-
Double Descent: Understanding Linear Model Estimation of Nonidentifiable Parameters and a Model for Overfitting
Authors:
Ronald Christensen
Abstract:
We consider ordinary least squares estimation and variations on least squares estimation such as penalized (regularized) least squares and spectral shrinkage estimates for problems with p > n and associated problems with prediction of new observations. After the introduction of Section 1, Section 2 examines a number of commonly used estimators for p > n. Section 3 introduces prediction with p > n.…
▽ More
We consider ordinary least squares estimation and variations on least squares estimation such as penalized (regularized) least squares and spectral shrinkage estimates for problems with p > n and associated problems with prediction of new observations. After the introduction of Section 1, Section 2 examines a number of commonly used estimators for p > n. Section 3 introduces prediction with p > n. Section 4 introduces notational changes to facilitate discussion of overfitting and Section 5 illustrates the phenomenon of double descent. We conclude with some final comments.
△ Less
Submitted 23 August, 2024;
originally announced August 2024.
-
Precise Coil Alignment for Dynamic Wireless Charging of Electric Vehicles with RFID Sensing
Authors:
Haijian Sun,
Xiang Ma,
Rose Qingyang Hu,
Randy Christensen
Abstract:
Electric vehicle (EV) has emerged as a transformative force for the sustainable and environmentally friendly future. To alleviate range anxiety caused by battery and charging facility, dynamic wireless power transfer (DWPT) is increasingly recognized as a key enabler for widespread EV adoption, yet it faces significant technical challenges, primarily in precise coil alignment. This article begins…
▽ More
Electric vehicle (EV) has emerged as a transformative force for the sustainable and environmentally friendly future. To alleviate range anxiety caused by battery and charging facility, dynamic wireless power transfer (DWPT) is increasingly recognized as a key enabler for widespread EV adoption, yet it faces significant technical challenges, primarily in precise coil alignment. This article begins by reviewing current alignment methodologies and evaluates their advantages and limitations. We observe that achieving the necessary alignment precision is challenging with these existing methods. To address this, we present an innovative RFID-based DWPT coil alignment system, utilizing coherent phase detection and a maximum likelihood estimation algorithm, capable of achieving sub-10 cm accuracy. This system's efficacy in providing both lateral and vertical misalignment estimates has been verified through laboratory and experimental tests. We also discuss potential challenges in broader system implementation and propose corresponding solutions. This research offers a viable and promising solution for enhancing DWPT efficiency.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Quantum Two-Way Communication Protocol Beyond Superdense Coding
Authors:
Lorenzo Valentini,
Kristian Skafte Jensen,
René Bødker Christensen,
Marco Chiani,
Petar Popovski
Abstract:
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol caters for provision of entangled pairs, which is assumed to be given in one-way superdense coding. The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol.…
▽ More
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol caters for provision of entangled pairs, which is assumed to be given in one-way superdense coding. The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol. Even when decoherence is taken into consideration, the quantum protocol performs better as long as the decoherence time is not extremely short.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Private Product Computation using Quantum Entanglement
Authors:
René Bødker Christensen,
Petar Popovski
Abstract:
In this work, we show that a pair of entangled qubits can be used to compute a product privately. More precisely, two participants with a private input from a finite field can perform local operations on a shared, Bell-like quantum state, and when these qubits are later sent to a third participant, the third participant can determine the product of the inputs, but without learning more about the i…
▽ More
In this work, we show that a pair of entangled qubits can be used to compute a product privately. More precisely, two participants with a private input from a finite field can perform local operations on a shared, Bell-like quantum state, and when these qubits are later sent to a third participant, the third participant can determine the product of the inputs, but without learning more about the individual inputs. We give a concrete way to realize this product computation for arbitrary finite fields of prime order.
△ Less
Submitted 27 October, 2023; v1 submitted 10 May, 2023;
originally announced May 2023.
-
Reliable Quantum Communications based on Asymmetry in Distillation and Coding
Authors:
Lorenzo Valentini,
René Bødker Christensen,
Petar Popovski,
Marco Chiani
Abstract:
The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint on the latency of the quantum protocol, which bring…
▽ More
The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint on the latency of the quantum protocol, which brings the problem of quantum protocol design into the context of latency-reliability constraints. We address the problem through hybrid schemes that combine: (1) indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC). The intuition is that, at present, the quantum hardware offers low fidelity, which demands distillation; on the other hand, low latency can be obtained by QEC techniques. It is shown that, in the proposed framework, the distillation protocol gives rise to asymmetries that can be exploited by asymmetric quantum error correcting code (QECC), which sets the basis for unique hybrid distillation and coding design. Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
△ Less
Submitted 3 June, 2024; v1 submitted 1 May, 2023;
originally announced May 2023.
-
Multilevel Skeletonization Using Local Separators
Authors:
J. Andreas Bærentzen,
Rasmus Emil Christensen,
Emil Toftegaard Gæde,
Eva Rotenberg
Abstract:
In this paper we give a new, efficient algorithm for computing curve skeletons, based on local separators. Our efficiency stems from a multilevel approach, where we solve small problems across levels of detail and combine these in order to quickly obtain a skeleton. We do this in a highly modular fashion, ensuring complete flexibility in adapting the algorithm for specific types of input or for ot…
▽ More
In this paper we give a new, efficient algorithm for computing curve skeletons, based on local separators. Our efficiency stems from a multilevel approach, where we solve small problems across levels of detail and combine these in order to quickly obtain a skeleton. We do this in a highly modular fashion, ensuring complete flexibility in adapting the algorithm for specific types of input or for otherwise targeting specific applications.
Separator based skeletonization was first proposed by Bærentzen and Rotenberg in [ACM Tran. Graphics'21], showing high quality output at the cost of running times which become prohibitive for large inputs. Our new approach retains the high quality output, and applicability to any spatially embedded graph, while being orders of magnitude faster for all practical purposes.
We test our skeletonization algorithm for efficiency and quality in practice, comparing it to local separator skeletonization on the University of Groningen Skeletonization Benchmark [Telea'16].
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
Fillet-based RRT*: A Rapid Convergence Implementation of RRT* for Curvature Constrained Vehicles
Authors:
James Swedeen,
Greg Droge,
Randall Christensen
Abstract:
Rapidly exploring random trees (RRTs) have proven effective in quickly finding feasible solutions to complex motion planning problems. RRT* is an extension of the RRT algorithm that provides probabilistic asymptotic optimality guarantees when using straight-line motion primitives. This work provides extensions to RRT and RRT* that employ fillets as motion primitives, allowing path curvature constr…
▽ More
Rapidly exploring random trees (RRTs) have proven effective in quickly finding feasible solutions to complex motion planning problems. RRT* is an extension of the RRT algorithm that provides probabilistic asymptotic optimality guarantees when using straight-line motion primitives. This work provides extensions to RRT and RRT* that employ fillets as motion primitives, allowing path curvature constraints to be considered when planning. Two fillets are developed, an arc-based fillet that uses circular arcs to generate paths that respect maximum curvature constraints and a spline-based fillet that uses Bezier curves to additionally respect curvature continuity requirements. Planning with these fillets is shown to far exceed the performance of RRT* using Dubin's path motion primitives, approaching the performance of planning with straight-line path primitives. Path sampling heuristics are also introduced to accelerate convergence for nonholonomic motion planning. Comparisons to established RRT* approaches are made using the Open Motion Planning Library (OMPL).
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Private Randomness Agreement and its Application in Quantum Key Distribution Networks
Authors:
René Bødker Christensen,
Petar Popovski
Abstract:
We define a variation on the well-known problem of private message transmission. This new problem called private randomness agreement (PRA) gives two participants access to a public, authenticated channel alongside the main channels, and the 'message' is not fixed a priori.
Instead, the participants aim to agree on a random string completely unknown to a computationally unbounded adversary.
We…
▽ More
We define a variation on the well-known problem of private message transmission. This new problem called private randomness agreement (PRA) gives two participants access to a public, authenticated channel alongside the main channels, and the 'message' is not fixed a priori.
Instead, the participants aim to agree on a random string completely unknown to a computationally unbounded adversary.
We define privacy and reliability, and show that PRA cannot be solved in a single round. We then show that it can be solved in three rounds, albeit with exponential cost, and give an efficient four-round protocol based on polynomial evaluation.
△ Less
Submitted 14 February, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Smartwatch-based ecological momentary assessments for occupant wellness and privacy in buildings
Authors:
Clayton Miller,
Renee Christensen,
Jin Kai Leong,
Mahmoud Abdelrahman,
Federico Tartarini,
Matias Quintana,
Andre Matthias Müller,
Mario Frei
Abstract:
This paper describes the adaptation of an open-source ecological momentary assessment smart-watch platform with three sets of micro-survey wellness-related questions focused on i) infectious disease (COVID-19) risk perception, ii) privacy and distraction in an office context, and iii) triggers of various movement-related behaviors in buildings. This platform was previously used to collect data for…
▽ More
This paper describes the adaptation of an open-source ecological momentary assessment smart-watch platform with three sets of micro-survey wellness-related questions focused on i) infectious disease (COVID-19) risk perception, ii) privacy and distraction in an office context, and iii) triggers of various movement-related behaviors in buildings. This platform was previously used to collect data for thermal comfort, and this work extends its use to other domains. Several research participants took part in a proof-of-concept experiment by wearing a smartwatch to collect their micro-survey question preferences and perception responses for two of the question sets. Participants were also asked to install an indoor localization app on their phone to detect where precisely in the building they completed the survey. The experiment identified occupant information such as the tendencies for the research participants to prefer privacy in certain spaces and the difference between infectious disease risk perception in naturally versus mechanically ventilated spaces.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
A Semi-automatic Cell Tracking Process Towards Completing the 4D Atlas of C. elegans Development
Authors:
Andrew Lauziere,
Ryan Christensen,
Hari Shroff
Abstract:
The nematode Caenorhabditis elegans (C. elegans) is used as a model organism to better understand developmental biology and neurobiology. C. elegans features an invariant cell lineage, which has been catalogued and observed using fluorescence microscopy images. However, established methods to track cells in late-stage development fail to generalize once sporadic muscular twitching has begun. We bu…
▽ More
The nematode Caenorhabditis elegans (C. elegans) is used as a model organism to better understand developmental biology and neurobiology. C. elegans features an invariant cell lineage, which has been catalogued and observed using fluorescence microscopy images. However, established methods to track cells in late-stage development fail to generalize once sporadic muscular twitching has begun. We build upon methodology which uses skin cells as fiducial markers to carry out cell tracking despite random twitching. In particular, we present a cell nucleus segmentation and tracking procedure which was integrated into a 3D rendering GUI to improve efficiency in tracking cells across late-stage development. Results on images depicting aforementioned muscle cell nuclei across three test embryos suggest the fiducial markers in conjunction with a classic tracking paradigm overcome sporadic twitching.
△ Less
Submitted 2 August, 2022; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Semi-Private Computation of Data Similarity with Applications to Data Valuation and Pricing
Authors:
René Bødker Christensen,
Shashi Raj Pandey,
Petar Popovski
Abstract:
Consider two data providers that want to contribute data to a certain learning model. Recent works have shown that the value of the data of one of the providers is dependent on the similarity with the data owned by the other provider. It would thus be beneficial if the two providers can calculate the similarity of their data, while keeping the actual data private. In this work, we devise multipart…
▽ More
Consider two data providers that want to contribute data to a certain learning model. Recent works have shown that the value of the data of one of the providers is dependent on the similarity with the data owned by the other provider. It would thus be beneficial if the two providers can calculate the similarity of their data, while keeping the actual data private. In this work, we devise multiparty computation-protocols to compute similarity of two data sets based on correlation, while offering controllable privacy guarantees. We consider a simple model with two participating providers and develop methods to compute exact and approximate correlation, respectively, with controlled information leakage. Both protocols have computational and communication complexities that are linear in the number of data samples. We also provide general bounds on the maximal error in the approximation case, and analyse the resulting errors for practical parameter choices.
△ Less
Submitted 11 April, 2023; v1 submitted 14 June, 2022;
originally announced June 2022.
-
Sensitivity Study of Fiducial-Aided Navigation of Unmanned Aerial Vehicles
Authors:
Amanda J. Strate,
Randall Christensen
Abstract:
The possible applications and benefits of autonomous Unmanned Aerial Vehicle (UAV) use in urban areas are gaining considerable attention. Before these possibilities can be realized, it is essential that UAVs be able to navigate reliably and precisely in urban environments. The most common means of determining the location of a UAV is to utilize position measurements from Global Navigation Satellit…
▽ More
The possible applications and benefits of autonomous Unmanned Aerial Vehicle (UAV) use in urban areas are gaining considerable attention. Before these possibilities can be realized, it is essential that UAVs be able to navigate reliably and precisely in urban environments. The most common means of determining the location of a UAV is to utilize position measurements from Global Navigation Satellite Systems (GNSS). In urban environments, however, GNSS measurements are significantly degraded due to occlusions and multipath. This research analyzes the use of camera Line-of-Sight (LOS) measurements to self-describing fiducials as a replacement for conventional GNSS measurements. An extended Kalman filter (EKF) is developed and validated for the purpose of combining continuous measurements from an Inertial Measurement Unit (IMU) with the discrete LOS measurements to accurately estimate the states of a UAV. The sensitivity of the estimation error covariance to various system parameters is assessed, including IMU grade, fiducial placement, vehicle altitude, and image processing frequency.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
A Closed-Loop Linear Covariance Framework for Vehicle Path Planning in a Static Uncertain Obstacle Fiel
Authors:
Randall Christensen,
Greg Droge,
Robert Leishman
Abstract:
Path planning in an uncertain environment is a key enabler of true vehicle autonomy. Over the past two decades, numerous approaches have been developed to account for errors in the vehicle path while navigating complex and often uncertain environments. An important capability of such planning is the prediction of vehicle dispersion covariances about a candidate path. This work develops a new close…
▽ More
Path planning in an uncertain environment is a key enabler of true vehicle autonomy. Over the past two decades, numerous approaches have been developed to account for errors in the vehicle path while navigating complex and often uncertain environments. An important capability of such planning is the prediction of vehicle dispersion covariances about a candidate path. This work develops a new closed-loop linear covariance (CL-LinCov) framework applicable to a wide range of autonomous system architectures. Important features of the developed framework include the (1) separation of high-level guidance from low-level control, (2) support for output-feedback controllers with internal states, dynamics, and output, and (3) multi-use continuous sensors for navigation state propagation, guidance, and feedback control. The closed-loop nature of the framework preserves the important coupling between the system dynamics, exogenous disturbances, and the guidance, navigation, and control algorithms. The developed framework is applied to a simplified model of an unmanned aerial vehicle and validated by comparison via Monte Carlo analysis. The utility of the CL-LinCov information is illustrated by its application to path planning in a static, uncertain obstacle field via a modified version of the Rapidly Exploring Random Tree algorithm.
△ Less
Submitted 5 October, 2021; v1 submitted 25 May, 2021;
originally announced May 2021.
-
An Algorithmic Approach to Entanglement-Assisted Quantum Error-Correcting Codes from the Hermitian Curve
Authors:
René Bødker Christensen,
Carlos Munuera,
Francisco Revson F. Pereira,
Diego Ruano
Abstract:
We study entanglement-assisted quantum error-correcting codes (EAQECCs) arising from classical one-point algebraic geometry codes from the Hermitian curve with respect to the Hermitian inner product. Their only unknown parameter is $c$, the number of required maximally entangled quantum states since the Hermitian dual of an AG code is unknown. In this article, we present an efficient algorithmic a…
▽ More
We study entanglement-assisted quantum error-correcting codes (EAQECCs) arising from classical one-point algebraic geometry codes from the Hermitian curve with respect to the Hermitian inner product. Their only unknown parameter is $c$, the number of required maximally entangled quantum states since the Hermitian dual of an AG code is unknown. In this article, we present an efficient algorithmic approach for computing $c$ for this family of EAQECCs. As a result, this algorithm allows us to provide EAQECCs with excellent parameters over any field size.
△ Less
Submitted 11 January, 2022; v1 submitted 5 May, 2021;
originally announced May 2021.
-
An Exact Hypergraph Matching Algorithm for Nuclear Identification in Embryonic Caenorhabditis elegans
Authors:
Andrew Lauziere,
Ryan Christensen,
Hari Shroff,
Radu Balan
Abstract:
Finding an optimal correspondence between point sets is a common task in computer vision. Existing techniques assume relatively simple relationships among points and do not guarantee an optimal match. We introduce an algorithm capable of exactly solving point set matching by modeling the task as hypergraph matching. The algorithm extends the classical branch and bound paradigm to select and aggreg…
▽ More
Finding an optimal correspondence between point sets is a common task in computer vision. Existing techniques assume relatively simple relationships among points and do not guarantee an optimal match. We introduce an algorithm capable of exactly solving point set matching by modeling the task as hypergraph matching. The algorithm extends the classical branch and bound paradigm to select and aggregate vertices under a proposed decomposition of the multilinear objective function. The methodology is motivated by Caenorhabditis elegans, a model organism used frequently in developmental biology and neurobiology. The embryonic C. elegans contains seam cells that can act as fiducial markers allowing the identification of other nuclei during embryo development. The proposed algorithm identifies seam cells more accurately than established point-set matching methods, while providing a framework to approach other similarly complex point set matching tasks.
△ Less
Submitted 9 July, 2022; v1 submitted 20 April, 2021;
originally announced April 2021.
-
GPS-Denied Navigation Using SAR Images and Neural Networks
Authors:
Teresa White,
Jesse Wheeler,
Colton Lindstrom,
Randall Christensen,
Kevin R. Moon
Abstract:
Unmanned aerial vehicles (UAV) often rely on GPS for navigation. GPS signals, however, are very low in power and easily jammed or otherwise disrupted. This paper presents a method for determining the navigation errors present at the beginning of a GPS-denied period utilizing data from a synthetic aperture radar (SAR) system. This is accomplished by comparing an online-generated SAR image with a re…
▽ More
Unmanned aerial vehicles (UAV) often rely on GPS for navigation. GPS signals, however, are very low in power and easily jammed or otherwise disrupted. This paper presents a method for determining the navigation errors present at the beginning of a GPS-denied period utilizing data from a synthetic aperture radar (SAR) system. This is accomplished by comparing an online-generated SAR image with a reference image obtained a priori. The distortions relative to the reference image are learned and exploited with a convolutional neural network to recover the initial navigational errors, which can be used to recover the true flight trajectory throughout the synthetic aperture. The proposed neural network approach is able to learn to predict the initial errors on both simulated and real SAR image data.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Zero-Error Tracking for Autonomous Vehicles through Epsilon-Trajectory Generation
Authors:
Clint Ferrin,
Greg Droge,
Randall Christensen
Abstract:
This paper presents a control method and trajectory planner for vehicles with first-order nonholonomic constraints that guarantee asymptotic convergence to a time-indexed trajectory. To overcome the nonholonomic constraint, a fixed point in front of the vehicle can be controlled to track a desired trajectory, albeit with a steady-state error. To eliminate steady state error, a sufficiently smooth…
▽ More
This paper presents a control method and trajectory planner for vehicles with first-order nonholonomic constraints that guarantee asymptotic convergence to a time-indexed trajectory. To overcome the nonholonomic constraint, a fixed point in front of the vehicle can be controlled to track a desired trajectory, albeit with a steady-state error. To eliminate steady state error, a sufficiently smooth trajectory is reformulated for the new reference point such that, when tracking the new trajectory, the vehicle asymptotically converges to the original trajectory. The resulting zero-error tracking law is demonstrated through a novel framework for creating time-indexed Clothoids. The Clothoids can be planned to pass through arbitrary waypoints using traditional methods yet result in trajectories that can be followed with zero steady-state error. The results of the control method and planner are illustrated in simulation wherein zero-error tracking is demonstrated.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
On Steane-Enlargement of Quantum Codes from Cartesian Product Point Sets
Authors:
René Bødker Christensen,
Olav Geil
Abstract:
In this work, we study quantum error-correcting codes obtained by using Steane-enlargement. We apply this technique to certain codes defined from Cartesian products previously considered by Galindo et al. in [4]. We give bounds on the dimension increase obtained via enlargement, and additionally give an algorithm to compute the true increase. A number of examples of codes are provided, and their p…
▽ More
In this work, we study quantum error-correcting codes obtained by using Steane-enlargement. We apply this technique to certain codes defined from Cartesian products previously considered by Galindo et al. in [4]. We give bounds on the dimension increase obtained via enlargement, and additionally give an algorithm to compute the true increase. A number of examples of codes are provided, and their parameters are compared to relevant codes in the literature, which shows that the parameters of the enlarged codes are advantageous. Furthermore, comparison with the Gilbert-Varshamov bound for stabilizer quantum codes shows that several of the enlarged codes match or exceed the parameters promised by the bound.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Steane-Enlargement of Quantum Codes from the Hermitian Curve
Authors:
René Bødker Christensen,
Olav Geil
Abstract:
In this paper, we study the construction of quantum codes by applying Steane-enlargement to codes from the Hermitian curve. We cover Steane-enlargement of both usual one-point Hermitian codes and of order bound improved Hermitian codes. In particular, the paper contains two constructions of quantum codes whose parameters are described by explicit formulae, and we show that these codes compare favo…
▽ More
In this paper, we study the construction of quantum codes by applying Steane-enlargement to codes from the Hermitian curve. We cover Steane-enlargement of both usual one-point Hermitian codes and of order bound improved Hermitian codes. In particular, the paper contains two constructions of quantum codes whose parameters are described by explicit formulae, and we show that these codes compare favourably to existing, comparable constructions in the literature.
△ Less
Submitted 22 April, 2019;
originally announced April 2019.
-
On nested code pairs from the Hermitian curve
Authors:
René Bødker Christensen,
Olav Geil
Abstract:
Nested code pairs play a crucial role in the construction of ramp secret sharing schemes [Kurihara et al. 2012] and in the CSS construction of quantum codes [Ketkar et al. 2006]. The important parameters are (1) the codimension, (2) the relative minimum distance of the codes, and (3) the relative minimum distance of the dual set of codes. Given values for two of them, one aims at finding a set of…
▽ More
Nested code pairs play a crucial role in the construction of ramp secret sharing schemes [Kurihara et al. 2012] and in the CSS construction of quantum codes [Ketkar et al. 2006]. The important parameters are (1) the codimension, (2) the relative minimum distance of the codes, and (3) the relative minimum distance of the dual set of codes. Given values for two of them, one aims at finding a set of nested codes having parameters with these values and with the remaining parameter being as large as possible. In this work we study nested codes from the Hermitian curve. For not too small codimension, we present improved constructions and provide closed formula estimates on their performance. For small codimension we show how to choose pairs of one-point algebraic geometric codes in such a way that one of the relative minimum distances is larger than the corresponding non-relative minimum distance.
△ Less
Submitted 2 September, 2020; v1 submitted 11 July, 2018;
originally announced July 2018.