id
float64 2.21k
2.31k
| content
stringlengths 78
1.92k
⌀ | category
stringclasses 8
values |
|---|---|---|
2,312.02954 |
The delensing of cosmic microwave background (CMB) maps will be increasingly valuable for extracting as much information as possible from future CMB surveys. Delensing provides many general benefits, including sharpening of the acoustic peaks, more accurate recovery of the damping tail, and reduction of lensing-induced $B$-mode power. In this paper we present several applications of delensing focused on testing theories of early-universe inflation with observations of the CMB. We find that delensing the CMB results in improved parameter constraints for reconstructing the spectrum of primordial curvature fluctuations, probing oscillatory features in the primordial curvature spectrum, measuring the spatial curvature of the universe, and constraining several different models of isocurvature perturbations. In some cases we find that delensing can recover almost all of the constraining power contained in unlensed spectra, and it will be a particularly valuable analysis technique to achieve further improvements in constraints for model parameters whose measurements are not expected to improve significantly when utilizing only lensed CMB maps from next-generation CMB surveys. We also quantify the prospects of testing the single-field inflation tensor consistency condition using delensed CMB data; we find it to be out of reach of current and proposed experimental technology and advocate for alternative detection methods.
|
astro-ph
|
2,312.05455 |
Let $X={\rm Spec}\: B$ be a factorial affine variety defined over an algebraically closed field $k$ of characteristic zero with a nontrivial action of the additive group $G_a$ associated to a locally nilpotent derivation $\delta$ on $B$. Suppose that $A={\rm Ker}\: \delta$ is an affine $k$-domain. The quotient morphism $\pi : X \to Y={\rm \Spec}\: A$ splits to a composite ${\rm pr} \circ p$ of the projection ${\rm pr} : Y\times \mathbb A^1 \to Y$ and a $G_a$-equivariant birational morphism $p : X \to Y\times \mathbb A^1$ where $G_a$ acts on $\mathbb A^1$ by translation. In this article, we study $X$ of dimension $\ge 3$ under the assumption that the plinth ideal $\delta(B)\cap A$ is a principal ideal generated by a non-unit element $a$ of $A$. By decomposing $p : X \to Y\times \mathbb A^1$ to a sequence of $G_a$-equivariant affine modifications, we investigate the structure of $X$. We show in algebraic way that the general closed fiber of $\pi$ over the closed set $V(a)$ of $Y$ consists of a disjoint union of affine lines. The $G_a$-action on $X$ and the fixed-point locus $X^{G_a}$ are studied with particular interest.
|
math
|
2,312.05953 |
Deep learning in medical imaging often requires large-scale, high-quality data or initiation with suitably pre-trained weights. However, medical datasets are limited by data availability, domain-specific knowledge, and privacy concerns, and the creation of large and diverse radiologic databases like RadImageNet is highly resource-intensive. To address these limitations, we introduce RadImageGAN, the first multi-modal radiologic data generator, which was developed by training StyleGAN-XL on the real RadImageNet dataset of 102,774 patients. RadImageGAN can generate high-resolution synthetic medical imaging datasets across 12 anatomical regions and 130 pathological classes in 3 modalities. Furthermore, we demonstrate that RadImageGAN generators can be utilized with BigDatasetGAN to generate multi-class pixel-wise annotated paired synthetic images and masks for diverse downstream segmentation tasks with minimal manual annotation. We showed that using synthetic auto-labeled data from RadImageGAN can significantly improve performance on four diverse downstream segmentation datasets by augmenting real training data and/or developing pre-trained weights for fine-tuning. This shows that RadImageGAN combined with BigDatasetGAN can improve model performance and address data scarcity while reducing the resources needed for annotations for segmentation tasks.
|
cs
|
2,312.02451 |
Quantum variational algorithms have been one of major applications of quantum computing with current quantum devices. There are recent attempts to establish the foundation for these algorithms. A possible approach is to characterize the training dynamics with quantum neural tangent kernel. In this work, we construct the kernel for two models, Quantun Ensemble and Quantum Neural Network, and show the convergence of these models in the limit of infinitely many qubits. We also show applications of the kernel limit in regression tasks.
|
quant-ph
|
2,312.05492 |
Error-bounded lossy compression is a critical technique for significantly reducing scientific data volumes. Compared to CPU-based scientific compressors, GPU-accelerated compressors exhibit substantially higher throughputs, which can thus better adapt to GPU-based scientific simulation applications. However, a critical limitation still lies in all existing GPU-accelerated error-bounded lossy compressors: they suffer from low compression ratios, which strictly restricts their scope of usage. To address this limitation, in this paper, we propose a new design of GPU-accelerated scientific error-bounded lossy compressor, namely cuSZ-I, which has achieved the following contributions: (1) A brand new GPU-customized interpolation-based data pre-diction method is raised in cuSZ-I for extensively improving the compression ratio and the decompression data quality. (2) The Huffman encoding module in cuSZ-I has been improved for both efficiency and stability. (3) cuSZ-I is the first work to integrate the highly effective NVIDIA bitcomp lossless compression module to maximally boost the compression ratio for GPU-accelerated lossy compressors with nearly negligible speed degradation. In experimental evaluations, with the same magnitude of compression throughput as existing GPU-accelerated compressors, in terms of compression ratio and quality, cuSZ-I outperforms other state-of-the-art GPU-based scientific lossy compressors to a significant extent. It gains compression ratio improvements by up to 500% under the same error bound or PSNR. In several real-world use cases, cuSZ-I also achieves the optimized performance, having the minimized time cost for distributed lossy data transmission tasks and the highest decompression data visualization quality.
|
cs
|
2,312.03371 |
Multivariate signals, which are measured simultaneously over time and acquired by sensor networks, are becoming increasingly common. The emerging field of graph signal processing (GSP) promises to analyse spectral characteristics of these multivariate signals, while at the same time taking the spatial structure between the time signals into account. A central idea in GSP is the graph Fourier transform, which projects a multivariate signal onto frequency-ordered graph Fourier modes, and can therefore be regarded as a spatial analog of the temporal Fourier transform. This chapter derives and discusses key concepts in GSP, with a specific focus on how the various concepts relate to one another. The experimental section focuses on the role of graph frequency in data classification, with applications to neuroimaging. To address the limited sample size of neurophysiological datasets, we introduce a minimalist simulation framework that can generate arbitrary amounts of data. Using this artificial data, we find that lower graph frequency signals are less suitable for classifying neurophysiological data as compared to higher graph frequency signals. Finally, we introduce a baseline testing framework for GSP. Employing this framework, our results suggest that GSP applications may attenuate spectral characteristics in the signals, highlighting current limitations of GSP for neuroimaging.
|
eess
|
2,312.05993 |
This paper presents a novel algorithm that leverages Stochastic Gradient Descent strategies in conjunction with Random Features to augment the scalability of Conic Particle Gradient Descent (CPGD) specifically tailored for solving sparse optimisation problems on measures. By formulating the CPGD steps within a variational framework, we provide rigorous mathematical proofs demonstrating the following key findings: (i) The total variation norms of the solution measures along the descent trajectory remain bounded, ensuring stability and preventing undesirable divergence; (ii) We establish a global convergence guarantee with a convergence rate of $\mathcal{O}(\log(K)/\sqrt{K})$ over $K$ iterations, showcasing the efficiency and effectiveness of our algorithm; (iii) Additionally, we analyze and establish local control over the first-order condition discrepancy, contributing to a deeper understanding of the algorithm's behavior and reliability in practical applications.
|
stat
|
2,312.03062 |
Trace-free Einstein gravity is a theory of gravity that is an alternative to general relativity, wherein the cosmological constant arises as an integration constant. However, there are no fully diffeomorphism-invariant action principles available that lead to the equations of motion of this theory. Unimodular gravity comes close to this idea, but it relies on action principles that are invariant only under volume-preserving diffeomorphisms. We present a real $BF$-type action principle for trace-free Einstein gravity that is fully diffeomorphism-invariant and does not require any unimodular condition or nondynamical fields. We generalize this action principle by giving another one involving a free parameter.
|
math
|
2,312.05704 |
The inherent limitations in scaling up ground infrastructure for future wireless networks, combined with decreasing operational costs of aerial and space networks, are driving considerable research interest in multisegment ground-air-space (GAS) networks. In GAS networks, where ground and aerial users share network resources, ubiquitous and accurate user localization becomes indispensable, not only as an end-user service but also as an enabler for location-aware communications. This breaks the convention of having localization as a byproduct in networks primarily designed for communications. To address these imperative localization needs, the design and utilization of ground, aerial, and space anchors require thorough investigation. In this tutorial, we provide an in-depth systemic analysis of the radio localization problem in GAS networks, considering ground and aerial users as targets to be localized. Starting from a survey of the most relevant works, we then define the key characteristics of anchors and targets in GAS networks. Subsequently, we detail localization fundamentals in GAS networks, considering 3D positions and orientations. Afterward, we thoroughly analyze radio localization systems in GAS networks, detailing the system model, design aspects, and considerations for each of the three GAS anchors. Preliminary results are presented to provide a quantifiable perspective on key design aspects in GAS-based localization scenarios. We then identify the vital roles 6G enablers are expected to play in radio localization in GAS networks.
|
eess
|
2,312.06651 |
This paper is the first part of the series "Spherical higher order Fourier analysis over finite fields", aiming to develop the higher order Fourier analysis method along spheres over finite fields, and to solve the geometric Ramsey conjecture in the finite field setting.
In this paper, we prove a quantitative equidistribution theorem for polynomial sequences in a nilmanifold, where the average is taken along spheres instead of cubes. To be more precise, let $\Omega\subseteq\mathbb{F}_{p}^{d}$ be a sphere. We showed that if a polynomial sequence $(g(n)\Gamma)_{n\in\Omega}$ which is $p$-periodic along $\Omega$ is not equidistributed on a nilmanifold $G/\Gamma$, then there exists a nontrivial horizontal character $\eta$ of $G/\Gamma$ such that $\eta\circ g \mod \mathbb{Z}$ vanishes on $\Omega$. This result will serve as a fundamental tool in later parts of the series to proof the spherical Gowers inverse theorem and the geometric Ramsey conjecture.
|
math
|
2,312.05623 |
Prior works have analyzed the performance of millimeter wave automotive radars in the presence of diverse clutter and interference scenarios using stochastic geometry tools instead of more time-consuming measurement studies or system-level simulations. In these works, the distributions of radars or discrete clutter scatterers were modeled as Poisson point processes in the Euclidean space. However, since most automotive radars are likely to be mounted on vehicles and road infrastructure, road geometries are an important factor that must be considered. Instead of considering each road geometry as an individual case for study, in this work, we model each case as a specific instance of an underlying Poisson line process and further model the distribution of vehicles on the road as a Poisson point process - forming a Poisson line Cox process. Then, through the use of stochastic geometry tools, we estimate the average number of interfering radars for specific road and vehicular densities and the effect of radar parameters such as noise and beamwidth on the radar detection metrics. The numerical results are validated with Monte Carlo simulations.
|
cs
|
2,312.03563 |
We show that w.h.p the chromatic number $\chi$ of the square of $G_{n,p},p=c/n$ is asymptotically equal to the maximum degree $\Delta(G_{n,p})$. This improves an earlier result of Garapaty et al \cite{KLMP} who proved that $\chi(G^2_{n,p})=\Theta \left(\Delta(G_{n,p})\right)$.
|
math
|
2,312.05614 |
We propose expanding the shared Transformer module to produce and initialize Transformers with diverse depths, enabling adaptation to dynamic resource constraints. Drawing an analogy to genetic expansibility, we term such module as learngene. To identify the expansion mechanism, we delve into the relationship between the layer position and its corresponding weight value, and find that linear function appropriately approximates this relationship. Building on this insight, we present Transformer as Linear Expansion of learnGene (TLEG), a novel approach for flexibly producing and initializing Transformers of diverse depths. Specifically, to learn learngene, we firstly construct an auxiliary Transformer linearly expanded from learngene, after which we train it through employing soft distillation. Subsequently, we can produce and initialize Transformers of varying depths via linearly expanding the well-trained learngene, thereby supporting diverse downstream scenarios. Extensive experiments on ImageNet-1K classification demonstrate that TLEG achieves comparable or better performance compared to many individual models trained from scratch, while reducing around 2$\times$ training cost. When transferring one model to several downstream classification datasets, TLEG surpasses existing initialization methods by a large margin (e.g., +6.87% on iNat 2019 and +7.66% on CIFAR-100). Under the situation where we need to produce models of different scales adapting for different resource constraints, TLEG achieves comparable results while reducing around 19$\times$ parameters stored to initialize these models and around 5$\times$ training costs, in contrast to the pre-training and fine-tuning approach.
|
cs
|
2,312.03361 |
Being aware of important news is crucial for staying informed and making well-informed decisions efficiently. Natural Language Processing (NLP) approaches can significantly automate this process. This paper introduces the detection of important news, in a previously unexplored area, and presents a new benchmarking dataset (Khabarchin) for detecting important news in the Persian language. We define important news articles as those deemed significant for a considerable portion of society, capable of influencing their mindset or decision-making. The news articles are obtained from seven different prominent Persian news agencies, resulting in the annotation of 7,869 samples and the creation of the dataset. Two challenges of high disagreement and imbalance between classes were faced, and solutions were provided for them. We also propose several learning-based models, ranging from conventional machine learning to state-of-the-art transformer models, to tackle this task. Furthermore, we introduce the second task of important sentence detection in news articles, as they often come with a significant contextual length that makes it challenging for readers to identify important information. We identify these sentences in a weakly supervised manner.
|
cs
|
2,312.06247 |
We present the first deep (72 hours of observations) radio image of the Euclid Deep Field North (EDFN) obtained with the LOw-Frequency ARray (LOFAR) High Band Antenna (HBA) at 144 MHz. The EDFN is the latest addition to the LOFAR Two-Metre Sky Survey (LoTSS) Deep Fields and these observations represent the first data release for this field. The observations produced a 6" resolution image with a central r.m.s. noise of $32\,\mu$Jy\,beam$^{-1}$. A catalogue of $\sim 23,000$ radio sources above a signal-to-noise ratio (SNR) threshold of 5 is extracted from the inner circular 10 deg$^2$ region. We discuss the data analysis and we provide a detailed description of how we derived the catalogue of radio sources and on the issues related to direction-dependent calibration and their effects on the final products. Finally, we derive the radio source counts at 144 MHz in the EDFN using catalogues of mock radio sources to derive the completeness correction factors. The source counts in the EDFN are consistent with those obtained from the first data release of the other LoTSS Deep Fields (ELAIS-N1, Lockman Hole and Bootes), despite the different method adopted to construct the final catalogue and to assess its completeness.
|
astro-ph
|
2,312.06114 |
We observe that the time averaged continuous Price equation is identical to the positive momentum virial theorem, and we discuss the applications and implications of this connection.
|
q-bio
|
2,312.04435 |
This work aims to investigate the problem of 3D modeling using single free-hand sketches, which is one of the most natural ways we humans express ideas. Although sketch-based 3D modeling can drastically make the 3D modeling process more accessible, the sparsity and ambiguity of sketches bring significant challenges for creating high-fidelity 3D models that reflect the creators' ideas. In this work, we propose a view- and structural-aware deep learning approach, \textit{Deep3DSketch}, which tackles the ambiguity and fully uses sparse information of sketches, emphasizing the structural information. Specifically, we introduced random pose sampling on both 3D shapes and 2D silhouettes, and an adversarial training scheme with an effective progressive discriminator to facilitate learning of the shape structures. Extensive experiments demonstrated the effectiveness of our approach, which outperforms existing methods -- with state-of-the-art (SOTA) performance on both synthetic and real datasets.
|
cs
|
2,312.05131 |
In this paper, we revisit the experimental constraints on the multipolar dark matter that has derivative coupling to the visible sector mediated by the Standard Model photon. The momentum dependent interaction enables them to be captured efficiently within massive celestial bodies boosted by their steep gravitational potential. This phenomena makes compact celestial bodies as an efficient target to probe such type of dark matter candidates. We demonstrate that a synergy of the updated direct detection results from DarkSide-50 and LUX-ZEPLIN together with IceCube bounds on high energy solar neutrinos from dark matter capture disfavour the viable parameter space of the dipolar dark matter scenario. Whereas, for the anapole dark matter scenario, a narrow window survives that lies within the reach of prospective heating signals due to the capture of dark matter at cold neutron stars.
|
hep-ex
|
2,312.06185 |
Generative Large Language Models (LLMs), such as ChatGPT, offer interactive APIs that can answer common questions at a human-expert level. However, these models often give inaccurate or incorrect responses when faced with questions requiring domain-specific or professional-specific knowledge not covered in their training corpus. Furthermore, many state-of-the-art LLMs are not open-source, making it challenging to inject knowledge with model APIs only. In this work, we introduce KnowGPT, a black-box knowledge injection framework for LLMs in question answering. KnowGPT leverages deep reinforcement learning (RL) to extract relevant knowledge from Knowledge Graphs (KGs) and use Multi-Armed Bandit (MAB) to construct the most suitable prompt for each question. Our extensive experiments on three benchmark datasets showcase that KnowGPT significantly enhances the existing methods. Notably, KnowGPT achieves an average improvement of 23.7% over ChatGPT and an average improvement of 2.9% over GPT-4. Additionally, KnowGPT attains a 91.6% accuracy on the OpenbookQA official leaderboard, which is comparable to human-level performance.
|
cs
|
2,312.04999 |
The Rauzy gasket is the attractor of a parabolic, nonconformal iterated function system on the projective plane which describes an exceptional parameter set in various important topological and dynamical problems. Since 2009 there have been several attempts to calculate the Hausdorff dimension of the Rauzy gasket, which is a challenging problem due to the combination of the parabolicity and nonconformality in the geometry. In this paper we settle this question by proving that the Hausdorff dimension of the Rauzy gasket equals the (projective) affinity dimension. The key technical result underpinning this is a partial generalisation of work of Hochman and Solomyak to the $\mathrm{SL}_3(\mathbb{R})$ setting, where we establish the exact dimension of stationary (Furstenberg) measures supported on the Rauzy gasket. The dimension results for both stationary measures and attractors are established in broader generality and extend recent work on projective iterated function systems to higher dimensions.
|
math
|
2,312.03816 |
Recent advances in diffusion models have successfully enabled text-guided image inpainting. While it seems straightforward to extend such editing capability into video domain, there has been fewer works regarding text-guided video inpainting. Given a video, a masked region at its initial frame, and an editing prompt, it requires a model to do infilling at each frame following the editing guidance while keeping the out-of-mask region intact. There are three main challenges in text-guided video inpainting: ($i$) temporal consistency of the edited video, ($ii$) supporting different inpainting types at different structural fidelity level, and ($iii$) dealing with variable video length. To address these challenges, we introduce Any-Length Video Inpainting with Diffusion Model, dubbed as AVID. At its core, our model is equipped with effective motion modules and adjustable structure guidance, for fixed-length video inpainting. Building on top of that, we propose a novel Temporal MultiDiffusion sampling pipeline with an middle-frame attention guidance mechanism, facilitating the generation of videos with any desired duration. Our comprehensive experiments show our model can robustly deal with various inpainting types at different video duration range, with high quality. More visualization results is made publicly available at .
|
cs
|
2,312.02572 |
Query optimizers built on the transformation-based Volcano/Cascades framework are used in many database systems. Transformations proposed earlier on the logical query dag (LQDAG) data structure, which is key in such a framework, focus only on recursion-free queries. In this paper, we propose the recursive logical query dag (RLQDAG) which extends the LQDAG with the ability to capture and transform recursive queries, leveraging recent developments in recursive relational algebra. Specifically, this extension includes: (i) the ability of capturing and transforming sets of recursive relational terms thanks to (ii) annotated equivalence nodes used for guiding transformations that are more complex in the presence of recursion; and (iii) RLQDAG rewrite rules that transform sets of subterms in a grouped manner, instead of transforming individual terms in a sequential manner; and that (iv) incrementally update the necessary annotations. Core concepts of the RLQDAG are formalized using a syntax and formal semantics with a particular focus on subterm sharing and recursion. The result is a clean generalization of the LQDAG transformation-based approach, enabling more efficient explorations of plan spaces for recursive queries. An implementation of the proposed approach shows significant performance gains compared to the state-of-the-art.
|
cs
|
2,312.05054 |
KASCADE-Grande, the extension of the multi-detector setup of KASCADE, was devoted to measure the properties of extensive air showers initiated by high-energy cosmic rays in the primary energy range of 1 PeV up to 1 EeV. The observations of the energy spectrum and mass composition of cosmic rays contribute with great detail to the understanding of the transition from galactic to extragalactic origin of cosmic rays, and furthermore to validate the properties of hadronic interaction models in the air shower development. Although the experiment is fully dismantled, the analysis of the entire KASCADE-Grande data set continues. We have recently investigated the impact of different post-LHC hadronic interaction models, QGSJETII-04, EPOS-LHC, Sibyll 2.3d, on air shower predictions in terms of the reconstructed spectra of heavy and light primary masses, including systematic uncertainties. In addition, the conversely discussed evolution of the muon content of high-energy air showers in the atmosphere is compared with the predictions of different interaction models. In this contribution, the latest results from the KASCADE-Grande measurements will be discussed.
|
astro-ph
|
2,312.066 |
We propose a non-linear state-space model to examine the relationship between CO$_2$ emissions, energy sources, and macroeconomic activity, using data from 1971 to 2019. CO$_2$ emissions are modeled as a weighted sum of fossil fuel use, with emission conversion factors that evolve over time to reflect technological changes. GDP is expressed as the outcome of linearly increasing energy efficiency and total energy consumption. The model is estimated using CO$_2$ data from the Global Carbon Budget, GDP statistics from the World Bank, and energy data from the International Energy Agency (IEA). Projections for CO$_2$ emissions and GDP from 2020 to 2100 from the model are based on energy scenarios from the Shared Socioeconomic Pathways (SSP) and the IEA's Net Zero roadmap. Emissions projections from the model are consistent with these scenarios but predict lower GDP growth. An alternative model version, assuming exponential energy efficiency improvement, produces GDP growth rates more in line with the benchmark projections. Our results imply that if internationally agreed net-zero objectives are to be fulfilled and economic growth is to follow SSP or IEA scenarios, then drastic changes in energy efficiency, not consistent with historical trends, are needed.
|
stat
|
2,312.05892 |
A known source of decoherence in superconducting qubits is the presence of broken Cooper pairs, or quasiparticles. These can be generated by high-energy radiation, either present in the environment or purposefully introduced, as in the case of some hybrid quantum devices. Here, we systematically study the properties of a transmon qubit under illumination by focused infrared radiation with various powers, durations, and spatial locations. Despite the high energy of incident photons, our observations agree well with a model of low-energy quasiparticle dynamics dominated by trapping. This technique can be used for understanding and potentially mitigating the effects of high-energy radiation on superconducting circuits with a variety of geometries and materials.
|
quant-ph
|
2,312.0382 |
We present a new formalism to solve the kinematical constraints due to Weyl invariance for CFTs in curved backgrounds and/or non-trivial states, and we apply it to thermal CFTs and to CFTs on squashed spheres. The ambient space formalism is based on constructing a class of geometric objects that are Weyl covariant and identifying them as natural building blocks of correlation functions. We construct (scalar) $n$-point functions and we illustrate the formalism with a detailed computation of 2-point functions. We compare our results for thermal 2-point functions with results that follow from thermal OPEs and holographic computations, finding exact agreement. In our holographic computation we also obtain the OPE coefficient of the leading double-twist contribution, and we discuss how the double-twist coefficients may be computed from the multi-energy-momentum contributions, given knowledge of the analytic structure of the correlator. The 2-point function for the CFT on squashed spheres is a new result. We also discuss the relation of our work to flat holography.
|
math
|
2,312.05398 |
The traditional role of the network layer is the transfer of packet replicas from source to destination through intermediate network nodes. We present a generative network layer that uses Generative AI (GenAI) at intermediate or edge network nodes and analyze its impact on the required data rates in the network. We conduct a case study where the GenAI-aided nodes generate images from prompts that consist of substantially compressed latent representations. The results from network flow analyses under image quality constraints show that the generative network layer can achieve an improvement of more than 100% in terms of the required data rate.
|
math
|
2,312.03636 |
In evolving cyber landscapes, the detection of malicious URLs calls for cooperation and knowledge sharing across domains. However, collaboration is often hindered by concerns over privacy and business sensitivities. Federated learning addresses these issues by enabling multi-clients collaboration without direct data exchange. Unfortunately, if highly expressive Transformer models are used, clients may face intolerable computational burdens, and the exchange of weights could quickly deplete network bandwidth. In this paper, we propose Fed-urlBERT, a federated URL pre-trained model designed to address both privacy concerns and the need for cross-domain collaboration in cybersecurity. Fed-urlBERT leverages split learning to divide the pre-training model into client and server part, so that the client part takes up less extensive computation resources and bandwidth. Our appraoch achieves performance comparable to centralized model under both independently and identically distributed (IID) and two non-IID data scenarios. Significantly, our federated model shows about an 7% decrease in the FPR compared to the centralized model. Additionally, we implement an adaptive local aggregation strategy that mitigates heterogeneity among clients, demonstrating promising performance improvements. Overall, our study validates the applicability of the proposed Transformer federated learning for URL threat analysis, establishing a foundation for real-world collaborative cybersecurity efforts. The source code is accessible at .
|
cs
|
2,312.03576 |
DC shipboard microgrids (SMGs) are highly dynamic systems susceptible to failure due to various cyber-physical disturbances, such as extreme weather and mission operations during wartime. In this paper, the real-time operational resilience (OR) evaluation of DC SMGs against dynamic disturbances is proposed using frequency-domain metrics. To this end, first the drawbacks of time-domain OR evaluation using an energy imbalance index is discussed. As the time-domain energy imbalance index is shown to be incapable of real-time OR assessment, particularly in the context of droop-controlled DC SMGs without secondary voltage restoration control, the $\mathcal{H}_2$ and $\mathcal{H_\infty}$ norms of candidate transfer functions (TFs) of the system are proposed as measures of resilience. It is shown that the proposed norms calculated for the bus impedance TF of the system provides intuitive results in terms of energy imbalance and can be computed in real time. The case studies conducted for the study DC SMG under pulsed power load (PPL) disturbances demonstrate the shortcoming of the time-domain OR evaluation and the capability of the proposed frequency-domain metrics in intuitive OR evaluation of DC SMGs.
|
cs
|
2,312.04584 |
Currently, sample-specific backdoor attacks (SSBAs) are the most advanced and malicious methods since they can easily circumvent most of the current backdoor defenses. In this paper, we reveal that SSBAs are not sufficiently stealthy due to their poisoned-label nature, where users can discover anomalies if they check the image-label relationship. In particular, we demonstrate that it is ineffective to directly generalize existing SSBAs to their clean-label variants by poisoning samples solely from the target class. We reveal that it is primarily due to two reasons, including \textbf{(1)} the `antagonistic effects' of ground-truth features and \textbf{(2)} the learning difficulty of sample-specific features. Accordingly, trigger-related features of existing SSBAs cannot be effectively learned under the clean-label setting due to their mild trigger intensity required for ensuring stealthiness. We argue that the intensity constraint of existing SSBAs is mostly because their trigger patterns are `content-irrelevant' and therefore act as `noises' for both humans and DNNs. Motivated by this understanding, we propose to exploit content-relevant features, $a.k.a.$ (human-relied) attributes, as the trigger patterns to design clean-label SSBAs. This new attack paradigm is dubbed backdoor attack with attribute trigger (BAAT). Extensive experiments are conducted on benchmark datasets, which verify the effectiveness of our BAAT and its resistance to existing defenses.
|
cs
|
2,312.04166 |
As an emerging federated learning paradigm, federated distillation enables communication-efficient model training by transmitting only small-scale knowledge during the learning process. To further improve the communication efficiency of federated distillation, we propose a novel technique, ALU, which accumulates multiple rounds of local updates before transferring the knowledge to the central server. ALU drastically decreases the frequency of communication in federated distillation, thereby significantly reducing the communication overhead during the training process. Empirical experiments demonstrate the substantial effect of ALU in improving the communication efficiency of federated distillation.
|
cs
|
2,312.02508 |
We propose and develop a theory of Ferrers diagrams and their $q$-rook polynomials solely based on their diagonals. We show that the cardinalities of the diagonals of a Ferrers diagram are equivalent information to their rook numbers, $q$-rook polynomials, and the rank distribution of matrices supported on the diagram. Our approach is based on the concept of \textit{canonical form} of a Ferrers diagrams, and on two simple diagram operations as the main proof tools. In the second part of the paper we develop the same theory for symmetric Ferrers diagrams, considering symmetric and alternating matrices supported on them. As an application of our results, we establish some combinatorial identities linking symmetric and alternating matrices, which do not appear to have an obvious bijective proof, and which generalize some curious results in enumerative combinatorics.
|
math
|
2,312.05528 |
In 2023, it is estimated that 81,800 kidney cancer cases will be newly diagnosed, and 14,890 people will die from this cancer in the United States. Preoperative dynamic contrast-enhanced abdominal computed tomography (CT) is often used for detecting lesions. However, there exists inter-observer variability due to subtle differences in the imaging features of kidney and kidney tumors. In this paper, we explore various 3D U-Net training configurations and effective post-processing strategies for accurate segmentation of kidneys, cysts, and kidney tumors in CT images. We validated our model on the dataset of the 2023 Kidney and Kidney Tumor Segmentation (KiTS23) challenge. Our method took second place in the final ranking of the KiTS23 challenge on unseen test data with an average Dice score of 0.820 and an average Surface Dice of 0.712.
|
cs
|
2,312.03102 |
In magnetic resonance imaging (MRI), slice-to-volume reconstruction (SVR) refers to computational reconstruction of an unknown 3D magnetic resonance volume from stacks of 2D slices corrupted by motion. While promising, current SVR methods require multiple slice stacks for accurate 3D reconstruction, leading to long scans and limiting their use in time-sensitive applications such as fetal fMRI. Here, we propose a SVR method that overcomes the shortcomings of previous work and produces state-of-the-art reconstructions in the presence of extreme inter-slice motion. Inspired by the recent success of single-view depth estimation methods, we formulate SVR as a single-stack motion estimation task and train a fully convolutional network to predict a motion stack for a given slice stack, producing a 3D reconstruction as a byproduct of the predicted motion. Extensive experiments on the SVR of adult and fetal brains demonstrate that our fully convolutional method is twice as accurate as previous SVR methods. Our code is available at .
|
cs
|
2,312.03133 |
Bone degradation, especially for astronauts in microgravity conditions, is crucial for space exploration missions since the lower applied external forces accelerate the diminution in bone stiffness and strength substantially. Although existing computational models help us understand this phenomenon and possibly restrict its effect in the future, they are time-consuming to simulate the changes in the bones, not just the bone microstructures, of each individual in detail. In this study, a robust yet fast computational method to predict and visualize bone degradation has been developed. Our deep-learning method, TransVNet, can take in different 3D voxelized images and predict their evolution throughout months utilizing a hybrid 3D-CNN-VisionTransformer autoencoder architecture. Because of limited available experimental data and challenges of obtaining new samples, a digital twin dataset of diverse and initial bone-like microstructures was generated to train our TransVNet on the evolution of the 3D images through a previously developed degradation model for microgravity.
|
eess
|
2,312.05195 |
Typically, machine learning models are trained and evaluated without making any distinction between users (e.g, using traditional hold-out and cross-validation). However, this produces inaccurate performance metrics estimates in multi-user settings. That is, situations where the data were collected by multiple users with different characteristics (e.g., age, gender, height, etc.) which is very common in user computer interaction and medical applications. For these types of scenarios model evaluation strategies that provide better performance estimates have been proposed such as mixed, user-independent, user-dependent, and user-adaptive models. Although those strategies are better suited for multi-user systems, they are typically assessed with respect to performance metrics that capture the overall behavior of the models and do not provide any performance guarantees for individual predictions nor they provide any feedback about the predictions' uncertainty. In order to overcome those limitations, in this work we evaluated the conformal prediction framework in several multi-user settings. Conformal prediction is a model agnostic method that provides confidence guarantees on the predictions, thus, increasing the trustworthiness and robustness of the models. We conducted extensive experiments using different evaluation strategies and found significant differences in terms of conformal performance measures. We also proposed several visualizations based on matrices, graphs, and charts that capture different aspects of the resulting prediction sets.
|
cs
|
2,312.05531 |
The ability to modify and extend an operating system is an important feature for improving a system's security, reliability, and performance. The extended Berkeley Packet Filters (eBPF) ecosystem has emerged as the standard mechanism for extending the Linux kernel and has recently been ported to Windows. eBPF programs inject new logic into the kernel that the system will execute before or after existing logic. While the eBPF ecosystem provides a flexible mechanism for kernel extension, it is difficult for developers to write eBPF programs today. An eBPF developer must have deep knowledge of the internals of the operating system to determine where to place logic and cope with programming limitations on the control flow and data accesses of their eBPF program enforced by the eBPF verifier. This paper presents KEN, an alternative framework that alleviates the difficulty of writing an eBPF program by allowing Kernel Extensions to be written in Natural language. KEN uses recent advances in large language models (LLMs) to synthesize an eBPF program given a user's English language prompt. To ensure that LLM's output is semantically equivalent to the user's prompt, KEN employs a combination of LLM-empowered program comprehension, symbolic execution, and a series of feedback loops. KEN's key novelty is the combination of these techniques. In particular, the system uses symbolic execution in a novel structure that allows it to combine the results of program synthesis and program comprehension and build on the recent success that LLMs have shown for each of these tasks individually. To evaluate KEN, we developed a new corpus of natural language prompts for eBPF programs. We show that KEN produces correct eBPF programs on 80% which is an improvement of a factor of 2.67 compared to an LLM-empowered program synthesis baseline.
|
cs
|
2,312.05532 |
Kinematical and morphological features observed in early-type galaxies provide valuable insights into the evolution of their hosts. We studied the origin of prolate rotation (i.e., rotation around the long axis) in Illustris large-scale cosmological hydrodynamical simulations. We found that basically all the simulated massive prolate rotators were created in relatively recent major mergers of galaxies. Such mergers are expected to produce tidal features such as tails, shells, asymmetric stellar halos. We investigated deep optical images of prolate rotators, including newly obtained Milanković data, revealing signs of galaxy interaction in all of them. This correlation proves to be statistically very significant when compared with a general sample of early-type galaxies from the MATLAS deep imaging survey. In an ongoing project, we use Milanković to assemble deep images of the complete sample of all known nearby massive prolate rotators. Additionally, we searched these data for asteroids to improve the accuracy of trajectories and even discover one previously unknown main-belt asteroid. The most frequent tidal features among the prolate rotators happen to be shells. We developed methods to calculate the probable time of the merger from optical images. This will allow us to compare the merger history of the sample with predictions from Illustris. Our plan is to expand these methods to even larger samples of shell galaxies supplied by upcoming large surveys like LSST at Rubin Observatory. This will provide an unprecedented amount of statistically significant data on the recent merger history of our Universe and allow extensive investigation of the impact of mergers to a wide range of other astrophysical phenomena.
|
astro-ph
|
2,312.06019 |
A Lorentz-covariant system of wave equations is formulated for a quantum-mechanical three-body system in one space dimension, comprised of one photon and two identical massive spin one-half Dirac particles, which can be thought of as two electrons (or alternatively, two positrons). Manifest covariance is achieved using Dirac's formalism of multi-time wave functions, i.e, wave functions $\Psi(\textbf{x}_{\text{ph}},\textbf{x}_{\text{e}_1},\textbf{x}_{\text{e}_2})$ where $\textbf{x}_{\text{ph}},\textbf{x}_{\text{e}_1},\textbf{x}_{\text{e}_2}$ are generic spacetime events of the photon and two electrons respectively. Their interaction is implemented via a Lorentz-invariant no-crossing-of-paths boundary condition at the coincidence submanifolds $\{\textbf{x}_{\text{ph}}=\textbf{x}_{\text{e}_1}\}$ and $\{\textbf{x}_{\text{ph}}=\textbf{x}_{\text{e}_2}\}$ compatible with conservation of probability current. The corresponding initial-boundary value problem is shown to be well-posed under the additional assumption of anti-symmetry given by the Pauli exclusion principle, and a closed-form solution to the ensuing coupled system of Klein-Gordon and transport equations is given.
|
quant-ph
|
2,312.04964 |
The long-tailed distribution problem in medical image analysis reflects a high prevalence of common conditions and a low prevalence of rare ones, which poses a significant challenge in developing a unified model capable of identifying rare or novel tumor categories not encountered during training. In this paper, we propose a new zero-shot pan-tumor segmentation framework (ZePT) based on query-disentangling and self-prompting to segment unseen tumor categories beyond the training set. ZePT disentangles the object queries into two subsets and trains them in two stages. Initially, it learns a set of fundamental queries for organ segmentation through an object-aware feature grouping strategy, which gathers organ-level visual features. Subsequently, it refines the other set of advanced queries that focus on the auto-generated visual prompts for unseen tumor segmentation. Moreover, we introduce query-knowledge alignment at the feature level to enhance each query's discriminative representation and generalizability. Extensive experiments on various tumor segmentation tasks demonstrate the performance superiority of ZePT, which surpasses the previous counterparts and evidence the promising ability for zero-shot tumor segmentation in real-world settings. Codes will be made publicly available.
|
cs
|
2,312.04591 |
Massive MIMO systems are typically designed assuming linear power amplifiers (PAs). However, PAs are most energy efficient close to saturation, where non-linear distortion arises. For conventional precoders, this distortion can coherently combine at user locations, limiting performance. We propose a graph neural network (GNN) to learn a mapping between channel and precoding matrices, which maximizes the sum rate affected by non-linear distortion, using a high-order polynomial PA model. In the distortion-limited regime, this GNN-based precoder outperforms zero forcing (ZF), ZF plus digital pre-distortion (DPD) and the distortion-aware beamforming (DAB) precoder from the state-of-the-art. At an input back-off of -3 dB the proposed precoder compared to ZF increases the sum rate by 8.60 and 8.84 bits/channel use for two and four users respectively. Radiation patterns show that these gains are achieved by transmitting the non-linear distortion in non-user directions. In the four user-case, for a fixed sum rate, the total consumed power (PA and processing) of the GNN precoder is 3.24 and 1.44 times lower compared to ZF and ZF plus DPD respectively. A complexity analysis shows six orders of magnitude reduction compared to DAB precoding. This opens perspectives to operate PAs closer to saturation, which drastically increases their energy efficiency.
|
cs
|
2,312.04433 |
Customized generation using diffusion models has made impressive progress in image generation, but remains unsatisfactory in the challenging video generation task, as it requires the controllability of both subjects and motions. To that end, we present DreamVideo, a novel approach to generating personalized videos from a few static images of the desired subject and a few videos of target motion. DreamVideo decouples this task into two stages, subject learning and motion learning, by leveraging a pre-trained video diffusion model. The subject learning aims to accurately capture the fine appearance of the subject from provided images, which is achieved by combining textual inversion and fine-tuning of our carefully designed identity adapter. In motion learning, we architect a motion adapter and fine-tune it on the given videos to effectively model the target motion pattern. Combining these two lightweight and efficient adapters allows for flexible customization of any subject with any motion. Extensive experimental results demonstrate the superior performance of our DreamVideo over the state-of-the-art methods for customized video generation. Our project page is at .
|
cs
|
2,312.02182 |
In this paper, we prove that an Adam-type algorithm with smooth clipping approaches the global minimizer of the regularized non-convex loss function. Adding smooth clipping and taking the state space as the set of all trajectories, we can apply the ergodic theory of Markov semigroups for this algorithm and investigate its asymptotic behavior. The ergodic theory we establish in this paper reduces the problem of evaluating the convergence, generalization error and discretization error of this algorithm to the problem of evaluating the difference between two functional stochastic differential equations (SDEs) with different drift coefficients. As a result of our analysis, we have shown that this algorithm minimizes the the regularized non-convex loss function with errors of the form $n^{-1/2}$, $\eta^{1/4}$, $\beta^{-1} \log (\beta + 1)$ and $e^{- c t}$. Here, $c$ is a constant and $n$, $\eta$, $\beta$ and $t$ denote the size of the training dataset, learning rate, inverse temperature and time, respectively.
|
cs
|
2,312.02412 |
This paper describes a sequence of natural numbers that grows faster than any Turing computable function. This sequence is generated from a version of the tiling problem, called a coloring system. In our proof that generates the sequence, we use the notions of a chain and an unbounded sequence property, which resemble the methods of point set topology. From this sequence, we define a Turing incomputable coloring function.
|
math
|
2,312.02188 |
Existing popular video captioning benchmarks and models deal with generic captions devoid of specific person, place or organization named entities. In contrast, news videos present a challenging setting where the caption requires such named entities for meaningful summarization. As such, we propose the task of summarizing news video directly to entity-aware captions. We also release a large-scale dataset, VIEWS (VIdeo NEWS), to support research on this task. Further, we propose a method that augments visual information from videos with context retrieved from external world knowledge to generate entity-aware captions. We demonstrate the effectiveness of our approach on three video captioning models. We also show that our approach generalizes to existing news image captions dataset. With all the extensive experiments and insights, we believe we establish a solid basis for future research on this challenging task.
|
cs
|
2,312.06088 |
Sentence classification is one of the basic tasks of natural language processing. Convolution neural network (CNN) has the ability to extract n-grams features through convolutional filters and capture local correlations between consecutive words in parallel, so CNN is a popular neural network architecture to dealing with the task. But restricted by the width of convolutional filters, it is difficult for CNN to capture long term contextual dependencies. Attention is a mechanism that considers global information and pays more attention to keywords in sentences, thus attention mechanism is cooperated with CNN network to improve performance in sentence classification task. In our work, we don't focus on keyword in a sentence, but on which CNN's output feature map is more important. We propose a Squeeze-and-Excitation Convolutional neural Network (SECNN) for sentence classification. SECNN takes the feature maps from multiple CNN as different channels of sentence representation, and then, we can utilize channel attention mechanism, that is SE attention mechanism, to enable the model to learn the attention weights of different channel features. The results show that our model achieves advanced performance in the sentence classification task.
|
cs
|
2,312.04823 |
Entropy and mutual information in neural networks provide rich information on the learning process, but they have proven difficult to compute reliably in high dimensions. Indeed, in noisy and high-dimensional data, traditional estimates in ambient dimensions approach a fixed entropy and are prohibitively hard to compute. To address these issues, we leverage data geometry to access the underlying manifold and reliably compute these information-theoretic measures. Specifically, we define diffusion spectral entropy (DSE) in neural representations of a dataset as well as diffusion spectral mutual information (DSMI) between different variables representing data. First, we show that they form noise-resistant measures of intrinsic dimensionality and relationship strength in high-dimensional simulated data that outperform classic Shannon entropy, nonparametric estimation, and mutual information neural estimation (MINE). We then study the evolution of representations in classification networks with supervised learning, self-supervision, or overfitting. We observe that (1) DSE of neural representations increases during training; (2) DSMI with the class label increases during generalizable learning but stays stagnant during overfitting; (3) DSMI with the input signal shows differing trends: on MNIST it increases, while on CIFAR-10 and STL-10 it decreases. Finally, we show that DSE can be used to guide better network initialization and that DSMI can be used to predict downstream classification accuracy across 962 models on ImageNet. The official implementation is available at .
|
cs
|
2,312.06225 |
Unmanned aerial vehicles (UAVs) are expected to be an integral part of wireless networks, and determining collision-free trajectory in multi-UAV non-cooperative scenarios while collecting data from distributed Internet of Things (IoT) nodes is a challenging task. In this paper, we consider a path planning optimization problem to maximize the collected data from multiple IoT nodes under realistic constraints. The considered multi-UAV non-cooperative scenarios involve random number of other UAVs in addition to the typical UAV, and UAVs do not communicate or share information among each other. We translate the problem into a Markov decision process (MDP) with parameterized states, permissible actions, and detailed reward functions. Dueling double deep Q-network (D3QN) is proposed to learn the decision making policy for the typical UAV, without any prior knowledge of the environment (e.g., channel propagation model and locations of the obstacles) and other UAVs (e.g., their missions, movements, and policies). The proposed algorithm can adapt to various missions in various scenarios, e.g., different numbers and positions of IoT nodes, different amount of data to be collected, and different numbers and positions of other UAVs.
Numerical results demonstrate that real-time navigation can be efficiently performed with high success rate, high data collection rate, and low collision rate.
|
eess
|
2,312.03205 |
Federated learning (FL) emerges as an effective collaborative learning framework to coordinate data and computation resources from massive and distributed clients in training. Such collaboration results in non-trivial intellectual property (IP) represented by the model parameters that should be protected and shared by the whole party rather than an individual user. Meanwhile, the distributed nature of FL endorses a malicious client the convenience to compromise IP through illegal model leakage to unauthorized third parties. To block such IP leakage, it is essential to make the IP identifiable in the shared model and locate the anonymous infringer who first leaks it. The collective challenges call for \emph{accountable federated learning}, which requires verifiable ownership of the model and is capable of revealing the infringer's identity upon leakage. In this paper, we propose Decodable Unique Watermarking (DUW) for complying with the requirements of accountable FL. Specifically, before a global model is sent to a client in an FL round, DUW encodes a client-unique key into the model by leveraging a backdoor-based watermark injection. To identify the infringer of a leaked model, DUW examines the model and checks if the triggers can be decoded as the corresponding keys. Extensive empirical results show that DUW is highly effective and robust, achieving over $99\%$ watermark success rate for Digits, CIFAR-10, and CIFAR-100 datasets under heterogeneous FL settings, and identifying the IP infringer with $100\%$ accuracy even after common watermark removal attempts.
|
cs
|
2,312.06077 |
We study the understanding of deep neural networks from the scope in which they are trained on. While the accuracy of these models is usually impressive on the aggregate level, they still make mistakes, sometimes on cases that appear to be trivial. Moreover, these models are not reliable in realizing what they do not know leading to failures such as adversarial vulnerability and out-of-distribution failures. Here, we propose a measure for quantifying the ambiguity of inputs for any given model with regard to the scope of its training. We define the ambiguity based on the geometric arrangements of the decision boundaries and the convex hull of training set in the feature space learned by the trained model, and demonstrate that a single ambiguity measure may detect a considerable portion of mistakes of a model on in-distribution samples, adversarial inputs, as well as out-of-distribution inputs. Using our ambiguity measure, a model may abstain from classification when it encounters ambiguous inputs leading to a better model accuracy not just on a given testing set, but on the inputs it may encounter at the world at large. In pursuit of this measure, we develop a theoretical framework that can identify the unknowns of the model in relation to its scope. We put this in perspective with the confidence of the model and develop formulations to identify the regions of the domain which are unknown to the model, yet the model is guaranteed to have high confidence.
|
cs
|
2,312.04377 |
This paper introduces hybrid automatic repeat request with incremental redundancy (HARQ-IR) to boost the reliability of short packet communications. The finite blocklength information theory and correlated decoding events tremendously preclude the analysis of average block error rate (BLER). Fortunately, the recursive form of average BLER motivates us to calculate its value through the trapezoidal approximation and Gauss-Laguerre quadrature. Moreover, the asymptotic analysis is performed to derive a simple expression for the average BLER at high signal-to-noise ratio (SNR). Then, we study the maximization of long term average throughput (LTAT) via power allocation meanwhile ensuring the power and the BLER constraints. For tractability, the asymptotic BLER is employed to solve the problem through geometric programming (GP). However, the GP-based solution underestimates the LTAT at low SNR due to a large approximation error in this case. Alternatively, we also develop a deep reinforcement learning (DRL)-based framework to learn power allocation policy. In particular, the optimization problem is transformed into a constrained Markov decision process, which is solved by integrating deep deterministic policy gradient (DDPG) with subgradient method. The numerical results finally demonstrate that the DRL-based method outperforms the GP-based one at low SNR, albeit at the cost of increasing computational burden.
|
math
|
2,312.05694 |
Single-field models of inflation might lead to amplified scalar fluctuations on small scales due, for example, to a transient ultra-slow-roll phase. It was argued by Kristiano $\&$ Yokoyama in that the enhanced amplitude of the scalar power spectrum on small scales has the potential to induce a sizeable 1-loop correction to the spectrum at large scales. In this work, we repeat the calculation for the 1-loop correction presented in . We closely follow their assumptions but evaluate the loop numerically. This allows us to consider both instantaneous and smooth transitions between the slow-roll and ultra-slow-roll phases. In particular, we generate models featuring realistic, smooth evolution from an analytic inflationary potential. We find that, upon fixing the amplitude of the peak in the power spectrum at short scales, the resulting 1-loop correction is not significantly reduced by considering a smooth evolution. In particular, for a power spectrum with a tree-level peak amplitude potentially relevant for small-scale phenomenology, e.g. primordial black hole production, the 1-loop correction on large scales is a few percent of the tree-level power spectrum.
|
astro-ph
|
2,312.04018 |
Model-based approaches to imaging, like specialized image enhancements in astronomy, favour physics-based models which facilitate explanations of relationships between observed inputs and computed outputs. While this paper features a tutorial example, inspired by exoplanet imaging, that reveals embedded 2D fast Fourier transforms in an image enhancement model, the work is actually about the tensor algebra and software, or tensor frameworks, available for model-based imaging. The paper proposes a Ricci-notation tensor (RT) framework, comprising an extended Ricci notation, which aligns well with the symbolic dual-index algebra of non-Euclidean geometry, and codesigned object-oriented software, called the RTToolbox for MATLAB. Extensions offer novel representations for entrywise, pagewise, and broadcasting operations popular in extended matrix-vector (EMV) frameworks for imaging. Complementing the EMV algebra computable with MATLAB, the RTToolbox demonstrates programmatic and computational efficiency thanks to careful design of tensor and dual-index classes. Compared to a numeric tensor predecessor, the RT framework enables superior ways to model imaging problems and, thereby, to develop solutions.
|
astro-ph
|
2,312.023 |
This paper explores the challenges in evaluating machine learning (ML) models for continuous health monitoring using wearable devices beyond conventional metrics. We state the complexities posed by real-world variability, disease dynamics, user-specific characteristics, and the prevalence of false notifications, necessitating novel evaluation strategies. Drawing insights from large-scale heart studies, the paper offers a comprehensive guideline for robust ML model evaluation on continuous health monitoring.
|
eess
|
2,312.02091 |
[Abridged abstract] Large Language Models (LLMs) can solve some undergraduate-level to graduate-level physics textbook problems and are proficient at coding. Combining these two capabilities could one day enable AI systems to simulate and predict the physical world.
We present an evaluation of state-of-the-art (SOTA) LLMs on PhD-level to research-level computational physics problems. We condition LLM generation on the use of well-documented and widely-used packages to elicit coding capabilities in the physics and astrophysics domains. We contribute $\sim 50$ original and challenging problems in celestial mechanics (with REBOUND), stellar physics (with MESA), 1D fluid dynamics (with Dedalus) and non-linear dynamics (with SciPy). Since our problems do not admit unique solutions, we evaluate LLM performance on several soft metrics: counts of lines that contain different types of errors (coding, physics, necessity and sufficiency) as well as a more "educational" Pass-Fail metric focused on capturing the salient physical ingredients of the problem at hand.
As expected, today's SOTA LLM (GPT4) zero-shot fails most of our problems, although about 40\% of the solutions could plausibly get a passing grade. About $70-90 \%$ of the code lines produced are necessary, sufficient and correct (coding \& physics). Physics and coding errors are the most common, with some unnecessary or insufficient lines. We observe significant variations across problem class and difficulty. We identify several failure modes of GPT4 in the computational physics domain.
Our reconnaissance work provides a snapshot of current computational capabilities in classical physics and points to obvious improvement targets if AI systems are ever to reach a basic level of autonomy in physics simulation capabilities.
|
astro-ph
|
2,312.04064 |
The discovery of therapeutics to treat genetically-driven pathologies relies on identifying genes involved in the underlying disease mechanisms. Existing approaches search over the billions of potential interventions to maximize the expected influence on the target phenotype. However, to reduce the risk of failure in future stages of trials, practical experiment design aims to find a set of interventions that maximally change a target phenotype via diverse mechanisms. We propose DiscoBAX, a sample-efficient method for maximizing the rate of significant discoveries per experiment while simultaneously probing for a wide range of diverse mechanisms during a genomic experiment campaign. We provide theoretical guarantees of approximate optimality under standard assumptions, and conduct a comprehensive experimental evaluation covering both synthetic as well as real-world experimental design tasks. DiscoBAX outperforms existing state-of-the-art methods for experimental design, selecting effective and diverse perturbations in biological systems.
|
cs
|
2,312.04351 |
In a two-round auction, a subset of bidders is selected (probabilistically), according to their bids in the first round, for the second round, where they can increase their bids. We formalize the two-round auction model, restricting the second round to a dominant strategy incentive compatible (DSIC) auction for the selected bidders. It turns out that, however, such two-round auctions are not directly DSIC, even if the probability of each bidder being selected for the second round is monotonic to its first bid, which is surprisingly counter-intuitive. We also illustrate the necessary and sufficient conditions of two-round auctions being DSIC. Besides, we characterize the Nash equilibria for untruthful two-round auctions. One can achieve better revenue performance by setting proper probability for selecting bidders for the second round compared with truthful two-round auctions.
|
cs
|
2,312.03274 |
Sparse Principal Components Analysis (PCA) has been proposed as a way to improve both interpretability and reliability of PCA. However, use of sparse PCA in practice is hindered by the difficulty of tuning the multiple hyperparameters that control the sparsity of different PCs (the "multiple tuning problem", MTP). Here we present a solution to the MTP using Empirical Bayes methods. We first introduce a general formulation for penalized PCA of a data matrix $\mathbf{X}$, which includes some existing sparse PCA methods as special cases. We show that this formulation also leads to a penalized decomposition of the covariance (or Gram) matrix, $\mathbf{X}^T\mathbf{X}$. We introduce empirical Bayes versions of these penalized problems, in which the penalties are determined by prior distributions that are estimated from the data by maximum likelihood rather than cross-validation. The resulting "Empirical Bayes Covariance Decomposition" provides a principled and efficient solution to the MTP in sparse PCA, and one that can be immediately extended to incorporate other structural assumptions (e.g. non-negative PCA). We illustrate the effectiveness of this approach on both simulated and real data examples.
|
stat
|
2,312.02246 |
Inverse problems aim to determine parameters from observations, a crucial task in engineering and science. Lately, generative models, especially diffusion models, have gained popularity in this area for their ability to produce realistic solutions and their good mathematical properties. Despite their success, an important drawback of diffusion models is their sensitivity to the choice of variance schedule, which controls the dynamics of the diffusion process. Fine-tuning this schedule for specific applications is crucial but time-costly and does not guarantee an optimal result. We propose a novel approach for learning the schedule as part of the training process. Our method supports probabilistic conditioning on data, provides high-quality solutions, and is flexible, proving able to adapt to different applications with minimum overhead. This approach is tested in two unrelated inverse problems: super-resolution microscopy and quantitative phase imaging, yielding comparable or superior results to previous methods and fine-tuned diffusion models. We conclude that fine-tuning the schedule by experimentation should be avoided because it can be learned during training in a stable way that yields better results.
|
stat
|
2,312.0243 |
The 2021 paper "Control barrier functions for stochastic systems" provides theorems that give almost sure safety guarantees given stochastic zero control barrier function (ZCBF). Unfortunately, both the theorem and its proof is invalid. In this letter, we illustrate on a toy example that the almost sure safety guarantees for stochastic ZCBF do not hold and explain why the proof is flawed. Although stochastic reciprocal barrier functions (RCBF) also uses the same proof technique, we provide a different proof technique that verifies that stochastic RCBFs are indeed safe with probability one. Using the RCBF, we derive a modified ZCBF condition that guarantees safety with probability one. Finally, we provide some discussion on the role of unbounded controls in the almost-sure safety guarantees of RCBFs, and show that the rate of divergence of the ratio of the drift and diffusion is the key for whether a system has almost sure safety guarantees.
|
math
|
2,312.03098 |
For two subsets S and T of a given lattice L, we define a relative distributive (modular) property over L, that underlies a large family including the usual class of distributive (modular) lattices. Our proposed class will be called ST-distributive (ST-modular) lattices. In this paper, we explore elemental properties of ST-distributivity (ST-modularity) and find examples of maximal S and T to form ST-distributive lattices for some non-distributive finite lattices of small order. We also characterize the maximal pairs of subsets (S,T), subject to certain constraints, that induce ST-distributivity in the lattice family M_n,n for all natural numbers n greater than or equal to 3. Afterwards, we present an application of ST-modular to convex sets and polytopes. This application has been the first example found and the main guiding light for our new definitions. The aforementioned definitions are closely related to distributive elements of Birkhoff-Gratzer and Stanley's SS-lattices.
|
math
|
2,312.0279 |
Social network alignment (SNA) holds significant importance for various downstream applications, prompting numerous professionals to develop and share SNA tools. Unfortunately, these tools can be exploited by malicious actors to integrate sensitive user information, posing cybersecurity risks. While many researchers have explored attacking SNA (ASNA) through a network modification attack way, practical feasibility remains a challenge. This paper introduces a novel approach, the node injection attack. To overcome the problem of modeling and solving within a limited time and balancing costs and benefits, we propose a low-cost, high-impact node injection attack via dynamic programming (DPNIA) framework. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs who have a greater similarity scores than the pairs between existing nodes, making ASNA solvable. Meanwhile, it employs a cross-network evaluation method to identify node vulnerability, facilitating a progressive attack from easy to difficult. Additionally, it utilizes an optimal injection strategy searching method, based on dynamic programming, to determine which links should be added between injected nodes and existing nodes, thereby achieving a high impact for attack effectiveness at a low cost. Experiments on four real-world datasets consistently demonstrate that DPNIA consistently and significantly outperforms various attack baselines.
|
cs
|
2,312.03833 |
The Tavis-Cummings model is a paradigmatic central-mode model where a set of two-level quantum emitters (spins) are coupled to a collective cavity mode. Here we study the eigenstate spectrum, its localization properties and the effect on dynamics, focusing on the two-excitation sector relevant for nonlinear photonics. These models admit two sources of disorder: in the coupling between the spins and the cavity and in the energy shifts of the individual spins. While this model was known to be exactly solvable in the limit of a homogeneous coupling and inhomogeneous energy shifts, we here establish the solvability in the opposite limit of a homogeneous energy shift and inhomogeneous coupling, presenting the exact solution and corresponding conserved quantities. We identify three different classes of eigenstates, exhibiting different degrees of multifractality and semilocalization closely tied to the integrable points, and study their stability to perturbations away from these solvable points. The dynamics of the cavity occupation number away from equilibrium, exhibiting boson bunching and a two-photon blockade, is explicitly related to the localization properties of the eigenstates and illustrates how these models support a collective spin description despite the presence of disorder.
|
quant-ph
|
2,312.04843 |
Recent advances in deep learning, and especially the invention of encoder-decoder architectures, has significantly improved the performance of abstractive summarization systems. The majority of research has focused on written documents, however, neglecting the problem of multi-party dialogue summarization. In this paper, we present a dataset of French political debates for the purpose of enhancing resources for multi-lingual dialogue summarization. Our dataset consists of manually transcribed and annotated political debates, covering a range of topics and perspectives. We highlight the importance of high quality transcription and annotations for training accurate and effective dialogue summarization models, and emphasize the need for multilingual resources to support dialogue summarization in non-English languages. We also provide baseline experiments using state-of-the-art methods, and encourage further research in this area to advance the field of dialogue summarization. Our dataset will be made publicly available for use by the research community.
|
cs
|
2,312.06345 |
We present the first results of the Hubble Deep Hydrogen Alpha (HDH$\alpha$) project, which analyzes the space-borne deep H$\alpha$ narrowband imaging data in the GOODS-S region. The HDH$\alpha$ data comprises 72 orbits' images taken with the HST ACS/WFC F658N filter. The exposure time varies across a total area of $\sim$76.1 $\rm{arcmin}^2$, adding up to a total exposure time of 195.7 ks, among which 68.8 ks are spent in the deepest region. These images are aligned, reprojected, and combined to have the same pixel grid as the Hubble Legacy Fields (HLF). The scientific goals of the HDH$\alpha$ include establishing a sample of emission-line galaxies (ELGs) including [O III] emitters at $z\sim$ 0.3, [O II] emitters at $z\sim$ 0.8, and Lyman-$\alpha$ emitters (LAEs) at $z \sim 4.4$, studying the line morphology of ELGs with high resolution imaging data, and statistically analyzing the line luminosity functions and line equivalent-width distributions of ELGs selected with HST. Furthermore, the HDH$\alpha$ project enhances the legacy value of the GOODS-S field by contributing the first HST-based narrowband image to the existing data sets, which includes the HST broadband data and other ancillary data from X-ray to radio taken by other facilities. In this paper, we describe the data reduction process of the HDH$\alpha$, select ELGs based on HST's F658N and broadband data, validate the redshifts of the selected candidates by cross matching with the public spectroscopic catalogs in the GOODS-S, and present a final catalog of the confirmed [O III] emitters at $z\sim$ 0.3, [O II] emitters at $z\sim$ 0.8, and LAEs at $z \sim 4.4$.
|
astro-ph
|
2,312.02814 |
A family of linear positive maps in the algebra of $3 \times 3$ complex matrices proposed recently in Bera et al. is further analyzed. It provides a generalization of a seminal Choi nondecomposable extremal map in $M_3$. We investigate when generalized Choi maps are optimal, i.e. cannot be represented as a sum of positive and completely positive maps. This property is weaker than extremality, however, it turns out that it plays a key role in detecting quantum entanglement.
|
quant-ph
|
2,312.04298 |
The quantum dynamics of vibrational polaritonic states arising from the interaction of a bistable molecule with the quantized mode of a Fabry-Perot microcavity is investigated using an asymmetric double-well potential as a simplified one-dimensional model of a reactive molecule. After discussing the role of the light-matter coupling strength in the emergence of avoided crossings between polaritonic states, we investigate the possibility of using these crossings in order to trigger a dynamical switching of these states from one potential well to the other. Two schemes are proposed to achieve this coherent state switching, either by preparing the molecule in an appropriate vibrational excited state before inserting it into the cavity, or by applying a short laser pulse inside the cavity to obtain a coherent superposition of polaritonic states. The respective influences of the dipole amplitude and potential asymmetry on the coherent switching process are also discussed.
|
quant-ph
|
2,312.03561 |
In testing industry, precise item categorization is pivotal to align exam questions with the designated content domains outlined in the assessment blueprint. Traditional methods either entail manual classification, which is laborious and error-prone, or utilize machine learning requiring extensive training data, often leading to model underfit or overfit issues. This study unveils a novel approach employing the zero-shot and few-shot Generative Pretrained Transformer (GPT) classifier for hierarchical item categorization, minimizing the necessity for training data, and instead, leveraging human-like language descriptions to define categories. Through a structured python dictionary, the hierarchical nature of examination blueprints is navigated seamlessly, allowing for a tiered classification of items across multiple levels. An initial simulation with artificial data demonstrates the efficacy of this method, achieving an average accuracy of 92.91% measured by the F1 score. This method was further applied to real exam items from the 2022 In-Training Examination (ITE) conducted by the American Board of Family Medicine (ABFM), reclassifying 200 items according to a newly formulated blueprint swiftly in 15 minutes, a task that traditionally could span several days among editors and physicians. This innovative approach not only drastically cuts down classification time but also ensures a consistent, principle-driven categorization, minimizing human biases and discrepancies. The ability to refine classifications by adjusting definitions adds to its robustness and sustainability.
|
stat
|
2,312.04864 |
Networks, threat models, and malicious actors are advancing quickly. With the increased deployment of the 5G networks, the security issues of the attached 5G physical devices have also increased. Therefore, artificial intelligence based autonomous end-to-end security design is needed that can deal with incoming threats by detecting network traffic anomalies. To address this requirement, in this research, we used a recently published 5G traffic dataset, 5G-NIDD, to detect network traffic anomalies using machine and deep learning approaches. First, we analyzed the dataset using three visualization techniques: t-Distributed Stochastic Neighbor Embedding (t-SNE), Uniform Manifold Approximation and Projection (UMAP), and Principal Component Analysis (PCA). Second, we reduced the data dimensionality using mutual information and PCA techniques. Third, we solve the class imbalance issue by inserting synthetic records of minority classes. Last, we performed classification using six different classifiers and presented the evaluation metrics. We received the best results when K-Nearest Neighbors classifier was used: accuracy (97.2%), detection rate (96.7%), and false positive rate (2.2%).
|
cs
|
2,312.02978 |
Modeling the underlying pairing mechanism of charge carriers in strongly correlated electrons, starting from a microscopic theory, is among the central challenges of condensed-matter physics. Hereby, the key task is to understand what causes the appearance of superconductivity at comparatively high temperatures upon hole doping an antiferromagnetic (AFM) Mott insulator. Recently, it has been proposed that at strong coupling and low doping, the fundamental one- and two-hole meson-type constituents -- magnetic polarons and bipolaronic pairs -- likely realize an emergent Feshbach resonance producing near-resonant $d_{x^2-y^2}$ interactions between charge carriers. Here, we provide detailed calculations of the proposed scenario by describing the open and closed meson scattering channels in the $t$-$t'$-$J$ model using a truncated basis method. After integrating out the closed channel constituted by bipolaronic pairs, we find $d_{x^2-y^2}$ attractive interactions between open channel magnetic polarons. The closed form of the derived interactions allows us analyze the resonant pairing interactions and we find enhanced (suppressed) attraction for hole (electron) doping in our model. The formalism we introduce provides a framework to analyze the implications of a possible Feshbach scenario, e.g. in the context of BEC-BCS crossover, and establishes a foundation to test quantitative aspects of the proposed Feshbach pairing mechanisms in doped antiferromagnets.
|
quant-ph
|
2,312.06622 |
A Search and Rescue game (SR game) is a new type of game on a graph that has quickly found applications in scheduling, object detection, and adaptive search. In this paper, we broaden the definition of SR games by putting them into the context of ordered sets and Bayesian networks, extending known solutions of these games and opening up the way to further applications.
|
cs
|
2,312.06019 |
A Lorentz-covariant system of wave equations is formulated for a quantum-mechanical three-body system in one space dimension, comprised of one photon and two identical massive spin one-half Dirac particles, which can be thought of as two electrons (or alternatively, two positrons). Manifest covariance is achieved using Dirac's formalism of multi-time wave functions, i.e, wave functions $\Psi(\textbf{x}_{\text{ph}},\textbf{x}_{\text{e}_1},\textbf{x}_{\text{e}_2})$ where $\textbf{x}_{\text{ph}},\textbf{x}_{\text{e}_1},\textbf{x}_{\text{e}_2}$ are generic spacetime events of the photon and two electrons respectively. Their interaction is implemented via a Lorentz-invariant no-crossing-of-paths boundary condition at the coincidence submanifolds $\{\textbf{x}_{\text{ph}}=\textbf{x}_{\text{e}_1}\}$ and $\{\textbf{x}_{\text{ph}}=\textbf{x}_{\text{e}_2}\}$ compatible with conservation of probability current. The corresponding initial-boundary value problem is shown to be well-posed under the additional assumption of anti-symmetry given by the Pauli exclusion principle, and a closed-form solution to the ensuing coupled system of Klein-Gordon and transport equations is given.
|
math
|
2,312.04511 |
Large Language Models (LLMs) have shown remarkable results on various complex reasoning benchmarks. The reasoning capabilities of LLMs enable them to execute function calls, using user-provided functions to overcome their inherent limitations, such as knowledge cutoffs, poor arithmetic skills, or lack of access to private data. This development has expanded LLMs' scope to include multi-function calling, where LLMs are equipped with a variety of functions and select the proper functions based on the context. Multi-function calling abilities of LLMs have catalyzed LLM-based software development, allowing them to tackle more complex problems. However, current methods for multi-function calling often require sequential reasoning and acting for each function which can result in high latency, cost, and sometimes inaccurate behavior. To address this, we introduce LLMCompiler, which executes functions in parallel to efficiently orchestrate multi-function calling. Drawing from the principles of classical compilers, LLMCompiler streamlines parallel function calling with three components: (i) an LLM Planner, formulating execution strategies and dependencies; (ii) a Task Fetching Unit, dispatching function calling tasks; and (iii) an Executor, executing these tasks in parallel. LLMCompiler automatically computes an optimized orchestration for the function calls and can be used with open-source models such as LLaMA-2. We have benchmarked LLMCompiler on a range of tasks including cases with non-trivial inter-dependency between function calls, as well as cases that require dynamic replanning based on intermediate results. We observe consistent latency speedup of up to 3.7x, cost savings of up to 6.7x, and accuracy improvement of up to ~9% as compared to ReAct. Additionally, LLMCompiler achieves up to 1.35x latency gain over OpenAI's recent parallel function calling, while achieving similar accuracy.
|
cs
|
2,312.02789 |
A measurement of the invisible width of the $Z$ boson using events with jets and missing transverse momentum is presented using 37 $\mbox{fb\(^{-1}\)}$ of 13 TeV proton-proton data collected by the ATLAS detector in 2015 and 2016. The ratio of $Z\rightarrow \textrm{inv}$ to $Z\rightarrow\ell\ell$ events, where inv refers to non-detected particles and $\ell$ is either an electron or a muon, is measured and corrected for detector effects. Events with at least one energetic central jet with $p_{\textrm{T}} \geq 110$ GeV are selected for both the $Z\rightarrow \textrm{inv}$ and $Z\rightarrow\ell\ell$ final states to obtain a similar phase space in the ratio. The invisible width is measured to be $506\pm2 \textrm{ (stat.)} \pm12 \textrm{ (syst.)}$ MeV and is the single most precise recoil-based measurement. The result is in agreement with the most precise determination from LEP and the Standard Model prediction based on three neutrino generations.
|
hep-ex
|
2,312.03671 |
We present a novel machine-learning approach for detecting faint point sources in high-contrast adaptive optics imaging datasets. The most widely used algorithms for primary subtraction aim to decouple bright stellar speckle noise from planetary signatures by subtracting an approximation of the temporally evolving stellar noise from each frame in an imaging sequence. Our approach aims to improve the stellar noise approximation and increase the planet detection sensitivity by leveraging deep learning in a novel direct imaging post-processing algorithm. We show that a convolutional autoencoder neural network, trained on an extensive reference library of real imaging sequences, accurately reconstructs the stellar speckle noise at the location of a potential planet signal. This tool is used in a post-processing algorithm we call Direct Exoplanet Detection with Convolutional Image Reconstruction, or ConStruct. The reliability and sensitivity of ConStruct are assessed using real Keck/NIRC2 angular differential imaging datasets. Of the 30 unique point sources we examine, ConStruct yields a higher S/N than traditional PCA-based processing for 67$\%$ of the cases and improves the relative contrast by up to a factor of 2.6. This work demonstrates the value and potential of deep learning to take advantage of a diverse reference library of point spread function realizations to improve direct imaging post-processing. ConStruct and its future improvements may be particularly useful as tools for post-processing high-contrast images from the James Webb Space Telescope and extreme adaptive optics instruments, both for the current generation and those being designed for the upcoming 30 meter-class telescopes.
|
cs
|
2,312.05995 |
Estimating the relative camera pose from $n \geq 5$ correspondences between two calibrated views is a fundamental task in computer vision. This process typically involves two stages: 1) estimating the essential matrix between the views, and 2) disambiguating among the four candidate relative poses that satisfy the epipolar geometry. In this paper, we demonstrate a novel approach that, for the first time, bypasses the second stage. Specifically, we show that it is possible to directly estimate the correct relative camera pose from correspondences without needing a post-processing step to enforce the cheirality constraint on the correspondences. Building on recent advances in certifiable non-minimal optimization, we frame the relative pose estimation as a Quadratically Constrained Quadratic Program (QCQP). By applying the appropriate constraints, we ensure the estimation of a camera pose that corresponds to a valid 3D geometry and that is globally optimal when certified. We validate our method through exhaustive synthetic and real-world experiments, confirming the efficacy, efficiency and accuracy of the proposed approach. Code is available at .
|
cs
|
2,312.04454 |
Let $P(z)=\sum_{n=0}^Na_nz^n$ be a Littlewood polynomial of degree $N$, meaning that $a_n\in\{\pm 1\}$. We say that $P$ is reciprocal if $P(z)=z^NP(1/z)$. Borwein, Erdélyi and Littmann posed the question of determining the minimum number $Z_{\mathcal{L}}(N)$ of zeros of modulus 1 of a reciprocal Littlewood polynomial $P$ of degree $N$. Several finite lower bounds on $Z_{\mathcal{L}}(N)$ have been obtained in the literature, and it has been conjectured by various authors that $Z_{\mathcal{L}}(N)$ must in fact grow to infinity with $N$. Starting from ideas in recent breakthrough papers of Erdélyi and Sahasrabudhe, we are able to confirm this.
|
math
|
2,312.04065 |
Boundary points pose a significant challenge for machine learning tasks, including classification, clustering, and dimensionality reduction. Due to the similarity of features, boundary areas can result in mixed-up classes or clusters, leading to a crowding problem in dimensionality reduction. To address this challenge, numerous boundary point detection methods have been developed, but they are insufficiently to accurately and efficiently identify the boundary points in non-convex structures and high-dimensional manifolds. In this work, we propose a robust and efficient method for detecting boundary points using Local Direction Dispersion (LoDD). LoDD considers that internal points are surrounded by neighboring points in all directions, while neighboring points of a boundary point tend to be distributed only in a certain directional range. LoDD adopts a density-independent K-Nearest Neighbors (KNN) method to determine neighboring points, and defines a statistic-based metric using the eigenvalues of the covariance matrix of KNN coordinates to measure the centrality of a query point. We demonstrated the validity of LoDD on five synthetic datasets (2-D and 3-D) and ten real-world benchmarks, and tested its clustering performance by equipping with two typical clustering methods, K-means and Ncut. Our results show that LoDD achieves promising and robust detection accuracy in a time-efficient manner.
|
cs
|
2,312.04355 |
This paper studies a secure cell-free integrated sensing and communication (ISAC) system, in which multiple ISAC transmitters collaboratively send confidential information to multiple communication users (CUs) and concurrently conduct target detection. Different from prior works investigating communication security against potential information eavesdropping, we consider the security of both communication and sensing in the presence of both information and sensing eavesdroppers that aim to intercept confidential communication information and extract target information, respectively. Towards this end, we optimize the joint information and sensing transmit beamforming at these ISAC transmitters for secure cell-free ISAC. Our objective is to maximize the detection probability over a designated sensing area while ensuring the minimum signal-to-interference-plus-noise-ratio (SINR) requirements at CUs. Our formulation also takes into account the maximum tolerable signal-to-noise ratio (SNR) at information eavesdroppers for ensuring the confidentiality of information transmission, and the maximum detection probability constraints at sensing eavesdroppers for preserving sensing privacy. The formulated secure joint transmit beamforming problem is highly non-convex due to the intricate interplay between the detection probabilities, beamforming vectors, and SINR constraints. Fortunately, through strategic manipulation and via applying the semidefinite relaxation (SDR) technique, we successfully obtain the globally optimal solution to the design problem by rigorously verifying the tightness of SDR. Furthermore, we present two alternative joint beamforming designs based on the sensing SNR maximization over the specific sensing area and the coordinated beamforming, respectively. Numerical results reveal the benefits of our proposed design over these alternative benchmarks.
|
cs
|
2,312.03178 |
We present a numerical calculation of the Lee-Yang and Fisher zeros of the 2D Ising model using multi-point Padé approximants. We perform simulations for the 2D Ising model with ferromagnetic couplings both in the absence and in the presence of a magnetic field using a cluster spin-flip algorithm. We show that it is possible to extract genuine signature of Lee Yang and Fisher zeros of the theory through the poles of magnetization and specific heat, using multi-point Padé method. We extract the poles of magnetization using Padé approximants and compare their scaling with known results. We verify the circle theorem associated to the well known behaviour of Lee Yang zeros. We present our finite volume scaling analysis of the zeros done at $T=T_c$ for a few lattice sizes, extracting to a very good precision the (combination of) critical exponents $\beta \delta$. The computation at the critical temperature is performed after the latter has been determined via the study of Fisher zeros, thus extracting both $\beta_c$ and the critical exponent $\nu$. Results already exist for extracting the critical exponents for the Ising model in 2 and 3 dimensions making use of Fisher and Lee Yang zeros. In this work, multi-point Padé is shown to be competitive with this respect and thus a powerful tool to study phase transitions.
|
math
|
2,312.02891 |
We consider the low-rank alternating directions implicit (ADI) iteration for approximately solving large-scale algebraic Sylvester equations. Inside every iteration step of this iterative process a pair of linear systems of equations has to be solved. We investigate the situation when those inner linear systems are solved inexactly by an iterative methods such as, for example, preconditioned Krylov subspace methods. The main contribution of this work are thresholds for the required accuracies regarding the inner linear systems which dictate when the employed inner Krylov subspace methods can be safely terminated. The goal is to save computational effort by solving the inner linear system as inaccurate as possible without endangering the functionality of the low-rank Sylvester-ADI method. Ideally, the inexact ADI method mimics the convergence behaviour of the more expensive exact ADI method, where the linear systems are solved directly. Alongside the theoretical results, also strategies for an actual practical implementation of the stopping criteria are developed. Numerical experiments confirm the effectiveness of the proposed strategies.
|
cs
|
2,312.05787 |
Reinforcement learning (RL) methods with a high replay ratio (RR) and regularization have gained interest due to their superior sample efficiency. However, these methods have mainly been developed for dense-reward tasks. In this paper, we aim to extend these RL methods to sparse-reward goal-conditioned tasks. We use Randomized Ensemble Double Q-learning (REDQ) (Chen et al., 2021), an RL method with a high RR and regularization. To apply REDQ to sparse-reward goal-conditioned tasks, we make the following modifications to it: (i) using hindsight experience replay and (ii) bounding target Q-values. We evaluate REDQ with these modifications on 12 sparse-reward goal-conditioned tasks of Robotics (Plappert et al., 2018), and show that it achieves about $2 \times$ better sample efficiency than previous state-of-the-art (SoTA) RL methods. Furthermore, we reconsider the necessity of specific components of REDQ and simplify it by removing unnecessary ones. The simplified REDQ with our modifications achieves $\sim 8 \times$ better sample efficiency than the SoTA methods in 4 Fetch tasks of Robotics.
|
cs
|
2,312.06291 |
Landau theory's implicit assumption that microscopic details cannot affect the system's phases has been challenged only recently in systems such as antiferromagnetic quantum spin chains with periodic boundary conditions, where topological frustration can be induced. In this work, we show that the latter modifies the zero temperature phase diagram of the XY chain in a transverse magnetic field by inducing new quantum phase transitions. In doing so, we come across the first case of second order boundary quantum phase transition characterized by a quartic dispersion relation. Our analytical results are supported by numerical investigations and lay the foundation for understanding the phase diagram of this frustrated model.
|
quant-ph
|
2,312.05348 |
Video streaming often requires transcoding content into different resolutions and bitrates to match the recipient's internet speed and screen capabilities. Video encoders like x264 offer various presets, each with different tradeoffs between transcoding time and rate-distortion performance. Choosing the best preset for video transcoding is difficult, especially for live streaming, as trying all the presets and choosing the best one is not feasible. One solution is to predict each preset's transcoding time and select the preset that ensures the highest quality while adhering to live streaming time constraints. Prediction of video transcoding time is also critical in minimizing streaming delays, deploying resource management algorithms, and load balancing. We propose a learning-based framework for predicting the transcoding time of videos across various presets. Our predictor's features for video transcoding time prediction are derived directly from the ingested stream, primarily from the header or metadata. As a result, only minimal additional delay is incurred for feature extraction, rendering our approach ideal for live-streaming applications. We evaluated our learning-based transcoding time prediction using a dataset of videos. The results demonstrate that our framework can accurately predict the transcoding time for different presets, with a mean absolute percentage error (MAPE) of nearly 5.0%. Leveraging these predictions, we then select the most suitable transcoding preset for live video streaming. Utilizing our transcoding time prediction-based preset selection improved Peak Signal-to-Noise Ratio (PSNR) of up to 5 dB.
|
cs
|
2,312.02613 |
Simulation is a powerful tool to easily generate annotated data, and a highly desirable feature, especially in those domains where learning models need large training datasets. Machine learning and deep learning solutions, have proven to be extremely data-hungry and sometimes, the available real-world data are not sufficient to effectively model the given task. Despite the initial skepticism of a portion of the scientific community, the potential of simulation has been largely confirmed in many application areas, and the recent developments in terms of rendering and virtualization engines, have shown a good ability also in representing complex scenes. This includes environmental factors, such as weather conditions and surface reflectance, as well as human-related events, like human actions and behaviors. We present a human crowd simulator, called UniCrowd, and its associated validation pipeline. We show how the simulator can generate annotated data, suitable for computer vision tasks, in particular for detection and segmentation, as well as the related applications, as crowd counting, human pose estimation, trajectory analysis and prediction, and anomaly detection.
|
cs
|
2,312.04224 |
In this paper, a fine-tuning method of the parameters in the MMG model for the real-scale ship is proposed. In the proposed method, all of the arbitrarily indicated target parameters of the MMG model are tuned simultaneously in the framework of SI using time series data of real-sale ship maneuvering motion data to steadily improve the accuracy of the MMG model. Parameter tuning is formulated as a minimization problem of the deviation of the maneuvering motion simulated with given parameters and the real-scale ship trials, and the global solution is explored using CMA-ES. By constraining the exploration ranges to the neighborhood of the previously determined parameter values, the proposed method limits the output in a realistic range. The proposed method is applied to the tuning of 12 parameters for a container ship with five different widths of the exploration range. The results show that, in all cases, the accuracy of the maneuvering simulation is improved by applying the tuned parameters to the MMG model, and the validity of the proposed parameter fine-tuning method is confirmed.
|
cs
|
2,312.02544 |
Ising formulations are widely utilized to solve combinatorial optimization problems, and a variety of quantum or semiconductor-based hardware has recently been made available. In combinatorial optimization problems, the existence of local minima in energy landscapes is problematic to use to seek the global minimum. We note that the aim of the optimization is not to obtain exact samplings from the Boltzmann distribution, and there is thus no need to satisfy detailed balance conditions. In light of this fact, we develop an algorithm to get out of the local minima efficiently while it does not yield the exact samplings. For this purpose, we utilize a feature that characterizes locality in the current state, which is easy to obtain with a type of specialized hardware. Furthermore, as the proposed algorithm is based on a rejection-free algorithm, the computational cost is low. In this work, after presenting the details of the proposed algorithm, we report the results of numerical experiments that demonstrate the effectiveness of the proposed feature and algorithm.
|
cs
|
2,312.04847 |
Orphan galaxies that have lost a large fraction of the dark matter subhaloes have often been invoked in semi-analytical as well as empirical models of galaxy formation. We run a mock cluster finder that mimics the optical cluster finding technique of the redMaPPer algorithm on a catalogue of galaxies with quenched star formation from one such empirical model, the UniverseMachine, and obtain the prevalence of orphan galaxies in these clusters as a function of their cluster-centric distance. We compare the fraction of orphan galaxies with the upper limits derived based on our prior observations of the weak lensing signals around satellite galaxies from SDSS redMaPPer clusters. Although the orphan fraction from the UniverseMachine is marginally consistent with the upper limits in the innermost regions of galaxy clusters spanning [0.1, 0.3] $h^{-1}$ Mpc, we observe that the orphan fractions substantially violate the upper limits in the outer regions of galaxy clusters beyond 0.3 $h^{-1}$ Mpc. We discuss the reasons, plausible improvements to the model and how observations can be used to constrain such models further.
|
astro-ph
|
2,312.03615 |
We investigate the rotational properties of quantum droplets, which form in a mixture of two Bose-Einstein condensates, in the presence of an anharmonic trapping potential. We identify various phases as the atom number and the angular momentum/angular velocity of the trap vary. These phases include center-of-mass-like excitation (without, or with vortices), vortices of single and multiple quantization, etc. Finally, we compare our results with those of the single-component problem.
|
quant-ph
|
2,312.03097 |
State of health (SOH) estimation for lithium-ion battery modules with cells connected in parallel is a challenging problem, especially with cell-to-cell variations. Incremental capacity analysis (ICA) and differential voltage analysis (DVA) are effective at the cell level, but they cannot be directly applied to module level SOH estimation, when only module level measurements are available. This paper proposes a new method and demonstrates that, with multiple features systematically selected from the module level ICA and DVA, the module level SOH can be estimated with high accuracy and confidence in the presence of cell-to-cell variations. First, a new information theory-based feature selection algorithm is proposed to find an optimal set of features for module level SOH estimation. Second, a new relevance vector regression (RVR)-based module level SOH estimation model is proposed to provide both point estimates and three-sigma credible intervals while maintaining model sparsity. Experimental datasets are used to illustrate and evaluate the proposed method. With more selected features incorporated, the proposed method achieves better estimation accuracy and higher confidence at the expense of higher model complexity. This trade-off is explored through a case study. When applied to a large experimental dataset, the proposed method and the resulting sparse model lead to module level SOH estimates with 0.5% root-mean-square errors and 1.5% average three-sigma values. With all the optimization and training processes completed offboard, the proposed method has low computational complexity for onboard implementations.
|
eess
|
2,312.02483 |
Early weakly supervised video grounding (WSVG) methods often struggle with incomplete boundary detection due to the absence of temporal boundary annotations. To bridge the gap between video-level and boundary-level annotation, explicit-supervision methods, i.e., generating pseudo-temporal boundaries for training, have achieved great success. However, data augmentations in these methods might disrupt critical temporal information, yielding poor pseudo boundaries. In this paper, we propose a new perspective that maintains the integrity of the original temporal content while introducing more valuable information for expanding the incomplete boundaries. To this end, we propose EtC (Expand then Clarify), first use the additional information to expand the initial incomplete pseudo boundaries, and subsequently refine these expanded ones to achieve precise boundaries. Motivated by video continuity, i.e., visual similarity across adjacent frames, we use powerful multimodal large language models (MLLMs) to annotate each frame within initial pseudo boundaries, yielding more comprehensive descriptions for expanded boundaries. To further clarify the noise of expanded boundaries, we combine mutual learning with a tailored proposal-level contrastive objective to use a learnable approach to harmonize a balance between incomplete yet clean (initial) and comprehensive yet noisy (expanded) boundaries for more precise ones. Experiments demonstrate the superiority of our method on two challenging WSVG datasets.
|
cs
|
2,312.06346 |
The concepts of stability and balance represent many critical problems faced by engineering today. The inverted pendulum on a cart is one such non-linear, unstable, multivariate system whose goal is to determine a suitable control action given to the cart such that it stabilizes the pendulum in an upright vertical position. This paper therefore, aims to design and study a highly robust MISO control structure using Linear Quadratic Regulation, Fuzzy logic and Neural Networks called Two-Stage LQR-based-ANFIS (referred to as TS-LA) for the stabilization of Inverted Pendulums. The proposed controller is implemented on a Simulink model of the Inverted Pendulum constructed through relevant mathematical and state space modelling using Newtonian and Lagrangian mechanics. Applying external disturbances, transient parameters are obtained and are benchmarked against standard conventional controllers to perform comparative analysis and showcase its disturbance rejection capabilities.
|
cs
|
2,312.02892 |
A combination of control Lyapunov functions (CLFs) and control barrier functions (CBFs) forms an efficient framework for addressing control challenges in safe stabilization. In our previous research, we developed an analytical control strategy, namely the universal formula, that incorporates CLF and CBF conditions for safe stabilization. However, successful implementation of this universal formula relies on an accurate model, as any mismatch between the model and the actual system can compromise stability and safety. In this paper, we propose a new universal formula that leverages Gaussian processes (GPs) learning to address safe stabilization in the presence of model uncertainty. By utilizing the results related to bounded learning errors, we achieve a high probability of stability and safety guarantees with the proposed universal formula. Additionally, we introduce a probabilistic compatibility condition to evaluate conflicts between the modified CLF and CBF conditions with GP learning results. In cases where compatibility assumptions fail and control system limits are present, we propose a modified universal formula that relaxes stability constraints and a projection-based method accommodating control limits. We illustrate the effectiveness of our approach through a simulation of adaptive cruise control (ACC), highlighting its potential for practical applications in real-world scenarios.
|
cs
|
2,312.04007 |
The Hubble tension persists as a challenge in cosmology. Even early dark energy (EDE) models, initially considered the most promising for alleviating the Hubble tension, fall short of addressing the issue without exacerbating other tensions, such as the $S_8$ tension. Considering that a negative dark matter (DM) equation of state (EoS) parameter is conducive to reduce the value of $\sigma_8$ parameter, in this paper, we extend the axion-like EDE model in this paper by replacing the cold dark matter (CDM) with DM characterized by a constant EoS $w_{\rm dm}$ (referred as WDM hereafter). We then impose constraints on this axion-like EDE extension model, along with three other models: the axion-like EDE model, $\Lambda$WDM, and $\Lambda$CDM. These constraints are derived from a comprehensive analysis incorporating data from the Planck 2018 cosmic microwave background (CMB), baryon acoustic oscillations (BAO), the Pantheon compilation, as well as a prior on $H_0$ (i.e., $H_0=73.04\pm1.04$, based on the latest local measurement by Riess et al.) and a Gaussianized prior on $S_8$ (i.e., $S_8=0.766\pm0.017$, determined through the joint analysis of KID1000+BOSS+2dLenS). We find that although the new model maintains the ability to alleviate the Hubble tension to $\sim$ 1.4$\sigma$, it still exacerbate the $S_8$ tension to a level similar to that of the axion-like EDE model.
|
astro-ph
|
2,312.04586 |
Security-Enhanced Linux (SELinux) is a Linux kernel module that allows for a role-based access control (RBAC) mechanism. It provides a fine-grained security framework enabling system administrators to define security policies at the system and application level. Whilst SELinux offers robust security features through a customisable, powerful RBAC model, its manual policy management is prone to error, leaving the system vulnerable to accidental misconfigurations or loopholes. We present a tool to automate the conversion of SELinux policies into satisfiability modulo theories (SMT), enabling the verification of the intended security configurations using automated theorem proving. Our tool is capable of flagging common policy misconfigurations by asserting consistency between supplied RBAC policies and the intended specification by the user in SMT. RBAC policies are inherently complicated to verify entirely. We envision that the automated tool presented here can be further extended to identify an even broader range of policy misconfigurations, relieving the burden of managing convoluted policies on system administrators.
|
cs
|
2,312.03372 |
Three-dimensional (3D) reconstruction of trees has always been a key task in precision forestry management and research. Due to the complex branch morphological structure of trees themselves and the occlusions from tree stems, branches and foliage, it is difficult to recreate a complete three-dimensional tree model from a two-dimensional image by conventional photogrammetric methods. In this study, based on tree images collected by various cameras in different ways, the Neural Radiance Fields (NeRF) method was used for individual tree reconstruction and the exported point cloud models are compared with point cloud derived from photogrammetric reconstruction and laser scanning methods. The results show that the NeRF method performs well in individual tree 3D reconstruction, as it has higher successful reconstruction rate, better reconstruction in the canopy area, it requires less amount of images as input. Compared with photogrammetric reconstruction method, NeRF has significant advantages in reconstruction efficiency and is adaptable to complex scenes, but the generated point cloud tends to be noisy and low resolution. The accuracy of tree structural parameters (tree height and diameter at breast height) extracted from the photogrammetric point cloud is still higher than those of derived from the NeRF point cloud. The results of this study illustrate the great potential of NeRF method for individual tree reconstruction, and it provides new ideas and research directions for 3D reconstruction and visualization of complex forest scenes.
|
cs
|
2,312.05419 |
A new definition of discrete-time negative imaginary (NI) systems is provided. This definition characterizes the dissipative property of a zero-order hold sampled continuous-time NI system. Under some assumptions, asymptotic stability can be guaranteed for the closed-loop interconnection of an NI system and an output strictly negative imaginary system, with one of them having a one step advance. In the case of linear systems, we also provide necessary and sufficient frequency-domain and LMI conditions under which the definition is satisfied. Also provided is a simple DC gain condition for the stability results in the linear case. We show in an example that a discretized mass-spring system, which is NI, can be asymptotically stabilized using the proposed results.
|
math
|
2,312.02735 |
We present a comprehensive overview of a volume-complete sample of white dwarfs located within 40 pc of the Sun, a significant proportion of which were detected in Gaia Data Release 3 (DR3). Our DR3 sample contains 1076 spectroscopically confirmed white dwarfs, with just five candidates within the volume remaining unconfirmed (more than 99 per cent spectroscopic completeness). Additionally, 28 white dwarfs were not in our initial selection from Gaia DR3, most of which are in unresolved binaries. We use Gaia DR3 photometry and astrometry to determine a uniform set of white dwarf parameters, including mass, effective temperature, and cooling age. We assess the demographics of the 40 pc sample, specifically magnetic fields, binarity, space density and mass distributions.
|
astro-ph
|
2,312.03849 |
Generating instructional images of human daily actions from an egocentric viewpoint serves a key step towards efficient skill transfer. In this paper, we introduce a novel problem -- egocentric action frame generation. The goal is to synthesize the action frame conditioning on the user prompt question and an input egocentric image that captures user's environment. Notably, existing egocentric datasets lack the detailed annotations that describe the execution of actions. Additionally, the diffusion-based image manipulation models fail to control the state change of an action within the corresponding egocentric image pixel space. To this end, we finetune a visual large language model (VLLM) via visual instruction tuning for curating the enriched action descriptions to address our proposed problem. Moreover, we propose to Learn EGOcentric (LEGO) action frame generation using image and text embeddings from VLLM as additional conditioning. We validate our proposed model on two egocentric datasets -- Ego4D and Epic-Kitchens. Our experiments show prominent improvement over prior image manipulation models in both quantitative and qualitative evaluation. We also conduct detailed ablation studies and analysis to provide insights on our method.
|
cs
|
2,312.03245 |
Deep learning based intrusion detection systems (DL-based IDS) have emerged as one of the best choices for providing security solutions against various network intrusion attacks. However, due to the emergence and development of adversarial deep learning technologies, it becomes challenging for the adoption of DL models into IDS. In this paper, we propose a novel IDS architecture that can enhance the robustness of IDS against adversarial attacks by combining conventional machine learning (ML) models and Deep Learning models. The proposed DLL-IDS consists of three components: DL-based IDS, adversarial example (AE) detector, and ML-based IDS. We first develop a novel AE detector based on the local intrinsic dimensionality (LID). Then, we exploit the low attack transferability between DL models and ML models to find a robust ML model that can assist us in determining the maliciousness of AEs. If the input traffic is detected as an AE, the ML-based IDS will predict the maliciousness of input traffic, otherwise the DL-based IDS will work for the prediction. The fusion mechanism can leverage the high prediction accuracy of DL models and low attack transferability between DL models and ML models to improve the robustness of the whole system. In our experiments, we observe a significant improvement in the prediction performance of the IDS when subjected to adversarial attack, achieving high accuracy with low resource consumption.
|
cs
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.