-
Discursive objection strategies in online comments: Develo** a classification schema and validating its training
Authors:
Ashley L. Shea,
Aspen K. B. Omapang,
Ji Yong Cho,
Miryam Y. Ginsparg,
Natalie Bazarova,
Winice Hui,
René F. Kizilcec,
Chau Tong,
Drew Margolin
Abstract:
Most Americans agree that misinformation, hate speech and harassment are harmful and inadequately curbed on social media through current moderation practices. In this paper, we aim to understand the discursive strategies employed by people in response to harmful speech in news comments. We conducted a content analysis of more than 6500 comment replies to trending news videos on YouTube and Twitter…
▽ More
Most Americans agree that misinformation, hate speech and harassment are harmful and inadequately curbed on social media through current moderation practices. In this paper, we aim to understand the discursive strategies employed by people in response to harmful speech in news comments. We conducted a content analysis of more than 6500 comment replies to trending news videos on YouTube and Twitter and identified seven distinct discursive objection strategies (Study 1). We examined the frequency of each strategy's occurrence from the 6500 comment replies, as well as from a second sample of 2004 replies (Study 2). Together, these studies show that people deploy a diversity of discursive strategies when objecting to speech, and reputational attacks are the most common. The resulting classification scheme accounts for different theoretical approaches for expressing objections and offers a comprehensive perspective on grassroots efforts aimed at stop** offensive or problematic speech on campus.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
RoT: Enhancing Large Language Models with Reflection on Search Trees
Authors:
Wenyang Hui,
Chengyue Jiang,
Yan Wang,
Kewei Tu
Abstract:
Large language models (LLMs) have demonstrated impressive capability in reasoning and planning when integrated with tree-search-based prompting methods. However, since these methods ignore the previous search experiences, they often make the same mistakes in the search process. To address this issue, we introduce Reflection on search Trees (RoT), an LLM reflection framework designed to improve the…
▽ More
Large language models (LLMs) have demonstrated impressive capability in reasoning and planning when integrated with tree-search-based prompting methods. However, since these methods ignore the previous search experiences, they often make the same mistakes in the search process. To address this issue, we introduce Reflection on search Trees (RoT), an LLM reflection framework designed to improve the performance of tree-search-based prompting methods. It uses a strong LLM to summarize guidelines from previous tree search experiences to enhance the ability of a weak LLM. The guidelines are instructions about solving this task through tree search which can prevent the weak LLMs from making similar mistakes in the past search process. In addition, we proposed a novel state selection method, which identifies the critical information from historical search processes to help RoT generate more specific and meaningful guidelines. In our extensive experiments, we find that RoT significantly improves the performance of LLMs in reasoning or planning tasks with various tree-search-based prompting methods (e.g., BFS and MCTS). Non-tree-search-based prompting methods such as Chain-of-Thought (CoT) can also benefit from RoT guidelines since RoT can provide task-specific knowledge collected from the search experience.
△ Less
Submitted 11 April, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Mitigating Nonlinear Algorithmic Bias in Binary Classification
Authors:
Wendy Hui,
Wai Kwong Lau
Abstract:
This paper proposes the use of causal modeling to detect and mitigate algorithmic bias that is nonlinear in the protected attribute. We provide a general overview of our approach. We use the German Credit data set, which is available for download from the UC Irvine Machine Learning Repository, to develop (1) a prediction model, which is treated as a black box, and (2) a causal model for bias mitig…
▽ More
This paper proposes the use of causal modeling to detect and mitigate algorithmic bias that is nonlinear in the protected attribute. We provide a general overview of our approach. We use the German Credit data set, which is available for download from the UC Irvine Machine Learning Repository, to develop (1) a prediction model, which is treated as a black box, and (2) a causal model for bias mitigation. In this paper, we focus on age bias and the problem of binary classification. We show that the probability of getting correctly classified as "low risk" is lowest among young people. The probability increases with age nonlinearly. To incorporate the nonlinearity into the causal model, we introduce a higher order polynomial term. Based on the fitted causal model, the de-biased probability estimates are computed, showing improved fairness with little impact on overall classification accuracy. Causal modeling is intuitive and, hence, its use can enhance explicability and promotes trust among different stakeholders of AI.
△ Less
Submitted 7 May, 2024; v1 submitted 8 December, 2023;
originally announced December 2023.
-
Conic10K: A Challenging Math Problem Understanding and Reasoning Dataset
Authors:
Haoyi Wu,
Wenyang Hui,
Yezeng Chen,
Weiqi Wu,
Kewei Tu,
Yi Zhou
Abstract:
Mathematical understanding and reasoning are crucial tasks for assessing the capabilities of artificial intelligence (AI). However, existing benchmarks either require just a few steps of reasoning, or only contain a small amount of data in one specific topic, making it hard to analyse AI's behaviour with reference to different problems within a specific topic in detail. In this work, we propose Co…
▽ More
Mathematical understanding and reasoning are crucial tasks for assessing the capabilities of artificial intelligence (AI). However, existing benchmarks either require just a few steps of reasoning, or only contain a small amount of data in one specific topic, making it hard to analyse AI's behaviour with reference to different problems within a specific topic in detail. In this work, we propose Conic10K, a challenging math problem dataset on conic sections in Chinese senior high school education. Our dataset contains various problems with different reasoning depths, while only the knowledge from conic sections is required. Since the dataset only involves a narrow range of knowledge, it is easy to separately analyse the knowledge a model possesses and the reasoning ability it has. For each problem, we provide a high-quality formal representation, the reasoning steps, and the final solution. Experiments show that existing large language models, including GPT-4, exhibit weak performance on complex reasoning. We hope that our findings could inspire more advanced techniques for precise natural language understanding and reasoning. Our dataset and codes are available at https://github.com/whyNLP/Conic10K.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Detecting and Mitigating Algorithmic Bias in Binary Classification using Causal Modeling
Authors:
Wendy Hui,
Wai Kwong Lau
Abstract:
This paper proposes the use of causal modeling to detect and mitigate algorithmic bias. We provide a brief description of causal modeling and a general overview of our approach. We then use the Adult dataset, which is available for download from the UC Irvine Machine Learning Repository, to develop (1) a prediction model, which is treated as a black box, and (2) a causal model for bias mitigation.…
▽ More
This paper proposes the use of causal modeling to detect and mitigate algorithmic bias. We provide a brief description of causal modeling and a general overview of our approach. We then use the Adult dataset, which is available for download from the UC Irvine Machine Learning Repository, to develop (1) a prediction model, which is treated as a black box, and (2) a causal model for bias mitigation. In this paper, we focus on gender bias and the problem of binary classification. We show that gender bias in the prediction model is statistically significant at the 0.05 level. We demonstrate the effectiveness of the causal model in mitigating gender bias by cross-validation. Furthermore, we show that the overall classification accuracy is improved slightly. Our novel approach is intuitive, easy-to-use, and can be implemented using existing statistical software tools such as "lavaan" in R. Hence, it enhances explainability and promotes trust.
△ Less
Submitted 8 November, 2023; v1 submitted 18 October, 2023;
originally announced October 2023.
-
Object Topological Character Acquisition by Inductive Learning
Authors:
Wei Hui,
Li** Yu,
Yiran Wei
Abstract:
Understanding the shape and structure of objects is undoubtedly extremely important for object recognition, but the most common pattern recognition method currently used is machine learning, which often requires a large number of training data. The problem is that this kind of object-oriented learning lacks a priori knowledge. The amount of training data and the complexity of computations are very…
▽ More
Understanding the shape and structure of objects is undoubtedly extremely important for object recognition, but the most common pattern recognition method currently used is machine learning, which often requires a large number of training data. The problem is that this kind of object-oriented learning lacks a priori knowledge. The amount of training data and the complexity of computations are very large, and it is hard to extract explicit knowledge after learning. This is typically called "knowing how without knowing why". We adopted a method of inductive learning, ho** to derive conceptual knowledge of the shape of an object and its formal representation based on a small number of positive examples. It is clear that implementing object recognition is not based on simple physical features such as colors, edges, textures, etc., but on their common geometry, such as topologies, which are stable, persistent, and essential to recognition. In this paper, a formal representation of topological structure based on object's skeleton (RTS) was proposed and the induction process of "seeking common ground" is realized. This research helps promote the method of object recognition from empiricism to rationalism.
△ Less
Submitted 18 June, 2023;
originally announced June 2023.
-
Recall, Expand and Multi-Candidate Cross-Encode: Fast and Accurate Ultra-Fine Entity Ty**
Authors:
Chengyue Jiang,
Wenyang Hui,
Yong Jiang,
Xiaobin Wang,
Pengjun Xie,
Kewei Tu
Abstract:
Ultra-fine entity ty** (UFET) predicts extremely free-formed types (e.g., president, politician) of a given entity mention (e.g., Joe Biden) in context. State-of-the-art (SOTA) methods use the cross-encoder (CE) based architecture. CE concatenates the mention (and its context) with each type and feeds the pairs into a pretrained language model (PLM) to score their relevance. It brings deeper int…
▽ More
Ultra-fine entity ty** (UFET) predicts extremely free-formed types (e.g., president, politician) of a given entity mention (e.g., Joe Biden) in context. State-of-the-art (SOTA) methods use the cross-encoder (CE) based architecture. CE concatenates the mention (and its context) with each type and feeds the pairs into a pretrained language model (PLM) to score their relevance. It brings deeper interaction between mention and types to reach better performance but has to perform N (type set size) forward passes to infer types of a single mention. CE is therefore very slow in inference when the type set is large (e.g., N = 10k for UFET). To this end, we propose to perform entity ty** in a recall-expand-filter manner. The recall and expand stages prune the large type set and generate K (K is typically less than 256) most relevant type candidates for each mention. At the filter stage, we use a novel model called MCCE to concurrently encode and score these K candidates in only one forward pass to obtain the final type prediction. We investigate different variants of MCCE and extensive experiments show that MCCE under our paradigm reaches SOTA performance on ultra-fine entity ty** and is thousands of times faster than the cross-encoder. We also found MCCE is very effective in fine-grained (130 types) and coarse-grained (9 types) entity ty**. Our code is available at \url{https://github.com/modelscope/AdaSeq/tree/master/examples/MCCE}.
△ Less
Submitted 18 December, 2022;
originally announced December 2022.
-
Encoding protein dynamic information in graph representation for functional residue identification
Authors:
Yuan Chiang,
Wei-Han Hui,
Shu-Wei Chang
Abstract:
Recent advances in protein function prediction exploit graph-based deep learning approaches to correlate the structural and topological features of proteins with their molecular functions. However, proteins in vivo are not static but dynamic molecules that alter conformation for functional purposes. Here we apply normal mode analysis to native protein conformations and augment protein graphs by co…
▽ More
Recent advances in protein function prediction exploit graph-based deep learning approaches to correlate the structural and topological features of proteins with their molecular functions. However, proteins in vivo are not static but dynamic molecules that alter conformation for functional purposes. Here we apply normal mode analysis to native protein conformations and augment protein graphs by connecting edges between dynamically correlated residue pairs. In the multilabel function classification task, our method demonstrates a remarkable performance gain based on this dynamics-informed representation. The proposed graph neural network, ProDAR, increases the interpretability and generalizability of residue-level annotations and robustly reflects structural nuance in proteins. We elucidate the importance of dynamic information in graph representation by comparing class activation maps for hMTH1, nitrophorin, and SARS-CoV-2 receptor binding domain. Our model successfully learns the dynamic fingerprints of proteins and pinpoints the residues of functional impacts, with vast untapped potential for broad biotechnology and pharmaceutical applications.
△ Less
Submitted 10 June, 2022; v1 submitted 15 December, 2021;
originally announced December 2021.
-
Constructions of tight sets of the Hermitian polar space $\mc{H}(2r-1,q^2)$
Authors:
Alice M. W. Hui,
Weicong Li,
Qing Xiang,
Hanlin Zou
Abstract:
In this paper, we construct two infinite families of tight sets with parameters $(q^{2r-2}-1)$ and $(q^{2r-1}-q^{2r-2})$, respectively, in the Hermitian polar space $\mathcal{H}(2r-1,q^2)$ for any $r\ge 2$ and any prime power $q$. Both families admit $(q-1).\PGL(r,q^2).2.2e$ as the full automorphism group, where $q=p^e$, $p$ is a prime, and $e$ a positive integer.
In this paper, we construct two infinite families of tight sets with parameters $(q^{2r-2}-1)$ and $(q^{2r-1}-q^{2r-2})$, respectively, in the Hermitian polar space $\mathcal{H}(2r-1,q^2)$ for any $r\ge 2$ and any prime power $q$. Both families admit $(q-1).\PGL(r,q^2).2.2e$ as the full automorphism group, where $q=p^e$, $p$ is a prime, and $e$ a positive integer.
△ Less
Submitted 9 January, 2022; v1 submitted 19 December, 2021;
originally announced December 2021.
-
Performance of Transfer Learning Model vs. Traditional Neural Network in Low System Resource Environment
Authors:
William Hui
Abstract:
Recently, the use of pre-trained model to build neural network based on transfer learning methodology is increasingly popular. These pre-trained models present the benefit of using less computing resources to train model with smaller amount of training data. The rise of state-of-the-art models such as BERT, XLNet and GPT boost accuracy and benefit as a base model for transfer leanring. However, th…
▽ More
Recently, the use of pre-trained model to build neural network based on transfer learning methodology is increasingly popular. These pre-trained models present the benefit of using less computing resources to train model with smaller amount of training data. The rise of state-of-the-art models such as BERT, XLNet and GPT boost accuracy and benefit as a base model for transfer leanring. However, these models are still too complex and consume many computing resource to train for transfer learning with low GPU memory. We will compare the performance and cost between lighter transfer learning model and purposely built neural network for NLP application of text classification and NER model.
△ Less
Submitted 20 October, 2020;
originally announced November 2020.
-
Design Science Research Process: A Model for Producing and Presenting Information Systems Research
Authors:
Ken Peffers,
Tuure Tuunanen,
Charles E Gengler,
Matti Rossi,
Wendy Hui,
Ville Virtanen,
Johanna Bragge
Abstract:
The authors design and demonstrate a process for carrying out design science (DS) research in information systems and demonstrate use of the process to conduct research in two case studies. Several IS researchers have pioneered the acceptance of DS research in IS, but in the last 15 years little DS research has been done within the discipline. The lack of a generally accepted process for DS resear…
▽ More
The authors design and demonstrate a process for carrying out design science (DS) research in information systems and demonstrate use of the process to conduct research in two case studies. Several IS researchers have pioneered the acceptance of DS research in IS, but in the last 15 years little DS research has been done within the discipline. The lack of a generally accepted process for DS research in IS may have contributed to this problem. We sought to design a design science research process (DSRP) model that would meet three objectives: it would be consistent with prior literature, it would provide a nominal process model for doing DS research, and it would provide a mental model for presenting and appreciating DS research in IS. The process includes six steps: problem identification and motivation, objectives for a solution, design and development, evaluation, and communication. We demonstrated the process by using it in this study and by presenting two case studies, one in IS planning to develop application ideas for mobile financial services and another in requirements engineering to specify feature requirements for a self service advertising design and sales system intended for wide audience end users. The process effectively satisfies the three objectives and has the potential to help aid the acceptance of DS research in the IS discipline.
△ Less
Submitted 4 June, 2020;
originally announced June 2020.
-
A Reliable Gravity Compensation Control Strategy for dVRK Robotic Arms With Nonlinear Disturbance Forces
Authors:
Hongbin Lin,
C. W. Vincent Hui,
Yan Wang,
Anton Deguet,
Peter Kazanzides,
K. W. Samuel Au
Abstract:
External disturbance forces caused by nonlinear springy electrical cables in the Master Tool Manipulator (MTM) of the da Vinci Research Kit (dVRK) limits the usage of the existing gravity compensation methods. Significant motion drifts at the MTM tip are often observed when the MTM is located far from its identification trajectory, preventing the usage of these methods for the entire workspace rel…
▽ More
External disturbance forces caused by nonlinear springy electrical cables in the Master Tool Manipulator (MTM) of the da Vinci Research Kit (dVRK) limits the usage of the existing gravity compensation methods. Significant motion drifts at the MTM tip are often observed when the MTM is located far from its identification trajectory, preventing the usage of these methods for the entire workspace reliably. In this paper, we propose a general and systematic framework to address the problems of the gravity compensation for the MTM of the dVRK. Particularly, high order polynomial models were used to capture the highly nonlinear disturbance forces and integrated with the Multi-step Least Square Estimation (MLSE) framework. This method allows us to identify the parameters of both the gravitational and disturbance forces for each link sequentially, preventing residual error passing among the links of the MTM with uneven mass distribution. A corresponding gravity compensation controller was developed to compensate the gravitational and disturbance forces. The method was validated with extensive experiments in the majority of the manipulator's workspace, showing significant performance enhancements over existing methods. Finally, a deliverable software package in MATLAB and C++ was integrated with dVRK and published in the dVRK community for open-source research and development.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
Characterising hyperbolic hyperplanes of a non-singular quadric in $PG(4,q)$
Authors:
S. G. Barwick,
Alice M. W. Hui,
Wen-Ai Jackson,
Jeroen Schillewaert
Abstract:
Let $H$ be a non-empty set of hyperplanes in $PG(4,q)$, $q$ even, such that every point of $PG(4,q)$ lies in either $0$, $\frac12q^3$ or $\frac12(q^3+q^2)$ hyperplanes of $ H$, and every plane of $PG(4,q)$ lies in $0$ or at least $\frac12q$ hyperplanes of $H$. Then $H$ is the set of all hyperplanes which meet a given non-singular quadric $Q(4,q)$ in a hyperbolic quadric.
Let $H$ be a non-empty set of hyperplanes in $PG(4,q)$, $q$ even, such that every point of $PG(4,q)$ lies in either $0$, $\frac12q^3$ or $\frac12(q^3+q^2)$ hyperplanes of $ H$, and every plane of $PG(4,q)$ lies in $0$ or at least $\frac12q$ hyperplanes of $H$. Then $H$ is the set of all hyperplanes which meet a given non-singular quadric $Q(4,q)$ in a hyperbolic quadric.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
Characterising elliptic solids of $Q(4,q)$, $q$ even
Authors:
S. G. Barwick,
Alice M. W. Hui,
Wen-Ai Jackson
Abstract:
Let $E$ be a set of solids (hyperplanes) in $PG(4,q)$, $q$ even, $q>2$, such that every point of $PG(4,q)$ lies in either $0$, $\frac12q^3$ or $\frac12(q^3-q^2)$ solids of $E$, and every plane of $PG(4,q)$ lies in either $0$, $\frac12q$ or $q$ solids of $E$. This article shows that $E$ is either the set of solids that are disjoint from a hyperoval, or the set of solids that meet a non-singular qua…
▽ More
Let $E$ be a set of solids (hyperplanes) in $PG(4,q)$, $q$ even, $q>2$, such that every point of $PG(4,q)$ lies in either $0$, $\frac12q^3$ or $\frac12(q^3-q^2)$ solids of $E$, and every plane of $PG(4,q)$ lies in either $0$, $\frac12q$ or $q$ solids of $E$. This article shows that $E$ is either the set of solids that are disjoint from a hyperoval, or the set of solids that meet a non-singular quadric $Q(4,q)$ in an elliptic quadric.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
Metrology of time-domain soft X-ray attosecond pulses and re-evaluation of pulse durations of three recent experiments
Authors:
Zhao Xi,
Wang Su-Ju,
Yu Wei-Wei,
Wei Hui,
Lin C. D
Abstract:
Attosecond pulses in the soft-X-ray (SXR) to water-window energy region offer the tools for creating and studying target specific localized inner-shell electrons or holes in materials, enable monitoring or controlling charge and energy flows in a dynamic system on attosecond timescales. Recently, a number of laboratories have reported generation of continuum harmonics in the hundred-electron-volt…
▽ More
Attosecond pulses in the soft-X-ray (SXR) to water-window energy region offer the tools for creating and studying target specific localized inner-shell electrons or holes in materials, enable monitoring or controlling charge and energy flows in a dynamic system on attosecond timescales. Recently, a number of laboratories have reported generation of continuum harmonics in the hundred-electron-volt to kilovolt region with few-cycle long-wavelength mid-infrared lasers. These harmonics have the bandwidth to support pulses with duration of few- to few-ten attoseconds. But harmonics generated in a gas medium have attochirps that cannot be fully compensated by materials over a broad spectral range; thus, realistically what are the typical shortest attosecond pulses that one can generate? To answer this question, it is essential that the temporal attosecond pulses be accurately characterized. By re-analyzing the soft X-ray harmonics reported in three recent experiments \cite{chang_natcom2017,Thomas_OE2017,Bieger_2017PRX} using a newly developed broadband phase retrieval algorithm, we show that their generated attosecond pulses are all longer than about 60 as. Since broadband pulses tend to have high-order chirps away from the spectral center of the pulse, the algorithm has to be able to retrieve accurately the phase over the whole bandwidth. Our re-evaluated pulse durations are found to be longer than those previously reported. We also introduce the autocorrelation (AC) of the streaking spectrogram. By comparing the ACs from the experiments and from the retrieved SXR pulses, the accuracy of the retrieved results can be directly visualized to ensure that correct phases have been obtained. Our retrieval method is fast and accurate, and it shall provide a powerful tool for the metrology of few-ten-attosecond pulses in the future.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Some Experimental Results of Relieving Discomfort in Virtual Reality by Disturbing Feedback Loop in Human Brain
Authors:
Wei Qionghua,
Wang Hui,
Wei Qiang
Abstract:
Recently, great progress has been made in virtual reality(VR) research and application. However, virtual reality faces a big problem since its appearance, i.e. discomfort (nausea, stomach awareness, etc). Discomfort can be relieved by increasing hardware (sensor, cpu and display) speed. But this will increase cost. This paper gives another low cost solution. The phenomenon of cybersickness is expl…
▽ More
Recently, great progress has been made in virtual reality(VR) research and application. However, virtual reality faces a big problem since its appearance, i.e. discomfort (nausea, stomach awareness, etc). Discomfort can be relieved by increasing hardware (sensor, cpu and display) speed. But this will increase cost. This paper gives another low cost solution. The phenomenon of cybersickness is explained with the control theory: discomfort arises if feedback scene differs from expectation, so it can be relieved by disturbing feedback loop in human brain. A hardware platform is build to test this explanation. The VR display on a Samsung S6 is blurred while head movement is detected. The effect is evaluated by comparing responses to the Simulated Sickness Questionnaire (SSQ) between a control and experimental condition. Experimental results show that the new method can ease discomfort remarkably with little extra cost. As a result, VR may be used more widely in teaching (like foreign language, medicine). It's also reasonable to expect likewise merits in other VR applications.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Standard Cell Library Evaluation with Multiple lithography-compliant verification and Improved Synopsys Pin Access Checking Utility
Authors:
Yongfu Li,
Wan Chia Ang,
Chin Hui Lee,
Kok Peng Chua,
Yoong Seang Jonathan Ong,
Chiu Wing Colin Hui
Abstract:
While standard cell layouts are drawn with minimum design rules to maximize the benefit of design area shrinkage, the complicated design rules have caused difficulties with signal routes accessing the pins in standard cell layouts. As a result, it has become a great challenge for physical layout designers to design a standard cell layout that is optimized for area, power, timing, signal integrity,…
▽ More
While standard cell layouts are drawn with minimum design rules to maximize the benefit of design area shrinkage, the complicated design rules have caused difficulties with signal routes accessing the pins in standard cell layouts. As a result, it has become a great challenge for physical layout designers to design a standard cell layout that is optimized for area, power, timing, signal integrity, and printability. Multiple design iterations are required to consider pin accessibility during standard cells layout to increase the number of feasible solutions available to the router. In this work, we will demonstrate several improvements with the Synopsys PAC methodology, such as reducing the number of cells required for each Synopsys 'testcell' with the same cell abutment condition, increasing the complexity of the pin connection for better pin accessibility evaluation. We also recommend additional constraints to improve the probability of detecting pin accessibility issues. We also integrate other physical verification methods to access the design rule compliance and the printability of standard cells. We hope that the easy to use utility enables layout engineers to perform the verification, simplifying the verification methodology.
△ Less
Submitted 27 May, 2018;
originally announced May 2018.
-
Multiple-Lithography-Compliant Verification for Standard Cell Library Development Flow
Authors:
Yongfu Li,
Wan Chia Ang,
Chin Hui Lee,
Kok Peng Chua,
Yoong Seang Jonathan Ong,
Chiu Wing Colin Hui
Abstract:
Starting from 22-nm, a standard cell must be designed to be full lithography-compliant, which includes Design Rule Check, Design-for-Manufacturability and Double-Patterning compliant. It has become a great challenge for physical layout designers to provide a full lithography-compliant standard cell layout that is optimized for area, power, timing, signal integrity, and yield. This challenge is fur…
▽ More
Starting from 22-nm, a standard cell must be designed to be full lithography-compliant, which includes Design Rule Check, Design-for-Manufacturability and Double-Patterning compliant. It has become a great challenge for physical layout designers to provide a full lithography-compliant standard cell layout that is optimized for area, power, timing, signal integrity, and yield. This challenge is further exacerbated with abutted single- and multiple-height standard cells. At present, different foundries and library vendors have different approaches for full lithography-compliant library preparation and validation. To the best of our knowledge, there is no single tool integrates all types of lithography-compliant check in standard cell libraries validation flow. In this work, we will demonstrate multiple lithography-compliant verification for standard cell library development flow. Validation flow and detailed algorithm implementation will be explained to assist engineers to achieve full lithography-compliant standard cell libraries. An area-efficient standard cell placement methodology will also be discussed to validate the issues arises from standard cell abutment.
△ Less
Submitted 27 May, 2018;
originally announced May 2018.
-
Constraining the Synopsys Pin Access Checker Utility for Improved Standard Cells Library Verification Flow
Authors:
Yongfu Li,
Chin Hui Lee,
Wan Chia Ang,
Kok Peng Chua,
Yoong Seang Jonathan Ong,
Chiu Wing Colin Hui
Abstract:
While standard cell layouts are drawn with minimum design rules for maximum benefit of design area shrinkage, the complicated design rules begin to cause difficulties with signal routes accessing the pins in standard cell layouts. Multiple design iterations are required to resolve routing issues, thus increasing the runtime and the overall chip area. To optimize the chip performance, power and are…
▽ More
While standard cell layouts are drawn with minimum design rules for maximum benefit of design area shrinkage, the complicated design rules begin to cause difficulties with signal routes accessing the pins in standard cell layouts. Multiple design iterations are required to resolve routing issues, thus increasing the runtime and the overall chip area. To optimize the chip performance, power and area (PPA) and improve the routability, it is necessary to consider the pin accessibility during standard cell development phase so that each cell is designed to maximize the number of feasible pin-access solutions available to the router. As part of the Synopsys IC Compiler Library Preparation Reference Methodology, the Synopsys Pin Access Checker (PAC) reports DRC violations associated with the standard cell. Based on Synopsys PAC's methodology, we demonstrate several methods to improve the probability of detecting pin accessibility issues, such as reducing the number of cells required for each Synopsys 'testcell', increasing the complexity of the pin connectivity assignment and recommending the router constraints.
△ Less
Submitted 25 May, 2018;
originally announced May 2018.
-
On the structure of zero-sum free set with minimum subset sums in abelian groups
Authors:
Jiangtao Peng,
Wanzhen Hui
Abstract:
Let $G$ be an additive abelian group and $S\subset G$ a subset. Let $Σ(S)$ denote the set of group elements which can be expressed as a sum of a nonempty subset of $S$. We say $S$ is zero-sum free if $0 \not\in Σ(S)$. It was conjectured by R.B.~Eggleton and P.~Erdös in 1972 and proved by W.~Gao et. al. in 2008 that $|Σ(S)|\geq 19$ provided that $S$ is a zero-sum free subset of an abelian group…
▽ More
Let $G$ be an additive abelian group and $S\subset G$ a subset. Let $Σ(S)$ denote the set of group elements which can be expressed as a sum of a nonempty subset of $S$. We say $S$ is zero-sum free if $0 \not\in Σ(S)$. It was conjectured by R.B.~Eggleton and P.~Erdös in 1972 and proved by W.~Gao et. al. in 2008 that $|Σ(S)|\geq 19$ provided that $S$ is a zero-sum free subset of an abelian group $G$ with $|S|=6$. In this paper, we determined the structure of zero-sum free set $S$ where $|S|=6$ and $|Σ(S)|=19$.
△ Less
Submitted 30 December, 2017;
originally announced January 2018.
-
The vertex-isoperimetric number of the incidence andnon-incidence graphs of unitals
Authors:
Alice M. W. Hui,
Muhammad Adib Surani,
Sanming Zhou
Abstract:
We derive upper and lower bounds for the vertex-isoperimetric number of the incidence graphs of unitals and determine its order of magnitude. In the case when a unital contains sufficiently large arcs, these bounds agree and give rise to the precise value of this parameter. In particular, we obtain the exact value of the vertex-isoperimetric number of the incidence graphs of classical unitals and…
▽ More
We derive upper and lower bounds for the vertex-isoperimetric number of the incidence graphs of unitals and determine its order of magnitude. In the case when a unital contains sufficiently large arcs, these bounds agree and give rise to the precise value of this parameter. In particular, we obtain the exact value of the vertex-isoperimetric number of the incidence graphs of classical unitals and a certain subfamily of BM-unitals. In the case when the maximum size of arcs in the unital is relatively small, we obtain an upper bound for this parameter in terms of the vertex-isoperimetric number of the incidence graph. We also determine the exact value of the vertex-isoperimetric number of the non-incidence graph of any unital.
△ Less
Submitted 5 December, 2017;
originally announced December 2017.
-
Switched graphs of some strongly regular graphs related to the symplectic graph
Authors:
Alice M. W. Hui,
Bernardo Rodrigues
Abstract:
Applying a method of Godsil and McKay \cite{GM} to some graphs related to the symplectic graph, a series of new infinite families of strongly regular graphs with parameters $(2^n\pm2^{(n-1)/2},2^{n-1}\pm2^{(n-1)/2},2^{n-2}\pm2^{(n-3)/2},2^{n-2}\pm2^{(n-1)/2})$ are constructed for any odd $n \geq 5$. The construction is described in terms of geometry of quadric in projective space. The binary linea…
▽ More
Applying a method of Godsil and McKay \cite{GM} to some graphs related to the symplectic graph, a series of new infinite families of strongly regular graphs with parameters $(2^n\pm2^{(n-1)/2},2^{n-1}\pm2^{(n-1)/2},2^{n-2}\pm2^{(n-3)/2},2^{n-2}\pm2^{(n-1)/2})$ are constructed for any odd $n \geq 5$. The construction is described in terms of geometry of quadric in projective space. The binary linear codes of the switched graphs are $[2^n \mp 2^{\frac{n-1}{2}},n+3,2^{t+1}]_2$-code or $[2^n \mp 2^{\frac{n-1}{2}},n+3,2^{t+2}]_2$-code.
△ Less
Submitted 24 May, 2016;
originally announced May 2016.
-
A geometric proof of Wilbrink's characterization of even order classical unitals
Authors:
Alice M. W. Hui
Abstract:
Using geometric methods and without invoking deep results from group theory, we prove that a classical unital of even order $n\geq4$ is characterized by two conditions (I) and (II): (I) is the absence of O'Nan configurations of four distinct lines intersecting in exactly six distinct points; (II) is a notion of parallelism. This was previously proven by Wilbrink (1983), where the proof depends on…
▽ More
Using geometric methods and without invoking deep results from group theory, we prove that a classical unital of even order $n\geq4$ is characterized by two conditions (I) and (II): (I) is the absence of O'Nan configurations of four distinct lines intersecting in exactly six distinct points; (II) is a notion of parallelism. This was previously proven by Wilbrink (1983), where the proof depends on the classification of finite groups with a split BN-pair of rank 1.
△ Less
Submitted 24 March, 2016;
originally announced March 2016.
-
A Unified Framework for Information Consumption Based on Markov Chains
Authors:
David Shui Wing Hui,
Yi-Chao Chen,
Gong Zhang,
Weijie Wu,
Guanrong Chen,
John C. S. Lui,
Yingtao Li
Abstract:
This paper establishes a Markov chain model as a unified framework for understanding information consumption processes in complex networks, with clear implications to the Internet and big-data technologies. In particular, the proposed model is the first one to address the formation mechanism of the "trichotomy" in observed probability density functions from empirical data of various social and tec…
▽ More
This paper establishes a Markov chain model as a unified framework for understanding information consumption processes in complex networks, with clear implications to the Internet and big-data technologies. In particular, the proposed model is the first one to address the formation mechanism of the "trichotomy" in observed probability density functions from empirical data of various social and technical networks. Both simulation and experimental results demonstrate a good match of the proposed model with real datasets, showing its superiority over the classical power-law models.
△ Less
Submitted 2 February, 2016;
originally announced February 2016.
-
Inclusive and Direct Photons in S + Au Central Collisions at 200A GeV/c
Authors:
Wang Hui,
Sa Ben-Hao,
Tai An,
Sun Zu-Xun
Abstract:
A hadron and string cascade model, JPCIAE, which is based on LUND string model, PYTHIA event generator especially, is used to study both inclusive photon production and direct photon production in 200A GeV S + Au central collisions. The model takes into account the photon production from the partonic QCD scattering process, the hadronic final-state interaction, and the hadronic decay and deals w…
▽ More
A hadron and string cascade model, JPCIAE, which is based on LUND string model, PYTHIA event generator especially, is used to study both inclusive photon production and direct photon production in 200A GeV S + Au central collisions. The model takes into account the photon production from the partonic QCD scattering process, the hadronic final-state interaction, and the hadronic decay and deals with them consistently. The results of JPCIAE model reproduce successfully both the WA93 data of low p_T inclusive photon distribution and the WA80 data of transverse momentum dependent upper limit of direct photon. The photon production from different decay channels is investigated for both direct and inclusive photons. We have discussed the effects of the partonic QCD scattering and the hadronic final-state interaction on direct photon production as well.
△ Less
Submitted 13 April, 1999;
originally announced April 1999.
-
$J/ψ$ normal and anomalous suppressions in a hadron and string cascade model
Authors:
Sa Ben-Hao,
Amand Faessler,
Tai An,
T. Waindzoch,
C. Fuchs,
Z. S. Wang,
Wang Hui
Abstract:
A mechanism for the effective dissociation of a $c\bar{c}$ pair in the colour electric field of strings is introduced into a hadron and string cascade model, i.e. JPCIAE, which is based on the LUND model, simulating ultra-relativistic nucleus - nucleus collisions. This new mechanism together with the known mechanism of nuclear absorption (both baryons and mesons) could reproduce fairly the data…
▽ More
A mechanism for the effective dissociation of a $c\bar{c}$ pair in the colour electric field of strings is introduced into a hadron and string cascade model, i.e. JPCIAE, which is based on the LUND model, simulating ultra-relativistic nucleus - nucleus collisions. This new mechanism together with the known mechanism of nuclear absorption (both baryons and mesons) could reproduce fairly the data of the normal and anomalous $J/ψ$ suppressions in minimum bias pA, AB (with light projectile), and Pb + Pb collisions at 200 A GeV/c. However the impact parameter (E_T) dependence of the $J/ψ$ suppression factor, both, in S + U and Pb + Pb reactions at 200 A GeV/c and 158 A GeV/c, respectively, is not well reproduced. We also tested the additional mechanism of the energy degradation of leading particles, with which both, the normal and anomalous $J/ψ$ suppressions in minimum bias pA, AB, and Pb + Pb collisions and the E_T dependence of the $J/ψ$ suppression factor are better reproduced.
△ Less
Submitted 19 February, 1999; v1 submitted 8 September, 1998;
originally announced September 1998.
-
Formation time effect on J/ψdynamical nuclear suppression
Authors:
Sa Ben-Hao,
Tai An,
Wang Hui,
Liu Feng-He
Abstract:
The proposed hadronic and string cascade model, JPCIAE, for ultrarelativistic nucleus - nucleus collisions based on the LUND model and the PYTHIA event generator especially, is used to investigate the $J/ψ$ suppression due to the nuclear absorption of a $J/ψ$ in minimum bias pA and BA collisions at 200 A GeV energy. With the different sets of reasonable formation time for hadron and $J/ψ$ the re…
▽ More
The proposed hadronic and string cascade model, JPCIAE, for ultrarelativistic nucleus - nucleus collisions based on the LUND model and the PYTHIA event generator especially, is used to investigate the $J/ψ$ suppression due to the nuclear absorption of a $J/ψ$ in minimum bias pA and BA collisions at 200 A GeV energy. With the different sets of reasonable formation time for hadron and $J/ψ$ the results of $J/ψ$ suppression factor from both the usual scenario and the Glauber - like simulations are comparable with all the NA38 pA and BA data, except the NA50 data of Pb + Pb collisions. However, the difference between the usual scenario and the Glauber - like simulation, hence the difference between the dynamical simulation and Glauber theory, can not be ignored. The sensitive effect of the hadron formation time on the $J/ψ$ suppression is studied in detail. The results seem to denote that for the $J/ψ$ suppression the meson absorption plays role in pA as well as in BA collisions.
△ Less
Submitted 15 March, 1998;
originally announced March 1998.