-
Source Depth of Three-minute Umbral Oscillations
Authors:
Kyuhyoun Cho,
Jongchul Chae
Abstract:
We infer the depth of the internal sources giving rise to three-minute umbral oscillations. Recent observations of ripple-like velocity patterns of umbral oscillations supported the notion that there exist internal sources exciting the umbral oscillations. We adopt the hypothesis that the fast magnetohydrodynamic (MHD) waves generated at a source below the photospheric layer propagate along differ…
▽ More
We infer the depth of the internal sources giving rise to three-minute umbral oscillations. Recent observations of ripple-like velocity patterns of umbral oscillations supported the notion that there exist internal sources exciting the umbral oscillations. We adopt the hypothesis that the fast magnetohydrodynamic (MHD) waves generated at a source below the photospheric layer propagate along different paths, reach the surface at different times, and excited slow MHD waves by mode conversion. These slow MHD waves are observed as the ripples that apparently propagate horizontally. The propagation distance of the ripple given as a function of time is strongly related to the depth of the source. Using the spectral data of the Fe I 5435A line taken by the Fast Imaging Solar Spectrograph of the Goode Solar Telescope at Big Bear Solar Observatory, we identified five ripples and determined the propagation distance as a function of time in each ripple. From the model fitting to these data, we obtained the depth between 1000 km and 2000 km. Our result will serve as an observational constraint to understanding the detailed processes of magnetoconvection and wave generation in sunspots.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
A High-Performance Object Proposals based on Horizontal High Frequency Signal
Authors:
Jiang Chao,
Liang Huawei,
Wang Zhiling
Abstract:
In recent years, the use of object proposal as a preprocessing step for target detection to improve computational efficiency has become an effective method. Good object proposal methods should have high object detection recall rate and low computational cost, as well as good localization quality and repeatability. However, it is difficult for current advanced algorithms to achieve a good balance i…
▽ More
In recent years, the use of object proposal as a preprocessing step for target detection to improve computational efficiency has become an effective method. Good object proposal methods should have high object detection recall rate and low computational cost, as well as good localization quality and repeatability. However, it is difficult for current advanced algorithms to achieve a good balance in the above performance. For this problem, we propose a class-independent object proposal algorithm BIHL. It combines the advantages of window scoring and superpixel merging, which not only improves the localization quality but also speeds up the computational efficiency. The experimental results on the VOC2007 data set show that when the IOU is 0.5 and 10,000 budget proposals, our method can achieve the highest detection recall and an mean average best overlap of 79.5%, and the computational efficiency is nearly three times faster than the current fastest method. Moreover, our method is the method with the highest average repeatability among the methods that achieve good repeatability to various disturbances.
△ Less
Submitted 13 May, 2020; v1 submitted 13 March, 2020;
originally announced March 2020.
-
Transfinite Milnor invariants for 3-manifolds
Authors:
Jae Choon Cha,
Kent E. Orr
Abstract:
In his 1957 paper, John Milnor introduced link invariants which measure the homotopy class of the longitudes of a link relative to the lower central series of the link group. Consequently, these invariants determine the lower central series quotients of the link group. This work has driven decades of research with profound influence. One of Milnor's original problems remained unsolved: to extract…
▽ More
In his 1957 paper, John Milnor introduced link invariants which measure the homotopy class of the longitudes of a link relative to the lower central series of the link group. Consequently, these invariants determine the lower central series quotients of the link group. This work has driven decades of research with profound influence. One of Milnor's original problems remained unsolved: to extract similar invariants from the transfinite lower central series of the link group. We reformulate and extend Milnor's invariants in the broader setting of 3-manifolds, with his original invariants as special cases. We present a solution to Milnor's problem for general 3-manifold groups, develo** a theory of transfinite invariants and realizing nontrivial values.
△ Less
Submitted 10 September, 2021; v1 submitted 8 February, 2020;
originally announced February 2020.
-
To schedule or not to schedule: when no-scheduling can beat the best-known flow scheduling algorithm in datacenter networks
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathan Chao
Abstract:
Conventional wisdom for minimizing the average flow completion time (AFCT) in the datacenter network (DCN), where flow sizes are highly variable, would suggest scheduling every individual flow. However, we show that considering scheduling delay (including scheduler's computational and communication delays), serving most of the flows without any scheduling and only in first-come-first-served (FCFS)…
▽ More
Conventional wisdom for minimizing the average flow completion time (AFCT) in the datacenter network (DCN), where flow sizes are highly variable, would suggest scheduling every individual flow. However, we show that considering scheduling delay (including scheduler's computational and communication delays), serving most of the flows without any scheduling and only in first-come-first-served (FCFS) manner significantly improves their performance even when it is compared to the shortest remaining processing time (SRPT)-known as optimum algorithm when scheduling delay is zero. To do so, we only require to have two coarse classes of flows categorized based on flows' sizes (1st-class including flows smaller than a threshold, H, and 2nd-class including others) and serve 1st-class flows always before serving 2nd-class ones. To show that, we take SRPT scheduling algorithm accompanied by the global knowledge of flows, formulate impact of scheduling delay on its performance, and prove that for any flow size distribution and network load (<1), there is always a threshold, H, which guarantees 1st-class flows achieve lower AFCT under FCFS compared to SRPT. Our numerically calculated results and extensive flow-level simulations show that on average, more than 90% of flows could be in 1st-class and consequently do not require any scheduling.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
Self-Driving like a Human driver instead of a Robocar: Personalized comfortable driving experience for autonomous vehicles
Authors:
Il Bae,
Jaeyoung Moon,
Junekyo Jhung,
Ho Suk,
Taewoo Kim,
Hyungbin Park,
Jaekwang Cha,
**hyuk Kim,
Dohyun Kim,
Shiho Kim
Abstract:
This paper issues an integrated control system of self-driving autonomous vehicles based on the personal driving preference to provide personalized comfortable driving experience to autonomous vehicle users. We propose an Occupant's Preference Metric (OPM) which is defining a preferred lateral and longitudinal acceleration region with maximum allowable jerk for users. Moreover, we propose a vehicl…
▽ More
This paper issues an integrated control system of self-driving autonomous vehicles based on the personal driving preference to provide personalized comfortable driving experience to autonomous vehicle users. We propose an Occupant's Preference Metric (OPM) which is defining a preferred lateral and longitudinal acceleration region with maximum allowable jerk for users. Moreover, we propose a vehicle controller based on control parameters enabling integrated lateral and longitudinal control via preference-aware maneuvering of autonomous vehicles. The proposed system not only provides the criteria for the occupant's driving preference, but also provides a personalized autonomous self-driving style like a human driver instead of a Robocar. The simulation and experimental results demonstrated that the proposed system can maneuver the self-driving vehicle like a human driver by tracking the specified criterion of admissible acceleration and jerk.
△ Less
Submitted 18 November, 2022; v1 submitted 12 January, 2020;
originally announced January 2020.
-
SharpEdge: An Asynchronous and Core-Agnostic Solution to Guarantee Bounded-Delays
Authors:
Soheil Abbasloo,
H. Jonathan Chao
Abstract:
What are the key properties that a network should have to provide bounded-delay guarantees for the packets? In this paper, we attempt to answer this question. To that end, we explore the theory of bounded-delay networks and provide the necessary and the sufficient conditions required to have deterministic bounded-delays in the network. We prove that as long as a network is work-conserving, indepen…
▽ More
What are the key properties that a network should have to provide bounded-delay guarantees for the packets? In this paper, we attempt to answer this question. To that end, we explore the theory of bounded-delay networks and provide the necessary and the sufficient conditions required to have deterministic bounded-delays in the network. We prove that as long as a network is work-conserving, independent of the packet scheduling and queue management algorithms used in the switches, it is sufficient to shape the traffic~\textit{properly} at the edge of the network to meet hard bounded-delays in the network. Using the derived theorems, we present SharpEdge, a novel design to meet deterministic bounded-delays in the network. To the best of our knowledge, SharpEdge is the first scheme that can meet all following key properties: 1) it supports coexistence of different classes of traffic, while it can guarantee their different required bounded-delays 2) it does not require any changes in the core of the network, 3) it supports both periodic and bursty traffic patterns, and 4) it does not require any time synchronization between network devices.
△ Less
Submitted 14 August, 2020; v1 submitted 31 December, 2019;
originally announced January 2020.
-
Wanna Make Your TCP Scheme Great for Cellular Networks? Let Machines Do It for You!
Authors:
Soheil Abbasloo,
Chen-Yu Yen,
H. Jonathan Chao
Abstract:
Can we instead of designing just another new TCP, design a TCP \textit{plug-in} which can boost the performance of the existing/future TCP designs in cellular networks? To answer this question, we introduce DeepCC plug-in. DeepCC leverages deep reinforcement learning (DRL), a modern decision-making tool, to steer TCP toward achieving applications' desired delay and high throughput in a highly dyna…
▽ More
Can we instead of designing just another new TCP, design a TCP \textit{plug-in} which can boost the performance of the existing/future TCP designs in cellular networks? To answer this question, we introduce DeepCC plug-in. DeepCC leverages deep reinforcement learning (DRL), a modern decision-making tool, to steer TCP toward achieving applications' desired delay and high throughput in a highly dynamic network such as the cellular network. The fact that DeepCC does not try to reinvent/replace TCP but aims to boost the performance of it differentiates it from the most (if not all) of the existing reinforcement learning (RL) systems where RL systems are considered clean-slate alternative designs replacing the traditional ones.
We used DeepCC plug-in to boost the performance of various old and new TCP schemes including TCP Cubic, Google's BBR, TCP Westwood, and TCP Illinois in cellular networks. Through both extensive trace-based evaluations and in-field tests, we show that not only DeepCC can significantly improve the performance of TCP, but also after accompanied by DeepCC, these schemes can outperform state-of-the-art TCP protocols including Aurora, Sprout, Verus, C2TCP, Copa, Indigo, Remy, PCC-Vivace, and LEDBAT in cellular networks.
△ Less
Submitted 23 June, 2020; v1 submitted 25 December, 2019;
originally announced December 2019.
-
FaultNet: Faulty Rail-Valves Detection using Deep Learning and Computer Vision
Authors:
Ramanpreet Singh Pahwa,
** Chao,
Jestine Paul,
Yiqun Li,
Ma Tin Lay Nwe,
Shudong Xie,
Ashish James,
Arulmurugan Ambikapathi,
Zeng Zeng,
Vijay Ramaseshan Chandrasekhar
Abstract:
Regular inspection of rail valves and engines is an important task to ensure the safety and efficiency of railway networks around the globe. Over the past decade, computer vision and pattern recognition based techniques have gained traction for such inspection and defect detection tasks. An automated end-to-end trained system can potentially provide a low-cost, high throughput, and cheap alternati…
▽ More
Regular inspection of rail valves and engines is an important task to ensure the safety and efficiency of railway networks around the globe. Over the past decade, computer vision and pattern recognition based techniques have gained traction for such inspection and defect detection tasks. An automated end-to-end trained system can potentially provide a low-cost, high throughput, and cheap alternative to manual visual inspection of these components. However, such systems require a huge amount of defective images for networks to understand complex defects. In this paper, a multi-phase deep learning based technique is proposed to perform accurate fault detection of rail-valves. Our approach uses a two-step method to perform high precision image segmentation of rail-valves resulting in pixel-wise accurate segmentation. Thereafter, a computer vision technique is used to identify faulty valves. We demonstrate that the proposed approach results in improved detection performance when compared to current state-of-theart techniques used in fault detection.
△ Less
Submitted 8 November, 2019;
originally announced December 2019.
-
Primary decomposition in the smooth concordance group of topologically slice knots
Authors:
Jae Choon Cha
Abstract:
We address primary decomposition conjectures for knot concordance groups, which predict direct sum decompositions into primary parts. We show that the smooth concordance group of topologically slice knots has a large subgroup for which the conjectures are true and there are infinitely many primary parts each of which has infinite rank. This supports the conjectures for topologically slice knots. W…
▽ More
We address primary decomposition conjectures for knot concordance groups, which predict direct sum decompositions into primary parts. We show that the smooth concordance group of topologically slice knots has a large subgroup for which the conjectures are true and there are infinitely many primary parts each of which has infinite rank. This supports the conjectures for topologically slice knots. We also prove analogues for the associated graded groups of the bipolar filtration of topologically slice knots. Among ingredients of the proof, we use amenable $L^2$-signatures, Ozsváth-Szabó $d$-invariants and Némethi's result on Heegaard Floer homology of Seifert 3-manifolds. In an appendix, we present a general formulation of the notion of primary decomposition.
△ Less
Submitted 29 June, 2021; v1 submitted 31 October, 2019;
originally announced October 2019.
-
Greedy Sparse Signal Recovery Algorithm Based on Bit-wise MAP detection
Authors:
J. Chae,
S. -N. Hong
Abstract:
We propose a novel greedy algorithm for the support recovery of a sparse signal from a small number of noisy measurements. In the proposed method, a new support index is identified for each iteration based on bit-wise maximum a posteriori (B-MAP) detection. This is optimal in the sense of detecting one of the remaining support indices, provided that all the detected indices in the previous iterati…
▽ More
We propose a novel greedy algorithm for the support recovery of a sparse signal from a small number of noisy measurements. In the proposed method, a new support index is identified for each iteration based on bit-wise maximum a posteriori (B-MAP) detection. This is optimal in the sense of detecting one of the remaining support indices, provided that all the detected indices in the previous iterations are correct. Despite its optimality, it requires an expensive complexity for computing the maximization metric (i.e., a posteriori probability of each remaining support) due to the marginalization of high-dimensional sparse vector. We address this problem by presenting a good proxy (named B-MAP proxy) on the maximization metric which is accurate enough to find the maximum index, rather than an exact probability, Moreover, it is easily evaluated only using vector correlations as in orthogonal matching pursuit (OMP), but the use completely different proxy matrices for maximization. We demonstrate that the proposed B-MAP detection provides a significant gain compared with the existing methods as OMP and MAP-OMP, having the same complexity. Subsequently, we construct the advanced greedy algorithms, based on B-MAP proxy, by leveraging the idea of compressive sampling matching pursuit (CoSaMP) and subspace pursuit (SP). Via simulations, we show that the proposed method outperforms also OMP and MAP-OMP under the frameworks of the advanced greedy algorithms.
△ Less
Submitted 28 October, 2019;
originally announced October 2019.
-
Exascale Deep Learning to Accelerate Cancer Research
Authors:
Robert M. Patton,
J. Travis Johnston,
Steven R. Young,
Catherine D. Schuman,
Thomas E. Potok,
Derek C. Rose,
Seung-Hwan Lim,
Junghoon Chae,
Le Hou,
Shahira Abousamra,
Dimitris Samaras,
Joel Saltz
Abstract:
Deep learning, through the use of neural networks, has demonstrated remarkable ability to automate many routine tasks when presented with sufficient data for training. The neural network architecture (e.g. number of layers, types of layers, connections between layers, etc.) plays a critical role in determining what, if anything, the neural network is able to learn from the training data. The trend…
▽ More
Deep learning, through the use of neural networks, has demonstrated remarkable ability to automate many routine tasks when presented with sufficient data for training. The neural network architecture (e.g. number of layers, types of layers, connections between layers, etc.) plays a critical role in determining what, if anything, the neural network is able to learn from the training data. The trend for neural network architectures, especially those trained on ImageNet, has been to grow ever deeper and more complex. The result has been ever increasing accuracy on benchmark datasets with the cost of increased computational demands. In this paper we demonstrate that neural network architectures can be automatically generated, tailored for a specific application, with dual objectives: accuracy of prediction and speed of prediction. Using MENNDL--an HPC-enabled software stack for neural architecture search--we generate a neural network with comparable accuracy to state-of-the-art networks on a cancer pathology dataset that is also $16\times$ faster at inference. The speedup in inference is necessary because of the volume and velocity of cancer pathology data; specifically, the previous state-of-the-art networks are too slow for individual researchers without access to HPC systems to keep pace with the rate of data generation. Our new model enables researchers with modest computational resources to analyze newly generated data faster than it is collected.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
Bounding Queue Delay in Cellular Networks to Support Ultra-Low Latency Applications
Authors:
Soheil Abbasloo,
H. Jonathan Chao
Abstract:
Most of the current active queue management (AQM) designs have major issues including severe hardship of being tuned for highly fluctuated cellular access link bandwidths. Consequently, most of the cellular network providers either give up using AQMs or use conservative offline configurations for them. However, these choices will significantly impact the performance of the emerging interactive and…
▽ More
Most of the current active queue management (AQM) designs have major issues including severe hardship of being tuned for highly fluctuated cellular access link bandwidths. Consequently, most of the cellular network providers either give up using AQMs or use conservative offline configurations for them. However, these choices will significantly impact the performance of the emerging interactive and highly delay sensitive applications such as virtual reality and vehicle-to-vehicle communications.
Therefore, in this paper, we investigate the problems of existing AQM schemes and show that they are not suitable options to support ultra-low latency applications in a highly dynamic network such as current and future cellular networks. Moreover, we believe that achieving good performance does not necessarily come from complex drop rate calculation algorithms or complicated AQM techniques. Consequently, we propose BoDe an extremely simple and deployment friendly AQM scheme to bound the queuing delay of served packets and support ultra-low latency applications.
We have evaluated BoDe in extensive trace-based evaluations using cellular traces from 3 different service providers in the US and compared its performance with state-of-the-art AQM designs including CoDel and PIE under a variety of streaming applications, video conferencing applications, and various recently proposed TCP protocols. Results show that despite BoDe's simple design, it outperforms other schemes and achieves significantly lower queuing delay in all tested scenarios.
△ Less
Submitted 2 August, 2019;
originally announced August 2019.
-
Josephson Detection of Time Reversal Symmetry Broken Superconductivity in SnTe Nanowires
Authors:
C. J. Trimble,
M. T. Wei,
N. F. Q. Yuan,
S. S. Kalantre,
P. Liu,
H. -J Han,
M. -G. Han,
Y. Zhu,
J. J. Cha,
L. Fu,
J. R. Williams
Abstract:
Exotic superconductors, such as high T$_C$, topological, and heavy-fermion superconductors, require phase sensitive measurements to determine the underlying pairing. Here we investigate the proximity-induced superconductivity in nanowires of SnTe, where an $s\pm is^{\prime}$ superconducting state is produced that lacks the time-reversal and valley-exchange symmetry of the parent SnTe. This effect,…
▽ More
Exotic superconductors, such as high T$_C$, topological, and heavy-fermion superconductors, require phase sensitive measurements to determine the underlying pairing. Here we investigate the proximity-induced superconductivity in nanowires of SnTe, where an $s\pm is^{\prime}$ superconducting state is produced that lacks the time-reversal and valley-exchange symmetry of the parent SnTe. This effect, in conjunction with a ferroelectric distortion of the lattice at low temperatures, results in a marked alteration of the properties of Josephson junctions fabricated using SnTe nanowires. This work establishes the existence of a ferroelectric transition in SnTe nanowires and elucidates the role of ferroelectric domain walls on the flow of supercurrent through SnTe weak links. We detail two unique characteristics of these junctions: an asymmetric critical current in the DC Josephson effect and a prominent second harmonic in the AC Josephson effect. Each reveals the broken time-reversal symmetry in the junction. The novel $s\pm is^{\prime}$ superconductivity and the new Josephson effects can be used to investigate fractional vortices [1,2], topological superconductivity in multiband materials [3-5], and new types of Josephson-based devices in proximity-induced multiband and ferroelectric superconductors [6,7].
△ Less
Submitted 19 February, 2020; v1 submitted 9 July, 2019;
originally announced July 2019.
-
MGOS: A Library for Molecular Geometry and its Operating System
Authors:
Deok-Soo Kima,
Joonghyun Ryua,
Youngsong Choa,
Mokwon Leeb,
Jehyun Cha,
Chanyoung Song,
Sangwha Kim,
Roman A Laskowskid,
Kokichi Sugihara,
Jong Bhak,
Seong Eon Ryu
Abstract:
The geometry of atomic arrangement underpins the structural understanding of molecules in many fields. However, no general framework of mathematical/computational theory for the geometry of atomic arrangement exists. Here we present "Molecular Geometry (MG)" as a theoretical framework accompanied by "MG Operating System (MGOS)" which consists of callable functions implementing the MG theory. MG al…
▽ More
The geometry of atomic arrangement underpins the structural understanding of molecules in many fields. However, no general framework of mathematical/computational theory for the geometry of atomic arrangement exists. Here we present "Molecular Geometry (MG)" as a theoretical framework accompanied by "MG Operating System (MGOS)" which consists of callable functions implementing the MG theory. MG allows researchers to model complicated molecular structure problems in terms of elementary yet standard notions of volume, area, etc. and MGOS frees them from the hard and tedious task of develo**/implementing geometric algorithms so that they can focus more on their primary research issues. MG facilitates simpler modeling of molecular structure problems; MGOS functions can be conveniently embedded in application programs for the efficient and accurate solution of geometric queries involving atomic arrangements. The use of MGOS in problems involving spherical entities is akin to the use of math libraries in general purpose programming languages in science and engineering.
△ Less
Submitted 28 June, 2019;
originally announced June 2019.
-
Intelligent Anomaly Detection and Mitigation in Data Centers
Authors:
Ashkan Aghdai,
Kang Xi,
H. Jonathan Chao
Abstract:
Data centers play a key role in today's Internet. Cloud applications are mainly hosted on multi-tenant warehouse-scale data centers. Anomalies pose a serious threat to data centers' operations. If not controlled properly, a simple anomaly can spread throughout the data center, resulting in a cascading failure. Amazon AWS had been affected by such incidents recently. Although some solutions are pro…
▽ More
Data centers play a key role in today's Internet. Cloud applications are mainly hosted on multi-tenant warehouse-scale data centers. Anomalies pose a serious threat to data centers' operations. If not controlled properly, a simple anomaly can spread throughout the data center, resulting in a cascading failure. Amazon AWS had been affected by such incidents recently. Although some solutions are proposed to detect anomalies and prevent cascading failures, they mainly rely on application-specific metrics and case-based diagnosis to detect the anomalies. Given the variety of applications on a multi-tenant data center, proposed solutions are not capable of detecting anomalies in a timely manner. In this paper we design an application-agnostic anomaly detection scheme. More specifically, our design uses a highly distributed data mining scheme over network-level traffic metrics to detect anomalies. Once anomalies are detected, simple actions are taken to mitigate the damage. This ensures that errors are confined and prevents cascading failures before administrators intervene.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
The Observational Evidence for the Internal Excitation of Sunspot Oscillations Inferred from the Fe I 5435 A Line
Authors:
Kyuhyoun Cho,
Jongchul Chae,
Eun-kyung Lim,
Heesu Yang
Abstract:
The umbral oscillations of velocity are commonly observed in the chromosphere of a sunspot. Their sources are considered to be either the external p-mode driving or the internal excitation by magnetoconvection. Even though the possibility of the p-mode driving has been often considered, the internal excitation has been rarely investigated. We report the identification of the oscillation patterns t…
▽ More
The umbral oscillations of velocity are commonly observed in the chromosphere of a sunspot. Their sources are considered to be either the external p-mode driving or the internal excitation by magnetoconvection. Even though the possibility of the p-mode driving has been often considered, the internal excitation has been rarely investigated. We report the identification of the oscillation patterns that may be closely related to the events of internal excitation from the observations of velocity oscillations in the temperature minimum region of two sunspots. The velocities were determined from the spectral data of the Fe I 5435 A line, a magnetically insensitive line, taken with the Fast Imaging Solar Spectrograph of the 1.6 m Goode Solar Telescope at the Big Bear Solar Observatory. As a result, we identified 4 oscillation patterns of 2.0 * 10^3 km coherent size that were clearly identified for about 7.9 minutes with oscillation amplitude of 9.3 * 10^-2 km/s. The power of the oscillations in these centers was concentrated in the 3 minute band. All the oscillation centers were located above the umbral dots undergoing noticeable morphological and dynamical changes that may be regarded as an observable signature of small-scale magnetoconvection inside the umbrae. Our results support the notion that magnetoconvection associated with umbral dots inside sunspots can drive the 3 minute umbral oscillations.
△ Less
Submitted 5 June, 2019;
originally announced June 2019.
-
Hierarchical Auxiliary Learning
Authors:
Jaehoon Cha,
Kyeong Soo Kim,
Sanghyuk Lee
Abstract:
Conventional application of convolutional neural networks (CNNs) for image classification and recognition is based on the assumption that all target classes are equal(i.e., no hierarchy) and exclusive of one another (i.e., no overlap). CNN-based image classifiers built on this assumption, therefore, cannot take into account an innate hierarchy among target classes (e.g., cats and dogs in animal im…
▽ More
Conventional application of convolutional neural networks (CNNs) for image classification and recognition is based on the assumption that all target classes are equal(i.e., no hierarchy) and exclusive of one another (i.e., no overlap). CNN-based image classifiers built on this assumption, therefore, cannot take into account an innate hierarchy among target classes (e.g., cats and dogs in animal image classification) or additional information that can be easily derived from the data (e.g.,numbers larger than five in the recognition of handwritten digits), thereby resulting in scalability issues when the number of target classes is large. Combining two related but slightly different ideas of hierarchical classification and logical learning by auxiliary inputs, we propose a new learning framework called hierarchical auxiliary learning, which not only address the scalability issues with a large number of classes but also could further reduce the classification/recognition errors with a reasonable number of classes. In the hierarchical auxiliary learning, target classes are semantically or non-semantically grouped into superclasses, which turns the original problem of map** between an image and its target class into a new problem of map** between a pair of an image and its superclass and the target class. To take the advantage of superclasses, we introduce an auxiliary block into a neural network, which generates auxiliary scores used as additional information for final classification/recognition; in this paper, we add the auxiliary block between the last residual block and the fully-connected output layer of the ResNet. Experimental results demonstrate that the proposed hierarchical auxiliary learning can reduce classification errors up to 0.56, 1.6 and 3.56 percent with MNIST, SVHN and CIFAR-10 datasets, respectively.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
Toward Optimal Performance with Network Assisted TCP at Mobile Edge
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathon Chao,
Hang Shi,
Ulas C. Kozat,
Yinghua Ye
Abstract:
In contrast to the classic fashion for designing distributed end-to-end (e2e) TCP schemes for cellular networks (CN), we explore another design space by having the CN assist the task of the transport control. We show that in the emerging cellular architectures such as mobile/multi-access edge computing (MEC), where the servers are located close to the radio access network (RAN), significant improv…
▽ More
In contrast to the classic fashion for designing distributed end-to-end (e2e) TCP schemes for cellular networks (CN), we explore another design space by having the CN assist the task of the transport control. We show that in the emerging cellular architectures such as mobile/multi-access edge computing (MEC), where the servers are located close to the radio access network (RAN), significant improvements can be achieved by leveraging the nature of the logically centralized network measurements at the RAN and passing information such as its minimum e2e delay and access link capacity to each server. Particularly, a Network Assistance module (located at the mobile edge) will pair up with wireless scheduler to provide feedback information to each server and facilitate the task of congestion control. To that end, we present two Network Assisted schemes called NATCP (a clean-slate design replacing TCP at end-hosts) and NACubic (a backward compatible design requiring no change for TCP at end-hosts). Our preliminary evaluations using real cellular traces show that both schemes dramatically outperform existing schemes both in single-flow and multi-flow scenarios.
△ Less
Submitted 22 May, 2019;
originally announced May 2019.
-
The Physical Nature of Spiral Wave Patterns in Sunspots
Authors:
Juhyung Kang,
Jongchul Chae,
Valery M. Nakariakov,
Kyuhyoun Cho,
Hannah Kwak,
Kyeore Lee
Abstract:
Recently, spiral wave patterns (SWPs) have been detected in 3 minute oscillations of sunspot umbrae, but the nature of this phenomenon has remained elusive. We present a theoretical model that interprets the observed SWPs as the superposition of two different azimuthal modes of slow magnetoacoustic waves driven below the surface in an untwisted and non-rotating magnetic cylinder. We apply this mod…
▽ More
Recently, spiral wave patterns (SWPs) have been detected in 3 minute oscillations of sunspot umbrae, but the nature of this phenomenon has remained elusive. We present a theoretical model that interprets the observed SWPs as the superposition of two different azimuthal modes of slow magnetoacoustic waves driven below the surface in an untwisted and non-rotating magnetic cylinder. We apply this model to SWPs of the line-of-sight (LOS) velocity in a pore observed by the Fast Imaging Solar Spectrograph installed at the 1.6 m Goode Solar Telescope. One- and two-armed SWPs were identified in instantaneous amplitudes of LOS Doppler velocity maps of 3 minute oscillations. The associated oscillation periods are about 160 s, and the durations are about 5 minutes. In our theoretical model, the observed spiral structures are explained by the superposition of non-zero azimuthal modes driven 1600 km below the photosphere in the pore. The one-armed SWP is produced by the slow-body sausage (m = 0) and kink (m = 1) modes, and the two-armed SWP is formed by the slow-body sausage (m = 0) and fluting (m = 2) modes of the magnetic flux tube forming the pore.
△ Less
Submitted 21 May, 2019;
originally announced May 2019.
-
Enabling Mobility in LTE-Compatible Mobile-edge Computing with Programmable Switches
Authors:
Ashkan Aghdai,
Yang Xu,
Mark Huang,
David H. Dai,
H. Jonathan Chao
Abstract:
Network softwarization triggered a new wave of innovation in modern network design. The next generation of mobile networks embraces this trend. Mobile-edge computing (MEC) is a key part of emerging mobile networks that enables ultra-low latency mission-critical application such as vehicle-to vehicle communication. MEC aims at bringing delay-sensitive applications closer to the radio access network…
▽ More
Network softwarization triggered a new wave of innovation in modern network design. The next generation of mobile networks embraces this trend. Mobile-edge computing (MEC) is a key part of emerging mobile networks that enables ultra-low latency mission-critical application such as vehicle-to vehicle communication. MEC aims at bringing delay-sensitive applications closer to the radio access network to enable ultra-low latency for users and decrease the back-haul pressure on mobile service providers. However, there are no practical solutions to enable mobility at MEC where connections are no longer anchored to the core network and serving applications are supposed to move as their users move. We propose the mobile-edge gateway (MEGW) to address this gap. MEGW enables mobility for MEC applications transparently and without requiring any modifications to existing protocols and applications. MEGW supports mobility by reconstructing mobile users' location via listening to LTE control plane in addition to using two-stage location-dependent traffic steering for edge connections. Networks can incrementally upgrade to support MEC by upgrading some IP router to programmable switches that run MEGW. We have implemented MEGW using P4 language and verified its compatibility with existing LTE networks in a testbed running reference LTE protocol stack. Furthermore, using packet-level simulations we show that the two-stage traffic steering algorithm reduces the number of application migrations and simplifies service provisioning.
△ Less
Submitted 13 May, 2019;
originally announced May 2019.
-
Semantics-Aware Image to Image Translation and Domain Transfer
Authors:
Pravakar Roy,
Nicolai Häni,
Jun-Jee Chao,
Volkan Isler
Abstract:
Image to image translation is the problem of transferring an image from a source domain to a different (but related) target domain. We present a new unsupervised image to image translation technique that leverages the underlying semantic information for object transfiguration and domain transfer tasks. Specifically, we present a generative adversarial learning approach that jointly translates imag…
▽ More
Image to image translation is the problem of transferring an image from a source domain to a different (but related) target domain. We present a new unsupervised image to image translation technique that leverages the underlying semantic information for object transfiguration and domain transfer tasks. Specifically, we present a generative adversarial learning approach that jointly translates images and labels from a source domain to a target domain. Our main technical contribution is an encoder-decoder based network architecture that jointly encodes the image and its underlying semantics and translates both individually to the target domain. Additionally, we propose object transfiguration and cross-domain semantic consistency losses that preserve semantic labels. Through extensive experimental evaluation, we demonstrate the effectiveness of our approach as compared to the state-of-the-art methods on unsupervised image-to-image translation, domain adaptation, and object transfiguration.
△ Less
Submitted 1 March, 2021; v1 submitted 3 April, 2019;
originally announced April 2019.
-
CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images
Authors:
** Chao,
Ahmad Al Badawi,
Balagopal Unnikrishnan,
Jie Lin,
Chan Fook Mun,
James M. Brown,
J. Peter Campbell,
Michael Chiang,
Jayashree Kalpathy-Cramer,
Vijay Ramaseshan Chandrasekhar,
Pavitra Krishnaswamy,
Khin Mi Mi Aung
Abstract:
Convolutional neural networks (CNNs) have enabled significant performance leaps in medical image classification tasks. However, translating neural network models for clinical applications remains challenging due to data privacy issues. Fully Homomorphic Encryption (FHE) has the potential to address this challenge as it enables the use of CNNs on encrypted images. However, current HE technology pos…
▽ More
Convolutional neural networks (CNNs) have enabled significant performance leaps in medical image classification tasks. However, translating neural network models for clinical applications remains challenging due to data privacy issues. Fully Homomorphic Encryption (FHE) has the potential to address this challenge as it enables the use of CNNs on encrypted images. However, current HE technology poses immense computational and memory overheads, particularly for high-resolution images such as those seen in the clinical context. We present CaRENets: Compact and Resource-Efficient CNNs for high performance and resource-efficient inference on high-resolution encrypted images in practical applications. At the core, CaRENets comprises a new FHE compact packing scheme that is tightly integrated with CNN functions. CaRENets offers dual advantages of memory efficiency (due to compact packing of images and CNN activations) and inference speed (due to the reduction in the number of ciphertexts created and the associated mathematical operations) over standard interleaved packing schemes. We apply CaRENets to perform homomorphic abnormality detection with 80-bit security level in two clinical conditions - Retinopathy of Prematurity (ROP) and Diabetic Retinopathy (DR). The ROP dataset comprises 96 x 96 grayscale images, while the DR dataset comprises 256 x 256 RGB images. We demonstrate over 45x improvement in memory efficiency and 4-5x speedup in inference over the interleaved packing schemes. As our approach enables memory-efficient low-latency HE inference without imposing additional communication burden, it has implications for practical and secure deep learning inference in clinical imaging.
△ Less
Submitted 28 January, 2019;
originally announced January 2019.
-
On the Transformation of Latent Space in Autoencoders
Authors:
Jaehoon Cha,
Kyeong Soo Kim,
Sanghyuk Lee
Abstract:
Noting the importance of the latent variables in inference and learning, we propose a novel framework for autoencoders based on the homeomorphic transformation of latent variables, which could reduce the distance between vectors in the transformed space, while preserving the topological properties of the original space, and investigate the effect of the latent space transformation on learning gene…
▽ More
Noting the importance of the latent variables in inference and learning, we propose a novel framework for autoencoders based on the homeomorphic transformation of latent variables, which could reduce the distance between vectors in the transformed space, while preserving the topological properties of the original space, and investigate the effect of the latent space transformation on learning generative models and denoising corrupted data. The experimental results demonstrate that our generative and denoising models based on the proposed framework can provide better performance than conventional variational and denoising autoencoders due to the transformation, where we evaluate the performance of generative and denoising models in terms of the Hausdorff distance between the sets of training and processed i.e., either generated or denoised images, which can objectively measure their differences, as well as through direct comparison of the visual characteristics of the processed images.
△ Less
Submitted 3 June, 2019; v1 submitted 24 January, 2019;
originally announced January 2019.
-
Two-solvable and two-bipolar knots with large four-genera
Authors:
Jae Choon Cha,
Allison N. Miller,
Mark Powell
Abstract:
For every integer g, we construct a 2-solvable and 2-bipolar knot whose topological 4-genus is greater than g. Note that 2-solvable knots are in particular algebraically slice and have vanishing Casson-Gordon obstructions. Similarly all known smooth 4-genus bounds from gauge theory and Floer homology vanish for 2-bipolar knots. Moreover, our knots bound smoothly embedded height four gropes in…
▽ More
For every integer g, we construct a 2-solvable and 2-bipolar knot whose topological 4-genus is greater than g. Note that 2-solvable knots are in particular algebraically slice and have vanishing Casson-Gordon obstructions. Similarly all known smooth 4-genus bounds from gauge theory and Floer homology vanish for 2-bipolar knots. Moreover, our knots bound smoothly embedded height four gropes in $D^4$, an a priori stronger condition than being 2-solvable. We use new lower bounds for the 4-genus arising from $L^{(2)}$-signature defects associated to meta-metabelian representations of the fundamental group.
△ Less
Submitted 17 July, 2020; v1 submitted 7 January, 2019;
originally announced January 2019.
-
In-network Congestion-aware Load Balancing at Transport Layer
Authors:
Ashkan Aghdai,
Michael I. -C. Wang,
Yang Xu,
Charles H. -P. Wen,
H. Jonathan Chao
Abstract:
Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks, where per-connection consistency (PCC) has to be met for optimal performance. Cloud-native L4 load balancers are commonly deployed as virtual network functions (VNFs) and are a critical forwarding element in modern cloud infrastructure. We identify load imbalance among servic…
▽ More
Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks, where per-connection consistency (PCC) has to be met for optimal performance. Cloud-native L4 load balancers are commonly deployed as virtual network functions (VNFs) and are a critical forwarding element in modern cloud infrastructure. We identify load imbalance among service instances as the main cause of additional processing delay caused by transport-layer load balancers. Existing transport-layer load balancers rely on one of two methods: host-level traffic redirection, which may add as much as 12.48% additional traffic to underlying networks, or connection tracking, which consumes a considerable amount of memory in load balancers. Both of these methods result in inefficient usage of network resources. We propose the in-network congestion-aware load Balancer (INCAB) to achieve even load distribution among service instances and optimal network resources usage in addition to meeting the PCC requirement. We show that INCAB is capable of identifying and monitoring each instance's most-utilized resource and can improve the load distribution among all service instances. INCAB utilizes a Bloom filter and an ultra-compact connection table for in-network flow distribution. Furthermore, it does not rely on end hosts for traffic redirection. Our flow level simulations show that INCAB improves flows' average completion time by 31.97% compared to stateless solutions.
△ Less
Submitted 13 June, 2019; v1 submitted 23 November, 2018;
originally announced November 2018.
-
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs
Authors:
Ahmad Al Badawi,
** Chao,
Jie Lin,
Chan Fook Mun,
Jun Jie Sim,
Benjamin Hong Meng Tan,
Xiao Nan,
Khin Mi Mi Aung,
Vijay Ramaseshan Chandrasekhar
Abstract:
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model. The biggest concern with DLaaS is user privacy if the input samples are sensitive data. We provide here an efficient privacy-preserving system by employing high-end technologies…
▽ More
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model. The biggest concern with DLaaS is user privacy if the input samples are sensitive data. We provide here an efficient privacy-preserving system by employing high-end technologies such as Fully Homomorphic Encryption (FHE), Convolutional Neural Networks (CNNs) and Graphics Processing Units (GPUs). FHE, with its widely-known feature of computing on encrypted data, empowers a wide range of privacy-concerned applications. This comes at high cost as it requires enormous computing power. In this paper, we show how to accelerate the performance of running CNNs on encrypted data with GPUs. We evaluated two CNNs to classify homomorphically the MNIST and CIFAR-10 datasets. Our solution achieved a sufficient security level (> 80 bit) and reasonable classification accuracy (99%) and (77.55%) for MNIST and CIFAR-10, respectively. In terms of latency, we could classify an image in 5.16 seconds and 304.43 seconds for MNIST and CIFAR-10, respectively. Our system can also classify a batch of images (> 8,000) without extra overhead.
△ Less
Submitted 18 August, 2020; v1 submitted 2 November, 2018;
originally announced November 2018.
-
C2TCP: A Flexible Cellular TCP to Meet Stringent Delay Requirements
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathan Chao
Abstract:
Since current widely available network protocols/systems are mainly throughput-oriented designs, meeting stringent delay requirements of new applications such as virtual reality and vehicle-to-vehicle communications on cellular network requires new network protocol/system designs. C2TCP is an effort toward that new design direction.
C2TCP is inspired by in-network active queue management (AQM) d…
▽ More
Since current widely available network protocols/systems are mainly throughput-oriented designs, meeting stringent delay requirements of new applications such as virtual reality and vehicle-to-vehicle communications on cellular network requires new network protocol/system designs. C2TCP is an effort toward that new design direction.
C2TCP is inspired by in-network active queue management (AQM) designs such as RED and CoDel and motivated by lack of a flexible end-to-end (e2e) approach which can adapt itself to different applications' QoS requirements without modifying any network devices. It copes with unique challenges in cellular networks for achieving ultra-low latency (including highly variable channels, deep per-user buffers, self-inflicted queuing delays, radio uplink/downlink scheduling delays) and intends to satisfy stringent delay requirements of different applications while maximizing the throughput. C2TCP works on top of classic throughput-oriented TCP and accommodates various target delays without requiring any channel prediction, network state profiling, or complicated rate adjustment mechanisms.
We have evaluated C2TCP in both real-world environment and extensive trace-based emulations and compared its performance with different TCP variants and state-of-the-art schemes including PCC-Vivace, Google's BBR, Verus, Sprout, TCP Westwood, and Cubic. Results show that C2TCP outperforms all these schemes and achieves lower average delay, jitter, and 95th percentile delay for packets.
△ Less
Submitted 3 December, 2018; v1 submitted 29 October, 2018;
originally announced October 2018.
-
Evolution of Photospheric Vector Magnetic Field Associated with Moving Flare Ribbons As Seen By GST
Authors:
Chang Liu,
Wenda Cao,
Jongchul Chae,
Kwangsu Ahn,
Debi Prasad Choudhary,
Jeongwoo Lee,
Rui Liu,
Na Deng,
Jiasheng Wang,
Haimin Wang
Abstract:
The photospheric response to solar flares, also known as coronal back reaction, is often observed as sudden flare-induced changes in vector magnetic field and sunspot motions. However, it remains obscure whether evolving flare ribbons, the flare signature closest to the photosphere, are accompanied by changes in vector magnetic field therein. Here we explore the relationship between the dynamics o…
▽ More
The photospheric response to solar flares, also known as coronal back reaction, is often observed as sudden flare-induced changes in vector magnetic field and sunspot motions. However, it remains obscure whether evolving flare ribbons, the flare signature closest to the photosphere, are accompanied by changes in vector magnetic field therein. Here we explore the relationship between the dynamics of flare ribbons in the chromosphere and variations of magnetic fields in the underlying photosphere, using high-resolution off-band H-alpha images and near-infrared vector magnetograms of the M6.5 flare on 2015 June 22 observed with the 1.6 m Goode Solar Telescope. We find that changes of photospheric fields occur at the arrival of the flare ribbon front, thus propagating analogously to flare ribbons. In general, the horizontal field increases and the field lines become more inclined to the surface. When ribbons sweep through regions that undergo a rotational motion, the fields transiently turn more vertical with decreased horizontal field and inclination angle, and then restore and/or become more horizontal than before the ribbon arrival. The ribbon propagation decelerates near the sunspot rotation center, where the vertical field becomes permanently enhanced. Similar magnetic field changes are discernible in magnetograms from the Helioseismic and Magnetic Imager (HMI), and an inward collapse of coronal magnetic fields is inferred from the time sequence of non-linear force-free field models extrapolated from HMI magnetograms. We conclude that photospheric fields respond nearly instantaneously to magnetic reconnection in the corona.
△ Less
Submitted 27 October, 2018;
originally announced October 2018.
-
Phase diagram of two-color QCD matter at finite baryon and axial isospin densities
Authors:
**gyi Chao
Abstract:
We study the two-color QCD matter within two fundamental quark flavors via both chiral perturbation theory and Nambu--Jona-Lasinio model methods. The effective Lagrangian described by low lying meson and baryon, i.e., diquark, is derived, where the excitations locate in the extended $\mathrm{SU}(4)$ flavor symmetry space. We determine the leading order terms on the dependence of the baryon and axi…
▽ More
We study the two-color QCD matter within two fundamental quark flavors via both chiral perturbation theory and Nambu--Jona-Lasinio model methods. The effective Lagrangian described by low lying meson and baryon, i.e., diquark, is derived, where the excitations locate in the extended $\mathrm{SU}(4)$ flavor symmetry space. We determine the leading order terms on the dependence of the baryon and axial isospin densities. Then, the two-color NJL model is employed to run the numerical simulation and the phase diagram in the plane of $μ-ν_{5}$ is plotted.
△ Less
Submitted 6 August, 2018;
originally announced August 2018.
-
HyLine: a Simple and Practical Flow Scheduling for Commodity Datacenters
Authors:
Soheil Abbasloo,
Yang Xu,
H. Jonathan Chao
Abstract:
Today's datacenter networks (DCNs) have been built upon multipath topologies where each path contains multiple links. However, flow scheduling schemes proposed to minimize flow completion times (FCT) in DCNs are based on algorithms which are optimum or close-to-optimum only over single link. Moreover, most of these scheduling schemes seek either fully centralized approaches having overhead of comm…
▽ More
Today's datacenter networks (DCNs) have been built upon multipath topologies where each path contains multiple links. However, flow scheduling schemes proposed to minimize flow completion times (FCT) in DCNs are based on algorithms which are optimum or close-to-optimum only over single link. Moreover, most of these scheduling schemes seek either fully centralized approaches having overhead of communicating to a central entity or fully distributed approaches requiring changes in the fabric. Motivated by these shortcomings, we present HyLine a simple scheduling design for commodity DCNs which is equipped with a joint load-balancing and flow scheduling (path-aware) design exploiting the multipath nature of DCNs. HyLine takes a hybrid approach and uses the global-awareness of centralized and agility of distributed techniques without requiring any changes in the fabric. To that end, it determines a threshold margin identifying flows for which using centralized approach is beneficial. We have shown through extensive ns2 simulations that despite HyLine's simplicity, it significantly outperforms existing schemes and achieves lower average and 99th percentile FCTs. For instance, compared to Qjump-state-of-the-art practical scheme-and pFabric-one of the best performing flow scheduling schemes-HyLine reduces average FCT up to 68% and 31%, respectively, under a production datacenter workload.
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
A family of freely slice good boundary links
Authors:
Jae Choon Cha,
Min Hoon Kim,
Mark Powell
Abstract:
We show that every good boundary link with a pair of derivative links on a Seifert surface satisfying a homotopically trivial plus assumption is freely slice. This subsumes all previously known methods for freely slicing good boundary links with two or more components, and provides new freely slice links.
We show that every good boundary link with a pair of derivative links on a Seifert surface satisfying a homotopically trivial plus assumption is freely slice. This subsumes all previously known methods for freely slicing good boundary links with two or more components, and provides new freely slice links.
△ Less
Submitted 30 August, 2019; v1 submitted 14 July, 2018;
originally announced July 2018.
-
Cellular Controlled Delay TCP (C2TCP)
Authors:
Soheil Abbasloo,
Tong Li,
Yang Xu,
H. Jonathan Chao
Abstract:
Cellular networks have special characteristics including highly variable channels, fast fluctuating capacities, deep per user buffers, self-inflicted queuing delays, radio uplink/downlink scheduling delays, etc. These distinguishing properties make the problem of achieving low latency and high throughput in cellular networks more challenging than in wired networks. That's why in this environment,…
▽ More
Cellular networks have special characteristics including highly variable channels, fast fluctuating capacities, deep per user buffers, self-inflicted queuing delays, radio uplink/downlink scheduling delays, etc. These distinguishing properties make the problem of achieving low latency and high throughput in cellular networks more challenging than in wired networks. That's why in this environment, TCP and its flavors, which are generally designed for wired networks, perform poorly.
To cope with these challenges, we present C2TCP, a flexible end-to-end solution targeting interactive applications requiring high throughput and low delay in cellular networks. C2TCP stands on top of loss-based TCP and brings it delay sensitivity without requiring any network state profiling, channel prediction, or complicated rate adjustment mechanisms. The key idea behind C2TCP is to absorb dynamics of unpredictable cellular channels by investigating local minimum delay of packets in a moving time window and react to the cellular network's capacity changes very fast.
Through extensive trace-based evaluations using traces from five commercial LTE and 3G networks, we have compared performance of C2TCP with various TCP variants, and state-of-the-art schemes including BBR, Verus, and Sprout. Results show that on average, C2TCP outperforms these schemes and achieves lower average and 95th percentile delay for packets.
△ Less
Submitted 7 July, 2018;
originally announced July 2018.
-
Experimental realization of on-chip topological nanoelectromechanical metamaterials
Authors:
**woong Cha,
Kun Woo Kim,
Chiara Daraio
Abstract:
Topological mechanical metamaterials translate condensed matter phenomena, like non-reciprocity and robustness to defects, into classical platforms. At small scales, topological nanoelectromechanical metamaterials (NEMM) can enable the realization of on-chip acoustic components, like unidirectional waveguides and compact delay-lines for mobile devices. Here, we report the experimental realization…
▽ More
Topological mechanical metamaterials translate condensed matter phenomena, like non-reciprocity and robustness to defects, into classical platforms. At small scales, topological nanoelectromechanical metamaterials (NEMM) can enable the realization of on-chip acoustic components, like unidirectional waveguides and compact delay-lines for mobile devices. Here, we report the experimental realization of NEMM phononic topological insulators, consisting of two-dimensional arrays of free-standing silicon nitride (SiN) nanomembranes that operate at high frequencies (10-20 MHz). We experimentally demonstrate the presence of edge states, by characterizing their localization and Dirac cone-like frequency dispersion. Our topological waveguides also exhibit robustness to waveguide distortions and pseudospin-dependent transport. The suggested devices open wide opportunities to develop functional acoustic systems for high-frequency signal processing applications.
△ Less
Submitted 27 June, 2018;
originally announced June 2018.
-
Spotlight: Scalable Transport Layer Load Balancing for Data Center Networks
Authors:
Ashkan Aghdai,
Cing-Yu Chu,
Yang Xu,
David H. Dai,
Jun Xu,
H. Jonathan Chao
Abstract:
Load Balancing plays a vital role in modern data centers to distribute traffic among instances of network functions or services. State-of-the-art load balancers such as Silkroad dispatch traffic obliviously without considering the real-time utilization of service instances and therefore can lead to uneven load distribution and suboptimal performance.
In this paper, we design and implement Spotli…
▽ More
Load Balancing plays a vital role in modern data centers to distribute traffic among instances of network functions or services. State-of-the-art load balancers such as Silkroad dispatch traffic obliviously without considering the real-time utilization of service instances and therefore can lead to uneven load distribution and suboptimal performance.
In this paper, we design and implement Spotlight, a scalable and distributed load balancing architecture that maintains connection-to-instance map** consistency at the edge of data center networks. Spotlight uses a new stateful flow dispatcher which periodically polls instances' load and dispatches incoming connections to instances in proportion to their available capacity. Our design utilizes distributed control plane and in-band flow dispatching and thus scales horizontally in data center networks. Through extensive flow-level simulation and packet-level experiments on a testbed, we demonstrate that compared to existing methods Spotlight distributes the traffic more efficiently and has near-optimum performance in terms of overall service utilization. Moreover, Spotlight is not sensitive to utilization polling interval and therefore can be implemented with low polling frequency to reduce the amount of control traffic. Indeed, Spotlight achieves the mentioned performance improvements using O(100ms) polling interval.
△ Less
Submitted 23 February, 2019; v1 submitted 21 June, 2018;
originally announced June 2018.
-
Idiosyncratic Approach to Visualize Degradation of Black Phosphorus
Authors:
Bilal Abbas Naqvi,
Muhammad Arslan Shehzad,
Janghwan Cha,
Kyung Ah Min,
M. Farooq Khan,
Sajjad Hussain,
Seo Yongho,
Suklyun Hong,
Eom Jonghwa,
Jung Jongwan
Abstract:
Black Phosphorus (BP) is an excellent material for post graphene era due to its layer dependent band gap, high mobility and high Ion/Ioff. However, its poor stability in ambient poses a great challenge in its practical and long-term usage. Optical visualization of oxidized BP is the key and foremost step for its successful passivation from the ambience. Here, we have done a systematic study of the…
▽ More
Black Phosphorus (BP) is an excellent material for post graphene era due to its layer dependent band gap, high mobility and high Ion/Ioff. However, its poor stability in ambient poses a great challenge in its practical and long-term usage. Optical visualization of oxidized BP is the key and foremost step for its successful passivation from the ambience. Here, we have done a systematic study of the oxidation of BP and developed a technique to optically identify the oxidation of BP using Liquid Crystal (LC). Interestingly we found that rapid oxidation of thin layers of BP makes them disappear and can be envisaged by using the alignment of LC. The molecular dynamics simulations also proved the preferential alignment of LC on oxidized BP. We believe that this simple technique will be effective in passivation efforts of BP and will enable it for exploitation of its properties in the field of electronics.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
To Centralize or Not to Centralize: A Tale of Swarm Coordination
Authors:
Justin Hu,
Ariana Bruno,
Drew Zagieboylo,
Mark Zhao,
Brian Ritchken,
Brendon Jackson,
Joo Yeon Chae,
Francois Mertil,
Mateo Espinosa,
Christina Delimitrou
Abstract:
Large swarms of autonomous devices are increasing in size and importance. When it comes to controlling the devices of large-scale swarms there are two main lines of thought. Centralized control, where all decisions - and often compute - happen in a centralized back-end cloud system, and distributed control, where edge devices are responsible for selecting and executing tasks with minimal or zero h…
▽ More
Large swarms of autonomous devices are increasing in size and importance. When it comes to controlling the devices of large-scale swarms there are two main lines of thought. Centralized control, where all decisions - and often compute - happen in a centralized back-end cloud system, and distributed control, where edge devices are responsible for selecting and executing tasks with minimal or zero help from a centralized entity. In this work we aim to quantify the trade-offs between the two approaches with respect to task assignment quality, latency, and reliability. We do so first on a local swarm of 12 programmable drones with a 10-server cluster as the backend cloud, and then using a validated simulator to study the tail at scale effects of swarm coordination control. We conclude that although centralized control almost always outperforms distributed in the quality of its decisions, it faces significant scalability limitations, and we provide a list of system challenges that need to be addressed for centralized control to scale.
△ Less
Submitted 4 May, 2018;
originally announced May 2018.
-
Charged pion condensation under parallel electromagnetic fields
Authors:
**gyi Chao,
Mei Huang,
Andrey Radzhabov
Abstract:
The formation of charged pion condensate under parallel electromagnetic fields is studied within the two-flavor Nambu--Jona-Lasinio model. The technique of Schwinger proper time method is extended to explore the quantity locating in the off-diagonal flavor space, i.e., charged pion. We obtain the associated effective potential as a function of the strength of the electromagnetic fields and find ou…
▽ More
The formation of charged pion condensate under parallel electromagnetic fields is studied within the two-flavor Nambu--Jona-Lasinio model. The technique of Schwinger proper time method is extended to explore the quantity locating in the off-diagonal flavor space, i.e., charged pion. We obtain the associated effective potential as a function of the strength of the electromagnetic fields and find out that it contains a sextic term which possibly induce weakly first order phase transition. Dependence of pion condensation on model parameters is investigated.
△ Less
Submitted 2 May, 2018;
originally announced May 2018.
-
Nonlinear nano-electromechanical lattices for high-frequency, tunable stress propagation
Authors:
**woong Cha,
Chiara Daraio
Abstract:
Active manipulation of mechanical waves at high frequencies opens opportunities in heat management, radio-frequency (RF) signal processing, and quantum technologies. Nanoelectromechanical systems (NEMS) are appropriate platforms for develo** these technologies, offering energy transducibility between different physical domains, for example, converting optical or electrical signals into mechanica…
▽ More
Active manipulation of mechanical waves at high frequencies opens opportunities in heat management, radio-frequency (RF) signal processing, and quantum technologies. Nanoelectromechanical systems (NEMS) are appropriate platforms for develo** these technologies, offering energy transducibility between different physical domains, for example, converting optical or electrical signals into mechanical vibrations and viceversa. Existing NEMS platforms, however, are mostly linear, passive, and not dynamically controllable. Here, we report the realization of active manipulation of frequency band dispersion in one-dimensional (1D) nonlinear nanoelectromechanical lattices (NEML) in the RF domain (10-30 MHz). Our NEML is comprised of a periodic arrangement of mechanically coupled free-standing nano-membranes, with circular clamped boundaries. This design forms a flexural phononic crystals with a well-defined band gaps, 1.8 MHz wide. The application a DC gate voltage creates voltage-dependent on-site potentials, which can significantly shift the frequency bands of the device. Dynamic modulation of the voltage triggers nonlinear effects, which induce the formation of phononic band gaps in the acoustic branch. These devices could be used in tunable filters, ultrasonic delay lines and transducers for implantable medical devices.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Surface reconstruction and charge modulation in BaFe2As2 superconducting film
Authors:
S. Kim,
S. Yi,
M. Oh,
B. G. Jang,
W. Nam,
Y. -C. Yoo,
M. Lee,
H. Jeon,
I. Zoh,
H. Lee,
C. Zhang,
K. H. Kim,
J. Seo,
J. H. Shim,
J. S. Chae,
Y. Kuk
Abstract:
Whether or not epitaxially grown superconducting films have the same bulk-like superconducting properties is an important concern. We report the structure and the electronic properties of epitaxially grown Ba(Fe1-xCox)2As2 films using scanning tunneling microscopy and scanning tunneling spectroscopy (STS). This film showed a different surface structure, (2sqrtx2sqrt2)R45 reconstruction, from those…
▽ More
Whether or not epitaxially grown superconducting films have the same bulk-like superconducting properties is an important concern. We report the structure and the electronic properties of epitaxially grown Ba(Fe1-xCox)2As2 films using scanning tunneling microscopy and scanning tunneling spectroscopy (STS). This film showed a different surface structure, (2sqrtx2sqrt2)R45 reconstruction, from those of as-cleaved surfaces from bulk crystals. The electronic structure of the grown film is different from that in bulk, and it is notable that the film exhibits the same superconducting transport properties. We found that the superconducting gap at the surface is screened at the Ba layer surface in STS measurements, and the charge density wave was observed at the surface in sample in the superconducting state.
△ Less
Submitted 7 March, 2018; v1 submitted 5 March, 2018;
originally announced March 2018.
-
Selective resolution of phonon modes in STM-IETS on clean and oxygen-adsorbed Cu(100) surfaces
Authors:
Minjun Lee,
Myungchul Oh,
Hoyeon Jeon,
Sunwouk Yi,
Inhae Zoh,
Chao Zhang,
Jungseok Chae,
Young Kuk
Abstract:
The observation of surface phonon dispersion using local probes can provide important information related to local structural and thermal properties. In this study, surface phonon modes on a Cu(100) surface were measured using the inelastic tunneling spectroscopy of scanning tunneling microscopy (STM-IETS) with atomically sharp tips. Different phonon modes were selectively measured depending on th…
▽ More
The observation of surface phonon dispersion using local probes can provide important information related to local structural and thermal properties. In this study, surface phonon modes on a Cu(100) surface were measured using the inelastic tunneling spectroscopy of scanning tunneling microscopy (STM-IETS) with atomically sharp tips. Different phonon modes were selectively measured depending on the structures of the probing tips or the surfaces. Two different surface phonon modes, at 19.0 meV on a clean Cu(100) surface and at 13.5 meV on an oxygen-adsorbed Cu(100) surface, are explained by the selection rules. Additionally, the spatial variation in STM-IETS showed surface stress relaxation.
△ Less
Submitted 5 March, 2018; v1 submitted 2 March, 2018;
originally announced March 2018.
-
Discussions on non-probabilistic convex modelling for uncertain problems
Authors:
Ni Bingyu,
Jiang Chao,
Huang Zhiliang
Abstract:
Non-probabilistic convex model utilizes a convex set to quantify the uncertainty domain of uncertain-but-bounded parameters, which is very effective for structural uncertainty analysis with limited or poor-quality experimental data. To overcome the complexity and diversity of the formulations of current convex models, in this paper, a unified framework for construction of the non-probabilistic con…
▽ More
Non-probabilistic convex model utilizes a convex set to quantify the uncertainty domain of uncertain-but-bounded parameters, which is very effective for structural uncertainty analysis with limited or poor-quality experimental data. To overcome the complexity and diversity of the formulations of current convex models, in this paper, a unified framework for construction of the non-probabilistic convex models is proposed. By introducing the correlation analysis technique, the mathematical expression of a convex model can be conveniently formulated once the correlation matrix of the uncertain parameters is created. More importantly, from the theoretic analysis level, an evaluation criterion for convex modelling methods is proposed, which can be regarded as a test standard for validity verification of subsequent newly proposed convex modelling methods. And from the practical application level, two model assessment indexes are proposed, by which the adaptabilities of different convex models to a specific uncertain problem with given experimental samples can be estimated. Four numerical examples are investigated to demonstrate the effectiveness of the present study.
△ Less
Submitted 29 November, 2017;
originally announced January 2018.
-
Transient rotation of photospheric vector magnetic fields associated with a solar flare
Authors:
Yan Xu,
Wenda Cao,
Kwangsu Ahn,
Ju **g,
Chang Liu,
Jongchul Chae,
Nengyi Huang,
Na Deng,
Dale E. Gary,
Haimin Wang
Abstract:
As one of the most violent eruptions on the Sun, flares are believed to be powered by magnetic reconnection. The fundamental physics involving the release, transfer and deposition of energy have been studied extensively. Taking advantage of the unprecedented resolution provided by the 1.6-m Goode Solar Telescope, here we show a sudden rotation of vector magnetic fields, about 12$^{\circ}$-20…
▽ More
As one of the most violent eruptions on the Sun, flares are believed to be powered by magnetic reconnection. The fundamental physics involving the release, transfer and deposition of energy have been studied extensively. Taking advantage of the unprecedented resolution provided by the 1.6-m Goode Solar Telescope, here we show a sudden rotation of vector magnetic fields, about 12$^{\circ}$-20$^{\circ}$ counterclockwise, associated with a flare. Unlike the permanent changes reported previously, the azimuth-angle change is transient and co-spatial/temporal with H$α$ emission. The measured azimuth angle becomes closer to that in potential fields suggesting untwist of flare loops. The magnetograms were obtained in the near infrared at 1.56~$μ$m, which is minimally affected by flare emission and no intensity profile change was detected. We believe that these transient changes are real and discuss the possible explanations in which the high energy electron beams or $Alfv\acute{e}n$ waves play a crucial role.
△ Less
Submitted 9 January, 2018;
originally announced January 2018.
-
Generative Sensing: Transforming Unreliable Sensor Data for Reliable Recognition
Authors:
Lina Karam,
Tejas Borkar,
Yu Cao,
Junseok Chae
Abstract:
This paper introduces a deep learning enabled generative sensing framework which integrates low-end sensors with computational intelligence to attain a high recognition accuracy on par with that attained with high-end sensors. The proposed generative sensing framework aims at transforming low-end, low-quality sensor data into higher quality sensor data in terms of achieved classification accuracy.…
▽ More
This paper introduces a deep learning enabled generative sensing framework which integrates low-end sensors with computational intelligence to attain a high recognition accuracy on par with that attained with high-end sensors. The proposed generative sensing framework aims at transforming low-end, low-quality sensor data into higher quality sensor data in terms of achieved classification accuracy. The low-end data can be transformed into higher quality data of the same modality or into data of another modality. Different from existing methods for image generation, the proposed framework is based on discriminative models and targets to maximize the recognition accuracy rather than a similarity measure. This is achieved through the introduction of selective feature regeneration in a deep neural network (DNN). The proposed generative sensing will essentially transform low-quality sensor data into high-quality information for robust perception. Results are presented to illustrate the performance of the proposed framework.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
Three-minute Sunspot Oscillations Driven by Magnetic Reconnection in a Light Bridge
Authors:
Donguk Song,
Jongchul Chae,
Hannah Kwak,
Ryouhei Kano,
Vasyl Yurchyshyn,
Yong-Jae Moon,
Eun-Kyung Lim,
Jeongwoo Lee
Abstract:
We report a different type of three-minute chromospheric oscillations above a sunspot in association with a small-scale impulsive event in a light bridge. During our observations, we found a transient brightening in the light bridge. The brightening was composed of elementary bursts that may be a manifestation of fast repetitive magnetic reconnections in the light bridge. Interestingly, the oscill…
▽ More
We report a different type of three-minute chromospheric oscillations above a sunspot in association with a small-scale impulsive event in a light bridge. During our observations, we found a transient brightening in the light bridge. The brightening was composed of elementary bursts that may be a manifestation of fast repetitive magnetic reconnections in the light bridge. Interestingly, the oscillations in the nearby sunspot umbra were impulsively excited when the intensity of the brightening reached its peak. The initial period of the oscillations was about 2.3 minutes and then gradually increased to 3.0 minutes with time. In addition, we found that the amplitude of the excited oscillations was twice the amplitude of oscillations before the brightening. Based on our results, we propose that magnetic reconnection occurring in a light bridge can excite of oscillations in the nearby sunspot umbra.
△ Less
Submitted 17 November, 2017;
originally announced November 2017.
-
Observation of a Large-scale Quasi-circular Secondary Ribbon associated with Successive Flares and a Halo CME
Authors:
Eun-Kyung Lim,
Vasyl Yurchyshyn,
Pankaj Kumar,
Kyuhyoun Cho,
Chaowei Jiang,
Su** Kim,
Heesu Yang,
Jongchul Chae,
Kyung-Suk Cho,
Jeongwoo Lee
Abstract:
Solar flare ribbons provide an important clue to the magnetic reconnection process and associated magnetic field topology in the solar corona. We detected a large-scale secondary flare ribbon of a circular shape that developed in association with two successive M-class flares and one CME. The ribbon revealed interesting properties such as 1) a quasi-circular shape and enclosing the central active…
▽ More
Solar flare ribbons provide an important clue to the magnetic reconnection process and associated magnetic field topology in the solar corona. We detected a large-scale secondary flare ribbon of a circular shape that developed in association with two successive M-class flares and one CME. The ribbon revealed interesting properties such as 1) a quasi-circular shape and enclosing the central active region; 2) the size as large as 500\arcsec\, by 650\arcsec\,, 3) successive brightenings in the clockwise direction at a speed of \kms{160} starting from the nearest position to the flaring sunspots, 4) radial contraction and expansion in the northern and the southern part, respectively at speeds of $\leq$ \kms{10}. Using multi-wavelength data from \textit{SDO}, \textit{RHESSI}, XRT, and Nobeyama, along with magnetic field extrapolations, we found that: 1) the secondary ribbon location is consistent with the field line footpoints of a fan-shaped magnetic structure that connects the flaring region and the ambient decaying field; 2) the second M2.6 flare occurred when the expanding coronal loops driven by the first M2.0 flare encountered the background decayed field. 3) Immediately after the second flare, the secondary ribbon developed along with dimming regions. Based on our findings, we suggest that interaction between the expanding sigmoid field and the overlying fan-shaped field triggered the secondary reconnection that resulted in the field opening and formation of the quasi-circular secondary ribbon. We thus conclude that interaction between the active region and the ambient large-scale fields should be taken into account to fully understand the entire eruption process.
△ Less
Submitted 2 November, 2017;
originally announced November 2017.
-
The bipolar filtration of topologically slice knots
Authors:
Jae Choon Cha,
Min Hoon Kim
Abstract:
The bipolar filtration of Cochran, Harvey and Horn presents a framework of the study of deeper structures in the smooth concordance group of topologically slice knots. We show that the graded quotient of the bipolar filtration of topologically slice knots has infinite rank at each stage greater than one. To detect nontrivial elements in the quotient, the proof simultaneously uses higher order amen…
▽ More
The bipolar filtration of Cochran, Harvey and Horn presents a framework of the study of deeper structures in the smooth concordance group of topologically slice knots. We show that the graded quotient of the bipolar filtration of topologically slice knots has infinite rank at each stage greater than one. To detect nontrivial elements in the quotient, the proof simultaneously uses higher order amenable Cheeger-Gromov $L^2$ $ρ$-invariants and infinitely many Heegaard Floer correction term $d$-invariants.
△ Less
Submitted 28 June, 2021; v1 submitted 21 October, 2017;
originally announced October 2017.
-
On Optimal Operational Sequence of Components in a Warm Standby System
Authors:
M. Finkelstein,
N. K. Hazra,
J. H. Cha
Abstract:
We consider an open problem of optimal operational sequence for the $1$-out-of-$n$ system with warm standby. Using the virtual age concept and the cumulative exposure model, we show that the components should be activated in accordance with the increasing sequence of their lifetimes. Lifetimes of the components and the system are compared with respect to the stochastic precedence order. Only speci…
▽ More
We consider an open problem of optimal operational sequence for the $1$-out-of-$n$ system with warm standby. Using the virtual age concept and the cumulative exposure model, we show that the components should be activated in accordance with the increasing sequence of their lifetimes. Lifetimes of the components and the system are compared with respect to the stochastic precedence order. Only specific cases of this optimal problem were considered in the literature previously.
△ Less
Submitted 6 December, 2018; v1 submitted 18 October, 2017;
originally announced October 2017.
-
Large-Scale Location-Aware Services in Access: Hierarchical Building/Floor Classification and Location Estimation using Wi-Fi Fingerprinting Based on Deep Neural Networks
Authors:
Kyeong Soo Kim,
Ruihao Wang,
Zhenghang Zhong,
Zikun Tan,
Haowei Song,
Jaehoon Cha,
Sanghyuk Lee
Abstract:
One of key technologies for future large-scale location-aware services in access is a scalable indoor localization technique. In this paper, we report preliminary results from our investigation on the use of deep neural networks (DNNs) for hierarchical building/floor classification and floor-level location estimation based on Wi-Fi fingerprinting, which we carried out as part of a feasibility stud…
▽ More
One of key technologies for future large-scale location-aware services in access is a scalable indoor localization technique. In this paper, we report preliminary results from our investigation on the use of deep neural networks (DNNs) for hierarchical building/floor classification and floor-level location estimation based on Wi-Fi fingerprinting, which we carried out as part of a feasibility study project on Xi'an Jiaotong-Liverpool University (XJTLU) Campus Information and Visitor Service System. To take into account the hierarchical nature of the building/floor classification problem, we propose a new DNN architecture based on a stacked autoencoder for the reduction of feature space dimension and a feed-forward classifier for multi-label classification with argmax functions to convert multi-label classification results into multi-class classification ones. We also describe the demonstration of a prototype DNN-based indoor localization system for floor-level location estimation using real received signal strength (RSS) data collected at one of the buildings on the XJTLU campus. The preliminary results for both building/floor classification and floor-level location estimation clearly show the strengths of DNN-based approaches, which can provide near state-of-the-art performance with less parameter tuning and higher scalability.
△ Less
Submitted 10 October, 2017; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Fused Segmentation of Geometric Models for Myocardium and Coronary Artery via Medial Axis
Authors:
Jehyun Chaa,
Joonghyun Ryub,
**-Ho Choi,
Deok-Soo Kim
Abstract:
Coronary arteries and their branches supply blood to myocardium. The obstruction of coronary arteries results in significant loss of myocardium, called acute myocardial infarction, and the number one cause of death globally. Hence, quantification of the regional amount of heart muscle subtended by obstructed coronary arteries is of critical value in clinical medicine. However, the conventional met…
▽ More
Coronary arteries and their branches supply blood to myocardium. The obstruction of coronary arteries results in significant loss of myocardium, called acute myocardial infarction, and the number one cause of death globally. Hence, quantification of the regional amount of heart muscle subtended by obstructed coronary arteries is of critical value in clinical medicine. However, the conventional methods are inaccurate and frequently disagree with clinical practices. This study proposes a novel algorithm to segment regional myocardium-at-risk subtended by any potentially obstructed coronary artery. Assuming the geometric triangular mesh models of coronary artery and myocardium derived from an individual cardiac computed tomography image, the proposed algorithm performs (i) computation of the medial axis of the coronary artery and (ii) segmentation of the coronary artery and myocardium using the medial axis. The algorithm provides the fused segmentation of coronary artery and myocardium via the medial axis. The computed result provides a robust mathematical linkage between myocardium-at-risk and supplying coronary arteries so that ischemic myocardial regions can be accurately identified, and both the extent and severity of myocardial ischemia can be quantified effectively and efficiently. Furthermore, the correspondence between segmented coronary artery and myocardium can be more importantly used for building optimization models of cardiac systems for various applications. We believe that the proposed algorithm and implemented VoroHeart program, which is freely available at http://voronoi.hanyang.ac.kr/software/voroheart, will be an invaluable tool for patient-specific risk predictions and the treatment of obstructed coronary artery disease in clinical medicine. The algorithmic accuracy and efficiency are theoretically asserted and experimentally verified.
△ Less
Submitted 29 August, 2017;
originally announced August 2017.
-
Solar Multiple Eruptions From a Confined Magnetic Structure
Authors:
Jeongwoo Lee,
Chang Liu,
Ju **g,
Jongchul Chae
Abstract:
How eruption can recur from a confined magnetic structure is discussed based on the {\it Solar Dynamics Observatory} (SDO) observations of the NOAA active region 11444, which produced three eruptions within 1.5 hours on March 27, 2012. The active region had the positive polarity magnetic fields in the center surrounded by the negative polarity fields around. Since such a distribution of magnetic p…
▽ More
How eruption can recur from a confined magnetic structure is discussed based on the {\it Solar Dynamics Observatory} (SDO) observations of the NOAA active region 11444, which produced three eruptions within 1.5 hours on March 27, 2012. The active region had the positive polarity magnetic fields in the center surrounded by the negative polarity fields around. Since such a distribution of magnetic polarity tends to form a dome-like magnetic fan structure confined over the active region, the multiple eruptions was puzzling. Our investigation reveals that this event exhibits several properties distinct from other eruptions associated with magnetic fan structures: (i) a long filament encircling the active region was present before the eruptions; (ii) expansion of the open-closed boundary of the field lines after each eruption suggestive of the growing fan-dome structure, and (iii) the ribbons inside the closed magnetic polarity inversion line evolving in response to the expanding open-closed boundary. It thus appears that in spite of multiple eruptions the fan-dome structure remained undamaged, and the closing back field lines after each eruption rather reinforced the fan-dome structure. We argue that the multiple eruptions could occur in this active region in spite of its confined magnetic structure because the filament encircling the active region was adequate for slip** through the magnetic separatrix to minimize the damage to its overlying fan-dome structure. The result of this study provides a new insight into the productivity of eruptions from a confined magnetic structure.
△ Less
Submitted 14 August, 2017;
originally announced August 2017.