-
PhoTOS: Topology Optimization of Photonic Components using a Shape Library
Authors:
Rahul Kumar Padhy,
Aaditya Chandrasekhar
Abstract:
Topology Optimization (TO) holds the promise of designing next-generation compact and efficient photonic components. However, ensuring the optimized designs comply with fabrication constraints imposed by semiconductor foundries remains a challenge. This work presents a TO framework that guarantees designs satisfy fabrication criteria, particularly minimum feature size and separation. Leveraging re…
▽ More
Topology Optimization (TO) holds the promise of designing next-generation compact and efficient photonic components. However, ensuring the optimized designs comply with fabrication constraints imposed by semiconductor foundries remains a challenge. This work presents a TO framework that guarantees designs satisfy fabrication criteria, particularly minimum feature size and separation. Leveraging recent advancements in machine learning and feature map** methods, our approach constructs components by transforming shapes from a predefined library, simplifying constraint enforcement. Specifically, we introduce a Convo-implicit Variational Autoencoder to encode the discrete shape library into a differentiable space, enabling gradient-based optimization. The efficacy of our framework is demonstrated through the design of several common photonic components.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Model-Based Inference and Experimental Design for Interference Using Partial Network Data
Authors:
Steven Wilkins Reeves,
Shane Lubold,
Arun G. Chandrasekhar,
Tyler H. McCormick
Abstract:
The stable unit treatment value assumption states that the outcome of an individual is not affected by the treatment statuses of others, however in many real world applications, treatments can have an effect on many others beyond the immediately treated. Interference can generically be thought of as mediated through some network structure. In many empirically relevant situations however, complete…
▽ More
The stable unit treatment value assumption states that the outcome of an individual is not affected by the treatment statuses of others, however in many real world applications, treatments can have an effect on many others beyond the immediately treated. Interference can generically be thought of as mediated through some network structure. In many empirically relevant situations however, complete network data (required to adjust for these spillover effects) are too costly or logistically infeasible to collect. Partially or indirectly observed network data (e.g., subsamples, aggregated relational data (ARD), egocentric sampling, or respondent-driven sampling) reduce the logistical and financial burden of collecting network data, but the statistical properties of treatment effect adjustments from these design strategies are only beginning to be explored. In this paper, we present a framework for the estimation and inference of treatment effect adjustments using partial network data through the lens of structural causal models. We also illustrate procedures to assign treatments using only partial network data, with the goal of either minimizing estimator variance or optimally seeding. We derive single network asymptotic results applicable to a variety of choices for an underlying graph model. We validate our approach using simulated experiments on observed graphs with applications to information diffusion in India and Malawi.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
AMGPT: a Large Language Model for Contextual Querying in Additive Manufacturing
Authors:
Achuth Chandrasekhar,
Jonathan Chan,
Francis Ogoke,
Olabode Ajenifujah,
Amir Barati Farimani
Abstract:
Generalized large language models (LLMs) such as GPT-4 may not provide specific answers to queries formulated by materials science researchers. These models may produce a high-level outline but lack the capacity to return detailed instructions on manufacturing and material properties of novel alloys. Enhancing a smaller model with specialized domain knowledge may provide an advantage over large la…
▽ More
Generalized large language models (LLMs) such as GPT-4 may not provide specific answers to queries formulated by materials science researchers. These models may produce a high-level outline but lack the capacity to return detailed instructions on manufacturing and material properties of novel alloys. Enhancing a smaller model with specialized domain knowledge may provide an advantage over large language models which cannot be retrained quickly enough to keep up with the rapid pace of research in metal additive manufacturing (AM). We introduce "AMGPT," a specialized LLM text generator designed for metal AM queries. The goal of AMGPT is to assist researchers and users in navigating the extensive corpus of literature in AM. Instead of training from scratch, we employ a pre-trained Llama2-7B model from Hugging Face in a Retrieval-Augmented Generation (RAG) setup, utilizing it to dynamically incorporate information from $\sim$50 AM papers and textbooks in PDF format. Mathpix is used to convert these PDF documents into TeX format, facilitating their integration into the RAG pipeline managed by LlamaIndex. Expert evaluations of this project highlight that specific embeddings from the RAG setup accelerate response times and maintain coherence in the generated text.
△ Less
Submitted 24 May, 2024;
originally announced June 2024.
-
PoseGravity: Pose Estimation from Points and Lines with Axis Prior
Authors:
Akshay Chandrasekhar
Abstract:
This paper presents a new algorithm to estimate absolute camera pose given an axis of the camera's rotation matrix. Current algorithms solve the problem via algebraic solutions on limited input domains. This paper shows that the problem can be solved efficiently by finding the intersection points of a hyperbola and the unit circle. The solution can flexibly accommodate combinations of point and li…
▽ More
This paper presents a new algorithm to estimate absolute camera pose given an axis of the camera's rotation matrix. Current algorithms solve the problem via algebraic solutions on limited input domains. This paper shows that the problem can be solved efficiently by finding the intersection points of a hyperbola and the unit circle. The solution can flexibly accommodate combinations of point and line features in minimal and overconstrained configurations. In addition, the two special cases of planar and minimal configurations are identified to yield simpler closed-form solutions. Extensive experiments validate the approach.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
VoroTO: Multiscale Topology Optimization of Voronoi Structures using Surrogate Neural Networks
Authors:
Rahul Kumar Padhy,
Krishnan Suresh,
Aaditya Chandrasekhar
Abstract:
Cellular structures found in nature exhibit remarkable properties such as high strength, high energy absorption, excellent thermal/acoustic insulation, and fluid transfusion. Many of these structures are Voronoi-like; therefore researchers have proposed Voronoi multi-scale designs for a wide variety of engineering applications. However, designing such structures can be computationally prohibitive…
▽ More
Cellular structures found in nature exhibit remarkable properties such as high strength, high energy absorption, excellent thermal/acoustic insulation, and fluid transfusion. Many of these structures are Voronoi-like; therefore researchers have proposed Voronoi multi-scale designs for a wide variety of engineering applications. However, designing such structures can be computationally prohibitive due to the multi-scale nature of the underlying analysis and optimization. In this work, we propose the use of a neural network (NN) to carry out efficient topology optimization (TO) of multi-scale Voronoi structures. The NN is first trained using Voronoi parameters (cell site locations, thickness, orientation, and anisotropy) to predict the homogenized constitutive properties. This network is then integrated into a conventional TO framework to minimize structural compliance subject to a volume constraint. Special considerations are given for ensuring positive definiteness of the constitutive matrix and promoting macroscale connectivity. Several numerical examples are provided to showcase the proposed method.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Robustly estimating heterogeneity in factorial data using Rashomon Partitions
Authors:
Aparajithan Venkateswaran,
Anirudh Sankar,
Arun G. Chandrasekhar,
Tyler H. McCormick
Abstract:
Many statistical analyses, in both observational data and randomized control trials, ask: how does the outcome of interest vary with combinations of observable covariates? How do various drug combinations affect health outcomes, or how does technology adoption depend on incentives and demographics? Our goal is to partition this factorial space into "pools" of covariate combinations where the outco…
▽ More
Many statistical analyses, in both observational data and randomized control trials, ask: how does the outcome of interest vary with combinations of observable covariates? How do various drug combinations affect health outcomes, or how does technology adoption depend on incentives and demographics? Our goal is to partition this factorial space into "pools" of covariate combinations where the outcome differs across the pools (but not within a pool). Existing approaches (i) search for a single "optimal" partition under assumptions about the association between covariates or (ii) sample from the entire set of possible partitions. Both these approaches ignore the reality that, especially with correlation structure in covariates, many ways to partition the covariate space may be statistically indistinguishable, despite very different implications for policy or science. We develop an alternative perspective, called Rashomon Partition Sets (RPSs). Each item in the RPS partitions the space of covariates using a tree-like geometry. RPSs incorporate all partitions that have posterior values near the maximum a posteriori partition, even if they offer substantively different explanations, and do so using a prior that makes no assumptions about associations between covariates. This prior is the $\ell_0$ prior, which we show is minimax optimal. Given the RPS we calculate the posterior of any measurable function of the feature effects vector on outcomes, conditional on being in the RPS. We also characterize approximation error relative to the entire posterior and provide bounds on the size of the RPS. Simulations demonstrate this framework allows for robust conclusions relative to conventional regularization techniques. We apply our method to three empirical settings: price effects on charitable giving, chromosomal structure (telomere length), and the introduction of microfinance.
△ Less
Submitted 25 June, 2024; v1 submitted 2 April, 2024;
originally announced April 2024.
-
Non-robustness of diffusion estimates on networks with measurement error
Authors:
Arun G. Chandrasekhar,
Paul Goldsmith-Pinkham,
Tyler H. McCormick,
Samuel Thau,
Jerry Wei
Abstract:
Network diffusion models are used to study things like disease transmission, information spread, and technology adoption. However, small amounts of mismeasurement are extremely likely in the networks constructed to operationalize these models. We show that estimates of diffusions are highly non-robust to this measurement error. First, we show that even when measurement error is vanishingly small,…
▽ More
Network diffusion models are used to study things like disease transmission, information spread, and technology adoption. However, small amounts of mismeasurement are extremely likely in the networks constructed to operationalize these models. We show that estimates of diffusions are highly non-robust to this measurement error. First, we show that even when measurement error is vanishingly small, such that the share of missed links is close to zero, forecasts about the extent of diffusion will greatly underestimate the truth. Second, a small mismeasurement in the identity of the initial seed generates a large shift in the locations of expected diffusion path. We show that both of these results still hold when the vanishing measurement error is only local in nature. Such non-robustness in forecasting exists even under conditions where the basic reproductive number is consistently estimable. Possible solutions, such as estimating the measurement error or implementing widespread detection efforts, still face difficulties because the number of missed links are so small. Finally, we conduct Monte Carlo simulations on simulated networks, and real networks from three settings: travel data from the COVID-19 pandemic in the western US, a mobile phone marketing campaign in rural India, and in an insurance experiment in China.
△ Less
Submitted 11 June, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
TOMAS: Topology Optimization of Multiscale Fluid Devices using Variational Autoencoders and Super-Shapes
Authors:
Rahul Kumar Padhy,
Krishnan Suresh,
Aaditya Chandrasekhar
Abstract:
In this paper, we present a framework for multiscale topology optimization of fluid-flow devices. The objective is to minimize dissipated power, subject to a desired contact-area. The proposed strategy is to design optimal microstructures in individual finite element cells, while simultaneously optimizing the overall fluid flow. In particular, parameterized super-shape microstructures are chosen h…
▽ More
In this paper, we present a framework for multiscale topology optimization of fluid-flow devices. The objective is to minimize dissipated power, subject to a desired contact-area. The proposed strategy is to design optimal microstructures in individual finite element cells, while simultaneously optimizing the overall fluid flow. In particular, parameterized super-shape microstructures are chosen here to represent microstructures since they exhibit a wide range of permeability and contact area. To avoid repeated homogenization, a finite set of these super-shapes are analyzed a priori, and a variational autoencoder (VAE) is trained on their fluid constitutive properties (permeability), contact area and shape parameters. The resulting differentiable latent space is integrated with a coordinate neural network to carry out a global multi-scale fluid flow optimization. The latent space enables the use of new microstructures that were not present in the original data-set. The proposed method is illustrated using numerous examples in 2D.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
General Covariance-Based Conditions for Central Limit Theorems with Dependent Triangular Arrays
Authors:
Arun G. Chandrasekhar,
Matthew O. Jackson,
Tyler H. McCormick,
Vydhourie Thiyageswaran
Abstract:
We present a general central limit theorem with simple, easy-to-check covariance-based sufficient conditions for triangular arrays of random vectors when all variables could be interdependent. The result is constructed from Stein's method, but the conditions are distinct from related work. We show that these covariance conditions nest standard assumptions studied in the literature such as $M$-depe…
▽ More
We present a general central limit theorem with simple, easy-to-check covariance-based sufficient conditions for triangular arrays of random vectors when all variables could be interdependent. The result is constructed from Stein's method, but the conditions are distinct from related work. We show that these covariance conditions nest standard assumptions studied in the literature such as $M$-dependence, mixing random fields, non-mixing autoregressive processes, and dependency graphs, which themselves need not imply each other. This permits researchers to work with high-level but intuitive conditions based on overall correlation instead of more complicated and restrictive conditions such as strong mixing in random fields that may not have any obvious micro-foundation. As examples of the implications, we show how the theorem implies asymptotic normality in estimating: treatment effects with spillovers in more settings than previously admitted, covariance matrices, processes with global dependencies such as epidemic spread and information diffusion, and spatial process with Matérn dependencies.
△ Less
Submitted 14 December, 2023; v1 submitted 23 August, 2023;
originally announced August 2023.
-
PolyTO: Structural Topology Optimization using Convex Polygons
Authors:
Aaditya Chandrasekhar
Abstract:
In this paper, we propose a topology optimization (TO) framework where the design is parameterized by a set of convex polygons. Extending feature map** methods in TO, the representation allows for direct extraction of the geometry. In addition, the method allows one to impose geometric constraints such as feature size control directly on the polygons that are otherwise difficult to impose in den…
▽ More
In this paper, we propose a topology optimization (TO) framework where the design is parameterized by a set of convex polygons. Extending feature map** methods in TO, the representation allows for direct extraction of the geometry. In addition, the method allows one to impose geometric constraints such as feature size control directly on the polygons that are otherwise difficult to impose in density or level set based approaches. The use of polygons provides for more more varied shapes than simpler primitives like bars, plates, or circles. The polygons are defined as the feasible set of a collection of halfspaces. Varying the halfspace's parameters allows for us to obtain diverse configurations of the polygons. Furthermore, the halfspaces are differentiably mapped onto a background mesh to allow for analysis and gradient driven optimization. The proposed framework is illustrated through numerous examples of 2D structural compliance minimization TO. Some of the key limitations and future research are also summarized.
△ Less
Submitted 7 May, 2023;
originally announced May 2023.
-
FluTO: Graded Multiscale Fluid Topology Optimization using Neural Networks
Authors:
Rahul Kumar Padhy,
Aaditya Chandrasekhar,
Krishnan Suresh
Abstract:
Fluid-flow devices with low dissipation, but high contact area, are of importance in many applications. A well-known strategy to design such devices is multi-scale topology optimization (MTO), where optimal microstructures are designed within each cell of a discretized domain. Unfortunately, MTO is computationally very expensive since one must perform homogenization of the evolving microstructures…
▽ More
Fluid-flow devices with low dissipation, but high contact area, are of importance in many applications. A well-known strategy to design such devices is multi-scale topology optimization (MTO), where optimal microstructures are designed within each cell of a discretized domain. Unfortunately, MTO is computationally very expensive since one must perform homogenization of the evolving microstructures, during each step of the homogenization process. As an alternate, we propose here a graded multiscale topology optimization (GMTO) for designing fluid-flow devices. In the proposed method, several pre-selected but size-parameterized and orientable microstructures are used to fill the domain optimally. GMTO significantly reduces the computation while retaining many of the benefits of MTO.
In particular, GMTO is implemented here using a neural-network (NN) since: (1) homogenization can be performed off-line, and used by the NN during optimization, (2) it enables continuous switching between microstructures during optimization, (3) the number of design variables and computational effort is independent of number of microstructure used, and, (4) it supports automatic differentiation, thereby eliminating manual sensitivity analysis. Several numerical results are presented to illustrate the proposed framework.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
A Generalized Framework for Microstructural Optimization using Neural Networks
Authors:
Saketh Sridhara,
Aaditya Chandrasekhar,
Krishnan Suresh
Abstract:
Microstructures, i.e., architected materials, are designed today, typically, by maximizing an objective, such as bulk modulus, subject to a volume constraint. However, in many applications, it is often more appropriate to impose constraints on other physical quantities of interest. In this paper, we consider such generalized microstructural optimization problems where any of the microstructural qu…
▽ More
Microstructures, i.e., architected materials, are designed today, typically, by maximizing an objective, such as bulk modulus, subject to a volume constraint. However, in many applications, it is often more appropriate to impose constraints on other physical quantities of interest. In this paper, we consider such generalized microstructural optimization problems where any of the microstructural quantities, namely, bulk, shear, Poisson ratio, or volume, can serve as the objective, while the remaining can serve as constraints. In particular, we propose here a neural-network (NN) framework to solve such problems. The framework relies on the classic density formulation of microstructural optimization, but the density field is represented through the NN's weights and biases. The main characteristics of the proposed NN framework are: (1) it supports automatic differentiation, eliminating the need for manual sensitivity derivations, (2) smoothing filters are not required due to implicit filtering, (3) the framework can be easily extended to multiple-materials, and (4) a high-resolution microstructural topology can be recovered through a simple post-processing step. The framework is illustrated through a variety of microstructural optimization problems.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
FRC-TOuNN: Topology Optimization of Continuous Fiber Reinforced Composites using Neural Network
Authors:
Aaditya Chandrasekhar,
Amir Mirzendehdel,
Morad Behandish,
Krishnan Suresh
Abstract:
In this paper, we present a topology optimization (TO) framework to simultaneously optimize the matrix topology and fiber distribution of functionally graded continuous fiber-reinforced composites (FRC). Current approaches in density-based TO for FRC use the underlying finite element mesh both for analysis and design representation. This poses several limitations while enforcing sub-element fiber…
▽ More
In this paper, we present a topology optimization (TO) framework to simultaneously optimize the matrix topology and fiber distribution of functionally graded continuous fiber-reinforced composites (FRC). Current approaches in density-based TO for FRC use the underlying finite element mesh both for analysis and design representation. This poses several limitations while enforcing sub-element fiber spacing and generating high-resolution continuous fibers. In contrast, we propose a mesh-independent representation based on a neural network (NN) both to capture the matrix topology and fiber distribution. The implicit NN-based representation enables geometric and material queries at a higher resolution than a mesh discretization. This leads to the accurate extraction of functionally-graded continuous fibers. Further, by integrating the finite element simulations into the NN computational framework, we can leverage automatic differentiation for end-to-end automated sensitivity analysis, i.e., we no longer need to manually derive cumbersome sensitivity expressions. We demonstrate the effectiveness and computational efficiency of the proposed method through several numerical examples involving various objective functions. We also show that the optimized continuous fiber reinforced composites can be directly fabricated at high resolution using additive manufacturing.
△ Less
Submitted 7 May, 2022;
originally announced May 2022.
-
GM-TOuNN: Graded Multiscale Topology Optimization using Neural Networks
Authors:
Aaditya Chandrasekhar,
Saketh Sridhara,
Krishnan Suresh
Abstract:
Multiscale topology optimization (M-TO) entails generating an optimal global topology, and an optimal set of microstructures at a smaller scale, for a physics-constrained problem. With the advent of additive manufacturing, M-TO has gained significant prominence. However, generating optimal microstructures at various locations can be computationally very expensive. As an alternate, graded multiscal…
▽ More
Multiscale topology optimization (M-TO) entails generating an optimal global topology, and an optimal set of microstructures at a smaller scale, for a physics-constrained problem. With the advent of additive manufacturing, M-TO has gained significant prominence. However, generating optimal microstructures at various locations can be computationally very expensive. As an alternate, graded multiscale topology optimization (GM-TO) has been proposed where one or more pre-selected and graded (parameterized) microstructural topologies are used to fill the domain optimally. This leads to a significant reduction in computation while retaining many of the benefits of M-TO.
A successful GM-TO framework must: (1) be capable of efficiently handling numerous pre-selected microstructures, (2) be able to continuously switch between these microstructures during optimization, (3) ensure that the partition of unity is satisfied, and (4) discourage microstructure mixing at termination.
In this paper, we propose to meet these requirements by exploiting the unique classification capacity of neural networks. Specifically, we propose a graded multiscale topology optimization using neural-network (GM-TOuNN) framework with the following features: (1) the number of design variables is only weakly dependent on the number of pre-selected microstructures, (2) it guarantees partition of unity while discouraging microstructure mixing, and (3) it supports automatic differentiation, thereby eliminating manual sensitivity analysis. The proposed framework is illustrated through several examples.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Integrating Material Selection with Design Optimization via Neural Networks
Authors:
Aaditya Chandrasekhar,
Saketh Sridhara,
Krishnan Suresh
Abstract:
The engineering design process often entails optimizing the underlying geometry while simultaneously selecting a suitable material. For a certain class of simple problems, the two are separable where, for example, one can first select an optimal material, and then optimize the geometry. However, in general, the two are not separable. Furthermore, the discrete nature of material selection is not co…
▽ More
The engineering design process often entails optimizing the underlying geometry while simultaneously selecting a suitable material. For a certain class of simple problems, the two are separable where, for example, one can first select an optimal material, and then optimize the geometry. However, in general, the two are not separable. Furthermore, the discrete nature of material selection is not compatible with gradient-based geometry optimization, making simultaneous optimization challenging.
In this paper, we propose the use of variational autoencoders (VAE) for simultaneous optimization. First, a data-driven VAE is used to project the discrete material database onto a continuous and differentiable latent space. This is then coupled with a fully-connected neural network, embedded with a finite-element solver, to simultaneously optimize the material and geometry. The neural-network's built-in gradient optimizer and back-propagation are exploited during optimization.
The proposed framework is demonstrated using trusses, where an optimal material needs to be chosen from a database, while simultaneously optimizing the cross-sectional areas of the truss members. Several numerical examples illustrate the efficacy of the proposed framework. The Python code used in these experiments is available at github.com/UW-ERSL/MaTruss
△ Less
Submitted 23 December, 2021;
originally announced December 2021.
-
Deriving the bulk properties of solar wind electrons observed by Solar Orbiter: A preliminary study of electron plasma thermodynamics
Authors:
Georgios Nicolaou,
Robert T. Wicks,
Christopher J. Owen,
Dhiren O. Kataria,
Anekallu Chandrasekhar,
Gethyn R. Lewis,
Daniel Verscharen,
Vito Fortunato,
Gennaro Mele,
Rossana DeMarco,
Roberto Bruno
Abstract:
We demonstrate the calculation of solar wind electron bulk parameters from recent observations by Solar Wind Analyser Electron Analyser System on board Solar Orbiter. We use our methods to derive the electron bulk parameters in a time interval of a few hours. We attempt a preliminary examination of the polytropic behavior of the electrons by analyzing the derived electron density and temperature.…
▽ More
We demonstrate the calculation of solar wind electron bulk parameters from recent observations by Solar Wind Analyser Electron Analyser System on board Solar Orbiter. We use our methods to derive the electron bulk parameters in a time interval of a few hours. We attempt a preliminary examination of the polytropic behavior of the electrons by analyzing the derived electron density and temperature. Moreover, we discuss the challenges in analyzing the observations due to the spacecraft charging and photo-electron contamination in the energy range < 10 eV.
Aims: We derive bulk parameters of thermal solar wind electrons by analyzing Solar Orbiter observations and we investigate if there is any typical polytropic model that applies to the electron density and temperature fluctuations.
Methods: We use the appropriate transformations to convert the observations to velocity distribution functions in the instrument frame. We then derive the electron bulk parameters by a) calculating the statistical moments of the constructed velocity distribution functions and b) by fitting the constructed distributions with analytical expressions. We firstly test our methods by applying them to an artificial data-set, which we produce by using the forward modeling technique.
Results: The forward model validates the analysis techniques which we use to derive the electron bulk parameters. The calculation of the statistical moments and the fitting method determines bulk parameters that are identical within uncertainty to the input parameters we use to simulate the plasma electrons in the first place. An application of our analysis technique to the data reveals a nearly isothermal electron "core". The results are affected by the spacecraft potential and the photo-electron contamination, which we need to characterize in detail in future analyses.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Length Scale Control in Topology Optimization using Fourier Enhanced Neural Networks
Authors:
Aaditya Chandrasekhar,
Krishnan Suresh
Abstract:
Length scale control is imposed in topology optimization (TO) to make designs amenable to manufacturing and other functional requirements. Broadly, there are two types of length-scale control in TO: \emph {exact} and \emph {approximate}. While the former is desirable, its implementation can be difficult, and is computationally expensive. Approximate length scale control is therefore preferred, and…
▽ More
Length scale control is imposed in topology optimization (TO) to make designs amenable to manufacturing and other functional requirements. Broadly, there are two types of length-scale control in TO: \emph {exact} and \emph {approximate}. While the former is desirable, its implementation can be difficult, and is computationally expensive. Approximate length scale control is therefore preferred, and is often sufficient for early stages of design.
In this paper we propose an approximate length scale control strategy for TO, by extending a recently proposed density-based TO formulation using neural networks (TOuNN). Specifically, we enhance TOuNN with a Fourier space projection, to control the minimum and/or maximum length scales. The proposed method does not involve additional constraints, and the sensitivity computations are automated by expressing the computations in an end-end differentiable fashion using the neural net's library. The proposed method is illustrated through several numerical experiments for single and multi-material designs.
△ Less
Submitted 4 September, 2021;
originally announced September 2021.
-
Doctors and Nurses Social Media Ads Reduced Holiday Travel and COVID-19 infections: A cluster randomized controlled trial in 13 States
Authors:
Emily Breza,
Fatima Cody Stanford,
Marcela Alsan,
M. D. Ph. D.,
Burak Alsan,
Abhijit Banerjee,
Arun G. Chandrasekhar,
Sarah Eichmeyer,
Traci Glushko,
Paul Goldsmith-Pinkham,
Kelly Holland,
Emily Hoppe,
Mohit Karnani,
Sarah Liegl,
Tristan Loisel,
Lucy Ogbu-Nwobodo,
Benjamin A. Olken Carlos Torres,
Pierre-Luc Vautrey,
Erica Warner,
Susan Wootton,
Esther Duflo
Abstract:
During the COVID-19 epidemic, many health professionals started using mass communication on social media to relay critical information and persuade individuals to adopt preventative health behaviors. Our group of clinicians and nurses developed and recorded short video messages to encourage viewers to stay home for the Thanksgiving and Christmas Holidays. We then conducted a two-stage clustered ra…
▽ More
During the COVID-19 epidemic, many health professionals started using mass communication on social media to relay critical information and persuade individuals to adopt preventative health behaviors. Our group of clinicians and nurses developed and recorded short video messages to encourage viewers to stay home for the Thanksgiving and Christmas Holidays. We then conducted a two-stage clustered randomized controlled trial in 820 counties (covering 13 States) in the United States of a large-scale Facebook ad campaign disseminating these messages. In the first level of randomization, we randomly divided the counties into two groups: high intensity and low intensity. In the second level, we randomly assigned zip codes to either treatment or control such that 75% of zip codes in high intensity counties received the treatment, while 25% of zip codes in low intensity counties received the treatment. In each treated zip code, we sent the ad to as many Facebook subscribers as possible (11,954,109 users received at least one ad at Thanksgiving and 23,302,290 users received at least one ad at Christmas). The first primary outcome was aggregate holiday travel, measured using mobile phone location data, available at the county level: we find that average distance travelled in high-intensity counties decreased by -0.993 percentage points (95% CI -1.616, -0.371, p-value 0.002) the three days before each holiday. The second primary outcome was COVID-19 infection at the zip-code level: COVID-19 infections recorded in the two-week period starting five days post-holiday declined by 3.5 percent (adjusted 95% CI [-6.2 percent, -0.7 percent], p-value 0.013) in intervention zip codes compared to control zip codes.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Selecting the Most Effective Nudge: Evidence from a Large-Scale Experiment on Immunization
Authors:
Abhijit Banerjee,
Arun G. Chandrasekhar,
Suresh Dalpath,
Esther Duflo,
John Floretta,
Matthew O. Jackson,
Harini Kannan,
Francine Loza,
Anirudh Sankar,
Anna Schrimpf,
Maheshwor Shrestha
Abstract:
Policymakers often choose a policy bundle that is a combination of different interventions in different dosages. We develop a new technique -- treatment variant aggregation (TVA) -- to select a policy from a large factorial design. TVA pools together policy variants that are not meaningfully different and prunes those deemed ineffective. This allows us to restrict attention to aggregated policy va…
▽ More
Policymakers often choose a policy bundle that is a combination of different interventions in different dosages. We develop a new technique -- treatment variant aggregation (TVA) -- to select a policy from a large factorial design. TVA pools together policy variants that are not meaningfully different and prunes those deemed ineffective. This allows us to restrict attention to aggregated policy variants, consistently estimate their effects on the outcome, and estimate the best policy effect adjusting for the winner's curse. We apply TVA to a large randomized controlled trial that tests interventions to stimulate demand for immunization in Haryana, India. The policies under consideration include reminders, incentives, and local ambassadors for community mobilization. Cross-randomizing these interventions, with different dosages or types of each intervention, yields 75 combinations. The policy with the largest impact (which combines incentives, ambassadors who are information hubs, and reminders) increases the number of immunizations by 44% relative to the status quo. The most cost-effective policy (information hubs, ambassadors, and SMS reminders but no incentives) increases the number of immunizations per dollar by 9.1% relative to status quo.
△ Less
Submitted 12 September, 2022; v1 submitted 19 April, 2021;
originally announced April 2021.
-
AuTO: A Framework for Automatic differentiation in Topology Optimization
Authors:
Aaditya Chandrasekhar,
Saketh Sridhara,
Krishnan Suresh
Abstract:
A critical step in topology optimization (TO) is finding sensitivities. Manual derivation and implementation of the sensitivities can be quite laborious and error-prone, especially for non-trivial objectives, constraints and material models. An alternate approach is to utilize automatic differentiation (AD). While AD has been around for decades, and has also been applied in TO, wider adoption has…
▽ More
A critical step in topology optimization (TO) is finding sensitivities. Manual derivation and implementation of the sensitivities can be quite laborious and error-prone, especially for non-trivial objectives, constraints and material models. An alternate approach is to utilize automatic differentiation (AD). While AD has been around for decades, and has also been applied in TO, wider adoption has largely been absent.
In this educational paper, we aim to reintroduce AD for TO, and make it easily accessible through illustrative codes. In particular, we employ JAX, a high-performance Python library for automatically computing sensitivities from a user defined TO problem. The resulting framework, referred to here as AuTO, is illustrated through several examples in compliance minimization, compliant mechanism design and microstructural design.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
Identifying the latent space geometry of network models through analysis of curvature
Authors:
Shane Lubold,
Arun G. Chandrasekhar,
Tyler H. McCormick
Abstract:
A common approach to modeling networks assigns each node to a position on a low-dimensional manifold where distance is inversely proportional to connection likelihood. More positive manifold curvature encourages more and tighter communities; negative curvature induces repulsion. We consistently estimate manifold type, dimension, and curvature from simply connected, complete Riemannian manifolds of…
▽ More
A common approach to modeling networks assigns each node to a position on a low-dimensional manifold where distance is inversely proportional to connection likelihood. More positive manifold curvature encourages more and tighter communities; negative curvature induces repulsion. We consistently estimate manifold type, dimension, and curvature from simply connected, complete Riemannian manifolds of constant curvature. We represent the graph as a noisy distance matrix based on the ties between cliques, then develop hypothesis tests to determine whether the observed distances could plausibly be embedded isometrically in each of the candidate geometries. We apply our approach to data-sets from economics and neuroscience.
△ Less
Submitted 30 December, 2022; v1 submitted 18 December, 2020;
originally announced December 2020.
-
Interacting Regional Policies in Containing a Disease
Authors:
Arun G. Chandrasekhar,
Paul Goldsmith-Pinkham,
Matthew O. Jackson,
Samuel Thau
Abstract:
Regional quarantine policies, in which a portion of a population surrounding infections are locked down, are an important tool to contain disease. However, jurisdictional governments -- such as cities, counties, states, and countries -- act with minimal coordination across borders. We show that a regional quarantine policy's effectiveness depends upon whether (i) the network of interactions satisf…
▽ More
Regional quarantine policies, in which a portion of a population surrounding infections are locked down, are an important tool to contain disease. However, jurisdictional governments -- such as cities, counties, states, and countries -- act with minimal coordination across borders. We show that a regional quarantine policy's effectiveness depends upon whether (i) the network of interactions satisfies a balanced-growth condition, (ii) infections have a short delay in detection, and (iii) the government has control over and knowledge of the necessary parts of the network (no leakage of behaviors). As these conditions generally fail to be satisfied, especially when interactions cross borders, we show that substantial improvements are possible if governments are outward-looking and proactive: triggering quarantines in reaction to neighbors' infection rates, in some cases even before infections are detected internally. We also show that even a few lax governments -- those that wait for nontrivial internal infection rates before quarantining -- impose substantial costs on the whole system. Our results illustrate the importance of understanding contagion across policy borders and offer a starting point in designing proactive policies for decentralized jurisdictions.
△ Less
Submitted 1 February, 2021; v1 submitted 24 August, 2020;
originally announced August 2020.
-
Consistently estimating network statistics using Aggregated Relational Data
Authors:
Emily Breza,
Arun G. Chandrasekhar,
Shane Lubold,
Tyler H. McCormick,
Mengjie Pan
Abstract:
Collecting complete network data is expensive, time-consuming, and often infeasible. Aggregated Relational Data (ARD), which capture information about a social network by asking a respondent questions of the form ``How many people with trait X do you know?'' provide a low-cost option when collecting complete network data is not possible. Rather than asking about connections between each pair of in…
▽ More
Collecting complete network data is expensive, time-consuming, and often infeasible. Aggregated Relational Data (ARD), which capture information about a social network by asking a respondent questions of the form ``How many people with trait X do you know?'' provide a low-cost option when collecting complete network data is not possible. Rather than asking about connections between each pair of individuals directly, ARD collects the number of contacts the respondent knows with a given trait. Despite widespread use and a growing literature on ARD methodology, there is still no systematic understanding of when and why ARD should accurately recover features of the unobserved network. This paper provides such a characterization by deriving conditions under which statistics about the unobserved network (or functions of these statistics like regression coefficients) can be consistently estimated using ARD. We do this by first providing consistent estimates of network model parameters for three commonly used probabilistic models: the beta-model with node-specific unobserved effects, the stochastic block model with unobserved community structure, and latent geometric space models with unobserved latent locations. A key observation behind these results is that cross-group link probabilities for a collection of (possibly unobserved) groups identifies the model parameters, meaning ARD is sufficient for parameter estimation. With these estimated parameters, it is possible to simulate graphs from the fitted distribution and analyze the distribution of network statistics. We can then characterize conditions under which the simulated networks based on ARD will allow for consistent estimation of the unobserved network statistics, such as eigenvector centrality or response functions by or of the unobserved network, such as regression coefficients.
△ Less
Submitted 21 October, 2022; v1 submitted 26 August, 2019;
originally announced August 2019.
-
When Celebrities Speak: A Nationwide Twitter Experiment Promoting Vaccination in Indonesia
Authors:
Vivi Alatas,
Arun G. Chandrasekhar,
Markus Mobius,
Benjamin A. Olken,
Cindy Paladines
Abstract:
Celebrity endorsements are often sought to influence public opinion. We ask whether celebrity endorsement per se has an effect beyond the fact that their statements are seen by many, and whether on net their statements actually lead people to change their beliefs. To do so, we conducted a nationwide Twitter experiment in Indonesia with 46 high-profile celebrities and organizations, with a total of…
▽ More
Celebrity endorsements are often sought to influence public opinion. We ask whether celebrity endorsement per se has an effect beyond the fact that their statements are seen by many, and whether on net their statements actually lead people to change their beliefs. To do so, we conducted a nationwide Twitter experiment in Indonesia with 46 high-profile celebrities and organizations, with a total of 7.8 million followers, who agreed to let us randomly tweet or retweet content promoting immunization from their accounts. Our design exploits the structure of what information is passed on along a retweet chain on Twitter to parse reach versus endorsement effects. Endorsements matter: tweets that users can identify as being originated by a celebrity are far more likely to be liked or retweeted by users than similar tweets seen by the same users but without the celebrities' imprimatur. By contrast, explicitly citing sources in the tweets actually reduces diffusion. By randomizing which celebrities tweeted when, we find suggestive evidence that overall exposure to the campaign may influence beliefs about vaccination and knowledge of immunization-seeking behavior by one's network. Taken together, the findings suggest an important role for celebrity endorsement.
△ Less
Submitted 14 February, 2019;
originally announced February 2019.
-
Seeing the forest for the trees? An investigation of network knowledge
Authors:
Emily Breza,
Arun G. Chandrasekhar,
Alireza Tahbaz-Salehi
Abstract:
This paper assesses the empirical content of one of the most prevalent assumptions in the economics of networks literature, namely the assumption that decision makers have full knowledge about the networks they interact on. Using network data from 75 villages, we ask 4,554 individuals to assess whether five randomly chosen pairs of households in their village are linked through financial, social,…
▽ More
This paper assesses the empirical content of one of the most prevalent assumptions in the economics of networks literature, namely the assumption that decision makers have full knowledge about the networks they interact on. Using network data from 75 villages, we ask 4,554 individuals to assess whether five randomly chosen pairs of households in their village are linked through financial, social, and informational relationships. We find that network knowledge is low and highly localized, declining steeply with the pair's network distance to the respondent. 46% of respondents are not even able to offer a guess about the status of a potential link between a given pair of individuals. Even when willing to offer a guess, respondents can only correctly identify the links 37% of the time. We also find that a one-step increase in the social distance to the pair corresponds to a 10pp increase in the probability of misidentifying the link. We then investigate the theoretical implications of this assumption by showing that the predictions of various models change substantially if agents behave under the more realistic assumption of incomplete knowledge about the network. Taken together, our results suggest that the assumption of full network knowledge (i) may serve as a poor approximation to the real world and (ii) is not innocuous: allowing for incomplete network knowledge may have first-order implications for a range of qualitative and quantitative results in various contexts.
△ Less
Submitted 22 February, 2018;
originally announced February 2018.
-
Using Aggregated Relational Data to feasibly identify network structure without network data
Authors:
Emily Breza,
Arun G. Chandrasekhar,
Tyler H. McCormick,
Mengjie Pan
Abstract:
Social network data is often prohibitively expensive to collect, limiting empirical network research. Typical economic network map** requires (1) enumerating a census, (2) eliciting the names of all network links for each individual, (3) matching the list of social connections to the census, and (4) repeating (1)-(3) across many networks. In settings requiring field surveys, steps (2)-(3) can be…
▽ More
Social network data is often prohibitively expensive to collect, limiting empirical network research. Typical economic network map** requires (1) enumerating a census, (2) eliciting the names of all network links for each individual, (3) matching the list of social connections to the census, and (4) repeating (1)-(3) across many networks. In settings requiring field surveys, steps (2)-(3) can be very expensive. In other network populations such as financial intermediaries or high-risk groups, proprietary data and privacy concerns may render (2)-(3) impossible. Both restrict the accessibility of high-quality networks research to investigators with considerable resources.
We propose an inexpensive and feasible strategy for network elicitation using Aggregated Relational Data (ARD) -- responses to questions of the form "How many of your social connections have trait k?" Our method uses ARD to recover the parameters of a general network formation model, which in turn, permits the estimation of any arbitrary node- or graph-level statistic. The method works well in simulations and in matching a range of network characteristics in real-world graphs from 75 Indian villages. Moreover, we replicate the results of two field experiments that involved collecting network data. We show that the researchers would have drawn similar conclusions using ARD alone. Finally, using calculations from J-PAL fieldwork, we show that in rural India, for example, ARD surveys are 80% cheaper than full network surveys.
△ Less
Submitted 2 August, 2018; v1 submitted 12 March, 2017;
originally announced March 2017.
-
A Network Formation Model Based on Subgraphs
Authors:
Arun G. Chandrasekhar,
Matthew O. Jackson
Abstract:
We develop a new class of random graph models for the statistical estimation of network formation -- subgraph generated models (SUGMs). Various subgraphs -- e.g., links, triangles, cliques, stars -- are generated and their union results in a network. We show that SUGMs are identified and establish the consistency and asymptotic distribution of parameter estimates in empirically relevant cases. We…
▽ More
We develop a new class of random graph models for the statistical estimation of network formation -- subgraph generated models (SUGMs). Various subgraphs -- e.g., links, triangles, cliques, stars -- are generated and their union results in a network. We show that SUGMs are identified and establish the consistency and asymptotic distribution of parameter estimates in empirically relevant cases. We show that a simple four-parameter SUGM matches basic patterns in empirical networks more closely than four standard models (with many more dimensions): (i) stochastic block models; (ii) models with node-level unobserved heterogeneity; (iii) latent space models; (iv) exponential random graphs. We illustrate the framework's value via several applications using networks from rural India. We study whether network structure helps enforce risk-sharing and whether cross-caste interactions are more likely to be private. We also develop a new central limit theorem for correlated random variables, which is required to prove our results and is of independent interest.
△ Less
Submitted 9 November, 2023; v1 submitted 23 November, 2016;
originally announced November 2016.
-
Using Gossips to Spread Information: Theory and Evidence from a Randomized Controlled Trial
Authors:
Abhijit Banerjee,
Arun G. Chandrasekhar,
Esther Duflo,
Matthew O. Jackson
Abstract:
Is it possible to identify individuals who are highly central in a community without gathering any network information, simply by asking a few people? If we use people's nominees as seeds for a diffusion process, will it be successful? We explore these questions theoretically, via surveys, and via field experiments. We show via a model of information flow how members of a community can, just by tr…
▽ More
Is it possible to identify individuals who are highly central in a community without gathering any network information, simply by asking a few people? If we use people's nominees as seeds for a diffusion process, will it be successful? We explore these questions theoretically, via surveys, and via field experiments. We show via a model of information flow how members of a community can, just by tracking gossip about others, identify highly central individuals in their network. Asking villagers in rural Indian villages to name good seeds for diffusion, we find that they accurately nominate those who are central according to a measure tailored for diffusion - not just those with many friends or in powerful positions. Finally, we run a randomized field experiment in 213 other villages that tests how effective it is to use such nominations as seeds for a diffusion process. Relative to random seeds or those with high social status, hitting at least one seed nominated by villagers leads to more than a 65% increase in the spread of information.
△ Less
Submitted 8 May, 2017; v1 submitted 9 June, 2014;
originally announced June 2014.
-
Inference for best linear approximations to set identified functions
Authors:
Arun Chandrasekhar,
Victor Chernozhukov,
Francesca Molinari,
Paul Schrimpf
Abstract:
This paper provides inference methods for best linear approximations to functions which are known to lie within a band. It extends the partial identification literature by allowing the upper and lower functions defining the band to be any functions, including ones carrying an index, which can be estimated parametrically or non-parametrically. The identification region of the parameters of the best…
▽ More
This paper provides inference methods for best linear approximations to functions which are known to lie within a band. It extends the partial identification literature by allowing the upper and lower functions defining the band to be any functions, including ones carrying an index, which can be estimated parametrically or non-parametrically. The identification region of the parameters of the best linear approximation is characterized via its support function, and limit theory is developed for the latter. We prove that the support function approximately converges to a Gaussian process and establish validity of the Bayesian bootstrap. The paper nests as special cases the canonical examples in the literature: mean regression with interval valued outcome data and interval valued regressor data. Because the bounds may carry an index, the paper covers problems beyond mean regression; the framework is extremely versatile. Applications include quantile and distribution regression with interval valued data, sample selection problems, as well as mean, quantile, and distribution treatment effects. Moreover, the framework can account for the availability of instruments. An application is carried out, studying female labor force participation along the lines of Mulligan and Rubinstein (2008).
△ Less
Submitted 21 December, 2012;
originally announced December 2012.
-
Tractable and Consistent Random Graph Models
Authors:
Arun G. Chandrasekhar,
Matthew O. Jackson
Abstract:
We define a general class of network formation models, Statistical Exponential Random Graph Models (SERGMs), that nest standard exponential random graph models (ERGMs) as a special case. We provide the first general results on when these models' (including ERGMs) parameters estimated from the observation of a single network are consistent (i.e., become accurate as the number of nodes grows). Next,…
▽ More
We define a general class of network formation models, Statistical Exponential Random Graph Models (SERGMs), that nest standard exponential random graph models (ERGMs) as a special case. We provide the first general results on when these models' (including ERGMs) parameters estimated from the observation of a single network are consistent (i.e., become accurate as the number of nodes grows). Next, addressing the problem that standard techniques of estimating ERGMs have been shown to have exponentially slow mixing times for many specifications, we show that by reformulating network formation as a distribution over the space of sufficient statistics instead of the space of networks, the size of the space of estimation can be greatly reduced, making estimation practical and easy. We also develop a related, but distinct, class of models that we call subgraph generation models (SUGMs) that are useful for modeling sparse networks and whose parameter estimates are also directly and easily estimable, consistent, and asymptotically normally distributed. Finally, we show how choice-based (strategic) network formation models can be written as SERGMs and SUGMs, and apply our models and techniques to network data from rural Indian villages.
△ Less
Submitted 25 June, 2014; v1 submitted 27 October, 2012;
originally announced October 2012.
-
A Block Cipher using Rotation and Logical XOR Operations
Authors:
D. Sravana Kumar,
CH. Suneetha,
A. Chandrasekhar
Abstract:
Cryptography is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the messages. Information security has become a very critical aspect of modern communication systems. With the global acceptance of the Internet as a medium of communication, virtually every computer in the world is connected to every other. It has create…
▽ More
Cryptography is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the messages. Information security has become a very critical aspect of modern communication systems. With the global acceptance of the Internet as a medium of communication, virtually every computer in the world is connected to every other. It has created a new risk for the users of the computers with a constant threat of being hacked and being victims of data theft. In this connection data encryption has become an essential part of secure communication of the messages. In the present paper we propose a new method of encryption of data in blocks using the operations Rotation and Logical XOR
△ Less
Submitted 9 February, 2012;
originally announced February 2012.
-
Encryption of Data using Elliptic Curve over Finite fields
Authors:
D. Sravana Kumar,
CH. Suneetha,
A. Chandrasekhar
Abstract:
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital signature. The principal attraction of elliptic c…
▽ More
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital signature. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. In the present paper we propose a new encryption algorithm using some Elliptic Curve over finite fields
△ Less
Submitted 9 February, 2012;
originally announced February 2012.