-
Touch, press and stroke: a soft capacitive sensor skin
Authors:
Mirza S. Sarwar,
Ryusuke Ishizaki,
Kieran Morton,
Claire Preston,
Tan Nguyen,
Xu Fan,
Bertille Dupont,
Leanna Hogarth,
Takahide Yoshiike,
Shahriar Mirabbasi,
John D. W. Madden
Abstract:
Soft sensors that can discriminate shear and normal force could help provide machines the fine control desirable for safe and effective physical interactions with people. A capacitive sensor is made for this purpose, composed of patterned elastomer and containing both fixed and sliding pillars that allow the sensor to deform and buckle, much like skin itself. The sensor differentiates between simu…
▽ More
Soft sensors that can discriminate shear and normal force could help provide machines the fine control desirable for safe and effective physical interactions with people. A capacitive sensor is made for this purpose, composed of patterned elastomer and containing both fixed and sliding pillars that allow the sensor to deform and buckle, much like skin itself. The sensor differentiates between simultaneously applied pressure and shear. In addition, finger proximity is detectable up to 15 mm, with a pressure and shear sensitivity of 1 kPa and a displacement resolution of 50 $μ$m. The operation is demonstrated on a simple gripper holding a cup. The combination of features and the straightforward fabrication method make this sensor a candidate for implementation as a sensing skin for humanoid robotics applications.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Classifying Component Function in Product Assemblies with Graph Neural Networks
Authors:
Vincenzo Ferrero,
Kaveh Hassani,
Daniele Grandi,
Bryony DuPont
Abstract:
Function is defined as the ensemble of tasks that enable the product to complete the designed purpose. Functional tools, such as functional modeling, offer decision guidance in the early phase of product design, where explicit design decisions are yet to be made. Function-based design data is often sparse and grounded in individual interpretation. As such, function-based design tools can benefit f…
▽ More
Function is defined as the ensemble of tasks that enable the product to complete the designed purpose. Functional tools, such as functional modeling, offer decision guidance in the early phase of product design, where explicit design decisions are yet to be made. Function-based design data is often sparse and grounded in individual interpretation. As such, function-based design tools can benefit from automatic function classification to increase data fidelity and provide function representation models that enable function-based intelligent design agents. Function-based design data is commonly stored in manually generated design repositories. These design repositories are a collection of expert knowledge and interpretations of function in product design bounded by function-flow and component taxonomies. In this work, we represent a structured taxonomy-based design repository as assembly-flow graphs, then leverage a graph neural network (GNN) model to perform automatic function classification. We support automated function classification by learning from repository data to establish the ground truth of component function assignment. Experimental results show that our GNN model achieves a micro-average F${_1}$-score of 0.832 for tier 1 (broad), 0.756 for tier 2, and 0.783 for tier 3 (specific) functions. Given the imbalance of data features, the results are encouraging. Our efforts in this paper can be a starting point for more sophisticated applications in knowledge-based CAD systems and Design-for-X consideration in function-based design.
△ Less
Submitted 8 July, 2021;
originally announced July 2021.
-
Categorification of infinite-dimensional $\mathfrak{sl}_2$-modules and braid group 2-actions I: tensor products
Authors:
Benjamin Dupont,
Grégoire Naisse
Abstract:
This is the first part of a series of two papers aiming to construct a categorification of the braiding on tensor products of Verma modules, and in particular of the Lawrence--Krammer--Bigelow representations. \\ In this part, we categorify all tensor products of Verma modules and integrable modules for quantum $\mathfrak{sl_2}$. The categorification is given by derived categories of dg versions o…
▽ More
This is the first part of a series of two papers aiming to construct a categorification of the braiding on tensor products of Verma modules, and in particular of the Lawrence--Krammer--Bigelow representations. \\ In this part, we categorify all tensor products of Verma modules and integrable modules for quantum $\mathfrak{sl_2}$. The categorification is given by derived categories of dg versions of KLRW algebras which generalize both the tensor product algebras of Webster, and the dg-algebras used by Lacabanne, the second author and Vaz. We compute a basis for these dgKLRW algebras by using rewriting methods modulo braid-like isotopy, which we develop in an Appendix.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
Super rewriting theory and nondegeneracy of odd categorified sl(2)
Authors:
Benjamin Dupont,
Mark Ebert,
Aaron D. Lauda
Abstract:
We develop the rewriting theory for monoidal supercategories and 2-supercategories. This extends the theory of higher-dimensional rewriting established for (linear) 2-categories to the super setting, providing a suite of tools for constructing bases and normal forms for 2-supercategories given by generators and relations. We then employ this newly developed theory to prove the non-degeneracy conje…
▽ More
We develop the rewriting theory for monoidal supercategories and 2-supercategories. This extends the theory of higher-dimensional rewriting established for (linear) 2-categories to the super setting, providing a suite of tools for constructing bases and normal forms for 2-supercategories given by generators and relations. We then employ this newly developed theory to prove the non-degeneracy conjecture for the odd categorification of quantum sl(2) from arXiv:1307.7816 and arXiv:1701.04133. As a corollary, this gives a classification of dg-structures on the odd 2-category conjectured in arXiv:1808.04924.
△ Less
Submitted 30 January, 2021;
originally announced February 2021.
-
Confluence of algebraic rewriting systems
Authors:
Cyrille Chenavier,
Benjamin Dupont,
Philippe Malbos
Abstract:
Convergent rewriting systems on algebraic structures give methods to solve decision problems, to prove coherence results, and to compute homological invariants. These methods are based on higher-dimensional extensions of the critical branching lemma that proves local confluence from confluence of the critical branchings. The analysis of local confluence of rewriting systems on algebraic structures…
▽ More
Convergent rewriting systems on algebraic structures give methods to solve decision problems, to prove coherence results, and to compute homological invariants. These methods are based on higher-dimensional extensions of the critical branching lemma that proves local confluence from confluence of the critical branchings. The analysis of local confluence of rewriting systems on algebraic structures, such as groups or linear algebras, is complicated because of the underlying algebraic axioms. This article introduces the structure of algebraic polygraph modulo that formalizes the interaction between the rules of an algebraic rewriting system and the inherent algebraic axioms, and we show a critical branching lemma for algebraic polygraphs. We deduce a critical branching lemma for rewriting systems on algebraic models whose axioms are specified by convergent modulo rewriting systems. We illustrate our constructions for string, linear, and group rewriting systems.
△ Less
Submitted 5 November, 2021; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Rewriting modulo isotopies in Khovanov-Lauda-Rouquier's categorification of quantum groups
Authors:
Benjamin Dupont
Abstract:
We study a presentation of Khovanov - Lauda - Rouquier's candidate $2$-categorification of a quantum group using algebraic rewriting methods. We use a computational approach based on rewriting modulo the isotopy axioms of its pivotal structure to compute a family of linear bases for all the vector spaces of $2$-cells in this $2$-category. We show that these bases correspond to Khovanov and Lauda's…
▽ More
We study a presentation of Khovanov - Lauda - Rouquier's candidate $2$-categorification of a quantum group using algebraic rewriting methods. We use a computational approach based on rewriting modulo the isotopy axioms of its pivotal structure to compute a family of linear bases for all the vector spaces of $2$-cells in this $2$-category. We show that these bases correspond to Khovanov and Lauda's conjectured generating sets, proving the non-degeneracy of their diagrammatic calculus. This implies that this $2$-category is a categorification of Lusztig's idempotent and integral quantum group $\bf{U}_{q}(\mathfrak{g})$ associated to a symmetrizable simply-laced Kac-Moody algebra $\mathfrak{g}$.
△ Less
Submitted 23 July, 2019;
originally announced July 2019.
-
Rewriting modulo isotopies in pivotal linear $(2,2)$-categories
Authors:
Benjamin Dupont
Abstract:
In this paper, we study rewriting modulo a set of algebraic axioms in categories enriched in linear categories, called linear~$(2,2)$-categories. We introduce the structure of linear~$(3,2)$-polygraph modulo as a presentation of a linear~$(2,2)$-category by a rewriting system modulo algebraic axioms. We introduce a symbolic computation method in order to compute linear bases for the vector spaces…
▽ More
In this paper, we study rewriting modulo a set of algebraic axioms in categories enriched in linear categories, called linear~$(2,2)$-categories. We introduce the structure of linear~$(3,2)$-polygraph modulo as a presentation of a linear~$(2,2)$-category by a rewriting system modulo algebraic axioms. We introduce a symbolic computation method in order to compute linear bases for the vector spaces of $2$-cells of these categories. In particular, we study the case of pivotal $2$-categories using the isotopy relations given by biadjunctions on $1$-cells and cyclicity conditions on $2$-cells as axioms for which we rewrite modulo. By this constructive method, we recover the bases of normally ordered dotted oriented Brauer diagrams in te affine oriented Brauer linear~$(2,2)$-category.
△ Less
Submitted 10 June, 2019;
originally announced June 2019.
-
Coherent confluence modulo relations and double groupoids
Authors:
Benjamin Dupont,
Philippe Malbos
Abstract:
A coherent presentation of an n-category is a presentation by generators, relations and relations among relations. Confluent and terminating rewriting systems generate coherent presentations, whose relations among relations are defined by confluence diagrams of critical branchings. This article introduces a procedure to compute coherent presentations when the rewrite relations are defined modulo a…
▽ More
A coherent presentation of an n-category is a presentation by generators, relations and relations among relations. Confluent and terminating rewriting systems generate coherent presentations, whose relations among relations are defined by confluence diagrams of critical branchings. This article introduces a procedure to compute coherent presentations when the rewrite relations are defined modulo a set of axioms. Our coherence results are formulated using the structure of n-categories enriched in double groupoids, whose horizontal cells represent rewriting paths, vertical cells represent the congruence generated by the axioms and square cells represent coherence cells induced by diagrams of confluence modulo. We illustrate our constructions on rewriting systems modulo commutation relations in commutative monoids, isotopy relations in pivotal monoidal categories, and inverse relations in groups.
△ Less
Submitted 4 October, 2021; v1 submitted 18 October, 2018;
originally announced October 2018.
-
Ransomware Payments in the Bitcoin Ecosystem
Authors:
Masarah Paquet-Clouston,
Bernhard Haslhofer,
Benoit Dupont
Abstract:
Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public. However, a more comprehensive, evidence-based picture on the global direct financial impact of ransomware atta…
▽ More
Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public. However, a more comprehensive, evidence-based picture on the global direct financial impact of ransomware attacks is still missing. In this paper, we present a data-driven method for identifying and gathering information on Bitcoin transactions related to illicit activity based on footprints left on the public Bitcoin blockchain. We implement this method on-top-of the GraphSense open-source platform and apply it to empirically analyze transactions related to 35 ransomware families. We estimate the lower bound direct financial impact of each ransomware family and find that, from 2013 to mid-2017, the market for ransomware payments has a minimum worth of USD 12,768,536 (22,967.54 BTC). We also find that the market is highly skewed with only a few number of players responsible for the majority of the payments. Based on these research findings, policy-makers and law enforcement agencies can use the statistics provided to understand the size of the illicit market and make informed decisions on how best to address the threat.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.