-
Testing a non-local 1-equation turbulent convection model: A solar model
Authors:
T. A. M. Braun,
F. Ahlborn,
A. Weiss
Abstract:
Turbulent convection models treat stellar convection more physically than standard mixing-length theory by including non-local effects. We recently successfully applied the Kuhfuss version to convective cores in main sequence stars. Its usefulness for convective envelopes remains to be tested. The solar convective envelope constitutes a viable test bed for investigating the usefulness of the 1-equ…
▽ More
Turbulent convection models treat stellar convection more physically than standard mixing-length theory by including non-local effects. We recently successfully applied the Kuhfuss version to convective cores in main sequence stars. Its usefulness for convective envelopes remains to be tested. The solar convective envelope constitutes a viable test bed for investigating the usefulness of the 1-equation Kuhfuss turbulent convection model. We used the one-dimensional stellar evolution code GARSTEC to calculate a standard solar model with the 1-equation Kuhfuss turbulent convection model, and compared it to helioseismic measurements and a solar model using standard mixing-length theory. Additionally, we investigated the influence of the additional free parameters of the convection model on the solar structure. The 1-equation Kuhfuss model reproduces the sound-speed profile and the lower boundary of the convective region less well than the mixing-length model, because the inherent non-local effects overestimate the amount of convective penetration below the Schwarzschild boundary. We trace this back to the coupling of the temperature gradient to the convective flux in the 1-equation version of the Kuhfuss theory. The temperature stratification of the solar convective envelope is not well modelled by the 1-equation Kuhfuss turbulent convection model, and the more complex 3-equation version is needed to improve the modelling of convection in the envelopes of 1D stellar evolution models.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Enhancement of Subjective Content Descriptions by using Human Feedback
Authors:
Magnus Bender,
Tanya Braun,
Ralf Möller,
Marcel Gehrke
Abstract:
An agent providing an information retrieval service may work with a corpus of text documents. The documents in the corpus may contain annotations such as Subjective Content Descriptions (SCD) -- additional data associated with different sentences of the documents. Each SCD is associated with multiple sentences of the corpus and has relations among each other. The agent uses the SCDs to create its…
▽ More
An agent providing an information retrieval service may work with a corpus of text documents. The documents in the corpus may contain annotations such as Subjective Content Descriptions (SCD) -- additional data associated with different sentences of the documents. Each SCD is associated with multiple sentences of the corpus and has relations among each other. The agent uses the SCDs to create its answers in response to queries supplied by users. However, the SCD the agent uses might reflect the subjective perspective of another user. Hence, answers may be considered faulty by an agent's user, because the SCDs may not exactly match the perceptions of an agent's user. A naive and very costly approach would be to ask each user to completely create all the SCD themselves. To use existing knowledge, this paper presents ReFrESH, an approach for Relation-preserving Feedback-reliant Enhancement of SCDs by Humans. An agent's user can give feedback about faulty answers to the agent. This feedback is then used by ReFrESH to update the SCDs incrementally. However, human feedback is not always unambiguous. Therefore, this paper additionally presents an approach to decide how to incorporate the feedback and when to update the SCDs. Altogether, SCDs can be updated with human feedback, allowing users to create even more specific SCDs for their needs.
△ Less
Submitted 30 April, 2024;
originally announced May 2024.
-
Lifted Causal Inference in Relational Domains
Authors:
Malte Luttermann,
Mattis Hartwig,
Tanya Braun,
Ralf Möller,
Marcel Gehrke
Abstract:
Lifted inference exploits symmetries in probabilistic graphical models by using a representative for indistinguishable objects, thereby speeding up query answering while maintaining exact answers. Even though lifting is a well-established technique for the task of probabilistic inference in relational domains, it has not yet been applied to the task of causal inference. In this paper, we show how…
▽ More
Lifted inference exploits symmetries in probabilistic graphical models by using a representative for indistinguishable objects, thereby speeding up query answering while maintaining exact answers. Even though lifting is a well-established technique for the task of probabilistic inference in relational domains, it has not yet been applied to the task of causal inference. In this paper, we show how lifting can be applied to efficiently compute causal effects in relational domains. More specifically, we introduce parametric causal factor graphs as an extension of parametric factor graphs incorporating causal knowledge and give a formal semantics of interventions therein. We further present the lifted causal inference algorithm to compute causal effects on a lifted level, thereby drastically speeding up causal inference compared to propositional inference, e.g., in causal Bayesian networks. In our empirical evaluation, we demonstrate the effectiveness of our approach.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
The Machine Vision Iceberg Explained: Advancing Dynamic Testing by Considering Holistic Environmental Relations
Authors:
Hubert Padusinski,
Christian Steinhauser,
Thilo Braun,
Lennart Ries,
Eric Sax
Abstract:
Machine Vision (MV) is essential for solving driving automation. This paper examines potential shortcomings in current MV testing strategies for highly automated driving (HAD) systems. We argue for a more comprehensive understanding of the performance factors that must be considered during the MV evaluation process, noting that neglecting these factors can lead to significant risks. This is not on…
▽ More
Machine Vision (MV) is essential for solving driving automation. This paper examines potential shortcomings in current MV testing strategies for highly automated driving (HAD) systems. We argue for a more comprehensive understanding of the performance factors that must be considered during the MV evaluation process, noting that neglecting these factors can lead to significant risks. This is not only relevant to MV component testing, but also to integration testing. To illustrate this point, we draw an analogy to a ship navigating towards an iceberg to show potential hidden challenges in current MV testing strategies. The main contribution is a novel framework for black-box testing which observes environmental relations. This means it is designed to enhance MV assessments by considering the attributes and surroundings of relevant individual objects. The framework provides the identification of seven general concerns about the object recognition of MV, which are not addressed adequately in established test processes. To detect these deficits based on their performance factors, we propose the use of a taxonomy called "granularity orders" along with a graphical representation. This allows an identification of MV uncertainties across a range of driving scenarios. This approach aims to advance the precision, efficiency, and completeness of testing procedures for MV.
△ Less
Submitted 30 April, 2024; v1 submitted 26 January, 2024;
originally announced January 2024.
-
Revealing recurrent regimes of mid-latitude atmospheric variability using novel machine learning method
Authors:
Dmitry Mukhin,
Abdel Hannachi,
Tobias Braun,
Norbert Marwan
Abstract:
The low frequency variability of the extratropical atmosphere involves hemispheric-scale recurring, often persistent, states known as teleconnection patterns or regimes, which can have profound impact on predictability on intra-seasonal and longer timescales. However, reliable data-driven identification and dynamical representation of such states are still challenging problems in modeling dynamics…
▽ More
The low frequency variability of the extratropical atmosphere involves hemispheric-scale recurring, often persistent, states known as teleconnection patterns or regimes, which can have profound impact on predictability on intra-seasonal and longer timescales. However, reliable data-driven identification and dynamical representation of such states are still challenging problems in modeling dynamics of the atmosphere. We present a new method, which allows both to detect recurring regimes of atmospheric variability, and to obtain dynamical variables serving as an embedding for these regimes. The method combines two approaches from nonlinear data analysis: partitioning a network of recurrent states with studying its properties by the recurrence quantification analysis and the kernel principal component analysis. We apply the method to study teleconnection patterns in a quasi-geostrophical model of atmospheric circulation over the extratropical hemisphere as well as to reanalysis data of geopotential height anomalies in the mid-latitudes of the Northern Hemisphere atmosphere in the winter seasons from 1981 to the present. It is shown that the detected regimes as well as the obtained set of dynamical variables explain large-scale weather patterns, which are associated, in particular, with severe winters over Eurasia and North America. The method presented opens prospects for improving empirical modeling and long-term forecasting of large-scale atmospheric circulation regimes.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Understanding the Process of Data Labeling in Cybersecurity
Authors:
Tobias Braun,
Irdin Pekaric,
Giovanni Apruzzese
Abstract:
Many domains now leverage the benefits of Machine Learning (ML), which promises solutions that can autonomously learn to solve complex tasks by training over some data. Unfortunately, in cyberthreat detection, high-quality data is hard to come by. Moreover, for some specific applications of ML, such data must be labeled by human operators. Many works "assume" that labeling is tough/challenging/cos…
▽ More
Many domains now leverage the benefits of Machine Learning (ML), which promises solutions that can autonomously learn to solve complex tasks by training over some data. Unfortunately, in cyberthreat detection, high-quality data is hard to come by. Moreover, for some specific applications of ML, such data must be labeled by human operators. Many works "assume" that labeling is tough/challenging/costly in cyberthreat detection, thereby proposing solutions to address such a hurdle. Yet, we found no work that specifically addresses the process of labeling 'from the viewpoint of ML security practitioners'. This is a problem: to this date, it is still mostly unknown how labeling is done in practice -- thereby preventing one from pinpointing "what is needed" in the real world.
In this paper, we take the first step to build a bridge between academic research and security practice in the context of data labeling. First, we reach out to five subject matter experts and carry out open interviews to identify pain points in their labeling routines. Then, by using our findings as a scaffold, we conduct a user study with 13 practitioners from large security companies, and ask detailed questions on subjects such as active learning, costs of labeling, and revision of labels. Finally, we perform proof-of-concept experiments addressing labeling-related aspects in cyberthreat detection that are sometimes overlooked in research. Altogether, our contributions and recommendations serve as a step** stone to future endeavors aimed at improving the quality and robustness of ML-driven security systems. We release our resources.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
A Collection of German Science Interests in the Next Generation Very Large Array
Authors:
M. Kadler,
D. A. Riechers,
J. Agarwal,
A. -K. Baczko,
H. Beuther,
F. Bigiel,
T. Birnstiel,
B. Boccardi,
D. J. Bomans,
L. Boogaard,
T. T. Braun,
S. Britzen,
M. Brüggen,
A. Brunthaler,
P. Caselli,
D. Elsässer,
S. von Fellenberg,
M. Flock,
C. M. Fromm,
L. Fuhrmann,
P. Hartogh,
M. Hoeft,
R. P. Keenan,
Y. Kovalev,
K. Kreckel
, et al. (66 additional authors not shown)
Abstract:
The Next Generation Very Large Array (ngVLA) is a planned radio interferometer providing unprecedented sensitivity at wavelengths between 21 cm and 3 mm. Its 263 antenna element array will be spatially distributed across North America to enable both superb low surface brightness recovery and sub-milliarcsecond angular resolution imaging. The project was developed by the international astronomy com…
▽ More
The Next Generation Very Large Array (ngVLA) is a planned radio interferometer providing unprecedented sensitivity at wavelengths between 21 cm and 3 mm. Its 263 antenna element array will be spatially distributed across North America to enable both superb low surface brightness recovery and sub-milliarcsecond angular resolution imaging. The project was developed by the international astronomy community under the lead of the National Radio Astronomy Observatory (NRAO), and is anticipated to be built between 2027 and 2037. Two workshops have been held in 2022 and 2023 with the goal to discuss and consolidate the scientific interests in the ngVLA within the German astronomical community. This community paper constitutes a collection of 48 science ideas which the German community aims to pursue with the ngVLA in the 2030s. This is not a complete list and the ideas are not developed at the level of a "Science Book", such that the present document is mainly meant provide a basis for further discussion within the community. As such, additional contributions are welcome, and will be considered for inclusion in future revisions.
△ Less
Submitted 18 June, 2024; v1 submitted 16 November, 2023;
originally announced November 2023.
-
Colour Passing Revisited: Lifted Model Construction with Commutative Factors
Authors:
Malte Luttermann,
Tanya Braun,
Ralf Möller,
Marcel Gehrke
Abstract:
Lifted probabilistic inference exploits symmetries in a probabilistic model to allow for tractable probabilistic inference with respect to domain sizes. To apply lifted inference, a lifted representation has to be obtained, and to do so, the so-called colour passing algorithm is the state of the art. The colour passing algorithm, however, is bound to a specific inference algorithm and we found tha…
▽ More
Lifted probabilistic inference exploits symmetries in a probabilistic model to allow for tractable probabilistic inference with respect to domain sizes. To apply lifted inference, a lifted representation has to be obtained, and to do so, the so-called colour passing algorithm is the state of the art. The colour passing algorithm, however, is bound to a specific inference algorithm and we found that it ignores commutativity of factors while constructing a lifted representation. We contribute a modified version of the colour passing algorithm that uses logical variables to construct a lifted representation independent of a specific inference algorithm while at the same time exploiting commutativity of factors during an offline-step. Our proposed algorithm efficiently detects more symmetries than the state of the art and thereby drastically increases compression, yielding significantly faster online query times for probabilistic inference when the resulting model is applied.
△ Less
Submitted 15 December, 2023; v1 submitted 20 September, 2023;
originally announced September 2023.
-
Realtime Spectrum Monitoring via Reinforcement Learning -- A Comparison Between Q-Learning and Heuristic Methods
Authors:
Tobias Braun,
Tobias Korzyzkowske,
Larissa Putzar,
Jan Mietzner,
Peter A. Hoeher
Abstract:
Due to technological advances in the field of radio technology and its availability, the number of interference signals in the radio spectrum is continuously increasing. Interference signals must be detected in a timely fashion, in order to maintain standards and keep emergency frequencies open. To this end, specialized (multi-channel) receivers are used for spectrum monitoring. In this paper, the…
▽ More
Due to technological advances in the field of radio technology and its availability, the number of interference signals in the radio spectrum is continuously increasing. Interference signals must be detected in a timely fashion, in order to maintain standards and keep emergency frequencies open. To this end, specialized (multi-channel) receivers are used for spectrum monitoring. In this paper, the performances of two different approaches for controlling the available receiver resources are compared. The methods used for resource management (ReMa) are linear frequency tuning as a heuristic approach and a Q-learning algorithm from the field of reinforcement learning. To test the methods to be investigated, a simplified scenario was designed with two receiver channels monitoring ten non-overlap** frequency bands with non-uniform signal activity. For this setting, it is shown that the Q-learning algorithm used has a significantly higher detection rate than the heuristic approach at the expense of a smaller exploration rate. In particular, the Q-learning approach can be parameterized to allow for a suitable trade-off between detection and exploration rate.
△ Less
Submitted 11 July, 2023;
originally announced July 2023.
-
DPM: Clustering Sensitive Data through Separation
Authors:
Yara Schütt,
Johannes Liebenow,
Tanya Braun,
Marcel Gehrke,
Florian Thaeter,
Esfandiar Mohammadi
Abstract:
Privacy-preserving clustering groups data points in an unsupervised manner whilst ensuring that sensitive information remains protected. Previous privacy-preserving clustering focused on identifying concentration of point clouds. In this paper, we take another path and focus on identifying appropriate separators that split a data set. We introduce the novel differentially private clustering algori…
▽ More
Privacy-preserving clustering groups data points in an unsupervised manner whilst ensuring that sensitive information remains protected. Previous privacy-preserving clustering focused on identifying concentration of point clouds. In this paper, we take another path and focus on identifying appropriate separators that split a data set. We introduce the novel differentially private clustering algorithm DPM that searches for accurate data point separators in a differentially private manner. DPM addresses two key challenges for finding accurate separators: identifying separators that are large gaps between clusters instead of small gaps within a cluster and, to efficiently spend the privacy budget, prioritising separators that split the data into large subparts. Using the differentially private Exponential Mechanism, DPM randomly chooses cluster separators with provably high utility: For a data set $D$, if there is a wide low-density separator in the central $60\%$ quantile, DPM finds that separator with probability $1 - \exp(-\sqrt{|D|})$. Our experimental evaluation demonstrates that DPM achieves significant improvements in terms of the clustering metric inertia. With the inertia results of the non-private KMeans++ as a baseline, for $\varepsilon = 1$ and $δ=10^{-5}$ DPM improves upon the difference to the baseline by up to $50\%$ for a synthetic data set and by up to $62\%$ for a real-world data set compared to a state-of-the-art clustering algorithm by Chang and Kamath.
△ Less
Submitted 6 July, 2023;
originally announced July 2023.
-
Low-period spacing core-helium burning giants: `hot subdwarf analogues'?
Authors:
S. Hekker,
Y. Elsworth,
T. A. M. Braun,
S. Basu
Abstract:
Global stellar oscillations probe the internal structure of stars. In low- to intermediate-mass red giants, these oscillations provide signatures from both the outer regions of the star as well as from the core. These signatures are imprinted in e.g. the frequency of maximum oscillation power, and in the differences in periods of non-radial oscillations (period spacings), respectively. In core hel…
▽ More
Global stellar oscillations probe the internal structure of stars. In low- to intermediate-mass red giants, these oscillations provide signatures from both the outer regions of the star as well as from the core. These signatures are imprinted in e.g. the frequency of maximum oscillation power, and in the differences in periods of non-radial oscillations (period spacings), respectively. In core helium burning giants with masses below about 1.7 solar masses, i.e. stars that have gone through a helium flash, the asymptotic period spacings take values of about 220 -350 s at frequency of maximum oscillation power of $\sim$30-50 $μ$Hz. A set of stars with asymptotic period spacings lower than about 200 s at similar frequencies separations has recently been discovered by Elsworth and collaborators. In this work, we present a hypothesis for the formation scenario of these stars. We find that these stars can be the result of a mass-loss event at the end of the red-giant branch phase of stars massive enough to not have a degenerate core, i.e. one of the scenarios to form hot subdwarf stars. Therefore, these stars can be classified as `hot subdwarf analogues'. Interestingly, if mass loss continues gradually during the core helium burning phase, these stars turn hotter and denser, and could, therefore, be hot subdwarf progenitors as they shed more of their envelope.
△ Less
Submitted 7 August, 2023; v1 submitted 17 May, 2023;
originally announced May 2023.
-
Laser Powder Bed Fusion of anisotropic Nd-Fe-B bonded magnets utilizing an in situ mechanical alignment approach
Authors:
Kilian Schäfer,
Rafael Gitti Tortoretto Fim,
Fernando Maccari,
Tobias Braun,
Stefan Riegg,
Konstantin Skokov,
David Koch,
Enrico Bruder,
Iliya Radulov,
Carlos Henrique Ahrens,
Paulo Antônio Pereira Wendhausen,
Oliver Gutfleisch
Abstract:
Nd-Fe-B bonded magnets are an important class of permanent magnets, employed in many technological sectors. The Additive Manufacturing (AM) processes enables the fabrication of net-shape bonded magnets with complex geometries, allowing to tailor their magnetic stray field specifically for a given application. A crucial challenge to be addressed concerning AM of bonded magnets is the production of…
▽ More
Nd-Fe-B bonded magnets are an important class of permanent magnets, employed in many technological sectors. The Additive Manufacturing (AM) processes enables the fabrication of net-shape bonded magnets with complex geometries, allowing to tailor their magnetic stray field specifically for a given application. A crucial challenge to be addressed concerning AM of bonded magnets is the production of magnetically anisotropic components. The common approaches presented in the literature up to now, required a post-printing procedure or the complex integration of a magnetic field source into the AM process. Here, we present a technique to fabricate anisotropic bonded magnets via Laser Powder Bed Fusion (LPBF) by utilizing the mechanical alignment of anisotropic particles in a single step, without the need for a magnetic field source. Anisotropic bonded magnets were fabricated using a mixture of anisotropic Nd-Fe-B powder (MQA-38-14) and polyamide-12 (PA12). This magnetic powder consists of ellipsoidal particles, where the easy magnetization axis is distributed perpendicular to their longest side, which can be exploited to generate magnetic texture. Depending on the particle size used as feedstock, the degree of alignment (<cos$(θ)$>) can be tailored to a maximum of <cos$(θ)$> = 0.78. The fabricated anisotropic bonded magnets exhibited a maximum remanence of Jr = 377 mT and an energy product of (BH)max = 28.6 kJ/m3, respectively.
△ Less
Submitted 5 May, 2023; v1 submitted 4 May, 2023;
originally announced May 2023.
-
1001 Ways of Scenario Generation for Testing of Self-driving Cars: A Survey
Authors:
Barbara Schütt,
Joshua Ransiek,
Thilo Braun,
Eric Sax
Abstract:
Scenario generation is one of the essential steps in scenario-based testing and, therefore, a significant part of the verification and validation of driver assistance functions and autonomous driving systems. However, the term scenario generation is used for many different methods, e.g., extraction of scenarios from naturalistic driving data or variation of scenario parameters. This survey aims to…
▽ More
Scenario generation is one of the essential steps in scenario-based testing and, therefore, a significant part of the verification and validation of driver assistance functions and autonomous driving systems. However, the term scenario generation is used for many different methods, e.g., extraction of scenarios from naturalistic driving data or variation of scenario parameters. This survey aims to give a systematic overview of different approaches, establish different categories of scenario acquisition and generation, and show that each group of methods has typical input and output types. It shows that although the term is often used throughout literature, the evaluated methods use different inputs and the resulting scenarios differ in abstraction level and from a systematical point of view. Additionally, recent research and literature examples are given to underline this categorization.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Exposure to War and Its Labor Market Consequences over the Life Cycle
Authors:
Sebastian T. Braun,
Jan Stuhler
Abstract:
With 70 million dead, World War II remains the most devastating conflict in history. Of the survivors, millions were displaced, returned maimed from the battlefield, or spent years in captivity. We examine the impact of such wartime experiences on labor market careers and show that they often become apparent only at certain life stages. While war injuries reduced employment in old age, former pris…
▽ More
With 70 million dead, World War II remains the most devastating conflict in history. Of the survivors, millions were displaced, returned maimed from the battlefield, or spent years in captivity. We examine the impact of such wartime experiences on labor market careers and show that they often become apparent only at certain life stages. While war injuries reduced employment in old age, former prisoners of war postponed their retirement. Many displaced workers, particularly women, never returned to employment. These responses are in line with standard life-cycle theory and thus likely extend to other conflicts.
△ Less
Submitted 25 March, 2023;
originally announced March 2023.
-
Polymer-bonded magnets produced by laser powder bed fusion: Influence of powder morphology, filler fraction and energy input on the magnetic and mechanical properties
Authors:
Kilian Schäfer,
Tobias Braun,
Stefan Riegg,
Jens Musekamp,
Oliver Gutfleisch
Abstract:
Bonded permanent magnets are key components in many energy conversion, sensor and actuator devices. These applications require high magnetic performance and freedom of shape. With additive manufacturing processes, for example laser powder bed fusion (LPBF), it is possible to produce bonded magnets with customized stray field distribution. Up to now, most studies use spherical powders as magnetic f…
▽ More
Bonded permanent magnets are key components in many energy conversion, sensor and actuator devices. These applications require high magnetic performance and freedom of shape. With additive manufacturing processes, for example laser powder bed fusion (LPBF), it is possible to produce bonded magnets with customized stray field distribution. Up to now, most studies use spherical powders as magnetic fillers due to their good flowability. Here, the behavior of large SmFeN platelets with a high aspect ratio as filler material and its influence on the arrangement and the resulting magnetic properties are examined in comparison to a spherical magnetic filler. The 3D distribution and orientation of the magnetic filler was studied by computed tomography and digital image analysis. The platelet-shaped particles align themselves perpendicular to the buildup direction during the process, which offers a new and cost-effective way of producing composites by LPBF with anisotropic structural and functional properties. The influence of LPBF parameters on the properties of the composites is investigated. Highest filling fractions are required for high magnetic remanence, however the powder itself limits this maximum due to particle shape and required minimal polymer fraction to form mechanically stable magnets. The coercivity decreases for higher filling fractions, which is attributed to increased rotation of insufficiently embedded magnetic particles in the matrix. It is discussed how filler morphology influences the observed change in coercivity since the rotation of spherical particles in comparison to platelet-shaped particles requires less energy. Our work shows the challenges and opportunities of large platelet shaped fillers used in LPBF for the production of anisotropic functional and structural composites.
△ Less
Submitted 2 October, 2022;
originally announced October 2022.
-
GINGER
Authors:
Carlo Altucci,
Francesco Bajardi Emilio Barchiesi,
Andrea Basti,
Nicolò Beverini,
Thomas Braun,
Giorgio Carelli,
Salvatore Capozziello,
Donatella Ciampini,
Fabrizio Davì,
Gaetano De Luca,
Roberto Devoti,
Rita Di Giovambattista,
Giuseppe Di Somma,
Giuseppe Di Stefano,
Angela D. V. Di Virgilio,
Daniela Famiani,
Alberto Frepoli,
Francesco Fuso,
Ivan Giorgio,
Aladino Govoni,
Gaetano Lambiase,
Enrico Maccioni,
Paolo Marsili,
Alessia Mercuri,
Fabio Morsani
, et al. (7 additional authors not shown)
Abstract:
In this paper, we outline the scientific objectives, the experimental layout, and the collaborations envisaged for the GINGER (Gyroscopes IN GEneral Relativity) project. The GINGER project brings together different scientific disciplines aiming at building an array of Ring Laser Gyroscopes (RLGs), exploiting the Sagnac effect, to measure continuously, with sensitivity better than picorad/ s, large…
▽ More
In this paper, we outline the scientific objectives, the experimental layout, and the collaborations envisaged for the GINGER (Gyroscopes IN GEneral Relativity) project. The GINGER project brings together different scientific disciplines aiming at building an array of Ring Laser Gyroscopes (RLGs), exploiting the Sagnac effect, to measure continuously, with sensitivity better than picorad/ s, large bandwidth (ca. 1 kHz), and high dynamic range, the absolute angular rotation rate of the Earth. In the paper, we address the feasibility of the apparatus with respect to the ambitious specifications above, as well as prove how such an apparatus, which will be able to detect strong Earthquakes, very weak geodetic signals, as well as general relativity effects like Lense-Thirring and De Sitter, will help scientific advancements in Theoretical Physics, Geophysics, and Geodesy, among other scientific fields.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Recurrence flow measure of nonlinear dependence
Authors:
Tobias Braun,
K. Hauke Kraemer,
Norbert Marwan
Abstract:
Couplings in complex real-world systems are often nonlinear and scale-dependent. In many cases, it is crucial to consider a multitude of interlinked variables and the strengths of their correlations to adequately fathom the dynamics of a high-dimensional nonlinear system. We propose a recurrence based dependence measure that quantifies the relationship between multiple time series based on the pre…
▽ More
Couplings in complex real-world systems are often nonlinear and scale-dependent. In many cases, it is crucial to consider a multitude of interlinked variables and the strengths of their correlations to adequately fathom the dynamics of a high-dimensional nonlinear system. We propose a recurrence based dependence measure that quantifies the relationship between multiple time series based on the predictability of their joint evolution. The statistical analysis of recurrence plots (RPs) is a powerful framework in nonlinear time series analysis that has proven to be effective in addressing many fundamental problems, e.g., regime shift detection and identification of couplings. The recurrence flow through an RP exploits artifacts in the formation of diagonal lines, a structure in RPs that reflects periods of predictable dynamics. By using time-delayed variables of a deterministic uni-/multivariate system, lagged dependencies with potentially many time scales can be captured by the recurrence flow measure. Given an RP, no parameters are required for its computation. We showcase the scope of the method for quantifying lagged nonlinear correlations and put a focus on the delay selection problem in time-delay embedding which is often used for attractor reconstruction. The recurrence flow measure of dependence helps to identify non-uniform delays and appears as a promising foundation for a recurrence based state space reconstruction algorithm.
△ Less
Submitted 10 June, 2022;
originally announced June 2022.
-
Development of an automated millifluidic platform and data-analysis pipeline for rapid electrochemical corrosion measurements: a pH study on Zn-Ni
Authors:
Howie Joress,
Brian DeCost,
Najlaa Hassan,
Trevor M. Braun,
Justin M. Gorham,
Jason Hattrick-Simpers
Abstract:
We describe the development of a millifluidic based scanning droplet cell platform for rapid and automated corrosion. This system allows for measurement of corrosion properties (e.g., open circuit potential, corrosion current through Tafel and linear polarization resistance measurements, and cyclic voltammograms) on a localized section of a planar sample. Our system is highly automated and flexibl…
▽ More
We describe the development of a millifluidic based scanning droplet cell platform for rapid and automated corrosion. This system allows for measurement of corrosion properties (e.g., open circuit potential, corrosion current through Tafel and linear polarization resistance measurements, and cyclic voltammograms) on a localized section of a planar sample. Our system is highly automated and flexible, allowing for scripted changing and mixing of solutions and point-to-point motion on the sample. We have also created an automated data analysis pipeline. Here we demonstrate this tool by corroding a plate of electroplated Zn$_{85}$Ni$_{15}$ alloy over a range of pH values and correlate our results with XPS measurements and literature.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Sampling rate-corrected analysis of irregularly sampled time series
Authors:
Tobias Braun,
Cinthya N. Fernandez,
Deniz Eroglu,
Adam Hartland,
Sebastian F. M. Breitenbach,
Norbert Marwan
Abstract:
The analysis of irregularly sampled time series remains a challenging task requiring methods that account for continuous and abrupt changes of sampling resolution without introducing additional biases. The edit-distance is an effective metric to quantitatively compare time series segments of unequal length by computing the cost of transforming one segment into the other. We show that transformatio…
▽ More
The analysis of irregularly sampled time series remains a challenging task requiring methods that account for continuous and abrupt changes of sampling resolution without introducing additional biases. The edit-distance is an effective metric to quantitatively compare time series segments of unequal length by computing the cost of transforming one segment into the other. We show that transformation costs generally exhibit a non-trivial relationship with local sampling rate. If the sampling resolution undergoes strong variations, this effect impedes unbiased comparison between different time episodes. We study the impact of this effect on recurrence quantification analysis, a framework that is well-suited for identifying regime shifts in nonlinear time series. A constrained randomization approach is put forward to correct for the biased recurrence quantification measures. This strategy involves the generation of a novel type of time series and time axis surrogates which we call sampling rate constrained (SRC) surrogates. We demonstrate the effectiveness of the proposed approach with a synthetic example and an irregularly sampled speleothem proxy record from Niue island in the central tropical Pacific. Application of the proposed correction scheme identifies a spurious transition that is solely imposed by an abrupt shift in sampling rate and uncovers periods of reduced seasonal rainfall predictability associated with enhanced ENSO and tropical cyclone activity.
△ Less
Submitted 9 December, 2021;
originally announced December 2021.
-
Experiments conducted in the burning plasma regime with inertial fusion implosions
Authors:
J. S. Ross,
J. E. Ralph,
A. B. Zylstra,
A. L. Kritcher,
H. F. Robey,
C. V. Young,
O. A. Hurricane,
D. A. Callahan,
K. L. Baker,
D. T. Casey,
T. Doeppner,
L. Divol,
M. Hohenberger,
S. Le Pape,
A. Pak,
P. K. Patel,
R. Tommasini,
S. J. Ali,
P. A. Amendt,
L. J. Atherton,
B. Bachmann,
D. Bailey,
L. R. Benedetti,
L. Berzak Hopkins,
R. Betti
, et al. (127 additional authors not shown)
Abstract:
An experimental program is currently underway at the National Ignition Facility (NIF) to compress deuterium and tritium (DT) fuel to densities and temperatures sufficient to achieve fusion and energy gain. The primary approach being investigated is indirect drive inertial confinement fusion (ICF), where a high-Z radiation cavity (a hohlraum) is heated by lasers, converting the incident energy into…
▽ More
An experimental program is currently underway at the National Ignition Facility (NIF) to compress deuterium and tritium (DT) fuel to densities and temperatures sufficient to achieve fusion and energy gain. The primary approach being investigated is indirect drive inertial confinement fusion (ICF), where a high-Z radiation cavity (a hohlraum) is heated by lasers, converting the incident energy into x-ray radiation which in turn drives the DT fuel filled capsule causing it to implode. Previous experiments reported DT fuel gain exceeding unity [O.A. Hurricane et al., Nature 506, 343 (2014)] and then exceeding the kinetic energy of the imploding fuel [S. Le Pape et al., Phys. Rev. Lett. 120, 245003 (2018)]. We report on recent experiments that have achieved record fusion neutron yields on NIF, greater than 100 kJ with momentary fusion powers exceeding 1PW, and have for the first time entered the burning plasma regime where fusion alpha-heating of the fuel exceeds the energy delivered to the fuel via compression. This was accomplished by increasing the size of the high-density carbon (HDC) capsule, increasing energy coupling, while controlling symmetry and implosion design parameters. Two tactics were successful in controlling the radiation flux symmetry and therefore the implosion symmetry: transferring energy between laser cones via plasma waves, and changing the shape of the hohlraum. In conducting these experiments, we controlled for known sources of degradation. Herein we show how these experiments were performed to produce record performance, and demonstrate the data fidelity leading us to conclude that these shots have entered the burning plasma regime.
△ Less
Submitted 8 November, 2021;
originally announced November 2021.
-
Lifting DecPOMDPs for Nanoscale Systems -- A Work in Progress
Authors:
Tanya Braun,
Stefan Fischer,
Florian Lau,
Ralf Möller
Abstract:
DNA-based nanonetworks have a wide range of promising use cases, especially in the field of medicine. With a large set of agents, a partially observable stochastic environment, and noisy observations, such nanoscale systems can be modelled as a decentralised, partially observable, Markov decision process (DecPOMDP). As the agent set is a dominating factor, this paper presents (i) lifted DecPOMDPs,…
▽ More
DNA-based nanonetworks have a wide range of promising use cases, especially in the field of medicine. With a large set of agents, a partially observable stochastic environment, and noisy observations, such nanoscale systems can be modelled as a decentralised, partially observable, Markov decision process (DecPOMDP). As the agent set is a dominating factor, this paper presents (i) lifted DecPOMDPs, partitioning the agent set into sets of indistinguishable agents, reducing the worst-case space required, and (ii) a nanoscale medical system as an application. Future work turns to solving and implementing lifted DecPOMDPs.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Visually Connecting Historical Figures Through Event Knowledge Graphs
Authors:
Shahid Latif,
Shivam Agarwal,
Simon Gottschalk,
Carina Chrosch,
Felix Feit,
Johannes Jahn,
Tobias Braun,
Yanick Christian Tchenko,
Elena Demidova,
Fabian Beck
Abstract:
Knowledge graphs store information about historical figures and their relationships indirectly through shared events. We developed a visualization system, VisKonnect, for analyzing the intertwined lives of historical figures based on the events they participated in. A user's query is parsed for identifying named entities, and related data is retrieved from an event knowledge graph. While a short t…
▽ More
Knowledge graphs store information about historical figures and their relationships indirectly through shared events. We developed a visualization system, VisKonnect, for analyzing the intertwined lives of historical figures based on the events they participated in. A user's query is parsed for identifying named entities, and related data is retrieved from an event knowledge graph. While a short textual answer to the query is generated using the GPT-3 language model, various linked visualizations provide context, display additional information related to the query, and allow exploration.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case
Authors:
Christian Wolschke,
Stefan Marksteiner,
Tobias Braun,
Markus Wolf
Abstract:
This paper presents a Domain Specific Language (DSL) for generically describing cyber attacks, agnostic to specific system-under-test(SUT). The creation of the presented DSL is motivated by an automotive use case. The concepts of the DSL are generic such thatattacks on arbitrary systems can be addressed.The ongoing trend to improve the user experience of vehicles with connected services implies an…
▽ More
This paper presents a Domain Specific Language (DSL) for generically describing cyber attacks, agnostic to specific system-under-test(SUT). The creation of the presented DSL is motivated by an automotive use case. The concepts of the DSL are generic such thatattacks on arbitrary systems can be addressed.The ongoing trend to improve the user experience of vehicles with connected services implies an enhanced connectivity as well asremote accessible interface opens potential attack vectors. This might also impact safety and the proprietary nature of potential SUTs.Reusing tests of attack vectors to industrialize testing them on multiple SUTs mandates an abstraction mechanism to port an attackfrom one system to another. The DSL therefore generically describes attacks for the usage with a test case generator (and executionenvironment) also described in this paper. The latter use this description and a database with SUT-specific information to generateattack implementations for a multitude of different (automotive) SUTs.
△ Less
Submitted 19 August, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems
Authors:
Christian Wolschke,
Behrooz Sangchoolie,
Jacob Simon,
Stefan Marksteiner,
Tobias Braun,
Hayk Hamazaryan
Abstract:
Increasing communication and self-driving capabilities for road vehicles lead to threats imposed by attackers. Especially attacks leading to safety violations have to be identified to address them by appropriate measures. The impact of an attack depends on the threat exploited, potential countermeasures and the traffic situation. In order to identify such attacks and to use them for testing, we pr…
▽ More
Increasing communication and self-driving capabilities for road vehicles lead to threats imposed by attackers. Especially attacks leading to safety violations have to be identified to address them by appropriate measures. The impact of an attack depends on the threat exploited, potential countermeasures and the traffic situation. In order to identify such attacks and to use them for testing, we propose the systematic approach SaSeVAL for deriving attacks of autonomous vehicles. SaSeVAL is based on threats identification and safety-security analysis. The impact of automotive use cases to attacks is considered. The threat identification considers the attack interface of vehicles and classifies threat scenarios according to threat types, which are then mapped to attack types. The safety-security analysis identifies the necessary requirements which have to be tested based on the architecture of the system under test. lt determines which safety impact a security violation may have, and in which traffic situations the highest impact is expected. Finally, the results of threat identification and safety-security analysis are used to describe attacks. The goal of SaSeVAL is to achieve safety validation of the vehicle w.r.t. security concerns. lt traces safety goals to threats and to attacks explicitly. Hence, the coverage of safety concerns by security testing is assured. Two use cases of vehicle communication and autonomous driving are investigated to prove the applicability of the approach.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Classifying toric 3-fold codes of dimensions 4 and 5
Authors:
Tori Braun,
James Carzon,
Jenna Gorham,
Kelly Jabbusch
Abstract:
A toric code is an error-correcting code determined by a toric variety or its associated integral convex polytope. We investigate $4$- and $5$-dimensional toric $3$-fold codes, which are codes arising from polytopes in $\mathbf{R}^3$ with four and five lattice points, respectively. By computing the minimum distances of each code, we fully classify the $4$-dimensional codes. We further present prog…
▽ More
A toric code is an error-correcting code determined by a toric variety or its associated integral convex polytope. We investigate $4$- and $5$-dimensional toric $3$-fold codes, which are codes arising from polytopes in $\mathbf{R}^3$ with four and five lattice points, respectively. By computing the minimum distances of each code, we fully classify the $4$-dimensional codes. We further present progress toward the same goal for dimension $5$ codes. In particular, we classify the $5$-dimensional toric $3$-fold codes arising from polytopes of width 1.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
SceML - A Graphical Modeling Framework for Scenario-based Testing of Autonomous Vehicles
Authors:
Barbara Schuett,
Thilo Braun,
Stefan Otten,
Eric Sax
Abstract:
Ensuring the functional correctness and safety of autonomous vehicles is a major challenge for the automotive industry. However, exhaustive physical test drives are not feasible, as billions of driven kilometers would be required to obtain reliable results. Scenariobased testing is an approach to tackle this problem and reduce necessary test drives by replacing driven kilometers with simulations o…
▽ More
Ensuring the functional correctness and safety of autonomous vehicles is a major challenge for the automotive industry. However, exhaustive physical test drives are not feasible, as billions of driven kilometers would be required to obtain reliable results. Scenariobased testing is an approach to tackle this problem and reduce necessary test drives by replacing driven kilometers with simulations of relevant or interesting scenarios. These scenarios can be generated or extracted from recorded data with machine learning algorithms or created by experts. In this paper, we propose a novel graphical scenario modeling language. The graphical framework allows experts to create new scenarios or review ones designed by other experts or generated by machine learning algorithms. The scenario description is modeled as a graph and based on behavior trees. It supports different abstraction levels of scenario description during software and test development. Additionally, the graphbased structure provides modularity and reusable sub-scenarios, an important use case in scenario modeling. A graphical visualization of the scenario enhances comprehensibility for different users. The presented approach eases the scenario creation process and increases the usage of scenarios within development and testing processes.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
Detection of Dynamical Regime Transitions with Lacunarity as a Multiscale Recurrence Quantification Measure
Authors:
Tobias Braun,
Vishnu R. Unni,
R. I. Sujith,
Juergen Kurths,
Norbert Marwan
Abstract:
We propose lacunarity as a novel recurrence quantification measure and illustrate its efficacy to detect dynamical regime transitions which are exhibited by many complex real-world systems. We carry out a recurrence plot based analysis for different paradigmatic systems and nonlinear empirical data in order to demonstrate the ability of our method to detect dynamical transitions ranging across dif…
▽ More
We propose lacunarity as a novel recurrence quantification measure and illustrate its efficacy to detect dynamical regime transitions which are exhibited by many complex real-world systems. We carry out a recurrence plot based analysis for different paradigmatic systems and nonlinear empirical data in order to demonstrate the ability of our method to detect dynamical transitions ranging across different temporal scales. It succeeds to distinguish states of varying dynamical complexity in the presence of noise and non-stationarity, even when the time series is of short length. In contrast to traditional recurrence quantifiers, no specification of minimal line lengths is required and rather geometric features beyond linear structures in the recurrence plot can be accounted for. This makes lacunarity more broadly applicable as a recurrence quantification measure. Lacunarity is usually interpreted as a measure of heterogeneity or translational invariance of an arbitrary spatial pattern. In application to recurrence plots, it quantifies the degree of heterogenity in the temporal recurrence patterns at all relevant time scales. We demonstrate the potential of the proposed method when applied to empirical data, namely time series of acoustic pressure fluctuations from a turbulent combustor. Recurrence lacunarity captures both the rich variability in dynamical complexity of acoustic pressure fluctuations and shifting time scales encoded in the recurrence plots. Furthermore, it contributes to a better distinction between stable operation and near blowout states of combustors.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Correlated power time series of individual wind turbines: A data driven model approach
Authors:
Tobias Braun,
Matthias Waechter,
Joachim Peinke,
Thomas Guhr
Abstract:
Wind farms can be regarded as complex systems that are, on the one hand, coupled to the nonlinear, stochastic characteristics of weather and, on the other hand, strongly influenced by supervisory control mechanisms. One crucial problem in this context today is the predictability of wind energy as an intermittent renewable resource with additional non-stationary nature. In this context, we analyze…
▽ More
Wind farms can be regarded as complex systems that are, on the one hand, coupled to the nonlinear, stochastic characteristics of weather and, on the other hand, strongly influenced by supervisory control mechanisms. One crucial problem in this context today is the predictability of wind energy as an intermittent renewable resource with additional non-stationary nature. In this context, we analyze the power time series measured in an offshore wind farm for a total period of one year with a time resolution of 10 min. Applying detrended fluctuation analysis, we characterize the autocorrelation of power time series and find a Hurst exponent in the persistent regime with cross-over behavior. To enrich the modeling perspective of complex large wind energy systems, we develop a stochastic reduced-form model ofpower time series. The observed transitions between two dominating power generation phases are reflected by a bistable deterministic component, while correlated stochastic fluctuations account for the identified persistence. The model succeeds to qualitatively reproduce several empirical characteristics such as the autocorrelation function and the bimodal probability density function.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Dynamical stellar masses of pre-main sequence stars in Lupus and Taurus obtained with ALMA surveys in comparison with stellar evolutionary models
Authors:
Teresa A. M. Braun,
Hsi-Wei Yen,
Patrick M. Koch,
Carlo F. Manara,
Anna Miotello,
Leonardo Testi
Abstract:
We analysed archival molecular line data of pre-main sequence (PMS) stars in the Lupus and Taurus star-forming regions obtained with ALMA surveys with an integration time of a few minutes per source. We stacked the data of $^{13}$CO and C$^{18}$O (J = 2-1 & 3-2) and CN (N = 3-2, J = 7/2-5/2) lines to enhance the signal-to-noise ratios, and measured the stellar masses of 45 out of 67 PMS stars from…
▽ More
We analysed archival molecular line data of pre-main sequence (PMS) stars in the Lupus and Taurus star-forming regions obtained with ALMA surveys with an integration time of a few minutes per source. We stacked the data of $^{13}$CO and C$^{18}$O (J = 2-1 & 3-2) and CN (N = 3-2, J = 7/2-5/2) lines to enhance the signal-to-noise ratios, and measured the stellar masses of 45 out of 67 PMS stars from the Keplerian rotation in their circumstellar disks. The measured dynamical stellar masses were compared to the stellar masses estimated from the spectroscopic measurements with seven different stellar evolutionary models. We found that the magnetic model of Feiden (2016) provides the best estimate of the stellar masses in the mass range of $0.6~M_{\odot}\leq M_{\star} \leq 1.3~M_{\odot}$ with a deviation of $<$0.7$σ$ from the dynamical masses, while all the other models underestimate the stellar masses in this mass range by 20% to 40%. In the mass range of $<0.6~M_{\odot}$, the stellar masses estimated with the magnetic model of Feiden (2016) have a larger deviation ($>2σ$) from the dynamical masses, and other, non-magnetic stellar evolutionary models of Siess et al. (2000), Baraffe et al. (2015) and Feiden (2016) show better agreements with the dynamical masses with the deviations of 1.4$σ$ to 1.6$σ$. Our results show the mass dependence of the accuracy of these stellar evolutionary models.
△ Less
Submitted 14 December, 2020;
originally announced December 2020.
-
Power prior models for treatment effect estimation in a small n, sequential, multiple assignment, randomized trial
Authors:
Yan-Cheng Chao,
Thomas M. Braun,
Roy N. Tamura,
Kelley M. Kidwell
Abstract:
A small n, sequential, multiple assignment, randomized trial (snSMART) is a small sample, two-stage design where participants receive up to two treatments sequentially, but the second treatment depends on response to the first treatment. The treatment effect of interest in an snSMART is the first-stage response rate, but outcomes from both stages can be used to obtain more information from a small…
▽ More
A small n, sequential, multiple assignment, randomized trial (snSMART) is a small sample, two-stage design where participants receive up to two treatments sequentially, but the second treatment depends on response to the first treatment. The treatment effect of interest in an snSMART is the first-stage response rate, but outcomes from both stages can be used to obtain more information from a small sample. A novel way to incorporate the outcomes from both stages applies power prior models, in which first stage outcomes from an snSMART are regarded as the primary data and second stage outcomes are regarded as supplemental. We apply existing power prior models to snSMART data, and we also develop new extensions of power prior models. All methods are compared to each other and to the Bayesian joint stage model (BJSM) via simulation studies. By comparing the biases and the efficiency of the response rate estimates among all proposed power prior methods, we suggest application of Fisher's exact test or the Bhattacharyya's overlap measure to an snSMART to estimate the treatment effect in an snSMART, which both have performance mostly as good or better than the BJSM. We describe the situations where each of these suggested approaches is preferred.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
Exploring Unknown Universes in Probabilistic Relational Models
Authors:
Tanya Braun,
Ralf Möller
Abstract:
Large probabilistic models are often shaped by a pool of known individuals (a universe) and relations between them. Lifted inference algorithms handle sets of known individuals for tractable inference. Universes may not always be known, though, or may only described by assumptions such as "small universes are more likely". Without a universe, inference is no longer possible for lifted algorithms,…
▽ More
Large probabilistic models are often shaped by a pool of known individuals (a universe) and relations between them. Lifted inference algorithms handle sets of known individuals for tractable inference. Universes may not always be known, though, or may only described by assumptions such as "small universes are more likely". Without a universe, inference is no longer possible for lifted algorithms, losing their advantage of tractable inference. The aim of this paper is to define a semantics for models with unknown universes decoupled from a specific constraint language to enable lifted and thereby, tractable inference.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
A high-throughput structural and electrochemical study of metallic glass formation in Ni-Ti-Al
Authors:
Howie Joress,
Brian L. DeCost,
Suchismita Sarker,
Trevor M. Braun,
Sidra Jilani,
Ryan Smith,
Logan Ward,
Kevin J. Laws,
Apurva Mehta,
Jason Hattrick-Simpers
Abstract:
Based on a set of machine learning predictions of glass formation in the Ni-Ti-Al system, we have undertaken a high-throughput experimental study of that system. We utilized rapid synthesis followed by high-throughput structural and electrochemical characterization. Using this dual-modality approach, we are able to better classify the amorphous portion of the library, which we found to be the port…
▽ More
Based on a set of machine learning predictions of glass formation in the Ni-Ti-Al system, we have undertaken a high-throughput experimental study of that system. We utilized rapid synthesis followed by high-throughput structural and electrochemical characterization. Using this dual-modality approach, we are able to better classify the amorphous portion of the library, which we found to be the portion with a full-width-half-maximum (FWHM) of 0.42 A$^{-1}$ for the first sharp x-ray diffraction peak. We demonstrate that the FWHM and corrosion resistance are correlated but that, while chemistry still plays a role, a large FWHM is necessary for the best corrosion resistance.
△ Less
Submitted 19 December, 2019;
originally announced December 2019.
-
Taming Reasoning in Temporal Probabilistic Relational Models
Authors:
Marcel Gehrke,
Ralf Möller,
Tanya Braun
Abstract:
Evidence often grounds temporal probabilistic relational models over time, which makes reasoning infeasible. To counteract groundings over time and to keep reasoning polynomial by restoring a lifted representation, we present temporal approximate merging (TAMe), which incorporates (i) clustering for grou** submodels as well as (ii) statistical significance checks to test the fitness of the clust…
▽ More
Evidence often grounds temporal probabilistic relational models over time, which makes reasoning infeasible. To counteract groundings over time and to keep reasoning polynomial by restoring a lifted representation, we present temporal approximate merging (TAMe), which incorporates (i) clustering for grou** submodels as well as (ii) statistical significance checks to test the fitness of the clustering outcome. In exchange for faster runtimes, TAMe introduces a bounded error that becomes negligible over time. Empirical results show that TAMe significantly improves the runtime performance of inference, while kee** errors small.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
Factorizations of surjective maps of connected quandles
Authors:
T. Braun,
C. Crotwell,
A. Liu,
P. Weston,
D. N. Yetter
Abstract:
We consider the problem of when one quandle homomorphism will factor through another, restricting our attention to the case where all quandles involved are connected. We provide a complete solution to the problem for surjective quandle homomorphisms using the structure theorem for connected quandles of Ehrman et al. (2008) and the factorization system for surjective quandle homomorphsims of Bunch…
▽ More
We consider the problem of when one quandle homomorphism will factor through another, restricting our attention to the case where all quandles involved are connected. We provide a complete solution to the problem for surjective quandle homomorphisms using the structure theorem for connected quandles of Ehrman et al. (2008) and the factorization system for surjective quandle homomorphsims of Bunch et al. (2010) as our primary tools. The paper contains the substantive results obtained by an REU research group consisting of the first four authors under the mentorship of the fifth, and was supported by National Science Foundation, grant DMS-1659123.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
DeepFloat: Resource-Efficient Dynamic Management of Vehicular Floating Content
Authors:
Gaetano Manzo,
Sebastian Otalora,
Marco Ajmone Marsan,
Torsten Braun,
Hung Nguyen,
Gianluca Rizzo
Abstract:
Opportunistic communications are expected to playa crucial role in enabling context-aware vehicular services. A widely investigated opportunistic communication paradigm for storing a piece of content probabilistically in a geographica larea is Floating Content (FC). A key issue in the practical deployment of FC is how to tune content replication and caching in a way which achieves a target perform…
▽ More
Opportunistic communications are expected to playa crucial role in enabling context-aware vehicular services. A widely investigated opportunistic communication paradigm for storing a piece of content probabilistically in a geographica larea is Floating Content (FC). A key issue in the practical deployment of FC is how to tune content replication and caching in a way which achieves a target performance (in terms of the mean fraction of users possessing the content in a given region of space) while minimizing the use of bandwidth and host memory. Fully distributed, distance-based approaches prove highly inefficient, and may not meet the performance target,while centralized, model-based approaches do not perform well in realistic, inhomogeneous settings. In this work, we present a data-driven centralized approach to resource-efficient, QoS-aware dynamic management of FC.We propose a Deep Learning strategy, which employs a Convolutional Neural Network (CNN) to capture the relationships between patterns of users mobility, of content diffusion and replication, and FC performance in terms of resource utilization and of content availability within a given area. Numerical evaluations show the effectiveness of our approach in deriving strategies which efficiently modulate the FC operation in space and effectively adapt to mobility pattern changes over time.
△ Less
Submitted 11 June, 2019;
originally announced June 2019.
-
CHANG-ES XX. High Resolution Radio Continuum Images of Edge-on Galaxies and their AGNs -- Data Release 3
Authors:
Judith Irwin,
Theresa Wiegert,
Alison Merritt,
Marek Wezgowiec,
Lucas Hunt,
Alex Woodfinden,
Yelena Stein,
Ancor Damas-Segovia,
Jiangtao Li,
Q. Daniel Wang,
Megan Johnson,
Marita Krause,
Ralf-Juergen Dettmar,
Jisung Im,
Philip Schmidt,
Arpad Miskolczi,
Timothy T. Braun,
D. J. Saikia,
Jayanne English,
Mark L. A. Richardson
Abstract:
The CHANG-ES galaxy sample consists of 35 nearby edge-on galaxies that have been observed using the VLA at 1.6 GHz and 6.0 GHz. Here we present the 3rd data release of our sample, namely the B-configuration 1.6 GHz sample. In addition, we make available the {\it band-to-band} spectral index maps between 1.6 GHz and 6.0 GHz, the latter taken in the matching resolution C-configuration. The images ca…
▽ More
The CHANG-ES galaxy sample consists of 35 nearby edge-on galaxies that have been observed using the VLA at 1.6 GHz and 6.0 GHz. Here we present the 3rd data release of our sample, namely the B-configuration 1.6 GHz sample. In addition, we make available the {\it band-to-band} spectral index maps between 1.6 GHz and 6.0 GHz, the latter taken in the matching resolution C-configuration. The images can be downloaded from https://www.queensu.ca/changes. These are our highest resolution images ($\approx$ 3 arcsec) and we examine the possible presence of low luminosity active galactic nuclei in the sample as well as some in-disk structure. New features can be seen in the spectral index maps that are masked in the total intensity emission, including hidden spiral arms in NGC~3448 and two previously unknown radio lobes on either side of the nucleus of NGC~3628. Our AGN detection rate, using only radio criteria, is 55\% which we take as a lower limit because some weaker embedded AGNs are likely present which could be revealed at higher resolution. Archival XMM-Newton data were used to search for further fingerprints of the AGNs in the studied sample. In galaxy disks, discrete regions of flat spectral index are seen, likely due to a thermal emission fraction that is higher than the global average.
△ Less
Submitted 20 May, 2019; v1 submitted 8 May, 2019;
originally announced May 2019.
-
A joint deconvolution algorithm to combine single dish and interferometer data for wideband multi-term and mosaic imaging
Authors:
Urvashi Rau,
Nikhil Naik,
Timothy Braun
Abstract:
Imaging in radio astronomy is usually carried out with a single-dish radio telescope doing a raster scan of a region of the sky or with an interferometer that samples the visibility function of the sky brightness. Mosaic observations are the current standard for imaging large fields of view with an interferometer and multi-frequency observations are now routinely carried out with both types of tel…
▽ More
Imaging in radio astronomy is usually carried out with a single-dish radio telescope doing a raster scan of a region of the sky or with an interferometer that samples the visibility function of the sky brightness. Mosaic observations are the current standard for imaging large fields of view with an interferometer and multi-frequency observations are now routinely carried out with both types of telescopes to increase the continuum imaging sensitivity and to probe spectral structure. This paper describes an algorithm to combine wideband data from these two types of telescopes in a joint iterative reconstruction scheme that can be applied to spectral cube or wideband multi-term imaging both for narrow fields of view as well as mosaics. Our results demonstrate the ability to prevent instabilities and error that typically arise when wide-band or joint mosaicing algorithms are presented with spatial and spectral structure that is inadequetely sampled by the interferometer alone. For comparable noise levels in the single dish and interferometer data, the numerical behaviour of this algorithm is expected to be similar to the idea of generating artificial visibilities from single dish data. However, our discussed implementation is simpler and more flexible in terms of applying relative data weighting schemes to match noise levels while preserving flux accuracy, fits within standard iterative image reconstruction frameworks, is fully compatible with wide-field and joint mosaicing gridding algorithms that apply corrections specific to the interferometer data and may be configured to enable spectral cube and wideband multi-term deconvolution for single-dish data alone.
△ Less
Submitted 18 April, 2019;
originally announced April 2019.
-
PopNetCod: A Popularity-based Caching Policy for Network Coding enabled Named Data Networking
Authors:
Jonnahtan Saltarin,
Torsten Braun,
Eirina Bourtsoulatze,
Nikolaos Thomos
Abstract:
In this paper, we propose PopNetCod, a popularity-based caching policy for network coding enabled Named Data Networking. PopNetCod is a distributed caching policy, in which each router measures the local popularity of the content objects by analyzing the requests that it receives. It then uses this information to decide which Data packets to cache or evict from its content store. Since network cod…
▽ More
In this paper, we propose PopNetCod, a popularity-based caching policy for network coding enabled Named Data Networking. PopNetCod is a distributed caching policy, in which each router measures the local popularity of the content objects by analyzing the requests that it receives. It then uses this information to decide which Data packets to cache or evict from its content store. Since network coding is used, partial caching of content objects is supported, which facilitates the management of the content store. The routers decide the Data packets that they cache or evict in an online manner when they receive requests for Data packets. This allows the most popular Data packets to be cached closer to the network edges. The evaluation of PopNetCod shows an improved cache-hit rate compared to the widely used Leave Copy Everywhere placement policy and the Least Recently Used eviction policy. The improved cache-hit rate helps the clients to achieve higher goodput, while it also reduces the load on the source servers.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
Pull-based Bloom Filter-based Routing for Information-Centric Networks
Authors:
Ali Marandi,
Torsten Braun,
Kave Salamatian,
Nikolaos Thomos
Abstract:
In Named Data Networking (NDN), there is a need for routing protocols to populate Forwarding Information Base (FIB) tables so that the Interest messages can be forwarded. To populate FIBs, clients and routers require some routing information. One method to obtain this information is that network nodes exchange routing information by each node advertising the available content objects. Bloom Filter…
▽ More
In Named Data Networking (NDN), there is a need for routing protocols to populate Forwarding Information Base (FIB) tables so that the Interest messages can be forwarded. To populate FIBs, clients and routers require some routing information. One method to obtain this information is that network nodes exchange routing information by each node advertising the available content objects. Bloom Filter-based Routing approaches like BFR [1], use Bloom Filters (BFs) to advertise all provided content objects, which consumes valuable bandwidth and storage resources. This strategy is inefficient as clients request only a small number of the provided content objects and they do not need the content advertisement information for all provided content objects. In this paper, we propose a novel routing algorithm for NDN called pull-based BFR in which servers only advertise the demanded file names. We compare the performance of pull-based BFR with original BFR and with a flooding-assisted routing protocol. Our experimental evaluations show that pull-based BFR outperforms original BFR in terms of communication overhead needed for content advertisements, average roundtrip delay, memory resources needed for storing content advertisements at clients and routers, and the impact of false positive reports on routing. The comparisons also show that pull-based BFR outperforms flooding-assisted routing in terms of average round-trip delay.
△ Less
Submitted 28 September, 2018;
originally announced September 2018.
-
Answering Hindsight Queries with Lifted Dynamic Junction Trees
Authors:
Marcel Gehrke,
Tanya Braun,
Ralf Möller
Abstract:
The lifted dynamic junction tree algorithm (LDJT) efficiently answers filtering and prediction queries for probabilistic relational temporal models by building and then reusing a first-order cluster representation of a knowledge base for multiple queries and time steps. We extend LDJT to (i) solve the smoothing inference problem to answer hindsight queries by introducing an efficient backward pass…
▽ More
The lifted dynamic junction tree algorithm (LDJT) efficiently answers filtering and prediction queries for probabilistic relational temporal models by building and then reusing a first-order cluster representation of a knowledge base for multiple queries and time steps. We extend LDJT to (i) solve the smoothing inference problem to answer hindsight queries by introducing an efficient backward pass and (ii) discuss different options to instantiate a first-order cluster representation during a backward pass. Further, our relational forward backward algorithm makes hindsight queries to the very beginning feasible. LDJT answers multiple temporal queries faster than the static lifted junction tree algorithm on an unrolled model, which performs smoothing during message passing.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Preventing Unnecessary Groundings in the Lifted Dynamic Junction Tree Algorithm
Authors:
Marcel Gehrke,
Tanya Braun,
Ralf Möller
Abstract:
The lifted dynamic junction tree algorithm (LDJT) efficiently answers filtering and prediction queries for probabilistic relational temporal models by building and then reusing a first-order cluster representation of a knowledge base for multiple queries and time steps. Unfortunately, a non-ideal elimination order can lead to groundings even though a lifted run is possible for a model. We extend L…
▽ More
The lifted dynamic junction tree algorithm (LDJT) efficiently answers filtering and prediction queries for probabilistic relational temporal models by building and then reusing a first-order cluster representation of a knowledge base for multiple queries and time steps. Unfortunately, a non-ideal elimination order can lead to groundings even though a lifted run is possible for a model. We extend LDJT (i) to identify unnecessary groundings while proceeding in time and (ii) to prevent groundings by delaying eliminations through changes in a temporal first-order cluster representation. The extended version of LDJT answers multiple temporal queries orders of magnitude faster than the original version.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Fusing First-order Knowledge Compilation and the Lifted Junction Tree Algorithm
Authors:
Tanya Braun,
Ralf Möller
Abstract:
Standard approaches for inference in probabilistic formalisms with first-order constructs include lifted variable elimination (LVE) for single queries as well as first-order knowledge compilation (FOKC) based on weighted model counting. To handle multiple queries efficiently, the lifted junction tree algorithm (LJT) uses a first-order cluster representation of a model and LVE as a subroutine in it…
▽ More
Standard approaches for inference in probabilistic formalisms with first-order constructs include lifted variable elimination (LVE) for single queries as well as first-order knowledge compilation (FOKC) based on weighted model counting. To handle multiple queries efficiently, the lifted junction tree algorithm (LJT) uses a first-order cluster representation of a model and LVE as a subroutine in its computations. For certain inputs, the implementations of LVE and, as a result, LJT ground parts of a model where FOKC has a lifted run. The purpose of this paper is to prepare LJT as a backbone for lifted inference and to use any exact inference algorithm as subroutine. Using FOKC in LJT allows us to compute answers faster than LJT, LVE, and FOKC for certain inputs.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Room Recognition Using Discriminative Ensemble Learning with Hidden Markov Models for Smartphones
Authors:
Jose Luis Carrera V.,
Zhongliang Zhao,
Torsten Braun
Abstract:
An accurate room localization system is a powerful tool for providing location-based services. Considering that people spend most of their time indoors, indoor localization systems are becoming increasingly important in designing smart environments. In this work, we propose an efficient ensemble learning method to provide room level localization in smart buildings. Our proposed localization method…
▽ More
An accurate room localization system is a powerful tool for providing location-based services. Considering that people spend most of their time indoors, indoor localization systems are becoming increasingly important in designing smart environments. In this work, we propose an efficient ensemble learning method to provide room level localization in smart buildings. Our proposed localization method achieves high room-level localization accuracy by combining Hidden Markov Models with simple discriminative learning methods. The localization algorithms are designed for a terminal-based system, which consists of commercial smartphones and Wi-Fi access points. We conduct experimental studies to evaluate our system in an office-like indoor environment. Experiment results show that our system can overcome traditional individual machine learning and ensemble learning approaches.
△ Less
Submitted 24 April, 2018;
originally announced April 2018.
-
Discriminative Learning-based Smartphone Indoor Localization
Authors:
Jose Luis V. Carrera,
Zhongliang Zhao,
Torsten Braun,
Haiyong Luo,
Fang Zhao
Abstract:
Due to the growing area of ubiquitous mobile applications, indoor localization of smartphones has become an interesting research topic. Most of the current indoor localization systems rely on intensive site survey to achieve high accuracy. In this work, we propose an efficient smartphones indoor localization system that is able to reduce the site survey effort while still achieving high localizati…
▽ More
Due to the growing area of ubiquitous mobile applications, indoor localization of smartphones has become an interesting research topic. Most of the current indoor localization systems rely on intensive site survey to achieve high accuracy. In this work, we propose an efficient smartphones indoor localization system that is able to reduce the site survey effort while still achieving high localization accuracy. Our system is built by fusing a variety of signals, such as Wi-Fi received signal strength indicator, magnetic field and floor plan information in an enhanced particle filter. To achieve high and stable performance, we first apply discriminative learning models to integrate Wi-Fi and magnetic field readings to achieve room level landmark detection. Further, we integrate landmark detection, range-based localization models, with a graph-based discretized system state representation. Because our approach requires only discriminative learning-based room level landmark detections, the time spent in the learning phase is significantly reduced compared to traditional Wi-Fi fingerprinting or landmark-based approaches. We conduct experimental studies to evaluate our system in an office-like indoor environment. Experiment results show that our system can significantly reduce the learning efforts, and the localization method can achieve performance with an average localization error of 1.55 meters.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.
-
CHANG-ES XI: Circular Polarization in the Cores of Nearby Galaxies
Authors:
Judith A Irwin,
Richard N. Henriksen,
Marek Wezgowiec,
Ancor Damas-Segovia,
Q. Daniel Wang,
Marita Krause,
George Heald,
Ralf-Juergen Dettmar,
Jiang-Tao Li,
Theresa Wiegert,
Yelena Stein,
Timothy T. Braun,
Jisung Im,
Philip Schmidt,
Scott Macdonald,
Arpad Miskolczi,
Alison Merritt,
S. C. Mora-Partiarroyo,
D. J. Saikia,
Carlos Sotomayor,
Yang Yang
Abstract:
We detect 5 galaxies in the CHANG-ES (Continuum Halos in Nearby Galaxies -- an EVLA Survey) sample that show circular polarization (CP) at L-band in our high resolution data sets. Two of the galaxies (NGC~4388 and NGC~4845) show strong Stokes $V/I\,\equiv\,m_C\,\sim\,2$\%, two (NGC~660 and NGC~3628) have values of $m_C\sim \,0.3$\%, and NGC~3079 is a marginal detection at $m_C\sim \,0.2$\%. The tw…
▽ More
We detect 5 galaxies in the CHANG-ES (Continuum Halos in Nearby Galaxies -- an EVLA Survey) sample that show circular polarization (CP) at L-band in our high resolution data sets. Two of the galaxies (NGC~4388 and NGC~4845) show strong Stokes $V/I\,\equiv\,m_C\,\sim\,2$\%, two (NGC~660 and NGC~3628) have values of $m_C\sim \,0.3$\%, and NGC~3079 is a marginal detection at $m_C\sim \,0.2$\%. The two strongest $m_C$ galaxies also have the most luminous X-ray cores and the strongest internal absorption in X-rays. We have expanded on our previous Faraday conversion interpretation and analysis and provide analytical expressions for the expected $V$ signal for a general case in which the cosmic ray electron energy spectral index can take on any value. We provide examples as to how such expressions could be used to estimate magnetic field strengths and the lower energy cutoff for CR electrons. Four out of our detections are {\it resolved}, showing unique structures, including a {\it jet} in NGC~4388 and a CP `conversion disk' in NGC~4845. The conversion disk is inclined to the galactic disk but is perpendicular to a possible outflow direction. Such CP structures have never before been seen in any galaxy to our knowledge. None of the galaxy cores show linear polarization at L-band. Thus CP may provide a unique probe of physical conditions deep into radio AGNs.
△ Less
Submitted 16 February, 2018;
originally announced February 2018.
-
Social Influence (Deep) Learning for Human Behavior Prediction
Authors:
Luca Luceri,
Torsten Braun,
Silvia Giordano
Abstract:
Influence propagation in social networks has recently received large interest. In fact, the understanding of how influence propagates among subjects in a social network opens the way to a growing number of applications. Many efforts have been made to quantitatively measure the influence probability between pairs of subjects. Existing approaches have two main drawbacks: (i) they assume that the inf…
▽ More
Influence propagation in social networks has recently received large interest. In fact, the understanding of how influence propagates among subjects in a social network opens the way to a growing number of applications. Many efforts have been made to quantitatively measure the influence probability between pairs of subjects. Existing approaches have two main drawbacks: (i) they assume that the influence probabilities are independent of each other, and (ii) they do not consider the actions not performed by the subject (but performed by her/his friends) to learn these probabilities. In this paper, we propose to address these limitations by employing a deep learning approach. We introduce a Deep Neural Network (DNN) framework that has the capability for both modeling social influence and for predicting human behavior. To empirically validate the proposed framework, we conduct experiments on a real-life (offline) dataset of an Event-Based Social Network (EBSN). Results indicate that our approach outperforms existing solutions, by efficiently resolving the limitations previously described.
△ Less
Submitted 29 January, 2018;
originally announced January 2018.
-
On the Social Influence in Human Behavior: Physical, Homophily, and Social Communities
Authors:
Luca Luceri,
Alberto Vancheri,
Torsten Braun,
Silvia Giordano
Abstract:
Understanding the forces governing human behavior and social dynamics is a challenging problem. Individuals' decisions and actions are affected by interlaced factors, such as physical location, homophily, and social ties. In this paper, we propose to examine the role that distinct communities, linked to these factors, play as sources of social influence. The ego network is typically used in the so…
▽ More
Understanding the forces governing human behavior and social dynamics is a challenging problem. Individuals' decisions and actions are affected by interlaced factors, such as physical location, homophily, and social ties. In this paper, we propose to examine the role that distinct communities, linked to these factors, play as sources of social influence. The ego network is typically used in the social influence analysis. Our hypothesis is that individuals are embedded in communities not only related to their direct social relationships, but that involve different and complex forces. We analyze physical, homophily, and social communities to evaluate their relation with subjects' behavior. We prove that social influence is correlated with these communities, and each one of them is (differently) significant for individuals. We define community-based features, which reflect the subject involvement in these groups, and we use them with a supervised learning algorithm to predict subject participation in social events. Results indicate that both communities and ego network are relevant sources of social influence, confirming that the ego network alone is not sufficient to explain this phenomenon. Moreover, we classify users according to the degree of social influence they experienced with respect to their groups, recognizing classes of behavioral phenotypes. To our knowledge, this is the first work that proves the existence of phenotypes related to the social influence phenomenon.
△ Less
Submitted 29 January, 2018;
originally announced January 2018.
-
A topology-oblivious routing protocol for NDN-VANETs
Authors:
Eirini Kalogeiton,
Thomas Kolonko,
Torsten Braun
Abstract:
Vehicular Ad Hoc Networks (VANETs) are characterized by intermittent connectivity, which leads to failures of end-to-end paths between nodes. Named Data Networking (NDN) is a network paradigm that deals with such problems, since information is forwarded based on content and not on the location of the hosts. In this work, we propose an enhanced routing protocol of our previous topology-oblivious Mu…
▽ More
Vehicular Ad Hoc Networks (VANETs) are characterized by intermittent connectivity, which leads to failures of end-to-end paths between nodes. Named Data Networking (NDN) is a network paradigm that deals with such problems, since information is forwarded based on content and not on the location of the hosts. In this work, we propose an enhanced routing protocol of our previous topology-oblivious Multihop, Multipath, and Multichannel NDN for VANETs (MMM-VNDN) routing strategy that exploits several paths to achieve more efficient content retrieval. Our new enhanced protocol, i mproved MMM-VNDN (iMMM-VNDN), creates paths between a requester node and a provider by broadcasting Interest messages. When a provider responds with a Data message to a broadcast Interest message, we create unicast routes between nodes, by using the MAC address(es) as the distinct address(es) of each node. iMMM-VNDN extracts and thus creates routes based on the MAC addresses from the strategy layer of an NDN node. Simulation results show that our routing strategy performs better than other state of the art strategies in terms of Interest Satisfaction Rate, while kee** the latency and jitter of messages low.
△ Less
Submitted 19 November, 2018; v1 submitted 27 November, 2017;
originally announced November 2017.
-
P-splines with an l1 penalty for repeated measures
Authors:
Brian D. Segal,
Michael R. Elliott,
Thomas Braun,
Hui Jiang
Abstract:
P-splines are penalized B-splines, in which finite order differences in coefficients are typically penalized with an $\ell_2$ norm. P-splines can be used for semiparametric regression and can include random effects to account for within-subject variability. In addition to $\ell_2$ penalties, $\ell_1$-type penalties have been used in nonparametric and semiparametric regression to achieve greater fl…
▽ More
P-splines are penalized B-splines, in which finite order differences in coefficients are typically penalized with an $\ell_2$ norm. P-splines can be used for semiparametric regression and can include random effects to account for within-subject variability. In addition to $\ell_2$ penalties, $\ell_1$-type penalties have been used in nonparametric and semiparametric regression to achieve greater flexibility, such as in locally adaptive regression splines, $\ell_1$ trend filtering, and the fused lasso additive model. However, there has been less focus on using $\ell_1$ penalties in P-splines, particularly for estimating conditional means.
In this paper, we demonstrate the potential benefits of using an $\ell_1$ penalty in P-splines with an emphasis on fitting non-smooth functions. We propose an estimation procedure using the alternating direction method of multipliers and cross validation, and provide degrees of freedom and approximate confidence bands based on a ridge approximation to the $\ell_1$ penalized fit. We also demonstrate potential uses through simulations and an application to electrodermal activity data collected as part of a stress study.
△ Less
Submitted 22 July, 2018; v1 submitted 27 July, 2017;
originally announced July 2017.
-
Impact and Recovery Process of Mini Flash Crashes: An Empirical Study
Authors:
Tobias Braun,
Jonas A. Fiegen,
Daniel C. Wagner,
Sebastian M. Krause,
Thomas Guhr
Abstract:
In an Ultrafast Extreme Event (or Mini Flash Crash), the price of a traded stock increases or decreases strongly within milliseconds. We present a detailed study of Ultrafast Extreme Events in stock market data. In contrast to popular belief, our analysis suggests that most of the Ultrafast Extreme Events are not primarily due to High Frequency Trading. In at least 60 percent of the observed Ultra…
▽ More
In an Ultrafast Extreme Event (or Mini Flash Crash), the price of a traded stock increases or decreases strongly within milliseconds. We present a detailed study of Ultrafast Extreme Events in stock market data. In contrast to popular belief, our analysis suggests that most of the Ultrafast Extreme Events are not primarily due to High Frequency Trading. In at least 60 percent of the observed Ultrafast Extreme Events, the main cause for the events are large market orders. In times of financial crisis, large market orders are more likely which can be linked to the significant increase of Ultrafast Extreme Events occurrences. Furthermore, we analyze the 100 trades following each Ultrafast Extreme Events. While we observe a tendency of the prices to partially recover, less than 40 percent recover completely. On the other hand we find 25 percent of the Ultrafast Extreme Events to be almost recovered after only one trade which differs from the usually found price impact of market orders.
△ Less
Submitted 18 July, 2017;
originally announced July 2017.