-
A Utility-Preserving GAN for Face Obscuration
Authors:
Hanxiang Hao,
David Güera,
Amy R. Reibman,
Edward J. Delp
Abstract:
From TV news to Google StreetView, face obscuration has been used for privacy protection. Due to recent advances in the field of deep learning, obscuration methods such as Gaussian blurring and pixelation are not guaranteed to conceal identity. In this paper, we propose a utility-preserving generative model, UP-GAN, that is able to provide an effective face obscuration, while preserving facial uti…
▽ More
From TV news to Google StreetView, face obscuration has been used for privacy protection. Due to recent advances in the field of deep learning, obscuration methods such as Gaussian blurring and pixelation are not guaranteed to conceal identity. In this paper, we propose a utility-preserving generative model, UP-GAN, that is able to provide an effective face obscuration, while preserving facial utility. By utility-preserving we mean preserving facial features that do not reveal identity, such as age, gender, skin tone, pose, and expression. We show that the proposed method achieves the best performance in terms of obscuration and utility preservation.
△ Less
Submitted 27 June, 2019;
originally announced June 2019.
-
An experiment to search for dark matter interactions using sodium iodide detectors
Authors:
Govinda Adhikari,
Pushparaj Adhikari,
Estella Barbosa de Souza,
Nelson Carlin,
Seonho Choi,
Mitra Djamal,
Anthony C. Ezeribe,
Chang Hyon Ha,
Insik Hahn,
Antonia J. F. Hubbard,
Eunju Jeon,
Jay Hyun Jo,
Hanwool Joo,
Woon Gu Kang,
Woosik Kang,
Matthew Kauer,
Bonghee Kim,
Hyounggyu Kim,
Hongjoo Kim,
Kyungwon Kim,
Nam Young Kim,
Sun Kee Kim,
Yeongduk Kim,
Yong-Hamb Kim,
Young Ju Ko
, et al. (25 additional authors not shown)
Abstract:
Observations of galaxies and primordial radiation suggest that the Universe is made mostly of non-luminous dark matter. Several types of new fundamental particles have been proposed as candidates for dark matter such as weakly interacting massive particles (WIMPs) but no definitive signal has been seen despite concerted efforts by many collaborations. One exception is the much-debated claim by the…
▽ More
Observations of galaxies and primordial radiation suggest that the Universe is made mostly of non-luminous dark matter. Several types of new fundamental particles have been proposed as candidates for dark matter such as weakly interacting massive particles (WIMPs) but no definitive signal has been seen despite concerted efforts by many collaborations. One exception is the much-debated claim by the DAMA collaboration of a statistically significant annual modulation in the event rate of their experiment with a period and phase consistent with that expected from WIMP dark matter. Several groups have been working to develop experiments with the aim of reproducing DAMA's results using the same target medium. Here we report results from the initial operation of the COSINE-100 experiment. COSINE-100 uses sodium iodide as the target medium-the same medium as DAMA-and is designed to carry out a model-independent test of DAMA's claim. Initial data based on the first 59.5 days indicate that there is no excess of events over the expected background, confirming that DAMA's annual modulation signal is in severe tension with results from other experiments under the assumption of dark matter having spin independent interactions and the Standard Halo Model. COSINE-100 is now taking data to study the presence of dark matter-induced annual modulation in the event rate of the sodium iodide detectors.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
Laplace-Beltrami Operators on Noncommutative Tori
Authors:
Hyunsu Ha,
Raphael Ponge
Abstract:
In this paper, we construct Laplace-Beltrami operators associated with arbitrary Riemannian metrics on noncommutative tori of any dimension. These operators enjoy the main properties of the Laplace-Beltrami operators on ordinary Riemannian manifolds. The construction takes into account the non-triviality of the group of modular automorphisms. On the way we introduce notions of Riemannian density a…
▽ More
In this paper, we construct Laplace-Beltrami operators associated with arbitrary Riemannian metrics on noncommutative tori of any dimension. These operators enjoy the main properties of the Laplace-Beltrami operators on ordinary Riemannian manifolds. The construction takes into account the non-triviality of the group of modular automorphisms. On the way we introduce notions of Riemannian density and Riemannian volumes for noncommutative tori.
△ Less
Submitted 8 January, 2020; v1 submitted 22 May, 2019;
originally announced May 2019.
-
Robustness Analysis of Face Obscuration
Authors:
Hanxiang Hao,
David Güera,
János Horváth,
Amy R. Reibman,
Edward J. Delp
Abstract:
Face obscuration is needed by law enforcement and mass media outlets to guarantee privacy. Sharing sensitive content where obscuration or redaction techniques have failed to completely remove all identifiable traces can lead to many legal and social issues. Hence, we need to be able to systematically measure the face obscuration performance of a given technique. In this paper we propose to measure…
▽ More
Face obscuration is needed by law enforcement and mass media outlets to guarantee privacy. Sharing sensitive content where obscuration or redaction techniques have failed to completely remove all identifiable traces can lead to many legal and social issues. Hence, we need to be able to systematically measure the face obscuration performance of a given technique. In this paper we propose to measure the effectiveness of eight obscuration techniques. We do so by attacking the redacted faces in three scenarios: obscured face identification, verification, and reconstruction. Threat modeling is also considered to provide a vulnerability analysis for each studied obscuration technique. Based on our evaluation, we show that the k-same based methods are the most effective.
△ Less
Submitted 15 October, 2019; v1 submitted 13 May, 2019;
originally announced May 2019.
-
Depth functions of powers of homogeneous ideals
Authors:
Huy Tai Ha,
Hop Dang Nguyen,
Ngo Viet Trung,
Tran Nam Trung
Abstract:
We settle a conjecture of Herzog and Hibi, which states that the function depth $S/Q^n$, $n \ge 1$, where $Q$ is a homogeneous ideal in a polynomial ring $S$, can be any convergent numerical function. We also give a positive answer to a long-standing open question of Ratliff on the associated primes of powers of ideals.
We settle a conjecture of Herzog and Hibi, which states that the function depth $S/Q^n$, $n \ge 1$, where $Q$ is a homogeneous ideal in a polynomial ring $S$, can be any convergent numerical function. We also give a positive answer to a long-standing open question of Ratliff on the associated primes of powers of ideals.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
First Results from the AMoRE-Pilot neutrinoless double beta decay experiment
Authors:
V. Alenkov,
H. W. Bae,
J. Beyer,
R. S. Boiko,
K. Boonin,
O. Buzanov,
N. Chanthima,
M. K. Cheoun,
D. M. Chernyak,
J. S. Choe,
S. Choi,
F. A. Danevich,
M. Djamal,
D. Drung,
C. Enss,
A. Fleischmann,
A. M. Gangapshev,
L. Gastaldo,
Yu. M. Gavriljuk,
A. M. Gezhaev,
V. D. Grigoryeva,
V. I. Gurentsov,
O. Gylova,
C. Ha,
D. H. Ha
, et al. (84 additional authors not shown)
Abstract:
The Advanced Molybdenum-based Rare process Experiment (AMoRE) aims to search for neutrinoless double beta decay (0$νββ$) of $^{100}$Mo with $\sim$100 kg of $^{100}$Mo-enriched molybdenum embedded in cryogenic detectors with a dual heat and light readout. At the current, pilot stage of the AMoRE project we employ six calcium molybdate crystals with a total mass of 1.9 kg, produced from $^{48}$Ca-de…
▽ More
The Advanced Molybdenum-based Rare process Experiment (AMoRE) aims to search for neutrinoless double beta decay (0$νββ$) of $^{100}$Mo with $\sim$100 kg of $^{100}$Mo-enriched molybdenum embedded in cryogenic detectors with a dual heat and light readout. At the current, pilot stage of the AMoRE project we employ six calcium molybdate crystals with a total mass of 1.9 kg, produced from $^{48}$Ca-depleted calcium and $^{100}$Mo-enriched molybdenum ($^{48\textrm{depl}}$Ca$^{100}$MoO$_4$). The simultaneous detection of heat(phonon) and scintillation (photon) signals is realized with high resolution metallic magnetic calorimeter sensors that operate at milli-Kelvin temperatures. This stage of the project is carried out in the Yangyang underground laboratory at a depth of 700 m. We report first results from the AMoRE-Pilot $0νββ$ search with a 111 kg$\cdot$d live exposure of $^{48\textrm{depl}}$Ca$^{100}$MoO$_4$ crystals. No evidence for $0νββ$ decay of $^{100}$Mo is found, and a upper limit is set for the half-life of 0$νββ$ of $^{100}$Mo of $T^{0ν}_{1/2} > 9.5\times10^{22}$ y at 90% C.L.. This limit corresponds to an effective Majorana neutrino mass limit in the range $\langle m_{ββ}\rangle\le(1.2-2.1)$ eV.
△ Less
Submitted 7 May, 2019; v1 submitted 22 March, 2019;
originally announced March 2019.
-
Face Liveness Detection Based on Client Identity Using Siamese Network
Authors:
Huiling Hao,
Mingtao Pei
Abstract:
Face liveness detection is an essential prerequisite for face recognition applications. Previous face liveness detection methods usually train a binary classifier to differentiate between a fake face and a real face before face recognition. The client identity information is not utilized in previous face liveness detection methods. However, in practical face recognition applications, face spoofing…
▽ More
Face liveness detection is an essential prerequisite for face recognition applications. Previous face liveness detection methods usually train a binary classifier to differentiate between a fake face and a real face before face recognition. The client identity information is not utilized in previous face liveness detection methods. However, in practical face recognition applications, face spoofing attacks are always aimed at a specific client, and the client identity information can provide useful clues for face liveness detection. In this paper, we propose a face liveness detection method based on the client identity using Siamese network. We detect face liveness after face recognition instead of before face recognition, that is, we detect face liveness with the client identity information. We train a Siamese network with image pairs. Each image pair consists of two real face images or one real and one fake face images. The face images in each pair come from a same client. Given a test face image, the face image is firstly recognized by face recognition system, then the real face image of the identified client is retrieved to help the face liveness detection. Experiment results demonstrate the effectiveness of our method.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
CE-Net: Context Encoder Network for 2D Medical Image Segmentation
Authors:
Zaiwang Gu,
Jun Cheng,
Huazhu Fu,
Kang Zhou,
Huaying Hao,
Yitian Zhao,
Tianyang Zhang,
Shenghua Gao,
Jiang Liu
Abstract:
Medical image segmentation is an important step in medical image analysis. With the rapid development of convolutional neural network in image processing, deep learning has been used for medical image segmentation, such as optic disc segmentation, blood vessel detection, lung segmentation, cell segmentation, etc. Previously, U-net based approaches have been proposed. However, the consecutive pooli…
▽ More
Medical image segmentation is an important step in medical image analysis. With the rapid development of convolutional neural network in image processing, deep learning has been used for medical image segmentation, such as optic disc segmentation, blood vessel detection, lung segmentation, cell segmentation, etc. Previously, U-net based approaches have been proposed. However, the consecutive pooling and strided convolutional operations lead to the loss of some spatial information. In this paper, we propose a context encoder network (referred to as CE-Net) to capture more high-level information and preserve spatial information for 2D medical image segmentation. CE-Net mainly contains three major components: a feature encoder module, a context extractor and a feature decoder module. We use pretrained ResNet block as the fixed feature extractor. The context extractor module is formed by a newly proposed dense atrous convolution (DAC) block and residual multi-kernel pooling (RMP) block. We applied the proposed CE-Net to different 2D medical image segmentation tasks. Comprehensive results show that the proposed method outperforms the original U-Net method and other state-of-the-art methods for optic disc segmentation, vessel detection, lung segmentation, cell contour segmentation and retinal optical coherence tomography layer segmentation.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
Fedoryuk values and stability of global Hölderian error bounds for polynomial functions
Authors:
Huy-Vui Hà,
Phi-Dũng Hoàng
Abstract:
Let $f$ be a polynomial function of $n$ variables. In this paper, we study stability of global Hölderian error bound for a nonempty sublevel set $[f \le t]$ under a perturbation of $t$. In this paper, we give:
* Criteria for the existence of a global Hölderian error bound of $[f \le t]$;
* Formulas for computing explicitly the set…
▽ More
Let $f$ be a polynomial function of $n$ variables. In this paper, we study stability of global Hölderian error bound for a nonempty sublevel set $[f \le t]$ under a perturbation of $t$. In this paper, we give:
* Criteria for the existence of a global Hölderian error bound of $[f \le t]$;
* Formulas for computing explicitly the set $$H(f) := \{ t \in \mathbb{R}: [f \le t]\ \text{has a global Hölderian error bound}\}$$ via some Fedoryuk values of $f$ and definition of threshold for the existence of global Hölderian error bound of $f$;
* Definition of all types of stability of global Hölderian error bound of $[f \le t]$.
△ Less
Submitted 16 October, 2019; v1 submitted 15 February, 2019;
originally announced February 2019.
-
Auxiliary Field Quantum Monte Carlo for Multiband Hubbard Models: Controlling the Sign and Phase Problems to Capture Hund's Physics
Authors:
Hongxia Hao,
Brenda M. Rubenstein,
Hao Shi
Abstract:
In the study of strongly-correlated, many-electron systems, the Hubbard Kanamori (HK) model has emerged as one of the prototypes for transition metal oxide physics. The model is multi-band in nature and contains Hund's coupling terms, which have pronounced effects on metal-insulator transitions, high-temperature superconductivity, and other physical properties. In the following, we present a compl…
▽ More
In the study of strongly-correlated, many-electron systems, the Hubbard Kanamori (HK) model has emerged as one of the prototypes for transition metal oxide physics. The model is multi-band in nature and contains Hund's coupling terms, which have pronounced effects on metal-insulator transitions, high-temperature superconductivity, and other physical properties. In the following, we present a complete theoretical framework for treating the HK model using the ground state Auxiliary Field Quantum Monte Carlo (AFQMC) method and analyze its performance on few-band models whose parameters approximate those observed in ruthenate, rhodates, and other materials exhibiting Hund's physics. Unlike previous studies, the constrained path and phaseless approximations are used to respectively control the sign and phase problems, which enables high accuracy modeling of the HK model's ground state properties within parameter regimes of experimental interest. We demonstrate that, after careful consideration of the Hubbard-Stratonovich transformations and trial wave functions employed, relative errors in the energy of less than 1% can routinely be achieved for moderate to large values of the Hund's coupling constant. Crucially, our methodology also accurately predicts magnetic ordering and phase transitions. The results presented open the door to more predictive modeling of Hund's physics within a wide range of strongly-correlated materials using AFQMC.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
Resurgence numbers of fiber products of projective schemes
Authors:
Sankhaneel Bisui,
Huy Tai Ha,
A. V. Jayanthan,
Abu Chackalamannil Thomas
Abstract:
We investigate the resurgence and asymptotic resurgence numbers of fiber products of projective schemes. Particularly, we show that while the asymptotic resurgence number of the k-fold fiber product of a projective scheme remains unchanged, its resurgence number could strictly increase.
We investigate the resurgence and asymptotic resurgence numbers of fiber products of projective schemes. Particularly, we show that while the asymptotic resurgence number of the k-fold fiber product of a projective scheme remains unchanged, its resurgence number could strictly increase.
△ Less
Submitted 22 April, 2019; v1 submitted 23 January, 2019;
originally announced January 2019.
-
Fiber invariants of projective morphisms and regularity of powers of ideals
Authors:
Sankhaneel Bisui,
Huy Tai Ha,
Abu Chackalamannil Thomas
Abstract:
We introduce an invariant, associated to a coherent sheaf over a projective morphism of schemes, which controls when sheaf cohomology can be passed through the given morphism. We then use this invariant to estimate the stability indexes of the regularity and a*-invariant of powers of homogeneous ideals.
We introduce an invariant, associated to a coherent sheaf over a projective morphism of schemes, which controls when sheaf cohomology can be passed through the given morphism. We then use this invariant to estimate the stability indexes of the regularity and a*-invariant of powers of homogeneous ideals.
△ Less
Submitted 14 January, 2019;
originally announced January 2019.
-
A Hybrid Genetic Algorithm for the Traveling Salesman Problem with Drone
Authors:
Quang Minh Ha,
Yves Deville,
Quang Dung Pham,
Minh Hoàng Hà
Abstract:
This paper addresses the Traveling Salesman Problem with Drone (TSP-D), in which a truck and drone are used to deliver parcels to customers. The objective of this problem is to either minimize the total operational cost (min-cost TSP-D) or minimize the completion time for the truck and drone (min-time TSP-D). This problem has gained a lot of attention in the last few years since it is matched with…
▽ More
This paper addresses the Traveling Salesman Problem with Drone (TSP-D), in which a truck and drone are used to deliver parcels to customers. The objective of this problem is to either minimize the total operational cost (min-cost TSP-D) or minimize the completion time for the truck and drone (min-time TSP-D). This problem has gained a lot of attention in the last few years since it is matched with the recent trends in a new delivery method among logistics companies. To solve the TSP-D, we propose a hybrid genetic search with dynamic population management and adaptive diversity control based on a split algorithm, problem-tailored crossover and local search operators, a new restore method to advance the convergence and an adaptive penalization mechanism to dynamically balance the search between feasible/infeasible solutions. The computational results show that the proposed algorithm outperforms existing methods in terms of solution quality and improves best known solutions found in the literature. Moreover, various analyses on the impacts of crossover choice and heuristic components have been conducted to analysis further their sensitivity to the performance of our method.
△ Less
Submitted 21 December, 2018;
originally announced December 2018.
-
Sampling-based Bayesian Inference with gradient uncertainty
Authors:
Chanwoo Park,
Jae Myung Kim,
Seok Hyeon Ha,
Jungwoo Lee
Abstract:
Deep neural networks(NNs) have achieved impressive performance, often exceed human performance on many computer vision tasks. However, one of the most challenging issues that still remains is that NNs are overconfident in their predictions, which can be very harmful when this arises in safety critical applications. In this paper, we show that predictive uncertainty can be efficiently estimated whe…
▽ More
Deep neural networks(NNs) have achieved impressive performance, often exceed human performance on many computer vision tasks. However, one of the most challenging issues that still remains is that NNs are overconfident in their predictions, which can be very harmful when this arises in safety critical applications. In this paper, we show that predictive uncertainty can be efficiently estimated when we incorporate the concept of gradients uncertainty into posterior sampling. The proposed method is tested on two different datasets, MNIST for in-distribution confusing examples and notMNIST for out-of-distribution data. We show that our method is able to efficiently represent predictive uncertainty on both datasets.
△ Less
Submitted 27 December, 2019; v1 submitted 8 December, 2018;
originally announced December 2018.
-
A note on independence number, connectivity and $k$-ended tree
Authors:
Pham Hoang Ha
Abstract:
A $k$-ended tree is a tree with at most $k$ leaves. In this note, we give a simple proof for the following theorem. Let $G$ be a connected graph and $k$ be an integer ($k\geq 2$). Let $S$ be a vertex subset of $G$ such that $α_{G}(S) \leq k + κ_{G}(S)- 1.$ Then, $G$ has a $k$-ended tree which covers $S.$ Moreover, the condition is sharp.
A $k$-ended tree is a tree with at most $k$ leaves. In this note, we give a simple proof for the following theorem. Let $G$ be a connected graph and $k$ be an integer ($k\geq 2$). Let $S$ be a vertex subset of $G$ such that $α_{G}(S) \leq k + κ_{G}(S)- 1.$ Then, $G$ has a $k$-ended tree which covers $S.$ Moreover, the condition is sharp.
△ Less
Submitted 26 October, 2018;
originally announced October 2018.
-
A note on spanning trees of connected $K_{1,t}$-free graphs whose stems have a few leaves
Authors:
Pham Hoang Ha,
Dang Dinh Hanh
Abstract:
Let $T$ be a tree, a vertex of degree one is called a leaf. The set of leaves of $T$ is denoted by $Leaf(T)$. The subtree $T-Leaf(T)$ of $T$ is called the stem of $T$ and denoted by $Stem(T).$ In this note, we give a sharp sufficient condition to show that a $K_{1,t}-$free graph has a spanning tree whose stem has a few leaves. By applying the main result, we give improvements of previous related r…
▽ More
Let $T$ be a tree, a vertex of degree one is called a leaf. The set of leaves of $T$ is denoted by $Leaf(T)$. The subtree $T-Leaf(T)$ of $T$ is called the stem of $T$ and denoted by $Stem(T).$ In this note, we give a sharp sufficient condition to show that a $K_{1,t}-$free graph has a spanning tree whose stem has a few leaves. By applying the main result, we give improvements of previous related results.
△ Less
Submitted 18 October, 2018;
originally announced October 2018.
-
Solving the clustered traveling salesman problem with d-relaxed priority rule
Authors:
Hoa Nguyen Phuong,
Huyen Tran Ngoc Nhat,
Minh Hoàng Hà,
André Langevin,
Martin Trépanier
Abstract:
The Clustered Traveling Salesman Problem with a Prespecified Order on the Clusters, a variant of the well-known traveling salesman problem is studied in literature. In this problem, delivery locations are divided into clusters with different urgency levels and more urgent locations must be visited before less urgent ones. However, this could lead to an inefficient route in terms of traveling cost.…
▽ More
The Clustered Traveling Salesman Problem with a Prespecified Order on the Clusters, a variant of the well-known traveling salesman problem is studied in literature. In this problem, delivery locations are divided into clusters with different urgency levels and more urgent locations must be visited before less urgent ones. However, this could lead to an inefficient route in terms of traveling cost. This priority-oriented constraint can be relaxed by a rule called d-relaxed priority that provides a trade-off between transportation cost and emergency level. Our research proposes two approaches to solve the problem with d-relaxed priority rule. We improve the mathematical formulation proposed in the literature to construct an exact solution method. A meta-heuristic method based on the framework of Iterated Local Search with problem-tailored operators is also introduced to find approximate solutions. Experimental results show the effectiveness of our methods.
△ Less
Submitted 6 October, 2018;
originally announced October 2018.
-
Initially regular sequences and depths of ideals
Authors:
Louiza Fouli,
Huy Tai Ha,
Susan Morey
Abstract:
For an arbitrary ideal $I$ in a polynomial ring $R$ we define the notion of initially regular sequences on $R/I$. These sequences share properties with regular sequences. In particular, the length of an initially regular sequence provides a lower bound for the depth of $R/I$. Using combinatorial information from the initial ideal of $I$ we construct sequences of linear polynomials that form initia…
▽ More
For an arbitrary ideal $I$ in a polynomial ring $R$ we define the notion of initially regular sequences on $R/I$. These sequences share properties with regular sequences. In particular, the length of an initially regular sequence provides a lower bound for the depth of $R/I$. Using combinatorial information from the initial ideal of $I$ we construct sequences of linear polynomials that form initially regular sequences on $R/I$. We identify situations where initially regular sequences are also regular sequences, and we show that our results can be combined with polarization to improve known depth bounds for general monomial ideals.
△ Less
Submitted 28 June, 2019; v1 submitted 2 October, 2018;
originally announced October 2018.
-
Accurate Predictions of Electron Binding Energies of Dipole-Bound Anions via Quantum Monte Carlo Methods
Authors:
Hongxia Hao,
James Shee,
Shiv Upadhyay,
Can Ataca,
Kenneth D. Jordan,
Brenda M. Rubenstein
Abstract:
Neutral molecules with sufficiently large dipole moments can bind electrons in diffuse nonvalence orbitals with most of their charge density far from the nuclei, forming so-called dipole-bound anions. Because long-range correlation effects play an important role in the binding of an excess electron and overall binding energies are often only of the order of 10-100s of wave numbers, predictively mo…
▽ More
Neutral molecules with sufficiently large dipole moments can bind electrons in diffuse nonvalence orbitals with most of their charge density far from the nuclei, forming so-called dipole-bound anions. Because long-range correlation effects play an important role in the binding of an excess electron and overall binding energies are often only of the order of 10-100s of wave numbers, predictively modeling dipole-bound anions remains a challenge. Here, we demonstrate that quantum Monte Carlo methods can accurately characterize molecular dipole-bound anions with near threshold dipole moments. We also show that correlated sampling Auxiliary Field Quantum Monte Carlo is particularly well-suited for resolving the fine energy differences between the neutral and anionic species. These results shed light on the fundamental limitations of quantum Monte Carlo methods and pave the way toward using them for the study of weakly-bound species that are too large to model using traditional electron structure methods.
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
Interstellar: Using Halide's Scheduling Language to Analyze DNN Accelerators
Authors:
Xuan Yang,
Mingyu Gao,
Qiaoyi Liu,
Jeff Ou Setter,
**g Pu,
Ankita Nayak,
Steven Emberton Bell,
Kaidi Cao,
Heonjae Ha,
Priyanka Raina,
Christos Kozyrakis,
Mark Horowitz
Abstract:
We show that DNN accelerator micro-architectures and their program map**s represent specific choices of loop order and hardware parallelism for computing the seven nested loops of DNNs, which enables us to create a formal taxonomy of all existing dense DNN accelerators. Surprisingly, the loop transformations needed to create these hardware variants can be precisely and concisely represented by H…
▽ More
We show that DNN accelerator micro-architectures and their program map**s represent specific choices of loop order and hardware parallelism for computing the seven nested loops of DNNs, which enables us to create a formal taxonomy of all existing dense DNN accelerators. Surprisingly, the loop transformations needed to create these hardware variants can be precisely and concisely represented by Halide's scheduling language. By modifying the Halide compiler to generate hardware, we create a system that can fairly compare these prior accelerators. As long as proper loop blocking schemes are used, and the hardware can support map** replicated loops, many different hardware dataflows yield similar energy efficiency with good performance. This is because the loop blocking can ensure that most data references stay on-chip with good locality and the processing units have high resource utilization. How resources are allocated, especially in the memory system, has a large impact on energy and performance. By optimizing hardware resource allocation while kee** throughput constant, we achieve up to 4.2X energy improvement for Convolutional Neural Networks (CNNs), 1.6X and 1.8X improvement for Long Short-Term Memories (LSTMs) and multi-layer perceptrons (MLPs), respectively.
△ Less
Submitted 26 April, 2020; v1 submitted 10 September, 2018;
originally announced September 2018.
-
Predicting Lung Nodule Malignancies by Combining Deep Convolutional Neural Network and Handcrafted Features
Authors:
Shulong Li,
Panpan Xu,
Bin Li,
Liyuan Chen,
Zhiguo Zhou,
Hongxia Hao,
Yingying Duan,
Michael Folkert,
Jianhua Ma,
Steve Jiang,
**g Wang
Abstract:
To predict lung nodule malignancy with a high sensitivity and specificity, we propose a fusion algorithm that combines handcrafted features (HF) into the features learned at the output layer of a 3D deep convolutional neural network (CNN). First, we extracted twenty-nine handcrafted features, including nine intensity features, eight geometric features, and twelve texture features based on grey-lev…
▽ More
To predict lung nodule malignancy with a high sensitivity and specificity, we propose a fusion algorithm that combines handcrafted features (HF) into the features learned at the output layer of a 3D deep convolutional neural network (CNN). First, we extracted twenty-nine handcrafted features, including nine intensity features, eight geometric features, and twelve texture features based on grey-level co-occurrence matrix (GLCM) averaged from thirteen directions. We then trained 3D CNNs modified from three state-of-the-art 2D CNN architectures (AlexNet, VGG-16 Net and Multi-crop Net) to extract the CNN features learned at the output layer. For each 3D CNN, the CNN features combined with the 29 handcrafted features were used as the input for the support vector machine (SVM) coupled with the sequential forward feature selection (SFS) method to select the optimal feature subset and construct the classifiers. The fusion algorithm takes full advantage of the handcrafted features and the highest level CNN features learned at the output layer. It can overcome the disadvantage of the handcrafted features that may not fully reflect the unique characteristics of a particular lesion by combining the intrinsic CNN features. Meanwhile, it also alleviates the requirement of a large scale annotated dataset for the CNNs based on the complementary of handcrafted features. The patient cohort includes 431 malignant nodules and 795 benign nodules extracted from the LIDC/IDRI database. For each investigated CNN architecture, the proposed fusion algorithm achieved the highest AUC, accuracy, sensitivity, and specificity scores among all competitive classification models.
△ Less
Submitted 27 December, 2018; v1 submitted 7 September, 2018;
originally announced September 2018.
-
Kinetic Trans-assembly of DNA Nanostructures
Authors:
Jihoon Shin,
Junghoon Kim,
Sung Ha Park,
Tai Hwan Ha
Abstract:
The central dogma of molecular biology is the principal framework for understanding how nucleic acid information is propagated and used by living systems to create complex biomolecules. Here, by integrating the structural and dynamic paradigms of DNA nanotechnology, we present a rationally designed synthetic platform which functions in an analogous manner to create complex DNA nanostructures. Star…
▽ More
The central dogma of molecular biology is the principal framework for understanding how nucleic acid information is propagated and used by living systems to create complex biomolecules. Here, by integrating the structural and dynamic paradigms of DNA nanotechnology, we present a rationally designed synthetic platform which functions in an analogous manner to create complex DNA nanostructures. Starting from one type of DNA nanostructure, DNA strand displacement circuits were designed to interact and pass along the information encoded in the initial structure to mediate the self-assembly of a different type of structure, the final output structure depending on the type of circuit triggered. Using this concept of a DNA structure "trans-assembling" a different DNA structure through non-local strand displacement circuitry, four different schemes were implemented. Specifically, 1D ladder and 2D double-crossover (DX) lattices were designed to kinetically trigger DNA circuits to activate polymerization of either ring structures or another type of DX lattice under enzyme-free, isothermal conditions. In each scheme, the desired multilayer reaction pathway was activated, among multiple possible pathways, ultimately leading to the downstream self-assembly of the correct output structure.
△ Less
Submitted 3 October, 2018; v1 submitted 20 August, 2018;
originally announced August 2018.
-
Membership criteria and containments of powers of monomial ideals
Authors:
Huy Tai Ha,
Ngo Viet Trung
Abstract:
We present a close relationship between matching number, covering numbers and their fractional versions in combinatorial optimization and ordinary powers, integral closures of powers, and symbolic powers of monomial ideals. This relationship leads to several new results and problems on the containments between these powers.
We present a close relationship between matching number, covering numbers and their fractional versions in combinatorial optimization and ordinary powers, integral closures of powers, and symbolic powers of monomial ideals. This relationship leads to several new results and problems on the containments between these powers.
△ Less
Submitted 18 January, 2019; v1 submitted 17 August, 2018;
originally announced August 2018.
-
Parallax: Sparsity-aware Data Parallel Training of Deep Neural Networks
Authors:
Soojeong Kim,
Gyeong-In Yu,
Ho** Park,
Sungwoo Cho,
Eunji Jeong,
Hyeonmin Ha,
Sanha Lee,
Joo Seong Jeong,
Byung-Gon Chun
Abstract:
The employment of high-performance servers and GPU accelerators for training deep neural network models have greatly accelerated recent advances in deep learning (DL). DL frameworks, such as TensorFlow, MXNet, and Caffe2, have emerged to assist DL researchers to train their models in a distributed manner. Although current DL frameworks scale well for image classification models, there remain oppor…
▽ More
The employment of high-performance servers and GPU accelerators for training deep neural network models have greatly accelerated recent advances in deep learning (DL). DL frameworks, such as TensorFlow, MXNet, and Caffe2, have emerged to assist DL researchers to train their models in a distributed manner. Although current DL frameworks scale well for image classification models, there remain opportunities for scalable distributed training on natural language processing (NLP) models. We found that current frameworks show relatively low scalability on training NLP models due to the lack of consideration to the difference in sparsity of model parameters. In this paper, we propose Parallax, a framework that optimizes data parallel training by utilizing the sparsity of model parameters. Parallax introduces a hybrid approach that combines Parameter Server and AllReduce architectures to optimize the amount of data transfer according to the sparsity. Experiments show that Parallax built atop TensorFlow achieves scalable training throughput on both dense and sparse models while requiring little effort from its users. Parallax achieves up to 2.8x, 6.02x speedup for NLP models than TensorFlow and Horovod with 48 GPUs, respectively. The training speed for the image classification models is equal to Horovod and 1.53x faster than TensorFlow.
△ Less
Submitted 10 June, 2019; v1 submitted 8 August, 2018;
originally announced August 2018.
-
Security and Privacy Issues in Deep Learning
Authors:
Ho Bae,
Jaehee Jang,
Dahuin Jung,
Hyemi Jang,
Heonseok Ha,
Hyungyu Lee,
Sungroh Yoon
Abstract:
To promote secure and private artificial intelligence (SPAI), we review studies on the model security and data privacy of DNNs. Model security allows system to behave as intended without being affected by malicious external influences that can compromise its integrity and efficiency. Security attacks can be divided based on when they occur: if an attack occurs during training, it is known as a poi…
▽ More
To promote secure and private artificial intelligence (SPAI), we review studies on the model security and data privacy of DNNs. Model security allows system to behave as intended without being affected by malicious external influences that can compromise its integrity and efficiency. Security attacks can be divided based on when they occur: if an attack occurs during training, it is known as a poisoning attack, and if it occurs during inference (after training) it is termed an evasion attack. Poisoning attacks compromise the training process by corrupting the data with malicious examples, while evasion attacks use adversarial examples to disrupt entire classification process. Defenses proposed against such attacks include techniques to recognize and remove malicious data, train a model to be insensitive to such data, and mask the model's structure and parameters to render attacks more challenging to implement. Furthermore, the privacy of the data involved in model training is also threatened by attacks such as the model-inversion attack, or by dishonest service providers of AI applications. To maintain data privacy, several solutions that combine existing data-privacy techniques have been proposed, including differential privacy and modern cryptography techniques. In this paper, we describe the notions of some of methods, e.g., homomorphic encryption, and review their advantages and challenges when implemented in deep-learning models.
△ Less
Submitted 9 March, 2021; v1 submitted 31 July, 2018;
originally announced July 2018.
-
Traveling and standing thermoacoustic waves in solid media
Authors:
Haitian Hao,
Carlo Scalo,
Fabio Semperlotti
Abstract:
The most attractive application of fluid-based thermoacoustic (TA) energy conversion involves traveling wave devices due to their low onset temperature ratios and high growth rates. Recently, theoretical and numerical studies have shown that thermoacoustic effects can exist also in solids. However, these initial studies only focus on standing waves. This paper presents a numerical study investigat…
▽ More
The most attractive application of fluid-based thermoacoustic (TA) energy conversion involves traveling wave devices due to their low onset temperature ratios and high growth rates. Recently, theoretical and numerical studies have shown that thermoacoustic effects can exist also in solids. However, these initial studies only focus on standing waves. This paper presents a numerical study investigating the existence of self-sustained thermoelastic oscillations associated with traveling wave modes in a looped solid rod under the effect of a localized thermal gradient. Configurations having different ratios of the rod radius $R$ to the thermal penetration depth $δ_k$ were explored and the traveling wave component (TWC) was found to become dominant as $R$ approaches $δ_k$. The growth-rate-to-frequency ratio of the traveling TA wave is found to be significantly larger than that of the standing wave counterpart for the same wavelength. The perturbation energy budgets are analytically formulated and closed, shedding light onto the energy conversion processes of solid-state thermoacoustic (SSTA) engines and highlighting differences with fluids. Efficiency is also quantified based on the thermoacoustic production and dissipation rates evaluated from the energy budgets.
△ Less
Submitted 14 June, 2018;
originally announced June 2018.
-
Spanning trees with at most 2 branch vertices in claw - free graphs
Authors:
Pham Hoang Ha,
Dang Dinh Hanh
Abstract:
In this article, we will prove that if $G$ is a connected claw-free graph and either $σ_6(G)\geq |G|-5$ or $σ_7(G)\geq |G|-2$, here $σ_k(G)$ is the minimmum degree sum of $k$ independent vertices in $G$, then $G$ has a spanning tree with at most two branch vertices.
In this article, we will prove that if $G$ is a connected claw-free graph and either $σ_6(G)\geq |G|-5$ or $σ_7(G)\geq |G|-2$, here $σ_k(G)$ is the minimmum degree sum of $k$ independent vertices in $G$, then $G$ has a spanning tree with at most two branch vertices.
△ Less
Submitted 3 November, 2018; v1 submitted 2 June, 2018;
originally announced June 2018.
-
Deep Trustworthy Knowledge Tracing
Authors:
Heonseok Ha,
Uiwon Hwang,
Yongjun Hong,
Jahee Jang,
Sungroh Yoon
Abstract:
Knowledge tracing (KT), a key component of an intelligent tutoring system, is a machine learning technique that estimates the mastery level of a student based on his/her past performance. The objective of KT is to predict a student's response to the next question. Compared with traditional KT models, deep learning-based KT (DLKT) models show better predictive performance because of the representat…
▽ More
Knowledge tracing (KT), a key component of an intelligent tutoring system, is a machine learning technique that estimates the mastery level of a student based on his/her past performance. The objective of KT is to predict a student's response to the next question. Compared with traditional KT models, deep learning-based KT (DLKT) models show better predictive performance because of the representation power of deep neural networks. Various methods have been proposed to improve the performance of DLKT, but few studies have been conducted on the reliability of DLKT. In this work, we claim that the existing DLKTs are not reliable in real education environments. To substantiate the claim, we show limitations of DLKT from various perspectives such as knowledge state update failure, catastrophic forgetting, and non-interpretability. We then propose a novel regularization to address these problems. The proposed method allows us to achieve trustworthy DLKT. In addition, the proposed model which is trained on scenarios with forgetting can also be easily extended to scenarios without forgetting.
△ Less
Submitted 18 September, 2019; v1 submitted 28 May, 2018;
originally announced May 2018.
-
Edge ideals of oriented graphs
Authors:
Huy Tài Hà,
Kuei-Nuan Lin,
Susan Morey,
Enrique Reyes,
Rafael H. Villarreal
Abstract:
Let $\mathcal{D}$ be a weighted oriented graph and let $I(\mathcal{D})$ be its edge ideal. Under a natural condition that the underlying (undirected) graph of $\mathcal{D}$ contains a perfect matching consisting of leaves, we provide several equivalent conditions for the Cohen-Macaulayness of $I(\mathcal{D})$. We also completely characterize the Cohen-Macaulayness of $I(\mathcal{D})$ when the unde…
▽ More
Let $\mathcal{D}$ be a weighted oriented graph and let $I(\mathcal{D})$ be its edge ideal. Under a natural condition that the underlying (undirected) graph of $\mathcal{D}$ contains a perfect matching consisting of leaves, we provide several equivalent conditions for the Cohen-Macaulayness of $I(\mathcal{D})$. We also completely characterize the Cohen-Macaulayness of $I(\mathcal{D})$ when the underlying graph of $\mathcal{D}$ is a bipartite graph. When $I(\mathcal{D})$ fails to be Cohen-Macaulay, we give an instance where $I(\mathcal{D})$ is shown to be sequentially Cohen-Macaulay.
△ Less
Submitted 10 May, 2018;
originally announced May 2018.
-
On three soft rectangle packing problems with guillotine constraints
Authors:
Quoc Trung Bui,
Thibaut Vidal,
Minh Hoàng Hà
Abstract:
We investigate how to partition a rectangular region of length $L_1$ and height $L_2$ into $n$ rectangles of given areas $(a_1, \dots, a_n)$ using two-stage guillotine cuts, so as to minimize either (i) the sum of the perimeters, (ii) the largest perimeter, or (iii) the maximum aspect ratio of the rectangles. These problems play an important role in the ongoing Vietnamese land-allocation reform, a…
▽ More
We investigate how to partition a rectangular region of length $L_1$ and height $L_2$ into $n$ rectangles of given areas $(a_1, \dots, a_n)$ using two-stage guillotine cuts, so as to minimize either (i) the sum of the perimeters, (ii) the largest perimeter, or (iii) the maximum aspect ratio of the rectangles. These problems play an important role in the ongoing Vietnamese land-allocation reform, as well as in the optimization of matrix multiplication algorithms. We show that the first problem can be solved to optimality in $\mathcal{O}(n \log n)$, while the two others are NP-hard. We propose mixed integer programming (MIP) formulations and a binary search-based approach for solving the NP-hard problems. Experimental analyses are conducted to compare the solution approaches in terms of computational efficiency and solution quality, for different objectives.
△ Less
Submitted 9 May, 2018;
originally announced May 2018.
-
Symbolic powers of edge ideals of graphs
Authors:
Yan Gu,
Huy Tai Ha,
Jonathan L. O'Rourke,
Joseph W. Skelton
Abstract:
Let $G$ be a graph and let $I = I(G)$ be its edge ideal. When $G$ is unicyclic, we give a decomposition of symbolic powers of $I$ in terms of its ordinary powers. This allows us to explicitly compute the Waldschmidt constant and the resurgence number of $I$. When $G$ is an odd cycle, we explicitly compute the regularity of $I^{(s)}$ for all $s \in \mathbb{N}$. In doing so, we also give a natural l…
▽ More
Let $G$ be a graph and let $I = I(G)$ be its edge ideal. When $G$ is unicyclic, we give a decomposition of symbolic powers of $I$ in terms of its ordinary powers. This allows us to explicitly compute the Waldschmidt constant and the resurgence number of $I$. When $G$ is an odd cycle, we explicitly compute the regularity of $I^{(s)}$ for all $s \in \mathbb{N}$. In doing so, we also give a natural lower bound for the regularity function $\text{reg } I^{(s)}$, for $s \in \mathbb{N}$, for an arbitrary graph $G$.
△ Less
Submitted 24 February, 2019; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Regularity of powers of edge ideals: from local properties to global bounds
Authors:
Arindam Banerjee,
Selvi Kara,
Huy Tai Ha
Abstract:
Let $I = I(G)$ be the edge ideal of a graph $G$. We give various general upper bounds for the regularity function $\text{reg} I^s$, for $s \ge 1$, addressing a conjecture made by the authors and Alilooee. When $G$ is a gap-free graph and locally of regularity 2, we show that $\text{reg} I^s = 2s$ for all $s \ge 2$. This is a slightly weaker version of a conjecture of Nevo and Peeva. Our method i…
▽ More
Let $I = I(G)$ be the edge ideal of a graph $G$. We give various general upper bounds for the regularity function $\text{reg} I^s$, for $s \ge 1$, addressing a conjecture made by the authors and Alilooee. When $G$ is a gap-free graph and locally of regularity 2, we show that $\text{reg} I^s = 2s$ for all $s \ge 2$. This is a slightly weaker version of a conjecture of Nevo and Peeva. Our method is to investigate the regularity function $\text{reg}I^s$, for $s \ge 1$, via local information of $I$.
△ Less
Submitted 14 April, 2019; v1 submitted 3 May, 2018;
originally announced May 2018.
-
Spanning trees with at most 4 leaves in $K_{1,5}-$free graphs
Authors:
Yuan Chen,
Pham Hoang Ha,
Dang Dinh Hanh
Abstract:
In 2009, Kyaw proved that every $n$-vertex connected $K_{1,4}$-free graph $G$ with $σ_4(G)\geq n-1$ contains a spanning tree with at most $3$ leaves. In this paper, we prove an analogue of Kyaw's result for connected $K_{1,5}$-free graphs. We show that every $n$-vertex connected $K_{1,5}$-free graph $G$ with $σ_5(G)\geq n-1$ contains a spanning tree with at most $4$ leaves. Moreover, the degree su…
▽ More
In 2009, Kyaw proved that every $n$-vertex connected $K_{1,4}$-free graph $G$ with $σ_4(G)\geq n-1$ contains a spanning tree with at most $3$ leaves. In this paper, we prove an analogue of Kyaw's result for connected $K_{1,5}$-free graphs. We show that every $n$-vertex connected $K_{1,5}$-free graph $G$ with $σ_5(G)\geq n-1$ contains a spanning tree with at most $4$ leaves. Moreover, the degree sum condition `$σ_5(G)\geq n-1$' is best possible.
△ Less
Submitted 18 October, 2018; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Coalescence driven self-organization of growing nanodroplets around a microcap
Authors:
Brendan Dyett,
Hao Hao,
Detlef Lohse,
Xuehua Zhang
Abstract:
The coalescence between growing droplets is important for the surface coverage and spatial arrangements of droplets on surfaces. In this work, total internal reflection fluorescence (TIRF) microscopy is utilized to in-situ investigate the formation of nanodroplets around the rim of a polymer microcap, with sub-micron spatial and millisecond temporal resolution. We observe that the coalescence amon…
▽ More
The coalescence between growing droplets is important for the surface coverage and spatial arrangements of droplets on surfaces. In this work, total internal reflection fluorescence (TIRF) microscopy is utilized to in-situ investigate the formation of nanodroplets around the rim of a polymer microcap, with sub-micron spatial and millisecond temporal resolution. We observe that the coalescence among droplets occurs frequently during their growth by solvent exchange. Our experimental results show that the position of the droplet from two merged droplets is related to the size of the parent droplets. The position of the coalesced droplet and the ratio of parent droplet sizes obey a scaling law, reflecting a coalescence preference based on the size inequality. As a result of droplet coalescence, the angles between the centroids of two neighbouring droplets increase with time, obeying a nearly symmetrical arrangement of droplets at various time intervals. The evolution of the position and number from coalescence of growing droplets is modelled. The mechanism for coalescence driven self-organization of growing droplets is general, applicable to microcaps of different sizes and droplets of different liquids. The understanding from this work may be valuable for positioning nanodroplets by nucleation and growth without using templates.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
Pseudodifferential calculus on noncommutative tori, II. Main properties
Authors:
Hyunsu Ha,
Gihyun Lee,
Raphael Ponge
Abstract:
This paper is the 2nd part of a two-paper series whose aim is to give a detailed description of Connes' pseudodifferential calculus on noncommutative $n$-tori, $n\geq 2$. We make use of the tools introduced in the 1st part to deal with the main properties of pseudodifferential operators on noncommutative tori of any dimension $n\geq 2$. This includes the main results mentioned in the original note…
▽ More
This paper is the 2nd part of a two-paper series whose aim is to give a detailed description of Connes' pseudodifferential calculus on noncommutative $n$-tori, $n\geq 2$. We make use of the tools introduced in the 1st part to deal with the main properties of pseudodifferential operators on noncommutative tori of any dimension $n\geq 2$. This includes the main results mentioned in the original notes of Connes and Baaj. We also obtain further results regarding action on Sobolev spaces, spectral theory of elliptic operators, and Schatten-class properties of pseudodifferential operators of negative order, including a trace-formula for pseudodifferential operators of order $<-n$.
△ Less
Submitted 5 April, 2019; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Pseudodifferential calculus on noncommutative tori, I. Oscillating integrals
Authors:
Hyunsu Ha,
Gihyun Lee,
Raphael Ponge
Abstract:
This paper is the first part of a two-paper series whose aim is to give a thorough account on Connes' pseudodifferential calculus on noncommutative tori. This pseudodifferential calculus has been used in numerous recent papers, but a detailed description is still missing. In this paper, we focus on constructing an oscillating integral for noncommutative tori and laying down the main functional ana…
▽ More
This paper is the first part of a two-paper series whose aim is to give a thorough account on Connes' pseudodifferential calculus on noncommutative tori. This pseudodifferential calculus has been used in numerous recent papers, but a detailed description is still missing. In this paper, we focus on constructing an oscillating integral for noncommutative tori and laying down the main functional analysis ground for understanding Connes' pseudodifferential calculus. In particular, this allows us to give a precise explanation of the definition of pseudodifferential operators on noncommutative tori. More generally, this paper introduces the main technical tools that are used in the 2nd part of the series to derive the main properties of these operators. In addition, we establish the equivalence between our class of operators and the toroidal pseudo differential operators considered by other authors.
△ Less
Submitted 5 April, 2019; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Spanning trees in a Claw-free graph whose stems have at most $k$ branch vertices
Authors:
Pham Hoang Ha
Abstract:
Let $T$ be a tree, a vertex of degree one and a vertex of degree at least three is called a leaf and a branch vertex, respectively. The set of leaves of $T$ is denoted by $Leaf(T)$. The subtree $T-Leaf(T)$ of $T$ is called the stem of $T$ and denoted by $Stem(T).$ In this paper, we give two sufficient conditions for a connected claw-free graph to have a spanning tree whose stem has a bounded numbe…
▽ More
Let $T$ be a tree, a vertex of degree one and a vertex of degree at least three is called a leaf and a branch vertex, respectively. The set of leaves of $T$ is denoted by $Leaf(T)$. The subtree $T-Leaf(T)$ of $T$ is called the stem of $T$ and denoted by $Stem(T).$ In this paper, we give two sufficient conditions for a connected claw-free graph to have a spanning tree whose stem has a bounded number of branch vertices, and those conditions are best possible. As corollaries of main results we also give some conditions to show that a connected claw-free graph has a spanning tree whose stem is a spider.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
QMCPACK : An open source ab initio Quantum Monte Carlo package for the electronic structure of atoms, molecules, and solids
Authors:
Jeongnim Kim,
Andrew Baczewski,
Todd D. Beaudet,
Anouar Benali,
M. Chandler Bennett,
Mark A. Berrill,
Nick S. Blunt,
Edgar Josue Landinez Borda,
Michele Casula,
David M. Ceperley,
Simone Chiesa,
Bryan K. Clark,
Raymond C. Clay III,
Kris T. Delaney,
Mark Dewing,
Kenneth P. Esler,
Hongxia Hao,
Olle Heinonen,
Paul R. C. Kent,
Jaron T. Krogel,
Ilkka Kylanpaa,
Ying Wai Li,
M. Graham Lopez,
Ye Luo,
Fionn D. Malone
, et al. (23 additional authors not shown)
Abstract:
QMCPACK is an open source quantum Monte Carlo package for ab-initio electronic structure calculations. It supports calculations of metallic and insulating solids, molecules, atoms, and some model Hamiltonians. Implemented real space quantum Monte Carlo algorithms include variational, diffusion, and reptation Monte Carlo. QMCPACK uses Slater-Jastrow type trial wave functions in conjunction with a s…
▽ More
QMCPACK is an open source quantum Monte Carlo package for ab-initio electronic structure calculations. It supports calculations of metallic and insulating solids, molecules, atoms, and some model Hamiltonians. Implemented real space quantum Monte Carlo algorithms include variational, diffusion, and reptation Monte Carlo. QMCPACK uses Slater-Jastrow type trial wave functions in conjunction with a sophisticated optimizer capable of optimizing tens of thousands of parameters. The orbital space auxiliary field quantum Monte Carlo method is also implemented, enabling cross validation between different highly accurate methods. The code is specifically optimized for calculations with large numbers of electrons on the latest high performance computing architectures, including multicore central processing unit (CPU) and graphical processing unit (GPU) systems. We detail the program's capabilities, outline its structure, and give examples of its use in current research calculations. The package is available at http://www.qmcpack.org .
△ Less
Submitted 4 April, 2018; v1 submitted 19 February, 2018;
originally announced February 2018.
-
D2.4 Report on the final prototype of programming abstractions for energy-efficient inter-process communication
Authors:
Phuong Hoai Ha,
Vi Ngoc-Nha Tran,
Ibrahim Umar,
Aras Atalar,
Anders Gidenstam,
Paul Renaud-Goud,
Philippas Tsigas,
Ivan Walulya
Abstract:
Work package 2 (WP2) aims to develop libraries for energy-efficient inter-process communication and data sharing on the EXCESS platforms. The Deliverable D2.4 reports on the final prototype of programming abstractions for energy-efficient inter- process communication. Section 1 is the updated overview of the prototype of programming abstraction and devised power/energy models. The Section 2-6 cont…
▽ More
Work package 2 (WP2) aims to develop libraries for energy-efficient inter-process communication and data sharing on the EXCESS platforms. The Deliverable D2.4 reports on the final prototype of programming abstractions for energy-efficient inter- process communication. Section 1 is the updated overview of the prototype of programming abstraction and devised power/energy models. The Section 2-6 contain the latest results of the four studies: i) GreenBST, a energy-efficient and concurrent search tree (cf. Section 2) ii) Customization methodology for implementation of streaming aggregation in embedded systems (cf. Section 3) iii) Energy Model on CPU for Lock-free Data-structures in Dynamic Environments (cf. Section 4.10) iv) A General and Validated Energy Complexity Model for Multithreaded Algorithms (cf. Section 5)
△ Less
Submitted 8 February, 2018;
originally announced February 2018.
-
D2.3 Power models, energy models and libraries for energy-efficient concurrent data structures and algorithms
Authors:
Phuong Hoai Ha,
Vi Ngoc-Nha Tran,
Ibrahim Umar,
Aras Atalar,
Anders Gidenstam,
Paul Renaud-Goud,
Philippas Tsigas,
Ivan Walulya
Abstract:
This deliverable reports the results of the power models, energy models and libraries for energy-efficient concurrent data structures and algorithms as available by project month 30 of Work Package 2 (WP2). It reports i) the latest results of Task 2.2-2.4 on providing programming abstractions and libraries for develo** energy-efficient data structures and algorithms and ii) the improved results…
▽ More
This deliverable reports the results of the power models, energy models and libraries for energy-efficient concurrent data structures and algorithms as available by project month 30 of Work Package 2 (WP2). It reports i) the latest results of Task 2.2-2.4 on providing programming abstractions and libraries for develo** energy-efficient data structures and algorithms and ii) the improved results of Task 2.1 on investigating and modeling the trade-off between energy and performance of concurrent data structures and algorithms. The work has been conducted on two main EXCESS platforms: Intel platforms with recent Intel multicore CPUs and Movidius Myriad platforms.
△ Less
Submitted 8 February, 2018; v1 submitted 31 January, 2018;
originally announced January 2018.
-
REOH: Using Probabilistic Network for Runtime Energy Optimization of Heterogeneous Systems
Authors:
Vi Ngoc-Nha Tran,
Tommy Oines,
Alexander Horsch,
Phuong Hoai Ha
Abstract:
Significant efforts have been devoted to choosing the best configuration of a computing system to run an application energy efficiently. However, available tuning approaches mainly focus on homogeneous systems and are inextensible for heterogeneous systems which include several components (e.g., CPUs, GPUs) with different architectures. This study proposes a holistic tuning approach called REOH us…
▽ More
Significant efforts have been devoted to choosing the best configuration of a computing system to run an application energy efficiently. However, available tuning approaches mainly focus on homogeneous systems and are inextensible for heterogeneous systems which include several components (e.g., CPUs, GPUs) with different architectures. This study proposes a holistic tuning approach called REOH using probabilistic network to predict the most energy-efficient configuration (i.e., which platform and its setting) of a heterogeneous system for running a given application. Based on the computation and communication patterns from Berkeley dwarfs, we conduct experiments to devise the training set including 7074 data samples covering varying application patterns and characteristics. Validating the REOH approach on heterogeneous systems including CPUs and GPUs shows that the energy consumption by the REOH approach is close to the optimal energy consumption by the Brute Force approach while saving 17% of sampling runs compared to the previous (homogeneous) approach using probabilistic network. Based on the REOH approach, we develop an open-source energy-optimizing runtime framework for selecting an energy efficient configuration of a heterogeneous system for a given application at runtime.
△ Less
Submitted 16 September, 2018; v1 submitted 30 January, 2018;
originally announced January 2018.
-
D2.1 Models for energy consumption of data structures and algorithms
Authors:
Phuong Hoai Ha,
Vi Ngoc-Nha Tran,
Ibrahim Umar,
Philippas Tsigas,
Anders Gidenstam,
Paul Renaud-Goud,
Ivan Walulya,
Aras Atalar
Abstract:
This deliverable reports our early energy models for data structures and algorithms based on both micro-benchmarks and concurrent algorithms. It reports the early results of Task 2.1 on investigating and modeling the trade-off between energy and performance in concurrent data structures and algorithms, which forms the basis for the whole work package 2 (WP2). The work has been conducted on the two…
▽ More
This deliverable reports our early energy models for data structures and algorithms based on both micro-benchmarks and concurrent algorithms. It reports the early results of Task 2.1 on investigating and modeling the trade-off between energy and performance in concurrent data structures and algorithms, which forms the basis for the whole work package 2 (WP2). The work has been conducted on the two main EXCESS platforms: (1) Intel platform with recent Intel multi-core CPUs and (2) Movidius embedded platform.
△ Less
Submitted 8 February, 2018; v1 submitted 29 January, 2018;
originally announced January 2018.
-
D2.2 White-box methodologies, programming abstractions and libraries
Authors:
Phuong Hoai Ha,
Vi Ngoc-Nha Tran,
Ibrahim Umar,
Aras Atalar,
Anders Gidenstam,
Paul Renaud-Goud,
Philippas Tsigas
Abstract:
This deliverable reports the results of white-box methodologies and early results of the first prototype of libraries and programming abstractions as available by project month 18 by Work Package 2 (WP2). It reports i) the latest results of Task 2.2 on white-box methodologies, programming abstractions and libraries for develo** energy-efficient data structures and algorithms and ii) the improved…
▽ More
This deliverable reports the results of white-box methodologies and early results of the first prototype of libraries and programming abstractions as available by project month 18 by Work Package 2 (WP2). It reports i) the latest results of Task 2.2 on white-box methodologies, programming abstractions and libraries for develo** energy-efficient data structures and algorithms and ii) the improved results of Task 2.1 on investigating and modeling the trade-off between energy and performance of concurrent data structures and algorithms. The work has been conducted on two main EXCESS platforms: Intel platforms with recent Intel multicore CPUs and Movidius Myriad1 platform. Regarding white-box methodologies, we have devised new relaxed cache-oblivious models and proposed a new power model for Myriad1 platform and an energy model for lock-free queues on CPU platforms. For Myriad1 platform, the im- proved model now considers both computation and data movement cost as well as architecture and application properties. The model has been evaluated with a set of micro-benchmarks and application benchmarks. For Intel platforms, we have generalized the model for concurrent queues on CPU platforms to offer more flexibility according to the workers calling the data structure (parallel section sizes of enqueuers and dequeuers are decoupled). Regarding programming abstractions and libraries, we have continued investigat- ing the trade-offs between energy consumption and performance of data structures such as concurrent queues and concurrent search trees based on the early results of Task 2.1.The preliminary results show that our concurrent trees are faster and more energy efficient than the state-of-the-art on commodity HPC and embedded platforms.
△ Less
Submitted 8 February, 2018; v1 submitted 26 January, 2018;
originally announced January 2018.
-
Reinforcement Learning based Recommender System using Biclustering Technique
Authors:
Sungwoon Choi,
Heonseok Ha,
Uiwon Hwang,
Chanju Kim,
Jung-Woo Ha,
Sungroh Yoon
Abstract:
A recommender system aims to recommend items that a user is interested in among many items. The need for the recommender system has been expanded by the information explosion. Various approaches have been suggested for providing meaningful recommendations to users. One of the proposed approaches is to consider a recommender system as a Markov decision process (MDP) problem and try to solve it usin…
▽ More
A recommender system aims to recommend items that a user is interested in among many items. The need for the recommender system has been expanded by the information explosion. Various approaches have been suggested for providing meaningful recommendations to users. One of the proposed approaches is to consider a recommender system as a Markov decision process (MDP) problem and try to solve it using reinforcement learning (RL). However, existing RL-based methods have an obvious drawback. To solve an MDP in a recommender system, they encountered a problem with the large number of discrete actions that bring RL to a larger class of problems. In this paper, we propose a novel RL-based recommender system. We formulate a recommender system as a gridworld game by using a biclustering technique that can reduce the state and action space significantly. Using biclustering not only reduces space but also improves the recommendation quality effectively handling the cold-start problem. In addition, our approach can provide users with some explanation why the system recommends certain items. Lastly, we examine the proposed algorithm on a real-world dataset and achieve a better performance than the widely used recommendation algorithm.
△ Less
Submitted 16 January, 2018;
originally announced January 2018.
-
Regularity of Edge Ideals and Their Powers
Authors:
Arindam Banerjee,
Selvi Kara,
Huy Tai Ha
Abstract:
We survey recent studies on the Castelnuovo-Mumford regularity of edge ideals of graphs and their powers. Our focus is on bounds and exact values of $\text{reg} I(G)$ and the asymptotic linear function $\text{reg} I(G)^q$, for $q \geq 1,$ in terms of combinatorial data of the given graph $G.$
We survey recent studies on the Castelnuovo-Mumford regularity of edge ideals of graphs and their powers. Our focus is on bounds and exact values of $\text{reg} I(G)$ and the asymptotic linear function $\text{reg} I(G)^q$, for $q \geq 1,$ in terms of combinatorial data of the given graph $G.$
△ Less
Submitted 11 March, 2018; v1 submitted 3 December, 2017;
originally announced December 2017.
-
Modified defect relations of the Gauss map and the total curvature of a complete minimal surface
Authors:
Pham Hoang Ha
Abstract:
In this article, we propose some conditions on the modified defect relations of the Gauss map of a complete minimal surface $M$ to show that $M$ has finite total curvature.
In this article, we propose some conditions on the modified defect relations of the Gauss map of a complete minimal surface $M$ to show that $M$ has finite total curvature.
△ Less
Submitted 12 October, 2017; v1 submitted 9 October, 2017;
originally announced October 2017.
-
Non-integrated defect relations for the Gauss map of a complete minimal surface with finite total curvature in $\mathbb R^m$
Authors:
Pham Hoang Ha
Abstract:
In this article, we give the non-integrated defect relations for the Gauss map of a complete minimal surface with finite total curvature in $\mathbb R^m.$ This is a continuation of previous work of Ha-Trao [J. Math. Anal. Appl., \textbf{430} (2015), 76-84.], which we extend here to targets of higher dimension.
In this article, we give the non-integrated defect relations for the Gauss map of a complete minimal surface with finite total curvature in $\mathbb R^m.$ This is a continuation of previous work of Ha-Trao [J. Math. Anal. Appl., \textbf{430} (2015), 76-84.], which we extend here to targets of higher dimension.
△ Less
Submitted 4 October, 2017;
originally announced October 2017.
-
Constructing multi-modality and multi-classifier radiomics predictive models through reliable classifier fusion
Authors:
Zhiguo Zhou,
Zhi-Jie Zhou,
Hongxia Hao,
Shulong Li,
Xi Chen,
You Zhang,
Michael Folkert,
**g Wang
Abstract:
Radiomics aims to extract and analyze large numbers of quantitative features from medical images and is highly promising in staging, diagnosing, and predicting outcomes of cancer treatments. Nevertheless, several challenges need to be addressed to construct an optimal radiomics predictive model. First, the predictive performance of the model may be reduced when features extracted from an individua…
▽ More
Radiomics aims to extract and analyze large numbers of quantitative features from medical images and is highly promising in staging, diagnosing, and predicting outcomes of cancer treatments. Nevertheless, several challenges need to be addressed to construct an optimal radiomics predictive model. First, the predictive performance of the model may be reduced when features extracted from an individual imaging modality are blindly combined into a single predictive model. Second, because many different types of classifiers are available to construct a predictive model, selecting an optimal classifier for a particular application is still challenging. In this work, we developed multi-modality and multi-classifier radiomics predictive models that address the aforementioned issues in currently available models. Specifically, a new reliable classifier fusion strategy was proposed to optimally combine output from different modalities and classifiers. In this strategy, modality-specific classifiers were first trained, and an analytic evidential reasoning (ER) rule was developed to fuse the output score from each modality to construct an optimal predictive model. One public data set and two clinical case studies were performed to validate model performance. The experimental results indicated that the proposed ER rule based radiomics models outperformed the traditional models that rely on a single classifier or simply use combined features from different modalities.
△ Less
Submitted 5 October, 2017; v1 submitted 4 October, 2017;
originally announced October 2017.
-
Shell feature: a new radiomics descriptor for predicting distant failure after radiotherapy in non-small cell lung cancer and cervix cancer
Authors:
Hongxia Hao,
Zhiguo Zhou,
Shulong Li,
Genevieve Maquilan,
Michael R. Folkert,
Puneeth Iyengar,
Kenneth D. Westover,
Kevin Albuquerque,
Fang Liu,
Hak Choy,
Robert Timmerman,
Lin Yang,
**g Wang
Abstract:
Purpose To develop and demonstrate a novel tumor shell feature for predicting distant failure in non-small cell lung cancer (NSCLC) and cervical cancer (CC) patients. Patients and Methods The shell predictive model was constructed using pretreatment positron emission tomography (PET) images from 48 NSCLC patients received stereotactic body radiation therapy (SBRT) and 52 CC patients underwent exte…
▽ More
Purpose To develop and demonstrate a novel tumor shell feature for predicting distant failure in non-small cell lung cancer (NSCLC) and cervical cancer (CC) patients. Patients and Methods The shell predictive model was constructed using pretreatment positron emission tomography (PET) images from 48 NSCLC patients received stereotactic body radiation therapy (SBRT) and 52 CC patients underwent external beam radiation therapy and concurrent chemotherapy followed with high-dose-rate intracavitary brachytherapy. A shell feature, consisting of outer voxels around the tumor boundary, was extracted from a series of axial PET slices. The hypothesis behind this feature is that non-invasive and invasive tumors may have different morphologic patterns in the tumor periphery, in turn reflecting the differences in radiological presentations in the PET images. The utility of the shell was evaluated by the support vector machine (SVM) classifier in comparison with intensity, geometry, gray level co-occurrence matrix (GLCM) based texture, neighborhood gray tone difference matrix (NGTDM) based texture, and a combination of these four features. The results were assessed in terms of accuracy, sensitivity, specificity, and the area under the receiver operating curve (AUC). Results For NSCLC, the AUC achieved by the shell feature was 0.82 while the highest AUC achieved by the other features was 0.76. Similarly, for CC, the AUC achieved by the shell feature was 0.83 while the highest AUC achieved by the other features was 0.76. Also, the difference in performance between shell and the other features was significant (P < 0.005) in all cases. Conclusions We propose a boundary-based shell feature that correlates with tumor metastasis. The shell feature showed better predictive performance than all the other features for distant failure prediction in both NSCLC and CC.
△ Less
Submitted 27 September, 2017;
originally announced September 2017.
-
Thermoacoustics of solids: a pathway to solid state engines and refrigerators
Authors:
Haitian Hao,
Carlo Scalo,
Mihir Sen,
Fabio Semperlotti
Abstract:
Thermoacoustic oscillations have been one of the most exciting discoveries of the physics of fluids in the 19th century. Since its inception, scientists have formulated a comprehensive theoretical explanation of the basic phenomenon which has later found several practical applications to engineering devices. To-date, all studies have concentrated on the thermoacoustics of fluid media where this fa…
▽ More
Thermoacoustic oscillations have been one of the most exciting discoveries of the physics of fluids in the 19th century. Since its inception, scientists have formulated a comprehensive theoretical explanation of the basic phenomenon which has later found several practical applications to engineering devices. To-date, all studies have concentrated on the thermoacoustics of fluid media where this fascinating mechanism was exclusively believed to exist. Our study shows theoretical and numerical evidence of the existence of thermoacoustic instabilities in solid media. Although the underlying physical mechanism is analogous to its counterpart in fluids, the theoretical framework highlights relevant differences that have important implications on the ability to trigger and sustain the thermoacoustic response. This mechanism could pave the way to the development of highly robust and reliable solid-state thermoacoustic engines and refrigerators.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.