-
StimuVAR: Spatiotemporal Stimuli-aware Video Affective Reasoning with Multimodal Large Language Models
Authors:
Yuxiang Guo,
Faizan Siddiqui,
Yang Zhao,
Rama Chellappa,
Shao-Yuan Lo
Abstract:
Predicting and reasoning how a video would make a human feel is crucial for developing socially intelligent systems. Although Multimodal Large Language Models (MLLMs) have shown impressive video understanding capabilities, they tend to focus more on the semantic content of videos, often overlooking emotional stimuli. Hence, most existing MLLMs fall short in estimating viewers' emotional reactions…
▽ More
Predicting and reasoning how a video would make a human feel is crucial for developing socially intelligent systems. Although Multimodal Large Language Models (MLLMs) have shown impressive video understanding capabilities, they tend to focus more on the semantic content of videos, often overlooking emotional stimuli. Hence, most existing MLLMs fall short in estimating viewers' emotional reactions and providing plausible explanations. To address this issue, we propose StimuVAR, a spatiotemporal Stimuli-aware framework for Video Affective Reasoning (VAR) with MLLMs. StimuVAR incorporates a two-level stimuli-aware mechanism: frame-level awareness and token-level awareness. Frame-level awareness involves sampling video frames with events that are most likely to evoke viewers' emotions. Token-level awareness performs tube selection in the token space to make the MLLM concentrate on emotion-triggered spatiotemporal regions. Furthermore, we create VAR instruction data to perform affective training, steering MLLMs' reasoning strengths towards emotional focus and thereby enhancing their affective reasoning ability. To thoroughly assess the effectiveness of VAR, we provide a comprehensive evaluation protocol with extensive metrics. StimuVAR is the first MLLM-based method for viewer-centered VAR. Experiments demonstrate its superiority in understanding viewers' emotional responses to videos and providing coherent and insightful explanations.
△ Less
Submitted 30 August, 2024;
originally announced September 2024.
-
ComNeck: Bridging Compressed Image Latents and Multimodal LLMs via Universal Transform-Neck
Authors:
Chia-Hao Kao,
Cheng Chien,
Yu-Jen Tseng,
Yi-Hsin Chen,
Alessandro Gnutti,
Shao-Yuan Lo,
Wen-Hsiao Peng,
Riccardo Leonardi
Abstract:
This paper presents the first-ever study of adapting compressed image latents to suit the needs of downstream vision tasks that adopt Multimodal Large Language Models (MLLMs). MLLMs have extended the success of large language models to modalities (e.g. images) beyond text, but their billion scale hinders deployment on resource-constrained end devices. While cloud-hosted MLLMs could be available, t…
▽ More
This paper presents the first-ever study of adapting compressed image latents to suit the needs of downstream vision tasks that adopt Multimodal Large Language Models (MLLMs). MLLMs have extended the success of large language models to modalities (e.g. images) beyond text, but their billion scale hinders deployment on resource-constrained end devices. While cloud-hosted MLLMs could be available, transmitting raw, uncompressed images captured by end devices to the cloud requires an efficient image compression system. To address this, we focus on emerging neural image compression and propose a novel framework with a lightweight transform-neck and a surrogate loss to adapt compressed image latents for MLLM-based vision tasks. The proposed framework is generic and applicable to multiple application scenarios, where the neural image codec can be (1) pre-trained for human perception without updating, (2) fully updated for joint human and machine perception, or (3) fully updated for only machine perception. The transform-neck trained with the surrogate loss is universal, for it can serve various downstream vision tasks enabled by a variety of MLLMs that share the same visual encoder. Our framework has the striking feature of excluding the downstream MLLMs from training the transform-neck, and potentially the neural image codec as well. This stands out from most existing coding for machine approaches that involve downstream networks in training and thus could be impractical when the networks are MLLMs. Extensive experiments on different neural image codecs and various MLLM-based vision tasks show that our method achieves great rate-accuracy performance with much less complexity, demonstrating its effectiveness.
△ Less
Submitted 28 July, 2024;
originally announced July 2024.
-
Time Synchronization of TESLA-enabled GNSS Receivers
Authors:
Jason Anderson,
Sherman Lo,
Todd Walter
Abstract:
As TESLA-enabled GNSS for authenticated positioning reaches ubiquity, receivers must use an onboard, GNSS-independent clock and carefully constructed time synchronization algorithms to assert the authenticity afforded. This work provides the necessary checks and synchronization protocols needed in the broadcast-only GNSS context. We provide proof of security for each of our algorithms under a dela…
▽ More
As TESLA-enabled GNSS for authenticated positioning reaches ubiquity, receivers must use an onboard, GNSS-independent clock and carefully constructed time synchronization algorithms to assert the authenticity afforded. This work provides the necessary checks and synchronization protocols needed in the broadcast-only GNSS context. We provide proof of security for each of our algorithms under a delay-capable adversary. The algorithms included herein enable a GNSS receiver to use its onboard, GNSS-independent clock to determine whether a message arrived at the correct time, to determine whether its onboard, GNSS-independent clock is safe to use and when the clock will no longer be safe in the future due to predicted clock drift, and to resynchronize its onboard, GNSS-independent clock. Each algorithm is safe to use even when an adversary induces delays within the protocol. Moreover, we discuss the implications of GNSS authentication schemes that use two simultaneous TESLA instances of different authentication cadences. To a receiver implementer or standards author, this work provides the necessary implementation algorithms to assert security and provides a comprehensive guide on why these methods are required.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.
-
Follow the Rules: Reasoning for Video Anomaly Detection with Large Language Models
Authors:
Yuchen Yang,
Kwonjoon Lee,
Behzad Dariush,
Yinzhi Cao,
Shao-Yuan Lo
Abstract:
Video Anomaly Detection (VAD) is crucial for applications such as security surveillance and autonomous driving. However, existing VAD methods provide little rationale behind detection, hindering public trust in real-world deployments. In this paper, we approach VAD with a reasoning framework. Although Large Language Models (LLMs) have shown revolutionary reasoning ability, we find that their direc…
▽ More
Video Anomaly Detection (VAD) is crucial for applications such as security surveillance and autonomous driving. However, existing VAD methods provide little rationale behind detection, hindering public trust in real-world deployments. In this paper, we approach VAD with a reasoning framework. Although Large Language Models (LLMs) have shown revolutionary reasoning ability, we find that their direct use falls short of VAD. Specifically, the implicit knowledge pre-trained in LLMs focuses on general context and thus may not apply to every specific real-world VAD scenario, leading to inflexibility and inaccuracy. To address this, we propose AnomalyRuler, a novel rule-based reasoning framework for VAD with LLMs. AnomalyRuler comprises two main stages: induction and deduction. In the induction stage, the LLM is fed with few-shot normal reference samples and then summarizes these normal patterns to induce a set of rules for detecting anomalies. The deduction stage follows the induced rules to spot anomalous frames in test videos. Additionally, we design rule aggregation, perception smoothing, and robust reasoning strategies to further enhance AnomalyRuler's robustness. AnomalyRuler is the first reasoning approach for the one-class VAD task, which requires only few-normal-shot prompting without the need for full-shot training, thereby enabling fast adaption to various VAD scenarios. Comprehensive experiments across four VAD benchmarks demonstrate AnomalyRuler's state-of-the-art detection performance and reasoning ability. AnomalyRuler is open-source and available at: https://github.com/Yuchen413/AnomalyRuler
△ Less
Submitted 20 July, 2024; v1 submitted 14 July, 2024;
originally announced July 2024.
-
Subpath-Based Column Generation for the Electric Routing-Scheduling Problem
Authors:
Alexandre Jacquillat,
Sean Lo
Abstract:
Motivated by widespread electrification targets, this paper studies an electric routing-scheduling problem (ERSP) that jointly optimizes routing-scheduling and charging decisions. The ERSP is formulated as a semi-infinite set-partitioning model, where continuous charging decisions result in infinitely-many path-based variables. To solve it, we develop a column generation algorithm with a bi-level…
▽ More
Motivated by widespread electrification targets, this paper studies an electric routing-scheduling problem (ERSP) that jointly optimizes routing-scheduling and charging decisions. The ERSP is formulated as a semi-infinite set-partitioning model, where continuous charging decisions result in infinitely-many path-based variables. To solve it, we develop a column generation algorithm with a bi-level label-setting algorithm to decompose the pricing problem into (i) a first-level procedure to generate subpaths between charging stations, and (ii) a second-level procedure to combine subpaths into paths. We formalize subpath-based domination properties to establish the finite convergence and exactness of the column generation algorithm. We prove that the methodology can handle modeling extensions with heterogeneous charging costs (via dynamic re-optimization of charging decisions) and algorithm extensions to tighten the relaxation using ng-routes and limited-memory subset-row inequalities (via augmented domination criteria). Computational results show that the methodology scales to large instances, outperforming state-of-the-art column generation algorithms. From a practical standpoint, the methodology achieves significant cost reductions by jointly optimizing routing-scheduling and charging decisions and by capturing heterogeneous charging costs.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Can't make an Omelette without Breaking some Eggs: Plausible Action Anticipation using Large Video-Language Models
Authors:
Himangi Mittal,
Nakul Agarwal,
Shao-Yuan Lo,
Kwonjoon Lee
Abstract:
We introduce PlausiVL, a large video-language model for anticipating action sequences that are plausible in the real-world. While significant efforts have been made towards anticipating future actions, prior approaches do not take into account the aspect of plausibility in an action sequence. To address this limitation, we explore the generative capability of a large video-language model in our wo…
▽ More
We introduce PlausiVL, a large video-language model for anticipating action sequences that are plausible in the real-world. While significant efforts have been made towards anticipating future actions, prior approaches do not take into account the aspect of plausibility in an action sequence. To address this limitation, we explore the generative capability of a large video-language model in our work and further, develop the understanding of plausibility in an action sequence by introducing two objective functions, a counterfactual-based plausible action sequence learning loss and a long-horizon action repetition loss. We utilize temporal logical constraints as well as verb-noun action pair logical constraints to create implausible/counterfactual action sequences and use them to train the model with plausible action sequence learning loss. This loss helps the model to differentiate between plausible and not plausible action sequences and also helps the model to learn implicit temporal cues crucial for the task of action anticipation. The long-horizon action repetition loss puts a higher penalty on the actions that are more prone to repetition over a longer temporal window. With this penalization, the model is able to generate diverse, plausible action sequences. We evaluate our approach on two large-scale datasets, Ego4D and EPIC-Kitchens-100, and show improvements on the task of action anticipation.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
VisTA-SR: Improving the Accuracy and Resolution of Low-Cost Thermal Imaging Cameras for Agriculture
Authors:
Heesup Yun,
Sassoum Lo,
Christine H. Diepenbrock,
Brian N. Bailey,
J. Mason Earles
Abstract:
Thermal cameras are an important tool for agricultural research because they allow for non-invasive measurement of plant temperature, which relates to important photochemical, hydraulic, and agronomic traits. Utilizing low-cost thermal cameras can lower the barrier to introducing thermal imaging in agricultural research and production. This paper presents an approach to improve the temperature acc…
▽ More
Thermal cameras are an important tool for agricultural research because they allow for non-invasive measurement of plant temperature, which relates to important photochemical, hydraulic, and agronomic traits. Utilizing low-cost thermal cameras can lower the barrier to introducing thermal imaging in agricultural research and production. This paper presents an approach to improve the temperature accuracy and image quality of low-cost thermal imaging cameras for agricultural applications. Leveraging advancements in computer vision techniques, particularly deep learning networks, we propose a method, called $\textbf{VisTA-SR}$ ($\textbf{Vis}$ual \& $\textbf{T}$hermal $\textbf{A}$lignment and $\textbf{S}$uper-$\textbf{R}$esolution Enhancement) that combines RGB and thermal images to enhance the capabilities of low-resolution thermal cameras. The research includes calibration and validation of temperature measurements, acquisition of paired image datasets, and the development of a deep learning network tailored for agricultural thermal imaging. Our study addresses the challenges of image enhancement in the agricultural domain and explores the potential of low-cost thermal cameras to replace high-resolution industrial cameras. Experimental results demonstrate the effectiveness of our approach in enhancing temperature accuracy and image sharpness, paving the way for more accessible and efficient thermal imaging solutions in agriculture.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Coherent Quantum Communications Across National Scale Telecommunication Infrastructure
Authors:
Mirko Pittaluga,
Yuen San Lo,
Adam Brzosko,
Robert I. Woodward,
Matthew S. Winnel,
Thomas Roger,
James F. Dynes,
Kim A. Owen,
Sergio Juarez,
Piotr Rydlichowski,
Domenico Vicinanza,
Guy Roberts,
Andrew J. Shields
Abstract:
Quantum communications harness quantum phenomena like superposition and entanglement to enhance information transfer between remote nodes. Coherent quantum communications, essential for phase-based quantum internet architecture, require optical coherence among nodes and typically involve single-photon interference. Challenges like preserving optical coherence and integrating advanced single-photon…
▽ More
Quantum communications harness quantum phenomena like superposition and entanglement to enhance information transfer between remote nodes. Coherent quantum communications, essential for phase-based quantum internet architecture, require optical coherence among nodes and typically involve single-photon interference. Challenges like preserving optical coherence and integrating advanced single-photon detectors have impeded their deployment in existing telecommunication networks. This study introduces innovative approaches to the architecture and techniques supporting coherent quantum communications, marking their first successful integration within a commercial telecom infrastructure between Frankfurt and Kehl, Germany. Employing the Twin Field Quantum Key Distribution protocol, we achieved encryption key distribution at 110 bit/s over 254 km. This system features measurement-device-independent properties and non-cryogenically cooled detectors, and represents the first effective quantum repeater implementation on telecom infrastructure, the longest practical quantum key distribution deployment to date, and validates the feasibility of a phase-based quantum internet architecture.
△ Less
Submitted 21 May, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Adaptive Batch Normalization Networks for Adversarial Robustness
Authors:
Shao-Yuan Lo,
Vishal M. Patel
Abstract:
Deep networks are vulnerable to adversarial examples. Adversarial Training (AT) has been a standard foundation of modern adversarial defense approaches due to its remarkable effectiveness. However, AT is extremely time-consuming, refraining it from wide deployment in practical applications. In this paper, we aim at a non-AT defense: How to design a defense method that gets rid of AT but is still r…
▽ More
Deep networks are vulnerable to adversarial examples. Adversarial Training (AT) has been a standard foundation of modern adversarial defense approaches due to its remarkable effectiveness. However, AT is extremely time-consuming, refraining it from wide deployment in practical applications. In this paper, we aim at a non-AT defense: How to design a defense method that gets rid of AT but is still robust against strong adversarial attacks? To answer this question, we resort to adaptive Batch Normalization (BN), inspired by the recent advances in test-time domain adaptation. We propose a novel defense accordingly, referred to as the Adaptive Batch Normalization Network (ABNN). ABNN employs a pre-trained substitute model to generate clean BN statistics and sends them to the target model. The target model is exclusively trained on clean data and learns to align the substitute model's BN statistics. Experimental results show that ABNN consistently improves adversarial robustness against both digital and physically realizable attacks on both image and video datasets. Furthermore, ABNN can achieve higher clean data performance and significantly lower training time complexity compared to AT-based approaches.
△ Less
Submitted 26 May, 2024; v1 submitted 19 May, 2024;
originally announced May 2024.
-
Agent Design Pattern Catalogue: A Collection of Architectural Patterns for Foundation Model based Agents
Authors:
Yue Liu,
Sin Kit Lo,
Qinghua Lu,
Liming Zhu,
Dehai Zhao,
Xiwei Xu,
Stefan Harrer,
Jon Whittle
Abstract:
Foundation model-enabled generative artificial intelligence facilitates the development and implementation of agents, which can leverage distinguished reasoning and language processing capabilities to takes a proactive, autonomous role to pursue users' goals. Nevertheless, there is a lack of systematic knowledge to guide practitioners in designing the agents considering challenges of goal-seeking…
▽ More
Foundation model-enabled generative artificial intelligence facilitates the development and implementation of agents, which can leverage distinguished reasoning and language processing capabilities to takes a proactive, autonomous role to pursue users' goals. Nevertheless, there is a lack of systematic knowledge to guide practitioners in designing the agents considering challenges of goal-seeking (including generating instrumental goals and plans), such as hallucinations inherent in foundation models, explainability of reasoning process, complex accountability, etc. To address this issue, we have performed a systematic literature review to understand the state-of-the-art foundation model-based agents and the broader ecosystem. In this paper, we present a pattern catalogue consisting of 17 architectural patterns with analyses of the context, forces, and trade-offs as the outcomes from the previous literature review. The proposed catalogue can provide holistic guidance for the effective use of patterns, and support the architecture design of foundation model-based agents by facilitating goal-seeking and plan generation.
△ Less
Submitted 24 June, 2024; v1 submitted 16 May, 2024;
originally announced May 2024.
-
RoofDiffusion: Constructing Roofs from Severely Corrupted Point Data via Diffusion
Authors:
Kyle Shih-Huang Lo,
Jörg Peters,
Eric Spellman
Abstract:
Accurate completion and denoising of roof height maps are crucial to reconstructing high-quality 3D buildings. Repairing sparse points can enhance low-cost sensor use and reduce UAV flight overlap. RoofDiffusion is a new end-to-end self-supervised diffusion technique for robustly completing, in particular difficult, roof height maps. RoofDiffusion leverages widely-available curated footprints and…
▽ More
Accurate completion and denoising of roof height maps are crucial to reconstructing high-quality 3D buildings. Repairing sparse points can enhance low-cost sensor use and reduce UAV flight overlap. RoofDiffusion is a new end-to-end self-supervised diffusion technique for robustly completing, in particular difficult, roof height maps. RoofDiffusion leverages widely-available curated footprints and can so handle up to 99\% point sparsity and 80\% roof area occlusion (regional incompleteness). A variant, No-FP RoofDiffusion, simultaneously predicts building footprints and heights. Both quantitatively outperform state-of-the-art unguided depth completion and representative inpainting methods for Digital Elevation Models (DEM), on both a roof-specific benchmark and the BuildingNet dataset. Qualitative assessments show the effectiveness of RoofDiffusion for datasets with real-world scans including AHN3, Dales3D, and USGS 3DEP LiDAR. Tested with the leading City3D algorithm, preprocessing height maps with RoofDiffusion noticeably improves 3D building reconstruction. RoofDiffusion is complemented by a new dataset of 13k complex roof geometries, focusing on long-tail issues in remote sensing; a novel simulation of tree occlusion; and a wide variety of large-area roof cut-outs for data augmentation and benchmarking.
△ Less
Submitted 14 April, 2024;
originally announced April 2024.
-
Building an AI Support Tool for Real-time Ulcerative Colitis Diagnosis
Authors:
Bjørn Leth Møller,
Bobby Zhao Sheng Lo,
Johan Burisch,
Flemming Bendtsen,
Ida Vind,
Bulat Ibragimov,
Christian Igel
Abstract:
Ulcerative Colitis (UC) is a chronic inflammatory bowel disease decreasing life quality through symptoms such as bloody diarrhoea and abdominal pain. Endoscopy is a cornerstone of diagnosis and monitoring of UC. The Mayo endoscopic subscore (MES) index is the standard for measuring UC severity during endoscopic evaluation. However, the MES is subject to high inter-observer variability leading to m…
▽ More
Ulcerative Colitis (UC) is a chronic inflammatory bowel disease decreasing life quality through symptoms such as bloody diarrhoea and abdominal pain. Endoscopy is a cornerstone of diagnosis and monitoring of UC. The Mayo endoscopic subscore (MES) index is the standard for measuring UC severity during endoscopic evaluation. However, the MES is subject to high inter-observer variability leading to misdiagnosis and suboptimal treatment. We propose using a machine-learning based MES classification system to support the endoscopic process and to mitigate the observer-variability. The system runs real-time in the clinic and augments doctors' decision-making during the endoscopy. This project report outlines the process of designing, creating and evaluating our system. We describe our initial evaluation, which is a combination of a standard non-clinical model test and a first clinical test of the system on a real patient.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Towards More General Video-based Deepfake Detection through Facial Feature Guided Adaptation for Foundation Model
Authors:
Yue-Hua Han,
Tai-Ming Huang,
Shu-Tzu Lo,
Po-Han Huang,
Kai-Lung Hua,
Jun-Cheng Chen
Abstract:
With the rise of deep learning, generative models have enabled the creation of highly realistic synthetic images, presenting challenges due to their potential misuse. While research in Deepfake detection has grown rapidly in response, many detection methods struggle with unseen Deepfakes generated by new synthesis techniques. To address this generalisation challenge, we propose a novel Deepfake de…
▽ More
With the rise of deep learning, generative models have enabled the creation of highly realistic synthetic images, presenting challenges due to their potential misuse. While research in Deepfake detection has grown rapidly in response, many detection methods struggle with unseen Deepfakes generated by new synthesis techniques. To address this generalisation challenge, we propose a novel Deepfake detection approach by adapting the Foundation Models with rich information encoded inside, specifically using the image encoder from CLIP which has demonstrated strong zero-shot capability for downstream tasks. Inspired by the recent advances of parameter efficient fine-tuning, we propose a novel side-network-based decoder to extract spatial and temporal cues from the given video clip, with the promotion of the Facial Component Guidance (FCG) to encourage the spatial feature to include features of key facial parts for more robust and general Deepfake detection. Through extensive cross-dataset evaluations, our approach exhibits superior effectiveness in identifying unseen Deepfake samples, achieving notable performance improvement even with limited training samples and manipulation types. Our model secures an average performance enhancement of 0.9\% AUROC in cross-dataset assessments comparing with state-of-the-art methods, especially a significant lead of achieving 4.4\% improvement on the challenging DFDC dataset.
△ Less
Submitted 5 June, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
A maximum penalised likelihood approach for semiparametric accelerated failure time models with time-varying covariates and partly interval censoring
Authors:
Aishwarya Bhaskaran,
Ding Ma,
Benoit Liquet,
Angela Hong,
Serigne N Lo,
Stephane Heritier,
Jun Ma
Abstract:
Accelerated failure time (AFT) models are frequently used for modelling survival data. This approach is attractive as it quantifies the direct relationship between the time until an event occurs and various covariates. It asserts that the failure times experience either acceleration or deceleration through a multiplicative factor when these covariates are present. While existing literature provide…
▽ More
Accelerated failure time (AFT) models are frequently used for modelling survival data. This approach is attractive as it quantifies the direct relationship between the time until an event occurs and various covariates. It asserts that the failure times experience either acceleration or deceleration through a multiplicative factor when these covariates are present. While existing literature provides numerous methods for fitting AFT models with time-fixed covariates, adapting these approaches to scenarios involving both time-varying covariates and partly interval-censored data remains challenging. In this paper, we introduce a maximum penalised likelihood approach to fit a semiparametric AFT model. This method, designed for survival data with partly interval-censored failure times, accommodates both time-fixed and time-varying covariates. We utilise Gaussian basis functions to construct a smooth approximation of the nonparametric baseline hazard and fit the model via a constrained optimisation approach. To illustrate the effectiveness of our proposed method, we conduct a comprehensive simulation study. We also present an implementation of our approach on a randomised clinical trial dataset on advanced melanoma patients.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
The Aleph & Other Metaphors for Image Generation
Authors:
Gonzalo Ramos,
Rick Barraza,
Victor Dibia,
Sharon Lo
Abstract:
In this position paper, we reflect on fictional stories dealing with the infinite and how they connect with the current, fast-evolving field of image generation models. We draw attention to how some of these literary constructs can serve as powerful metaphors for guiding human-centered design and technical thinking in the space of these emerging technologies and the experiences we build around the…
▽ More
In this position paper, we reflect on fictional stories dealing with the infinite and how they connect with the current, fast-evolving field of image generation models. We draw attention to how some of these literary constructs can serve as powerful metaphors for guiding human-centered design and technical thinking in the space of these emerging technologies and the experiences we build around them. We hope our provocations seed conversations about current and yet-to-be developed interactions with these emerging models in ways that may amplify human agency.
△ Less
Submitted 11 February, 2024;
originally announced February 2024.
-
Filamentary Network and Magnetic Field Structures Revealed with BISTRO in the High-Mass Star-Forming Region NGC2264 : Global Properties and Local Magnetogravitational Configurations
Authors:
Jia-Wei Wang,
Patrick M. Koch,
Seamus D. Clarke,
Gary Fuller,
Nicolas Peretto,
Ya-Wen Tang,
Hsi-Wei Yen,
Shih-Ping Lai,
Nagayoshi Ohashi,
Doris Arzoumanian,
Doug Johnstone,
Ray Furuya,
Shu-ichiro Inutsuka,
Chang Won Lee,
Derek Ward-Thompson,
Valentin J. M. Le Gouellec,
Hong-Li Liu,
Lapo Fanciullo,
Jihye Hwang,
Kate Pattle,
Frédérick Poidevin,
Mehrnoosh Tahani,
Takashi Onaka,
Mark G. Rawlings,
Eun Jung Chung
, et al. (132 additional authors not shown)
Abstract:
We report 850 $μ$m continuum polarization observations toward the filamentary high-mass star-forming region NGC 2264, taken as part of the B-fields In STar forming Regions Observations (BISTRO) large program on the James Clerk Maxwell Telescope (JCMT). These data reveal a well-structured non-uniform magnetic field in the NGC 2264C and 2264D regions with a prevailing orientation around 30 deg from…
▽ More
We report 850 $μ$m continuum polarization observations toward the filamentary high-mass star-forming region NGC 2264, taken as part of the B-fields In STar forming Regions Observations (BISTRO) large program on the James Clerk Maxwell Telescope (JCMT). These data reveal a well-structured non-uniform magnetic field in the NGC 2264C and 2264D regions with a prevailing orientation around 30 deg from north to east. Field strengths estimates and a virial analysis for the major clumps indicate that NGC 2264C is globally dominated by gravity while in 2264D magnetic, gravitational, and kinetic energies are roughly balanced. We present an analysis scheme that utilizes the locally resolved magnetic field structures, together with the locally measured gravitational vector field and the extracted filamentary network. From this, we infer statistical trends showing that this network consists of two main groups of filaments oriented approximately perpendicular to one another. Additionally, gravity shows one dominating converging direction that is roughly perpendicular to one of the filament orientations, which is suggestive of mass accretion along this direction. Beyond these statistical trends, we identify two types of filaments. The type-I filament is perpendicular to the magnetic field with local gravity transitioning from parallel to perpendicular to the magnetic field from the outside to the filament ridge. The type-II filament is parallel to the magnetic field and local gravity. We interpret these two types of filaments as originating from the competition between radial collapsing, driven by filament self-gravity, and the longitudinal collapsing, driven by the region's global gravity.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
DP-$5$-truncated-degree-colourability of $K_{2,4}$-minor free graphs
Authors:
On-Hei Solomon Lo,
Cheng Wang,
Huan Zhou,
Xuding Zhu
Abstract:
Assume G is a graph and k is a positive integer. Let f: V(G) to N be defined as f(v)=min{k, d_G(v)}. If G is DP-f-colourable (respectively, f-choosable), then we say G is DP-k-truncated-degree-colourable (respectively, k-truncated-degree-choosable). Hutchinson [On list-colouring outerplanar graphs. J. Graph Theory] proved that 2-connected maximal outerplanar graphs other than the triangle are 5-tr…
▽ More
Assume G is a graph and k is a positive integer. Let f: V(G) to N be defined as f(v)=min{k, d_G(v)}. If G is DP-f-colourable (respectively, f-choosable), then we say G is DP-k-truncated-degree-colourable (respectively, k-truncated-degree-choosable). Hutchinson [On list-colouring outerplanar graphs. J. Graph Theory] proved that 2-connected maximal outerplanar graphs other than the triangle are 5-truncated-degree-choosable. This result was recently improved by Dai, Hu, Li, and Maezawa in [On DP-colouring of outerplanar graphs. Manuscript, 2023], where it is proved that 2-connected outerplanar graphs other than cycles are DP-5-truncated-degree-colourable. This paper further improves this result and proves that 2-connected K_{2,4}-minor free graphs other than cycles and complete graphs are DP-$5$-truncated-degree-colourable.
△ Less
Submitted 26 December, 2023;
originally announced December 2023.
-
Optical transmitter tunable over a 65-nm wavelength range around 1550 nm for quantum key distribution
Authors:
B. Griffiths,
Y. S. Lo,
J. F. Dynes,
R. I. Woodward,
A. J. Shields
Abstract:
The ability to create phase-controlled pulses of light with wavelength tunability has applications spanning quantum and classical communications networks. Traditionally, optical transmitters are able to either produce phase-controlled pulses at a fixed wavelength or require a chain of bulky and expensive external modulators to convert wavelength tunable continuous-wave light into optical pulses. O…
▽ More
The ability to create phase-controlled pulses of light with wavelength tunability has applications spanning quantum and classical communications networks. Traditionally, optical transmitters are able to either produce phase-controlled pulses at a fixed wavelength or require a chain of bulky and expensive external modulators to convert wavelength tunable continuous-wave light into optical pulses. One technology of great interest is quantum key distribution (QKD), a technology for generating perfectly random keys at remote nodes to ensure secure communications. Environments such as data centers, where the user needs change regularly, will require adaptability in the deployment of QKD to integrate into classical optical networks. Here we propose and demonstrate an alternative quantum transmitter design consisting of a multimodal Fabry-Perot laser optically injection locked by a wavelength tunable laser. The transmitter is able to produce phase-controlled optical pulses at GHz speeds with a tunable wavelength range of >65nm centered at 1550 nm. With this transmitter, we perform proof-of-principle QKD with secure bit rates of order Mb/s.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
Millimeter-Wave Reflectionless Filters Using Advanced Thin-Film Fabrication
Authors:
Matthew Morgan,
Seng Loo,
Tod Boyd,
Miho Hunter
Abstract:
We report on the development of millimeter-wave, lumped-element reflectionless filters using an advanced thin-film fabrication process. Based on previously demonstrated circuit topologies capable of achieving 50Ω impedance match at all frequencies, these circuits have been implemented at higher frequencies than ever before by leveraging a thin-film process with better than 2 μm feature size and in…
▽ More
We report on the development of millimeter-wave, lumped-element reflectionless filters using an advanced thin-film fabrication process. Based on previously demonstrated circuit topologies capable of achieving 50Ω impedance match at all frequencies, these circuits have been implemented at higher frequencies than ever before by leveraging a thin-film process with better than 2 μm feature size and integrated elements such as SiN Metal-Insulator-Metal (MIM) capacitors, bridges, and TaN Thin-Film Resistors (TFRs).
△ Less
Submitted 4 July, 2023;
originally announced July 2023.
-
Distributed Trust Through the Lens of Software Architecture
Authors:
Sin Kit Lo,
Yue Liu,
Guangsheng Yu,
Qinghua Lu,
Xiwei Xu,
Liming Zhu
Abstract:
Distributed trust is a nebulous concept that has evolved from different perspectives in recent years. While one can attribute its current prominence to blockchain and cryptocurrency, the distributed trust concept has been cultivating progress in federated learning, trustworthy and responsible AI in an ecosystem setting, data sharing, privacy issues across organizational boundaries, and zero trust…
▽ More
Distributed trust is a nebulous concept that has evolved from different perspectives in recent years. While one can attribute its current prominence to blockchain and cryptocurrency, the distributed trust concept has been cultivating progress in federated learning, trustworthy and responsible AI in an ecosystem setting, data sharing, privacy issues across organizational boundaries, and zero trust cybersecurity. This paper will survey the concept of distributed trust in multiple disciplines. It will take a system/software architecture point of view to look at trust redistribution/shift and the associated tradeoffs in systems and applications enabled by distributed trust technologies.
△ Less
Submitted 25 May, 2023;
originally announced June 2023.
-
Optimal Low-Rank Matrix Completion: Semidefinite Relaxations and Eigenvector Disjunctions
Authors:
Dimitris Bertsimas,
Ryan Cory-Wright,
Sean Lo,
Jean Pauphilet
Abstract:
Low-rank matrix completion consists of computing a matrix of minimal complexity that recovers a given set of observations as accurately as possible. Unfortunately, existing methods for matrix completion are heuristics that, while highly scalable and often identifying high-quality solutions, do not possess any optimality guarantees. We reexamine matrix completion with an optimality-oriented eye. We…
▽ More
Low-rank matrix completion consists of computing a matrix of minimal complexity that recovers a given set of observations as accurately as possible. Unfortunately, existing methods for matrix completion are heuristics that, while highly scalable and often identifying high-quality solutions, do not possess any optimality guarantees. We reexamine matrix completion with an optimality-oriented eye. We reformulate these low-rank problems as convex problems over the non-convex set of projection matrices and implement a disjunctive branch-and-bound scheme that solves them to certifiable optimality. Further, we derive a novel and often tight class of convex relaxations by decomposing a low-rank matrix as a sum of rank-one matrices and incentivizing that two-by-two minors in each rank-one matrix have determinant zero. In numerical experiments, our new convex relaxations decrease the optimality gap by two orders of magnitude compared to existing attempts, and our disjunctive branch-and-bound scheme solves nxn rank-r matrix completion problems to certifiable optimality in hours for n<=150 and r<=5.
△ Less
Submitted 26 January, 2024; v1 submitted 20 May, 2023;
originally announced May 2023.
-
The JCMT BISTRO Survey: Studying the Complex Magnetic Field of L43
Authors:
Janik Karoly,
Derek Ward-Thompson,
Kate Pattle,
David Berry,
Anthony Whitworth,
Jason Kirk,
Pierre Bastien,
Tao-Chung Ching,
Simon Coude,
Jihye Hwang,
Woojin Kwon,
Archana Soam,
Jia-Wei Wang,
Tetsuo Hasegawa,
Shih-Ping Lai,
Keping Qiu,
Doris Arzoumanian,
Tyler L. Bourke,
Do-Young Byun,
Huei-Ru Vivien Chen,
Wen Ping Chen,
Mike Chen,
Zhiwei Chen,
Jungyeon Cho,
Minho Choi
, et al. (133 additional authors not shown)
Abstract:
We present observations of polarized dust emission at 850 $μ$m from the L43 molecular cloud which sits in the Ophiuchus cloud complex. The data were taken using SCUBA-2/POL-2 on the James Clerk Maxwell Telescope as a part of the BISTRO large program. L43 is a dense ($N_{\rm H_2}\sim 10^{22}$-10$^{23}$ cm$^{-2}$) complex molecular cloud with a submillimetre-bright starless core and two protostellar…
▽ More
We present observations of polarized dust emission at 850 $μ$m from the L43 molecular cloud which sits in the Ophiuchus cloud complex. The data were taken using SCUBA-2/POL-2 on the James Clerk Maxwell Telescope as a part of the BISTRO large program. L43 is a dense ($N_{\rm H_2}\sim 10^{22}$-10$^{23}$ cm$^{-2}$) complex molecular cloud with a submillimetre-bright starless core and two protostellar sources. There appears to be an evolutionary gradient along the isolated filament that L43 is embedded within, with the most evolved source closest to the Sco OB2 association. One of the protostars drives a CO outflow that has created a cavity to the southeast. We see a magnetic field that appears to be aligned with the cavity walls of the outflow, suggesting interaction with the outflow. We also find a magnetic field strength of up to $\sim$160$\pm$30 $μ$G in the main starless core and up to $\sim$90$\pm$40 $μ$G in the more diffuse, extended region. These field strengths give magnetically super- and sub-critical values respectively and both are found to be roughly trans-Alfvénic. We also present a new method of data reduction for these denser but fainter objects like starless cores.
△ Less
Submitted 22 May, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
The James Webb Space Telescope Mission
Authors:
Jonathan P. Gardner,
John C. Mather,
Randy Abbott,
James S. Abell,
Mark Abernathy,
Faith E. Abney,
John G. Abraham,
Roberto Abraham,
Yasin M. Abul-Huda,
Scott Acton,
Cynthia K. Adams,
Evan Adams,
David S. Adler,
Maarten Adriaensen,
Jonathan Albert Aguilar,
Mansoor Ahmed,
Nasif S. Ahmed,
Tanjira Ahmed,
Rüdeger Albat,
Loïc Albert,
Stacey Alberts,
David Aldridge,
Mary Marsha Allen,
Shaune S. Allen,
Martin Altenburg
, et al. (983 additional authors not shown)
Abstract:
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astrono…
▽ More
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astronomers will celebrate their accomplishments for the life of the mission, potentially as long as 20 years, and beyond. This report and the scientific discoveries that follow are extended thank-you notes to the 20,000 team members. The telescope is working perfectly, with much better image quality than expected. In this and accompanying papers, we give a brief history, describe the observatory, outline its objectives and current observing program, and discuss the inventions and people who made it possible. We cite detailed reports on the design and the measured performance on orbit.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Simplified intensity- and phase-modulated transmitter for modulator-free decoy-state quantum key distribution
Authors:
Y. S. Lo,
R. I. Woodward,
N. Walk,
M. Lucamarini,
I. De Marco,
T. K. Paraïso,
M. Pittaluga,
T. Roger,
M. Sanzaro,
Z. L. Yuan,
A. J. Shields
Abstract:
Quantum key distribution (QKD) allows secret key exchange between two users with unconditional security. For QKD to be widely deployed, low cost and compactness are crucial requirements alongside high performance. Currently, the majority of QKD systems demonstrated rely on bulk intensity and phase modulators to generate optical pulses with precisely defined amplitude and relative phase difference…
▽ More
Quantum key distribution (QKD) allows secret key exchange between two users with unconditional security. For QKD to be widely deployed, low cost and compactness are crucial requirements alongside high performance. Currently, the majority of QKD systems demonstrated rely on bulk intensity and phase modulators to generate optical pulses with precisely defined amplitude and relative phase difference i.e., to encode information as signal states and decoy states. However, these modulators are expensive and bulky, thereby limiting the compactness of QKD systems. Here, we present and experimentally demonstrate a novel optical transmitter design to overcome this disadvantage by generating intensity- and phase-tunable pulses at GHz clock speeds. Our design removes the need for bulk modulators by employing directly modulated lasers in combination with optical injection locking and coherent interference. This scheme is, therefore, well suited to miniaturization and photonic integration, and we implement a proof-of-principle QKD demonstration to highlight potential applications.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
Spatio-Temporal Pixel-Level Contrastive Learning-based Source-Free Domain Adaptation for Video Semantic Segmentation
Authors:
Shao-Yuan Lo,
Poojan Oza,
Sumanth Chennupati,
Alejandro Galindo,
Vishal M. Patel
Abstract:
Unsupervised Domain Adaptation (UDA) of semantic segmentation transfers labeled source knowledge to an unlabeled target domain by relying on accessing both the source and target data. However, the access to source data is often restricted or infeasible in real-world scenarios. Under the source data restrictive circumstances, UDA is less practical. To address this, recent works have explored soluti…
▽ More
Unsupervised Domain Adaptation (UDA) of semantic segmentation transfers labeled source knowledge to an unlabeled target domain by relying on accessing both the source and target data. However, the access to source data is often restricted or infeasible in real-world scenarios. Under the source data restrictive circumstances, UDA is less practical. To address this, recent works have explored solutions under the Source-Free Domain Adaptation (SFDA) setup, which aims to adapt a source-trained model to the target domain without accessing source data. Still, existing SFDA approaches use only image-level information for adaptation, making them sub-optimal in video applications. This paper studies SFDA for Video Semantic Segmentation (VSS), where temporal information is leveraged to address video adaptation. Specifically, we propose Spatio-Temporal Pixel-Level (STPL) contrastive learning, a novel method that takes full advantage of spatio-temporal information to tackle the absence of source data better. STPL explicitly learns semantic correlations among pixels in the spatio-temporal space, providing strong self-supervision for adaptation to the unlabeled target domain. Extensive experiments show that STPL achieves state-of-the-art performance on VSS benchmarks compared to current UDA and SFDA approaches. Code is available at: https://github.com/shaoyuanlo/STPL
△ Less
Submitted 25 March, 2023;
originally announced March 2023.
-
Deep Learning-based Multi-Organ CT Segmentation with Adversarial Data Augmentation
Authors:
Shaoyan Pan,
Shao-Yuan Lo,
Min Huang,
Chaoqiong Ma,
Jacob Wynne,
Tonghe Wang,
Tian Liu,
Xiaofeng Yang
Abstract:
In this work, we propose an adversarial attack-based data augmentation method to improve the deep-learning-based segmentation algorithm for the delineation of Organs-At-Risk (OAR) in abdominal Computed Tomography (CT) to facilitate radiation therapy. We introduce Adversarial Feature Attack for Medical Image (AFA-MI) augmentation, which forces the segmentation network to learn out-of-distribution s…
▽ More
In this work, we propose an adversarial attack-based data augmentation method to improve the deep-learning-based segmentation algorithm for the delineation of Organs-At-Risk (OAR) in abdominal Computed Tomography (CT) to facilitate radiation therapy. We introduce Adversarial Feature Attack for Medical Image (AFA-MI) augmentation, which forces the segmentation network to learn out-of-distribution statistics and improve generalization and robustness to noises. AFA-MI augmentation consists of three steps: 1) generate adversarial noises by Fast Gradient Sign Method (FGSM) on the intermediate features of the segmentation network's encoder; 2) inject the generated adversarial noises into the network, intentionally compromising performance; 3) optimize the network with both clean and adversarial features. Experiments are conducted segmenting the heart, left and right kidney, liver, left and right lung, spinal cord, and stomach. We first evaluate the AFA-MI augmentation using nnUnet and TT-Vnet on the test data from a public abdominal dataset and an institutional dataset. In addition, we validate how AFA-MI affects the networks' robustness to the noisy data by evaluating the networks with added Gaussian noises of varying magnitudes to the institutional dataset. Network performance is quantitatively evaluated using Dice Similarity Coefficient (DSC) for volume-based accuracy. Also, Hausdorff Distance (HD) is applied for surface-based accuracy. On the public dataset, nnUnet with AFA-MI achieves DSC = 0.85 and HD = 6.16 millimeters (mm); and TT-Vnet achieves DSC = 0.86 and HD = 5.62 mm. AFA-MI augmentation further improves all contour accuracies up to 0.217 DSC score when tested on images with Gaussian noises. AFA-MI augmentation is therefore demonstrated to improve segmentation performance and robustness in CT multi-organ segmentation.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
First BISTRO observations of the dark cloud Taurus L1495A-B10: the role of the magnetic field in the earliest stages of low-mass star formation
Authors:
Derek Ward-Thompson,
Janik Karoly,
Kate Pattle,
Anthony Whitworth,
Jason Kirk,
David Berry,
Pierre Bastien,
Tao-Chung Ching,
Simon Coude,
Jihye Hwang,
Woojin Kwon,
Archana Soam,
Jia-Wei Wang,
Tetsuo Hasegawa,
Shih-Ping Lai,
Keping Qiu,
Doris Arzoumanian,
Tyler L. Bourke,
Do-Young Byun,
Huei-Ru Vivien Chen,
Wen Ping Chen,
Mike Chen,
Zhiwei Chen,
Jungyeon Cho,
Minho Choi
, et al. (133 additional authors not shown)
Abstract:
We present BISTRO Survey 850 μm dust emission polarisation observations of the L1495A-B10 region of the Taurus molecular cloud, taken at the JCMT. We observe a roughly triangular network of dense filaments. We detect 9 of the dense starless cores embedded within these filaments in polarisation, finding that the plane-of-sky orientation of the core-scale magnetic field lies roughly perpendicular to…
▽ More
We present BISTRO Survey 850 μm dust emission polarisation observations of the L1495A-B10 region of the Taurus molecular cloud, taken at the JCMT. We observe a roughly triangular network of dense filaments. We detect 9 of the dense starless cores embedded within these filaments in polarisation, finding that the plane-of-sky orientation of the core-scale magnetic field lies roughly perpendicular to the filaments in almost all cases. We also find that the large-scale magnetic field orientation measured by Planck is not correlated with any of the core or filament structures, except in the case of the lowest-density core. We propose a scenario for early prestellar evolution that is both an extension to, and consistent with, previous models, introducing an additional evolutionary transitional stage between field-dominated and matter-dominated evolution, observed here for the first time. In this scenario, the cloud collapses first to a sheet-like structure. Uniquely, we appear to be seeing this sheet almost face-on. The sheet fragments into filaments, which in turn form cores. However, the material must reach a certain critical density before the evolution changes from being field-dominated to being matter-dominated. We measure the sheet surface density and the magnetic field strength at that transition for the first time and show consistency with an analytical prediction that had previously gone untested for over 50 years (Mestel 1965).
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
Defective acyclic colorings of planar graphs
Authors:
On-Hei Solomon Lo,
Ben Seamone,
Xuding Zhu
Abstract:
This paper studies two variants of defective acyclic coloring of planar graphs. For a graph $G$ and a coloring $\varphi$ of $G$, a 2CC transversal is a subset $E'$ of $E(G)$ that intersects every 2-colored cycle. Let $k$ be a positive integer. We denote by $m_k(G)$ the minimum integer $m$ such that $G$ has a proper $k$-coloring which has a 2CC transerval of size $m$, and by $m'_k(G)$ the minimum s…
▽ More
This paper studies two variants of defective acyclic coloring of planar graphs. For a graph $G$ and a coloring $\varphi$ of $G$, a 2CC transversal is a subset $E'$ of $E(G)$ that intersects every 2-colored cycle. Let $k$ be a positive integer. We denote by $m_k(G)$ the minimum integer $m$ such that $G$ has a proper $k$-coloring which has a 2CC transerval of size $m$, and by $m'_k(G)$ the minimum size of a subset $E'$ of $E(G)$ such that $G-E'$ is acyclic $k$-colorable. We prove that for any $n$-vertex $3$-colorable planar graph $G$, $m_3(G) \le n - 3$ and for any planar graph $G$, $m_4(G) \le n - 5$ provided that $n \ge 5$. We show that these upper bounds are sharp: there are infinitely many planar graphs attaining these upper bounds. Moreover, the minimum 2CC transversal $E'$ can be chosen in such a way that $E'$ induces a forest. We also prove that for any planar graph $G$, $m'_3(G) \le (13n - 42) / 10$ and $m'_4(G) \le (3n - 12) / 5$.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Modelling grain-size distributions in C-type shocks using a discrete power-law model
Authors:
Rosie Sumpter,
Sven Van Loo
Abstract:
In this paper we discuss the implementation of a discrete, piecewise power-law grain-size distribution method into a numerical multifluid MHD code as described in Sumpter (2020). Such a description allows to capture the full size range of dust grains and their dynamical effects. The only assumptions are that grains within a single discrete bin have the same velocity and charge. We test the impleme…
▽ More
In this paper we discuss the implementation of a discrete, piecewise power-law grain-size distribution method into a numerical multifluid MHD code as described in Sumpter (2020). Such a description allows to capture the full size range of dust grains and their dynamical effects. The only assumptions are that grains within a single discrete bin have the same velocity and charge. We test the implementation by modelling plane-parallel C-type shocks and compare the results with shock models of multispecies grain models. We find that both the discrete and multispecies grain models converge to the same shock profile. However, the convergence for the discrete models is faster than for the multispecies grain models. For the pure advection models a single discrete bin is sufficient, while the multispecies grain models need a minimum of 8 grain species. When including grain sputtering the necessary number of discrete bins increases to 4, as the grain distribution cannot be described by a single power-law as in the advection models. The multispecies grain models still need more grain species to model the distribution, but the number does not increase compared to the pure advection models. Our results show that modelling the grain distribution function using a discrete distribution reduces the computational cost needed to capture the grain physics significantly.
△ Less
Submitted 16 January, 2023;
originally announced January 2023.
-
Size-selective accretion of dust onto CPDs: Low CPD masses and filtration of larger grains
Authors:
Samuel M. Karlin,
Olja Panić,
Sven van Loo
Abstract:
The major satellites of Jupiter and Saturn are believed to have formed in circumplanetary discs, which orbit forming giant protoplanets. Gas and dust in CPDs have different distributions and affect each other by drag, which varies with grain size. Yet simulations of multiple dust grain sizes with separate dynamics have not been done before. We seek to assess how much dust of each grain size there…
▽ More
The major satellites of Jupiter and Saturn are believed to have formed in circumplanetary discs, which orbit forming giant protoplanets. Gas and dust in CPDs have different distributions and affect each other by drag, which varies with grain size. Yet simulations of multiple dust grain sizes with separate dynamics have not been done before. We seek to assess how much dust of each grain size there is in circumplanetary discs. We run multifluid 3D hydrodynamical simulations including gas and four discrete grain sizes of dust from 1$μ$m to 1mm, representing a continuous distribution. We consider a 1 $M_\mathrm{Jup}$ protoplanet embedded in a protoplanetary disc around a 1 $M_{\odot}$ star. Our results show a truncated MRN distribution at smaller grain sizes, which starts to tail off by $a=100μ$m and is near zero at 1mm. Large dust grains, which hold most of the dust mass, have very inefficient accretion to the CPD, due to dust filtration. Therefore CPDs' dust masses must be small, with mass ratio ~ a few $\times 10^{-6}$ to the protoplanet. These masses and the corresponding millimetre opacities are in line with CPD fluxes observed to date.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
JCMT BISTRO Observations: Magnetic Field Morphology of Bubbles Associated with NGC 6334
Authors:
Mehrnoosh Tahani,
Pierre Bastien,
Ray S. Furuya,
Kate Pattle,
Doug Johnstone,
Doris Arzoumanian,
Yasuo Doi,
Tetsuo Hasegawa,
Shu-ichiro Inutsuka,
Simon Coudé,
Laura Fissel,
Michael Chun-Yuan Chen,
Frédérick Poidevin,
Sarah Sadavoy,
Rachel Friesen,
Patrick M. Koch,
James Di Francesco,
Gerald H. Moriarty-Schieven,
Zhiwei Chen,
Eun Jung Chung,
Chakali Eswaraiah,
Lapo Fanciullo,
Tim Gledhill,
Valentin J. M. Le Gouellec,
Thiem Hoang
, et al. (120 additional authors not shown)
Abstract:
We study the HII regions associated with the NGC 6334 molecular cloud observed in the sub-millimeter and taken as part of the B-fields In STar-forming Region Observations (BISTRO) Survey. In particular, we investigate the polarization patterns and magnetic field morphologies associated with these HII regions. Through polarization pattern and pressure calculation analyses, several of these bubbles…
▽ More
We study the HII regions associated with the NGC 6334 molecular cloud observed in the sub-millimeter and taken as part of the B-fields In STar-forming Region Observations (BISTRO) Survey. In particular, we investigate the polarization patterns and magnetic field morphologies associated with these HII regions. Through polarization pattern and pressure calculation analyses, several of these bubbles indicate that the gas and magnetic field lines have been pushed away from the bubble, toward an almost tangential (to the bubble) magnetic field morphology. In the densest part of NGC 6334, where the magnetic field morphology is similar to an hourglass, the polarization observations do not exhibit observable impact from HII regions. We detect two nested radial polarization patterns in a bubble to the south of NGC 6334 that correspond to the previously observed bipolar structure in this bubble. Finally, using the results of this study, we present steps (incorporating computer vision; circular Hough Transform) that can be used in future studies to identify bubbles that have physically impacted magnetic field lines.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Elements of Randoms Analysis about the Gamma Generalized Hyperbolic Distribution Levy Stochastic Process
Authors:
Nafy Ngom,
Aladji Babacar Niang,
Soumaila Dembele,
Gane Samb Lo
Abstract:
In this paper, we study some aspects on random analysis on the Léevy stochastic processes with margins following generalized hyperbolic distributions generated by gamma laws. In particular we study the boundedness of its total variations and the quadratic variations. Next we give an empirical construction that enables the graphical representation of the paths of such stochastic processes. Comparis…
▽ More
In this paper, we study some aspects on random analysis on the Léevy stochastic processes with margins following generalized hyperbolic distributions generated by gamma laws. In particular we study the boundedness of its total variations and the quadratic variations. Next we give an empirical construction that enables the graphical representation of the paths of such stochastic processes. Comparisons with the Brownian motions are considered.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
The JCMT BISTRO-2 Survey: Magnetic Fields of the Massive DR21 Filament
Authors:
Tao-Chung Ching,
Keping Qiu,
Di Li,
Zhiyuan Ren,
Shih-Ping Lai,
David Berry,
Kate Pattle,
Ray Furuya,
Derek Ward-Thompson,
Doug Johnstone,
Patrick M. Koch,
Chang Won Lee,
Thiem Hoang,
Tetsuo Hasegawa,
Woojin Kwon,
Pierre Bastien,
Chakali Eswaraiah,
Jia-Wei Wang,
Kyoung Hee Kim,
Jihye Hwang,
Archana Soam,
A-Ran Lyo,
Junhao Liu,
Valentin J. M. Le Gouellec,
Doris Arzoumanian
, et al. (132 additional authors not shown)
Abstract:
We present 850 $μ$m dust polarization observations of the massive DR21 filament from the B-fields In STar-forming Region Observations (BISTRO) survey, using the POL-2 polarimeter and the SCUBA-2 camera on the James Clerk Maxwell Telescope. We detect ordered magnetic fields perpendicular to the parsec-scale ridge of the DR21 main filament. In the sub-filaments, the magnetic fields are mainly parall…
▽ More
We present 850 $μ$m dust polarization observations of the massive DR21 filament from the B-fields In STar-forming Region Observations (BISTRO) survey, using the POL-2 polarimeter and the SCUBA-2 camera on the James Clerk Maxwell Telescope. We detect ordered magnetic fields perpendicular to the parsec-scale ridge of the DR21 main filament. In the sub-filaments, the magnetic fields are mainly parallel to the filamentary structures and smoothly connect to the magnetic fields of the main filament. We compare the POL-2 and Planck dust polarization observations to study the magnetic field structures of the DR21 filament on 0.1--10 pc scales. The magnetic fields revealed in the Planck data are well aligned with those of the POL-2 data, indicating a smooth variation of magnetic fields from large to small scales. The plane-of-sky magnetic field strengths derived from angular dispersion functions of dust polarization are 0.6--1.0 mG in the DR21 filament and $\sim$ 0.1 mG in the surrounding ambient gas. The mass-to-flux ratios are found to be magnetically supercritical in the filament and slightly subcritical to nearly critical in the ambient gas. The alignment between column density structures and magnetic fields changes from random alignment in the low-density ambient gas probed by Planck to mostly perpendicular in the high-density main filament probed by JCMT. The magnetic field structures of the DR21 filament are in agreement with MHD simulations of a strongly magnetized medium, suggesting that magnetic fields play an important role in shaping the DR21 main filament and sub-filaments.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
Few hamiltonian cycles in graphs with one or two vertex degrees
Authors:
Jan Goedgebeur,
Jorik Jooken,
On-Hei Solomon Lo,
Ben Seamone,
Carol T. Zamfirescu
Abstract:
We fully disprove a conjecture of Haythorpe on the minimum number of hamiltonian cycles in regular hamiltonian graphs, thereby extending a result of Zamfirescu, as well as correct and complement Haythorpe's computational enumerative results from [Experim. Math. 27 (2018) 426-430]. Thereafter, we use the Lovász Local Lemma to extend Thomassen's independent dominating set method. Regarding the limit…
▽ More
We fully disprove a conjecture of Haythorpe on the minimum number of hamiltonian cycles in regular hamiltonian graphs, thereby extending a result of Zamfirescu, as well as correct and complement Haythorpe's computational enumerative results from [Experim. Math. 27 (2018) 426-430]. Thereafter, we use the Lovász Local Lemma to extend Thomassen's independent dominating set method. Regarding the limitations of this method, we answer a question of Haxell, Seamone, and Verstraete, and settle the first open case of a problem of Thomassen. Motivated by an observation of Aldred and Thomassen, we prove that for every $κ\in \{ 2, 3 \}$ and any positive integer $k$, there are infinitely many non-regular graphs of connectivity $κ$ containing exactly one hamiltonian cycle and in which every vertex has degree $3$ or $2k$.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Self-Tuning Transmitter for Quantum Key Distribution Using Machine Intelligence
Authors:
Y. S. Lo,
R. I. Woodward,
T. Roger,
V. Lovic,
T. K. Paraïso,
I. De Marco,
Z. L. Yuan,
A. J. Shields
Abstract:
The development and performance of quantum technologies heavily relies on the properties of the quantum states, which often require careful optimization of the driving conditions of all underlying components. In quantum key distribution (QKD), optical injection locking (OIL) of pulsed lasers has recently been shown as a promising technique to realize high-speed quantum transmitters with efficient…
▽ More
The development and performance of quantum technologies heavily relies on the properties of the quantum states, which often require careful optimization of the driving conditions of all underlying components. In quantum key distribution (QKD), optical injection locking (OIL) of pulsed lasers has recently been shown as a promising technique to realize high-speed quantum transmitters with efficient system design. However, due to the complex underlying laser dynamics, tuning such laser system is both a challenging and time-consuming task. Here, we experimentally demonstrate an OIL-based QKD transmitter that can be automatically tuned to its optimum operating state by employing a genetic algorithm. Starting with minimal knowledge of the laser operating parameters, the phase coherence and the quantum bit error rate of the system are optimized autonomously to a level matching the state of the art.
△ Less
Submitted 15 October, 2022;
originally announced October 2022.
-
The JCMT BISTRO Survey: A Spiral Magnetic Field in a Hub-filament Structure, Monoceros R2
Authors:
Jihye Hwang,
Jongsoo Kim,
Kate Pattle,
Chang Won Lee,
Patrick M. Koch,
Doug Johnstone,
Kohji Tomisaka,
Anthony Whitworth,
Ray S. Furuya,
Ji-hyun Kang,
A-Ran Lyo,
Eun Jung Chung,
Doris Arzoumanian,
Geumsook Park,
Woojin Kwon,
Shinyoung Kim,
Motohide Tamura,
Jungmi Kwon,
Archana Soam,
Ilseung Han,
Thiem Hoang,
Kyoung Hee Kim,
Takashi Onaka,
Eswaraiah Chakali,
Derek Ward-Thompson
, et al. (135 additional authors not shown)
Abstract:
We present and analyze observations of polarized dust emission at 850 $μ$m towards the central 1 pc $\times$ 1 pc hub-filament structure of Monoceros R2 (Mon R2). The data are obtained with SCUBA-2/POL-2 on the James Clerk Maxwell Telescope (JCMT) as part of the BISTRO (B-fields in Star-forming Region Observations) survey. The orientations of the magnetic field follow the spiral structure of Mon R…
▽ More
We present and analyze observations of polarized dust emission at 850 $μ$m towards the central 1 pc $\times$ 1 pc hub-filament structure of Monoceros R2 (Mon R2). The data are obtained with SCUBA-2/POL-2 on the James Clerk Maxwell Telescope (JCMT) as part of the BISTRO (B-fields in Star-forming Region Observations) survey. The orientations of the magnetic field follow the spiral structure of Mon R2, which are well-described by an axisymmetric magnetic field model. We estimate the turbulent component of the magnetic field using the angle difference between our observations and the best-fit model of the underlying large-scale mean magnetic field. This estimate is used to calculate the magnetic field strength using the Davis-Chandrasekhar-Fermi method, for which we also obtain the distribution of volume density and velocity dispersion using a column density map derived from $Herschel$ data and the C$^{18}$O ($J$ = 3-2) data taken with HARP on the JCMT, respectively. We make maps of magnetic field strengths and mass-to-flux ratios, finding that magnetic field strengths vary from 0.02 to 3.64 mG with a mean value of 1.0 $\pm$ 0.06 mG, and the mean critical mass-to-flux ratio is 0.47 $\pm$ 0.02. Additionally, the mean Alfvén Mach number is 0.35 $\pm$ 0.01. This suggests that in Mon R2, magnetic fields provide resistance against large-scale gravitational collapse, and magnetic pressure exceeds turbulent pressure. We also investigate the properties of each filament in Mon R2. Most of the filaments are aligned along the magnetic field direction and are magnetically sub-critical.
△ Less
Submitted 13 December, 2022; v1 submitted 12 October, 2022;
originally announced October 2022.
-
Counting cycles in planar triangulations
Authors:
On-Hei Solomon Lo,
Carol T. Zamfirescu
Abstract:
We investigate the minimum number of cycles of specified lengths in planar $n$-vertex triangulations $G$. It is proven that this number is $Ω(n)$ for any cycle length at most $3 + \max \{ {\rm rad}(G^*), \lceil (\frac{n-3}{2})^{\log_32} \rceil \}$, where ${\rm rad}(G^*)$ denotes the radius of the triangulation's dual, which is at least logarithmic but can be linear in the order of the triangulatio…
▽ More
We investigate the minimum number of cycles of specified lengths in planar $n$-vertex triangulations $G$. It is proven that this number is $Ω(n)$ for any cycle length at most $3 + \max \{ {\rm rad}(G^*), \lceil (\frac{n-3}{2})^{\log_32} \rceil \}$, where ${\rm rad}(G^*)$ denotes the radius of the triangulation's dual, which is at least logarithmic but can be linear in the order of the triangulation. We also show that there exist planar hamiltonian $n$-vertex triangulations containing $O(n)$ many $k$-cycles for any $k \in \{ \lceil n - \sqrt[5]{n} \rceil, \ldots, n \}$. Furthermore, we prove that planar 4-connected $n$-vertex triangulations contain $Ω(n)$ many $k$-cycles for every $k \in \{ 3, \ldots, n \}$, and that, under certain additional conditions, they contain $Ω(n^2)$ $k$-cycles for many values of $k$, including $n$.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
Applying of the Extreme Value Theory for determining extreme claims in the automobile insurance sector: Case of a China car insurance
Authors:
Daouda Diawara,
Ladji Kane,
Soumaila Dembele,
Gane Samb Lo
Abstract:
According to the Chinese Health Statistics Yearbook, in 2005, the number of traffic accidents was 187781 with total direct property losses of 103691.7 (10000 Yuan). This research aims to fill the gap in the literature by investigating the extreme claim sizes not only for the entire portfolio. This empirical study investigates the behavior of the upper tail of the claim size by class of policyholde…
▽ More
According to the Chinese Health Statistics Yearbook, in 2005, the number of traffic accidents was 187781 with total direct property losses of 103691.7 (10000 Yuan). This research aims to fill the gap in the literature by investigating the extreme claim sizes not only for the entire portfolio. This empirical study investigates the behavior of the upper tail of the claim size by class of policyholders.
△ Less
Submitted 25 September, 2022; v1 submitted 21 September, 2022;
originally announced September 2022.
-
The exact probability law for the approximated similarity from the Minhashing method
Authors:
Soumaila Dembele,
Gane Samb Lo
Abstract:
We propose a probabilistic setting in which we study the probability law of the Rajaraman and Ullman \textit{RU} algorithm and a modified version of it denoted by \textit{RUM}. These algorithms aim at estimating the similarity index between huge texts in the context of the web. We give a foundation of this method by showing, in the ideal case of carefully chosen probability laws, the exact similar…
▽ More
We propose a probabilistic setting in which we study the probability law of the Rajaraman and Ullman \textit{RU} algorithm and a modified version of it denoted by \textit{RUM}. These algorithms aim at estimating the similarity index between huge texts in the context of the web. We give a foundation of this method by showing, in the ideal case of carefully chosen probability laws, the exact similarity is the mathematical expectation of the random similarity provided by the algorithm. Some extensions are given.
\noindent \textbf{Résumé.} Nous proposons un cadre probabilistique dans lequel nous étudions la loi de probabilité de l'algorithme de Rajaraman et Ullman \textit{RU} ainsi qu'une version modifiée de cet algorithme notée \textit{RUM}. Ces alogrithmes visent à estimer l'indice de la similarité entre des textes de grandes tailles dans le contexte du Web. Nous donnons une base de validité de cette méthode en montrant que pour des lois de probabilités minutieusement choisies, la similarité exacte est l'espérance mathématique de la similarité aléatoire donnée par l'algorithme \textit{RUM}. Des généralisations sont abordées.
△ Less
Submitted 25 September, 2022; v1 submitted 20 September, 2022;
originally announced September 2022.
-
Learning Feature Decomposition for Domain Adaptive Monocular Depth Estimation
Authors:
Shao-Yuan Lo,
Wei Wang,
Jim Thomas,
Jingjing Zheng,
Vishal M. Patel,
Cheng-Hao Kuo
Abstract:
Monocular depth estimation (MDE) has attracted intense study due to its low cost and critical functions for robotic tasks such as localization, mapping and obstacle detection. Supervised approaches have led to great success with the advance of deep learning, but they rely on large quantities of ground-truth depth annotations that are expensive to acquire. Unsupervised domain adaptation (UDA) trans…
▽ More
Monocular depth estimation (MDE) has attracted intense study due to its low cost and critical functions for robotic tasks such as localization, mapping and obstacle detection. Supervised approaches have led to great success with the advance of deep learning, but they rely on large quantities of ground-truth depth annotations that are expensive to acquire. Unsupervised domain adaptation (UDA) transfers knowledge from labeled source data to unlabeled target data, so as to relax the constraint of supervised learning. However, existing UDA approaches may not completely align the domain gap across different datasets because of the domain shift problem. We believe better domain alignment can be achieved via well-designed feature decomposition. In this paper, we propose a novel UDA method for MDE, referred to as Learning Feature Decomposition for Adaptation (LFDA), which learns to decompose the feature space into content and style components. LFDA only attempts to align the content component since it has a smaller domain gap. Meanwhile, it excludes the style component which is specific to the source domain from training the primary task. Furthermore, LFDA uses separate feature distribution estimations to further bridge the domain gap. Extensive experiments on three domain adaptative MDE scenarios show that the proposed method achieves superior accuracy and lower computational cost compared to the state-of-the-art approaches.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
Towards Personalized Healthcare in Cardiac Population: The Development of a Wearable ECG Monitoring System, an ECG Lossy Compression Schema, and a ResNet-Based AF Detector
Authors:
Wei-Ying Yi,
Peng-Fei Liu,
Sheung-Lai Lo,
Ya-Fen Chan,
Yu Zhou,
Yee Leung,
Kam-Sang Woo,
Alex Pui-Wai Lee,
Jia-Min Chen,
Kwong-Sak Leung
Abstract:
Cardiovascular diseases (CVDs) are the number one cause of death worldwide. While there is growing evidence that the atrial fibrillation (AF) has strong associations with various CVDs, this heart arrhythmia is usually diagnosed using electrocardiography (ECG) which is a risk-free, non-intrusive, and cost-efficient tool. Continuously and remotely monitoring the subjects' ECG information unlocks the…
▽ More
Cardiovascular diseases (CVDs) are the number one cause of death worldwide. While there is growing evidence that the atrial fibrillation (AF) has strong associations with various CVDs, this heart arrhythmia is usually diagnosed using electrocardiography (ECG) which is a risk-free, non-intrusive, and cost-efficient tool. Continuously and remotely monitoring the subjects' ECG information unlocks the potentials of prompt pre-diagnosis and timely pre-treatment of AF before the development of any life-threatening conditions/diseases. Ultimately, the CVDs associated mortality could be reduced. In this manuscript, the design and implementation of a personalized healthcare system embodying a wearable ECG device, a mobile application, and a back-end server are presented. This system continuously monitors the users' ECG information to provide personalized health warnings/feedbacks. The users are able to communicate with their paired health advisors through this system for remote diagnoses, interventions, etc. The implemented wearable ECG devices have been evaluated and showed excellent intra-consistency (CVRMS=5.5%), acceptable inter-consistency (CVRMS=12.1%), and negligible RR-interval errors (ARE<1.4%). To boost the battery life of the wearable devices, a lossy compression schema utilizing the quasi-periodic feature of ECG signals to achieve compression was proposed. Compared to the recognized schemata, it outperformed the others in terms of compression efficiency and distortion, and achieved at least 2x of CR at a certain PRD or RMSE for ECG signals from the MIT-BIH database. To enable automated AF diagnosis/screening in the proposed system, a ResNet-based AF detector was developed. For the ECG records from the 2017 PhysioNet CinC challenge, this AF detector obtained an average testing F1=85.10% and a best testing F1=87.31%, outperforming the state-of-the-art.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models
Authors:
Aarohi Srivastava,
Abhinav Rastogi,
Abhishek Rao,
Abu Awal Md Shoeb,
Abubakar Abid,
Adam Fisch,
Adam R. Brown,
Adam Santoro,
Aditya Gupta,
Adrià Garriga-Alonso,
Agnieszka Kluska,
Aitor Lewkowycz,
Akshat Agarwal,
Alethea Power,
Alex Ray,
Alex Warstadt,
Alexander W. Kocurek,
Ali Safaya,
Ali Tazarv,
Alice Xiang,
Alicia Parrish,
Allen Nie,
Aman Hussain,
Amanda Askell,
Amanda Dsouza
, et al. (426 additional authors not shown)
Abstract:
Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur…
▽ More
Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-future capabilities and limitations of language models. To address this challenge, we introduce the Beyond the Imitation Game benchmark (BIG-bench). BIG-bench currently consists of 204 tasks, contributed by 450 authors across 132 institutions. Task topics are diverse, drawing problems from linguistics, childhood development, math, common-sense reasoning, biology, physics, social bias, software development, and beyond. BIG-bench focuses on tasks that are believed to be beyond the capabilities of current language models. We evaluate the behavior of OpenAI's GPT models, Google-internal dense transformer architectures, and Switch-style sparse transformers on BIG-bench, across model sizes spanning millions to hundreds of billions of parameters. In addition, a team of human expert raters performed all tasks in order to provide a strong baseline. Findings include: model performance and calibration both improve with scale, but are poor in absolute terms (and when compared with rater performance); performance is remarkably similar across model classes, though with benefits from sparsity; tasks that improve gradually and predictably commonly involve a large knowledge or memorization component, whereas tasks that exhibit "breakthrough" behavior at a critical scale often involve multiple steps or components, or brittle metrics; social bias typically increases with scale in settings with ambiguous context, but this can be improved with prompting.
△ Less
Submitted 12 June, 2023; v1 submitted 9 June, 2022;
originally announced June 2022.
-
$\mathbf{G}$-Central limit theorems and $\mathbf{G}$-invariance principles for associated random variables
Authors:
Aladji Babacar Niang,
Akym Adekpedjou,
Harouna Sangaré,
Gane Samb Lo
Abstract:
The investigation asymptotic limits on associated data mainly focused on limit theorems of summands of associated data and on the related invariance principles. In a series of papers, we are going to set the general frame of the theory by considering an arbitrary infinitely decomposable (divisible) limit law for summands and study the associated functional laws converging to Lévy processes. The as…
▽ More
The investigation asymptotic limits on associated data mainly focused on limit theorems of summands of associated data and on the related invariance principles. In a series of papers, we are going to set the general frame of the theory by considering an arbitrary infinitely decomposable (divisible) limit law for summands and study the associated functional laws converging to Lévy processes. The asymptotic frame of Newman (1980) is still used as a main tool. Detailed results are given when $G$ is a Gaussian law (as confirmation of known results) and when $G$ is a Poisson law. In the later case, classical results for independent and identically distributed data are extended to stationary and non-stationary associated data.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
$\ell^{\infty}$ Poisson invariance principles from two classical Poisson limit theorems and extension to non-stationary independent sequences
Authors:
Aladji Babacar Niang,
Gane Samb Lo,
Chérif Mamadou Moctar Traoré,
Amadou Ball
Abstract:
The simple Lévy Poisson process and scaled forms are explicitly constructed from partial sums of independent and identically distributed random variables and from sums of non-stationary independent random variables. For the latter, the weak limits are scaled Poisson processes. The method proposed here prepares generalizations to dependent data, to associated data in the first place.
The simple Lévy Poisson process and scaled forms are explicitly constructed from partial sums of independent and identically distributed random variables and from sums of non-stationary independent random variables. For the latter, the weak limits are scaled Poisson processes. The method proposed here prepares generalizations to dependent data, to associated data in the first place.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
A single risk approach to the semiparametric copula competing risks model
Authors:
Simon M. S. Lo,
Ralf A. Wilke
Abstract:
A typical situation in competing risks analysis is that the researcher is only interested in a subset of risks. This paper considers a depending competing risks model with the distribution of one risk being a parametric or semi-parametric model, while the model for the other risks being unknown. Identifiability is shown for popular classes of parametric models and the semiparametric proportional h…
▽ More
A typical situation in competing risks analysis is that the researcher is only interested in a subset of risks. This paper considers a depending competing risks model with the distribution of one risk being a parametric or semi-parametric model, while the model for the other risks being unknown. Identifiability is shown for popular classes of parametric models and the semiparametric proportional hazards model. The identifiability of the parametric models does not require a covariate, while the semiparametric model requires at least one. Estimation approaches are suggested which are shown to be $\sqrt{n}$-consistent. Applicability and attractive finite sample performance are demonstrated with the help of simulations and data examples.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Decision Models for Selecting Federated Learning Architecture Patterns
Authors:
Sin Kit Lo,
Qinghua Lu,
Hye-Young Paik,
Liming Zhu
Abstract:
Federated machine learning is growing fast in academia and industries as a solution to solve data hungriness and privacy issues in machine learning. Being a widely distributed system, federated machine learning requires various system design thinking. To better design a federated machine learning system, researchers have introduced multiple patterns and tactics that cover various system design asp…
▽ More
Federated machine learning is growing fast in academia and industries as a solution to solve data hungriness and privacy issues in machine learning. Being a widely distributed system, federated machine learning requires various system design thinking. To better design a federated machine learning system, researchers have introduced multiple patterns and tactics that cover various system design aspects. However, the multitude of patterns leaves the designers confused about when and which pattern to adopt. In this paper, we present a set of decision models for the selection of patterns for federated machine learning architecture design based on a systematic literature review on federated machine learning, to assist designers and architects who have limited knowledge of federated machine learning. Each decision model maps functional and non-functional requirements of federated machine learning systems to a set of patterns. We also clarify the drawbacks of the patterns. We evaluated the decision models by mapping the decision patterns to concrete federated machine learning architectures by big tech firms to assess the models' correctness and usefulness. The evaluation results indicate that the proposed decision models are able to bring structure to the federated machine learning architecture design process and help explicitly articulate the design rationale.
△ Less
Submitted 27 April, 2023; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Exploring dust growth in the episodic WCd system WR140
Authors:
J. W. Eatson,
J. M. Pittard,
S. Van Loo
Abstract:
The wind collision region (WCR) in a colliding wind binary (CWB) is a particularly violent place, as such, it is surprising that it is also a region where significant quantities of interstellar dust can form. In extreme cases, approximately 30% of the total mass loss rate of a system can be converted into dust. These regions are poorly understood, as observation and simulation of these systems are…
▽ More
The wind collision region (WCR) in a colliding wind binary (CWB) is a particularly violent place, as such, it is surprising that it is also a region where significant quantities of interstellar dust can form. In extreme cases, approximately 30% of the total mass loss rate of a system can be converted into dust. These regions are poorly understood, as observation and simulation of these systems are difficult. In our previous paper we simulated dust growth in CWB systems using an advected scalar model and found our model to be suitable for qualitative study. For this paper we simulated the periodic dust forming CWB (WCd) system WR140 with our dust model, to determine how dust growth changes over the systems periastron passage. We found that dust production increases significantly at periastron passage, which is consistent with IR emission of the surrounding dusty shell. We also find that the dust production rate of the system decreases rapidly as the stars recede from each other, though the rate of decrease is significantly lower than the rate of increase during periastron passage. This was found to be due to strong cooling and its associated thermal instabilities, resulting in cool, high-density pockets of gas in the WCR where dust forms. The WCR also shows a degree of hysteresis, resulting in a radiative post-shock flow even when the stars are separated enough for the region to behave adiabatically.
△ Less
Submitted 17 October, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
An exploration of dust grain growth within WCd systems using an advected scalar dust model
Authors:
J. W. Eatson,
J. M. Pittard,
S. Van Loo
Abstract:
Dust production is one of the more curious phenomena observed in massive binary systems with interacting winds. The high temperatures, UV photon flux and violent shocks should destroy any dust grains that condense. However, in some extreme cases dust production yields of approximately 30% of the total mass loss rate of the stellar winds have been observed. In order to better understand this phenom…
▽ More
Dust production is one of the more curious phenomena observed in massive binary systems with interacting winds. The high temperatures, UV photon flux and violent shocks should destroy any dust grains that condense. However, in some extreme cases dust production yields of approximately 30% of the total mass loss rate of the stellar winds have been observed. In order to better understand this phenomenon a parameter space exploration was performed using a series of numerical models of dust producing carbon phase Wolf-Rayet (WCd) systems. These models incorporated a passive scalar dust model simulating dust growth, destruction and radiative cooling. We find that reasonable dust yields were produced by these simulations. Significant changes in the dust yield were caused by changing the mass loss rates of the stars, with a greater mass loss rate contributing to increased dust yields. Similarly, a close orbit between the stars also resulted in higher dust yields. Finally, a high velocity wind shear, which induces Kelvin-Helmholtz (KH) instabilities and wind mixing, drastically increases the dust yields.
△ Less
Submitted 17 October, 2022; v1 submitted 15 April, 2022;
originally announced April 2022.
-
Extensions of two classical Poisson limit laws to non-stationary independent data
Authors:
Aladji Babacar Niang,
Harouna Sangaré,
Tchilabalo Abozou Kpanzou,
Gane Samb Lo,
Nafy Ngom
Abstract:
In earlier stages in the introduction to asymptotic methods in probability theory, the weak convergence of sequences $(X_n)_{n\geq 1}$ of Binomial of random variables (\textit{rv}'s) to a Poisson law is classical and easy-to prove. A version of such a result concerning sequences $(Y_n)_{n\geq 1}$ of negative binomial \textit{rv}'s also exists. In both cases, $X_n$ and $Y_n-n$ are by-row sums…
▽ More
In earlier stages in the introduction to asymptotic methods in probability theory, the weak convergence of sequences $(X_n)_{n\geq 1}$ of Binomial of random variables (\textit{rv}'s) to a Poisson law is classical and easy-to prove. A version of such a result concerning sequences $(Y_n)_{n\geq 1}$ of negative binomial \textit{rv}'s also exists. In both cases, $X_n$ and $Y_n-n$ are by-row sums $S_n[X]$ and $S_n[Y]$ of arrays of Bernoulli \textit{rv}'s and corrected geometric \textit{rv}'s respectively. When considered in the general frame of asymptotic theorems of by-row sums of \textit{rv}'s of arrays, these two simple results in the independent and identically distributed scheme can be generalized to non-stationary data and beyond to non-stationary and dependent data. Further generalizations give interesting results that would not be found by direct methods. In this paper, we focus on generalizations to the non-stationary independent data. Extensions to dependent data will addressed later.
△ Less
Submitted 20 February, 2022;
originally announced February 2022.
-
Exploring Adversarially Robust Training for Unsupervised Domain Adaptation
Authors:
Shao-Yuan Lo,
Vishal M. Patel
Abstract:
Unsupervised Domain Adaptation (UDA) methods aim to transfer knowledge from a labeled source domain to an unlabeled target domain. UDA has been extensively studied in the computer vision literature. Deep networks have been shown to be vulnerable to adversarial attacks. However, very little focus is devoted to improving the adversarial robustness of deep UDA models, causing serious concerns about m…
▽ More
Unsupervised Domain Adaptation (UDA) methods aim to transfer knowledge from a labeled source domain to an unlabeled target domain. UDA has been extensively studied in the computer vision literature. Deep networks have been shown to be vulnerable to adversarial attacks. However, very little focus is devoted to improving the adversarial robustness of deep UDA models, causing serious concerns about model reliability. Adversarial Training (AT) has been considered to be the most successful adversarial defense approach. Nevertheless, conventional AT requires ground-truth labels to generate adversarial examples and train models, which limits its effectiveness in the unlabeled target domain. In this paper, we aim to explore AT to robustify UDA models: How to enhance the unlabeled data robustness via AT while learning domain-invariant features for UDA? To answer this question, we provide a systematic study into multiple AT variants that can potentially be applied to UDA. Moreover, we propose a novel Adversarially Robust Training method for UDA accordingly, referred to as ARTUDA. Extensive experiments on multiple adversarial attacks and UDA benchmarks show that ARTUDA consistently improves the adversarial robustness of UDA models. Code is available at https://github.com/shaoyuanlo/ARTUDA
△ Less
Submitted 4 October, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.