-
Verification of Perrin's theory of the motion of dilute spheroidal colloids
Authors:
John David Geiger,
Mohammed Alhissi,
Markus Voggenreiter,
Matthias Fuchs,
Andreas Zumbusch
Abstract:
Brownian motion is of central importance for understanding diffusive transport in biology, chemistry, and physics. For spherical particles, the theory was developed by Einstein, whereas a theoretical description of the motion of spheroids was given by F. Perrin. Here, we report the systematic verification of Perrin's theory 90 years after its publication. To this end, we synthesized oblate and pro…
▽ More
Brownian motion is of central importance for understanding diffusive transport in biology, chemistry, and physics. For spherical particles, the theory was developed by Einstein, whereas a theoretical description of the motion of spheroids was given by F. Perrin. Here, we report the systematic verification of Perrin's theory 90 years after its publication. To this end, we synthesized oblate and prolate core-shell spheroids with different aspect ratios and tracked their three-dimensional diffusive motion in high dilution using confocal fluorescence microscopy. The experimental data for the dependence of translational and rotational diffusion on aspect ratio are in excellent agreement with the theoretical predictions. The crossover dynamics from anisotropic to isotropic diffusion as a hallmark for translation rotation coupling are also found as predicted. This verifies Perrin's theory as a cornerstone for understanding diffusive transport and underlines the excellent suitability of the particle system for testing more detailed theory.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Global GIS-based potential analysis and cost assessment of Power-to-X fuels in 2050
Authors:
Maximilian Pfennig,
Diana Böttger,
Benedikt Häckner,
David Geiger,
Christoph Zink,
André Bisevic,
Lukas Jansen
Abstract:
Electricity-based fuels from renewable energies are regarded as a key instrument for climate protection. These Power-to-X (PtX) products are to replace fossil fuels in sectors where direct use of electricity from renewable energies is not possible. We investigate the production potential of PtX fuels from onshore wind energy and ground-mounted photovoltaic energy for all countries outside the Euro…
▽ More
Electricity-based fuels from renewable energies are regarded as a key instrument for climate protection. These Power-to-X (PtX) products are to replace fossil fuels in sectors where direct use of electricity from renewable energies is not possible. We investigate the production potential of PtX fuels from onshore wind energy and ground-mounted photovoltaic energy for all countries outside the European Economic Area along 14 PtX production pathways. These include hydrogen, several hydrocarbons and ammonia. The technical and economic potential assessment is based on data with hourly temporal and high spatial resolution. The analysis considers various criteria, including weather conditions, nature conservation concerns and land use. The results show the production quantities and costs of climate-friendly fuel production under strict sustainability criteria and locate them spatially. It is shown that many regions of the world are well suited to produce PtX products. The production quantity outside Europe is up to 120,000 TWh/yr of hydrogen or 87,000 TWh/yr of hydrocarbons in the long term. We identify 97 countries with potentials, of which 38 countries possess relevant potentials of more than 100 TWh/yr. The largest suitable areas are in the United States, Australia and Argentina. The production costs vary a lot across the different regions. The lowest production costs for PtX generation are in Latin America (Chile, Argentina and Venezuela) and Mauritania with a lower limit of 42.3 EUR/MWh to 46.5 EUR/MWh for gaseous hydrogen and 84 EUR/MWh to 89.1 EUR/MWh for Fischer-Tropsch fuels. All best sites are pure wind or combined wind and photovoltaic sites. Moreover, we show import options of these PtX products to Europe considering socioeconomic factors and transport costs. All investigation results are freely accessible via the Global PtX Atlas on https://maps.iee.fraunhofer.de/ptx-atlas/.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Spin Entropy
Authors:
Davi Geiger,
Zvi Kedem
Abstract:
In classical physics, entropy quantifies the randomness of large systems, where the complete specification of the state, though possible in theory, is not possible in practice. In quantum physics, despite its inherently probabilistic nature, the concept of entropy has been elusive. The von Neumann entropy, currently adopted in quantum information and computing, models only the randomness associate…
▽ More
In classical physics, entropy quantifies the randomness of large systems, where the complete specification of the state, though possible in theory, is not possible in practice. In quantum physics, despite its inherently probabilistic nature, the concept of entropy has been elusive. The von Neumann entropy, currently adopted in quantum information and computing, models only the randomness associated with unknown specifications of a state and is zero for pure quantum states, and thus cannot quantify the inherent randomness of its observables. Our goal is to provide such quantification.
This paper focuses on the quantification of the observed spin values associated with a pure quantum state, given an axis $z$. To this end, we define a spin entropy, which is not zero for pure states, and its minimum is $\ln 2π$, reflecting the uncertainty principle for the spin observables. We study the spin entropy for single massive particles with spin $1/2$ and spin 1, photons, and two fermions in entangled and disentangled states. The spin entropy attains local minima for Bell states, which are pure entangled states of two fermions, and local maxima for disentangled states. The spin entropy may be useful for develo** robust quantum computational processes.
△ Less
Submitted 1 June, 2022; v1 submitted 22 November, 2021;
originally announced November 2021.
-
Quantum Entropy Evolution
Authors:
Davi Geiger,
Zvi M. Kedem
Abstract:
A quantum coordinate-entropy formulated in quantum phase space has been recently proposed together with an entropy law that asserts that such entropy can not decrease over time. The coordinate-entropy is dimensionless, a relativistic scalar, and it is invariant under coordinate and CPT transformations. We study here the time evolution of this entropy.
We show that the entropy associated with coh…
▽ More
A quantum coordinate-entropy formulated in quantum phase space has been recently proposed together with an entropy law that asserts that such entropy can not decrease over time. The coordinate-entropy is dimensionless, a relativistic scalar, and it is invariant under coordinate and CPT transformations. We study here the time evolution of this entropy.
We show that the entropy associated with coherent states evolving under a Dirac Hamiltonian is increasing. However, for the collisions of two particles, where each is evolving as a coherent state, as they come closer to each other their spatial entanglement causes the total system's entropy to oscillate. We augment time reversal with time translation and show that CPT with time translation can transform particles with decreasing entropy for a finite time interval into anti-particles with increasing entropy for the same finite time interval.
We then analyze the impact of the entropy law for the evolution scenarios described above and explore the possibility that entropy oscillations trigger the annihilation and the creation of particles.
△ Less
Submitted 14 May, 2022; v1 submitted 29 June, 2021;
originally announced June 2021.
-
Quantum Entropy
Authors:
Davi Geiger,
Zvi M. Kedem
Abstract:
Quantum physics, despite its observables being intrinsically of a probabilistic nature, does not have a quantum entropy assigned to them. We propose a quantum entropy that quantify the randomness of a pure quantum state via a conjugate pair of observables forming the quantum phase space. The entropy is dimensionless, it is a relativistic scalar, it is invariant under coordinate transformation of p…
▽ More
Quantum physics, despite its observables being intrinsically of a probabilistic nature, does not have a quantum entropy assigned to them. We propose a quantum entropy that quantify the randomness of a pure quantum state via a conjugate pair of observables forming the quantum phase space. The entropy is dimensionless, it is a relativistic scalar, it is invariant under coordinate transformation of position and momentum that maintain conjugate properties, and under CPT transformations; and its minimum is positive due to the uncertainty principle. We expand the entropy to also include mixed states and show that the proposed entropy is always larger than von Neumann's entropy. We conjecture an entropy law whereby that entropy of a closed system never decreases, implying a time arrow for particles physics.
△ Less
Submitted 19 May, 2022; v1 submitted 29 June, 2021;
originally announced June 2021.
-
Likelihoods and Parameter Priors for Bayesian Networks
Authors:
David Heckerman,
Dan Geiger
Abstract:
We develop simple methods for constructing likelihoods and parameter priors for learning about the parameters and structure of a Bayesian network. In particular, we introduce several assumptions that permit the construction of likelihoods and parameter priors for a large number of Bayesian-network structures from a small set of assessments. The most notable assumption is that of likelihood equival…
▽ More
We develop simple methods for constructing likelihoods and parameter priors for learning about the parameters and structure of a Bayesian network. In particular, we introduce several assumptions that permit the construction of likelihoods and parameter priors for a large number of Bayesian-network structures from a small set of assessments. The most notable assumption is that of likelihood equivalence, which says that data can not help to discriminate network structures that encode the same assertions of conditional independence. We describe the constructions that follow from these assumptions, and also present a method for directly computing the marginal likelihood of a random sample with no missing observations. Also, we show how these assumptions lead to a general framework for characterizing parameter priors of multivariate distributions.
△ Less
Submitted 29 June, 2021; v1 submitted 13 May, 2021;
originally announced May 2021.
-
Parameter Priors for Directed Acyclic Graphical Models and the Characterization of Several Probability Distributions
Authors:
Dan Geiger,
David Heckerman
Abstract:
We develop simple methods for constructing parameter priors for model choice among Directed Acyclic Graphical (DAG) models. In particular, we introduce several assumptions that permit the construction of parameter priors for a large number of DAG models from a small set of assessments. We then present a method for directly computing the marginal likelihood of every DAG model given a random sample…
▽ More
We develop simple methods for constructing parameter priors for model choice among Directed Acyclic Graphical (DAG) models. In particular, we introduce several assumptions that permit the construction of parameter priors for a large number of DAG models from a small set of assessments. We then present a method for directly computing the marginal likelihood of every DAG model given a random sample with no missing observations. We apply this methodology to Gaussian DAG models which consist of a recursive set of linear regression models. We show that the only parameter prior for complete Gaussian DAG models that satisfies our assumptions is the normal-Wishart distribution. Our analysis is based on the following new characterization of the Wishart distribution: let $W$ be an $n \times n$, $n \ge 3$, positive-definite symmetric matrix of random variables and $f(W)$ be a pdf of $W$. Then, f$(W)$ is a Wishart distribution if and only if $W_{11} - W_{12} W_{22}^{-1} W'_{12}$ is independent of $\{W_{12},W_{22}\}$ for every block partitioning $W_{11},W_{12}, W'_{12}, W_{22}$ of $W$. Similar characterizations of the normal and normal-Wishart distributions are provided as well.
△ Less
Submitted 29 June, 2021; v1 submitted 5 May, 2021;
originally announced May 2021.
-
Quantum-Entropy Physics
Authors:
Davi Geiger,
Zvi M. Kedem
Abstract:
All the laws of physics are time-reversible. Time arrow emerges only when ensembles of classical particles are treated probabilistically, outside of physics laws, and the entropy and the second law of thermodynamics are introduced. In quantum physics, no mechanism for a time arrow has been proposed despite its intrinsic probabilistic nature. In consequence, one cannot explain why an electron in an…
▽ More
All the laws of physics are time-reversible. Time arrow emerges only when ensembles of classical particles are treated probabilistically, outside of physics laws, and the entropy and the second law of thermodynamics are introduced. In quantum physics, no mechanism for a time arrow has been proposed despite its intrinsic probabilistic nature. In consequence, one cannot explain why an electron in an excited state will "spontaneously" transition into a ground state as a photon is created and emitted, instead of continuing in its reversible unitary evolution. To address such phenomena, we introduce an entropy for quantum physics, which will conduce to the emergence of a time arrow.
The entropy is a measure of randomness over the degrees of freedom of a quantum state. It is dimensionless; it is a relativistic scalar, it is invariant under coordinate transformation of position and momentum that maintain conjugate properties and under CPT transformations; and its minimum is positive due to the uncertainty principle.
To excogitate why some quantum physical processes cannot take place even though they obey conservation laws, we partition the set of all evolutions of an initial state into four blocks, based on whether the entropy is (i) increasing but not a constant, (ii) decreasing but not a constant, (iii) a constant, (iv) oscillating. We propose a law that in quantum physics entropy (weakly) increases over time. Thus, evolutions in the set (ii) are disallowed, and evolutions in set (iv) are barred from completing an oscillation period by instantaneously transitioning to a new state. This law for quantum physics limits physical scenarios beyond conservation laws, providing causality reasoning by defining a time arrow.
△ Less
Submitted 14 March, 2021;
originally announced March 2021.
-
Quantum Interference for Counting Clusters
Authors:
Rohit R Muthyala,
Davi Geiger,
Zvi M. Kedem
Abstract:
Counting the number of clusters, when these clusters overlap significantly is a challenging problem in machine learning. We argue that a purely mathematical quantum theory, formulated using the path integral technique, when applied to non-physics modeling leads to non-physics quantum theories that are statistical in nature. We show that a quantum theory can be a more robust statistical theory to s…
▽ More
Counting the number of clusters, when these clusters overlap significantly is a challenging problem in machine learning. We argue that a purely mathematical quantum theory, formulated using the path integral technique, when applied to non-physics modeling leads to non-physics quantum theories that are statistical in nature. We show that a quantum theory can be a more robust statistical theory to separate data to count overlap** clusters. The theory is also confirmed from data simulations.This works identify how quantum theory can be effective in counting clusters and hope to inspire the field to further apply such techniques.
△ Less
Submitted 3 January, 2020;
originally announced January 2020.
-
ACE: Adaptive Confusion Energy for Natural World Data Distribution
Authors:
Yen-Chi Hsu,
Cheng-Yao Hong,
Wan-Cyuan Fan,
Ming-Sui Lee,
Davi Geiger,
Tyng-Luh Liu
Abstract:
With the development of deep learning, standard classification problems have achieved good results. However, conventional classification problems are often too idealistic. Most data in the natural world usually have imbalanced distribution and fine-grained characteristics. Recently, many state-of-the-art approaches tend to focus on one or another separately, but rarely on both. In this paper, we i…
▽ More
With the development of deep learning, standard classification problems have achieved good results. However, conventional classification problems are often too idealistic. Most data in the natural world usually have imbalanced distribution and fine-grained characteristics. Recently, many state-of-the-art approaches tend to focus on one or another separately, but rarely on both. In this paper, we introduce a novel and adaptive batch-wise regularization based on the proposed Adaptive Confusion Energy (ACE) to flexibly address the nature world distribution, which usually involves fine-grained and long-tailed properties at the same time. ACE increases the difficulty of the training process and further alleviates the overfitting problem. Through the datasets with the technical issue in fine-grained (CUB, CAR, AIR) and long-tailed (ImageNet-LT), or comprehensive issues (CUB-LT, iNaturalist), the result shows that the ACE is not only competitive to some state-of-the-art on performance but also demonstrates the effectiveness of training.
△ Less
Submitted 12 March, 2021; v1 submitted 27 October, 2019;
originally announced October 2019.
-
A Theory for the Time Arrow
Authors:
Davi Geiger,
Zvi M. Kedem
Abstract:
Physical laws for elementary particles can be described by the quantum dynamics equation given a Hamiltonian. The solution are probability amplitudes in Hilbert space that evolve over time. A probability density function over position and time is given as the magnitude square of such probability amplitude. An entropy can be associated with these probability densities characterizing the position in…
▽ More
Physical laws for elementary particles can be described by the quantum dynamics equation given a Hamiltonian. The solution are probability amplitudes in Hilbert space that evolve over time. A probability density function over position and time is given as the magnitude square of such probability amplitude. An entropy can be associated with these probability densities characterizing the position information of a particle. Coherent states are localized wave packets and may describe the spatial distribution for some particle states. We show that due to a dispersion property of Hamiltonians in quantum physics, the entropy of coherent states increases over time. We investigate a partition of the Hilbert space into four sets based on whether the entropy is (i) increasing but not a constant, (ii) decreasing but not a constant, (iii) a constant, (iv) oscillating.
We propose a law that entropy (weakly) increases in time in quantum physics. Thus, states in set (ii) are disallowed, and the states in set (iii) cannot complete an oscillation period.
Then, according to this law, quantum theory is not time-reversible unless the state is in set (iii), i.e., it is a stationary state (an eigenstate of the Hamiltonian.). This additional law in quantum theory limits physical scenarios beyond conservation laws, providing causality reasoning by defining an arrow of time.
△ Less
Submitted 29 November, 2019; v1 submitted 27 June, 2019;
originally announced June 2019.
-
Deal-Grove Oxidation and Nanoparticle Adhesion - an AFM Study
Authors:
Clara C. Wanjura,
Daniel Geiger,
Irina Schrezenmeier,
Matthias Roos,
Othmar Marti
Abstract:
We study the formation of nanometer thick oxide layers around nanoparticles (plateaus) in a wet nitrogen environment over 32 days. We determine both the plateau height and the lateral force needed to remove the particles with an atomic force microscope (AFM). The height is well described by the Deal-Grove model for a thermally activated diffusion limited oxidation process. Furthermore, we observe…
▽ More
We study the formation of nanometer thick oxide layers around nanoparticles (plateaus) in a wet nitrogen environment over 32 days. We determine both the plateau height and the lateral force needed to remove the particles with an atomic force microscope (AFM). The height is well described by the Deal-Grove model for a thermally activated diffusion limited oxidation process. Furthermore, we observe that height and force appear to be correlated suggesting that the rise in adhesion forces is mainly governed by an oxidation process. Since the plateaus are the result of a change in the chemical structure, the surface remains permanently altered even after the removal of the nanoparticles. This observation is of great importance for many applications requiring smooth silicon surfaces, such as photolithography, where small contamination can cause the observed oxidation process and significantly increase the surface roughness.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Three-dimensional Simulation of Quantitative Ultrasound in Cancellous Bone using the Echographic Response of a Metallic Pin
Authors:
Yoshiki Nagatani,
Séraphin Guipieri,
Vu-Hieu Nguyen,
Christine Chappard,
Didier Geiger,
Salah Naili,
Guillaume Haïat
Abstract:
Degenerative discopathy is a common pathology which may require spine surgery. A metallic cylindrical pin is inserted into the vertebral body to maintain soft tissues and may be used as a reflector of ultrasonic wave to estimate bone density. The first aim of this paper is to validate a 3D model to simulate the ultrasonic propagation in a trabecular bone sample in which a metallic pin has been ins…
▽ More
Degenerative discopathy is a common pathology which may require spine surgery. A metallic cylindrical pin is inserted into the vertebral body to maintain soft tissues and may be used as a reflector of ultrasonic wave to estimate bone density. The first aim of this paper is to validate a 3D model to simulate the ultrasonic propagation in a trabecular bone sample in which a metallic pin has been inserted. We also aim at determining the effect of changes of bone volume fraction (BV/TV) and of positioning errors on the quantitative ultrasound (QUS) parameters in this specific configuration. The approach consists in coupling finite difference time domain simulation with X-ray microcomputed tomography. The correlation coefficient between experimental and simulated speed of sound (SOS) (respectively broadband ultrasonic attenuation (BUA)) was equal to 0.90 (respectively 0.55). The results show a significant correlation of SOS with BV/TV (R = 0.82), while BUA values exhibit a non-linear behavior versus BV/TV. The orientation of the pin should be controlled with an accuracy of around 1{\textdegree} in order to obtain accurate results. The results indicate that using the ultrasonic wave reflected by a pin has a potential to estimate the bone density. SOS is more reliable than BUA due its lower sensitivity to the tilt angle.
△ Less
Submitted 7 May, 2018;
originally announced May 2018.
-
Sequential localization of a complex electron fluid
Authors:
V. Martelli,
A. Cai,
E. M. Nica,
M. Taupin,
A. Prokofiev,
C. -C. Liu,
H. -H. Lai,
R. Yu,
K. Ingersent,
R. Küchler,
A. M. Strydom,
D. Geiger,
J. Haenel,
J. Larrea,
Q. Si,
S. Paschen
Abstract:
Complex and correlated quantum systems with promise for new functionality often involve entwined electronic degrees of freedom. In such materials, highly unusual properties emerge and could be the result of electron localization. Here, a cubic heavy fermion metal governed by spins and orbitals is chosen as a model system for this physics. Its properties are found to originate from surprisingly sim…
▽ More
Complex and correlated quantum systems with promise for new functionality often involve entwined electronic degrees of freedom. In such materials, highly unusual properties emerge and could be the result of electron localization. Here, a cubic heavy fermion metal governed by spins and orbitals is chosen as a model system for this physics. Its properties are found to originate from surprisingly simple low-energy behavior, with two distinct localization transitions driven by a single degree of freedom at a time. This result is unexpected, but we are able to understand it by advancing the notion of sequential destruction of an SU(4) spin-orbital-coupled Kondo entanglement. Our results implicate electron localization as a unified framework for strongly correlated materials and suggest ways to exploit multiple degrees of freedom for quantum engineering.
△ Less
Submitted 8 October, 2019; v1 submitted 27 September, 2017;
originally announced September 2017.
-
Quantum Clustering and Gaussian Mixtures
Authors:
Mahajabin Rahman,
Davi Geiger
Abstract:
The mixture of Gaussian distributions, a soft version of k-means , is considered a state-of-the-art clustering algorithm. It is widely used in computer vision for selecting classes, e.g., color, texture, and shapes. In this algorithm, each class is described by a Gaussian distribution, defined by its mean and covariance. The data is described by a weighted sum of these Gaussian distributions. We p…
▽ More
The mixture of Gaussian distributions, a soft version of k-means , is considered a state-of-the-art clustering algorithm. It is widely used in computer vision for selecting classes, e.g., color, texture, and shapes. In this algorithm, each class is described by a Gaussian distribution, defined by its mean and covariance. The data is described by a weighted sum of these Gaussian distributions. We propose a new method, inspired by quantum interference in physics. Instead of modeling each class distribution directly, we model a class wave function such that its magnitude square is the class Gaussian distribution. We then mix the class wave functions to create the mixture wave function. The final mixture distribution is then the magnitude square of the mixture wave function. As a result, we observe the quantum class interference phenomena, not present in the Gaussian mixture model. We show that the quantum method outperforms the Gaussian mixture method in every aspect of the estimations. It provides more accurate estimations of all distribution parameters, with much less fluctuations, and it is also more robust to data deformations from the Gaussian assumptions. We illustrate our method for color segmentation as an example application.
△ Less
Submitted 29 December, 2016;
originally announced December 2016.
-
Dependence and Relevance: A probabilistic view
Authors:
Dan Geiger,
David Heckerman
Abstract:
We examine three probabilistic concepts related to the sentence "two variables have no bearing on each other". We explore the relationships between these three concepts and establish their relevance to the process of constructing similarity networks---a tool for acquiring probabilistic knowledge from human experts. We also establish a precise relationship between connectedness in Bayesian networks…
▽ More
We examine three probabilistic concepts related to the sentence "two variables have no bearing on each other". We explore the relationships between these three concepts and establish their relevance to the process of constructing similarity networks---a tool for acquiring probabilistic knowledge from human experts. We also establish a precise relationship between connectedness in Bayesian networks and relevance in probability.
△ Less
Submitted 27 October, 2016;
originally announced November 2016.
-
A convolutional approach to reflection symmetry
Authors:
Marcelo Cicconet,
Vighnesh Birodkar,
Mads Lund,
Michael Werman,
Davi Geiger
Abstract:
We present a convolutional approach to reflection symmetry detection in 2D. Our model, built on the products of complex-valued wavelet convolutions, simplifies previous edge-based pairwise methods. Being parameter-centered, as opposed to feature-centered, it has certain computational advantages when the object sizes are known a priori, as demonstrated in an ellipse detection application. The metho…
▽ More
We present a convolutional approach to reflection symmetry detection in 2D. Our model, built on the products of complex-valued wavelet convolutions, simplifies previous edge-based pairwise methods. Being parameter-centered, as opposed to feature-centered, it has certain computational advantages when the object sizes are known a priori, as demonstrated in an ellipse detection application. The method outperforms the best-performing algorithm on the CVPR 2013 Symmetry Detection Competition Database in the single-symmetry case. Code and a new database for 2D symmetry detection is available.
△ Less
Submitted 16 September, 2016;
originally announced September 2016.
-
THz conductivity of Sr$_{1-x}$Ca$_x$RuO$_3$
Authors:
Diana Geiger,
Uwe S. Pracht,
Martin Dressel,
Jernej Mravlje,
Melanie Schneider,
Philipp Gegenwart,
Marc Scheffler
Abstract:
We investigate the optical conductivity of Sr$_{1-x}$Ca$_x$RuO$_3$ across the ferromagnetic to paramagnetic transition that occurs at $x=0.8$. The thin films were grown by metalorganic aerosol deposition with $0 \leq x \leq 1$ onto NdGaO$_3$ substrates. We performed THz frequency domain spectroscopy in a frequency range from 3~cm$^{-1}$ to 40~cm$^{-1}$ (100~GHz to 1.4~THz) and at temperatures rang…
▽ More
We investigate the optical conductivity of Sr$_{1-x}$Ca$_x$RuO$_3$ across the ferromagnetic to paramagnetic transition that occurs at $x=0.8$. The thin films were grown by metalorganic aerosol deposition with $0 \leq x \leq 1$ onto NdGaO$_3$ substrates. We performed THz frequency domain spectroscopy in a frequency range from 3~cm$^{-1}$ to 40~cm$^{-1}$ (100~GHz to 1.4~THz) and at temperatures ranging from 5~K to 300~K, measuring transmittivity and phase shift through the films. From this we obtained real and imaginary parts of the optical conductivity. The end-members, ferromagnetic SrRuO$_3$ and paramagnetic CaRuO$_3$, show a strongly frequency-dependent metallic response at temperatures below 20~K. Due to the high quality of these samples we can access pronounced intrinsic electronic contributions to the optical scattering rate, which at 1.4~THz exceeds the residual scattering rate by more than a factor of three. Deviations from a Drude response start at about 0.7~THz for both end-members in a remarkably similar way. For the intermediate members a higher residual scattering originating in the compositional disorder leads to a featureless optical response, instead. The relevance of low-lying interband transitions is addressed by a calculation of the optical conductivity within density functional theory in the local density approximation (LDA).
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
Quantum Pairwise Symmetry: Applications in 2D Shape Analysis
Authors:
Marcelo Cicconet,
Davi Geiger,
Michael Werman
Abstract:
A pair of rooted tangents -- defining a quantum triangle -- with an associated quantum wave of spin 1/2 is proposed as the primitive to represent and compute symmetry. Measures of the spin characterize how "isosceles" or how "degenerate" these triangles are -- which corresponds to their mirror or parallel symmetry. We also introduce a complex-valued kernel to model probability errors in the parame…
▽ More
A pair of rooted tangents -- defining a quantum triangle -- with an associated quantum wave of spin 1/2 is proposed as the primitive to represent and compute symmetry. Measures of the spin characterize how "isosceles" or how "degenerate" these triangles are -- which corresponds to their mirror or parallel symmetry. We also introduce a complex-valued kernel to model probability errors in the parameter space, which is more robust to noise and clutter than the classical model.
△ Less
Submitted 9 February, 2015; v1 submitted 2 February, 2015;
originally announced February 2015.
-
Complex-Valued Hough Transforms for Circles
Authors:
Marcelo Cicconet,
Davi Geiger,
Michael Werman
Abstract:
This paper advocates the use of complex variables to represent votes in the Hough transform for circle detection. Replacing the positive numbers classically used in the parameter space of the Hough transforms by complex numbers allows cancellation effects when adding up the votes. Cancellation and the computation of shape likelihood via a complex number's magnitude square lead to more robust solut…
▽ More
This paper advocates the use of complex variables to represent votes in the Hough transform for circle detection. Replacing the positive numbers classically used in the parameter space of the Hough transforms by complex numbers allows cancellation effects when adding up the votes. Cancellation and the computation of shape likelihood via a complex number's magnitude square lead to more robust solutions than the "classic" algorithms, as shown by computational experiments on synthetic and real datasets.
△ Less
Submitted 9 February, 2015; v1 submitted 2 February, 2015;
originally announced February 2015.
-
Accurate Liability Estimation Improves Power in Ascertained Case Control Studies
Authors:
Omer Weissbrod,
Christoph Lippert,
Dan Geiger,
David Heckerman
Abstract:
Linear mixed models (LMMs) have emerged as the method of choice for confounded genome-wide association studies. However, the performance of LMMs in non-randomly ascertained case-control studies deteriorates with increasing sample size. We propose a framework called LEAP (Liability Estimator As a Phenotype, https://github.com/omerwe/LEAP) that tests for association with estimated latent values corr…
▽ More
Linear mixed models (LMMs) have emerged as the method of choice for confounded genome-wide association studies. However, the performance of LMMs in non-randomly ascertained case-control studies deteriorates with increasing sample size. We propose a framework called LEAP (Liability Estimator As a Phenotype, https://github.com/omerwe/LEAP) that tests for association with estimated latent values corresponding to severity of phenotype, and demonstrate that this can lead to a substantial power increase.
△ Less
Submitted 21 February, 2016; v1 submitted 8 September, 2014;
originally announced September 2014.
-
Random Algorithms for the Loop Cutset Problem
Authors:
Ann Becker,
Reuven Bar-Yehuada,
Dan Geiger
Abstract:
We show how to find a minimum loop cutset in a Bayesian network with high probability. Finding such a loop cutset is the first step in Pearl's method of conditioning for inference. Our random algorithm for finding a loop cutset, called "Repeated WGuessI", outputs a minimum loop cutset, after O(c 6^k k n) steps, with probability at least 1-(1 over{6^k})^{c 6^k}), where c>1 is a constant specified…
▽ More
We show how to find a minimum loop cutset in a Bayesian network with high probability. Finding such a loop cutset is the first step in Pearl's method of conditioning for inference. Our random algorithm for finding a loop cutset, called "Repeated WGuessI", outputs a minimum loop cutset, after O(c 6^k k n) steps, with probability at least 1-(1 over{6^k})^{c 6^k}), where c>1 is a constant specified by the user, k is the size of a minimum weight loop cutset, and n is the number of vertices. We also show empirically that a variant of this algorithm, called WRA, often finds a loop cutset that is closer to the minimum loop cutset than the ones found by the best deterministic algorithms known.
△ Less
Submitted 7 August, 2014;
originally announced August 2014.
-
Numerical correction of anti-symmetric aberrations in single HRTEM images of weakly scattering 2D-objects
Authors:
Ossi Lehtinen,
Dorin Geiger,
Zhongbo Lee,
Michale B. Whitwick,
Ming-Wei Chen,
Andras Kis,
Ute Kaiser
Abstract:
Here, we present a numerical post-processing method for removing the effect of anti-symmetric residual aberrations in high-resolution transmission electron microscopy (HRTEM) images of weakly scattering 2D-objects. The method is based on applying the same aberrations with the opposite phase to the Fourier transform of the recorded image intensity and subsequently inverting the Fourier transform. W…
▽ More
Here, we present a numerical post-processing method for removing the effect of anti-symmetric residual aberrations in high-resolution transmission electron microscopy (HRTEM) images of weakly scattering 2D-objects. The method is based on applying the same aberrations with the opposite phase to the Fourier transform of the recorded image intensity and subsequently inverting the Fourier transform. We present the theoretical justification of the method and its verification based on simulated images in the case of low-order anti-symmetric aberrations. Ultimately the method is applied to experimental hardware aberration-corrected HRTEM images of single-layer graphene and MoSe2 resulting in images with strongly reduced residual low-order aberrations, and consequently improved interpretability. Alternatively, this method can be used to estimate by trial and error the residual anti-symmetric aberrations in HRTEM images of weakly scattering objects.
△ Less
Submitted 16 January, 2015; v1 submitted 8 July, 2014;
originally announced July 2014.
-
Low-energy electronic properties of clean CaRuO$_3$: elusive Landau quasiparticles
Authors:
M. Schneider,
D. Geiger,
S. Esser,
U. S. Pracht,
C. Stingl,
Y. Tokiwa,
V. Moshnyaga,
I. Sheikin,
J. Mravlje,
M. Scheffler,
P. Gegenwart
Abstract:
We have prepared high-quality epitaxial thin films of CaRuO$_3$ with residual resistivity ratios up to 55. Shubnikov-de Haas oscillations in the magnetoresistance and a $T^2$ temperature dependence in the electrical resistivity only below 1.5 K, whose coefficient is substantially suppressed in large magnetic fields, establish CaRuO$_3$ as a Fermi liquid (FL) with anomalously low coherence scale. N…
▽ More
We have prepared high-quality epitaxial thin films of CaRuO$_3$ with residual resistivity ratios up to 55. Shubnikov-de Haas oscillations in the magnetoresistance and a $T^2$ temperature dependence in the electrical resistivity only below 1.5 K, whose coefficient is substantially suppressed in large magnetic fields, establish CaRuO$_3$ as a Fermi liquid (FL) with anomalously low coherence scale. Non-Fermi liquid (NFL) $T^{3/2}$ dependence is found between 2 and 25 K. The high sample quality allows access to the intrinsic electronic properties via THz spectroscopy. For frequencies below 0.6 THz, the conductivity is Drude-like and can be modeled by FL concepts, while for higher frequencies non-Drude behavior, inconsistent with FL predictions, is found. This establishes CaRuO$_3$ as a prime example of optical NFL behavior in the THz range.
△ Less
Submitted 13 December, 2013;
originally announced December 2013.
-
A Dynamic Programming Solution to the Monotonic Path of Minimal Cost in a 3-Rows Matrix
Authors:
Marcelo Cicconet,
Davi Geiger
Abstract:
We consider the problem of finding the path of minimal cost going from left to right in a 3-rows matrix, starting at the third row, and not going downwards, where there is an additional cost related to not changing rows, such that the higher the change in intensity within the row, the higher the cost of not moving upwards.
We consider the problem of finding the path of minimal cost going from left to right in a 3-rows matrix, starting at the third row, and not going downwards, where there is an additional cost related to not changing rows, such that the higher the change in intensity within the row, the higher the cost of not moving upwards.
△ Less
Submitted 16 October, 2013;
originally announced October 2013.
-
Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence (1997)
Authors:
Dan Geiger,
Prakash Shenoy
Abstract:
This is the Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence, which was held in Providence, RI, August 1-3, 1997
This is the Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence, which was held in Providence, RI, August 1-3, 1997
△ Less
Submitted 13 April, 2013;
originally announced April 2013.
-
On the Logic of Causal Models
Authors:
Dan Geiger,
Judea Pearl
Abstract:
This paper explores the role of Directed Acyclic Graphs (DAGs) as a representation of conditional independence relationships. We show that DAGs offer polynomially sound and complete inference mechanisms for inferring conditional independence relationships from a given causal set of such relationships. As a consequence, d-separation, a graphical criterion for identifying independencies in a DAG,…
▽ More
This paper explores the role of Directed Acyclic Graphs (DAGs) as a representation of conditional independence relationships. We show that DAGs offer polynomially sound and complete inference mechanisms for inferring conditional independence relationships from a given causal set of such relationships. As a consequence, d-separation, a graphical criterion for identifying independencies in a DAG, is shown to uncover more valid independencies then any other criterion. In addition, we employ the Armstrong property of conditional independence to show that the dependence relationships displayed by a DAG are inherently consistent, i.e. for every DAG D there exists some probability distribution P that embodies all the conditional independencies displayed in D and none other.
△ Less
Submitted 27 March, 2013;
originally announced April 2013.
-
d-Separation: From Theorems to Algorithms
Authors:
Dan Geiger,
Tom S. Verma,
Judea Pearl
Abstract:
An efficient algorithm is developed that identifies all independencies implied by the topology of a Bayesian network. Its correctness and maximality stems from the soundness and completeness of d-separation with respect to probability theory. The algorithm runs in time O (l E l) where E is the number of edges in the network.
An efficient algorithm is developed that identifies all independencies implied by the topology of a Bayesian network. Its correctness and maximality stems from the soundness and completeness of d-separation with respect to probability theory. The algorithm runs in time O (l E l) where E is the number of edges in the network.
△ Less
Submitted 27 March, 2013;
originally announced April 2013.
-
Separable and transitive graphoids
Authors:
Dan Geiger,
David Heckerman
Abstract:
We examine three probabilistic formulations of the sentence a and b are totally unrelated with respect to a given set of variables U. First, two variables a and b are totally independent if they are independent given any value of any subset of the variables in U. Second, two variables are totally uncoupled if U can be partitioned into two marginally independent sets containing a and b respectively…
▽ More
We examine three probabilistic formulations of the sentence a and b are totally unrelated with respect to a given set of variables U. First, two variables a and b are totally independent if they are independent given any value of any subset of the variables in U. Second, two variables are totally uncoupled if U can be partitioned into two marginally independent sets containing a and b respectively. Third, two variables are totally disconnected if the corresponding nodes are disconnected in every belief network representation. We explore the relationship between these three formulations of unrelatedness and explain their relevance to the process of acquiring probabilistic knowledge from human experts.
△ Less
Submitted 16 May, 2015; v1 submitted 27 March, 2013;
originally announced April 2013.
-
Advances in Probabilistic Reasoning
Authors:
Dan Geiger,
David Heckerman
Abstract:
This paper discuses multiple Bayesian networks representation paradigms for encoding asymmetric independence assertions. We offer three contributions: (1) an inference mechanism that makes explicit use of asymmetric independence to speed up computations, (2) a simplified definition of similarity networks and extensions of their theory, and (3) a generalized representation scheme that encodes more…
▽ More
This paper discuses multiple Bayesian networks representation paradigms for encoding asymmetric independence assertions. We offer three contributions: (1) an inference mechanism that makes explicit use of asymmetric independence to speed up computations, (2) a simplified definition of similarity networks and extensions of their theory, and (3) a generalized representation scheme that encodes more types of asymmetric independence assertions than do similarity networks.
△ Less
Submitted 16 May, 2015; v1 submitted 20 March, 2013;
originally announced March 2013.
-
An Entropy-based Learning Algorithm of Bayesian Conditional Trees
Authors:
Dan Geiger
Abstract:
This article offers a modification of Chow and Liu's learning algorithm in the context of handwritten digit recognition. The modified algorithm directs the user to group digits into several classes consisting of digits that are hard to distinguish and then constructing an optimal conditional tree representation for each class of digits instead of for each single digit as done by Chow and Liu (196…
▽ More
This article offers a modification of Chow and Liu's learning algorithm in the context of handwritten digit recognition. The modified algorithm directs the user to group digits into several classes consisting of digits that are hard to distinguish and then constructing an optimal conditional tree representation for each class of digits instead of for each single digit as done by Chow and Liu (1968). Advantages and extensions of the new method are discussed. Related works of Wong and Wang (1977) and Wong and Poon (1989) which offer a different entropy-based learning algorithm are shown to rest on inappropriate assumptions.
△ Less
Submitted 13 March, 2013;
originally announced March 2013.
-
Inference Algorithms for Similarity Networks
Authors:
Dan Geiger,
David Heckerman
Abstract:
We examine two types of similarity networks each based on a distinct notion of relevance. For both types of similarity networks we present an efficient inference algorithm that works under the assumption that every event has a nonzero probability of occurrence. Another inference algorithm is developed for type 1 similarity networks that works under no restriction, albeit less efficiently.
We examine two types of similarity networks each based on a distinct notion of relevance. For both types of similarity networks we present an efficient inference algorithm that works under the assumption that every event has a nonzero probability of occurrence. Another inference algorithm is developed for type 1 similarity networks that works under no restriction, albeit less efficiently.
△ Less
Submitted 16 May, 2015; v1 submitted 6 March, 2013;
originally announced March 2013.
-
Learning Bayesian Networks: The Combination of Knowledge and Statistical Data
Authors:
David Heckerman,
Dan Geiger,
David Maxwell Chickering
Abstract:
We describe algorithms for learning Bayesian networks from a combination of user knowledge and statistical data. The algorithms have two components: a scoring metric and a search procedure. The scoring metric takes a network structure, statistical data, and a user's prior knowledge, and returns a score proportional to the posterior probability of the network structure given the data. The search pr…
▽ More
We describe algorithms for learning Bayesian networks from a combination of user knowledge and statistical data. The algorithms have two components: a scoring metric and a search procedure. The scoring metric takes a network structure, statistical data, and a user's prior knowledge, and returns a score proportional to the posterior probability of the network structure given the data. The search procedure generates networks for evaluation by the scoring metric. Our contributions are threefold. First, we identify two important properties of metrics, which we call event equivalence and parameter modularity. These properties have been mostly ignored, but when combined, greatly simplify the encoding of a user's prior knowledge. In particular, a user can express her knowledge-for the most part-as a single prior Bayesian network for the domain. Second, we describe local search and annealing algorithms to be used in conjunction with scoring metrics. In the special case where each node has at most one parent, we show that heuristic search can be replaced with a polynomial algorithm to identify the networks with the highest score. Third, we describe a methodology for evaluating Bayesian-network learning algorithms. We apply this approach to a comparison of metrics and search procedures.
△ Less
Submitted 16 May, 2015; v1 submitted 27 February, 2013;
originally announced February 2013.
-
On Testing Whether an Embedded Bayesian Network Represents a Probability Model
Authors:
Dan Geiger,
Azaria Paz,
Judea Pearl
Abstract:
Testing the validity of probabilistic models containing unmeasured (hidden) variables is shown to be a hard task. We show that the task of testing whether models are structurally incompatible with the data at hand, requires an exponential number of independence evaluations, each of the form: "X is conditionally independent of Y, given Z." In contrast, a linear number of such evaluations is requi…
▽ More
Testing the validity of probabilistic models containing unmeasured (hidden) variables is shown to be a hard task. We show that the task of testing whether models are structurally incompatible with the data at hand, requires an exponential number of independence evaluations, each of the form: "X is conditionally independent of Y, given Z." In contrast, a linear number of such evaluations is required to test a standard Bayesian network (one per vertex). On the positive side, we show that if a network with hidden variables G has a tree skeleton, checking whether G represents a given probability model P requires the polynomial number of such independence evaluations. Moreover, we provide an algorithm that efficiently constructs a tree-structured Bayesian network (with hidden variables) that represents P if such a network exists, and further recognizes when such a network does not exist.
△ Less
Submitted 27 February, 2013;
originally announced February 2013.
-
Learning Gaussian Networks
Authors:
Dan Geiger,
David Heckerman
Abstract:
We describe algorithms for learning Bayesian networks from a combination of user knowledge and statistical data. The algorithms have two components: a scoring metric and a search procedure. The scoring metric takes a network structure, statistical data, and a user's prior knowledge, and returns a score proportional to the posterior probability of the network structure given the data. The search pr…
▽ More
We describe algorithms for learning Bayesian networks from a combination of user knowledge and statistical data. The algorithms have two components: a scoring metric and a search procedure. The scoring metric takes a network structure, statistical data, and a user's prior knowledge, and returns a score proportional to the posterior probability of the network structure given the data. The search procedure generates networks for evaluation by the scoring metric. Previous work has concentrated on metrics for domains containing only discrete variables, under the assumption that data represents a multinomial sample. In this paper, we extend this work, develo** scoring metrics for domains containing all continuous variables or a mixture of discrete and continuous variables, under the assumption that continuous data is sampled from a multivariate normal distribution. Our work extends traditional statistical approaches for identifying vanishing regression coefficients in that we identify two important assumptions, called event equivalence and parameter modularity, that when combined allow the construction of prior distributions for multivariate normal parameters from a single prior Bayesian network specified by a user.
△ Less
Submitted 27 June, 2021; v1 submitted 27 February, 2013;
originally announced February 2013.
-
Approximation Algorithms for the Loop Cutset Problem
Authors:
Ann Becker,
Dan Geiger
Abstract:
We show how to find a small loop curser in a Bayesian network. Finding such a loop cutset is the first step in the method of conditioning for inference. Our algorithm for finding a loop cutset, called MGA, finds a loop cutset which is guaranteed in the worst case to contain less than twice the number of variables contained in a minimum loop cutset. We test MGA on randomly generated graphs and f…
▽ More
We show how to find a small loop curser in a Bayesian network. Finding such a loop cutset is the first step in the method of conditioning for inference. Our algorithm for finding a loop cutset, called MGA, finds a loop cutset which is guaranteed in the worst case to contain less than twice the number of variables contained in a minimum loop cutset. We test MGA on randomly generated graphs and find that the average ratio between the number of instances associated with the algorithms' output and the number of instances associated with a minimum solution is 1.22.
△ Less
Submitted 27 February, 2013;
originally announced February 2013.
-
Learning Bayesian Networks: A Unification for Discrete and Gaussian Domains
Authors:
David Heckerman,
Dan Geiger
Abstract:
We examine Bayesian methods for learning Bayesian networks from a combination of prior knowledge and statistical data. In particular, we unify the approaches we presented at last year's conference for discrete and Gaussian domains. We derive a general Bayesian scoring metric, appropriate for both domains. We then use this metric in combination with well-known statistical facts about the Dirichlet…
▽ More
We examine Bayesian methods for learning Bayesian networks from a combination of prior knowledge and statistical data. In particular, we unify the approaches we presented at last year's conference for discrete and Gaussian domains. We derive a general Bayesian scoring metric, appropriate for both domains. We then use this metric in combination with well-known statistical facts about the Dirichlet and normal--Wishart distributions to derive our metrics for discrete and Gaussian domains.
△ Less
Submitted 29 June, 2021; v1 submitted 20 February, 2013;
originally announced February 2013.
-
A Characterization of the Dirichlet Distribution with Application to Learning Bayesian Networks
Authors:
Dan Geiger,
David Heckerman
Abstract:
We provide a new characterization of the Dirichlet distribution. This characterization implies that under assumptions made by several previous authors for learning belief networks, a Dirichlet prior on the parameters is inevitable.
We provide a new characterization of the Dirichlet distribution. This characterization implies that under assumptions made by several previous authors for learning belief networks, a Dirichlet prior on the parameters is inevitable.
△ Less
Submitted 20 February, 2013;
originally announced February 2013.
-
Asymptotic Model Selection for Directed Networks with Hidden Variables
Authors:
Dan Geiger,
David Heckerman,
Christopher Meek
Abstract:
We extend the Bayesian Information Criterion (BIC), an asymptotic approximation for the marginal likelihood, to Bayesian networks with hidden variables. This approximation can be used to select models given large samples of data. The standard BIC as well as our extension punishes the complexity of a model according to the dimension of its parameters. We argue that the dimension of a Bayesian netwo…
▽ More
We extend the Bayesian Information Criterion (BIC), an asymptotic approximation for the marginal likelihood, to Bayesian networks with hidden variables. This approximation can be used to select models given large samples of data. The standard BIC as well as our extension punishes the complexity of a model according to the dimension of its parameters. We argue that the dimension of a Bayesian network with hidden variables is the rank of the Jacobian matrix of the transformation between the parameters of the network and the parameters of the observable variables. We compute the dimensions of several networks including the naive Bayes model with a hidden root node.
△ Less
Submitted 16 May, 2015; v1 submitted 13 February, 2013;
originally announced February 2013.
-
A Sufficiently Fast Algorithm for Finding Close to Optimal Junction Trees
Authors:
Ann Becker,
Dan Geiger
Abstract:
An algorithm is developed for finding a close to optimal junction tree of a given graph G. The algorithm has a worst case complexity O(c^k n^a) where a and c are constants, n is the number of vertices, and k is the size of the largest clique in a junction tree of G in which this size is minimized. The algorithm guarantees that the logarithm of the size of the state space of the heaviest clique in…
▽ More
An algorithm is developed for finding a close to optimal junction tree of a given graph G. The algorithm has a worst case complexity O(c^k n^a) where a and c are constants, n is the number of vertices, and k is the size of the largest clique in a junction tree of G in which this size is minimized. The algorithm guarantees that the logarithm of the size of the state space of the heaviest clique in the junction tree produced is less than a constant factor off the optimal value. When k = O(log n), our algorithm yields a polynomial inference algorithm for Bayesian networks.
△ Less
Submitted 13 February, 2013;
originally announced February 2013.
-
Graphical Models and Exponential Families
Authors:
Dan Geiger,
Christopher Meek
Abstract:
We provide a classification of graphical models according to their representation as subfamilies of exponential families. Undirected graphical models with no hidden variables are linear exponential families (LEFs), directed acyclic graphical models and chain graphs with no hidden variables, including Bayesian networks with several families of local distributions, are curved exponential families (C…
▽ More
We provide a classification of graphical models according to their representation as subfamilies of exponential families. Undirected graphical models with no hidden variables are linear exponential families (LEFs), directed acyclic graphical models and chain graphs with no hidden variables, including Bayesian networks with several families of local distributions, are curved exponential families (CEFs) and graphical models with hidden variables are stratified exponential families (SEFs). An SEF is a finite union of CEFs satisfying a frontier condition. In addition, we illustrate how one can automatically generate independence and non-independence constraints on the distributions over the observable variables implied by a Bayesian network with hidden variables. The relevance of these results for model selection is examined.
△ Less
Submitted 30 January, 2013;
originally announced January 2013.
-
Quantifier Elimination for Statistical Problems
Authors:
Dan Geiger,
Christopher Meek
Abstract:
Recent improvement on Tarski's procedure for quantifier elimination in the first order theory of real numbers makes it feasible to solve small instances of the following problems completely automatically: 1. listing all equality and inequality constraints implied by a graphical model with hidden variables. 2. Comparing graphyical models with hidden variables (i.e., model equivalence, inclusion, an…
▽ More
Recent improvement on Tarski's procedure for quantifier elimination in the first order theory of real numbers makes it feasible to solve small instances of the following problems completely automatically: 1. listing all equality and inequality constraints implied by a graphical model with hidden variables. 2. Comparing graphyical models with hidden variables (i.e., model equivalence, inclusion, and overlap). 3. Answering questions about the identification of a model or portion of a model, and about bounds on quantities derived from a model. 4. Determing whether a given set of independence assertions. We discuss the foundation of quantifier elimination and demonstrate its application to these problems.
△ Less
Submitted 23 January, 2013;
originally announced January 2013.
-
Parameter Priors for Directed Acyclic Graphical Models and the Characterization of Several Probability Distributions
Authors:
Dan Geiger,
David Heckerman
Abstract:
We show that the only parameter prior for complete Gaussian DAG models that satisfies global parameter independence, complete model equivalence, and some weak regularity assumptions, is the normal-Wishart distribution. Our analysis is based on the following new characterization of the Wishart distribution: let W be an n x n, n >= 3, positive-definite symmetric matrix of random variables and f(W) b…
▽ More
We show that the only parameter prior for complete Gaussian DAG models that satisfies global parameter independence, complete model equivalence, and some weak regularity assumptions, is the normal-Wishart distribution. Our analysis is based on the following new characterization of the Wishart distribution: let W be an n x n, n >= 3, positive-definite symmetric matrix of random variables and f(W) be a pdf of W. Then, f(W) is a Wishart distribution if and only if W_{11}-W_{12}W_{22}^{-1}W_{12}' is independent of {W_{12}, W_{22}} for every block partitioning W_{11}, W_{12}, W_{12}', W_{22} of W. Similar characterizations of the normal and normal-Wishart distributions are provided as well. We also show how to construct a prior for every DAG model over X from the prior of a single regression model.
△ Less
Submitted 29 June, 2021; v1 submitted 23 January, 2013;
originally announced January 2013.
-
Likelihood Computations Using Value Abstractions
Authors:
Nir Friedman,
Dan Geiger,
Noam Lotner
Abstract:
In this paper, we use evidence-specific value abstraction for speeding Bayesian networks inference. This is done by grou** variable values and treating the combined values as a single entity. As we show, such abstractions can exploit regularities in conditional probability distributions and also the specific values of observed variables. To formally justify value abstraction, we define the notio…
▽ More
In this paper, we use evidence-specific value abstraction for speeding Bayesian networks inference. This is done by grou** variable values and treating the combined values as a single entity. As we show, such abstractions can exploit regularities in conditional probability distributions and also the specific values of observed variables. To formally justify value abstraction, we define the notion of safe value abstraction and devise inference algorithms that use it to reduce the cost of inference. Our procedure is particularly useful for learning complex networks with many hidden variables. In such cases, repeated likelihood computations are required for EM or other parameter optimization techniques. Since these computations are repeated with respect to the same evidence set, our methods can provide significant speedup to the learning procedure. We demonstrate the algorithm on genetic linkage problems where the use of value abstraction sometimes differentiates between a feasible and non-feasible solution.
△ Less
Submitted 16 January, 2013;
originally announced January 2013.
-
Perfect Tree-Like Markovian Distributions
Authors:
Ann Becker,
Dan Geiger,
Christopher Meek
Abstract:
We show that if a strictly positive joint probability distribution for a set of binary random variables factors according to a tree, then vertex separation represents all and only the independence relations enclosed in the distribution. The same result is shown to hold also for multivariate strictly positive normal distributions. Our proof uses a new property of conditional independence that hold…
▽ More
We show that if a strictly positive joint probability distribution for a set of binary random variables factors according to a tree, then vertex separation represents all and only the independence relations enclosed in the distribution. The same result is shown to hold also for multivariate strictly positive normal distributions. Our proof uses a new property of conditional independence that holds for these two classes of probability distributions.
△ Less
Submitted 16 January, 2013;
originally announced January 2013.
-
A Geometric Descriptor for Cell-Division Detection
Authors:
Marcelo Cicconet,
Italo Lima,
Davi Geiger,
Kris Gunsalus
Abstract:
We describe a method for cell-division detection based on a geometric-driven descriptor that can be represented as a 5-layers processing network, based mainly on wavelet filtering and a test for mirror symmetry between pairs of pixels. After the centroids of the descriptors are computed for a sequence of frames, the two-steps piecewise constant function that best fits the sequence of centroids det…
▽ More
We describe a method for cell-division detection based on a geometric-driven descriptor that can be represented as a 5-layers processing network, based mainly on wavelet filtering and a test for mirror symmetry between pairs of pixels. After the centroids of the descriptors are computed for a sequence of frames, the two-steps piecewise constant function that best fits the sequence of centroids determines the frame where the division occurs.
△ Less
Submitted 10 April, 2013; v1 submitted 15 January, 2013;
originally announced January 2013.
-
Asymptotic Model Selection for Naive Bayesian Networks
Authors:
Dmitry Rusakov,
Dan Geiger
Abstract:
We develop a closed form asymptotic formula to compute the marginal likelihood of data given a naive Bayesian network model with two hidden states and binary features. This formula deviates from the standard BIC score. Our work provides a concrete example that the BIC score is generally not valid for statistical models that belong to a stratified exponential family. This stands in contrast to line…
▽ More
We develop a closed form asymptotic formula to compute the marginal likelihood of data given a naive Bayesian network model with two hidden states and binary features. This formula deviates from the standard BIC score. Our work provides a concrete example that the BIC score is generally not valid for statistical models that belong to a stratified exponential family. This stands in contrast to linear and curved exponential families, where the BIC score has been proven to provide a correct approximation for the marginal likelihood.
△ Less
Submitted 12 December, 2012;
originally announced January 2013.
-
Factorization of Discrete Probability Distributions
Authors:
Dan Geiger,
Christopher Meek,
Bernd Sturmfels
Abstract:
We formulate necessary and sufficient conditions for an arbitrary discrete probability distribution to factor according to an undirected graphical model, or a log-linear model, or other more general exponential models. This result generalizes the well known Hammersley-Clifford Theorem.
We formulate necessary and sufficient conditions for an arbitrary discrete probability distribution to factor according to an undirected graphical model, or a log-linear model, or other more general exponential models. This result generalizes the well known Hammersley-Clifford Theorem.
△ Less
Submitted 12 December, 2012;
originally announced January 2013.
-
Automated Analytic Asymptotic Evaluation of the Marginal Likelihood for Latent Models
Authors:
Dmitry Rusakov,
Dan Geiger
Abstract:
We present and implement two algorithms for analytic asymptotic evaluation of the marginal likelihood of data given a Bayesian network with hidden nodes. As shown by previous work, this evaluation is particularly hard for latent Bayesian network models, namely networks that include hidden variables, where asymptotic approximation deviates from the standard BIC score. Our algorithms…
▽ More
We present and implement two algorithms for analytic asymptotic evaluation of the marginal likelihood of data given a Bayesian network with hidden nodes. As shown by previous work, this evaluation is particularly hard for latent Bayesian network models, namely networks that include hidden variables, where asymptotic approximation deviates from the standard BIC score. Our algorithms solve two central difficulties in asymptotic evaluation of marginal likelihood integrals, namely, evaluation of regular dimensionality drop for latent Bayesian network models and computation of non-standard approximation formulas for singular statistics for these models. The presented algorithms are implemented in Matlab and Maple and their usage is demonstrated for marginal likelihood approximations for Bayesian networks with hidden variables.
△ Less
Submitted 19 October, 2012;
originally announced December 2012.
-
A Distance-Based Branch and Bound Feature Selection Algorithm
Authors:
Ari Frank,
Dan Geiger,
Zohar Yakhini
Abstract:
There is no known efficient method for selecting k Gaussian features from n which achieve the lowest Bayesian classification error. We show an example of how greedy algorithms faced with this task are led to give results that are not optimal. This motivates us to propose a more robust approach. We present a Branch and Bound algorithm for finding a subset of k independent Gaussian…
▽ More
There is no known efficient method for selecting k Gaussian features from n which achieve the lowest Bayesian classification error. We show an example of how greedy algorithms faced with this task are led to give results that are not optimal. This motivates us to propose a more robust approach. We present a Branch and Bound algorithm for finding a subset of k independent Gaussian features which minimizes the naive Bayesian classification error. Our algorithm uses additive monotonic distance measures to produce bounds for the Bayesian classification error in order to exclude many feature subsets from evaluation, while still returning an optimal solution. We test our method on synthetic data as well as data obtained from gene expression profiling.
△ Less
Submitted 19 October, 2012;
originally announced December 2012.