-
UADSN: Uncertainty-Aware Dual-Stream Network for Facial Nerve Segmentation
Authors:
Guanghao Zhu,
Lin Liu,
**g Zhang,
Xiaohui Du,
Ruqian Hao,
Juanxiu Liu
Abstract:
Facial nerve segmentation is crucial for preoperative path planning in cochlear implantation surgery. Recently, researchers have proposed some segmentation methods, such as atlas-based and deep learning-based methods. However, since the facial nerve is a tubular organ with a diameter of only 1.0-1.5mm, it is challenging to locate and segment the facial nerve in CT scans. In this work, we propose a…
▽ More
Facial nerve segmentation is crucial for preoperative path planning in cochlear implantation surgery. Recently, researchers have proposed some segmentation methods, such as atlas-based and deep learning-based methods. However, since the facial nerve is a tubular organ with a diameter of only 1.0-1.5mm, it is challenging to locate and segment the facial nerve in CT scans. In this work, we propose an uncertainty-aware dualstream network (UADSN). UADSN consists of a 2D segmentation stream and a 3D segmentation stream. Predictions from two streams are used to identify uncertain regions, and a consistency loss is employed to supervise the segmentation of these regions. In addition, we introduce channel squeeze & spatial excitation modules into the skip connections of U-shaped networks to extract meaningful spatial information. In order to consider topologypreservation, a clDice loss is introduced into the supervised loss function. Experimental results on the facial nerve dataset demonstrate the effectiveness of UADSN and our submodules.
△ Less
Submitted 28 June, 2024;
originally announced July 2024.
-
AstMatch: Adversarial Self-training Consistency Framework for Semi-Supervised Medical Image Segmentation
Authors:
Guanghao Zhu,
**g Zhang,
Juanxiu Liu,
Xiaohui Du,
Ruqian Hao,
Yong Liu,
Lin Liu
Abstract:
Semi-supervised learning (SSL) has shown considerable potential in medical image segmentation, primarily leveraging consistency regularization and pseudo-labeling. However, many SSL approaches only pay attention to low-level consistency and overlook the significance of pseudo-label reliability. Therefore, in this work, we propose an adversarial self-training consistency framework (AstMatch). First…
▽ More
Semi-supervised learning (SSL) has shown considerable potential in medical image segmentation, primarily leveraging consistency regularization and pseudo-labeling. However, many SSL approaches only pay attention to low-level consistency and overlook the significance of pseudo-label reliability. Therefore, in this work, we propose an adversarial self-training consistency framework (AstMatch). Firstly, we design an adversarial consistency regularization (ACR) approach to enhance knowledge transfer and strengthen prediction consistency under varying perturbation intensities. Second, we apply a feature matching loss for adversarial training to incorporate high-level consistency regularization. Additionally, we present the pyramid channel attention (PCA) and efficient channel and spatial attention (ECSA) modules to improve the discriminator's performance. Finally, we propose an adaptive self-training (AST) approach to ensure the pseudo-labels' quality. The proposed AstMatch has been extensively evaluated with cutting-edge SSL methods on three public-available datasets. The experimental results under different labeled ratios indicate that AstMatch outperforms other existing methods, achieving new state-of-the-art performance. Our code will be available at https://github.com/GuanghaoZhu663/AstMatch.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
SKD-TSTSAN: Three-Stream Temporal-Shift Attention Network Based on Self-Knowledge Distillation for Micro-Expression Recognition
Authors:
Guanghao Zhu,
Lin Liu,
Yuhao Hu,
Haixin Sun,
Fang Liu,
Xiaohui Du,
Ruqian Hao,
Juanxiu Liu,
Yong Liu,
Hao Deng,
**g Zhang
Abstract:
Micro-expressions (MEs) are subtle facial movements that occur spontaneously when people try to conceal the real emotions. Micro-expression recognition (MER) is crucial in many fields, including criminal analysis and psychotherapy. However, MER is challenging since MEs have low intensity and ME datasets are small in size. To this end, a three-stream temporal-shift attention network based on self-k…
▽ More
Micro-expressions (MEs) are subtle facial movements that occur spontaneously when people try to conceal the real emotions. Micro-expression recognition (MER) is crucial in many fields, including criminal analysis and psychotherapy. However, MER is challenging since MEs have low intensity and ME datasets are small in size. To this end, a three-stream temporal-shift attention network based on self-knowledge distillation (SKD-TSTSAN) is proposed in this paper. Firstly, to address the low intensity of ME muscle movements, we utilize learning-based motion magnification modules to enhance the intensity of ME muscle movements. Secondly, we employ efficient channel attention (ECA) modules in the local-spatial stream to make the network focus on facial regions that are highly relevant to MEs. In addition, temporal shift modules (TSMs) are used in the dynamic-temporal stream, which enables temporal modeling with no additional parameters by mixing ME motion information from two different temporal domains. Furthermore, we introduce self-knowledge distillation (SKD) into the MER task by introducing auxiliary classifiers and using the deepest section of the network for supervision, encouraging all blocks to fully explore the features of the training set. Finally, extensive experiments are conducted on four ME datasets: CASME II, SAMM, MMEW, and CAS(ME)3. The experimental results demonstrate that our SKD-TSTSAN outperforms other existing methods and achieves new state-of-the-art performance. Our code will be available at https://github.com/GuanghaoZhu663/SKD-TSTSAN.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Unified End-to-End V2X Cooperative Autonomous Driving
Authors:
Zhiwei Li,
Bozhen Zhang,
Lei Yang,
Tianyu Shen,
Nuo Xu,
Ruosen Hao,
Weiting Li,
Tao Yan,
Hua** Liu
Abstract:
V2X cooperation, through the integration of sensor data from both vehicles and infrastructure, is considered a pivotal approach to advancing autonomous driving technology. Current research primarily focuses on enhancing perception accuracy, often overlooking the systematic improvement of accident prediction accuracy through end-to-end learning, leading to insufficient attention to the safety issue…
▽ More
V2X cooperation, through the integration of sensor data from both vehicles and infrastructure, is considered a pivotal approach to advancing autonomous driving technology. Current research primarily focuses on enhancing perception accuracy, often overlooking the systematic improvement of accident prediction accuracy through end-to-end learning, leading to insufficient attention to the safety issues of autonomous driving. To address this challenge, this paper introduces the UniE2EV2X framework, a V2X-integrated end-to-end autonomous driving system that consolidates key driving modules within a unified network. The framework employs a deformable attention-based data fusion strategy, effectively facilitating cooperation between vehicles and infrastructure. The main advantages include: 1) significantly enhancing agents' perception and motion prediction capabilities, thereby improving the accuracy of accident predictions; 2) ensuring high reliability in the data fusion process; 3) superior end-to-end perception compared to modular approaches. Furthermore, We implement the UniE2EV2X framework on the challenging DeepAccident, a simulation dataset designed for V2X cooperative driving.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Minimum saturated graphs for unions of cliques
Authors:
Wen-Han Zhu,
Rong-Xia Hao,
Zhen He
Abstract:
Let $H$ be a fixed graph. A graph $G$ is called {\it $H$-saturated} if $H$ is not a subgraph of $G$ but the addition of any missing edge to $G$ results in an $H$-subgraph. The {\it saturation number} of $H$, denoted $sat(n,H)$, is the minimum number of edges over all $H$-saturated graphs of order $n$, and $Sat(n,H)$ denote the family of $H$-saturated graphs with $sat(n,H)$ edges and $n$ vertices.…
▽ More
Let $H$ be a fixed graph. A graph $G$ is called {\it $H$-saturated} if $H$ is not a subgraph of $G$ but the addition of any missing edge to $G$ results in an $H$-subgraph. The {\it saturation number} of $H$, denoted $sat(n,H)$, is the minimum number of edges over all $H$-saturated graphs of order $n$, and $Sat(n,H)$ denote the family of $H$-saturated graphs with $sat(n,H)$ edges and $n$ vertices. In this paper, we resolve a conjecture of Chen and Yuan in[Discrete Math. 347(2024)113868] by determining $Sat(n,K_p\cup (t-1)K_q)$ for every $2\le p\le q$ and $t\ge 2$.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
RCooper: A Real-world Large-scale Dataset for Roadside Cooperative Perception
Authors:
Ruiyang Hao,
Siqi Fan,
Yingru Dai,
Zhenlin Zhang,
Chenxi Li,
Yuntian Wang,
Haibao Yu,
Wenxian Yang,
Jirui Yuan,
Zaiqing Nie
Abstract:
The value of roadside perception, which could extend the boundaries of autonomous driving and traffic management, has gradually become more prominent and acknowledged in recent years. However, existing roadside perception approaches only focus on the single-infrastructure sensor system, which cannot realize a comprehensive understanding of a traffic area because of the limited sensing range and bl…
▽ More
The value of roadside perception, which could extend the boundaries of autonomous driving and traffic management, has gradually become more prominent and acknowledged in recent years. However, existing roadside perception approaches only focus on the single-infrastructure sensor system, which cannot realize a comprehensive understanding of a traffic area because of the limited sensing range and blind spots. Orienting high-quality roadside perception, we need Roadside Cooperative Perception (RCooper) to achieve practical area-coverage roadside perception for restricted traffic areas. Rcooper has its own domain-specific challenges, but further exploration is hindered due to the lack of datasets. We hence release the first real-world, large-scale RCooper dataset to bloom the research on practical roadside cooperative perception, including detection and tracking. The manually annotated dataset comprises 50k images and 30k point clouds, including two representative traffic scenes (i.e., intersection and corridor). The constructed benchmarks prove the effectiveness of roadside cooperation perception and demonstrate the direction of further research. Codes and dataset can be accessed at: https://github.com/AIR-THU/DAIR-RCooper.
△ Less
Submitted 31 March, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Packing internally disjoint Steiner paths of data center networks
Authors:
Wen-Han Zhu,
Rong-Xia Hao,
Jou-Ming Chang,
Jaeun Lee
Abstract:
Let $S\subseteq V(G)$ and $π_{G}(S)$ denote the maximum number $t$ of edge-disjoint paths $P_{1},P_{2},\ldots,P_{t}$ in a graph $G$ such that $V(P_{i})\cap V(P_{j})=S$ for any $i,j\in\{1,2,\ldots,t\}$ and $i\neq j$. If $S=V(G)$, then $π_{G}(S)$ is the maximum number of edge-disjoint spanning paths in $G$. It is proved [Graphs Combin., 37 (2021) 2521-2533] that deciding whether $π_G(S)\geq r$ is NP…
▽ More
Let $S\subseteq V(G)$ and $π_{G}(S)$ denote the maximum number $t$ of edge-disjoint paths $P_{1},P_{2},\ldots,P_{t}$ in a graph $G$ such that $V(P_{i})\cap V(P_{j})=S$ for any $i,j\in\{1,2,\ldots,t\}$ and $i\neq j$. If $S=V(G)$, then $π_{G}(S)$ is the maximum number of edge-disjoint spanning paths in $G$. It is proved [Graphs Combin., 37 (2021) 2521-2533] that deciding whether $π_G(S)\geq r$ is NP-complete for a given $S\subseteq V(G)$. For an integer $r$ with $2\leq r\leq n$, the $r$-path connectivity of a graph $G$ is defined as $π_{r}(G)=$min$\{π_{G}(S)|S\subseteq V(G)$ and $|S|=r\}$, which is a generalization of tree connectivity. In this paper, we study the $3$-path connectivity of the $k$-dimensional data center network with $n$-port switches $D_{k,n}$ which has significate role in the cloud computing, and prove that $π_{3}(D_{k,n})=\lfloor\frac{2n+3k}{4}\rfloor$ with $k\geq 1$ and $n\geq 6$.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
HybridGait: A Benchmark for Spatial-Temporal Cloth-Changing Gait Recognition with Hybrid Explorations
Authors:
Yilan Dong,
Chunlin Yu,
Ruiyang Ha,
Ye Shi,
Yuexin Ma,
Lan Xu,
Yanwei Fu,
**gya Wang
Abstract:
Existing gait recognition benchmarks mostly include minor clothing variations in the laboratory environments, but lack persistent changes in appearance over time and space. In this paper, we propose the first in-the-wild benchmark CCGait for cloth-changing gait recognition, which incorporates diverse clothing changes, indoor and outdoor scenes, and multi-modal statistics over 92 days. To further a…
▽ More
Existing gait recognition benchmarks mostly include minor clothing variations in the laboratory environments, but lack persistent changes in appearance over time and space. In this paper, we propose the first in-the-wild benchmark CCGait for cloth-changing gait recognition, which incorporates diverse clothing changes, indoor and outdoor scenes, and multi-modal statistics over 92 days. To further address the coupling effect of clothing and viewpoint variations, we propose a hybrid approach HybridGait that exploits both temporal dynamics and the projected 2D information of 3D human meshes. Specifically, we introduce a Canonical Alignment Spatial-Temporal Transformer (CA-STT) module to encode human joint position-aware features, and fully exploit 3D dense priors via a Silhouette-guided Deformation with 3D-2D Appearance Projection (SilD) strategy. Our contributions are twofold: we provide a challenging benchmark CCGait that captures realistic appearance changes across an expanded and space, and we propose a hybrid framework HybridGait that outperforms prior works on CCGait and Gait3D benchmarks. Our project page is available at https://github.com/HCVLab/HybridGait.
△ Less
Submitted 30 December, 2023;
originally announced January 2024.
-
Collaborative planning and optimization for electric-thermal-hydrogen-coupled energy systems with portfolio selection of the complete hydrogen energy chain
Authors:
Xinning Yi,
Tianguang Lu,
Yixiao Li,
Qian Ai,
Ran Hao
Abstract:
Under the global low-carbon target, the uneven spatiotemporal distribution of renewable energy resources exacerbates the uncertainty and seasonal power imbalance. Additionally, the issue of an incomplete hydrogen energy chain is widely overlooked in planning models, which hinders the complete analysis of the role of hydrogen in energy systems. Therefore, this paper proposes a high-resolution colla…
▽ More
Under the global low-carbon target, the uneven spatiotemporal distribution of renewable energy resources exacerbates the uncertainty and seasonal power imbalance. Additionally, the issue of an incomplete hydrogen energy chain is widely overlooked in planning models, which hinders the complete analysis of the role of hydrogen in energy systems. Therefore, this paper proposes a high-resolution collaborative planning model for electricity-thermal-hydrogen-coupled energy systems considering both the spatiotemporal distribution characteristics of renewable energy resources and the multi-scale bottom-to-top investment strategy for the complete hydrogen energy chain. Considering the high-resolution system operation flexibility, this paper proposes a hydrogen chain-based fast clustering optimization method that can handle high-dimensional data and multi-time scale operation characteristics. The model optimizes the geographical distribution and capacity configuration of the Northeast China energy system in 2050, with hourly operational characteristics. The planning optimization covered single-energy devices, multi-energy-coupled conversion devices, and electric-hydrogen transmission networks. Last but not least, this paper thoroughly examines the optimal portfolio selection of different hydrogen technologies based on the differences in cost, flexibility, and efficiency. In the Pareto analysis, the proposed model reduces CO2 emissions by 60% with a competitive cost. This paper provides a zero-carbon pathway for multi-energy systems with a cost 4% less than the social cost of carbon $44.6/ton, and the integration of the complete hydrogen energy chain reduces the renewable energy curtailment by 97.0%. Besides, the portfolio selection results indicate that the system favors the SOEC with the highest energy efficiency and the PEMFC with the fastest dynamic response when achieving zero-carbon emissions
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Gravity Spy: Lessons Learned and a Path Forward
Authors:
Michael Zevin,
Corey B. Jackson,
Zoheyr Doctor,
Yunan Wu,
Carsten Østerlund,
L. Clifton Johnson,
Christopher P. L. Berry,
Kevin Crowston,
Scott B. Coughlin,
Vicky Kalogera,
Sharan Banagiri,
Derek Davis,
Jane Glanzer,
Renzhi Hao,
Aggelos K. Katsaggelos,
Oli Patane,
Jennifer Sanchez,
Joshua Smith,
Siddharth Soni,
Laura Trouille,
Marissa Walker,
Irina Aerith,
Wilfried Domainko,
Victor-Georges Baranowski,
Gerhard Niklasch
, et al. (1 additional authors not shown)
Abstract:
The Gravity Spy project aims to uncover the origins of glitches, transient bursts of noise that hamper analysis of gravitational-wave data. By using both the work of citizen-science volunteers and machine-learning algorithms, the Gravity Spy project enables reliable classification of glitches. Citizen science and machine learning are intrinsically coupled within the Gravity Spy framework, with mac…
▽ More
The Gravity Spy project aims to uncover the origins of glitches, transient bursts of noise that hamper analysis of gravitational-wave data. By using both the work of citizen-science volunteers and machine-learning algorithms, the Gravity Spy project enables reliable classification of glitches. Citizen science and machine learning are intrinsically coupled within the Gravity Spy framework, with machine-learning classifications providing a rapid first-pass classification of the dataset and enabling tiered volunteer training, and volunteer-based classifications verifying the machine classifications, bolstering the machine-learning training set and identifying new morphological classes of glitches. These classifications are now routinely used in studies characterizing the performance of the LIGO gravitational-wave detectors. Providing the volunteers with a training framework that teaches them to classify a wide range of glitches, as well as additional tools to aid their investigations of interesting glitches, empowers them to make discoveries of new classes of glitches. This demonstrates that, when giving suitable support, volunteers can go beyond simple classification tasks to identify new features in data at a level comparable to domain experts. The Gravity Spy project is now providing volunteers with more complicated data that includes auxiliary monitors of the detector to identify the root cause of glitches.
△ Less
Submitted 31 January, 2024; v1 submitted 29 August, 2023;
originally announced August 2023.
-
Avoidance Navigation Based on Offline Pre-Training Reinforcement Learning
Authors:
Yang Wenkai Ji Ruihang Zhang Yuxiang Lei Hao,
Zhao Zijie
Abstract:
This paper presents a Pre-Training Deep Reinforcement Learning(DRL) for avoidance navigation without map for mobile robots which map raw sensor data to control variable and navigate in an unknown environment. The efficient offline training strategy is proposed to speed up the inefficient random explorations in early stage and we also collect a universal dataset including expert experience for offl…
▽ More
This paper presents a Pre-Training Deep Reinforcement Learning(DRL) for avoidance navigation without map for mobile robots which map raw sensor data to control variable and navigate in an unknown environment. The efficient offline training strategy is proposed to speed up the inefficient random explorations in early stage and we also collect a universal dataset including expert experience for offline training, which is of some significance for other navigation training work. The pre-training and prioritized expert experience are proposed to reduce 80\% training time and has been verified to improve the 2 times reward of DRL. The advanced simulation gazebo with real physical modelling and dynamic equations reduce the gap between sim-to-real. We train our model a corridor environment, and evaluate the model in different environment getting the same effect. Compared to traditional method navigation, we can confirm the trained model can be directly applied into different scenarios and have the ability to no collision navigate. It was demonstrated that our DRL model have universal general capacity in different environment.
△ Less
Submitted 3 August, 2023;
originally announced August 2023.
-
Enhancing Human Capabilities through Symbiotic Artificial Intelligence with Shared Sensory Experiences
Authors:
Rui Hao,
Dianbo Liu,
Linmei Hu
Abstract:
The merging of human intelligence and artificial intelligence has long been a subject of interest in both science fiction and academia. In this paper, we introduce a novel concept in Human-AI interaction called Symbiotic Artificial Intelligence with Shared Sensory Experiences (SAISSE), which aims to establish a mutually beneficial relationship between AI systems and human users through shared sens…
▽ More
The merging of human intelligence and artificial intelligence has long been a subject of interest in both science fiction and academia. In this paper, we introduce a novel concept in Human-AI interaction called Symbiotic Artificial Intelligence with Shared Sensory Experiences (SAISSE), which aims to establish a mutually beneficial relationship between AI systems and human users through shared sensory experiences. By integrating multiple sensory input channels and processing human experiences, SAISSE fosters a strong human-AI bond, enabling AI systems to learn from and adapt to individual users, providing personalized support, assistance, and enhancement. Furthermore, we discuss the incorporation of memory storage units for long-term growth and development of both the AI system and its human user. As we address user privacy and ethical guidelines for responsible AI-human symbiosis, we also explore potential biases and inequalities in AI-human symbiosis and propose strategies to mitigate these challenges. Our research aims to provide a comprehensive understanding of the SAISSE concept and its potential to effectively support and enhance individual human users through symbiotic AI systems. This position article aims at discussing poteintial AI-human interaction related topics within the scientific community, rather than providing experimental or theoretical results.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
ChatLLM Network: More brains, More intelligence
Authors:
Rui Hao,
Linmei Hu,
Weijian Qi,
Qingliu Wu,
Yirui Zhang,
Liqiang Nie
Abstract:
Dialogue-based language models mark a huge milestone in the field of artificial intelligence, by their impressive ability to interact with users, as well as a series of challenging tasks prompted by customized instructions. However, the prevalent large-scale dialogue-based language models like ChatGPT still have room for improvement, such as unstable responses to questions and the inability to thi…
▽ More
Dialogue-based language models mark a huge milestone in the field of artificial intelligence, by their impressive ability to interact with users, as well as a series of challenging tasks prompted by customized instructions. However, the prevalent large-scale dialogue-based language models like ChatGPT still have room for improvement, such as unstable responses to questions and the inability to think cooperatively like humans. Considering the ability of dialogue-based language models in conversation and their inherent randomness in thinking, we propose ChatLLM network that allows multiple dialogue-based language models to interact, provide feedback, and think together. We design the network of ChatLLMs based on ChatGPT. Specifically, individual instances of ChatGPT may possess distinct perspectives towards the same problem, and by consolidating these diverse viewpoints via a separate ChatGPT, the ChatLLM network system can conduct decision-making more objectively and comprehensively. In addition, a language-based feedback mechanism comparable to backpropagation is devised to update the ChatGPTs within the network. Experiments on two datasets demonstrate that our network attains significant improvements in problem-solving, leading to observable progress amongst each member.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
The extremal unicyclic graphs of the revised edge Szeged index with given diameter
Authors:
Shengjie He,
Qiaozhi Geng,
Rong-Xia Hao
Abstract:
Let $G$ be a connected graph. The revised edge Szeged index of $G$ is defined as $Sz^{\ast}_{e}(G)=\sum\limits_{e=uv\in E(G)}(m_{u}(e|G)+\frac{m_{0}(e|G)}{2})(m_{v}(e|G)+\frac{m_{0}(e|G)}{2})$, where $m_{u}(e|G)$ (resp., $m_{v}(e|G)$) is the number of edges whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex $v$ (resp., $u$), and $m_{0}(e|G)$ is the number of edges equ…
▽ More
Let $G$ be a connected graph. The revised edge Szeged index of $G$ is defined as $Sz^{\ast}_{e}(G)=\sum\limits_{e=uv\in E(G)}(m_{u}(e|G)+\frac{m_{0}(e|G)}{2})(m_{v}(e|G)+\frac{m_{0}(e|G)}{2})$, where $m_{u}(e|G)$ (resp., $m_{v}(e|G)$) is the number of edges whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex $v$ (resp., $u$), and $m_{0}(e|G)$ is the number of edges equidistant from both ends of $e$, respectively. In this paper, the graphs with minimum revised edge Szeged index among all the unicyclic graphs with given diameter are characterized.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
No mixed graph with the nullity $η(\widetilde{G})=|V(G)|-2m(G)+2c(G)-1$
Authors:
Shengjie He,
Rong-Xia Hao,
Hong-Jian Lai,
Qiaozhi Geng
Abstract:
A mixed graph $\widetilde{G}$ is obtained from a simple undirected graph $G$, the underlying graph of $\widetilde{G}$, by orienting some edges of $G$. Let $c(G)=|E(G)|-|V(G)|+ω(G)$ be the cyclomatic number of $G$ with $ω(G)$ the number of connected components of $G$, $m(G)$ be the matching number of $G$, and $η(\widetilde{G})$ be the nullity of $\widetilde{G}$. Chen et al. (2018)\cite{LSC} and Tia…
▽ More
A mixed graph $\widetilde{G}$ is obtained from a simple undirected graph $G$, the underlying graph of $\widetilde{G}$, by orienting some edges of $G$. Let $c(G)=|E(G)|-|V(G)|+ω(G)$ be the cyclomatic number of $G$ with $ω(G)$ the number of connected components of $G$, $m(G)$ be the matching number of $G$, and $η(\widetilde{G})$ be the nullity of $\widetilde{G}$. Chen et al. (2018)\cite{LSC} and Tian et al. (2018)\cite{TFL} proved independently that $|V(G)|-2m(G)-2c(G) \leq η(\widetilde{G}) \leq |V(G)|-2m(G)+2c(G)$, respectively, and they characterized the mixed graphs with nullity attaining the upper bound and the lower bound. In this paper, we prove that there is no mixed graph with nullity $η(\widetilde{G})=|V(G)|-2m(G)+2c(G)-1$. Moreover, for fixed $c(G)$, there are infinitely many connected mixed graphs with nullity $|V(G)|-2m(G)+2c(G)-s$ $( 0 \leq s \leq 3c(G), s\neq1 )$ is proved.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
BLOOM: A 176B-Parameter Open-Access Multilingual Language Model
Authors:
BigScience Workshop,
:,
Teven Le Scao,
Angela Fan,
Christopher Akiki,
Ellie Pavlick,
Suzana Ilić,
Daniel Hesslow,
Roman Castagné,
Alexandra Sasha Luccioni,
François Yvon,
Matthias Gallé,
Jonathan Tow,
Alexander M. Rush,
Stella Biderman,
Albert Webson,
Pawan Sasanka Ammanamanchi,
Thomas Wang,
Benoît Sagot,
Niklas Muennighoff,
Albert Villanova del Moral,
Olatunji Ruwase,
Rachel Bawden,
Stas Bekman,
Angelina McMillan-Major
, et al. (369 additional authors not shown)
Abstract:
Large language models (LLMs) have been shown to be able to perform new tasks based on a few demonstrations or natural language instructions. While these capabilities have led to widespread adoption, most LLMs are developed by resource-rich organizations and are frequently kept from the public. As a step towards democratizing this powerful technology, we present BLOOM, a 176B-parameter open-access…
▽ More
Large language models (LLMs) have been shown to be able to perform new tasks based on a few demonstrations or natural language instructions. While these capabilities have led to widespread adoption, most LLMs are developed by resource-rich organizations and are frequently kept from the public. As a step towards democratizing this powerful technology, we present BLOOM, a 176B-parameter open-access language model designed and built thanks to a collaboration of hundreds of researchers. BLOOM is a decoder-only Transformer language model that was trained on the ROOTS corpus, a dataset comprising hundreds of sources in 46 natural and 13 programming languages (59 in total). We find that BLOOM achieves competitive performance on a wide variety of benchmarks, with stronger results after undergoing multitask prompted finetuning. To facilitate future research and applications using LLMs, we publicly release our models and code under the Responsible AI License.
△ Less
Submitted 27 June, 2023; v1 submitted 9 November, 2022;
originally announced November 2022.
-
Optimizing Irregular-Shaped Matrix-Matrix Multiplication on Multi-Core DSPs
Authors:
Shangfei Yin,
Qinglin Wang,
Ruochen Hao,
Tianyang Zhou,
Songzhu Mei,
Jie Liu
Abstract:
General Matrix Multiplication (GEMM) has a wide range of applications in scientific simulation and artificial intelligence. Although traditional libraries can achieve high performance on large regular-shaped GEMMs, they often behave not well on irregular-shaped GEMMs, which are often found in new algorithms and applications of high-performance computing (HPC). Due to energy efficiency constraints,…
▽ More
General Matrix Multiplication (GEMM) has a wide range of applications in scientific simulation and artificial intelligence. Although traditional libraries can achieve high performance on large regular-shaped GEMMs, they often behave not well on irregular-shaped GEMMs, which are often found in new algorithms and applications of high-performance computing (HPC). Due to energy efficiency constraints, low-power multi-core digital signal processors (DSPs) have become an alternative architecture in HPC systems. Targeting multi-core DSPs in FT-m7032, a prototype CPU-DSPs heterogeneous processor for HPC, an efficient implementation - ftIMM - for three types of irregular-shaped GEMMs is proposed. FtIMM supports automatic generation of assembly micro-kernels, two parallelization strategies, and auto-tuning of block sizes and parallelization strategies. The experiments show that ftIMM can get better performance than the traditional GEMM implementations on multi-core DSPs in FT-m7032, yielding on up to 7.2x performance improvement, when performing on irregular-shaped GEMMs. And ftIMM on multi-core DSPs can also far outperform the open source library on multi-core CPUs in FT-m7032, delivering up to 3.1x higher efficiency.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
Towards Effective Depthwise Convolutions on ARMv8 Architecture
Authors:
Ruochen Hao,
Qinglin Wang,
Shangfei Yin,
Tianyang Zhou,
Siqi Shen,
Songzhu Mei,
Jie Liu
Abstract:
Depthwise convolutions are widely used in lightweight convolutional neural networks (CNNs). The performance of depthwise convolutions is mainly bounded by the memory access rather than the arithmetic operations for classic convolutions so that direct algorithms are often more efficient than indirect ones (matrix multiplication-, Winograd-, and FFT-based convolutions) with additional memory accesse…
▽ More
Depthwise convolutions are widely used in lightweight convolutional neural networks (CNNs). The performance of depthwise convolutions is mainly bounded by the memory access rather than the arithmetic operations for classic convolutions so that direct algorithms are often more efficient than indirect ones (matrix multiplication-, Winograd-, and FFT-based convolutions) with additional memory accesses. However, the existing direct implementations of depthwise convolutions on ARMv8 architectures feature a bad trade-off between register-level reuse of different tensors, which usually leads to sub-optimal performance. In this paper, we propose new direct implementations of depthwise convolutions by means of implicit padding, register tiling, etc., which contain forward propagation, backward propagation and weight gradient update procedures. Compared to the existing ones, our new implementations can incur much less communication overhead between registers and cache. Experimental results on two ARMv8 CPUs show that our implementations can averagely deliver 4.88x and 16.4x performance improvement over the existing direct ones in open source libraries and matrix multiplications-based ones in Pytorch, respectively.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Real-time Cooperative Vehicle Coordination at Unsignalized Road Intersections
Authors:
Ji** Luo,
Tingting Zhang,
Rui Hao,
Donglin Li,
Chunsheng Chen,
Zhenyu Na,
Qinyu Zhang
Abstract:
Cooperative coordination at unsignalized road intersections, which aims to improve the driving safety and traffic throughput for connected and automated vehicles, has attracted increasing interests in recent years. However, most existing investigations either suffer from computational complexity or cannot harness the full potential of the road infrastructure. To this end, we first present a dedica…
▽ More
Cooperative coordination at unsignalized road intersections, which aims to improve the driving safety and traffic throughput for connected and automated vehicles, has attracted increasing interests in recent years. However, most existing investigations either suffer from computational complexity or cannot harness the full potential of the road infrastructure. To this end, we first present a dedicated intersection coordination framework, where the involved vehicles hand over their control authorities and follow instructions from a centralized coordinator. Then a unified cooperative trajectory optimization problem will be formulated to maximize the traffic throughput while ensuring the driving safety and long-term stability of the coordination system. To address the key computational challenges in the real-world deployment, we reformulate this non-convex sequential decision problem into a model-free Markov Decision Process (MDP) and tackle it by devising a Twin Delayed Deep Deterministic Policy Gradient (TD3)-based strategy in the deep reinforcement learning (DRL) framework. Simulation and practical experiments show that the proposed strategy could achieve near-optimal performance in sub-static coordination scenarios and significantly improve the traffic throughput in the realistic continuous traffic flow. The most remarkable advantage is that our strategy could reduce the time complexity of computation to milliseconds, and is shown scalable when the road lanes increase.
△ Less
Submitted 22 March, 2023; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Neutron capture measurement and resonance parameter analysis of natSm
Authors:
X. X. Li,
L. X. Liu,
W. Jiang,
J. Ren,
H. W. Wang,
G. T. Fan,
J. J. He,
D. X. Wang,
S. Y Zhang,
Z. D. An,
X. G. Cao,
L. L. Song,
Y. Zhang,
X. R. Hu,
Z. R. Hao,
P. Kuang,
B. Jiang,
X. H. Wang,
J. F. Hu,
Y. D. Liu,
X. Ma,
C. W. Ma,
Y. T. Wang,
J. Su,
L. Y. Zhang
, et al. (5 additional authors not shown)
Abstract:
Multiple isotopes of samarium element are the isotopes produced by the s process, and 154Sm is produced by the r process. In addition, 144Sm is p nuclei in nuclear astrophysics. The measurement of these can help us to better understand the results of relevant photonuclear reaction experiments. On the other hand, 149Sm is a 235U fission product with a 1% yield, its cross sections are important to r…
▽ More
Multiple isotopes of samarium element are the isotopes produced by the s process, and 154Sm is produced by the r process. In addition, 144Sm is p nuclei in nuclear astrophysics. The measurement of these can help us to better understand the results of relevant photonuclear reaction experiments. On the other hand, 149Sm is a 235U fission product with a 1% yield, its cross sections are important to reactor neutronics. In this work, the neutron capture yield of the natural samarium target was measured at the back-streaming white neutron beamline (Back-n) of the China Spallation Neutron Source (CSNS), and the resonance parameters were analyzed by SAMMY code. The resonance peaks and the neutron separation energies contributed by the different isotopes are considered individually. The results of the capture yield found signs of the possibility of two resonance peaks at 8 eV, which awaits further experimental examination. Cross-section was calculated according to resonance parameters and was compared with other experimental results and evaluation databases of ENDF/B-VIII.0 and CENDL-3.2. A clear difference between ENDF/B VIII.0 and CENDL-3.2 database appears at 23.2 eV, the experimental result at this energy is smaller than data of ENDF/B VIII.0 database but CENDL-3.2 database. Most of the controversial experimental results invariably come from the samarium 149 isotope.
△ Less
Submitted 8 April, 2022;
originally announced April 2022.
-
p-process chaser detector in $n$-$γ$ coincidences
Authors:
H. Utsunomiya,
Z. R. Hao,
S. Goriely,
X. G. Cao,
G. T. Fan,
H. W. Wang
Abstract:
We propose two types of neutron-$γ_1$-$γ_2$ triple coincidence detectors (not constructed) to chase gamma transitions to produce p-nuclei following the neutron emission in the $(γ, n)$ reaction. Neutrons are detected with 24 $^3$He counters embedded in a polyethylene moderator in Type I detector and with 6 liquid scintillation detectors in Type II detector, respectively. $γ$ rays are detected with…
▽ More
We propose two types of neutron-$γ_1$-$γ_2$ triple coincidence detectors (not constructed) to chase gamma transitions to produce p-nuclei following the neutron emission in the $(γ, n)$ reaction. Neutrons are detected with 24 $^3$He counters embedded in a polyethylene moderator in Type I detector and with 6 liquid scintillation detectors in Type II detector, respectively. $γ$ rays are detected with two high-purity germanium detectors and four LaBr$_3$(Ce) detectors. The detector which is referred to as p-process chaser detector is used to search for mediating states in $^{180}$Ta through which the isomeric and ground states in $^{180}$Ta are thermalized in the p-process. A search is made for both resonant states and unresolved states in high nuclear-level-density domain.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
Simulation of the band structure of InAs/GaSb type II superlattices utilizing multiple energy band theories
Authors:
Shuiliu Fang,
Ruiting Hao,
Longgang Zhang,
Jie Guo,
Wuming Liu
Abstract:
Antimonide type II superlattices is expected to overtake HgCdTe as the preferred materials for infrared detection due to their excellent photoelectric properties and flexible and adjustable band structures. Among these compounds, InAs/GaSb type II superlattices represents the most commonly studied materials. However, the sophisticated physics associated with the antimonide-based bandgap engineerin…
▽ More
Antimonide type II superlattices is expected to overtake HgCdTe as the preferred materials for infrared detection due to their excellent photoelectric properties and flexible and adjustable band structures. Among these compounds, InAs/GaSb type II superlattices represents the most commonly studied materials. However, the sophisticated physics associated with the antimonide-based bandgap engineering concept started at the beginning of 1990s gave a new impact and interest in development of infrared detector structures within academic and national laboratories. InAs/GaSb superlattices is a type II disconnected band structure with electrons and holes confined in the InAs and GaSb layers, respectively. The electron micro-band and hole micro-band can be regulated separately by adjusting the InAs and GaSb layers, which facilitates the design of superlattice structures and maximizes the amount of energy band offset. These works constituted a theoretical basis for the effective utilization of the InAs/GaSb system in material optimization and designing new SL structures; they also provided an opportunity for the preparation and rapid development of InAs/GaSb T2SLs. In this paper, we systematically review several widely used methods for simulating superlattice band structures, including the kp perturbation method, envelope function approximation, empirical pseudopotential method, empirical tight-binding method, and first-principles calculations. With the limitations of different theoretical methods proposed, the simulation methods have been modified and developed to obtain reliable InAs/GaSb SL energy band calculation results. The objective of this work is to provide a reference for designing InAs/GaSb type II superlattice band structures.
△ Less
Submitted 26 November, 2021;
originally announced November 2021.
-
NUMA-aware FFT-based Convolution on ARMv8 Many-core CPUs
Authors:
Xiandong Huang,
Qinglin Wang,
Shuyu Lu,
Ruochen Hao,
Songzhu Mei,
Jie Liu
Abstract:
Convolutional Neural Networks (CNNs), one of the most representative algorithms of deep learning, are widely used in various artificial intelligence applications. Convolution operations often take most of the computational overhead of CNNs. The FFT-based algorithm can improve the efficiency of convolution by reducing its algorithm complexity, there are a lot of works about the high-performance imp…
▽ More
Convolutional Neural Networks (CNNs), one of the most representative algorithms of deep learning, are widely used in various artificial intelligence applications. Convolution operations often take most of the computational overhead of CNNs. The FFT-based algorithm can improve the efficiency of convolution by reducing its algorithm complexity, there are a lot of works about the high-performance implementation of FFT-based convolution on many-core CPUs. However, there is no optimization for the non-uniform memory access (NUMA) characteristics in many-core CPUs. In this paper, we present a NUMA-aware FFT-based convolution implementation on ARMv8 many-core CPUs with NUMA architectures. The implementation can reduce a number of remote memory access through the data reordering of FFT transformations and the three-level parallelization of the complex matrix multiplication. The experiment results on a ARMv8 many-core CPU with NUMA architectures demonstrate that our NUMA-aware implementation has much better performance than the state-of-the-art work in most cases.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
A flock-like two-dimensional cooperative vehicle formation model based on potential functions
Authors:
Ruochen Hao,
Meiqi Liu,
Wan**g Ma,
Bart van Arem,
Meng Wang
Abstract:
Platooning on highways with connected and automated vehicles (CAVs) has attracted considerable attention, while how to mange and coordinate platoons in urban networks remains largely an open question. This scientific gap mainly results from the maneuver complexity on urban roads, making it difficult to model the platoon formation process. Inspired by flocking behaviors in nature, this paper propos…
▽ More
Platooning on highways with connected and automated vehicles (CAVs) has attracted considerable attention, while how to mange and coordinate platoons in urban networks remains largely an open question. This scientific gap mainly results from the maneuver complexity on urban roads, making it difficult to model the platoon formation process. Inspired by flocking behaviors in nature, this paper proposed a two-dimensional model to describe CAV group dynamics. The model is formulated based on potential fields in planar coordinates, which is composed of the inter-vehicle potential field and the cross-section potential field. The inter-vehicle potential field enables CAVs to attract each other when vehicle gaps are larger than the equilibrium distance, and repel each other otherwise. It also generates incentives for lane change maneuvers to join a platoon or to comply with the traffic management layer. The cross-section potential field is able to mimic lane kee** behavior and it also creates resistance to avoid unnecessary lane changes at very low incentives. These modeling principles can also be applied to human-driven vehicles in the mixed traffic environment. Behavioral plausibility of the model in terms of car-following rationality and car-following safety is demonstrated analytically and further verified with simulation in typical driving scenarios. The model is computationally efficient and can provide insights into platoon operations in urban networks.
△ Less
Submitted 19 March, 2021;
originally announced April 2021.
-
Combinatorial proofs of the Ramanujan type congruences modulo 3
Authors:
Robert X. J. Hao
Abstract:
The partition statistic $V_R$-rank is introduced to give combinatorial proofs of the Ramanujan type congruences mod 3 for certain classes of partition functions.
The partition statistic $V_R$-rank is introduced to give combinatorial proofs of the Ramanujan type congruences mod 3 for certain classes of partition functions.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
A crank for bipartitions with designated summands
Authors:
R. X. J. Hao,
E. Y. Y. Shen
Abstract:
Andrews, Lewis and Lovejoy introduced the partition function $PD(n)$ as the number of partitions of $n$ with designated summands. A bipartition of $n$ is an ordered pair of partitions $(π_1, π_2)$ with the sum of all of the parts being $n$. In this paper, we introduce a generalized crank named the $pd$-crank for bipartitions with designated summands and give some inequalities for the $pd$-crank of…
▽ More
Andrews, Lewis and Lovejoy introduced the partition function $PD(n)$ as the number of partitions of $n$ with designated summands. A bipartition of $n$ is an ordered pair of partitions $(π_1, π_2)$ with the sum of all of the parts being $n$. In this paper, we introduce a generalized crank named the $pd$-crank for bipartitions with designated summands and give some inequalities for the $pd$-crank of bipartitions with designated summands modulo 2 and 3. We also define the $pd$-crank moments weighted by the parity of $pd$-cranks $μ_{2k,bd}(-1,n)$ and show the positivity of $(-1)^nμ_{2k,bd}(-1,n)$. Let $M_{bd}(m,n)$ denote the number of bipartitions of $n$ with designated summands with $pd$-crank $m$. We prove a monotonicity property of $pd$-cranks of bipartitions with designated summands and find that the sequence $\{M_{bd}(m,n)\}_{|m|\leq n}$ is unimodal for $n\not= 1,5,7$.
△ Less
Submitted 25 February, 2021;
originally announced February 2021.
-
PyART: Python API Recommendation in Real-Time
Authors:
Xincheng He,
Lei Xu,
Xiangyu Zhang,
Rui Hao,
Yang Feng,
Baowen Xu
Abstract:
API recommendation in real-time is challenging for dynamic languages like Python. Many existing API recommendation techniques are highly effective, but they mainly support static languages. A few Python IDEs provide API recommendation functionalities based on type inference and training on a large corpus of Python libraries and third-party libraries. As such, they may fail to recommend or make poo…
▽ More
API recommendation in real-time is challenging for dynamic languages like Python. Many existing API recommendation techniques are highly effective, but they mainly support static languages. A few Python IDEs provide API recommendation functionalities based on type inference and training on a large corpus of Python libraries and third-party libraries. As such, they may fail to recommend or make poor recommendations when type information is missing or target APIs are project-specific. In this paper, we propose a novel approach, PyART, to recommend APIs for Python programs in real-time. It features a light-weight analysis to derives so-called optimistic data-flow, which is neither sound nor complete, but simulates the local data-flow information humans can derive. It extracts three kinds of features: data-flow, token similarity, and token co-occurrence, in the context of the program point where a recommendation is solicited. A predictive model is trained on these features using the Random Forest algorithm. Evaluation on 8 popular Python projects demonstrates that PyART can provide effective API recommendations. When historic commits can be leveraged, which is the target scenario of a state-of-the-art tool ARIREC, our average top-1 accuracy is over 50% and average top-10 accuracy over 70%, outperforming APIREC and Intellicode (i.e., the recommendation component in Visual Studio) by 28.48%-39.05% for top-1 accuracy and 24.41%-30.49% for top-10 accuracy. In other applications such as when historic comments are not available and cross-project recommendation, PyART also shows better overall performance. The time to make a recommendation is less than a second on average, satisfying the real-time requirement.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
A Transfer Learning Based Active Learning Framework for Brain Tumor Classification
Authors:
Ruqian Hao,
Khashayar Namdar,
Lin Liu,
Farzad Khalvati
Abstract:
Brain tumor is one of the leading causes of cancer-related death globally among children and adults. Precise classification of brain tumor grade (low-grade and high-grade glioma) at early stage plays a key role in successful prognosis and treatment planning. With recent advances in deep learning, Artificial Intelligence-enabled brain tumor grading systems can assist radiologists in the interpretat…
▽ More
Brain tumor is one of the leading causes of cancer-related death globally among children and adults. Precise classification of brain tumor grade (low-grade and high-grade glioma) at early stage plays a key role in successful prognosis and treatment planning. With recent advances in deep learning, Artificial Intelligence-enabled brain tumor grading systems can assist radiologists in the interpretation of medical images within seconds. The performance of deep learning techniques is, however, highly depended on the size of the annotated dataset. It is extremely challenging to label a large quantity of medical images given the complexity and volume of medical data. In this work, we propose a novel transfer learning based active learning framework to reduce the annotation cost while maintaining stability and robustness of the model performance for brain tumor classification. We employed a 2D slice-based approach to train and finetune our model on the Magnetic Resonance Imaging (MRI) training dataset of 203 patients and a validation dataset of 66 patients which was used as the baseline. With our proposed method, the model achieved Area Under Receiver Operating Characteristic (ROC) Curve (AUC) of 82.89% on a separate test dataset of 66 patients, which was 2.92% higher than the baseline AUC while saving at least 40% of labeling cost. In order to further examine the robustness of our method, we created a balanced dataset, which underwent the same procedure. The model achieved AUC of 82% compared with AUC of 78.48% for the baseline, which reassures the robustness and stability of our proposed transfer learning augmented with active learning framework while significantly reducing the size of training data.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
Managing connected and automated vehicles with flexible routing at "lane-allocation-free'' intersections
Authors:
Wan**g Ma,
Ruochen Hao,
Chunhui Yu,
Tuo Sun,
Bart van Arem
Abstract:
Trajectory planning and coordination for connected and automated vehicles (CAVs) have been studied at isolated ``signal-free'' intersections and in ``signal-free'' corridors under the fully CAV environment in the literature. Most of the existing studies are based on the definition of approaching and exit lanes. The route a vehicle takes to pass through an intersection is determined from its moveme…
▽ More
Trajectory planning and coordination for connected and automated vehicles (CAVs) have been studied at isolated ``signal-free'' intersections and in ``signal-free'' corridors under the fully CAV environment in the literature. Most of the existing studies are based on the definition of approaching and exit lanes. The route a vehicle takes to pass through an intersection is determined from its movement. That is, only the origin and destination arms are included. This study proposes a mixed-integer linear programming (MILP) model to optimize vehicle trajectories at an isolated ``signal-free'' intersection without lane allocation, which is denoted as ``lane-allocation-free'' (LAF) control. Each lane can be used as both approaching and exit lanes for all vehicle movements including left-turn, through, and right-turn. A vehicle can take a flexible route by way of multiple arms to pass through the intersection. In this way, the spatial-temporal resources are expected to be fully utilized. The interactions between vehicle trajectories are modeled explicitly at the microscopic level. Vehicle routes and trajectories (i.e., car-following and lane-changing behaviors) at the intersection are optimized in one unified framework for system optimality in terms of total vehicle delay. Considering varying traffic conditions, the planning horizon is adaptively adjusted in the implementation procedure of the proposed model to make a balance between solution feasibility and computational burden. Numerical studies validate the advantages of the proposed LAF control in terms of both vehicle delay and throughput with different demand structures and temporal safety gaps.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
A Comprehensive Study of Data Augmentation Strategies for Prostate Cancer Detection in Diffusion-weighted MRI using Convolutional Neural Networks
Authors:
Ruqian Hao,
Khashayar Namdar,
Lin Liu,
Masoom A. Haider,
Farzad Khalvati
Abstract:
Data augmentation refers to a group of techniques whose goal is to battle limited amount of available data to improve model generalization and push sample distribution toward the true distribution. While different augmentation strategies and their combinations have been investigated for various computer vision tasks in the context of deep learning, a specific work in the domain of medical imaging…
▽ More
Data augmentation refers to a group of techniques whose goal is to battle limited amount of available data to improve model generalization and push sample distribution toward the true distribution. While different augmentation strategies and their combinations have been investigated for various computer vision tasks in the context of deep learning, a specific work in the domain of medical imaging is rare and to the best of our knowledge, there has been no dedicated work on exploring the effects of various augmentation methods on the performance of deep learning models in prostate cancer detection. In this work, we have statically applied five most frequently used augmentation techniques (random rotation, horizontal flip, vertical flip, random crop, and translation) to prostate Diffusion-weighted Magnetic Resonance Imaging training dataset of 217 patients separately and evaluated the effect of each method on the accuracy of prostate cancer detection. The augmentation algorithms were applied independently to each data channel and a shallow as well as a deep Convolutional Neural Network (CNN) were trained on the five augmented sets separately. We used Area Under Receiver Operating Characteristic (ROC) curve (AUC) to evaluate the performance of the trained CNNs on a separate test set of 95 patients, using a validation set of 102 patients for finetuning. The shallow network outperformed the deep network with the best 2D slice-based AUC of 0.85 obtained by the rotation method.
△ Less
Submitted 1 June, 2020;
originally announced June 2020.
-
A rank of partitions with overline designated summands
Authors:
Robert. X. J. Hao,
Erin Y. Y. Shen,
Wenston J. T. Zang
Abstract:
Andrews, Lewis and Lovejoy introduced the partition function $PD(n)$ as the number of partitions of $n$ with designated summands. In a recent work, Lin studied a partition function $PD_{t}(n)$ which counts the number of tagged parts over all the partitions of $n$ with designated summands. He proved that $PD_{t}(3n+2)$ is divisible by $3$. In this paper, we first introduce a structure named partiti…
▽ More
Andrews, Lewis and Lovejoy introduced the partition function $PD(n)$ as the number of partitions of $n$ with designated summands. In a recent work, Lin studied a partition function $PD_{t}(n)$ which counts the number of tagged parts over all the partitions of $n$ with designated summands. He proved that $PD_{t}(3n+2)$ is divisible by $3$. In this paper, we first introduce a structure named partitions with overline designated summands, which is counted by $PD_t(n)$. We then define a generalized rank of partitions with overline designated summands and give a combinatorial interpretation of the congruence for $PD_t(3n+2)$.
△ Less
Submitted 7 July, 2020; v1 submitted 7 April, 2020;
originally announced April 2020.
-
Paired 3-disjoint path covers of balanced hypercubes
Authors:
Mei-Rong Guo,
Rong-Xia Hao,
Mei-Mei Gu
Abstract:
The balanced hypercube $BH_{n}$, proposed by Wu and Huang, is a variation of the hypercube. The paired 1-disjoint path cover of $BH_{n}$ is the Hamiltonian laceability, which was obtained by Xu et al. in [Appl. Math. Comput. 189 (2007) 1393--1401]. The paired 2-disjoint path cover of $BH_{n}$ was obtained by Cheng et al. in [Appl. Math. and Comput. 242 (2014) 127-142]. In this paper, we obtain the…
▽ More
The balanced hypercube $BH_{n}$, proposed by Wu and Huang, is a variation of the hypercube. The paired 1-disjoint path cover of $BH_{n}$ is the Hamiltonian laceability, which was obtained by Xu et al. in [Appl. Math. Comput. 189 (2007) 1393--1401]. The paired 2-disjoint path cover of $BH_{n}$ was obtained by Cheng et al. in [Appl. Math. and Comput. 242 (2014) 127-142]. In this paper, we obtain the paired 3-disjoint path cover of $BH_{n}$ with $n\geq 3$. This result improves the above known results about the paired $k$-disjoint path covers of $BH_{n}$ for $k=1,2$.
△ Less
Submitted 15 December, 2019;
originally announced December 2019.
-
Strong Menger connectedness of augmented $k$-ary $n$-cubes
Authors:
Mei-Mei Gu,
Jou-Ming Chang,
Rong-Xia Hao
Abstract:
A connected graph $G$ is called strongly Menger (edge) connected if for any two distinct vertices $x,y$ of $G$, there are $\min \{{\rm deg}_G(x), {\rm deg}_G(y)\}$ vertex(edge)-disjoint paths between $x$ and $y$. In this paper, we consider strong Menger (edge) connectedness of the augmented $k$-ary $n$-cube $AQ_{n,k}$, which is a variant of $k$-ary $n$-cube $Q_n^k$. By exploring the topological pr…
▽ More
A connected graph $G$ is called strongly Menger (edge) connected if for any two distinct vertices $x,y$ of $G$, there are $\min \{{\rm deg}_G(x), {\rm deg}_G(y)\}$ vertex(edge)-disjoint paths between $x$ and $y$. In this paper, we consider strong Menger (edge) connectedness of the augmented $k$-ary $n$-cube $AQ_{n,k}$, which is a variant of $k$-ary $n$-cube $Q_n^k$. By exploring the topological proprieties of $AQ_{n,k}$, we show that $AQ_{n,3}$ for $n\geq 4$ (resp.\ $AQ_{n,k}$ for $n\geq 2$ and $k\geq 4$) is still strongly Menger connected even when there are $4n-9$ (resp.\ $4n-8$) faulty vertices and $AQ_{n,k}$ is still strongly Menger edge connected even when there are $4n-4$ faulty edges for $n\geq 2$ and $k\geq 3$. Moreover, under the restricted condition that each vertex has at least two fault-free edges, we show that $AQ_{n,k}$ is still strongly Menger edge connected even when there are $8n-10$ faulty edges for $n\geq 2$ and $k\geq 3$. These results are all optimal in the sense of the maximum number of tolerated vertex (resp.\ edge) faults.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
Bounds for the rank of a complex unit gain graph in terms of the independence number
Authors:
Shengjie He,
Rong-Xia Hao,
Aimei Yu
Abstract:
A complex unit gain graph (or $\mathbb{T}$-gain graph) is a triple $Φ=(G, \mathbb{T}, \varphi)$ ($(G, \varphi)$ for short) consisting of a graph $G$ as the underlying graph of $(G, \varphi)$, $\mathbb{T}= \{ z \in C:|z|=1 \} $ is a subgroup of the multiplicative group of all nonzero complex numbers $\mathbb{C}^{\times}$ and a gain function $\varphi: \overrightarrow{E} \rightarrow \mathbb{T}$ such…
▽ More
A complex unit gain graph (or $\mathbb{T}$-gain graph) is a triple $Φ=(G, \mathbb{T}, \varphi)$ ($(G, \varphi)$ for short) consisting of a graph $G$ as the underlying graph of $(G, \varphi)$, $\mathbb{T}= \{ z \in C:|z|=1 \} $ is a subgroup of the multiplicative group of all nonzero complex numbers $\mathbb{C}^{\times}$ and a gain function $\varphi: \overrightarrow{E} \rightarrow \mathbb{T}$ such that $\varphi(e_{ij})=\varphi(e_{ji})^{-1}=\overline{\varphi(e_{ji})}$. In this paper, we investigate the relation among the rank, the independence number and the cyclomatic number of a complex unit gain graph $(G, \varphi)$ with order $n$, and prove that $2n-2c(G) \leq r(G, \varphi)+2α(G) \leq 2n$. Where $r(G, \varphi)$, $α(G)$ and $c(G)$ are the rank of the Hermitian adjacency matrix $A(G, \varphi)$, the independence number and the cyclomatic number of $G$, respectively. Furthermore, the properties of the complex unit gain graph that reaching the lower bound are characterized.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
The rank of a complex unit gain graph in terms of the matching number
Authors:
Shengjie He,
Rong-Xia Hao,
Fengming Dong
Abstract:
A complex unit gain graph (or ${\mathbb T}$-gain graph) is a triple $Φ=(G, {\mathbb T}, \varphi)$ (or $(G, \varphi)$ for short) consisting of a simple graph $G$, as the underlying graph of $(G, \varphi)$, the set of unit complex numbers $\mathbb{T}= \{ z \in C:|z|=1 \}$ and a gain function $\varphi: \overrightarrow{E} \rightarrow \mathbb{T}$ with the property that…
▽ More
A complex unit gain graph (or ${\mathbb T}$-gain graph) is a triple $Φ=(G, {\mathbb T}, \varphi)$ (or $(G, \varphi)$ for short) consisting of a simple graph $G$, as the underlying graph of $(G, \varphi)$, the set of unit complex numbers $\mathbb{T}= \{ z \in C:|z|=1 \}$ and a gain function $\varphi: \overrightarrow{E} \rightarrow \mathbb{T}$ with the property that $\varphi(e_{i,j})=\varphi(e_{j,i})^{-1}$. In this paper, we prove that $2m(G)-2c(G) \leq r(G, \varphi) \leq 2m(G)+c(G)$, where $r(G, \varphi)$, $m(G)$ and $c(G)$ are the rank of the Hermitian adjacency matrix $H(G, \varphi)$, the matching number and the cyclomatic number of $G$, respectively. Furthermore, the complex unit gain graphs $(G, \mathbb{T}, \varphi)$ with $r(G, \varphi)=2m(G)-2c(G)$ and $r(G, \varphi)=2m(G)+c(G)$ are characterized. These results generalize the corresponding known results about undirected graphs, mixed graphs and signed graphs. Moreover, we show that $2m(G-V_{0}) \leq r(G, \varphi) \leq 2m(G)+b(G)$ holds for any subset $V_0$ of $V(G)$ such that $G-V_0$ is acyclic and $b(G)$ is the minimum integer $|S|$ such that $G-S$ is bipartite for $S \subset V(G)$.
△ Less
Submitted 5 January, 2020; v1 submitted 16 September, 2019;
originally announced September 2019.
-
On the inertia index of a mixed graph with the matching number
Authors:
Shengjie He,
Rong-Xia Hao,
Aimei Yu
Abstract:
A mixed graph $\widetilde{G}$ is obtained by orienting some edges of $G$, where $G$ is the underlying graph of $\widetilde{G}$. The positive inertia index, denoted by $p^{+}(G)$, and the negative inertia index, denoted by $n^{-}(G)$, of a mixed graph $\widetilde{G}$ are the integers specifying the numbers of positive and negative eigenvalues of the Hermitian adjacent matrix of $\widetilde{G}$, res…
▽ More
A mixed graph $\widetilde{G}$ is obtained by orienting some edges of $G$, where $G$ is the underlying graph of $\widetilde{G}$. The positive inertia index, denoted by $p^{+}(G)$, and the negative inertia index, denoted by $n^{-}(G)$, of a mixed graph $\widetilde{G}$ are the integers specifying the numbers of positive and negative eigenvalues of the Hermitian adjacent matrix of $\widetilde{G}$, respectively. In this paper, we study the positive and negative inertia index of the mixed unicyclic graph. Moreover, we give the upper and lower bounds of the positive and negative inertia index of the mixed graph, and characterize the mixed graphs which attain the upper and lower bounds respectively.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
Intrinsic Picosecond Magnetic Switching Mechanism Assisted by an Electric Field in a Synthetic Antiferromagnetic Structure
Authors:
Lei Wang,
Runzi Hao,
Tai Min
Abstract:
The processional switching mechanism governs magnetic switching in magnetic tunnel junctions (MTJs) in the sub-nanosecond range, which limits the application of spin transfer torque magnetic random access memory (STT-MRAM) in the ultrafast region. In this paper, we propose a new picosecond magnetic switching mechanism in a synthetic antiferromagnetic (SAF) structure using the adjustable Ruderman-K…
▽ More
The processional switching mechanism governs magnetic switching in magnetic tunnel junctions (MTJs) in the sub-nanosecond range, which limits the application of spin transfer torque magnetic random access memory (STT-MRAM) in the ultrafast region. In this paper, we propose a new picosecond magnetic switching mechanism in a synthetic antiferromagnetic (SAF) structure using the adjustable Ruderman-Kittel-Kasuya-Yosida (RKKY) interaction controlled by an external electric field (E-field). It is shown that along with the sign change of the RKKY interaction in the SAF structure with an external E-field, the critical switching current density can be significantly reduced by one order of magnitude compared to that of a normal MTJ design at 100 ps; thus, this novel STT-MRAM can be written with a very low switching current density to avoid the MTJ breakdown problem and reduce the writing energy. To understand the physical origin of this abnormal phenomenon, a toy model is proposed in which the external-E-field-controlled sign change of the RKKY interaction in the SAF structure provides an extra contribution to the total energy that helps thespins overcome the energy barrier and break the processional switching mechanism.
△ Less
Submitted 23 July, 2019;
originally announced July 2019.
-
The relation between the independence number and rank of a signed graph
Authors:
Shengjie He,
Rong-Xia Hao
Abstract:
A signed graph $(G, σ)$ is a graph with a sign attached to each of its edges, where $G$ is the underlying graph of $(G, σ)$. Let $c(G)$, $α(G)$ and $r(G, σ)$ be the cyclomatic number, the independence number and the rank of the adjacency matrix of $(G, σ)$, respectively. In this paper, we study the relation among the independence number, the rank and the cyclomatic number of a signed graph…
▽ More
A signed graph $(G, σ)$ is a graph with a sign attached to each of its edges, where $G$ is the underlying graph of $(G, σ)$. Let $c(G)$, $α(G)$ and $r(G, σ)$ be the cyclomatic number, the independence number and the rank of the adjacency matrix of $(G, σ)$, respectively. In this paper, we study the relation among the independence number, the rank and the cyclomatic number of a signed graph $(G, σ)$ with order $n$, and prove that $2n-2c(G) \leq r(G, σ)+2α(G) \leq 2n$. Furthermore, the signed graphs that reaching the lower bound are investigated.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
The Component Connectivity of Alternating Group Graphs and Split-Stars
Authors:
Mei-Mei Gu,
Rong-Xia Hao,
Jou-Ming Chang
Abstract:
For an integer $\ell\geqslant 2$, the $\ell$-component connectivity of a graph $G$, denoted by $κ_{\ell}(G)$, is the minimum number of vertices whose removal from $G$ results in a disconnected graph with at least $\ell$ components or a graph with fewer than $\ell$ vertices. This is a natural generalization of the classical connectivity of graphs defined in term of the minimum vertex-cut and is a g…
▽ More
For an integer $\ell\geqslant 2$, the $\ell$-component connectivity of a graph $G$, denoted by $κ_{\ell}(G)$, is the minimum number of vertices whose removal from $G$ results in a disconnected graph with at least $\ell$ components or a graph with fewer than $\ell$ vertices. This is a natural generalization of the classical connectivity of graphs defined in term of the minimum vertex-cut and is a good measure of robustness for the graph corresponding to a network. So far, the exact values of $\ell$-connectivity are known only for a few classes of networks and small $\ell$'s. It has been pointed out in~[Component connectivity of the hypercubes, Int. J. Comput. Math. 89 (2012) 137--145] that determining $\ell$-connectivity is still unsolved for most interconnection networks, such as alternating group graphs and star graphs. In this paper, by exploring the combinatorial properties and fault-tolerance of the alternating group graphs $AG_n$ and a variation of the star graphs called split-stars $S_n^2$, we study their $\ell$-component connectivities. We obtain the following results: (i) $κ_3(AG_n)=4n-10$ and $κ_4(AG_n)=6n-16$ for $n\geqslant 4$, and $κ_5(AG_n)=8n-24$ for $n\geqslant 5$; (ii) $κ_3(S_n^2)=4n-8$, $κ_4(S_n^2)=6n-14$, and $κ_5(S_n^2)=8n-20$ for $n\geqslant 4$.
△ Less
Submitted 3 December, 2018;
originally announced December 2018.
-
The $g$-good neighbour diagnosability of hierarchical cubic networks
Authors:
Shu-Li Zhao,
Rong-Xia Hao
Abstract:
Let $G=(V, E)$ be a connected graph, a subset $S\subseteq V(G)$ is called an $R^{g}$-vertex-cut of $G$ if $G-F$ is disconnected and any vertex in $G-F$ has at least $g$ neighbours in $G-F$. The $R^{g}$-vertex-connectivity is the size of the minimum $R^{g}$-vertex-cut and denoted by $κ^{g}(G)$. Many large-scale multiprocessor or multi-computer systems take interconnection networks as underlying top…
▽ More
Let $G=(V, E)$ be a connected graph, a subset $S\subseteq V(G)$ is called an $R^{g}$-vertex-cut of $G$ if $G-F$ is disconnected and any vertex in $G-F$ has at least $g$ neighbours in $G-F$. The $R^{g}$-vertex-connectivity is the size of the minimum $R^{g}$-vertex-cut and denoted by $κ^{g}(G)$. Many large-scale multiprocessor or multi-computer systems take interconnection networks as underlying topologies. Fault diagnosis is especially important to identify fault tolerability of such systems. The $g$-good-neighbor diagnosability such that every fault-free node has at least $g$ fault-free neighbors is a novel measure of diagnosability. In this paper, we show that the $g$-good-neighbor diagnosability of the hierarchical cubic networks $HCN_{n}$ under the PMC model for $1\leq g\leq n-1$ and the $MM^{*}$ model for $1\leq g\leq n-1$ is $2^{g}(n+2-g)-1$, respectively.
△ Less
Submitted 30 November, 2018;
originally announced December 2018.
-
Antimagic orientations of disconnected even regular graphs
Authors:
Chen Song,
Rong-Xia Hao
Abstract:
A $labeling$ of a digraph $D$ with $m$ arcs is a bijection from the set of arcs of $D$ to $\{1,2,\ldots,m\}$. A labeling of $D$ is $antimagic$ if no two vertices in $D$ have the same vertex-sum, where the vertex-sum of a vertex $u \in V(D)$ for a labeling is the sum of labels of all arcs entering $u$ minus the sum of labels of all arcs leaving $u$. An antimagic orientation $D$ of a graph $G$ is…
▽ More
A $labeling$ of a digraph $D$ with $m$ arcs is a bijection from the set of arcs of $D$ to $\{1,2,\ldots,m\}$. A labeling of $D$ is $antimagic$ if no two vertices in $D$ have the same vertex-sum, where the vertex-sum of a vertex $u \in V(D)$ for a labeling is the sum of labels of all arcs entering $u$ minus the sum of labels of all arcs leaving $u$. An antimagic orientation $D$ of a graph $G$ is $antimagic$ if $D$ has an antimagic labeling. Hefetz, M$\ddot{u}$tze and Schwartz in [J. Graph Theory 64(2010)219-232] raised the question: Does every graph admits an antimagic orientation? It had been proved that for any integer $d$, every 2$d$-regular graph with at most two odd components has an antimagic orientation. In this paper, we consider the 2$d$-regular graph with many odd components. We show that every 2$d$-regular graph with any odd components has an antimagic orientation provide each odd component with enough order.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
Bounds on the edge-Wiener index of cacti with $n$ vertices and $t$ cycles
Authors:
Siyan Liu,
Rong-Xia Hao
Abstract:
The edge-Wiener index $W_e(G)$ of a connected graph $G$ is the sum of distances between all pairs of edges of $G$. A connected graph $G$ is said to be a cactus if each of its blocks is either a cycle or an edge. Let $\mathcal{G}_{n,t}$ denote the class of all cacti with $n$ vertices and $t$ cycles. In this paper, the upper bound and lower bound on the edge-Wiener index of graphs in…
▽ More
The edge-Wiener index $W_e(G)$ of a connected graph $G$ is the sum of distances between all pairs of edges of $G$. A connected graph $G$ is said to be a cactus if each of its blocks is either a cycle or an edge. Let $\mathcal{G}_{n,t}$ denote the class of all cacti with $n$ vertices and $t$ cycles. In this paper, the upper bound and lower bound on the edge-Wiener index of graphs in $\mathcal{G}_{n,t}$ are identified and the corresponding extremal graphs are characterized.
△ Less
Submitted 3 September, 2018;
originally announced September 2018.
-
The generalized connectivity of some regular graphs
Authors:
Shu-Li Zhao,
Rong-Xia Hao
Abstract:
The generalized $k$-connectivity $κ_{k}(G)$ of a graph $G$ is a parameter that can measure the reliability of a network $G$ to connect any $k$ vertices in $G$, which is proved to be NP-complete for a general graph $G$. Let $S\subseteq V(G)$ and $κ_{G}(S)$ denote the maximum number $r$ of edge-disjoint trees $T_{1}, T_{2}, \cdots, T_{r}$ in $G$ such that $V(T_{i})\bigcap V(T_{j})=S$ for any…
▽ More
The generalized $k$-connectivity $κ_{k}(G)$ of a graph $G$ is a parameter that can measure the reliability of a network $G$ to connect any $k$ vertices in $G$, which is proved to be NP-complete for a general graph $G$. Let $S\subseteq V(G)$ and $κ_{G}(S)$ denote the maximum number $r$ of edge-disjoint trees $T_{1}, T_{2}, \cdots, T_{r}$ in $G$ such that $V(T_{i})\bigcap V(T_{j})=S$ for any $i, j \in \{1, 2, \cdots, r\}$ and $i\neq j$. For an integer $k$ with $2\leq k\leq n$, the {\em generalized $k$-connectivity} of a graph $G$ is defined as $κ_{k}(G)= min\{κ_{G}(S)|S\subseteq V(G)$ and $|S|=k\}$.
In this paper, we study the generalized $3$-connectivity of some general $m$-regular and $m$-connected graphs $G_{n}$ constructed recursively and obtain that $κ_{3}(G_{n})=m-1$, which attains the upper bound of $κ_{3}(G)$ [Discrete Mathematics 310 (2010) 2147-2163] given by Li {\em et al.} for $G=G_{n}$. As applications of the main result, the generalized $3$-connectivity of many famous networks such as the alternating group graph $AG_{n}$, the $k$-ary $n$-cube $Q_{n}^{k}$, the split-star network $S_{n}^{2}$ and the bubble-sort-star graph $BS_{n}$ etc. can be obtained directly.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
The generalized connectivity of $(n,k)$-bubble-sort graphs
Authors:
Shu-Li Zhao,
Rong-Xia Hao,
Lidong Wu
Abstract:
Let $S\subseteq V(G)$ and $κ_{G}(S)$ denote the maximum number $r$ of edge-disjoint trees $T_1, T_2, \cdots, T_r$ in $G$ such that $V(T_i)\bigcap V(T_{j})=S$ for any $i, j \in \{1, 2, \cdots, r\}$ and $i\neq j$. For an integer $k$ with $2\leq k\leq n$, the {\em generalized $k$-connectivity} of a graph $G$ is defined as $κ_{k}(G)= min\{κ_{G}(S)|S\subseteq V(G)$ and $|S|=k\}$. The generalized $k$-co…
▽ More
Let $S\subseteq V(G)$ and $κ_{G}(S)$ denote the maximum number $r$ of edge-disjoint trees $T_1, T_2, \cdots, T_r$ in $G$ such that $V(T_i)\bigcap V(T_{j})=S$ for any $i, j \in \{1, 2, \cdots, r\}$ and $i\neq j$. For an integer $k$ with $2\leq k\leq n$, the {\em generalized $k$-connectivity} of a graph $G$ is defined as $κ_{k}(G)= min\{κ_{G}(S)|S\subseteq V(G)$ and $|S|=k\}$. The generalized $k$-connectivity is a generalization of the traditional connectivity. In this paper, the generalized $3$-connectivity of the $(n,k)$-bubble-sort graph $B_{n,k}$ is studied for $2\leq k\leq n-1$. By proposing an algorithm to construct $n-1$ internally disjoint paths in $B_{n-1,k-1}$, we show that $κ_{3}(B_{n,k})=n-2$ for $2\leq k\leq n-1$, which generalizes the known result about the bubble-sort graph $B_{n}$ [Applied Mathematics and Computation 274 (2016) 41-46] given by Li $et$ $al.$, as the bubble-sort graph $B_{n}$ is the special $(n,k)$-bubble-sort graph for $k=n-1$.
△ Less
Submitted 7 May, 2018;
originally announced May 2018.
-
On extremal cacti with respect to the edge revised Szeged index
Authors:
Shengjie He,
Rong-Xia Hao,
Deming Li
Abstract:
Let $G$ be a connected graph. The edge revised Szeged index of $G$ is defined as $Sz^{\ast}_{e}(G)=\sum\limits_{e=uv\in E(G)}(m_{u}(e|G)+\frac{m_{0}(e|G)}{2})(m_{v}(e|G)+\frac{m_{0}(e|G)}{2})$, where $m_{u}(e|G)$ (resp., $m_{v}(e|G)$) is the number of edges whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex $v$ (resp., $u$), and $m_{0}(e|G)$ is the number of edges equ…
▽ More
Let $G$ be a connected graph. The edge revised Szeged index of $G$ is defined as $Sz^{\ast}_{e}(G)=\sum\limits_{e=uv\in E(G)}(m_{u}(e|G)+\frac{m_{0}(e|G)}{2})(m_{v}(e|G)+\frac{m_{0}(e|G)}{2})$, where $m_{u}(e|G)$ (resp., $m_{v}(e|G)$) is the number of edges whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex $v$ (resp., $u$), and $m_{0}(e|G)$ is the number of edges equidistant from both ends of $e$. In this paper, we give the minimal and the second minimal edge revised Szeged index of cacti with order $n$ and $k$ cycles, and all the graphs that achieve the minimal and second minimal edge revised Szeged index are identified.
△ Less
Submitted 16 April, 2018;
originally announced April 2018.
-
Two kinds of generalized connectivity of dual cubes
Authors:
Shu-Li Zhao,
Rong-Xia Hao,
Eddie Cheng
Abstract:
Let $S\subseteq V(G)$ and $κ_{G}(S)$ denote the maximum number $k$ of edge-disjoint trees $T_{1}, T_{2}, \cdots, T_{k}$ in $G$ such that $V(T_{i})\bigcap V(T_{j})=S$ for any $i, j \in \{1, 2, \cdots, k\}$ and $i\neq j$. For an integer $r$ with $2\leq r\leq n$, the {\em generalized $r$-connectivity} of a graph $G$ is defined as $κ_{r}(G)= min\{κ_{G}(S)|S\subseteq V(G)$ and $|S|=r\}$. The $r$-compon…
▽ More
Let $S\subseteq V(G)$ and $κ_{G}(S)$ denote the maximum number $k$ of edge-disjoint trees $T_{1}, T_{2}, \cdots, T_{k}$ in $G$ such that $V(T_{i})\bigcap V(T_{j})=S$ for any $i, j \in \{1, 2, \cdots, k\}$ and $i\neq j$. For an integer $r$ with $2\leq r\leq n$, the {\em generalized $r$-connectivity} of a graph $G$ is defined as $κ_{r}(G)= min\{κ_{G}(S)|S\subseteq V(G)$ and $|S|=r\}$. The $r$-component connectivity $cκ_{r}(G)$ of a non-complete graph $G$ is the minimum number of vertices whose deletion results in a graph with at least $r$ components. These two parameters are both generalizations of traditional connectivity. Except hypercubes and complete bipartite graphs, almost all known $κ_{r}(G)$ are about $r=3$. In this paper, we focus on $κ_{4}(D_{n})$ of dual cube $D_{n}$. We first show that $κ_{4}(D_{n})=n-1$ for $n\geq 4$. As a corollary, we obtain $κ_{3}(D_{n})=n-1$ for $n\geq 4$. Furthermore, we show that $cκ_{r+1}(D_{n})=rn-\frac{r(r+1)}{2}+1$ for $n\geq 2$ and $1\leq r \leq n-1$.
△ Less
Submitted 28 March, 2018;
originally announced March 2018.
-
On extremal cacti with respect to the edge Szeged index and edge-vertex Szeged index
Authors:
Shengjie He,
Rong-Xia Hao,
Aimei Yu
Abstract:
The edge Szeged index and edge-vertex Szeged index of a graph are defined as $Sz_{e}(G)=\sum\limits_{uv\in E(G)}m_{u}(uv|G)m_{v}(uv|G)$ and $Sz_{ev}(G)=\frac{1}{2} \sum\limits_{uv \in E(G)}[n_{u}(uv|G)m_{v}(uv|G)+n_{v}(uv|G)m_{u}(uv|G)],$ respectively, where $m_{u}(uv|G)$ (resp., $m_{v}(uv|G)$) is the number of edges whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex…
▽ More
The edge Szeged index and edge-vertex Szeged index of a graph are defined as $Sz_{e}(G)=\sum\limits_{uv\in E(G)}m_{u}(uv|G)m_{v}(uv|G)$ and $Sz_{ev}(G)=\frac{1}{2} \sum\limits_{uv \in E(G)}[n_{u}(uv|G)m_{v}(uv|G)+n_{v}(uv|G)m_{u}(uv|G)],$ respectively, where $m_{u}(uv|G)$ (resp., $m_{v}(uv|G)$) is the number of edges whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex $v$ (resp., $u$), and $n_{u}(uv|G)$ (resp., $n_{v}(uv|G)$) is the number of vertices whose distance to vertex $u$ (resp., $v$) is smaller than the distance to vertex $v$ (resp., $u$), respectively. A cactus is a graph in which any two cycles have at most one common vertex. In this paper, the lower bounds of edge Szeged index and edge-vertex Szeged index for cacti with order $n$ and $k$ cycles are determined, and all the graphs that achieve the lower bounds are identified.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
Berge-Fulkerson coloring for infinite families of snarks
Authors:
Ting Zheng,
Rong-Xia Hao
Abstract:
It is conjectured by Berge and Fulkerson that every bridgeless cubic graph has six perfect matchings such that each edge is contained in exactly two of them. H$\ddot{a}$gglund constructed two graphs Blowup$(K_4, C)$ and Blowup$(Prism, C_4)$. Based on these two graphs, Chen constructed infinite families of bridgeless cubic graphs $M_{0,1,2, \ldots,k-2, k-1}$ which is obtained from cyclically 4-edge…
▽ More
It is conjectured by Berge and Fulkerson that every bridgeless cubic graph has six perfect matchings such that each edge is contained in exactly two of them. H$\ddot{a}$gglund constructed two graphs Blowup$(K_4, C)$ and Blowup$(Prism, C_4)$. Based on these two graphs, Chen constructed infinite families of bridgeless cubic graphs $M_{0,1,2, \ldots,k-2, k-1}$ which is obtained from cyclically 4-edge-connected and having a Fulkerson-cover cubic graphs $G_0,G_1,\ldots, G_{k-1}$ by recursive process. If each $G_i$ for $1\leq i\leq k-1$ is a cyclically 4-edge-connected snarks with excessive index at least 5, Chen proved that these infinite families are snarks. He obtained that each graph in $M_{0,1,2,3}$ has a Fulkerson-cover and gave the open problem that whether every graph in $M_{0,1,2, \ldots,k-2, k-1}$ has a Fulkerson-cover. In this paper, we solve this problem and prove that every graph in $M_{0,1,2, \ldots,k-2, k-1}$ has a Fulkerson-cover.
△ Less
Submitted 23 August, 2017;
originally announced August 2017.
-
Fault diagnosability of data center networks
Authors:
Mei-Mei Gu,
Rong-Xia Hao,
Shuming Zhou
Abstract:
The data center networks $D_{n,k}$, proposed in 2008, has many desirable features such as high network capacity. A kind of generalization of diagnosability for network $G$ is $g$-good-neighbor diagnosability which is denoted by $t_g(G)$. Let $κ^g(G)$ be the $R^g$-connectivity. Lin et. al. in [IEEE Trans. on Reliability, 65 (3) (2016) 1248--1262] and Xu et. al in [Theor. Comput. Sci. 659 (2017) 53-…
▽ More
The data center networks $D_{n,k}$, proposed in 2008, has many desirable features such as high network capacity. A kind of generalization of diagnosability for network $G$ is $g$-good-neighbor diagnosability which is denoted by $t_g(G)$. Let $κ^g(G)$ be the $R^g$-connectivity. Lin et. al. in [IEEE Trans. on Reliability, 65 (3) (2016) 1248--1262] and Xu et. al in [Theor. Comput. Sci. 659 (2017) 53--63] gave the same problem independently that: the relationship between the $R^g$-connectivity $κ^g(G)$ and $t_g(G)$ of a general graph $G$ need to be studied in the future. In this paper, this open problem is solved for general regular graphs. We firstly establish the relationship of $κ^g(G)$ and $t_g(G)$, and obtain that $t_g(G)=κ^g(G)+g$ under some conditions. Secondly, we obtain the $g$-good-neighbor diagnosability of $D_{k,n}$ which are $t_g(D_{k,n})=(g+1)(k-1)+n+g$ for $1\leq g\leq n-1$ under the PMC model and the MM model, respectively. Further more, we show that $D_{k,n}$ is tightly super $(n+k-1)$-connected for $n\geq 2$ and $k\geq 2$ and we also prove that the largest connected component of the survival graph contains almost all of the remaining vertices in $D_{k,n}$ when $2k+n-2$ vertices removed.
△ Less
Submitted 29 January, 2017;
originally announced February 2017.
-
Equal relation between the extra connectivity and pessimistic diagnosability for some regular graphs
Authors:
Mei-Mei Gu,
Rong-Xia Hao,
Jun-Ming Xu,
Yan-Quan Feng
Abstract:
Extra connectivity and the pessimistic diagnosis are two crucial subjects for a multiprocessor system's ability to tolerate and diagnose faulty processor. The pessimistic diagnosis strategy is a classic strategy based on the PMC model in which isolates all faulty vertices within a set containing at most one fault-free vertex. In this paper, the result that the pessimistic diagnosability $t_p(G)$ e…
▽ More
Extra connectivity and the pessimistic diagnosis are two crucial subjects for a multiprocessor system's ability to tolerate and diagnose faulty processor. The pessimistic diagnosis strategy is a classic strategy based on the PMC model in which isolates all faulty vertices within a set containing at most one fault-free vertex. In this paper, the result that the pessimistic diagnosability $t_p(G)$ equals the extra connectivity $κ_{1}(G)$ of a regular graph $G$ under some conditions are shown. Furthermore, the following new results are gotten: the pessimistic diagnosability $t_p(S_n^2)=4n-9$ for split-star networks $S_n^2$, $t_p(Γ_n)=2n-4$ for Cayley graphs generated by transposition trees $Γ_n$, $t_p(Γ_{n}(Δ))=4n-11$ for Cayley graph generated by the $2$-tree $Γ_{n}(Δ)$, $t_{p}(BP_n)=2n-2$ for the burnt pancake networks $BP_n$. As corollaries, the known results about the extra connectivity and the pessimistic diagnosability of many famous networks including the alternating group graphs, the alternating group networks, BC networks, the $k$-ary $n$-cube networks etc. are obtained directly.
△ Less
Submitted 29 January, 2017;
originally announced January 2017.