-
Composing Object Relations and Attributes for Image-Text Matching
Authors:
Khoi Pham,
Chuong Huynh,
Ser-Nam Lim,
Abhinav Shrivastava
Abstract:
We study the visual semantic embedding problem for image-text matching. Most existing work utilizes a tailored cross-attention mechanism to perform local alignment across the two image and text modalities. This is computationally expensive, even though it is more powerful than the unimodal dual-encoder approach. This work introduces a dual-encoder image-text matching model, leveraging a scene grap…
▽ More
We study the visual semantic embedding problem for image-text matching. Most existing work utilizes a tailored cross-attention mechanism to perform local alignment across the two image and text modalities. This is computationally expensive, even though it is more powerful than the unimodal dual-encoder approach. This work introduces a dual-encoder image-text matching model, leveraging a scene graph to represent captions with nodes for objects and attributes interconnected by relational edges. Utilizing a graph attention network, our model efficiently encodes object-attribute and object-object semantic relations, resulting in a robust and fast-performing system. Representing caption as a scene graph offers the ability to utilize the strong relational inductive bias of graph neural networks to learn object-attribute and object-object relations effectively. To train the model, we propose losses that align the image and caption both at the holistic level (image-caption) and the local level (image-object entity), which we show is key to the success of the model. Our model is termed Composition model for Object Relations and Attributes, CORA. Experimental results on two prominent image-text retrieval benchmarks, Flickr30K and MSCOCO, demonstrate that CORA outperforms existing state-of-the-art computationally expensive cross-attention methods regarding recall score while achieving fast computation speed of the dual encoder.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
MaGGIe: Masked Guided Gradual Human Instance Matting
Authors:
Chuong Huynh,
Seoung Wug Oh,
Abhinav Shrivastava,
Joon-Young Lee
Abstract:
Human matting is a foundation task in image and video processing, where human foreground pixels are extracted from the input. Prior works either improve the accuracy by additional guidance or improve the temporal consistency of a single instance across frames. We propose a new framework MaGGIe, Masked Guided Gradual Human Instance Matting, which predicts alpha mattes progressively for each human i…
▽ More
Human matting is a foundation task in image and video processing, where human foreground pixels are extracted from the input. Prior works either improve the accuracy by additional guidance or improve the temporal consistency of a single instance across frames. We propose a new framework MaGGIe, Masked Guided Gradual Human Instance Matting, which predicts alpha mattes progressively for each human instances while maintaining the computational cost, precision, and consistency. Our method leverages modern architectures, including transformer attention and sparse convolution, to output all instance mattes simultaneously without exploding memory and latency. Although kee** constant inference costs in the multiple-instance scenario, our framework achieves robust and versatile performance on our proposed synthesized benchmarks. With the higher quality image and video matting benchmarks, the novel multi-instance synthesis approach from publicly available sources is introduced to increase the generalization of models in real-world scenarios.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Symmetry and reactivity of $π$-systems in electric and magnetic fields: a perspective from conceptual DFT
Authors:
Meilani Wibowo-Teale,
Bang C. Huynh,
Andrew M. Wibowo-Teale,
Frank De Proft,
Paul Geerlings
Abstract:
[Abridged] The extension of conceptual DFT to include external fields in chemical systems is utilised to investigate the effects of strong magnetic fields on the electronic charge distribution and its consequences on the reactivity of $π$-systems. Formaldehyde, H$_2$CO, is considered as a prototypical example and current-DFT calculations are used to evaluate the electric dipole moment together wit…
▽ More
[Abridged] The extension of conceptual DFT to include external fields in chemical systems is utilised to investigate the effects of strong magnetic fields on the electronic charge distribution and its consequences on the reactivity of $π$-systems. Formaldehyde, H$_2$CO, is considered as a prototypical example and current-DFT calculations are used to evaluate the electric dipole moment together with the electron density and the Fukui functions, which provide insight into how H$_2$CO behaves chemically in a magnetic field. In particular, the symmetries of these quantities are analysed based on group, representation, and corepresentation theories using QSym$^2$. This allows us to leverage the simple symmetry constraints on the macroscopic electric dipole moments to make profound predictions on the more nuanced symmetry transformation properties of the microscopic frontier MOs, electron densities, and Fukui functions. This is especially useful for complex-valued MOs in magnetic fields whose detailed symmetry analyses lead us to define the new concepts of modular and phasal symmetry breaking. Through these, the connection between the vanishing constraints on the electric dipole moments and the symmetry of electron densities and Fukui functions can be formalised, and the inability of the magnetic field in all three orientations considered to induce asymmetry with respect to the molecular plane can be understood from a molecular perspective. Furthermore, the detailed forms of the Fukui functions reveal remarkable reversals in the direction of the C=O dipole moment in the presence of a parallel or perpendicular magnetic field, which can be attributed to the mixing between frontier MOs due to their subduced symmetries in magnetic fields. The findings in this work are also discussed in the wider context of a long-standing debate on the possibility to create enantioselectivity by external fields.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
Optimizing Visibility-based Search in Polygonal Domains
Authors:
Kien C. Huynh,
Joseph S. B. Mitchell,
Linh Nguyen,
Valentin Polishchuk
Abstract:
Given a geometric domain $P$, visibility-based search problems seek routes for one or more mobile agents ("watchmen") to move within $P$ in order to be able to see a portion (or all) of $P$, while optimizing objectives, such as the length(s) of the route(s), the size (e.g., area or volume) of the portion seen, the probability of detecting a target distributed within $P$ according to a prior distri…
▽ More
Given a geometric domain $P$, visibility-based search problems seek routes for one or more mobile agents ("watchmen") to move within $P$ in order to be able to see a portion (or all) of $P$, while optimizing objectives, such as the length(s) of the route(s), the size (e.g., area or volume) of the portion seen, the probability of detecting a target distributed within $P$ according to a prior distribution, etc. The classic watchman route problem seeks a shortest route for an observer, with omnidirectional vision, to see all of $P$. In this paper we study bicriteria optimization problems for a single mobile agent within a polygonal domain $P$ in the plane, with the criteria of route length and area seen. Specifically, we address the problem of computing a minimum length route that sees at least a specified area of $P$ (minimum length, for a given area quota). We also study the problem of computing a length-constrained route that sees as much area as possible. We provide hardness results and approximation algorithms. In particular, for a simple polygon $P$ we provide the first fully polynomial-time approximation scheme for the problem of computing a shortest route seeing an area quota, as well as a (slightly more efficient) polynomial dual approximation. We also consider polygonal domains $P$ (with holes) and the special case of a planar domain consisting of a union of lines. Our results yield the first approximation algorithms for computing a time-optimal search route in $P$ to guarantee some specified probability of detection of a static target within $P$, randomly distributed in $P$ according to a given prior distribution.
△ Less
Submitted 18 April, 2024; v1 submitted 8 February, 2024;
originally announced February 2024.
-
Block-missing data in linear systems: An unbiased stochastic gradient descent approach
Authors:
Chelsea Huynh,
Anna Ma,
Michael Strand
Abstract:
Achieving accurate approximations to solutions of large linear systems is crucial, especially when those systems utilize real-world data. A consequence of using real-world data is that there will inevitably be missingness. Current approaches for dealing with missing data, such as deletion and imputation, can introduce bias. Recent studies proposed an adaptation of stochastic gradient descent (SGD)…
▽ More
Achieving accurate approximations to solutions of large linear systems is crucial, especially when those systems utilize real-world data. A consequence of using real-world data is that there will inevitably be missingness. Current approaches for dealing with missing data, such as deletion and imputation, can introduce bias. Recent studies proposed an adaptation of stochastic gradient descent (SGD) in specific missing-data models. In this work, we propose a new algorithm, $\ell$-tuple mSGD, for the setting in which data is missing in a block-wise, tuple pattern. We prove that our proposed method uses unbiased estimates of the gradient of the least squares objective in the presence of tuple missing data. We also draw connections between $\ell$-tuple mSGD and previously established SGD-type methods for missing data. Furthermore, we prove our algorithm converges when using updating step sizes and empirically demonstrate the convergence of $\ell$-tuple mSGD on synthetic data. Lastly, we evaluate $\ell$-tuple mSGD applied to real-world continuous glucose monitoring (CGM) device data.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
QSym$^2$: A Quantum Symbolic Symmetry Analysis Program for Electronic Structure
Authors:
Bang C. Huynh,
Meilani Wibowo-Teale,
Andrew M. Wibowo-Teale
Abstract:
Symmetry provides a powerful machinery to classify, interpret, and understand quantum-mechanical theories and results. However, most contemporary quantum chemistry packages lack the ability to handle degeneracy and symmetry breaking effects, especially in non-Abelian groups, nor are they able to characterize symmetry in the presence of external magnetic or electric fields. In this article, a progr…
▽ More
Symmetry provides a powerful machinery to classify, interpret, and understand quantum-mechanical theories and results. However, most contemporary quantum chemistry packages lack the ability to handle degeneracy and symmetry breaking effects, especially in non-Abelian groups, nor are they able to characterize symmetry in the presence of external magnetic or electric fields. In this article, a program written in Rust entitled QSym$^2$ that makes use of group and representation theories to provide symmetry analysis for a wide range of quantum-chemical calculations is introduced. With its ability to generate character tables symbolically on-the-fly, and by making use of a generic symmetry-orbit-based representation analysis method formulated in this work, QSym$^2$ is able to address all of these shortcomings. To illustrate these capabilities of QSym$^2$, four sets of case studies are examined in detail in this article: (i) high-symmetry $\textrm{C}_{84}\textrm{H}_{64}$, $\textrm{C}_{60}$, and $\textrm{B}_9^-$ to demonstrate the analysis of degenerate molecular orbitals (MOs); (ii) octahedral $\textrm{Fe(CN)}_6^{3-}$ to demonstrate the analysis of symmetry-broken determinants and MOs; (iii) linear hydrogen fluoride in a magnetic field to demonstrate the analysis of magnetic symmetry; and (iv) equilateral $\textrm{H}_3^+$ to demonstrate the analysis of density symmetries.
△ Less
Submitted 30 November, 2023; v1 submitted 10 October, 2023;
originally announced October 2023.
-
SimpSON: Simplifying Photo Cleanup with Single-Click Distracting Object Segmentation Network
Authors:
Chuong Huynh,
Yuqian Zhou,
Zhe Lin,
Connelly Barnes,
Eli Shechtman,
Sohrab Amirghodsi,
Abhinav Shrivastava
Abstract:
In photo editing, it is common practice to remove visual distractions to improve the overall image quality and highlight the primary subject. However, manually selecting and removing these small and dense distracting regions can be a laborious and time-consuming task. In this paper, we propose an interactive distractor selection method that is optimized to achieve the task with just a single click…
▽ More
In photo editing, it is common practice to remove visual distractions to improve the overall image quality and highlight the primary subject. However, manually selecting and removing these small and dense distracting regions can be a laborious and time-consuming task. In this paper, we propose an interactive distractor selection method that is optimized to achieve the task with just a single click. Our method surpasses the precision and recall achieved by the traditional method of running panoptic segmentation and then selecting the segments containing the clicks. We also showcase how a transformer-based module can be used to identify more distracting regions similar to the user's click position. Our experiments demonstrate that the model can effectively and accurately segment unknown distracting objects interactively and in groups. By significantly simplifying the photo cleaning and retouching process, our proposed model provides inspiration for exploring rare object segmentation and group selection with a single click.
△ Less
Submitted 28 May, 2023;
originally announced May 2023.
-
LEMaRT: Label-Efficient Masked Region Transform for Image Harmonization
Authors:
Sheng Liu,
Cong Phuoc Huynh,
Cong Chen,
Maxim Arap,
Raffay Hamid
Abstract:
We present a simple yet effective self-supervised pre-training method for image harmonization which can leverage large-scale unannotated image datasets. To achieve this goal, we first generate pre-training data online with our Label-Efficient Masked Region Transform (LEMaRT) pipeline. Given an image, LEMaRT generates a foreground mask and then applies a set of transformations to perturb various vi…
▽ More
We present a simple yet effective self-supervised pre-training method for image harmonization which can leverage large-scale unannotated image datasets. To achieve this goal, we first generate pre-training data online with our Label-Efficient Masked Region Transform (LEMaRT) pipeline. Given an image, LEMaRT generates a foreground mask and then applies a set of transformations to perturb various visual attributes, e.g., defocus blur, contrast, saturation, of the region specified by the generated mask. We then pre-train image harmonization models by recovering the original image from the perturbed image. Secondly, we introduce an image harmonization model, namely SwinIH, by retrofitting the Swin Transformer [27] with a combination of local and global self-attention mechanisms. Pre-training SwinIH with LEMaRT results in a new state of the art for image harmonization, while being label-efficient, i.e., consuming less annotated data for fine-tuning than existing methods. Notably, on iHarmony4 dataset [8], SwinIH outperforms the state of the art, i.e., SCS-Co [16] by a margin of 0.4 dB when it is fine-tuned on only 50% of the training data, and by 1.0 dB when it is trained on the full training dataset.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
Talbot Effect on the Sphere and Torus for $d\geq 2$
Authors:
M. Burak Erdogan,
Chi N. Y. Huynh,
Ryan McConnell
Abstract:
We utilize exponential sum techniques to obtain upper and lower bounds for the fractal dimension of the graph of solutions to the linear Schrödinger equation on $\mathbb{S}^d$ and $\mathbb{T}^d$. Specifically for $\mathbb S^d$, we provide dimension bounds using both $L^p$ estimates of Littlewood-Paley blocks, as well as assumptions on the Fourier coefficients. In the appendix, we present a slight…
▽ More
We utilize exponential sum techniques to obtain upper and lower bounds for the fractal dimension of the graph of solutions to the linear Schrödinger equation on $\mathbb{S}^d$ and $\mathbb{T}^d$. Specifically for $\mathbb S^d$, we provide dimension bounds using both $L^p$ estimates of Littlewood-Paley blocks, as well as assumptions on the Fourier coefficients. In the appendix, we present a slight improvement to the bilinear Strichartz estimate on $\mathbb{S}^2$ for functions supported on the zonal harmonics. We apply this to demonstrate an improved local well-posedness result for the zonal cubic NLS when $d=2$, and a nonlinear smoothing estimate when $d\geq 2$. As a corollary of the nonlinear smoothing for solutions to the zonal cubic NLS, we find dimension bounds generalizing the results of the first author and Tzirakis for solutions to the cubic NLS on $\mathbb{T}$. Additionally, we obtain several results on $\mathbb{T}^d$ generalizing the results of the $d=1$ case.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
On a barrier height problem for RNA branching
Authors:
Christine Heitsch,
Chi N. Y. Huynh,
Greg Johnston
Abstract:
The branching of an RNA molecule is an important structural characteristic yet difficult to predict correctly, especially for longer sequences. Using plane trees as a combinatorial model for RNA folding, we consider the thermodynamic cost, known as the barrier height, of transitioning between branching configurations. Using branching skew as a coarse energy approximation, we characterize various t…
▽ More
The branching of an RNA molecule is an important structural characteristic yet difficult to predict correctly, especially for longer sequences. Using plane trees as a combinatorial model for RNA folding, we consider the thermodynamic cost, known as the barrier height, of transitioning between branching configurations. Using branching skew as a coarse energy approximation, we characterize various types of paths in the discrete configuration landscape. In particular, we give sufficient conditions for a path to have both minimal length and minimal branching skew. The proofs offer some biological insights, notably the potential importance of both hairpin stability and domain architecture to higher resolution RNA barrier height analyses.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Accelerating Vision Transformer Training via a Patch Sampling Schedule
Authors:
Bradley McDanel,
Chi Phuong Huynh
Abstract:
We introduce the notion of a Patch Sampling Schedule (PSS), that varies the number of Vision Transformer (ViT) patches used per batch during training. Since all patches are not equally important for most vision objectives (e.g., classification), we argue that less important patches can be used in fewer training iterations, leading to shorter training time with minimal impact on performance. Additi…
▽ More
We introduce the notion of a Patch Sampling Schedule (PSS), that varies the number of Vision Transformer (ViT) patches used per batch during training. Since all patches are not equally important for most vision objectives (e.g., classification), we argue that less important patches can be used in fewer training iterations, leading to shorter training time with minimal impact on performance. Additionally, we observe that training with a PSS makes a ViT more robust to a wider patch sampling range during inference. This allows for a fine-grained, dynamic trade-off between throughput and accuracy during inference. We evaluate using PSSs on ViTs for ImageNet both trained from scratch and pre-trained using a reconstruction loss function. For the pre-trained model, we achieve a 0.26% reduction in classification accuracy for a 31% reduction in training time (from 25 to 17 hours) compared to using all patches each iteration. Code, model checkpoints and logs are available at https://github.com/BradMcDanel/pss.
△ Less
Submitted 19 August, 2022;
originally announced August 2022.
-
Density filamentation nonlinearly driven by the Weibel instability in relativistic beam plasmas
Authors:
Cong Tuan Huynh,
Chang-Mo Ryu,
Chulmin Kim
Abstract:
Density filamentation has been observed in many beam-plasma simulations and experiments. Because current filamentation is a pure transverse mode, charge density filamentation cannot be produced directly by the current filamentation process. To explain this phenomenon, several mechanisms are proposed such as the coupling of the Weibel instability to the two-stream instability, coupling to the Langm…
▽ More
Density filamentation has been observed in many beam-plasma simulations and experiments. Because current filamentation is a pure transverse mode, charge density filamentation cannot be produced directly by the current filamentation process. To explain this phenomenon, several mechanisms are proposed such as the coupling of the Weibel instability to the two-stream instability, coupling to the Langmuir wave, differences in thermal velocities between the beam and return currents, the magnetic pressure gradient force, etc. In this paper, it is shown that the gradient of the Lorentz factor can, in fact, represent the nonlinear behavior of a plasma fluid and further that the nonuniform Lorentz factor distribution can give rise to electrostatic fields and density filaments. Simulation results together with theoretical analyses are presented.
△ Less
Submitted 13 May, 2022; v1 submitted 8 May, 2022;
originally announced May 2022.
-
Analysis of Neural Fragility: Bounding the Norm of a Rank-One Perturbation Matrix
Authors:
Adam Li,
Chester Huynh
Abstract:
Over 15 million epilepsy patients worldwide do not respond to drugs and require surgical treatment. Successful surgical treatment requires complete removal, or disconnection of the epileptogenic zone (EZ), but without a prospective biomarker of the EZ, surgical success rates vary between 30%-70%. Neural fragility is a model recently proposed to localize the EZ. Neural fragility is computed as the…
▽ More
Over 15 million epilepsy patients worldwide do not respond to drugs and require surgical treatment. Successful surgical treatment requires complete removal, or disconnection of the epileptogenic zone (EZ), but without a prospective biomarker of the EZ, surgical success rates vary between 30%-70%. Neural fragility is a model recently proposed to localize the EZ. Neural fragility is computed as the l2 norm of a structured rank-one perturbation of an estimated linear dynamical system. However, an analysis of its numerical properties have not been explored. We show that neural fragility is a well-defined model given a good estimator of the linear dynamical system from data. Specifically, we provide bounds on neural fragility as a function of the underlying linear system and noise.
△ Less
Submitted 14 February, 2022;
originally announced February 2022.
-
A Strong Baseline for Vehicle Re-Identification
Authors:
Su V. Huynh,
Nam H. Nguyen,
Ngoc T. Nguyen,
Vinh TQ. Nguyen,
Chau Huynh,
Chuong Nguyen
Abstract:
Vehicle Re-Identification (Re-ID) aims to identify the same vehicle across different cameras, hence plays an important role in modern traffic management systems. The technical challenges require the algorithms must be robust in different views, resolution, occlusion and illumination conditions. In this paper, we first analyze the main factors hindering the Vehicle Re-ID performance. We then presen…
▽ More
Vehicle Re-Identification (Re-ID) aims to identify the same vehicle across different cameras, hence plays an important role in modern traffic management systems. The technical challenges require the algorithms must be robust in different views, resolution, occlusion and illumination conditions. In this paper, we first analyze the main factors hindering the Vehicle Re-ID performance. We then present our solutions, specifically targeting the dataset Track 2 of the 5th AI City Challenge, including (1) reducing the domain gap between real and synthetic data, (2) network modification by stacking multi heads with attention mechanism, (3) adaptive loss weight adjustment. Our method achieves 61.34% mAP on the private CityFlow testset without using external dataset or pseudo labeling, and outperforms all previous works at 87.1% mAP on the Veri benchmark. The code is available at https://github.com/cybercore-co-ltd/track2_aicity_2021.
△ Less
Submitted 21 April, 2021;
originally announced April 2021.
-
Progressive Semantic Segmentation
Authors:
Chuong Huynh,
Anh Tran,
Khoa Luu,
Minh Hoai
Abstract:
The objective of this work is to segment high-resolution images without overloading GPU memory usage or losing the fine details in the output segmentation map. The memory constraint means that we must either downsample the big image or divide the image into local patches for separate processing. However, the former approach would lose the fine details, while the latter can be ambiguous due to the…
▽ More
The objective of this work is to segment high-resolution images without overloading GPU memory usage or losing the fine details in the output segmentation map. The memory constraint means that we must either downsample the big image or divide the image into local patches for separate processing. However, the former approach would lose the fine details, while the latter can be ambiguous due to the lack of a global picture. In this work, we present MagNet, a multi-scale framework that resolves local ambiguity by looking at the image at multiple magnification levels. MagNet has multiple processing stages, where each stage corresponds to a magnification level, and the output of one stage is fed into the next stage for coarse-to-fine information propagation. Each stage analyzes the image at a higher resolution than the previous stage, recovering the previously lost details due to the lossy downsampling step, and the segmentation output is progressively refined through the processing stages. Experiments on three high-resolution datasets of urban views, aerial scenes, and medical images show that MagNet consistently outperforms the state-of-the-art methods by a significant margin.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
On Symmetry and the Reality of Holomorphic Hartree--Fock Wavefunctions
Authors:
Bang C. Huynh,
Alex J. W. Thom
Abstract:
The coalescence and disappearance of Hartree--Fock (HF) solutions as the molecular structure varies have been a common source of criticism for the breakdown of the HF approximation to the potential energy surfaces. However, recent developments in holomorphic HF theory show that this disappearing behavior is only a manifestation of the way conventional HF equations prevent solutions from being anal…
▽ More
The coalescence and disappearance of Hartree--Fock (HF) solutions as the molecular structure varies have been a common source of criticism for the breakdown of the HF approximation to the potential energy surfaces. However, recent developments in holomorphic HF theory show that this disappearing behavior is only a manifestation of the way conventional HF equations prevent solutions from being analytically continued, but it is unclear what factors govern the existence and the locations of these disappearances. In this work, we explore some of these factors from the perspective of spatial symmetry by introducing a classification for symmetry constraints on electronic-structure calculations. This forms a framework for us to systematically investigate several analytic holomorphic HF solutions of a model $\textrm{[H}_4\textrm{]}^{2+}$ system in STO-3G and demonstrate that, under appropriate conditions, spatial symmetry imposes strict requirements on the reality of certain solutions. The implications for self-consistent-field HF search algorithms are then discussed. Throughout this article, the term reality means the quality of a holomorphic HF solution having real molecular orbitals.
△ Less
Submitted 2 March, 2022; v1 submitted 22 December, 2020;
originally announced December 2020.
-
Identity Enhanced Residual Image Denoising
Authors:
Saeed Anwar,
Cong Phuoc Huynh,
Fatih Porikli
Abstract:
We propose to learn a fully-convolutional network model that consists of a Chain of Identity Map** Modules and residual on the residual architecture for image denoising. Our network structure possesses three distinctive features that are important for the noise removal task. Firstly, each unit employs identity map**s as the skip connections and receives pre-activated input to preserve the grad…
▽ More
We propose to learn a fully-convolutional network model that consists of a Chain of Identity Map** Modules and residual on the residual architecture for image denoising. Our network structure possesses three distinctive features that are important for the noise removal task. Firstly, each unit employs identity map**s as the skip connections and receives pre-activated input to preserve the gradient magnitude propagated in both the forward and backward directions. Secondly, by utilizing dilated kernels for the convolution layers in the residual branch, each neuron in the last convolution layer of each module can observe the full receptive field of the first layer. Lastly, we employ the residual on the residual architecture to ease the propagation of the high-level information. Contrary to current state-of-the-art real denoising networks, we also present a straightforward and single-stage network for real image denoising. The proposed network produces remarkably higher numerical accuracy and better visual image quality than the classical state-of-the-art and CNN algorithms when being evaluated on the three conventional benchmark and three real-world datasets.
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
Dimension Distortion by Right Coset Projections in the Heisenberg Group
Authors:
Terence L. J. Harris,
Chi N. Y. Huynh,
Fernando Roman-Garcia
Abstract:
We study the family of vertical projections whose fibers are right cosets of horizontal planes in the Heisenberg group, $\mathbb{H}^n$. We prove lower bounds for Hausdorff dimension distortion of sets under these map**s, with respect to the Euclidean metric and also the natural quotient metric which we show behaves like the Euclidean metric in this context. Our bounds are sharp in a large part o…
▽ More
We study the family of vertical projections whose fibers are right cosets of horizontal planes in the Heisenberg group, $\mathbb{H}^n$. We prove lower bounds for Hausdorff dimension distortion of sets under these map**s, with respect to the Euclidean metric and also the natural quotient metric which we show behaves like the Euclidean metric in this context. Our bounds are sharp in a large part of the dimension range, and we give conjectural sharp lower bounds for the remaining range. Our approach also lets us improve the known almost sure lower bound for the standard family of vertical projections in $\mathbb{H}^n$ for $n \geq 2$.
△ Less
Submitted 20 September, 2020; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Trap** of electrons around nanoscale metallic wires embedded in a semiconductor medium
Authors:
Chi Cuong Huynh,
R. Evrard,
Ngoc Duy Nguyen
Abstract:
We predict that conduction electrons in a semiconductor film containing a centered square array of metal nanowires normal to its plane are bound in quantum states around the central wires, if a positive bias voltage is applied between the wires at the square vertices and these latter. We obtain and discuss the eigenenergies and eigenfunctions of two models with different dimensions. The results sh…
▽ More
We predict that conduction electrons in a semiconductor film containing a centered square array of metal nanowires normal to its plane are bound in quantum states around the central wires, if a positive bias voltage is applied between the wires at the square vertices and these latter. We obtain and discuss the eigenenergies and eigenfunctions of two models with different dimensions. The results show that the eigenstates can be grouped into different shells. The energy differences between the shells is typically a few tens of meV, which corresponds to frequencies of emitted or absorbed photons in a range of 3 THz to 20 THz approximately. These energy differences strongly depend on the bias voltage. We calculate the linear response of individual electrons on the ground level of our models to large-wavelength electromagnetic waves whose electric field is in the plane of the semiconductor film. The computed oscillator strengths are dominated by the transitions to the states in each shell whose wave function has a single radial node line normal to the wave electric field. We include the effect of the image charge induced on the central metal wires and show that it modifies the oscillator strengths so that their sum deviates from the value given by the Thomas-Reiche-Kuhn rule. We report the linear response, or polarizability, versus photon energy, of the studied models and their absorption spectra. These latter show well-defined peaks as expected from the study of the oscillator strengths. We show that the position of these absorption peaks is strongly dependent on the bias voltage so that the frequency of photon absorption or emission in the systems described here is easily tunable. This makes them good candidates for the development of novel infrared devices.
△ Less
Submitted 9 November, 2019;
originally announced November 2019.
-
Manifold Oblique Random Forests: Towards Closing the Gap on Convolutional Deep Networks
Authors:
Adam Li,
Ronan Perry,
Chester Huynh,
Tyler M. Tomita,
Ronak Mehta,
Jesus Arroyo,
Jesse Patsolic,
Benjamin Falk,
Joshua T. Vogelstein
Abstract:
Decision forests (Forests), in particular random forests and gradient boosting trees, have demonstrated state-of-the-art accuracy compared to other methods in many supervised learning scenarios. In particular, Forests dominate other methods in tabular data, that is, when the feature space is unstructured, so that the signal is invariant to a permutation of the feature indices. However, in structur…
▽ More
Decision forests (Forests), in particular random forests and gradient boosting trees, have demonstrated state-of-the-art accuracy compared to other methods in many supervised learning scenarios. In particular, Forests dominate other methods in tabular data, that is, when the feature space is unstructured, so that the signal is invariant to a permutation of the feature indices. However, in structured data lying on a manifold (such as images, text, and speech) deep networks (Networks), specifically convolutional deep networks (ConvNets), tend to outperform Forests. We conjecture that at least part of the reason for this is that the input to Networks is not simply the feature magnitudes, but also their indices. In contrast, naive Forest implementations fail to explicitly consider feature indices. A recently proposed Forest approach demonstrates that Forests, for each node, implicitly sample a random matrix from some specific distribution. These Forests, like some classes of Networks, learn by partitioning the feature space into convex polytopes corresponding to linear functions. We build on that approach and show that one can choose distributions in a manifold-aware fashion to incorporate feature locality. We demonstrate the empirical performance on data whose features live on three different manifolds: a torus, images, and time-series. Moreover, we demonstrate its strength in multivariate simulated settings and also show superiority in predicting surgical outcome in epilepsy patients and predicting movement direction from raw stereotactic EEG data from non-motor brain regions. In all simulations and real data, Manifold Oblique Random Forest (MORF) algorithm outperforms approaches that ignore feature space structure and challenges the performance of ConvNets. Moreover, MORF runs fast and maintains interpretability and theoretical justification.
△ Less
Submitted 5 September, 2022; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Symmetry in Multiple Self-Consistent-Field Solutions of Transition-Metal Complexes
Authors:
Bang C. Huynh,
Alex J. W. Thom
Abstract:
We use a method based on metadynamics to locate multiple low-energy Unrestricted Hartree--Fock (UHF) self-consistent-field (SCF) solutions of two model octahedral $d^1$ and $d^2$ transition-metal complexes, $[\mathrm{MF}_6]^{3-} (\mathrm{M} = \mathrm{Ti}, \mathrm{V})$. By giving a group-theoretical definition of symmetry breaking, we classify these solutions in the framework of representation theo…
▽ More
We use a method based on metadynamics to locate multiple low-energy Unrestricted Hartree--Fock (UHF) self-consistent-field (SCF) solutions of two model octahedral $d^1$ and $d^2$ transition-metal complexes, $[\mathrm{MF}_6]^{3-} (\mathrm{M} = \mathrm{Ti}, \mathrm{V})$. By giving a group-theoretical definition of symmetry breaking, we classify these solutions in the framework of representation theory and observe that a number of them break spin or spatial symmetry, if not both. These solutions seem unphysical at first, but we show that they can be used as bases for Non-Orthogonal Configuration Interaction (NOCI) to yield multi-determinantal wavefunctions that have the right symmetry to be assigned to electronic terms. Furthermore, by examining the natural orbitals and occupation numbers of these NOCI wavefunctions, we gain insight into the amount of static correlation that they incorporate. We then investigate the behaviors of the most low-lying UHF and NOCI wavefunctions when the octahedral symmetry of the complexes is lowered and deduce that the symmetry-broken UHF solutions must first have their symmetry restored by NOCI before they can describe any vibronic stabilization effects dictated by the Jahn--Teller theorem.
△ Less
Submitted 11 December, 2019; v1 submitted 9 September, 2019;
originally announced September 2019.
-
Scaling limits for random triangulations on the torus
Authors:
Vincent Beffara,
Cong Bang Huynh,
Benjamin Lévêque
Abstract:
We study the scaling limit of essentially simple triangulations on the torus. We consider, for every $n\geq 1$, a uniformly random triangulation $G_n$ over the set of (appropriately rooted) essentially simple triangulations on the torus with $n$ vertices. We view $G_n$ as a metric space by endowing its set of vertices with the graph distance denoted by $d_{G_n}$ and show that the random metric spa…
▽ More
We study the scaling limit of essentially simple triangulations on the torus. We consider, for every $n\geq 1$, a uniformly random triangulation $G_n$ over the set of (appropriately rooted) essentially simple triangulations on the torus with $n$ vertices. We view $G_n$ as a metric space by endowing its set of vertices with the graph distance denoted by $d_{G_n}$ and show that the random metric space $(V(G_n),n^{-1/4}d_{G_n})$ converges in distribution in the Gromov-Hausdorff sense when $n$ goes to infinity, at least along subsequences, toward a random metric space. One of the crucial steps in the argument is to construct a simple labeling on the map and show its convergence to an explicit scaling limit. We moreover show that this labeling approximates the distance to the root up to a uniform correction of order $o(n^{1/4})$.
△ Less
Submitted 6 May, 2019;
originally announced May 2019.
-
Phase transition for the once-excited random walk on general trees
Authors:
Cong Bang Huynh
Abstract:
The phase transition of $M$-digging random on a general tree was studied by Collevecchio, Huynh and Kious (2018). In this paper, we study particularly the critical $M$-digging random walk on a superperiodic tree that is proved to be recurrent. We keep using the techniques introduced by Collevecchio, Kious and Sidoravicius (2017) with the aim of investigating the phase transition of Once-excited ra…
▽ More
The phase transition of $M$-digging random on a general tree was studied by Collevecchio, Huynh and Kious (2018). In this paper, we study particularly the critical $M$-digging random walk on a superperiodic tree that is proved to be recurrent. We keep using the techniques introduced by Collevecchio, Kious and Sidoravicius (2017) with the aim of investigating the phase transition of Once-excited random walk on general trees. In addition, we prove if $\mathcal T$ is a tree whose branching number is larger than $1$, any multi-excited random walk on $\mathcal{T}$ moving, after excitation, like a simple random walk is transient.
△ Less
Submitted 27 December, 2018; v1 submitted 5 December, 2018;
originally announced December 2018.
-
The branching-ruin number as critical parameter of random processes on trees
Authors:
Andrea Collevecchio,
Cong Bang Huynh,
Daniel Kious
Abstract:
The branching-ruin number of a tree, which describes its asymptotic growth and geometry, can be seen as a polynomial version of the branching number. This quantity was defined by Collevecchio, Kious and Sidoravicius (2018) in order to understand the phase transitions of the once-reinforced random walk (ORRW) on trees. Strikingly, this number was proved to be equal to the critical parameter of ORRW…
▽ More
The branching-ruin number of a tree, which describes its asymptotic growth and geometry, can be seen as a polynomial version of the branching number. This quantity was defined by Collevecchio, Kious and Sidoravicius (2018) in order to understand the phase transitions of the once-reinforced random walk (ORRW) on trees. Strikingly, this number was proved to be equal to the critical parameter of ORRW on trees. In this paper, we continue the investigation of the link between the branching-ruin number and the criticality of random processes on trees. First, we study random walks on random conductances on trees, when the conductances have an heavy tail at $0$, parametrized by some $p>1$, where $1/p$ is the exponent of the tail. We prove a phase transition recurrence/transience with respect to $p$ and identify the critical parameter to be equal to the branching-ruin number of the tree. Second, we study a multi-excited random walk on trees where each vertex has $M$ cookies and each cookie has an infinite strength towards the root. Here again, we prove a phase transition recurrence/transience and identify the critical number of cookies to be equal to the branching-ruin number of the tree, minus 1. This result extends a conjecture of Volkov (2003). Besides, we study a generalized version of this process and generalize results of Basdevant and Singh (2009).
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Can 3D Pose be Learned from 2D Projections Alone?
Authors:
Dylan Drover,
Rohith MV,
Ching-Hang Chen,
Amit Agrawal,
Ambrish Tyagi,
Cong Phuoc Huynh
Abstract:
3D pose estimation from a single image is a challenging task in computer vision. We present a weakly supervised approach to estimate 3D pose points, given only 2D pose landmarks. Our method does not require correspondences between 2D and 3D points to build explicit 3D priors. We utilize an adversarial framework to impose a prior on the 3D structure, learned solely from their random 2D projections.…
▽ More
3D pose estimation from a single image is a challenging task in computer vision. We present a weakly supervised approach to estimate 3D pose points, given only 2D pose landmarks. Our method does not require correspondences between 2D and 3D points to build explicit 3D priors. We utilize an adversarial framework to impose a prior on the 3D structure, learned solely from their random 2D projections. Given a set of 2D pose landmarks, the generator network hypothesizes their depths to obtain a 3D skeleton. We propose a novel Random Projection layer, which randomly projects the generated 3D skeleton and sends the resulting 2D pose to the discriminator. The discriminator improves by discriminating between the generated poses and pose samples from a real distribution of 2D poses. Training does not require correspondence between the 2D inputs to either the generator or the discriminator. We apply our approach to the task of 3D human pose estimation. Results on Human3.6M dataset demonstrates that our approach outperforms many previous supervised and weakly supervised approaches.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
CRAFT: Complementary Recommendations Using Adversarial Feature Transformer
Authors:
Cong Phuoc Huynh,
Arridhana Ciptadi,
Ambrish Tyagi,
Amit Agrawal
Abstract:
Traditional approaches for complementary product recommendations rely on behavioral and non-visual data such as customer co-views or co-buys. However, certain domains such as fashion are primarily visual. We propose a framework that harnesses visual cues in an unsupervised manner to learn the distribution of co-occurring complementary items in real world images. Our model learns a non-linear trans…
▽ More
Traditional approaches for complementary product recommendations rely on behavioral and non-visual data such as customer co-views or co-buys. However, certain domains such as fashion are primarily visual. We propose a framework that harnesses visual cues in an unsupervised manner to learn the distribution of co-occurring complementary items in real world images. Our model learns a non-linear transformation between the two manifolds of source and target complementary item categories (e.g., tops and bottoms in outfits). Given a large dataset of images containing instances of co-occurring object categories, we train a generative transformer network directly on the feature representation space by casting it as an adversarial optimization problem. Such a conditional generative model can produce multiple novel samples of complementary items (in the feature space) for a given query item. The final recommendations are selected from the closest real world examples to the synthesized complementary features. We apply our framework to the task of recommending complementary tops for a given bottom clothing item. The recommendations made by our system are diverse, and are favored by human experts over the baseline approaches.
△ Less
Submitted 10 September, 2018; v1 submitted 29 April, 2018;
originally announced April 2018.
-
Chaining Identity Map** Modules for Image Denoising
Authors:
Saeed Anwar,
Cong Phouc Huynh,
Fatih Porikli
Abstract:
We propose to learn a fully-convolutional network model that consists of a Chain of Identity Map** Modules (CIMM) for image denoising. The CIMM structure possesses two distinctive features that are important for the noise removal task. Firstly, each residual unit employs identity map**s as the skip connections and receives pre-activated input in order to preserve the gradient magnitude propaga…
▽ More
We propose to learn a fully-convolutional network model that consists of a Chain of Identity Map** Modules (CIMM) for image denoising. The CIMM structure possesses two distinctive features that are important for the noise removal task. Firstly, each residual unit employs identity map**s as the skip connections and receives pre-activated input in order to preserve the gradient magnitude propagated in both the forward and backward directions. Secondly, by utilizing dilated kernels for the convolution layers in the residual branch, in other words within an identity map** module, each neuron in the last convolution layer can observe the full receptive field of the first layer. After being trained on the BSD400 dataset, the proposed network produces remarkably higher numerical accuracy and better visual image quality than the state-of-the-art when being evaluated on conventional benchmark images and the BSD68 dataset.
△ Less
Submitted 18 July, 2019; v1 submitted 7 December, 2017;
originally announced December 2017.
-
Trees of self-avoiding walks
Authors:
Vincent Beffara,
Cong Bang Huynh
Abstract:
We consider the biased random walk on a tree constructed from the set of finite self-avoiding walks on a lattice, and use it to construct probability measures on infinite self-avoiding walks. The limit measure (if it exists) obtained when the bias converges to its critical value is conjectured to coincide with the weak limit of the uniform SAW. Along the way, we obtain a cri…
▽ More
We consider the biased random walk on a tree constructed from the set of finite self-avoiding walks on a lattice, and use it to construct probability measures on infinite self-avoiding walks. The limit measure (if it exists) obtained when the bias converges to its critical value is conjectured to coincide with the weak limit of the uniform SAW. Along the way, we obtain a criterion for the continuity of the escape probability of a biased random walk on a tree as a function of the bias, and show that the collection of escape probability functions for spherically symmetric trees of bounded degree is stable under uniform convergence.
△ Less
Submitted 24 December, 2019; v1 submitted 15 November, 2017;
originally announced November 2017.
-
Classification of crescent configurations
Authors:
Rebecca F. Durst,
Max Hlavacek,
Chi Huynh,
Steven J. Miller,
Eyvindur A. Palsson
Abstract:
Let $n$ points be in crescent configurations in $\mathbb{R}^d$ if they lie in general position in $\mathbb{R}^d$ and determine $n-1$ distinct distances, such that for every $1 \leq i \leq n-1$ there is a distance that occurs exactly $i$ times. Since Erdős' conjecture in 1989 on the existence of $N$ sufficiently large such that no crescent configurations exist on $N$ or more points, he, Pomerance,…
▽ More
Let $n$ points be in crescent configurations in $\mathbb{R}^d$ if they lie in general position in $\mathbb{R}^d$ and determine $n-1$ distinct distances, such that for every $1 \leq i \leq n-1$ there is a distance that occurs exactly $i$ times. Since Erdős' conjecture in 1989 on the existence of $N$ sufficiently large such that no crescent configurations exist on $N$ or more points, he, Pomerance, and Palásti have given constructions for $n$ up to $8$ but nothing is yet known for $n \geq 9$. Most recently, Burt et. al. had proven that a crescent configuration on $n$ points exists in $\mathbb{R}^{n-2}$ for $n \geq 3$. In this paper, we study the classification of these configurations on $4$ and $5$ points through graph isomorphism and rigidity. Our techniques, which can be generalized to higher dimensions, offer a new viewpoint on the problem through the lens of distance geometry and provide a systematic way to construct crescent configurations.
△ Less
Submitted 10 January, 2019; v1 submitted 25 October, 2016;
originally announced October 2016.
-
The Inverse Gamma Distribution and Benford's Law
Authors:
Rebecca F. Durst,
Chi Huynh,
Adam Lott,
Steven J. Miller,
Eyvindur A. Palsson,
Wouter Touw,
Gert Vriend
Abstract:
According to Benford's Law, many data sets have a bias towards lower leading digits (about $30\%$ are $1$'s). The applications of Benford's Law vary: from detecting tax, voter and image fraud to determining the possibility of match-fixing in competitive sports. There are many common distributions that exhibit such bias, i.e. they are almost Benford. These include the exponential and the Weibull di…
▽ More
According to Benford's Law, many data sets have a bias towards lower leading digits (about $30\%$ are $1$'s). The applications of Benford's Law vary: from detecting tax, voter and image fraud to determining the possibility of match-fixing in competitive sports. There are many common distributions that exhibit such bias, i.e. they are almost Benford. These include the exponential and the Weibull distributions. Motivated by these examples and the fact that the underlying distribution of factors in protein structure follows an inverse gamma distribution, we determine the closeness of this distribution to a Benford distribution as its parameters change.
△ Less
Submitted 6 January, 2018; v1 submitted 13 September, 2016;
originally announced September 2016.
-
Summand minimality and asymptotic convergence of generalized Zeckendorf decompositions
Authors:
Katherine Cordwell,
Max Hlavacek,
Chi Huynh,
Steven J. Miller,
Carsten Peterson,
Yen Nhi Truong Vu
Abstract:
Given a recurrence sequence $H$, with $H_n = c_1 H_{n-1} + \dots + c_t H_{n-t}$ where $c_i \in \mathbb{N}_0$ for all $i$ and $c_1, c_t \geq 1$, the generalized Zeckendorf decomposition (gzd) of $m \in \mathbb{N}_0$ is the unique representation of $m$ using $H$ composed of blocks lexicographically less than $σ= (c_1, \dots, c_t)$. We prove that the gzd of $m$ uses the fewest number of summands amon…
▽ More
Given a recurrence sequence $H$, with $H_n = c_1 H_{n-1} + \dots + c_t H_{n-t}$ where $c_i \in \mathbb{N}_0$ for all $i$ and $c_1, c_t \geq 1$, the generalized Zeckendorf decomposition (gzd) of $m \in \mathbb{N}_0$ is the unique representation of $m$ using $H$ composed of blocks lexicographically less than $σ= (c_1, \dots, c_t)$. We prove that the gzd of $m$ uses the fewest number of summands among all representations of $m$ using $H$, for all $m$, if and only if $σ$ is weakly decreasing. We develop an algorithm for moving from any representation of $m$ to the gzd, the analysis of which proves that $σ$ weakly decreasing implies summand minimality. We prove that the gzds of numbers of the form $v_0 H_n + \dots + v_\ell H_{n-\ell}$ converge in a suitable sense as $n \to \infty$, furthermore we classify three distinct behaviors for this convergence. We use this result, together with the irreducibility of certain families of polynomials, to exhibit a representation with fewer summands than the gzd if $σ$ is not weakly decreasing.
△ Less
Submitted 14 October, 2018; v1 submitted 31 August, 2016;
originally announced August 2016.
-
Nano Josephson Superconducting Tunnel Junctions in Y-Ba-Cu-O Direct- Patterned with a Focused Helium Ion Beam
Authors:
Shane A. Cybart,
E. Y. Cho,
T. J. Wong,
Björn H. Wehlin,
Meng K. Ma,
Chuong Huynh,
R. C. Dynes
Abstract:
Since the discovery of the unconventional copper-oxide high-transition-temperature superconductors (HTS), researchers have explored many methods to fabricate superconducting tunnel junctions from these materials for both superconducting electronics operating at the practical temperature of liquid nitrogen (77 K) and for fundamental measurements essential for testing and guiding theories of these r…
▽ More
Since the discovery of the unconventional copper-oxide high-transition-temperature superconductors (HTS), researchers have explored many methods to fabricate superconducting tunnel junctions from these materials for both superconducting electronics operating at the practical temperature of liquid nitrogen (77 K) and for fundamental measurements essential for testing and guiding theories of these remarkable superconductors. The difficulty is that the traditional estimate of the superconducting coherence length is very short and anisotropic in these materials, typically ~2 nm in the a-b plane and ~0.2 nm along the c-axis. The coherence volume encloses very few superconducting pairs, so even the presence of small scale inhomogeneities can locally disrupt superconductivity unlike in conventional superconductors. Therefore the electrical properties of Josephson junctions are sensitive to chemical variations and structural defects on atomic length scales, thus to make multiple uniform HTS junctions, control at the atomic level is required. In this letter, we demonstrate very high-quality all-HTS Josephson superconducting tunnel junctions (both Josephson and quasiparticle tunneling) created by using a 500 pm diameter focused beam of helium ions to direct-write tunnel barriers into YBa2Cu3O7(YBCO) thin films. With this method we demonstrate the ability to control the barrier properties continuously from conducting to insulating by varying the irradiation dose. This technique provides a reliable and reproducible pathway for the scaling up of quantum mechanical circuits operating at practical temperatures (~77 K) as well as an avenue to conduct superconducting tunneling studies in HTS for basic science.
△ Less
Submitted 17 September, 2014;
originally announced September 2014.
-
Student-based Collaborative Network for Delivering Information of Natural Disasters and Climate Adaptation
Authors:
Chien Huynh,
Phuong Huynh
Abstract:
The student generation nowadays is considered as the Net Generation who grow up in the age of Internet and mobile technology and prefer bringing technological application into their life. The Learning Resource Center, an academic information center, takes the initiative in develo** a collaborative network with the participation of students for delivering information of natural disasters and clim…
▽ More
The student generation nowadays is considered as the Net Generation who grow up in the age of Internet and mobile technology and prefer bringing technological application into their life. The Learning Resource Center, an academic information center, takes the initiative in develo** a collaborative network with the participation of students for delivering information of natural disasters and climate adaptation to the people who live in the vulnerable areas of Thua Thien Hue province. The network is aimed at hel** local people mitigating vulnerabilities and adapting to the globally climate change for a better life.
△ Less
Submitted 28 December, 2013;
originally announced January 2014.
-
Synthesis and structural characterization of uranium-doped Ca2CuO3, a 1D quantum antiferromagnet
Authors:
Nam Nhat Hoang,
Dang Chinh Huynh,
Duc Tho Nguyen,
Thuy Trang Nguyen,
Duc The Ngo,
Michael Finnie,
Chau Nguyen
Abstract:
The technological settings of a modified sol-gel method for preparation of highly fine homogeneous powder Ca2CuO3 doped with uranium 238 (x=0-0.05) is presented. The analysis of structure, purity of phases and the justification for the role of uranium in the given compounds are provided together with almost complete classification of observed optical phonons by means of the Raman, IR measurement…
▽ More
The technological settings of a modified sol-gel method for preparation of highly fine homogeneous powder Ca2CuO3 doped with uranium 238 (x=0-0.05) is presented. The analysis of structure, purity of phases and the justification for the role of uranium in the given compounds are provided together with almost complete classification of observed optical phonons by means of the Raman, IR measurements and ab initio calculation. The significant reduction in particle size was achieved by do** and the strong correlation between resistivity and do** concentration was observed and explained using the phonon-assisted electron hop** conduction model. The persistence of covalent insulation state in all compounds is a key feature of this class of compounds.
△ Less
Submitted 30 April, 2008; v1 submitted 11 February, 2008;
originally announced February 2008.