-
Robust and Parallel Bayesian Model Selection
Authors:
Michael Minyi Zhang,
Henry Lam,
Lizhen Lin
Abstract:
Effective and accurate model selection is an important problem in modern data analysis. One of the major challenges is the computational burden required to handle large data sets that cannot be stored or processed on one machine. Another challenge one may encounter is the presence of outliers and contaminations that damage the inference quality. The parallel "divide and conquer" model selection st…
▽ More
Effective and accurate model selection is an important problem in modern data analysis. One of the major challenges is the computational burden required to handle large data sets that cannot be stored or processed on one machine. Another challenge one may encounter is the presence of outliers and contaminations that damage the inference quality. The parallel "divide and conquer" model selection strategy divides the observations of the full data set into roughly equal subsets and perform inference and model selection independently on each subset. After local subset inference, this method aggregates the posterior model probabilities or other model/variable selection criteria to obtain a final model by using the notion of geometric median. This approach leads to improved concentration in finding the "correct" model and model parameters and also is provably robust to outliers and data contamination.
△ Less
Submitted 22 March, 2018; v1 submitted 19 October, 2016;
originally announced October 2016.
-
Resumming the POPE at One Loop
Authors:
Ho Tat Lam,
Matt von Hippel
Abstract:
The Pentagon Operator Product Expansion represents polygonal Wilson loops in planar $\mathcal{N}=4$ super Yang-Mills in terms of a series of flux tube excitations for finite coupling. We demonstrate how to re-sum this series at the one loop level for the hexagonal Wilson loop dual to the six-point MHV amplitude. By summing over a series of effective excitations we find expressions which integrate…
▽ More
The Pentagon Operator Product Expansion represents polygonal Wilson loops in planar $\mathcal{N}=4$ super Yang-Mills in terms of a series of flux tube excitations for finite coupling. We demonstrate how to re-sum this series at the one loop level for the hexagonal Wilson loop dual to the six-point MHV amplitude. By summing over a series of effective excitations we find expressions which integrate to logarithms and polylogarithms, reproducing the known one-loop result.
△ Less
Submitted 26 September, 2016; v1 submitted 29 August, 2016;
originally announced August 2016.
-
Accelerated Evaluation of Automated Vehicles in Car-Following Maneuvers
Authors:
Ding Zhao,
Xianan Huang,
Huei Peng,
Henry Lam,
David J. LeBlanc
Abstract:
The safety of Automated Vehicles (AVs) must be assured before their release and deployment. The current approach to evaluation relies primarily on (i) testing AVs on public roads or (ii) track testing with scenarios defined in a test matrix. These two methods have completely opposing drawbacks: the former, while offering realistic scenarios, takes too much time to execute; the latter, though it ca…
▽ More
The safety of Automated Vehicles (AVs) must be assured before their release and deployment. The current approach to evaluation relies primarily on (i) testing AVs on public roads or (ii) track testing with scenarios defined in a test matrix. These two methods have completely opposing drawbacks: the former, while offering realistic scenarios, takes too much time to execute; the latter, though it can be completed in a short amount of time, has no clear correlation to safety benefits in the real world. To avoid the aforementioned problems, we propose Accelerated Evaluation, focusing on the car-following scenario. The stochastic human-controlled vehicle (HV) motions are modeled based on 1.3 million miles of naturalistic driving data collected by the University of Michigan Safety Pilot Model Deployment Program. The statistics of the HV behaviors are then modified to generate more intense interactions between HVs and AVs to accelerate the evaluation procedure. The Importance Sampling theory was used to ensure that the safety benefits of AVs are accurately assessed under accelerated tests. Crash, injury and conflict rates for a simulated AV are simulated to demonstrate the proposed approach. Results show that test duration is reduced by a factor of 300 to 100,000 compared with the non-accelerated (naturalistic) evaluation. In other words, the proposed techniques have great potential for accelerating the AV evaluation process.
△ Less
Submitted 19 February, 2017; v1 submitted 9 July, 2016;
originally announced July 2016.
-
Reverse orbifold construction and uniqueness of holomorphic vertex operator algebras
Authors:
Ching Hung Lam,
Hiroki Shimakura
Abstract:
In this article, we develop a general technique for proving the uniqueness of holomorphic vertex operator algebras based on the orbifold construction and its "reverse" process. As an application, we prove that the structure of a strongly regular holomorphic vertex operator algebra of central charge $24$ is uniquely determined by its weight one Lie algebra if the Lie algebra has the type…
▽ More
In this article, we develop a general technique for proving the uniqueness of holomorphic vertex operator algebras based on the orbifold construction and its "reverse" process. As an application, we prove that the structure of a strongly regular holomorphic vertex operator algebra of central charge $24$ is uniquely determined by its weight one Lie algebra if the Lie algebra has the type $E_{6,3}G_{2,1}^3$, $A_{2,3}^6$ or $A_{5,3}D_{4,3}A_{1,1}^3$.
△ Less
Submitted 10 May, 2019; v1 submitted 29 June, 2016;
originally announced June 2016.
-
Sensitivity to Serial Dependency of Input Processes: A Robust Approach
Authors:
Henry Lam
Abstract:
Procedures in assessing the impact of serial dependency on performance analysis are usually built on parametrically specified models. In this paper, we propose a robust, nonparametric approach to carry out this assessment, by computing the worst-case deviation of the performance measure due to arbitrary dependence. The approach is based on optimizations, posited on the model space, that have const…
▽ More
Procedures in assessing the impact of serial dependency on performance analysis are usually built on parametrically specified models. In this paper, we propose a robust, nonparametric approach to carry out this assessment, by computing the worst-case deviation of the performance measure due to arbitrary dependence. The approach is based on optimizations, posited on the model space, that have constraints specifying the level of dependency measured by a nonparametric distance to some nominal i.i.d. input model. We study approximation methods for these optimizations via simulation and analysis-of-variance (ANOVA). Numerical experiments demonstrate how the proposed approach can discover the hidden impacts of dependency beyond those revealed by conventional parametric modeling and correlation studies.
△ Less
Submitted 21 June, 2016;
originally announced June 2016.
-
$\Z_3$-orbifold construction of the Moonshine vertex operator algebra and some maximal $3$-local subgroups of the Monster
Authors:
Hsian-Yang Chen,
Ching Hung Lam,
Hiroki Shimakura
Abstract:
In this article, we describe some maximal $3$-local subgroups of the Monster simple group using vertex operator algebras (VOA). We first study the holomorphic vertex operator algebra obtained by applying the orbifold construction to the Leech lattice vertex operator algebra and a lift of a fixed-point free isometry of order $3$ of the Leech lattice. We also consider some of its special subVOAs and…
▽ More
In this article, we describe some maximal $3$-local subgroups of the Monster simple group using vertex operator algebras (VOA). We first study the holomorphic vertex operator algebra obtained by applying the orbifold construction to the Leech lattice vertex operator algebra and a lift of a fixed-point free isometry of order $3$ of the Leech lattice. We also consider some of its special subVOAs and study their stabilizer subgroups using the symmetries of the subVOAs. It turns out that these stabilizer subgroups are $3$-local subgroups of its full automorphism group. As one of our main results, we show that its full automorphism group is isomorphic to the Monster simple group by using a $3$-local characterization and that the holomorphic VOA is isomorphic to the Moonshine VOA. This approach allows us to obtain relatively explicit descriptions of two maximal $3$-local subgroups of the shape $3^{1+12}.2.\Suz{:}2$ and $3^8.Ω^-(8,3).2$ in the Monster simple group.
△ Less
Submitted 13 February, 2017; v1 submitted 19 June, 2016;
originally announced June 2016.
-
A holomorphic vertex operator algebra of central charge $24$ whose weight one Lie algebra has type $A_{6,7}$
Authors:
Ching Hung Lam,
Hiroki Shimakura
Abstract:
In this article, we describe a construction of a holomorphic vertex operator algebras of central charge $24$ whose weight one Lie algebra has type $A_{6,7}$.
In this article, we describe a construction of a holomorphic vertex operator algebras of central charge $24$ whose weight one Lie algebra has type $A_{6,7}$.
△ Less
Submitted 17 August, 2016; v1 submitted 15 June, 2016;
originally announced June 2016.
-
Singularities in FLRW Spacetimes
Authors:
Huibert het Lam,
Tomislav Prokopec
Abstract:
We point out that past-incompleteness of geodesics in FLRW spacetimes does not necessarily imply that these spacetimes start from a singularity. Namely, if a test particle that follows such a trajectory has a non-vanishing velocity, its energy was super-Planckian at some time in the past if it kept following that geodesic. That indicates a breakdown of the particle's description, which is why we s…
▽ More
We point out that past-incompleteness of geodesics in FLRW spacetimes does not necessarily imply that these spacetimes start from a singularity. Namely, if a test particle that follows such a trajectory has a non-vanishing velocity, its energy was super-Planckian at some time in the past if it kept following that geodesic. That indicates a breakdown of the particle's description, which is why we should not consider those trajectories for the definition of an initial singularity. When one only considers test particles that do not have this breakdown of their trajectory, it turns out that the only singular FLRW spacetimes are the ones that have a scale parameter that vanishes at some initial time.
△ Less
Submitted 3 June, 2016;
originally announced June 2016.
-
Recovering Best Statistical Guarantees via the Empirical Divergence-based Distributionally Robust Optimization
Authors:
Henry Lam
Abstract:
We investigate the use of distributionally robust optimization (DRO) as a tractable tool to recover the asymptotic statistical guarantees provided by the Central Limit Theorem, for maintaining the feasibility of an expected value constraint under ambiguous probability distributions. We show that using empirically defined Burg-entropy divergence balls to construct the DRO can attain such guarantees…
▽ More
We investigate the use of distributionally robust optimization (DRO) as a tractable tool to recover the asymptotic statistical guarantees provided by the Central Limit Theorem, for maintaining the feasibility of an expected value constraint under ambiguous probability distributions. We show that using empirically defined Burg-entropy divergence balls to construct the DRO can attain such guarantees. These balls, however, are not reasoned from the standard data-driven DRO framework since by themselves they can have low or even zero probability of covering the true distribution. Rather, their superior statistical performances are endowed by linking the resulting DRO with empirical likelihood and empirical processes. We show that the sizes of these balls can be optimally calibrated using chi-square process excursion. We conduct numerical experiments to support our theoretical findings.
△ Less
Submitted 30 May, 2016;
originally announced May 2016.
-
Optimization-based Calibration of Simulation Input Models
Authors:
Aleksandrina Goeva,
Henry Lam,
Huajie Qian,
Bo Zhang
Abstract:
Studies on simulation input uncertainty often built on the availability of input data. In this paper, we investigate an inverse problem where, given only the availability of output data, we nonparametrically calibrate the input models and other related performance measures of interest. We propose an optimization-based framework to compute statistically valid bounds on input quantities. The framewo…
▽ More
Studies on simulation input uncertainty often built on the availability of input data. In this paper, we investigate an inverse problem where, given only the availability of output data, we nonparametrically calibrate the input models and other related performance measures of interest. We propose an optimization-based framework to compute statistically valid bounds on input quantities. The framework utilizes constraints that connect the statistical information of the real-world outputs with the input-output relation via a simulable map. We analyze the statistical guarantees of this approach from the view of data-driven robust optimization, and show how the guarantees relate to the function complexity of the constraints arising in our framework. We investigate an iterative procedure based on a stochastic quadratic penalty method to approximately solve the resulting optimization. We conduct numerical experiments to demonstrate our performance in bounding the input models and related quantities.
△ Less
Submitted 6 January, 2018; v1 submitted 29 May, 2016;
originally announced May 2016.
-
Accelerated Evaluation of Automated Vehicles Safety in Lane Change Scenarios Based on Importance Sampling Techniques
Authors:
Ding Zhao,
Henry Lam,
Huei Peng,
Shan Bao,
David J. LeBlanc,
Kazutoshi Nobukawa,
Christopher S. Pan
Abstract:
Automated vehicles (AVs) must be evaluated thoroughly before their release and deployment. A widely-used evaluation approach is the Naturalistic-Field Operational Test (N-FOT), which tests prototype vehicles directly on the public roads. Due to the low exposure to safety-critical scenarios, N-FOTs are time-consuming and expensive to conduct. In this paper, we propose an accelerated evaluation appr…
▽ More
Automated vehicles (AVs) must be evaluated thoroughly before their release and deployment. A widely-used evaluation approach is the Naturalistic-Field Operational Test (N-FOT), which tests prototype vehicles directly on the public roads. Due to the low exposure to safety-critical scenarios, N-FOTs are time-consuming and expensive to conduct. In this paper, we propose an accelerated evaluation approach for AVs. The results can be used to generate motions of the primary other vehicles to accelerate the verification of AVs in simulations and controlled experiments. Frontal collision due to unsafe cut-ins is the target crash type of this paper. Human-controlled vehicles making unsafe lane changes are modeled as the primary disturbance to AVs based on data collected by the University of Michigan Safety Pilot Model Deployment Program. The cut-in scenarios are generated based on skewed statistics of collected human driver behaviors, which generate risky testing scenarios while preserving the statistical information so that the safety benefits of AVs in non-accelerated cases can be accurately estimated. The Cross Entropy method is used to recursively search for the optimal skewing parameters. The frequencies of occurrence of conflicts, crashes and injuries are estimated for a modeled automated vehicle, and the achieved accelerated rate is around 2,000 to 20,000. In other words, in the accelerated simulations, driving for 1,000 miles will expose the AV with challenging scenarios that will take about 2 to 20 million miles of real-world driving to encounter. This technique thus has the potential to reduce greatly the development and validation time for AVs.
△ Less
Submitted 15 June, 2016; v1 submitted 16 May, 2016;
originally announced May 2016.
-
The Conway-Miyamoto correspondences for the Fischer 3-transposition groups
Authors:
Ching Hung Lam,
Hiroshi Yamauchi
Abstract:
In this paper, we present a general construction of 3-transposition groups as automorphism groups of vertex operator algebras. Applying to the moonshine vertex operator algebra, we establish the Conway-Miyamoto correspondences between Fischer 3-transposition groups $\mathrm{Fi}_{23}$ and $\mathrm{Fi}_{22}$ and $c=25/28$ and $c=11/12$ Virasoro vectors of subalgebras of the moonshine vertex operator…
▽ More
In this paper, we present a general construction of 3-transposition groups as automorphism groups of vertex operator algebras. Applying to the moonshine vertex operator algebra, we establish the Conway-Miyamoto correspondences between Fischer 3-transposition groups $\mathrm{Fi}_{23}$ and $\mathrm{Fi}_{22}$ and $c=25/28$ and $c=11/12$ Virasoro vectors of subalgebras of the moonshine vertex operator algebra.
△ Less
Submitted 9 November, 2021; v1 submitted 18 April, 2016;
originally announced April 2016.
-
3-dimensional Griess algebras and Miyamoto involutions
Authors:
Ching Hung Lam,
Hiroshi Yamauchi
Abstract:
We consider a series of VOAs generated by 3-dimensional Griess algebras. We will show that these VOAs can be characterized by their 3-dimensional Griess algebras and their structures are uniquely determined. As an application, we will determine the groups generated by the Miyamoto involutions associated to Virasoro vectors of our VOAs.
We consider a series of VOAs generated by 3-dimensional Griess algebras. We will show that these VOAs can be characterized by their 3-dimensional Griess algebras and their structures are uniquely determined. As an application, we will determine the groups generated by the Miyamoto involutions associated to Virasoro vectors of our VOAs.
△ Less
Submitted 15 April, 2016;
originally announced April 2016.
-
The Empirical Likelihood Approach to Quantifying Uncertainty in Sample Average Approximation
Authors:
Henry Lam,
Enlu Zhou
Abstract:
We study the empirical likelihood approach to construct confidence intervals for the optimal value and the optimality gap of a given solution, henceforth quantify the statistical uncertainty of sample average approximation, for optimization problems with expected value objectives and constraints where the underlying probability distributions are observed via limited data. This approach relies on t…
▽ More
We study the empirical likelihood approach to construct confidence intervals for the optimal value and the optimality gap of a given solution, henceforth quantify the statistical uncertainty of sample average approximation, for optimization problems with expected value objectives and constraints where the underlying probability distributions are observed via limited data. This approach relies on two distributionally robust optimization problems posited over the uncertain distribution, with a divergence-based uncertainty set that is suitably calibrated to provide asymptotic statistical guarantees.
△ Less
Submitted 23 October, 2016; v1 submitted 9 April, 2016;
originally announced April 2016.
-
Consistent analysis of one-nucleon spectroscopic factors involving weakly- and strongly-bound nucleons
Authors:
J. Okołowicz,
Y. H. Lam,
M. Płoszajczak,
A. O. Macchiavelli,
N. A. Smirnova
Abstract:
There is a considerable interest in understanding the dependence of one-nucleon removal cross sections on the asymmetry of the neutron $S_n$ and proton $S_p$ separation energies, following a large amount of experimental data and theoretical analyses in a framework of sudden and eikonal approximations of the reaction dynamics. These theoretical calculations involve both the single-particle cross se…
▽ More
There is a considerable interest in understanding the dependence of one-nucleon removal cross sections on the asymmetry of the neutron $S_n$ and proton $S_p$ separation energies, following a large amount of experimental data and theoretical analyses in a framework of sudden and eikonal approximations of the reaction dynamics. These theoretical calculations involve both the single-particle cross section and the shell-model description of the projectile initial state and final states of the reaction residues. The configuration mixing in shell-model description of nuclear states depends on the proximity of one-nucleon decay threshold but does it depend sensitively on $S_n - S_p$? To answer this question, we use the shell model embedded in the continuum to investigate the dependence of one-nucleon spectroscopic factors on the asymmetry of $S_n$ and $S_p$ for mirror nuclei $^{24}$Si, $^{24}$Ne and $^{28}$S, $^{28}$Mg and for a series of neon isotopes ($20 \leq A \leq 28$).
△ Less
Submitted 17 November, 2015;
originally announced November 2015.
-
(Blue) Taxi Destination and Trip Time Prediction from Partial Trajectories
Authors:
Hoang Thanh Lam,
Ernesto Diaz-Aviles,
Alessandra Pascale,
Yiannis Gkoufas,
Bei Chen
Abstract:
Real-time estimation of destination and travel time for taxis is of great importance for existing electronic dispatch systems. We present an approach based on trip matching and ensemble learning, in which we leverage the patterns observed in a dataset of roughly 1.7 million taxi journeys to predict the corresponding final destination and travel time for ongoing taxi trips, as a solution for the EC…
▽ More
Real-time estimation of destination and travel time for taxis is of great importance for existing electronic dispatch systems. We present an approach based on trip matching and ensemble learning, in which we leverage the patterns observed in a dataset of roughly 1.7 million taxi journeys to predict the corresponding final destination and travel time for ongoing taxi trips, as a solution for the ECML/PKDD Discovery Challenge 2015 competition. The results of our empirical evaluation show that our approach is effective and very robust, which led our team -- BlueTaxi -- to the 3rd and 7th position of the final rankings for the trip time and destination prediction tasks, respectively. Given the fact that the final rankings were computed using a very small test set (with only 320 trips) we believe that our approach is one of the most robust solutions for the challenge based on the consistency of our good results across the test sets.
△ Less
Submitted 17 September, 2015;
originally announced September 2015.
-
Symmetry Protected Topological Phases and Majorana Mode in One-dimensional Quantum Walk with Boundary
Authors:
Ho Tat Lam,
Yue Yu,
Kwok Yip Szeto
Abstract:
The topological phases in one-dimensional quantum walk can be classified by the coin parameters. By solving for the general exact solutions of bound states in one-dimensional quantum walk with boundaries specified by different coin parameters, we show that these bound states are Majorana modes with quasi-energy $E=0,π$. These modes are qualitatively different for different boundary conditions used…
▽ More
The topological phases in one-dimensional quantum walk can be classified by the coin parameters. By solving for the general exact solutions of bound states in one-dimensional quantum walk with boundaries specified by different coin parameters, we show that these bound states are Majorana modes with quasi-energy $E=0,π$. These modes are qualitatively different for different boundary conditions used. For two-boundary system with symmetric boundary conditions, the interaction energy between two Majorana bound states can be computed, as in the case of a finite wire. Suggestion of observing these modes are provided.
△ Less
Submitted 30 August, 2015;
originally announced August 2015.
-
Robust Analysis in Stochastic Simulation: Computation and Performance Guarantees
Authors:
Soumyadip Ghosh,
Henry Lam
Abstract:
Any performance analysis based on stochastic simulation is subject to the errors inherent in misspecifying the modeling assumptions, particularly the input distributions. In situations with little support from data, we investigate the use of worst-case analysis to analyze these errors, by representing the partial, nonparametric knowledge of the input models via optimization constraints. We study t…
▽ More
Any performance analysis based on stochastic simulation is subject to the errors inherent in misspecifying the modeling assumptions, particularly the input distributions. In situations with little support from data, we investigate the use of worst-case analysis to analyze these errors, by representing the partial, nonparametric knowledge of the input models via optimization constraints. We study the performance and robustness guarantees of this approach. We design and analyze a numerical scheme for solving a general class of simulation objectives and uncertainty specifications. The key steps involve a randomized discretization of the probability spaces, a simulable unbiased gradient estimator using a nonparametric analog of the likelihood ratio method, and a Frank-Wolfe (FW) variant of the stochastic approximation (SA) method (which we call FWSA) run on the space of input probability distributions. A convergence analysis for FWSA on non-convex problems is provided. We test the performance of our approach via several numerical examples.
△ Less
Submitted 11 April, 2018; v1 submitted 19 July, 2015;
originally announced July 2015.
-
Tail Analysis without Parametric Models: A Worst-case Perspective
Authors:
Henry Lam,
Clementine Mottet
Abstract:
A common bottleneck in evaluating extremal performance measures is that, due to their very nature, tail data are often very limited. The conventional approach selects the best probability distribution from tail data using parametric fitting, but the validity of the parametric choice can be difficult to verify. This paper describes an alternative based on the computation of worst-case bounds under…
▽ More
A common bottleneck in evaluating extremal performance measures is that, due to their very nature, tail data are often very limited. The conventional approach selects the best probability distribution from tail data using parametric fitting, but the validity of the parametric choice can be difficult to verify. This paper describes an alternative based on the computation of worst-case bounds under the geometric premise of tail convexity, a feature shared by all common parametric tail distributions. We characterize the optimality structure of the resulting optimization problem, and demonstrate that the worst-case convex tail behavior is in a sense either extremely light-tailed or extremely heavy-tailed. We develop low-dimensional nonlinear programs that distinguish between the two cases and compute the worst-case bound. We numerically illustrate how the proposed approach can give more reliable performances than conventional parametric methods.
△ Less
Submitted 2 January, 2018; v1 submitted 12 July, 2015;
originally announced July 2015.
-
A Bayesian Approach for Online Classifier Ensemble
Authors:
Qinxun Bai,
Henry Lam,
Stan Sclaroff
Abstract:
We propose a Bayesian approach for recursively estimating the classifier weights in online learning of a classifier ensemble. In contrast with past methods, such as stochastic gradient descent or online boosting, our approach estimates the weights by recursively updating its posterior distribution. For a specified class of loss functions, we show that it is possible to formulate a suitably defined…
▽ More
We propose a Bayesian approach for recursively estimating the classifier weights in online learning of a classifier ensemble. In contrast with past methods, such as stochastic gradient descent or online boosting, our approach estimates the weights by recursively updating its posterior distribution. For a specified class of loss functions, we show that it is possible to formulate a suitably defined likelihood function and hence use the posterior distribution as an approximation to the global empirical loss minimizer. If the stream of training data is sampled from a stationary process, we can also show that our approach admits a superior rate of convergence to the expected loss minimizer than is possible with standard stochastic gradient descent. In experiments with real-world datasets, our formulation often performs better than state-of-the-art stochastic gradient descent and online boosting algorithms.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
Associated primes of powers of edge ideals and ear decompositions of graphs
Authors:
Ha Minh Lam,
Ngo Viet Trung
Abstract:
In this paper, we give a complete description of the associated primes of every power of the edge ideal in terms of generalized ear decompositions of the graph. This result establishes a surprising relationship between two seemingly unrelated notions of Commutative Algebra and Combinatorics. It covers all previous major results in this topic and has several interesting consequences.
In this paper, we give a complete description of the associated primes of every power of the edge ideal in terms of generalized ear decompositions of the graph. This result establishes a surprising relationship between two seemingly unrelated notions of Commutative Algebra and Combinatorics. It covers all previous major results in this topic and has several interesting consequences.
△ Less
Submitted 16 July, 2018; v1 submitted 4 June, 2015;
originally announced June 2015.
-
Genetically Improved BarraCUDA
Authors:
W. B. Langdon,
Brian Yee Hong Lam
Abstract:
BarraCUDA is a C program which uses the BWA algorithm in parallel with nVidia CUDA to align short next generation DNA sequences against a reference genome. The genetically improved (GI) code is up to three times faster on short paired end reads from The 1000 Genomes Project and 60percent more accurate on a short BioPlanet.com GCAT alignment benchmark. GPGPU Barracuda running on a single K80 Tesla…
▽ More
BarraCUDA is a C program which uses the BWA algorithm in parallel with nVidia CUDA to align short next generation DNA sequences against a reference genome. The genetically improved (GI) code is up to three times faster on short paired end reads from The 1000 Genomes Project and 60percent more accurate on a short BioPlanet.com GCAT alignment benchmark. GPGPU Barracuda running on a single K80 Tesla GPU can align short paired end nextgen sequences up to ten times faster than bwa on a 12 core CPU.
△ Less
Submitted 28 May, 2015;
originally announced May 2015.
-
Reaction rates of $^{64}$Ge($p,γ$)$^{65}$As and $^{65}$As($p,γ$)$^{66}$Se and the extent of nucleosynthesis in type I X-ray bursts
Authors:
Y. H. Lam,
J. J. He,
A. Parikh,
H. Schatz,
B. A. Brown,
M. Wang,
B. Guo,
Y. H. Zhang,
X. H. Zhou,
H. S. Xu
Abstract:
The extent of nucleosynthesis in models of type I X-ray bursts and the associated impact on the energy released in these explosive events are sensitive to nuclear masses and reaction rates around the $^{64}$Ge waiting point. Using the well known mass of $^{64}$Ge, the recently measured $^{65}$As mass, and large-scale shell model calculations, we have determined new thermonuclear rates of the…
▽ More
The extent of nucleosynthesis in models of type I X-ray bursts and the associated impact on the energy released in these explosive events are sensitive to nuclear masses and reaction rates around the $^{64}$Ge waiting point. Using the well known mass of $^{64}$Ge, the recently measured $^{65}$As mass, and large-scale shell model calculations, we have determined new thermonuclear rates of the $^{64}$Ge($p$,$γ$)$^{65}$As and $^{65}$As($p$,$γ$)$^{66}$Se reactions with reliable uncertainties. The new reaction rates differ significantly from previously published rates. Using the new data we analyze the impact of the new rates and the remaining nuclear physics uncertainties on the $^{64}$Ge waiting point in a number of representative one-zone X-ray burst models. We find that in contrast to previous work, when all relevant uncertainties are considered, a strong $^{64}$Ge $rp$-process waiting point cannot be ruled out. The nuclear physics uncertainties strongly affect X-ray burst model predictions of the synthesis of $^{64}$Zn, the synthesis of nuclei beyond $A=64$, energy generation, and burst light curve. We also identify key nuclear uncertainties that need to be addressed to determine the role of the $^{64}$Ge waiting point in X-ray bursts. These include the remaining uncertainty in the $^{65}$As mass, the uncertainty of the $^{66}$Se mass, and the remaining uncertainty in the $^{65}$As($p$,$γ$)$^{66}$Se reaction rate, which mainly originates from uncertain resonance energies.
△ Less
Submitted 29 January, 2016; v1 submitted 9 May, 2015;
originally announced May 2015.
-
Ramsauer effect in one-dimensional quantum walk with multiple defects
Authors:
Ho Tat Lam,
Kwok Yip Szeto
Abstract:
Experimental observations of quantum walks in one dimension have provided many exciting applications in quantum computing, while recent theoretical investigation of single phase defect in these system points towards interesting phenomena associated with bounds states. Here we obtain analytical solutions of quantum walk with a general quantum coin in one dimension with multiple defects, with new pr…
▽ More
Experimental observations of quantum walks in one dimension have provided many exciting applications in quantum computing, while recent theoretical investigation of single phase defect in these system points towards interesting phenomena associated with bounds states. Here we obtain analytical solutions of quantum walk with a general quantum coin in one dimension with multiple defects, with new prediction on the condition for zero reflectance for scattering state, and the existence of an analogy to the Ramsauer effect for multiple defects. We also show the transition from the zero reflectance state to the bound state can provide a method for preparing the quantum walk in a bound state. Applications to systems similar to thin film optics are suggested.
△ Less
Submitted 24 June, 2015; v1 submitted 6 May, 2015;
originally announced May 2015.
-
Combinatorial characterizations of the saturation and the associated primes of the fourth power of edge ideals
Authors:
Ha Minh Lam,
Ha Thi Thu Hien
Abstract:
To compute the local cohomology of powers of edge ideals one needs to know their saturations. The saturation of the second and third powers has been described in terms of the graph in [13] and [10]. In this article, we give a combinatorial description of the generators of the saturation of the fourth power. As a consequence, we are able to give a complete classification of the associated primes of…
▽ More
To compute the local cohomology of powers of edge ideals one needs to know their saturations. The saturation of the second and third powers has been described in terms of the graph in [13] and [10]. In this article, we give a combinatorial description of the generators of the saturation of the fourth power. As a consequence, we are able to give a complete classification of the associated primes of the fourth power of edge ideals in terms of the graph.
△ Less
Submitted 9 March, 2015;
originally announced March 2015.
-
Orbifold construction of holomorphic vertex operator algebras associated to inner automorphisms
Authors:
Ching Hung Lam,
Hiroki Shimakura
Abstract:
In this article, we construct three new holomorphic vertex operator algebras of central charge $24$ using the $\mathbb{Z}_2$-orbifold construction associated to inner automorphisms. Their weight one subspaces has the Lie algebra structures $D_{7,3}A_{3,1}G_{2,1}$, $E_{7,3}A_{5,1}$, and $A_{8,3}A_{2,1}^2$. In addition, we discuss the constructions of holomorphic vertex operator algebras with Lie al…
▽ More
In this article, we construct three new holomorphic vertex operator algebras of central charge $24$ using the $\mathbb{Z}_2$-orbifold construction associated to inner automorphisms. Their weight one subspaces has the Lie algebra structures $D_{7,3}A_{3,1}G_{2,1}$, $E_{7,3}A_{5,1}$, and $A_{8,3}A_{2,1}^2$. In addition, we discuss the constructions of holomorphic vertex operator algebras with Lie algebras $A_{5,6}C_{2,3}A_{1,2}$ and $D_{6,5}A_{1,1}^2$ from holomorphic vertex operator algebras with Lie algebras $C_{5,3}G_{2,2}A_{1,1}$ and $A_{4,5}^2$, respectively.
△ Less
Submitted 23 August, 2015; v1 submitted 21 January, 2015;
originally announced January 2015.
-
Predicting User Engagement in Twitter with Collaborative Ranking
Authors:
Ernesto Diaz-Aviles,
Hoang Thanh Lam,
Fabio Pinelli,
Stefano Braghin,
Yiannis Gkoufas,
Michele Berlingerio,
Francesco Calabrese
Abstract:
Collaborative Filtering (CF) is a core component of popular web-based services such as Amazon, YouTube, Netflix, and Twitter. Most applications use CF to recommend a small set of items to the user. For instance, YouTube presents to a user a list of top-n videos she would likely watch next based on her rating and viewing history. Current methods of CF evaluation have been focused on assessing the q…
▽ More
Collaborative Filtering (CF) is a core component of popular web-based services such as Amazon, YouTube, Netflix, and Twitter. Most applications use CF to recommend a small set of items to the user. For instance, YouTube presents to a user a list of top-n videos she would likely watch next based on her rating and viewing history. Current methods of CF evaluation have been focused on assessing the quality of a predicted rating or the ranking performance for top-n recommended items. However, restricting the recommender system evaluation to these two aspects is rather limiting and neglects other dimensions that could better characterize a well-perceived recommendation. In this paper, instead of optimizing rating or top-n recommendation, we focus on the task of predicting which items generate the highest user engagement. In particular, we use Twitter as our testbed and cast the problem as a Collaborative Ranking task where the rich features extracted from the metadata of the tweets help to complement the transaction information limited to user ids, item ids, ratings and timestamps. We learn a scoring function that directly optimizes the user engagement in terms of nDCG@10 on the predicted ranking. Experiments conducted on an extended version of the MovieTweetings dataset, released as part of the RecSys Challenge 2014, show the effectiveness of our approach.
△ Less
Submitted 26 December, 2014;
originally announced December 2014.
-
Optimization of Reliability of Network of Given Connectivity using Genetic Algorithm
Authors:
Ho Tat Lam,
Kwok Yip Szeto
Abstract:
Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a system will perform satisfactorily for at least a given period of time. When the system is described by a connected network of N components (nodes) and their L connection (links), the reliability of the system becomes a difficult network design problem which…
▽ More
Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a system will perform satisfactorily for at least a given period of time. When the system is described by a connected network of N components (nodes) and their L connection (links), the reliability of the system becomes a difficult network design problem which solutions are of great practical interest in science and engineering. This paper discusses the numerical method of finding the most reliable network for a given N and L using genetic algorithm. For a given topology of the network, the reliability is numerically computed using adjacency matrix. For a search in the space of all possible topologies of the connected network with N nodes and L links, genetic operators such as mutation and crossover are applied to the adjacency matrix through a string representation. In the context of graphs, the mutation of strings in genetic algorithm corresponds to the rewiring of graphs, while crossover corresponds to the interchange of the sub-graphs. For small networks where the most reliable network can be found by exhaustive search, genetic algorithm is very efficient. For larger networks, our results not only demonstrate the efficiency of our algorithm, but also suggest that the most reliable network will have high symmetry.
△ Less
Submitted 13 December, 2014;
originally announced December 2014.
-
Saturation and associated primes of powers of edge ideals
Authors:
Ha Thi Thu Hien,
Ha Minh Lam,
Ngo Viet Trung
Abstract:
For the edge ideal I of an arbitrary simple graph G we describe the monomials of the saturation of a power of I in terms of (vertex) weighted graphs associated with the monomials. This description allows us to characterize the embedded associated primes of a power of I as covers of G which contain certain types of subgraphs of G. As an application, we completely classify the associated primes of t…
▽ More
For the edge ideal I of an arbitrary simple graph G we describe the monomials of the saturation of a power of I in terms of (vertex) weighted graphs associated with the monomials. This description allows us to characterize the embedded associated primes of a power of I as covers of G which contain certain types of subgraphs of G. As an application, we completely classify the associated primes of the second and the third power of I in terms of G.
△ Less
Submitted 27 November, 2014;
originally announced November 2014.
-
Quantum dimensions and fusion rules of the VOA $ V^τ_{L_{C \times D}}$
Authors:
Hsian-Yang Chen,
Ching Hung Lam
Abstract:
In this article, we determine quantum dimensions and fusion rules for the orbifold code VOA $ V^τ_{L_{C \times D}}$. As an application, we also construct certain $3$-local subgroups inside the automorphism group of the VOA $V^\sharp$, where $V^\sharp$ is a holomorphic VOA obtained by the $\mathbb{Z}_3$-orbifold construction on the Leech lattice VOA.
In this article, we determine quantum dimensions and fusion rules for the orbifold code VOA $ V^τ_{L_{C \times D}}$. As an application, we also construct certain $3$-local subgroups inside the automorphism group of the VOA $V^\sharp$, where $V^\sharp$ is a holomorphic VOA obtained by the $\mathbb{Z}_3$-orbifold construction on the Leech lattice VOA.
△ Less
Submitted 1 September, 2014;
originally announced September 2014.
-
From Black-Scholes to Online Learning: Dynamic Hedging under Adversarial Environments
Authors:
Henry Lam,
Zhenming Liu
Abstract:
We consider a non-stochastic online learning approach to price financial options by modeling the market dynamic as a repeated game between the nature (adversary) and the investor. We demonstrate that such framework yields analogous structure as the Black-Scholes model, the widely popular option pricing model in stochastic finance, for both European and American options with convex payoffs. In the…
▽ More
We consider a non-stochastic online learning approach to price financial options by modeling the market dynamic as a repeated game between the nature (adversary) and the investor. We demonstrate that such framework yields analogous structure as the Black-Scholes model, the widely popular option pricing model in stochastic finance, for both European and American options with convex payoffs. In the case of non-convex options, we construct approximate pricing algorithms, and demonstrate that their efficiency can be analyzed through the introduction of an artificial probability measure, in parallel to the so-called risk-neutral measure in the finance literature, even though our framework is completely adversarial. Continuous-time convergence results and extensions to incorporate price jumps are also presented.
△ Less
Submitted 23 June, 2014;
originally announced June 2014.
-
Heisenberg Groups as Platform for the AAG key-exchange protocol
Authors:
Delaram Kahrobaei,
Ha T. Lam
Abstract:
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by submitting Heisenberg groups to one of AAG's major attacks, the length-based attack.
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by submitting Heisenberg groups to one of AAG's major attacks, the length-based attack.
△ Less
Submitted 17 March, 2014;
originally announced March 2014.
-
Astrophysical weak-interaction rates for selected $A=20$ and $A=24$ nuclei
Authors:
G. Martínez-Pinedo,
Y. H. Lam,
K. Langanke,
R. G. T. Zegers,
C. Sullivan
Abstract:
We have evaluated the electron capture rates on $^{20}$Ne, $^{20}$F, $^{24}$Mg, $^{24}$Na and the $β$ decay rates for $^{20}$F and $^{24}$Na at temperature and density conditions relevant for the late-evolution stages of stars with $M=8$-12 M$_\odot$. The rates are based on recent experimental data and large-scale shell model calculations. We show that the electron capture rates on $^{20}$Ne,…
▽ More
We have evaluated the electron capture rates on $^{20}$Ne, $^{20}$F, $^{24}$Mg, $^{24}$Na and the $β$ decay rates for $^{20}$F and $^{24}$Na at temperature and density conditions relevant for the late-evolution stages of stars with $M=8$-12 M$_\odot$. The rates are based on recent experimental data and large-scale shell model calculations. We show that the electron capture rates on $^{20}$Ne, $^{24}$Mg and the $^{20}$F, $^{24}$Na $β$-decay rates are based on data in this astrophysical range, except for the capture rate on $^{20}$Ne, which we predict to have a dominating contribution from the second-forbidden transition between the $^{20}$Ne and $^{20}$F ground states in the density range $\log ρY_e (\mathrm{g~cm}^{-3}) = 9.3$-9.6. The dominance of a few individual transitions allows us to present the various rates by analytical expressions at the relevant astrophysical conditions. We also derive the screening corrections to the rates.
△ Less
Submitted 4 February, 2014;
originally announced February 2014.
-
Designing a brown planthoppers surveillance network based on wireless sensor network approach
Authors:
Hoai Bao Lam,
Tai Tan Phan,
Long Huynh Vuong,
Hiep Xuan Huynh,
Bernard Pottier
Abstract:
This paper proposes a new approach for monitoring brown planthoppers (BPH) swarms using a surveillance network at provincial scale. The topology of this network is identified to a wireless sensor network (WSN), where each node is a real light trap and each edge describes the influence between two nodes, allowing gathering BPH information. Different communication ranges are evaluated to choose a su…
▽ More
This paper proposes a new approach for monitoring brown planthoppers (BPH) swarms using a surveillance network at provincial scale. The topology of this network is identified to a wireless sensor network (WSN), where each node is a real light trap and each edge describes the influence between two nodes, allowing gathering BPH information. Different communication ranges are evaluated to choose a suitable network. The experiments are performed on the light traps surveillance network of Hau Giang province, a typical rice province in the Mekong Delta region of Vietnam.
△ Less
Submitted 12 December, 2013;
originally announced December 2013.
-
Learning about social learning in MOOCs: From statistical analysis to generative model
Authors:
Christopher G. Brinton,
Mung Chiang,
Shaili Jain,
Henry Lam,
Zhenming Liu,
Felix Ming Fai Wong
Abstract:
We study user behavior in the courses offered by a major Massive Online Open Course (MOOC) provider during the summer of 2013. Since social learning is a key element of scalable education in MOOCs and is done via online discussion forums, our main focus is in understanding forum activities. Two salient features of MOOC forum activities drive our research: 1. High decline rate: for all courses stud…
▽ More
We study user behavior in the courses offered by a major Massive Online Open Course (MOOC) provider during the summer of 2013. Since social learning is a key element of scalable education in MOOCs and is done via online discussion forums, our main focus is in understanding forum activities. Two salient features of MOOC forum activities drive our research: 1. High decline rate: for all courses studied, the volume of discussions in the forum declines continuously throughout the duration of the course. 2. High-volume, noisy discussions: at least 30% of the courses produce new discussion threads at rates that are infeasible for students or teaching staff to read through. Furthermore, a substantial portion of the discussions are not directly course-related.
We investigate factors that correlate with the decline of activity in the online discussion forums and find effective strategies to classify threads and rank their relevance. Specifically, we use linear regression models to analyze the time series of the count data for the forum activities and make a number of observations, e.g., the teaching staff's active participation in the discussion increases the discussion volume but does not slow down the decline rate. We then propose a unified generative model for the discussion threads, which allows us both to choose efficient thread classifiers and design an effective algorithm for ranking thread relevance. Our ranking algorithm is further compared against two baseline algorithms, using human evaluation from Amazon Mechanical Turk.
The authors on this paper are listed in alphabetical order. For media and press coverage, please refer to us collectively, as "researchers from the EDGE Lab at Princeton University, together with collaborators at Boston University and Microsoft Corporation."
△ Less
Submitted 19 December, 2013; v1 submitted 7 December, 2013;
originally announced December 2013.
-
On 3-transposition groups generated by $σ$-involutions associated to c=4/5 Virasoro vectors
Authors:
Ching Hung Lam,
Hiroshi Yamauchi
Abstract:
In this paper, we show that $σ$-involutions associated to extendable c=4/5 Virasoro vectors generate a 3-transposition group in the automorphism group of a vertex operator algebra (VOA). Several explicit examples related to lattice VOA are also discussed in details. In particular, we show that the automorphism group of the VOA $V_{K_{12}}^{\hatν}$ associated to the Coxeter Todd lattice $K_{12}$ co…
▽ More
In this paper, we show that $σ$-involutions associated to extendable c=4/5 Virasoro vectors generate a 3-transposition group in the automorphism group of a vertex operator algebra (VOA). Several explicit examples related to lattice VOA are also discussed in details. In particular, we show that the automorphism group of the VOA $V_{K_{12}}^{\hatν}$ associated to the Coxeter Todd lattice $K_{12}$ contains a subgroup isomorphic to ${}^+Ω^{-}(8,3)$.
△ Less
Submitted 12 November, 2013;
originally announced November 2013.
-
Applications of vertex algebra covering procedures to Chevalley groups and modular moonshine
Authors:
Robert L. Griess Jr.,
Ching Hung Lam
Abstract:
A vertex operator algebra of lattice type ADE has a standard integral form which extends a Chevalley basis for its degree 1 Lie algebra. This integral form may be used to define a vertex algebra over a commutative ring $R$ and to get a Chevalley group over $R$ of the same type, acting as automorphisms of this vertex algebra. We define vertex algebras of types BCFG over a commutative ring and certa…
▽ More
A vertex operator algebra of lattice type ADE has a standard integral form which extends a Chevalley basis for its degree 1 Lie algebra. This integral form may be used to define a vertex algebra over a commutative ring $R$ and to get a Chevalley group over $R$ of the same type, acting as automorphisms of this vertex algebra. We define vertex algebras of types BCFG over a commutative ring and certain reduced VAs, then get analogous results about automorphism groups. In characteristics 2 and 3, there are exceptionally large automorphism groups. A covering algebra idea of Frohardt and Griess for Lie algebras is applied to the vertex algebra situation.
We use integral form and covering procedures for vertex algebras to complete the modular moonshine program of Borcherds and Ryba for proving an embedding of the sporadic group $F_3$ in $E_8(3)$.
△ Less
Submitted 9 August, 2013;
originally announced August 2013.
-
The Earth's Equilibrium Climate Sensitivity and Thermal Inertia
Authors:
B. S. H. Royce,
S. H. Lam
Abstract:
The Earth's equilibrium climate sensitivity has received much attention because of its relevance and importance for global warming policymaking. This paper focuses on the Earth's \emph{thermal inertia time scale} which has received relatively little attention. The difference between the observed transient climate sensitivity and the equilibrium climate sensitivity is shown to be proportional to th…
▽ More
The Earth's equilibrium climate sensitivity has received much attention because of its relevance and importance for global warming policymaking. This paper focuses on the Earth's \emph{thermal inertia time scale} which has received relatively little attention. The difference between the observed transient climate sensitivity and the equilibrium climate sensitivity is shown to be proportional to the thermal inertia time scale, and the numerical value of the proportionality factor is determined using recent observational data.
Many useful policymaking insights can be extracted from the resulting empirical quantitative relation.
△ Less
Submitted 25 July, 2013;
originally announced July 2013.
-
Advanced burning stages and fate of 8-10 Mo stars
Authors:
Samuel Jones,
Raphael Hirschi,
Ken'ichi Nomoto,
Tobias Fischer,
Frank X. Timmes,
Falk Herwig,
Bill Paxton,
Hiroshi Toki,
Toshio Suzuki,
Gabriel Martinez-Pinedo,
Yi Hua Lam,
Michael G. Bertolli
Abstract:
The stellar mass range 8<M/Mo<12 corresponds to the most massive AGB stars and the most numerous massive stars. It is host to a variety of supernova progenitors and is therefore very important for galactic chemical evolution and stellar population studies. In this paper, we study the transition from super-AGB star to massive star and find that a propagating neon-oxygen burning shell is common to b…
▽ More
The stellar mass range 8<M/Mo<12 corresponds to the most massive AGB stars and the most numerous massive stars. It is host to a variety of supernova progenitors and is therefore very important for galactic chemical evolution and stellar population studies. In this paper, we study the transition from super-AGB star to massive star and find that a propagating neon-oxygen burning shell is common to both the most massive electron capture supernova (EC-SN) progenitors and the lowest mass iron-core collapse supernova (FeCCSN) progenitors. Of the models that ignite neon burning off-center, the 9.5Mo model would evolve to an FeCCSN after the neon-burning shell propagates to the center, as in previous studies. The neon-burning shell in the 8.8Mo model, however, fails to reach the center as the URCA process and an extended (0.6 Mo) region of low Ye (0.48) in the outer part of the core begin to dominate the late evolution; the model evolves to an EC-SN. This is the first study to follow the most massive EC-SN progenitors to collapse, representing an evolutionary path to EC-SN in addition to that from SAGB stars undergoing thermal pulses. We also present models of an 8.75Mo super-AGB star through its entire thermal pulse phase until electron captures on 20Ne begin at its center and of a 12Mo star up to the iron core collapse. We discuss key uncertainties and how the different pathways to collapse affect the pre-supernova structure. Finally, we compare our results to the observed neutron star mass distribution.
△ Less
Submitted 9 June, 2013;
originally announced June 2013.
-
Weyl groups and vertex operator algebras generated by Ising vectors satisfying $(2B,3C)$ condition
Authors:
Ching Hung Lam,
Hsian-Yang Chen
Abstract:
In this article, we construct explicitly certain moonshine type vertex operator algebras generated by a set of Ising vectors $I$ such that
(1) for any $e\neq f\in I$, the subVOA $\mathrm{VOA}(e,f)$ generated by $e$ and $f$ is isomorphic to either $U_{2B}$ or $U_{3C}$; and
(2)the subgroup generated by the corresponding Miyamoto involutions $\{τ_e|\,e\in I\}$ is isomorphic to the Weyl group of a…
▽ More
In this article, we construct explicitly certain moonshine type vertex operator algebras generated by a set of Ising vectors $I$ such that
(1) for any $e\neq f\in I$, the subVOA $\mathrm{VOA}(e,f)$ generated by $e$ and $f$ is isomorphic to either $U_{2B}$ or $U_{3C}$; and
(2)the subgroup generated by the corresponding Miyamoto involutions $\{τ_e|\,e\in I\}$ is isomorphic to the Weyl group of a root system of type $A_n$, $D_n$, $E_6$, $E_7$ or $E_8$.
The structures of the corresponding vertex operator algebras and their Griess algebras are also studied. In particular, the central charge of these vertex operator algebras are determined.
△ Less
Submitted 31 May, 2013;
originally announced May 2013.
-
On Majorana representations of the group $3^2{:}2$ of 3C-pure type and the corresponding vertex operator algebras
Authors:
Ching Hung Lam,
Hsian-Yang Chen
Abstract:
In this article, we study Griess algebras and vertex operator subalgebras generated by Ising vectors in a moonshine type VOA such that the subgroup generated by the corresponding Miyamoto involutions has the shape $3^2{:}2$ and any two Ising vectors generate a 3C subVOA $U_{3C}$. We show that such a Griess algebra is uniquely determined, up to isomorphisms. The structure of the corresponding verte…
▽ More
In this article, we study Griess algebras and vertex operator subalgebras generated by Ising vectors in a moonshine type VOA such that the subgroup generated by the corresponding Miyamoto involutions has the shape $3^2{:}2$ and any two Ising vectors generate a 3C subVOA $U_{3C}$. We show that such a Griess algebra is uniquely determined, up to isomorphisms. The structure of the corresponding vertex operator algebra is also discussed. In addition, we give a construction of such a VOA inside the lattice VOA $V_{E_8^3}$, which gives an explicit example for Majorana representations of the group $3^2{:}2$ of 3C-pure type.
△ Less
Submitted 31 May, 2013;
originally announced May 2013.
-
Length-based attacks in polycyclic groups
Authors:
David Garber,
Delaram Kahrobaei,
Ha T. Lam
Abstract:
After the Anshel-Anshel-Goldfeld (AAG) key-exchange protocol was introduced in 1999, it was implemented and studied with braid groups and with the Thompson group as its underlying platforms. The length-based attack, introduced by Hughes and Tannenbaum, has been used to extensively study AAG with the braid group as the underlying platform. Meanwhile, a new platform, using polycyclic groups, was pro…
▽ More
After the Anshel-Anshel-Goldfeld (AAG) key-exchange protocol was introduced in 1999, it was implemented and studied with braid groups and with the Thompson group as its underlying platforms. The length-based attack, introduced by Hughes and Tannenbaum, has been used to extensively study AAG with the braid group as the underlying platform. Meanwhile, a new platform, using polycyclic groups, was proposed by Eick and Kahrobaei.
In this paper, we show that with a high enough Hirsch length, the polycyclic group as an underlying platform for AAG is resistant to the length-based attack. In particular, polycyclic groups could provide a secure platform for any cryptosystem based on conjugacy search problem such as non-commutative Diffie-Hellman, ElGamal and Cramer-Shoup key exchange protocols.
△ Less
Submitted 22 November, 2014; v1 submitted 2 May, 2013;
originally announced May 2013.
-
Robust Sensitivity Analysis for Stochastic Systems
Authors:
Henry Lam
Abstract:
We study a worst-case approach to measure the sensitivity to model misspecification in the performance analysis of stochastic systems. The situation of interest is when only minimal parametric information is available on the form of the true model. Under this setting, we post optimization programs that compute the worst-case performance measures, subject to constraints on the amount of model missp…
▽ More
We study a worst-case approach to measure the sensitivity to model misspecification in the performance analysis of stochastic systems. The situation of interest is when only minimal parametric information is available on the form of the true model. Under this setting, we post optimization programs that compute the worst-case performance measures, subject to constraints on the amount of model misspecification measured by Kullback-Leibler (KL) divergence. Our main contribution is the development of infinitesimal approximations for these programs, resulting in asymptotic expansions of their optimal values in terms of the divergence. The coefficients of these expansions can be computed via simulation, and are mathematically derived from the representation of the worst-case models as changes of measure that satisfy a well-defined class of functional fixed point equations.
△ Less
Submitted 12 July, 2015; v1 submitted 1 March, 2013;
originally announced March 2013.
-
Isospin Non-Conservation in $sd$-Shell Nuclei
Authors:
Yi Hua Lam,
Nadezda A. Smirnova,
Etienne Caurier
Abstract:
The question of isospin-symmetry breaking in nuclei of the $sd$ shell is addressed. We propose a new global parameterization of the isospin-nonconserving (INC) shell-model Hamiltonian which accurately describes experimentally known isobaric mass splittings. The isospin-symmetry violating part of the Hamiltonian consists of the Coulomb interaction and effective charge-dependent forces of nuclear or…
▽ More
The question of isospin-symmetry breaking in nuclei of the $sd$ shell is addressed. We propose a new global parameterization of the isospin-nonconserving (INC) shell-model Hamiltonian which accurately describes experimentally known isobaric mass splittings. The isospin-symmetry violating part of the Hamiltonian consists of the Coulomb interaction and effective charge-dependent forces of nuclear origin. Particular attention has been paid to the effect of the short-range correlations. The behavior of $b$ and $c$ coefficients of the isobaric-mass-multiplet equation (IMME) is explored in detail. In particular, a high-precision numerical description of the staggering effect is proposed and contribution of the charge-dependent forces to the nuclear pairing is discussed. The Hamiltonian is applied to the study of the IMME beyond a quadratic form in the A=32 quintet, as well as to calculation of nuclear structure corrections to superallowed $0^+ \to 0^+$ Fermi $β$ decay, and to amplitudes of Fermi transitions to non-analogue states in sd-shell nuclei.
△ Less
Submitted 29 June, 2013; v1 submitted 30 September, 2012;
originally announced October 2012.
-
Classification of holomorphic framed vertex operator algebras of central charge 24
Authors:
Ching Hung Lam,
Hiroki Shimakura
Abstract:
This article is a continuation of our work on the classification of holomorphic framed vertex operator algebras of central charge 24. We show that a holomorphic framed VOA of central charge 24 is uniquely determined by the Lie algebra structure of its weight one subspace. As a consequence, we completely classify all holomorphic framed vertex operator algebras of central charge 24 and show that the…
▽ More
This article is a continuation of our work on the classification of holomorphic framed vertex operator algebras of central charge 24. We show that a holomorphic framed VOA of central charge 24 is uniquely determined by the Lie algebra structure of its weight one subspace. As a consequence, we completely classify all holomorphic framed vertex operator algebras of central charge 24 and show that there exist exactly 56 such vertex operator algebras, up to isomorphism.
△ Less
Submitted 20 September, 2012;
originally announced September 2012.
-
Two-parameter Sample Path Large Deviations for Infinite Server Queues
Authors:
J. Blanchet,
X. Chen,
H. Lam
Abstract:
Let $Q_λ(t,y) $ be the number of people present at time $t$ with $y$ units of remaining service time in an infinite server system with arrival rate equal to $λ>0$. In the presence of a non-lattice renewal arrival process and assuming that the service times have a continuous distribution, we obtain a large deviations principle for $Q_λ(\cdot) /λ$ under the topology of uniform convergence on…
▽ More
Let $Q_λ(t,y) $ be the number of people present at time $t$ with $y$ units of remaining service time in an infinite server system with arrival rate equal to $λ>0$. In the presence of a non-lattice renewal arrival process and assuming that the service times have a continuous distribution, we obtain a large deviations principle for $Q_λ(\cdot) /λ$ under the topology of uniform convergence on $[0,T]\times\lbrack0,\infty)$. We illustrate our results by obtaining the most likely path, represented as a surface, to ruin in life insurance portfolios, and also we obtain the most likely surfaces to overflow in the setting of loss queues.
△ Less
Submitted 21 July, 2012;
originally announced July 2012.
-
Zhu's algebra, C_2-algebra and C_2-cofiniteness of parafermion vertex operator algebras
Authors:
Tomoyuki Arakawa,
Ching Hung Lam,
Hiromichi Yamada
Abstract:
We determine Zhu's algebra and C_2-algebra of parafermion vertex operator algebras for sl_2. Moreover, we prove the C_2-cofiniteness of parafermion vertex operator algebras for any finite dimensional simple Lie algebras.
We determine Zhu's algebra and C_2-algebra of parafermion vertex operator algebras for sl_2. Moreover, we prove the C_2-cofiniteness of parafermion vertex operator algebras for any finite dimensional simple Lie algebras.
△ Less
Submitted 17 July, 2012;
originally announced July 2012.
-
XUV Frequency Combs via Femtosecond Enhancement Cavities
Authors:
Arthur K Mills,
TJ Hammond,
Matthew HC Lam,
David J Jones
Abstract:
We review the current state of tabletop extreme ultraviolet (XUV) sources based on high harmonic generation (HHG) in femtosecond enhancement cavities (fsEC). Recent developments have enabled generation of high photon flux (1014 photons/sec) in the XUV, at high repetition rates (>50 MHz) and spanning the spectral region from 40 nm - 120 nm. This level of performance has enabled precision spectrosco…
▽ More
We review the current state of tabletop extreme ultraviolet (XUV) sources based on high harmonic generation (HHG) in femtosecond enhancement cavities (fsEC). Recent developments have enabled generation of high photon flux (1014 photons/sec) in the XUV, at high repetition rates (>50 MHz) and spanning the spectral region from 40 nm - 120 nm. This level of performance has enabled precision spectroscopy with XUV frequency combs and promises further applications in XUV spectroscopic and photoemission studies. We discuss the theory of operation and experimental details of the fsEC and XUV generation based on HHG, including current technical challenges to increasing the photon flux and maximum photon energy produced by this type of system. Current and future applications for these sources are also discussed.
△ Less
Submitted 2 June, 2012;
originally announced June 2012.
-
Moonshine paths for 3A and 6A nodes of the extended E8-diagram
Authors:
Robert L. Griess Jr.,
Ching Hung lam
Abstract:
We continue the program to make a moonshine path between a node of the extended $E_8$-diagram and the Monster. Our theory is a concrete model expressing some of the mysterious connections identified by John McKay, George Glauberman and Simon Norton. In this article, we treat the 3A and 6A-nodes. We determine the orbits of triples $(x,y,z)$ in the Monster where $z\in 2B$, $x, y \in 2A \cap C(z)$ an…
▽ More
We continue the program to make a moonshine path between a node of the extended $E_8$-diagram and the Monster. Our theory is a concrete model expressing some of the mysterious connections identified by John McKay, George Glauberman and Simon Norton. In this article, we treat the 3A and 6A-nodes. We determine the orbits of triples $(x,y,z)$ in the Monster where $z\in 2B$, $x, y \in 2A \cap C(z)$ and $xy\in 3A \cup 6A$. Such $x, y$ correspond to a rootless $EE_8$-pair in the Leech lattice. For the 3A and 6A cases, we shall say something about the "half Weyl groups", which are proposed in the Glauberman-Norton theory. Most work in this article is with lattices, due to their connection with dihedral subgroups of the Monster. These lattices are $M+N$, where $M, N$ is the relevant pair of $EE_8$-sublattices, and their annihilators in the Leech lattice. The isometry groups of these four lattices are analyzed.
△ Less
Submitted 27 May, 2012;
originally announced May 2012.
-
Rare-Event Simulation for Many-Server Queues
Authors:
Jose Blanchet,
Henry Lam
Abstract:
We develop rare-event simulation methodology for the analysis of loss events in a many-server loss system under quality-driven regime, focusing on the steady-state loss probability (i.e. fraction of lost customers over arrivals) and the behavior of the whole system leading to loss events. The analysis of these events requires working with the full measure-valued process describing the system. This…
▽ More
We develop rare-event simulation methodology for the analysis of loss events in a many-server loss system under quality-driven regime, focusing on the steady-state loss probability (i.e. fraction of lost customers over arrivals) and the behavior of the whole system leading to loss events. The analysis of these events requires working with the full measure-valued process describing the system. This is the first algorithm that is shown to be asymptotically optimal, in the rare-event simulation context, under the setting of many-server queues involving a full measure-valued descriptor.
△ Less
Submitted 16 January, 2012;
originally announced January 2012.