-
DAQE: Enhancing the Quality of Compressed Images by Exploiting the Inherent Characteristic of Defocus
Authors:
Qunliang Xing,
Mai Xu,
Xin Deng,
Yichen Guo
Abstract:
Image defocus is inherent in the physics of image formation caused by the optical aberration of lenses, providing plentiful information on image quality. Unfortunately, existing quality enhancement approaches for compressed images neglect the inherent characteristic of defocus, resulting in inferior performance. This paper finds that in compressed images, significantly defocused regions have bette…
▽ More
Image defocus is inherent in the physics of image formation caused by the optical aberration of lenses, providing plentiful information on image quality. Unfortunately, existing quality enhancement approaches for compressed images neglect the inherent characteristic of defocus, resulting in inferior performance. This paper finds that in compressed images, significantly defocused regions have better compression quality, and two regions with different defocus values possess diverse texture patterns. These observations motivate our defocus-aware quality enhancement (DAQE) approach. Specifically, we propose a novel dynamic region-based deep learning architecture of the DAQE approach, which considers the regionwise defocus difference of compressed images in two aspects. (1) The DAQE approach employs fewer computational resources to enhance the quality of significantly defocused regions and more resources to enhance the quality of other regions; (2) The DAQE approach learns to separately enhance diverse texture patterns for regions with different defocus values, such that texture-specific enhancement can be achieved. Extensive experiments validate the superiority of our DAQE approach over state-of-the-art approaches in terms of quality enhancement and resource savings.
△ Less
Submitted 13 March, 2023; v1 submitted 20 November, 2022;
originally announced November 2022.
-
Beating the break-even point with a discrete-variable-encoded logical qubit
Authors:
Zhongchu Ni,
Sai Li,
Xiaowei Deng,
Yanyan Cai,
Libo Zhang,
Weiting Wang,
Zhen-Biao Yang,
Haifeng Yu,
Fei Yan,
Song Liu,
Chang-Ling Zou,
Luyan Sun,
Shi-Biao Zheng,
Yuan Xu,
Dapeng Yu
Abstract:
Quantum error correction (QEC) aims to protect logical qubits from noises by utilizing the redundancy of a large Hilbert space, where an error, once it occurs, can be detected and corrected in real time. In most QEC codes, a logical qubit is encoded in some discrete variables, e.g., photon numbers. Such encoding schemes make the codewords orthogonal, so that the encoded quantum information can be…
▽ More
Quantum error correction (QEC) aims to protect logical qubits from noises by utilizing the redundancy of a large Hilbert space, where an error, once it occurs, can be detected and corrected in real time. In most QEC codes, a logical qubit is encoded in some discrete variables, e.g., photon numbers. Such encoding schemes make the codewords orthogonal, so that the encoded quantum information can be unambiguously extracted after processing. Based on such discrete-variable encodings, repetitive QEC demonstrations have been reported on various platforms, but there the lifetime of the encoded logical qubit is still shorter than that of the best available physical qubit in the entire system, which represents a break-even point that needs to be surpassed for any QEC code to be of practical use. Here we demonstrate a QEC procedure with a logical qubit encoded in photon-number states of a microwave cavity, dispersively coupled to an ancilla superconducting qubit. By applying a pulse featuring a tailored frequency comb to the ancilla, we can repetitively extract the error syndrome with high fidelity and perform error correction with feedback control accordingly, thereby exceeding the break-even point by about 16% lifetime enhancement. Our work illustrates the potential of the hardware-efficient discrete-variable QEC codes towards a reliable quantum information processor.
△ Less
Submitted 5 April, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
On the distance-edge-monitoring numbers of graphs
Authors:
Chengxu Yang,
Ralf Klasing,
Ya** Mao,
Xingchao Deng
Abstract:
Foucaud et al. [Discrete Appl. Math. 319 (2022), 424-438] recently introduced and initiated the study of a new graph-theoretic concept in the area of network monitoring. For a set $M$ of vertices and an edge $e$ of a graph $G$, let $P(M, e)$ be the set of pairs $(x, y)$ with a vertex $x$ of $M$ and a vertex $y$ of $V(G)$ such that $d_G(x, y)\neq d_{G-e}(x, y)$. For a vertex $x$, let $EM(x)$ be the…
▽ More
Foucaud et al. [Discrete Appl. Math. 319 (2022), 424-438] recently introduced and initiated the study of a new graph-theoretic concept in the area of network monitoring. For a set $M$ of vertices and an edge $e$ of a graph $G$, let $P(M, e)$ be the set of pairs $(x, y)$ with a vertex $x$ of $M$ and a vertex $y$ of $V(G)$ such that $d_G(x, y)\neq d_{G-e}(x, y)$. For a vertex $x$, let $EM(x)$ be the set of edges $e$ such that there exists a vertex $v$ in $G$ with $(x, v) \in P(\{x\}, e)$. A set $M$ of vertices of a graph $G$ is distance-edge-monitoring set if every edge $e$ of $G$ is monitored by some vertex of $M$, that is, the set $P(M, e)$ is nonempty. The distance-edge-monitoring number of a graph $G$, denoted by $dem(G)$, is defined as the smallest size of distance-edge-monitoring sets of $G$. The vertices of $M$ represent distance probes in a network modeled by $G$; when the edge $e$ fails, the distance from $x$ to $y$ increases, and thus we are able to detect the failure. It turns out that not only we can detect it, but we can even correctly locate the failing edge. In this paper, we continue the study of \emph{distance-edge-monitoring sets}. In particular, we give upper and lower bounds of $P(M,e)$, $EM(x)$, $dem(G)$, respectively, and extremal graphs attaining the bounds are characterized. We also characterize the graphs with $dem(G)=3$.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Sybil-Proof Diffusion Auction in Social Networks
Authors:
Hongyin Chen,
Xiaotie Deng,
Ying Wang,
Yue Wu,
Dengji Zhao
Abstract:
A diffusion auction is a market to sell commodities over a social network, where the challenge is to incentivize existing buyers to invite their neighbors in the network to join the market. Existing mechanisms have been designed to solve the challenge in various settings, aiming at desirable properties such as non-deficiency, incentive compatibility and social welfare maximization. Since the mecha…
▽ More
A diffusion auction is a market to sell commodities over a social network, where the challenge is to incentivize existing buyers to invite their neighbors in the network to join the market. Existing mechanisms have been designed to solve the challenge in various settings, aiming at desirable properties such as non-deficiency, incentive compatibility and social welfare maximization. Since the mechanisms are employed in dynamic networks with ever-changing structures, buyers could easily generate fake nodes in the network to manipulate the mechanisms for their own benefits, which is commonly known as the Sybil attack. We observe that strategic agents may gain an unfair advantage in existing mechanisms through such attacks. To resist this potential attack, we propose two diffusion auction mechanisms, the Sybil tax mechanism (STM) and the Sybil cluster mechanism (SCM), to achieve both Sybil-proofness and incentive compatibility in the single-item setting. Our proposal provides the first mechanisms to protect the interests of buyers against Sybil attacks with a mild sacrifice of social welfare and revenue.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Low-latency Federated Learning with DNN Partition in Distributed Industrial IoT Networks
Authors:
Xiumei Deng,
Jun Li,
Chuan Ma,
Kang Wei,
Long Shi,
Ming Ding,
Wen Chen
Abstract:
Federated Learning (FL) empowers Industrial Internet of Things (IIoT) with distributed intelligence of industrial automation thanks to its capability of distributed machine learning without any raw data exchange. However, it is rather challenging for lightweight IIoT devices to perform computation-intensive local model training over large-scale deep neural networks (DNNs). Driven by this issue, we…
▽ More
Federated Learning (FL) empowers Industrial Internet of Things (IIoT) with distributed intelligence of industrial automation thanks to its capability of distributed machine learning without any raw data exchange. However, it is rather challenging for lightweight IIoT devices to perform computation-intensive local model training over large-scale deep neural networks (DNNs). Driven by this issue, we develop a communication-computation efficient FL framework for resource-limited IIoT networks that integrates DNN partition technique into the standard FL mechanism, wherein IIoT devices perform local model training over the bottom layers of the objective DNN, and offload the top layers to the edge gateway side. Considering imbalanced data distribution, we derive the device-specific participation rate to involve the devices with better data distribution in more communication rounds. Upon deriving the device-specific participation rate, we propose to minimize the training delay under the constraints of device-specific participation rate, energy consumption and memory usage. To this end, we formulate a joint optimization problem of device scheduling and resource allocation (i.e. DNN partition point, channel assignment, transmit power, and computation frequency), and solve the long-term min-max mixed integer non-linear programming based on the Lyapunov technique. In particular, the proposed dynamic device scheduling and resource allocation (DDSRA) algorithm can achieve a trade-off to balance the training delay minimization and FL performance. We also provide the FL convergence bound for the DDSRA algorithm with both convex and non-convex settings. Experimental results demonstrate the derived device-specific participation rate in terms of feasibility, and show that the DDSRA algorithm outperforms baselines in terms of test accuracy and convergence time.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Universal robust quantum gates by geometric correspondence of noisy quantum dynamics
Authors:
Yong-Ju Hai,
Junning Li,
Junkai Zeng,
Xiu-Hao Deng
Abstract:
Exposure to noises is a major obstacle for processing quantum information, but noises don't necessarily induce errors. Errors on the quantum gates could be suppressed via robust quantum control techniques. But understanding the genesis of errors and finding a universal treatment remains grueling. To resolve this issue, we develop a geometric theory to capture quantum dynamics due to various noises…
▽ More
Exposure to noises is a major obstacle for processing quantum information, but noises don't necessarily induce errors. Errors on the quantum gates could be suppressed via robust quantum control techniques. But understanding the genesis of errors and finding a universal treatment remains grueling. To resolve this issue, we develop a geometric theory to capture quantum dynamics due to various noises graphically, obtaining the quantum erroneous evolution diagrams (QEED). Our theory provides explicit necessary and sufficient criteria for robust control Hamiltonian and quantitative geometric metrics of the gate error. We then develop a protocol to engineer a universal set of single- and two-qubit robust gates that correct the generic errors. Our numerical simulation shows gate fidelities above $99.99\%$ over a broad region of noise strength using simplest and smooth pulses for arbitrary gate time. Our approach offers new insights into the geometric aspects of noisy quantum dynamics and several advantages over existing methods, including the treatment of arbitrary noises, independence of system parameters, scalability, and being friendly to experiments.
△ Less
Submitted 7 November, 2023; v1 submitted 26 October, 2022;
originally announced October 2022.
-
Topological Robust Corner States of a Two-Dimensional Square Lattice with $\mathbf C_{\mathbf 4}$ Symmetry in Fully Coupled Dipolar Arrays
Authors:
Chen Luo,
Xiang Zhou,
Hui-Chang Li,
Tai-Lin Zhang,
Yun Shen,
Xiao-Hua Deng
Abstract:
Higher-order topological insulators(HOTIs) is an exciting topic. We constructed a square lattice dipole arrays, it supports out-of-plane and in-plane modes by going beyond conventional scalar coupling. In-plane modes naturally break $\mathrm C_{4}$ symmetry, we only studied the out-of-plane modes that maintain $\mathrm C_{4}$ symmetry. Due to the slowly decaying long-range coupling, we consider it…
▽ More
Higher-order topological insulators(HOTIs) is an exciting topic. We constructed a square lattice dipole arrays, it supports out-of-plane and in-plane modes by going beyond conventional scalar coupling. In-plane modes naturally break $\mathrm C_{4}$ symmetry, we only studied the out-of-plane modes that maintain $\mathrm C_{4}$ symmetry. Due to the slowly decaying long-range coupling, we consider its fully coupled interactions by using the lattice sums technique and combined with the coupled dipole method (CDM) to study its topological properties in detail. Interestingly, even when the full coupling is considered, the topological properties of the system remain similar to those of the 2D Su-Schrieffer-Heeger(SSH) model, but very differently, it supports robust zero-energy corner states (ZECSs) with $\mathrm C_{4}$ symmetry, we calculate the bulk polarization and discuss in detail the topological origin of the ZECSs. The lattice sums technique in the article can be applied to arbitrary fully coupled 2D dipole arrays. The materials we used can be able to confine light into the deep subwavelength scale, it has a great potential in enhancing light-matter interactions in the terahertz (THz) range.
△ Less
Submitted 3 November, 2022; v1 submitted 25 October, 2022;
originally announced October 2022.
-
GeoAI at ACM SIGSPATIAL: The New Frontier of Geospatial Artificial Intelligence Research
Authors:
Dalton Lunga,
Yingjie Hu,
Shawn Newsam,
Song Gao,
Bruno Martins,
Lexie Yang,
Xueqing Deng
Abstract:
Geospatial Artificial Intelligence (GeoAI) is an interdisciplinary field enjoying tremendous adoption. However, the efficient design and implementation of GeoAI systems face many open challenges. This is mainly due to the lack of non-standardized approaches to artificial intelligence tool development, inadequate platforms, and a lack of multidisciplinary engagements, which all motivate domain expe…
▽ More
Geospatial Artificial Intelligence (GeoAI) is an interdisciplinary field enjoying tremendous adoption. However, the efficient design and implementation of GeoAI systems face many open challenges. This is mainly due to the lack of non-standardized approaches to artificial intelligence tool development, inadequate platforms, and a lack of multidisciplinary engagements, which all motivate domain experts to seek a shared stage with scientists and engineers to solve problems of significant impact on society. Since its inception in 2017, the GeoAI series of workshops has been co-located with the Association for Computing Machinery International Conference on Advances in Geographic Information Systems. The workshop series has fostered a nexus for geoscientists, computer scientists, engineers, entrepreneurs, and decision-makers, from academia, industry, and government to engage in artificial intelligence, spatiotemporal data computing, and geospatial data science research, motivated by various challenges. In this article, we revisit and discuss the state of GeoAI open research directions, the recent developments, and an emerging agenda calling for a continued cross-disciplinary community engagement.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
de-Broglie Wavelength Enhanced Weak Equivalence Principle Test for Atoms in Different Hyperfine States
Authors:
Yao-Yao Xu,
Xiao-Bing Deng,
Xiao-Chun Duan,
Lu-Shuai Cao,
Min-Kang Zhou,
Cheng-Gang Shao,
Zhong-Kun Hu
Abstract:
We report a hyperfine-states related weak equivalence principle (WEP) test which searches for possible WEP violation signal in single atom interferometer. With the ground hyperfine states $\left|F=1\right\rangle$ and $\left|F=2\right\rangle$ of $^{87}$Rb atoms simultaneously scanned over different paths in a Raman Mach-Zehnder interferometer (MZI), the difference of the free fall accelerations for…
▽ More
We report a hyperfine-states related weak equivalence principle (WEP) test which searches for possible WEP violation signal in single atom interferometer. With the ground hyperfine states $\left|F=1\right\rangle$ and $\left|F=2\right\rangle$ of $^{87}$Rb atoms simultaneously scanned over different paths in a Raman Mach-Zehnder interferometer (MZI), the difference of the free fall accelerations for the atom in the two hyperfine states is encoded into the phase shift of the MZI, contributing a WEP test signal. The test signal can be extracted out by reversing the direction of the effective wave vector of the Raman laser to suppress direction-dependent disturbances. More importantly, de-Broglie wavelength of cold atoms can be utilized to enhance the test signal in our scheme, which helps to improve the upper bound of the WEP test for atoms in different hyperfine states to $2.9\times10^{-11}$, about one order of magnitude lower than the previous record.
△ Less
Submitted 17 October, 2022; v1 submitted 16 October, 2022;
originally announced October 2022.
-
Competition among Parallel Contests
Authors:
Xiaotie Deng,
Ningyuan Li,
Weian Li,
Qi Qi
Abstract:
We investigate the model of multiple contests held in parallel, where each contestant selects one contest to join and each contest designer decides the prize structure to compete for the participation of contestants. We first analyze the strategic behaviors of contestants and completely characterize the symmetric Bayesian Nash equilibrium. As for the strategies of contest designers, when other des…
▽ More
We investigate the model of multiple contests held in parallel, where each contestant selects one contest to join and each contest designer decides the prize structure to compete for the participation of contestants. We first analyze the strategic behaviors of contestants and completely characterize the symmetric Bayesian Nash equilibrium. As for the strategies of contest designers, when other designers' strategies are known, we show that computing the best response is NP-hard and propose a fully polynomial time approximation scheme (FPTAS) to output the $ε$-approximate best response. When other designers' strategies are unknown, we provide a worst case analysis on one designer's strategy. We give an upper bound on the utility of any strategy and propose a method to construct a strategy whose utility can guarantee a constant ratio of this upper bound in the worst case.
△ Less
Submitted 27 October, 2022; v1 submitted 13 October, 2022;
originally announced October 2022.
-
Bayesian Sparse Regression for Mixed Multi-Responses with Application to Runtime Metrics Prediction in Fog Manufacturing
Authors:
Xiaoyu Chen,
Xiaoning Kang,
Ran **,
Xinwei Deng
Abstract:
Fog manufacturing can greatly enhance traditional manufacturing systems through distributed Fog computation units, which are governed by predictive computational workload offloading methods under different Industrial Internet architectures. It is known that the predictive offloading methods highly depend on accurate prediction and uncertainty quantification of runtime performance metrics, containi…
▽ More
Fog manufacturing can greatly enhance traditional manufacturing systems through distributed Fog computation units, which are governed by predictive computational workload offloading methods under different Industrial Internet architectures. It is known that the predictive offloading methods highly depend on accurate prediction and uncertainty quantification of runtime performance metrics, containing multivariate mixed-type responses (i.e., continuous, counting, binary). In this work, we propose a Bayesian sparse regression for multivariate mixed responses to enhance the prediction of runtime performance metrics and to enable the statistical inferences. The proposed method considers both group and individual variable selection to jointly model the mixed types of runtime performance metrics. The conditional dependency among multiple responses is described by a graphical model using the precision matrix, where a spike-and-slab prior is used to enable the sparse estimation of the graph. The proposed method not only achieves accurate prediction, but also makes the predictive model more interpretable with statistical inferences on model parameters and prediction in the Fog manufacturing. A simulation study and a real case example in a Fog manufacturing are conducted to demonstrate the merits of the proposed model.
△ Less
Submitted 10 October, 2022; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Elastic anisotropy of lizardite at subduction zone conditions
Authors:
Xin Deng,
Chenxing Luo,
Renata M. Wentzcovitch,
Geoffrey A. Abers,
Zhongqing Wu
Abstract:
Subduction zones transport water into Earth's deep interior through slab subduction. Serpentine minerals, the primary hydration product of ultramafic peridotite, are abundant in most subduction zones. Characterization of their high-temperature elasticity, particularly their anisotropy, will help us better estimate the extent of mantle serpentinization and the Earth's deep water cycle. Lizardite, t…
▽ More
Subduction zones transport water into Earth's deep interior through slab subduction. Serpentine minerals, the primary hydration product of ultramafic peridotite, are abundant in most subduction zones. Characterization of their high-temperature elasticity, particularly their anisotropy, will help us better estimate the extent of mantle serpentinization and the Earth's deep water cycle. Lizardite, the low-temperature polymorph of serpentine, is stable under the P-T conditions of cold subduction slabs (< 260°C at 2 GPa), and its high-temperature elasticity remains unknown. Here we report ab initio elasticity and acoustic wave velocities of lizardite at P-T conditions of subduction zones. Our static results agree with previous studies. Its high-temperature velocities are much higher than previous experimental-based lizardite estimates with chrysotile but closer to antigorite velocities. The elastic anisotropy of lizardite is much larger than that of antigorite and could better account for the observed large shear-wave splitting in some cold slabs such as Tonga.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
A standing Leidenfrost drop with Sufi-whirling
Authors:
**long Yang,
Yong Li,
Yue Fan,
Longquan Chen,
Dehui Wang,
Xu Deng
Abstract:
The mobility of Leidenfrost drop has been exploited for the manipulation of drop motions. In the classical model, the Leidenfrost drop was levitated by a vapor cushion, in the absence of touch to the surface. Here we report a standing Leidenfrost state on a heated hydrophobic surface where drop stands on the surface with partial adhesion and further self-rotates like Sufi-whirling. To elucidate th…
▽ More
The mobility of Leidenfrost drop has been exploited for the manipulation of drop motions. In the classical model, the Leidenfrost drop was levitated by a vapor cushion, in the absence of touch to the surface. Here we report a standing Leidenfrost state on a heated hydrophobic surface where drop stands on the surface with partial adhesion and further self-rotates like Sufi-whirling. To elucidate this new phenomenon, we imaged the evolution of the partial adhesion, the inner circulation, and the ellipsoidal rotation of the drop. The stable partial adhesion is accompanied by thermal and mechanical equilibrium, and further drives the development of the drop rotation.
△ Less
Submitted 17 September, 2022;
originally announced September 2022.
-
Neighborhood VAR: Efficient estimation of multivariate timeseries with neighborhood information
Authors:
Zhihao Hu,
Shyam Ranganathan,
Yang Shao,
Xinwei Deng
Abstract:
In data science, vector autoregression (VAR) models are popular in modeling multivariate time series in the environmental sciences and other applications. However, these models are computationally complex with the number of parameters scaling quadratically with the number of time series.
In this work, we propose a so-called neighborhood vector autoregression (NVAR) model to efficiently analyze l…
▽ More
In data science, vector autoregression (VAR) models are popular in modeling multivariate time series in the environmental sciences and other applications. However, these models are computationally complex with the number of parameters scaling quadratically with the number of time series.
In this work, we propose a so-called neighborhood vector autoregression (NVAR) model to efficiently analyze large-dimensional multivariate time series.
We assume that the time series have underlying neighborhood relationships, e.g., spatial or network, among them based on the inherent setting of the problem. When this neighborhood information is available or can be summarized using a distance matrix, we demonstrate that our proposed NVAR method provides a computationally efficient and theoretically sound estimation of model parameters. The performance of the proposed method is compared with other existing approaches in both simulation studies and a real application of stream nitrogen study.
△ Less
Submitted 17 September, 2022;
originally announced September 2022.
-
Clustering-based Imputation for Dropout Buyers in Large-scale Online Experimentation
Authors:
Sumin Shen,
Huiying Mao,
Zezhong Zhang,
Zili Chen,
Keyu Nie,
Xinwei Deng
Abstract:
In online experimentation, appropriate metrics (e.g., purchase) provide strong evidence to support hypotheses and enhance the decision-making process. However, incomplete metrics are frequently occurred in the online experimentation, making the available data to be much fewer than the planned online experiments (e.g., A/B testing). In this work, we introduce the concept of dropout buyers and categ…
▽ More
In online experimentation, appropriate metrics (e.g., purchase) provide strong evidence to support hypotheses and enhance the decision-making process. However, incomplete metrics are frequently occurred in the online experimentation, making the available data to be much fewer than the planned online experiments (e.g., A/B testing). In this work, we introduce the concept of dropout buyers and categorize users with incomplete metric values into two groups: visitors and dropout buyers. For the analysis of incomplete metrics, we propose a clustering-based imputation method using $k$-nearest neighbors. Our proposed imputation method considers both the experiment-specific features and users' activities along their shop** paths, allowing different imputation values for different users. To facilitate efficient imputation of large-scale data sets in online experimentation, the proposed method uses a combination of stratification and clustering. The performance of the proposed method is compared to several conventional methods in both simulation studies and a real online experiment at eBay.
△ Less
Submitted 7 April, 2023; v1 submitted 8 September, 2022;
originally announced September 2022.
-
The solutions of classical and nonlocal nonlinear Schrödinger equations with nonzero backgrounds: Bilinearisation and reduction approach
Authors:
Da-jun Zhang,
Shi-min Liu,
Xiao Deng
Abstract:
In this paper we develop a bilinearisation-reduction approach to derive solutions to the classical and nonlocal nonlinear Schrödinger (NLS) equations with nonzero backgrounds. We start from the second order Ablowitz-Kaup-Newell-Segur coupled equations as an unreduced system. With a pair of solutions $(q_0,r_0)$ we bilinearize the unreduced system and obtain solutions in terms of quasi double Wrons…
▽ More
In this paper we develop a bilinearisation-reduction approach to derive solutions to the classical and nonlocal nonlinear Schrödinger (NLS) equations with nonzero backgrounds. We start from the second order Ablowitz-Kaup-Newell-Segur coupled equations as an unreduced system. With a pair of solutions $(q_0,r_0)$ we bilinearize the unreduced system and obtain solutions in terms of quasi double Wronskians. Then we implement reductions by introducing constraints on the column vectors of the Wronskians and finally obtain solutions to the reduced equations, including the classical NLS equation and the nonlocal NLS equations with reverse-space, reverse-time and reverse-space-time, respectively. With a set of plane wave solution $(q_0,r_0)$ as a background solution, we present explicit formulae for these column vectors. As examples, we analyze and illustrate solutions to the focusing NLS equation and the reverse-space nonlocal NLS equation. In particular, we present formulae for the rouge waves of arbitrary order for the focusing NLS equation.
△ Less
Submitted 3 April, 2023; v1 submitted 11 September, 2022;
originally announced September 2022.
-
Modeling and Active Learning for Experiments with Quantitative-Sequence Factors
Authors:
Qian Xiao,
Ya** Wang,
Abhyuday Mandal,
Xinwei Deng
Abstract:
A new type of experiment that aims to determine the optimal quantities of a sequence of factors is eliciting considerable attention in medical science, bioengineering, and many other disciplines. Such studies require the simultaneous optimization of both quantities and the sequence orders of several components which are called quantitative-sequence (QS) factors. Given the large and semi-discrete s…
▽ More
A new type of experiment that aims to determine the optimal quantities of a sequence of factors is eliciting considerable attention in medical science, bioengineering, and many other disciplines. Such studies require the simultaneous optimization of both quantities and the sequence orders of several components which are called quantitative-sequence (QS) factors. Given the large and semi-discrete solution spaces in such experiments, efficiently identifying optimal or near-optimal solutions by using a small number of experimental trials is a nontrivial task. To address this challenge, we propose a novel active learning approach, called QS-learning, to enable effective modeling and efficient optimization for experiments with QS factors. QS-learning consists of three parts: a novel map**-based additive Gaussian process (MaGP) model, an efficient global optimization scheme (QS-EGO), and a new class of optimal designs (QS-design). The theoretical properties of the proposed method are investigated, and optimization techniques using analytical gradients are developed. The performance of the proposed method is demonstrated via a real drug experiment on lymphoma treatment and several simulation studies.
△ Less
Submitted 12 September, 2022; v1 submitted 6 September, 2022;
originally announced September 2022.
-
Giant superlinear power dependence of photocurrent based on layered Ta$_2$NiS$_5$ photodetector
Authors:
Xianghao Meng,
Yuhan Du,
Wenbin Wu,
Nesta Benno Joseph,
Xing Deng,
**** Wang,
Jianwen Ma,
Ze** Shi,
Binglin Liu,
Yuanji Ma,
Fangyu Yue,
Ni Zhong,
**-Hua Xiang,
Cheng Zhang,
Chun-Gang Duan,
Awadhesh Narayan,
Zhenrong Sun,
Junhao Chu,
Xiang Yuan
Abstract:
Photodetector based on two-dimensional (2D) materials is an ongoing quest in optoelectronics. These 2D photodetectors are generally efficient at low illuminating power but suffer severe recombination processes at high power, which results in the sublinear power dependence of photoresponse and lower optoelectronic efficiency. The desirable superlinear photocurrent is mostly achieved by sophisticate…
▽ More
Photodetector based on two-dimensional (2D) materials is an ongoing quest in optoelectronics. These 2D photodetectors are generally efficient at low illuminating power but suffer severe recombination processes at high power, which results in the sublinear power dependence of photoresponse and lower optoelectronic efficiency. The desirable superlinear photocurrent is mostly achieved by sophisticated 2D heterostructures or device arrays, while 2D materials rarely show intrinsic superlinear photoresponse. Here, we report the giant superlinear power dependence of photocurrent based on multi-layer Ta$_2$NiS$_5$. While the fabricated photodetector exhibits good sensitivity ($3.1 mS/W$ per square) and fast photoresponse ($31 μ$$s$), the bias-, polarization-, and spatial-resolved measurements point to an intrinsic photoconductive mechanism. By increasing the incident power density from $1.5 μ$W/$μ$$m^{2}$ to $200 μ$W/$μ$$m^{2}$, the photocurrent power dependence varies from sublinear to superlinear. At higher illuminating conditions, a prominent superlinearity is observed with a giant power exponent of $γ=1.5$. The unusual photoresponse can be explained by a two-recombination-center model where the distinct density of states of the recombination centers effectively closes all recombination channels. The fabricated photodetector is integrated into camera for taking photos with enhanced contrast due to the superlinearity. Our work provides an effective route to enable higher optoelectronic efficiency at extreme conditions.
△ Less
Submitted 17 April, 2023; v1 submitted 27 August, 2022;
originally announced August 2022.
-
Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm
Authors:
J. Lian,
K. Choi,
B. Veeramani,
A. Hu,
L. Freeman,
E. Bowen,
X. Deng
Abstract:
The quality of Artificial Intelligence (AI) algorithms is of significant importance for confidently adopting algorithms in various applications such as cybersecurity, healthcare, and autonomous driving. This work presents a principled framework of using a design-of-experimental approach to systematically evaluate the quality of AI algorithms, named as Do-AIQ. Specifically, we focus on investigatin…
▽ More
The quality of Artificial Intelligence (AI) algorithms is of significant importance for confidently adopting algorithms in various applications such as cybersecurity, healthcare, and autonomous driving. This work presents a principled framework of using a design-of-experimental approach to systematically evaluate the quality of AI algorithms, named as Do-AIQ. Specifically, we focus on investigating the quality of the AI mislabel data algorithm against data poisoning. The performance of AI algorithms is affected by hyperparameters in the algorithm and data quality, particularly, data mislabeling, class imbalance, and data types. To evaluate the quality of the AI algorithms and obtain a trustworthy assessment on the quality of the algorithms, we establish a design-of-experiment framework to construct an efficient space-filling design in a high-dimensional constraint space and develop an effective surrogate model using additive Gaussian process to enable the emulation of the quality of AI algorithms. Both theoretical and numerical studies are conducted to justify the merits of the proposed framework. The proposed framework can set an exemplar for AI algorithm to enhance the AI assurance of robustness, reproducibility, and transparency.
△ Less
Submitted 21 August, 2022;
originally announced August 2022.
-
Robotic Dough Sha**
Authors:
Jan Ondras,
Di Ni,
Xi Deng,
Zeqi Gu,
Henry Zheng,
Tapomayukh Bhattacharjee
Abstract:
Robotic manipulation of deformable objects gains great attention due to its wide applications including medical surgery, home assistance, and automatic food preparation. The ability to deform soft objects remains a great challenge for robots due to difficulties in defining the problem mathematically. In this paper, we address the problem of sha** a piece of dough-like deformable material into a…
▽ More
Robotic manipulation of deformable objects gains great attention due to its wide applications including medical surgery, home assistance, and automatic food preparation. The ability to deform soft objects remains a great challenge for robots due to difficulties in defining the problem mathematically. In this paper, we address the problem of sha** a piece of dough-like deformable material into a 2D target shape presented upfront. We use a 6 degree-of-freedom WidowX-250 Robot Arm equipped with a rolling pin and information collected from an RGB-D camera and a tactile sensor. We present and compare several control policies, including a dough shrinking action, in extensive experiments across three kinds of deformable materials and across three target dough shape sizes, achieving the intersection over union (IoU) of 0.90. Our results show that: i) rolling dough from the highest dough point is more efficient than from the 2D/3D dough centroid; ii) it might be better to stop the roll movement at the current dough boundary as opposed to the target shape outline; iii) the shrink action might be beneficial only if properly tuned with respect to the expand action; and iv) the Play-Doh material is easier to shape to a target shape as compared to Plasticine or Kinetic sand. Video demonstrations of our work are available at https://youtu.be/ZzLMxuITdt4
△ Less
Submitted 5 October, 2022; v1 submitted 31 July, 2022;
originally announced August 2022.
-
A Learning and Control Perspective for Microfinance
Authors:
Christian Kurniawan,
Xiyu Deng,
Adhiraj Chakraborty,
Assane Gueye,
Niangjun Chen,
Yorie Nakahira
Abstract:
Microfinance, despite its significant potential for poverty reduction, is facing sustainability hardships due to high default rates. Although many methods in regular finance can estimate credit scores and default probabilities, these methods are not directly applicable to microfinance due to the following unique characteristics: a) under-explored (develo**) areas such as rural Africa do not have…
▽ More
Microfinance, despite its significant potential for poverty reduction, is facing sustainability hardships due to high default rates. Although many methods in regular finance can estimate credit scores and default probabilities, these methods are not directly applicable to microfinance due to the following unique characteristics: a) under-explored (develo**) areas such as rural Africa do not have sufficient prior loan data for microfinance institutions (MFIs) to establish a credit scoring system; b) microfinance applicants may have difficulty providing sufficient information for MFIs to accurately predict default probabilities; and c) many MFIs use group liability (instead of collateral) to secure repayment. Here, we present a novel control-theoretic model of microfinance that accounts for these characteristics. We construct an algorithm to learn microfinance decision policies that achieve financial inclusion, fairness, social welfare, and sustainability. We characterize the convergence conditions to Pareto-optimum and the convergence speeds. We demonstrate, in numerous real and synthetic datasets, that the proposed method accounts for the complexities induced by group liability to produce robust decisions before sufficient loans are given to establish credit scoring systems and for applicants whose default probability cannot be accurately estimated due to missing information. To the best of our knowledge, this paper is the first to connect microfinance and control theory. We envision that the connection will enable safe learning and control techniques to help modernize microfinance and alleviate poverty.
△ Less
Submitted 12 December, 2022; v1 submitted 25 July, 2022;
originally announced July 2022.
-
Evolution of channel flow and Darcy law beyond the critical Reynolds number
Authors:
Xiaohui Deng,
** Sheng
Abstract:
Channel flow is usually described by Darcy law with the Poiseuille flow profile. However, for incompressible channel flow there is a critical state, characterized by a critical Reynolds number $Re_c$ and a critical wavevector mc, beyond which the channel flow becomes unstable in the linear regime. By obtaining the analytical eigenfunctions of the linearized, incompressible, three dimensional (3D)…
▽ More
Channel flow is usually described by Darcy law with the Poiseuille flow profile. However, for incompressible channel flow there is a critical state, characterized by a critical Reynolds number $Re_c$ and a critical wavevector mc, beyond which the channel flow becomes unstable in the linear regime. By obtaining the analytical eigenfunctions of the linearized, incompressible, three dimensional (3D) Navier-Stokes (NS) equation in the channel geometry, i.e., the hydrodynamic modes (HMs), we reduce the full NS equation to a system of coupled autonomous ordinary differential equations (ODEs) by expanding the velocity in terms of the HMs; time becomes the only independent variable. The nonlinear term of the NS equation is converted to a third-rank tensor that couples pairs of the expansion coefficients to effect the time variation on the third. In the linear regime, the value of $Re_c$ is obtained to five significant digit accuracy when compared to the Orszag result. We numerically time evolve the autonomous ODEs at $Re>Re_c$ with a finite set of thermally excited initial HMs to find a fluctuating equilibrium state with a reduced net flow rate, accompanied by vortices. Through the perspective of force balance, interesting features are uncovered in the counter-flow profiles at $Re>Re_c$.
△ Less
Submitted 8 August, 2022; v1 submitted 14 July, 2022;
originally announced July 2022.
-
Lattice control of non-ergodicity in a polar lattice gas
Authors:
H. Korbmacher,
P. Sierant,
W. Li,
X. Deng,
J. Zakrzewski,
L. Santos
Abstract:
Inter-site interactions in polar lattice gases may result, due to Hilbert-space fragmentation, in a lack of ergodicity even in absence of disorder. We show that the inter-site interaction in a one-dimensional dipolar gas in an optical lattice departs from the usually considered $1/r^3$ dependence, acquiring a universal form that depends on the transversal confinement and the lattice depth. Due to…
▽ More
Inter-site interactions in polar lattice gases may result, due to Hilbert-space fragmentation, in a lack of ergodicity even in absence of disorder. We show that the inter-site interaction in a one-dimensional dipolar gas in an optical lattice departs from the usually considered $1/r^3$ dependence, acquiring a universal form that depends on the transversal confinement and the lattice depth. Due to the crucial role played by the nearest- and next-to-nearest neighbors, the Hilbert-space fragmentation and particle dynamics are very similar to that of a power-law model $1/r^{β_{\mathrm{eff}}<3}$, where $β_{\mathrm{eff}}$ is experimentally controllable by properly tailoring the transversal confinement. Our results are of direct experimental relevance for experiments on dipolar gases in optical lattices, and show that the particle dynamics may be remarkably different if the quasi-1D lattice model is realized in a strong 3D lattice, or by means of a strong transversal harmonic confinement.
△ Less
Submitted 29 October, 2023; v1 submitted 13 July, 2022;
originally announced July 2022.
-
Bootstrap** a User-Centered Task-Oriented Dialogue System
Authors:
Shijie Chen,
Ziru Chen,
Xiang Deng,
Ashley Lewis,
Lingbo Mo,
Samuel Stevens,
Zhen Wang,
Xiang Yue,
Tianshu Zhang,
Yu Su,
Huan Sun
Abstract:
We present TacoBot, a task-oriented dialogue system built for the inaugural Alexa Prize TaskBot Challenge, which assists users in completing multi-step cooking and home improvement tasks. TacoBot is designed with a user-centered principle and aspires to deliver a collaborative and accessible dialogue experience. Towards that end, it is equipped with accurate language understanding, flexible dialog…
▽ More
We present TacoBot, a task-oriented dialogue system built for the inaugural Alexa Prize TaskBot Challenge, which assists users in completing multi-step cooking and home improvement tasks. TacoBot is designed with a user-centered principle and aspires to deliver a collaborative and accessible dialogue experience. Towards that end, it is equipped with accurate language understanding, flexible dialogue management, and engaging response generation. Furthermore, TacoBot is backed by a strong search engine and an automated end-to-end test suite. In bootstrap** the development of TacoBot, we explore a series of data augmentation strategies to train advanced neural language processing models and continuously improve the dialogue experience with collected real conversations. At the end of the semifinals, TacoBot achieved an average rating of 3.55/5.0.
△ Less
Submitted 21 July, 2022; v1 submitted 11 July, 2022;
originally announced July 2022.
-
Tunable quantum interference effects in Floquet two- and three-level systems
Authors:
Yingying Han,
Minchen Qiao,
Xiao-Qing Luo,
Tie-Fu Li,
Wenxian Zhang,
Xiu-Hao Deng,
J. Q. You,
Dapeng Yu
Abstract:
Quantum interference effects in the unmodulated quantum systems with light-matter interaction have been widely studied, such as electromagnetically induced transparency (EIT) and Autler-Townes splitting (ATS). However, the similar quantum interference effects in the Floquet systems (i.e., periodically modulated systems), which might cover rich new physics, were rarely studied. In this article, we…
▽ More
Quantum interference effects in the unmodulated quantum systems with light-matter interaction have been widely studied, such as electromagnetically induced transparency (EIT) and Autler-Townes splitting (ATS). However, the similar quantum interference effects in the Floquet systems (i.e., periodically modulated systems), which might cover rich new physics, were rarely studied. In this article, we investigate the quantum interference effects in the Floquet two- and three-level systems analytically and numerically. We show a coherent destruction tunneling effect in a lotuslike multipeak spectrum with a Floquet two-level system, where the intensity of the probe field is periodically modulated with a square-wave sequence. We demonstrate that the multipeak split into multiple transparency windows with tunable quantum interference if the Floquet system is asynchronously controlled via a third level. Based on phenomenological analysis with Akaike information criterion, we show that the symmetric central transparency window has a similar mechanism to the traditional ATS or EIT depending on the choice of parameters, additional with an extra degree of freedom to control the quantum interference provided by the modulation period. The other transparent windows are shown to be asymmetric, different from the traditional ATS and EIT windows. These nontrivial quantum interference effects open up a scope to explore the applications of the Floquet systems.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
Dynamic Budget Throttling in Repeated Second-Price Auctions
Authors:
Zhaohua Chen,
Chang Wang,
Qian Wang,
Yuqi Pan,
Zhuming Shi,
Zheng Cai,
Yukun Ren,
Zhihua Zhu,
Xiaotie Deng
Abstract:
In today's online advertising markets, a crucial requirement for an advertiser is to control her total expenditure within a time horizon under some budget. Among various budget control methods, throttling has emerged as a popular choice, managing an advertiser's total expenditure by selecting only a subset of auctions to participate in. This paper provides a theoretical panorama of a single advert…
▽ More
In today's online advertising markets, a crucial requirement for an advertiser is to control her total expenditure within a time horizon under some budget. Among various budget control methods, throttling has emerged as a popular choice, managing an advertiser's total expenditure by selecting only a subset of auctions to participate in. This paper provides a theoretical panorama of a single advertiser's dynamic budget throttling process in repeated second-price auctions. We first establish a lower bound on the regret and an upper bound on the asymptotic competitive ratio for any throttling algorithm, respectively, when the advertiser's values are stochastic and adversarial. Regarding the algorithmic side, we propose the OGD-CB algorithm, which guarantees a near-optimal expected regret with stochastic values. On the other hand, when values are adversarial, we prove that this algorithm also reaches the upper bound on the asymptotic competitive ratio. We further compare throttling with pacing, another widely adopted budget control method, in repeated second-price auctions. In the stochastic case, we demonstrate that pacing is generally superior to throttling for the advertiser, supporting the well-known result that pacing is asymptotically optimal in this scenario. However, in the adversarial case, we give an exciting result indicating that throttling is also an asymptotically optimal dynamic bidding strategy. Our results bridge the gaps in theoretical research of throttling in repeated auctions and comprehensively reveal the ability of this popular budget-smoothing strategy.
△ Less
Submitted 12 December, 2023; v1 submitted 11 July, 2022;
originally announced July 2022.
-
Impact of magnetic field on giant dipole resonance of $^{40}$Ca using the EQMD model
Authors:
Ya-Ting Cao,
Xian-Gai Deng,
Yu-Gang Ma
Abstract:
By taking into account the magnetic field in the extended quantum molecular dynamics model (EQMD), we analyzed its effects on giant dipole resonance (GDR) by studying the responses and strengths of the dipole moments. The selected system is the $^{40}$Ca nucleus which is excited through the Coulomb interaction by $^{16}$O. Particle acceleration term in Liénard-Wiechert potential is discussed which…
▽ More
By taking into account the magnetic field in the extended quantum molecular dynamics model (EQMD), we analyzed its effects on giant dipole resonance (GDR) by studying the responses and strengths of the dipole moments. The selected system is the $^{40}$Ca nucleus which is excited through the Coulomb interaction by $^{16}$O. Particle acceleration term in Liénard-Wiechert potential is discussed which, however, has small impact on magnetic field. The peak energy, strength and width of GDR, temperature, and angular momentum of $^{40}$Ca as a function of beam energy are investigated. It is found that the magnetic field enhances the peak energy, strength and width of GDR which is not only due to the temperature effects but also due to the enhancement of the angular momentum of nucleus. At beam energy {E} $>$ 200 MeV/nucleon, magnetic field maintains a constant value for the strength of GDR. The work sheds light on examining important roles of the magnetic field on nuclear structure in low-intermediate energy heavy-ion collisions.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
Optimal Private Payoff Manipulation against Commitment in Extensive-form Games
Authors:
Yurong Chen,
Xiaotie Deng,
Yuhao Li
Abstract:
To take advantage of strategy commitment, a useful tactic of playing games, a leader must learn enough information about the follower's payoff function. However, this leaves the follower a chance to provide fake information and influence the final game outcome. Through a carefully contrived payoff function misreported to the learning leader, the follower may induce an outcome that benefits him mor…
▽ More
To take advantage of strategy commitment, a useful tactic of playing games, a leader must learn enough information about the follower's payoff function. However, this leaves the follower a chance to provide fake information and influence the final game outcome. Through a carefully contrived payoff function misreported to the learning leader, the follower may induce an outcome that benefits him more, compared to the ones when he truthfully behaves.
We study the follower's optimal manipulation via such strategic behaviors in extensive-form games. Followers' different attitudes are taken into account. An optimistic follower maximizes his true utility among all game outcomes that can be induced by some payoff function. A pessimistic follower only considers misreporting payoff functions that induce a unique game outcome. For all the settings considered in this paper, we characterize all the possible game outcomes that can be induced successfully. We show that it is polynomial-time tractable for the follower to find the optimal way of misreporting his private payoff information. Our work completely resolves this follower's optimal manipulation problem on an extensive-form game tree.
△ Less
Submitted 13 June, 2023; v1 submitted 27 June, 2022;
originally announced June 2022.
-
Submillimeter-wave cornea phantom sensing over an extended depth of field with an axicon-generated Bessel beam
Authors:
Mariangela Baggio,
Aleksi Tamminen,
Joel Lamberg,
Roman Grigorev,
Samu-Ville Pälli,
Juha Ala-Laurinaho,
Irina Nefedova,
Jean-Louis Bourges,
Sophie X. Deng,
Elliott R. Brown,
Vincent P. Wallace,
Zachary D. Taylor
Abstract:
The feasibility of a 220 - 330 GHz zero order axicon generated Bessel beam for corneal water content was explored. Simulation and experimental data from the 25-degree cone angle hyperbolic-axicon lens illuminating metallic spherical targets demonstrate a monotonically decreasing, band integrated, backscatter intensity for increasing radius of curvature from 7 - 11 mm, when lens reflector and optic…
▽ More
The feasibility of a 220 - 330 GHz zero order axicon generated Bessel beam for corneal water content was explored. Simulation and experimental data from the 25-degree cone angle hyperbolic-axicon lens illuminating metallic spherical targets demonstrate a monotonically decreasing, band integrated, backscatter intensity for increasing radius of curvature from 7 - 11 mm, when lens reflector and optical axis are aligned. Further, for radii >= 9.5 mm, maximum signal was obtained with a 1 mm transverse displacement between lens and reflector optical axes arising from spatial correlation between main lobe and out of phase side lobes. Thickness and permittivity parameter estimation experiments were performed on an 8 mm radius of curvature, 1 mm thick fused quartz dome over a 10 mm axial span. Extracted thickness and permittivity varied by less than ~ 25 $μ$m and 0.2 respectively after correction for superluminal velocity. Estimated water permittivity and thickness of water backed gelatin phantoms showed significantly more variation due to a time varying radius of curvature.
△ Less
Submitted 26 February, 2023; v1 submitted 25 June, 2022;
originally announced June 2022.
-
Theoretical and Experimental Studies on Steady-state Microbunching
Authors:
Xiujie Deng
Abstract:
Particle accelerators as photon sources are advanced tools in studying the structure and dynamical properties of matter. The present workhorses of these sources are storage ring-based synchrotron radiation facilities and linear accelerator-based free-electron lasers, delivering light with high repetition rate and high peak brilliance (power), respectively. The steady-state microbunching (SSMB) mec…
▽ More
Particle accelerators as photon sources are advanced tools in studying the structure and dynamical properties of matter. The present workhorses of these sources are storage ring-based synchrotron radiation facilities and linear accelerator-based free-electron lasers, delivering light with high repetition rate and high peak brilliance (power), respectively. The steady-state microbunching (SSMB) mechanism was proposed to bridge the gap of these two kinds of sources to generate high-average-power, high-repetition-rate coherent radiation in an electron storage ring. Such a novel light source promises new possibilities for accelerator photon science and industry applications, for example in ultra-high-energy-resolution angle-resolved photoemission spectroscopy and extreme ultraviolet lithography. The six orders of magnitude extrapolation of the electron bunch length in an SSMB storage ring compared to that of a conventional ring provides tremendous opportunities for accelerator physics research.
This dissertation is devoted to the theoretical and experimental investigations of SSMB, with important results achieved. The work presented can be summarized as: first, how to realize SSMB; second, what radiation characteristics can we obtain from the formed SSMB; and third, experimentally demonstrate the working mechanism of SSMB in a real machine.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
A data management system for machine learning research of tokamak
Authors:
Chenguang Wan,
Zhi Yu,
Xiaojuan Liu,
Xinghao Wen,
Xi Deng,
Jiangang Li
Abstract:
In recent years, machine learning (ML) research methods have received increasing attention in the tokamak community. The conventional database (i.e., MDSplus for tokamak) of experimental data has been designed for small group consumption and is mainly aimed at simultaneous visualization of a small amount of data. The ML data access patterns fundamentally differ from traditional data access pattern…
▽ More
In recent years, machine learning (ML) research methods have received increasing attention in the tokamak community. The conventional database (i.e., MDSplus for tokamak) of experimental data has been designed for small group consumption and is mainly aimed at simultaneous visualization of a small amount of data. The ML data access patterns fundamentally differ from traditional data access patterns. The typical MDSplus database is increasingly showing its limitations. We developed a new data management system suitable for tokamak machine learning research based on Experimental Advanced Superconducting Tokamak (EAST) data. The data management system is based on MongoDB and Hierarchical Data Format version 5 (HDF5). Currently, the entire data management has more than 3000 channels of data. The system can provide highly reliable concurrent access. The system includes error correction, MDSplus original data conversion, and high-performance sequence data output. Further, some valuable functions are implemented to accelerate ML model training of fusion, such as bucketing generator, the concatenating buffer, and distributed sequence generation. This data management system is more suitable for fusion machine learning model R\&D than MDSplus, but it can not replace the MDSplus database. The MDSplus database is still the backend for EAST tokamak data acquisition and storage.
△ Less
Submitted 18 November, 2022; v1 submitted 16 June, 2022;
originally announced June 2022.
-
Blockchain-based Federated Learning for Industrial Metaverses: Incentive Scheme with Optimal AoI
Authors:
Jiawen Kang,
Dongdong Ye,
Jiangtian Nie,
Jiang Xiao,
Xianjun Deng,
Siming Wang,
Zehui Xiong,
Rong Yu,
Dusit Niyato
Abstract:
The emerging industrial metaverses realize the map** and expanding operations of physical industry into virtual space for significantly upgrading intelligent manufacturing. The industrial metaverses obtain data from various production and operation lines by Industrial Internet of Things (IIoT), and thus conduct effective data analysis and decision-making, thereby enhancing the production efficie…
▽ More
The emerging industrial metaverses realize the map** and expanding operations of physical industry into virtual space for significantly upgrading intelligent manufacturing. The industrial metaverses obtain data from various production and operation lines by Industrial Internet of Things (IIoT), and thus conduct effective data analysis and decision-making, thereby enhancing the production efficiency of the physical space, reducing operating costs, and maximizing commercial value. However, there still exist bottlenecks when integrating metaverses into IIoT, such as the privacy leakage of sensitive data with commercial secrets, IIoT sensing data freshness, and incentives for sharing these data. In this paper, we design a user-defined privacy-preserving framework with decentralized federated learning for the industrial metaverses. To further improve privacy protection of industrial metaverse, a cross-chain empowered federated learning framework is further utilized to perform decentralized, secure, and privacy-preserving data training on both physical and virtual spaces through a hierarchical blockchain architecture with a main chain and multiple subchains. Moreover, we introduce the age of information as the data freshness metric and thus design an age-based contract model to motivate data sensing among IIoT nodes. Numerical results indicate the efficiency of the proposed framework and incentive mechanism in the industrial metaverses.
△ Less
Submitted 28 August, 2022; v1 submitted 15 June, 2022;
originally announced June 2022.
-
Wavelet Regularization Benefits Adversarial Training
Authors:
Jun Yan,
Huilin Yin,
Xiaoyang Deng,
Ziming Zhao,
Wancheng Ge,
Hao Zhang,
Gerhard Rigoll
Abstract:
Adversarial training methods are state-of-the-art (SOTA) empirical defense methods against adversarial examples. Many regularization methods have been proven to be effective with the combination of adversarial training. Nevertheless, such regularization methods are implemented in the time domain. Since adversarial vulnerability can be regarded as a high-frequency phenomenon, it is essential to reg…
▽ More
Adversarial training methods are state-of-the-art (SOTA) empirical defense methods against adversarial examples. Many regularization methods have been proven to be effective with the combination of adversarial training. Nevertheless, such regularization methods are implemented in the time domain. Since adversarial vulnerability can be regarded as a high-frequency phenomenon, it is essential to regulate the adversarially-trained neural network models in the frequency domain. Faced with these challenges, we make a theoretical analysis on the regularization property of wavelets which can enhance adversarial training. We propose a wavelet regularization method based on the Haar wavelet decomposition which is named Wavelet Average Pooling. This wavelet regularization module is integrated into the wide residual neural network so that a new WideWaveletResNet model is formed. On the datasets of CIFAR-10 and CIFAR-100, our proposed Adversarial Wavelet Training method realizes considerable robustness under different types of attacks. It verifies the assumption that our wavelet regularization method can enhance adversarial robustness especially in the deep wide neural networks. The visualization experiments of the Frequency Principle (F-Principle) and interpretability are implemented to show the effectiveness of our method. A detailed comparison based on different wavelet base functions is presented. The code is available at the repository: \url{https://github.com/momo1986/AdversarialWaveletTraining}.
△ Less
Submitted 8 June, 2022;
originally announced June 2022.
-
EEG-based Emotion Recognition with Spatial and Functional Brain Map** of CNS and PNS Signals
Authors:
Zhiyao Cen,
Xiangwen Deng,
Hengjie Zheng,
Jianing Zhao,
Anjie **,
Chentao Fu,
Tianqi Wang,
Shangming Yang,
**gdian Yang
Abstract:
Emotion plays a significant role in our daily life. Recognition of emotion is wide-spread in the field of health care and human-computer interaction. Emotion is the result of the coordinated activities of cortical and subcortical neural processes, which correlate to specific physiological responses. However, the existing emotion recognition techniques failed to combine various physiological signal…
▽ More
Emotion plays a significant role in our daily life. Recognition of emotion is wide-spread in the field of health care and human-computer interaction. Emotion is the result of the coordinated activities of cortical and subcortical neural processes, which correlate to specific physiological responses. However, the existing emotion recognition techniques failed to combine various physiological signals as one integrated feature representation. Meanwhile, many researchers ignored the problem of over-fitting model with high accuracy, which was actually false high accuracy caused by improper pre-processing. In this paper, sigmoid baseline filtering is conducted to solve the over-fitting problem from source. To construct a physiological-based algorithm, a 3D spatial and functional brain map** is proposed based on human physiological mechanism and international electrode system, which combines the signals of the central and peripheral nervous system together. By combining the baseline filtering, 3D brain map**, and simple 4D-CNN, a novel emotion recognition model is finally proposed. Experiment results demonstrate that the performance of the proposed model is comparable to the state of art algorithms.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Manifold formation and crossings of ultracold lattice spinor atoms in the intermediate interaction regime
Authors:
Xue-Ting Fang,
Zheng-Qi Dai,
Di Xiang,
Shou-Long Chen,
Shao-Jun Li,
Xiang Gao,
Qian-Ru Zhu,
Xing Deng,
Lushuai Cao,
Zhong-Kun Hu
Abstract:
Ultracold spinor atoms in the weak and strong interaction regime have received extensive investigations, while the behavior in the intermediate regime is less understood. We numerically investigate ultracold spinor atomic ensembles of finite size in the intermediate interaction regime, and reveal the evolution of the eigenstates from the strong to the intermediate regime. In the strong interaction…
▽ More
Ultracold spinor atoms in the weak and strong interaction regime have received extensive investigations, while the behavior in the intermediate regime is less understood. We numerically investigate ultracold spinor atomic ensembles of finite size in the intermediate interaction regime, and reveal the evolution of the eigenstates from the strong to the intermediate regime. In the strong interaction regime, it has been well known that the low-lying eigenenergy spectrum presents the well-gaped multi-manifold structure, and the energy gaps protect the categorization of the eigenstates. In the intermediate interaction regime, it is found that the categorization of the eigenstates is preserved, and the eigenenergy spectrum become quasi-continuum, with different manifolds becoming overlapped. The overlap** induces both direct and avoided crossings between close-lying manifolds, which is determined by the combined symmetries of the eigenstates involved in the crossing. A modified t-J model is derived to describe the low-lying eigenstates in the intermediate regime, which can capture the formation and crossings of the manifolds. State preparation through the avoided crossings is also investigated.
△ Less
Submitted 30 May, 2022;
originally announced June 2022.
-
Strongly Augmented Contrastive Clustering
Authors:
Xiaozhi Deng,
Dong Huang,
Ding-Hua Chen,
Chang-Dong Wang,
Jian-Huang Lai
Abstract:
Deep clustering has attracted increasing attention in recent years due to its capability of joint representation learning and clustering via deep neural networks. In its latest developments, the contrastive learning has emerged as an effective technique to substantially enhance the deep clustering performance. However, the existing contrastive learning based deep clustering algorithms mostly focus…
▽ More
Deep clustering has attracted increasing attention in recent years due to its capability of joint representation learning and clustering via deep neural networks. In its latest developments, the contrastive learning has emerged as an effective technique to substantially enhance the deep clustering performance. However, the existing contrastive learning based deep clustering algorithms mostly focus on some carefully-designed augmentations (often with limited transformations to preserve the structure), referred to as weak augmentations, but cannot go beyond the weak augmentations to explore the more opportunities in stronger augmentations (with more aggressive transformations or even severe distortions). In this paper, we present an end-to-end deep clustering approach termed Strongly Augmented Contrastive Clustering (SACC), which extends the conventional two-augmentation-view paradigm to multiple views and jointly leverages strong and weak augmentations for strengthened deep clustering. Particularly, we utilize a backbone network with triply-shared weights, where a strongly augmented view and two weakly augmented views are incorporated. Based on the representations produced by the backbone, the weak-weak view pair and the strong-weak view pairs are simultaneously exploited for the instance-level contrastive learning (via an instance projector) and the cluster-level contrastive learning (via a cluster projector), which, together with the backbone, can be jointly optimized in a purely unsupervised manner. Experimental results on five challenging image datasets have shown the superiority of our SACC approach over the state-of-the-art. The code is available at https://github.com/dengxiaozhi/SACC.
△ Less
Submitted 14 July, 2022; v1 submitted 1 June, 2022;
originally announced June 2022.
-
Superdiffusion in random two dimensional system with time-reversal symmetry and long-range hop**
Authors:
Xiaolong Deng,
Ivan M. Khaymovich,
Alexander L. Burin
Abstract:
Although it is recognized that Anderson localization takes place for all states at a dimension $d$ less or equal $2$, while delocalization is expected for hop** $V(r)$ decreasing with the distance slower or as $r^{-d}$, the localization problem in the crossover regime for the dimension $d=2$ and hop** $V(r) \propto r^{-2}$ is not resolved yet. Following earlier suggestions we show that for the…
▽ More
Although it is recognized that Anderson localization takes place for all states at a dimension $d$ less or equal $2$, while delocalization is expected for hop** $V(r)$ decreasing with the distance slower or as $r^{-d}$, the localization problem in the crossover regime for the dimension $d=2$ and hop** $V(r) \propto r^{-2}$ is not resolved yet. Following earlier suggestions we show that for the hop** determined by two-dimensional anisotropic dipole-dipole interactions in the presence of time-reversal symmetry there exist two distinguishable phases at weak and strong disorder. The first phase is characterized by ergodic dynamics and superdiffusive transport, while the second phase is characterized by diffusive transport and delocalized eigenstates with fractal dimension less than $2$. The transition between phases is resolved analytically using the extension of scaling theory of localization and verified numerically using an exact numerical diagonalization.
△ Less
Submitted 8 May, 2024; v1 submitted 29 May, 2022;
originally announced May 2022.
-
No-regret Learning in Repeated First-Price Auctions with Budget Constraints
Authors:
Rui Ai,
Chang Wang,
Chenchen Li,
**shan Zhang,
Wenhan Huang,
Xiaotie Deng
Abstract:
Recently the online advertising market has exhibited a gradual shift from second-price auctions to first-price auctions. Although there has been a line of works concerning online bidding strategies in first-price auctions, it still remains open how to handle budget constraints in the problem. In the present paper, we initiate the study for a buyer with budgets to learn online bidding strategies in…
▽ More
Recently the online advertising market has exhibited a gradual shift from second-price auctions to first-price auctions. Although there has been a line of works concerning online bidding strategies in first-price auctions, it still remains open how to handle budget constraints in the problem. In the present paper, we initiate the study for a buyer with budgets to learn online bidding strategies in repeated first-price auctions. We propose an RL-based bidding algorithm against the optimal non-anticipating strategy under stationary competition. Our algorithm obtains $\widetilde O(\sqrt T)$-regret if the bids are all revealed at the end of each round. With the restriction that the buyer only sees the winning bid after each round, our modified algorithm obtains $\widetilde O(T^{\frac{7}{12}})$-regret by techniques developed from survival analysis. Our analysis extends to the more general scenario where the buyer has any bounded instantaneous utility function with regrets of the same order.
△ Less
Submitted 29 May, 2022;
originally announced May 2022.
-
PointVector: A Vector Representation In Point Cloud Analysis
Authors:
Xin Deng,
WenYu Zhang,
Qing Ding,
XinMing Zhang
Abstract:
In point cloud analysis, point-based methods have rapidly developed in recent years. These methods have recently focused on concise MLP structures, such as PointNeXt, which have demonstrated competitiveness with Convolutional and Transformer structures. However, standard MLPs are limited in their ability to extract local features effectively. To address this limitation, we propose a Vector-oriente…
▽ More
In point cloud analysis, point-based methods have rapidly developed in recent years. These methods have recently focused on concise MLP structures, such as PointNeXt, which have demonstrated competitiveness with Convolutional and Transformer structures. However, standard MLPs are limited in their ability to extract local features effectively. To address this limitation, we propose a Vector-oriented Point Set Abstraction that can aggregate neighboring features through higher-dimensional vectors. To facilitate network optimization, we construct a transformation from scalar to vector using independent angles based on 3D vector rotations. Finally, we develop a PointVector model that follows the structure of PointNeXt. Our experimental results demonstrate that PointVector achieves state-of-the-art performance $\textbf{72.3\% mIOU}$ on the S3DIS Area 5 and $\textbf{78.4\% mIOU}$ on the S3DIS (6-fold cross-validation) with only $\textbf{58\%}$ model parameters of PointNeXt. We hope our work will help the exploration of concise and effective feature representations. The code will be released soon.
△ Less
Submitted 28 March, 2023; v1 submitted 21 May, 2022;
originally announced May 2022.
-
Continual Object Detection via Prototypical Task Correlation Guided Gating Mechanism
Authors:
Binbin Yang,
Xinchi Deng,
Han Shi,
Changlin Li,
Gengwei Zhang,
Hang Xu,
Shen Zhao,
Liang Lin,
Xiaodan Liang
Abstract:
Continual learning is a challenging real-world problem for constructing a mature AI system when data are provided in a streaming fashion. Despite recent progress in continual classification, the researches of continual object detection are impeded by the diverse sizes and numbers of objects in each image. Different from previous works that tune the whole network for all tasks, in this work, we pre…
▽ More
Continual learning is a challenging real-world problem for constructing a mature AI system when data are provided in a streaming fashion. Despite recent progress in continual classification, the researches of continual object detection are impeded by the diverse sizes and numbers of objects in each image. Different from previous works that tune the whole network for all tasks, in this work, we present a simple and flexible framework for continual object detection via pRotOtypical taSk corrElaTion guided gaTing mechAnism (ROSETTA). Concretely, a unified framework is shared by all tasks while task-aware gates are introduced to automatically select sub-models for specific tasks. In this way, various knowledge can be successively memorized by storing their corresponding sub-model weights in this system. To make ROSETTA automatically determine which experience is available and useful, a prototypical task correlation guided Gating Diversity Controller(GDC) is introduced to adaptively adjust the diversity of gates for the new task based on class-specific prototypes. GDC module computes class-to-class correlation matrix to depict the cross-task correlation, and hereby activates more exclusive gates for the new task if a significant domain gap is observed. Comprehensive experiments on COCO-VOC, KITTI-Kitchen, class-incremental detection on VOC and sequential learning of four tasks show that ROSETTA yields state-of-the-art performance on both task-based and class-based continual object detection.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
On the Convergence of Fictitious Play: A Decomposition Approach
Authors:
Yurong Chen,
Xiaotie Deng,
Chenchen Li,
David Mguni,
Jun Wang,
Xiang Yan,
Yaodong Yang
Abstract:
Fictitious play (FP) is one of the most fundamental game-theoretical learning frameworks for computing Nash equilibrium in $n$-player games, which builds the foundation for modern multi-agent learning algorithms. Although FP has provable convergence guarantees on zero-sum games and potential games, many real-world problems are often a mixture of both and the convergence property of FP has not been…
▽ More
Fictitious play (FP) is one of the most fundamental game-theoretical learning frameworks for computing Nash equilibrium in $n$-player games, which builds the foundation for modern multi-agent learning algorithms. Although FP has provable convergence guarantees on zero-sum games and potential games, many real-world problems are often a mixture of both and the convergence property of FP has not been fully studied yet. In this paper, we extend the convergence results of FP to the combinations of such games and beyond. Specifically, we derive new conditions for FP to converge by leveraging game decomposition techniques. We further develop a linear relationship unifying cooperation and competition in the sense that these two classes of games are mutually transferable. Finally, we analyze a non-convergent example of FP, the Shapley game, and develop sufficient conditions for FP to converge.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
Making Large Language Models Interactive: A Pioneer Study on Supporting Complex Information-Seeking Tasks with Implicit Constraints
Authors:
Ali Ahmadvand,
Negar Arabzadeh,
Julia Kiseleva,
Patricio Figueroa Sanz,
Xin Deng,
Sujay Jauhar,
Michael Gamon,
Eugene Agichtein,
Ned Friend,
Aniruddha
Abstract:
Current interactive systems with natural language interfaces lack the ability to understand a complex information-seeking request which expresses several implicit constraints at once, and there is no prior information about user preferences e.g.,"find hiking trails around San Francisco which are accessible with toddlers and have beautiful scenery in summer", where output is a list of possible sugg…
▽ More
Current interactive systems with natural language interfaces lack the ability to understand a complex information-seeking request which expresses several implicit constraints at once, and there is no prior information about user preferences e.g.,"find hiking trails around San Francisco which are accessible with toddlers and have beautiful scenery in summer", where output is a list of possible suggestions for users to start their exploration. In such scenarios, user requests can be issued in one shot in the form of a complex and long query, unlike conversational and exploratory search models, where require short utterances or queries are often presented to the system step by step. We have designed and deployed a platform to collect the data from approaching such complex interactive systems. Moreover, despite with the current advancement of generative language models these models suffer from hallucination in providing accurate factual knowledge. All language models are mostly trained in large part on web-scraped data from the past, which usually is not useful for immediate users' needs. In this article, we propose an IA that leverages Large Language Models (LLM) for complex request understanding and makes it interactive using Reinforcement learning that allows intricately refine user requests by making them complete, leading to better retrieval and reduce LLMs hallucination problems for current user needs. To demonstrate the performance of the proposed modeling paradigm, we have adopted various pre-retrieval metrics that capture the extent to which guided interactions with our system yield better retrieval results. Through extensive experimentation, we demonstrated that our method significantly outperforms several robust baselines.
△ Less
Submitted 5 October, 2023; v1 submitted 1 May, 2022;
originally announced May 2022.
-
Compression-Based Optimizations for Out-of-Core GPU Stencil Computation
Authors:
**gcheng Shen,
Xin Deng,
Yifan Wu,
Masao Okita,
Fumihiko Ino
Abstract:
An out-of-core stencil computation code handles large data whose size is beyond the capacity of GPU memory. Whereas, such an code requires streaming data to and from the GPU frequently. As a result, data movement between the CPU and GPU usually limits the performance. In this work, compression-based optimizations are proposed. First, an on-the-fly compression technique is applied to an out-of-core…
▽ More
An out-of-core stencil computation code handles large data whose size is beyond the capacity of GPU memory. Whereas, such an code requires streaming data to and from the GPU frequently. As a result, data movement between the CPU and GPU usually limits the performance. In this work, compression-based optimizations are proposed. First, an on-the-fly compression technique is applied to an out-of-core stencil code, reducing the CPU-GPU memory copy. Secondly, a single working buffer technique is used to reduce GPU memory consumption. Experimental results show that the stencil code using the proposed techniques achieved 1.1x speed and reduced GPU memory consumption by 33.0\% on an NVIDIA Tesla V100 GPU.
△ Less
Submitted 24 April, 2022;
originally announced April 2022.
-
Actions at the Edge: Jointly Optimizing the Resources in Multi-access Edge Computing
Authors:
Yiqin Deng,
Xianhao Chen,
Guangyu Zhu,
Yuguang Fang,
Zhigang Chen,
Xiaoheng Deng
Abstract:
Multi-access edge computing (MEC) is an emerging paradigm that pushes resources for sensing, communications, computing, storage and intelligence (SCCSI) to the premises closer to the end users, i.e., the edge, so that they could leverage the nearby rich resources to improve their quality of experience (QoE). Due to the growing emerging applications targeting at intelligentizing life-sustaining cyb…
▽ More
Multi-access edge computing (MEC) is an emerging paradigm that pushes resources for sensing, communications, computing, storage and intelligence (SCCSI) to the premises closer to the end users, i.e., the edge, so that they could leverage the nearby rich resources to improve their quality of experience (QoE). Due to the growing emerging applications targeting at intelligentizing life-sustaining cyber-physical systems, this paradigm has become a hot research topic, particularly when MEC is utilized to provide edge intelligence and real-time processing and control. This article is to elaborate the research issues along this line, including basic concepts and performance metrics, killer applications, architectural design, modeling approaches and solutions, and future research directions. It is hoped that this article provides a quick introduction to this fruitful research area particularly for beginning researchers.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
DistPro: Searching A Fast Knowledge Distillation Process via Meta Optimization
Authors:
Xueqing Deng,
Dawei Sun,
Shawn Newsam,
Peng Wang
Abstract:
Recent Knowledge distillation (KD) studies show that different manually designed schemes impact the learned results significantly. Yet, in KD, automatically searching an optimal distillation scheme has not yet been well explored. In this paper, we propose DistPro, a novel framework which searches for an optimal KD process via differentiable meta-learning. Specifically, given a pair of student and…
▽ More
Recent Knowledge distillation (KD) studies show that different manually designed schemes impact the learned results significantly. Yet, in KD, automatically searching an optimal distillation scheme has not yet been well explored. In this paper, we propose DistPro, a novel framework which searches for an optimal KD process via differentiable meta-learning. Specifically, given a pair of student and teacher networks, DistPro first sets up a rich set of KD connection from the transmitting layers of the teacher to the receiving layers of the student, and in the meanwhile, various transforms are also proposed for comparing feature maps along its pathway for the distillation. Then, each combination of a connection and a transform choice (pathway) is associated with a stochastic weighting process which indicates its importance at every step during the distillation. In the searching stage, the process can be effectively learned through our proposed bi-level meta-optimization strategy. In the distillation stage, DistPro adopts the learned processes for knowledge distillation, which significantly improves the student accuracy especially when faster training is required. Lastly, we find the learned processes can be generalized between similar tasks and networks. In our experiments, DistPro produces state-of-the-art (SoTA) accuracy under varying number of learning epochs on popular datasets, i.e. CIFAR100 and ImageNet, which demonstrate the effectiveness of our framework.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
NightLab: A Dual-level Architecture with Hardness Detection for Segmentation at Night
Authors:
Xueqing Deng,
Peng Wang,
Xiaochen Lian,
Shawn Newsam
Abstract:
The semantic segmentation of nighttime scenes is a challenging problem that is key to impactful applications like self-driving cars. Yet, it has received little attention compared to its daytime counterpart. In this paper, we propose NightLab, a novel nighttime segmentation framework that leverages multiple deep learning models imbued with night-aware features to yield State-of-The-Art (SoTA) perf…
▽ More
The semantic segmentation of nighttime scenes is a challenging problem that is key to impactful applications like self-driving cars. Yet, it has received little attention compared to its daytime counterpart. In this paper, we propose NightLab, a novel nighttime segmentation framework that leverages multiple deep learning models imbued with night-aware features to yield State-of-The-Art (SoTA) performance on multiple night segmentation benchmarks. Notably, NightLab contains models at two levels of granularity, i.e. image and regional, and each level is composed of light adaptation and segmentation modules. Given a nighttime image, the image level model provides an initial segmentation estimate while, in parallel, a hardness detection module identifies regions and their surrounding context that need further analysis. A regional level model focuses on these difficult regions to provide a significantly improved segmentation. All the models in NightLab are trained end-to-end using a set of proposed night-aware losses without handcrafted heuristics. Extensive experiments on the NightCity and BDD100K datasets show NightLab achieves SoTA performance compared to concurrent methods.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
On Convergence Lemma and Convergence Stability for Piecewise Analytic Functions
Authors:
Xiaotie Deng,
Hanyu Li,
Ningyuan Li
Abstract:
In this work, a convergence lemma for function $f$ being finite compositions of analytic map**s and the maximum operator is proved. The lemma shows that the set of $δ$-stationary points near an isolated local minimum point $x^*$ is shrinking to $x^*$ as $δ\to 0$. It is a natural extension of the version for strongly convex $C^1$ functions. However, the correctness of the lemma is subtle. Analyti…
▽ More
In this work, a convergence lemma for function $f$ being finite compositions of analytic map**s and the maximum operator is proved. The lemma shows that the set of $δ$-stationary points near an isolated local minimum point $x^*$ is shrinking to $x^*$ as $δ\to 0$. It is a natural extension of the version for strongly convex $C^1$ functions. However, the correctness of the lemma is subtle. Analytic map**s are necessary for the lemma in the sense that replacing it with differentiable or $C^\infty$ map**s makes the lemma false. The proof is based on stratification theorems of semi-analytic sets by Łojasiewicz. An extension of this proof presents a geometric characterization of the set of stationary points of $f$. Finally, a notion of stability on stationary points, called convergence stability, is proposed. It asks, under small numerical errors, whether a reasonable convergent optimization method started near a stationary point should eventually converge to the same stationary point. The concept of convergence stability becomes nontrivial qualitatively only when the objective function is both nonsmooth and nonconvex. Via the convergence lemma, an intuitive equivalent condition for convergence stability of $f$ is proved. These results together provide a new geometric perspective to study the problem of "where-to-converge" in nonsmooth nonconvex optimization.
△ Less
Submitted 11 August, 2022; v1 submitted 4 April, 2022;
originally announced April 2022.
-
A UCB-based Tree Search Approach to Joint Verification-Correction Strategy for Large Scale Systems
Authors:
Peng Xu,
Xinwei Deng,
Alejandro Salado
Abstract:
Verification planning is a sequential decision-making problem that specifies a set of verification activities (VA) and correction activities (CA) at different phases of system development. While VAs are used to identify errors and defects, CAs also play important roles in system verification as they correct the identified errors and defects. However, current planning methods only consider VAs as d…
▽ More
Verification planning is a sequential decision-making problem that specifies a set of verification activities (VA) and correction activities (CA) at different phases of system development. While VAs are used to identify errors and defects, CAs also play important roles in system verification as they correct the identified errors and defects. However, current planning methods only consider VAs as decision choices. Because VAs and CAs have different activity spaces, planning a joint verification-correction strategy (JVCS) is still challenging, especially for large-size systems. Here we introduce a UCB-based tree search approach to search for near-optimal JVCSs. First, verification planning is simplified as repeatable bandit problems and an upper confidence bound rule for repeatable bandits (UCBRB) is presented with the optimal regret bound. Next, a tree search algorithm is proposed to search for feasible JVCSs. A tree-based ensemble learning model is also used to extend the tree search algorithm to handle local optimality issues. The proposed approach is evaluated on the notional case of a communication system.
△ Less
Submitted 2 April, 2022;
originally announced April 2022.
-
Budget-Constrained Auctions with Unassured Priors: Strategic Equivalence and Structural Properties
Authors:
Zhaohua Chen,
Mingwei Yang,
Chang Wang,
Jicheng Li,
Zheng Cai,
Yukun Ren,
Zhihua Zhu,
Xiaotie Deng
Abstract:
In today's online advertising markets, it is common for advertisers to set long-term budgets. Correspondingly, advertising platforms adopt budget control methods to ensure that advertisers' payments lie within their budgets. Most budget control methods rely on the value distributions of advertisers. However, due to the complex advertising landscape and potential privacy concerns, the platform hard…
▽ More
In today's online advertising markets, it is common for advertisers to set long-term budgets. Correspondingly, advertising platforms adopt budget control methods to ensure that advertisers' payments lie within their budgets. Most budget control methods rely on the value distributions of advertisers. However, due to the complex advertising landscape and potential privacy concerns, the platform hardly learns advertisers' true priors. Thus, it is crucial to understand how budget control auction mechanisms perform under unassured priors.
This work answers this problem from multiple aspects. We consider the unassured prior game among the seller and all buyers induced by different mechanisms in the stochastic model. We restrict the parameterized mechanisms to satisfy the budget-extracting condition, which maximizes the seller's revenue by extracting buyers' budgets as effectively as possible. Our main result shows that the Bayesian revenue-optimal mechanism and the budget-extracting bid-discount first-price mechanism yield the same set of Nash equilibrium outcomes in the unassured prior game. This implies that simple mechanisms can be as robust as the optimal mechanism under unassured priors in the budget-constrained setting. In the symmetric case, we further show that all these five (budget-extracting) mechanisms share the same set of possible outcomes. We further dig into the structural properties of these mechanisms. We characterize sufficient and necessary conditions on the budget-extracting parameter tuple for bid-discount/pacing first-price auctions. Meanwhile, when buyers do not take strategic behaviors, we exploit the dominance relationships of these mechanisms by revealing their intrinsic structures.
△ Less
Submitted 10 February, 2024; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Efficient Virtual View Selection for 3D Hand Pose Estimation
Authors:
Jian Cheng,
Yanguang Wan,
Dexin Zuo,
Cuixia Ma,
Jian Gu,
** Tan,
Hongan Wang,
Xiaoming Deng,
Yinda Zhang
Abstract:
3D hand pose estimation from single depth is a fundamental problem in computer vision, and has wide applications.However, the existing methods still can not achieve satisfactory hand pose estimation results due to view variation and occlusion of human hand. In this paper, we propose a new virtual view selection and fusion module for 3D hand pose estimation from single depth.We propose to automatic…
▽ More
3D hand pose estimation from single depth is a fundamental problem in computer vision, and has wide applications.However, the existing methods still can not achieve satisfactory hand pose estimation results due to view variation and occlusion of human hand. In this paper, we propose a new virtual view selection and fusion module for 3D hand pose estimation from single depth.We propose to automatically select multiple virtual viewpoints for pose estimation and fuse the results of all and find this empirically delivers accurate and robust pose estimation. In order to select most effective virtual views for pose fusion, we evaluate the virtual views based on the confidence of virtual views using a light-weight network via network distillation. Experiments on three main benchmark datasets including NYU, ICVL and Hands2019 demonstrate that our method outperforms the state-of-the-arts on NYU and ICVL, and achieves very competitive performance on Hands2019-Task1, and our proposed virtual view selection and fusion module is both effective for 3D hand pose estimation.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.