-
Deep-Learning Classification and Parameter Inference of Rotational Core-Collapse Supernovae
Authors:
Solange Nunes,
Gabriel Escrig,
Osvaldo G. Freitas,
José A. Font,
Tiago Fernandes,
Antonio Onofre,
Alejandro Torres-Forné
Abstract:
We test Deep-Learning (DL) techniques for the analysis of rotational core-collapse supernovae (CCSN) gravitational-wave (GW) signals by performing classification and parameter inference of the GW strain amplitude ($D \cdot Δh $) and the maximum (peak) frequency $(f_\textrm{peak})$, attained at core bounce. Our datasets are built from a catalog of numerically generated CCSN waveforms assembled by R…
▽ More
We test Deep-Learning (DL) techniques for the analysis of rotational core-collapse supernovae (CCSN) gravitational-wave (GW) signals by performing classification and parameter inference of the GW strain amplitude ($D \cdot Δh $) and the maximum (peak) frequency $(f_\textrm{peak})$, attained at core bounce. Our datasets are built from a catalog of numerically generated CCSN waveforms assembled by Richers 2017. Those waveforms are injected into noise from the Advanced LIGO and Advanced Virgo detectors corresponding to the O2 and O3a observing runs. For a signal-to-noise ratio (SNR) above 5, our classification network using time series detects Galactic CCSN GW signals buried in detector noise with a false positive rate (FPR) of 0.10% and a 98% accuracy, being able to detect all signals with SNR>10. The inference of $f_\textrm{peak}$ is more accurate than for $D \cdot Δh $, particularly for our datasets with the shortest time window (0.25 s) and for a minimum SNR=15. From the calibration plots of predicted versus true values of the two parameters, the standard deviation ($σ$) and the slope deviation with respect to the ideal value are computed. We find $σ_{D \cdot Δh}$ = 52.6cm and $σ_{f_\textrm{peak}}$ = 18.3Hz, with respective slope deviations of 11.6% and 8.3%. Our best model is also tested on waveforms from a recent CCSN catalog built by Mitra 2023, different from the one used for the training. For these new waveforms the true values of the two parameters are mostly within the 1$σ$ band around the network's predicted values. Our results show that DL techniques hold promise to infer physical parameters of Galactic rotational CCSN even in the presence of real (non-Gaussian) noise conditions from current GW detectors.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Normal modes of Proca fields in AdS$_d$ spacetime
Authors:
David Lopes,
Tiago V. Fernandes,
José P. S. Lemos
Abstract:
The normal modes of Proca field perturbations in $d$-dimensional anti-de Sitter spacetime, AdS$_d$ for short, with reflective Dirichlet boundary conditions, are obtained exactly. Within the Ishibashi-Kodama framework, we decompose the Proca field in scalar-type and vector-type components, according to their tensorial behavior on the $(d-2)$-sphere $\mathcal{S}^{d-2}$. Two of the degrees of freedom…
▽ More
The normal modes of Proca field perturbations in $d$-dimensional anti-de Sitter spacetime, AdS$_d$ for short, with reflective Dirichlet boundary conditions, are obtained exactly. Within the Ishibashi-Kodama framework, we decompose the Proca field in scalar-type and vector-type components, according to their tensorial behavior on the $(d-2)$-sphere $\mathcal{S}^{d-2}$. Two of the degrees of freedom of the Proca field are described by scalar-type components, which in general are coupled due to the mass of the field, but in AdS$_d$ we show that they can be decoupled. The other $d-3$ degrees of freedom of the field are described by a vector-type component that generically decouples completely. The normal modes and their frequencies for both the scalar-type and vector-type components of the Proca field are then obtained analytically. Additionally, we analyze the normal modes of the Maxwell field as the massless limit of the Proca field. We find that for scalar-type perturbations in $d=4$ there is a discontinuity in the massless limit, in $d=5$ the massless limit is well defined using Dirichlet-Neumann rather than Dirichlet boundary conditions, and in $d>5$ the massless limit is completely well defined, i.e., it is obtained smoothly from the massless limit of the scalar-type perturbations of the Proca field. For vector-type perturbations the Maxwell field limit is obtained smoothly for all $d$ from the massless limit of the vector-type perturbations of the Proca field.
△ Less
Submitted 15 March, 2024; v1 submitted 23 January, 2024;
originally announced January 2024.
-
On relative constructible sheaves and integral transforms
Authors:
Luisa Fiorot,
Teresa Monteiro Fernandes
Abstract:
The aim of this note is threefold. The first is to obtain a simple characterization of relative constructible sheaves when the parameter space is projective. The second is to study the relative Fourier-Mukai for relative constructible sheaves and for relative regular holonomic $\mathcal D$-modules and prove they induce relative equivalences of categories. The third is to introduce and study the no…
▽ More
The aim of this note is threefold. The first is to obtain a simple characterization of relative constructible sheaves when the parameter space is projective. The second is to study the relative Fourier-Mukai for relative constructible sheaves and for relative regular holonomic $\mathcal D$-modules and prove they induce relative equivalences of categories. The third is to introduce and study the notions of relative constructible functions and relative Euler-Poincaré index. We prove that the relative Euler-Poincaré index provides an isomorphism between the Grothendieck group of the derived category of complexes with bounded relative $\mathbb R$-constructible cohomology and the ring of relative constructible functions.
△ Less
Submitted 23 April, 2024; v1 submitted 16 October, 2023;
originally announced October 2023.
-
Grand canonical ensemble of a $d$-dimensional Reissner-Nordström black hole in a cavity
Authors:
Tiago V. Fernandes,
José P. S. Lemos
Abstract:
The grand canonical ensemble of a $d$-dimensional Reissner-Nordström black hole space in a cavity is analyzed. The realization of this ensemble is made through the Euclidean path integral approach by giving the Euclidean action for the black hole with the correct topology, and boundary conditions corresponding to a cavity, where the fixed quantities are the temperature and the electric potential.…
▽ More
The grand canonical ensemble of a $d$-dimensional Reissner-Nordström black hole space in a cavity is analyzed. The realization of this ensemble is made through the Euclidean path integral approach by giving the Euclidean action for the black hole with the correct topology, and boundary conditions corresponding to a cavity, where the fixed quantities are the temperature and the electric potential. One performs a zero loop approximation to find and analyze the stationary points of the reduced action. This yields two solutions for the electrically charged black hole, $r_{+1}$, which is the smaller and unstable, and $r_{+2}$, which is the larger and stable. One also analyzes the most probable configurations, which are either a stable charged black hole or hot flat space, mimicked by a nongravitating charged shell. Making the correspondence between the action and the grand potential, one can get the black hole thermodynamic quantities, such as the entropy, the mean charge, the mean energy, and the thermodynamic pressure, as well as the Smarr formula, shown to be valid only for the unstable black hole. We find that thermodynamic stability is related to the positivity of the heat capacity at constant electric potential and area of the cavity. We also comment on the most favorable thermodynamic phases and phase transitions. We then choose $d = 5$, which is singled out naturally from the other higher dimensions as it provides an exact solution for the problem, and apply all the results previously found. The case $d = 4$ is mentioned. We compare thermodynamic radii with the photonic orbit radius and the Buchdahl-Andréasson-Wright bound radius in $d$-dimensional Reissner-Nordström spacetimes and find they are unconnected, showing that the connections displayed in the Schwarzschild case are not generic, rather they are very restricted holding only in the pure gravitational situation.
△ Less
Submitted 26 October, 2023; v1 submitted 21 September, 2023;
originally announced September 2023.
-
Convolutional Neural Networks for the classification of glitches in gravitational-wave data streams
Authors:
Tiago S. Fernandes,
Samuel J. Vieira,
Antonio Onofre,
Juan Calderón Bustillo,
Alejandro Torres-Forné,
José A. Font
Abstract:
We investigate the use of Convolutional Neural Networks (including the modern ConvNeXt network family) to classify transient noise signals (i.e.~glitches) and gravitational waves in data from the Advanced LIGO detectors. First, we use models with a supervised learning approach, both trained from scratch using the Gravity Spy dataset and employing transfer learning by fine-tuning pre-trained models…
▽ More
We investigate the use of Convolutional Neural Networks (including the modern ConvNeXt network family) to classify transient noise signals (i.e.~glitches) and gravitational waves in data from the Advanced LIGO detectors. First, we use models with a supervised learning approach, both trained from scratch using the Gravity Spy dataset and employing transfer learning by fine-tuning pre-trained models in this dataset. Second, we also explore a self-supervised approach, pre-training models with automatically generated pseudo-labels. Our findings are very close to existing results for the same dataset, reaching values for the F1 score of 97.18% (94.15%) for the best supervised (self-supervised) model. We further test the models using actual gravitational-wave signals from LIGO-Virgo's O3 run. Although trained using data from previous runs (O1 and O2), the models show good performance, in particular when using transfer learning. We find that transfer learning improves the scores without the need for any training on real signals apart from the less than 50 chirp examples from hardware injections present in the Gravity Spy dataset. This motivates the use of transfer learning not only for glitch classification but also for signal classification.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Normal modes of Proca fields in AdS spacetime
Authors:
Tiago V. Fernandes,
David Hilditch,
José P. S. Lemos,
Vítor Cardoso
Abstract:
A normal mode analysis for Proca fields in the anti-de Sitter (AdS) spacetime is given. It is found that the equations for the Proca field can be decoupled analytically. This is performed by changing the basis of the vector spherical harmonics (VSH) decomposition. The normal modes and the normal mode frequencies of the Proca equation in the AdS spacetime are then analytically determined. It is als…
▽ More
A normal mode analysis for Proca fields in the anti-de Sitter (AdS) spacetime is given. It is found that the equations for the Proca field can be decoupled analytically. This is performed by changing the basis of the vector spherical harmonics (VSH) decomposition. The normal modes and the normal mode frequencies of the Proca equation in the AdS spacetime are then analytically determined. It is also shown that the Maxwell field can be recovered by taking the massless limit of the Proca field with care so that the nonphysical gauge modes are eliminated.
△ Less
Submitted 24 January, 2023;
originally announced January 2023.
-
Regularization of relative holonomic D-modules
Authors:
Teresa Monteiro Fernandes
Abstract:
Let $X$ and $S$ be complex analytic manifolds where $S$ plays the role of a parameter space. Using the sheaf $\DXS^{\infty}$ of relative differential operators of infinite order, we construct functorially the regular holonomic $\DXS$-module $\shm_{reg}$ associated to a relative holonomic $\DXS$-module $\shm$, extending to the relative case classical theorems by Kashiwara-Kawai: denoting by…
▽ More
Let $X$ and $S$ be complex analytic manifolds where $S$ plays the role of a parameter space. Using the sheaf $\DXS^{\infty}$ of relative differential operators of infinite order, we construct functorially the regular holonomic $\DXS$-module $\shm_{reg}$ associated to a relative holonomic $\DXS$-module $\shm$, extending to the relative case classical theorems by Kashiwara-Kawai: denoting by $\shm^{\infty}$ the tensor product of $\shm$ by $\DXS^{\infty}$ we explicit $\shm^{\infty}$ in terms of the sheaf of holomorphic solutions of $\shm$ and prove that $\shm^{\infty}$ and $\shm_{reg}^{\infty}$ are isomorphic.
△ Less
Submitted 26 May, 2023; v1 submitted 30 October, 2022;
originally announced October 2022.
-
Electrically charged spherical matter shells in higher dimensions: Entropy, thermodynamic stability, and the black hole limit
Authors:
Tiago V. Fernandes,
José P. S. Lemos
Abstract:
We study the thermodynamic properties of a static electrically charged spherical thin shell in $d$ dimensions by imposing the first law of thermodynamics on the shell. The shell is at radius $R$, inside it the spacetime is Minkowski, and outside it the spacetime is Reissner-Nordström. We obtain that the shell thermodynamics is fully described by giving two additional reduced equations of state, on…
▽ More
We study the thermodynamic properties of a static electrically charged spherical thin shell in $d$ dimensions by imposing the first law of thermodynamics on the shell. The shell is at radius $R$, inside it the spacetime is Minkowski, and outside it the spacetime is Reissner-Nordström. We obtain that the shell thermodynamics is fully described by giving two additional reduced equations of state, one for the temperature and another for the electrostatic potential. We choose the equation of state for the temperature as a power law in the gravitational radius $r_+$ with exponent $a$, such that the $a=1$ case gives the temperature of a shell with black hole thermodynamic properties, and for the electrostatic potential we choose an equation of state characteristic of a Reissner-Nordström black hole spacetime. The entropy of the shell is found to be proportional to $A_+^a$, where $A_+$ is the gravitational area corresponding to $r_+$, with $a>0$. We are then able to perform the black hole limit $R=r_+$, find the Smarr formula, and recover the thermodynamics of a $d$-dimensional Reissner-Nordström black hole. We study the intrinsic thermodynamic stability of the shell with the chosen equations of state. We obtain that for $0<a\leq \frac{d-3}{d-2}$ all the configurations of the shell are thermodynamically stable, for $\frac{d-3}{d-2}<a<1$ stability depends on the mass and electric charge, and for $a>1$ all the configurations are unstable, except for the shell at its own gravitational radius, which is marginally stable. We rewrite the stability conditions in terms of laboratory variables. We find that the sufficient condition for the stability of these shells is when the isothermal electric susceptibility $χ_{p,T}$ is positive, marginal stability happening when this quantity is infinite, and instability arising for configurations with a negative electric susceptibility.
△ Less
Submitted 24 November, 2022; v1 submitted 23 August, 2022;
originally announced August 2022.
-
Roadmap for Optical Tweezers
Authors:
Giovanni Volpe,
Onofrio M. Maragò,
Halina Rubinzstein-Dunlop,
Giuseppe Pesce,
Alexander B. Stilgoe,
Giorgio Volpe,
Georgiy Tkachenko,
Viet Giang Truong,
Síle Nic Chormaic,
Fatemeh Kalantarifard,
Parviz Elahi,
Mikael Käll,
Agnese Callegari,
Manuel I. Marqués,
Antonio A. R. Neves,
Wendel L. Moreira,
Adriana Fontes,
Carlos L. Cesar,
Rosalba Saija,
Abir Saidi,
Paul Beck,
Jörg S. Eismann,
Peter Banzer,
Thales F. D. Fernandes,
Francesco Pedaci
, et al. (58 additional authors not shown)
Abstract:
Optical tweezers are tools made of light that enable contactless pushing, trap**, and manipulation of objects ranging from atoms to space light sails. Since the pioneering work by Arthur Ashkin in the 1970s, optical tweezers have evolved into sophisticated instruments and have been employed in a broad range of applications in life sciences, physics, and engineering. These include accurate force…
▽ More
Optical tweezers are tools made of light that enable contactless pushing, trap**, and manipulation of objects ranging from atoms to space light sails. Since the pioneering work by Arthur Ashkin in the 1970s, optical tweezers have evolved into sophisticated instruments and have been employed in a broad range of applications in life sciences, physics, and engineering. These include accurate force and torque measurement at the femtonewton level, microrheology of complex fluids, single micro- and nanoparticle spectroscopy, single-cell analysis, and statistical-physics experiments. This roadmap provides insights into current investigations involving optical forces and optical tweezers from their theoretical foundations to designs and setups. It also offers perspectives for applications to a wide range of research fields, from biophysics to space exploration.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
Relative Regular Riemann-Hilbert correspondence II
Authors:
Luisa Fiorot,
Teresa Monteiro Fernandes,
Claude Sabbah
Abstract:
We develop the theory of relative regular holonomic D-modules with a smooth complex manifold S of arbitrary dimension as parameter space, together with their main functorial properties. In particular, we establish in this general setting the relative Riemann-Hilbert correspondence proved in a previous work in the one-dimensional case.
We develop the theory of relative regular holonomic D-modules with a smooth complex manifold S of arbitrary dimension as parameter space, together with their main functorial properties. In particular, we establish in this general setting the relative Riemann-Hilbert correspondence proved in a previous work in the one-dimensional case.
△ Less
Submitted 12 February, 2024; v1 submitted 10 March, 2022;
originally announced March 2022.
-
Quasinormal modes of Proca fields in a Schwarzschild-AdS spacetime
Authors:
Tiago V. Fernandes,
David Hilditch,
José P. S. Lemos,
Vitor Cardoso
Abstract:
We present new results concerning the Proca massive vector field in a Schwarzschild-AdS black hole geometry. We provide a first principles analysis of Proca vector fields in this geometry using both the vector spherical harmonic (VSH) separation method and the Frolov-Krtouš-Kubizňák-Santos (FKKS) method that separates the relevant equations in spinning geometries. The analysis in the VSH method sh…
▽ More
We present new results concerning the Proca massive vector field in a Schwarzschild-AdS black hole geometry. We provide a first principles analysis of Proca vector fields in this geometry using both the vector spherical harmonic (VSH) separation method and the Frolov-Krtouš-Kubizňák-Santos (FKKS) method that separates the relevant equations in spinning geometries. The analysis in the VSH method shows, on one hand, that it is arduous to separate the scalar-type from the vector-type polarizations of the electric sector of the Proca field, and on the other hand, it displays clearly the electric and the magnetic mode sectors. The analysis in the FKKS method is performed by taking the nonrotating limit of the Kerr-AdS spacetime, and shows that the ansatz decouples the polarizations in the electric mode sector even in the nonrotating limit. On the other hand, it captures only two of the three possible polarizations, the magnetic mode sector is missing. The reason for the absence of this polarization is related to the degeneracy of the principal tensor in static spherical symmetric spacetimes. The degrees of freedom and quasinormal modes in both separation methods of the Proca field are found. The frequencies of the quasinormal modes are also computed. For the electric mode sector in the VSH method the frequencies are found through an extension, which substitutes number coefficients by matrix coefficients, of the Horowitz-Hubeny numerical procedure, whereas for the magnetic mode sector in the VSH method and the electric sector of the FKKS method it is shown that a direct use of the procedure can be made. The values of the quasinormal mode frequencies obtained for each method are compared and showed to be in good agreement with each other. This further supports the analytical approaches presented here for the behavior of the Proca field in a Schwarzschild-AdS black hole background.
△ Less
Submitted 10 February, 2022; v1 submitted 6 December, 2021;
originally announced December 2021.
-
Method to Build Equivalent Models of Microgrids for RMS Dynamic Simulation of Power Systems
Authors:
Rodrigo A. Ramos,
Ahda P. Grilo-Pavani,
Artur B. Piardi,
Tatiane C. C. Fernandes
Abstract:
The high penetration of distributed renewable energy resources in power systems has changed their dynamic behavior, not only at the distribution level but also at the transmission levels. For analyses performed in this new reality of interconnected systems, a suitable equivalent model is required to represent the active dynamics of distribution systems. In this context, this paper proposes the app…
▽ More
The high penetration of distributed renewable energy resources in power systems has changed their dynamic behavior, not only at the distribution level but also at the transmission levels. For analyses performed in this new reality of interconnected systems, a suitable equivalent model is required to represent the active dynamics of distribution systems. In this context, this paper proposes the application of a gray-box method to obtain an appropriate equivalent model for active distribution networks. From data measured at the point of common coupling, a trajectory sensitivity analysis is carried out to select the most important parameters of this equivalent model, which are then estimated by an evolutionary algorithm. The results show that the application of the sensitivity analysis can improve the quality of the parameter estimation process (since it focuses only on relevant parameters), enabling an efficient tuning of an equivalent ADN model.
△ Less
Submitted 19 July, 2022; v1 submitted 12 October, 2021;
originally announced October 2021.
-
Relative subanalytic sheaves II
Authors:
Teresa Monteiro Fernandes,
Luca Prelli
Abstract:
We give a new construction of sheaves on a relative site associated to a product $X\times S$ where $S$ plays the role of a parameter space, expanding the previous construction by the same authors, where the subanalytic structure on $S$ was required. Here we let this last condition fall. In this way the construction becomes much easier to apply when dimension of $S$ is bigger than one. We also stud…
▽ More
We give a new construction of sheaves on a relative site associated to a product $X\times S$ where $S$ plays the role of a parameter space, expanding the previous construction by the same authors, where the subanalytic structure on $S$ was required. Here we let this last condition fall. In this way the construction becomes much easier to apply when dimension of $S$ is bigger than one. We also study the functorial properties of base change with respect to the parameter space.
△ Less
Submitted 19 July, 2021; v1 submitted 3 March, 2021;
originally announced March 2021.
-
The relative hermitian duality functor
Authors:
Teresa Monteiro Fernandes,
Claude Sabbah
Abstract:
We extend to the category of relative regular holonomic modules on a manifold $X$, parametrized by a curve $S$, the Hermitian duality functor (or conjugation functor) of Kashiwara. We prove that this functor is an equivalence with the similar category on the conjugate manifold $\overline X$, parametrized by the same curve. As a byproduct we introduce the notion of regular holonomic relative distri…
▽ More
We extend to the category of relative regular holonomic modules on a manifold $X$, parametrized by a curve $S$, the Hermitian duality functor (or conjugation functor) of Kashiwara. We prove that this functor is an equivalence with the similar category on the conjugate manifold $\overline X$, parametrized by the same curve. As a byproduct we introduce the notion of regular holonomic relative distribution.
△ Less
Submitted 8 July, 2022; v1 submitted 30 December, 2020;
originally announced December 2020.
-
Analysis of Social Robotic Navigation approaches: CNN Encoder and Incremental Learning as an alternative to Deep Reinforcement Learning
Authors:
Janderson Ferreira,
Agostinho A. F. Júnior,
Letícia Castro,
Yves M. Galvão,
Pablo Barros,
Bruno J. T. Fernandes
Abstract:
Dealing with social tasks in robotic scenarios is difficult, as having humans in the learning loop is incompatible with most of the state-of-the-art machine learning algorithms. This is the case when exploring Incremental learning models, in particular the ones involving reinforcement learning. In this work, we discuss this problem and possible solutions by analysing a previous study on adaptive c…
▽ More
Dealing with social tasks in robotic scenarios is difficult, as having humans in the learning loop is incompatible with most of the state-of-the-art machine learning algorithms. This is the case when exploring Incremental learning models, in particular the ones involving reinforcement learning. In this work, we discuss this problem and possible solutions by analysing a previous study on adaptive convolutional encoders for a social navigation task.
△ Less
Submitted 5 September, 2020; v1 submitted 18 August, 2020;
originally announced August 2020.
-
On the globalization of Riemannian Newton method
Authors:
Marcio Antonio de Andrade Bortoloti,
Teles Araujo Fernandes,
Orizon Pereira Ferreira
Abstract:
In the present paper, in order to fnd a singularity of a vector field defined on Riemannian manifolds, we present a new globalization strategy of Newton method and establish its global convergence with superlinear rate. In particular, this globalization generalizes for a general retraction the existing damped Newton's method. The presented global convergence analysis does not require any hypoteses…
▽ More
In the present paper, in order to fnd a singularity of a vector field defined on Riemannian manifolds, we present a new globalization strategy of Newton method and establish its global convergence with superlinear rate. In particular, this globalization generalizes for a general retraction the existing damped Newton's method. The presented global convergence analysis does not require any hypotesesis on singularity of the vector field. We applied the proposed method to solve the truncated singular value problem on the product of two Stiefel manifolds, the dextrous hand gras** problem on the cone of symmetric positive definite matrices and the Rayleigh quotient on the sphere. Moreover, some academic problems are solved. Numerical experiments are presented showing that the proposed algorithm has better robustness compared with the aforementioned method.
△ Less
Submitted 14 August, 2020;
originally announced August 2020.
-
Performance Improvement of Path Planning algorithms with Deep Learning Encoder Model
Authors:
Janderson Ferreira,
Agostinho A. F. Júnior,
Yves M. Galvão,
Pablo Barros,
Sergio Murilo Maciel Fernandes,
Bruno J. T. Fernandes
Abstract:
Currently, path planning algorithms are used in many daily tasks. They are relevant to find the best route in traffic and make autonomous robots able to navigate. The use of path planning presents some issues in large and dynamic environments. Large environments make these algorithms spend much time finding the shortest path. On the other hand, dynamic environments request a new execution of the a…
▽ More
Currently, path planning algorithms are used in many daily tasks. They are relevant to find the best route in traffic and make autonomous robots able to navigate. The use of path planning presents some issues in large and dynamic environments. Large environments make these algorithms spend much time finding the shortest path. On the other hand, dynamic environments request a new execution of the algorithm each time a change occurs in the environment, and it increases the execution time. The dimensionality reduction appears as a solution to this problem, which in this context means removing useless paths present in those environments. Most of the algorithms that reduce dimensionality are limited to the linear correlation of the input data. Recently, a Convolutional Neural Network (CNN) Encoder was used to overcome this situation since it can use both linear and non-linear information to data reduction. This paper analyzes in-depth the performance to eliminate the useless paths using this CNN Encoder model. To measure the mentioned model efficiency, we combined it with different path planning algorithms. Next, the final algorithms (combined and not combined) are checked in a database that is composed of five scenarios. Each scenario contains fixed and dynamic obstacles. Their proposed model, the CNN Encoder, associated to other existent path planning algorithms in the literature, was able to obtain a time decrease to find the shortest path in comparison to all path planning algorithms analyzed. the average decreased time was 54.43 %.
△ Less
Submitted 5 August, 2020;
originally announced August 2020.
-
FCN+RL: A Fully Convolutional Network followed by Refinement Layers to Offline Handwritten Signature Segmentation
Authors:
Celso A. M. Lopes Junior,
Matheus Henrique M. da Silva,
Byron Leite Dantas Bezerra,
Bruno Jose Torres Fernandes,
Donato Impedovo
Abstract:
Although secular, handwritten signature is one of the most reliable biometric methods used by most countries. In the last ten years, the application of technology for verification of handwritten signatures has evolved strongly, including forensic aspects. Some factors, such as the complexity of the background and the small size of the region of interest - signature pixels - increase the difficulty…
▽ More
Although secular, handwritten signature is one of the most reliable biometric methods used by most countries. In the last ten years, the application of technology for verification of handwritten signatures has evolved strongly, including forensic aspects. Some factors, such as the complexity of the background and the small size of the region of interest - signature pixels - increase the difficulty of the targeting task. Other factors that make it challenging are the various variations present in handwritten signatures such as location, type of ink, color and type of pen, and the type of stroke. In this work, we propose an approach to locate and extract the pixels of handwritten signatures on identification documents, without any prior information on the location of the signatures. The technique used is based on a fully convolutional encoder-decoder network combined with a block of refinement layers for the alpha channel of the predicted image. The experimental results demonstrate that the technique outputs a clean signature with higher fidelity in the lines than the traditional approaches and preservation of the pertinent characteristics to the signer's spelling. To evaluate the quality of our proposal, we use the following image similarity metrics: SSIM, SIFT, and Dice Coefficient. The qualitative and quantitative results show a significant improvement in comparison with the baseline system.
△ Less
Submitted 28 May, 2020;
originally announced May 2020.
-
CNN Encoder to Reduce the Dimensionality of Data Image for Motion Planning
Authors:
Janderson Ferreira,
Agostinho A. F. Júnior,
Yves M. Galvão,
Bruno J. T. Fernandes,
Pablo Barros
Abstract:
Many real-world applications need path planning algorithms to solve tasks in different areas, such as social applications, autonomous cars, and tracking activities. And most importantly motion planning. Although the use of path planning is sufficient in most motion planning scenarios, they represent potential bottlenecks in large environments with dynamic changes. To tackle this problem, the numbe…
▽ More
Many real-world applications need path planning algorithms to solve tasks in different areas, such as social applications, autonomous cars, and tracking activities. And most importantly motion planning. Although the use of path planning is sufficient in most motion planning scenarios, they represent potential bottlenecks in large environments with dynamic changes. To tackle this problem, the number of possible routes could be reduced to make it easier for path planning algorithms to find the shortest path with less efforts. An traditional algorithm for path planning is the A*, it uses an heuristic to work faster than other solutions. In this work, we propose a CNN encoder capable of eliminating useless routes for motion planning problems, then we combine the proposed neural network output with A*. To measure the efficiency of our solution, we propose a database with different scenarios of motion planning problems. The evaluated metric is the number of the iterations to find the shortest path. The A* was compared with the CNN Encoder (proposal) with A*. In all evaluated scenarios, our solution reduced the number of iterations by more than 60\%.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
Synchronous, Crosstalk-free Correlative AFM and Confocal Microscopies/Spectroscopies
Authors:
Thales F. D. Fernandes,
Oscar Saavedra,
Emmanuel Margeat,
Pierre-Emmanuel Milhiet,
Luca Costa
Abstract:
Microscopies have become pillars of our characterization tools to observe biological systems and assemblies. Correlative and synchronous use of different microscopies relies on the fundamental assumption of non-interference during images acquisitions. In this work, by exploring the correlative use of Atomic Force Microscopy and confocal-Fluorescence-Lifetime Imaging Microscopy (AFM-FLIM), we quant…
▽ More
Microscopies have become pillars of our characterization tools to observe biological systems and assemblies. Correlative and synchronous use of different microscopies relies on the fundamental assumption of non-interference during images acquisitions. In this work, by exploring the correlative use of Atomic Force Microscopy and confocal-Fluorescence-Lifetime Imaging Microscopy (AFM-FLIM), we quantify cross-talk effects occurring during synchronous acquisition. We characterize and minimize optomechanical forces on different AFM cantilevers interfering with normal AFM operation as well as spurious luminescence from the tip and cantilever affecting time-resolved fluorescence detection. By defining non-interfering experimental imaging parameters, we show accurate real-time acquisition and two-dimensional map** of interaction force, fluorescence lifetime and intensity characterizing morphology (AFM) and local viscosity (FLIM) of gel and fluid phases separation of supported lipid model membranes. Finally, as proof of principle by means of synchronous force and fluorescence spectroscopies, we precisely tune the lifetime of a fluorescent nanodiamond positioned on the AFM tip by controlling its distance from a metallic surface. This opens up a novel pathway of quench sensing to image soft biological samples such as membranes since it does not require tip-sample mechanical contact in contrast with conventional AFM in liquid.
△ Less
Submitted 21 February, 2020; v1 submitted 8 January, 2020;
originally announced January 2020.
-
Basis-independent treatment of the complex 2HDM
Authors:
Rafael Boto,
Tiago V. Fernandes,
Howard E. Haber,
Jorge C. Romao,
Joao P. Silva
Abstract:
The complex 2HDM (C2HDM) is the most general CP-violating two Higgs doublet model that possesses a softly-broken $\mathbb{Z}_2$ symmetry. However, the physical consequences of the model cannot depend on the basis of scalar fields used to define it. Thus, to get a better sense of the significance of the C2HDM parameters, we have analyzed this model by employing a basis-independent formalism. This f…
▽ More
The complex 2HDM (C2HDM) is the most general CP-violating two Higgs doublet model that possesses a softly-broken $\mathbb{Z}_2$ symmetry. However, the physical consequences of the model cannot depend on the basis of scalar fields used to define it. Thus, to get a better sense of the significance of the C2HDM parameters, we have analyzed this model by employing a basis-independent formalism. This formalism involves transforming to the Higgs basis (which is defined up to an arbitrary complex phase) and identifying quantities that are invariant with respect to this phase degree of freedom. Using this method, we have obtained the constraints that enforce the softly-broken $\mathbb{Z}_2$ symmetry. One can then relate the C2HDM parameters to basis-independent quantities up to a two-fold ambiguity. We then show how this remaining ambiguity is resolved. We also examine the possibility of spontaneous CP violation when the scalar potential of the C2HDM is explicitly CP-conserving. Basis-independent constraints are presented that govern the presence of spontaneous CP violation.
△ Less
Submitted 17 March, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
On Lisbon integrals
Authors:
Daniel Barlet,
Teresa Monteiro Fernandes
Abstract:
We introduce new complex analytic integral transforms, the Lisbon Integrals, which naturally arise in the study of the affine space $\mathbb{C}^k$ of unitary polynomials $P_s(z)$ where $s\in\mathbb{C}^k$ and $z\in \mathbb{C}$, $s_i$ identified to the $i-$th symmetric function of the roots of $P_s(z)$. We completely determine the $\mathcal{D}$-modules (or systems of partial differential equations)…
▽ More
We introduce new complex analytic integral transforms, the Lisbon Integrals, which naturally arise in the study of the affine space $\mathbb{C}^k$ of unitary polynomials $P_s(z)$ where $s\in\mathbb{C}^k$ and $z\in \mathbb{C}$, $s_i$ identified to the $i-$th symmetric function of the roots of $P_s(z)$. We completely determine the $\mathcal{D}$-modules (or systems of partial differential equations) the Lisbon Integrals satisfy and prove that they are their unique global solutions. If we specify a holomorphic function $f$ in the $z$-variable, our construction induces an integral transform which associates a regular holonomic module quotient of the sub-holonomic module we computed. We illustrate this correspondence in the case of a $1$-parameter family of exponentials $f_t(z) = exp(t z)$ with $t$ a complex parameter.
△ Less
Submitted 23 February, 2020; v1 submitted 24 June, 2019;
originally announced June 2019.
-
Relative regular Riemann-Hilbert correspondence
Authors:
Luisa Fiorot,
Teresa Monteiro Fernandes,
Claude Sabbah
Abstract:
On the product of a complex manifold $X$ by a complex curve $S$ considered as a parameter space, we show a Riemann-Hilbert correspondence between regular holonomic relative $\mathcal D$-modules (resp. complexes) on the one hand and relative perverse complexes (resp. $S$-$\mathbb{C}$-constructible complexes) on the other hand.
On the product of a complex manifold $X$ by a complex curve $S$ considered as a parameter space, we show a Riemann-Hilbert correspondence between regular holonomic relative $\mathcal D$-modules (resp. complexes) on the one hand and relative perverse complexes (resp. $S$-$\mathbb{C}$-constructible complexes) on the other hand.
△ Less
Submitted 6 August, 2021; v1 submitted 24 June, 2019;
originally announced June 2019.
-
Relative strongly regular holonomic ${\mathcal{D}}$-modules and the Riemann-Hilbert correspondence
Authors:
Luisa Fiorot,
Teresa Monteiro Fernandes
Abstract:
We introduce the notion of strong regular holonomic ${\mathcal{D}}_{{X\times S}/S}$-module and we prove that the functor ${\mathrm{RH}}^S$ introduced by T. Monteiro Fernandes and C. Sabbah in [14] takes image in ${\mathsf{D}}^{\mathrm{b}}_{\mathrm{srhol}}({\mathcal{D}}_{{X\times S}/S})$ (complexes of ${\mathcal{D}}_{{X\times S}/S}$-module whose cohomologies are strongly regular). We prove that for…
▽ More
We introduce the notion of strong regular holonomic ${\mathcal{D}}_{{X\times S}/S}$-module and we prove that the functor ${\mathrm{RH}}^S$ introduced by T. Monteiro Fernandes and C. Sabbah in [14] takes image in ${\mathsf{D}}^{\mathrm{b}}_{\mathrm{srhol}}({\mathcal{D}}_{{X\times S}/S})$ (complexes of ${\mathcal{D}}_{{X\times S}/S}$-module whose cohomologies are strongly regular). We prove that for $\dim X=\dim S=1$ the functor solution functor ${}^\mathrm{p}{\mathrm{Sol}}$ restricted to ${\mathsf{D}}^{\mathrm{b}}_{\mathrm{srhol}}({\mathcal{D}}_{{X\times S}/S})$ is an equivalence of categories with quasi-inverse ${\mathrm{RH}}^S$.
△ Less
Submitted 17 November, 2018;
originally announced November 2018.
-
Optical force laws for guided light in linear media
Authors:
Thales F. D. Fernandes,
Pierre-Louis de Assis
Abstract:
The mechanical response of transparent materials to optical forces is a topic that concerns a wide range of fields, from the manipulation of biological material by optical tweezers to the design of nano-optomechanical systems (NOMS). However, the fundamental aspects of such forces have always been surrounded by controversies, and several different formulations have been proposed. In this work, we…
▽ More
The mechanical response of transparent materials to optical forces is a topic that concerns a wide range of fields, from the manipulation of biological material by optical tweezers to the design of nano-optomechanical systems (NOMS). However, the fundamental aspects of such forces have always been surrounded by controversies, and several different formulations have been proposed. In this work, we focus on the specific case of light propagating as a superposition of guided modes in lossless dielectric waveguides as a physical example upon which to build a general stress tensor. We use this formalism to calculate optical forces for straight and curved waveguide sections and all possible excitation configurations for a given set of coupled eigenmodes, and then compare the results for each of the known proposed optical force laws as well as a novel one derived from this general stress tensor. We show that proper use of the divergence theorem is crucial to account for all force terms, many of which vanish if the procedure most commonly used is applied for situations other than eigenmodes in straight waveguides. A better understanding of how different stress tensors predict very different forces for certain waveguide geometries opens a pathway for new experimental tests of each formulation.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Physical Adversarial Examples for Object Detectors
Authors:
Kevin Eykholt,
Ivan Evtimov,
Earlence Fernandes,
Bo Li,
Amir Rahmati,
Florian Tramer,
Atul Prakash,
Tadayoshi Kohno,
Dawn Song
Abstract:
Deep neural networks (DNNs) are vulnerable to adversarial examples-maliciously crafted inputs that cause DNNs to make incorrect predictions. Recent work has shown that these attacks generalize to the physical domain, to create perturbations on physical objects that fool image classifiers under a variety of real-world conditions. Such attacks pose a risk to deep learning models used in safety-criti…
▽ More
Deep neural networks (DNNs) are vulnerable to adversarial examples-maliciously crafted inputs that cause DNNs to make incorrect predictions. Recent work has shown that these attacks generalize to the physical domain, to create perturbations on physical objects that fool image classifiers under a variety of real-world conditions. Such attacks pose a risk to deep learning models used in safety-critical cyber-physical systems. In this work, we extend physical attacks to more challenging object detection models, a broader class of deep learning algorithms widely used to detect and label multiple objects within a scene. Improving upon a previous physical attack on image classifiers, we create perturbed physical objects that are either ignored or mislabeled by object detection models. We implement a Disappearance Attack, in which we cause a Stop sign to "disappear" according to the detector-either by covering thesign with an adversarial Stop sign poster, or by adding adversarial stickers onto the sign. In a video recorded in a controlled lab environment, the state-of-the-art YOLOv2 detector failed to recognize these adversarial Stop signs in over 85% of the video frames. In an outdoor experiment, YOLO was fooled by the poster and sticker attacks in 72.5% and 63.5% of the video frames respectively. We also use Faster R-CNN, a different object detection model, to demonstrate the transferability of our adversarial perturbations. The created poster perturbation is able to fool Faster R-CNN in 85.9% of the video frames in a controlled lab environment, and 40.2% of the video frames in an outdoor environment. Finally, we present preliminary results with a new Creation Attack, where in innocuous physical stickers fool a model into detecting nonexistent objects.
△ Less
Submitted 5 October, 2018; v1 submitted 20 July, 2018;
originally announced July 2018.
-
Damped Newton's Method on Riemannian Manifolds
Authors:
M. A. A. Bortoloti,
T. A. Fernandes,
O. P. Ferreira,
**yun Yuan
Abstract:
A damped Newton's method to find a singularity of a vector field in Riemannian setting is presented with global convergence study. It is ensured that the sequence generated by the proposed method reduces to a sequence generated by the Riemannian version of the classical Newton's method after a finite number of iterations, consequently its convergence rate is superlinear/quadratic. Moreover, numeri…
▽ More
A damped Newton's method to find a singularity of a vector field in Riemannian setting is presented with global convergence study. It is ensured that the sequence generated by the proposed method reduces to a sequence generated by the Riemannian version of the classical Newton's method after a finite number of iterations, consequently its convergence rate is superlinear/quadratic. Moreover, numerical experiments illustrate that the damped Newton's method has better performance than Newton's method in number of iteration and computational time.
△ Less
Submitted 19 July, 2018; v1 submitted 13 March, 2018;
originally announced March 2018.
-
Note on Attacking Object Detectors with Adversarial Stickers
Authors:
Kevin Eykholt,
Ivan Evtimov,
Earlence Fernandes,
Bo Li,
Dawn Song,
Tadayoshi Kohno,
Amir Rahmati,
Atul Prakash,
Florian Tramer
Abstract:
Deep learning has proven to be a powerful tool for computer vision and has seen widespread adoption for numerous tasks. However, deep learning algorithms are known to be vulnerable to adversarial examples. These adversarial inputs are created such that, when provided to a deep learning algorithm, they are very likely to be mislabeled. This can be problematic when deep learning is used to assist in…
▽ More
Deep learning has proven to be a powerful tool for computer vision and has seen widespread adoption for numerous tasks. However, deep learning algorithms are known to be vulnerable to adversarial examples. These adversarial inputs are created such that, when provided to a deep learning algorithm, they are very likely to be mislabeled. This can be problematic when deep learning is used to assist in safety critical decisions. Recent research has shown that classifiers can be attacked by physical adversarial examples under various physical conditions. Given the fact that state-of-the-art objection detection algorithms are harder to be fooled by the same set of adversarial examples, here we show that these detectors can also be attacked by physical adversarial examples. In this note, we briefly show both static and dynamic test results. We design an algorithm that produces physical adversarial inputs, which can fool the YOLO object detector and can also attack Faster-RCNN with relatively high success rate based on transferability. Furthermore, our algorithm can compress the size of the adversarial inputs to stickers that, when attached to the targeted object, result in the detector either mislabeling or not detecting the object a high percentage of the time. This note provides a small set of results. Our upcoming paper will contain a thorough evaluation on other object detectors, and will present the algorithm.
△ Less
Submitted 23 July, 2018; v1 submitted 21 December, 2017;
originally announced December 2017.
-
The graph tessellation cover number: extremal bounds, efficient algorithms and hardness
Authors:
A. Abreu,
L. Cunha,
T. Fernandes,
C. de Figueiredo,
L. Kowada,
F. Marquezino,
D. Posner,
R. Portugal
Abstract:
A tessellation of a graph is a partition of its vertices into vertex disjoint cliques. A tessellation cover of a graph is a set of tessellations that covers all of its edges. The $t$-tessellability problem aims to decide whether there is a tessellation cover of the graph with $t$ tessellations. This problem is motivated by its applications to quantum walk models, in especial, the evolution operato…
▽ More
A tessellation of a graph is a partition of its vertices into vertex disjoint cliques. A tessellation cover of a graph is a set of tessellations that covers all of its edges. The $t$-tessellability problem aims to decide whether there is a tessellation cover of the graph with $t$ tessellations. This problem is motivated by its applications to quantum walk models, in especial, the evolution operator of the staggered model is obtained from a graph tessellation cover. We establish upper bounds on the tessellation cover number given by the minimum between the chromatic index of the graph and the chromatic number of its clique graph and we show graph classes for which these bounds are tight. We prove $\mathcal{NP}$-completeness for $t$-tessellability if the instance is restricted to planar graphs, chordal (2,1)-graphs, (1,2)-graphs, diamond-free graphs with diameter five, or for any fixed $t$ at least 3. On the other hand, we improve the complexity for 2-tessellability to a linear-time algorithm.
△ Less
Submitted 20 December, 2017;
originally announced December 2017.
-
Some Physics Notions on Monetary Standard
Authors:
Tiago Fernandes
Abstract:
Regardless of the gold-standard being considered as outdated, it provides valuable signs concerning the development of novel monetary standards, better adjusted to the current macroeconomic environment. By using a point of view of classical physics, the intent of this work is doing a review of the concept of monetary standard and show that the energy matrix of an economy together with a new moneta…
▽ More
Regardless of the gold-standard being considered as outdated, it provides valuable signs concerning the development of novel monetary standards, better adjusted to the current macroeconomic environment. By using a point of view of classical physics, the intent of this work is doing a review of the concept of monetary standard and show that the energy matrix of an economy together with a new monetary standard, based on the energy supply capacity, can play an essential role in the sustainable growth.
△ Less
Submitted 17 January, 2018; v1 submitted 30 November, 2017;
originally announced December 2017.
-
IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks
Authors:
Amir Rahmati,
Earlence Fernandes,
Jaeyeon Jung,
Atul Prakash
Abstract:
The growing popularity of online services and IoT platforms along with increased developer's access to devices and services through RESTful APIs is giving rise to a new class of frameworks that support trigger-action programming. These frameworks provide an interface for end-users to bridge different RESTful APIs in a trigger-action model and easily create automated tasks across diverse platforms.…
▽ More
The growing popularity of online services and IoT platforms along with increased developer's access to devices and services through RESTful APIs is giving rise to a new class of frameworks that support trigger-action programming. These frameworks provide an interface for end-users to bridge different RESTful APIs in a trigger-action model and easily create automated tasks across diverse platforms. Past work has characterized the space of user-created trigger-action combinations in the context of IFTTT, a popular trigger-action framework. In this work, we characterize the space of possible functionality that such frameworks open up to end-users in the context of two major frameworks -IFTTT and Zapier- and discuss results from our comparative analysis of these frameworks. We create a snapshot of 6406 triggers and actions from 1051 channels/apps across these two frameworks and compare the available functions, distribution of channels, and functions shared between them. We examine user's ability to define their own channels, triggers, and actions; analyze the growth of these frameworks; and discuss future research opportunities in this domain.
△ Less
Submitted 8 September, 2017;
originally announced September 2017.
-
Complexity Bounds on Quantum Search Algorithms in finite-dimensional Networks
Authors:
Stefan Boettcher,
Shanshan Li,
Tharso D. Fernandes,
Renato Portugal
Abstract:
We establish a lower bound concerning the computational complexity of Grover's algorithms on fractal networks. This bound provides general predictions for the quantum advantage gained for searching unstructured lists. It yields a fundamental criterion, derived from quantum transport properties, for the improvement a quantum search algorithm achieves over the corresponding classical search in a net…
▽ More
We establish a lower bound concerning the computational complexity of Grover's algorithms on fractal networks. This bound provides general predictions for the quantum advantage gained for searching unstructured lists. It yields a fundamental criterion, derived from quantum transport properties, for the improvement a quantum search algorithm achieves over the corresponding classical search in a network based solely on its spectral dimension, $d_{s}$. Our analysis employs recent advances in the interpretation of the venerable real-space renormalization group (RG) as applied to quantum walks. It clarifies the competition between Grover's abstract algorithm, i.e., a rotation in Hilbert space, and quantum transport in an actual geometry. The latter is characterized in terms of the quantum walk dimension $d_{w}^{Q}$ and the spatial (fractal) dimension $d_{f}$ that is summarized simply by the spectral dimension of the network. The analysis simultaneously determines the optimal time for a quantum measurement and the probability for successfully pin-pointing a marked element in the network. The RG further encompasses an optimization scheme devised by Tulsi that allows to tune this probability to certainty, leaving quantum transport as the only limiting process. It considers entire families of problems to be studied, thereby establishing large universality classes for quantum search, which we verify with extensive simulations. The methods we develop could point the way towards systematic studies of universality classes in computational complexity to enable modification and control of search behavior.
△ Less
Submitted 18 July, 2018; v1 submitted 17 August, 2017;
originally announced August 2017.
-
Gaia Data Release 1: The archive visualisation service
Authors:
A. Moitinho,
A. Krone-Martins,
H. Savietto,
M. Barros,
C. Barata,
A. J. Falcão,
T. Fernandes,
J. Alves,
A. F. Silva,
M. Gomes,
J. Bakker,
A. G. A. Brown,
J. González-Núñez,
G. Gracia-Abril,
R. Gutiérrez-Sánchez,
J. Hernández,
S. Jordan,
X. Luri,
B. Merin,
F. Mignard,
A. Mora,
V. Navarro,
W. O'Mullane,
T. Sagristà Sellés,
J. Salgado
, et al. (9 additional authors not shown)
Abstract:
Context: The first Gaia data release (DR1) delivered a catalogue of astrometry and photometry for over a billion astronomical sources. Within the panoply of methods used for data exploration, visualisation is often the starting point and even the guiding reference for scientific thought. However, this is a volume of data that cannot be efficiently explored using traditional tools, techniques, and…
▽ More
Context: The first Gaia data release (DR1) delivered a catalogue of astrometry and photometry for over a billion astronomical sources. Within the panoply of methods used for data exploration, visualisation is often the starting point and even the guiding reference for scientific thought. However, this is a volume of data that cannot be efficiently explored using traditional tools, techniques, and habits.
Aims: We aim to provide a global visual exploration service for the Gaia archive, something that is not possible out of the box for most people. The service has two main goals. The first is to provide a software platform for interactive visual exploration of the archive contents, using common personal computers and mobile devices available to most users. The second aim is to produce intelligible and appealing visual representations of the enormous information content of the archive.
Methods: The interactive exploration service follows a client-server design. The server runs close to the data, at the archive, and is responsible for hiding as far as possible the complexity and volume of the Gaia data from the client. This is achieved by serving visual detail on demand. Levels of detail are pre-computed using data aggregation and subsampling techniques. For DR1, the client is a web application that provides an interactive multi-panel visualisation workspace as well as a graphical user interface.
Results: The Gaia archive Visualisation Service offers a web-based multi-panel interactive visualisation desktop in a browser tab. It currently provides highly configurable 1D histograms and 2D scatter plots of Gaia DR1 and the Tycho-Gaia Astrometric Solution (TGAS) with linked views. An innovative feature is the creation of ADQL queries from visually defined regions in plots. [abridged]
△ Less
Submitted 1 August, 2017;
originally announced August 2017.
-
Robust Physical-World Attacks on Deep Learning Models
Authors:
Kevin Eykholt,
Ivan Evtimov,
Earlence Fernandes,
Bo Li,
Amir Rahmati,
Chaowei Xiao,
Atul Prakash,
Tadayoshi Kohno,
Dawn Song
Abstract:
Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added to the input. Given that that emerging physical systems are using DNNs in safety-critical situations, adversarial examples could mislead these systems and cause dangerous situations.Therefore, understanding adversarial examples in the…
▽ More
Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added to the input. Given that that emerging physical systems are using DNNs in safety-critical situations, adversarial examples could mislead these systems and cause dangerous situations.Therefore, understanding adversarial examples in the physical world is an important step towards develo** resilient learning algorithms. We propose a general attack algorithm,Robust Physical Perturbations (RP2), to generate robust visual adversarial perturbations under different physical conditions. Using the real-world case of road sign classification, we show that adversarial examples generated using RP2 achieve high targeted misclassification rates against standard-architecture road sign classifiers in the physical world under various environmental conditions, including viewpoints. Due to the current lack of a standardized testing method, we propose a two-stage evaluation methodology for robust physical adversarial examples consisting of lab and field tests. Using this methodology, we evaluate the efficacy of physical adversarial manipulations on real objects. Witha perturbation in the form of only black and white stickers,we attack a real stop sign, causing targeted misclassification in 100% of the images obtained in lab settings, and in 84.8%of the captured video frames obtained on a moving vehicle(field test) for the target classifier.
△ Less
Submitted 10 April, 2018; v1 submitted 27 July, 2017;
originally announced July 2017.
-
Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things
Authors:
Earlence Fernandes,
Amir Rahmati,
Jaeyeon Jung,
Atul Prakash
Abstract:
Trigger-Action platforms are an emerging class of web-based systems that enable users to create automation rules (or recipes) of the form, "If there is a smoke alarm, then turn off my oven." These platforms stitch together various online services including Internet of Things devices, social networks, and productivity tools by obtaining OAuth tokens on behalf of users. Unfortunately, these platform…
▽ More
Trigger-Action platforms are an emerging class of web-based systems that enable users to create automation rules (or recipes) of the form, "If there is a smoke alarm, then turn off my oven." These platforms stitch together various online services including Internet of Things devices, social networks, and productivity tools by obtaining OAuth tokens on behalf of users. Unfortunately, these platforms also introduce a long-term security risk: If they are compromised, the attacker can misuse the OAuth tokens belonging to millions of users to arbitrarily manipulate their devices and data. In this work, we first quantify the risk users face in the context of If-This-Then-That (IFTTT). We perform the first empirical analysis of the OAuth-based authorization model of IFTTT using semi-automated tools that we built to overcome the challenges of IFTTT's closed source nature and of online service API inconsistencies. We find that 75% of IFTTT's channels, an abstraction of online services, use overprivileged OAuth tokens, increasing risks in the event of a compromise. Even if the OAuth tokens were to be privileged correctly, IFTTT's compromise will not prevent their misuse. Motivated by this empirical analysis, we design and evaluate Decoupled-IFTTT (dIFTTT), the first trigger-action platform where users do not have to give it highly-privileged access to their online services. Our design pushes the notion of fine-grained OAuth tokens to its extreme and ensures that even if the cloud service is controlled by the attacker, it cannot misuse the OAuth tokens to invoke unauthorized actions. Our evaluation establishes that dIFTTT poses modest overhead: it adds less than 15ms of latency to recipe execution time, and reduces throughput by 2.5%.
△ Less
Submitted 3 July, 2017;
originally announced July 2017.
-
Center of mass acceleration in coupled nanowaveguides due to transverse optical beating force
Authors:
Thales F. D. Fernandes,
Cauê K. M. C. Carvalho,
Paulo Sérgio S. Guimarães,
Bernardo R. A. Neves,
Pierre-Louis de Assis
Abstract:
Eigenmode optical forces arising in symmetrically coupled waveguides have opposite sign on opposite waveguides and thus can deform the waveguides by changing their relative separation, but cannot change any other degree of freedom on their own. It would be extremely desirable to have a way to act on the center of mass of such a system. In this work we show that it is possible to do so by injecting…
▽ More
Eigenmode optical forces arising in symmetrically coupled waveguides have opposite sign on opposite waveguides and thus can deform the waveguides by changing their relative separation, but cannot change any other degree of freedom on their own. It would be extremely desirable to have a way to act on the center of mass of such a system. In this work we show that it is possible to do so by injecting a superposition of eigenmodes that are degenerate in frequency and have opposite parity along the desired direction, resulting in beating forces that have the same sign on opposite waveguides and therefore act on the center of mass. We have used both the Maxwell Stress Tensor formalism and the induced dipole force equation to numerically calculate this transverse beating force and have found its magnitude to be comparable to the eigenmode forces. We also show that the longitudinal variation caused by the spatial beating pattern on the time-averaged quantities used in the calculations must be taken into account in order to properly employ the divergence theorem and obtain the correct magnitudes. We then propose a heuristic model that shows good quantitative agreement with the numerical results and may be used as a prototy** tool for accurate and fast computation without relying on expensive numerical computation.
△ Less
Submitted 18 October, 2017; v1 submitted 13 June, 2017;
originally announced June 2017.
-
The tessellation problem of quantum walks
Authors:
A. Abreu,
L. Cunha,
T. Fernandes,
C. de Figueiredo,
L. Kowada,
F. Marquezino,
D. Posner,
R. Portugal
Abstract:
Quantum walks have received a great deal of attention recently because they can be used to develop new quantum algorithms and to simulate interesting quantum systems. In this work, we focus on a model called staggered quantum walk, which employs advanced ideas of graph theory and has the advantage of including the most important instances of other discrete-time models. The evolution operator of th…
▽ More
Quantum walks have received a great deal of attention recently because they can be used to develop new quantum algorithms and to simulate interesting quantum systems. In this work, we focus on a model called staggered quantum walk, which employs advanced ideas of graph theory and has the advantage of including the most important instances of other discrete-time models. The evolution operator of the staggered model is obtained from a tessellation cover, which is defined in terms of a set of partitions of the graph into cliques. It is important to establish the minimum number of tessellations required in a tessellation cover, and what classes of graphs admit a small number of tessellations. We describe two main results: (1) infinite classes of graphs where we relate the chromatic number of the clique graph to the minimum number of tessellations required in a tessellation cover, and (2) the problem of deciding whether a graph is $k$-tessellable for $k\ge 3$ is NP-complete.
△ Less
Submitted 24 May, 2017;
originally announced May 2017.
-
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
Authors:
Earlence Fernandes,
Amir Rahmati,
Kevin Eykholt,
Atul Prakash
Abstract:
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles? And, what are the new problems and challenges in this…
▽ More
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles? And, what are the new problems and challenges in this space that require new security mechanisms? This article summarizes the intellectual similarities and differences between classic information technology security research and IoT security research.
△ Less
Submitted 18 July, 2017; v1 submitted 23 May, 2017;
originally announced May 2017.
-
Gaia Data Release 1. Testing the parallaxes with local Cepheids and RR Lyrae stars
Authors:
Gaia Collaboration,
G. Clementini,
L. Eyer,
V. Ripepi,
M. Marconi,
T. Muraveva,
A. Garofalo,
L. M. Sarro,
M. Palmer,
X. Luri,
R. Molinaro,
L. Rimoldini,
L. Szabados,
I. Musella,
R. I. Anderson,
T. Prusti,
J. H. J. de Bruijne,
A. G. A. Brown,
A. Vallenari,
C. Babusiaux,
C. A. L. Bailer-Jones,
U. Bastian,
M. Biermann,
D. W. Evans,
F. Jansen
, et al. (566 additional authors not shown)
Abstract:
Parallaxes for 331 classical Cepheids, 31 Type II Cepheids and 364 RR Lyrae stars in common between Gaia and the Hipparcos and Tycho-2 catalogues are published in Gaia Data Release 1 (DR1) as part of the Tycho-Gaia Astrometric Solution (TGAS). In order to test these first parallax measurements of the primary standard candles of the cosmological distance ladder, that involve astrometry collected by…
▽ More
Parallaxes for 331 classical Cepheids, 31 Type II Cepheids and 364 RR Lyrae stars in common between Gaia and the Hipparcos and Tycho-2 catalogues are published in Gaia Data Release 1 (DR1) as part of the Tycho-Gaia Astrometric Solution (TGAS). In order to test these first parallax measurements of the primary standard candles of the cosmological distance ladder, that involve astrometry collected by Gaia during the initial 14 months of science operation, we compared them with literature estimates and derived new period-luminosity ($PL$), period-Wesenheit ($PW$) relations for classical and Type II Cepheids and infrared $PL$, $PL$-metallicity ($PLZ$) and optical luminosity-metallicity ($M_V$-[Fe/H]) relations for the RR Lyrae stars, with zero points based on TGAS. The new relations were computed using multi-band ($V,I,J,K_{\mathrm{s}},W_{1}$) photometry and spectroscopic metal abundances available in the literature, and applying three alternative approaches: (i) by linear least squares fitting the absolute magnitudes inferred from direct transformation of the TGAS parallaxes, (ii) by adopting astrometric-based luminosities, and (iii) using a Bayesian fitting approach. TGAS parallaxes bring a significant added value to the previous Hipparcos estimates. The relations presented in this paper represent first Gaia-calibrated relations and form a "work-in-progress" milestone report in the wait for Gaia-only parallaxes of which a first solution will become available with Gaia's Data Release 2 (DR2) in 2018.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Relative Riemann-Hilbert correspondence in dimension one
Authors:
Teresa Monteiro Fernandes,
Claude Sabbah
Abstract:
We prove that, on a Riemann surface, the functor $\mathrm{RH}^S$ constructed in a previous work as a right quasi-inverse of the solution functor from the bounded derived category of regular relative holonomic modules to that of relative constructible complexes satisfies the left quasi-inverse property in a generic sense.
We prove that, on a Riemann surface, the functor $\mathrm{RH}^S$ constructed in a previous work as a right quasi-inverse of the solution functor from the bounded derived category of regular relative holonomic modules to that of relative constructible complexes satisfies the left quasi-inverse property in a generic sense.
△ Less
Submitted 13 September, 2017; v1 submitted 17 April, 2017;
originally announced April 2017.
-
$t$-Structures for Relative $\mathcal{D}$-Modules and $t$-Exactness of the de Rham Functor
Authors:
Luisa Fiorot,
Teresa Monteiro Fernandes
Abstract:
This paper is a contribution to the study of relative holonomic $\mathcal{D}$-modules. Contrary to the absolute case, the standard $t$-structure on holonomic $\mathcal{D}$-modules is not preserved by duality and hence the solution functor is no longer $t$-exact with respect to the canonical, resp. middle-perverse, $t$-structures. We provide an explicit description of these dual $t$-structures. Whe…
▽ More
This paper is a contribution to the study of relative holonomic $\mathcal{D}$-modules. Contrary to the absolute case, the standard $t$-structure on holonomic $\mathcal{D}$-modules is not preserved by duality and hence the solution functor is no longer $t$-exact with respect to the canonical, resp. middle-perverse, $t$-structures. We provide an explicit description of these dual $t$-structures. When the parameter space is 1-dimensional, we use this description to prove that the solution functor as well as the relative Riemann-Hilbert functor are $t$-exact with respect to the dual $t$-structure and to the middle-perverse one while the de Rham functor is $t$-exact for the canonical, resp. middle-perverse, $t$-structures and their duals.
△ Less
Submitted 8 June, 2018; v1 submitted 27 March, 2017;
originally announced March 2017.
-
Gaia Data Release 1. Open cluster astrometry: performance, limitations, and future prospects
Authors:
Gaia Collaboration,
F. van Leeuwen,
A. Vallenari,
C. Jordi,
L. Lindegren,
U. Bastian,
T. Prusti,
J. H. J. de Bruijne,
A. G. A. Brown,
C. Babusiaux,
C. A. L. Bailer-Jones,
M. Biermann,
D. W. Evans,
L. Eyer,
F. Jansen,
S. A. Klioner,
U. Lammers,
X. Luri,
F. Mignard,
C. Panem,
D. Pourbaix,
S. Randich,
P. Sartoretti,
H. I. Siddiqui,
C. Soubiran
, et al. (567 additional authors not shown)
Abstract:
Context. The first Gaia Data Release contains the Tycho-Gaia Astrometric Solution (TGAS). This is a subset of about 2 million stars for which, besides the position and photometry, the proper motion and parallax are calculated using Hipparcos and Tycho-2 positions in 1991.25 as prior information. Aims. We investigate the scientific potential and limitations of the TGAS component by means of the ast…
▽ More
Context. The first Gaia Data Release contains the Tycho-Gaia Astrometric Solution (TGAS). This is a subset of about 2 million stars for which, besides the position and photometry, the proper motion and parallax are calculated using Hipparcos and Tycho-2 positions in 1991.25 as prior information. Aims. We investigate the scientific potential and limitations of the TGAS component by means of the astrometric data for open clusters. Methods. Mean cluster parallax and proper motion values are derived taking into account the error correlations within the astrometric solutions for individual stars, an estimate of the internal velocity dispersion in the cluster, and, where relevant, the effects of the depth of the cluster along the line of sight. Internal consistency of the TGAS data is assessed. Results. Values given for standard uncertainties are still inaccurate and may lead to unrealistic unit-weight standard deviations of least squares solutions for cluster parameters. Reconstructed mean cluster parallax and proper motion values are generally in very good agreement with earlier Hipparcos-based determination, although the Gaia mean parallax for the Pleiades is a significant exception. We have no current explanation for that discrepancy. Most clusters are observed to extend to nearly 15 pc from the cluster centre, and it will be up to future Gaia releases to establish whether those potential cluster-member stars are still dynamically bound to the clusters. Conclusions. The Gaia DR1 provides the means to examine open clusters far beyond their more easily visible cores, and can provide membership assessments based on proper motions and parallaxes. A combined HR diagram shows the same features as observed before using the Hipparcos data, with clearly increased luminosities for older A and F dwarfs.
△ Less
Submitted 3 March, 2017;
originally announced March 2017.
-
Quantum search on the two-dimensional lattice using the staggered model with Hamiltonians
Authors:
Renato Portugal,
Tharso D. Fernandes
Abstract:
Quantum search on the two-dimensional lattice with one marked vertex and cyclic boundary conditions is an important problem in the context of quantum algorithms with an interesting unfolding. It avails to test the ability of quantum walk models to provide efficient algorithms from the theoretical side and means to implement quantum walks in laboratories from the practical side. In this paper, we r…
▽ More
Quantum search on the two-dimensional lattice with one marked vertex and cyclic boundary conditions is an important problem in the context of quantum algorithms with an interesting unfolding. It avails to test the ability of quantum walk models to provide efficient algorithms from the theoretical side and means to implement quantum walks in laboratories from the practical side. In this paper, we rigorously prove that the recent-proposed staggered quantum walk model provides an efficient quantum search on the two-dimensional lattice, if the reflection operators associated with the graph tessellations are used as Hamiltonians, which is an important theoretical result for validating the staggered model with Hamiltonians. Numerical results show that on the two-dimensional lattice staggered models without Hamiltonians are not as efficient as the one described in this paper and are, in fact, as slow as classical random-walk-based algorithms.
△ Less
Submitted 30 March, 2017; v1 submitted 5 January, 2017;
originally announced January 2017.
-
On the superlinear convergence of Newton's method on Riemannian manifolds
Authors:
Teles A. Fernandes,
Orizon P. Ferreira,
Yuan J. Yun
Abstract:
In this paper we study the Newton's method for finding a singularity of a differentiable vector field defined on a Riemannian manifold. Under the assumption of invertibility of covariant derivative of the vector field at its singularity, we establish the well definition of the method in a suitable neighborhood of this singularity. Moreover, we also show that the generated sequence by Newton method…
▽ More
In this paper we study the Newton's method for finding a singularity of a differentiable vector field defined on a Riemannian manifold. Under the assumption of invertibility of covariant derivative of the vector field at its singularity, we establish the well definition of the method in a suitable neighborhood of this singularity. Moreover, we also show that the generated sequence by Newton method converges for the solution with superlinear rate.
△ Less
Submitted 13 November, 2016;
originally announced November 2016.
-
Riemann-Hilbert correspondence for mixed twistor D-Modules
Authors:
Teresa Monteiro Fernandes,
Claude Sabbah
Abstract:
We introduce the notion of regularity for a relative holonomic $\mathcal D$-module in the sense of arXiv:1204.1331. We prove that the solution functor from the bounded derived category of regular relative holonomic modules to that of relative constructible complexes is essentially surjective by constructing a right quasi-inverse functor. When restricted to relative $\mathcal D$-modules underlying…
▽ More
We introduce the notion of regularity for a relative holonomic $\mathcal D$-module in the sense of arXiv:1204.1331. We prove that the solution functor from the bounded derived category of regular relative holonomic modules to that of relative constructible complexes is essentially surjective by constructing a right quasi-inverse functor. When restricted to relative $\mathcal D$-modules underlying a regular mixed twistor $\mathcal D$-module, this functor satisfies the left quasi-inverse property.
△ Less
Submitted 4 March, 2017; v1 submitted 14 September, 2016;
originally announced September 2016.
-
Comparison of 30 THz impulsive burst time development to microwaves, H-alpha, EUV, and GOES soft X-rays
Authors:
R. Miteva,
P. Kaufmann,
D. P. Cabezas,
M. M. Cassiano,
L. O. T. Fernandes,
S. L. Freeland,
M. Karlicky,
A. Kerdraon,
A. S. Kudaka,
M. L. Luoni,
R. Marcon,
J. -P. Raulin,
G. Trottet,
S. M. White
Abstract:
The recent discovery of impulsive solar burst emission in the 30 THz band is raising new interpretation challenges. One event associated with a GOES M2 class flare has been observed simultaneously in microwaves, H-alpha, EUV, and soft X-ray bands. Although these new observations confirm some features found in the two prior known events, they exhibit time profile structure discrepancies between 30…
▽ More
The recent discovery of impulsive solar burst emission in the 30 THz band is raising new interpretation challenges. One event associated with a GOES M2 class flare has been observed simultaneously in microwaves, H-alpha, EUV, and soft X-ray bands. Although these new observations confirm some features found in the two prior known events, they exhibit time profile structure discrepancies between 30 THz, microwaves, and hard X-rays (as inferred from the Neupert effect). These results suggest a more complex relationship between 30 THz emission and radiation produced at other wavelength ranges. The multiple frequency emissions in the impulsive phase are likely to be produced at a common flaring site lower in the chromosphere. The 30 THz burst emission may be either part of a nonthermal radiation mechanism or due to the rapid thermal response to a beam of high-energy particles bombarding the dense solar atmosphere.
△ Less
Submitted 6 December, 2015;
originally announced December 2015.
-
Bright 30 THz Impulsive Solar Bursts
Authors:
P. Kaufmann,
S. M. White,
R. Marcon,
A. S. Kudaka,
D. P. Cabezas,
M. M. Cassiano,
C. Francile,
L. O. T. Fernandes,
R. F. Hidalgo Ramirez,
M. Luoni,
A. Marun,
P. Pereyra,
R. V. de Souza
Abstract:
Impulsive 30 THz continuum bursts have been recently observed in solar flares, utilizing small telescopes with a unique and relatively simple optical setup concept. The most intense burst was observed together with a GOES X2 class event on October 27, 2014, also detected at two sub-THz frequencies, RHESSI X-rays and SDO/HMI and EUV. It exhibits strikingly good correlation in time and in space with…
▽ More
Impulsive 30 THz continuum bursts have been recently observed in solar flares, utilizing small telescopes with a unique and relatively simple optical setup concept. The most intense burst was observed together with a GOES X2 class event on October 27, 2014, also detected at two sub-THz frequencies, RHESSI X-rays and SDO/HMI and EUV. It exhibits strikingly good correlation in time and in space with white light flare emission. It is likely that this association may prove to be very common. All three 30 THz events recently observed exhibited intense fluxes in the range of 104 solar flux units, considerably larger than those measured for the same events at microwave and sub-mm wavelengths. The 30 THz burst emission might be part of the same spectral burst component found at sub-THz frequencies. The 30 THz solar bursts open a promising new window for the study of flares at their origin
△ Less
Submitted 22 May, 2015;
originally announced May 2015.
-
The Staggered Quantum Walk Model
Authors:
R. Portugal,
R. A. M. Santos,
T. D. Fernandes,
D. N. Gonçalves
Abstract:
There are at least three models of discrete-time quantum walks (QWs) on graphs currently under active development. In this work we focus on the equivalence of two of them, known as Szegedy's and staggered QWs. We give a formal definition of the staggered model and discuss generalized versions for searching marked vertices. Using this formal definition, we prove that any instance of Szegedy's model…
▽ More
There are at least three models of discrete-time quantum walks (QWs) on graphs currently under active development. In this work we focus on the equivalence of two of them, known as Szegedy's and staggered QWs. We give a formal definition of the staggered model and discuss generalized versions for searching marked vertices. Using this formal definition, we prove that any instance of Szegedy's model is equivalent to an instance of the staggered model. On the other hand, we show that there are instances of the staggered model that cannot be cast into Szegedy's framework. Our analysis also works when there are marked vertices. We show that Szegedy's spatial search algorithms can be converted into search algorithms in staggered QWs. We take advantage of the similarity of those models to define the quantum hitting time in the staggered model and to describe a method to calculate the eigenvalues and eigenvectors of the evolution operator of staggered QWs.
△ Less
Submitted 27 July, 2015; v1 submitted 18 May, 2015;
originally announced May 2015.
-
Anception: Application Virtualization For Android
Authors:
Earlence Fernandes,
Alexander Crowell,
Ajit Aluri,
Atul Prakash
Abstract:
The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant chal- lenge for several reasons: (1) graphics performance is important due to popularity of games and…
▽ More
The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant chal- lenge for several reasons: (1) graphics performance is important due to popularity of games and (2) applications with the same UID can share state. This paper presents Anception, the first flexible application virtualization framework for Android. It is imple- mented as a modification to the Android kernel and supports application virtualization that addresses the above requirements. Anception is able to confine many types of malware while supporting unmodified Android applications. Our Anception- based system exhibits up to 3.9% overhead on various 2D/3D benchmarks, and 1.8% overhead on the SunSpider benchmark.
△ Less
Submitted 26 January, 2014;
originally announced January 2014.
-
Relative subanalytic sheaves
Authors:
Teresa Monteiro Fernandes,
Luca Prelli
Abstract:
Given a projection $f$ of a product of real analytic manifolds onto one factor, let us say, $S$, and a subanalytic sheaf $\mathcal{F}$ on the associated subanalytic site, we give a natural construction of the (subanalytic) relative sheaf $\mathcal{F}^S$. Applying our construction to the subanalytic sheaves of tempered distributions, holomorphic functions and Whitney $\mathcal{C}^{\infty}$-function…
▽ More
Given a projection $f$ of a product of real analytic manifolds onto one factor, let us say, $S$, and a subanalytic sheaf $\mathcal{F}$ on the associated subanalytic site, we give a natural construction of the (subanalytic) relative sheaf $\mathcal{F}^S$. Applying our construction to the subanalytic sheaves of tempered distributions, holomorphic functions and Whitney $\mathcal{C}^{\infty}$-functions we obtain their relative versions and study their properties.
△ Less
Submitted 3 January, 2014; v1 submitted 3 October, 2013;
originally announced October 2013.