-
Implicit Regularization Effects of the Sobolev Norms in Image Processing
Authors:
Bowen Zhu,
**gwei Hu,
Yifei Lou,
Yunan Yang
Abstract:
In this paper, we propose to use the general $L^2$-based Sobolev norms, i.e., $H^s$ norms where $s\in \mathbb{R}$, to measure the data discrepancy due to noise in image processing tasks that are formulated as optimization problems. As opposed to a popular trend of develo** regularization methods, we emphasize that an implicit regularization effect can be achieved through the class of Sobolev nor…
▽ More
In this paper, we propose to use the general $L^2$-based Sobolev norms, i.e., $H^s$ norms where $s\in \mathbb{R}$, to measure the data discrepancy due to noise in image processing tasks that are formulated as optimization problems. As opposed to a popular trend of develo** regularization methods, we emphasize that an implicit regularization effect can be achieved through the class of Sobolev norms as the data-fitting term. Specifically, we analyze that the implicit regularization comes from the weights that the $H^s$ norm imposes on different frequency contents of an underlying image. We further analyze the underlying noise assumption of using the Sobolev norm as the data-fitting term from a Bayesian perspective, build the connections with the Sobolev gradient-based methods and discuss the preconditioning effects on the convergence rate of the gradient descent algorithm, leading to a better understanding of functional spaces/metrics and the optimization process involved in image processing. Numerical results in full waveform inversion, image denoising and deblurring demonstrate the implicit regularization effects.
△ Less
Submitted 28 February, 2022; v1 submitted 13 September, 2021;
originally announced September 2021.
-
Potential PeVatron supernova remnant G106.3+2.7 seen in the highest-energy gamma rays
Authors:
M. Amenomori,
Y. W. Bao,
X. J. Bi,
D. Chen,
T. L. Chen,
W. Y. Chen,
Xu Chen,
Y. Chen,
Cirennima,
S. W. Cui,
Danzengluobu,
L. K. Ding,
J. H. Fang,
K. Fang,
C. F. Feng,
Zhaoyang Feng,
Z. Y. Feng,
Qi Gao,
Q. B. Gou,
Y. Q. Guo,
Y. Y. Guo,
H. H. He,
Z. T. He,
K. Hibino,
N. Hotta
, et al. (70 additional authors not shown)
Abstract:
Cosmic rays (protons and other atomic nuclei) are believed to gain energies of petaelectronvolts (PeV) and beyond at astrophysical particle accelerators called 'PeVatrons' inside our Galaxy. Although a characteristic feature of a PeVatron is expected to be a hard gamma-ray energy spectrum that extends beyond 100 teraelectronvolts (TeV) without a cutoff, none of the currently known sources exhibits…
▽ More
Cosmic rays (protons and other atomic nuclei) are believed to gain energies of petaelectronvolts (PeV) and beyond at astrophysical particle accelerators called 'PeVatrons' inside our Galaxy. Although a characteristic feature of a PeVatron is expected to be a hard gamma-ray energy spectrum that extends beyond 100 teraelectronvolts (TeV) without a cutoff, none of the currently known sources exhibits such a spectrum due to the low maximum energy of accelerated cosmic rays or insufficient detector sensitivity around 100 TeV. Here we report the observation of gamma-ray emission from the supernova remnant G106.3+2.7 above 10 TeV. This work provides flux data points up to and above 100 TeV and indicates that the very-high-energy gamma-ray emission above 10 TeV is well correlated with a molecular cloud rather than the pulsar PSR J2229+6114. Regarding the gamma-ray emission mechanism of G106.3+2.7, this morphological feature appears to favor a hadronic origin via the π0 decay caused by accelerated relativistic protons over a leptonic one via the inverse-Compton scattering by relativistic electrons. Furthermore, we point out that an X-ray flux upper limit on the synchrotron spectrum would provide important information to firmly establish the hadronic scenario as the mechanism of particle acceleration at the source.
△ Less
Submitted 7 September, 2021;
originally announced September 2021.
-
Cross-token Modeling with Conditional Computation
Authors:
Yuxuan Lou,
Fuzhao Xue,
Zangwei Zheng,
Yang You
Abstract:
Mixture-of-Experts (MoE), a conditional computation architecture, achieved promising performance by scaling local module (i.e. feed-forward network) of transformer. However, scaling the cross-token module (i.e. self-attention) is challenging due to the unstable training. This work proposes Sparse-MLP, an all-MLP model which applies sparsely-activated MLPs to cross-token modeling. Specifically, in…
▽ More
Mixture-of-Experts (MoE), a conditional computation architecture, achieved promising performance by scaling local module (i.e. feed-forward network) of transformer. However, scaling the cross-token module (i.e. self-attention) is challenging due to the unstable training. This work proposes Sparse-MLP, an all-MLP model which applies sparsely-activated MLPs to cross-token modeling. Specifically, in each Sparse block of our all-MLP model, we apply two stages of MoE layers: one with MLP experts mixing information within channels along image patch dimension, the other with MLP experts mixing information within patches along the channel dimension. In addition, by proposing importance-score routing strategy for MoE and redesigning the image representation shape, we further improve our model's computational efficiency. Experimentally, we are more computation-efficient than Vision Transformers with comparable accuracy. Also, our models can outperform MLP-Mixer by 2.5\% on ImageNet Top-1 accuracy with fewer parameters and computational cost. On downstream tasks, i.e. Cifar10 and Cifar100, our models can still achieve better performance than baselines.
△ Less
Submitted 14 January, 2022; v1 submitted 5 September, 2021;
originally announced September 2021.
-
Neighborhood Consensus Contrastive Learning for Backward-Compatible Representation
Authors:
Shengsen Wu,
Liang Chen,
Yihang Lou,
Yan Bai,
Tao Bai,
Minghua Deng,
Lingyu Duan
Abstract:
In object re-identification (ReID), the development of deep learning techniques often involves model updates and deployment. It is unbearable to re-embedding and re-index with the system suspended when deploying new models. Therefore, backward-compatible representation is proposed to enable "new" features to be compared with "old" features directly, which means that the database is active when the…
▽ More
In object re-identification (ReID), the development of deep learning techniques often involves model updates and deployment. It is unbearable to re-embedding and re-index with the system suspended when deploying new models. Therefore, backward-compatible representation is proposed to enable "new" features to be compared with "old" features directly, which means that the database is active when there are both "new" and "old" features in it. Thus we can scroll-refresh the database or even do nothing on the database to update.
The existing backward-compatible methods either require a strong overlap between old and new training data or simply conduct constraints at the instance level. Thus they are difficult in handling complicated cluster structures and are limited in eliminating the impact of outliers in old embeddings, resulting in a risk of damaging the discriminative capability of new features. In this work, we propose a Neighborhood Consensus Contrastive Learning (NCCL) method. With no assumptions about the new training data, we estimate the sub-cluster structures of old embeddings. A new embedding is constrained with multiple old embeddings in both embedding space and discrimination space at the sub-class level. The effect of outliers diminished, as the multiple samples serve as "mean teachers". Besides, we also propose a scheme to filter the old embeddings with low credibility, further improving the compatibility robustness. Our method ensures backward compatibility without impairing the accuracy of the new model. And it can even improve the new model's accuracy in most scenarios.
△ Less
Submitted 8 March, 2023; v1 submitted 7 August, 2021;
originally announced August 2021.
-
Dual-Tuning: Joint Prototype Transfer and Structure Regularization for Compatible Feature Learning
Authors:
Yan Bai,
Jile Jiao,
Shengsen Wu,
Yihang Lou,
Jun Liu,
Xuetao Feng,
Ling-Yu Duan
Abstract:
Visual retrieval system faces frequent model update and deployment. It is a heavy workload to re-extract features of the whole database every time.Feature compatibility enables the learned new visual features to be directly compared with the old features stored in the database. In this way, when updating the deployed model, we can bypass the inflexible and time-consuming feature re-extraction proc…
▽ More
Visual retrieval system faces frequent model update and deployment. It is a heavy workload to re-extract features of the whole database every time.Feature compatibility enables the learned new visual features to be directly compared with the old features stored in the database. In this way, when updating the deployed model, we can bypass the inflexible and time-consuming feature re-extraction process. However, the old feature space that needs to be compatible is not ideal and faces the distribution discrepancy problem with the new space caused by different supervision losses. In this work, we propose a global optimization Dual-Tuning method to obtain feature compatibility against different networks and losses. A feature-level prototype loss is proposed to explicitly align two types of embedding features, by transferring global prototype information. Furthermore, we design a component-level mutual structural regularization to implicitly optimize the feature intrinsic structure. Experimental results on million-scale datasets demonstrate that our Dual-Tuning is able to obtain feature compatibility without sacrificing performance. (Our code will be avaliable at https://github.com/yanbai1993/Dual-Tuning)
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles
Authors:
**di Zhang,
Yang Lou,
Jian** Wang,
Kui Wu,
Kejie Lu,
Xiaohua Jia
Abstract:
In recent years, many deep learning models have been adopted in autonomous driving. At the same time, these models introduce new vulnerabilities that may compromise the safety of autonomous vehicles. Specifically, recent studies have demonstrated that adversarial attacks can cause a significant decline in detection precision of deep learning-based 3D object detection models. Although driving safet…
▽ More
In recent years, many deep learning models have been adopted in autonomous driving. At the same time, these models introduce new vulnerabilities that may compromise the safety of autonomous vehicles. Specifically, recent studies have demonstrated that adversarial attacks can cause a significant decline in detection precision of deep learning-based 3D object detection models. Although driving safety is the ultimate concern for autonomous driving, there is no comprehensive study on the linkage between the performance of deep learning models and the driving safety of autonomous vehicles under adversarial attacks. In this paper, we investigate the impact of two primary types of adversarial attacks, perturbation attacks and patch attacks, on the driving safety of vision-based autonomous vehicles rather than the detection precision of deep learning models. In particular, we consider two state-of-the-art models in vision-based 3D object detection, Stereo R-CNN and DSGN. To evaluate driving safety, we propose an end-to-end evaluation framework with a set of driving safety performance metrics. By analyzing the results of our extensive evaluation experiments, we find that (1) the attack's impact on the driving safety of autonomous vehicles and the attack's impact on the precision of 3D object detectors are decoupled, and (2) the DSGN model demonstrates stronger robustness to adversarial attacks than the Stereo R-CNN model. In addition, we further investigate the causes behind the two findings with an ablation study. The findings of this paper provide a new perspective to evaluate adversarial attacks and guide the selection of deep learning models in autonomous driving.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Go Wider Instead of Deeper
Authors:
Fuzhao Xue,
Ziji Shi,
Futao Wei,
Yuxuan Lou,
Yong Liu,
Yang You
Abstract:
More transformer blocks with residual connections have recently achieved impressive results on various tasks. To achieve better performance with fewer trainable parameters, recent methods are proposed to go shallower by parameter sharing or model compressing along with the depth. However, weak modeling capacity limits their performance. Contrastively, going wider by inducing more trainable matrixe…
▽ More
More transformer blocks with residual connections have recently achieved impressive results on various tasks. To achieve better performance with fewer trainable parameters, recent methods are proposed to go shallower by parameter sharing or model compressing along with the depth. However, weak modeling capacity limits their performance. Contrastively, going wider by inducing more trainable matrixes and parameters would produce a huge model requiring advanced parallelism to train and inference.
In this paper, we propose a parameter-efficient framework, going wider instead of deeper. Specially, following existing works, we adapt parameter sharing to compress along depth. But, such deployment would limit the performance. To maximize modeling capacity, we scale along model width by replacing feed-forward network (FFN) with mixture-of-experts (MoE). Across transformer blocks, instead of sharing normalization layers, we propose to use individual layernorms to transform various semantic representations in a more parameter-efficient way. To evaluate our plug-and-run framework, we design WideNet and conduct comprehensive experiments on popular computer vision and natural language processing benchmarks. On ImageNet-1K, our best model outperforms Vision Transformer (ViT) by $1.5\%$ with $0.72 \times$ trainable parameters. Using $0.46 \times$ and $0.13 \times$ parameters, our WideNet can still surpass ViT and ViT-MoE by $0.8\%$ and $2.1\%$, respectively. On four natural language processing datasets, WideNet outperforms ALBERT by $1.8\%$ on average and surpass BERT using factorized embedding parameterization by $0.8\%$ with fewer parameters.
△ Less
Submitted 7 September, 2021; v1 submitted 25 July, 2021;
originally announced July 2021.
-
Interfacial friction dictates long-range force propagation in tissues
Authors:
Yuting Lou,
Takumi Kawaue,
Ivan Yow,
Yusuke Toyama,
Jacques Prost,
Tetsuya Hiraiwa
Abstract:
Tissues are characterized by layers of functional units such as cells and extracellular matrix (ECM). Nevertheless, how dynamics at interlayer interfaces help transmit cellular forces in tissues remains overlooked. Here, we investigate a multi-layer system where a layer of epithelial cells is seeded upon an elastic substrate in contact with a hard surface. Our experiments show that, upon a cell ex…
▽ More
Tissues are characterized by layers of functional units such as cells and extracellular matrix (ECM). Nevertheless, how dynamics at interlayer interfaces help transmit cellular forces in tissues remains overlooked. Here, we investigate a multi-layer system where a layer of epithelial cells is seeded upon an elastic substrate in contact with a hard surface. Our experiments show that, upon a cell extrusion event in the cellular layer, long-range wave propagation emerges in the substrate only when the two substrate layers were weakly attached to each other. We then derive a theoretical model which quantitatively reproduces the wave dynamics and explains how frictional sliding between substrate layers helps propagate cellular forces at a variety of scales, depending on the stiffness, thickness, and slipperiness of the substrate. These results highlight the importance of interfacial friction between layers in transmitting mechanical cues in tissues in vivo.
△ Less
Submitted 23 November, 2021; v1 submitted 7 July, 2021;
originally announced July 2021.
-
Gamma-ray Observation of the Cygnus Region in the 100 TeV Energy Region
Authors:
M. Amenomori,
Y. W. Bao,
X. J. Bi,
D. Chen,
T. L. Chen,
W. Y. Chen,
Xu Chen,
Y. Chen,
Cirennima,
S. W. Cui,
Danzengluobu,
L. K. Ding,
J. H. Fang,
K. Fang,
C. F. Feng,
Zhaoyang Feng,
Z. Y. Feng,
Qi Gao,
A. Gomi,
Q. B. Gou,
Y. Q. Guo,
Y. Y. Guo,
H. H. He,
Z. T. He,
K. Hibino
, et al. (88 additional authors not shown)
Abstract:
We report observations of gamma-ray emissions with energies in the 100 TeV energy region from the Cygnus region in our Galaxy. Two sources are significantly detected in the directions of the Cygnus OB1 and OB2 associations. Based on their positional coincidences, we associate one with a pulsar PSR J2032+4127 and the other mainly with a pulsar wind nebula PWN G75.2+0.1 with the pulsar moving away f…
▽ More
We report observations of gamma-ray emissions with energies in the 100 TeV energy region from the Cygnus region in our Galaxy. Two sources are significantly detected in the directions of the Cygnus OB1 and OB2 associations. Based on their positional coincidences, we associate one with a pulsar PSR J2032+4127 and the other mainly with a pulsar wind nebula PWN G75.2+0.1 with the pulsar moving away from its original birthplace situated around the centroid of the observed gamma-ray emission. This work would stimulate further studies of particle acceleration mechanisms at these gamma-ray sources.
△ Less
Submitted 2 July, 2021;
originally announced July 2021.
-
Isoparametric unfitted BDF -- Finite element method for PDEs on evolving domains
Authors:
Yimin Lou,
Christoph Lehrenfeld
Abstract:
We propose a new discretization method for PDEs on moving domains in the setting of unfitted finite element methods, which is provably higher-order accurate in space and time. In the considered setting, the physical domain that evolves essentially arbitrarily through a time-independent computational background domain, is represented by a level set function. For the time discretization, the applica…
▽ More
We propose a new discretization method for PDEs on moving domains in the setting of unfitted finite element methods, which is provably higher-order accurate in space and time. In the considered setting, the physical domain that evolves essentially arbitrarily through a time-independent computational background domain, is represented by a level set function. For the time discretization, the application of standard time step** schemes that are based on finite difference approximations of the time derivative is not directly possible, as the degrees of freedom may get active or inactive across such a finite difference stencil in time. In [Lehrenfeld, Olshanskii. An Eulerian finite element method for PDEs in time-dependent domains. ESAIM: M2AN, 53:585--614, 2019] this problem is overcome by extending the discrete solution at every timestep to a sufficiently large neighborhood so that all the degrees of freedom that are relevant at the next time step stay active. But that paper focuses on low-order methods. We advance these results with introducing and analyzing realizable techniques for the extension to higher order. To obtain higher-order convergence in space and time, we combine the BDF time step** with the isoparametric unfitted FEM. The latter has been used and analyzed for several stationary problems before. However, for moving domains the key ingredient in the method, the transformation of the underlying mesh, becomes time-dependent which gives rise to some technical issues. We treat these with special care, carry out an a priori error analysis and two numerical experiments.
△ Less
Submitted 16 February, 2022; v1 submitted 19 May, 2021;
originally announced May 2021.
-
When Automated Program Repair Meets Regression Testing -- An Extensive Study on 2 Million Patches
Authors:
Yiling Lou,
Jun Yang,
Samuel Benton,
Dan Hao,
Lin Tan,
Zhenpeng Chen,
Lu Zhang,
Lingming Zhang
Abstract:
In recent years, Automated Program Repair (APR) has been extensively studied in academia and even drawn wide attention from industry. However, APR techniques can be extremely time consuming since (1) a large number of patches can be generated for a given bug, and (2) each patch needs to be executed on the original tests to ensure its correctness. In the literature, various techniques (e.g., based…
▽ More
In recent years, Automated Program Repair (APR) has been extensively studied in academia and even drawn wide attention from industry. However, APR techniques can be extremely time consuming since (1) a large number of patches can be generated for a given bug, and (2) each patch needs to be executed on the original tests to ensure its correctness. In the literature, various techniques (e.g., based on learning, mining, and constraint solving) have been proposed/studied to reduce the number of patches. Intuitively, every patch can be treated as a software revision during regression testing; thus, traditional Regression Test Selection (RTS) techniques can be leveraged to only execute the tests affected by each patch (as the other tests would keep the same outcomes) to further reduce patch execution time. However, few APR systems actually adopt RTS and there is still a lack of systematic studies demonstrating the benefits of RTS and the impact of different RTS strategies on APR. To this end, this paper presents the first extensive study of widely-used RTS techniques at different levels (i.e., class/method/statement levels) for 12 state-of-the-art APR systems on over 2M patches. Our study reveals various practical guidelines for bridging the gap between APR and regression testing.
△ Less
Submitted 2 July, 2024; v1 submitted 15 May, 2021;
originally announced May 2021.
-
Special decompositions and linear superpositions of nonlinear systems: BKP and dispersionless BKP equations
Authors:
Xiazhi Hao,
S. Y. Lou
Abstract:
The existence of decomposition solutions of the well-known nonlinear BKP hierarchy is explored. It is shown that these decompositions provide simple and interesting relationships between classical integrable systems and the BKP hierarchy. Further, some special decomposition solutions display a rare property: they can be linearly superposed. With the emphasis on the case of the fifth BKP equation,…
▽ More
The existence of decomposition solutions of the well-known nonlinear BKP hierarchy is explored. It is shown that these decompositions provide simple and interesting relationships between classical integrable systems and the BKP hierarchy. Further, some special decomposition solutions display a rare property: they can be linearly superposed. With the emphasis on the case of the fifth BKP equation, the structure characteristic having linear superposition solutions is analyzed. Finally, we obtain similar superposed solutions in the dispersionless BKP hierarchy.
△ Less
Submitted 7 September, 2021; v1 submitted 21 April, 2021;
originally announced April 2021.
-
First Detection of sub-PeV Diffuse Gamma Rays from the Galactic Disk: Evidence for Ubiquitous Galactic Cosmic Rays beyond PeV Energies
Authors:
M. Amenomori,
Y. W. Bao,
X. J. Bi,
D. Chen,
T. L. Chen,
W. Y. Chen,
Xu Chen,
Y. Chen,
Cirennima,
S. W. Cui,
Danzengluobu,
L. K. Ding,
J. H. Fang,
K. Fang,
C. F. Feng,
Zhaoyang Feng,
Z. Y. Feng,
Qi Gao,
Q. B. Gou,
Y. Q. Guo,
Y. Y. Guo,
H. H. He,
Z. T. He,
K. Hibino,
N. Hotta
, et al. (70 additional authors not shown)
Abstract:
We report, for the first time, the long-awaited detection of diffuse gamma rays with energies between 100 TeV and 1 PeV in the Galactic disk. Particularly, all gamma rays above 398 TeV are observed apart from known TeV gamma-ray sources and compatible with expectations from the hadronic emission scenario in which gamma rays originate from the decay of $π^0$'s produced through the interaction of pr…
▽ More
We report, for the first time, the long-awaited detection of diffuse gamma rays with energies between 100 TeV and 1 PeV in the Galactic disk. Particularly, all gamma rays above 398 TeV are observed apart from known TeV gamma-ray sources and compatible with expectations from the hadronic emission scenario in which gamma rays originate from the decay of $π^0$'s produced through the interaction of protons with the interstellar medium in the Galaxy. This is strong evidence that cosmic rays are accelerated beyond PeV energies in our Galaxy and spread over the Galactic disk.
△ Less
Submitted 17 May, 2021; v1 submitted 11 April, 2021;
originally announced April 2021.
-
Convergence Properties of the Distributed Projected Subgradient Algorithm over General Graphs
Authors:
Weijian Li,
Zihan Chen,
Youcheng Lou,
Yiguang Hong
Abstract:
In this paper, we revisit a well-known distributed projected subgradient algorithm which aims to minimize a sum of cost functions with a common set constraint. In contrast to most of existing results, weight matrices of the time-varying multi-agent network are assumed to be more general, i.e., they are only required to be row stochastic instead of doubly stochastic. We focus on analyzing convergen…
▽ More
In this paper, we revisit a well-known distributed projected subgradient algorithm which aims to minimize a sum of cost functions with a common set constraint. In contrast to most of existing results, weight matrices of the time-varying multi-agent network are assumed to be more general, i.e., they are only required to be row stochastic instead of doubly stochastic. We focus on analyzing convergence properties of this algorithm under general graphs. We first show that there generally exists a graph sequence such that the algorithm is not convergent when the network switches freely within finitely many general graphs. Then to guarantee the convergence of this algorithm under any uniformly jointly strongly connected general graph sequence, we provide a necessary and sufficient condition, i.e., the intersection of optimal solution sets to all local optimization problems is not empty. Furthermore, we surprisingly find that the algorithm is convergent for any periodically switching general graph sequence, and the converged solution minimizes a weighted sum of local cost functions, where the weights depend on the Perron vectors of some product matrices of the underlying periodically switching graphs. Finally, we consider a slightly broader class of quasi-periodically switching graph sequences, and show that the algorithm is convergent for any quasi-periodic graph sequence if and only if the network switches between only two graphs.
△ Less
Submitted 28 April, 2021; v1 submitted 31 March, 2021;
originally announced March 2021.
-
Duality of positive and negative integrable hierarchies via relativistically invariant fields
Authors:
S. Y. Lou,
X. B. Hu,
Q. P. Liu
Abstract:
It is shown that the relativistic invariance plays a key role in the study of integrable systems. Using the relativistically invariant sine-Gordon equation, the Tzitzeica equation, the Toda fields and the second heavenly equation as dual relations, some continuous and discrete integrable positive hierarchies such as the potential modified Korteweg-de Vries hierarchy, the potential Fordy-Gibbons hi…
▽ More
It is shown that the relativistic invariance plays a key role in the study of integrable systems. Using the relativistically invariant sine-Gordon equation, the Tzitzeica equation, the Toda fields and the second heavenly equation as dual relations, some continuous and discrete integrable positive hierarchies such as the potential modified Korteweg-de Vries hierarchy, the potential Fordy-Gibbons hierarchies, the potential dispersionless Kadomtsev-Petviashvili-like (dKPL) hierarchy, the differential-difference dKPL hierarchy and the second heavenly hierarchies are converted to the integrable negative hierarchies including the sG hierarchy and the Tzitzeica hierarchy, the two-dimensional dispersionless Toda hierarchy, the two-dimensional Toda hierarchies and negative heavenly hierarchy. In (1+1)-dimensional cases the positive/negative hierarchy dualities are guaranteed by the dualities between the recursion operators and their inverses. In (2+1)-dimensional cases, the positive/negative hierarchy dualities are explicitly shown by using the formal series symmetry approach, the mastersymmetry method and the relativistic invariance of the duality relations. For the 4-dimensional heavenly system, the duality problem is studied firstly by formal series symmetry approach. Two elegant commuting recursion operators of the heavenly equation appear naturally from the formal series symmetry approach so that the duality problem can also be studied by means of the recursion operators.
△ Less
Submitted 7 June, 2021; v1 submitted 8 March, 2021;
originally announced March 2021.
-
Strong Triplet-Exciton-LO-Phonon Coupling in Two-Dimensional Layered Organic-Inorganic Hybrid Perovskite Single Crystal Microflakes
Authors:
Yunuan Wang,
Feilong Song,
Yu Yuan,
Jianchen Dang,
Xin Xie,
Sibai Sun,
Sai Yan,
Yanbing Hou Zhidong Lou,
Xiulai Xu
Abstract:
Two-dimensional (2D) layered hybrid perovskites provide an ideal platform for studying the properties of excitons. Here, we report on a strong triplet-exciton and longitudinal-optical (LO) phonon coupling in 2D (C6H5CH2CH2NH3, PEA)2PbBr4 perovskites. The triplet excitons exhibit strong photoluminescence (PL) in thick perovskite microflakes, and the PL is not detectable for monolayer microflakes. T…
▽ More
Two-dimensional (2D) layered hybrid perovskites provide an ideal platform for studying the properties of excitons. Here, we report on a strong triplet-exciton and longitudinal-optical (LO) phonon coupling in 2D (C6H5CH2CH2NH3, PEA)2PbBr4 perovskites. The triplet excitons exhibit strong photoluminescence (PL) in thick perovskite microflakes, and the PL is not detectable for monolayer microflakes. The coupling strength of the triplet exciton-LO phonon is approximately two to three times greater than that of the singlet exciton-LO phonon with a LO phonon energy of about 21 meV. This difference might due to the different locations of singlet excitons located in the well and triplet excitons located in the barrier in the 2D layered perovskite. Revealing the strong coupling of triplet exciton-LO phonon provides a fundamental understanding of many-body interaction in hybrid perovskites, which is useful to develop and optimize the optoelectronic devices based on 2D perovskites in the future.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
PRIN/SPRIN: On Extracting Point-wise Rotation Invariant Features
Authors:
Yang You,
Yu**g Lou,
Ruoxi Shi,
Qi Liu,
Yu-Wing Tai,
Lizhuang Ma,
Weiming Wang,
Cewu Lu
Abstract:
Point cloud analysis without pose priors is very challenging in real applications, as the orientations of point clouds are often unknown. In this paper, we propose a brand new point-set learning framework PRIN, namely, Point-wise Rotation Invariant Network, focusing on rotation invariant feature extraction in point clouds analysis. We construct spherical signals by Density Aware Adaptive Sampling…
▽ More
Point cloud analysis without pose priors is very challenging in real applications, as the orientations of point clouds are often unknown. In this paper, we propose a brand new point-set learning framework PRIN, namely, Point-wise Rotation Invariant Network, focusing on rotation invariant feature extraction in point clouds analysis. We construct spherical signals by Density Aware Adaptive Sampling to deal with distorted point distributions in spherical space. Spherical Voxel Convolution and Point Re-sampling are proposed to extract rotation invariant features for each point. In addition, we extend PRIN to a sparse version called SPRIN, which directly operates on sparse point clouds. Both PRIN and SPRIN can be applied to tasks ranging from object classification, part segmentation, to 3D feature matching and label alignment. Results show that, on the dataset with randomly rotated point clouds, SPRIN demonstrates better performance than state-of-the-art methods without any data augmentation. We also provide thorough theoretical proof and analysis for point-wise rotation invariance achieved by our methods. Our code is available on https://github.com/qq456cvb/SPRIN.
△ Less
Submitted 22 November, 2021; v1 submitted 24 February, 2021;
originally announced February 2021.
-
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization
Authors:
HanQin Cai,
Yuchen Lou,
Daniel McKenzie,
Wotao Yin
Abstract:
We consider the zeroth-order optimization problem in the huge-scale setting, where the dimension of the problem is so large that performing even basic vector operations on the decision variables is infeasible. In this paper, we propose a novel algorithm, coined ZO-BCD, that exhibits favorable overall query complexity and has a much smaller per-iteration computational complexity. In addition, we di…
▽ More
We consider the zeroth-order optimization problem in the huge-scale setting, where the dimension of the problem is so large that performing even basic vector operations on the decision variables is infeasible. In this paper, we propose a novel algorithm, coined ZO-BCD, that exhibits favorable overall query complexity and has a much smaller per-iteration computational complexity. In addition, we discuss how the memory footprint of ZO-BCD can be reduced even further by the clever use of circulant measurement matrices. As an application of our new method, we propose the idea of crafting adversarial attacks on neural network based classifiers in a wavelet domain, which can result in problem dimensions of over 1.7 million. In particular, we show that crafting adversarial examples to audio classifiers in a wavelet domain can achieve the state-of-the-art attack success rate of 97.9%.
△ Less
Submitted 11 June, 2021; v1 submitted 21 February, 2021;
originally announced February 2021.
-
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications
Authors:
Zhenpeng Chen,
Huihan Yao,
Yiling Lou,
Yanbin Cao,
Yuanqiang Liu,
Haoyu Wang,
Xuanzhe Liu
Abstract:
Deep Learning (DL) is finding its way into a growing number of mobile software applications. These software applications, named as DL based mobile applications (abbreviated as mobile DL apps) integrate DL models trained using large-scale data with DL programs. A DL program encodes the structure of a desirable DL model and the process by which the model is trained using training data. Due to the in…
▽ More
Deep Learning (DL) is finding its way into a growing number of mobile software applications. These software applications, named as DL based mobile applications (abbreviated as mobile DL apps) integrate DL models trained using large-scale data with DL programs. A DL program encodes the structure of a desirable DL model and the process by which the model is trained using training data. Due to the increasing dependency of current mobile apps on DL, software engineering (SE) for mobile DL apps has become important. However, existing efforts in SE research community mainly focus on the development of DL models and extensively analyze faults in DL programs. In contrast, faults related to the deployment of DL models on mobile devices (named as deployment faults of mobile DL apps) have not been well studied. Since mobile DL apps have been used by billions of end users daily for various purposes including for safety-critical scenarios, characterizing their deployment faults is of enormous importance. To fill the knowledge gap, this paper presents the first comprehensive study on the deployment faults of mobile DL apps. We identify 304 real deployment faults from Stack Overflow and GitHub, two commonly used data sources for studying software faults. Based on the identified faults, we construct a fine-granularity taxonomy consisting of 23 categories regarding to fault symptoms and distill common fix strategies for different fault types. Furthermore, we suggest actionable implications and research avenues that could further facilitate the deployment of DL models on mobile devices.
△ Less
Submitted 10 February, 2021; v1 submitted 13 January, 2021;
originally announced January 2021.
-
A general framework of rotational sparse approximation in uncertainty quantification
Authors:
Mengqi Hu,
Yifei Lou,
Xiu Yang
Abstract:
This paper proposes a general framework to estimate coefficients of generalized polynomial chaos (gPC) used in uncertainty quantification via rotational sparse approximation. In particular, we aim to identify a rotation matrix such that the gPC expansion of a set of random variables after the rotation has a sparser representation. However, this rotational approach alters the underlying linear syst…
▽ More
This paper proposes a general framework to estimate coefficients of generalized polynomial chaos (gPC) used in uncertainty quantification via rotational sparse approximation. In particular, we aim to identify a rotation matrix such that the gPC expansion of a set of random variables after the rotation has a sparser representation. However, this rotational approach alters the underlying linear system to be solved, which makes finding the sparse coefficients more difficult than the case without rotation. To solve this problem, we examine several popular nonconvex regularizations in compressive sensing (CS) that perform better than the classic l1 approach empirically. All these regularizations can be minimized by the alternating direction method of multipliers (ADMM). Numerical examples show superior performance of the proposed combination of rotation and nonconvex sparse promoting regularizations over the ones without rotation and with rotation but using the convex l1 approach.
△ Less
Submitted 17 September, 2021; v1 submitted 13 January, 2021;
originally announced January 2021.
-
Minimizing L1 over L2 norms on the gradient
Authors:
Chao Wang,
Min Tao,
Chen-Nee Chuah,
James Nagy,
Yifei Lou
Abstract:
In this paper, we study the L1/L2 minimization on the gradient for imaging applications. Several recent works have demonstrated that L1/L2 is better than the L1 norm when approximating the L0 norm to promote sparsity. Consequently, we postulate that applying L1/L2 on the gradient is better than the classic total variation (the L1 norm on the gradient) to enforce the sparsity of the image gradient.…
▽ More
In this paper, we study the L1/L2 minimization on the gradient for imaging applications. Several recent works have demonstrated that L1/L2 is better than the L1 norm when approximating the L0 norm to promote sparsity. Consequently, we postulate that applying L1/L2 on the gradient is better than the classic total variation (the L1 norm on the gradient) to enforce the sparsity of the image gradient. To verify our hypothesis, we consider a constrained formulation to reveal empirical evidence on the superiority of L1/L2 over L1 when recovering piecewise constant signals from low-frequency measurements. Numerically, we design a specific splitting scheme, under which we can prove subsequential and global convergence for the alternating direction method of multipliers (ADMM) under certain conditions. Experimentally, we demonstrate visible improvements of L1/L2 over L1 and other nonconvex regularizations for image recovery from low-frequency measurements and two medical applications of MRI and CT reconstruction. All the numerical results show the efficiency of our proposed approach.
△ Less
Submitted 6 July, 2021; v1 submitted 4 January, 2021;
originally announced January 2021.
-
Computing Cliques and Cavities in Networks
Authors:
Dinghua Shi,
Zhifeng Chen,
Xiang Sun,
Qinghua Chen,
Chuang Ma,
Yang Lou,
Guanrong Chen
Abstract:
Complex networks contain complete subgraphs such as nodes, edges, triangles, etc., referred to as simplices and cliques of different orders. Notably, cavities consisting of higher-order cliques play an important role in brain functions. Since searching for maximum cliques is an NP-complete problem, we use k-core decomposition to determine the computability of a given network. For a computable netw…
▽ More
Complex networks contain complete subgraphs such as nodes, edges, triangles, etc., referred to as simplices and cliques of different orders. Notably, cavities consisting of higher-order cliques play an important role in brain functions. Since searching for maximum cliques is an NP-complete problem, we use k-core decomposition to determine the computability of a given network. For a computable network, we design a search method with an implementable algorithm for finding cliques of different orders, obtaining also the Euler characteristic number. Then, we compute the Betti numbers by using the ranks of boundary matrices of adjacent cliques. Furthermore, we design an optimized algorithm for finding cavities of different orders. Finally, we apply the algorithm to the neuronal network of C. elegans with data from one typical dataset, and find all of its cliques and some cavities of different orders, providing a basis for further mathematical analysis and computation of its structure and function.
△ Less
Submitted 31 October, 2021; v1 submitted 2 January, 2021;
originally announced January 2021.
-
Multi-stream Convolutional Neural Network with Frequency Selection for Robust Speaker Verification
Authors:
Wei Yao,
Shen Chen,
Jiamin Cui,
Yaolin Lou
Abstract:
Speaker verification aims to verify whether an input speech corresponds to the claimed speaker, and conventionally, this kind of system is deployed based on single-stream scenario, wherein the feature extractor operates in full frequency range. In this paper, we hypothesize that machine can learn enough knowledge to do classification task when listening to partial frequency range instead of full f…
▽ More
Speaker verification aims to verify whether an input speech corresponds to the claimed speaker, and conventionally, this kind of system is deployed based on single-stream scenario, wherein the feature extractor operates in full frequency range. In this paper, we hypothesize that machine can learn enough knowledge to do classification task when listening to partial frequency range instead of full frequency range, which is so called frequency selection technique, and further propose a novel framework of multi-stream Convolutional Neural Network (CNN) with this technique for speaker verification tasks. The proposed framework accommodates diverse temporal embeddings generated from multiple streams to enhance the robustness of acoustic modeling. For the diversity of temporal embeddings, we consider feature augmentation with frequency selection, which is to manually segment the full-band of frequency into several sub-bands, and the feature extractor of each stream can select which sub-bands to use as target frequency domain. Different from conventional single-stream solution wherein each utterance would only be processed for one time, in this framework, there are multiple streams processing it in parallel. The input utterance for each stream is pre-processed by a frequency selector within specified frequency range, and post-processed by mean normalization. The normalized temporal embeddings of each stream will flow into a pooling layer to generate fused embeddings. We conduct extensive experiments on VoxCeleb dataset, and the experimental results demonstrate that multi-stream CNN significantly outperforms single-stream baseline with 20.53 % of relative improvement in minimum Decision Cost Function (minDCF).
△ Less
Submitted 12 January, 2021; v1 submitted 21 December, 2020;
originally announced December 2020.
-
Canonical Voting: Towards Robust Oriented Bounding Box Detection in 3D Scenes
Authors:
Yang You,
Zelin Ye,
Yu**g Lou,
Chengkun Li,
Yong-Lu Li,
Lizhuang Ma,
Weiming Wang,
Cewu Lu
Abstract:
3D object detection has attracted much attention thanks to the advances in sensors and deep learning methods for point clouds. Current state-of-the-art methods like VoteNet regress direct offset towards object centers and box orientations with an additional Multi-Layer-Perceptron network. Both their offset and orientation predictions are not accurate due to the fundamental difficulty in rotation c…
▽ More
3D object detection has attracted much attention thanks to the advances in sensors and deep learning methods for point clouds. Current state-of-the-art methods like VoteNet regress direct offset towards object centers and box orientations with an additional Multi-Layer-Perceptron network. Both their offset and orientation predictions are not accurate due to the fundamental difficulty in rotation classification. In the work, we disentangle the direct offset into Local Canonical Coordinates (LCC), box scales and box orientations. Only LCC and box scales are regressed, while box orientations are generated by a canonical voting scheme. Finally, an LCC-aware back-projection checking algorithm iteratively cuts out bounding boxes from the generated vote maps, with the elimination of false positives. Our model achieves state-of-the-art performance on three standard real-world benchmarks: ScanNet, SceneNN and SUN RGB-D. Our code is available on https://github.com/qq456cvb/CanonicalVoting.
△ Less
Submitted 9 March, 2022; v1 submitted 24 November, 2020;
originally announced November 2020.
-
FPGAs-as-a-Service Toolkit (FaaST)
Authors:
Dylan Sheldon Rankin,
Jeffrey Krupa,
Philip Harris,
Maria Acosta Flechas,
Burt Holzman,
Thomas Klijnsma,
Kevin Pedro,
Nhan Tran,
Scott Hauck,
Shih-Chieh Hsu,
Matthew Trahms,
Kelvin Lin,
Yu Lou,
Ta-Wei Ho,
Javier Duarte,
Mia Liu
Abstract:
Computing needs for high energy physics are already intensive and are expected to increase drastically in the coming years. In this context, heterogeneous computing, specifically as-a-service computing, has the potential for significant gains over traditional computing models. Although previous studies and packages in the field of heterogeneous computing have focused on GPUs as accelerators, FPGAs…
▽ More
Computing needs for high energy physics are already intensive and are expected to increase drastically in the coming years. In this context, heterogeneous computing, specifically as-a-service computing, has the potential for significant gains over traditional computing models. Although previous studies and packages in the field of heterogeneous computing have focused on GPUs as accelerators, FPGAs are an extremely promising option as well. A series of workflows are developed to establish the performance capabilities of FPGAs as a service. Multiple different devices and a range of algorithms for use in high energy physics are studied. For a small, dense network, the throughput can be improved by an order of magnitude with respect to GPUs as a service. For large convolutional networks, the throughput is found to be comparable to GPUs as a service. This work represents the first open-source FPGAs-as-a-service toolkit.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
Measurements of D-D fusion neutrons generated in nanowire array laser plasma using Timepix3 detector
Authors:
Peter Rubovic,
Aldo Bonasera,
Petr Burian,
Zhengxuan Cao,
Changbo Fu,
Defeng Kong,
Haoyang Lan,
Yao Lou,
Wen Luo,
Chong Lv,
Yugang Ma,
Wenjun Ma,
Zhiguo Ma,
Lukas Meduna,
Zhusong Mei,
Yesid Mora,
Zhuo Pan,
Yinren Shou,
Rudolf Sykora,
Martin Veselsky,
Pengjie Wang,
Wenzhao Wang,
Xueqing Yan,
Guoqiang Zhang,
Jiarui Zhao
, et al. (2 additional authors not shown)
Abstract:
We present the results of neutron detection in a laser plasma experiment with a CD$_2$ nanowire target. A hybrid semiconductor pixel detector Timepix3 covered with neutron converters was used for the detection of neutrons. D-D fusion neutrons were detected in a polyethylene converter through recoiled protons. Both the energy of recoiled protons and the time-of-flight of neutrons (and thus their en…
▽ More
We present the results of neutron detection in a laser plasma experiment with a CD$_2$ nanowire target. A hybrid semiconductor pixel detector Timepix3 covered with neutron converters was used for the detection of neutrons. D-D fusion neutrons were detected in a polyethylene converter through recoiled protons. Both the energy of recoiled protons and the time-of-flight of neutrons (and thus their energy) were determined. We report $(2.4 \pm 1.8) \times 10^7$ neutrons generated for 1~J of incoming laser energy. Furthermore, we proved that Timepix3 is suitable for difficult operational conditions in laser experiments.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Physical-Layer Security for Two-Hop Air-to-Underwater Communication Systems With Fixed-Gain Amplify-and-Forward Relaying
Authors:
Yi Lou,
Ruofan Sun,
Julian Cheng,
Songzuo Liu,
Feng Zhou,
Gang Qiao
Abstract:
We analyze a secure two-hop mixed radio frequency (RF) and underwater wireless optical communication (UWOC) system using a fixed-gain amplify-and-forward (AF) relay. The UWOC channel is modeled using a unified mixture exponential-generalized Gamma distribution to consider the combined effects of air bubbles and temperature gradients on transmission characteristics. Both legitimate and eavesdroppin…
▽ More
We analyze a secure two-hop mixed radio frequency (RF) and underwater wireless optical communication (UWOC) system using a fixed-gain amplify-and-forward (AF) relay. The UWOC channel is modeled using a unified mixture exponential-generalized Gamma distribution to consider the combined effects of air bubbles and temperature gradients on transmission characteristics. Both legitimate and eavesdrop** RF channels are modeled using flexible $α-μ$ distributions. Specifically, we first derive both the probability density function (PDF) and cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) of the mixed RF and UWOC system. Based on the PDF and CDF expressions, we derive the closed-form expressions for the tight lower bound of the secrecy outage probability (SOP) and the probability of non-zero secrecy capacity (PNZ), which are both expressed in terms bivariate Fox's $H$-function. To utilize these analytical expressions, we derive asymptotic expressions of SOP and PNZ using only elementary functions. Also, we use asymptotic expressions to determine the optimal transmitting power to maximize energy efficiency. Further, we thoroughly investigate the effect of levels of air bubbles and temperature gradients in the UWOC channel, and study nonlinear characteristics of the transmission medium and the number of multipath clusters of the RF channel on the secrecy performance. Finally, all analyses are validated using Monte Carlo simulation.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
Prior Knowledge about Attributes: Learning a More Effective Potential Space for Zero-Shot Recognition
Authors:
Chunlai Chai,
Yukuan Lou,
Shi** Zhang
Abstract:
Zero-shot learning (ZSL) aims to recognize unseen classes accurately by learning seen classes and known attributes, but correlations in attributes were ignored by previous study which lead to classification results confused. To solve this problem, we build an Attribute Correlation Potential Space Generation (ACPSG) model which uses a graph convolution network and attribute correlation to generate…
▽ More
Zero-shot learning (ZSL) aims to recognize unseen classes accurately by learning seen classes and known attributes, but correlations in attributes were ignored by previous study which lead to classification results confused. To solve this problem, we build an Attribute Correlation Potential Space Generation (ACPSG) model which uses a graph convolution network and attribute correlation to generate a more discriminating potential space. Combining potential discrimination space and user-defined attribute space, we can better classify unseen classes. Our approach outperforms some existing state-of-the-art methods on several benchmark datasets, whether it is conventional ZSL or generalized ZSL.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
Cascade Network for Self-Supervised Monocular Depth Estimation
Authors:
Chunlai Chai,
Yukuan Lou,
Shi** Zhang
Abstract:
It is a classical compute vision problem to obtain real scene depth maps by using a monocular camera, which has been widely concerned in recent years. However, training this model usually requires a large number of artificially labeled samples. To solve this problem, some researchers use a self-supervised learning model to overcome this problem and reduce the dependence on manually labeled data. N…
▽ More
It is a classical compute vision problem to obtain real scene depth maps by using a monocular camera, which has been widely concerned in recent years. However, training this model usually requires a large number of artificially labeled samples. To solve this problem, some researchers use a self-supervised learning model to overcome this problem and reduce the dependence on manually labeled data. Nevertheless, the accuracy and reliability of these methods have not reached the expected standard. In this paper, we propose a new self-supervised learning method based on cascade networks. Compared with the previous self-supervised methods, our method has improved accuracy and reliability, and we have proved this by experiments. We show a cascaded neural network that divides the target scene into parts of different sight distances and trains them separately to generate a better depth map. Our approach is divided into the following four steps. In the first step, we use the self-supervised model to estimate the depth of the scene roughly. In the second step, the depth of the scene generated in the first step is used as a label to divide the scene into different depth parts. The third step is to use models with different parameters to generate depth maps of different depth parts in the target scene, and the fourth step is to fuse the depth map. Through the ablation study, we demonstrated the effectiveness of each component individually and showed high-quality, state-of-the-art results in the KITTI benchmark.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
Secrecy Outage Analysis of Two-Hop Decode-and-Forward Mixed RF/UWOC Systems
Authors:
Yi Lou,
Ruofan Sun,
Julian Cheng,
Donghu Nie,
Gang Qiao
Abstract:
We analyze the secrecy performance of a two-hop mixed radio frequency (RF)/underwater wireless optical communication (UWOC) system using a decode-and-forward (DF) relay. All RF and UWOC links are modeled by the $α-μ$ and exponential-generalized Gamma distributions, respectively. We first derive the expressions of the secrecy outage probability (SOP) in exact closed-form, which are subsequently use…
▽ More
We analyze the secrecy performance of a two-hop mixed radio frequency (RF)/underwater wireless optical communication (UWOC) system using a decode-and-forward (DF) relay. All RF and UWOC links are modeled by the $α-μ$ and exponential-generalized Gamma distributions, respectively. We first derive the expressions of the secrecy outage probability (SOP) in exact closed-form, which are subsequently used to derive asymptotic expressions at high SNR that only includes simple functions for further insight. Moreover, based on the asymptotic expression, we can determine the optimal transmit power for a wide variety of RF and UWOC channel conditions. All analyses are validated using Monte Carlo simulation.
△ Less
Submitted 1 September, 2020;
originally announced September 2020.
-
A Framework of Hierarchical Attacks to Network Controllability
Authors:
Yang Lou,
Lin Wang,
Guanrong Chen
Abstract:
Network controllability robustness reflects how well a networked dynamical system can maintain its controllability against destructive attacks. This paper investigates the network controllability robustness from the perspective of a malicious attack. A framework of hierarchical attack is proposed, by means of edge- or node-removal attacks. Edges (or nodes) in a target network are classified hierar…
▽ More
Network controllability robustness reflects how well a networked dynamical system can maintain its controllability against destructive attacks. This paper investigates the network controllability robustness from the perspective of a malicious attack. A framework of hierarchical attack is proposed, by means of edge- or node-removal attacks. Edges (or nodes) in a target network are classified hierarchically into categories, with different priorities to attack. The category of critical edges (or nodes) has the highest priority to be selected for attack. Extensive experiments on nine synthetic networks and nine real-world networks show the effectiveness of the proposed hierarchical attack strategies for destructing the network controllability. From the protection point of view, this study suggests that the critical edges and nodes should be hidden from the attackers. This finding helps better understand the network controllability and better design robust networks.
△ Less
Submitted 4 August, 2020;
originally announced August 2020.
-
Quantum-enhanced stochastic phase estimation with SU(1,1) interferometer
Authors:
Kaimin Zheng,
Minghao Mi,
Ben Wang,
Liyun Hu,
Shengshuai Liu,
Yanbo Lou,
Jietai **g,
Lijian Zhang
Abstract:
The quantum stochastic phase estimation has many applications in the precise measurement of various physical parameters. Similar to the estimation of a constant phase, there is a standard quantum limit for stochastic phase estimation, which can be obtained with the Mach-Zehnder interferometer and coherent input state. Recently, it has been shown that the stochastic standard quantum limit can be su…
▽ More
The quantum stochastic phase estimation has many applications in the precise measurement of various physical parameters. Similar to the estimation of a constant phase, there is a standard quantum limit for stochastic phase estimation, which can be obtained with the Mach-Zehnder interferometer and coherent input state. Recently, it has been shown that the stochastic standard quantum limit can be surpassed with non-classical resources such as the squeezed light. However, practical methods to achieve the quantum enhancement in the stochastic phase estimation remains largely unexplored. Here we propose a method utilizing the SU(1,1) interferometer and coherent input states to estimate a stochastic optical phase. As an example, we investigate the Ornstein-Uhlenback stochastic phase. We analyze the performance of this method for three key estimation problems: prediction, tracking and smoothing. The results show significant reduction of the mean square error compared with the Mach-Zehnder interferometer under the same photon number flux inside the interferometers. In particular, we show that the method with the SU(1,1) interferometer can achieve the fundamental quantum scaling, the stochastic Heisenberg scaling, and surpass the precision of the canonical measurement.
△ Less
Submitted 6 August, 2020;
originally announced August 2020.
-
Performance of Underwater Wireless Optical Communications in Presents of Cascaded Mixture Exponential-Generalized Gamma Turbulence
Authors:
Yi Lou,
Julian Cheng,
Donghu Nie,
Gang Qiao
Abstract:
Underwater wireless optical communication is one of the critical technologies for buoy-based high-speed cross-sea surface communication, where the communication nodes are vertically deployed. Due to the vertically inhomogeneous nature of the underwater environment, seawater is usually vertically divided into multiple layers with different parameters that reflect the real environment. In this work,…
▽ More
Underwater wireless optical communication is one of the critical technologies for buoy-based high-speed cross-sea surface communication, where the communication nodes are vertically deployed. Due to the vertically inhomogeneous nature of the underwater environment, seawater is usually vertically divided into multiple layers with different parameters that reflect the real environment. In this work, we consider a generalized UWOC channel model that contains$N$ layers. To capture the effects of air bubbles and temperature gradients on channel statistics, we model each layer by a mixture Exponential-Generalized Gamma(EGG) distribution. We derive the PDF and CDF of the end-to-end SNR in exact closed-form. Then, unified BER and outage expressions using OOK and BPSK are also derived. The performance and behavior of common vertical underwater optical communication scenarios are thoroughly analyzed through the appropriate selection of parameters. All the derived expressions are verified via Monte Carlo simulations.
△ Less
Submitted 6 August, 2020;
originally announced August 2020.
-
Searching for missing D'Alembert waves in nonlinear system: Nizhnik-Novikov-Veselov equation
Authors:
Man Jia,
S. Y. Lou
Abstract:
In linear science, the wave motion equation with general D'Alembert wave solutions is one of the fundamental models. The D'Alembert wave is an arbitrary travelling wave moving along one direction under a fixed model (material) dependent velocity. However, the D'Alembert waves are missed when nonlinear effects are introduced to wave motions. In this paper, we study the possible travelling wave solu…
▽ More
In linear science, the wave motion equation with general D'Alembert wave solutions is one of the fundamental models. The D'Alembert wave is an arbitrary travelling wave moving along one direction under a fixed model (material) dependent velocity. However, the D'Alembert waves are missed when nonlinear effects are introduced to wave motions. In this paper, we study the possible travelling wave solutions, multiple soliton solutions and soliton molecules for a special (2+1)-dimensional Koteweg-de Vries (KdV) equation, the so-called Nizhnik-Novikov-Veselov (NNV) equation. The missed D'Alembert wave is re-discovered from the NNV equation. By using the velocity resonance mechanism, the soliton molecules are found to be closely related to D'Alembert waves. In fact, the soliton molecules of the NNV equation can be viewed as special D'Alembert waves. The interaction solutions among special D'Alembert type waves ($n$-soliton molecules and soliton-solitoff molecules) and solitons are also discussed.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
A Novel Regularization Based on the Error Function for Sparse Recovery
Authors:
Weihong Guo,
Yifei Lou,
**g Qin,
Ming Yan
Abstract:
Regularization plays an important role in solving ill-posed problems by adding extra information about the desired solution, such as sparsity. Many regularization terms usually involve some vector norm, e.g., $L_1$ and $L_2$ norms. In this paper, we propose a novel regularization framework that uses the error function to approximate the unit step function. It can be considered as a surrogate funct…
▽ More
Regularization plays an important role in solving ill-posed problems by adding extra information about the desired solution, such as sparsity. Many regularization terms usually involve some vector norm, e.g., $L_1$ and $L_2$ norms. In this paper, we propose a novel regularization framework that uses the error function to approximate the unit step function. It can be considered as a surrogate function for the $L_0$ norm. The asymptotic behavior of the error function with respect to its intrinsic parameter indicates that the proposed regularization can approximate the standard $L_0$, $L_1$ norms as the parameter approaches to $0$ and $\infty,$ respectively. Statistically, it is also less biased than the $L_1$ approach. We then incorporate the error function into either a constrained or an unconstrained model when recovering a sparse signal from an under-determined linear system. Computationally, both problems can be solved via an iterative reweighted $L_1$ (IRL1) algorithm with guaranteed convergence. A large number of experimental results demonstrate that the proposed approach outperforms the state-of-the-art methods in various sparse recovery scenarios.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Painlevé property, local and nonlocal symmetries and symmetry reductions for a (2+1)-dimensional integrable KdV equation
Authors:
Xiao-Bo Wang,
Man Jia,
S. Y. Lou
Abstract:
The Painlevé property for a (2+1)-dimensional Korteweg-de Vries (KdV) extension, the combined KP3 (Kadomtsev- Petviashvili) and KP4 (cKP3-4) is proved by using Kruskal's simplification. The truncated Painlevé expansion is used to find the Schwartz form, the Bäcklund/Levi transformations and the residual nonlocal symmetry. The residual symmetry is localized to find its finite Bäcklund transformatio…
▽ More
The Painlevé property for a (2+1)-dimensional Korteweg-de Vries (KdV) extension, the combined KP3 (Kadomtsev- Petviashvili) and KP4 (cKP3-4) is proved by using Kruskal's simplification. The truncated Painlevé expansion is used to find the Schwartz form, the Bäcklund/Levi transformations and the residual nonlocal symmetry. The residual symmetry is localized to find its finite Bäcklund transformation. The local point symmetries of the model constitute a centerless Kac-Moody-Virasoro algebra. The local point symmetries are used to find the related group invariant reductions including a new Lax integrable model with a fourth order spectral problem. The finite transformation theorem or the Lie point symmetry group is obtained by using a direct method.
△ Less
Submitted 5 July, 2020;
originally announced July 2020.
-
Limited-angle CT reconstruction via the L1/L2 minimization
Authors:
Chao Wang,
Min Tao,
James Nagy,
Yifei Lou
Abstract:
In this paper, we consider minimizing the L1/L2 term on the gradient for a limited-angle scanning problem in computed tomography (CT) reconstruction. We design a specific splitting framework for an unconstrained optimization model so that the alternating direction method of multipliers (ADMM) has guaranteed convergence under certain conditions. In addition, we incorporate a box constraint that is…
▽ More
In this paper, we consider minimizing the L1/L2 term on the gradient for a limited-angle scanning problem in computed tomography (CT) reconstruction. We design a specific splitting framework for an unconstrained optimization model so that the alternating direction method of multipliers (ADMM) has guaranteed convergence under certain conditions. In addition, we incorporate a box constraint that is reasonable for imaging applications, and the convergence for the additional box constraint can also be established. Numerical results on both synthetic and experimental datasets demonstrate the effectiveness and efficiency of our proposed approaches, showing significant improvements over the state-of-the-art methods in the limited-angle CT reconstruction.
△ Less
Submitted 17 March, 2021; v1 submitted 31 May, 2020;
originally announced June 2020.
-
A Weighted Difference of Anisotropic and Isotropic Total Variation for Relaxed Mumford-Shah Color and Multiphase Image Segmentation
Authors:
Kevin Bui,
Fredrick Park,
Yifei Lou,
Jack Xin
Abstract:
In a class of piecewise-constant image segmentation models, we propose to incorporate a weighted difference of anisotropic and isotropic total variation (AITV) to regularize the partition boundaries in an image. In particular, we replace the total variation regularization in the Chan-Vese segmentation model and a fuzzy region competition model by the proposed AITV. To deal with the nonconvex natur…
▽ More
In a class of piecewise-constant image segmentation models, we propose to incorporate a weighted difference of anisotropic and isotropic total variation (AITV) to regularize the partition boundaries in an image. In particular, we replace the total variation regularization in the Chan-Vese segmentation model and a fuzzy region competition model by the proposed AITV. To deal with the nonconvex nature of AITV, we apply the difference-of-convex algorithm (DCA), in which the subproblems can be minimized by the primal-dual hybrid gradient method with linesearch. The convergence of the DCA scheme is analyzed. In addition, a generalization to color image segmentation is discussed. In the numerical experiments, we compare the proposed models with the classic convex approaches and the two-stage segmentation methods (smoothing and then thresholding) on various images, showing that our models are effective in image segmentation and robust with respect to impulsive noises.
△ Less
Submitted 17 July, 2021; v1 submitted 9 May, 2020;
originally announced May 2020.
-
Semantic Correspondence via 2D-3D-2D Cycle
Authors:
Yang You,
Chengkun Li,
Yu**g Lou,
Zhoujun Cheng,
Lizhuang Ma,
Cewu Lu,
Weiming Wang
Abstract:
Visual semantic correspondence is an important topic in computer vision and could help machine understand objects in our daily life. However, most previous methods directly train on correspondences in 2D images, which is end-to-end but loses plenty of information in 3D spaces. In this paper, we propose a new method on predicting semantic correspondences by leveraging it to 3D domain and then proje…
▽ More
Visual semantic correspondence is an important topic in computer vision and could help machine understand objects in our daily life. However, most previous methods directly train on correspondences in 2D images, which is end-to-end but loses plenty of information in 3D spaces. In this paper, we propose a new method on predicting semantic correspondences by leveraging it to 3D domain and then project corresponding 3D models back to 2D domain, with their semantic labels. Our method leverages the advantages in 3D vision and can explicitly reason about objects self-occlusion and visibility. We show that our method gives comparative and even superior results on standard semantic benchmarks. We also conduct thorough and detailed experiments to analyze our network components. The code and experiments are publicly available at https://github.com/qq456cvb/SemanticTransfer.
△ Less
Submitted 13 April, 2021; v1 submitted 20 April, 2020;
originally announced April 2020.
-
Interactive Patch Filtering as Debugging Aid
Authors:
**g**g Liang,
Ruyi Ji,
Jiajun Jiang,
Yiling Lou,
Yingfei Xiong,
Gang Huang
Abstract:
It is widely recognized that program repair tools need to have a high precision to be useful, i.e., the generated patches need to have a high probability to be correct. However, it is fundamentally difficult to ensure the correctness of the patches, and many tools compromise other aspects of repair performance such as recall for an acceptable precision.
In this paper we ask a question: can a rep…
▽ More
It is widely recognized that program repair tools need to have a high precision to be useful, i.e., the generated patches need to have a high probability to be correct. However, it is fundamentally difficult to ensure the correctness of the patches, and many tools compromise other aspects of repair performance such as recall for an acceptable precision.
In this paper we ask a question: can a repair tool with a low precision be still useful? To explore this question, we propose an interactive filtering approach to patch review, which filters out incorrect patches by asking questions to the developers. Our intuition is that incorrect patches can still help understand the bug. With proper tool support, the benefit outweighs the cost even if there are many incorrect patches.
We implemented the approach as an Eclipse plugin tool, InPaFer, and evaluated it with a simulated experiment and a user study with 30 developers. The results show that our approach improve the repair performance of developers, with 62.5% more successfully repaired bugs and 25.3% less debugging time in average. In particular, even if the generated patches are all incorrect, the performance of the developers would not be significantly reduced, and could be improved when some patches provide useful information for repairing, such as the faulty location and a partial fix.
△ Less
Submitted 27 April, 2020; v1 submitted 18 April, 2020;
originally announced April 2020.
-
Selected topics on reaction-diffusion-advection models from spatial ecology
Authors:
King-Yeung Lam,
Shuang Liu,
Yuan Lou
Abstract:
We discuss the effects of movement and spatial heterogeneity on population dynamics via reaction-diffusion-advection models, focusing on the persistence, competition, and evolution of organisms in spatially heterogeneous environments. Topics include Lokta-Volterra competition models, river models, evolution of biased movement, phytoplankton growth, and spatial spread of epidemic disease. Open prob…
▽ More
We discuss the effects of movement and spatial heterogeneity on population dynamics via reaction-diffusion-advection models, focusing on the persistence, competition, and evolution of organisms in spatially heterogeneous environments. Topics include Lokta-Volterra competition models, river models, evolution of biased movement, phytoplankton growth, and spatial spread of epidemic disease. Open problems and conjectures are presented.
△ Less
Submitted 17 May, 2020; v1 submitted 16 April, 2020;
originally announced April 2020.
-
Optical computation of divergence operation for vector field
Authors:
Yijie Lou,
Yisheng Fang,
Zhichao Ruan
Abstract:
Topological physics desires stable methods to measure the polarization singularities in optical vector fields. Here a periodic plasmonic metasurface is proposed to perform divergence computation of vectorial paraxial beams. We design such an optical device to compute spatial differentiation along two directions, parallel and perpendicular to the incident plane, simultaneously. The divergence opera…
▽ More
Topological physics desires stable methods to measure the polarization singularities in optical vector fields. Here a periodic plasmonic metasurface is proposed to perform divergence computation of vectorial paraxial beams. We design such an optical device to compute spatial differentiation along two directions, parallel and perpendicular to the incident plane, simultaneously. The divergence operation is achieved by creating the constructive interference between two derivative results. We demonstrate that such optical computations provide a new direct pathway to elucidate specific polarization singularities of vector fields.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Knowledge-Based Prediction of Network Controllability Robustness
Authors:
Yang Lou,
Yaodong He,
Lin Wang,
Kim Fung Tsang,
Guanrong Chen
Abstract:
Network controllability robustness reflects how well a networked system can maintain its controllability against destructive attacks. Its measure is quantified by a sequence of values that record the remaining controllability of the network after a sequence of node-removal or edge-removal attacks. Traditionally, the controllability robustness is determined by attack simulations, which is computati…
▽ More
Network controllability robustness reflects how well a networked system can maintain its controllability against destructive attacks. Its measure is quantified by a sequence of values that record the remaining controllability of the network after a sequence of node-removal or edge-removal attacks. Traditionally, the controllability robustness is determined by attack simulations, which is computationally time consuming or even infeasible. In the present paper, an improved method for predicting the network controllability robustness is developed based on machine learning using a group of convolutional neural networks (CNNs). In this scheme, a number of training data generated by simulations are used to train the group of CNNs for classification and prediction, respectively. Extensive experimental studies are carried out, which demonstrate that 1) the proposed method predicts more precisely than the classical single-CNN predictor; 2) the proposed CNN-based predictor provides a better predictive measure than the traditional spectral measures and network heterogeneity.
△ Less
Submitted 22 April, 2021; v1 submitted 19 March, 2020;
originally announced March 2020.
-
KeypointNet: A Large-scale 3D Keypoint Dataset Aggregated from Numerous Human Annotations
Authors:
Yang You,
Yu**g Lou,
Chengkun Li,
Zhoujun Cheng,
Liangwei Li,
Lizhuang Ma,
Weiming Wang,
Cewu Lu
Abstract:
Detecting 3D objects keypoints is of great interest to the areas of both graphics and computer vision. There have been several 2D and 3D keypoint datasets aiming to address this problem in a data-driven way. These datasets, however, either lack scalability or bring ambiguity to the definition of keypoints. Therefore, we present KeypointNet: the first large-scale and diverse 3D keypoint dataset tha…
▽ More
Detecting 3D objects keypoints is of great interest to the areas of both graphics and computer vision. There have been several 2D and 3D keypoint datasets aiming to address this problem in a data-driven way. These datasets, however, either lack scalability or bring ambiguity to the definition of keypoints. Therefore, we present KeypointNet: the first large-scale and diverse 3D keypoint dataset that contains 103,450 keypoints and 8,234 3D models from 16 object categories, by leveraging numerous human annotations. To handle the inconsistency between annotations from different people, we propose a novel method to aggregate these keypoints automatically, through minimization of a fidelity loss. Finally, ten state-of-the-art methods are benchmarked on our proposed dataset. Our code and data are available on https://github.com/qq456cvb/KeypointNet.
△ Less
Submitted 6 August, 2020; v1 submitted 28 February, 2020;
originally announced February 2020.
-
Evolution of anisotropic diffusion in two-dimensional heterogeneous environments
Authors:
Emeric Bouin,
Guillaume Legendre,
Yuan Lou,
Nichole Slover
Abstract:
We consider a system of two competing populations in two-dimensional heterogeneous environments. The populations are assumed to move horizontally and vertically with different probabilities, but are otherwise identical. We regard these probabilities as dispersal strategies. We show that the evolutionarily stable strategies are to move in one direction only. Our results predict that it is more bene…
▽ More
We consider a system of two competing populations in two-dimensional heterogeneous environments. The populations are assumed to move horizontally and vertically with different probabilities, but are otherwise identical. We regard these probabilities as dispersal strategies. We show that the evolutionarily stable strategies are to move in one direction only. Our results predict that it is more beneficial for the species to choose the direction with smaller variation in the resource distribution. This finding seems to be in agreement with the classical results of Hasting [15] and Dockery et al. [11] for the evolution of slow dispersal, i.e. random diffusion is selected against in spatially heterogeneous environments. These conclusions also suggest that broader dispersal strategies should be considered regarding the movement in heterogeneous habitats.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
Asymptotics of the principal eigenvalue for a linear time-periodic parabolic operator II: Small diffusion
Authors:
Shuang Liu,
Yuan Lou,
Rui Peng,
Maolin Zhou
Abstract:
We investigate the effect of small diffusion on the principal eigenvalues of linear time-periodic parabolic operators with zero Neumann boundary conditions in one dimensional space. The asymptotic behaviors of the principal eigenvalues, as the diffusion coefficients tend to zero, are established for non-degenerate and degenerate spatial-temporally varying environments. A new finding is the depende…
▽ More
We investigate the effect of small diffusion on the principal eigenvalues of linear time-periodic parabolic operators with zero Neumann boundary conditions in one dimensional space. The asymptotic behaviors of the principal eigenvalues, as the diffusion coefficients tend to zero, are established for non-degenerate and degenerate spatial-temporally varying environments. A new finding is the dependence of these asymptotic behaviors on the periodic solutions of a specific ordinary differential equation induced by the drift. The proofs are based upon delicate constructions of super/sub-solutions and the applications of comparison principles.
△ Less
Submitted 12 January, 2021; v1 submitted 4 February, 2020;
originally announced February 2020.
-
Asymptotics of the principal eigenvalue for a linear time-periodic parabolic operator I: Large advection
Authors:
Shuang Liu,
Yuan Lou,
Rui Peng,
Maolin Zhou
Abstract:
We investigate the effects of advection on the principal eigenvalues of linear time-periodic parabolic operators with zero Neumann boundary conditions. Various asymptotic behaviors of the principal eigenvalues, when advection coefficient approaches infinity, are established in heterogeneous environments, where spatial or temporal degeneracy could occur in the advection term. Our findings partially…
▽ More
We investigate the effects of advection on the principal eigenvalues of linear time-periodic parabolic operators with zero Neumann boundary conditions. Various asymptotic behaviors of the principal eigenvalues, when advection coefficient approaches infinity, are established in heterogeneous environments, where spatial or temporal degeneracy could occur in the advection term. Our findings partially extend the existing results in Chen-Lou [2008 Indiana Univ. Math. J.] and Peng-Zhou [2018 Indiana Univ. Math. J.] for elliptic operators and those in Peng-Zhao [2015 Calc. Var. Partial Diff.] for parabolic operators.
△ Less
Submitted 25 May, 2021; v1 submitted 4 February, 2020;
originally announced February 2020.
-
A novel (2+1)-dimensional integrable KdV equation with peculiar solution structures
Authors:
S. Y. Lou
Abstract:
The celebrated (1+1)-dimensional Korteweg de-Vries (KdV) equation and its (2+1)-dimensional extention, the Kadomtsev-Petviashvili (KP) equation, are two of the most important models in physical science. The KP hierarchy is explicitly written out by means of the linearized operator of the KP equation. A novel (2+1)-dimensional KdV extension, the cKP3-4 equation, is obtained by combining the third m…
▽ More
The celebrated (1+1)-dimensional Korteweg de-Vries (KdV) equation and its (2+1)-dimensional extention, the Kadomtsev-Petviashvili (KP) equation, are two of the most important models in physical science. The KP hierarchy is explicitly written out by means of the linearized operator of the KP equation. A novel (2+1)-dimensional KdV extension, the cKP3-4 equation, is obtained by combining the third member (KP3, the usual KP equation) and the fourth member (KP4) of the KP hierarchy. The integrability of the cKP3-4 equation is guaranteed by the existence of the Lax pair and dual Lax pair. The cKP3-4 system can be bilinearized by using Hirota's bilinear operators after introducing an additional auxiliary variable. Exact solutions of the cKP3-4 equation possess some peculiar and interesting properties which are not valid for the KP3 and KP4 equations. For instance, the soliton molecules and the missing D'Alembert type solutions (the arbitrary travelling waves moving in one direction with a fixed model dependent velocity) including periodic kink molecules, periodic kink-antikink molecules, few cycle solitons and envelope solitons are existed for the cKP3-4 equation but not for the separated KP3 equation and the KP4 equation.
△ Less
Submitted 23 January, 2020;
originally announced January 2020.
-
Human Correspondence Consensus for 3D Object Semantic Understanding
Authors:
Yu**g Lou,
Yang You,
Chengkun Li,
Zhoujun Cheng,
Liangwei Li,
Lizhuang Ma,
Weiming Wang,
Cewu Lu
Abstract:
Semantic understanding of 3D objects is crucial in many applications such as object manipulation. However, it is hard to give a universal definition of point-level semantics that everyone would agree on. We observe that people have a consensus on semantic correspondences between two areas from different objects, but are less certain about the exact semantic meaning of each area. Therefore, we argu…
▽ More
Semantic understanding of 3D objects is crucial in many applications such as object manipulation. However, it is hard to give a universal definition of point-level semantics that everyone would agree on. We observe that people have a consensus on semantic correspondences between two areas from different objects, but are less certain about the exact semantic meaning of each area. Therefore, we argue that by providing human labeled correspondences between different objects from the same category instead of explicit semantic labels, one can recover rich semantic information of an object. In this paper, we introduce a new dataset named CorresPondenceNet. Based on this dataset, we are able to learn dense semantic embeddings with a novel geodesic consistency loss. Accordingly, several state-of-the-art networks are evaluated on this correspondence benchmark. We further show that CorresPondenceNet could not only boost fine-grained understanding of heterogeneous objects but also cross-object registration and partial object matching.
△ Less
Submitted 26 November, 2020; v1 submitted 28 December, 2019;
originally announced December 2019.
-
Towards Optimal Robustness of Network Controllability: An Empirical Necessary Condition
Authors:
Yang Lou,
Lin Wang,
Kim Fung Tsang,
Guanrong Chen
Abstract:
To better understand the correlation between network topological features and the robustness of network controllability in a general setting, this paper suggests a practical approach to searching for optimal network topologies with given numbers of nodes and edges. Since theoretical analysis seems impossible at least in the present time, exhaustive search based on optimization techniques is employ…
▽ More
To better understand the correlation between network topological features and the robustness of network controllability in a general setting, this paper suggests a practical approach to searching for optimal network topologies with given numbers of nodes and edges. Since theoretical analysis seems impossible at least in the present time, exhaustive search based on optimization techniques is employed, firstly for a group of small-sized networks that are realistically workable, where \textit{exhaustive} means 1) all possible network structures with the given numbers of nodes and edges are computed and compared, and 2) all possible node-removal sequences are considered. A main contribution of this paper is the observation of an empirical necessary condition (ENC) from the results of exhaustive search, which shrinks the search space to quickly find an optimal solution. ENC shows that the maximum and minimum in- and out-degrees of an optimal network structure should be almost identical, or within a very narrow range, i.e., the network should be extremely homogeneous. Edge rectification towards the satisfaction of the ENC is then designed and evaluated. Simulation results on large-sized synthetic and real-world networks verify the effectiveness of both the observed ENC and the edge rectification scheme. As more operations of edge rectification are performed, the network is getting closer to exactly satisfying the ENC, and consequently the robustness of the network controllability is enhanced towards optimum.
△ Less
Submitted 1 September, 2020; v1 submitted 28 December, 2019;
originally announced December 2019.