id
float64 2.21k
2.31k
| content
stringlengths 78
1.92k
⌀ | category
stringclasses 8
values |
---|---|---|
2,312.04942 | Steering is a type of nonseparable quantum correlation, where its inherent asymmetric feature makes it distinct from Bell-nonlocality and entanglement. In this paper, we investigate quantum steering in a two-mode Gaussian state $% \hat{\varrho}_{c_{1}c_{2}}$ coupled to a two-mode vacuum reservoir. The mode $c_{1}$($c_{2}$) is emitted during the first(second) transition of a nondegenerate three-level cascade laser. By means of the master equation of the state $\hat{\varrho}_{c_{1}c_{2}}$, we derive analytical expression of the steady-state covariance matrix of the modes $c_{1}$ and $c_{2}$. Using realistic experimental parameters, we show that the state $\hat{\varrho}% _{c_{1}c_{2}}$ can exhibit asymmetric steering. Furthermore, by an appropriate choice of the physical parameters of the state $\hat{\varrho}% _{c_{1}c_{2}}$, we show that one-way steering can be achieved. Essentially, we demonstrate that one-way steering can, in general, occur only from $% c_{1}\rightarrow c_{2}$. Besides, we perform a comparative study between the steering of the two laser modes and their Gaussian Rényi-2 entanglement. As results, we found that the entanglement and steering behave similarly in the same circumstances, i.e., both of them decay under dissipation effect, moreover, they can be well enhanced by inducing more and more quantum coherence in the state $\hat{\varrho}_{c_{1}c_{2}}$% . In particular, we found that the steering remains always less than the Gaussian Rényi-2 entanglement. | quant-ph |
2,312.03853 | This year, we witnessed a rise in the use of Large Language Models, especially when combined with applications like chatbot assistants. Safety mechanisms and specialized training procedures are put in place to prevent improper responses from these assistants. In this work, we bypass these measures for ChatGPT and Bard (and, to some extent, Bing chat) by making them impersonate complex personas with opposite characteristics as those of the truthful assistants they are supposed to be. We start by creating elaborate biographies of these personas, which we then use in a new session with the same chatbots. Our conversation followed a role-play style to get the response the assistant was not allowed to provide. By making use of personas, we show that the response that is prohibited is actually provided, making it possible to obtain unauthorized, illegal, or harmful information. This work shows that by using adversarial personas, one can overcome safety mechanisms set out by ChatGPT and Bard. It also introduces several ways of activating such adversarial personas, altogether showing that both chatbots are vulnerable to this kind of attack. | cs |
2,312.06039 | Variable curvature modeling tools provide an accurate means of controlling infinite degrees-of-freedom deformable bodies and structures. However, their forward and inverse Newton-Euler dynamics are fraught with high computational costs. Assuming piecewise constant strains across discretized Cosserat rods imposed on the soft material, a composite two time-scale singularly perturbed nonlinear backstepping control scheme is here introduced. This is to alleviate the long computational times of the recursive Newton-Euler dynamics for soft structures. Our contribution is three-pronged: (i) we decompose the system's Newton-Euler dynamics to a two coupled sub-dynamics by introducing a perturbation parameter; (ii) we then prescribe a set of stabilizing controllers for regulating each subsystem's dynamics; and (iii) we study the interconnected singularly perturbed system and analyze its stability. | eess |
2,312.04385 | Anisotropic low-resolution (LR) magnetic resonance (MR) images are fast to obtain but hinder automated processing. We propose to use denoising diffusion probabilistic models (DDPMs) to super-resolve these 2D-acquired LR MR slices. This paper introduces AniRes2D, a novel approach combining DDPM with a residual prediction for 2D super-resolution (SR). Results demonstrate that AniRes2D outperforms several other DDPM-based models in quantitative metrics, visual quality, and out-of-domain evaluation. We use a trained AniRes2D to super-resolve 3D volumes slice by slice, where comparative quantitative results and reduced skull aliasing are achieved compared to a recent state-of-the-art self-supervised 3D super-resolution method. Furthermore, we explored the use of noise conditioning augmentation (NCA) as an alternative augmentation technique for DDPM-based SR models, but it was found to reduce performance. Our findings contribute valuable insights to the application of DDPMs for SR of anisotropic MR images. | eess |
2,312.02885 | A line bundle is immaculate if its cohomology vanishes in every dimension. We give a criterion for when a smooth toric Deligne-Mumford stack has infinitely many immaculate line bundles. This answers positively a question of Borisov and Wang. | math |
2,312.04157 | Magnetic active regions on the Sun are harbingers of space weather events. Understanding the physics of how they form and evolve will improve space weather forecasting. Our aim is to characterise the surface magnetic field and flows for a sample of active regions with persistent magnetic bipoles prior to emergence. We identified 42 emerging active regions (EARs), in the Solar Dynamics Observatory Helioseismic Emerging Active Region survey (Schunker et al. 2016), associated with small magnetic bipoles at least one day before the time of emergence. We then identified a contrasting sample of 42 EARs that emerge more abruptly without bipoles before emergence. We computed the supergranulation scale surface flows using helioseismic holography. We averaged the flow maps and magnetic field maps over all active regions in each sample at each time interval from 2 days before emergence to 1 day after. We found that EARs associated with a persistent pre-emergence bipole evolve to be, on average, lower flux active regions than EARs that emerge more abruptly. Further, we found that the EARs that emerge more abruptly do so with a diverging flow of $(3\pm 0.6) \times 10^{-6}$ s$^{-1}$ on the order of 50-100 ms$^{-1}$. Our results suggest that there is a statistical dependence of the surface flow signature throughout the emergence process on the maximum magnetic flux of the active region. | astro-ph |
2,312.0348 | We present the Granular AMR Parsing Evaluation Suite (GrAPES), a challenge set for Abstract Meaning Representation (AMR) parsing with accompanying evaluation metrics. AMR parsers now obtain high scores on the standard AMR evaluation metric Smatch, close to or even above reported inter-annotator agreement. But that does not mean that AMR parsing is solved; in fact, human evaluation in previous work indicates that current parsers still quite frequently make errors on node labels or graph structure that substantially distort sentence meaning. Here, we provide an evaluation suite that tests AMR parsers on a range of phenomena of practical, technical, and linguistic interest. Our 36 categories range from seen and unseen labels, to structural generalization, to coreference. GrAPES reveals in depth the abilities and shortcomings of current AMR parsers. | cs |
2,312.06582 | Hosting capacity analysis is essential for effective integration of distributed energy resources into distribution systems. This paper discusses hosting capacity analysis with emphasis on various aspects affecting the process. This paper addresses key research gaps, aiming to improve the accuracy, scalability, and practicality of hosting capacity estimation. Standardized methodologies are highlighted as a need to ensure consistent hosting capacity estimation across distribution systems. Validation and benchmarking frameworks are emphasized for evaluating various estimation approaches. The potential of data-driven techniques, is also discussed for enhancing hosting capacity analysis. Real-time and dynamic estimation techniques which account for changing system conditions are explored, as well as the integration of hosting capacity analysis with distribution planning and operations. Uncertainty quantification and risk assessment in hosting capacity analysis are identified as crucial areas, advocating for probabilistic and stochastic modelling. This study also emphasizes the importance of considering multiple DER interactions and synergies in hosting capacity analysis, enabling a comprehensive understanding of system performance. This survey aims to serve as a valuable resource for researchers, practitioners, and policymakers, providing insights into advancements made and guiding future research efforts to address identified gaps. | eess |
2,312.02872 | In the context of autonomous driving, pedestrian crossing prediction is a key component for improving road safety. Presently, the focus of these predictions extends beyond achieving trustworthy results; it is shifting towards the explainability and interpretability of these predictions. This research introduces a novel neuro-symbolic approach that combines deep learning and fuzzy logic for an explainable and interpretable pedestrian crossing prediction. We have developed an explainable predictor (ExPedCross), which utilizes a set of explainable features and employs a fuzzy inference system to predict whether the pedestrian will cross or not. Our approach was evaluated on both the PIE and JAAD datasets. The results offer experimental insights into achieving explainability and interpretability in the pedestrian crossing prediction task. Furthermore, the testing results yield a set of guidelines and recommendations regarding the process of dataset selection, feature selection, and explainability. | cs |
2,312.03567 | Extractive question answering (QA) systems can enable physicians and researchers to query medical records, a foundational capability for designing clinical studies and understanding patient medical history. However, building these systems typically requires expert-annotated QA pairs. Large language models (LLMs), which can perform extractive QA, depend on high quality data in their prompts, specialized for the application domain. We introduce a novel approach, XAIQA, for generating synthetic QA pairs at scale from data naturally available in electronic health records. Our method uses the idea of a classification model explainer to generate questions and answers about medical concepts corresponding to medical codes. In an expert evaluation with two physicians, our method identifies $2.2\times$ more semantic matches and $3.8\times$ more clinical abbreviations than two popular approaches that use sentence transformers to create QA pairs. In an ML evaluation, adding our QA pairs improves performance of GPT-4 as an extractive QA model, including on difficult questions. In both the expert and ML evaluations, we examine trade-offs between our method and sentence transformers for QA pair generation depending on question difficulty. | cs |
2,312.03273 | We study the stability and sensitivity of an absorbing layer for the Boltzmann equation by examining the Bhatnagar-Gross-Krook (BGK) approximation and using the perfectly matched layer (PML) technique. To ensure stability, we discard some parameters in the model and calculate the total sensitivity indices of the remaining parameters using the ANOVA expansion of multivariate functions. We conduct extensive numerical experiments to study stability and compute the total sensitivity indices, which allow us to identify the essential parameters of the model. | cs |
2,312.06563 | Based on the success of a well-known method for solving higher order linear differential equations, a study of two of the most important mathematical features of that method, viz. the null spaces and commutativity of the product of unbounded linear operators on a Hilbert space is carried out. A principle is proved describing solutions for the product of such operators in terms of the solutions for each of the factors when the null spaces of those factors satisfy a certain geometric relation to one another. Another geometric principle equating commutativity of a closed densely defined operator and a projection to stability of the range of the projection under the closed operator is proved. | math |
2,312.03076 | We define the $\textit{marginal information}$ of a communication protocol, and use it to prove XOR lemmas for communication complexity. We show that if every $C$-bit protocol has bounded advantage for computing a Boolean function $f$, then every $\tilde \Omega(C \sqrt{n})$-bit protocol has advantage $\exp(-\Omega(n))$ for computing the $n$-fold xor $f^{\oplus n}$. We prove exponentially small bounds in the average case setting, and near optimal bounds for product distributions and for bounded-round protocols. | cs |
2,312.05536 | Motivated by Bresch, Desjardins, Gisclon and Sart (2008), in this paper, we study the influence of capillary number on an instability result related to the Navier-Stokes-Korteweg equations. Precisely, we investigate the instability of a steady-state profile with a heavier fluid lying above a lighter fluid, i.e., to study the Rayleigh-Taylor instability problem if the capillary number is below the critical value. After writing the nonlinear equations in a perturbed form, the first part is to provide a spectral analysis showing that, there exist possibly multiple normal modes to the linearized equations by following the operator method of Lafitte-Nguyen (2022). Hence, we construct a wide class of initial data for which the nonlinear perturbation problem departs from the equilibrium, based on the finding of possibly multiple normal modes. Using a refined framework of Guo-Strauss (1995), we prove the nonlinear instability. | math |
2,312.06626 | We consider a certain class of infinitary rules of inference, called here restriction rules, using of which allows to deduce complete theories of given models. Such rules generalizing the $\omega$-rule were first considered by Henkin. Later on Barwise showed that within countable languages, for any countable model $\mathfrak M$, first-order logic expanded by the corresponding $\mathfrak M$-rule deduces from the diagram of $\mathfrak M$ all formulas that are true in all models that include $\mathfrak M$, in particular, it deduces the (relativized) complete theory of $\mathfrak M$. We show that, if the aim is only deducing the complete theory of a given model, these countability assumptions can be omitted. Moreover, similar facts hold for infinitary and higher-order logics, even if these logics are highly incomplete. Finally, we show that Barwise's theorem in its stronger form, for vocabularies of arbitrary cardinality, holds for infinitary logics $\mathscr L_{\kappa,\lambda}$ whenever $\kappa$ is supercompact. The note also contains brief historical remarks. | math |
2,312.04383 | Free-electron radiation phenomena are treated almost exclusively with classical electrodynamics, despite the intrinsic interaction being that of quantum electrodynamics. The lack of quantumness arises from the vast disparity between the electron energy and the much smaller photon energy, creating a small cross-section that makes quantum effects negligible. Here we identify a fundamentally distinct phenomenon of electron radiation that bypasses this energy disparity, and thus displays extremely strong quantum features. This phenomenon arises from free-electron elastic recoil, which can influence fundamental radiation processes in ways thought so far to necessitate inelastic scattering. The underlying reason for the quantum radiation features, which have no counterparts in classical theory, is the entanglement between each elastically recoiled electron and the photons it emitted. We show that this phenomenon is more accessible than all other types of quantum features in free-electron radiation and can be detected in current experimental setups such as electron microscopes. These quantum radiation features could guide the development of compact coherent X-ray sources facilitated by nanophotonics and quantum optics. | quant-ph |
2,312.06347 | Octonions are 8-dimensional hypercomplex numbers which form the biggest normed division algebras over the real numbers. Motivated by applications in theoretical physics, continuous octonionic analysis has become an area of active research in recent year. Looking at possible practical applications, it is beneficial to work directly with discrete structures, rather than approximate continuous objects. Therefore, in previous papers, we have proposed some ideas towards the discrete octonionic analysis. It is well known, that there are several possibilities to discretise the continuous setting, and the Weyl calculus approach, which is typically used in the discrete Clifford analysis, to octonions has not been studied yet. Therefore, in this paper, we close this gap by presenting the discretisation of octonionic analysis based on the Weyl calculus. | math |
2,312.02362 | Point clouds offer an attractive source of information to complement images in neural scene representations, especially when few images are available. Neural rendering methods based on point clouds do exist, but they do not perform well when the point cloud quality is low -- e.g., sparse or incomplete, which is often the case with real-world data. We overcome these problems with a simple representation that aggregates point clouds at multiple scale levels with sparse voxel grids at different resolutions. To deal with point cloud sparsity, we average across multiple scale levels -- but only among those that are valid, i.e., that have enough neighboring points in proximity to the ray of a pixel. To help model areas without points, we add a global voxel at the coarsest scale, thus unifying "classical" and point-based NeRF formulations. We validate our method on the NeRF Synthetic, ScanNet, and KITTI-360 datasets, outperforming the state of the art by a significant margin. | cs |
2,312.04123 | The graph edit distance is used for comparing graphs in various domains. Due to its high computational complexity it is primarily approximated. Widely-used heuristics search for an optimal assignment of vertices based on the distance between local substructures. While faster ones only consider vertices and their incident edges, leading to poor accuracy, other approaches require computationally intense exact distance computations between subgraphs. Our new method abstracts local substructures to neighborhood trees and compares them using efficient tree matching techniques. This results in a ground distance for mapping vertices that yields high quality approximations of the graph edit distance. By limiting the maximum tree height, our method supports steering between more accurate results and faster execution. We thoroughly analyze the running time of the tree matching method and propose several techniques to accelerate computation in practice. We use compressed tree representations, recognize redundancies by tree canonization and exploit them via caching. Experimentally we show that our method provides a significantly improved trade-off between running time and approximation quality compared to existing state-of-the-art approaches. | cs |
2,312.02187 | The past decade has witnessed a dramatically growing interest in collective intelligence - the phenomenon of groups having an ability to make more accurate decisions than isolated individuals. However, the vast majority of studies to date have focused, either explicitly or implicitly, on spatial decisions (e.g., potential nest sites, food patches, or migration directions). We highlight the equally important, but severely understudied, realm of temporal collective decision-making, i.e., decisions about when to perform an action. We argue that temporal collective decision making is likely to differ from spatial decision making in several crucial ways and probably involves different mechanisms, model predictions, and experimental outcomes. We anticipate that research focused on temporal decisions should lead to a radically expanded understanding of the adaptiveness and constraints of living in groups. | q-bio |
2,312.04224 | In this paper, a fine-tuning method of the parameters in the MMG model for the real-scale ship is proposed. In the proposed method, all of the arbitrarily indicated target parameters of the MMG model are tuned simultaneously in the framework of SI using time series data of real-sale ship maneuvering motion data to steadily improve the accuracy of the MMG model. Parameter tuning is formulated as a minimization problem of the deviation of the maneuvering motion simulated with given parameters and the real-scale ship trials, and the global solution is explored using CMA-ES. By constraining the exploration ranges to the neighborhood of the previously determined parameter values, the proposed method limits the output in a realistic range. The proposed method is applied to the tuning of 12 parameters for a container ship with five different widths of the exploration range. The results show that, in all cases, the accuracy of the maneuvering simulation is improved by applying the tuned parameters to the MMG model, and the validity of the proposed parameter fine-tuning method is confirmed. | eess |
2,312.02686 | We propose a notion of multi-scale stability conditions with the goal of providing a smooth compactification of the quotient of the space of projectivized Bridgeland stability conditions by the group of autoequivalence. For the case of the 3CY category associated with the $A_n$-quiver this goal is achieved by defining a topology and complex structure that relies on a plumbing construction. We compare this compactification to the multi-scale compactification of quadratic differentials and briefly indicate why even for the Kronecker quiver this notion needs refinement to provide a full compactification. | math |
2,312.04045 | This paper considers finitely many investors who perform mean-variance portfolio selection under a relative performance criterion. That is, each investor is concerned about not only her terminal wealth, but how it compares to the average terminal wealth of all investors (i.e., the mean field). At the inter-personal level, each investor selects a trading strategy in response to others' strategies (which affect the mean field). The selected strategy additionally needs to yield an equilibrium intra-personally, so as to resolve time inconsistency among the investor's current and future selves (triggered by the mean-variance objective). A Nash equilibrium we look for is thus a tuple of trading strategies under which every investor achieves her intra-personal equilibrium simultaneously. We derive such a Nash equilibrium explicitly in the idealized case of full information (i.e., the dynamics of the underlying stock is perfectly known), and semi-explicitly in the realistic case of partial information (i.e., the stock evolution is observed, but the expected return of the stock is not precisely known). The formula under partial information involves an additional state process that serves to filter the true state of the expected return. Its effect on trading is captured by two degenerate Cauchy problems, one of which depends on the other, whose solutions are constructed by elliptic regularization and a stability analysis of the state process. Our results indicate that partial information alone can reduce investors' wealth significantly, thereby causing or aggravating systemic risk. Intriguingly, in two different scenarios of the expected return (i.e., it is constant or alternating between two values), our Nash equilibrium formula spells out two distinct manners systemic risk materializes. | math |
2,312.02863 | The incompressibility method is a counting argument in the framework of algorithmic complexity that permits discovering properties that are satisfied by most objects of a class. This paper gives a preliminary insight into Kolmogorov's complexity of groupoids and some algebras. The incompressibility method shows that almost all the groupoids are asymmetric and simple: Only trivial or constant homomorphisms are possible. However, highly random groupoids allow subgroupoids with interesting restrictions that reveal intrinsic structural properties. We also study the issue of the algebraic varieties and wonder which equational identities allow randomness. | cs |
2,312.05279 | Dynamic susceptibility contrast magnetic resonance imaging (DSC-MRI) is widely used to evaluate acute ischemic stroke to distinguish salvageable tissue and infarct core. For this purpose, traditional methods employ deconvolution techniques, like singular value decomposition, which are known to be vulnerable to noise, potentially distorting the derived perfusion parameters. However, deep learning technology could leverage it, which can accurately estimate clinical perfusion parameters compared to traditional clinical approaches. Therefore, this study presents a perfusion parameters estimation network that considers spatial and temporal information, the Spatiotemporal Network (ST-Net), for the first time. The proposed network comprises a designed physical loss function to enhance model performance further. The results indicate that the network can accurately estimate perfusion parameters, including cerebral blood volume (CBV), cerebral blood flow (CBF), and time to maximum of the residual function (Tmax). The structural similarity index (SSIM) mean values for CBV, CBF, and Tmax parameters were 0.952, 0.943, and 0.863, respectively. The DICE score for the hypo-perfused region reached 0.859, demonstrating high consistency. The proposed model also maintains time efficiency, closely approaching the performance of commercial gold-standard software. | cs |
2,312.04046 | Modeling, identification, drive, and current control loop of a limited-rotation actuator with magnetic restoration is studied. Nonlinear and linearized electromechanical models are developed for the design of the drive as well as small and large signal controls of the actuator. To get higher accuracy and an efficient design, the eddy-currents in the laminations and the magnet are modeled by analytically solving the diffusion equation from which a lumped-element circuit is derived for system-level analyses like control system design. The impact of the pre-sliding friction is studied as well. Finite element analysis is also employed. The actuator is prototyped and the identification of the model is carried out. A close agreement is observed between the results obtained from the model, FEM and experiment. Its superiority over previous approaches are shown. Then, an op-amp-based drive is proposed and designed. Afterward, a very accurate model for the drive and the current loop is developed to be used as a simulation platform, while its simplified version is obtained for design purposes. Part II of the paper is on the evaluations and trade-offs of the current control as well as linear and nonlinear position control. | cs |
2,312.02162 | In this article we consider 2-dimensional surfaces. We define some new operators which enable us to evaluate quantities of the surface, such invariants, in a more systematic way. | math |
2,312.02731 | Many real-world sequential manipulation tasks involve a combination of discrete symbolic search and continuous motion planning, collectively known as combined task and motion planning (TAMP). However, prevailing methods often struggle with the computational burden and intricate combinatorial challenges stemming from the multitude of action skeletons. To address this, we propose Dynamic Logic-Geometric Program (D-LGP), a novel approach integrating Dynamic Tree Search and global optimization for efficient hybrid planning. Through empirical evaluation on three benchmarks, we demonstrate the efficacy of our approach, showcasing superior performance in comparison to state-of-the-art techniques. We validate our approach through simulation and demonstrate its capability for online replanning under uncertainty and external disturbances in the real world. | cs |
2,312.03718 | The advent of artificial intelligence (AI) has significantly impacted the traditional judicial industry. Moreover, recently, with the development of AI-generated content (AIGC), AI and law have found applications in various domains, including image recognition, automatic text generation, and interactive chat. With the rapid emergence and growing popularity of large models, it is evident that AI will drive transformation in the traditional judicial industry. However, the application of legal large language models (LLMs) is still in its nascent stage. Several challenges need to be addressed. In this paper, we aim to provide a comprehensive survey of legal LLMs. We not only conduct an extensive survey of LLMs, but also expose their applications in the judicial system. We first provide an overview of AI technologies in the legal field and showcase the recent research in LLMs. Then, we discuss the practical implementation presented by legal LLMs, such as providing legal advice to users and assisting judges during trials. In addition, we explore the limitations of legal LLMs, including data, algorithms, and judicial practice. Finally, we summarize practical recommendations and propose future development directions to address these challenges. | cs |
2,312.0433 | The modeling and forecasting of sea ice conditions in the Arctic region are important tasks for ship routing, offshore oil production, and environmental monitoring. We propose the adaptive surrogate modeling approach named LANE-SI (Lightweight Automated Neural Ensembling for Sea Ice) that uses ensemble of relatively simple deep learning models with different loss functions for forecasting of spatial distribution for sea ice concentration in the specified water area. Experimental studies confirm the quality of a long-term forecast based on a deep learning model fitted to the specific water area is comparable to resource-intensive physical modeling, and for some periods of the year, it is superior. We achieved a 20% improvement against the state-of-the-art physics-based forecast system SEAS5 for the Kara Sea. | cs |
2,312.06035 | We present photodynamical models of four eclipsing binary systems that are members of higher-order multiple systems. We provide some radial velocities measurements and use recent TESS data for three of the systems. KIC 7668648 consists of an eclipsing binary (P=27.8 d) with late-type stars that has a low-mass star on a roughly coplanar outer orbit (P=208 d). There are eclipse events involving the third star that allow for the precise determination of the system parameters. KIC 10319590 consists of a binary (P=21.3 d) with late-type stars that stopped eclipsing about a third of the way into the Kepler mission. We show that the third star in this system is a Sun-like star on an inclined outer orbit (P=456 d). We present the first comprehensive solution for KIC 5255552 and demonstrate that it is a 2 + 2 system consisting of an eclipsing binary (P_1 = 32.5 d) with late-type stars paired with a non-eclipsing binary (P_2 = 33.7 d) with lower-mass stars. The two binaries have nearly coplanar orbits and a roughly aligned outer orbit (P=878 d). There are extra eclipses involving the component stars of the non-eclipsing binary, which leads to relatively small uncertainties in the system parameters. EPIC 220204960 consists of a pair of eclipsing binaries that both consist of two low-mass stars with a poorly determined outer orbit. Because of the relatively short time span of the observations, the masses and radii of the component stars can only be determined with accuracies of ~10% and ~5%, respectively. We show that the most likely period of the outer orbit is 957 days, with a 1-sigma range of 595 to 1674 days. We can only place weak constraints on the mutual inclinations of the orbital planes, and additional radial velocity measurements and/or additional eclipse observations would allow for much tighter constraints on the properties of the outer orbit. | astro-ph |
2,312.03935 | Massive infrared dark clouds (IRDCs) are considered to host the earliest stages of high-mass star formation. In particular, 70 $\mu$m dark IRDCs are the colder and more quiescent clouds. At a scale of about 5000 au using formaldehyde (H2CO) emission, we investigate the kinetic temperature of dense cores in 12 IRDCs obtained from the pilot ALMA Survey of 70 $\mu$m dark High-mass clumps in Early Stages (ASHES). Compared to 1.3 mm dust continuum and other molecular lines, such as C18O and deuterated species, we find that H2CO is mainly sensitive to low-velocity outflow components rather than to quiescent gas expected in the early phases of star formation. The kinetic temperatures of these components range from 26 to 300 K. The Mach number reaches about 15 with an average value of about 4, suggesting that the velocity distribution of gas traced by H2CO is significantly influenced by a supersonic non-thermal component. In addition, we detect warm line emission from HC3N and OCS in 14 protostellar cores, which requires high excitation temperatures (Eu/k ~ 100 K). These results show that some of the embedded cores in the ASHES fields are in an advanced evolutionary stage, previously unexpected for 70 $\mu$m dark IRDCs. | astro-ph |
2,312.05987 | The Hilbert metric is a distance function defined for points lying within the interior of a convex body. It arises in the analysis and processing of convex bodies, machine learning, and quantum information theory. In this paper, we show how to adapt the Euclidean Delaunay triangulation to the Hilbert geometry defined by a convex polygon in the plane. We analyze the geometric properties of the Hilbert Delaunay triangulation, which has some notable differences with respect to the Euclidean case, including the fact that the triangulation does not necessarily cover the convex hull of the point set. We also introduce the notion of a Hilbert ball at infinity, which is a Hilbert metric ball centered on the boundary of the convex polygon. We present a simple randomized incremental algorithm that computes the Hilbert Delaunay triangulation for a set of $n$ points in the Hilbert geometry defined by a convex $m$-gon. The algorithm runs in $O(n (\log n + \log^3 m))$ expected time. In addition we introduce the notion of the Hilbert hull of a set of points, which we define to be the region covered by their Hilbert Delaunay triangulation. We present an algorithm for computing the Hilbert hull in time $O(n h \log^2 m)$, where $h$ is the number of points on the hull's boundary. | cs |
2,312.06254 | Machine learning training data is often dynamic in real-world use cases, i.e., data is added or removed and may experience distribution shifts over time. Models must incorporate this evolving training data to improve generalization, adapt to potential distribution shifts, and adhere to privacy regulations. However, the cost of model (re)training is proportional to how often the model trains and on how much data it trains on. While ML research explores these topics in isolation, there is no end-to-end open-source platform to facilitate the exploration of model retraining and data selection policies and the deployment these algorithms efficiently at scale.
We present Modyn, a platform for model training on dynamic datasets that enables sample-level data selection and triggering policies. Modyn orchestrates continuous training pipelines while optimizing the underlying system infrastructure to support fast access to arbitrary data samples for efficient data selection. Modyn's extensible architecture allows users to run training pipelines without modifying the platform code, and enables researchers to effortlessly extend the system. We evaluate Modyn's training throughput, showing that even in memory-bound recommendation systems workloads, Modyn is able to reach 80 to 100 % of the throughput compared to loading big chunks of data locally without sample-level data selection. Additionally, we showcase Modyn's functionality with three different data selection policies. | stat |
2,312.02285 | We provide a complete axiomatization of modal inclusion logic - team-based modal logic extended with inclusion atoms. We review and refine an expressive completeness and normal form theorem for the logic, define a natural deduction proof system, and use the normal form to prove completeness of the axiomatization. Complete axiomatizations are also provided for two other extensions of modal logic with the same expressive power as modal inclusion logic: one augmented with a might operator and the other with a single-world variant of the might operator. | math |
2,312.0628 | Variational Autoencoders (VAEs) are powerful generative models that have been widely used in various fields, including image and text generation. However, one of the known challenges in using VAEs is the model's sensitivity to its hyperparameters, such as the latent space size. This paper presents a simple extension of VAEs for automatically determining the optimal latent space size during the training process by gradually decreasing the latent size through neuron removal and observing the model performance. The proposed method is compared to traditional hyperparameter grid search and is shown to be significantly faster while still achieving the best optimal dimensionality on four image datasets. Furthermore, we show that the final performance of our method is comparable to training on the optimal latent size from scratch, and might thus serve as a convenient substitute. | cs |
2,312.05705 | Second-order methods for deep learning -- such as KFAC -- can be useful for neural net training. However, they are often memory-inefficient and numerically unstable for low-precision training since their preconditioning Kronecker factors are dense, and require high-precision matrix inversion or decomposition. Consequently, such methods are not widely used for training large neural networks such as transformer-based models. We address these two issues by (i) formulating an inverse-free update of KFAC and (ii) imposing structures in each of the Kronecker factors, resulting in a method we term structured inverse-free natural gradient descent (SINGD). On large modern neural networks, we show that, in contrast to KFAC, SINGD is memory efficient and numerically robust, and often outperforms AdamW even in half precision. Hence, our work closes a gap between first-order and second-order methods in modern low precision training for large neural nets. | cs |
2,312.06556 | In core-collapse supernovae and neutron star mergers, the neutrino density is so large that neutrino-neutrino refraction can lead to flavor conversion, classified as ``fast'' since the neutrino self-interaction strength $\mu=\sqrt{2} G_F n_\nu$ represents the characteristic time-scale of the system. However, it has been empirically realized that the vacuum frequency $\omega=\Delta m^2/2E$ affects the development of flavor conversion even if $\omega \ll \mu$, as is the case in the core of compact astrophysical sources. Focusing on a homogeneous and axially symmetric neutrino gas, we explore the role of $\omega$ in the onset of flavor instabilities. Relying on a perturbative approach, we find that the odd powers of $\omega$ are linked to the angular distribution of the neutrino flavor particle number (FPN). Hence, when $\omega \neq 0$, the flavor conversion dynamics does not depend on the neutrino flavor lepton number only (FLN), like for fast flavor conversion, but also on the FPN. A non-zero vacuum frequency is also responsible for inducing flavor instabilities with a non-negligible growth rate in a neutrino gas that would be otherwise stable for $\omega \rightarrow 0$. Such a neutrino ensemble with $\omega \neq 0$ can be formally mapped into an effective system with $\omega =0$, whose angular distributions have non-zero imaginary components. Our work highlights the overlooked role of vacuum mixing in the development of flavor instabilities in neutrino systems with FLN zero-crossings in the angular distributions. | astro-ph |
2,312.05141 | Open Domain Generalization (ODG) is a challenging task as it not only deals with distribution shifts but also category shifts between the source and target datasets. To handle this task, the model has to learn a generalizable representation that can be applied to unseen domains while also identify unknown classes that were not present during training. Previous work has used multiple source-specific networks, which involve a high computation cost. Therefore, this paper proposes a method that can handle ODG using only a single network. The proposed method utilizes a head that is pre-trained by linear-probing and employs two regularization terms, each targeting the regularization of feature extractor and the classification head, respectively. The two regularization terms fully utilize the pre-trained features and collaborate to modify the head of the model without excessively altering the feature extractor. This ensures a smoother softmax output and prevents the model from being biased towards the source domains. The proposed method shows improved adaptability to unseen domains and increased capability to detect unseen classes as well. Extensive experiments show that our method achieves competitive performance in several benchmarks. We also justify our method with careful analysis of the effect on the logits, features, and the head. | cs |
2,312.06438 | Electromagnetically induced transparency (EIT) can be used to cool an atom in a harmonic potential close to the ground state by addressing several vibrational modes simultaneously. Previous experimental efforts focus on trapped ions and neutral atoms in a standing wave trap. In this work, we demonstrate EIT cooling of an optically trapped single neutral atom, where the trap frequencies are an order of magnitude smaller than in an ion trap and a standing wave trap. We resolve the Fano resonance feature in fluorescence excitation spectra and the corresponding cooling profile in temperature measurements. A final temperature of around 6 $\mu$K is achieved with EIT cooling, a factor of two lower than the previous value obtained using olarization gradient cooling. | quant-ph |
2,312.04668 | Task-Oriented Dialogue (TOD) systems have become crucial components in interactive artificial intelligence applications. While recent advances have capitalized on pre-trained language models (PLMs), they exhibit limitations regarding transparency and controllability. To address these challenges, we propose a novel approach focusing on inferring the TOD-Flow graph from dialogue data annotated with dialog acts, uncovering the underlying task structure in the form of a graph. The inferred TOD-Flow graph can be easily integrated with any dialogue model to improve its prediction performance, transparency, and controllability. Our TOD-Flow graph learns what a model can, should, and should not predict, effectively reducing the search space and providing a rationale for the model's prediction. We show that the proposed TOD-Flow graph better resembles human-annotated graphs compared to prior approaches. Furthermore, when combined with several dialogue policies and end-to-end dialogue models, we demonstrate that our approach significantly improves dialog act classification and end-to-end response generation performance in the MultiWOZ and SGD benchmarks. Code available at: | cs |
2,312.03006 | Recently introduced cone distribution functions from statistics are turned into multi-criteria decision making (MCDM) tools. It is demonstrated that this procedure can be considered as an upgrade of the weighted sum scalarization insofar as it absorbs a whole collection of weighted sum scalarizations at once instead of fixing a particular one in advance. Moreover, situations are characterized in which different types of rank reversal occur, and it is explained why this might even be useful for analyzing the ranking procedure. A few examples will be discussed and a potential application in machine learning is outlined. | math |
2,312.0398 | We give a number of examples of exotic actions of locally compact groups on separable nuclear C*-algebras. In particular, we give examples of the following:
(1) Minimal effective actions of ${\mathbb{Z}}$ and $F_n$ on unital nonsimple prime AF algebras.
(2) For any second countable noncompact locally compact group, a minimal effective action on a separable nuclear nonsimple prime C*-algebra.
(3) For any amenable second countable noncompact locally compact group, a minimal effective action on a separable nuclear nonsimple prime C*-algebra (unital when the group is ${\mathbb{Z}}$ or ${\mathbb{R}}$) such that the crossed product is $K \otimes {\mathcal{O}}_2$ (${\mathcal{O}}_2$ when the group is ${\mathbb{Z}}$).
(4) For any second countable locally compact abelian group which is not discrete, an action on $K \otimes {\mathcal{O}}_2$ such that the crossed product is a nonsimple prime C*-algebra.
In most of these situations, we can specify the primitive ideal space of the C*-algebra (of the crossed product in the last item) within a class of spaces. | math |
2,312.05549 | Unveil, model, and comprehend the causal mechanisms underpinning natural phenomena stand as fundamental endeavors across myriad scientific disciplines. Meanwhile, new knowledge emerges when discovering causal relationships from data. Existing causal learning algorithms predominantly focus on the isolated effects of variables, overlook the intricate interplay of multiple variables and their collective behavioral patterns. Furthermore, the ubiquity of high-dimensional data exacts a substantial temporal cost for causal algorithms. In this paper, we develop a novel method called MgCSL (Multi-granularity Causal Structure Learning), which first leverages sparse auto-encoder to explore coarse-graining strategies and causal abstractions from micro-variables to macro-ones. MgCSL then takes multi-granularity variables as inputs to train multilayer perceptrons and to delve the causality between variables. To enhance the efficacy on high-dimensional data, MgCSL introduces a simplified acyclicity constraint to adeptly search the directed acyclic graph among variables. Experimental results show that MgCSL outperforms competitive baselines, and finds out explainable causal connections on fMRI datasets. | stat |
2,312.03761 | We consider the problem of estimating differences in two Gaussian graphical models (GGMs) which are known to have similar structure. The GGM structure is encoded in its precision (inverse covariance) matrix. In many applications one is interested in estimating the difference in two precision matrices to characterize underlying changes in conditional dependencies of two sets of data. Existing methods for differential graph estimation are based on single-attribute (SA) models where one associates a scalar random variable with each node. In multi-attribute (MA) graphical models, each node represents a random vector. In this paper, we analyze a group lasso penalized D-trace loss function approach for differential graph learning from multi-attribute data. An alternating direction method of multipliers (ADMM) algorithm is presented to optimize the objective function. Theoretical analysis establishing consistency in support recovery and estimation in high-dimensional settings is provided. Numerical results based on synthetic as well as real data are presented. | stat |
2,312.06385 | Quantum key distribution (QKD) stands as a pioneering method for establishing information-theoretically secure communication channels by utilizing the principles of quantum mechanics. In the security proof of QKD, the phase error rate serves as a critical indicator of information leakage and directly influences the security of the shared key bits between communicating parties, Alice and Bob. In estimating the upper bound of the phase error rate, phase randomization and subsequent postselection mechanisms serve pivotal roles across numerous QKD protocols. Here we make a precise phase error rate analysis for QKD protocols with phase postselection, which helps us to accurately bound the amount of information an eavesdropper may obtain. We further apply our analysis in sending-or-not-sending twin-field quantum key distribution (SNS-TFQKD) and mode-pairing quantum key distribution (MP-QKD). The simulation results confirm that our precise phase error analysis can noticeably improve the key rate performance especially over long distances in practice. Note that our method does not require alterations to the existing experimental hardware or protocol steps. It can be readily applied within current SNS-TF-QKD and MP-QKD for higher key rate generation. | quant-ph |
2,312.06422 | Mean field limits are an important tool in the context of large-scale dynamical systems, in particular, when studying multiagent and interacting particle systems. While the continuous-time theory is well-developed, few works have considered mean field limits for deterministic discrete-time systems, which are relevant for the analysis and control of large-scale discrete-time multiagent system. We prove existence results for the mean field limit of very general discrete-time control systems, for which we utilize kernel mean embeddings. These results are then applied in a typical optimal control setup, where we establish the mean field limit of the relaxed dynamic programming principle. Our results can serve as a rigorous foundation for many applications of mean field approaches for discrete-time dynamical systems. | eess |
2,312.02555 | The Meudon Solar Tower (MST) is a 0.60 m telescope dedicated to spectroscopic observations of solar regions. It includes a 14-meter focal length spectrograph which offers high spectral resolution. The spectrograph works either in classical thin slit mode (R > 300000) or 2D imaging spectroscopy (60000 < R < 180000). This specific mode is able to provide high temporal resolution measurements (1 min) of velocities and magnetic fields upon a 2D field of view, using the Multichannel Subtractive Double Pass (MSDP) system. The purpose of this paper is to describe the capabilities of the MSDP at MST with available slicers for broad and thin lines. The goal is to produce multichannel spectra-images, from which cubes of instantaneous data (x, y, $\lambda$) are derived, in order to study of the plasma dynamics and magnetic fields (with polarimetry). | astro-ph |
2,312.02746 | Innovation and standardization in 5G have brought advancements to every facet of the cellular architecture. This ranges from the introduction of new frequency bands and signaling technologies for the radio access network (RAN), to a core network underpinned by micro-services and network function virtualization (NFV). However, like any emerging technology, the pace of real-world deployments does not instantly match the pace of innovation. To address this discrepancy, one of the key aspects under continuous development is the RAN with the aim of making it more open, adaptive, functional, and easy to manage. In this paper, we highlight the transformative potential of embracing novel cellular architectures by transitioning from conventional systems to the progressive principles of Open RAN. This promises to make 6G networks more agile, cost-effective, energy-efficient, and resilient. It opens up a plethora of novel use cases, ranging from ubiquitous support for autonomous devices to cost-effective expansions in regions previously underserved. The principles of Open RAN encompass: (i) a disaggregated architecture with modular and standardized interfaces; (ii) cloudification, programmability and orchestration; and (iii) AI-enabled data-centric closed-loop control and automation. We first discuss the transformative role Open RAN principles have played in the 5G era. Then, we adopt a system-level approach and describe how these Open RAN principles will support 6G RAN and architecture innovation. We qualitatively discuss potential performance gains that Open RAN principles yield for specific 6G use cases. For each principle, we outline the steps that research, development and standardization communities ought to take to make Open RAN principles central to next-generation cellular network designs. | cs |
2,312.02839 | A practical and scalable multicast beamformer design in multi-input multi-output~(MIMO) coded caching~(CC) systems is introduced in this paper. The proposed approach allows multicast transmission to multiple groups with partially overlapping user sets using receiver dimensions to distinguish between different group-specific streams. Additionally, it provides flexibility in accommodating various parameter configurations of the MIMO-CC setup and overcomes practical limitations, such as the requirement to use successive interference cancellation~(SIC) at the receiver, while achieving the same degrees-of-freedom~(DoF). To evaluate the proposed scheme, we define the symmetric rate as the sum rate of the partially overlapping streams received per user, comprising a linear multistream multicast transmission vector and the linear minimum mean square error~(LMMSE) receiver. The resulting non-convex symmetric rate maximization problem is solved using alternative optimization and successive convex approximation~(SCA). Moreover, a fast iterative Lagrangian-based algorithm is developed, significantly reducing the computational overhead compared to previous designs. The effectiveness of our proposed method is demonstrated by extensive simulations. | math |
2,312.03145 | Associated to each graph G is a Gaussian graphical model. Such models are often used in high-dimensional settings, i.e. where there are relatively few data points compared to the number of variables. The maximum likelihood threshold of a graph is the minimum number of data points required to fit the corresponding graphical model using maximum likelihood estimation. Graphical lasso is a method for selecting and fitting a graphical model. In this project, we ask: when graphical lasso is used to select and fit a graphical model on n data points, how likely is it that n is greater than or equal to the maximum likelihood threshold of the corresponding graph? Our results are a series of computational experiments. | stat |
2,312.03075 | We present a new five-epoch Chandra X-ray Observatory monitoring survey of the nearby spiral galaxy M33 which probes X-ray variability with time sampling between two weeks and four months. We characterize the X-ray variability of 55 bright point sources outside of the nucleus, many of which are expected to be high-mass X-ray binaries (HMXBs). We detect eight new candidate transients not detected in previous X-ray catalogs of M33 and discuss their possible nature. The final catalog includes 26 known HMXB candidates identified in the literature. We extend the baseline of the X-ray light curves up to 21 years by including archival X-ray observations of these sources. We compare the detection and non-detection epochs of the sources to suites of simulated source duty cycles and infer that most of our detected sources have duty cycles > 30%. We find only four sources whose detection patterns are consistent with having duty cycles below 30%. This large fraction of sources with high duty cycles is unexpected for a population of HMXBs, thus more frequent X-ray monitoring will likely reveal many more low duty cycle HMXBs in M33. | astro-ph |
2,312.03197 | Topologies can be expanded with the help of ideals, using the local function, an operator resembling the closure of a set.
The aim of this paper is to define the ideals which enable us to create this topology $\tau^{*}$ on $X$ simultaneously making a specific set $A\subseteq X$ open in $\tau^{*}$. We study certain properties of $\tau^{*}$, especially under the assumption that $A$ is a preopen set. Further, we reflect on the ideal topological space in which the ideal is generated by a chosen family of dense sets. Here we prove that the generated topology by this ideal is submaximal, but not maximal connected. | math |
2,312.03136 | We present a novel Finite Volume (FV) scheme on unstructured polygonal meshes that is provably compliant with the Second Law of Thermodynamics and the Geometric Conservation Law (GCL) at the same time. The governing equations are provided by a subset of the class of symmetric and hyperbolic thermodynamically compatible (SHTC) models. Our numerical method discretizes the equations for the conservation of momentum, total energy, distortion tensor and thermal impulse vector, hence accounting in one single unified mathematical formalism for a wide range of physical phenomena in continuum mechanics. By means of two conservative corrections directly embedded in the definition of the numerical fluxes, the new schemes are proven to satisfy two extra conservation laws, namely an entropy balance law and a geometric equation that links the distortion tensor to the density evolution. As such, the classical mass conservation equation can be discarded. Firstly, the GCL is derived at the continuous level, and subsequently it is satisfied by introducing the new concepts of general potential and generalized Gibbs relation. Once compatibility of the GCL is ensured, thermodynamic compatibility is tackled in the same manner, thus achieving the satisfaction of a local cell entropy inequality. The two corrections are orthogonal, meaning that they can coexist simultaneously without interfering with each other. The compatibility of the new FV schemes holds true at the semi-discrete level, and time integration of the governing PDE is carried out relying on Runge-Kutta schemes. A large suite of test cases demonstrates the structure preserving properties of the schemes at the discrete level as well. | cs |
2,312.0575 | This paper is a continuation of our work concerning the logical and computational foundations of multi-step fuzzy inference. We bring further results on the implementation of the Mamdani-Assilian type of fuzzy rules and inference in Goedel logic with truth constants. In our previous work, we have provided translation of Mamdani-Assilian fuzzy rules to formulae of Goedel logic, and subsequently, to suitable clausal form. Moreover, we have outlined a class of problems regarding general properties of fuzzy inference and shown its reduction to a class of deduction/unsatisfiability problems. We now focus on solving such problems using an adapted hyperresolution calculus. | cs |
2,312.06024 | We introduce the concept of "thinking assistants", an approach that encourages users to engage in deep reflection and critical thinking through brainstorming and thought-provoking queries. We instantiate one such thinking assistant, Gradschool.chat, as a virtual assistant tailored to assist prospective graduate students. We posit that thinking assistants are particularly relevant to situations like applying to graduate school, a phase often characterized by the challenges of academic preparation and the development of a unique research identity. In such situations, students often lack direct mentorship from professors, or may feel hesitant to approach faculty with their queries, making thinking assistants particularly useful.
Leveraging a Large Language Model (LLM), Gradschool.chat is a demonstration system built as a thinking assistant for working with specific professors in the field of human-computer interaction (HCI). It was designed through training on information specific to these professors and a validation processes in collaboration with these academics. This technical report delineates the system's architecture and offers a preliminary analysis of our deployment study. Additionally, this report covers the spectrum of questions posed to our chatbots by users. The system recorded 223 conversations, with participants responding positively to approximately 65% of responses. Our findings indicate that users who discuss and brainstorm their research interests with Gradschool.chat engage more deeply, often interacting with the chatbot twice as long compared to those who only pose questions about professors. | cs |
2,312.0495 | In this paper we explore the concept of sequential inductive prediction intervals using theory from sequential testing. We furthermore introduce a 3-parameter PAC definition of prediction intervals that allows us via simulation to achieve almost sharp bounds with high probability. | cs |
2,312.05467 | Social Media is a repository of digital literature including user-generated content. The users of social media are expressing their opinion with diverse mediums such as text, emojis, memes, and also through other visual and textual mediums. A major portion of these media elements could be treated as harmful to others and they are known by many words including Cyberbullying and Toxic Language . The goal of this research paper is to analyze a curated and value-added dataset of toxic language titled ToxLex_bn . It is an exhaustive wordlist that can be used as classifier material to detect toxicity in social media. The toxic language/script used by the Bengali community as cyberbullying, hate speech and moral policing became major trends in social media culture in Bangladesh and West Bengal. The toxicity became so high that the victims has to post as a counter or release explanation video for the haters. Most cases are pointed to women celebrity and their relation, dress, lifestyle are became trolled and toxicity flooded in comments boxes. Not only celebrity bashing but also hates occurred between Hindu Muslims, India-Bangladesh, Two opponents of 1971 and these are very common for virtual conflict in the comment thread. Even many times facebook comment causes sue and legal matters in Bangladesh and thus it requires more study. In this study, a Bangla toxic language dataset has been analyzed which was inputted by the user in Bengali script & language. For this, about 1968 unique bigrams or phrases as wordlists have been analyzed which are derived from 2207590 comments. It is assumed that this analysis will reinforce the detection of Bangla's toxic language used in social media and thus cure this virtual disease. | cs |
2,312.03044 | The deep neural network (DNN) has been proven effective in various domains. However, they often struggle to perform well on certain minority groups during inference, despite showing strong performance on the majority of data groups. This is because over-parameterized models learned \textit{bias attributes} from a large number of \textit{bias-aligned} training samples. These bias attributes are strongly spuriously correlated with the target variable, causing the models to be biased towards spurious correlations (i.e., \textit{bias-conflicting}). To tackle this issue, we propose a novel \textbf{re}weighted \textbf{s}parse \textbf{t}raining framework, dubbed as \textit{\textbf{REST}}, which aims to enhance the performance of biased data while improving computation and memory efficiency. Our proposed REST framework has been experimentally validated on three datasets, demonstrating its effectiveness in exploring unbiased subnetworks. We found that REST reduces the reliance on spuriously correlated features, leading to better performance across a wider range of data groups with fewer training and inference resources. We highlight that the \textit{REST} framework represents a promising approach for improving the performance of DNNs on biased data, while simultaneously improving computation and memory efficiency. By reducing the reliance on spurious correlations, REST has the potential to enhance the robustness of DNNs and improve their generalization capabilities. Code is released at \url{} | cs |
2,312.06156 | A marked strongly invertible knot is a triple $(K,h,\delta)$ of a knot $K$ in $S^3$, a strong inversion $h$ of $K$, and a subarc $\delta \subset \operatorname{Fix}(h)\cong S^1$ bounded by $\operatorname{Fix}(h)\cap K\cong S^0$. An invariant Seifert surface for $(K,h,\delta)$ is an $h$-invariant Seifert surface for $K$ that intersects $\operatorname{Fix}(h)$ in the arc $\delta$. In this paper, we completely determine the equivariant genus (the minimum of the genera of invariant Seifert surfaces for $(K,h,\delta)$) of every marked strongly invertible knot $(K,h,\delta)$ with $K$ a $2$-bridge knot. | math |
2,312.06579 | Amazon Locker is a self-service delivery or pickup location where customers can pick up packages and drop off returns. A basic first-come-first-served policy for accepting package delivery requests to lockers results in lockers becoming full with standard shipping speed (3-5 day shipping) packages, and leaving no space left for expedited packages which are mostly Next-Day or Two-Day shipping. This paper proposes a solution to the problem of determining how much locker capacity to reserve for different ship-option packages. Yield management is a much researched field with popular applications in the airline, car rental, and hotel industries. However, Amazon Locker poses a unique challenge in this field since the number of days a package will wait in a locker (package dwell time) is, in general, unknown. The proposed solution combines machine learning techniques to predict locker demand and package dwell time, and linear programming to maximize throughput in lockers. The decision variables from this optimization provide optimal capacity reservation values for different ship options. This resulted in a year-over-year increase of 9% in Locker throughput worldwide during holiday season of 2018, impacting millions of customers. | cs |
2,312.0548 | Extremely precise radial velocity is essential for the detection of sub-m/s radial velocity of stars induced by Earth-like planets. Although modeling of the barycentric correction of radial velocity could achieve 1 mm/s precision, the input astrometry could be biased due to nonlinear motions of stars caused by companions. To account for astrometry-induced bias in barycentric correction, we correct for astrometric bias by minimizing the scatter of reduced RV data with PEXO. In particular, we apply this method to the barycentric correction for 266 stars from HARPS data archive. We find that the RV scatter for 8 targets are significantly reduced due to correction of astrometric bias. Among these targets, 2 targets exhibit bias caused by known massive companions, while for the remaining 6 targets, the bias could be attributed to unknown companions or Gaia systematics. Furthermore, 14 targets have an astrometry-induced annual RV variation higher than 0.05 m/s, and 10 of them are closer than 10 pc. We show the results of Barnard's star as an example, and find that an annual RV bias of 10 cm/s is mitigated by replacing BarCor by PEXO as the barycentric correction code. Our work demonstrates the necessity of astrometric bias correction and the utilization of barycentric correction code within a relativistic framework in high-precision RV for the detection of Earth-like planets. | astro-ph |
2,312.02159 | In the realm of 5G communication systems, the accuracy of Channel State Information (CSI) prediction is vital for optimizing performance. This letter introduces a pioneering approach: the Spectral-Temporal Graph Neural Network (STEM GNN), which fuses spatial relationships and temporal dynamics of the wireless channel using the Graph Fourier Transform. We compare the STEM GNN approach with conventional Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) models for CSI prediction. Our findings reveal a significant enhancement in overall communication system performance through STEM GNNs. For instance, in one scenario, STEM GNN achieves a sum rate of 5.009 bps/Hz which is $11.9\%$ higher than that of LSTM and $35\%$ higher than that of RNN. The spectral-temporal analysis capabilities of STEM GNNs capture intricate patterns often overlooked by traditional models, offering improvements in beamforming, interference mitigation, and ultra-reliable low-latency communication (URLLC). | eess |
2,312.02956 | Purpose: To develop Choroidalyzer, an open-source, end-to-end pipeline for segmenting the choroid region, vessels, and fovea, and deriving choroidal thickness, area, and vascular index.
Methods: We used 5,600 OCT B-scans (233 subjects, 6 systemic disease cohorts, 3 device types, 2 manufacturers). To generate region and vessel ground-truths, we used state-of-the-art automatic methods following manual correction of inaccurate segmentations, with foveal positions manually annotated. We trained a U-Net deep-learning model to detect the region, vessels, and fovea to calculate choroid thickness, area, and vascular index in a fovea-centred region of interest. We analysed segmentation agreement (AUC, Dice) and choroid metrics agreement (Pearson, Spearman, mean absolute error (MAE)) in internal and external test sets. We compared Choroidalyzer to two manual graders on a small subset of external test images and examined cases of high error.
Results: Choroidalyzer took 0.299 seconds per image on a standard laptop and achieved excellent region (Dice: internal 0.9789, external 0.9749), very good vessel segmentation performance (Dice: internal 0.8817, external 0.8703) and excellent fovea location prediction (MAE: internal 3.9 pixels, external 3.4 pixels). For thickness, area, and vascular index, Pearson correlations were 0.9754, 0.9815, and 0.8285 (internal) / 0.9831, 0.9779, 0.7948 (external), respectively (all p<0.0001). Choroidalyzer's agreement with graders was comparable to the inter-grader agreement across all metrics.
Conclusions: Choroidalyzer is an open-source, end-to-end pipeline that accurately segments the choroid and reliably extracts thickness, area, and vascular index. Especially choroidal vessel segmentation is a difficult and subjective task, and fully-automatic methods like Choroidalyzer could provide objectivity and standardisation. | q-bio |
2,312.02888 | In the context of the Laser Interferometer Space Antenna (LISA), the laser subsystems exhibit frequency fluctuations that introduce significant levels of noise into the measurements, surpassing the gravitational wave signal by several orders of magnitude. Mitigation is achieved via time-shifting individual measurements in a data processing step known as time-delay interferometry (TDI). The suppression performance of TDI relies on accurate knowledge and consideration of the delays experienced by the interfering lasers. While considerable efforts have been dedicated to the accurate determination of inter-spacecraft ranging delays, the sources for onboard delays have been either neglected or assumed to be known. Contrary to these assumptions, analog delays of the phasemeter front end and the laser modulator are not only large but also prone to change with temperature and heterodyne frequency. This motivates our proposal for a novel method enabling a calibration of these delays on-ground and in-space, based on minimal functional additions to the receiver architecture. Specifically, we establish a set of calibration measurements and elucidate how these measurements are utilized in data processing, leading to the mitigation of the delays in the TDI Michelson variables. Following a performance analysis of the calibration measurements, proposed calibration scheme is assessed through numerical simulations. We find that in the absence of the calibration scheme, the assumed drifts of the analog delays increase residual laser noise at high frequencies of the LISA measurement band. A single, on-ground calibration of the analog delays leads to an improvement by roughly one order of magnitude, while re-calibration in space may improve performance by yet another order of magnitude. Towards lower frequencies, ranging error is always found to be the limiting factor for which countermeasures are discussed. | astro-ph |
2,312.04921 | The Vera C. Rubin Observatory will produce an unprecedented astronomical data set for studies of the deep and dynamic universe. Its Legacy Survey of Space and Time (LSST) will image the entire southern sky every three to four days and produce tens of petabytes of raw image data and associated calibration data over the course of the experiment's run. More than 20 terabytes of data must be stored every night, and annual campaigns to reprocess the entire dataset since the beginning of the survey will be conducted over ten years. The Production and Distributed Analysis (PanDA) system was evaluated by the Rubin Observatory Data Management team and selected to serve the Observatory's needs due to its demonstrated scalability and flexibility over the years, for its Directed Acyclic Graph (DAG) support, its support for multi-site processing, and its highly scalable complex workflows via the intelligent Data Delivery Service (iDDS). PanDA is also being evaluated for prompt processing where data must be processed within 60 seconds after image capture. This paper will briefly describe the Rubin Data Management system and its Data Facilities (DFs). Finally, it will describe in depth the work performed in order to integrate the PanDA system with the Rubin Observatory to be able to run the Rubin Science Pipelines using PanDA. | cs |
2,312.04692 | Deep learning models, while achieving remarkable performance across various tasks, are vulnerable to member inference attacks, wherein adversaries identify if a specific data point was part of a model's training set. This susceptibility raises substantial privacy concerns, especially when models are trained on sensitive datasets. Current defense methods often struggle to provide robust protection without hurting model utility, and they often require retraining the model or using extra data. In this work, we introduce a novel defense framework against membership attacks by leveraging generative models. The key intuition of our defense is to remove the differences between member and non-member inputs which can be used to perform membership attacks, by re-generating input samples before feeding them to the target model. Therefore, our defense works \emph{pre-inference}, which is unlike prior defenses that are either training-time (modify the model) or post-inference time (modify the model's output).
A unique feature of our defense is that it works on input samples only, without modifying the training or inference phase of the target model. Therefore, it can be cascaded with other defense mechanisms as we demonstrate through experiments. Through extensive experimentation, we show that our approach can serve as a robust plug-n-play defense mechanism, enhancing membership privacy without compromising model utility in both baseline and defended settings. For example, our method enhanced the effectiveness of recent state-of-the-art defenses, reducing attack accuracy by an average of 5.7\% to 12.4\% across three datasets, without any impact on the model's accuracy. By integrating our method with prior defenses, we achieve new state-of-the-art performance in the privacy-utility trade-off. | cs |
2,312.03149 | A nut graph is a simple graph for which the adjacency matrix has a single zero eigenvalue such that all non-zero kernel eigenvectors have no zero entry. If the isolated vertex is excluded as trivial, nut graphs have seven or more vertices; they are connected, non-bipartite, and have no leaves. It is shown that a nut graph $G$ always has at least one more edge orbit than it has vertex orbits: $o_e(G) \geq o_v(G) + 1$, with the obvious corollary that edge transitive nut graphs do not exist. We give infinite familes of vertex-transitive nut graphs with two orbits of edges, and infinite families of nut graphs with two orbits of vertices and three of edges. Several constructions for nut graphs from smaller starting graphs are known: double subdivision of a bridge, four-fold subdivision of an edge, a construction for extrusion of a vertex with preservation of the degree sequence. To these we add multiplier constructions that yield nut graphs from regular (not necessarily nut graph) parents. In general, constructions can have different effects on automorphism group and counts of vertex and edge orbits, but in the case where the automorphism group is `preserved', they can be used in a predictable way to control vertex and edge orbit numbers. | math |
2,312.033 | The non-backtracking operator of a graph is a powerful tool in spectral graph theory and random matrix theory. Most existing results for the non-backtracking operator of a random graph concern only eigenvalues or top eigenvectors. In this paper, we take the first step in analyzing its bulk eigenvector behaviors. We demonstrate that for the non-backtracking operator $B$ of a random $d$-regular graph, its eigenvectors corresponding to nontrivial eigenvalues are completely delocalized with high probability. Additionally, we show complete delocalization for a reduced $2n \times 2n$ non-backtracking matrix $\widetilde{B}$. By projecting all eigenvalues of $\widetilde{B}$ onto the real line, we obtain an empirical measure that converges weakly in probability to the Kesten-McKay law for fixed $d\geq 3$ and to a semicircle law as $d \to\infty$ with $n \to\infty$. | math |
2,312.0281 | We describe a case study in the use of the Structured Process for Information Campaign Enhancement (SP!CE, version 2.1) to evaluate influence campaigns present in the 2nd round of the Brazilian presidential election in 2022 October. SP!CE is a US-military focused framework for describing both friendly and adversary actions in influence campaigns, and is inter-operable with the Disinformation Analysis and Risk Management (DISARM) framework. The purpose of the case study is to demonstrate how SP!CE can be used to describe influence campaign behaviors. We selected the Brazilian election as the target of the case study as it is known that there were significant amounts of mis- and disinformation present on social media during the campaigns. Our goal was to demonstrate how SP!CE could be applied in such a context, showing how social media content could be aligned with information campaign behaviors and how such an alignment can be used to analyze which mis- and disinformation narratives were in play. Additionally, we aim to provide insights on best practices regarding how to apply the framework in further research. We release the coding and screenshots of the relevant social media posts to support future research. | cs |
2,312.05615 | We study the Poisson geometrical formulation of quantum mechanics for finite dimensional mixed and pure states. Equivalently, we show quantum mechanics can be understood in the language of classical mechanics. We review the symplectic structure of the Hilbert space and identify canonical coordinates. We find the geometry extends to space of density matrices $D_N^+$. It is no more symplectic but follows $\mathfrak{su}(N)$ Poisson commutation relation. We identify Casimir surfaces for this algebra and show physical pure states constitute one of the symplectic submanifold lying on the intersection of primitive Casimirs. Various forms of primitive Casimirs are identified. Generic symplectic submanifolds of $D_N^+$ are identified and dimensions of the same are calculated. $D_N^+$ is written as a disjoint union of such symplectic submanifolds. $D_N^+$ and its Poisson structure is recovered from partial tracing of the pure states in $\mathbb{C}^N \times \mathbb{C}^M$ and its symplectic structure. Geometry of physical pure states $\mathbb{C}P^{N-1}$ is also reconciled with Poisson geometry of full space of density matrices $D_N^+$. An ascending chain of Poisson submanifolds $D_N^M \subset D_N^{M+1}$ are identified with respect to $\subset$ for $M \leq N$. Each Poisson submanifold lies on the intersection of $N-M$ Casimirs and is constructed by tracing out the $\mathbb{C}^M$ states in $\mathbb{C}^N \times \mathbb{C}^M$. Their foliations are also discussed. Constraints on the geometry due to positive semi-definiteness on a class of symplectic submanifolds $E_N^M$ consisting of mixed states with maximum entropy in $D_N^M$ are studied. | quant-ph |
2,312.04597 | As a key technology in 6G research, federated learning (FL) enables collaborative learning among multiple clients while ensuring individual data privacy. However, malicious attackers among the participating clients can intentionally tamper with the training data or the trained model, compromising the accuracy and trustworthiness of the system. To address this issue, in this paper, we propose a hierarchical audit-based FL (HiAudit-FL) framework, with the aim to enhance the reliability and security of the learning process. The hierarchical audit process includes two stages, namely model-audit and parameter-audit. In the model-audit stage, a low-overhead audit method is employed to identify suspicious clients. Subsequently, in the parameter-audit stage, a resource-consuming method is used to detect all malicious clients with higher accuracy among the suspicious ones. Specifically, we execute the model audit method among partial clients for multiple rounds, which is modeled as a partial observation Markov decision process (POMDP) with the aim to enhance the robustness and accountability of the decision-making in complex and uncertain environments. Meanwhile, we formulate the problem of identifying malicious attackers through a multi-round audit as an active sequential hypothesis testing problem and leverage a diffusion model-based AI-Enabled audit selection strategy (ASS) to decide which clients should be audited in each round. To accomplish efficient and effective audit selection, we design a DRL-ASS algorithm by incorporating the ASS in a deep reinforcement learning (DRL) framework. Our simulation results demonstrate that HiAudit-FL can effectively identify and handle potential malicious users accurately, with small system overhead. | cs |
2,312.0457 | Deep Reinforcement Learning (DRL) is a quickly evolving research field rooted in operations research and behavioural psychology, with potential applications extending across various domains, including robotics. This thesis delineates the background of modern Reinforcement Learning (RL), starting with the framework constituted by the Markov decision processes, Markov properties, goals and rewards, agent-environment interactions, and policies. We explain the main types of algorithms commonly used in RL, including value-based, policy gradient, and actor-critic methods, with a special emphasis on DQN, A2C and PPO. We then give a short literature review on some widely adopted frameworks for implementing RL algorithms and environments. Subsequently, we present Bidimensional Gripper Environment (BGE), a virtual simulator based on the Pymunk physics engine we developed to analyse top-down bidimensional object manipulation. The methodology section frames our agent-environment interaction as a Markov decision process, such that we can apply our RL algorithms. We list various goal formulation strategies, including reward shaping and curriculum learning. We also employ different steps of observation preprocessing to reduce the computational workload required. In the experimental phase, we run through a series of scenarios of increasing difficulty. We start with a simple static scenario and then gradually increase the amount of stochasticity. Whenever the agents show difficulty in learning, we counteract by increasing the degree of reward shaping and curriculum learning. These experiments demonstrate the substantial limitations and pitfalls of model-free algorithms under changing dynamics. In conclusion, we present a summary of our findings and remarks. We then outline potential future work to improve our methodology and possibly expand to real-world systems. | cs |
2,312.02708 | A machine learning model is traditionally considered robust if its prediction remains (almost) constant under input perturbations with small norm. However, real-world tasks like molecular property prediction or point cloud segmentation have inherent equivariances, such as rotation or permutation equivariance. In such tasks, even perturbations with large norm do not necessarily change an input's semantic content. Furthermore, there are perturbations for which a model's prediction explicitly needs to change. For the first time, we propose a sound notion of adversarial robustness that accounts for task equivariance. We then demonstrate that provable robustness can be achieved by (1) choosing a model that matches the task's equivariances (2) certifying traditional adversarial robustness. Certification methods are, however, unavailable for many models, such as those with continuous equivariances. We close this gap by developing the framework of equivariance-preserving randomized smoothing, which enables architecture-agnostic certification. We additionally derive the first architecture-specific graph edit distance certificates, i.e. sound robustness guarantees for isomorphism equivariant tasks like node classification. Overall, a sound notion of robustness is an important prerequisite for future work at the intersection of robust and geometric machine learning. | stat |
2,312.03509 | Automatic detection and tracking of cells in microscopy images are major applications of computer vision technologies in both biomedical research and clinical practice. Though machine learning methods are increasingly common in these fields, classical algorithms still offer significant advantages for both tasks, including better explainability, faster computation, lower hardware requirements and more consistent performance. In this paper, we present a novel approach based on gravitational force fields that can compete with, and potentially outperform modern machine learning models when applied to fluorescence microscopy images. This method includes detection, segmentation, and tracking elements, with the results demonstrated on a Cell Tracking Challenge dataset. | cs |
2,312.04781 | The Lattice Boltzmann Method (LBM) is widely recognized as an efficient algorithm for simulating fluid flows in both single-phase and multi-phase scenarios. In this research, a quantum Carleman Linearization formulation of the Lattice Boltzmann equation is described, employing the Bhatnagar Gross and Krook equilibrium function. Our approach addresses the treatment of boundary conditions with the commonly used bounce back scheme.
The accuracy of the proposed algorithm is demonstrated by simulating flow past a rectangular prism, achieving agreement with respect to fluid velocity In comparison to classical LBM simulations. This improved formulation showcases the potential to provide computational speed-ups in a wide range of fluid flow applications.
Additionally, we provide details on read in and read out techniques. | quant-ph |
2,312.06554 | The diversity and heterogeneity of biomarkers has made the development of general methods for single-step quantification of analytes difficult. For individual biomarkers, electrochemical methods that detect a conformational change in an affinity binder upon analyte binding have shown promise. However, because the conformational change must operate within a nanometer-scale working distance, an entirely new sensor, with a unique conformational change, must be developed for each analyte. Here, we demonstrate a modular electrochemical biosensor, built from DNA origami, which is easily adapted to diverse molecules by merely replacing its analyte binding domains. Instead of relying on a unique nanometer-scale movement of a single redox reporter, all sensor variants rely on the same 100-nanometer scale conformational change, which brings dozens of reporters close enough to a gold electrode surface that a signal can be measured via square wave voltammetry, a standard electrochemical technique. To validate our sensor's mechanism, we used single-stranded DNA as an analyte, and optimized the number of redox reporters and various linker lengths. Adaptation of the sensor to streptavidin and PDGF-BB analytes was achieved by simply adding biotin or anti-PDGF aptamers to appropriate DNA linkers. Geometrically-optimized streptavidin sensors exhibited signal gain and limit of detection markedly better than comparable reagentless electrochemical sensors. After use, the same sensors could be regenerated under mild conditions: performance was largely maintained over four cycles of DNA strand displacement and rehybridization. By leveraging the modularity of DNA nanostructures, our work provides a straightforward route to the single-step quantification of arbitrary nucleic acids and proteins. | q-bio |
2,312.06256 | This work concerns control-oriented and structure-preserving learning of low-dimensional approximations of high-dimensional physical systems, with a focus on mechanical systems. We investigate the integration of neural autoencoders in model order reduction, while at the same time preserving Hamiltonian or Lagrangian structures. We focus on extensively evaluating the considered methodology by performing simulation and control experiments on large mass-spring-damper networks, with hundreds of states. The empirical findings reveal that compressed latent dynamics with less than 5 degrees of freedom can accurately reconstruct the original systems' transient and steady-state behavior with a relative total error of around 4\%, while simultaneously accurately reconstructing the total energy. Leveraging this system compression technique, we introduce a model-based controller that exploits the mathematical structure of the compressed model to regulate the configuration of heavily underactuated mechanical systems. | cs |
2,312.05928 | Neural style transfer (NST) has evolved significantly in recent years. Yet, despite its rapid progress and advancement, existing NST methods either struggle to transfer aesthetic information from a style effectively or suffer from high computational costs and inefficiencies in feature disentanglement due to using pre-trained models. This work proposes a lightweight but effective model, AesFA -- Aesthetic Feature-Aware NST. The primary idea is to decompose the image via its frequencies to better disentangle aesthetic styles from the reference image while training the entire model in an end-to-end manner to exclude pre-trained models at inference completely. To improve the network's ability to extract more distinct representations and further enhance the stylization quality, this work introduces a new aesthetic feature: contrastive loss. Extensive experiments and ablations show the approach not only outperforms recent NST methods in terms of stylization quality, but it also achieves faster inference. Codes are available at . | cs |
2,312.04404 | Automated decision systems are increasingly used to make consequential decisions in people's lives. Due to the sensitivity of the manipulated data as well as the resulting decisions, several ethical concerns need to be addressed for the appropriate use of such technologies, in particular, fairness and privacy. Unlike previous work, which focused on centralized differential privacy (DP) or local DP (LDP) for a single sensitive attribute, in this paper, we examine the impact of LDP in the presence of several sensitive attributes (i.e., multi-dimensional data) on fairness. Detailed empirical analysis on synthetic and benchmark datasets revealed very relevant observations. In particular, (1) multi-dimensional LDP is an efficient approach to reduce disparity, (2) the multi-dimensional approach of LDP (independent vs. combined) matters only at low privacy guarantees, and (3) the outcome Y distribution has an important effect on which group is more sensitive to the obfuscation. Last, we summarize our findings in the form of recommendations to guide practitioners in adopting effective privacy-preserving practices while maintaining fairness and utility in ML applications. | cs |
2,312.06551 | Flexible antenna systems (FASs) can reconfigure their locations freely within a spatially continuous space. To keep favorable antenna positions, the channel state information (CSI) acquisition for FASs is essential. While some techniques have been proposed, most existing FAS channel estimators require several channel assumptions, such as slow variation and angular-domain sparsity. When these assumptions are not reasonable, the model mismatch may lead to unpredictable performance loss. In this paper, we propose the successive Bayesian reconstructor (S-BAR) as a general solution to estimate FAS channels. Unlike model-based estimators, the proposed S-BAR is prior-aided, which builds the experiential kernel for CSI acquisition. Inspired by Bayesian regression, the key idea of S-BAR is to model the FAS channels as a stochastic process, whose uncertainty can be successively eliminated by kernel-based sampling and regression. In this way, the predictive mean of the regressed stochastic process can be viewed as the maximum a posterior (MAP) estimator of FAS channels. Simulation results verify that, in both model-mismatched and model-matched cases, the proposed S-BAR can achieve higher estimation accuracy than the existing schemes. | eess |
2,312.06498 | This paper explores the benefits of incorporating natural ventilation (NV) simulation into a generative process of designing residential buildings to improve energy efficiency and indoor thermal comfort. Our proposed workflow uses the Wave Function Collapse algorithm to generate a diverse set of plausible floor plans. It also includes post-COVID occupant presence models while incorporating adaptive comfort models. We conduct four sets of experiments using the workflow, and the simulated results suggest that multi-mode cooling strategies combining conventional air conditioning with NV can often significantly reduce energy use while introducing only slight reductions in thermal comfort. | eess |
2,312.06433 | Let $P$ be a pointed, closed convex cone in $\mathbb{R}^d$. We prove that for two pure isometric representations $V^{(1)}$ and $V^{(2)}$ of $P$, the associated CAR flows $\beta^{V^{(1)}}$ and $\beta^{V^{(2)}}$ are cocycle conjugate if and only if $V^{(1)}$ and $V^{(2)}$ are unitarily equivalent. We also give a complete description of pure isometric representations of $P$ with commuting range projections that give rise to type I CAR flows. We show that such an isometric representation is completely reducible with each irreducible component being a pullback of the shift semigroup $\{S_t\}_{t \geq 0}$ on $L^2[0,\infty)$. We also compute the index and the gauge group of the associated CAR flows and show that the action of the gauge group on the set of normalised units need not be transitive. | math |
2,312.05645 | We study the problem of hypothesis selection under the constraint of local differential privacy. Given a class $\mathcal{F}$ of $k$ distributions and a set of i.i.d. samples from an unknown distribution $h$, the goal of hypothesis selection is to pick a distribution $\hat{f}$ whose total variation distance to $h$ is comparable with the best distribution in $\mathcal{F}$ (with high probability). We devise an $\varepsilon$-locally-differentially-private ($\varepsilon$-LDP) algorithm that uses $\Theta\left(\frac{k}{\alpha^2\min \{\varepsilon^2,1\}}\right)$ samples to guarantee that $d_{TV}(h,\hat{f})\leq \alpha + 9 \min_{f\in \mathcal{F}}d_{TV}(h,f)$ with high probability. This sample complexity is optimal for $\varepsilon<1$, matching the lower bound of Gopi et al. (2020). All previously known algorithms for this problem required $\Omega\left(\frac{k\log k}{\alpha^2\min \{ \varepsilon^2 ,1\}} \right)$ samples to work.
Moreover, our result demonstrates the power of interaction for $\varepsilon$-LDP hypothesis selection. Namely, it breaks the known lower bound of $\Omega\left(\frac{k\log k}{\alpha^2\min \{ \varepsilon^2 ,1\}} \right)$ for the sample complexity of non-interactive hypothesis selection. Our algorithm breaks this barrier using only $\Theta(\log \log k)$ rounds of interaction.
To prove our results, we define the notion of \emph{critical queries} for a Statistical Query Algorithm (SQA) which may be of independent interest. Informally, an SQA is said to use a small number of critical queries if its success relies on the accuracy of only a small number of queries it asks. We then design an LDP algorithm that uses a smaller number of critical queries. | cs |
2,312.02224 | Model Parsing defines the research task of predicting hyperparameters of the generative model (GM), given a generated image as input. Since a diverse set of hyperparameters is jointly employed by the generative model, and dependencies often exist among them, it is crucial to learn these hyperparameter dependencies for the improved model parsing performance. To explore such important dependencies, we propose a novel model parsing method called Learnable Graph Pooling Network (LGPN). Specifically, we transform model parsing into a graph node classification task, using graph nodes and edges to represent hyperparameters and their dependencies, respectively. Furthermore, LGPN incorporates a learnable pooling-unpooling mechanism tailored to model parsing, which adaptively learns hyperparameter dependencies of GMs used to generate the input image. We also extend our proposed method to CNN-generated image detection and coordinate attacks detection. Empirically, we achieve state-of-the-art results in model parsing and its extended applications, showing the effectiveness of our method. Our source code are available. | cs |
2,312.04161 | This paper presents the modeling and numerical analysis of the Kangaroo lower body prototype, a novel bipedal humanoid robot developed and manufactured by PAL Robotics. Kangaroo features high-power linear electric actuators combined with unique serial-parallel hybrid chains, which allow for the positioning of all the leg actuators near the base of the robot in order to improve the overall mass distribution. To model and analyze such complex nonlinear mechanisms, we employ a constrained formulation that is extended to account for floating-base systems in contact with the environment. A comparison is made to demonstrate the significant improvements achieved with TALOS, another humanoid bipedal robot designed by PAL Robotics, in terms of equivalent Cartesian inertia at the feet and centroidal angular momentum. Finally, the paper includes numerical experiments conducted through simulation and preliminary tests performed on the actual Kangaroo platform. | cs |
2,312.04424 | Synthesizing multi-view 3D from one single image is a significant and challenging task. For this goal, Zero-1-to-3 methods aim to extend a 2D latent diffusion model to the 3D scope. These approaches generate the target-view image with a single-view source image and the camera pose as condition information. However, the one-to-one manner adopted in Zero-1-to-3 incurs challenges for building geometric and visual consistency across views, especially for complex objects. We propose a cascade generation framework constructed with two Zero-1-to-3 models, named Cascade-Zero123, to tackle this issue, which progressively extracts 3D information from the source image. Specifically, a self-prompting mechanism is designed to generate several nearby views at first. These views are then fed into the second-stage model along with the source image as generation conditions. With self-prompted multiple views as the supplementary information, our Cascade-Zero123 generates more highly consistent novel-view images than Zero-1-to-3. The promotion is significant for various complex and challenging scenes, involving insects, humans, transparent objects, and stacked multiple objects etc. The project page is at . | cs |
2,312.02272 | We propose a method to prepare Gaussian wave packets with momentum on top of the interacting ground state of a fermionic Hamiltonian. Using Givens rotation, we show how to efficiently obtain expectation values of observables throughout the evolution of the wave packets on digital quantum computers. We demonstrate our technique by applying it to the staggered lattice formulation of the Thirring model and studying the scattering of two wave packets. Monitoring the the particle density and the entropy produced during the scattering process, we characterize the phenomenon and provide a first step towards studying more complicated collision processes on digital quantum computers. In addition, we perform a small-scale demonstration on IBM's quantum hardware, showing that our method is suitable for current and near-term quantum devices. | quant-ph |
2,312.03585 | This work aims to leverage pre-trained foundation models, such as contrastive language-image pre-training (CLIP) and segment anything model (SAM), to address weakly supervised semantic segmentation (WSSS) using image-level labels. To this end, we propose a coarse-to-fine framework based on CLIP and SAM for generating high-quality segmentation seeds. Specifically, we construct an image classification task and a seed segmentation task, which are jointly performed by CLIP with frozen weights and two sets of learnable task-specific prompts. A SAM-based seeding (SAMS) module is designed and applied to each task to produce either coarse or fine seed maps. Moreover, we design a multi-label contrastive loss supervised by image-level labels and a CAM activation loss supervised by the generated coarse seed map. These losses are used to learn the prompts, which are the only parts need to be learned in our framework. Once the prompts are learned, we input each image along with the learned segmentation-specific prompts into CLIP and the SAMS module to produce high-quality segmentation seeds. These seeds serve as pseudo labels to train an off-the-shelf segmentation network like other two-stage WSSS methods. Experiments show that our method achieves the state-of-the-art performance on PASCAL VOC 2012 and competitive results on MS COCO 2014. Code is available at . | cs |
2,312.04602 | The extremely large-scale massive multiple-input multiple-output (XL-MIMO) has the potential to achieve boosted spectral efficiency and refined spatial resolution for future wireless networks. However, channel estimation for XL-MIMO is challenging since the large number of antennas results in high computational complexity with the near-field effect. In this letter, we propose a low-complexity sequential angle-distance channel estimation (SADCE) method for near-field XL-MIMO systems equipped with uniformly planar arrays (UPA). Specifically, we first successfully decouple the angle and distance parameters, which allows us to devise a two-dimensional discrete Fourier transform (2D-DFT) method for angle parameters estimation. Then, a low-complexity distance estimation method is proposed with a closed-form solution. Compared with existing methods, the proposed method achieves significant performance gain with noticeably reduced computational complexity.Numerical results verify the superiority of the proposed near-field channel estimation algorithm. | cs |
2,312.06496 | We present the resummation of one-jettiness for the colour-singlet plus jet production process $p p \to ( \gamma^*/Z \to \ell^+ \ell^-) + {\text{jet}}$ at hadron colliders up to the fourth logarithmic order (N$^3$LL). This is the first resummation at this order for processes involving three coloured partons at the Born level. We match our resummation formula to the corresponding fixed-order predictions, extending the validity of our results to regions of the phase space where further hard emissions are present. This result paves the way for the construction of next-to-next-to-leading order simulations for colour-singlet plus jet production matched to parton showers in the GENEVA framework. | hep-ex |
2,312.02556 | Secure storage and sharing of patients' medical data over the Internet are part of the challenges for emerging healthcare systems. The use of blockchain technology in medical Internet of things systems can be considered a safe and novel solution to overcome such challenges. Patients with movement disorders require multi-disciplinary management and must continuously receive medical care from a specialist. Due to the increasing costs of face-to-face treatment, especially during the pandemic, patients would highly benefit from remote monitoring and management. The proposed work presents a model for blockchain-based remote management systems for patients with movement disorders, especially those with Parkinson's disease. The model ensures a high level of integrity and decreases the security risks of medical data sharing. | cs |
2,312.02357 | A minimal separating set in a connected topological space $X$ is a subset $L \subset X$ with the property that $X \setminus L$ is disconnected, but if $L^{\prime}$ is a proper subset of $L$, then $X \setminus L^{\prime}$ is connected. Such sets show up in a variety of contexts. For example, in a wide class of metric spaces, if we choose distinct points p and q, then the set of points x satisfying d(x, p) = d(x, q) is a minimal separating set. In this paper we classify which topological graphs can be realized as minimal separating sets in surfaces of low genus. In general the question of whether a graph can be embedded at all in a surface is a difficult one, so our work is partly computational. We classify graphs embeddings which are minimal separating in a given genus and write a computer program to find all such embeddings and their underlying graphs. | math |
2,312.04342 | Context: T CrB (NOVA CrB 1946) is a famous recurrent nova with a recurrence timescale of 80 years.
Aims: We aim to estimate the colours, luminosity, and mass-accretion rate for T CrB (NOVA CrB 1946) during and after the superactive state.
Methods and Results: We performed and analysed $UBV$ photometry of the recurrent nova T~CrB. For the hot component of T~CrB, we find average dereddened colours of $(U-B)_0 = -0.70 \pm 0.08$ and $(B-V)_0 = 0.23 \pm 0.06$, which correspond to an effective temperature of $9400 \pm 500$~K and an optical luminosity of $40-110~L_\odot$ during the superactive state (2016-2022). After the end of the superactive state, the hot component became significantly redder, $(U-B)_0 \approx -0.3$ and $(B-V)_0 \approx 0.6$ in August 2023, and its luminosity decreased markedly to $20-25$~$L_\odot$ in April-May 2023, and to $8-9~L_\odot$ in August 2023. The total mass accreted during the superactive state from 2014 to 2023 is $\sim 2 \times 10^{-7}$~M$_\odot$. This is a significant fraction of the mass required to cause a thermonuclear runaway (TNR). Overall our results support a model in which a large accretion disc acts as a reservoir with increased accretion rate onto the central white dwarf during disc high states, ultimately leading to a TNR explosion, which now seems to be imminent. | astro-ph |
2,312.06524 | In view of a better understanding of the geometry of scalar flat Kähler metrics, this paper studies two families of scalar flat Kähler metrics constructed in [10] by A. D. Hwang and M. A. Singer on $\mathbb C^{n+1}$ and on $\mathcal O(-k)$. For the metrics in both the families, we prove the existence of an asymptotic expansion for their $\epsilon$-functions and we show that they can be approximated by a sequence of projectively induced Kähler metrics. Further, we show that the metrics on $\mathbb C^{n+1}$ are not projectively induced, and that the Burns-Simanca metric is characterized among the scalar flat metrics on $\mathcal O(-k)$ to be the only projectively induced one as well as the only one whose second coefficient in the asymptotic expansion of the $\epsilon$-function vanishes. | math |
2,312.04973 | The success of Bayesian persuasion relies on the key assumption that the sender will commit to a predetermined information disclosure policy (signaling scheme). However, in practice, it is usually difficult for the receiver to monitor whether the sender sticks to the disclosure policy, which makes the credibility of the sender's disclosure policy questionable. The sender's credibility is particularly tenuous when there are obvious deviations that benefit the sender. In this work, we identify such a deviation: the sender may be unwilling to send a signal that will lead to a less desirable outcome compared to no information disclosure. We thus propose the notion of ex-post individually rational (ex-post IR) Bayesian persuasion: after observing the state, the sender is never required to send a signal that will make the outcome worse off (compared to no information disclosure). An ex-post IR Bayesian persuasion policy is more likely to be truthfully followed by the sender, and thus more credible for the receiver. Our contribution is threefold. Firstly, we demonstrate that the optimal ex-post IR Bayesian persuasion policy can be efficiently computed through a linear program, while also offering geometric characterizations of this optimal policy. Second, we show that surprisingly, for non-trivial classes of games, the imposition of ex-post IR constraints does not affect the sender's expected utility. Finally, we compare ex-post IR Bayesian persuasion to other information disclosure models that ensure different notions of credibility. | cs |
2,312.05025 | Beamforming is a powerful tool for physical layer security, as it can be used for steering signals towards legitimate receivers and away from eavesdroppers. An active eavesdropper, however, can interfere with the pilot phase that the transmitter needs to acquire the channel knowledge necessary for beamforming. By doing so, the eavesdropper can make the transmitter form beams towards the eavesdropper rather than towards the legitimate receiver. To mitigate active eavesdroppers, we propose VILLAIN, a novel channel estimator that uses secret pilots. When an eavesdropper interferes with the pilot phase, VILLAIN produces a channel estimate that is orthogonal to the eavesdropper's channel (in the noiseless case). We prove that beamforming based on this channel estimate delivers the highest possible signal power to the legitimate receiver without delivering any signal power to the eavesdropper. Simulations show that VILLAIN mitigates active eavesdroppers also in the noisy case. | math |
2,312.03279 | With the advance development in quantum science, constructing a large-scale quantum network has become a hot area of future quantum information technology. Future quantum networks promise to enable many fantastic applications and will unlock fundamentally new technologies in information security and large-scale computation. The future quantum internet is required to connect quantum information processors to achieve unparalleled capabilities in secret communication and enable quantum communication between any two points on Earth. However, the existing quantum networks are basically constructed to realize the communication between the end users in their own networks. How to bridge different independent networks to form a fully-connected quantum internet becomes a pressing challenge for future networks. Here, we demonstrate the quantum fusion of two independent networks for the first time based on multiuser entanglement swapping, to merge two 10-user networks into a larger network with 18 users in quantum correlation layer. By performing the Bell state measurement between two nonneighboring nodes, the users from different networks can establish entanglement and ultimately every pair of the 18 users are able to communicate with each other using the swapped states. Our approach opens attractive opportunities for the establishment of quantum entanglement between remote nodes in different networks, which facilitates versatile quantum information interconnects and has great application in constructing large-scale intercity quantum communication networks. | quant-ph |
2,312.02547 | The learning-augmented multi-option ski rental problem generalizes the classical ski rental problem in two ways: the algorithm is provided with a prediction on the number of days we can ski, and the ski rental options now come with a variety of rental periods and prices to choose from, unlike the classical two-option setting. Subsequent to the initial study of the multi-option ski rental problem (without learning augmentation) due to Zhang, Poon, and Xu, significant progress has been made for this problem recently in particular. The problem is very well understood when we relinquish one of the two generalizations -- for the learning-augmented classical ski rental problem, algorithms giving best-possible trade-off between consistency and robustness exist; for the multi-option ski rental problem without learning augmentation, deterministic/randomized algorithms giving the best-possible competitiveness have been found. However, in presence of both generalizations, there remained a huge gap between the algorithmic and impossibility results. In fact, for randomized algorithms, we did not have any nontrivial lower bounds on the consistency-robustness trade-off before.
This paper bridges this gap for both deterministic and randomized algorithms. For deterministic algorithms, we present a best-possible algorithm that completely matches the known lower bound. For randomized algorithms, we show the first nontrivial lower bound on the consistency-robustness trade-off, and also present an improved randomized algorithm. Our algorithm matches our lower bound on robustness within a factor of e/2 when the consistency is at most 1.086. | cs |
2,312.0322 | We prove that every finite dimensional unitary representation of $\mathrm{SL}_{4}(\mathbf{Z})$ contains an $\mathrm{SL}_{2}(\mathbf{Z})$-invariant vector. As a consequence, there is no sequence of finite-dimensional representations of $\mathrm{SL}_{4}(\mathbf{Z})$ that gives rise to an embedding of its reduced $C^*$-algebra into an ultraproduct of matrix algebras. | math |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.