119 results on '"Zander, P."'
Search Results
2. Constraints on non-unitary neutrino mixing in light of atmospheric and reactor neutrino data
- Author
-
Kozynets, Tetiana, Eller, Philipp, Zander, Alan, Ettengruber, Manuel, and Koskinen, D. Jason
- Subjects
High Energy Physics - Phenomenology ,High Energy Physics - Experiment - Abstract
While the origin of neutrino masses remains unknown, several key neutrino mass generation models result in a non-unitary three-neutrino mixing matrix. To put such models to test, the deviations of the mixing matrix from unitarity can be measured directly through neutrino oscillation experiments. In this study, we perform a Bayesian analysis of the non-unitary mixing model using the recent public data from atmospheric and reactor neutrino experiments - namely IceCube-DeepCore, Daya Bay, and KamLAND. The novelty of our approach compared to the preceding global fits for non-unitarity is in the detailed treatment of the atmospheric neutrino data, which for the first time includes the relevant flux and detector systematic uncertainties. From the Bayesian posteriors on the individual mixing matrix elements, we derive the non-unitarity constraints in the form of normalisations and closures of the mixing matrix rows and columns. We find comparable constraints for electron and tau row normalisations as other similar studies in literature, and additionally reveal strong correlations between muon and tau row constraints induced by the atmospheric systematic uncertainties. We find that the current data is well described by both unitary and non-unitary mixing models, with a strong preference for the unitary mixing indicated by the Bayes factor. With the upcoming IceCube-Upgrade and JUNO detectors, both featuring superior energy resolution compared to the current atmospheric and reactor neutrino experiments, our constraints on the row normalisations are expected to improve by a factor of 2 (2.5) in the tau (muon) sector and by nearly 25% in the electron sector. In the future, our approach can be expanded to include solar and long-baseline neutrino experiments, with the aim to provide more stringent constraints while keeping track of the nuisance parameters that may be degenerate with non-unitarity., Comment: 46 pages, 26 figures
- Published
- 2024
3. On the Complexity of Identification in Linear Structural Causal Models
- Author
-
Dörfler, Julian, van der Zander, Benito, Bläser, Markus, and Liskiewicz, Maciej
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computational Complexity - Abstract
Learning the unknown causal parameters of a linear structural causal model is a fundamental task in causal analysis. The task, known as the problem of identification, asks to estimate the parameters of the model from a combination of assumptions on the graphical structure of the model and observational data, represented as a non-causal covariance matrix. In this paper, we give a new sound and complete algorithm for generic identification which runs in polynomial space. By standard simulation results, this algorithm has exponential running time which vastly improves the state-of-the-art double exponential time method using a Gr\"obner basis approach. The paper also presents evidence that parameter identification is computationally hard in general. In particular, we prove, that the task asking whether, for a given feasible correlation matrix, there are exactly one or two or more parameter sets explaining the observed matrix, is hard for $\forall R$, the co-class of the existential theory of the reals. In particular, this problem is $coNP$-hard. To our best knowledge, this is the first hardness result for some notion of identifiability.
- Published
- 2024
4. Solving the Product Breakdown Structure Problem with constrained QAOA
- Author
-
Zander, René, Seidel, Raphael, Inajetovic, Matteo, Steinmann, Niklas, and Petrič, Matic
- Subjects
Quantum Physics - Abstract
Constrained optimization problems, where not all possible variable assignments are feasible solutions, comprise numerous practically relevant optimization problems such as the Traveling Salesman Problem (TSP), or portfolio optimization. Established methods such as quantum annealing or vanilla QAOA usually transform the problem statement into a QUBO (Quadratic Unconstrained Binary Optimization) form, where the constraints are enforced by auxiliary terms in the QUBO objective. Consequently, such approaches fail to utilize the additional structure provided by the constraints. In this paper, we present a method for solving the industry relevant Product Breakdown Structure problem. Our solution is based on constrained QAOA, which by construction never explores the part of the Hilbert space that represents solutions forbidden by the problem constraints. The size of the search space is thereby reduced significantly. We experimentally show that this approach has not only a very favorable scaling behavior, but also appears to suppress the negative effects of Barren Plateaus., Comment: 13 pages
- Published
- 2024
5. Qrisp: A Framework for Compilable High-Level Programming of Gate-Based Quantum Computers
- Author
-
Seidel, Raphael, Bock, Sebastian, Zander, René, Petrič, Matic, Steinmann, Niklas, Tcholtchev, Nikolay, and Hauswirth, Manfred
- Subjects
Quantum Physics ,Computer Science - Programming Languages - Abstract
While significant progress has been made on the hardware side of quantum computing, support for high-level quantum programming abstractions remains underdeveloped compared to classical programming languages. In this article, we introduce Qrisp, a framework designed to bridge several gaps between high-level programming paradigms in state-of-the-art software engineering and the physical reality of today's quantum hardware. The framework aims to provide a systematic approach to quantum algorithm development such that they can be effortlessly implemented, maintained and improved. We propose a number of programming abstractions that are inspired by classical paradigms, yet consistently focus on the particular needs of a quantum developer. Unlike many other high-level language approaches, Qrisp's standout feature is its ability to compile programs to the circuit level, making them executable on most existing physical backends. The introduced abstractions enable the Qrisp compiler to leverage algorithm structure for increased compilation efficiency. Finally, we present a set of code examples, including an implementation of Shor's factoring algorithm. For the latter, the resulting circuit shows significantly reduced quantum resource requirements, strongly supporting the claim that systematic quantum algorithm development can give quantitative benefits.
- Published
- 2024
6. Decoding moral judgement from text: a pilot study
- Author
-
Gherman, Diana E. and Zander, Thorsten O.
- Subjects
Quantitative Biology - Neurons and Cognition ,Computer Science - Computation and Language ,Computer Science - Human-Computer Interaction - Abstract
Moral judgement is a complex human reaction that engages cognitive and emotional dimensions. While some of the morality neural correlates are known, it is currently unclear if we can detect moral violation at a single-trial level. In a pilot study, here we explore the feasibility of moral judgement decoding from text stimuli with passive brain-computer interfaces. For effective moral judgement elicitation, we use video-audio affective priming prior to text stimuli presentation and attribute the text to moral agents. Our results show that further efforts are necessary to achieve reliable classification between moral congruency vs. incongruency states. We obtain good accuracy results for neutral vs. morally-charged trials. With this research, we try to pave the way towards neuroadaptive human-computer interaction and more human-compatible large language models (LLMs), Comment: 7 pages, 2 figures, conference
- Published
- 2024
7. AdjointDEIS: Efficient Gradients for Diffusion Models
- Author
-
Blasingame, Zander W. and Liu, Chen
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
The optimization of the latents and parameters of diffusion models with respect to some differentiable metric defined on the output of the model is a challenging and complex problem. The sampling for diffusion models is done by solving either the probability flow ODE or diffusion SDE wherein a neural network approximates the score function or related quantity, allowing a numerical ODE/SDE solver to be used. However, na\"ive backpropagation techniques are memory intensive, requiring the storage of all intermediate states, and face additional complexity in handling the injected noise from the diffusion term of the diffusion SDE. We propose a novel method based on the stochastic adjoint sensitivity method to calculate the gradientwith respect to the initial noise, conditional information, and model parameters by solving an additional SDE whose solution is the gradient of the diffusion SDE. We exploit the unique construction of diffusion SDEs to further simplify the formulation of the adjoint diffusion SDE and use a change-of-variables to simplify the solution to an exponentially weighted integral. Using this formulation we derive a custom solver for the adjoint SDE as well as the simpler adjoint ODE. The proposed adjoint diffusion solvers can efficiently compute the gradients for both the probability flow ODE and diffusion SDE for latents and parameters of the model. Lastly, we demonstrate the effectiveness of the adjoint diffusion solvers onthe face morphing problem., Comment: Initial pre-print
- Published
- 2024
8. Probabilistic and Causal Satisfiability: the Impact of Marginalization
- Author
-
Dörfler, Julian, van der Zander, Benito, Bläser, Markus, and Liskiewicz, Maciej
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computational Complexity - Abstract
The framework of Pearl's Causal Hierarchy (PCH) formalizes three types of reasoning: observational, interventional, and counterfactual, that reflect the progressive sophistication of human thought regarding causation. We investigate the computational complexity aspects of reasoning in this framework focusing mainly on satisfiability problems expressed in probabilistic and causal languages across the PCH. That is, given a system of formulas in the standard probabilistic and causal languages, does there exist a model satisfying the formulas? The resulting complexity changes depending on the level of the hierarchy as well as the operators allowed in the formulas (addition, multiplication, or marginalization). We focus on formulas involving marginalization that are widely used in probabilistic and causal inference, but whose complexity issues are still little explored. Our main contribution are the exact computational complexity results showing that linear languages (allowing addition and marginalization) yield NP^PP-, PSPACE-, and NEXP-complete satisfiability problems, depending on the level of the PCH. Moreover, we prove that the problem for the full language (allowing additionally multiplication) is complete for the class succ$\exists$R for languages on the highest, counterfactual level, which extends previous results for the lower levels of the PCH. Finally, we consider constrained models that are restricted to a given Bayesian network, a Directed Acyclic Graph structure, or a small polynomial size. The complexity of languages on the interventional level is increased to the complexity of counterfactual languages without such a constraint, that is, linear languages become NEXP-complete. On the other hand, the complexity on the counterfactual level does not change. The constraint on the size reduces the complexity of the interventional and counterfactual languages to NEXP-complete., Comment: update adds complexity results involving a graph structure; submitted to NIPS
- Published
- 2024
9. The Existential Theory of the Reals with Summation Operators
- Author
-
Bläser, Markus, Dörfler, Julian, Liskiewicz, Maciej, and van der Zander, Benito
- Subjects
Computer Science - Computational Complexity ,Computer Science - Logic in Computer Science - Abstract
To characterize the computational complexity of satisfiability problems for probabilistic and causal reasoning within the Pearl's Causal Hierarchy, arXiv:2305.09508 [cs.AI] introduce a new natural class, named succ-$\exists$R. This class can be viewed as a succinct variant of the well-studied class $\exists$R based on the Existential Theory of the Reals (ETR). Analogously to $\exists$R, succ-$\exists$R is an intermediate class between NEXP and EXPSPACE, the exponential versions of NP and PSPACE. The main contributions of this work are threefold. Firstly, we characterize the class succ-$\exists$R in terms of nondeterministic real RAM machines and develop structural complexity theoretic results for real RAMs, including translation and hierarchy theorems. Notably, we demonstrate the separation of $\exists$R and succ-$\exists$R. Secondly, we examine the complexity of model checking and satisfiability of fragments of existential second-order logic and probabilistic independence logic. We show succ-$\exists$R- completeness of several of these problems, for which the best-known complexity lower and upper bounds were previously NEXP-hardness and EXPSPACE, respectively. Thirdly, while succ-$\exists$R is characterized in terms of ordinary (non-succinct) ETR instances enriched by exponential sums and a mechanism to index exponentially many variables, in this paper, we prove that when only exponential sums are added, the corresponding class $\exists$R^{\Sigma} is contained in PSPACE. We conjecture that this inclusion is strict, as this class is equivalent to adding a VNP-oracle to a polynomial time nondeterministic real RAM. Conversely, the addition of exponential products to ETR, yields PSPACE. Additionally, we study the satisfiability problem for probabilistic reasoning, with the additional requirement of a small model and prove that this problem is complete for $\exists$R^{\Sigma}.
- Published
- 2024
10. The Impact of Print-Scanning in Heterogeneous Morph Evaluation Scenarios
- Author
-
Neddo, Richard E., Blasingame, Zander W., and Liu, Chen
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Face morphing attacks pose an increasing threat to face recognition (FR) systems. A morphed photo contains biometric information from two different subjects to take advantage of vulnerabilities in FRs. These systems are particularly susceptible to attacks when the morphs are subjected to print-scanning to mask the artifacts generated during the morphing process. We investigate the impact of print-scanning on morphing attack detection through a series of evaluations on heterogeneous morphing attack scenarios. Our experiments show that we can increase the Mated Morph Presentation Match Rate (MMPMR) by up to 8.48%. Furthermore, when a Single-image Morphing Attack Detection (S-MAD) algorithm is not trained to detect print-scanned morphs the Morphing Attack Classification Error Rate (MACER) can increase by up to 96.12%, indicating significant vulnerability., Comment: Accepted as a special sessions paper at IJCB 2024
- Published
- 2024
11. Greedy-DiM: Greedy Algorithms for Unreasonably Effective Face Morphs
- Author
-
Blasingame, Zander W. and Liu, Chen
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Morphing attacks are an emerging threat to state-of-the-art Face Recognition (FR) systems, which aim to create a single image that contains the biometric information of multiple identities. Diffusion Morphs (DiM) are a recently proposed morphing attack that has achieved state-of-the-art performance for representation-based morphing attacks. However, none of the existing research on DiMs have leveraged the iterative nature of DiMs and left the DiM model as a black box, treating it no differently than one would a Generative Adversarial Network (GAN) or Varational AutoEncoder (VAE). We propose a greedy strategy on the iterative sampling process of DiM models which searches for an optimal step guided by an identity-based heuristic function. We compare our proposed algorithm against ten other state-of-the-art morphing algorithms using the open-source SYN-MAD 2022 competition dataset. We find that our proposed algorithm is unreasonably effective, fooling all of the tested FR systems with an MMPMR of 100%, outperforming all other morphing algorithms compared., Comment: Accepted as a conference paper at IJCB 2024
- Published
- 2024
12. Spatially Selective Reconfigurable Intelligent Surfaces Through Element Permutation
- Author
-
Rusek, Fredrik, Flordelis, Jose, Zhao, Kun, Bengtsson, Erik, and Zander, Olof
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
A standard reconfigurable intelligent surface (RIS) can be configured to reflect signals from an arbitrary impinging direction to an arbitrary outgoing direction. However, if a signal impinges from any other direction, said signal is reflected, with full beamforming gain, to a specific direction, which is easily determined. The goal of this paper is to propose a RIS which \emph{only} reflects signals from the configured impinging direction. This can be accomplished by a RIS architecture that permutes the antenna elements in the sense that a signal is re-radiated from a different antenna than the one receiving the signal. We analytically prove this fact, and also discuss several variants and hardware implementations., Comment: ICC 2024, 6 pages, 4 figures
- Published
- 2024
13. Set the Clock: Temporal Alignment of Pretrained Language Models
- Author
-
Zhao, Bowen, Brumbaugh, Zander, Wang, Yizhong, Hajishirzi, Hannaneh, and Smith, Noah A.
- Subjects
Computer Science - Computation and Language - Abstract
Language models (LMs) are trained on web text originating from many points in time and, in general, without any explicit temporal grounding. This work investigates the temporal chaos of pretrained LMs and explores various methods to align their internal knowledge to a target time, which we call "temporal alignment." To do this, we first automatically construct a dataset containing 20K time-sensitive questions and their answers for each year from 2000 to 2023. Based on this dataset, we empirically show that pretrained LMs (e.g., LLaMa2), despite having a recent pretraining cutoff (e.g., 2022), mostly answer questions using earlier knowledge (e.g., in 2019). We then develop several methods, from prompting to finetuning, to align LMs to use their most recent knowledge when answering questions, and investigate various factors in this alignment. Our experiments demonstrate that aligning LLaMa2 to the year 2022 can enhance its performance by up to 62% according to that year's answers. This improvement occurs even without explicitly mentioning time information, indicating the possibility of aligning models' internal sense of time after pretraining. Finally, we find that alignment to a historical time is also possible, with up to 2.8$\times$ the performance of the unaligned LM in 2010 if finetuning models to that year. These findings hint at the sophistication of LMs' internal knowledge organization and the necessity of tuning them properly., Comment: Accepted as Findings of ACL 2024. Our code and data is available at https://github.com/yizhongw/llm-temporal-alignment
- Published
- 2024
14. Quantum Backtracking in Qrisp Applied to Sudoku Problems
- Author
-
Seidel, Raphael, Zander, René, Petrič, Matic, Steinmann, Niklas, Liu, David Q., Tcholtchev, Nikolay, and Hauswirth, Manfred
- Subjects
Quantum Physics ,Computer Science - Data Structures and Algorithms ,Computer Science - Programming Languages - Abstract
The quantum backtracking algorithm proposed by Ashley Montanaro raised considerable interest, as it provides a quantum speed-up for a large class of classical optimization algorithms. It does not suffer from Barren-Plateaus and transfers well into the fault-tolerant era, as it requires only a limited number of arbitrary angle gates. Despite its potential, the algorithm has seen limited implementation efforts, presumably due to its abstract formulation. In this work, we provide a detailed instruction on implementing the quantum step operator for arbitrary backtracking instances. For a single controlled diffuser of a binary backtracking tree with depth n, our implementation requires only $6n+14$ CX gates. We detail the process of constructing accept and reject oracles for Sudoku problems using our interface to quantum backtracking. The presented code is written using Qrisp, a high-level quantum programming language, making it executable on most current physical backends and simulators. Subsequently, we perform several simulator based experiments and demonstrate solving 4x4 Sudoku instances with up to 9 empty fields. This is, to the best of our knowledge, the first instance of a compilable implementation of this generality, marking a significant and exciting step forward in quantum software engineering.
- Published
- 2024
15. Benchmarking Multipartite Entanglement Generation with Graph States
- Author
-
Zander, René and Becker, Colin Kai-Uwe
- Subjects
Quantum Physics - Abstract
As quantum computing technology slowly matures and the number of available qubits on a QPU gradually increases, interest in assessing the capabilities of quantum computing hardware in a scalable manner is growing. One of the key properties for quantum computing is the ability to generate multipartite entangled states. In this paper, aspects of benchmarking entanglement generation capabilities of noisy intermediate-scale quantum (NISQ) devices are discussed based on the preparation of graph states and the verification of entanglement in the prepared states. Thereby, we use entanglement witnesses that are specifically suited for a scalable experiment design. This choice of entanglement witnesses can detect A) bipartite entanglement and B) genuine multipartite entanglement for graph states with constant two measurement settings if the prepared graph state is based on a 2-colorable graph, e.g., a square grid graph or one of its subgraphs. With this, we experimentally verify that a fully bipartite entangled state can be prepared on a 127-qubit IBM Quantum superconducting QPU, and genuine multipartite entanglement can be detected for states of up to 23 qubits with quantum readout error mitigation., Comment: 13 pages
- Published
- 2024
16. Testing the Number of Neutrino Species with a Global Fit of Neutrino Data
- Author
-
Ettengruber, Manuel, Zander, Alan, and Eller, Philipp
- Subjects
High Energy Physics - Phenomenology ,High Energy Physics - Experiment ,Nuclear Theory - Abstract
We present the first experimental constraints on models with many additional neutrino species in an analysis of current neutrino data. These types of models are motivated as a solution to the hierarchy problem by lowering the species scale of gravity to TeV. Additionally, they offer a natural mechanism to generate small neutrino masses and provide interesting dark matter candidates. This study analyzes data from DayaBay, KamLAND, MINOS, NOvA and KATRIN. We do not find evidence for the presence of any additional neutrino species, therefore we report lower bounds on the allowed number of neutrino species realized in nature. For the normal/inverted neutrino mass ordering, we can give a lower bound on the number of neutrino species of O(30) and O(100), respectively, over a large range of the parameter space., Comment: 8 pages, 4 figures
- Published
- 2024
17. Uncertainty quantification for probabilistic machine learning in earth observation using conformal prediction
- Author
-
Singh, Geethen, Moncrieff, Glenn, Venter, Zander, Cawse-Nicholson, Kerry, Slingsby, Jasper, and Robinson, Tamara B
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Unreliable predictions can occur when using artificial intelligence (AI) systems with negative consequences for downstream applications, particularly when employed for decision-making. Conformal prediction provides a model-agnostic framework for uncertainty quantification that can be applied to any dataset, irrespective of its distribution, post hoc. In contrast to other pixel-level uncertainty quantification methods, conformal prediction operates without requiring access to the underlying model and training dataset, concurrently offering statistically valid and informative prediction regions, all while maintaining computational efficiency. In response to the increased need to report uncertainty alongside point predictions, we bring attention to the promise of conformal prediction within the domain of Earth Observation (EO) applications. To accomplish this, we assess the current state of uncertainty quantification in the EO domain and found that only 20% of the reviewed Google Earth Engine (GEE) datasets incorporated a degree of uncertainty information, with unreliable methods prevalent. Next, we introduce modules that seamlessly integrate into existing GEE predictive modelling workflows and demonstrate the application of these tools for datasets spanning local to global scales, including the Dynamic World and Global Ecosystem Dynamics Investigation (GEDI) datasets. These case studies encompass regression and classification tasks, featuring both traditional and deep learning-based workflows. Subsequently, we discuss the opportunities arising from the use of conformal prediction in EO. We anticipate that the increased availability of easy-to-use implementations of conformal predictors, such as those provided here, will drive wider adoption of rigorous uncertainty quantification in EO, thereby enhancing the reliability of uses such as operational monitoring and decision making.
- Published
- 2024
18. New Graph Decompositions and Combinatorial Boolean Matrix Multiplication Algorithms
- Author
-
Abboud, Amir, Fischer, Nick, Kelley, Zander, Lovett, Shachar, and Meka, Raghu
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
We revisit the fundamental Boolean Matrix Multiplication (BMM) problem. With the invention of algebraic fast matrix multiplication over 50 years ago, it also became known that BMM can be solved in truly subcubic $O(n^\omega)$ time, where $\omega<3$; much work has gone into bringing $\omega$ closer to $2$. Since then, a parallel line of work has sought comparably fast combinatorial algorithms but with limited success. The naive $O(n^3)$-time algorithm was initially improved by a $\log^2{n}$ factor [Arlazarov et al.; RAS'70], then by $\log^{2.25}{n}$ [Bansal and Williams; FOCS'09], then by $\log^3{n}$ [Chan; SODA'15], and finally by $\log^4{n}$ [Yu; ICALP'15]. We design a combinatorial algorithm for BMM running in time $n^3 / 2^{\Omega(\sqrt[7]{\log n})}$ -- a speed-up over cubic time that is stronger than any poly-log factor. This comes tantalizingly close to refuting the conjecture from the 90s that truly subcubic combinatorial algorithms for BMM are impossible. This popular conjecture is the basis for dozens of fine-grained hardness results. Our main technical contribution is a new regularity decomposition theorem for Boolean matrices (or equivalently, bipartite graphs) under a notion of regularity that was recently introduced and analyzed analytically in the context of communication complexity [Kelley, Lovett, Meka; arXiv'23], and is related to a similar notion from the recent work on $3$-term arithmetic progression free sets [Kelley, Meka; FOCS'23]., Comment: To appear at STOC 2024
- Published
- 2023
19. Fast-DiM: Towards Fast Diffusion Morphs
- Author
-
Blasingame, Zander W. and Liu, Chen
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Diffusion Morphs (DiM) are a recent state-of-the-art method for creating high quality face morphs; however, they require a high number of network function evaluations (NFE) to create the morphs. We propose a new DiM pipeline, Fast-DiM, which can create morphs of a similar quality but with fewer NFE. We investigate the ODE solvers used to solve the Probability Flow ODE and the impact they have on the the creation of face morphs. Additionally, we employ an alternative method for encoding images into the latent space of the Diffusion model by solving the Probability Flow ODE as time runs forwards. Our experiments show that we can reduce the NFE by upwards of 85% in the encoding process while experiencing only 1.6\% reduction in Mated Morph Presentation Match Rate (MMPMR). Likewise, we showed we could cut NFE, in the sampling process, in half with only a maximal reduction of 0.23% in MMPMR., Comment: Accepted as a paper in IEEE Security and Privacy
- Published
- 2023
- Full Text
- View/download PDF
20. A new meteor detection application robust to camera movements
- Author
-
Ciocan, Clara, Kandeepan, Mathuran, Cassagne, Adrien, Vaubaillon, Jeremie, Zander, Fabian, and Lacassagne, Lionel
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
This article presents a new tool for the automatic detection of meteors. Fast Meteor Detection Toolbox (FMDT) is able to detect meteor sightings by analyzing videos acquired by cameras onboard weather balloons or within airplane with stabilization. The challenge consists in designing a processing chain composed of simple algorithms, that are robust to the high fluctuation of the videos and that satisfy the constraints on power consumption (10 W) and real-time processing (25 frames per second)., Comment: in French language, Groupe de Recherche et d'{\'E}tudes de Traitement du Signal et des Images (GRETSI), Aug 2023, Grenoble, France
- Published
- 2023
21. Explicit separations between randomized and deterministic Number-on-Forehead communication
- Author
-
Kelley, Zander, Lovett, Shachar, and Meka, Raghu
- Subjects
Computer Science - Computational Complexity ,Mathematics - Combinatorics ,68Q11, 68Q17 ,F.2.2 ,F.1.3 - Abstract
We study the power of randomness in the Number-on-Forehead (NOF) model in communication complexity. We construct an explicit 3-player function $f:[N]^3 \to \{0,1\}$, such that: (i) there exist a randomized NOF protocol computing it that sends a constant number of bits; but (ii) any deterministic or nondeterministic NOF protocol computing it requires sending about $(\log N)^{1/3}$ many bits. This exponentially improves upon the previously best-known such separation. At the core of our proof is an extension of a recent result of the first and third authors on sets of integers without 3-term arithmetic progressions into a non-arithmetic setting.
- Published
- 2023
22. How Many Dark Neutrino Sectors Does Cosmology Allow?
- Author
-
Zander, Alan, Ettengruber, Manuel, and Eller, Philipp
- Subjects
High Energy Physics - Phenomenology - Abstract
We present the very first constraints on the number of Standard Model (SM) copies with an additional Dirac right-handed neutrino. From cosmology, we are able to pose strong limits on large regions of the parameter space. Moreover, we show that it is possible to account for the right dark matter density in form of stable particles from the dark sectors.
- Published
- 2023
23. Data Owner Benefit-Driven Design of People Analytics
- Author
-
Zander, Patrik and Zieglmeier, Valentin
- Subjects
Computer Science - Human-Computer Interaction ,Computer Science - Software Engineering - Abstract
With increasingly digitalized workplaces, the potential for sophisticated analyses of employee data rises. This increases the relevance of people analytics (PA), which are tools for the behavioral analysis of employees. Despite this potential, the successful usage of PA is hindered by employee concerns. Especially in Europe, where the GDPR or equivalent laws apply, employee consent is required before data can be processed in PA. Therefore, PA can only provide relevant insights if employees are willing to share their data. One potential way of achieving this is the use of appeal strategies. In the design of PA, the core strategy that can be used is the inclusion of data owner benefits, such as automated feedback, that are given to employees in exchange for sharing their own data. In this paper, we examine benefits as an appeal strategy and develop four design principles for the inclusion of benefits in PA. Then, we describe an exemplary set of analyses and benefits, demonstrating how our principles may be put into practice. Based on this exemplary implementation, we describe and discuss the results of a user study ($n = 46$) among employees in the EU and UK. Our study investigates the factors that foster or hinder employees' consent to sharing their data with PA. Then, we introduce our data owner benefits and analyze whether they can positively influence this consent decision. Our introduced data owner benefits were, contrary to our expectations, not suited to motivate our participants to consent to sharing their data. We therefore analyze how participants judge the benefits. Participants generally appreciate having them, confirming the value of including data owner benefits when designing PA. Some of our introduced benefits negatively influenced participants' sharing decision, though, meaning that careful consideration of potential risks is required when conceptualizing them., Comment: Peer-reviewed version accepted for publication in Proceedings of the ACM on Human-Computer Interaction (PACMHCI), EICS issue
- Published
- 2023
- Full Text
- View/download PDF
24. The Hardness of Reasoning about Probabilities and Causality
- Author
-
van der Zander, Benito, Bläser, Markus, and Liśkiewicz, Maciej
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computational Complexity - Abstract
We study formal languages which are capable of fully expressing quantitative probabilistic reasoning and do-calculus reasoning for causal effects, from a computational complexity perspective. We focus on satisfiability problems whose instance formulas allow expressing many tasks in probabilistic and causal inference. The main contribution of this work is establishing the exact computational complexity of these satisfiability problems. We introduce a new natural complexity class, named succ$\exists$R, which can be viewed as a succinct variant of the well-studied class $\exists$R, and show that the problems we consider are complete for succ$\exists$R. Our results imply even stronger algorithmic limitations than were proven by Fagin, Halpern, and Megiddo (1990) and Moss\'{e}, Ibeling, and Icard (2022) for some variants of the standard languages used commonly in probabilistic and causal inference., Comment: accepted at IJCAI 23
- Published
- 2023
25. Contribution of the oxygen reduction reaction to the electrochemical cathodic partial reaction for Mg-Al-Ca solid solutions
- Author
-
Felten, Markus, Zhang, Siyuan, Changizi, Rasa, Scheu, Christina, Bruns, Mark, Strebl, Michael, Virtanen, Sannakaisa, and Zander, Daniela
- Subjects
Physics - Chemical Physics - Abstract
The electrochemical corrosion rate of Magnesium (Mg) and Mg alloys depends on the stability of the formed surface layer. Based on the Mg substrate, the oxide structure comprises a dense MgO/Mg(OH)2 mixture underneath a porous plate-like Mg(OH)2 layer. While the kinetics of the anodic partial reaction has been mainly attributed to MgO, recent studies showed an effect of the Mg(OH)2 layer thickness on the cathodic partial reaction. A thinner Mg(OH)2 layer has been associated with a higher kinetics of the oxygen reduction rate. In the present study, the proposed mechanism has been further investigated via in situ respirometric measurements with Mg-Al-Ca solid solution in electrolytes with different pH values (pH = 8-13). The results indicate an additional effect based on the structure of the surface layer in the passive state of Mg corrosion. Furthermore, two different Al enriched interlayers at the Mg/MgO- and MgO/Mg(OH)2 interfaces were observed and discussed in terms of their thermodynamic stability under alkaline immersion conditions.
- Published
- 2023
26. Metallurgical synthesis methods for Mg-Al-Ca scientific model materials
- Author
-
Luo, W., Tanure, L., Felten, M., Nowak, J., Delis, W., Freund, M., Ayeb, N., Zander, D., Thomas, C., Feuerbacher, M., Sandlöbes-Haut, S., Korte-Kerzel, S., and Springer, H.
- Subjects
Condensed Matter - Materials Science - Abstract
Mg-based alloys are industrially used for structural applications, both as solid solutions alloys and as composites containing intermetallic compounds. However, a further development in terms of mechanical properties requires the investigation of underlying causalities between synthesis, processing and microstructure to adjust the mechanical and the corrosion properties, ideally down to the near atomic scale. Such fundamental scientific investigations with high resolution characterisation techniques require model materials of exceptionally high purity and strictly controlled microstructure e.g. with respect to grain size, morphology, chemical homogeneity as well as content and size of oxide inclusions. In this context, the Mg-Al-Ca system appears exceptionally challenging from a metallurgical perspective due to the high reactivity and high vapor pressures, so that conventional industrial techniques cannot be successfully deployed. Here, we demonstrate the applicability of various scientific synthesis methods from arc melting over solution growth to diffusion couples, extending to effects and parameters for thermo-mechanical processing. Suitable pathways to overcome the specific challenges of the Mg-Al-Ca system are demonstrated, as well as the persistent limitations of the current state of the art laboratory metallurgy technology., Comment: 17 pages, 7 figures
- Published
- 2023
27. Chemical and structural characterization of the native oxide scale on a Mg-based alloy
- Author
-
Neuß, Deborah, McCarroll, Ingrid E., Zhang, Siyuan, Woods, Eric, Delis, Wassilios J., Tanure, Leandro, Springer, Hauke, Sandlöbes, Stefanie, Yang, Jing, Todorova, Mira, Zander, Daniela, Scheu, Christina, Schneider, Jochen M., and Hans, Marcus
- Subjects
Condensed Matter - Materials Science - Abstract
In this study, the structure and composition of the native oxide forming on the basal plane (0001) of Mg-2Al-0.1Ca is investigated by a correlative approach, combining scanning transmission electron microscopy (STEM) and atom probe tomography (APT). Atom probe specimens were prepared conventionally in a Ga focused ion beam (FIB) as well as a Xe plasma FIB in a cryogenic setup and subsequently cleaned in the atom probe to remove surface contamination before oxidation. While thermal energy input from the laser and longer atmospheric exposure time increased the measured hydrogen content in the specimen's apex region, cryo preparation revealed, that the hydrogen uptake in magnesium is independent of the employment of conventional or cryogenic FIB preparation. TEM measurements demonstrated the growth of a (111) MgO oxide layer with 3-4 nm thickness on the basal (0001) plane of the Mg atom probe specimen. APT data further revealed the formation of an aluminum-rich region between bulk Mg and the native oxide. The aluminum enrichment of up to ~20 at.% at the interface is consistent with an inward growth of the oxide scale.
- Published
- 2023
28. Strong Bounds for 3-Progressions
- Author
-
Kelley, Zander and Meka, Raghu
- Subjects
Mathematics - Number Theory ,Mathematics - Combinatorics - Abstract
We show that for some constant $\beta > 0$, any subset $A$ of integers $\{1,\ldots,N\}$ of size at least $2^{-O((\log N)^\beta)} \cdot N$ contains a non-trivial three-term arithmetic progression. Previously, three-term arithmetic progressions were known to exist only for sets of size at least $N/(\log N)^{1 + c}$ for a constant $c > 0$. Our approach is first to develop new analytic techniques for addressing some related questions in the finite-field setting and then to apply some analogous variants of these same techniques, suitably adapted for the more complicated setting of integers.
- Published
- 2023
29. A 2022 $\tau$-Herculid meteor cluster from an airborne experiment: automated detection, characterization, and consequences for meteoroids
- Author
-
Vaubaillon, J., Loir, C., Ciocan, C., Kandeepan, M., Millet, M., Cassagne, A., Lacassagne, L., Da Fonseca, P., Zander, F., Buttsworth, D., Loehle, S., Toth, J., Gray, S., Moingeon, A., and Rambaux, N.
- Subjects
Astrophysics - Earth and Planetary Astrophysics - Abstract
Context. The existence of meteor clusters has long since been a subject of speculation and so far only seven events have been reported, among which two involve less than five meteors, and three were seen during the Leonid storms. Aims. The 1995 outburst of Comet 73P/Schwassmann-Wachmann was predicted to result in a meteor shower in May 2022. We detected the shower, proved this to be the result of this outburst, and detected another meteor cluster during the same observation mission. Methods. The {\tau}-Herculids meteor shower outburst on 31 May 2022 was continuously monitored for 4 hours during an airborne campaign. The video data were analyzed using a recently developed computer-vision processing chain for meteor real-time detection. Results. We report and characterize the detection of a meteor cluster involving 38 fragments, detected at 06:48 UT for a total duration of 11.3 s. The derived cumulative size frequency distribution index is relatively shallow: s = 3.1. Our open-source computer-vision processing chain (named FMDT) detects 100% of the meteors that a human eye is able to detect in the video. Classical automated motion detection assuming a static camera was not suitable for the stabilized camera setup because of residual motion. Conclusions. From all reported meteor clusters, we crudely estimate their occurrence to be less than one per million observed meteors. Low heliocentric distance enhances the probability of such meteoroid self-disruption in the interplanetary space., Comment: 6 pqges, 5 figures
- Published
- 2023
- Full Text
- View/download PDF
30. Reinforcement Learning-based Joint Handover and Beam Tracking in Millimeter-wave Networks
- Author
-
Khosravi, Sara, Ghadikolaei, Hossein S., Zander, Jens, and Petrova, Marina
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
In this paper, we develop an algorithm for joint handover and beam tracking in millimeter-wave (mmWave) networks. The aim is to provide a reliable connection in terms of the achieved throughput along the trajectory of the mobile user while preventing frequent handovers. We model the association problem as an optimization problem and propose a reinforcement learning-based solution. Our approach learns whether and when beam tracking and handover should be performed and chooses the target base stations. In the case of beam tracking, we propose a tracking algorithm based on measuring a small spatial neighbourhood of the optimal beams in the previous time slot. Simulation results in an outdoor environment show the superior performance of our proposed solution in achievable throughput and the number of handovers needed in comparison to a multi-connectivity baseline and a learning-based handover baseline.
- Published
- 2023
31. Leveraging Diffusion For Strong and High Quality Face Morphing Attacks
- Author
-
Blasingame, Zander W. and Liu, Chen
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Face morphing attacks seek to deceive a Face Recognition (FR) system by presenting a morphed image consisting of the biometric qualities from two different identities with the aim of triggering a false acceptance with one of the two identities, thereby presenting a significant threat to biometric systems. The success of a morphing attack is dependent on the ability of the morphed image to represent the biometric characteristics of both identities that were used to create the image. We present a novel morphing attack that uses a Diffusion-based architecture to improve the visual fidelity of the image and the ability of the morphing attack to represent characteristics from both identities. We demonstrate the effectiveness of the proposed attack by evaluating its visual fidelity via the Frechet Inception Distance (FID). Also, extensive experiments are conducted to measure the vulnerability of FR systems to the proposed attack. The ability of a morphing attack detector to detect the proposed attack is measured and compared against two state-of-the-art GAN-based morphing attacks along with two Landmark-based attacks. Additionally, a novel metric to measure the relative strength between different morphing attacks is introduced and evaluated., Comment: Diffusion Morphs (DiM) paper. Accepted in IEEE TBIOM
- Published
- 2023
- Full Text
- View/download PDF
32. Linear-Time Algorithms for Front-Door Adjustment in Causal Graphs
- Author
-
Wienöbst, Marcel, van der Zander, Benito, and Liśkiewicz, Maciej
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Data Structures and Algorithms ,Computer Science - Machine Learning ,Statistics - Methodology - Abstract
Causal effect estimation from observational data is a fundamental task in empirical sciences. It becomes particularly challenging when unobserved confounders are involved in a system. This paper focuses on front-door adjustment -- a classic technique which, using observed mediators allows to identify causal effects even in the presence of unobserved confounding. While the statistical properties of the front-door estimation are quite well understood, its algorithmic aspects remained unexplored for a long time. In 2022, Jeong, Tian, and Bareinboim presented the first polynomial-time algorithm for finding sets satisfying the front-door criterion in a given directed acyclic graph (DAG), with an $O(n^3(n+m))$ run time, where $n$ denotes the number of variables and $m$ the number of edges of the causal graph. In our work, we give the first linear-time, i.e., $O(n+m)$, algorithm for this task, which thus reaches the asymptotically optimal time complexity. This result implies an $O(n(n+m))$ delay enumeration algorithm of all front-door adjustment sets, again improving previous work by a factor of $n^3$. Moreover, we provide the first linear-time algorithm for finding a minimal front-door adjustment set. We offer implementations of our algorithms in multiple programming languages to facilitate practical usage and empirically validate their feasibility, even for large graphs., Comment: Extended version of paper accepted to the Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-2024)
- Published
- 2022
33. Simple HF antenna efficiency comparisons using the WSPR system
- Author
-
Zander, Jens
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Determining the efficiency of an HF-antenna by measurements requires is a complex procedure involving expensive equipment, calibrated instruments for field strengths. In this paper we evaluate a simple, inexpensive method to determine the relative efficiency of an antenna relative a reference antenna. The method uses the Weak Signal Propagation Reporter(WSPR) network of receivers that are located all over the world. These receivers report the estimated signal-to-noise ratio of received beacon signals to the WSPR.net database where the data can be retrieved (almost) in real time. In the paper we analyze the method, estimate its accuracy and discuss advantages and limitations. Some preliminary measurement results are presented.
- Published
- 2022
34. Digital Twin Assisted Risk-Aware Sleep Mode Management Using Deep Q-Networks
- Author
-
Masoudi, Meysam, Soroush, Ebrahim, Zander, Jens, and Cavdar, Cicek
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Base stations (BSs) are the most energy-consuming segment of mobile networks. To reduce BS energy consumption, different components of BSs can sleep when BS is not active. According to the activation/deactivation time of the BS components, multiple sleep modes (SMs) are defined in the literature. In this study, we model the problem of BS energy saving utilizing multiple sleep modes as a sequential MDP and propose an online traffic-aware deep reinforcement learning approach to maximize the long-term energy saving. However, there is a risk that BS is not sleeping at the right time and incurs large delays to the users. To tackle this issue, we propose to use a digital twin model to encapsulate the dynamics underlying the investigated system and estimate the risk of decision-making (RDM) in advance. We define a novel metric to quantify RDM and predict the performance degradation. The RDM calculated by DT is compared with a tolerable threshold set by the mobile operator. Based on this comparison, BS can decide to deactivate the SMs, re-train when needed to avoid taking high risks, or activate the SMs to benefit from energy savings. For deep reinforcement learning, we use long-short term memory (LSTM), to take into account the long and short-term dependencies in input traffic, and approximate the Q-function. We train the LSTM network using the experience replay method over a real traffic data set obtained from an operator BS in Stockholm. The data set contains data rate information with very coarse-grained time granularity. Thus, we propose a scheme to generate a new data set using the real network data set which 1) has finer-grained time granularity and 2) considers the bursty behavior of traffic data. Simulation results show that using proposed methods, considerable energy saving is obtained, compared to the baselines at cost of negligible number of delayed users., Comment: Accepted in IEEE Transactions on Vehicular Technology
- Published
- 2022
35. Preferred corrosion pathways for oxygen in Al2Ca-twin boundaries and dislocations
- Author
-
Peter, Nicolas J., Zander, Daniela, Cao, Xumeng, Tian, Chunhua, Zhang, Siyuan, Du, Kui, Scheu, Christina, and Dehm, Gerhard
- Subjects
Condensed Matter - Materials Science - Abstract
With an ongoing discussion on the oxygen diffusion along crystal defects remaining, it is difficult to study this phenomenon in Al containing intermetallic materials due to its rapid and passivating oxide formation. We report here the observation of enhanced oxygen diffusion along crystal defects, i.e. dislocations and twin boundaries, in the C15 Al 2 Ca Laves phase and how the presence of oxygen induces structural changes at these defects. Three main phases were identified and characterized structurally by aberration-corrected, atomic resolution scanning transmission electron microscopy, analytically by energy dispersive X-ray spectroscopy and electron energy loss spectroscopy. Unlike the C15 bulk phase, the twin boundary and dislocation transformed into a few nanometer wide amorphous phase, which depletes in Al and Ca but is highly enriched in oxygen. The dislocation even shows coexistence of the amorphous phase with a simple Al-rich A1 fcc phase. This A1 phase only depletes in Ca, not in Al (Al remains at bulk concentration), and is also enriched in oxygen. The Al-rich A1 phase is coherent with the C15 matrix. Electron energy loss spectroscopy revealed the amorphous phase to be Al 2 O 3 . We thereby show as one of the first studies that oxygen diffusion along crystal defects, especially also at the twin boundary can induce the formation of an amorphous oxide along themselves. The identification of oxygen-induced transformation at strained defects has to be considered when the material is exposed to air during plastic deformation at elevated temperatures., Comment: 6 pages, 3 figures
- Published
- 2022
36. Gaia Search for stellar Companions of TESS Objects of Interest III
- Author
-
Mugrauer, M., Zander, J., and Michel, K. -U.
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - Earth and Planetary Astrophysics ,Astrophysics - Astrophysics of Galaxies - Abstract
The latest results from our ongoing multiplicity study of (Community) TESS Objects of Interest are presented, using astro- and photometric data from the ESA-Gaia mission, to detect stellar companions of these stars and characterize their properties. A total of 124 binary and 7 hierarchical triple star systems were detected among 2175 targets, whose multiplicity was investigated in the course of our survey, which are located at distances closer than about 500pc around the Sun. The detected companions and the targets are located at the same distance and share a common proper motion, as expected for components of gravitationally bound stellar systems, as proven with their accurate Gaia EDR3 astrometry. The companions have masses in the range between about 0.09 and 2.5$M_\odot$ and are most frequently found in the mass range between 0.15 and 0.8$M_\odot$. The companions exhibit projected separations to the targets between about 50 to 9700au and their frequency is the highest and constant up to about 500au, while it decreases for larger projected separations. In addition to mainly mid M to early K dwarfs, 4 white dwarf companions were detected in this survey, whose true nature could be identified with their photometric properties., Comment: 25 pages, 10 figures, 5 tables, accepted for publication in AN
- Published
- 2022
- Full Text
- View/download PDF
37. Beam Alignment Using Trajectory Information in Mobile Millimeter-wave Networks
- Author
-
Khosravi, Sara, Ghadikolaei, Hossein S., Zander, Jens, and Petrova, Marina
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Millimeter-wave and terahertz systems rely on beamforming/combining codebooks to determine the best beam directions during the initial access and data transmission. Existing approaches suffer from large codebook sizes and high beam searching overhead in the presence of mobile devices. To address this issue, we utilize the similarity of the channel in adjacent locations to divide the user trajectory into a set of separate regions and maintain a set of candidate beams for each region in a database. Due to the tradeoff between the number of regions and the signalling overhead, i.e., the greater number of regions results in a higher signal-to-noise ratio (SNR) but also a larger signalling overhead for the database, we propose an optimization framework to find the minimum number of regions based on the trajectory of a mobile device. Using a ray tracing tool, we demonstrate that the proposed method provides high SNR while being more robust to the location information accuracy in comparison to the lookup table baseline and fixed size region baseline.
- Published
- 2022
38. The Topology of Circular Synthetic Aperture Sonar Targets
- Author
-
Robinson, Michael and Memon, Zander
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Computational Engineering, Finance, and Science ,Mathematics - Algebraic Topology ,57Z20, 55N31 ,J.2 - Abstract
This report presents a connection between the physical acoustics of an object and the topology of the space of echoes resulting from a circular synthetic aperture sonar (CSAS) collection of that object. A simple theoretical model is developed that yields a precise, yet qualitative, description of the space of echoes. This theoretical model is validated in simulation and with experimental data from a laboratory sonar system., Comment: 21 pages, 23 figures
- Published
- 2022
39. Location-Aided Beamforming in Mobile Millimeter-Wave Networks
- Author
-
Khosravi, Sara, Ghadikolaeiy, Hossein S., Zander, Jens, and Petrova, Marina
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Due to the large bandwidth available, millimeter-Wave (mmWave) bands are considered a viable opportunity to significantly increase the data rate in cellular and wireless networks. Nevertheless, the need for beamforming and directional communication between the transmitter and the receiver increases the complexity of the channel estimation and link establishment phase. Location-aided beamforming approaches have the potential to enable fast link establishment in mmWave networks. However, these are often very sensitive to location errors. In this work, we propose a beamforming algorithm based on tracking spatial correlation of the available strong paths between the transmitter and the receiver. We show that our method is robust to uncertainty in location information, i.e., location error and can provide a reliable connection to a moving user along a trajectory. The numerical results show that our approach outperforms benchmarks on various levels of error in the location information accuracy. The gain is more prominent in high location error scenarios.
- Published
- 2022
40. Identification in Tree-shaped Linear Structural Causal Models
- Author
-
van der Zander, Benito, Wienöbst, Marcel, Bläser, Markus, and Liśkiewicz, Maciej
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Computer Science - Symbolic Computation ,Statistics - Machine Learning - Abstract
Linear structural equation models represent direct causal effects as directed edges and confounding factors as bidirected edges. An open problem is to identify the causal parameters from correlations between the nodes. We investigate models, whose directed component forms a tree, and show that there, besides classical instrumental variables, missing cycles of bidirected edges can be used to identify the model. They can yield systems of quadratic equations that we explicitly solve to obtain one or two solutions for the causal parameters of adjacent directed edges. We show how multiple missing cycles can be combined to obtain a unique solution. This results in an algorithm that can identify instances that previously required approaches based on Gr\"obner bases, which have doubly-exponential time complexity in the number of structural parameters., Comment: 9 pages (excluding references and appendix), accepted by AISTATS 2022
- Published
- 2022
41. FirstPersonScience: Quantifying Psychophysics for First Person Shooter Tasks
- Author
-
Spjut, Josef, Boudaoud, Ben, Binaee, Kamran, Majercik, Zander, McGuire, Morgan, and Kim, Joohwan
- Subjects
Computer Science - Human-Computer Interaction ,Computer Science - Graphics - Abstract
In the emerging field of esports research, there is an increasing demand for quantitative results that can be used by players, coaches and analysts to make decisions and present meaningful commentary for spectators. We present FirstPersonScience, a software application intended to fill this need in the esports community by allowing scientists to design carefully controlled experiments and capture accurate results in the First Person Shooter esports genre. An experiment designer can control a variety of parameters including target motion, weapon configuration, 3D scene, frame rate, and latency. Furthermore, we validate this application through careful end-to-end latency analysis and provide a case study showing how it can be used to demonstrate the training effect of one user given repeated task performance., Comment: 7 pages, 4 figures, appeared in UCI Esports Conference, October 10, 2019
- Published
- 2022
42. SCALP -- Supervised Contrastive Learning for Cardiopulmonary Disease Classification and Localization in Chest X-rays using Patient Metadata
- Author
-
Jaiswal, Ajay, Li, Tianhao, Zander, Cyprian, Han, Yan, Rousseau, Justin F., Peng, Yifan, and Ding, Ying
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Computer-aided diagnosis plays a salient role in more accessible and accurate cardiopulmonary diseases classification and localization on chest radiography. Millions of people get affected and die due to these diseases without an accurate and timely diagnosis. Recently proposed contrastive learning heavily relies on data augmentation, especially positive data augmentation. However, generating clinically-accurate data augmentations for medical images is extremely difficult because the common data augmentation methods in computer vision, such as sharp, blur, and crop operations, can severely alter the clinical settings of medical images. In this paper, we proposed a novel and simple data augmentation method based on patient metadata and supervised knowledge to create clinically accurate positive and negative augmentations for chest X-rays. We introduce an end-to-end framework, SCALP, which extends the self-supervised contrastive approach to a supervised setting. Specifically, SCALP pulls together chest X-rays from the same patient (positive keys) and pushes apart chest X-rays from different patients (negative keys). In addition, it uses ResNet-50 along with the triplet-attention mechanism to identify cardiopulmonary diseases, and Grad-CAM++ to highlight the abnormal regions. Our extensive experiments demonstrate that SCALP outperforms existing baselines with significant margins in both classification and localization tasks. Specifically, the average classification AUCs improve from 82.8% (SOTA using DenseNet-121) to 83.9% (SCALP using ResNet-50), while the localization results improve on average by 3.7% over different IoU thresholds.
- Published
- 2021
43. Control of Electrochemical Corrosion Properties by Influencing Mn Partitioning through Intercritically Annealing of Medium-Mn Steel
- Author
-
Pütz, René Daniel, Allam, Tarek, Wang, Junmiao, Nowak, Jakub, Haase, Christian, Sandlöbes-Haut, Stefanie, Krupp, Ulrich, and Zander, Daniela
- Subjects
Condensed Matter - Materials Science - Abstract
Medium-Mn steels exhibit excellent mechanical properties and lower production costs compared to high-Mn steels, which makes them a potential material for future application in the automotive industry. Intercritical annealing (ICA) after cold rolling allows to control the stacking fault energy (SFE) of austenite, the fraction of ferrite and reverted austenite, and the element partitioning (especially Mn). Although Mn deteriorates the corrosion behavior of Fe-Mn-Al alloys, the influence of austenite fraction and element partitioning of Mn on the electrochemical corrosion behavior has not been investigated yet. Therefore, the electrochemical corrosion behavior in 0.1 M H2SO4 of X6MnAl12-3, which was intercritically annealed for 2 h at 550 {\deg}C, 600 {\deg}C and 700 {\deg}C, was investigated by potentiodynamic polarization (PDP), electrochemical impedance spectroscopy (EIS) and mass spectroscopy with inductively coupled plasma (ICP-MS). Additionally, specimens after 1 h and 24 h of immersion were examined via SEM to visualize the corrosion damage. The ICA specimens showed a selective dissolution of reverted austenite due to its micro-galvanic coupling with the adjacent ferrite. The severity of the micro-galvanic coupling can be reduced by decreasing the interface area as well as the chemical gradient of mainly Mn between ferrite and reverted austenite by ICA., Comment: 23 pages, 14 Figures, 4 Tables
- Published
- 2021
44. LuMaMi28: Real-Time Millimeter-Wave Massive MIMO Systems with Antenna Selection
- Author
-
Chung, MinKeun, Liu, Liang, Johansson, Andreas, Gunnarsson, Sara, Nilsson, Martin, Ying, Zhinong, Zander, Olof, Samanta, Kamal, Clifton, Chris, Koimori, Toshiyuki, Morita, Shinya, Taniguchi, Satoshi, Tufvesson, Fredrik, and Edfors, Ove
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Information Theory - Abstract
This paper presents LuMaMi28, a real-time 28 GHz massive multiple-input multiple-output (MIMO) testbed. In this testbed, the base station has 16 transceiver chains with a fully-digital beamforming architecture (with different pre-coding algorithms) and simultaneously supports multiple user equipments (UEs) with spatial multiplexing. The UEs are equipped with a beam-switchable antenna array for real-time antenna selection where the one with the highest channel magnitude, out of four pre-defined beams, is selected. For the beam-switchable antenna array, we consider two kinds of UE antennas, with different beam-width and different peak-gain. Based on this testbed, we provide measurement results for millimeter-wave (mmWave) massive MIMO performance in different real-life scenarios with static and mobile UEs. We explore the potential benefit of the mmWave massive MIMO systems with antenna selection based on measured channel data, and discuss the performance results through real-time measurements., Comment: 14 pages, 17 figures
- Published
- 2021
45. Dynamic Diffuse Global Illumination Resampling
- Author
-
Majercik, Zander, Müller, Thomas, Keller, Alexander, Nowrouzezahrai, Derek, and McGuire, Morgan
- Subjects
Computer Science - Graphics - Abstract
Interactive global illumination remains a challenge in radiometrically- and geometrically-complex scenes. Specialized sampling strategies are effective for specular and near-specular transport because the scattering has relatively low directional variance per scattering event. In contrast, the high variance from transport paths comprising multiple rough glossy or diffuse scattering events remains notoriously difficult to resolve with a small number of samples. We extend unidirectional path tracing to address this by combining screen-space reservoir resampling and sparse world-space probes, significantly improving sample efficiency for transport contributions that terminate on diffuse scattering events. Our experiments demonstrate a clear improvement -- at equal time and equal quality -- over purely path traced and purely probe-based baselines. Moreover, when combined with commodity denoisers, we are able to interactively render global illumination in complex scenes.
- Published
- 2021
46. Continental-scale land cover mapping at 10 m resolution over Europe (ELC10)
- Author
-
Venter, Zander S. and Sydenham, Markus A. K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Widely used European land cover maps such as CORINE are produced at medium spatial resolutions (100 m) and rely on diverse data with complex workflows requiring significant institutional capacity. We present a high resolution (10 m) land cover map (ELC10) of Europe based on a satellite-driven machine learning workflow that is annually updatable. A Random Forest classification model was trained on 70K ground-truth points from the LUCAS (Land Use/Cover Area frame Survey) dataset. Within the Google Earth Engine cloud computing environment, the ELC10 map can be generated from approx. 700 TB of Sentinel imagery within approx. 4 days from a single research user account. The map achieved an overall accuracy of 90% across 8 land cover classes and could account for statistical unit land cover proportions within 3.9% (R2 = 0.83) of the actual value. These accuracies are higher than that of CORINE (100 m) and other 10-m land cover maps including S2GLC and FROM-GLC10. We found that atmospheric correction of Sentinel-2 and speckle filtering of Sentinel-1 imagery had minimal effect on enhancing classification accuracy (< 1%). However, combining optical and radar imagery increased accuracy by 3% compared to Sentinel-2 alone and by 10% compared to Sentinel-1 alone. The conversion of LUCAS points into homogenous polygons under the Copernicus module increased accuracy by <1%, revealing that Random Forests are robust against contaminated training data. Furthermore, the model requires very little training data to achieve moderate accuracies - the difference between 5K and 50K LUCAS points is only 3% (86 vs 89%). At 10-m resolution, the ELC10 map can distinguish detailed landscape features like hedgerows and gardens, and therefore holds potential for aerial statistics at the city borough level and monitoring property-level environmental interventions (e.g. tree planting).
- Published
- 2021
- Full Text
- View/download PDF
47. Random restrictions and PRGs for PTFs in Gaussian Space
- Author
-
Kelley, Zander and Meka, Raghu
- Subjects
Computer Science - Computational Complexity - Abstract
A polynomial threshold function (PTF) $f:\mathbb{R}^n \rightarrow \mathbb{R}$ is a function of the form $f(x) = \mathsf{sign}(p(x))$ where $p$ is a polynomial of degree at most $d$. PTFs are a classical and well-studied complexity class with applications across complexity theory, learning theory, approximation theory, quantum complexity and more. We address the question of designing pseudorandom generators (PRG) for polynomial threshold functions (PTFs) in the gaussian space: design a PRG that takes a seed of few bits of randomness and outputs a $n$-dimensional vector whose distribution is indistinguishable from a standard multivariate gaussian by a degree $d$ PTF. Our main result is a PRG that takes a seed of $d^{O(1)}\log ( n / \varepsilon)\log(1/\varepsilon)/\varepsilon^2$ random bits with output that cannot be distinguished from $n$-dimensional gaussian distribution with advantage better than $\varepsilon$ by degree $d$ PTFs. The best previous generator due to O'Donnell, Servedio, and Tan (STOC'20) had a quasi-polynomial dependence (i.e., seedlength of $d^{O(\log d)}$) in the degree $d$. Along the way we prove a few nearly-tight structural properties of restrictions of PTFs that may be of independent interest.
- Published
- 2021
48. A Distributed, Decoupled System for Losslessly Streaming Dynamic Light Probes to Thin Clients
- Author
-
Stengel, Michael, Majercik, Zander, Boudaoud, Benjamin, and McGuire, Morgan
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Graphics - Abstract
We present a networked, high performance graphics system that combines dynamic, high quality, ray traced global illumination computed on a server with direct illumination and primary visibility computed on a client. This approach provides many of the image quality benefits of real-time ray tracing on low-power and legacy hardware, while maintaining a low latency response and mobile form factor. Our system distributes the graphic pipeline over a network by computing diffuse global illumination on a remote machine. Global illumination is computed using a recent irradiance volume representation combined with a novel, lossless, HEVC-based, hardware-accelerated encoding, and a perceptually-motivated update scheme. Our experimental implementation streams thousands of irradiance probes per second and requires less than 50 Mbps of throughput, reducing the consumed bandwidth by 99.4% when streaming at 60 Hz compared to traditional lossless texture compression. This bandwidth reduction allows higher quality and lower latency graphics than state-of-the-art remote rendering via video streaming. In addition, our split-rendering solution decouples remote computation from local rendering and so does not limit local display update rate or resolution., Comment: 12 pages, 7 figures, 3 tables
- Published
- 2021
49. Symmetry and Unification from Soft Theorems and Unitarity
- Author
-
Cheung, Clifford and Moss, Zander
- Subjects
High Energy Physics - Theory ,High Energy Physics - Phenomenology - Abstract
We argue that symmetry and unification can emerge as byproducts of certain physical constraints on dynamical scattering. To accomplish this we parameterize a general Lorentz invariant, four-dimensional theory of massless and massive scalar fields coupled via arbitrary local interactions. Assuming perturbative unitarity and an Adler zero condition, we prove that any finite spectrum of massless and massive modes will necessarily unify at high energies into multiplets of a linearized symmetry. Certain generators of the symmetry algebra can be derived explicitly in terms of the spectrum and three-particle interactions. Furthermore, our assumptions imply that the coset space is symmetric., Comment: 24 pages
- Published
- 2020
- Full Text
- View/download PDF
50. Millimeter-Wave Massive MIMO Testbed with Hybrid Beamforming
- Author
-
Chung, MinKeun, Liu, Liang, Johansson, Andreas, Nilsson, Martin, Zander, Olof, Ying, Zhinong, Tufvesson, Fredrik, and Edfors, Ove
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Information Theory - Abstract
Massive multiple-input multiple-out (MIMO) technology is vital in millimeter-wave (mmWave) bands to obtain large array gains. However, there are practical challenges, such as high hardware cost and power consumption in such systems. A promising solution to these problems is to adopt a hybrid beamforming architecture. This architecture has a much lower number of transceiver (TRx) chains than the total antenna number, resulting in cost- and energy-efficient systems. In this paper, we present a real-time mmWave (28 GHz) massive MIMO testbed with hybrid beamforming. This testbed has a 64-antenna/16-TRx unit for beam-selection, which can be expanded to larger array sizes in a modular way. For testing everything from baseband processing algorithms to scheduling and beam-selection in real propagation environments, we extend the capability of an existing 100-antenna/100-TRx massive MIMO testbed (below 6 GHz), built upon software-defined radio technology, to a flexible mmWave massive MIMO system., Comment: 54th Asilomar Conference on Signals, Systems, and Computers, Nov. 2020
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.