2,458,791 results
Search Results
2. Expanding the Katz Index for Link Prediction: A Case Study on a Live Fish Movement Network
- Author
-
Vidza, Michael-Sam, Budka, Marcin, Chai, Wei Koong, Thrush, Mark, and Alves, Mickael Teixeira
- Subjects
Computer Science - Social and Information Networks ,Mathematics - Combinatorics ,Physics - Physics and Society - Abstract
In aquaculture, disease spread models often neglect the dynamic interactions between farms, hindering accuracy. This study enhances the Katz index (KI) to incorporate spatial and temporal patterns of fish movement, improving the prediction of farms susceptible to disease via live fish transfers. We modified the Katz index to create models like the Weighted Katz Index (WKI), Edge Weighted Katz Index (EWKI), and combined models (e.g., KIEWKI). These incorporate spatial distances and temporal movement patterns for a comprehensive aquaculture network connection prediction framework. Model performance was evaluated using precision, recall, F1-scores, AUPR, and AUROC. The EWKI model significantly outperformed the traditional KI and other variations. It achieved high precision (0.988), recall (0.712), F1-score (0.827), and AUPR (0.970). Combined models (KIEWKI, WKIEWKI) approached, but couldn't surpass, EWKI performance. This study highlights the value of extending Katz index models to improve disease spread predictions in aquaculture networks. The EWKI model's performance demonstrates an innovative and flexible approach to tackling spatial challenges within network analysis., Comment: 15 pages, 3 figures, submitted to Expert Systems with Applications
- Published
- 2024
3. Wrinkling instability of 3D auxetic bilayers in tension
- Author
-
Venkata, Sairam Pamulaparthi, Fu, Yuxin, Fu, Yibin, Balbi, Valentina, and Destrade, Michel
- Subjects
Condensed Matter - Materials Science - Abstract
Bilayers (soft substrates coated with stiff films) are commonly found in nature with examples including skin tissue, vesicles, or organ membranes. They exhibit various types of instabilities when subjected to compression, depending on the contrast in material properties between the two components. We present wrinkling instabilities for 3D hyperelastic bilayer systems, including auxetics (materials with negative Poisson's ratio), under uni-axial tension. In tension, a soft bilayer can experience large lateral contraction, and we find that with an adequate contrast in the Poisson ratios, compressive stresses may develop and generate wrinkles aligned with the tensile direction. We rely on an analytic modelling of the phenomenon, and validate it with a user-defined Python script with periodic boundary conditions and constitutive relation implementation in advanced Finite Element simulations. Our findings reveal that wrinkles are observed when the Poisson ratio of the substrate is greater than that of the film. As the two Poisson ratios converge to a common value, the critical stretch of instability shoots up rapidly, and the wrinkling disappears. We also confirm these results by asymptotic analysis. This wrinkling analysis has significant potential in controlling surface patterns of auxetic skin grafts and hydrogel organ patches under mechanical loads. Moreover, the asymptotic expressions in this work can be used under finite strain for buckling-based metrology applications.
- Published
- 2024
4. Physical Layer Authentication Using Information Reconciliation
- Author
-
Passah, Atsu Kokuvi Angélo, de Lamare, Rodrigo C., and Chorti, Arsenia
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Cryptography and Security - Abstract
User authentication in future wireless communication networks is expected to become more complicated due to their large scale and heterogeneity. Furthermore, the computational complexity of classical cryptographic approaches based on public key distribution can be a limiting factor for using in simple, low-end Internet of things (IoT) devices. This paper proposes physical layer authentication (PLA) expected to complement existing traditional approaches, e.g., in multi-factor authentication protocols. The precision and consistency of PLA is impacted because of random variations of wireless channel realizations between different time slots, which can impair authentication performance. In order to address this, a method based on error-correcting codes in the form of reconciliation is considered in this work. In particular, we adopt distributed source coding (Slepian-Wolf) reconciliation using polar codes to reconcile channel measurements spread in time. Hypothesis testing is then applied to the reconciled vectors to accept or reject the device as authenticated. Simulation results show that the proposed PLA using reconciliation outperforms prior schemes even in low signal-to-noise ratio scenarios.
- Published
- 2024
5. Grid-aware Scheduling and Control of Electric Vehicle Charging Stations for Dispatching Active Distribution Networks. Part-II: Intra-day and Experimental Validation
- Author
-
Gupta, Rahul K., Fahmy, Sherif, Chevron, Max, Figini, Enea, and Paolone, Mario
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
In Part-I, we presented an optimal day-ahead scheduling scheme for dispatching active distribution networks accounting for the flexibility provided by electric vehicle charging stations (EVCSs) and other controllable resources such as battery energy storage systems (BESSs). Part-II presents the intra-day control layer for tracking the dispatch plan computed from the day-ahead scheduling stage. The control problem is formulated as model predictive control (MPC) with an objective to track the dispatch plan setpoint every 5 minutes, while actuated every 30 seconds. MPC accounts for the uncertainty of the power injections from stochastic resources (such as demand and generation from photovoltaic - PV plants) by short-term forecasts. MPC also accounts for the grid's operational constraints (i.e., the limits on the nodal voltages and the line power-flows) by a linearized optimal power flow (LOPF) model based on the power-flow sensitivity coefficients, and for the operational constraints of the controllable resources (i.e., BESSs and EVCSs). The proposed framework is experimentally validated on a real-life ADN at the EPFL's Distributed Electrical Systems Laboratory and is composed of a medium voltage (MV) bus connected to three low voltage distribution networks. It hosts two controllable EVCSs (172 kWp and 32 F~kWp), multiple PV plants (aggregated generation of 42~kWp), uncontrollable demand from office buildings (20 kWp), and two controllable BESSs (150kW/300kWh and 25kW/25kWh)., Comment: 10 pages, 14 Figures, submitted for review in IEEE Transactions
- Published
- 2024
6. LLM-R2: A Large Language Model Enhanced Rule-based Rewrite System for Boosting Query Efficiency
- Author
-
Li, Zhaodonghui, Yuan, Haitao, Wang, Huiming, Cong, Gao, and Bing, Lidong
- Subjects
Computer Science - Databases ,Computer Science - Computation and Language - Abstract
Query rewrite, which aims to generate more efficient queries by altering a SQL query's structure without changing the query result, has been an important research problem. In order to maintain equivalence between the rewritten query and the original one during rewriting, traditional query rewrite methods always rewrite the queries following certain rewrite rules. However, some problems still remain. Firstly, existing methods of finding the optimal choice or sequence of rewrite rules are still limited and the process always costs a lot of resources. Methods involving discovering new rewrite rules typically require complicated proofs of structural logic or extensive user interactions. Secondly, current query rewrite methods usually rely highly on DBMS cost estimators which are often not accurate. In this paper, we address these problems by proposing a novel method of query rewrite named LLM-R2, adopting a large language model (LLM) to propose possible rewrite rules for a database rewrite system. To further improve the inference ability of LLM in recommending rewrite rules, we train a contrastive model by curriculum to learn query representations and select effective query demonstrations for the LLM. Experimental results have shown that our method can significantly improve the query execution efficiency and outperform the baseline methods. In addition, our method enjoys high robustness across different datasets., Comment: 12 pages
- Published
- 2024
7. Tribo-piezoelectric Nanogenerators for Energy Harvesting: a first-principles study
- Author
-
Damte, Jemal Yimer and Houskaa, Jiri
- Subjects
Condensed Matter - Materials Science ,Physics - Applied Physics - Abstract
Two-dimensional transition metal dichalcogenides (TMDs) are highly promising candidates for various applications due to their unique electrical, optical, mechanical, and chemical properties. Furthermore, heterostructures consisting of TMDs with metals, oxides, and conductive materials have attracted significant research interest due to their exceptional electronic properties. In this study, we utilized density functional theory to investigate those electronic and transport properties, which are relevant for the application of tribo-piezoelectricity in creating novel nanogenerators: an interdisciplinary approach with promising implications. The results of the study demonstrate that the enhancement of charge transfer between layers and the orbital contribution to the Fermi level under applied strain in MoS/IrO, MoS/TiO, MoS/WTe, and MoTe/WS heterostructures is noteworthy. Additionally, non-equilibrium Green's function calculations of electron transport properties provide valuable insights into the behavior of these materials under different conditions. While MoS/IrO and MoS/TiO hetero-bilayers are unsuitable due to their tendency to exhibit large current flow with increasing voltage, others like MoS/WTe and MoTe/WS hetero bilayers show promise due to their ability to prevent voltage drop. The presented innovative concept of utilizing compressive strain of TMD bilayers to generate a tribo-piezoelectric effect for nanogenerators has a potential to contribute to the development of efficient and sustainable energy harvesting devices., Comment: 6 pages, 6 figures
- Published
- 2024
8. Coding for Composite DNA to Correct Substitutions, Strand Losses, and Deletions
- Author
-
Walter, Frederik, Sabary, Omer, Wachter-Zeh, Antonia, and Yaakobi, Eitan
- Subjects
Computer Science - Information Theory - Abstract
Composite DNA is a recent method to increase the base alphabet size in DNA-based data storage.This paper models synthesizing and sequencing of composite DNA and introduces coding techniques to correct substitutions, losses of entire strands, and symbol deletion errors. Non-asymptotic upper bounds on the size of codes with $t$ occurrences of these error types are derived. Explicit constructions are presented which can achieve the bounds.
- Published
- 2024
9. FipTR: A Simple yet Effective Transformer Framework for Future Instance Prediction in Autonomous Driving
- Author
-
Gui, Xingtai, Huang, Tengteng, Shao, Haonan, Yao, Haotian, and Zhang, Chi
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Robotics - Abstract
The future instance prediction from a Bird's Eye View(BEV) perspective is a vital component in autonomous driving, which involves future instance segmentation and instance motion prediction. Existing methods usually rely on a redundant and complex pipeline which requires multiple auxiliary outputs and post-processing procedures. Moreover, estimated errors on each of the auxiliary predictions will lead to degradation of the prediction performance. In this paper, we propose a simple yet effective fully end-to-end framework named Future Instance Prediction Transformer(FipTR), which views the task as BEV instance segmentation and prediction for future frames. We propose to adopt instance queries representing specific traffic participants to directly estimate the corresponding future occupied masks, and thus get rid of complex post-processing procedures. Besides, we devise a flow-aware BEV predictor for future BEV feature prediction composed of a flow-aware deformable attention that takes backward flow guiding the offset sampling. A novel future instance matching strategy is also proposed to further improve the temporal coherence. Extensive experiments demonstrate the superiority of FipTR and its effectiveness under different temporal BEV encoders.
- Published
- 2024
10. How Does the Textual Information Affect the Retrieval of Multimodal In-Context Learning?
- Author
-
Luo, Yang, Zheng, Zangwei, Zhu, Zirui, and You, Yang
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
The increase in parameter size of multimodal large language models (MLLMs) introduces significant capabilities, particularly in-context learning, where MLLMs enhance task performance without updating pre-trained parameters. This effectiveness, however, hinges on the appropriate selection of in-context examples, a process that is currently biased towards visual data, overlooking textual information. Furthermore, the area of supervised retrievers for MLLMs, crucial for optimal in-context example selection, continues to be uninvestigated. Our study offers an in-depth evaluation of the impact of textual information on the unsupervised selection of in-context examples in multimodal contexts, uncovering a notable sensitivity of retriever performance to the employed modalities. Responding to this, we introduce a novel supervised MLLM-retriever MSIER that employs a neural network to select examples that enhance multimodal in-context learning efficiency. This approach is validated through extensive testing across three distinct tasks, demonstrating the method's effectiveness. Additionally, we investigate the influence of modalities on our supervised retrieval method's training and pinpoint factors contributing to our model's success. This exploration paves the way for future advancements, highlighting the potential for refined in-context learning in MLLMs through the strategic use of multimodal data.
- Published
- 2024
11. A Guide to Feature Importance Methods for Scientific Inference
- Author
-
Ewald, Fiona Katharina, Bothmann, Ludwig, Wright, Marvin N., Bischl, Bernd, Casalicchio, Giuseppe, and König, Gunnar
- Subjects
Statistics - Machine Learning ,Computer Science - Machine Learning ,Mathematics - Statistics Theory ,Statistics - Methodology - Abstract
While machine learning (ML) models are increasingly used due to their high predictive power, their use in understanding the data-generating process (DGP) is limited. Understanding the DGP requires insights into feature-target associations, which many ML models cannot directly provide, due to their opaque internal mechanisms. Feature importance (FI) methods provide useful insights into the DGP under certain conditions. Since the results of different FI methods have different interpretations, selecting the correct FI method for a concrete use case is crucial and still requires expert knowledge. This paper serves as a comprehensive guide to help understand the different interpretations of FI methods. Through an extensive review of FI methods and providing new proofs regarding their interpretation, we facilitate a thorough understanding of these methods and formulate concrete recommendations for scientific inference. We conclude by discussing options for FI uncertainty estimation and point to directions for future research aiming at full statistical inference from black-box ML models., Comment: Accepted at the 2nd World Conference on eXplainable Artificial Intelligence, xAI-2024
- Published
- 2024
12. A minimal model of boosting and waning iin a recurrent seasonal epidemic
- Author
-
Chen, Siyu and Sankoff, David
- Subjects
Quantitative Biology - Populations and Evolution - Abstract
We propose a model of the immunity to a cyclical epidemic disease taking account not only of seasonal boosts during the infectious season, but also of residual immunity remaining from one season to the next. The focus is on the exponential waning process over successive cycles, imposed on the temporal distribution of infections or exposures over a season. This distribution, interacting with the waning function, is all that is necessary to reproduce, in mathematically closed form, the mechanical cycle of boosting and waning immunity characteristic of recurrent seasonal infectious disease. Distinct from epidemiological models predicting numbers of individuals moving between infectivity compartments, our result enables us to directly estimate parameters of waning and the infectivity distribution. We can naturally iterate the cyclical process to simulate immunity trajectories over many years and thus to quantify the strong relationship between residual immunity and the time elapsed between annual infectivity peaks.
- Published
- 2024
13. Nyon Unchained: Forensic Analysis of Bosch's eBike Board Computers
- Author
-
Stachak, Marcel, Geus, Julian, Pugliese, Gaston, and Freiling, Felix
- Subjects
Computer Science - Cryptography and Security - Abstract
Modern eBike on-board computers are basically small PCs that not only offer motor control, navigation, and performance monitoring, but also store lots of sensitive user data. The Bosch Nyon series of board computers are cutting-edge devices from one of the market leaders in the eBike business, which is why they are especially interesting for forensics. Therefore, we conducted an in-depth forensic analysis of the two available Nyon models released in 2014 and 2021. On a first-generation Nyon device, Telnet access could be established by abusing a design flaw in the update procedure, which allowed the acquisition of relevant data without risking damage to the hardware. Besides the user's personal information, the data analysis revealed databases containing user activities, including timestamps and GPS coordinates. Furthermore, it was possible to forge the data on the device and transfer it to Bosch's servers to be persisted across their online service and smartphone app. On a current second-generation Nyon device, no software-based access could be obtained. For this reason, more intrusive hardware-based options were considered, and the data could be extracted via chip-off eventually. Despite encryption, the user data could be accessed and evaluated. Besides location and user information, the newer model holds even more forensically relevant data, such as nearby Bluetooth devices., Comment: In: Proceedings of the Digital Forensics Research Conference EU (DFRWS EU). 2024
- Published
- 2024
14. Development of Two-Dimensional Neutron Imager with a Sandwich Configuration
- Author
-
Kamiya, Y., Nishimura, R., Mitsui, S., Wang, Z., Morris, C. L., Makela, M., Clayton, S. M., Baldwin, J. K., Ito, T. M., Akamatsu, S., Iwase, H., Arai, Y., Murata, J., and Asai, S.
- Subjects
Physics - Instrumentation and Detectors - Abstract
We have developed a two-dimensional neutron imager based on a semiconductor pixelated sensor, especially designed for experiments measuring of a spatial and a temporal behavior of quantum bound states of ultra-cold neutrons. Through these measurements, we expect to measure the ratio between the inertial and gravitational masses of neutrons and to test the equivalence principle in the quantum regime. As one of the principal neutron imagers, we fabricated a sensor with a sandwich configuration, named 10B-INTPIX4-sw, and tested its response to ultra-cold neutrons at the Los Alamos Neutron Science Center (LANSCE). We observed simultaneous events on both sandwiching sensors without significant loss of detection efficiency. The efficiency was evaluated to be about 16%, relative to the 10B/ZnS reference detector. The coincidence condition reduces its efficiency by a factor of about 3.
- Published
- 2024
15. Foundation Model assisted Weakly Supervised LiDAR Semantic Segmentation
- Author
-
Chen, Yilong, Xu, Zongyi, Huang, xiaoshui, Zhang, Ruicheng, Jiang, Xinqi, and Gao, Xinbo
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Current point cloud semantic segmentation has achieved great advances when given sufficient labels. However, the dense annotation of LiDAR point clouds remains prohibitively expensive and time-consuming, unable to keep up with the continuously growing volume of data. In this paper, we propose annotating images with scattered points, followed by utilizing SAM (a Foundation model) to generate semantic segmentation labels for the images. Finally, by mapping the segmentation labels of the images to the LiDAR space using the intrinsic and extrinsic parameters of the camera and LiDAR, we obtain labels for point cloud semantic segmentation, and release Scatter-KITTI and Scatter-nuScenes, which are the first works to utilize image segmentation-based SAM for weakly supervised point cloud semantic segmentation. Furthermore, to mitigate the influence of erroneous pseudo labels obtained from sparse annotations on point cloud features, we propose a multi-modal weakly supervised network for LiDAR semantic segmentation, called MM-ScatterNet. This network combines features from both point cloud and image modalities, enhancing the representation learning of point clouds by introducing consistency constraints between multi-modal features and point cloud features. On the SemanticKITTI dataset, we achieve 66\% of fully supervised performance using only 0.02% of annotated data, and on the NuScenes dataset, we achieve 95% of fully supervised performance using only 0.1% labeled points.
- Published
- 2024
16. Grid-aware Scheduling and Control of Electric Vehicle Charging Stations for Dispatching Active Distribution Networks. Part-I: Day-ahead and Numerical Validation
- Author
-
Gupta, Rahul K., Fahmy, Sherif, Chevron, Max, Vasapollo, Riccardo, Figini, Enea, and Paolone, Mario
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
This paper proposes a grid-aware scheduling and control framework for Electric Vehicle Charging Stations (EVCSs) for dispatching the operation of an active power distribution network. The framework consists of two stages. In the first stage, we determine an optimal day-ahead power schedule at the grid connection point (GCP), referred to as the dispatch plan. Then, in the second stage, a real-time model predictive control is proposed to track the day-ahead dispatch plan using flexibility from EVCSs. The dispatch plan accounts for the uncertainties of vehicles connected to the EVCS along with other uncontrollable power injections, by day-ahead predicted scenarios. We propose using a Gaussian-Mixture-Model (GMM) for the forecasting of EVCS demand using the historical dataset on arrival, departure times, EV battery capacity, State-of-Charge (SoC) targets, etc. The framework ensures that the grid is operated within its voltage and branches power-flow operational bounds, modeled by a linearized optimal power-flow model, maintaining the tractability of the problem formulation. The scheme is numerically and experimentally validated on a real-life distribution network at the EPFL connected to two EVCSs, two batteries, three photovoltaic plants, and multiple heterogeneous loads. The day-ahead and real-time stages are described in Part-I and Part-II papers respectively., Comment: 10 pages, 13 figures (submitted for review in IEEE Transactions)
- Published
- 2024
17. Relative Energy Method For Weak-Strong Uniqueness Of The Inhomogeneous Navier-Stokes Equations
- Author
-
Crin-Barat, Timothée, Škondrić, Stefan, and Violini, Alessandro
- Subjects
Mathematics - Analysis of PDEs - Abstract
We present a weak-strong uniqueness result for the inhomogeneous Navier-Stokes (INS) equations in $\mathbb{R}^d$ ($d=2,3$) for bounded initial densities that are far from vacuum. Given a strong solution within the class employed in Paicu, Zhang and Zhang (2013) and Chen, Zhang and Zhao (2016), and a Leray-Hopf weak solution, we establish that they coincide if the initial data agree. The strategy of our proof is based on the relative energy method and new $W^{-1,p}$-type stability estimates for the density. A key point lies in proving that every Leray-Hopf weak solution originating from initial densities far from vacuum remains distant from vacuum at all times.
- Published
- 2024
18. Nonreciprocal PT-symmetric phase transition in a non-Hermitian chiral quantum optical system
- Author
-
Cai, Miao, Tang, Jiang-Shan, Chen, Ming-Yuan, and Xia, Keyu
- Subjects
Quantum Physics - Abstract
Phase transitions, non-Hermiticity and nonreciprocity play central roles in fundamental physics. However, the triple interplay of these three fields is of lack in the quantum domain. Here, we show nonreciprocal parity-time-symmetric phase transition in a non-Hermitian chiral quantum electrodynamical system, caused by the directional system dissipation. In remarkable contrast to previously reported nonreciprocal phase transitions, the nonreciprocal parity-time-symmetric phases appear even when the atom-resonator coupling is reciprocal. Nonreciprocal photon blockade is obtained in the nonreciprocal phase region. These results may deepen the fundamental insight of nonreciprocal and non-Hermitian quantum physics, and also open a new door for unconventional quantum manipulation., Comment: 6 pages, 4 figures
- Published
- 2024
19. LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning
- Author
-
Li, Beichen, Guo, Yuanfang, Peng, Heqi, Li, Yangxi, and Wang, Yunhong
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Deep neural networks are vulnerable to backdoor attacks. Among the existing backdoor defense methods, trigger reverse engineering based approaches, which reconstruct the backdoor triggers via optimizations, are the most versatile and effective ones compared to other types of methods. In this paper, we summarize and construct a generic paradigm for the typical trigger reverse engineering process. Based on this paradigm, we propose a new perspective to defeat trigger reverse engineering by manipulating the classification confidence of backdoor samples. To determine the specific modifications of classification confidence, we propose a compensatory model to compute the lower bound of the modification. With proper modifications, the backdoor attack can easily bypass the trigger reverse engineering based methods. To achieve this objective, we propose a Label Smoothing Poisoning (LSP) framework, which leverages label smoothing to specifically manipulate the classification confidences of backdoor samples. Extensive experiments demonstrate that the proposed work can defeat the state-of-the-art trigger reverse engineering based methods, and possess good compatibility with a variety of existing backdoor attacks.
- Published
- 2024
20. CaBaFL: Asynchronous Federated Learning via Hierarchical Cache and Feature Balance
- Author
-
Xia, Zeke, Hu, Ming, Yan, Dengke, Xie, Xiaofei, Li, Tianlin, Li, Anran, Zhou, Junlong, and Chen, Mingsong
- Subjects
Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Federated Learning (FL) as a promising distributed machine learning paradigm has been widely adopted in Artificial Intelligence of Things (AIoT) applications. However, the efficiency and inference capability of FL is seriously limited due to the presence of stragglers and data imbalance across massive AIoT devices, respectively. To address the above challenges, we present a novel asynchronous FL approach named CaBaFL, which includes a hierarchical Cache-based aggregation mechanism and a feature Balance-guided device selection strategy. CaBaFL maintains multiple intermediate models simultaneously for local training. The hierarchical cache-based aggregation mechanism enables each intermediate model to be trained on multiple devices to align the training time and mitigate the straggler issue. In specific, each intermediate model is stored in a low-level cache for local training and when it is trained by sufficient local devices, it will be stored in a high-level cache for aggregation. To address the problem of imbalanced data, the feature balance-guided device selection strategy in CaBaFL adopts the activation distribution as a metric, which enables each intermediate model to be trained across devices with totally balanced data distributions before aggregation. Experimental results show that compared with the state-of-the-art FL methods, CaBaFL achieves up to 9.26X training acceleration and 19.71\% accuracy improvements.
- Published
- 2024
21. Language-Driven Active Learning for Diverse Open-Set 3D Object Detection
- Author
-
Greer, Ross, Antoniussen, Bjørk, Møgelmose, Andreas, and Trivedi, Mohan
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Object detection is crucial for ensuring safe autonomous driving. However, data-driven approaches face challenges when encountering minority or novel objects in the 3D driving scene. In this paper, we propose VisLED, a language-driven active learning framework for diverse open-set 3D Object Detection. Our method leverages active learning techniques to query diverse and informative data samples from an unlabeled pool, enhancing the model's ability to detect underrepresented or novel objects. Specifically, we introduce the Vision-Language Embedding Diversity Querying (VisLED-Querying) algorithm, which operates in both open-world exploring and closed-world mining settings. In open-world exploring, VisLED-Querying selects data points most novel relative to existing data, while in closed-world mining, it mines new instances of known classes. We evaluate our approach on the nuScenes dataset and demonstrate its effectiveness compared to random sampling and entropy-querying methods. Our results show that VisLED-Querying consistently outperforms random sampling and offers competitive performance compared to entropy-querying despite the latter's model-optimality, highlighting the potential of VisLED for improving object detection in autonomous driving scenarios.
- Published
- 2024
22. Circular Photocurrents in Centrosymmetric Semiconductors with Hidden Spin Polarization
- Author
-
Wang, Kexin, Yan, Chengyu, Zhang, Butian, and Wang, Shun
- Subjects
Condensed Matter - Materials Science ,Condensed Matter - Mesoscale and Nanoscale Physics - Abstract
Centrosymmetric materials with site inversion asymmetries possess hidden spin polarization, which remains challenging to be converted into spin currents because the global inversion symmetry is still conserved. This study demonstrates the spin-polarized DC circular photocurrents (CPC) in centrosymmetric transition metal dichalcogenides (TMDCs) at normal incidence without applying electric bias. The global inversion symmetry is broken by using a spatially-varying circularly polarized light beam, which could generate spin gradient owing to the hidden spin polarization. The dependences of CPC on electrode configuration, illumination position, and beam spot size indicate an emergence of circulating electric current under spatially inhomogeneous light, which is associated with the spin-to-charge conversion through the inverse spin Hall effect (ISHE). The CPC is subsequently utilized to probe the spin polarization and ISHE under different excitation wavelengths and temperatures. The results of this study demonstrate the feasibility of using centrosymmetric materials with hidden spin polarization and spin-orbit coupling (SOC) for spintronic device applications.
- Published
- 2024
23. Migrating Software Systems towards Post-Quantum-Cryptography -- A Systematic Literature Review
- Author
-
Näther, Christian, Herzinger, Daniel, Gazdag, Stefan-Lukas, Steghöfer, Jan-Philipp, Daum, Simon, and Loebenberger, Daniel
- Subjects
Computer Science - Cryptography and Security - Abstract
Networks such as the Internet are essential for our connected world. Quantum computing poses a threat to this heterogeneous infrastructure since it threatens fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components. At the moment, there is little knowledge on how such migrations should be structured and implemented in practice. Our systematic literature review addresses migration approaches for IP networks towards PQC. It surveys papers about the migration process and exemplary real-world software system migrations. On the process side, we found that terminology, migration steps, and roles are not defined precisely or consistently across the literature. Still, we identified four major phases and appropriate substeps which we matched with also emerging archetypes of roles. In terms of real-world migrations, we see that reports used several different PQC implementations and hybrid solutions for migrations of systems belonging to a wide range of system types. Across all papers we noticed three major challenges for adopters: missing experience of PQC and a high realization effort, concerns about the security of the upcoming system, and finally, high complexity. Our findings indicate that recent standardization efforts already push quantum-safe networking forward. However, the literature is still not in consensus about definitions and best practices. Implementations are mostly experimental and not necessarily practical, leading to an overall chaotic situation. To better grasp this fast moving field of (applied) research, our systematic literature review provides a comprehensive overview of its current state and serves as a starting point for delving into the matter of PQC migration., Comment: 2 figures, 12 tables, 22 pages
- Published
- 2024
24. Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset
- Author
-
Azugo, Peace, Venter, Hein, and Nkongolo, Mike Wa
- Subjects
Computer Science - Cryptography and Security - Abstract
Cybersecurity faces challenges in identifying and mitigating ransomware, which is important for protecting critical infrastructures. The absence of datasets for distinguishing normal versus abnormal network behaviour hinders the development of proactive detection strategies against ransomware. An obstacle in proactive prevention methods is the absence of comprehensive datasets for contrasting normal versus abnormal network behaviours. The dataset enabling such contrasts would significantly expedite threat anomaly mitigation. In this study, we introduce UGRansome2024, an optimised dataset for ransomware detection in network traffic. This dataset is derived from the UGRansome data using an intuitionistic feature engineering approach that considers only relevant patterns in network behaviour analysis. The study presents an analysis of ransomware detection using the UGRansome2024 dataset and the Random Forest algorithm. Through encoding and feature relevance determination, the Random Forest achieved a classification accuracy of 96% and effectively identified unusual ransomware transactions. Findings indicate that certain ransomware variants, such as those utilising Encrypt Decrypt Algorithms (EDA) and Globe ransomware, have the highest financial impact. These insights have significant implications for real-world cybersecurity practices, highlighting the importance of machine learning in ransomware detection and mitigation. Further research is recommended to expand datasets, explore alternative detection methods, and address limitations in current approaches.
- Published
- 2024
25. Perspective on descriptors of mechanical behavior of cubic transition-metal carbides and nitrides
- Author
-
Kindlund, Hanna, Ciobanu, Theodora, Kodambaka, Suneel, and Ciobanu, C. V.
- Subjects
Condensed Matter - Materials Science - Abstract
Cubic rocksalt structured transition-metal carbides, nitrides, and related alloys (TMC/Ns) are attractive for a wide variety of applications, notably as hard, wear-resistant material. To-date, valence electron concentration (VEC) is used as a good indicator of stability and mechanical properties of these refractory compounds. In this perspective, we argue for the need for electronic descriptors beyond VEC to explain and predict the mechanical behavior of the cubic TMC/Ns. As such, we point out that descriptors that highlight differences between constituent have been underused, along with semi-empirical models of mechanical properties. Additionally, it appears promising to partition VEC into contribution to ionic, covalent, and metallic bonds and we suggest that such partition could provide more insight into predicting mechanical properties in the future.
- Published
- 2024
26. ECOR: Explainable CLIP for Object Recognition
- Author
-
Rasekh, Ali, Ranjbar, Sepehr Kazemi, Heidari, Milad, and Nejdl, Wolfgang
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Large Vision Language Models (VLMs), such as CLIP, have significantly contributed to various computer vision tasks, including object recognition and object detection. Their open vocabulary feature enhances their value. However, their black-box nature and lack of explainability in predictions make them less trustworthy in critical domains. Recently, some work has been done to force VLMs to provide reasonable rationales for object recognition, but this often comes at the expense of classification accuracy. In this paper, we first propose a mathematical definition of explainability in the object recognition task based on the joint probability distribution of categories and rationales, then leverage this definition to fine-tune CLIP in an explainable manner. Through evaluations of different datasets, our method demonstrates state-of-the-art performance in explainable classification. Notably, it excels in zero-shot settings, showcasing its adaptability. This advancement improves explainable object recognition, enhancing trust across diverse applications. The code will be made available online upon publication.
- Published
- 2024
27. TartuNLP @ SIGTYP 2024 Shared Task: Adapting XLM-RoBERTa for Ancient and Historical Languages
- Author
-
Dorkin, Aleksei and Sirts, Kairit
- Subjects
Computer Science - Computation and Language - Abstract
We present our submission to the unconstrained subtask of the SIGTYP 2024 Shared Task on Word Embedding Evaluation for Ancient and Historical Languages for morphological annotation, POS-tagging, lemmatization, character- and word-level gap-filling. We developed a simple, uniform, and computationally lightweight approach based on the adapters framework using parameter-efficient fine-tuning. We applied the same adapter-based approach uniformly to all tasks and 16 languages by fine-tuning stacked language- and task-specific adapters. Our submission obtained an overall second place out of three submissions, with the first place in word-level gap-filling. Our results show the feasibility of adapting language models pre-trained on modern languages to historical and ancient languages via adapter training., Comment: 11 pages, 3 figures
- Published
- 2024
28. Boundary regularity for a general nonlinear parabolic equation in non-divergence form
- Author
-
Kurkinen, Tapio
- Subjects
Mathematics - Analysis of PDEs ,35K61 (primary) 35K65, 35K67, 35D40 (secondary) - Abstract
We characterize regular boundary points in terms of a barrier family for a general form of a parabolic equation that generalizes both the standard parabolic $p$-Laplace equation and the normalized version arising from stochastic game theory. Using this result we prove geometric conditions that ensure regularity by constructing suitable barrier families. We also prove that when $q<2$, a single barrier does not suffice to guarantee regularity., Comment: 30 pages
- Published
- 2024
29. Banach Lie groupoid of partial isometries over restricted Grassmannian
- Author
-
Goliński, Tomasz, Jakimowicz, Grzegorz, and Sliżewska, Aneta
- Subjects
Mathematics - Differential Geometry ,Mathematics - Functional Analysis - Abstract
The differential structure on the set of partial isometries over the restricted Grassmannian is constructed, which makes it a Banach Lie groupoid.
- Published
- 2024
30. KoReA-SFL: Knowledge Replay-based Split Federated Learning Against Catastrophic Forgetting
- Author
-
Xia, Zeke, Hu, Ming, Yan, Dengke, Liu, Ruixuan, Li, Anran, Xie, Xiaofei, and Chen, Mingsong
- Subjects
Computer Science - Machine Learning - Abstract
Although Split Federated Learning (SFL) is good at enabling knowledge sharing among resource-constrained clients, it suffers from the problem of low training accuracy due to the neglect of data heterogeneity and catastrophic forgetting. To address this issue, we propose a novel SFL approach named KoReA-SFL, which adopts a multi-model aggregation mechanism to alleviate gradient divergence caused by heterogeneous data and a knowledge replay strategy to deal with catastrophic forgetting. Specifically, in KoReA-SFL cloud servers (i.e., fed server and main server) maintain multiple branch model portions rather than a global portion for local training and an aggregated master-model portion for knowledge sharing among branch portions. To avoid catastrophic forgetting, the main server of KoReA-SFL selects multiple assistant devices for knowledge replay according to the training data distribution of each server-side branch-model portion. Experimental results obtained from non-IID and IID scenarios demonstrate that KoReA-SFL significantly outperforms conventional SFL methods (by up to 23.25\% test accuracy improvement).
- Published
- 2024
31. Determination of the CKM angle $\phi_{3}$ from a combination of Belle and Belle II results
- Author
-
Belle, Collaborations, Belle II, Adachi, I., Aggarwal, L., Aihara, H., Akopov, N., Aloisio, A., Said, S. Al, Ky, N. Anh, Asner, D. M., Atmacan, H., Aushev, V., Aversano, M., Ayad, R., Babu, V., Bae, H., Bahinipati, S., Bambade, P., Banerjee, Sw., Bansal, S., Barrett, M., Baudot, J., Baur, A., Beaubien, A., Becherer, F., Becker, J., Belous, K., Bennett, J. V., Bernlochner, F. U., Bertacchi, V., Bertemes, M., Bertholet, E., Bessner, M., Bettarini, S., Bhuyan, B., Bianchi, F., Bierwirth, L., Bilka, T., Bilokin, S., Biswas, D., Bobrov, A., Bodrov, D., Bolz, A., Bondar, A., Bozek, A., Bračko, M., Branchini, P., Briere, R. A., Browder, T. E., Budano, A., Bussino, S., Campajola, M., Cao, L., Casarosa, G., Cecchi, C., Cerasoli, J., Chang, M. -C., Chang, P., Cheaib, R., Cheema, P., Cheon, B. G., Chilikin, K., Chirapatpimol, K., Cho, H. -E., Cho, K., Choi, S. -K., Choi, Y., Choudhury, S., Corona, L., Das, S., Dattola, F., De La Cruz-Burelo, E., De La Motte, S. A., de Marino, G., De Nardo, G., De Nuccio, M., De Pietro, G., de Sangro, R., Destefanis, M., Dhamija, R., Di Canto, A., Di Capua, F., Dingfelder, J., Doležal, Z., Dong, T. V., Dorigo, M., Dort, K., Dossett, D., Dreyer, S., Dubey, S., Dujany, G., Ecker, P., Eliachevitch, M., Epifanov, D., Feichtinger, P., Ferber, T., Ferlewicz, D., Fillinger, T., Finocchiaro, G., Fodor, A., Forti, F., Frey, A., Fulsom, B. G., Gabrielli, A., Ganiev, E., Garcia-Hernandez, M., Garg, R., Gaudino, G., Gaur, V., Gaz, A., Gellrich, A., Ghevondyan, G., Ghosh, D., Ghumaryan, H., Giakoustidis, G., Giordano, R., Giri, A., Gobbo, B., Godang, R., Gogota, O., Goldenzweig, P., Gradl, W., Grammatico, T., Granderath, S., Graziani, E., Greenwald, D., Gruberová, Z., Gu, T., Guan, Y., Gudkova, K., Halder, S., Han, Y., Hara, T., Hayashii, H., Hazra, S., Hedges, M. T., Heidelbach, A., de la Cruz, I. Heredia, Villanueva, M. Hernández, Higuchi, T., Hoek, M., Hohmann, M., Horak, P., Hsu, C. -L., Humair, T., Iijima, T., Inami, K., Ipsita, N., Ishikawa, A., Itoh, R., Iwasaki, M., Jackson, P., Jacobs, W. W., Jang, E. -J., Ji, Q. P., Jia, S., Jin, Y., Junkerkalefeld, H., Kalita, D., Kaliyar, A. B., Kandra, J., Kawasaki, T., Keil, F., Kiesling, C., Kim, C. -H., Kim, D. Y., Kim, K. -H., Kim, Y. -K., Kindo, H., Kinoshita, K., Kodyš, P., Koga, T., Kohani, S., Kojima, K., Korobov, A., Korpar, S., Kovalenko, E., Kowalewski, R., Kraetzschmar, T. M. G., Križan, P., Krokovny, P., Kuhr, T., Kumar, J., Kumar, M., Kumar, R., Kumara, K., Kunigo, T., Kuzmin, A., Kwon, Y. -J., Lacaprara, S., Lai, Y. -T., Lam, T., Lanceri, L., Lange, J. S., Laurenza, M., Lee, M. J., Levit, D., Lewis, P. M., Li, C., Li, L. K., Li, Y., Li, Y. B., Libby, J., Liu, M. H., Liu, Q. Y., Liu, Z. Q., Liventsev, D., Longo, S., Lueck, T., Lyu, C., Ma, Y., Maggiora, M., Maharana, S. P., Maiti, R., Maity, S., Mancinelli, G., Manfredi, R., Manoni, E., Mantovano, M., Marcantonio, D., Marcello, S., Marinas, C., Martel, L., Martellini, C., Martini, A., Martinov, T., Massaccesi, L., Masuda, M., Matvienko, D., Maurya, S. K., McKenna, J. A., Mehta, R., Meier, F., Merola, M., Metzner, F., Miller, C., Mirra, M., Miyabayashi, K., Miyake, H., Mohanty, G. B., Molina-Gonzalez, N., Mondal, S., Moneta, S., Moser, H. -G., Mrvar, M., Mussa, R., Nakamura, I., Nakamura, K. R., Nakao, M., Nakazawa, Y., Charan, A. Narimani, Naruki, M., Narwal, D., Natkaniec, Z., Natochii, A., Nayak, L., Nayak, M., Nazaryan, G., Neu, M., Niebuhr, C., Nishida, S., Ogawa, S., Onishchuk, Y., Ono, H., Oskin, P., Otani, F., Pakhlov, P., Pakhlova, G., Panta, A., Pardi, S., Parham, K., Park, H., Park, S. -H., Passeri, A., Patra, S., Paul, S., Pedlar, T. K., Peschke, R., Pestotnik, R., Piccolo, M., Piilonen, L. E., Angioni, G. Pinna, Podesta-Lerma, P. L. M., Podobnik, T., Pokharel, S., Praz, C., Prell, S., Prencipe, E., Prim, M. T., Purwar, H., Rados, P., Raeuber, G., Raiz, S., Rauls, N., Reif, M., Reiter, S., Remnev, M., Ripp-Baudot, I., Rizzo, G., Robertson, S. H., Roehrken, M., Roney, J. M., Rostomyan, A., Rout, N., Russo, G., Sanders, D. A., Sandilya, S., Santelj, L., Sato, Y., Savinov, V., Scavino, B., Schmitt, C., Schnell, G., Schwanda, C., Schwickardi, M., Seino, Y., Selce, A., Senyo, K., Serrano, J., Sevior, M. E., Sfienti, C., Shan, W., Shi, X. D., Shillington, T., Shimasaki, T., Shiu, J. -G., Shtol, D., Shwartz, B., Sibidanov, A., Simon, F., Singh, J. B., Skorupa, J., Sobie, R. J., Sobotzik, M., Soffer, A., Sokolov, A., Solovieva, E., Spataro, S., Spruck, B., Starič, M., Stavroulakis, P., Stefkova, S., Stroili, R., Sumihama, M., Sumisawa, K., Sutcliffe, W., Suwonjandee, N., Takizawa, M., Tamponi, U., Tanida, K., Tenchini, F., Tittel, O., Tiwary, R., Tonelli, D., Torassa, E., Trabelsi, K., Tsaklidis, I., Uchida, M., Ueda, I., Uematsu, Y., Uglov, T., Unger, K., Unno, Y., Uno, K., Uno, S., Urquijo, P., Ushiroda, Y., Vahsen, S. E., van Tonder, R., Varvell, K. E., Veronesi, M., Vinokurova, A., Vismaya, V. S., Vitale, L., Vobbilisetti, V., Volpe, R., Wach, B., Wakai, M., Wallner, S., Wang, E., Wang, M. -Z., Wang, X. L., Wang, Z., Warburton, A., Watanuki, S., Wessel, C., Won, E., Xu, X. P., Yabsley, B. D., Yamada, S., Yan, W., Yang, S. B., Yelton, J., Yin, J. H., Yoshihara, K., Yuan, C. Z., Zhang, B., Zhang, Y., Zhilich, V., Zhou, Q. D., and Zhukova, V. I.
- Subjects
High Energy Physics - Experiment - Abstract
We report a determination of the CKM angle $\phi_{3}$, also known as $\gamma$, from a combination of measurements using samples of up to 711~fb$^{-1}$ from the Belle experiment and up to 362~fb$^{-1}$ from the Belle II experiment. We combine results from analyses of $B^+\to DK^+, B^+\to D\pi^+$, and $B^+ \to D^{*}K^+$ decays, where $D$ is an admixture of $D^0$ and $\overline{D}{}^{0}$ mesons, in a likelihood fit to obtain $\phi_{3} = (78.6^{+7.2}_{-7.3})^{\circ}$. We also briefly discuss the interpretation of this result., Comment: 31 pages, 4 figures
- Published
- 2024
32. Explainable Deepfake Video Detection using Convolutional Neural Network and CapsuleNet
- Author
-
Ishrak, Gazi Hasin, Mahmud, Zalish, Farabe, MD. Zami Al Zunaed, Tinni, Tahera Khanom, Reza, Tanzim, and Parvez, Mohammad Zavid
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
Deepfake technology, derived from deep learning, seamlessly inserts individuals into digital media, irrespective of their actual participation. Its foundation lies in machine learning and Artificial Intelligence (AI). Initially, deepfakes served research, industry, and entertainment. While the concept has existed for decades, recent advancements render deepfakes nearly indistinguishable from reality. Accessibility has soared, empowering even novices to create convincing deepfakes. However, this accessibility raises security concerns.The primary deepfake creation algorithm, GAN (Generative Adversarial Network), employs machine learning to craft realistic images or videos. Our objective is to utilize CNN (Convolutional Neural Network) and CapsuleNet with LSTM to differentiate between deepfake-generated frames and originals. Furthermore, we aim to elucidate our model's decision-making process through Explainable AI, fostering transparent human-AI relationships and offering practical examples for real-life scenarios.
- Published
- 2024
33. Martin's Maximum${}^{\ast, ++}_{\mathfrak{c}}$ in $\mathbb{P}_{\max}$ extensions of strong models of determinacy
- Author
-
Schindler, Ralf and Yasuda, Taichi
- Subjects
Mathematics - Logic - Abstract
We study a strengthening of $\mathrm{MM}^{++}$ which is called $\mathrm{MM}^{\ast, ++}$ and which was introduced by Asper\'o and Schindler. We force its bounded version $\mathrm{MM}^{\ast, ++}_{\mathfrak{c}}$, which is stronger than both $\mathrm{MM}^{++}(\mathfrak{c})$ as well as $\mathrm{BMM}^{++}$, by $\mathbb{P}_{\max}$ forcing over a determinacy model $L^{F_{\mathrm{uB}}}({\mathbb R}^*,\mbox{Hom}^{\ast})$. The construction of the ground model $L^{F_{\mathrm{uB}}}({\mathbb R}^{\ast},\mbox{Hom}^{\ast})$ builds upon Gappo and Sargsyan, and the derived model construction of Larson, Sargsyan, and Wilson.
- Published
- 2024
34. Towards Logically Consistent Language Models via Probabilistic Reasoning
- Author
-
Calanzone, Diego, Teso, Stefano, and Vergari, Antonio
- Subjects
Computer Science - Machine Learning ,Computer Science - Computation and Language - Abstract
Large language models (LLMs) are a promising venue for natural language understanding and generation tasks. However, current LLMs are far from reliable: they are prone to generate non-factual information and, more crucially, to contradict themselves when prompted to reason about beliefs of the world. These problems are currently addressed with large scale fine-tuning or by delegating consistent reasoning to external tools. In this work, we strive for a middle ground and introduce a training objective based on principled probabilistic reasoning that teaches a LLM to be consistent with external knowledge in the form of a set of facts and rules. Fine-tuning with our loss on a limited set of facts enables our LLMs to be more logically consistent than previous baselines and allows them to extrapolate to unseen but semantically similar factual knowledge more systematically., Comment: Accepted at ICLR 2024 Workshop on Reliable and Responsible Foundation Models
- Published
- 2024
35. Optimal Training Design for Over-the-Air Polynomial Power Amplifier Model Estimation
- Author
-
Rottenberg, François, Feys, Thomas, and Tervo, Nuutti
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
The current evolution towards a massive number of antennas and a large variety of transceiver architectures forces to revisit the conventional techniques used to improve the fundamental power amplifier (PA) linearity-efficiency trade-off. Most of the digital linearization techniques rely on PA measurements using a dedicated feedback receiver. However, in modern systems with large amount of RF chains and high carrier frequency, dedicated receiver per RF chain is costly and complex to implement. This issue can be addressed by measuring PAs over the air, but in that case, this extra signalling is sharing resources with the actual data transmission. In this paper, we look at the problem from an estimation theory point of view so as to minimize pilot overhead while optimizing estimation performance. We show that conventional results in the mathematical statistics community can be used. We find the least squares (LS) optimal training design, minimizing the maximal mean squared error (MSE) of the reconstructed PA response over its whole input range. As compared to uniform training, simulations demonstrate a factor 10 reduction of the maximal MSE for a L = 7 PA polynomial order. Using prior information, the LMMSE estimator can achieve an additional gain of a factor up to 300 at low signal-to-noise ratio (SNR).
- Published
- 2024
36. Accurate and Fast Geometry Optimization with Time Estimation and Method Switching
- Author
-
Imamura, Satoshi, Kasagi, Akihiko, and Yoshida, Eiji
- Subjects
Physics - Chemical Physics - Abstract
Geometry optimization is an important task in quantum chemical calculations to analyze the characteristics of molecules. A top concern on it is a long execution time because time-consuming energy and gradient calculations are repeated across several to tens of steps. In this work, we present a scheme to estimate the execution times of geometry optimization of a target molecule at different accuracy levels (i.e., the combinations of ab initio methods and basis sets). It enables to identify the accuracy levels where geometry optimization will finish in an acceptable time. In addition, we propose a gradient-based method switching (GMS) technique that reduces the execution time by dynamically switching multiple methods during geometry optimization. Our evaluation using 46 molecules in total shows that the geometry optimization times at 20 accuracy levels are estimated with a mean error of 29.5%, and GMS reduces the execution time by up to 42.7% without affecting the accuracy of geometry optimization., Comment: 24 pages, 8 figures
- Published
- 2024
37. Failures of integral Springer's Theorem
- Author
-
Daans, Nicolas, Kala, Vítĕzslav, Krásenský, Jakub, and Yatsyna, Pavlo
- Subjects
Mathematics - Number Theory ,11E12, 11H55, 11R80 - Abstract
We discuss the phenomenon where an element in a number field is not integrally represented by a given positive definite quadratic form, but becomes integrally represented by this form over a totally real extension of odd degree. We prove that this phenomenon happens infinitely often, and, conversely, establish finiteness results about the situation when the quadratic form is fixed., Comment: preprint, 10 pages
- Published
- 2024
38. On the $L^2$ volume of Bergman spaces
- Author
-
Zhou, Shengxuan
- Subjects
Mathematics - Complex Variables ,Mathematics - Differential Geometry - Abstract
In this paper, we show that the Calabi volume and Mabuchi volume of Bergman spaces on the product of a projective manifold and a projective space is infinite. Our result is inspired by a conjecture of Shiffman-Zelditch in [arXiv:2303.11559]., Comment: Comments are welcome!
- Published
- 2024
39. COIN: Counterfactual inpainting for weakly supervised semantic segmentation for medical images
- Author
-
Shvetsov, Dmytro, Ariva, Joonas, Domnich, Marharyta, Vicente, Raul, and Fishman, Dmytro
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Deep learning is dramatically transforming the field of medical imaging and radiology, enabling the identification of pathologies in medical images, including computed tomography (CT) and X-ray scans. However, the performance of deep learning models, particularly in segmentation tasks, is often limited by the need for extensive annotated datasets. To address this challenge, the capabilities of weakly supervised semantic segmentation are explored through the lens of Explainable AI and the generation of counterfactual explanations. The scope of this research is development of a novel counterfactual inpainting approach (COIN) that flips the predicted classification label from abnormal to normal by using a generative model. For instance, if the classifier deems an input medical image X as abnormal, indicating the presence of a pathology, the generative model aims to inpaint the abnormal region, thus reversing the classifier's original prediction label. The approach enables us to produce precise segmentations for pathologies without depending on pre-existing segmentation masks. Crucially, image-level labels are utilized, which are substantially easier to acquire than creating detailed segmentation masks. The effectiveness of the method is demonstrated by segmenting synthetic targets and actual kidney tumors from CT images acquired from Tartu University Hospital in Estonia. The findings indicate that COIN greatly surpasses established attribution methods, such as RISE, ScoreCAM, and LayerCAM, as well as an alternative counterfactual explanation method introduced by Singla et al. This evidence suggests that COIN is a promising approach for semantic segmentation of tumors in CT images, and presents a step forward in making deep learning applications more accessible and effective in healthcare, where annotated data is scarce., Comment: This work has been accepted to be presented to The 2nd World Conference on eXplainable Artificial Intelligence (xAI 2024), July 17-19, 2024 - Valletta, Malta
- Published
- 2024
40. Getting to the Root of the Problem: Sums of Squares for Infinite Trees
- Author
-
Brosch, Daniel and Puges, Diane
- Subjects
Mathematics - Optimization and Control ,Mathematics - Combinatorics - Abstract
The inducibility of a graph represents its maximum density as an induced subgraph over all possible sequences of graphs of size growing to infinity. This invariant of graphs has been extensively studied since its introduction in $1975$ by Pippenger and Golumbic. In $2017$, Czabarka, Sz\'ekely and Wagner extended this notion to leaf-labeled rooted binary trees, which are objects widely studied in the field of phylogenetics. They obtain the first results and bounds for the densities and inducibilities of such trees. Following up on their work, we apply Razborov's flag algebra theory to this setting, introducing the flag algebra of rooted leaf-labeled binary trees. This framework allows us to use polynomial optimization methods, based on semidefinite programming, to efficiently obtain new upper bounds for the inducibility of trees and to improve existing ones. Additionally, we obtain the first outer approximations of profiles of trees, which represent all possible simultaneous densities of a pair of trees. Finally, we are able to prove the non-convexity of some of these profiles.
- Published
- 2024
41. Black Hole shadows of $\alpha'$-corrected black holes
- Author
-
Agurto-Sepúlveda, F., Oliva, J., Oyarzo, M., and Schleicher, D. R. G
- Subjects
General Relativity and Quantum Cosmology ,Astrophysics - High Energy Astrophysical Phenomena ,High Energy Physics - Theory - Abstract
In this paper we study the qualitative features induces by corrections to GR coming from String Theory, on the shadows of rotating black holes. We deal with the slowly rotating black hole solutions up to order $\mathcal{O}(a^3)$, to first order in $\alpha'$, including also the dilaton. We provide a detailed characterization of the geometry, as well as the ISCO and photon ring, and then we proceed to obtain the black hole images within the relativistic thin-disk model. We characterize the images by computing the diameter, displacement and asymmetry. A comparison with the Kerr case, indicates that all these quantities grow due to the $\alpha'$ correction, and that the departure from GR for different observable is enhanced depending on the angle of view, namely for the diameter the maximum departure is obtained when the system is face-on, while for the displacement and asymmetry the departure from GR is maximized for edge-on point of view., Comment: 14 pages, 8 figures
- Published
- 2024
42. Towards a decentralized data privacy protocol for self-sovereignty in the digital world
- Author
-
Falcão, Rodrigo and Hosseinzadeh, Arghavan
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Software Engineering - Abstract
A typical user interacts with many digital services nowadays, providing these services with their data. As of now, the management of privacy preferences is service-centric: Users must manage their privacy preferences according to the rules of each service provider, meaning that every provider offers its unique mechanisms for users to control their privacy settings. However, managing privacy preferences holistically (i.e., across multiple digital services) is just impractical. In this vision paper, we propose a paradigm shift towards an enriched user-centric approach for cross-service privacy preferences management: the realization of a decentralized data privacy protocol., Comment: To appear in the proceedings of RCIS 2024
- Published
- 2024
43. On extremal points for some vectorial total variation seminorms
- Author
-
Bredies, Kristian, Iglesias, José A., and Walter, Daniel
- Subjects
Mathematics - Functional Analysis ,Mathematics - Analysis of PDEs ,Mathematics - Optimization and Control ,46N10, 46A55, 26B30, 49Q20 - Abstract
We consider the set of extremal points of the generalized unit ball induced by gradient total variation seminorms for vector-valued functions on bounded Euclidean domains. These extremal points are central to the understanding of sparse solutions and sparse optimization algorithms for variational regularization problems posed among such functions. For not fully vectorial cases in which either the domain or the target are one dimensional, or the sum of the total variations of each component is used, we prove that these extremals are fully characterized as in the scalar-valued case, that is, they consist of piecewise constant functions with two regions. For definitions involving more involved matrix norms and in particular spectral norms, which are of interest in image processing, we produce families of examples to show that the resulting set of extremal points is larger and includes piecewise constant functions with more than two regions. We also consider the total deformation induced by the symmetrized gradient, for which minimization with linear constraints appears in problems of determination of limit loads in a number of continuum mechanical models involving plasticity, bringing relevance to the corresponding extremal points. For this case, we show piecewise infinitesimally rigid functions with two pieces to be extremal under mild assumptions. Finally, as an example of an extremal which is not piecewise constant, we prove that unit radial vector fields are extremal for the Frobenius total variation in the plane., Comment: 33 pages, 0 figures
- Published
- 2024
44. How Far Can We Go with Practical Function-Level Program Repair?
- Author
-
Xiang, Jiahong, Xu, Xiaoyang, Kong, Fanchu, Wu, Mingyuan, Zhang, Haotian, and Zhang, Yuqun
- Subjects
Computer Science - Software Engineering - Abstract
Recently, multiple Automated Program Repair (APR) techniques based on Large Language Models (LLMs) have been proposed to enhance the repair performance. While these techniques mainly focus on the single-line or hunk-level repair, they face significant challenges in real-world application due to the limited repair task scope and costly statement-level fault localization. However, the more practical function-level APR, which broadens the scope of APR task to fix entire buggy functions and requires only cost-efficient function-level fault localization, remains underexplored. In this paper, we conduct the first comprehensive study of LLM-based function-level APR including investigating the effect of the few-shot learning mechanism and the auxiliary repair-relevant information. Specifically, we adopt six widely-studied LLMs and construct a benchmark in both the Defects4J 1.2 and 2.0 datasets. Our study demonstrates that LLMs with zero-shot learning are already powerful function-level APR techniques, while applying the few-shot learning mechanism leads to disparate repair performance. Moreover, we find that directly applying the auxiliary repair-relevant information to LLMs significantly increases function-level repair performance. Inspired by our findings, we propose an LLM-based function-level APR technique, namely SRepair, which adopts a dual-LLM framework to leverage the power of the auxiliary repair-relevant information for advancing the repair performance. The evaluation results demonstrate that SRepair can correctly fix 300 single-function bugs in the Defects4J dataset, largely surpassing all previous APR techniques by at least 85%, without the need for the costly statement-level fault location information. Furthermore, SRepair successfully fixes 32 multi-function bugs in the Defects4J dataset, which is the first time achieved by any APR technique ever to our best knowledge., Comment: https://github.com/GhabiX/SRepair/
- Published
- 2024
45. Distinguishing radiation mechanisms and particle populations in blazar jets through long-term multi-band monitoring with RINGO3 and Fermi
- Author
-
McCall, Callum, Jermak, Helen, Steele, Iain A., Agudo, Iván, de Almeida, Ulisses Barres, Hovatta, Talvikki, Lamb, Gavin P., Lindfors, Elina, and Mundell, Carole
- Subjects
Astrophysics - High Energy Astrophysical Phenomena - Abstract
We present the results of seven years of multicolour photometric monitoring of a sample of 31 $\gamma$-ray bright blazars using the RINGO3 polarimeter on the Liverpool Telescope from 2013--2020. We explore the relationships between simultaneous observations of flux in three optical wavebands along with Fermi $\gamma$-ray data in order to explore the radiation mechanisms and particle populations in blazar jets. We find significant correlations between optical and $\gamma$-ray flux with no detectable time lag, suggesting leptonic emission processes in the jets of these sources. Furthermore, we find the spectral behaviour against optical and $\gamma$-ray flux for many sources is best fit logarithmically. This is suggestive of a transition between bluer-/redder-when-brighter into stable-when-brighter behaviour during high activity states; a behaviour that might be missed in poorly sampled data, resulting in apparent linear relationships., Comment: 32 pages, 35 figures
- Published
- 2024
46. Coexistence of Push Wireless Access with Pull Communication for Content-based Wake-up Radios
- Author
-
Shiraishi, Junya, Cavallero, Sara, Pandey, Shashi Raj, Saggese, Fabio, and Popovski, Petar
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper considers energy-efficient connectivity for Internet of Things (IoT) devices in a coexistence scenario between two distinctive communication models: pull- and push-based. In pull-based, the base station (BS) decides when to retrieve a specific type of data from the IoT devices, while in push-based, the IoT device decides when and which data to transmit. To this end, this paper advocates introducing the content-based wake-up (CoWu), which enables the BS to remotely activate only a subset of pull-based nodes equipped with wake-up receivers, observing the relevant data. In this setup, a BS pulls data with CoWu at a specific time instance to fulfill its tasks while collecting data from the nodes operating with a push-based communication model. The resource allocation plays an important role: longer data collection duration for pull-based nodes can lead to high retrieval accuracy while decreasing the probability of data transmission success for push-based nodes, and vice versa. Numerical results show that CoWu can manage communication requirements for both pull-based and push-based nodes while realizing the high energy efficiency (up to 38%) of IoT devices, compared to the baseline scheduling method., Comment: Paper submitted to Globecom 2024. Copyright may be transferred without further notice
- Published
- 2024
47. CT-ADE: An Evaluation Benchmark for Adverse Drug Event Prediction from Clinical Trial Results
- Author
-
Yazdani, Anthony, Bornet, Alban, Zhang, Boya, Khlebnikov, Philipp, Amini, Poorya, and Teodoro, Douglas
- Subjects
Computer Science - Computation and Language - Abstract
Adverse drug events (ADEs) significantly impact clinical research and public health, contributing to failures in clinical trials and leading to increased healthcare costs. The accurate prediction and management of ADEs are crucial for improving the development of safer, more effective medications, and enhancing patient outcomes. To support this effort, we introduce CT-ADE, a novel dataset compiled to enhance the predictive modeling of ADEs. Encompassing over 12,000 instances extracted from clinical trial results, the CT-ADE dataset integrates drug, patient population, and contextual information for multilabel ADE classification tasks in monopharmacy treatments, providing a comprehensive resource for developing advanced predictive models. To mirror the complex nature of ADEs, annotations are standardized at the system organ class level of the Medical Dictionary for Regulatory Activities (MedDRA) ontology. Preliminary analyses using baseline models have demonstrated promising results, achieving 73.33% F1 score and 81.54% balanced accuracy, highlighting CT-ADE's potential to advance ADE prediction. CT-ADE provides an essential tool for researchers aiming to leverage the power of artificial intelligence and machine learning to enhance patient safety and minimize the impact of ADEs on pharmaceutical research and development. Researchers interested in using the CT-ADE dataset can find all necessary resources at https://github.com/xxxx/xxxx.
- Published
- 2024
48. A note on Combinatorial Invariance of Kazhdan--Lusztig polynomials
- Author
-
Esposito, Francesco and Marietti, Mario
- Subjects
Mathematics - Combinatorics ,Mathematics - Representation Theory - Abstract
We introduce the concepts of an amazing hypercube decomposition and a double shortcut for it, and use these new ideas to formulate a conjecture implying the Combinatorial Invariance Conjecture of the Kazhdan--Lusztig polynomials for the symmetric group. This conjecture has the advantage of being combinatorial in nature.
- Published
- 2024
49. LiMe: a Latin Corpus of Late Medieval Criminal Sentences
- Author
-
Bassani, Alessandra, Del Bo, Beatrice, Ferrara, Alfio, Mangini, Marta, Picascia, Sergio, and Stefanello, Ambra
- Subjects
Computer Science - Computation and Language - Abstract
The Latin language has received attention from the computational linguistics research community, which has built, over the years, several valuable resources, ranging from detailed annotated corpora to sophisticated tools for linguistic analysis. With the recent advent of large language models, researchers have also started developing models capable of generating vector representations of Latin texts. The performances of such models remain behind the ones for modern languages, given the disparity in available data. In this paper, we present the LiMe dataset, a corpus of 325 documents extracted from a series of medieval manuscripts called Libri sententiarum potestatis Mediolani, and thoroughly annotated by experts, in order to be employed for masked language model, as well as supervised natural language processing tasks., Comment: to be published in: LT4HALA@LREC-COLING 2024
- Published
- 2024
50. Low solution rank of the matrix LASSO under RIP with consequences for rank-constrained algorithms
- Author
-
McRae, Andrew D.
- Subjects
Mathematics - Optimization and Control ,Mathematics - Statistics Theory ,62J07, 90C25, 90C26, 90C31, 90C46 - Abstract
We show that solutions to the popular convex matrix LASSO problem (nuclear-norm--penalized linear least-squares) have low rank under similar assumptions as required by classical low-rank matrix sensing error bounds. Although the purpose of the nuclear norm penalty is to promote low solution rank, a proof has not yet (to our knowledge) been provided outside very specific circumstances. Furthermore, we show that this result has significant theoretical consequences for nonconvex rank-constrained optimization approaches. Specifically, we show that if (a) the ground truth matrix has low rank, (b) the (linear) measurement operator has the matrix restricted isometry property (RIP), and (c) the measurement error is small enough relative to the nuclear norm penalty, then the (unique) LASSO solution has rank (approximately) bounded by that of the ground truth. From this, we show (a) that a low-rank--projected proximal gradient descent algorithm will converge linearly to the LASSO solution from any initialization, and (b) that the nonconvex landscape of the low-rank Burer-Monteiro--factored problem formulation is benign in the sense that all second-order critical points are globally optimal and yield the LASSO solution.
- Published
- 2024
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.