report describes the format of the two datasets, the annotation
protocols, the merging strategies, and presents the datasets statistics. The
datasets labels together with code for processing and visualization will be
published at https://github.com/tue-mps/panoptic_parts.
| Recent years have witnessed rapid progress in detecting and recognizing
individual object instances. To understand the situation in a scene, however,
computers need to recognize how humans interact with surrounding objects. In
this paper, we tackle the challenging task of detecting human-object
interactions (HOI). Our core idea is that the appearance of a person or an
object instance contains informative cues on which relevant parts of an image
to attend to for facilitating interaction prediction. To exploit these cues, we
propose an instance-centric attention module that learns to dynamically
highlight regions in an image conditioned on the appearance of each instance.
Such an attention-based network allows us to selectively aggregate features
relevant for recognizing HOIs. We validate the efficacy of the proposed network
on the Verb in COCO and HICO-DET datasets and show that our approach compares
favorably with the state-of-the-arts.
| 0.855023 | 0.737864 | 0.117159 |
2004.07945 | ALCN: Adaptive Local Contrast Normalization | To make Robotics and Augmented Reality applications robust to illumination
changes, the current trend is to train a Deep Network with training images
captured under many different lighting conditions. Unfortunately, creating such
a training set is a very unwieldy and complex task. We therefore propose a
novel illumination normalization method that can easily be used for different
problems with challenging illumination conditions. Our preliminary experiments
show that among current normalization methods, the Difference-of Gaussians
method remains a very good baseline, and we introduce a novel illumination
normalization model that generalizes it. Our key insight is then that the
normalization parameters should depend on the input image, and we aim to train
a Convolutional Neural Network to predict these parameters from the input
image. This, however, cannot be done in a supervised manner, as the optimal
parameters are not known a priori. We thus designed a method to train this
network jointly with another network that aims to recognize objects under
different illuminations: The latter network performs well when the former
network predicts good values for the normalization parameters. We show that our
method significantly outperforms standard normalization methods and would also
be appear to be universal since it does not have to be re-trained for each new
application. Our method improves the robustness to light changes of
state-of-the-art 3D object detection and face recognition methods.
| We introduce the Region Adaptive Graph Fourier Transform (RA-GFT) for
compression of 3D point cloud attributes. We assume the points are organized by
a family of nested partitions represented by a tree. The RA-GFT is a
multiresolution transform, formed by combining spatially localized block
transforms. At each resolution level, attributes are processed in clusters by a
set of block transforms. Each block transform produces a single approximation
(DC) coefficient, and various detail (AC) coefficients. The DC coefficients are
promoted up the tree to the next (lower resolution) level, where the process
can be repeated until reaching the root. Since clusters may have a different
numbers of points, each block transform must incorporate the relative
importance of each coefficient. For this, we introduce the
$\mathbf{Q}$-normalized graph Laplacian, and propose using its eigenvectors as
the block transform. The RA-GFT outperforms the Region Adaptive Haar Transform
(RAHT) by up to 2.5 dB, with a small complexity overhead.
| 0.747615 | 0.699946 | 0.04767 |
2004.07946 | Beyond Tree Embeddings -- a Deterministic Framework for Network Design
with Deadlines or Delay | We consider network design problems with deadline or delay. All previous
results for these models are based on randomized embedding of the graph into a
tree (HST) and then solving the problem on this tree. We show that this is not
necessary. In particular, we design a deterministic framework for these
problems which is not based on embedding. This enables us to provide
deterministic $\text{poly-log}(n)$-competitive algorithms for Steiner tree,
generalized Steiner tree, node weighted Steiner tree, (non-uniform) facility
location and directed Steiner tree with deadlines or with delay (where $n$ is
the number of nodes). Our deterministic algorithms also give improved
guarantees over some previous randomized results. In addition, we show a lower
bound of $\text{poly-log}(n)$ for some of these problems, which implies that
our framework is optimal up to the power of the poly-log. Our algorithms and
techniques differ significantly from those in all previous considerations of
these problems.
| Chinese word segmentation is a fundamental task for Chinese language
processing. The granularity mismatch problem is the main cause of the errors.
This paper showed that the binary tree representation can store outputs with
different granularity. A binary tree based framework is also designed to
overcome the granularity mismatch problem. There are two steps in this
framework, namely tree building and tree pruning. The tree pruning step is
specially designed to focus on the granularity problem. Previous work for
Chinese word segmentation such as the sequence tagging can be easily employed
in this framework. This framework can also provide quantitative error analysis
methods. The experiments showed that after using a more sophisticated tree
pruning function for a state-of-the-art conditional random field based
baseline, the error reduction can be up to 20%.
| 0.863204 | 0.628973 | 0.234231 |
2004.07947 | The socio-economic determinants of the coronavirus disease (COVID-19)
pandemic | The magnitude of the coronavirus disease (COVID-19) pandemic has an enormous
impact on the social life and the economic activities in almost every country
in the world. Besides the biological and epidemiological factors, a multitude
of social and economic criteria also govern the extent of the coronavirus
disease spread in the population. Consequently, there is an active debate
regarding the critical socio-economic determinants that contribute to the
resulting pandemic. In this paper, we contribute towards the resolution of the
debate by leveraging Bayesian model averaging techniques and country level data
to investigate the potential of 35 determinants, describing a diverse set of
socio-economic characteristics, in explaining the coronavirus pandemic outcome.
| Research significance: During the epidemic prevention and control period, our
study can be helpful in prognosis, diagnosis and screening for the patients
infected with COVID-19 (the novel coronavirus) based on breathing
characteristics. According to the latest clinical research, the respiratory
pattern of COVID-19 is different from the respiratory patterns of flu and the
common cold. One significant symptom that occurs in the COVID-19 is Tachypnea.
People infected with COVID-19 have more rapid respiration. Our study can be
utilized to distinguish various respiratory patterns and our device can be
preliminarily put to practical use. Demo videos of this method working in
situations of one subject and two subjects can be downloaded online. Research
details: Accurate detection of the unexpected abnormal respiratory pattern of
people in a remote and unobtrusive manner has great significance. In this work,
we innovatively capitalize on depth camera and deep learning to achieve this
goal. The challenges in this task are twofold: the amount of real-world data is
not enough for training to get the deep model; and the intra-class variation of
different types of respiratory patterns is large and the outer-class variation
is small. In this paper, considering the characteristics of actual respiratory
signals, a novel and efficient Respiratory Simulation Model (RSM) is first
proposed to fill the gap between the large amount of training data and scarce
real-world data. Subsequently, we first apply a GRU neural network with
bidirectional and attentional mechanisms (BI-AT-GRU) to classify 6 clinically
significant respiratory patterns (Eupnea, Tachypnea, Bradypnea, Biots,
Cheyne-Stokes and Central-Apnea). The proposed deep model and the modeling
ideas have the great potential to be extended to large scale applications such
as public places, sleep scenario, and office environment.
| 0.917156 | 0.707611 | 0.209545 |
2004.07948 | Sound of Guns: Digital Forensics of Gun Audio Samples meets Artificial
Intelligence | Classifying a weapon based on its muzzle blast is a challenging task that has
significant applications in various security and military fields. Most of the
existing works rely on ad-hoc deployment of spatially diverse microphone
sensors to capture multiple replicas of the same gunshot, which enables
accurate detection and identification of the acoustic source. However,
carefully controlled setups are difficult to obtain in scenarios such as crime
scene forensics, making the aforementioned techniques inapplicable and
impractical. We introduce a novel technique that requires zero knowledge about
the recording setup and is completely agnostic to the relative positions of
both the microphone and shooter. Our solution can identify the category,
caliber, and model of the gun, reaching over 90% accuracy on a dataset composed
of 3655 samples that are extracted from YouTube videos. Our results demonstrate
the effectiveness and efficiency of applying Convolutional Neural Network (CNN)
in gunshot classification eliminating the need for an ad-hoc setup while
significantly improving the classification performance.
| Today, the volume of evidence collected per case is growing exponentially, to
address this problem forensics investigators are looking for investigation
process with tools built on new technologies like big data, cloud services, and
Deep Learning (DL) techniques. Consequently, the accuracy of artifacts found
also relies on the performance of techniques used, especially DL models.
Recently, \textbf{D}eep \textbf{N}eural \textbf{N}ets (\textbf{DNN}) have
achieved state of the art performance in the tasks of classification and
recognition. In the context of digital forensics, DNN has been applied to the
domains of cybercrime investigation such as child abuse investigations, malware
classification, steganalysis and image forensics. However, the robustness of
DNN models in the context of digital forensics is never studied before. Hence,
in this research, we design and implement a domain-independent Adversary
Testing Framework (ATF) to test the security robustness of black-box DNN's. By
using ATF, we also methodically test a commercially available DNN service used
in forensic investigations and bypass the detection, where published methods
fail in control settings.
| 0.834296 | 0.731588 | 0.102708 |
2004.07949 | A Resource Allocation and Coordinated Transmission Scheme for Large
Cellular Networks | With the increasing number of user equipment (UE) and data demands, denser
access points (APs) are being employed. Resource allocation problems have been
extensively researched with interference treated as noise. It is well
understood that the overall spectral efficiency can be significantly improved
if multiple terminals coordinate their transmissions either coherently or
non-coherently.The focus of this paper is to study how to select pairs of APs
for coordination and allocate resources accordingly. An optimization problem is
formulated to maximize the network utility function by optimizing AP paring,
spectrum allocation, user association, and power management in a flexible
manner. A scalable and efficient algorithm is proposed based on iterative
scheme pursuit and fractional programming. Numerical results demonstrate
substantial gains in the network utility due to coordinated transmission in a
network of 128 APs and 384 UE.
| Two-tier networks, comprising a conventional cellular network overlaid with
shorter range hotspots (e.g. femtocells, distributed antennas, or wired
relays), offer an economically viable way to improve cellular system capacity.
The capacity-limiting factor in such networks is interference. The cross-tier
interference between macrocells and femtocells can suffocate the capacity due
to the near-far problem, so in practice hotspots should use a different
frequency channel than the potentially nearby high-power macrocell users.
Centralized or coordinated frequency planning, which is difficult and
inefficient even in conventional cellular networks, is all but impossible in a
two-tier network. This paper proposes and analyzes an optimum decentralized
spectrum allocation policy for two-tier networks that employ frequency division
multiple access (including OFDMA). The proposed allocation is optimal in terms
of Area Spectral Efficiency (ASE), and is subjected to a sensible Quality of
Service (QoS) requirement, which guarantees that both macrocell and femtocell
users attain at least a prescribed data rate. Results show the dependence of
this allocation on the QoS requirement, hotspot density and the co-channel
interference from the macrocell and surrounding femtocells. Design
interpretations of this result are provided.
| 0.820573 | 0.786802 | 0.033771 |
2004.07950 | Learning visual policies for building 3D shape categories | Manipulation and assembly tasks require non-trivial planning of actions
depending on the environment and the final goal. Previous work in this domain
often assembles particular instances of objects from known sets of primitives.
In contrast, we here aim to handle varying sets of primitives and to construct
different objects of the same shape category. Given a single object instance of
a category, e.g. an arch, and a binary shape classifier, we learn a visual
policy to assemble other instances of the same category. In particular, we
propose a disassembly procedure and learn a state policy that discovers new
object instances and their assembly plans in state space. We then render
simulated states in the observation space and learn a heatmap representation to
predict alternative actions from a given input image. To validate our approach,
we first demonstrate its efficiency for building object categories in state
space. We then show the success of our visual policies for building arches from
different primitives. Moreover, we demonstrate (i) the reactive ability of our
method to re-assemble objects using additional primitives and (ii) the robust
performance of our policy for unseen primitives resembling building blocks used
during training. Our visual assembly policies are trained with no real images
and reach up to 95% success rate when evaluated on a real robot.
| Finding point-wise correspondences between images is a long-standing problem
in computer vision. Corresponding sketch images is particularly challenging due
to the varying nature of human style, projection distortions and viewport
changes. In this paper we present a feature descriptor targeting line drawings
learned from a 3D shape data set. Our descriptors are designed to locally match
image pairs where the object of interest belongs to the same semantic category,
yet still differ drastically in shape and projection angle. We build our
descriptors by means of a Convolutional Neural Network (CNN) trained in a
triplet fashion. The goal is to embed semantically similar anchor points close
to one another, and to pull the embeddings of different points far apart. To
learn the descriptors space, the network is fed with a succession of zoomed
views from the input sketches. We have specifically crafted a data set of
synthetic sketches using a non-photorealistic rendering algorithm over a large
collection of part-based registered 3D models. Once trained, our network can
generate descriptors for every pixel in an input image. Furthermore, our
network is able to generalize well to unseen sketches hand-drawn by humans,
outperforming state-of-the-art descriptors on the evaluated matching tasks. Our
descriptors can be used to obtain sparse and dense correspondences between
image pairs. We evaluate our method against a baseline of correspondences data
collected from expert designers, in addition to comparisons with descriptors
that have been proven effective in sketches. Finally, we demonstrate
applications showing the usefulness of our multi-view descriptors.
| 0.822037 | 0.773192 | 0.048844 |
2004.07951 | Measuring Fluxes of Meteor Showers with the NASA All-Sky Fireball
Network | We present an algorithm developed to measure the fluxes of major meteor
showers as observed in NASA's All-Sky Fireball Network cameras. Measurements of
fluxes from the All-Sky cameras not only improve the Meteoroid Environment
Office's (MEO's) ability to provide accurate risk assessments from major
showers, but also allows the mass distribution of meteoroids within the shower
to be constrained. This algorithm accounts for the shower-specific and
event-specific exposure time and collecting area of the sky for nights where
sufficiently large samples of shower meteors ($\sim 30$ or more from the
shower) are observed. The fluxes derived from the All-Sky Fireball Network for
the 2015 Geminid, 2016 Perseid and Quadrantid, 2017 Orionid, and 2018 Leonid
shower peaks are calculated. All five of these shower fluxes show excellent
agreement with expectations from independent measurements at different mass and
luminosity limits. For four of these five showers, the measured mass indices
are significantly shallower than what is currently assumed by the NASA
Meteoroid Environment Office's (MEO's) annual meteor shower forecast. A direct
comparison between forecasted and measured fluxes at limiting masses of $\sim 1
\thinspace \mathrm{g}$ shows good agreement for the three showers for which the
observations took place near their peak activity.
| We report a new observation of the Jupiter-family comet 209P/LINEAR during
its 2014 return. The comet is recognized as a dust source of a new meteor
shower, the May Camelopardalids. 209P/LINEAR was apparently inactive at a
heliocentric distance rh = 1.6 au and showed weak activity at rh < 1.4 au. We
found an active region of <0.001% of the entire nuclear surface during the
comet's dormant phase. An edge-on image suggests that particles up to 1 cm in
size (with an uncertainty of factor 3-5) were ejected following a differential
power-law size distribution with index q=-3.25+-0.10. We derived a mass loss
rate of 2-10 kg/s during the active phase and a total mass of ~5x10^7 kg during
the 2014 return. The ejection terminal velocity of millimeter- to
centimeter-sized particles was 1-4 m/s, which is comparable to the escape
velocity from the nucleus (1.4 m/s). These results imply that such large
meteoric particles marginally escaped from the highly dormant comet nucleus via
the gas drag force only within a few months of the perihelion passage.
| 0.913462 | 0.721696 | 0.191766 |
2004.07952 | Envelope Theory for Systems with Different Particles | The eigensolutions of many-body quantum systems are always difficult to
compute. The envelope theory is a method to easily obtain approximate, but
reliable, solutions in the case of identical particles. It is extended here to
treat systems with different particles (bosons or fermions). The accuracy is
tested for several systems composed of identical particles plus a different
one.
| Starting with an operator in the universal enveloping algebra of a
semi-simple, complex Lie group the nearest neighbor statistics of the spectra
of this operator along a sequence of representations are discussed.
After a short introduction in chapter 1 this problem is motivated by a
general construction of the classical limit for quantum mechanical systems,
which is adopted to this setting, in chapter 2. In chapter 3 it is shown that
for simple operators, i.e., operators of the Lie algebra the nearest neighbor
statistics along a sequence of irreducible representations converge to the
Dirac measure. After a suitable completion of the universal enveloping algebra
the convergence to Poisson statistics is proved in chapter 4 for the
exponentials of generic operators. The proof makes use of a combinatorial
inequality of the Katz-Sarnak type for tori, which is proved in chapter 5. In
the appendix the necessary facts from group theory and the theory of nearest
neighbor distributions are gathered.
| 0.897067 | 0.724091 | 0.172975 |
2004.07953 | Exploring laser-driven neutron sources for neutron capture cascades and
the production of neutron-rich isotopes | The production of neutron-rich isotopes and the occurrence of neutron capture
cascades via laser-driven (pulsed) neutron sources are investigated
theoretically. The considered scenario involves the interaction of a
laser-driven neutron beam with a target made of a single type of seed nuclide.
We present a comprehensive study over $95$ seed nuclides in the range $3\le Z
\le 100$ from $^7_3$Li to $^{255}_{100}$Fm. For each element, the heaviest
sufficiently-long-lived (half life $> 1$ h) isotope whose data is available in
the recent ENDF-B-VIII.0 neutron sublibrary is considered. We identify
interesting seed nuclides with good performance in the production of
neutron-rich isotopes where neutron capture cascades may occur. The effects of
the neutron number per pulse, the neutron-target interaction size and the
number of neutron pulses are also analyzed. Our results show the possibility of
observing up to $4$ successive neutron capture events leading to neutron-rich
isotopes with $4$ more neutrons than the original seed nuclide. This hints at
new experimental possibilities to produce neutron-rich isotopes and simulate
neutron capture nucleosynthesis in the laboratory. With several selected
interesting seed nuclides in the region of the branching point of the
$s$-process ($^{126}_{51}$Sb, $^{176}_{71}$Lu and $^{187}_{75}$Re) or the
waiting point of the $r$-process (Lu, Re, Os, Tm, Ir and Au), we expect that
laser-driven experiments can shed light on our understanding of
nucleosynthesis.
| Neutron rich Zr nuclei with number of neutrons between $N$= 50 and 82 are
investigated in the relativistic mean field approach in co-ordinate space. The
resonant levels in the positive energy continuum have been explicitly included
in the calculation. Odd nuclei have been treated in the blocking approximation.
Our calculation indicates that the dripline for odd mass isotopes is far away
from that for the even mass ones. Pairing interaction plays a significant role
in stabilizing the even isotopes, thus extending the dripline for them.
| 0.903857 | 0.699068 | 0.20479 |
2004.07954 | A novel method for constructing high accurate and robust WENO-Z type
scheme | A novel method for constructing robust and high-order accurate weighted
essentially non-oscillatory (WENO) scheme is proposed in this paper. The method
is mainly based on the WENO-Z type scheme, in which, an eighth-order global
smoothness indicator (the square of the approximation of the fourth-order
derivative on the five-point stencil used by the fifth-order WENO scheme) is
used, and in order to keep the ENO property and robustness, the constant 1 used
to calculate the un-normalized weights is replaced by a function of local
smoothness indicators of candidate sub-stencils. This function is designed to
have following adaptive property: if the five-point stencil contains a
discontinuity, then the function approaches to a small value, otherwise, it
approaches to a large value. Analysis and numerical results show that the
resulted WENO-Z type (WENO-ZN) scheme is robust for capturing shock waves and,
in smooth regions, achieves fifth-order accuracy at first-order critical point
and fourth-order accuracy at second-order critical point.
| Inspired by the well-known permutation entropy (PE), an effective image
encoding scheme for chaotic time series, Triad State Space Construction (TSSC),
is proposed. The TSSC image can recognize higher-order temporal patterns and
identify new forbidden regions in time series motifs beyond the Bandt-Pompe
probabilities. The Convolutional Neural Network (ConvNet) is widely used in
image classification. The ConvNet classifier based on TSSC images
(TSSC-ConvNet) are highly accurate and very robust in the chaotic signal
classification.
| 0.854725 | 0.673797 | 0.180927 |
2004.07955 | Targeted Attack for Deep Hashing based Retrieval | The deep hashing based retrieval method is widely adopted in large-scale
image and video retrieval. However, there is little investigation on its
security. In this paper, we propose a novel method, dubbed deep hashing
targeted attack (DHTA), to study the targeted attack on such retrieval.
Specifically, we first formulate the targeted attack as a point-to-set
optimization, which minimizes the average distance between the hash code of an
adversarial example and those of a set of objects with the target label. Then
we design a novel component-voting scheme to obtain an anchor code as the
representative of the set of hash codes of objects with the target label, whose
optimality guarantee is also theoretically derived. To balance the performance
and perceptibility, we propose to minimize the Hamming distance between the
hash code of the adversarial example and the anchor code under the
$\ell^\infty$ restriction on the perturbation. Extensive experiments verify
that DHTA is effective in attacking both deep hashing based image retrieval and
video retrieval.
| Deep learning has gained tremendous success and great popularity in the past
few years. However, recent research found that it is suffering several inherent
weaknesses, which can threaten the security and privacy of the stackholders.
Deep learning's wide use further magnifies the caused consequences. To this
end, lots of research has been conducted with the purpose of exhaustively
identifying intrinsic weaknesses and subsequently proposing feasible
mitigation. Yet few is clear about how these weaknesses are incurred and how
effective are these attack approaches in assaulting deep learning. In order to
unveil the security weaknesses and aid in the development of a robust deep
learning system, we are devoted to undertaking a comprehensive investigation on
attacks towards deep learning, and extensively evaluating these attacks in
multiple views. In particular, we focus on four types of attacks associated
with security and privacy of deep learning: model extraction attack, model
inversion attack, poisoning attack and adversarial attack. For each type of
attack, we construct its essential workflow as well as adversary capabilities
and attack goals. Many pivot metrics are devised for evaluating the attack
approaches, by which we perform a quantitative and qualitative analysis. From
the analysis, we have identified significant and indispensable factors in an
attack vector, \eg, how to reduce queries to target models, what distance used
for measuring perturbation. We spot light on 17 findings covering these
approaches' merits and demerits, success probability, deployment complexity and
prospects. Moreover, we discuss other potential security weaknesses and
possible mitigation which can inspire relevant researchers in this area.
| 0.912448 | 0.750821 | 0.161628 |