-
Extremal Fitting CQs do not Generalize
Authors:
Balder ten Cate,
Maurice Funk,
Jean Christoph Jung,
Carsten Lutz
Abstract:
A fitting algorithm for conjunctive queries (CQs) produces, given a set of positively and negatively labeled data examples, a CQ that fits these examples. In general, there may be many non-equivalent fitting CQs and thus the algorithm has some freedom in producing its output. Additional desirable properties of the produced CQ are that it generalizes well to unseen examples in the sense of PAC lear…
▽ More
A fitting algorithm for conjunctive queries (CQs) produces, given a set of positively and negatively labeled data examples, a CQ that fits these examples. In general, there may be many non-equivalent fitting CQs and thus the algorithm has some freedom in producing its output. Additional desirable properties of the produced CQ are that it generalizes well to unseen examples in the sense of PAC learning and that it is most general or most specific in the set of all fitting CQs. In this research note, we show that these desiderata are incompatible when we require PAC-style generalization from a polynomial sample: we prove that any fitting algorithm that produces a most-specific fitting CQ cannot be a sample-efficient PAC learning algorithm, and the same is true for fitting algorithms that produce a most-general fitting CQ (when it exists). Our proofs rely on a polynomial construction of relativized homomorphism dualities for path-shaped structures.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
Towards Ontology Construction with Language Models
Authors:
Maurice Funk,
Simon Hosemann,
Jean Christoph Jung,
Carsten Lutz
Abstract:
We present a method for automatically constructing a concept hierarchy for a given domain by querying a large language model. We apply this method to various domains using OpenAI's GPT 3.5. Our experiments indicate that LLMs can be of considerable help for constructing concept hierarchies.
We present a method for automatically constructing a concept hierarchy for a given domain by querying a large language model. We apply this method to various domains using OpenAI's GPT 3.5. Our experiments indicate that LLMs can be of considerable help for constructing concept hierarchies.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
A Causal Inference Framework for Leveraging External Controls in Hybrid Trials
Authors:
Michael Valancius,
Herb Pang,
Jiawen Zhu,
Stephen R Cole,
Michele Jonsson Funk,
Michael R Kosorok
Abstract:
We consider the challenges associated with causal inference in settings where data from a randomized trial is augmented with control data from an external source to improve efficiency in estimating the average treatment effect (ATE). Through the development of a formal causal inference framework, we outline sufficient causal assumptions about the exchangeability between the internal and external c…
▽ More
We consider the challenges associated with causal inference in settings where data from a randomized trial is augmented with control data from an external source to improve efficiency in estimating the average treatment effect (ATE). Through the development of a formal causal inference framework, we outline sufficient causal assumptions about the exchangeability between the internal and external controls to identify the ATE and establish the connection to a novel graphical criteria. We propose estimators, review efficiency bounds, develop an approach for efficient doubly-robust estimation even when unknown nuisance models are estimated with flexible machine learning methods, and demonstrate finite-sample performance through a simulation study. To illustrate the ideas and methods, we apply the framework to a trial investigating the effect of risdisplam on motor function in patients with spinal muscular atrophy for which there exists an external set of control patients from a previous trial.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
SAT-Based PAC Learning of Description Logic Concepts
Authors:
Balder ten Cate,
Maurice Funk,
Jean Christoph Jung,
Carsten Lutz
Abstract:
We propose bounded fitting as a scheme for learning description logic concepts in the presence of ontologies. A main advantage is that the resulting learning algorithms come with theoretical guarantees regarding their generalization to unseen examples in the sense of PAC learning. We prove that, in contrast, several other natural learning algorithms fail to provide such guarantees. As a further co…
▽ More
We propose bounded fitting as a scheme for learning description logic concepts in the presence of ontologies. A main advantage is that the resulting learning algorithms come with theoretical guarantees regarding their generalization to unseen examples in the sense of PAC learning. We prove that, in contrast, several other natural learning algorithms fail to provide such guarantees. As a further contribution, we present the system SPELL which efficiently implements bounded fitting for the description logic $\mathcal{ELH}^r$ based on a SAT solver, and compare its performance to a state-of-the-art learner.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Can a virtual conductor create its own interpretation of a music orchestra?
Authors:
Marc-Philipp Funk,
Nassim Chloe Eghtebas
Abstract:
Having a computer do the work for you has become more and more common over time. But in the entertainment area, where a human is a creator, we want to avoid having too much influence on technology. On the other hand, inspiration is still important; we developed a virtual conductor that can generate an emotionally associated interpretation of known music work. This was done by surveying a set numbe…
▽ More
Having a computer do the work for you has become more and more common over time. But in the entertainment area, where a human is a creator, we want to avoid having too much influence on technology. On the other hand, inspiration is still important; we developed a virtual conductor that can generate an emotionally associated interpretation of known music work. This was done by surveying a set number of people to determine, which emotions were associated with a specific interpretation and instruments. As a result of machine learning this conductor was then able to achieve his goal. Unlike earlier studies of virtual conductors, which would replace the role of a human conductor, this new one is supposed to be an assisting tool for conductors. As a result, starting on a new interpretation will be easier because it streamlines research time and provides a technical perspective that can inspire new ideas. By using this technology as a supplement to human creativity, we can create richer, more nuanced interpretations of musical works.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Seeing through Things: Exploring the Design Space of Privacy-Aware Data-Enabled Objects
Authors:
Yu-Ting Cheng,
Mathias Funk,
Rung-Huei Liang,
Lin-Lin Chen
Abstract:
Increasing amounts of sensor-augmented research objects have been used in design research. We call these objects Data-Enabled Objects, which can be integrated into daily activities capturing data about people's detailed whereabouts, behaviours and routines. These objects provide data perspectives on everyday life for contextual design research. However, data-enabled objects are still computational…
▽ More
Increasing amounts of sensor-augmented research objects have been used in design research. We call these objects Data-Enabled Objects, which can be integrated into daily activities capturing data about people's detailed whereabouts, behaviours and routines. These objects provide data perspectives on everyday life for contextual design research. However, data-enabled objects are still computational devices with limited privacy awareness and nuanced data sharing. To better design data-enabled objects, we explore privacy design spaces by inviting 18 teams of undergraduate design students to re-design the same type of sensor-enabled home research camera. We developed the Connected Peekaboo Toolkit (CPT) to support the design teams in designing, building, and directly deploying their prototypes in real home studies. We conducted Thematic Analysis to analyse their outcomes which led us to interpret that privacy is not just an obstacle but can be a driver by unfolding an exploration of possible design spaces for data-enabled objects.
△ Less
Submitted 15 December, 2022;
originally announced December 2022.
-
On the non-efficient PAC learnability of conjunctive queries
Authors:
Balder ten Cate,
Maurice Funk,
Jean Christoph Jung,
Carsten Lutz
Abstract:
This note serves three purposes: (i) we provide a self-contained exposition of the fact that conjunctive queries are not efficiently learnable in the Probably-Approximately-Correct (PAC) model, paying clear attention to the complicating fact that this concept class lacks the polynomial-size fitting property, a property that is tacitly assumed in much of the computational learning theory literature…
▽ More
This note serves three purposes: (i) we provide a self-contained exposition of the fact that conjunctive queries are not efficiently learnable in the Probably-Approximately-Correct (PAC) model, paying clear attention to the complicating fact that this concept class lacks the polynomial-size fitting property, a property that is tacitly assumed in much of the computational learning theory literature; (ii) we establish a strong negative PAC learnability result that applies to many restricted classes of conjunctive queries (CQs), including acyclic CQs for a wide range of notions of "acyclicity"; (iii) we show that CQs (and UCQs) are efficiently PAC learnable with membership queries.
△ Less
Submitted 26 July, 2023; v1 submitted 22 August, 2022;
originally announced August 2022.
-
A construction for a counterexample to the pseudo 2-factor isomorphic graph conjecture
Authors:
M. Abreu,
M. Funk,
D. Labbate,
F. Romaniello
Abstract:
A graph $G$ admiting a $2$-factor is \textit{pseudo $2$-factor isomorphic} if the parity of the number of cycles in all its $2$-factors is the same. In [M. Abreu, A.A. Diwan, B. Jackson, D. Labbate and J. Sheehan. Pseudo $2$-factor isomorphic regular bipartite graphs. Journal of Combinatorial Theory, Series B, 98(2) (2008), 432-444.] some of the authors of this note gave a partial characterisation…
▽ More
A graph $G$ admiting a $2$-factor is \textit{pseudo $2$-factor isomorphic} if the parity of the number of cycles in all its $2$-factors is the same. In [M. Abreu, A.A. Diwan, B. Jackson, D. Labbate and J. Sheehan. Pseudo $2$-factor isomorphic regular bipartite graphs. Journal of Combinatorial Theory, Series B, 98(2) (2008), 432-444.] some of the authors of this note gave a partial characterisation of pseudo $2$-factor isomorphic bipartite cubic graphs and conjectured that $K_{3,3}$, the Heawood graph and the Pappus graph are the only essentially $4$-edge-connected ones. In [J. Goedgebeur. A counterexample to the pseudo $2$-factor isomorphic graph conjecture. Discr. Applied Math., 193 (2015), 57-60.] Jan Goedgebeur computationally found a graph $\mathscr{G}$ on $30$ vertices which is pseudo $2$-factor isomorphic cubic and bipartite, essentially $4$-edge-connected and cyclically $6$-edge-connected, thus refuting the above conjecture. In this note, we describe how such a graph can be constructed from the Heawood graph and the generalised Petersen graph $GP(8,3)$, which are the Levi graphs of the Fano $7_3$ configuration and the Möbius-Kantor $8_3$ configuration, respectively. Such a description of $\mathscr{G}$ allows us to understand its automorphism group, which has order $144$, using both a geometrical and a graph theoretical approach simultaneously. Moreover we illustrate the uniqueness of this graph.
△ Less
Submitted 22 July, 2022;
originally announced July 2022.
-
Extremal Fitting Problems for Conjunctive Queries
Authors:
Balder ten Cate,
Victor Dalmau,
Maurice Funk,
Carsten Lutz
Abstract:
The fitting problem for conjunctive queries (CQs) is the problem to construct a CQ that fits a given set of labeled data examples. When a fitting CQ exists, it is in general not unique. This leads us to proposing natural refinements of the notion of a fitting CQ, such as most-general fitting CQ, most-specific fitting CQ, and unique fitting CQ. We give structural characterizations of these notions…
▽ More
The fitting problem for conjunctive queries (CQs) is the problem to construct a CQ that fits a given set of labeled data examples. When a fitting CQ exists, it is in general not unique. This leads us to proposing natural refinements of the notion of a fitting CQ, such as most-general fitting CQ, most-specific fitting CQ, and unique fitting CQ. We give structural characterizations of these notions in terms of (suitable refinements of) homomorphism dualities, frontiers, and direct products, which enable the construction of the refined fitting CQs when they exist. We also pinpoint the complexity of the associated existence and verification problems, and determine the size of fitting CQs. We study the same problems for UCQs and for the more restricted class of tree CQs.
△ Less
Submitted 15 April, 2023; v1 submitted 10 June, 2022;
originally announced June 2022.
-
Frontiers and Exact Learning of ELI Queries under DL-Lite Ontologies
Authors:
Maurice Funk,
Jean Christoph Jung,
Carsten Lutz
Abstract:
We study ELI queries (ELIQs) in the presence of ontologies formulated in the description logic DL-Lite. For the dialect DL-LiteH, we show that ELIQs have a frontier (set of least general generalizations) that is of polynomial size and can be computed in polynomial time. In the dialect DL-LiteF, in contrast, frontiers may be infinite. We identify a natural syntactic restriction that enables the sam…
▽ More
We study ELI queries (ELIQs) in the presence of ontologies formulated in the description logic DL-Lite. For the dialect DL-LiteH, we show that ELIQs have a frontier (set of least general generalizations) that is of polynomial size and can be computed in polynomial time. In the dialect DL-LiteF, in contrast, frontiers may be infinite. We identify a natural syntactic restriction that enables the same positive results as for DL-LiteH. We use out results on frontiers to show that ELIQs are learnable in polynomial time in the presence of a DL-LiteH / restricted DL-LiteF ontology in Angluin's framework of exact learning with only membership queries.
△ Less
Submitted 29 April, 2022;
originally announced April 2022.
-
EMMI: Empathic Human-Machine Interaction for Establishing Trust in Automated Driving
Authors:
Tobias Oetermann,
Pia Dautzenberg,
Dr. Gudrun Voß,
Christopher Brockmeier,
Dr. Stefan Ladwig,
Dr. Patrick Gebhard,
Tanja Schneeberger,
Dr. Markus Funk,
Dr. Raymond Brueckner,
Felix Schäfer,
Norbert Helff,
Dr. Andreas Gomer,
Prof. Lutz Eckstein
Abstract:
Highly automated vehicles represent one of the most crucial development efforts in the automotive industry. In addition to the use of research vehicles, production vehicles for the general public are realistic in the near future. However, to fully exploit the benefits of these systems, it is fundamental that users have an appropriate level of trust in automation. Recent studies indicate that more…
▽ More
Highly automated vehicles represent one of the most crucial development efforts in the automotive industry. In addition to the use of research vehicles, production vehicles for the general public are realistic in the near future. However, to fully exploit the benefits of these systems, it is fundamental that users have an appropriate level of trust in automation. Recent studies indicate that more research is needed in this area. Furthermore, beyond the management of user trust, the system should also convey a perceptible added value to realize not only trust, but also acceptance and thus use. The EMMI project pushes both, the management of user trust while conveying added value to the user. Therefore, an advanced socio-emotional user model for estimating user trust and various user-centered HMI systems with unique UX are being developed. Together, the systems are employed to induce changes in the users' trust in automated vehicles.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Actively Learning Concepts and Conjunctive Queries under ELr-Ontologies
Authors:
Maurice Funk,
Jean Christoph Jung,
Carsten Lutz
Abstract:
We consider the problem to learn a concept or a query in the presence of an ontology formulated in the description logic ELr, in Angluin's framework of active learning that allows the learning algorithm to interactively query an oracle (such as a domain expert). We show that the following can be learned in polynomial time: (1) EL-concepts, (2) symmetry-free ELI-concepts, and (3) conjunctive querie…
▽ More
We consider the problem to learn a concept or a query in the presence of an ontology formulated in the description logic ELr, in Angluin's framework of active learning that allows the learning algorithm to interactively query an oracle (such as a domain expert). We show that the following can be learned in polynomial time: (1) EL-concepts, (2) symmetry-free ELI-concepts, and (3) conjunctive queries (CQs) that are chordal, symmetry-free, and of bounded arity. In all cases, the learner can pose to the oracle membership queries based on ABoxes and equivalence queries that ask whether a given concept/query from the considered class is equivalent to the target. The restriction to bounded arity in (3) can be removed when we admit unrestricted CQs in equivalence queries. We also show that EL-concepts are not polynomial query learnable in the presence of ELI-ontologies.
△ Less
Submitted 19 May, 2021; v1 submitted 18 May, 2021;
originally announced May 2021.
-
Strongly regular configurations
Authors:
Marién Abreu,
Martin Funk,
Vedran Krčadinac,
Domenico Labbate
Abstract:
We study combinatorial configurations with the associated point and line graphs being strongly regular. Examples not belonging to known classes such as partial geometries and their generalizations or elliptic semiplanes are constructed. Necessary existence conditions are proved and a table of feasible parameters of such configurations with at most 200 points is presented. Non-existence of some con…
▽ More
We study combinatorial configurations with the associated point and line graphs being strongly regular. Examples not belonging to known classes such as partial geometries and their generalizations or elliptic semiplanes are constructed. Necessary existence conditions are proved and a table of feasible parameters of such configurations with at most 200 points is presented. Non-existence of some configurations with feasible parameters is proved.
△ Less
Submitted 12 September, 2021; v1 submitted 10 April, 2021;
originally announced April 2021.
-
Sonification of Facial Actions for Musical Expression
Authors:
Mathias Funk,
Kazuhiro Kuwabara,
Michael J. Lyons
Abstract:
The central role of the face in social interaction and non-verbal communication suggests we explore facial action as a means of musical expression. This paper presents the design, implementation, and preliminary studies of a novel system utilizing face detection and optic flow algorithms to associate facial movements with sound synthesis in a topographically specific fashion. We report on our expe…
▽ More
The central role of the face in social interaction and non-verbal communication suggests we explore facial action as a means of musical expression. This paper presents the design, implementation, and preliminary studies of a novel system utilizing face detection and optic flow algorithms to associate facial movements with sound synthesis in a topographically specific fashion. We report on our experience with various gesture-to-sound map**s and applications, and describe our preliminary experiments at musical performance using the system.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
The Upgrade I of LHCb VELO -- towards an intelligent monitoring platform
Authors:
P. Kopciewicz,
T. Szumlak,
M. Majewski,
K. Akiba,
O. Augusto,
J. Back,
D. S. Bobulska,
G. Bogdanova,
S. Borghi,
T. Bowcock,
J. Buytaert,
E. Lemos Cid,
V. Coco,
P. Collins,
E. Dall'Occo,
K. de Bruyn,
S. de Capua,
F. Dettori,
K. Dreimanis,
D. Dutta,
L. Eklund,
T. Evans,
M. Ferro-Luzzi W. Funk,
L. Meyer Garcia,
O. Boente García
, et al. (41 additional authors not shown)
Abstract:
The Large Hadron Collider beauty (LHCb) detector is designed to detect decays of b- and c- hadrons for the study of CP violation and rare decays. At the end of the LHC Run 2, many of the LHCb measurements remained statistically dominated. In order to increase the trigger yield for purely hadronic channels, the hardware trigger will be removed, and the detector will be read out at 40 MHz. This, in…
▽ More
The Large Hadron Collider beauty (LHCb) detector is designed to detect decays of b- and c- hadrons for the study of CP violation and rare decays. At the end of the LHC Run 2, many of the LHCb measurements remained statistically dominated. In order to increase the trigger yield for purely hadronic channels, the hardware trigger will be removed, and the detector will be read out at 40 MHz. This, in combination with the five-fold increase in luminosity, requires radical changes to LHCb's electronics, and, in some cases, the replacement of entire sub-detectors with state-of-the-art detector technologies. The Vertex Locator (VELO) surrounding the interaction region is used to reconstruct the collision points (primary vertices) and decay vertices of long-lived particles (secondary vertices). The upgraded VELO will be composed of 52 modules placed along the beam axis divided into two retractable halves. The modules will each be equipped with 4 silicon hybrid pixel tiles, each read out by 3 VeloPix ASICs. The total output data rate anticipated for the whole detector will be around 1.6 Tbit/s. The highest occupancy ASICs will have pixel hit rates of approximately 900 Mhit/s, with the corresponding output data rate of 15 Gbit/s. The LHCb upgrade detector will be the first detector to read out at the full LHC rate of 40 MHz. The VELO upgrade will utilize the latest detector technologies to read out at this rate while maintaining the required radiation-hard profile and minimizing the detector material.
△ Less
Submitted 22 July, 2022; v1 submitted 16 June, 2020;
originally announced June 2020.
-
An Environment for Sustainable Research Software in Germany and Beyond: Current State, Open Challenges, and Call for Action
Authors:
Hartwig Anzt,
Felix Bach,
Stephan Druskat,
Frank Löffler,
Axel Loewe,
Bernhard Y. Renard,
Gunnar Seemann,
Alexander Struck,
Elke Achhammer,
Piush Aggarwal,
Franziska Appel,
Michael Bader,
Lutz Brusch,
Christian Busse,
Gerasimos Chourdakis,
Piotr W. Dabrowski,
Peter Ebert,
Bernd Flemisch,
Sven Friedl,
Bernadette Fritzsch,
Maximilian D. Funk,
Volker Gast,
Florian Goth,
Jean-Noël Grad,
Sibylle Hermann
, et al. (18 additional authors not shown)
Abstract:
Research software has become a central asset in academic research. It optimizes existing and enables new research methods, implements and embeds research knowledge, and constitutes an essential research product in itself. Research software must be sustainable in order to understand, replicate, reproduce, and build upon existing research or conduct new research effectively. In other words, software…
▽ More
Research software has become a central asset in academic research. It optimizes existing and enables new research methods, implements and embeds research knowledge, and constitutes an essential research product in itself. Research software must be sustainable in order to understand, replicate, reproduce, and build upon existing research or conduct new research effectively. In other words, software must be available, discoverable, usable, and adaptable to new needs, both now and in the future. Research software therefore requires an environment that supports sustainability. Hence, a change is needed in the way research software development and maintenance are currently motivated, incentivized, funded, structurally and infrastructurally supported, and legally treated. Failing to do so will threaten the quality and validity of research. In this paper, we identify challenges for research software sustainability in Germany and beyond, in terms of motivation, selection, research software engineering personnel, funding, infrastructure, and legal aspects. Besides researchers, we specifically address political and academic decision-makers to increase awareness of the importance and needs of sustainable research software practices. In particular, we recommend strategies and measures to create an environment for sustainable research software, with the ultimate goal to ensure that software-driven research is valid, reproducible and sustainable, and that software is recognized as a first class citizen in research. This paper is the outcome of two workshops run in Germany in 2019, at deRSE19 - the first International Conference of Research Software Engineers in Germany - and a dedicated DFG-supported follow-up workshop in Berlin.
△ Less
Submitted 5 May, 2020; v1 submitted 27 April, 2020;
originally announced May 2020.
-
Download by Parachute: Retrieval of Assets from High Altitude Balloons
Authors:
E. L. Sirks,
P. Clark,
R. J. Massey,
S. J. Benton,
A. M. Brown,
C. J. Damaren,
T. Eifler,
A. A. Fraisse,
C. Frenk,
M. Funk,
M. N. Galloway,
A. Gill,
J. W. Hartley,
B. Holder,
E. M. Huff,
M. Jauzac,
W. C. Jones,
D. Lagattuta,
J. S. -Y. Leung,
L. Li,
T. V. T. Luu,
J. McCleary,
J. M. Nagy,
C. B. Netterfield,
S. Redmond
, et al. (5 additional authors not shown)
Abstract:
We present a publicly-available toolkit of flight-proven hardware and software to retrieve 5 TB of data or small physical samples from a stratospheric balloon platform. Before launch, a capsule is attached to the balloon, and rises with it. Upon remote command, the capsule is released and descends via parachute, continuously transmitting its location. Software to predict the trajectory can be used…
▽ More
We present a publicly-available toolkit of flight-proven hardware and software to retrieve 5 TB of data or small physical samples from a stratospheric balloon platform. Before launch, a capsule is attached to the balloon, and rises with it. Upon remote command, the capsule is released and descends via parachute, continuously transmitting its location. Software to predict the trajectory can be used to select a safe but accessible landing site. We dropped two such capsules from the SuperBIT telescope, in September 2019. The capsules took ~37 minutes to descend from ~30 km altitude. They drifted 32 km and 19 km horizontally, but landed within 300 m and 600 m of their predicted landing sites. We found them easily, and successfully recovered the data. We welcome interest from other balloon teams for whom the technology would be useful.
△ Less
Submitted 22 April, 2020;
originally announced April 2020.
-
Visual Exploration of Movement Relatedness for Multi-species Ecology Analysis
Authors:
Wei Li,
Mathias Funk,
Jasper Eikelboom,
Aarnout Brombacher
Abstract:
Advances in GPS telemetry technology have enabled analysis of animal movement in open areas. Ecologists today are utilizing modern analytic tools to study animal behaviors from large quantity of GPS coordinates. Analytic tools with automatic event extraction functionality can be used to investigate potential interactions between animals by locating relevant segments in movement trajectories. Howev…
▽ More
Advances in GPS telemetry technology have enabled analysis of animal movement in open areas. Ecologists today are utilizing modern analytic tools to study animal behaviors from large quantity of GPS coordinates. Analytic tools with automatic event extraction functionality can be used to investigate potential interactions between animals by locating relevant segments in movement trajectories. However, such automation can easily overlook the spatial, temporal, social context as well as potential data problems. To this end, this paper explores the visual presentations that also clarify the spatial-temporal contexts, social surroudings, as well as underlying data uncertainties of multi-species animal interactions. The outcome system presents the proximity-based, time-varying relatedness between animal entities through pairwise (PW) or individual-to-group (i-G) perspectives. Focusing on the relational aspects, we employ both static depictions and animations to communicate the travelling of individuals. Our contributions are a novel visualization system that helps investigate the subtle variations of long term spatial-temporal relatedness while considering small group patterns. Our evaluation with movement ecologists shows that the system gives them quick access to valuable clues in discovering insights into multi-species movements and signs of potential interactions.
△ Less
Submitted 29 January, 2020;
originally announced January 2020.
-
An open source toolkit for the tracking, termination and recovery of high altitude balloon flights and payloads
Authors:
Paul Clark,
Marc Funk,
Benjamin Funk,
Tobias Funk,
Richard E. Meadows,
Anthony M. Brown,
Lun Li,
Richard J. Massey,
C. Barth Netterfield
Abstract:
We present an open source toolkit of flight-proven electronic devices which can be used to track, terminate and recover high altitude balloon flights and payloads. Comprising a beacon, pyrotechnic and non-pyrotechnic cut-down devices plus associated software, the toolkit can be used to: (i) track the location of a flight via Iridium satellite communication; (ii) release lift and/or float balloons…
▽ More
We present an open source toolkit of flight-proven electronic devices which can be used to track, terminate and recover high altitude balloon flights and payloads. Comprising a beacon, pyrotechnic and non-pyrotechnic cut-down devices plus associated software, the toolkit can be used to: (i) track the location of a flight via Iridium satellite communication; (ii) release lift and/or float balloons manually or at pre-defined altitudes; (iii) locate the payload after descent. The size and mass of the toolkit make it suitable for use on weather or sounding balloon flights. We describe the technology readiness level of the toolkit, based on over 20 successful flights to altitudes of typically 32,000 m.
△ Less
Submitted 8 April, 2019;
originally announced April 2019.
-
Co-detection of micro seismic activity as early warning of gravitational slope failure
Authors:
Jerome Faillettaz,
Martin Funk,
Jan Beutel,
Andreas Vieli
Abstract:
We developed a new strategy for Disaster Risk Reduction for gravitational slope failure: We propose a simple method for real-time early warning of gravity-driven failures that considers and exploits both the heterogeneity of natural media and characteristics of acoustic emissions attenuation. This method capitalizes on co-detection of elastic waves emanating from micro-cracks by a network of multi…
▽ More
We developed a new strategy for Disaster Risk Reduction for gravitational slope failure: We propose a simple method for real-time early warning of gravity-driven failures that considers and exploits both the heterogeneity of natural media and characteristics of acoustic emissions attenuation. This method capitalizes on co-detection of elastic waves emanating from micro-cracks by a network of multiple and spatially distributed sensors. Event co-detection is considered as surrogate for large event size with more frequent co-detected events marking imminence of catastrophic failure. In this study we apply this method to a steep rock glacier / debris slope and demonstrate the potential of this simple strategy for real world cases, i.e. at slope scale. This low cost, robust and autonomous system provides a well adapted alternative/complementary solution for Early Warning Systems.
△ Less
Submitted 13 December, 2018;
originally announced December 2018.
-
The Witt Ring of a Curve with Good Reduction over a Non-dyadic Local Field
Authors:
Jeanne M. Funk,
Raymond T. Hoobler
Abstract:
In this work, we present a generalization to varieties and sheaves of the fundamental ideal of the Witt ring of a field by defining a sheaf of fundamental ideals $\tilde{I}$ and a sheaf of Witt rings $\tilde{W}$ in the obvious way. The Milnor conjecture then relates the associated graded of $\tilde{W}$ to Milnor K-theory and so allows the classical invariants of a bilinear space over a field to be…
▽ More
In this work, we present a generalization to varieties and sheaves of the fundamental ideal of the Witt ring of a field by defining a sheaf of fundamental ideals $\tilde{I}$ and a sheaf of Witt rings $\tilde{W}$ in the obvious way. The Milnor conjecture then relates the associated graded of $\tilde{W}$ to Milnor K-theory and so allows the classical invariants of a bilinear space over a field to be extended to our setting using étale cohomology. As an application of these results, we calculate the Witt ring of a smooth curve with good reduction over a non-dyadic local field.
△ Less
Submitted 2 January, 2014;
originally announced January 2014.
-
The Witt Ring of a Smooth Projective Curve over a Finite Field
Authors:
Jeanne M. Funk,
Raymond T. Hoobler
Abstract:
In this paper we calculate the Witt ring W(C) of a smooth geometrically connected projective curve C over a finite field of characteristic different from 2. We view W(C) as a subring of W(k(C)) where k(C) is the function field of C. We show that the triviality of the Clifford algebra of a bilinear space over C gives the main relation. The calculation is then completed using classical results for b…
▽ More
In this paper we calculate the Witt ring W(C) of a smooth geometrically connected projective curve C over a finite field of characteristic different from 2. We view W(C) as a subring of W(k(C)) where k(C) is the function field of C. We show that the triviality of the Clifford algebra of a bilinear space over C gives the main relation. The calculation is then completed using classical results for bilinear spaces over fields.
△ Less
Submitted 10 October, 2012;
originally announced October 2012.
-
Prediction of alpine glacier sliding instabilities: a new hope
Authors:
Jerome Faillettaz,
Martin Funk,
Didier Sornette
Abstract:
Mechanical and sliding instabilities are the two processes which may lead to breaking off events of large ice masses. Mechanical instabilities mainly affect unbalanced cold hanging glaciers. For the latter case, a prediction could be achieved based on data of surface velocities and seismic activity. The case of sliding instabilities is more problematic. This phenomenon occurs on temperate glacier…
▽ More
Mechanical and sliding instabilities are the two processes which may lead to breaking off events of large ice masses. Mechanical instabilities mainly affect unbalanced cold hanging glaciers. For the latter case, a prediction could be achieved based on data of surface velocities and seismic activity. The case of sliding instabilities is more problematic. This phenomenon occurs on temperate glacier tongues. Such instabilities are strongly affected by the subglacial hydrology: melt water may cause (i) a lubrication of the bed and (ii) a decrease of the effective pressure and consequently a decrease of basal friction. Available data from Allalingletscher (Valais) indicate that the glacier tongue experienced an active phase during 2-3 weeks with enhanced basal motion in late summer in most years. In order to scrutinize in more detail the processes governing the sliding instabilities, a numerical model developed to investigate gravitational instabilities in heterogeneous media was applied to Allalingletscher. This model enables to account for various geometric configurations, interaction between sliding and tension cracking and water flow at the bedrock. We could show that both a critical geometrical configuration of the glacier tongue and the existence of a distributed drainage network were the main causes of this catastrophic break-off. Moreover, the analysis of the modeling results diagnose the phenomenon of recoupling of the glacier to its bed as a potential new precursory sign announcing the final break-off. This model casts a gleam of hope for a better understanding of the ultimate rupture of such glacier sliding instabilities.
△ Less
Submitted 13 December, 2011;
originally announced January 2012.
-
On the Ubiquity and Utility of Cyclic Schemes
Authors:
M. Abreu,
M. J. Funk,
D. Labbate,
V. Napolitano
Abstract:
Let $k,l,m,n$, and $μ$ be positive integers. A $\mathbb{Z}_μ$--{\it scheme of valency} $(k,l)$ and {\it order} $(m,n)$ is a $m \times n$ array $(S_{ij})$ of subsets $S_{ij} \subseteq \mathbb{Z}_μ$ such that for each row and column one has $\sum_{j=1}^n |S_{ij}| = k $ and $\sum_{i=1}^m |S_{ij}| = l$, respectively. Any such scheme is an algebraic equivalent of a $(k,l)$-semi-regular bipartite voltag…
▽ More
Let $k,l,m,n$, and $μ$ be positive integers. A $\mathbb{Z}_μ$--{\it scheme of valency} $(k,l)$ and {\it order} $(m,n)$ is a $m \times n$ array $(S_{ij})$ of subsets $S_{ij} \subseteq \mathbb{Z}_μ$ such that for each row and column one has $\sum_{j=1}^n |S_{ij}| = k $ and $\sum_{i=1}^m |S_{ij}| = l$, respectively. Any such scheme is an algebraic equivalent of a $(k,l)$-semi-regular bipartite voltage graph with $n$ and $m$ vertices in the bipartition sets and voltages coming from the cyclic group $\mathbb{Z}_μ$. We are interested in the subclass of $\mathbb{Z}_μ$--schemes that are characterized by the property $a - b + c - d\; \not \equiv \;0$ (mod $μ$) for all $a \in S_{ij}$, $b \in S_{ih}$, $c \in S_{gh}$, and $d \in S_{gj}$ where $i,g \in {1,...,m}$ and $j,h \in {1,...,n}$ need not be distinct. These $\mathbb{Z}_μ$--schemes can be used to represent adjacency matrices of regular graphs of girth $\ge 5$ and semi-regular bipartite graphs of girth $\ge 6$. For suitable $ρ, σ\in \mathbb{N}$ with $ρk = σl$, they also represent incidence matrices for polycyclic $(ρμ_k, σμ_l)$ configurations and, in particular, for all known Desarguesian elliptic semiplanes. Partial projective closures yield {\it mixed $\mathbb{Z}_μ$-schemes}, which allow new constructions for Krčadinac's sporadic configuration of type $(34_6)$ and Balbuena's bipartite $(q-1)$-regular graphs of girth 6 on as few as $2(q^2-q-2)$ vertices, with $q$ ranging over prime powers. Besides some new results, this survey essentially furnishes new proofs in terms of (mixed) $\mathbb{Z}_μ$--schemes for ad-hoc constructions used thus far.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
Climate warming and stability of cold hanging glaciers: Lessons from the gigantic 1895 Altels break-off
Authors:
Jerome Faillettaz,
Didier Sornette,
Martin Funk
Abstract:
The Altels hanging glacier broke off on September 11, 1895. The ice volume of this catastrophic rupture was estimated at $\rm 4.10^6$ cubic meters and is the largest ever observed ice fall event in the Alps. The causes of this collapse are however not entirely clear. Based on previous studies, we reanalyzed this break-off event, with the help of a new numerical model, initially developed by Faille…
▽ More
The Altels hanging glacier broke off on September 11, 1895. The ice volume of this catastrophic rupture was estimated at $\rm 4.10^6$ cubic meters and is the largest ever observed ice fall event in the Alps. The causes of this collapse are however not entirely clear. Based on previous studies, we reanalyzed this break-off event, with the help of a new numerical model, initially developed by Faillettaz and others (2010) for gravity-driven instabilities. The simulations indicate that a break-off event is only possible when the basal friction at the bedrock is reduced in a restricted area, possibly induced by the storage of infiltrated water within the glacier. Moreover, our simulations reveal a two-step behavior: (i) A first quiescent phase, without visible changes, with a duration depending on the rate of basal changes; (ii) An active phase with a rapid increase of basal motion over a few days. The general lesson obtained from the comparison between the simulations and the available evidence is that visible signs of the destabilization process of a hanging glacier, resulting from a progressive warming of the ice/bed interface towards a temperate regime, will appear just a few days prior to the collapse.
△ Less
Submitted 26 January, 2011;
originally announced January 2011.
-
International research work experience of young females in physics
Authors:
Serene H. -J. Choi,
Maren Funk,
Susan H. Roelofs,
Martha B. Alvarez-Elizondo,
Timo A. Nieminen
Abstract:
International research work for young people is common in physics. However, work experience and career plan of female workers in physics are little studied. We explore them by interviewing three international female workers in physics.
International research work for young people is common in physics. However, work experience and career plan of female workers in physics are little studied. We explore them by interviewing three international female workers in physics.
△ Less
Submitted 10 January, 2011;
originally announced January 2011.
-
Icequakes coupled with surface displacements for predicting glacier break-off
Authors:
Jerome Faillettaz,
Didier Sornette,
Martin Funk
Abstract:
A hanging glacier at the east face of Weisshorn (Switzerland) broke off in 2005. We were able to monitor and measure surface motion and icequake activity for 25 days up to three days prior to the break-off. The analysis of seismic waves generated by the glacier during the rupture maturation process revealed four types of precursory signals of the imminent catastrophic rupture: (i) an increase in s…
▽ More
A hanging glacier at the east face of Weisshorn (Switzerland) broke off in 2005. We were able to monitor and measure surface motion and icequake activity for 25 days up to three days prior to the break-off. The analysis of seismic waves generated by the glacier during the rupture maturation process revealed four types of precursory signals of the imminent catastrophic rupture: (i) an increase in seismic activity within the glacier, (ii) a decrease in the waiting time between two successive icequakes, (iii) a change in the size-frequency distribution of icequake energy, and (iv) a modification in the structure of the waiting time distributions between two successive icequakes. Morevover, it was possible to demonstrate the existence of a correlation between the seismic activity and the log-periodic oscillations of the surface velocities superimposed on the global acceleration of the glacier during the rupture maturation. Analysis of the seismic activity led us to the identification of two regimes: a stable phase with diffuse damage, and an unstable and dangerous phase characterized by a hierarchical cascade of rupture instabilities where large icequakes are triggered.
△ Less
Submitted 22 November, 2010;
originally announced November 2010.
-
Adjacency Matrices of Configuration Graphs
Authors:
M. Abreu,
M. Funk,
D. Labbate,
V. Napolitano
Abstract:
In 1960, Hoffman and Singleton \cite{HS60} solved a celebrated equation for square matrices of order $n$, which can be written as $$ (κ- 1) I_n + J_n - A A^{\rm T} = A$$ where $I_n$, $J_n$, and $A$ are the identity matrix, the all one matrix, and a $(0,1)$--matrix with all row and column sums equal to $κ$, respectively. If $A$ is an incidence matrix of some configuration $\cal C$ of type $n_κ$,…
▽ More
In 1960, Hoffman and Singleton \cite{HS60} solved a celebrated equation for square matrices of order $n$, which can be written as $$ (κ- 1) I_n + J_n - A A^{\rm T} = A$$ where $I_n$, $J_n$, and $A$ are the identity matrix, the all one matrix, and a $(0,1)$--matrix with all row and column sums equal to $κ$, respectively. If $A$ is an incidence matrix of some configuration $\cal C$ of type $n_κ$, then the left-hand side $Θ(A):= (κ- 1)I_n + J_n - A A^{\rm T}$ is an adjacency matrix of the non--collinearity graph $Γ$ of $\cal C$. In certain situations, $Θ(A)$ is also an incidence matrix of some $n_κ$ configuration, namely the neighbourhood geometry of $Γ$ introduced by Lefèvre-Percsy, Percsy, and Leemans \cite{LPPL}.
The matrix operator $Θ$ can be reiterated and we pose the problem of solving the generalised Hoffman--Singleton equation $Θ^m(A)=A$. In particular, we classify all $(0,1)$--matrices $M$ with all row and column sums equal to $κ$, for $κ= 3,4$, which are solutions of this equation. As a by--product, we obtain characterisations for incidence matrices of the configuration $10_3F$ in Kantor's list \cite{Kantor} and the $17_4$ configuration $#1971$ in Betten and Betten's list \cite{BB99}.
△ Less
Submitted 4 February, 2010;
originally announced February 2010.
-
Icequakes as precursors of ice avalanches
Authors:
J. Faillettaz,
M. Funk,
D. Sornette
Abstract:
A hanging glacier at the east face of Weisshorn broke off in 2005. We were able to monitor and measure surface motion and icequake activity for 21 days up to three days prior to the break-off. Results are presented from the analysis of seismic waves generated by the glacier during the rupture maturation process. Three types of precursory signals of the imminent catastrophic rupture were identifi…
▽ More
A hanging glacier at the east face of Weisshorn broke off in 2005. We were able to monitor and measure surface motion and icequake activity for 21 days up to three days prior to the break-off. Results are presented from the analysis of seismic waves generated by the glacier during the rupture maturation process. Three types of precursory signals of the imminent catastrophic rupture were identified: (i) an increasing seismic activity within the glacier, (ii) a change in the size-frequency distribution of icequake energy, and (iii) a log-periodic oscillating behavior superimposed on power law acceleration of the inverse of waiting time between two icequakes. The analysis of the seismic activity gave indications of the rupture process and led to the identification of two regimes: a stable one where events are isolated and non correlated which is characteristic of diffuse damage, and an unstable and dangerous one in which events become synchronized and large icequakes are triggered.
△ Less
Submitted 30 June, 2009;
originally announced June 2009.
-
Gravity-driven instabilities: interplay between state-and-velocity dependent frictional sliding and stress corrosion damage cracking
Authors:
Jerome Faillettaz,
Didier Sornette,
Martin Funk
Abstract:
We model the progressive maturation of a heterogeneous mass towards a gravity-driven instability, characterized by the competition between frictional sliding and tension cracking, using array of slider blocks on an inclined basal surface, which interact via elastic-brittle springs. A realistic state- and rate-dependent friction law describes the block-surface interaction. The inner material dama…
▽ More
We model the progressive maturation of a heterogeneous mass towards a gravity-driven instability, characterized by the competition between frictional sliding and tension cracking, using array of slider blocks on an inclined basal surface, which interact via elastic-brittle springs. A realistic state- and rate-dependent friction law describes the block-surface interaction. The inner material damage occurs via stress corrosion. Three regimes, controlling the mass instability and its precursory behavior, are classified as a function of the ratio $T_c/T_f$ of two characteristic time scales associated with internal damage/creep and with frictional sliding. For $T_c/T_f \gg 1$, the whole mass undergoes a series of internal stick and slip events, associated with an initial slow average downward motion of the whole mass, and progressively accelerates until a global coherent runaway is observed. For $T_c/T_f \ll 1$, creep/damage occurs sufficiently fast compared with nucleation of sliding, causing bonds to break, and the bottom part of the mass undergoes a fragmentation process with the creation of a heterogeneous population of sliding blocks. For the intermediate regime $T_c/T_f \sim 1$, a macroscopic crack nucleates and propagates along the location of the largest curvature associated with the change of slope from the stable frictional state in the upper part to the unstable frictional sliding state in the lower part. The other important parameter is the Young modulus $Y$ which controls the correlation length of displacements in the system.
△ Less
Submitted 6 April, 2009;
originally announced April 2009.