id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
479
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
unknown | authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2312.08840 | Alban Poth\'erat | Alban Poth\'erat, K\'elig Aujogue and Fran\c{c}ois Debray | Magnetic Taylor-Proudman constraint explains the flows into the Tangent
Cylinder | 6 pages + 2 pages supplemental material, 4 figures, 48 references | null | null | null | physics.flu-dyn physics.geo-ph | http://creativecommons.org/licenses/by/4.0/ | Tangent Cylinders (TCs) have shaped our understanding of planetary dynamos
and liquid cores. The Taylor-Proudman Constraint (TPC) due to planetary
rotation creates these imaginary surfaces separating polar and equatorial
regions but cannot explain the flows meandering through them. Here we establish
and verify experimentally that magnetic fields aligned with rotation drive
flows \emph{into} TCs, linked to the flows \emph{along} TCs by a
\emph{magnetic} Taylor-Proudman constraint. This constraint explains and
quantifies how magnetic fields reshape rotating flows in planetary interiors
and magnetorotating flows in general.
| [
{
"version": "v1",
"created": "Thu, 14 Dec 2023 11:52:35 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Sep 2024 21:13:37 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 10:56:00 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Pothérat",
"Alban",
""
],
[
"Aujogue",
"Kélig",
""
],
[
"Debray",
"François",
""
]
] |
2312.10741 | Yu Zhang | Yu Zhang, Rongjie Huang, Ruiqi Li, JinZheng He, Yan Xia, Feiyang Chen,
Xinyu Duan, Baoxing Huai, Zhou Zhao | StyleSinger: Style Transfer for Out-of-Domain Singing Voice Synthesis | Accepted by AAAI 2024 | null | null | null | eess.AS cs.CL cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Style transfer for out-of-domain (OOD) singing voice synthesis (SVS) focuses
on generating high-quality singing voices with unseen styles (such as timbre,
emotion, pronunciation, and articulation skills) derived from reference singing
voice samples. However, the endeavor to model the intricate nuances of singing
voice styles is an arduous task, as singing voices possess a remarkable degree
of expressiveness. Moreover, existing SVS methods encounter a decline in the
quality of synthesized singing voices in OOD scenarios, as they rest upon the
assumption that the target vocal attributes are discernible during the training
phase. To overcome these challenges, we propose StyleSinger, the first singing
voice synthesis model for zero-shot style transfer of out-of-domain reference
singing voice samples. StyleSinger incorporates two critical approaches for
enhanced effectiveness: 1) the Residual Style Adaptor (RSA) which employs a
residual quantization module to capture diverse style characteristics in
singing voices, and 2) the Uncertainty Modeling Layer Normalization (UMLN) to
perturb the style attributes within the content representation during the
training phase and thus improve the model generalization. Our extensive
evaluations in zero-shot style transfer undeniably establish that StyleSinger
outperforms baseline models in both audio quality and similarity to the
reference singing voice samples. Access to singing voice samples can be found
at https://stylesinger.github.io/.
| [
{
"version": "v1",
"created": "Sun, 17 Dec 2023 15:26:16 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jan 2024 12:59:20 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 05:36:06 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Zhang",
"Yu",
""
],
[
"Huang",
"Rongjie",
""
],
[
"Li",
"Ruiqi",
""
],
[
"He",
"JinZheng",
""
],
[
"Xia",
"Yan",
""
],
[
"Chen",
"Feiyang",
""
],
[
"Duan",
"Xinyu",
""
],
[
"Huai",
"Baoxing",
""
],
[
"Zhao",
"Zhou",
""
]
] |
2312.11602 | Kohei Inayoshi | Kohei Inayoshi, Kazumi Kashiyama, Wenxiu Li, Yuichi Harikane, Kohei
Ichikawa, and Masafusa Onoue | Exploring Low-Mass Black Holes through Tidal Disruption Events in the
Early Universe: Perspectives in the Era of JWST, RST, and LSST Surveys | 24 pages, 12 figures, 3 tables, accepted for publication in ApJ | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | The James Webb Space Telescope (JWST) has recently uncovered the presence of
low-luminosity active galactic nuclei (AGNs) at $z=4-11$. Spectroscopic
observations have provided estimates of the nuclear black hole (BH) masses for
these sources, extending the low-mass boundary down to $M_{\rm BH} \sim
10^{6-7}~M_\odot$. Despite this breakthrough, the observed lowest mass of BHs
is still $\gtrsim 1-2$ orders of magnitude heavier than the predicted mass
range of their seed population, thereby leaving the initial mass distribution
of massive BHs poorly constrained. In this paper, we focus on UV-to-optical (in
rest frame) flares of stellar tidal disruption events (TDEs) embedded in
low-luminosity AGNs as a tool to explore low-mass BH populations with $\lesssim
10^{4-6}~M_\odot$. We provide an estimate of the TDE rate over $z=4-11$
associated wth the properties of JWST-detected AGN host galaxies, and find that
deep and wide survey programs with JWST and Roman Space Telescope (RST) can
detect and identify TDEs up to $z\simeq 4-7$. The predicted detection numbers
of TDEs at $z>4$ in one year are $N_{\rm TDE} \sim 2-10~(0.2-2)$ for the
JADES-Medium (and COSMOS-Web) survey with JWST, and $N_{\rm TDE} \sim
2-10~(8-50)$ for the Deep (and Wide) tier of the High-latitude Time Domain
Survey with RST. We further discuss the survey strategies to hunt for the
transient high-redshift TDEs in wide-field surveys with RST, as well as a joint
observation campaign with the Vera C. Rubin Observatory for enhancing the
detection number. The high-redshift TDE search will give us a unique
opportunity to probe the mass distribution of early BH populations.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2023 19:00:00 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 11:06:13 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Inayoshi",
"Kohei",
""
],
[
"Kashiyama",
"Kazumi",
""
],
[
"Li",
"Wenxiu",
""
],
[
"Harikane",
"Yuichi",
""
],
[
"Ichikawa",
"Kohei",
""
],
[
"Onoue",
"Masafusa",
""
]
] |
2312.12567 | Thomas Blom | Thomas Blom, Ieke Moerdijk | Profinite completions of topological operads | v2: Changed title and introduction, other minor changes. 45 pages | null | null | CPH-GEOTOP-DNRF151 | math.AT math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the particular profinite completion used by
Boavida-Horel-Robertson in their study of the Grothendieck-Teichm\"uller group
fits in the framework of profinite completion as a left Quillen functor. More
precisely, we construct a model category of profinite up-to-homotopy operads
based on dendroidal objects in Quick's model category of profinite spaces and
show that the construction of Boavida-Horel-Robertson extends to a left Quillen
functor into this model category. We also characterize the underlying
$\infty$-category of this model category and obtain a Dwyer-Kan style
characterization of the weak equivalences between such profinite up-to-homotopy
operads. Since this model category of profinite up-to-homotopy operads is
Quillen equivalent to the one considered in our earlier paper "Profinite
$\infty$-operads", we obtain analogous results in that setting.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2023 20:03:26 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 13:13:22 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Blom",
"Thomas",
""
],
[
"Moerdijk",
"Ieke",
""
]
] |
2312.13862 | Bartlomiej Szafran | B.Szafran, M.Zegrodnik. M.P.Nowak, R. Citro, P. W\'ojcik | Electric dipole spin resonance in single and two electron quantum dot
defined in two-dimensional electron gas at the SrTiO$_3$/LaAlO$_3$ interface | PRB in print | Phys. Rev. B 109, 155306 (2024) | 10.1103/PhysRevB.109.155306 | null | cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | We investigate the energy spectrum of a single and two electron quantum dot
(QD) embedded in two dimensional electron gas at the interface between
SrTiO$_3$ and LaAlO$_3$, in the presence of the external magnetic field. For
this purpose the three band model of $3d$-electrons defined on the square
lattice of Ti ions was utilized. We demonstrate that, for the weak parabolic
confinement potential, the low energy spectrum is sufficiently well described
by the effective Hamiltonian reduced to the one $d_{xy}$ orbital with the
spin-orbit interaction originating from the coupling to the $d_{xz}$, $d_{yz}$
bands. This is not the case for stronger confinement where contribution of the
states related to the $d_{xz/yz}$ orbital is relevant. Based on the time
depended calculations we discuss in details the manipulation of the electron
spin in QD by external AC voltages, in the context of the electric dipole spin
resonance. The allowed and forbidden transitions are discussed in details with
respect to the parity selection rule. Our calculations show that for a single
electron QD the spin-flip in the ground-state has a character of a Rabi
resonance while for two electrons the singlet-triplet transition is forbidden
by the parity symmetry. For the two electrons QD, we demonstrate that the
spin-flip transition can still be accomplished via a second-order, two-photon
process that has a two-state Rabi character for low AC field amplitude. The
violation of the parity symmetry on the spin-flip transitions is also analyzed.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2023 14:00:56 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Apr 2024 06:51:52 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Szafran",
"B.",
""
],
[
"Nowak",
"M. Zegrodnik. M. P.",
""
],
[
"Citro",
"R.",
""
],
[
"Wójcik",
"P.",
""
]
] |
2312.14075 | Arash Vaezi | Arash Vaezi, Ali Movaghar, Mohammad Ghodsi, Seyed Mohammad Hussein
Kazemi, Negin Bagheri Noghrehy, Seyed Mohsen Kazemi | Quantum Complexity vs Classical Complexity: A Survey | arXiv admin note: text overlap with arXiv:1612.07366 by other authors | null | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scientists have demonstrated that quantum computing has presented novel
approaches to address computational challenges, each varying in complexity.
Adapting problem-solving strategies is crucial to harness the full potential of
quantum computing. Nonetheless, there are defined boundaries to the
capabilities of quantum computing. This paper concentrates on aggregating prior
research efforts dedicated to solving intricate classical computational
problems through quantum computing. The objective is to systematically compile
an exhaustive inventory of these solutions and categorize a collection of
demanding open problems that await further exploration. Through statistical
analysis, we help the researchers with their further investigations.
| [
{
"version": "v1",
"created": "Sat, 16 Dec 2023 16:02:21 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2024 16:36:08 GMT"
},
{
"version": "v3",
"created": "Sat, 13 Jan 2024 07:32:35 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Aug 2024 12:40:17 GMT"
},
{
"version": "v5",
"created": "Wed, 11 Sep 2024 22:11:48 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Vaezi",
"Arash",
""
],
[
"Movaghar",
"Ali",
""
],
[
"Ghodsi",
"Mohammad",
""
],
[
"Kazemi",
"Seyed Mohammad Hussein",
""
],
[
"Noghrehy",
"Negin Bagheri",
""
],
[
"Kazemi",
"Seyed Mohsen",
""
]
] |
2312.14206 | Wei Feng | Wei Feng, Xin Wang, Hong Chen, Zeyang Zhang, Houlun Chen, Zihan Song,
Yuwei Zhou, Yuekui Yang, Haiyang Wu, Wenwu Zhu | LLM4VG: Large Language Models Evaluation for Video Grounding | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Recently, researchers have attempted to investigate the capability of LLMs in
handling videos and proposed several video LLM models. However, the ability of
LLMs to handle video grounding (VG), which is an important time-related video
task requiring the model to precisely locate the start and end timestamps of
temporal moments in videos that match the given textual queries, still remains
unclear and unexplored in literature. To fill the gap, in this paper, we
propose the LLM4VG benchmark, which systematically evaluates the performance of
different LLMs on video grounding tasks. Based on our proposed LLM4VG, we
design extensive experiments to examine two groups of video LLM models on video
grounding: (i) the video LLMs trained on the text-video pairs (denoted as
VidLLM), and (ii) the LLMs combined with pretrained visual description models
such as the video/image captioning model. We propose prompt methods to
integrate the instruction of VG and description from different kinds of
generators, including caption-based generators for direct visual description
and VQA-based generators for information enhancement. We also provide
comprehensive comparisons of various VidLLMs and explore the influence of
different choices of visual models, LLMs, prompt designs, etc, as well. Our
experimental evaluations lead to two conclusions: (i) the existing VidLLMs are
still far away from achieving satisfactory video grounding performance, and
more time-related video tasks should be included to further fine-tune these
models, and (ii) the combination of LLMs and visual models shows preliminary
abilities for video grounding with considerable potential for improvement by
resorting to more reliable models and further guidance of prompt instructions.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2023 08:15:02 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Dec 2023 13:02:31 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 02:57:07 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Feng",
"Wei",
""
],
[
"Wang",
"Xin",
""
],
[
"Chen",
"Hong",
""
],
[
"Zhang",
"Zeyang",
""
],
[
"Chen",
"Houlun",
""
],
[
"Song",
"Zihan",
""
],
[
"Zhou",
"Yuwei",
""
],
[
"Yang",
"Yuekui",
""
],
[
"Wu",
"Haiyang",
""
],
[
"Zhu",
"Wenwu",
""
]
] |
2312.14243 | Hector Pablo Ojeda Collado Dr. | H. P. Ojeda Collado, Marios H. Michael, Jim Skulte, Angel Rubio, and
Ludwig Mathey | Equilibrium Parametric Amplification in Raman-Cavity Hybrids | as accepted in PRL | null | 10.1103/PhysRevLett.133.116901 | null | quant-ph cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Parametric resonances and amplification have led to extraordinary
photoinduced phenomena in pump-probe experiments. While these phenomena
manifest themselves in out-of-equilibrium settings, here, we present the
striking result of parametric amplification in equilibrium. In particular, we
demonstrate that quantum and thermal fluctuations of a Raman-active mode
amplifies light inside a cavity, at equilibrium, when the Raman mode frequency
is twice the cavity mode frequency. This noise-driven amplification leads to
the creation of an unusual parametric Raman polariton, intertwining the Raman
mode with cavity squeezing fluctuations, with smoking gun signatures in Raman
spectroscopy. In the resonant regime, we show the emergence of not only quantum
light amplification but also localization and static shift of the Raman mode.
Apart from the fundamental interest of equilibrium parametric amplification our
study suggests a resonant mechanism for controlling Raman modes and thus matter
properties by cavity fluctuations. We conclude by outlining how to compute the
Raman-cavity coupling, and suggest possible experimental realization
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2023 19:00:11 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 13:41:44 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Collado",
"H. P. Ojeda",
""
],
[
"Michael",
"Marios H.",
""
],
[
"Skulte",
"Jim",
""
],
[
"Rubio",
"Angel",
""
],
[
"Mathey",
"Ludwig",
""
]
] |
2312.14278 | Thibaut Divoux | Thibaut Divoux, Elisabeth Agoritsas, Stefano Aime, Catherine Barentin,
Jean-Louis Barrat, Roberto Benzi, Ludovic Berthier, Dapeng Bi, Giulio Biroli,
Daniel Bonn, Philippe Bourrianne, Mehdi Bouzid, Emanuela Del Gado, H\'el\`ene
Delano\"e-Ayari, Kasra Farain, Suzanne Fielding, Matthias Fuchs, Jasper van
der Gucht, Silke Henkes, Maziyar Jalaal, Yogesh M. Joshi, Ana\"el Lema\^itre,
Robert L. Leheny, S\'ebastien Manneville, Kirsten Martens, Wilson C.K. Poon,
Marko Popovi\'c, Itamar Procaccia, Laurence Ramos, James A. Richards, Simon
Rogers, Saverio Rossi, Mauro Sbragaglia, Gilles Tarjus, Federico Toschi,
V\'eronique Trappe, Jan Vermant, Matthieu Wyart, Francesco Zamponi, Davoud
Zare | Ductile-to-brittle transition and yielding in soft amorphous materials:
perspectives and open questions | 21 pages, 7 figures, perspective on the workshop 'Yield stress and
fluidization in brittle and ductile amorphous systems' held from January 9 to
13, 2023 at the Lorentz Center in Leiden | Soft Matter, 2024,20, 6868-6888 | 10.1039/D3SM01740K | null | cond-mat.soft cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | Soft amorphous materials are viscoelastic solids ubiquitously found around
us, from clays and cementitious pastes to emulsions and physical gels
encountered in food or biomedical engineering. Under an external deformation,
these materials undergo a noteworthy transition from a solid to a liquid state
that reshapes the material microstructure. This yielding transition was the
main theme of a workshop held from January 9 to 13, 2023 at the Lorentz Center
in Leiden. The manuscript presented here offers a critical perspective on the
subject, synthesizing insights from the various brainstorming sessions and
informal discussions that unfolded during this week of vibrant exchange of
ideas. The result of these exchanges takes the form of a series of open
questions that represent outstanding experimental, numerical, and theoretical
challenges to be tackled in the near future.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2023 20:11:44 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Divoux",
"Thibaut",
""
],
[
"Agoritsas",
"Elisabeth",
""
],
[
"Aime",
"Stefano",
""
],
[
"Barentin",
"Catherine",
""
],
[
"Barrat",
"Jean-Louis",
""
],
[
"Benzi",
"Roberto",
""
],
[
"Berthier",
"Ludovic",
""
],
[
"Bi",
"Dapeng",
""
],
[
"Biroli",
"Giulio",
""
],
[
"Bonn",
"Daniel",
""
],
[
"Bourrianne",
"Philippe",
""
],
[
"Bouzid",
"Mehdi",
""
],
[
"Del Gado",
"Emanuela",
""
],
[
"Delanoë-Ayari",
"Hélène",
""
],
[
"Farain",
"Kasra",
""
],
[
"Fielding",
"Suzanne",
""
],
[
"Fuchs",
"Matthias",
""
],
[
"van der Gucht",
"Jasper",
""
],
[
"Henkes",
"Silke",
""
],
[
"Jalaal",
"Maziyar",
""
],
[
"Joshi",
"Yogesh M.",
""
],
[
"Lemaître",
"Anaël",
""
],
[
"Leheny",
"Robert L.",
""
],
[
"Manneville",
"Sébastien",
""
],
[
"Martens",
"Kirsten",
""
],
[
"Poon",
"Wilson C. K.",
""
],
[
"Popović",
"Marko",
""
],
[
"Procaccia",
"Itamar",
""
],
[
"Ramos",
"Laurence",
""
],
[
"Richards",
"James A.",
""
],
[
"Rogers",
"Simon",
""
],
[
"Rossi",
"Saverio",
""
],
[
"Sbragaglia",
"Mauro",
""
],
[
"Tarjus",
"Gilles",
""
],
[
"Toschi",
"Federico",
""
],
[
"Trappe",
"Véronique",
""
],
[
"Vermant",
"Jan",
""
],
[
"Wyart",
"Matthieu",
""
],
[
"Zamponi",
"Francesco",
""
],
[
"Zare",
"Davoud",
""
]
] |
2312.14408 | Yunfeng Kong | Yunfeng Kong, Chenchen Lian, Guangli Zhang, Shiyan Zhai | Extended p-median problems for balancing service efficiency and equality | 50 pages, 4 tables, 5 figures | null | null | null | cs.CY | http://creativecommons.org/licenses/by/4.0/ | This article deals with the location problem for balancing the service
efficiency and equality. In public service systems, some individuals may
experience envy if they have to travel longer distances to access services
compared to others. This envy can be simplified by comparing an individual's
travel distance to a service facility against a threshold distance. Four
extended p-median problems are proposed, utilizing the total travel distance
and total envy to balance service efficiency and spatial equality. The new
objective function is designed to be inequity-averse and exhibits several
analytical properties that pertain to both service efficiency and equality. The
extended problems were extensively tested on two sets of benchmark instances
and one set of geographical instances. The experimentation shows that the
equality measures, such as the standard deviation, mean absolute deviation, and
Gini coefficient between travel distances, can be substantially improved by
slightly increasing the travel distance. Additionally, the advantages of the
proposed problems were validated through Pareto optimality analysis and
comparisons with other location problems.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2023 03:22:55 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Apr 2024 09:19:02 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 09:32:24 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Kong",
"Yunfeng",
""
],
[
"Lian",
"Chenchen",
""
],
[
"Zhang",
"Guangli",
""
],
[
"Zhai",
"Shiyan",
""
]
] |
2312.16160 | Mengxin Yu | Edgar Dobriban, Mengxin Yu | SymmPI: Predictive Inference for Data with Group Symmetries | 50 pages | null | null | null | stat.ME cs.LG math.ST stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantifying the uncertainty of predictions is a core problem in modern
statistics. Methods for predictive inference have been developed under a
variety of assumptions, often -- for instance, in standard conformal prediction
-- relying on the invariance of the distribution of the data under special
groups of transformations such as permutation groups. Moreover, many existing
methods for predictive inference aim to predict unobserved outcomes in
sequences of feature-outcome observations. Meanwhile, there is interest in
predictive inference under more general observation models (e.g., for partially
observed features) and for data satisfying more general distributional
symmetries (e.g., rotationally invariant or coordinate-independent observations
in physics). Here we propose SymmPI, a methodology for predictive inference
when data distributions have general group symmetries in arbitrary observation
models. Our methods leverage the novel notion of distributional equivariant
transformations, which process the data while preserving their distributional
invariances. We show that SymmPI has valid coverage under distributional
invariance and characterize its performance under distribution shift,
recovering recent results as special cases. We apply SymmPI to predict
unobserved values associated to vertices in a network, where the distribution
is unchanged under relabelings that keep the network structure unchanged. In
several simulations in a two-layer hierarchical model, and in an empirical data
analysis example, SymmPI performs favorably compared to existing methods.
| [
{
"version": "v1",
"created": "Tue, 26 Dec 2023 18:41:14 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Dec 2023 00:16:55 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Sep 2024 18:55:22 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Dobriban",
"Edgar",
""
],
[
"Yu",
"Mengxin",
""
]
] |
2312.17534 | Zeeshan Ahmad | Md Salman Rabbi Limon and Zeeshan Ahmad | Heterogeneity in Point Defect Distribution and Mobility in Solid Ion
Conductors | 29 pages of main text + 11 pages of Supporting Information; 8 figures
and 2 tables | ACS Applied Materials and Interfaces (2024) | 10.1021/acsami.4c12128 | null | cond-mat.mtrl-sci physics.chem-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Alkali metal anodes paired with solid ion conductors offer promising avenues
for enhancing battery energy density and safety. To facilitate rapid ion
transport crucial for fast charging and discharging, it is essential to
understand point defects within these conductors. In this study, we investigate
the heterogeneity of defect distribution in Li$_3$OCl solid ion conductor,
quantifying the defect formation energy (DFE) of lithium vacancies and
interstitials as a function of distance from the surface through
first-principles simulations. Our results reveal that the surface DFE is
consistently lower than bulk except for one surface termination, indicating
significant defect aggregation at surfaces. This difference can cause the
defect density to be up to 14 orders of magnitude higher at surfaces compared
to the bulk. Moreover, we unveil the transition in DFE when moving from the
surface to the bulk through the DFE function, which exhibits an exponentially
decaying relationship. Incorporating this exponential trend, we develop a
revised model for the average behavior of defects that offers a more accurate
description of the influence of grain size. Surface effects dominate for grain
sizes $\lesssim$ 1 $\mu$m, highlighting the importance of surface defect
engineering and the DFE function for accurately capturing ion transport in
devices. We further explore the kinetics of defect redistribution by
calculating the migration barriers for defect movement between bulk and
surfaces. We find a highly asymmetric energy landscape for the lithium
vacancies, exhibiting lower migration barriers for movement towards the surface
compared to the bulk, while interstitial defects exhibit comparable kinetics
between surface and bulk regions. These insights underscore the importance of
considering both thermodynamic and kinetic factors in the design of solid ion
conductors.
| [
{
"version": "v1",
"created": "Fri, 29 Dec 2023 09:32:03 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Mar 2024 17:54:45 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Limon",
"Md Salman Rabbi",
""
],
[
"Ahmad",
"Zeeshan",
""
]
] |
2312.17679 | Kay Liu | Kay Liu, Hengrui Zhang, Ziqing Hu, Fangxin Wang, Philip S. Yu | Data Augmentation for Supervised Graph Outlier Detection with Latent
Diffusion Models | Preprint. Under review. Package available at
https://pypi.org/project/godm/ | null | null | null | cs.LG cs.SI | http://creativecommons.org/licenses/by/4.0/ | Graph outlier detection is a prominent task of research and application in
the realm of graph neural networks. It identifies the outlier nodes that
exhibit deviation from the majority in the graph. One of the fundamental
challenges confronting supervised graph outlier detection algorithms is the
prevalent issue of class imbalance, where the scarcity of outlier instances
compared to normal instances often results in suboptimal performance.
Conventional methods mitigate the imbalance by reweighting instances in the
estimation of the loss function, assigning higher weights to outliers and lower
weights to inliers. Nonetheless, these strategies are prone to overfitting and
underfitting, respectively. Recently, generative models, especially diffusion
models, have demonstrated their efficacy in synthesizing high-fidelity images.
Despite their extraordinary generation quality, their potential in data
augmentation for supervised graph outlier detection remains largely
underexplored.
To bridge this gap, we introduce GODM, a novel data augmentation for
mitigating class imbalance in supervised Graph Outlier detection with latent
Diffusion Models. Specifically, our proposed method consists of three key
components: (1) Variantioanl Encoder maps the heterogeneous information
inherent within the graph data into a unified latent space. (2) Graph Generator
synthesizes graph data that are statistically similar to real outliers from
latent space, and (3) Latent Diffusion Model learns the latent space
distribution of real organic data by iterative denoising. Extensive experiments
conducted on multiple datasets substantiate the effectiveness and efficiency of
GODM. The case study further demonstrated the generation quality of our
synthetic data. To foster accessibility and reproducibility, we encapsulate
GODM into a plug-and-play package and release it at the Python Package Index
(PyPI).
| [
{
"version": "v1",
"created": "Fri, 29 Dec 2023 16:50:40 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2024 21:39:09 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Liu",
"Kay",
""
],
[
"Zhang",
"Hengrui",
""
],
[
"Hu",
"Ziqing",
""
],
[
"Wang",
"Fangxin",
""
],
[
"Yu",
"Philip S.",
""
]
] |
2401.00363 | Hongyu Lu | Hongyu Lu, Han-Qing Wu, Bin-Bin Chen, Kai Sun, and Zi Yang Meng | From Fractional Quantum Anomalous Hall Smectics to Polar Smectic Metals:
Nontrivial Interplay Between Electronic Liquid Crystal Order and Topological
Order in Correlated Topological Flat Bands | null | Rep. Prog. Phys. 87 (2024) 108003 | 10.1088/1361-6633/ad7640 | null | cond-mat.str-el cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | Symmetry-breaking orders can not only compete with each other, but also be
interwined, and the interwined topological and symmetry-breaking orders make
the situation more intriguing. This work examines the archetypal correlated
flat band model on a checkerboard lattice at filling $\nu=2/3$ and we find the
unique interplay between smectic charge order and topological order gives rise
to two novel quantum states. As the interaction strength increases, the system
first transitions from a Fermi liquid into FQAH smectic (FQAHS) state, where
FQAH topological order coexists cooperatively with smectic charge order with
enlarged ground-state degeneracy and interestingly, the Hall conductivity is
$\sigma_{xy}=\nu=2/3$, different from the band-folding or doping scenarios.
Further increasing the interaction strength, the system undergoes another
quantum phase transition and evolves into a polar smectic metal (PSM) state.
This emergent PSM is an anisotropic non-Fermi liquid, whose interstripe
tunneling is irrelevant while it is metallic inside each stripe. Different from
the FQAHS and conventional smectic orders, this PSM spontaneously breaks the
two-fold rotational symmetry, resulting in a nonzero electric dipole moment and
ferroelectric order. In addition to the exotic ground states, large-scale
numerical simulations are also used to study low-energy excitations and
thermodynamic characteristics. We find the onset temperature of the
incompressible FQAHS state, which also coincides with the onset of non-polar
smectic order, is dictated by the magneto-roton modes. Above this onset
temperature, the PSM state exists at intermediate-temperature regime. Although
the T = 0 quantum phase transition between PSM and FQAHS is first order, the
thermal FQAHS-PSM transition could be continuous. We expect the features of the
exotic states and thermal phase transitions could be accessed in future
experiments.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2023 01:24:37 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jan 2024 02:09:44 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Jul 2024 15:12:11 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 08:25:31 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Lu",
"Hongyu",
""
],
[
"Wu",
"Han-Qing",
""
],
[
"Chen",
"Bin-Bin",
""
],
[
"Sun",
"Kai",
""
],
[
"Meng",
"Zi Yang",
""
]
] |
2401.01757 | Nikos Zygouras | Nikos Zygouras | Directed polymers in a random environment: a review of the phase
transitions | this is a review paper dedicated to the memory of Francis Comets. New
version has several updates including important bibliographical ones based on
recent developments | null | null | null | math.PR math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | The model of directed polymer in a random environment is a fundamental model
of interaction between a simple random walk and ambient disorder. This
interaction gives rise to complex phenomena and transitions from a central
limit theory to novel statistical behaviours. Despite its intense study, there
are still many aspects and phases which have not yet been identified. In this
review we focus on the current status of our understanding of the transition
between weak and strong disorder phases, give an account of some of the methods
that the study of the model has motivated and highlight some open questions.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2024 14:20:16 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Feb 2024 08:28:12 GMT"
},
{
"version": "v3",
"created": "Mon, 29 Jul 2024 13:02:14 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 12:14:55 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Zygouras",
"Nikos",
""
]
] |
2401.01884 | Carlos Olarte | Jaime Arias, Kyungmin Bae, Carlos Olarte, Peter Csaba \"Olveczky and
Laure Petrucci | A rewriting-logic-with-SMT-based formal analysis and parameter synthesis
framework for parametric time Petri nets | arXiv admin note: substantial text overlap with arXiv:2303.08929 | null | null | null | cs.LO | http://creativecommons.org/licenses/by/4.0/ | This paper presents a concrete and a symbolic rewriting logic semantics for
parametric time Petri nets with inhibitor arcs (PITPNs), a flexible model of
timed systems where parameters are allowed in firing bounds. We prove that our
semantics is bisimilar to the "standard" semantics of PITPNs. This allows us to
use the rewriting logic tool Maude, combined with SMT solving, to provide sound
and complete formal analyses for PITPNs. We develop and implement a new general
folding approach for symbolic reachability, so that Maude-with-SMT reachability
analysis terminates whenever the parametric state-class graph of the PITPN is
finite. Our work opens up the possibility of using the many formal analysis
capabilities of Maude -- including full LTL model checking, analysis with
user-defined analysis strategies, and even statistical model checking -- for
such nets. We illustrate this by explaining how almost all formal analysis and
parameter synthesis methods supported by the state-of-the-art PITPN tool Romeo
can be performed using Maude with SMT. In addition, we also support analysis
and parameter synthesis from parametric initial markings, as well as full LTL
model checking and analysis with user-defined execution strategies. Experiments
show that our methods outperform Romeo in many cases.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2024 18:53:53 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Apr 2024 13:42:19 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 16:55:17 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Arias",
"Jaime",
""
],
[
"Bae",
"Kyungmin",
""
],
[
"Olarte",
"Carlos",
""
],
[
"Ölveczky",
"Peter Csaba",
""
],
[
"Petrucci",
"Laure",
""
]
] |
2401.02398 | Erisa Hasani | Erisa Hasani, Rachel A. Ward | Generating synthetic data for neural operators | null | null | null | null | cs.LG cs.NA math.NA | http://creativecommons.org/licenses/by/4.0/ | Numerous developments in the recent literature show the promising potential
of deep learning in obtaining numerical solutions to partial differential
equations (PDEs) beyond the reach of current numerical solvers. However,
data-driven neural operators all suffer from a similar problem: the data needed
to train a network depends on classical numerical solvers such as finite
difference or finite element, among others. In this paper, we propose a
different approach to generating synthetic functional training data that does
not require solving a PDE numerically. We draw a large number $N$ of
independent and identically distributed 'random functions' $u_j$ from the
underlying solution space (e.g., $H_0^1(\Omega)$) in which we know the solution
lies according to classical theory. We then plug each such random candidate
solution into the equation and get a corresponding right-hand side function
$f_j$ for the equation, and consider $(f_j, u_j)_{j=1}^N$ as supervised
training data for learning the underlying inverse problem $f \rightarrow u$.
This `backwards' approach to generating training data only requires derivative
computations, in contrast to standard `forward' approaches, which require a
numerical PDE solver, enabling us to generate many data points quickly and
efficiently. While the idea is simple, we hope this method will expand the
potential for developing neural PDE solvers that do not depend on classical
numerical solvers.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2024 18:31:21 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 15:40:45 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Hasani",
"Erisa",
""
],
[
"Ward",
"Rachel A.",
""
]
] |
2401.03426 | Huahang Li | Huahang Li, Longyu Feng, Shuangyin Li, Fei Hao, Chen Jason Zhang,
Yuanfeng Song | On Leveraging Large Language Models for Enhancing Entity Resolution: A
Cost-efficient Approach | 9 pages, preprint under review | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Entity resolution, the task of identifying and merging records that refer to
the same real-world entity, is crucial in sectors like e-commerce, healthcare,
and law enforcement. Large Language Models (LLMs) introduce an innovative
approach to this task, capitalizing on their advanced linguistic capabilities
and a ``pay-as-you-go'' model that provides significant advantages to those
without extensive data science expertise. However, current LLMs are costly due
to per-API request billing. Existing methods often either lack quality or
become prohibitively expensive at scale. To address these problems, we propose
an uncertainty reduction framework using LLMs to improve entity resolution
results. We first initialize possible partitions of the entity cluster, refer
to the same entity, and define the uncertainty of the result. Then, we reduce
the uncertainty by selecting a few valuable matching questions for LLM
verification. Upon receiving the answers, we update the probability
distribution of the possible partitions. To further reduce costs, we design an
efficient algorithm to judiciously select the most valuable matching pairs to
query. Additionally, we create error-tolerant techniques to handle LLM mistakes
and a dynamic adjustment method to reach truly correct partitions. Experimental
results show that our method is efficient and effective, offering promising
applications in real-world tasks.
| [
{
"version": "v1",
"created": "Sun, 7 Jan 2024 09:06:58 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 04:47:33 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Li",
"Huahang",
""
],
[
"Feng",
"Longyu",
""
],
[
"Li",
"Shuangyin",
""
],
[
"Hao",
"Fei",
""
],
[
"Zhang",
"Chen Jason",
""
],
[
"Song",
"Yuanfeng",
""
]
] |
2401.04371 | Kazi Ashik Islam | Kazi Ashik Islam, Da Qi Chen, Madhav Marathe, Henning Mortveit,
Samarth Swarup, Anil Vullikanti | Strategic Routing and Scheduling for Evacuations | null | null | null | null | cs.GT | http://creativecommons.org/licenses/by/4.0/ | Evacuation planning is an essential part of disaster management where the
goal is to relocate people under imminent danger to safety. However, finding
jointly optimal evacuation routes and schedule that minimizes the average
evacuation time or evacuation completion time, is a computationally hard
problem. As a result, large-scale evacuation routing and scheduling continues
to be a challenge. In this paper, we present a game-theoretic approach to
tackle this problem. We start by formulating a strategic routing and scheduling
game, named the Evacuation Game: Routing and Scheduling (EGRES), where players
choose their route and time of departure. We show that: (i) every instance of
EGRES has at least one pure strategy Nash equilibrium, and (ii) an optimal
outcome in an instance will always be an equilibrium in that instance. We then
provide bounds on how bad an equilibrium can be compared to an optimal outcome.
Additionally, we present a polynomial-time algorithm, the Sequential Action
Algorithm (SAA), for finding equilibria in a given instance under a special
condition. We use Virginia Beach City in Virginia, and Harris County in
Houston, Texas as study areas and construct two EGRES instances. Our results
show that, by utilizing SAA, we can efficiently find equilibria in these
instances that have social objective close to the optimal value.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2024 06:08:49 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2024 20:51:31 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Islam",
"Kazi Ashik",
""
],
[
"Chen",
"Da Qi",
""
],
[
"Marathe",
"Madhav",
""
],
[
"Mortveit",
"Henning",
""
],
[
"Swarup",
"Samarth",
""
],
[
"Vullikanti",
"Anil",
""
]
] |
2401.04792 | Mohammad Hamad | Mohammad Hamad and Andreas Finkenzeller and Michael K\"uhr and Andrew
Roberts and Olaf Maennel and Vassilis Prevelakis and Sebastian Steinhorst | REACT: Autonomous Intrusion Response System for Intelligent Vehicles | 20 pages | null | 10.1016/j.cose.2024.104008 | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Autonomous and connected vehicles are rapidly evolving, integrating numerous
technologies and software. This progress, however, has made them appealing
targets for cybersecurity attacks. As the risk of cyber threats escalates with
this advancement, the focus is shifting from solely preventing these attacks to
also mitigating their impact. Current solutions rely on vehicle security
operation centers, where attack information is analyzed before deciding on a
response strategy. However, this process can be time-consuming and faces
scalability challenges, along with other issues stemming from vehicle
connectivity. This paper proposes a dynamic intrusion response system
integrated within the vehicle. This system enables the vehicle to respond to a
variety of incidents almost instantly, thereby reducing the need for
interaction with the vehicle security operation center. The system offers a
comprehensive list of potential responses, a methodology for response
evaluation, and various response selection methods. The proposed solution was
implemented on an embedded platform. Two distinct cyberattack use cases served
as the basis for evaluating the system. The evaluation highlights the system's
adaptability, its ability to respond swiftly, its minimal memory footprint, and
its capacity for dynamic system parameter adjustments. The proposed solution
underscores the necessity and feasibility of incorporating dynamic response
mechanisms in smart vehicles. This is a crucial factor in ensuring the safety
and resilience of future smart mobility.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2024 19:34:59 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2024 22:57:05 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Hamad",
"Mohammad",
""
],
[
"Finkenzeller",
"Andreas",
""
],
[
"Kühr",
"Michael",
""
],
[
"Roberts",
"Andrew",
""
],
[
"Maennel",
"Olaf",
""
],
[
"Prevelakis",
"Vassilis",
""
],
[
"Steinhorst",
"Sebastian",
""
]
] |
2401.05157 | Yitao Zhao | Yitao Zhao, Heng-Chao Li, Nanqing Liu, Rui Wang | Toward distortion-aware change detection in realistic scenarios | null | null | 10.1109/IGARSS53475.2024.10642144 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the conventional change detection (CD) pipeline, two manually registered
and labeled remote sensing datasets serve as the input of the model for
training and prediction. However, in realistic scenarios, data from different
periods or sensors could fail to be aligned as a result of various coordinate
systems. Geometric distortion caused by coordinate shifting remains a thorny
issue for CD algorithms. In this paper, we propose a reusable self-supervised
framework for bitemporal geometric distortion in CD tasks. The whole framework
is composed of Pretext Representation Pre-training, Bitemporal Image Alignment,
and Down-stream Decoder Fine-Tuning. With only single-stage pre-training, the
key components of the framework can be reused for assistance in the bitemporal
image alignment, while simultaneously enhancing the performance of the CD
decoder. Experimental results in 2 large-scale realistic scenarios demonstrate
that our proposed method can alleviate the bitemporal geometric distortion in
CD tasks.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2024 13:43:06 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Zhao",
"Yitao",
""
],
[
"Li",
"Heng-Chao",
""
],
[
"Liu",
"Nanqing",
""
],
[
"Wang",
"Rui",
""
]
] |
2401.05591 | Paul Kosovich | Paul A. Kosovich, Alexander G. Kosovichev, Viacheslav M. Sadykov,
Spiridon Kasapis, Irina N. Kitiashvili, Patrick M. O'Keefe, Aatiya Ali,
Vincent Oria, Samuel Granovsky, Chun Jie Chong, Gelu M. Nita | Time Series of Magnetic Field Parameters of Merged MDI and HMI
Space-Weather Active Region Patches as Potential Tool for Solar Flare
Forecasting | null | null | null | null | astro-ph.SR physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Solar flare prediction studies have been recently conducted with the use of
Space-Weather MDI (Michelson Doppler Imager onboard Solar and Heliospheric
Observatory) Active Region Patches (SMARP) and Space-Weather HMI (Helioseismic
and Magnetic Imager onboard Solar Dynamics Observatory) Active Region Patches
(SHARP), which are two currently available data products containing magnetic
field characteristics of solar active regions. The present work is an effort to
combine them into one data product, and perform some initial statistical
analyses in order to further expand their application in space weather
forecasting. The combined data are derived by filtering, rescaling, and merging
the SMARP with SHARP parameters, which can then be spatially reduced to create
uniform multivariate time series. The resulting combined MDI-HMI dataset
currently spans the period between April 4, 1996, and December 13, 2022, and
may be extended to a more recent date. This provides an opportunity to
correlate and compare it with other space weather time series, such as the
daily solar flare index or the statistical properties of the soft X-ray flux
measured by the Geostationary Operational Environmental Satellites (GOES).
Time-lagged cross-correlation indicates that a relationship may exist, where
some magnetic field properties of active regions lead the flare index in time.
Applying the rolling window technique makes it possible to see how this
leader-follower dynamic varies with time. Preliminary results indicate that
areas of high correlation generally correspond to increased flare activity
during the peak solar cycle.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2024 23:51:30 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2024 20:09:28 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Sep 2024 19:42:17 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Kosovich",
"Paul A.",
""
],
[
"Kosovichev",
"Alexander G.",
""
],
[
"Sadykov",
"Viacheslav M.",
""
],
[
"Kasapis",
"Spiridon",
""
],
[
"Kitiashvili",
"Irina N.",
""
],
[
"O'Keefe",
"Patrick M.",
""
],
[
"Ali",
"Aatiya",
""
],
[
"Oria",
"Vincent",
""
],
[
"Granovsky",
"Samuel",
""
],
[
"Chong",
"Chun Jie",
""
],
[
"Nita",
"Gelu M.",
""
]
] |
2401.06069 | Ivana Petkovi\'c | P. Glidic, I. Petkovic, C. Piquard, A. Aassime, A. Cavanna, Y. Jin, U.
Gennser, C. Mora, D. Kovrizhin, A. Anthore, F. Pierre | Signature of anyonic statistics in the integer quantum Hall regime | 6 pages, 4 figures, Methods, Supplemental Information | Nat. Commun. 15, 6578 (2024) | 10.1038/s41467-024-50820-0 | null | cond-mat.mes-hall cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anyons are exotic low-dimensional quasiparticles whose unconventional quantum
statistics extends the binary particle division into fermions and bosons. The
fractional quantum Hall regime provides a natural host, with first convincing
anyon signatures recently observed through interferometry and
cross-correlations of colliding beams. However, the fractional regime is rife
with experimental complications, such as an anomalous tunneling density of
states, which impede the manipulation of anyons. Here we show experimentally
that the canonical integer quantum Hall regime can provide a robust anyon
platform. Exploiting the Coulomb interaction between two co-propagating quantum
Hall channels, an electron injected into one channel splits into two fractional
charges behaving as abelian anyons. Their unconventional statistics is revealed
by negative cross-correlations between dilute quasiparticle beams. Similarly to
fractional quantum Hall observations, we show that the negative signal stems
from a time-domain braiding process, here involving the incident fractional
quasiparticles and spontaneously generated electron-hole pairs. Beyond the
dilute limit, a theoretical understanding is achieved via the edge
magnetoplasmon description of interacting integer quantum Hall channels. Our
findings establish that, counter-intuitively, the integer quantum Hall regime
provides a platform of choice for exploring and manipulating quasiparticles
with fractional quantum statistics.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2024 17:34:41 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 15:12:20 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Glidic",
"P.",
""
],
[
"Petkovic",
"I.",
""
],
[
"Piquard",
"C.",
""
],
[
"Aassime",
"A.",
""
],
[
"Cavanna",
"A.",
""
],
[
"Jin",
"Y.",
""
],
[
"Gennser",
"U.",
""
],
[
"Mora",
"C.",
""
],
[
"Kovrizhin",
"D.",
""
],
[
"Anthore",
"A.",
""
],
[
"Pierre",
"F.",
""
]
] |
2401.06082 | Darren Scott | Darren A. V. Scott, Alex Lewin | Borrowing from historical control data in a Bayesian time-to-event model
with flexible baseline hazard function | Explanation of how to choose borrowing hyperparameters for the
lump-and-smear prior | null | null | null | stat.ME | http://creativecommons.org/licenses/by-nc-nd/4.0/ | There is currently a focus on statistical methods which can use historical
trial information to help accelerate the discovery, development and delivery of
medicine. Bayesian methods can be constructed so that the borrowing is
"dynamic" in the sense that the similarity of the data helps to determine how
much information is used. In the time to event setting with one historical data
set, a popular model for a range of baseline hazards is the piecewise
exponential model where the time points are fixed and a borrowing structure is
imposed on the model. Although convenient for implementation this approach
effects the borrowing capability of the model. We propose a Bayesian model
which allows the time points to vary and a dependency to be placed between the
baseline hazards. This serves to smooth the posterior baseline hazard improving
both model estimation and borrowing characteristics. We explore a variety of
prior structures for the borrowing within our proposed model and assess their
performance against established approaches. We demonstrate that this leads to
improved type I error in the presence of prior data conflict and increased
power. We have developed accompanying software which is freely available and
enables easy implementation of the approach.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2024 17:58:54 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Feb 2024 14:50:46 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 13:42:57 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Scott",
"Darren A. V.",
""
],
[
"Lewin",
"Alex",
""
]
] |
2401.06501 | Dr Ravi Dwivedi | Ravi Dwivedi and Vivek Sahai | On the discrete analogues of Appell function $F_2$ | null | null | null | null | math.CA math.NT | http://creativecommons.org/licenses/by/4.0/ | In this paper, we introduce two distinct discrete forms of Appell function
$F_2$. We determine their convergence domains, integral representations as well
as difference-differential equations that are satisfied by these discrete
analogues of $F_2$. We have also obtained the difference-differential formulas,
finite and infinite summation formulas, and a complete list of
difference-differential recursion relations obeyed by these discrete functions.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2024 10:51:33 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Dwivedi",
"Ravi",
""
],
[
"Sahai",
"Vivek",
""
]
] |
2401.06854 | Juan Antonio Aguilar-Saavedra | J. A. Aguilar-Saavedra, J. A. Casas | Entanglement autodistillation from particle decays | LaTeX 9 pages. Expanded discussion, final version in PRL | null | null | IFT-UAM/CSIC-24-6 | hep-ph hep-ex quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Particle decays do not constitute a spin ``measurement'' in the
quantum-mechanical sense, but still modify the spin state, in particular for an
entangled system. We show that for a spin-entangled pair of particles the
entanglement of the system can increase after the decay of one particle. This
unique phenomenon has no equivalent for stable particles and could be
observable in top pair production at a high-energy polarized $e^+ e^-$
collider.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2024 19:00:33 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2024 21:43:13 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Aguilar-Saavedra",
"J. A.",
""
],
[
"Casas",
"J. A.",
""
]
] |
2401.08205 | Seyran Ibrahimov | Seyran S. Ibrahimov, Nazim I. Mahmudov | A Pillai-Catalan-type problem involving Fibonacci numbers | null | null | 10.53570/jnt.1162421 | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses A Pillai-Catalan-type problem assosiated with Fibonacci
numbers. Let $F_{n}$ be the Fibonacci numbers defined by the recurrence
relation $F_{1}=1$, $F_{2}=1$ and $F_{n}=F_{n-1}+F_{n-2}$ for all $n\geq 3$. We
will find all positive integer solution to the equation $3^{x}-F_{n}2^{y}=1$
using properties of Fibonacci numbers, linear forms of logarithms, and the
Baker-Davenport reduction method.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2024 08:41:23 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Mar 2024 09:04:42 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Mar 2024 18:05:13 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Ibrahimov",
"Seyran S.",
""
],
[
"Mahmudov",
"Nazim I.",
""
]
] |
2401.09090 | Yunpeng Xiao | Yunpeng Xiao, Kyrie Zhixuan Zhou, Yueqing Liang, Kai Shu | Understanding the concerns and choices of public when using large
language models for healthcare | 22 pages | null | null | null | cs.CY | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) have shown their potential in biomedical fields.
However, how the public uses them for healthcare purposes such as medical Q\&A,
self-diagnosis, and daily healthcare information seeking is under-investigated.
This paper adopts a mixed-methods approach, including surveys (N=214) and
interviews (N=17) to investigate how and why the public uses LLMs for
healthcare. We found that participants generally believed LLMs as a healthcare
tool have gained popularity, and are often used in combination with other
information channels such as search engines and online health communities to
optimize information quality. Based on the findings, we reflect on the ethical
and effective use of LLMs for healthcare and propose future research
directions.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2024 09:51:32 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 16:40:18 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Xiao",
"Yunpeng",
""
],
[
"Zhou",
"Kyrie Zhixuan",
""
],
[
"Liang",
"Yueqing",
""
],
[
"Shu",
"Kai",
""
]
] |
2401.10165 | Francesco Benini | Andrea Antinucci, Francesco Benini | Anomalies and gauging of U(1) symmetries | Two columns, 12 pages. v2: refs added, more clear exposition. v3:
refs added, typos corrected | null | null | SISSA 01/2024/FISI | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the Symmetry TFT for theories with a $U(1)$ symmetry in arbitrary
dimension. The Symmetry TFT describes the structure of the symmetry, its
anomalies, and the possible topological manipulations. It is constructed as a
BF theory of gauge fields for groups $U(1)$ and $\mathbb{R}$, and contains a
continuum of topological operators. We also propose an operation that produces
the Symmetry TFT for the theory obtained by dynamically gauging the $U(1)$
symmetry. We discuss many examples. As an interesting outcome, we obtain the
Symmetry TFT for the non-invertible $\mathbb{Q}/\mathbb{Z}$ chiral symmetry in
four dimensions.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2024 17:49:32 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Jan 2024 15:43:09 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Sep 2024 22:01:12 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Antinucci",
"Andrea",
""
],
[
"Benini",
"Francesco",
""
]
] |
2401.10302 | Eneko Osaba | Eneko Osaba, Esther Villar-Rodriguez, Aitor Gomez-Tejedor and Izaskun
Oregi | Hybrid Quantum Solvers in Production: how to succeed in the NISQ era? | Paper presented at the 25th International Conference on Intelligent
Data Engineering and Automated Learning (IDEAL 2024) | null | null | null | cs.ET quant-ph | http://creativecommons.org/licenses/by/4.0/ | Hybrid quantum computing is considered the present and the future within the
field of quantum computing. Far from being a passing fad, this trend cannot be
considered just a stopgap to address the limitations of NISQ-era devices. The
foundations linking both computing paradigms will remain robust over time. The
contribution of this work is twofold: first, we describe and categorize some of
the most frequently used hybrid solvers, resorting to two different taxonomies
recently published in the literature. Secondly, we put a special focus on two
solvers that are currently deployed in real production and that have
demonstrated to be near the real industry. These solvers are the
LeapHybridBQMSampler contained in D-Wave's Hybrid Solver Service and
Quantagonia's Hybrid Solver. We analyze the performance of both methods using
as benchmarks four combinatorial optimization problems.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2024 11:36:32 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jan 2024 16:31:47 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Jan 2024 10:18:05 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Mar 2024 12:00:08 GMT"
},
{
"version": "v5",
"created": "Fri, 29 Mar 2024 11:47:30 GMT"
},
{
"version": "v6",
"created": "Thu, 9 May 2024 10:41:26 GMT"
},
{
"version": "v7",
"created": "Mon, 5 Aug 2024 09:41:43 GMT"
},
{
"version": "v8",
"created": "Thu, 12 Sep 2024 09:23:22 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Osaba",
"Eneko",
""
],
[
"Villar-Rodriguez",
"Esther",
""
],
[
"Gomez-Tejedor",
"Aitor",
""
],
[
"Oregi",
"Izaskun",
""
]
] |
2401.10497 | Anay Aggarwal | Anay Aggarwal and Manu Isaacs | An Elementary Method For Fast Modular Exponentiation With Factored
Modulus | 18 pages, 4 figures, Presented at 2023 West Coast Number Theory
Conference | null | null | null | math.NT | http://creativecommons.org/licenses/by/4.0/ | We present a fast algorithm for modular exponentiation when the factorization
of the modulus is known. Let $a,n,m$ be positive integers and suppose $m$
factors canonically as $\prod_{i=1}^k p_i^{e_i}$. Choose integer parameters
$t_i\in [1, e_i]$ for $1\le i\le k$. Then we can compute the modular
exponentiation $a^n\pmod{m}$ in $O(\max(e_i/t_i)+\sum_{i=1}^k t_i\log p_i)$
steps (i.e., modular operations). We go on to analyze this algorithm
mathematically and programmatically, showing significant asymptotic improvement
in specific cases. Specifically, for an infinite family of $m$ we achieve a
complexity of $O(\sqrt{\log m})$ steps, much faster than the Repeated Squaring
Algorithm, which has complexity $O(\log m)$. Additionally, we extend our
algorithm to matrices and hence general linear recurrences. The complexity is
similar; with the same setup we can exponentiate matrices in
$GL_d(\mathbb{Z}/m\mathbb{Z})$ in less than $O(\max(e_i/t_i)+d^2\sum_{i=1}^k
t_i\log p_i)$ steps. This improves Fiduccia's algorithm and the results of
Bostan and Mori in the case of $\mathbb{Z}/m\mathbb{Z}$. We prove analogous
results for $\mathbb{Z}/p^k\mathbb{Z}$ ring extensions.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2024 05:21:26 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Feb 2024 23:09:22 GMT"
},
{
"version": "v3",
"created": "Sun, 28 Apr 2024 03:01:23 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Sep 2024 23:37:30 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Aggarwal",
"Anay",
""
],
[
"Isaacs",
"Manu",
""
]
] |
2401.11123 | Xiao Wang | Haoxiang Yang, Chengguo Yuan, Yabin Zhu, Lan Chen, Xiao Wang, Futian
Wang | Uncertainty-aware Bridge based Mobile-Former Network for Event-based
Pattern Recognition | Accepted by ICSIPC 2024 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The mainstream human activity recognition (HAR) algorithms are developed
based on RGB cameras, which are easily influenced by low-quality images (e.g.,
low illumination, motion blur). Meanwhile, the privacy protection issue caused
by ultra-high definition (HD) RGB cameras aroused more and more people's
attention. Inspired by the success of event cameras which perform better on
high dynamic range, no motion blur, and low energy consumption, we propose to
recognize human actions based on the event stream. We propose a lightweight
uncertainty-aware information propagation based Mobile-Former network for
efficient pattern recognition, which aggregates the MobileNet and Transformer
network effectively. Specifically, we first embed the event images using a stem
network into feature representations, then, feed them into uncertainty-aware
Mobile-Former blocks for local and global feature learning and fusion. Finally,
the features from MobileNet and Transformer branches are concatenated for
pattern recognition. Extensive experiments on multiple event-based recognition
datasets fully validated the effectiveness of our model. The source code of
this work will be released at
https://github.com/Event-AHU/Uncertainty_aware_MobileFormer.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2024 05:26:28 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 07:01:55 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Yang",
"Haoxiang",
""
],
[
"Yuan",
"Chengguo",
""
],
[
"Zhu",
"Yabin",
""
],
[
"Chen",
"Lan",
""
],
[
"Wang",
"Xiao",
""
],
[
"Wang",
"Futian",
""
]
] |
2401.11797 | Tristan Jocteur | Tristan Jocteur, Shana Figueiredo, Kirsten Martens, Eric Bertin, and
Romain Mari | Yielding is an absorbing phase transition with vanishing critical
fluctuations | 4 pages + Supplementary material | null | 10.1103/PhysRevLett.132.268203 | null | cond-mat.stat-mech cond-mat.soft | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The yielding transition in athermal complex fluids can be interpreted as an
absorbing phase transition between an elastic, absorbing state with high
mesoscopic degeneracy and a flowing, active state. We characterize
quantitatively this phase transition in an elastoplastic model under fixed
applied shear stress, using a finite-size scaling analysis. We find vanishing
critical fluctuations of the order parameter (i.e., the shear rate), and relate
this property to the convex character of the phase transition ($\beta >1$). We
show explicitly that the CDP class is recovered when both properties are
relaxed. We locate yielding within a family of models akin to fixed-energy
sandpile (FES) models, only with long-range redistribution kernels with
zero-modes that result from mechanical equilibrium. For redistribution kernels
with sufficiently fast decay, this family of models belong to a short-range
universality class distinct from the Conserved Directed Percolation class of
usual FES, which is induced by zero modes.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2024 09:53:31 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 10:14:35 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Jocteur",
"Tristan",
""
],
[
"Figueiredo",
"Shana",
""
],
[
"Martens",
"Kirsten",
""
],
[
"Bertin",
"Eric",
""
],
[
"Mari",
"Romain",
""
]
] |
2401.12153 | Mat\v{e}j Kone\v{c}n\'y | Jan Hubi\v{c}ka, Colin Jahel, Mat\v{e}j Kone\v{c}n\'y, Marcin Sabok | Extension property for partial automorphisms of the $n$-partite and
semigeneric tournaments | Revision mainly improves the presentation of the construction in
Section 5 | null | null | null | math.CO cs.DM math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a proof of the extension property for partial automorphisms (EPPA)
for classes of finite $n$-partite tournaments for $n \in
\{2,3,\ldots,\omega\}$, and for the class of finite semigeneric tournaments. We
also prove that the generic $\omega$-partite tournament and the generic
semigeneric tournament have ample generics.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2024 17:47:01 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 15:13:18 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Hubička",
"Jan",
""
],
[
"Jahel",
"Colin",
""
],
[
"Konečný",
"Matěj",
""
],
[
"Sabok",
"Marcin",
""
]
] |
2401.13491 | Luca Terenzi | Luca Terenzi | Tensor structures on fibered categories | 78 pages; v2: revised introduction, some references added | null | null | null | math.CT math.AG | http://creativecommons.org/licenses/by/4.0/ | Let $\mathcal{S}$ be a small category admitting binary products. We show that
the whole theory of monoidal $\mathcal{S}$-fibered categories, which is
customarily formulated in terms of the usual internal tensor product, can be
rephrased purely in terms of the associated external tensor product. More
precisely, we construct a canonical dictionary relating the classical
structures and properties of the internal tensor product to analogous
structures and properties of the external tensor product: this applies to
associativity, commutativity, and unit constraints, to projection formulae, as
well as to monoidality of morphisms between monoidal $\mathcal{S}$-fibered
categories. For instance, we show how Mac Lane's classical pentagon and hexagon
axioms can be stated using the external tensor product. Our results provide a
satisfactory abstract framework to study monoidal structures in the setting of
perverse sheaves.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2024 14:39:38 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 15:38:36 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Terenzi",
"Luca",
""
]
] |
2401.13751 | Charles Meyers | Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy L\"ofstedt, Erik
Elmroth | A Training Rate and Survival Heuristic for Inference and Robustness
Evaluation (TRASHFIRE) | null | null | null | null | cs.LG cs.AI cs.CV stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Machine learning models -- deep neural networks in particular -- have
performed remarkably well on benchmark datasets across a wide variety of
domains. However, the ease of finding adversarial counter-examples remains a
persistent problem when training times are measured in hours or days and the
time needed to find a successful adversarial counter-example is measured in
seconds. Much work has gone into generating and defending against these
adversarial counter-examples, however the relative costs of attacks and
defences are rarely discussed. Additionally, machine learning research is
almost entirely guided by test/train metrics, but these would require billions
of samples to meet industry standards. The present work addresses the problem
of understanding and predicting how particular model hyper-parameters influence
the performance of a model in the presence of an adversary. The proposed
approach uses survival models, worst-case examples, and a cost-aware analysis
to precisely and accurately reject a particular model change during routine
model training procedures rather than relying on real-world deployment,
expensive formal verification methods, or accurate simulations of very
complicated systems (\textit{e.g.}, digitally recreating every part of a car or
a plane). Through an evaluation of many pre-processing techniques, adversarial
counter-examples, and neural network configurations, the conclusion is that
deeper models do offer marginal gains in survival times compared to more
shallow counterparts. However, we show that those gains are driven more by the
model inference time than inherent robustness properties. Using the proposed
methodology, we show that ResNet is hopelessly insecure against even the
simplest of white box attacks.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2024 19:12:37 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2024 20:55:32 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Meyers",
"Charles",
""
],
[
"Sedghpour",
"Mohammad Reza Saleh",
""
],
[
"Löfstedt",
"Tommy",
""
],
[
"Elmroth",
"Erik",
""
]
] |
2401.14288 | Pablo M. Blanco | Pablo M. Blanco and Peter Ko\v{s}ovan | The explicit bonding Reaction ensemble Monte Carlo method | null | null | 10.1063/5.0226122 | null | cond-mat.soft | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We present the explicit bonding Reaction ensemble Monte Carlo (eb-RxMC)
method, designed to sample reversible bonding reactions in macromolecular
systems in thermodynamic equilibrium. Our eb-RxMC method is based on the
Reaction ensemble method, however, its implementation differs from the latter
by the representation of the reaction. In the eb-RxMC implementation, we are
adding or deleting bonds between existing particles, instead of inserting or
deleting particles with different chemical identities. This new implementation
makes the eb-RxMC method suitable for simulating the formation of reversible
linkages between macromolecules, which would not be feasible with the original
implementation. To enable coupling of our eb-RxMC algorithm with Molecular
Dynamics algorithm for sampling of the configuration space, we biased the
sampling of reactions only within a certain inclusion radius. We validated our
algorithm using a set of ideally behaving systems undergoing dimerization and
polycondensation reactions, for which analytical results are available. For
dimerization reactions with various equilibrium constants and initial
compositions, the degree of conversion measured in our simulations perfectly
matched the reference values given by the analytical equations. We also showed
that this agreement is not affected by the arbitrary choice of the inclusion
radius or the stiffness of the harmonic bond potential. Next, we showed that
our simulations can correctly match the analytical results for the distribution
of the degree of polymerization and end-to-end distance of ideal chains in
polycondensation reactions. Altogether, we demonstrated that our eb-RxMC
simulations correctly sample both reaction and configuration space of these
reference systems, opening the door to future simulations of more complex
interacting macromolecular systems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2024 16:28:57 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Jun 2024 09:00:22 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Aug 2024 11:22:34 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Blanco",
"Pablo M.",
""
],
[
"Košovan",
"Peter",
""
]
] |
2401.14289 | Santiago Cuervo | Santiago Cuervo and Ricard Marxer | Speech foundation models on intelligibility prediction for
hearing-impaired listeners | To be presented in ICASSP 2024 | null | 10.1109/ICASSP48485.2024.10447907 | null | cs.SD cs.LG eess.AS | http://creativecommons.org/licenses/by/4.0/ | Speech foundation models (SFMs) have been benchmarked on many speech
processing tasks, often achieving state-of-the-art performance with minimal
adaptation. However, the SFM paradigm has been significantly less explored for
applications of interest to the speech perception community. In this paper we
present a systematic evaluation of 10 SFMs on one such application: Speech
intelligibility prediction. We focus on the non-intrusive setup of the Clarity
Prediction Challenge 2 (CPC2), where the task is to predict the percentage of
words correctly perceived by hearing-impaired listeners from speech-in-noise
recordings. We propose a simple method that learns a lightweight specialized
prediction head on top of frozen SFMs to approach the problem. Our results
reveal statistically significant differences in performance across SFMs. Our
method resulted in the winning submission in the CPC2, demonstrating its
promise for speech perception applications.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2024 18:26:52 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Cuervo",
"Santiago",
""
],
[
"Marxer",
"Ricard",
""
]
] |
2401.14718 | Zhewei Huang | Ruibo Ming, Zhewei Huang, Zhuoxuan Ju, Jianming Hu, Lihui Peng,
Shuchang Zhou | A Survey on Future Frame Synthesis: Bridging Deterministic and
Generative Approaches | under review | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Future Frame Synthesis (FFS) aims to enable models to generate sequences of
future frames based on existing content. This task has garnered widespread
application across various domains. In this paper, we comprehensively survey
both historical and contemporary works in this field, encompassing widely used
datasets and algorithms. Our survey scrutinizes the challenges and the evolving
landscape of FFS within the realm of computer vision. We propose a novel
taxonomy centered on the stochastic nature of related algorithms. This taxonomy
emphasizes the gradual transition from deterministic to generative synthesis
methodologies, highlighting significant advancements and shifts in approach.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2024 08:59:38 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jan 2024 05:09:44 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Jul 2024 10:18:26 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 02:25:47 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Ming",
"Ruibo",
""
],
[
"Huang",
"Zhewei",
""
],
[
"Ju",
"Zhuoxuan",
""
],
[
"Hu",
"Jianming",
""
],
[
"Peng",
"Lihui",
""
],
[
"Zhou",
"Shuchang",
""
]
] |
2401.15499 | Sarah Schr\"oder | Sarah Schr\"oder, Alexander Schulz, Fabian Hinder and Barbara Hammer | Semantic Properties of cosine based bias scores for word embeddings | 11 pages, 3 figures. arXiv admin note: text overlap with
arXiv:2111.07864 | null | 10.5220/0012577200003654 | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Plenty of works have brought social biases in language models to attention
and proposed methods to detect such biases. As a result, the literature
contains a great deal of different bias tests and scores, each introduced with
the premise to uncover yet more biases that other scores fail to detect. What
severely lacks in the literature, however, are comparative studies that analyse
such bias scores and help researchers to understand the benefits or limitations
of the existing methods. In this work, we aim to close this gap for cosine
based bias scores. By building on a geometric definition of bias, we propose
requirements for bias scores to be considered meaningful for quantifying
biases. Furthermore, we formally analyze cosine based scores from the
literature with regard to these requirements. We underline these findings with
experiments to show that the bias scores' limitations have an impact in the
application case.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2024 20:31:10 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 08:07:27 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Schröder",
"Sarah",
""
],
[
"Schulz",
"Alexander",
""
],
[
"Hinder",
"Fabian",
""
],
[
"Hammer",
"Barbara",
""
]
] |
2401.15680 | Bingkai Wang | Bingkai Wang, Xueqi Wang, Fan Li | How to achieve model-robust inference in stepped wedge trials with
model-based methods? | null | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | A stepped wedge design is a unidirectional crossover design where clusters
are randomized to distinct treatment sequences. While model-based analysis of
stepped wedge designs is standard practice to evaluate treatment effects
accounting for clustering and adjusting for covariates, their properties under
misspecification have not been systematically explored. In this article, we
focus on model-based methods, including linear mixed models and generalized
estimating equations with an independence, simple exchangeable, or nested
exchangeable working correlation structure. We study when a potentially
misspecified working model can offer consistent estimation of the marginal
treatment effect estimands, which are defined nonparametrically with potential
outcomes and may be functions of calendar time and/or exposure time. We prove a
central result that consistency for nonparametric estimands usually requires a
correctly specified treatment effect structure, but generally not the remaining
aspects of the working model (functional form of covariates, random effects,
and residual distribution), and valid inference is obtained via the sandwich
variance estimator. Furthermore, an additional g-computation step is required
to achieve model-robust inference under non-identity link functions or for
ratio estimands. The theoretical results are illustrated via several simulation
experiments and re-analysis of a completed stepped wedge cluster randomized
trial.
| [
{
"version": "v1",
"created": "Sun, 28 Jan 2024 15:25:04 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Mar 2024 00:45:30 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Aug 2024 18:55:19 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 00:47:06 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Wang",
"Bingkai",
""
],
[
"Wang",
"Xueqi",
""
],
[
"Li",
"Fan",
""
]
] |
2402.00154 | Ajmery Jaman | Ajmery Jaman, Guanbo Wang, Ashkan Ertefaie, Mich\`ele Bally, Ren\'ee
L\'evesque, Robert W. Platt, Mireille E. Schnitzer | Penalized G-estimation for effect modifier selection in a structural
nested mean model for repeated outcomes | null | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Effect modification occurs when the impact of the treatment on an outcome
varies based on the levels of other covariates known as effect modifiers.
Modeling these effect differences is important for etiological goals and for
purposes of optimizing treatment. Structural nested mean models (SNMMs) are
useful causal models for estimating the potentially heterogeneous effect of a
time-varying exposure on the mean of an outcome in the presence of time-varying
confounding. A data-adaptive selection approach is necessary if the effect
modifiers are unknown a priori and need to be identified. Although variable
selection techniques are available for estimating the conditional average
treatment effects using marginal structural models or for developing optimal
dynamic treatment regimens, all of these methods consider a single
end-of-follow-up outcome. In the context of an SNMM for repeated outcomes, we
propose a doubly robust penalized G-estimator for the causal effect of a
time-varying exposure with a simultaneous selection of effect modifiers and
prove the oracle property of our estimator. We conduct a simulation study for
the evaluation of its performance in finite samples and verification of its
double-robustness property. Our work is motivated by the study of
hemodiafiltration for treating patients with end-stage renal disease at the
Centre Hospitalier de l'Universit\'e de Montr\'eal. We apply the proposed
method to investigate the effect heterogeneity of dialysis facility on the
repeated session-specific hemodiafiltration outcomes.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2024 20:17:45 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Feb 2024 18:12:30 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Sep 2024 19:42:01 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Jaman",
"Ajmery",
""
],
[
"Wang",
"Guanbo",
""
],
[
"Ertefaie",
"Ashkan",
""
],
[
"Bally",
"Michèle",
""
],
[
"Lévesque",
"Renée",
""
],
[
"Platt",
"Robert W.",
""
],
[
"Schnitzer",
"Mireille E.",
""
]
] |
2402.00478 | Matthew Steinberg | Matthew Steinberg, Medina Bandic, Sacha Szkudlarek, Carmen G.
Almudever, Aritra Sarkar, Sebastian Feld | Lightcone Bounds for Quantum Circuit Mapping via Uncomplexity | null | null | null | null | quant-ph cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficiently mapping quantum circuits onto hardware is an integral part of the
quantum compilation process, wherein a circuit is modified in accordance with
the stringent architectural demands of a quantum processor. Many techniques
exist for solving the quantum circuit mapping problem, in addition to several
theoretical perspectives that relate quantum circuit mapping to problems in
classical computer science. This work considers a novel perspective on quantum
circuit mapping, in which the routing process of a simplified circuit is viewed
as a composition of quantum operations acting on density matrices representing
the quantum circuit and processor. Drawing on insight from recent advances in
quantum circuit complexity and information geometry, we show that a minimal
SWAP-gate count for executing a quantum circuit on a device emerges via the
minimization of the distance between quantum states using the quantum
Jensen-Shannon divergence, which we dub the lightcone bound. Additionally, we
develop a novel initial placement algorithm based on a graph similarity search
that selects the partition nearest to a graph isomorphism between interaction
and coupling graphs. From these two ingredients, we construct an algorithm for
calculating the lightcone bound, which is directly compared alongside the IBM
Qiskit compiler for over $600$ realistic benchmark experiments, as well as
against a brute-force method for smaller benchmarks. In our simulations, we
unambiguously find that neither the brute-force method nor the Qiskit compiler
surpasses our bound, signaling utility for estimating minimal overhead when
realizing quantum algorithms on constrained quantum hardware. This work also
constitutes the first use of quantum circuit uncomplexity to
practically-relevant quantum computing. We anticipate that this method may have
diverse applicability outside of the scope of quantum information science.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2024 10:32:05 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 13:39:46 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Steinberg",
"Matthew",
""
],
[
"Bandic",
"Medina",
""
],
[
"Szkudlarek",
"Sacha",
""
],
[
"Almudever",
"Carmen G.",
""
],
[
"Sarkar",
"Aritra",
""
],
[
"Feld",
"Sebastian",
""
]
] |
2402.02003 | Yaning Zhang | Yaning Zhang, Zitong Yu, Xiaobin Huang, Linlin Shen, Jianfeng Ren | GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross
Appearance-Edge Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapid advancement of photorealistic generators has reached a critical
juncture where the discrepancy between authentic and manipulated images is
increasingly indistinguishable. Thus, benchmarking and advancing techniques
detecting digital manipulation become an urgent issue. Although there have been
a number of publicly available face forgery datasets, the forgery faces are
mostly generated using GAN-based synthesis technology, which does not involve
the most recent technologies like diffusion. The diversity and quality of
images generated by diffusion models have been significantly improved and thus
a much more challenging face forgery dataset shall be used to evaluate SOTA
forgery detection literature. In this paper, we propose a large-scale, diverse,
and fine-grained high-fidelity dataset, namely GenFace, to facilitate the
advancement of deepfake detection, which contains a large number of forgery
faces generated by advanced generators such as the diffusion-based model and
more detailed labels about the manipulation approaches and adopted generators.
In addition to evaluating SOTA approaches on our benchmark, we design an
innovative cross appearance-edge learning (CAEL) detector to capture
multi-grained appearance and edge global representations, and detect
discriminative and general forgery traces. Moreover, we devise an
appearance-edge cross-attention (AECA) module to explore the various
integrations across two domains. Extensive experiment results and
visualizations show that our detection model outperforms the state of the arts
on different settings like cross-generator, cross-forgery, and cross-dataset
evaluations. Code and datasets will be available at
\url{https://github.com/Jenine-321/GenFace
| [
{
"version": "v1",
"created": "Sat, 3 Feb 2024 03:13:50 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 13:51:51 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Zhang",
"Yaning",
""
],
[
"Yu",
"Zitong",
""
],
[
"Huang",
"Xiaobin",
""
],
[
"Shen",
"Linlin",
""
],
[
"Ren",
"Jianfeng",
""
]
] |
2402.03824 | Giuseppe Paolo Dr | Giuseppe Paolo, Jonas Gonzalez-Billandon, Bal\'azs K\'egl | A call for embodied AI | Published in ICML 2024 Position paper track | PMLR 235:39493-39508, 2024 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose Embodied AI as the next fundamental step in the pursuit of
Artificial General Intelligence, juxtaposing it against current AI
advancements, particularly Large Language Models. We traverse the evolution of
the embodiment concept across diverse fields - philosophy, psychology,
neuroscience, and robotics - to highlight how EAI distinguishes itself from the
classical paradigm of static learning. By broadening the scope of Embodied AI,
we introduce a theoretical framework based on cognitive architectures,
emphasizing perception, action, memory, and learning as essential components of
an embodied agent. This framework is aligned with Friston's active inference
principle, offering a comprehensive approach to EAI development. Despite the
progress made in the field of AI, substantial challenges, such as the
formulation of a novel AI learning theory and the innovation of advanced
hardware, persist. Our discussion lays down a foundational guideline for future
Embodied AI research. Highlighting the importance of creating Embodied AI
agents capable of seamless communication, collaboration, and coexistence with
humans and other intelligent entities within real-world environments, we aim to
steer the AI community towards addressing the multifaceted challenges and
seizing the opportunities that lie ahead in the quest for AGI.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2024 09:11:20 GMT"
},
{
"version": "v2",
"created": "Tue, 28 May 2024 15:07:37 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Jul 2024 14:06:13 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Paolo",
"Giuseppe",
""
],
[
"Gonzalez-Billandon",
"Jonas",
""
],
[
"Kégl",
"Balázs",
""
]
] |
2402.05462 | Abhishek Chakraborty | Abhishek Chakraborty, Angelia Nedi\'c | Randomized Feasibility-Update Algorithms for Variational Inequality
Problems | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a variational inequality (VI) problem arising from a
game among multiple agents, where each agent aims to minimize its own cost
function subject to its constrained set represented as the intersection of a
(possibly infinite) number of convex functional level sets. A direct
projection-based approach or Lagrangian-based techniques for such a problem can
be computationally expensive if not impossible to implement. To deal with the
problem, we consider randomized methods that avoid the projection step on the
whole constraint set by employing random feasibility updates. In particular, we
propose and analyze such random methods for solving VIs based on the projection
method, Korpelevich method, and Popov method. We establish the almost sure
convergence of the methods and, also, provide their convergence rate
guarantees. We illustrate the performance of the methods in simulations for
two-agent games.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2024 07:43:51 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Aug 2024 23:47:50 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 02:25:27 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Chakraborty",
"Abhishek",
""
],
[
"Nedić",
"Angelia",
""
]
] |
2402.05704 | Nikita Zaigraev | Ioseph Buchbinder, Evgeny Ivanov, Nikita Zaigraev | $\mathcal{N}=2$ higher-spin theories and harmonic superspace | 0+12 pages, Contribution to the Proceedings of the International
Conference on Particle Physics and Cosmology (professor V.A. Rubakov memorial
conference), October 02-07, 2023, Yerevan, Armenia; V2: references added,
typos corrected | null | 10.22323/1.455.0048 | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | A brief review of the harmonic superspace approach to the construction of
$\mathcal{N}=2$ supersymmetric higher spin theories is given. We define
off-shell analytic harmonic gauge potentials of $\mathcal{N}=2$ supersymmetric
higher-spin multiplets and of $\mathcal{N}=2$ superconformal higher-spin
multiplets for an arbitrary integer highest spin. The component contents of
these $\mathcal{N}=2$ higher-spin supermultiplets are explicitly presented. We
also construct their cubic couplings to the hypermultiplet. This short report
summarizes the basic results of the series of published papers [1-3] as well as
announces those of the forthcoming article [4].
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2024 14:28:18 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Feb 2024 16:03:31 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Buchbinder",
"Ioseph",
""
],
[
"Ivanov",
"Evgeny",
""
],
[
"Zaigraev",
"Nikita",
""
]
] |
2402.06409 | Jochem Meijer | Jochem G. Meijer, Duarte Rocha, Annemarie M. Linnenbank, Christian
Diddens, and Detlef Lohse | Enhanced bubble growth near an advancing solidification front | 19 pages, 10 figures | null | 10.1017/jfm.2024.777 | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Frozen water might appear opaque since gas bubbles can get trapped in the ice
during the freezing process. They nucleate and then grow near the advancing
solidification front, due to the formation of a gas supersaturation region in
its vicinity. A delicate interplay between the rate of mass transfer and the
rate of freezing dictates the final shapes and sizes of the entrapped gas
bubbles. In this work, we experimentally and numerically investigate the
initial growth of such gas bubbles that nucleate and grow near the advancing
ice front. We show that the initial growth of these bubbles is governed by
diffusion and is enhanced due to a combination of the presence of the
background gas concentration gradient and the motion of the approaching front.
Additionally, we recast the problem into that of mass transfer to a moving
spherical object in a homogeneous concentration field, finding good agreement
between our experimental data and the existing scaling relations for that
latter problem. Lastly, we address how fluid flow around the bubble might
further affect this growth and qualitatively explore this through numerical
simulations.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2024 13:49:17 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 06:57:13 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Meijer",
"Jochem G.",
""
],
[
"Rocha",
"Duarte",
""
],
[
"Linnenbank",
"Annemarie M.",
""
],
[
"Diddens",
"Christian",
""
],
[
"Lohse",
"Detlef",
""
]
] |
2402.07671 | Mazen Ali | Mazen Ali and Matthias Kabel | Piecewise Polynomial Tensor Network Quantum Feature Encoding | 17 pages, 11 figures | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work introduces a novel method for embedding continuous variables into
quantum circuits via piecewise polynomial features, utilizing low-rank tensor
networks. Our approach, termed Piecewise Polynomial Tensor Network Quantum
Feature Encoding (PPTNQFE), aims to broaden the applicability of quantum
algorithms by incorporating spatially localized representations suited for
numerical applications like partial differential equations and function
regression. We demonstrate the potential of PPTNQFE through efficient point
evaluations of solutions of discretized differential equations and in modeling
functions with localized features such as jump discontinuities. While
promising, challenges such as unexplored noise impact and design of trainable
circuits remain. This study opens new avenues for enhancing quantum models with
novel feature embeddings and leveraging TN representations for a wider array of
function types in quantum machine learning.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 14:26:33 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Feb 2024 10:29:02 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Jul 2024 22:10:27 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 11:23:46 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Ali",
"Mazen",
""
],
[
"Kabel",
"Matthias",
""
]
] |
2402.08031 | He Shuang | He Shuang, Lianying Zhao, David Lie | Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Web tracking harms user privacy. As a result, the use of tracker detection
and blocking tools is a common practice among Internet users. However, no such
tool can be perfect, and thus there is a trade-off between avoiding breakage
(caused by unintentionally blocking some required functionality) and neglecting
to block some trackers. State-of-the-art tools usually rely on user reports and
developer effort to detect breakages, which can be broadly categorized into two
causes: 1) misidentifying non-trackers as trackers, and 2) blocking mixed
trackers which blend tracking with functional components.
We propose incorporating a machine learning-based breakage detector into the
tracker detection pipeline to automatically avoid misidentification of
functional resources. For both tracker detection and breakage detection, we
propose using differential features that can more clearly elucidate the
differences caused by blocking a request. We designed and implemented a
prototype of our proposed approach, Duumviri, for non-mixed trackers. We then
adopt it to automatically identify mixed trackers, drawing differential
features at partial-request granularity.
In the case of non-mixed trackers, evaluating Duumviri on 15K pages shows its
ability to replicate the labels of human-generated filter lists, EasyPrivacy,
with an accuracy of 97.44%. Through a manual analysis, we find that Duumviri
can identify previously unreported trackers and its breakage detector can
identify overly strict EasyPrivacy rules that cause breakage. In the case of
mixed trackers, Duumviri is the first automated mixed tracker detector, and
achieves a lower bound accuracy of 74.19%. Duumviri has enabled us to detect
and confirm 22 previously unreported unique trackers and 26 unique mixed
trackers.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 19:57:15 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 12:48:26 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Shuang",
"He",
""
],
[
"Zhao",
"Lianying",
""
],
[
"Lie",
"David",
""
]
] |
2402.08118 | Arpana Saboo | Arpana Saboo, Soumyadeep Halder, Subrata Das and Sonjoy Majumder | Sinusoidal magnetic field induced topological excitations in a
spin-orbit coupled spinor condensate | 13 pages, 16 figures | null | null | null | cond-mat.quant-gas | http://creativecommons.org/licenses/by/4.0/ | We explore topological excitations in a spin-1 Bose-Einstein condensate
subjected to an in-plane sinusoidally varying magnetic field and Rashba
spin-orbit coupling (SOC). In the absence of SOC, the periodic magnetic field
induces vortex-anti-vortex structures in the $\ket{F=1, m_F=\pm1}$ condensates
at saddle-points, such that the net topological charge remains zero. The
introduction of Rashba SOC breaks the system's symmetry, leading to
non-conservation of overall angular momentum in the spin-1 condensate. This
anisotropy results in the emergence of certain skyrmion spin textures. We
provide a comparative study for various in-plane magnetic field configurations
while keeping the SOC strength constant. Our numerical simulations within the
mean-field framework reveal the potential to engineer diverse topological
excitations controlled by the interplay between spin-orbit coupling and
in-plane magnetic field in a spinor condensate.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 23:20:48 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 10:21:43 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Saboo",
"Arpana",
""
],
[
"Halder",
"Soumyadeep",
""
],
[
"Das",
"Subrata",
""
],
[
"Majumder",
"Sonjoy",
""
]
] |
2402.08139 | Jay Damask | Jay Damask | A Consistently Oriented Basis for Eigenanalysis: Improved Directional
Statistics | 15 pages, 11 figures, refer to arXiv:1912.12983 | Int J Data Sci Anal (2024) | 10.1007/s41060-024-00570-5 | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The algorithm derived in this article, which builds upon the original paper,
takes a holistic view of the handedness of an orthonormal eigenvector matrix so
as to transfer what would have been labeled as a reflection in the original
algorithm into a rotation through a major arc in the new algorithm. In so
doing, the angular wrap-around on the interval {\pi} that exists in the
original is extended to a 2{\pi} interval for primary rotations, which in turn
provides clean directional statistics. The modified algorithm is detailed in
this article and an empirical example is shown. The empirical example is
analyzed in the context of random matrix theory, after which two methods are
discussed to stabilize eigenvector pointing directions as they evolve in time.
The thucyd Python package and source code, reported in the original paper, has
been updated to include the new algorithm and is freely available.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2024 00:23:43 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Damask",
"Jay",
""
]
] |
2402.09757 | Gobinda Ghosh | Gobinda Ghosh, Sachin Pathak | Construction of CCC and ZCCS Through Additive Characters Over Galois
Field | null | null | null | null | cs.IT math.CO math.IT | http://creativecommons.org/licenses/by/4.0/ | The rapid progression in wireless communication technologies, especially in
multicarrier code-division multiple access (MC-CDMA), there is a need of
advanced code construction methods. Traditional approaches, mainly based on
generalized Boolean functions, have limitations in code length versatility.
This paper introduces a novel approach to constructing complete complementary
codes (CCC) and Z-complementary code sets (ZCCS), for reducing interference in
MC-CDMA systems. The proposed construction, distinct from Boolean
function-based approaches, employs additive characters over Galois fields
GF($p^{r}$), where $p$ is prime and $r$ is a positive integer. First, we
develop CCCs with lengths of $p^{r}$, which are then extended to construct ZCCS
with both unreported lengths and sizes of $np^{r}$, where $n$ are arbitrary
positive integers. The versatility of this method is further highlighted as it
includes the lengths of ZCCS reported in prior studies as special cases,
underscoring the method's comprehensive nature and superiority.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 07:11:10 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Mar 2024 16:56:02 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 11:25:42 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Ghosh",
"Gobinda",
""
],
[
"Pathak",
"Sachin",
""
]
] |
2402.09969 | Wonyong Jang | Hyungryul Baik and Wonyong Jang | On the kernel of actions on asymptotic cones | 35 pages, 4 figures. Any comments are welcome! We fixed a minor issue
in the proof of Corollary 5.16 in the previous version | null | null | null | math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Any finitely generated group $G$ acts on its asymptotic cones in natural
ways. The purpose of this paper is to calculate the kernel of such actions.
First, we show that when $G$ is acylindrically hyperbolic, the kernel of the
natural action on every asymptotic cone coincides with the unique maximal
finite normal subgroup $K(G)$ of $G$. Secondly, we use this equivalence to
interpret the kernel of the actions on asymptotic cones as the kernel of the
actions on many spaces at "infinity". For instance, if $G \curvearrowright M$
is a non-elementary convergence group, then we show that the kernel of actions
on the limit set $L(G)$ coincides with the kernel of the action on asymptotic
cones. Similar results can also be established for the non-trivial Floyd
boundary and the $\mathrm{CAT}(0)$ groups with the visual boundary, contracting
boundary, and sublinearly Morse boundary. Additionally, the results are
extended to another action on asymptotic cones, called Paulin's construction.
In the last section, we calculate the kernel on asymptotic cones for various
groups, and as an application, we show that the cardinality of the kernel can
determine whether the group admits non-elementary action under some mild
assumptions.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 14:23:23 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Apr 2024 09:57:18 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 05:03:01 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Baik",
"Hyungryul",
""
],
[
"Jang",
"Wonyong",
""
]
] |
2402.10251 | Zhizhang Yuan | Zhizhang Yuan, Fanqi Shen, Meng Li, Yuguo Yu, Chenhao Tan, Yang Yang | BrainWave: A Brain Signal Foundation Model for Clinical Applications | 39 pages, 14 figures | null | null | null | q-bio.NC cs.AI cs.LG eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural electrical activity is fundamental to brain function, underlying a
range of cognitive and behavioral processes, including movement, perception,
decision-making, and consciousness. Abnormal patterns of neural signaling often
indicate the presence of underlying brain diseases. The variability among
individuals, the diverse array of clinical symptoms from various brain
disorders, and the limited availability of diagnostic classifications, have
posed significant barriers to formulating reliable model of neural signals for
diverse application contexts. Here, we present BrainWave, the first foundation
model for both invasive and non-invasive neural recordings, pretrained on more
than 40,000 hours of electrical brain recordings (13.79 TB of data) from
approximately 16,000 individuals. Our analysis show that BrainWave outperforms
all other competing models and consistently achieves state-of-the-art
performance in the diagnosis and identification of neurological disorders. We
also demonstrate robust capabilities of BrainWave in enabling zero-shot
transfer learning across varying recording conditions and brain diseases, as
well as few-shot classification without fine-tuning, suggesting that BrainWave
learns highly generalizable representations of neural signals. We hence believe
that open-sourcing BrainWave will facilitate a wide range of clinical
applications in medicine, paving the way for AI-driven approaches to
investigate brain disorders and advance neuroscience research.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 16:04:11 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2024 12:32:53 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Mar 2024 09:04:32 GMT"
},
{
"version": "v4",
"created": "Thu, 28 Mar 2024 13:55:31 GMT"
},
{
"version": "v5",
"created": "Thu, 12 Sep 2024 06:35:30 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Yuan",
"Zhizhang",
""
],
[
"Shen",
"Fanqi",
""
],
[
"Li",
"Meng",
""
],
[
"Yu",
"Yuguo",
""
],
[
"Tan",
"Chenhao",
""
],
[
"Yang",
"Yang",
""
]
] |
2402.10358 | Sahitya Vegesna Varma | Sahitya V. Vegesna, Venkata Rao Rayapati, and Heidemarie Schmidt | Evaluating the transport properties of interface-type, analog memristors | 12 pages, 5 figures, 1 table | Phys. Rev. Applied 22, 034028 (2024) | 10.1103/PhysRevApplied.22.034028 | null | cond-mat.dis-nn math-ph math.MP physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | Interface-type, analog memristors have quite a reputation for real-time
applications in edge sensorics, edge computing, and neuromorphic computing. The
n-type conducting BiFeO3 (BFO) is such an interface-type, analog memristor
which is also nonlinear and can therefore not only store, but also process data
in the same memristor cell without data transfer between the data storage unit
and the data processing unit. Here we present a physical memristor model which
describes the hysteretic current-voltage curves of the BFO memristor in the
small and large current-voltage range. Extracted internal state variables are
reconfigured by the ion drift in the two write branches and are determining the
electron transport in the two read branches. Simulation of electronic circuits
with the BFO interface-type, analog memristors was not possible so far because
previous physical memristor models have not captured the full range of internal
state variables. We show quantitative agreement between modeled and
experimental current-voltage curves exemplarily of three different BFO
memristors in the small and large current-voltage ranges. Extracted dynamic and
static internal state variables in the two full write branches and in the two
full read branches, respectively, can be used for simulating electronic
circuits with BFO memristors, e.g. in edge sensorics, edge computing, and
neuromorphic computing.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 23:05:33 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 07:09:25 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Vegesna",
"Sahitya V.",
""
],
[
"Rayapati",
"Venkata Rao",
""
],
[
"Schmidt",
"Heidemarie",
""
]
] |
2402.11649 | Anindya Das | Ranit Dutta, Ayan Ghosh, Shinjan Mandal, K. Watanabe, T. Taniguchi,
H.R. Krishnamurthy, Sumilan Banerjee, Manish Jain and Anindya Das | Electric field tunable superconductivity with competing orders in
twisted bilayer graphene near magic-angle | null | null | null | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Superconductivity (SC) in twisted bilayer graphene (tBLG) has been explored
by varying carrier concentrations, twist angles, and screening strength, with
the aim of uncovering its origin and possible connections to strong electronic
correlations in narrow bands and various resulting broken symmetries. However,
the link between the tBLG band structure and the onset of SC and other orders
largely remains unclear. In this study, we address this crucial gap by
examining in-situ band structure tuning of a near magic-angle ($\theta
\approx0.95^\circ$) tBLG device with displacement field ($D$) and reveal
remarkable competition between SC and other broken symmetries. At zero $D$, the
device exhibits superconducting signatures without the resistance peak at
half-filling, a characteristic signature with a strong electronic correlation.
As $D$ increases, the SC is suppressed, accompanied by the appearance of a
resistance peak at half-filling. Hall density measurements reveal that at zero
$D$, SC arises around the van Hove singularity (vHs) from an isospin or
spin-valley unpolarized band. At higher $D$, the suppression of SC coincides
with broken isospin symmetry near half-filling with lifted degeneracy ($g_d
\sim 2$). Additionally, as the SC phase becomes weaker with $D$, vHs shifts to
higher fillings, highlighting the modification of the underlying band structure
with the applied electric field. These findings, with recent theoretical study
on SC in tBLG, highlight the competition, rather being connected concomitantly,
between SC and other orders promoted by broken symmetries.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2024 16:59:58 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 05:26:57 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Dutta",
"Ranit",
""
],
[
"Ghosh",
"Ayan",
""
],
[
"Mandal",
"Shinjan",
""
],
[
"Watanabe",
"K.",
""
],
[
"Taniguchi",
"T.",
""
],
[
"Krishnamurthy",
"H. R.",
""
],
[
"Banerjee",
"Sumilan",
""
],
[
"Jain",
"Manish",
""
],
[
"Das",
"Anindya",
""
]
] |
2402.12040 | Alyzia Maria Konsta | Alyzia-Maria Konsta, Gemma Di Federico, Alberto Lluch Lafuente, and
Andrea Burattin | Attack Tree Generation via Process Mining | null | null | null | null | cs.CR cs.FL | http://creativecommons.org/licenses/by/4.0/ | Attack Trees are a graphical model of security used to study threat
scenarios. While visually appealing and supported by solid theories and
effective tools, one of their main drawbacks remains the amount of effort
required by security experts to design them from scratch. This work aims to
remedy this by providing a method for the automatic generation of Attack Trees
from attack logs. The main original feature of our approach w.r.t existing ones
is the use of Process Mining algorithms to synthesize Attack Trees, which allow
users to customize the way a set of logs are summarized as an Attack Tree, for
example by discarding statistically irrelevant events. Our approach is
supported by a prototype that, apart from the derivation and translation of the
model, provides the user with an Attack Tree in the RisQFLan format, a tool
used for quantitative risk modeling and analysis with Attack Trees. We
illustrate our approach with the case study of attacks on a communication
protocol, produced by a state-of-the-art protocol analyzer.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2024 10:55:49 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 07:25:03 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Konsta",
"Alyzia-Maria",
""
],
[
"Di Federico",
"Gemma",
""
],
[
"Lafuente",
"Alberto Lluch",
""
],
[
"Burattin",
"Andrea",
""
]
] |
2402.12809 | Chen Shen | Khadija Khatun, Chen Shen, Lei Shi and Jun Tanimoto | Stability of pairwise social dilemma games: destructive agents,
constructive agents, and their joint effects | null | Physical Review E 110, 034307 (2024) | 10.1103/PhysRevE.110.034307 | null | physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Destructive agents, who opt out of the game and indiscriminately harm others,
paradoxically foster cooperation, representing an intriguing variant of the
voluntary participation strategy. Yet, their impact on cooperation remains
inadequately understood, particularly in the context of pairwise social dilemma
games and in comparison to their counterparts, constructive agents, who opt out
of the game but indiscriminately benefit others. Furthermore, little is known
about the combined effects of both agent types on cooperation dynamics. Using
replicator dynamics in infinite and well-mixed populations, we find that,
contrary to their role in facilitating cooperation in multiplayer games,
destructive agents fail to encourage cooperation in pairwise social dilemmas.
Instead, they destabilize and may even replace defection in the prisoners'
dilemma and stag-hunt games. Similarly, in the chicken game, they can
destabilize or replace the mixed equilibrium of cooperation and defection, and
they undermine cooperation in the harmony game. Conversely, constructive
agents, when their payoffs exceed their contributions to opponents, can exhibit
effects similar to destructive agents. However, if their payoffs are lower,
while they destabilize defection in prisoners' dilemma and stag-hunt games,
they do not disrupt the cooperation equilibrium in harmony games and have a
negligible impact on the coexistence of cooperation in chicken games. The
combination of destructive and constructive agents does not facilitate
cooperation but instead generates complex evolutionary dynamics, including
bi-stable, tri-stable, and quad-stable states, with outcomes contingent on
their relative payoffs and game types. These results, taken together, enhance
our understanding of the impact of the voluntary participation mechanism on
cooperation, contributing to a more comprehensive understanding of its
influence.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2024 08:27:55 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Khatun",
"Khadija",
""
],
[
"Shen",
"Chen",
""
],
[
"Shi",
"Lei",
""
],
[
"Tanimoto",
"Jun",
""
]
] |
2402.14416 | Lucas Kook | Lucas Kook and Anton Rask Lundborg | Algorithm-agnostic significance testing in supervised learning with
multimodal data | null | null | 10.1093/bib/bbae475 | null | stat.AP | http://creativecommons.org/licenses/by/4.0/ | Valid statistical inference is crucial for decision-making but difficult to
obtain in supervised learning with multimodal data, e.g., combinations of
clinical features, genomic data, and medical images. Multimodal data often
warrants the use of black-box algorithms, for instance, random forests or
neural networks, which impede the use of traditional variable significance
tests. We address this problem by proposing the use of COvariance Measure Tests
(COMETs), which are calibrated and powerful tests that can be combined with any
sufficiently predictive supervised learning algorithm. We apply COMETs to
several high-dimensional, multimodal data sets to illustrate (i) variable
significance testing for finding relevant mutations modulating drug-activity,
(ii) modality selection for predicting survival in liver cancer patients with
multiomics data, and (iii) modality selection with clinical features and
medical imaging data. In all applications, COMETs yield results consistent with
domain knowledge without requiring data-driven pre-processing which may
invalidate type I error control. These novel applications with high-dimensional
multimodal data corroborate prior results on the power and robustness of COMETs
for significance testing. COMETs are implemented in the comets R package
available on CRAN and pycomets Python library available on GitHub. Source code
for reproducing all results is available at
https://github.com/LucasKook/comets. All data sets used in this work are openly
available.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 10:03:21 GMT"
},
{
"version": "v2",
"created": "Thu, 30 May 2024 15:00:35 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Sep 2024 09:44:23 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Kook",
"Lucas",
""
],
[
"Lundborg",
"Anton Rask",
""
]
] |
2402.14482 | Alfred Ferrer Florensa | Alfred Ferrer Florensa, Jose Juan Almagro Armenteros, Henrik Nielsen,
Frank M{\o}ller Aarestrup, Philip Thomas Lanken Conradsen Clausen | SpanSeq: Similarity-based sequence data splitting method for improved
development and assessment of deep learning projects | null | null | 10.1093/nargab/lqae106 | null | cs.LG q-bio.QM | http://creativecommons.org/licenses/by/4.0/ | The use of deep learning models in computational biology has increased
massively in recent years, and is expected to do so further with the current
advances in fields like Natural Language Processing. These models, although
able to draw complex relations between input and target, are also largely
inclined to learn noisy deviations from the pool of data used during their
development. In order to assess their performance on unseen data (their
capacity to generalize), it is common to randomly split the available data in
development (train/validation) and test sets. This procedure, although
standard, has lately been shown to produce dubious assessments of
generalization due to the existing similarity between samples in the databases
used. In this work, we present SpanSeq, a database partition method for machine
learning that can scale to most biological sequences (genes, proteins and
genomes) in order to avoid data leakage between sets. We also explore the
effect of not restraining similarity between sets by reproducing the
development of the state-of-the-art model DeepLoc, not only confirming the
consequences of randomly splitting databases on the model assessment, but
expanding those repercussions to the model development. SpanSeq is available
for downloading and installing at
https://github.com/genomicepidemiology/SpanSeq.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 12:15:05 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Mar 2024 12:02:46 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Florensa",
"Alfred Ferrer",
""
],
[
"Armenteros",
"Jose Juan Almagro",
""
],
[
"Nielsen",
"Henrik",
""
],
[
"Aarestrup",
"Frank Møller",
""
],
[
"Clausen",
"Philip Thomas Lanken Conradsen",
""
]
] |
2402.14553 | Jiangchao Qian | Jiangchao Qian, Yi Li, Zhihao Jiang, Robert Busch, Hsu-Chih Ni,
Tzu-Hsiang Lo, Axel Hoffmann, Andr\'e Schleife, Jian-Min Zuo | Unraveling the origin of antiferromagnetic coupling at YIG/permalloy
interface | null | null | null | null | cond-mat.mtrl-sci quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the structural and electronic origin of antiferromagnetic
(AFM) coupling in the Yttrium iron garnet (YIG) and permalloy (Py) bilayer
system at the atomic level. Ferromagnetic Resonance (FMR) reveal unique hybrid
modes in samples prepared with surface ion milling, indicative of
antiferromagnetic exchange coupling at the YIG/Py interface. Using atomic
resolution scanning transmission electron microscopy (STEM), we found that AFM
coupling appears at the YIG/Py interface of the tetrahedral YIG surface formed
with ion milling. The STEM measurements suggest that the interfacial AFM
coupling is predominantly driven by an oxygen-mediated super-exchange coupling
mechanism, which is confirmed by the density functional theory (DFT)
calculations to be energetically favorable. Thus, the combined experimental and
theoretical results reveal the critical role of interfacial atomic structure in
determining the type magnetic coupling in a YIG/ferromagnet heterostructure,
and prove that the interfacial structure can be experimentally tuned by surface
ion-milling.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 13:48:03 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Mar 2024 19:12:38 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Jul 2024 21:03:22 GMT"
},
{
"version": "v4",
"created": "Mon, 15 Jul 2024 22:47:26 GMT"
},
{
"version": "v5",
"created": "Wed, 11 Sep 2024 20:31:36 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Qian",
"Jiangchao",
""
],
[
"Li",
"Yi",
""
],
[
"Jiang",
"Zhihao",
""
],
[
"Busch",
"Robert",
""
],
[
"Ni",
"Hsu-Chih",
""
],
[
"Lo",
"Tzu-Hsiang",
""
],
[
"Hoffmann",
"Axel",
""
],
[
"Schleife",
"André",
""
],
[
"Zuo",
"Jian-Min",
""
]
] |
2402.14706 | Kohei Inayoshi | Kohei Inayoshi, Kohei Ichikawa | Birth of Rapidly Spinning, Overmassive Black Holes in the Early Universe | 12 pages, 6 figures, 1 table, accepted for publication in ApJL | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | The James Webb Space Telescope (JWST) has unveiled numerous massive black
holes (BHs) in faint, broad-line active galactic nuclei (AGNs). The discovery
highlights the presence of dust-reddened AGN populations, referred to as
"little red dots (LRDs)", more abundant than X-ray selected AGNs, which are
less influenced by obscuration. This finding indicates that the cosmic growth
rate of BHs within this population does not decrease but rather increases at
higher redshifts beyond $z\sim 6$. The BH accretion rate density deduced from
their luminosity function is remarkably higher than that from other AGN surveys
in X-ray and infrared bands. To align the cumulative mass density accreted to
BHs with the observed BH mass density at $z\simeq 4-5$, as derived from the
integration of the BH mass function, the radiative efficiency must be doubled
from the canonical 10% value, achieving significance beyond the $>3\sigma$
confidence level. This suggests the presence of rapid spins with 96% of the
maximum limit among these BHs, maintained by prolonged mass accretion instead
of chaotic accretion with randomly oriented inflows. Moreover, we derive an
upper bound for the stellar mass of galaxies hosting these LRDs, ensuring
consistency with galaxy formation in the standard cosmological model, where the
host stellar mass is limited by the available baryonic reservoir. Our analysis
gives a lower bound for the BH-to-galaxy mass ratio that exceeds the typical
value known in the nearby universe and aligns with that for JWST-detected
unobscured AGNs. Accordingly, we propose a hypothesis that the dense, dust-rich
environments within LRDs facilitate the emergence of rapidly spinning and
overmassive BH populations during the epoch of reionization. This scenario
predicts a potential association between relativistic jets and other
high-energy phenomena with overmassive BHs in the early universe.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 17:05:57 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 08:36:30 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Inayoshi",
"Kohei",
""
],
[
"Ichikawa",
"Kohei",
""
]
] |
2402.15091 | Chen Shen | Zehua Si, Zhixue He, Chen Shen and Jun Tanimoto | Mixed strategy approach destabilizes cooperation in finite populations
with clustering coefficient | null | Chaos 1 May 2024; 34 (5): 053126 | 10.1063/5.0205330 | null | q-bio.PE physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Evolutionary game theory, encompassing discrete, continuous, and mixed
strategies, is pivotal for understanding cooperation dynamics. Discrete
strategies involve deterministic actions with a fixed probability of one,
whereas continuous strategies employ intermediate probabilities to convey the
extent of cooperation and emphasize expected payoffs. Mixed strategies, though
akin to continuous ones, calculate immediate payoffs based on the action chosen
at a given moment within intermediate probabilities. Although previous research
has highlighted the distinct impacts of these strategic approaches on fostering
cooperation, the reasons behind the differing levels of cooperation among these
approaches have remained somewhat unclear. This study explores how these
strategic approaches influence cooperation in the context of the prisoner's
dilemma game, particularly in networked populations with varying clustering
coefficients. Our research goes beyond existing studies by revealing that the
differences in cooperation levels between these strategic approaches are not
confined to finite populations; they also depend on the clustering coefficients
of these populations. In populations with nonzero clustering coefficients, we
observed varying degrees of stable cooperation for each strategic approach
across multiple simulations, with mixed strategies showing the most
variability, followed by continuous and discrete strategies. However, this
variability in cooperation evolution decreased in populations with a clustering
coefficient of zero, narrowing the differences in cooperation levels among the
strategies. These findings suggest that in more realistic settings, the
robustness of cooperation systems may be compromised, as the evolution of
cooperation through mixed and continuous strategies introduces a degree of
unpredictability.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2024 04:34:05 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Si",
"Zehua",
""
],
[
"He",
"Zhixue",
""
],
[
"Shen",
"Chen",
""
],
[
"Tanimoto",
"Jun",
""
]
] |
2402.16362 | Nelson Alirio Cruz Gutierrez | N.A. Cruz and O.O. Melo and C.A. Martinez | Estimability conditions for complex carryover effects in crossover
designs | null | null | null | null | stat.ME math.ST stat.TH | http://creativecommons.org/licenses/by-nc-nd/4.0/ | It has been argued for many years that models used to analyze data from
crossover designs are not appropriate when simple carryover effects are
assumed. Furthermore, a statistical model that could estimate complex
carry-over effects in crossover designs had never been found. However, in this
paper, the estimability conditions of the complex carryover effects and a
theoretical result that supports them are found. In addition, a simulation
example is developed in a non-linear dose-response test for a typical AB/BA
crossover design with repeated measures. This simulation shows that a
semiparametric model can detect complex carryover effects and that this
estimation improves the precision of the estimators of the treatment effect. It
is concluded that when there are at least five replicates in each observation
period per individual, semiparametric statistical models provide a good
estimator of the treatment effect and reduce bias with respect to models that
assume the absence of carryover effects or simplex carryover effects.
Furthermore, an application of the methodology is shown and the wealth of
analysis gained by estimating complex carryover effects is evident.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 07:32:56 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2024 18:13:57 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Cruz",
"N. A.",
""
],
[
"Melo",
"O. O.",
""
],
[
"Martinez",
"C. A.",
""
]
] |
2402.17158 | Alexander Fish | Michael Bj\"orklund and Alexander Fish | A Szemer\'edi type theorem for sets of positive density in approximate
lattices | 32 pages | null | null | null | math.DS math.CO math.NT | http://creativecommons.org/licenses/by/4.0/ | An extension of Szemer\'edi's Theorem is proved for sets of positive density
in approximate lattices in general locally compact and second countable abelian
groups. As a consequence, we establish a recent conjecture of Klick, Strungaru
and Tcaciuc. Via a novel version of Furstenberg's Correspondence principle,
which should be of independent interest, we show that our Szemer\'edi Theorems
can be deduced from a general \emph{transverse} multiple recurrence theorem,
which we establish using recent works of Austin.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2024 02:45:58 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Feb 2024 04:34:25 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 13:05:30 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Björklund",
"Michael",
""
],
[
"Fish",
"Alexander",
""
]
] |
2402.17713 | Darko Volkov | Mahadevan Ganesh, Stuart C. Hawkins, Darko Volkov | An all-frequency stable integral system for Maxwell's equations in 3-D
penetrable media: continuous and discrete model analysis | 11 figures | null | null | null | math.NA cs.NA math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new system of surface integral equations for Maxwell's
transmission problem in three dimensions. This system has two remarkable
features, both of which we prove. First, it is well-posed at all frequencies.
Second, the underlying linear operator has a uniformly bounded inverse as the
frequency approaches zero, ensuring that there is no low-frequency breakdown.
The system is derived from a formulation we introduced in our previous work,
which required additional integral constraints to ensure well -posedness across
all frequencies. In this study, we eliminate those constraints and demonstrate
that our new self adjoint, constraints-free linear system expressed in the
desirable form of an identity plus a compact weakly-singular operator is stable
for all frequencies. Furthermore, we propose and analyze a fully discrete
numerical method for these systems and provide a proof of spectrally accurate
convergence for the computational method. We also computationally demonstrate
the high-order accuracy of the algorithm using benchmark scatterers with curved
surfaces.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2024 17:48:56 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 16:46:33 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Ganesh",
"Mahadevan",
""
],
[
"Hawkins",
"Stuart C.",
""
],
[
"Volkov",
"Darko",
""
]
] |
2402.17984 | Minji Kim | Minji Kim, Vladas Pipiras, Kevin O'Connor, Themistoklis Sapsis | Sampling low-fidelity outputs for estimation of high-fidelity density
and its tails | 33 pages, 11 figures, 2 tables | null | null | null | stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a multifidelity setting, data are available under the same conditions from
two (or more) sources, e.g. computer codes, one being lower-fidelity but
computationally cheaper, and the other higher-fidelity and more expensive. This
work studies for which low-fidelity outputs, one should obtain high-fidelity
outputs, if the goal is to estimate the probability density function of the
latter, especially when it comes to the distribution tails and extremes. It is
suggested to approach this problem from the perspective of the importance
sampling of low-fidelity outputs according to some proposal distribution,
combined with special considerations for the distribution tails based on
extreme value theory. The notion of an optimal proposal distribution is
introduced and investigated, in both theory and simulations. The approach is
motivated and illustrated with an application to estimate the probability
density function of record extremes of ship motions, obtained through two
computer codes of different fidelities.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2024 01:56:36 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 00:27:07 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Kim",
"Minji",
""
],
[
"Pipiras",
"Vladas",
""
],
[
"O'Connor",
"Kevin",
""
],
[
"Sapsis",
"Themistoklis",
""
]
] |
2403.00381 | Jiajun Qian | Jiajun Qian, Liang Xu, Xiaoqiang Ren, Xiaofan Wang | Structured Deep Neural Network-Based Backstepping Trajectory Tracking
Control for Lagrangian Systems | null | null | null | null | cs.RO cs.LG cs.SY eess.SY | http://creativecommons.org/licenses/by/4.0/ | Deep neural networks (DNN) are increasingly being used to learn controllers
due to their excellent approximation capabilities. However, their black-box
nature poses significant challenges to closed-loop stability guarantees and
performance analysis. In this paper, we introduce a structured DNN-based
controller for the trajectory tracking control of Lagrangian systems using
backing techniques. By properly designing neural network structures, the
proposed controller can ensure closed-loop stability for any compatible neural
network parameters. In addition, improved control performance can be achieved
by further optimizing neural network parameters. Besides, we provide explicit
upper bounds on tracking errors in terms of controller parameters, which allows
us to achieve the desired tracking performance by properly selecting the
controller parameters. Furthermore, when system models are unknown, we propose
an improved Lagrangian neural network (LNN) structure to learn the system
dynamics and design the controller. We show that in the presence of model
approximation errors and external disturbances, the closed-loop stability and
tracking control performance can still be guaranteed. The effectiveness of the
proposed approach is demonstrated through simulations.
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2024 09:09:37 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Aug 2024 13:13:54 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 02:25:28 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Qian",
"Jiajun",
""
],
[
"Xu",
"Liang",
""
],
[
"Ren",
"Xiaoqiang",
""
],
[
"Wang",
"Xiaofan",
""
]
] |
2403.00564 | Shengjie Wang | Shengjie Wang, Shaohuai Liu, Weirui Ye, Jiacheng You and Yang Gao | EfficientZero V2: Mastering Discrete and Continuous Control with Limited
Data | 21 pages,10 figures | null | null | null | cs.LG cs.AI cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sample efficiency remains a crucial challenge in applying Reinforcement
Learning (RL) to real-world tasks. While recent algorithms have made
significant strides in improving sample efficiency, none have achieved
consistently superior performance across diverse domains. In this paper, we
introduce EfficientZero V2, a general framework designed for sample-efficient
RL algorithms. We have expanded the performance of EfficientZero to multiple
domains, encompassing both continuous and discrete actions, as well as visual
and low-dimensional inputs. With a series of improvements we propose,
EfficientZero V2 outperforms the current state-of-the-art (SOTA) by a
significant margin in diverse tasks under the limited data setting.
EfficientZero V2 exhibits a notable advancement over the prevailing general
algorithm, DreamerV3, achieving superior outcomes in 50 of 66 evaluated tasks
across diverse benchmarks, such as Atari 100k, Proprio Control, and Vision
Control.
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2024 14:42:25 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 08:37:27 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Wang",
"Shengjie",
""
],
[
"Liu",
"Shaohuai",
""
],
[
"Ye",
"Weirui",
""
],
[
"You",
"Jiacheng",
""
],
[
"Gao",
"Yang",
""
]
] |
2403.00995 | Chenghao Lyu | Chenghao Lyu, Qi Fan, Philippe Guyard, Yanlei Diao | A Spark Optimizer for Adaptive, Fine-Grained Parameter Tuning | null | null | 10.14778/3681954.3682021 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As Spark becomes a common big data analytics platform, its growing complexity
makes automatic tuning of numerous parameters critical for performance. Our
work on Spark parameter tuning is particularly motivated by two recent trends:
Spark's Adaptive Query Execution (AQE) based on runtime statistics, and the
increasingly popular Spark cloud deployments that make cost-performance
reasoning crucial for the end user. This paper presents our design of a Spark
optimizer that controls all tunable parameters of each query in the new AQE
architecture to explore its performance benefits and, at the same time, casts
the tuning problem in the theoretically sound multi-objective optimization
(MOO) setting to better adapt to user cost-performance preferences. To this
end, we propose a novel hybrid compile-time/runtime approach to
multi-granularity tuning of diverse, correlated Spark parameters, as well as a
suite of modeling and optimization techniques to solve the tuning problem in
the MOO setting while meeting the stringent time constraint of 1-2 seconds for
cloud use. Evaluation results using TPC-H and TPC-DS benchmarks demonstrate the
superior performance of our approach: (i) When prioritizing latency, it
achieves 63% and 65% reduction for TPC-H and TPC-DS, respectively, under an
average solving time of 0.7-0.8 sec, outperforming the most competitive MOO
method that reduces only 18-25% latency with 2.6-15 sec solving time. (ii) When
shifting preferences between latency and cost, our approach dominates the
solutions of alternative methods, exhibiting superior adaptability to varying
preferences.
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2024 21:34:54 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Jul 2024 21:10:58 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Jul 2024 00:01:07 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Lyu",
"Chenghao",
""
],
[
"Fan",
"Qi",
""
],
[
"Guyard",
"Philippe",
""
],
[
"Diao",
"Yanlei",
""
]
] |
2403.02913 | Benjamin Sanderse | Benjamin Sanderse, Panos Stinis, Romit Maulik, Shady E. Ahmed | Scientific machine learning for closure models in multiscale problems: a
review | null | null | null | PNNL-SA-195444 | math.NA cs.NA | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Closure problems are omnipresent when simulating multiscale systems, where
some quantities and processes cannot be fully prescribed despite their effects
on the simulation's accuracy. Recently, scientific machine learning approaches
have been proposed as a way to tackle the closure problem, combining
traditional (physics-based) modeling with data-driven (machine-learned)
techniques, typically through enriching differential equations with neural
networks. This paper reviews the different reduced model forms, distinguished
by the degree to which they include known physics, and the different objectives
of a priori and a posteriori learning. The importance of adhering to physical
laws (such as symmetries and conservation laws) in choosing the reduced model
form and choosing the learning method is discussed. The effect of spatial and
temporal discretization and recent trends toward discretization-invariant
models are reviewed. In addition, we make the connections between closure
problems and several other research disciplines: inverse problems, Mori-Zwanzig
theory, and multi-fidelity methods. In conclusion, much progress has been made
with scientific machine learning approaches for solving closure problems, but
many challenges remain. In particular, the generalizability and
interpretability of learned models is a major issue that needs to be addressed
further.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2024 12:28:04 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 07:54:18 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Sanderse",
"Benjamin",
""
],
[
"Stinis",
"Panos",
""
],
[
"Maulik",
"Romit",
""
],
[
"Ahmed",
"Shady E.",
""
]
] |
2403.03322 | Jingzhi Gong | Jingzhi Gong, Tao Chen | Deep Configuration Performance Learning: A Systematic Survey and
Taxonomy | Accepted by the TOSEM survey track | null | null | null | cs.SE cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Performance is arguably the most crucial attribute that reflects the quality
of a configurable software system. However, given the increasing scale and
complexity of modern software, modeling and predicting how various
configurations can impact performance becomes one of the major challenges in
software maintenance. As such, performance is often modeled without having a
thorough knowledge of the software system, but relying mainly on data, which
fits precisely with the purpose of deep learning.
In this paper, we conduct a comprehensive review exclusively on the topic of
deep learning for performance learning of configurable software, covering 1,206
searched papers spanning six indexing services, based on which 99 primary
papers were extracted and analyzed. Our results outline key statistics,
taxonomy, strengths, weaknesses, and optimal usage scenarios for techniques
related to the preparation of configuration data, the construction of deep
learning performance models, the evaluation of these models, and their
utilization in various software configuration-related tasks.We also identify
the good practices and potentially problematic phenomena from the studies
surveyed, together with a comprehensive summary of actionable suggestions and
insights into future opportunities within the field. To promote open science,
all the raw results of this survey can be accessed at our repository:
https://github.com/ideas-labo/DCPL-SLR.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2024 21:05:16 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jul 2024 22:28:00 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Sep 2024 21:27:40 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Gong",
"Jingzhi",
""
],
[
"Chen",
"Tao",
""
]
] |
2403.03546 | Zhiwei Zhu | Zhiwei Zhu, Jiaqun Wei | A bijection between support $\tau$-tilting subcategories and
$\tau$-cotorsion pairs in extriangulated categories | 15 pages | null | null | null | math.RT math.CT | http://creativecommons.org/licenses/by/4.0/ | Let $\mathscr{C}$ be an extriangulated category with enough projectives and
injectives. We give a new definition of tilting subcategories of $\mathscr{C}$
and prove it coincides with the definition given in [19]. As applications, we
introduce the notions of support $\tau$-tilting subcategories and
$\tau$-cotorsion pairs of $\mathscr{C}$. We build a bijection between support
$\tau$-tilting subcategories and certain $\tau$-cotorsion pairs. Moreover, this
bijection induces a bijection between tilting subcategories and certain
cotorsion pairs.
| [
{
"version": "v1",
"created": "Wed, 6 Mar 2024 08:48:07 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Apr 2024 10:44:44 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Apr 2024 01:46:58 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 08:05:54 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Zhu",
"Zhiwei",
""
],
[
"Wei",
"Jiaqun",
""
]
] |
2403.03655 | Andi Liu | Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu,
Song Bian, Mauro Conti | Kronos: A Secure and Generic Sharding Blockchain Consensus with
Optimized Overhead | The algorithms in Section 4 contain defects and inaccurate
descriptions that require correction | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sharding enhances blockchain scalability by dividing the network into shards,
each managing specific unspent transaction outputs or accounts. As an
introduced new transaction type, cross-shard transactions pose a critical
challenge to the security and efficiency of sharding blockchains. Currently,
there is a lack of a generic sharding consensus pattern that achieves both
security and low overhead. In this paper, we present Kronos, a secure sharding
blockchain consensus achieving optimized overhead. In particular, we propose a
new secure sharding consensus pattern, based on a buffer managed jointly by
shard members. Valid transactions are transferred to the payee via the buffer,
while invalid ones are rejected through happy or unhappy paths. Kronos is
proved to achieve security with atomicity under malicious clients with optimal
intra-shard overhead $kB$ ($k$ for involved shard number and $B$ for a
Byzantine fault tolerance (BFT) cost). Besides, we propose secure cross-shard
certification methods based on batch certification and reliable cross-shard
transfer. The former combines hybrid trees or vector commitments, while the
latter integrates erasure coding. Handling $b$ transactions, Kronos is proved
to achieve reliability with low cross-shard overhead $O(n b \lambda)$ ($n$ for
shard size and $\lambda$ for the security parameter). Notably, Kronos imposes
no restrictions on BFT and does not rely on time assumptions, offering optional
constructions in various modules. We implement Kronos using two prominent BFT
protocols: asynchronous Speeding Dumbo and partial synchronous Hotstuff.
Extensive experiments demonstrate Kronos scales the consensus nodes to
thousands, achieving a substantial throughput of 320 ktx/sec with 2.0 sec
latency. Compared with the past solutions, Kronos outperforms, achieving up to
a 12* improvement in throughput and a 50% reduction in latency.
| [
{
"version": "v1",
"created": "Wed, 6 Mar 2024 12:26:04 GMT"
},
{
"version": "v2",
"created": "Mon, 6 May 2024 02:57:37 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 06:58:23 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Liu",
"Yizhong",
""
],
[
"Liu",
"Andi",
""
],
[
"Lu",
"Yuan",
""
],
[
"Pan",
"Zhuocheng",
""
],
[
"Li",
"Yinuo",
""
],
[
"Liu",
"Jianwei",
""
],
[
"Bian",
"Song",
""
],
[
"Conti",
"Mauro",
""
]
] |
2403.05136 | Hoang Viet Do | Hoang Viet Do, Yong Hun Kim, Joo Han Lee, Min Ho Lee, and Jin Woo Song | DeRO: Dead Reckoning Based on Radar Odometry With Accelerometers Aided
for Robot Localization | 9 pages, 5 figures, 1 table, IROS 2024 | null | null | null | cs.RO eess.SP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we propose a radar odometry structure that directly utilizes
radar velocity measurements for dead reckoning while maintaining its ability to
update estimations within the Kalman filter framework. Specifically, we employ
the Doppler velocity obtained by a 4D Frequency Modulated Continuous Wave
(FMCW) radar in conjunction with gyroscope data to calculate poses. This
approach helps mitigate high drift resulting from accelerometer biases and
double integration. Instead, tilt angles measured by gravitational force are
utilized alongside relative distance measurements from radar scan matching for
the filter's measurement update. Additionally, to further enhance the system's
accuracy, we estimate and compensate for the radar velocity scale factor. The
performance of the proposed method is verified through five real-world
open-source datasets. The results demonstrate that our approach reduces
position error by 62% and rotation error by 66% on average compared to the
state-of-the-art radar-inertial fusion method in terms of absolute trajectory
error.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2024 08:09:10 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 07:39:34 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Do",
"Hoang Viet",
""
],
[
"Kim",
"Yong Hun",
""
],
[
"Lee",
"Joo Han",
""
],
[
"Lee",
"Min Ho",
""
],
[
"Song",
"Jin Woo",
""
]
] |
2403.05192 | Leonardo Peroni | Leonardo Peroni, Sergey Gorinsky | An End-to-End Pipeline Perspective on Video Streaming in Best-Effort
Networks: A Survey and Tutorial | null | null | null | null | cs.NI cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Remaining a dominant force in Internet traffic, video streaming captivates
end users, service providers, and researchers. This paper takes a pragmatic
approach to reviewing recent advances in the field by focusing on the prevalent
streaming paradigm that involves delivering long-form two-dimensional videos
over the best-effort Internet with client-side adaptive bitrate (ABR)
algorithms and assistance from content delivery networks (CDNs). To enhance
accessibility, we supplement the survey with tutorial material. Unlike existing
surveys that offer fragmented views, our work provides a holistic perspective
on the entire end-to-end streaming pipeline, from video capture by a
camera-equipped device to playback by the end user. Our novel perspective
covers the ingestion, processing, and distribution stages of the pipeline and
addresses key challenges such as video compression, upload, transcoding, ABR
algorithms, CDN support, and quality of experience. We review over 200 papers
and classify streaming designs by their problem-solving methodology, whether
based on intuition (simple heuristics), theory (formal optimization), or
machine learning (generalizable data patterns). The survey further refines
these methodology-based categories and characterizes each design by additional
traits such as compatible codecs and use of super resolution. We connect the
reviewed research to real-world applications by discussing the practices of
commercial streaming platforms. Finally, the survey highlights prominent
current trends and outlines future directions in video streaming.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2024 10:14:32 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 11:46:32 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Peroni",
"Leonardo",
""
],
[
"Gorinsky",
"Sergey",
""
]
] |
2403.06296 | Eran Sela | Cheolhee Han, Doron Cohen, and Eran Sela | Quantum limitation on experimental testing of non-equilibrium
fluctuation theorems | 10 pages, 5 figures | null | null | null | cond-mat.stat-mech cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-equilibrium fluctuation theorems (NFTs) relate work performed on a system
as its Hamiltonian varies with time, to equilibrium data of the initial and
final states. In a classical context the system energy can be directly
measured, while a quantum implementation requires the incorporation of a
work-agent. We demonstrate that the uncertainty principle imposes inherent
quantum limitations on the applicability of the NFT for probing non-trivial
mesoscopic systems. We work out the NFT validity regime for the simplest
quantum-dot toy model, and discuss future applications.
| [
{
"version": "v1",
"created": "Sun, 10 Mar 2024 20:02:33 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Jul 2024 06:51:26 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Aug 2024 21:47:18 GMT"
},
{
"version": "v4",
"created": "Thu, 12 Sep 2024 13:53:16 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Han",
"Cheolhee",
""
],
[
"Cohen",
"Doron",
""
],
[
"Sela",
"Eran",
""
]
] |
2403.07305 | Li You | Li You, Xiaoyu Qiang, Yongxiang Zhu, Fan Jiang, Christos G. Tsinos,
Wenjin Wang, Henk Wymeersch, Xiqi Gao, Bj\"orn Ottersten | Integrated Communications and Localization for Massive MIMO LEO
Satellite Systems | 14 pages, 7 figures, to appear in IEEE Transactions on Wireless
Communications | IEEE Transactions on Wireless Communications, vol. 23, no. 9, pp.
11061-11075, Sep. 2024 | 10.1109/TWC.2024.3378305 | null | cs.IT eess.SP math.IT | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Integrated communications and localization (ICAL) will play an important part
in future sixth generation (6G) networks for the realization of Internet of
Everything (IoE) to support both global communications and seamless
localization. Massive multiple-input multiple-output (MIMO) low earth orbit
(LEO) satellite systems have great potential in providing wide coverage with
enhanced gains, and thus are strong candidates for realizing ubiquitous ICAL.
In this paper, we develop a wideband massive MIMO LEO satellite system to
simultaneously support wireless communications and localization operations in
the downlink. In particular, we first characterize the signal propagation
properties and derive a localization performance bound. Based on these
analyses, we focus on the hybrid analog/digital precoding design to achieve
high communication capability and localization precision. Numerical results
demonstrate that the proposed ICAL scheme supports both the wireless
communication and localization operations for typical system setups.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2024 04:17:15 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"You",
"Li",
""
],
[
"Qiang",
"Xiaoyu",
""
],
[
"Zhu",
"Yongxiang",
""
],
[
"Jiang",
"Fan",
""
],
[
"Tsinos",
"Christos G.",
""
],
[
"Wang",
"Wenjin",
""
],
[
"Wymeersch",
"Henk",
""
],
[
"Gao",
"Xiqi",
""
],
[
"Ottersten",
"Björn",
""
]
] |
2403.08594 | Margherita Putti | Margherita Putti, Nicola Bartolo, Sukannya Bhattacharya, Marco Peloso | CMB spectral distortions from enhanced primordial perturbations: the
role of spectator axions | null | JCAP08(2024)016 | null | null | astro-ph.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Primordial tensor modes can induce Cosmic Microwave Background spectral
distortions during horizon re-entry. We investigate a specific mechanism
proposed for this purpose, characterized by the coupling of an SU(2) gauge
field to an axion undergoing a momentary stage of rapid evolution during
inflation. Examining also the scalar perturbations produced by this model, we
find that spectral distortions from the scalar modes significantly dominate
those arising from the tensors. This holds true also for an earlier version of
the model based on a U(1) gauge field. The scalar-induced distortions might be
observed in future experiments, and the current COBE/FIRAS constraints already
limit the parameter space of these models. Additionally, we find that delaying
the onset of fast roll in the SU(2) scenario (to enhance the modes at the
scales relevant for spectral distortions, while respecting the CMB constraints
at larger scales) poses a greater challenge compared to the U(1) case. We
propose a way to control the axion speed by varying the size of its coupling to
the gauge fields.
| [
{
"version": "v1",
"created": "Wed, 13 Mar 2024 15:01:37 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 10:10:46 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Putti",
"Margherita",
""
],
[
"Bartolo",
"Nicola",
""
],
[
"Bhattacharya",
"Sukannya",
""
],
[
"Peloso",
"Marco",
""
]
] |
2403.11694 | Zhuoyuan Li | Zhuoyuan Li, Zikun Yuan, Li Li, Dong Liu, Xiaohu Tang, Feng Wu | Object Segmentation-Assisted Inter Prediction for Versatile Video Coding | 20 pages, 13 figures, accepted by IEEE Transactions on Broadcasting
(TBC) | null | 10.1109/TBC.2024.3434520 | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In modern video coding standards, block-based inter prediction is widely
adopted, which brings high compression efficiency. However, in natural videos,
there are usually multiple moving objects of arbitrary shapes, resulting in
complex motion fields that are difficult to represent compactly. This problem
has been tackled by more flexible block partitioning methods in the Versatile
Video Coding (VVC) standard, but the more flexible partitions require more
overhead bits to signal and still cannot be made arbitrarily shaped. To address
this limitation, we propose an object segmentation-assisted inter prediction
method (SAIP), where objects in the reference frames are segmented by some
advanced technologies. With a proper indication, the object segmentation mask
is translated from the reference frame to the current frame as the
arbitrary-shaped partition of different regions without any extra signal. Using
the segmentation mask, motion compensation is separately performed for
different regions, achieving higher prediction accuracy. The segmentation mask
is further used to code the motion vectors of different regions more
efficiently. Moreover, the segmentation mask is considered in the joint
rate-distortion optimization for motion estimation and partition estimation to
derive the motion vector of different regions and partition more accurately.
The proposed method is implemented into the VVC reference software, VTM version
12.0. Experimental results show that the proposed method achieves up to 1.98%,
1.14%, 0.79%, and on average 0.82%, 0.49%, 0.37% BD-rate reduction for common
test sequences, under the Low-delay P, Low-delay B, and Random Access
configurations, respectively.
| [
{
"version": "v1",
"created": "Mon, 18 Mar 2024 11:48:20 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 10:13:26 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Li",
"Zhuoyuan",
""
],
[
"Yuan",
"Zikun",
""
],
[
"Li",
"Li",
""
],
[
"Liu",
"Dong",
""
],
[
"Tang",
"Xiaohu",
""
],
[
"Wu",
"Feng",
""
]
] |
2403.14570 | Li Tuobang | Li Tuobang | Robust estimations from distribution structures: II. Central Moments | null | null | null | null | math.ST stat.TH | http://creativecommons.org/licenses/by/4.0/ | In descriptive statistics, $U$-statistics arise naturally in producing
minimum-variance unbiased estimators. In 1984, Serfling considered the
distribution formed by evaluating the kernel of the $U$-statistics and proposed
generalized $L$-statistics which includes Hodges-Lehamnn estimator and
Bickel-Lehmann spread as special cases. However, the structures of the kernel
distributions remain unclear. In 1954, Hodges and Lehmann demonstrated that if
$X$ and $Y$ are independently sampled from the same unimodal distribution,
$X-Y$ will exhibit symmetrical unimodality with its peak centered at zero.
Building upon this foundational work, the current study delves into the
structure of the kernel distribution. It is shown that the $\mathbf{k}$th
central moment kernel distributions ($\mathbf{k}>2$) derived from a unimodal
distribution exhibit location invariance and is also nearly unimodal with the
mode and median close to zero. This article provides an approach to study the
general structure of kernel distributions.
| [
{
"version": "v1",
"created": "Wed, 20 Mar 2024 17:27:36 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 08:59:18 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Sep 2024 11:42:37 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Sep 2024 21:49:09 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Tuobang",
"Li",
""
]
] |
2403.14770 | Katie Lim | Katie Lim, Matthew Giordano, Theano Stavrinos, Irene Zhang, Jacob
Nelson, Baris Kasikci, Tom Anderson | Beehive: A Flexible Network Stack for Direct-Attached Accelerators | To appear at MICRO 2024 | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Direct-attached accelerators, where application accelerators are directly
connected to the datacenter network via a hardware network stack, offer
substantial benefits in terms of reduced latency, CPU overhead, and energy use.
However, a key challenge is that modern datacenter network stacks are complex,
with interleaved protocol layers, network management functions, and
virtualization support. To operators, network feature agility, diagnostics, and
manageability are often considered just as important as raw performance. By
contrast, existing hardware network stacks only support basic protocols and are
often difficult to extend since they use fixed processing pipelines.
We propose Beehive, a new, open-source FPGA network stack for direct-attached
accelerators designed to enable flexible and adaptive construction of complex
network functionality in hardware. Application and network protocol elements
are modularized as tiles over a network-on-chip substrate. Elements can be
added or scaled up/down to match workload characteristics with minimal effort
or changes to other elements. Flexible diagnostics and control are integral,
with tooling to ensure deadlock safety. Our implementation interoperates with
standard Linux TCP and UDP clients, with a 4x improvement in end-to-end RPC
tail latency for Linux UDP clients versus a CPU-attached accelerator. Beehive
is available at https://github.com/beehive-fpga/beehive
| [
{
"version": "v1",
"created": "Thu, 21 Mar 2024 18:16:46 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Apr 2024 07:24:48 GMT"
},
{
"version": "v3",
"created": "Sat, 13 Apr 2024 06:49:32 GMT"
},
{
"version": "v4",
"created": "Thu, 30 May 2024 19:25:18 GMT"
},
{
"version": "v5",
"created": "Wed, 11 Sep 2024 23:44:12 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Lim",
"Katie",
""
],
[
"Giordano",
"Matthew",
""
],
[
"Stavrinos",
"Theano",
""
],
[
"Zhang",
"Irene",
""
],
[
"Nelson",
"Jacob",
""
],
[
"Kasikci",
"Baris",
""
],
[
"Anderson",
"Tom",
""
]
] |
2403.15176 | Shirin Vafaei | Shirin Vafaei, Ryohei Fukuma, Takufumi Yanagisawa, Huixiang Yang,
Satoru Oshino, Naoki Tani, Hui Ming Khoo, Hidenori Sugano, Yasushi Iimura,
Hiroharu Suzuki, Madoka Nakajima, Kentaro Tamura, Haruhiko Kishima | Brain-aligning of semantic vectors improves neural decoding of visual
stimuli | 40 pages, 5 figures | null | null | null | q-bio.NC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The development of algorithms to accurately decode of neural information is a
long-standing effort in the field of neuroscience. Brain decoding is typically
employed by training machine learning models to map neural data onto a
preestablished vector representation of stimulus features. These vectors are
usually derived from image- and/or text-based feature spaces. Nonetheless, the
intrinsic characteristics of these vectors might be fundamentally different
than those encoded by the brain, limiting the ability of algorithms to
accurately learn this mapping. To address this issue, here, we propose a
representation learning framework, called brain-aligning of semantic vectors,
that fine-tunes pretrained feature vectors to better align with the structure
of neural representations of visual stimuli in the human brain. We trained this
model with functional magnetic resonance imaging (fMRI) data representing 150
visual stimulus categories; then, we performed zero-shot brain decoding on 1)
fMRI, 2) magnetoencephalography (MEG), and 3) electrocorticography (ECoG) data
reflecting neural representations of visual stimuli. By using fMRI-based
brain-aligned vectors, the zero-shot decoding accuracy all three neuroimaging
datasets increased. This finding underscores the potential of leveraging a
richer array of brainderived features to increase the performance of brain
decoding algorithms.
| [
{
"version": "v1",
"created": "Fri, 22 Mar 2024 13:01:10 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Aug 2024 05:14:38 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 09:35:03 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Vafaei",
"Shirin",
""
],
[
"Fukuma",
"Ryohei",
""
],
[
"Yanagisawa",
"Takufumi",
""
],
[
"Yang",
"Huixiang",
""
],
[
"Oshino",
"Satoru",
""
],
[
"Tani",
"Naoki",
""
],
[
"Khoo",
"Hui Ming",
""
],
[
"Sugano",
"Hidenori",
""
],
[
"Iimura",
"Yasushi",
""
],
[
"Suzuki",
"Hiroharu",
""
],
[
"Nakajima",
"Madoka",
""
],
[
"Tamura",
"Kentaro",
""
],
[
"Kishima",
"Haruhiko",
""
]
] |
2403.15344 | Kevin Colin | Ying Wang, Mirko Pasquini, K\'evin Colin, H{\aa}kan Hjalmarsson | Regret Minimization in Scalar, Static, Non-linear Optimization Problems | Extended version of a paper accepted for IEEE Conference on Decision
and Control (CDC 2024) | null | null | null | math.OC cs.SY eess.SY | http://creativecommons.org/publicdomain/zero/1.0/ | We study the problem of determining an effective exploration strategy in
static and non-linear optimization problems, which depend on an unknown scalar
parameter to be learned from online collected noisy data. An optimal trade-off
between exploration and exploitation is crucial for effective optimization
under uncertainties, and to achieve this we consider a cumulative regret
minimization approach over a finite horizon, with each time instant in the
horizon characterized by a stochastic exploration signal, whose variance is to
be designed. We aim to extend the well-established concepts of regret
minimization from linear to non-linear systems, with a focus on the subsequent
conceptual differences and challenges. Thus, under an idealized assumption on
an appropriately defined information function associated with the excitation,
we are able to show that an optimal exploration strategy is either to use no
exploration at all (called lazy exploration) or adding an exploration
excitation only at the first time instant of the horizon (called immediate
exploration). A quadratic numerical example is presented to demonstrate the
effectiveness of the proposed strategy.
| [
{
"version": "v1",
"created": "Fri, 22 Mar 2024 16:55:01 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 16:40:46 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Wang",
"Ying",
""
],
[
"Pasquini",
"Mirko",
""
],
[
"Colin",
"Kévin",
""
],
[
"Hjalmarsson",
"Håkan",
""
]
] |
2403.15365 | Yuepeng Hu | Yuepeng Hu, Zhengyuan Jiang, Moyang Guo, Neil Gong | A Transfer Attack to Image Watermarks | null | null | null | null | cs.CR cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Watermark has been widely deployed by industry to detect AI-generated images.
The robustness of such watermark-based detector against evasion attacks in the
white-box and black-box settings is well understood in the literature. However,
the robustness in the no-box setting is much less understood. In this work, we
propose a new transfer evasion attack to image watermark in the no-box setting.
Our transfer attack adds a perturbation to a watermarked image to evade
multiple surrogate watermarking models trained by the attacker itself, and the
perturbed watermarked image also evades the target watermarking model. Our
major contribution is to show that, both theoretically and empirically,
watermark-based AI-generated image detector is not robust to evasion attacks
even if the attacker does not have access to the watermarking model nor the
detection API.
| [
{
"version": "v1",
"created": "Fri, 22 Mar 2024 17:33:11 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Mar 2024 03:06:08 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 17:49:05 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Hu",
"Yuepeng",
""
],
[
"Jiang",
"Zhengyuan",
""
],
[
"Guo",
"Moyang",
""
],
[
"Gong",
"Neil",
""
]
] |
2403.15672 | Hongying Dong | Hongying Dong (1), Yizhe Zhang (1), Hyeonmin Lee (1), Shumon Huque
(2), Yixin Sun (1) ((1) University of Virginia, (2) Salesforce) | Exploring the Ecosystem of DNS HTTPS Resource Records: An End-to-End
Perspective | To appear in ACM Internet Measurement Conference 2024. 18 pages, 14
figures | null | 10.1145/3646547.3688410 | null | cs.NI | http://creativecommons.org/licenses/by/4.0/ | The DNS HTTPS resource record is a new DNS record type designed for the
delivery of configuration information and parameters required to initiate
connections to HTTPS network services. In addition, it is a key enabler for TLS
Encrypted ClientHello (ECH) by providing the cryptographic keying material
needed to encrypt the initial exchange. To understand the adoption of this new
DNS HTTPS record, we perform a longitudinal study on the server-side deployment
of DNS HTTPS for Tranco top million domains, as well as an analysis of the
client-side support for DNS HTTPS through snapshots from major browsers. To the
best of our knowledge, our work is the first longitudinal study on DNS HTTPS
server deployment, and the first known study on client-side support for DNS
HTTPS. Despite the rapidly growing trend of DNS HTTPS adoption, our study
highlights challenges and concerns in the deployment by both servers and
clients, such as the complexity in properly maintaining HTTPS records and
connection failure in browsers when the HTTPS record is not properly
configured.
| [
{
"version": "v1",
"created": "Sat, 23 Mar 2024 01:40:04 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2024 19:33:11 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Dong",
"Hongying",
"",
"University of Virginia"
],
[
"Zhang",
"Yizhe",
"",
"University of Virginia"
],
[
"Lee",
"Hyeonmin",
"",
"University of Virginia"
],
[
"Huque",
"Shumon",
"",
"Salesforce"
],
[
"Sun",
"Yixin",
"",
"University of Virginia"
]
] |
2403.15819 | Giacomo Gradenigo | Jacopo Niedda, Tommaso Tonolo, Giacomo Gradenigo | Probing marginal stability in the spherical $p=2$ model | 18 pages, 6 figures | null | null | null | cond-mat.dis-nn cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate the marginally stable nature of the
low-temperature trivial spin glass phase in the spherical $p=2$ spin glass, by
perturbing the system with three different kinds of non-linear interactions. In
particular, we compare the effect of three additional dense four-body
interactions: ferromagnetic couplings, purely disordered couplings and
couplings with competing disordered and ferromagnetic interactions. Our study,
characterized by the effort to present in a clear and pedagogical way the
derivation of all the results, shows that the marginal stability property of
the spherical spin glass depends in fact on which kind of perturbation is
applied to the system: in general, a certain degree of frustration is needed
also in the additional terms in order to induce a transition from a trivial to
a non-trivial spin-glass phase. On the contrary, the addition of generic
non-frustrated interactions does not destabilize the trivial spin-glass phase.
| [
{
"version": "v1",
"created": "Sat, 23 Mar 2024 12:16:04 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 17:25:35 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Niedda",
"Jacopo",
""
],
[
"Tonolo",
"Tommaso",
""
],
[
"Gradenigo",
"Giacomo",
""
]
] |
2403.15913 | Fran\c{c}ois Pacaud | Fran\c{c}ois Pacaud and Sungho Shin | GPU-accelerated dynamic nonlinear optimization with ExaModels and MadNLP | 6 pages, 1 figure, 2 tables | null | null | null | math.OC | http://creativecommons.org/licenses/by/4.0/ | We investigate the potential of Graphics Processing Units (GPUs) to solve
large-scale nonlinear programs with a dynamic structure. Using ExaModels, a
GPU-accelerated automatic differentiation tool, and the interior-point solver
MadNLP, we significantly reduce the time to solve dynamic nonlinear
optimization problems. The sparse linear systems formulated in the
interior-point method is solved on the GPU using a hybrid solver combining an
iterative method with a sparse Cholesky factorization, which harness the newly
released NVIDIA cuDSS solver. Our results on the classical distillation column
instance show that despite a significant pre-processing time, the hybrid solver
allows to reduce the time per iteration by a factor of 25 for the largest
instance.
| [
{
"version": "v1",
"created": "Sat, 23 Mar 2024 18:59:55 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 09:19:55 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Pacaud",
"François",
""
],
[
"Shin",
"Sungho",
""
]
] |
2403.18003 | Ian Lewis | Samuel D. Lane, Ian M. Lewis, Matthew Sullivan | Resonant Multi-Scalar Production in the Generic Complex Singlet Model in
the Multi-TeV Region | v2: matches version accepted by PRD, typos fixed, references added,
discussion expanded, results unchanged, 28 pgs+21 pgs of appendices and
references, 9 figures; v1: 27 pages+20 pages of appendices and references, 9
figures | Phys.Rev.D 110 (2024) 5, 055017 | 10.1103/PhysRevD.110.055017 | null | hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop benchmarks for resonant di-scalar production in the generic
complex singlet scalar extension of the Standard Model (SM), which contains two
new scalars. These benchmarks maximize di-scalar resonant production:
$pp\rightarrow h_2 \rightarrow h_1 h_1/h_1h_3/h_3h_3$, where $h_1$ is the
observed SM-like Higgs boson and $h_{2,3}$ are new scalars. The decays
$h_2\rightarrow h_1h_3$ and $h_2\rightarrow h_3h_3$ may be the only way to
discover $h_3$, leading to a discovery of two new scalars at once. Current LHC
and projected future collider (HL-LHC, FCC-ee, ILC500) constraints are used to
produce benchmarks at the HL-LHC for $h_2$ masses between 250 GeV and 1 TeV and
a future $pp$ collider for $h_2$ masses between 250 GeV and 12 TeV. We update
the current LHC bounds on the singlet-Higgs boson mixing angle. As the mass of
$h_2$ increases, certain limiting behaviors of the maximum rates are uncovered
due to theoretical constraints on the parameters. These limits, which can be
derived analytically, are ${\rm BR}(h_2\rightarrow h_1h_1)\rightarrow 0.25$,
${\rm BR}(h_2\rightarrow h_3h_3)\rightarrow 0.5$, and ${\rm BR}(h_2\rightarrow
h_1h_3) \rightarrow 0$. It can also be shown that the maximum rates of
$pp\rightarrow h_2\rightarrow h_1h_1/h_3h_3$ approach the same value. Hence,
all three $h_2\rightarrow h_ih_j$ decays are promising discovery modes for
$h_2$ masses below $\mathcal{O}(1\,{\rm TeV})$, while above
$\mathcal{O}(1\,{\rm TeV})$ the decays $h_2\rightarrow h_1h_1/h_3h_3$ are more
encouraging. Masses for $h_3$ are chosen to produce a large range of signatures
including multi-b, multi-vector boson, and multi-$h_1$ production. The behavior
of the maximum rates imply that in the multi-TeV region this model may be
discovered in the Higgs quartet production mode before Higgs triple production
is observed. The maximum di- and four Higgs production rates are similar in the
multi-TeV range.
| [
{
"version": "v1",
"created": "Tue, 26 Mar 2024 18:00:00 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Sep 2024 22:59:57 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Lane",
"Samuel D.",
""
],
[
"Lewis",
"Ian M.",
""
],
[
"Sullivan",
"Matthew",
""
]
] |
2403.18209 | Xuemin Hu | Xuemin Hu, Pan Chen, Yijun Wen, Bo Tang, Long Chen | Long and Short-Term Constraints Driven Safe Reinforcement Learning for
Autonomous Driving | null | null | null | null | cs.LG cs.AI cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reinforcement learning (RL) has been widely used in decision-making and
control tasks, but the risk is very high for the agent in the training process
due to the requirements of interaction with the environment, which seriously
limits its industrial applications such as autonomous driving systems. Safe RL
methods are developed to handle this issue by constraining the expected safety
violation costs as a training objective, but the occurring probability of an
unsafe state is still high, which is unacceptable in autonomous driving tasks.
Moreover, these methods are difficult to achieve a balance between the cost and
return expectations, which leads to learning performance degradation for the
algorithms. In this paper, we propose a novel algorithm based on the long and
short-term constraints (LSTC) for safe RL. The short-term constraint aims to
enhance the short-term state safety that the vehicle explores, while the
long-term constraint enhances the overall safety of the vehicle throughout the
decision-making process, both of which are jointly used to enhance the vehicle
safety in the training process. In addition, we develop a safe RL method with
dual-constraint optimization based on the Lagrange multiplier to optimize the
training process for end-to-end autonomous driving. Comprehensive experiments
were conducted on the MetaDrive simulator. Experimental results demonstrate
that the proposed method achieves higher safety in continuous state and action
tasks, and exhibits higher exploration performance in long-distance
decision-making tasks compared with state-of-the-art methods.
| [
{
"version": "v1",
"created": "Wed, 27 Mar 2024 02:41:52 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 12:59:19 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Hu",
"Xuemin",
""
],
[
"Chen",
"Pan",
""
],
[
"Wen",
"Yijun",
""
],
[
"Tang",
"Bo",
""
],
[
"Chen",
"Long",
""
]
] |
2403.18761 | Ningna Wang | Ningna Wang, Hui Huang, Shibo Song, Bin Wang, Wenping Wang, Xiaohu Guo | MATTopo: Topology-preserving Medial Axis Transform with Restricted Power
Diagram | null | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel topology-preserving 3D medial axis computation framework
based on volumetric restricted power diagram (RPD), while preserving the medial
features and geometric convergence simultaneously, for both 3D CAD and organic
shapes. The volumetric RPD discretizes the input 3D volume into sub-regions
given a set of medial spheres. With this intermediate structure, we convert the
homotopy equivalency between the generated medial mesh and the input 3D shape
into a localized contractibility checking for each restricted element (power
cell, power face, power edge), by checking their connected components and Euler
characteristics. We further propose a fractional Euler characteristic algorithm
for efficient GPU-based computation of Euler characteristic for each restricted
element on the fly while computing the volumetric RPD. Compared with existing
voxel-based or point-cloud-based methods, our approach is the first to
adaptively and directly revise the medial mesh without globally modifying the
dependent structure, such as voxel size or sampling density, while preserving
its topology and medial features. In comparison with the feature preservation
method MATFP, our method provides geometrically comparable results with fewer
spheres and more robustly captures the topology of the input 3D shape.
| [
{
"version": "v1",
"created": "Wed, 27 Mar 2024 16:59:21 GMT"
},
{
"version": "v2",
"created": "Tue, 21 May 2024 22:18:45 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 14:52:48 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Wang",
"Ningna",
""
],
[
"Huang",
"Hui",
""
],
[
"Song",
"Shibo",
""
],
[
"Wang",
"Bin",
""
],
[
"Wang",
"Wenping",
""
],
[
"Guo",
"Xiaohu",
""
]
] |
2403.19512 | Matthias Deiml | Matthias Deiml, Daniel Peterseim | Quantum Realization of the Finite Element Method | Updated version contains experiments on real quantum hardware | null | null | null | quant-ph cs.DS cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a quantum algorithm for the solution of prototypical
second-order linear elliptic partial differential equations discretized by
$d$-linear finite elements on Cartesian grids of a bounded $d$-dimensional
domain. An essential step in the construction is a BPX preconditioner, which
transforms the linear system into a sufficiently well-conditioned one, making
it amenable to quantum computation. We provide a constructive proof
demonstrating that, for any fixed dimension, our quantum algorithm can compute
suitable functionals of the solution to a given tolerance $\mathtt{tol}$ with
an optimal complexity of order $\mathtt{tol}^{-1}$ up to logarithmic terms,
significantly improving over existing approaches. Notably, this approach does
not rely on regularity of the solution and achieves quantum advantage over
classical solvers in two dimensions, whereas prior quantum methods required at
least four dimensions for asymptotic benefits. We further detail the design and
implementation of a quantum circuit capable of executing our algorithm, present
simulator results, and report numerical experiments on current quantum
hardware, confirming the feasibility of preconditioned finite element methods
for near-term quantum computing.
| [
{
"version": "v1",
"created": "Thu, 28 Mar 2024 15:44:20 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 12:34:10 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Deiml",
"Matthias",
""
],
[
"Peterseim",
"Daniel",
""
]
] |
2403.19834 | Wenbin Wang | Wenbin Wang, Zhiyu He, Giuseppe Belgioioso, Saverio Bolognani, Florian
D\"orfler | Online Feedback Optimization over Networks: A Distributed Model-free
Approach | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online feedback optimization (OFO) enables optimal steady-state operations of
a physical system by employing an iterative optimization algorithm as a dynamic
feedback controller. When the plant consists of several interconnected
sub-systems, centralized implementations become impractical due to the heavy
computational burden and the need to pre-compute system-wide sensitivities,
which may not be easily accessible in practice. Motivated by these challenges,
we develop a fully distributed model-free OFO controller, featuring
consensus-based tracking of the global objective value and local iterative
(projected) updates that use stochastic gradient estimates. We characterize how
the closed-loop performance depends on the size of the network, the number of
iterations, and the level of accuracy of consensus. Numerical simulations on a
voltage control problem in a direct current power grid corroborate the
theoretical findings.
| [
{
"version": "v1",
"created": "Thu, 28 Mar 2024 21:07:27 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 12:03:58 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Wang",
"Wenbin",
""
],
[
"He",
"Zhiyu",
""
],
[
"Belgioioso",
"Giuseppe",
""
],
[
"Bolognani",
"Saverio",
""
],
[
"Dörfler",
"Florian",
""
]
] |
2403.20036 | Andrey Katanin Dr. Prof. | T. B. Mazitov, A. A. Katanin | Local magnetic moment formation and Kondo screening in the presence of
Hund exchange: the two-band Hubbard model analysis | 12 pages, 14+1 figures | Phys. Rev. B 110, 075160 (2024) | 10.1103/PhysRevB.110.075160 | null | cond-mat.str-el | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We study formation and screening of local magnetic moments in the two-band
Hubbard model in the presence of Hund exchange interaction using dynamic mean
field theory approach. The characteristic temperatures of the formation,
beginning and full screening of local magnetic moments are obtained from the
analysis of temperature dependencies of the orbital, charge, and spin
susceptibilities, as well as the respective instantaneous correlation
functions. At half filling we find the phase diagram, which is similar to the
single-orbital case with wide region of formation of local magnetic moments
below the orbital Kondo temperature. Similarly to the single-orbital case, with
decreasing temperature the screening of local magnetic moments is preceded by
appearance of fermionic quasiparticles. In the two-band case the quasiparticles
are however present also in some temperature region above the Mott insulating
phase. At finite doping we find broad regime of presence of local magnetic
moments, which coexist with incoherently or coherently moving holes. We also
find, similarly to the half filled case, finite temperature interval in the
doped regime, when the fermionic quasiparticles are formed, but do not yet
screen local magnetic moments.
| [
{
"version": "v1",
"created": "Fri, 29 Mar 2024 08:08:19 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 06:15:57 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Mazitov",
"T. B.",
""
],
[
"Katanin",
"A. A.",
""
]
] |
2404.00111 | Zhuojun Yu | Zhuojun Yu and Peter J. Thomas | Variational design of sensory feedback for powerstroke-recovery systems | 48 pages, 17 figures, 3 tables | Biological Cybernetics (2024): 1-33 | 10.1007/s00422-024-00996-x | null | q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the raison d'etre of the brain is the survival of the body, there
are relatively few theoretical studies of closed-loop rhythmic motor control
systems. In this paper we provide a unified framework, based on variational
analysis, for investigating the dual goals of performance and robustness in
powerstroke-recovery systems. We augment two previously published closed-loop
motor control models by equipping each model with a performance measure based
on the rate of progress of the system relative to a spatially extended external
substrate -- such as progress relative to the ground for a locomotor task. The
sensitivity measure quantifies the ability of the system to maintain
performance in response to external perturbations. Motivated by a search for
optimal design principles for feedback control achieving the complementary
requirements of efficiency and robustness, we discuss the
performance-sensitivity patterns of the systems featuring different sensory
feedback architectures. In a paradigmatic half-center oscillator (HCO)-motor
system, we observe that the excitation-inhibition property of feedback
mechanisms determines the sensitivity pattern while the activation-inactivation
property determines the performance pattern. Moreover, we show that the
nonlinearity of the sigmoid activation of feedback signals allows the existence
of optimal combinations of performance and sensitivity. In a detailed hindlimb
locomotor system, we find that a force-dependent feedback can simultaneously
optimize both performance and robustness, while length-dependent feedback
variations result in significant performance-versus-sensitivity tradeoffs.
Thus, this work provides an analytical framework for studying feedback control
of oscillations in nonlinear dynamical systems, leading to several insights
that have the potential to inform the design of control or rehabilitation
systems.
| [
{
"version": "v1",
"created": "Fri, 29 Mar 2024 18:56:16 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Yu",
"Zhuojun",
""
],
[
"Thomas",
"Peter J.",
""
]
] |
2404.00201 | Daniel Ferlewicz | Belle Collaboration: D. Ferlewicz, P. Urquijo, I. Adachi, K. Adamczyk,
H. Aihara, D. M. Asner, H. Atmacan, R. Ayad, V. Babu, Sw. Banerjee, P.
Behera, K. Belous, J. Bennett, M. Bessner, V. Bhardwaj, B. Bhuyan, T. Bilka,
D. Biswas, D. Bodrov, M. Bra\v{c}ko, P. Branchini, T. E. Browder, A. Budano,
M. Campajola, L. Cao, D. \v{C}ervenkov, M.-C. Chang, B. G. Cheon, K.
Chilikin, H. E. Cho, K. Cho, S.-K. Choi, Y. Choi, S. Choudhury, S. Das, N.
Dash, G. de Marino, G. De Pietro, R. Dhamija, F. Di Capua, J. Dingfelder, Z.
Dole\v{z}al, T. V. Dong, S. Dubey, P. Ecker, D. Epifanov, T. Ferber, B. G.
Fulsom, V. Gaur, A. Garmash, A. Giri, P. Goldenzweig, E. Graziani, T. Gu, Y.
Guan, K. Gudkova, C. Hadjivasiliou, T. Hara, K. Hayasaka, H. Hayashii, S.
Hazra, M. T. Hedges, D. Herrmann, W.-S. Hou, C.-L. Hsu, T. Iijima, A.
Ishikawa, R. Itoh, M. Iwasaki, W. W. Jacobs, S. Jia, Y. Jin, A. B. Kaliyar,
C. Kiesling, C. H. Kim, D. Y. Kim, K.-H. Kim, Y.-K. Kim, K. Kinoshita, P.
Kody\v{s}, T. Konno, A. Korobov, S. Korpar, E. Kou, E. Kovalenko, P.
Kri\v{z}an, P. Krokovny, T. Kuhr, R. Kumar, K. Kumara, A. Kuzmin, Y.-J. Kwon,
Y.-T. Lai, T. Lam, S. C. Lee, D. Levit, P. Lewis, L. K. Li, Y. B. Li, L. Li
Gioi, J. Libby, D. Liventsev, Y. Ma, D. Matvienko, F. Meier, M. Merola, F.
Metzner, K. Miyabayashi, R. Mizuk, G. B. Mohanty, I. Nakamura, M. Nakao, A.
Natochii, L. Nayak, S. Nishida, S. Ogawa, H. Ono, S. Pardi, J. Park, A.
Passeri, S. Patra, S. Paul, T. K. Pedlar, R. Pestotnik, L. E. Piilonen, T.
Podobnik, E. Prencipe, M. T. Prim, N. Rout, G. Russo, S. Sandilya, V.
Savinov, G. Schnell, C. Schwanda, Y. Seino, K. Senyo, M. E. Sevior, W. Shan,
C. Sharma, J.-G. Shiu, B. Shwartz, E. Solovieva, M. Stari\v{c}, M. Sumihama,
M. Takizawa, U. Tamponi, K. Tanida, F. Tenchini, M. Uchida, Y. Unno, S. Uno,
Y. Ushiroda, S. E. Vahsen, K. E. Varvell, E. Wang, M.-Z. Wang, S. Watanuki,
E. Won, B. D. Yabsley, W. Yan, S. B. Yang, J. Yelton, J. H. Yin, C. Z. Yuan,
L. Yuan, Y. Yusa, Z. P. Zhang, V. Zhilich, V. Zhukova | Angular analysis of $B \to K^* e^+ e^-$ in the low-$q^2$ region with new
electron identification at Belle | Accepted by PRD | null | null | Belle preprint 2023-20, KEK preprint 2023-38 | hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perform an angular analysis of the $B\to K^* e^+ e^-$ decay for the
dielectron mass squared, $q^2$, range of $0.0008$ to $1.1200 ~\text{GeV}^2
/c^4$ using the full Belle data set in the $K^{*0} \to K^+ \pi^-$ and $K^{*+}
\to K_S^0 \pi^+$ channels, incorporating new methods of electron identification
to improve the statistical power of the data set. This analysis is sensitive to
contributions from right-handed currents from physics beyond the Standard Model
by constraining the Wilson coefficients $\mathcal{C}_7^{(\prime)}$. We perform
a fit to the $B\to K^* e^+ e^-$ differential decay rate and measure the
imaginary component of the transversality amplitude to be $A_T^{\rm Im} = -1.27
\pm 0.52 \pm 0.12$, and the $K^*$ transverse asymmetry to be $A_T^{(2)} = 0.52
\pm 0.53 \pm 0.11$, with $F_L$ and $A_T^{\rm Re}$ fixed to the Standard Model
values. The resulting constraints on the value of $\mathcal{C}_7^{\prime}$ are
consistent with the Standard Model within a $2\sigma$ confidence interval.
| [
{
"version": "v1",
"created": "Sat, 30 Mar 2024 00:19:20 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Apr 2024 01:32:08 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Sep 2024 01:13:27 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Belle Collaboration",
"",
""
],
[
"Ferlewicz",
"D.",
""
],
[
"Urquijo",
"P.",
""
],
[
"Adachi",
"I.",
""
],
[
"Adamczyk",
"K.",
""
],
[
"Aihara",
"H.",
""
],
[
"Asner",
"D. M.",
""
],
[
"Atmacan",
"H.",
""
],
[
"Ayad",
"R.",
""
],
[
"Babu",
"V.",
""
],
[
"Banerjee",
"Sw.",
""
],
[
"Behera",
"P.",
""
],
[
"Belous",
"K.",
""
],
[
"Bennett",
"J.",
""
],
[
"Bessner",
"M.",
""
],
[
"Bhardwaj",
"V.",
""
],
[
"Bhuyan",
"B.",
""
],
[
"Bilka",
"T.",
""
],
[
"Biswas",
"D.",
""
],
[
"Bodrov",
"D.",
""
],
[
"Bračko",
"M.",
""
],
[
"Branchini",
"P.",
""
],
[
"Browder",
"T. E.",
""
],
[
"Budano",
"A.",
""
],
[
"Campajola",
"M.",
""
],
[
"Cao",
"L.",
""
],
[
"Červenkov",
"D.",
""
],
[
"Chang",
"M. -C.",
""
],
[
"Cheon",
"B. G.",
""
],
[
"Chilikin",
"K.",
""
],
[
"Cho",
"H. E.",
""
],
[
"Cho",
"K.",
""
],
[
"Choi",
"S. -K.",
""
],
[
"Choi",
"Y.",
""
],
[
"Choudhury",
"S.",
""
],
[
"Das",
"S.",
""
],
[
"Dash",
"N.",
""
],
[
"de Marino",
"G.",
""
],
[
"De Pietro",
"G.",
""
],
[
"Dhamija",
"R.",
""
],
[
"Di Capua",
"F.",
""
],
[
"Dingfelder",
"J.",
""
],
[
"Doležal",
"Z.",
""
],
[
"Dong",
"T. V.",
""
],
[
"Dubey",
"S.",
""
],
[
"Ecker",
"P.",
""
],
[
"Epifanov",
"D.",
""
],
[
"Ferber",
"T.",
""
],
[
"Fulsom",
"B. G.",
""
],
[
"Gaur",
"V.",
""
],
[
"Garmash",
"A.",
""
],
[
"Giri",
"A.",
""
],
[
"Goldenzweig",
"P.",
""
],
[
"Graziani",
"E.",
""
],
[
"Gu",
"T.",
""
],
[
"Guan",
"Y.",
""
],
[
"Gudkova",
"K.",
""
],
[
"Hadjivasiliou",
"C.",
""
],
[
"Hara",
"T.",
""
],
[
"Hayasaka",
"K.",
""
],
[
"Hayashii",
"H.",
""
],
[
"Hazra",
"S.",
""
],
[
"Hedges",
"M. T.",
""
],
[
"Herrmann",
"D.",
""
],
[
"Hou",
"W. -S.",
""
],
[
"Hsu",
"C. -L.",
""
],
[
"Iijima",
"T.",
""
],
[
"Ishikawa",
"A.",
""
],
[
"Itoh",
"R.",
""
],
[
"Iwasaki",
"M.",
""
],
[
"Jacobs",
"W. W.",
""
],
[
"Jia",
"S.",
""
],
[
"Jin",
"Y.",
""
],
[
"Kaliyar",
"A. B.",
""
],
[
"Kiesling",
"C.",
""
],
[
"Kim",
"C. H.",
""
],
[
"Kim",
"D. Y.",
""
],
[
"Kim",
"K. -H.",
""
],
[
"Kim",
"Y. -K.",
""
],
[
"Kinoshita",
"K.",
""
],
[
"Kodyš",
"P.",
""
],
[
"Konno",
"T.",
""
],
[
"Korobov",
"A.",
""
],
[
"Korpar",
"S.",
""
],
[
"Kou",
"E.",
""
],
[
"Kovalenko",
"E.",
""
],
[
"Križan",
"P.",
""
],
[
"Krokovny",
"P.",
""
],
[
"Kuhr",
"T.",
""
],
[
"Kumar",
"R.",
""
],
[
"Kumara",
"K.",
""
],
[
"Kuzmin",
"A.",
""
],
[
"Kwon",
"Y. -J.",
""
],
[
"Lai",
"Y. -T.",
""
],
[
"Lam",
"T.",
""
],
[
"Lee",
"S. C.",
""
],
[
"Levit",
"D.",
""
],
[
"Lewis",
"P.",
""
],
[
"Li",
"L. K.",
""
],
[
"Li",
"Y. B.",
""
],
[
"Gioi",
"L. Li",
""
],
[
"Libby",
"J.",
""
],
[
"Liventsev",
"D.",
""
],
[
"Ma",
"Y.",
""
],
[
"Matvienko",
"D.",
""
],
[
"Meier",
"F.",
""
],
[
"Merola",
"M.",
""
],
[
"Metzner",
"F.",
""
],
[
"Miyabayashi",
"K.",
""
],
[
"Mizuk",
"R.",
""
],
[
"Mohanty",
"G. B.",
""
],
[
"Nakamura",
"I.",
""
],
[
"Nakao",
"M.",
""
],
[
"Natochii",
"A.",
""
],
[
"Nayak",
"L.",
""
],
[
"Nishida",
"S.",
""
],
[
"Ogawa",
"S.",
""
],
[
"Ono",
"H.",
""
],
[
"Pardi",
"S.",
""
],
[
"Park",
"J.",
""
],
[
"Passeri",
"A.",
""
],
[
"Patra",
"S.",
""
],
[
"Paul",
"S.",
""
],
[
"Pedlar",
"T. K.",
""
],
[
"Pestotnik",
"R.",
""
],
[
"Piilonen",
"L. E.",
""
],
[
"Podobnik",
"T.",
""
],
[
"Prencipe",
"E.",
""
],
[
"Prim",
"M. T.",
""
],
[
"Rout",
"N.",
""
],
[
"Russo",
"G.",
""
],
[
"Sandilya",
"S.",
""
],
[
"Savinov",
"V.",
""
],
[
"Schnell",
"G.",
""
],
[
"Schwanda",
"C.",
""
],
[
"Seino",
"Y.",
""
],
[
"Senyo",
"K.",
""
],
[
"Sevior",
"M. E.",
""
],
[
"Shan",
"W.",
""
],
[
"Sharma",
"C.",
""
],
[
"Shiu",
"J. -G.",
""
],
[
"Shwartz",
"B.",
""
],
[
"Solovieva",
"E.",
""
],
[
"Starič",
"M.",
""
],
[
"Sumihama",
"M.",
""
],
[
"Takizawa",
"M.",
""
],
[
"Tamponi",
"U.",
""
],
[
"Tanida",
"K.",
""
],
[
"Tenchini",
"F.",
""
],
[
"Uchida",
"M.",
""
],
[
"Unno",
"Y.",
""
],
[
"Uno",
"S.",
""
],
[
"Ushiroda",
"Y.",
""
],
[
"Vahsen",
"S. E.",
""
],
[
"Varvell",
"K. E.",
""
],
[
"Wang",
"E.",
""
],
[
"Wang",
"M. -Z.",
""
],
[
"Watanuki",
"S.",
""
],
[
"Won",
"E.",
""
],
[
"Yabsley",
"B. D.",
""
],
[
"Yan",
"W.",
""
],
[
"Yang",
"S. B.",
""
],
[
"Yelton",
"J.",
""
],
[
"Yin",
"J. H.",
""
],
[
"Yuan",
"C. Z.",
""
],
[
"Yuan",
"L.",
""
],
[
"Yusa",
"Y.",
""
],
[
"Zhang",
"Z. P.",
""
],
[
"Zhilich",
"V.",
""
],
[
"Zhukova",
"V.",
""
]
] |
2404.01055 | Javier Romero | Javier Romero-Alvarez, Jaime Alvarado-Valiente, Jorge Casco-Seco,
Enrique Moguel, Jose Garcia-Alonso, Javier Berrocal, Juan M. Murillo | Quantum circuit scheduler for QPUs usage optimization | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Progress in the realm of quantum technologies is paving the way for a
multitude of potential applications across different sectors. However, the
reduced number of available quantum computers, their technical limitations and
the high demand for their use are posing some problems for developers and
researchers. Mainly, users trying to execute quantum circuits on these devices
are usually facing long waiting times in the tasks queues. In this context,
this work propose a technique to reduce waiting times and optimize quantum
computers usage by scheduling circuits from different users into combined
circuits that are executed at the same time. To validate this proposal,
different widely known quantum algorithms have been selected and executed in
combined circuits. The obtained results are then compared with the results of
executing the same algorithms in an isolated way. This allowed us to measure
the impact of the use of the scheduler. Among the obtained results, it has been
possible to verify that the noise suffered by executing a combination of
circuits through the proposed scheduler does not critically affect the
outcomes.
| [
{
"version": "v1",
"created": "Mon, 1 Apr 2024 11:34:26 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 08:42:04 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Romero-Alvarez",
"Javier",
""
],
[
"Alvarado-Valiente",
"Jaime",
""
],
[
"Casco-Seco",
"Jorge",
""
],
[
"Moguel",
"Enrique",
""
],
[
"Garcia-Alonso",
"Jose",
""
],
[
"Berrocal",
"Javier",
""
],
[
"Murillo",
"Juan M.",
""
]
] |
2404.01387 | Ezequiel Alvarez | Ezequiel Alvarez and Yuling Yao | Inferring flavor mixtures in multijet events | 23 pages, 13 figures. Response to Referees in journal
https://scipost.org/submission/2404.01387v2/. No change in reasoning nor
conclusion, but a new section comparing new method to usual methods,
including a ROC curve comparison, has been added. Also a more realistic case
with 1% signal is shown | null | null | null | hep-ph hep-ex stat.AP | http://creativecommons.org/licenses/by/4.0/ | Multijet events with heavy-flavors are of central importance at the LHC since
many relevant processes -- such as $t\bar t$, $hh$, $t\bar t h$ and others --
have a preferred branching ratio for this final state. Current techniques for
tackling these processes use hard-assignment selections through $b$-tagging
working points, and suffer from systematic uncertainties because of the
difficulties in Monte Carlo simulations. We develop a flexible Bayesian mixture
model approach to simultaneously infer $b$-tagging score distributions and the
flavor mixture composition in the dataset. We model multidimensional jet
events, and to enhance estimation efficiency, we design structured priors that
leverages the continuity and unimodality of the $b$-tagging score
distributions. Remarkably, our method eliminates the need for a parametric
assumption and is robust against model misspecification -- It works for
arbitrarily flexible continuous curves and is better if they are unimodal. We
have run a toy inferential process with signal $bbbb$ and backgrounds $bbcc$
and $cccc$, and we find that with a few hundred events we can recover the true
mixture fractions of the signal and backgrounds, as well as the true
$b$-tagging score distribution curves, despite their arbitrariness and
nonparametric shapes. We discuss prospects for taking these findings into a
realistic scenario in a physics analysis. The presented results could be a
starting point for a different and novel kind of analysis in multijet events,
with a scope competitive with current state-of-the-art analyses. We also
discuss the possibility of using these results in general cases of signals and
backgrounds with approximately known continuous distributions and/or expected
unimodality.
| [
{
"version": "v1",
"created": "Mon, 1 Apr 2024 18:00:12 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Apr 2024 09:13:12 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Sep 2024 19:58:00 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Alvarez",
"Ezequiel",
""
],
[
"Yao",
"Yuling",
""
]
] |
2404.02110 | William Giar\`e | William Giar\`e, Yuejia Zhai, Supriya Pan, Eleonora Di Valentino,
Rafael C. Nunes, Carsten van de Bruck | Tightening the reins on non-minimal dark sector physics: Interacting
Dark Energy with dynamical and non-dynamical equation of state | 21 pages, 4 figures, 9 tables. V2: additional references added,
clarified some aspects of the results, their interpretation, and
implications. Version accepted for publication in PRD | null | 10.1103/PhysRevD.110.063527 | null | astro-ph.CO hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a comprehensive reassessment of the state of Interacting Dark
Energy (IDE) cosmology, namely models featuring a non-gravitational interaction
between Dark Matter (DM) and Dark Energy (DE). To achieve high generality, we
extend the dark sector physics by considering two different scenarios: a
non-dynamical DE equation of state $w_0\neq-1$, and a dynamical
$w(a)=w_0+w_a(1-a)$. In both cases, we distinguish two different physical
regimes resulting from a phantom or quintessence equation of state. To
circumvent early-time superhorizon instabilities, the energy-momentum transfer
should occur in opposing directions within the two regimes, resulting in
distinct phenomenological outcomes. We study quintessence and phantom
non-dynamical and dynamical models in light of two independent Cosmic Microwave
Background (CMB) experiments - the Planck satellite and the Atacama Cosmology
Telescope. We analyze CMB data both independently and in combination with
Supernovae (SN) distance moduli measurements from the Pantheon-Plus catalog and
Baryon Acoustic Oscillations (BAO) from the SDSS-IV eBOSS survey. Our results
update and extend the state-of-the-art analyses, significantly narrowing the
parameter space allowed for these models and limiting their overall ability to
reconcile cosmological tensions. Although considering different combinations of
data leaves some freedom to increase $H_0$ towards the value measured by the
SH0ES collaboration, our most constraining dataset (CMB+BAO+SN) indicates that
fully reconciling the tension solely within the framework of IDE remains
challenging.
| [
{
"version": "v1",
"created": "Tue, 2 Apr 2024 17:10:47 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 15:41:56 GMT"
}
] | "2024-09-13T00:00:00" | [
[
"Giarè",
"William",
""
],
[
"Zhai",
"Yuejia",
""
],
[
"Pan",
"Supriya",
""
],
[
"Di Valentino",
"Eleonora",
""
],
[
"Nunes",
"Rafael C.",
""
],
[
"van de Bruck",
"Carsten",
""
]
] |