2,199,024 Works

An Efficient and Adaptive Granular-ball Generation Method in Classification Problem

Shuyin Xia, Xiaochuan Dai, Guoyin Wang, Xinbo Gao & Elisabeth Giem
Granular-ball computing is an efficient, robust, and scalable learning method for granular computing. The basis of granular-ball computing is the granular-ball generation method. This paper proposes a method for accelerating the granular-ball generation using the division to replace $k$-means. It can greatly improve the efficiency of granular-ball generation while ensuring the accuracy similar to the existing method. Besides, a new adaptive method for the granular-ball generation is proposed by considering granular-ball's overlap eliminating and some...

One-Loop Renormalization of the Higgs Sector of the Electroweak Chiral Lagrangian extended by N Scalar Singlets

Andreas Lindner & Khoirul Faiq Muzakka
The framework of the electroweak chiral Lagrangian with a light Higgs is extended by an additional scalar and then generalized to N scalars in the Higgs sector. Divergences from scalar fluctuations are renormalized up to one loop using the background field method. The results are crosschecked against the case of one scalar. A subset of the divergences is demonstrated and crosschecked diagrammatically. Together with the complete one-loop renormalization of the electroweak chiral theory with one...

Monte-Carlo tool SANCphot for polarized $γγ$ collision simulation

Serge Bondarenko, Lidia Kalinovskaya & Andrey Sapronov
Our study of theoretical uncertainties for the four bosons processes at one-loop level including the case of the transverse polarization is presented. The calculations are based on helicity amplitudes approach for 4-boson SM interactions through a fermion and boson loops. The computation takes into account nonzero mass of loop particles. The obtained predictions are equally suitable for a wide range of energies and for arbitrary, including extreme, regions of the phase volume. Uncertainty estimates are...

Reconfiguration of Spanning Trees with Degree Constraint or Diameter Constraint

Nicolas Bousquet, Takehiro Ito, Yusuke Kobayashi, Haruka Mizuta, Paul Ouvrard, Akira Suzuki & Kunihiro Wasa
We investigate the complexity of finding a transformation from a given spanning tree in a graph to another given spanning tree in the same graph via a sequence of edge flips. The exchange property of the matroid bases immediately yields that such a transformation always exists if we have no constraints on spanning trees. In this paper, we wish to find a transformation which passes through only spanning trees satisfying some constraint. Our focus is...

Carrier-envelope phase of a light bullet

Elizaveta Zaloznaya, Victor Kompanets, Alexander Savvin, Alexander Dormidonov, Sergey Chekalin & Valery Kandidov
A light bullet is an extremely compressed in space and time wave packet of a few optical cycles, which is formed in the bulk transparent dielectric during femtosecond filamentation under anomalous group velocity dispersion. The effect of a carrier-envelope phase on the dynamics of the light bullet was demonstrated for the first time. The carrier-envelope phase change during a light bullet propagation causes synchronous oscillations of its spatial, temporal and energy parameters with the period...

Kohler-Jobin meets Ehrhard: the sharp lower bound for the Gaussian principal frequency while the Gaussian torsional rigidity is fixed, via rearrangements

Orli Herscovici & Galyna V. Livshyts
In this note, we provide an adaptation of the Kohler-Jobin rearrangement technique to the setting of the Gauss space. As a result, we prove the Gaussian analogue of the Kohler-Jobin's resolution of a conjecture of Pólya-Szegö: when the Gaussian torsional rigidity of a (convex) domain is fixed, the Gaussian principal frequency is minimized for the half-space. At the core of this rearrangement technique is the idea of considering a "modified" torsional rigidity, with respect to...

Accretion around black holes: The geometry and spectra

B. F. Liu & Erlin Qiao
Observations of black hole X-ray binaries and active galactic nuclei indicate that the accretion flows around black holes are composed of hot and cold gas, which have been theoretically described in terms of either a hot geometrically thick corona lying above and below a cold geometrically thin disk or an inner advection dominated accretion flow connected to an outer thin disk. This article reviews the accretion flows around black holes, with an emphasis on the...

Neighboring Backdoor Attacks on Graph Convolutional Network

Liang Chen, Qibiao Peng, Jintang Li, Yang Liu, Jiawei Chen, Yong Li & Zibin Zheng
Backdoor attacks have been widely studied to hide the misclassification rules in the normal models, which are only activated when the model is aware of the specific inputs (i.e., the trigger). However, despite their success in the conventional Euclidean space, there are few studies of backdoor attacks on graph structured data. In this paper, we propose a new type of backdoor which is specific to graph data, called neighboring backdoor. Considering the discreteness of graph...

Defeating Eavesdroppers with Ambient Backscatter Communications

Nguyen Van Huynh, Nguyen Quang Hieu, Nam H. Chu, Diep N. Nguyen, Dinh Thai Hoang & Eryk Dutkiewicz
Unlike conventional anti-eavesdropping methods that always require additional energy or computing resources (e.g., in friendly jamming and cryptography-based solutions), this work proposes a novel anti-eavesdropping solution that comes with mostly no extra power nor computing resource requirement. This is achieved by leveraging the ambient backscatter communications in which secret information can be transmitted by backscattering it over ambient radio signals. Specifically, the original message at the transmitter is first encoded into two parts: (i) active...

Comparative Study of Acoustic Echo Cancellation Algorithms for Speech Recognition System in Noisy Environment

Urmila Shrawankar
Traditionally, adaptive filters have been deployed to achieve AEC by estimating the acoustic echo response using algorithms such as the Normalized Least-Mean-Square (NLMS) algorithm. Several approaches have been proposed over recent years to improve the performance of the standard NLMS algorithm in various ways for AEC. These include algorithms based on Time Domain, Frequency Domain, Fourier Transform, Wavelet Transform Adaptive Schemes, Proportionate Schemes, Proportionate Adaptive Filters, Combination Schemes, Block Based Combination, Sub band Adaptive Filtering,...

Deep convolutional neural network for shape optimization using level-set approach

Wrik Mallik, Neil Farvolden, Jasmin Jelovica & Rajeev K. Jaiman
This article presents a reduced-order modeling methodology via deep convolutional neural networks (CNNs) for shape optimization applications. The CNN provides a nonlinear mapping between the shapes and their associated attributes while conserving the equivariance of these attributes to the shape translations. To implicitly represent complex shapes via a CNN-applicable Cartesian structured grid, a level-set method is employed. The CNN-based reduced-order model (ROM) is constructed in a completely data-driven manner thus well suited for non-intrusive applications....

Entanglement in quantum field theory via wavelet representations

Daniel J. George, Yuval R. Sanders, Mohsen Bagherimehrab, Barry C. Sanders & Gavin K. Brennen
Quantum field theory (QFT) describes nature using continuous fields, but physical properties of QFT are usually revealed in terms of measurements of observables at a finite resolution. We describe a multiscale representation of a free scalar bosonic and Ising model fermionic QFTs using wavelets. Making use of the orthogonality and self similarity of the wavelet basis functions, we demonstrate some well known relations such as scale dependent subsystem entanglement entropy and renormalization of correlations in...

An Improved Reinforcement Learning Algorithm for Learning to Branch

Qingyu Qu, Xijun Li, Yunfan Zhou, Jia Zeng, Mingxuan Yuan, Jie Wang, Jinhu Lv, Kexin Liu & Kun Mao
Most combinatorial optimization problems can be formulated as mixed integer linear programming (MILP), in which branch-and-bound (B\&B) is a general and widely used method. Recently, learning to branch has become a hot research topic in the intersection of machine learning and combinatorial optimization. In this paper, we propose a novel reinforcement learning-based B\&B algorithm. Similar to offline reinforcement learning, we initially train on the demonstration data to accelerate learning massively. With the improvement of the...

On convergence of occupational measures sets of a discrete-time stochastic control system, with applications to averaging of hybrid systems

Lucas Gamertsfelder
In the first part of the paper, we consider a discrete-time stochastic control system. We show that, under certain conditions, the set of random occupational measures generated by the state-control trajectories of the system as well as the set of their mathematical expectations converge (as the time horizon tends to infinity) to a convex and compact (non-random) set, which is shown to coincide with the set of stationary probabilities of the system. In the second...

An Empirical Study on the Overlapping Problem of Open-Domain Dialogue Datasets

Yuqiao Wen, Guoqing Luo & Lili Mou
Open-domain dialogue systems aim to converse with humans through text, and dialogue research has heavily relied on benchmark datasets. In this work, we observe the overlapping problem in DailyDialog and OpenSubtitles, two popular open-domain dialogue benchmark datasets. Our systematic analysis then shows that such overlapping can be exploited to obtain fake state-of-the-art performance. Finally, we address this issue by cleaning these datasets and setting up a proper data processing procedure for future research.

Efficient DNN Training with Knowledge-Guided Layer Freezing

Yiding Wang, Decang Sun, Kai Chen, Fan Lai & Mosharaf Chowdhury
Training deep neural networks (DNNs) is time-consuming. While most existing solutions try to overlap/schedule computation and communication for efficient training, this paper goes one step further by skipping computing and communication through DNN layer freezing. Our key insight is that the training progress of internal DNN layers differs significantly, and front layers often become well-trained much earlier than deep layers. To explore this, we first introduce the notion of training plasticity to quantify the training...

Targeted Optimal Treatment Regime Learning Using Summary Statistics

Jianing Chu, Wenbin Lu & Shu Yang
Personalized decision-making, aiming to derive optimal individualized treatment rules (ITRs) based on individual characteristics, has recently attracted increasing attention in many fields, such as medicine, social services, and economics. Current literature mainly focuses on estimating ITRs from a single source population. In real-world applications, the distribution of a target population can be different from that of the source population. Therefore, ITRs learned by existing methods may not generalize well to the target population. Due to...

MonLAD: Money Laundering Agents Detection in Transaction Streams

Xiaobing Sun, Wenjie Feng, Shenghua Liu, Yuyang Xie, Siddharth Bhatia, Bryan Hooi, Wenhan Wang & Xueqi Cheng
Given a stream of money transactions between accounts in a bank, how can we accurately detect money laundering agent accounts and suspected behaviors in real-time? Money laundering agents try to hide the origin of illegally obtained money by dispersive multiple small transactions and evade detection by smart strategies. Therefore, it is challenging to accurately catch such fraudsters in an unsupervised manner. Existing approaches do not consider the characteristics of those agent accounts and are not...

Experimental Observation of Maximum Density Fluctuation in Liquid Te

Yukio Kajihara, Masanori Inui, Kazuhiro Matsuda & Koji Ohara
We performed small-angle X-ray scattering measurements of liquid Te using a synchrotron radiation facility and observed the maximum scattering intensity near 620 K in the supercooled region (melting temperature 723 K). This result is an experimental observation of the ridge line of the critical density fluctuation associated with the liquid-liquid phase transition that is argued to exist in the supercooled region and verifies the existence of the transition. Similar results have been reported for supercooled...

Inferential Theory for Granular Instrumental Variables in High Dimensions

Saman Banafti & Tae-Hwy Lee
The Granular Instrumental Variables (GIV) methodology exploits panels with factor error structures to construct instruments to estimate structural time series models with endogeneity even after controlling for latent factors. We extend the GIV methodology in several dimensions. First, we extend the identification procedure to a large $N$ and large $T$ framework, which depends on the asymptotic Herfindahl index of the size distribution of $N$ cross-sectional units. Second, we treat both the factors and loadings as...

Drift vs Shift: Decoupling Trends and Changepoint Analysis

Haoxuan Wu, Sean Ryan & David S. Matteson
We introduce a new approach for decoupling trends (drift) and changepoints (shifts) in time series. Our locally adaptive model-based approach for robustly decoupling combines Bayesian trend filtering and machine learning based regularization. An over-parameterized Bayesian dynamic linear model (DLM) is first applied to characterize drift. Then a weighted penalized likelihood estimator is paired with the estimated DLM posterior distribution to identify shifts. We show how Bayesian DLMs specified with so-called shrinkage priors can provide smooth...

Neural Network Compression of ACAS Xu Early Prototype is Unsafe: Closed-Loop Verification through Quantized State Backreachability

Stanley Bak & Hoang-Dung Tran
ACAS Xu is an air-to-air collision avoidance system designed for unmanned aircraft that issues horizontal turn advisories to avoid an intruder aircraft. Due the use of a large lookup table in the design, a neural network compression of the policy was proposed. Analysis of this system has spurred a significant body of research in the formal methods community on neural network verification. While many powerful methods have been developed, most work focuses on open-loop properties...

Distributions of Hook lengths in integer partitions

Michael Griffin, Ken Ono & Wei-Lun Tsai
Motivated by the many roles that hook lengths play in mathematics, we study the distribution of the number of $t$-hooks in the partitions of $n$. We prove that the limiting distribution is normal with mean $μ_t(n)\sim \frac{\sqrt{6n}}π-\frac{t}{2}$ and variance $σ_t^2(n)\sim \frac{(π^2-6)\sqrt{6n}}{2π^3}.$ Furthermore, we prove that the distribution of the number of hook lengths that are multiples of a fixed $t\geq 4$ in partitions of $n$ converge to a shifted Gamma distribution with parameter $k=(t-1)/2$ and...

Optimal trend following portfolios

Sebastien Valeyre
This paper derives an optimal portfolio that is based on trend-following signal. Building on an earlier related article, it provides a unifying theoretical setting to introduce an autocorrelation model with the covariance matrix of trends and risk premia. We specify practically relevant models for the covariance matrix of trends. The optimal portfolio is decomposed into four basic components that yield four basic portfolios: Markowitz, risk parity, agnostic risk parity, and trend following on risk parity....

Pure dephasing of magnonic quantum states

H. Y. Yuan, W. P. Sterk, Akashdeep Kamra & Rembert A. Duine
For a wide range of nonclassical magnonic states that have been proposed and demonstrated recently, a new time scale besides the magnon lifetime - the magnon dephasing time - becomes important, but this time scale is rarely studied. Considering exchange interaction and spin-phonon coupling, we evaluate the pure magnon dephasing time and find it to be smaller than the magnon lifetime at temperatures of a few Kelvins. By examining a magnonic cat state as an...

Registration Year

  • 2023
    14,699
  • 2022
    2,184,325

Resource Types

  • Text
    1,191,123
  • Preprint
    1,007,901