-
Numerical verification of the convexification method for a frequency-dependent inverse scattering problem with experimental data
Authors:
Thuy Le,
Vo Anh Khoa,
Michael Victor Klibanov,
Loc Hoang Nguyen,
Grant Bidney,
Vasily Astratov
Abstract:
The reconstruction of physical properties of a medium from boundary measurements, known as inverse scattering problems, presents significant challenges. The present study aims to validate a newly developed convexification method for a 3D coefficient inverse problem in the case of buried unknown objects in a sandbox, using experimental data collected by a microwave scattering facility at The Univer…
▽ More
The reconstruction of physical properties of a medium from boundary measurements, known as inverse scattering problems, presents significant challenges. The present study aims to validate a newly developed convexification method for a 3D coefficient inverse problem in the case of buried unknown objects in a sandbox, using experimental data collected by a microwave scattering facility at The University of North Carolina at Charlotte. Our study considers the formulation of a coupled quasilinear elliptic system based on multiple frequencies. The system can be solved by minimizing a weighted Tikhonov-like functional, which forms our convexification method. Theoretical results related to the convexification are also revisited in this work.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
XPhoneBERT: A Pre-trained Multilingual Model for Phoneme Representations for Text-to-Speech
Authors:
Linh The Nguyen,
Thinh Pham,
Dat Quoc Nguyen
Abstract:
We present XPhoneBERT, the first multilingual model pre-trained to learn phoneme representations for the downstream text-to-speech (TTS) task. Our XPhoneBERT has the same model architecture as BERT-base, trained using the RoBERTa pre-training approach on 330M phoneme-level sentences from nearly 100 languages and locales. Experimental results show that employing XPhoneBERT as an input phoneme encod…
▽ More
We present XPhoneBERT, the first multilingual model pre-trained to learn phoneme representations for the downstream text-to-speech (TTS) task. Our XPhoneBERT has the same model architecture as BERT-base, trained using the RoBERTa pre-training approach on 330M phoneme-level sentences from nearly 100 languages and locales. Experimental results show that employing XPhoneBERT as an input phoneme encoder significantly boosts the performance of a strong neural TTS model in terms of naturalness and prosody and also helps produce fairly high-quality speech with limited training data. We publicly release our pre-trained XPhoneBERT with the hope that it would facilitate future research and downstream TTS applications for multiple languages. Our XPhoneBERT model is available at https://github.com/VinAIResearch/XPhoneBERT
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
The dimensional reduction method for solving a nonlinear inverse heat conduction problem with limited boundary data
Authors:
Dinh-Nho H`ao,
Thuy T. Le,
Loc H. Nguyen
Abstract:
The objective of this article is to introduce a novel technique for computing numerical solutions to the nonlinear inverse heat conduction problem. This involves solving nonlinear parabolic equations with Cauchy data provided on one side $Γ$ of the boundary of the computational domain $Ω$. The key step of our proposed method is the truncation of the Fourier series of the solution to the governing…
▽ More
The objective of this article is to introduce a novel technique for computing numerical solutions to the nonlinear inverse heat conduction problem. This involves solving nonlinear parabolic equations with Cauchy data provided on one side $Γ$ of the boundary of the computational domain $Ω$. The key step of our proposed method is the truncation of the Fourier series of the solution to the governing equation. The truncation technique enables us to derive a system of 1D ordinary differential equations. Then, we employ the well-known Runge-Kutta method to solve this system, which aids in addressing the nonlinearity and the lack of data on $\partial Ω\setmunus Γ$. This new approach is called the dimensional reduction method. By converting the high-dimensional problem into a 1D problem, we achieve exceptional computational speed. Numerical results are provided to support the effectiveness of our approach.
△ Less
Submitted 30 May, 2023;
originally announced May 2023.
-
An Optically Targeted Search for Gravitational Waves emitted by Core-Collapse Supernovae during the Third Observing Run of Advanced LIGO and Advanced Virgo
Authors:
Marek J. Szczepańczyk,
Yanyan Zheng,
Javier M. Antelis,
Michael Benjamin,
Marie-Anne Bizouard,
Alejandro Casallas-Lagos,
Pablo Cerdá-Durán,
Derek Davis,
Dorota Gondek-Rosińska,
Sergey Klimenko,
Claudia Moreno,
Martin Obergaulinger,
Jade Powell,
Dymetris Ramirez,
Brad Ratto,
Colter Richarson,
Abhinav Rijal,
Amber L. Stuver,
Paweł Szewczyk,
Gabriele Vedovato,
Michele Zanolin,
Imre Bartos,
Shubhagata Bhaumik,
Tomasz Bulik,
Marco Drago
, et al. (13 additional authors not shown)
Abstract:
We present the results from a search for gravitational-wave transients associated with core-collapse supernovae observed optically within 30 Mpc during the third observing run of Advanced LIGO and Advanced Virgo. No gravitational wave associated with a core-collapse supernova has been identified. We then report the detection efficiency for a variety of possible gravitational-wave emissions. For ne…
▽ More
We present the results from a search for gravitational-wave transients associated with core-collapse supernovae observed optically within 30 Mpc during the third observing run of Advanced LIGO and Advanced Virgo. No gravitational wave associated with a core-collapse supernova has been identified. We then report the detection efficiency for a variety of possible gravitational-wave emissions. For neutrino-driven explosions, the distance at which we reach 50% detection efficiency is up to 8.9 kpc, while more energetic magnetorotationally-driven explosions are detectable at larger distances. The distance reaches for selected models of the black hole formation, and quantum chromodynamics phase transition are also provided. We then constrain the core-collapse supernova engine across a wide frequency range from 50 Hz to 2 kHz. The upper limits on gravitational-wave energy and luminosity emission are at low frequencies down to $10^{-4}\,M_\odot c^2$ and $6 \times 10^{-4}\,M_\odot c^2$/s, respectively. The upper limits on the proto-neutron star ellipticity are down to 3 at high frequencies. Finally, by combining the results obtained with the data from the first and second observing runs of LIGO and Virgo, we improve the constraints of the parameter spaces of the extreme emission models. Specifically, the proto-neutron star ellipticities for the long-lasting bar mode model are down to 1 for long emission (1 s) at high frequency.
△ Less
Submitted 3 July, 2024; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Online and Streaming Algorithms for Constrained $k$-Submodular Maximization
Authors:
Fabian Spaeh,
Alina Ene,
Huy L. Nguyen
Abstract:
Constrained $k$-submodular maximization is a general framework that captures many discrete optimization problems such as ad allocation, influence maximization, personalized recommendation, and many others. In many of these applications, datasets are large or decisions need to be made in an online manner, which motivates the development of efficient streaming and online algorithms. In this work, we…
▽ More
Constrained $k$-submodular maximization is a general framework that captures many discrete optimization problems such as ad allocation, influence maximization, personalized recommendation, and many others. In many of these applications, datasets are large or decisions need to be made in an online manner, which motivates the development of efficient streaming and online algorithms. In this work, we develop single-pass streaming and online algorithms for constrained $k$-submodular maximization with both monotone and general (possibly non-monotone) objectives subject to cardinality and knapsack constraints. Our algorithms achieve provable constant-factor approximation guarantees which improve upon the state of the art in almost all settings. Moreover, they are combinatorial and very efficient, and have optimal space and running time. We experimentally evaluate our algorithms on instances for ad allocation and other applications, where we observe that our algorithms are efficient and scalable, and construct solutions that are comparable in value to offline greedy algorithms.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Simply typed convertibility is TOWER-complete even for safe lambda-terms
Authors:
Lê Thành Dũng Nguyên
Abstract:
We consider the following decision problem: given two simply typed $λ$-terms, are they $β$-convertible? Equivalently, do they have the same normal form? It is famously non-elementary, but the precise complexity - namely TOWER-complete - is lesser known. One goal of this short paper is to popularize this fact.
Our original contribution is to show that the problem stays TOWER-complete when the two…
▽ More
We consider the following decision problem: given two simply typed $λ$-terms, are they $β$-convertible? Equivalently, do they have the same normal form? It is famously non-elementary, but the precise complexity - namely TOWER-complete - is lesser known. One goal of this short paper is to popularize this fact.
Our original contribution is to show that the problem stays TOWER-complete when the two input terms belong to Blum and Ong's safe $λ$-calculus, a fragment of the simply typed $λ$-calculus arising from the study of higher-order recursion schemes. Previously, the best known lower bound for this safe $β$-convertibility problem was PSPACE-hardness. Our proof proceeds by reduction from the star-free expression equivalence problem, taking inspiration from the author's work with Pradic on "implicit automata in typed $λ$-calculi".
These results also hold for $βη$-convertibility.
△ Less
Submitted 13 April, 2024; v1 submitted 21 May, 2023;
originally announced May 2023.
-
Coronal Heating as Determined by the Solar Flare Frequency Distribution Obtained by Aggregating Case Studies
Authors:
James Paul Mason,
Alexandra Werth,
Colin G. West,
Allison A. Youngblood,
Donald L. Woodraska,
Courtney Peck,
Kevin Lacjak,
Florian G. Frick,
Moutamen Gabir,
Reema A. Alsinan,
Thomas Jacobsen,
Mohammad Alrubaie,
Kayla M. Chizmar,
Benjamin P. Lau,
Lizbeth Montoya Dominguez,
David Price,
Dylan R. Butler,
Connor J. Biron,
Nikita Feoktistov,
Kai Dewey,
N. E. Loomis,
Michal Bodzianowski,
Connor Kuybus,
Henry Dietrick,
Aubrey M. Wolfe
, et al. (977 additional authors not shown)
Abstract:
Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms th…
▽ More
Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms that could explain it: nanoflares or Alfvén waves. To date, neither can be directly observed. Nanoflares are, by definition, extremely small, but their aggregate energy release could represent a substantial heating mechanism, presuming they are sufficiently abundant. One way to test this presumption is via the flare frequency distribution, which describes how often flares of various energies occur. If the slope of the power law fitting the flare frequency distribution is above a critical threshold, $α=2$ as established in prior literature, then there should be a sufficient abundance of nanoflares to explain coronal heating. We performed $>$600 case studies of solar flares, made possible by an unprecedented number of data analysts via three semesters of an undergraduate physics laboratory course. This allowed us to include two crucial, but nontrivial, analysis methods: pre-flare baseline subtraction and computation of the flare energy, which requires determining flare start and stop times. We aggregated the results of these analyses into a statistical study to determine that $α= 1.63 \pm 0.03$. This is below the critical threshold, suggesting that Alfvén waves are an important driver of coronal heating.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
OpenViVQA: Task, Dataset, and Multimodal Fusion Models for Visual Question Answering in Vietnamese
Authors:
Nghia Hieu Nguyen,
Duong T. D. Vo,
Kiet Van Nguyen,
Ngan Luu-Thuy Nguyen
Abstract:
In recent years, visual question answering (VQA) has attracted attention from the research community because of its highly potential applications (such as virtual assistance on intelligent cars, assistant devices for blind people, or information retrieval from document images using natural language as queries) and challenge. The VQA task requires methods that have the ability to fuse the informati…
▽ More
In recent years, visual question answering (VQA) has attracted attention from the research community because of its highly potential applications (such as virtual assistance on intelligent cars, assistant devices for blind people, or information retrieval from document images using natural language as queries) and challenge. The VQA task requires methods that have the ability to fuse the information from questions and images to produce appropriate answers. Neural visual question answering models have achieved tremendous growth on large-scale datasets which are mostly for resource-rich languages such as English. However, available datasets narrow the VQA task as the answers selection task or answer classification task. We argue that this form of VQA is far from human ability and eliminates the challenge of the answering aspect in the VQA task by just selecting answers rather than generating them. In this paper, we introduce the OpenViVQA (Open-domain Vietnamese Visual Question Answering) dataset, the first large-scale dataset for VQA with open-ended answers in Vietnamese, consists of 11,000+ images associated with 37,000+ question-answer pairs (QAs). Moreover, we proposed FST, QuMLAG, and MLPAG which fuse information from images and answers, then use these fused features to construct answers as humans iteratively. Our proposed methods achieve results that are competitive with SOTA models such as SAAA, MCAN, LORA, and M4C. The dataset is available to encourage the research community to develop more generalized algorithms including transformers for low-resource languages such as Vietnamese.
△ Less
Submitted 6 May, 2023;
originally announced May 2023.
-
Mitigating stimulated Brillouin scattering in multimode fibers with focused output via wavefront sha**
Authors:
Chun-Wei Chen,
Linh V. Nguyen,
Kabish Wisal,
Shuen Wei,
Stephen C. Warren-Smith,
Ori Henderson-Sapir,
Erik P. Schartner,
Peyman Ahmadi,
Heike Ebendorff-Heidepriem,
A. Douglas Stone,
David J. Ottaway,
Hui Cao
Abstract:
The key challenge for high-power delivery through optical fibers is overcoming nonlinear optical effects. To keep a smooth output beam, most techniques for mitigating optical nonlinearities are restricted to single-mode fibers. Moving out of the single-mode paradigm, we show experimentally that wavefront-sha** of coherent input light that is incident on a highly multimode fiber can increase the…
▽ More
The key challenge for high-power delivery through optical fibers is overcoming nonlinear optical effects. To keep a smooth output beam, most techniques for mitigating optical nonlinearities are restricted to single-mode fibers. Moving out of the single-mode paradigm, we show experimentally that wavefront-sha** of coherent input light that is incident on a highly multimode fiber can increase the power threshold for stimulated Brillouin scattering (SBS) by an order of magnitude, whilst simultaneously controlling the output beam profile. The theory reveals that the suppression of SBS is due to the relative weakness of intermodal scattering compared to intramodal scattering, and to an effective broadening of the Brillouin spectrum under multimode excitation. Our method is efficient, robust, and applicable to continuous waves and pulses. This work points toward a promising route for suppressing detrimental nonlinear effects in optical fibers, which will enable further power scaling of high-power fiber systems for applications to directed energy, remote sensing, and gravitational-wave detection.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection
Authors:
Thuy Dung Nguyen,
Anh Duy Nguyen,
Kok-Seng Wong,
Huy Hieu Pham,
Thanh Hung Nguyen,
Phi Le Nguyen,
Truong Thao Nguyen
Abstract:
Federated learning (FL) enables multiple clients to train a model without compromising sensitive data. The decentralized nature of FL makes it susceptible to adversarial attacks, especially backdoor insertion during training. Recently, the edge-case backdoor attack employing the tail of the data distribution has been proposed as a powerful one, raising questions about the shortfall in current defe…
▽ More
Federated learning (FL) enables multiple clients to train a model without compromising sensitive data. The decentralized nature of FL makes it susceptible to adversarial attacks, especially backdoor insertion during training. Recently, the edge-case backdoor attack employing the tail of the data distribution has been proposed as a powerful one, raising questions about the shortfall in current defenses' robustness guarantees. Specifically, most existing defenses cannot eliminate edge-case backdoor attacks or suffer from a trade-off between backdoor-defending effectiveness and overall performance on the primary task. To tackle this challenge, we propose FedGrad, a novel backdoor-resistant defense for FL that is resistant to cutting-edge backdoor attacks, including the edge-case attack, and performs effectively under heterogeneous client data and a large number of compromised clients. FedGrad is designed as a two-layer filtering mechanism that thoroughly analyzes the ultimate layer's gradient to identify suspicious local updates and remove them from the aggregation process. We evaluate FedGrad under different attack scenarios and show that it significantly outperforms state-of-the-art defense mechanisms. Notably, FedGrad can almost 100% correctly detect the malicious participants, thus providing a significant reduction in the backdoor effect (e.g., backdoor accuracy is less than 8%) while not reducing the main accuracy on the primary task.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.
-
Non-Contact Heart Rate Measurement from Deteriorated Videos
Authors:
Nhi Nguyen,
Le Nguyen,
Constantino Álvarez Casado,
Olli Silvén,
Miguel Bordallo López
Abstract:
Remote photoplethysmography (rPPG) offers a state-of-the-art, non-contact methodology for estimating human pulse by analyzing facial videos. Despite its potential, rPPG methods can be susceptible to various artifacts, such as noise, occlusions, and other obstructions caused by sunglasses, masks, or even involuntary facial contact, such as individuals inadvertently touching their faces. In this stu…
▽ More
Remote photoplethysmography (rPPG) offers a state-of-the-art, non-contact methodology for estimating human pulse by analyzing facial videos. Despite its potential, rPPG methods can be susceptible to various artifacts, such as noise, occlusions, and other obstructions caused by sunglasses, masks, or even involuntary facial contact, such as individuals inadvertently touching their faces. In this study, we apply image processing transformations to intentionally degrade video quality, mimicking these challenging conditions, and subsequently evaluate the performance of both non-learning and learning-based rPPG methods on the deteriorated data. Our results reveal a significant decrease in accuracy in the presence of these artifacts, prompting us to propose the application of restoration techniques, such as denoising and inpainting, to improve heart-rate estimation outcomes. By addressing these challenging conditions and occlusion artifacts, our approach aims to make rPPG methods more robust and adaptable to real-world situations. To assess the effectiveness of our proposed methods, we undertake comprehensive experiments on three publicly available datasets, encompassing a wide range of scenarios and artifact types. Our findings underscore the potential to construct a robust rPPG system by employing an optimal combination of restoration algorithms and rPPG techniques. Moreover, our study contributes to the advancement of privacy-conscious rPPG methodologies, thereby bolstering the overall utility and impact of this innovative technology in the field of remote heart-rate estimation under realistic and diverse conditions.
△ Less
Submitted 28 April, 2023;
originally announced April 2023.
-
Cross-beam energy transfer in conditions relevant to direct-drive implosions on OMEGA
Authors:
K. L. Nguyen,
L. Yin,
B. J. Albright,
D. H. Edgell,
R. K. Follett,
D. Turnbull,
D. H. Froula,
J. P. Palastro
Abstract:
In cross-beam energy transfer (CBET), the interference of two laser beams ponderomotively drives an ion-acoustic wave that coherently scatters light from one beam into the other. This redirection of laser beam energy can severely inhibit the performance of direct-drive inertial confinement fusion (ICF) implosions. To assess the role of nonlinear and kinetic processes in direct-drive-relevant CBET,…
▽ More
In cross-beam energy transfer (CBET), the interference of two laser beams ponderomotively drives an ion-acoustic wave that coherently scatters light from one beam into the other. This redirection of laser beam energy can severely inhibit the performance of direct-drive inertial confinement fusion (ICF) implosions. To assess the role of nonlinear and kinetic processes in direct-drive-relevant CBET, the energy transfer between two laser beams in the plasma conditions of an ICF implosion at the OMEGA laser facility was modeled using particle-in-cell simulations. For typical laser beam intensities, the simulations are in excellent agreement with linear kinetic theory, indicating that nonlinear processes do not play a role in direct-drive implosions. At higher intensities, CBET can be modified by pump depletion, backward stimulated Raman scattering, or ion trap**, depending on the plasma density.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
Multimodal contrastive learning for diagnosing cardiovascular diseases from electrocardiography (ECG) signals and patient metadata
Authors:
Tue M. Cao,
Nhat H. Tran,
Phi Le Nguyen,
Hieu Pham
Abstract:
This work discusses the use of contrastive learning and deep learning for diagnosing cardiovascular diseases from electrocardiography (ECG) signals. While the ECG signals usually contain 12 leads (channels), many healthcare facilities and devices lack access to all these 12 leads. This raises the problem of how to use only fewer ECG leads to produce meaningful diagnoses with high performance. We i…
▽ More
This work discusses the use of contrastive learning and deep learning for diagnosing cardiovascular diseases from electrocardiography (ECG) signals. While the ECG signals usually contain 12 leads (channels), many healthcare facilities and devices lack access to all these 12 leads. This raises the problem of how to use only fewer ECG leads to produce meaningful diagnoses with high performance. We introduce a simple experiment to test whether contrastive learning can be applied to this task. More specifically, we added the similarity between the embedding vectors when the 12 leads signal and the fewer leads ECG signal to the loss function to bring these representations closer together. Despite its simplicity, this has been shown to have improved the performance of diagnosing with all lead combinations, proving the potential of contrastive learning on this task.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
L1BSR: Exploiting Detector Overlap for Self-Supervised Single-Image Super-Resolution of Sentinel-2 L1B Imagery
Authors:
Ngoc Long Nguyen,
Jérémy Anger,
Axel Davy,
Pablo Arias,
Gabriele Facciolo
Abstract:
High-resolution satellite imagery is a key element for many Earth monitoring applications. Satellites such as Sentinel-2 feature characteristics that are favorable for super-resolution algorithms such as aliasing and band-misalignment. Unfortunately the lack of reliable high-resolution (HR) ground truth limits the application of deep learning methods to this task. In this work we propose L1BSR, a…
▽ More
High-resolution satellite imagery is a key element for many Earth monitoring applications. Satellites such as Sentinel-2 feature characteristics that are favorable for super-resolution algorithms such as aliasing and band-misalignment. Unfortunately the lack of reliable high-resolution (HR) ground truth limits the application of deep learning methods to this task. In this work we propose L1BSR, a deep learning-based method for single-image super-resolution and band alignment of Sentinel-2 L1B 10m bands. The method is trained with self-supervision directly on real L1B data by leveraging overlap** areas in L1B images produced by adjacent CMOS detectors, thus not requiring HR ground truth. Our self-supervised loss is designed to enforce the super-resolved output image to have all the bands correctly aligned. This is achieved via a novel cross-spectral registration network (CSR) which computes an optical flow between images of different spectral bands. The CSR network is also trained with self-supervision using an Anchor-Consistency loss, which we also introduce in this work. We demonstrate the performance of the proposed approach on synthetic and real L1B data, where we show that it obtains comparable results to supervised methods.
△ Less
Submitted 17 April, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Label-Free Concept Bottleneck Models
Authors:
Tuomas Oikarinen,
Subhro Das,
Lam M. Nguyen,
Tsui-Wei Weng
Abstract:
Concept bottleneck models (CBM) are a popular way of creating more interpretable neural networks by having hidden layer neurons correspond to human-understandable concepts. However, existing CBMs and their variants have two crucial limitations: first, they need to collect labeled data for each of the predefined concepts, which is time consuming and labor intensive; second, the accuracy of a CBM is…
▽ More
Concept bottleneck models (CBM) are a popular way of creating more interpretable neural networks by having hidden layer neurons correspond to human-understandable concepts. However, existing CBMs and their variants have two crucial limitations: first, they need to collect labeled data for each of the predefined concepts, which is time consuming and labor intensive; second, the accuracy of a CBM is often significantly lower than that of a standard neural network, especially on more complex datasets. This poor performance creates a barrier for adopting CBMs in practical real world applications. Motivated by these challenges, we propose Label-free CBM which is a novel framework to transform any neural network into an interpretable CBM without labeled concept data, while retaining a high accuracy. Our Label-free CBM has many advantages, it is: scalable - we present the first CBM scaled to ImageNet, efficient - creating a CBM takes only a few hours even for very large datasets, and automated - training it for a new dataset requires minimal human effort. Our code is available at https://github.com/Trustworthy-ML-Lab/Label-free-CBM. Finally, in Appendix B we conduct a large scale user evaluation of the interpretability of our method.
△ Less
Submitted 5 June, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
Numerical differentiation by the polynomial-exponential basis
Authors:
Phuong M. Nguyen,
Thuy T. Le,
Loc H. Nguyen,
Michael V. Klibanov
Abstract:
Our objective is to calculate the derivatives of data corrupted by noise. This is a challenging task as even small amounts of noise can result in significant errors in the computation. This is mainly due to the randomness of the noise, which can result in high-frequency fluctuations. To overcome this challenge, we suggest an approach that involves approximating the data by eliminating high-frequen…
▽ More
Our objective is to calculate the derivatives of data corrupted by noise. This is a challenging task as even small amounts of noise can result in significant errors in the computation. This is mainly due to the randomness of the noise, which can result in high-frequency fluctuations. To overcome this challenge, we suggest an approach that involves approximating the data by eliminating high-frequency terms from the Fourier expansion of the given data with respect to the polynomial-exponential basis. This truncation method helps to regularize the issue, while the use of the polynomial-exponential basis ensures accuracy in the computation. We demonstrate the effectiveness of our approach through numerical examples in one and two dimensions.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Improved Convergence in High Probability of Clipped Gradient Methods with Heavy Tails
Authors:
Ta Duy Nguyen,
Alina Ene,
Huy L. Nguyen
Abstract:
In this work, we study the convergence \emph{in high probability} of clipped gradient methods when the noise distribution has heavy tails, ie., with bounded $p$th moments, for some $1<p\le2$. Prior works in this setting follow the same recipe of using concentration inequalities and an inductive argument with union bound to bound the iterates across all iterations. This method results in an increas…
▽ More
In this work, we study the convergence \emph{in high probability} of clipped gradient methods when the noise distribution has heavy tails, ie., with bounded $p$th moments, for some $1<p\le2$. Prior works in this setting follow the same recipe of using concentration inequalities and an inductive argument with union bound to bound the iterates across all iterations. This method results in an increase in the failure probability by a factor of $T$, where $T$ is the number of iterations. We instead propose a new analysis approach based on bounding the moment generating function of a well chosen supermartingale sequence. We improve the dependency on $T$ in the convergence guarantee for a wide range of algorithms with clipped gradients, including stochastic (accelerated) mirror descent for convex objectives and stochastic gradient descent for nonconvex objectives. This approach naturally allows the algorithms to use time-varying step sizes and clip** parameters when the time horizon is unknown, which appears impossible in prior works. We show that in the case of clipped stochastic mirror descent, problem constants, including the initial distance to the optimum, are not required when setting step sizes and clip** parameters.
△ Less
Submitted 4 April, 2023; v1 submitted 3 April, 2023;
originally announced April 2023.
-
Semi-supervised Neural Machine Translation with Consistency Regularization for Low-Resource Languages
Authors:
Viet H. Pham,
Thang M. Pham,
Giang Nguyen,
Long Nguyen,
Dien Dinh
Abstract:
The advent of deep learning has led to a significant gain in machine translation. However, most of the studies required a large parallel dataset which is scarce and expensive to construct and even unavailable for some languages. This paper presents a simple yet effective method to tackle this problem for low-resource languages by augmenting high-quality sentence pairs and training NMT models in a…
▽ More
The advent of deep learning has led to a significant gain in machine translation. However, most of the studies required a large parallel dataset which is scarce and expensive to construct and even unavailable for some languages. This paper presents a simple yet effective method to tackle this problem for low-resource languages by augmenting high-quality sentence pairs and training NMT models in a semi-supervised manner. Specifically, our approach combines the cross-entropy loss for supervised learning with KL Divergence for unsupervised fashion given pseudo and augmented target sentences derived from the model. We also introduce a SentenceBERT-based filter to enhance the quality of augmenting data by retaining semantically similar sentence pairs. Experimental results show that our approach significantly improves NMT baselines, especially on low-resource datasets with 0.46--2.03 BLEU scores. We also demonstrate that using unsupervised training for augmented data is more efficient than reusing the ground-truth target sentences for supervised learning.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
RADIFUSION: A multi-radiomics deep learning based breast cancer risk prediction model using sequential mammographic images with image attention and bilateral asymmetry refinement
Authors:
Hong Hui Yeoh,
Andrea Liew,
Raphaël Phan,
Fredrik Strand,
Kartini Rahmat,
Tuong Linh Nguyen,
John L. Hopper,
Maxine Tan
Abstract:
Breast cancer is a significant public health concern and early detection is critical for triaging high risk patients. Sequential screening mammograms can provide important spatiotemporal information about changes in breast tissue over time. In this study, we propose a deep learning architecture called RADIFUSION that utilizes sequential mammograms and incorporates a linear image attention mechanis…
▽ More
Breast cancer is a significant public health concern and early detection is critical for triaging high risk patients. Sequential screening mammograms can provide important spatiotemporal information about changes in breast tissue over time. In this study, we propose a deep learning architecture called RADIFUSION that utilizes sequential mammograms and incorporates a linear image attention mechanism, radiomic features, a new gating mechanism to combine different mammographic views, and bilateral asymmetry-based finetuning for breast cancer risk assessment. We evaluate our model on a screening dataset called Cohort of Screen-Aged Women (CSAW) dataset. Based on results obtained on the independent testing set consisting of 1,749 women, our approach achieved superior performance compared to other state-of-the-art models with area under the receiver operating characteristic curves (AUCs) of 0.905, 0.872 and 0.866 in the three respective metrics of 1-year AUC, 2-year AUC and > 2-year AUC. Our study highlights the importance of incorporating various deep learning mechanisms, such as image attention, radiomic features, gating mechanism, and bilateral asymmetry-based fine-tuning, to improve the accuracy of breast cancer risk assessment. We also demonstrate that our model's performance was enhanced by leveraging spatiotemporal information from sequential mammograms. Our findings suggest that RADIFUSION can provide clinicians with a powerful tool for breast cancer risk assessment.
△ Less
Submitted 2 June, 2023; v1 submitted 1 April, 2023;
originally announced April 2023.
-
Subdiffusive Dynamics of Topological Vortex Strings of a Charge Density Wave
Authors:
Gal Orenstein,
Ryan A. Duncan,
Gilberto A. de la Pena Munoz,
Yi**g Huang,
Viktor Krapivin,
Quynh Le Nguyen,
Samuel Teitelbaum,
Anisha G. Singh,
Roman Mankowsky,
Henrik Lemke,
Mathias Sander,
Yunpei Deng,
Christopher Arrell,
Ian R. Fisher,
David A. Reis,
Mariano Trigo
Abstract:
Nonequilibrium states of quantum materials can exhibit exotic properties and enable novel functionality and applications. These transient states are thought to be highly inhomogeneous, involving metastable, self-organized, topologically protected structures, which are inaccessible by most time-resolved measurements. Using ultrafast total x-ray scattering at a free electron laser and a sophisticate…
▽ More
Nonequilibrium states of quantum materials can exhibit exotic properties and enable novel functionality and applications. These transient states are thought to be highly inhomogeneous, involving metastable, self-organized, topologically protected structures, which are inaccessible by most time-resolved measurements. Using ultrafast total x-ray scattering at a free electron laser and a sophisticated scaling analysis, we gain unique access to the dynamics on the relevant mesoscopic length scales. Our results show that ultrafast excitation of LaTe$_3$ leads to formation of vortex strings of the charge density wave, which exhibit anomalous, subdiffusive dynamics. These findings provide rare insight into the nonequilibrium mesoscopic response in a quantum material and establish a general framework to investigate properties of topological defects, which can arrest equilibration and enhance competing orders.
△ Less
Submitted 31 March, 2023;
originally announced April 2023.
-
A Multiple Choices Reading Comprehension Corpus for Vietnamese Language Education
Authors:
Son T. Luu,
Khoi Trong Hoang,
Tuong Quang Pham,
Kiet Van Nguyen,
Ngan Luu-Thuy Nguyen
Abstract:
Machine reading comprehension has been an interesting and challenging task in recent years, with the purpose of extracting useful information from texts. To attain the computer ability to understand the reading text and answer relevant information, we introduce ViMMRC 2.0 - an extension of the previous ViMMRC for the task of multiple-choice reading comprehension in Vietnamese Textbooks which conta…
▽ More
Machine reading comprehension has been an interesting and challenging task in recent years, with the purpose of extracting useful information from texts. To attain the computer ability to understand the reading text and answer relevant information, we introduce ViMMRC 2.0 - an extension of the previous ViMMRC for the task of multiple-choice reading comprehension in Vietnamese Textbooks which contain the reading articles for students from Grade 1 to Grade 12. This dataset has 699 reading passages which are prose and poems, and 5,273 questions. The questions in the new dataset are not fixed with four options as in the previous version. Moreover, the difficulty of questions is increased, which challenges the models to find the correct choice. The computer must understand the whole context of the reading passage, the question, and the content of each choice to extract the right answers. Hence, we propose the multi-stage approach that combines the multi-step attention network (MAN) with the natural language inference (NLI) task to enhance the performance of the reading comprehension model. Then, we compare the proposed methodology with the baseline BERTology models on the new dataset and the ViMMRC 1.0. Our multi-stage models achieved 58.81% by Accuracy on the test set, which is 5.34% better than the highest BERTology models. From the results of the error analysis, we found the challenge of the reading comprehension models is understanding the implicit context in texts and linking them together in order to find the correct answers. Finally, we hope our new dataset will motivate further research in enhancing the language understanding ability of computers in the Vietnamese language.
△ Less
Submitted 31 March, 2023;
originally announced March 2023.
-
Quantum Gates with Oscillating Exchange Interaction
Authors:
Daniel Q. L. Nguyen,
Irina Heinz,
Guido Burkard
Abstract:
Two-qubit gates between spin qubits are often performed using a rectangular or an adiabatic exchange interaction pulse resulting in a CZ gate. An oscillating exchange pulse not only performs a CZ gate, but also enables the iSWAP gate, which offers more flexibility to perform quantum algorithms. We provide a detailed description for two-qubit gates using resonant and off-resonant exchange pulses, g…
▽ More
Two-qubit gates between spin qubits are often performed using a rectangular or an adiabatic exchange interaction pulse resulting in a CZ gate. An oscillating exchange pulse not only performs a CZ gate, but also enables the iSWAP gate, which offers more flexibility to perform quantum algorithms. We provide a detailed description for two-qubit gates using resonant and off-resonant exchange pulses, give conditions for performing the respective gates, and compare their performance to the state-of-the-art static counterpart. We find that for relatively low charge noise the gates still perform reliably and compare to the conventional CZ gate.
△ Less
Submitted 22 August, 2023; v1 submitted 31 March, 2023;
originally announced March 2023.
-
Identification of Negative Transfers in Multitask Learning Using Surrogate Models
Authors:
Dongyue Li,
Huy L. Nguyen,
Hongyang R. Zhang
Abstract:
Multitask learning is widely used in practice to train a low-resource target task by augmenting it with multiple related source tasks. Yet, naively combining all the source tasks with a target task does not always improve the prediction performance for the target task due to negative transfers. Thus, a critical problem in multitask learning is identifying subsets of source tasks that would benefit…
▽ More
Multitask learning is widely used in practice to train a low-resource target task by augmenting it with multiple related source tasks. Yet, naively combining all the source tasks with a target task does not always improve the prediction performance for the target task due to negative transfers. Thus, a critical problem in multitask learning is identifying subsets of source tasks that would benefit the target task. This problem is computationally challenging since the number of subsets grows exponentially with the number of source tasks; efficient heuristics for subset selection do not always capture the relationship between task subsets and multitask learning performances. In this paper, we introduce an efficient procedure to address this problem via surrogate modeling. In surrogate modeling, we sample (random) subsets of source tasks and precompute their multitask learning performances. Then, we approximate the precomputed performances with a linear regression model that can also predict the multitask performance of unseen task subsets. We show theoretically and empirically that fitting this model only requires sampling linearly many subsets in the number of source tasks. The fitted model provides a relevance score between each source and target task. We use the relevance scores to perform subset selection for multitask learning by thresholding. Through extensive experiments, we show that our approach predicts negative transfers from multiple source tasks to target tasks much more accurately than existing task affinity measures. Additionally, we demonstrate that for several weak supervision datasets, our approach consistently improves upon existing optimization methods for multitask learning.
△ Less
Submitted 27 December, 2023; v1 submitted 25 March, 2023;
originally announced March 2023.
-
Revealing Weaknesses of Vietnamese Language Models Through Unanswerable Questions in Machine Reading Comprehension
Authors:
Son Quoc Tran,
Phong Nguyen-Thuan Do,
Kiet Van Nguyen,
Ngan Luu-Thuy Nguyen
Abstract:
Although the curse of multilinguality significantly restricts the language abilities of multilingual models in monolingual settings, researchers now still have to rely on multilingual models to develop state-of-the-art systems in Vietnamese Machine Reading Comprehension. This difficulty in researching is because of the limited number of high-quality works in develo** Vietnamese language models.…
▽ More
Although the curse of multilinguality significantly restricts the language abilities of multilingual models in monolingual settings, researchers now still have to rely on multilingual models to develop state-of-the-art systems in Vietnamese Machine Reading Comprehension. This difficulty in researching is because of the limited number of high-quality works in develo** Vietnamese language models. In order to encourage more work in this research field, we present a comprehensive analysis of language weaknesses and strengths of current Vietnamese monolingual models using the downstream task of Machine Reading Comprehension. From the analysis results, we suggest new directions for develo** Vietnamese language models. Besides this main contribution, we also successfully reveal the existence of artifacts in Vietnamese Machine Reading Comprehension benchmarks and suggest an urgent need for new high-quality benchmarks to track the progress of Vietnamese Machine Reading Comprehension. Moreover, we also introduced a minor but valuable modification to the process of annotating unanswerable questions for Machine Reading Comprehension from previous work. Our proposed modification helps improve the quality of unanswerable questions to a higher level of difficulty for Machine Reading Comprehension systems to solve.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Minimizing Fuzzy Interpretations in Fuzzy Description Logics by Using Crisp Bisimulations
Authors:
Linh Anh Nguyen
Abstract:
The problem of minimizing finite fuzzy interpretations in fuzzy description logics (FDLs) is worth studying. For example, the structure of a fuzzy/weighted social network can be treated as a fuzzy interpretation in FDLs, where actors are individuals and actions are roles. Minimizing the structure of a fuzzy/weighted social network makes it more compact, thus making network analysis tasks more effi…
▽ More
The problem of minimizing finite fuzzy interpretations in fuzzy description logics (FDLs) is worth studying. For example, the structure of a fuzzy/weighted social network can be treated as a fuzzy interpretation in FDLs, where actors are individuals and actions are roles. Minimizing the structure of a fuzzy/weighted social network makes it more compact, thus making network analysis tasks more efficient. In this work, we study the problem of minimizing a finite fuzzy interpretation in a FDL by using the largest crisp auto-bisimulation. The considered FDLs use the Baaz projection operator and their semantics is specified using an abstract algebra of fuzzy truth values, which can be any linear and complete residuated lattice. We provide an efficient algorithm with a complexity of $O((m \log{l} + n) \log{n})$ for minimizing a given finite fuzzy interpretation $\mathcal{I}$, where $n$ is the size of the domain of $\mathcal{I}$, $m$ is number of nonzero instances of atomic roles of $\mathcal{I}$ and $l$ is the number of different fuzzy values used for instances of atomic roles of $\mathcal{I}$. We prove that the fuzzy interpretation returned by the algorithm is minimal among the ones that preserve fuzzy TBoxes and ABoxes under certain conditions.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
Training Invertible Neural Networks as Autoencoders
Authors:
The-Gia Leo Nguyen,
Lynton Ardizzone,
Ullrich Köthe
Abstract:
Autoencoders are able to learn useful data representations in an unsupervised matter and have been widely used in various machine learning and computer vision tasks. In this work, we present methods to train Invertible Neural Networks (INNs) as (variational) autoencoders which we call INN (variational) autoencoders. Our experiments on MNIST, CIFAR and CelebA show that for low bottleneck sizes our…
▽ More
Autoencoders are able to learn useful data representations in an unsupervised matter and have been widely used in various machine learning and computer vision tasks. In this work, we present methods to train Invertible Neural Networks (INNs) as (variational) autoencoders which we call INN (variational) autoencoders. Our experiments on MNIST, CIFAR and CelebA show that for low bottleneck sizes our INN autoencoder achieves results similar to the classical autoencoder. However, for large bottleneck sizes our INN autoencoder outperforms its classical counterpart. Based on the empirical results, we hypothesize that INN autoencoders might not have any intrinsic information loss and thereby are not bounded to a maximal number of layers (depth) after which only suboptimal results can be achieved.
△ Less
Submitted 21 March, 2023; v1 submitted 20 March, 2023;
originally announced March 2023.
-
One-Bit Massive MIMO Precoding for Frequency-Selective Fading Channels
Authors:
Ly V. Nguyen,
Lu Liu,
Nguyen Linh-Trung,
A. Lee Swindlehurst
Abstract:
One-bit digital-to-analog converters (DACs) are a practical and promising solution for reducing cost and power consumption in massive multiple-input multiple-output (MIMO) systems. However, the one-bit precoding problem is NP-hard and even more challenging in frequency-selective fading channels compared to the flat-fading scenario. While block-wise processing (BWP) can effectively address the inte…
▽ More
One-bit digital-to-analog converters (DACs) are a practical and promising solution for reducing cost and power consumption in massive multiple-input multiple-output (MIMO) systems. However, the one-bit precoding problem is NP-hard and even more challenging in frequency-selective fading channels compared to the flat-fading scenario. While block-wise processing (BWP) can effectively address the inter-symbol-interference (ISI) in frequency-selective fading channels, its computational complexity and processing delay can be too high for practical implementation. An alternative solution to alleviate the processing complexity and delay issues is symbol-wise processing (SWP) which sequentially designs the transmit signals. However, existing SWP work leaves unwanted interference for later signal designs. In this paper, we propose an SWP approach which can efficiently address the ISI even at the symbol rate. The idea is to design the transmit signal to not only be beneficial for its time slot, but also to provide constructive interference for subsequent symbols. We develop two active ISI processing methods that significantly outperform a conventional approach, one of which that even outperforms the BWP approach at low SNR.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Origin of octupole deformation softness in atomic nuclei
Authors:
Minh-Loc Bui,
Le-Anh Nguyen,
Panagiota Papakonstantinou,
Naftali Auerbach
Abstract:
Recent high-energy heavy ion collision experiments have revealed that some atomic nuclei exhibit unusual softness and significant shape fluctuations. In this work, we use the fully self-consistent mean-field theory to identify all even-even nuclei that are unstable or soft against octupole deformation. All exceptional cases of enhanced octupole transition strengths in stable even-even nuclei throu…
▽ More
Recent high-energy heavy ion collision experiments have revealed that some atomic nuclei exhibit unusual softness and significant shape fluctuations. In this work, we use the fully self-consistent mean-field theory to identify all even-even nuclei that are unstable or soft against octupole deformation. All exceptional cases of enhanced octupole transition strengths in stable even-even nuclei throughout the nuclide chart are resolved and the origin is found in basic shell structure. The presence of atomic nuclei exhibiting significant softness to quadrupole-octupole deformation is suggested. These results represent a significant advance in our understanding of the underlying mechanisms of nuclear octupole deformation and have implications for further experimental and theoretical studies.
△ Less
Submitted 25 July, 2023; v1 submitted 20 March, 2023;
originally announced March 2023.
-
High Accurate and Explainable Multi-Pill Detection Framework with Graph Neural Network-Assisted Multimodal Data Fusion
Authors:
Anh Duy Nguyen,
Huy Hieu Pham,
Huynh Thanh Trung,
Quoc Viet Hung Nguyen,
Thao Nguyen Truong,
Phi Le Nguyen
Abstract:
Due to the significant resemblance in visual appearance, pill misuse is prevalent and has become a critical issue, responsible for one-third of all deaths worldwide. Pill identification, thus, is a crucial concern needed to be investigated thoroughly. Recently, several attempts have been made to exploit deep learning to tackle the pill identification problem. However, most published works consider…
▽ More
Due to the significant resemblance in visual appearance, pill misuse is prevalent and has become a critical issue, responsible for one-third of all deaths worldwide. Pill identification, thus, is a crucial concern needed to be investigated thoroughly. Recently, several attempts have been made to exploit deep learning to tackle the pill identification problem. However, most published works consider only single-pill identification and fail to distinguish hard samples with identical appearances. Also, most existing pill image datasets only feature single pill images captured in carefully controlled environments under ideal lighting conditions and clean backgrounds. In this work, we are the first to tackle the multi-pill detection problem in real-world settings, aiming at localizing and identifying pills captured by users in a pill intake. Moreover, we also introduce a multi-pill image dataset taken in unconstrained conditions. To handle hard samples, we propose a novel method for constructing heterogeneous a priori graphs incorporating three forms of inter-pill relationships, including co-occurrence likelihood, relative size, and visual semantic correlation. We then offer a framework for integrating a priori with pills' visual features to enhance detection accuracy. Our experimental results have proved the robustness, reliability, and explainability of the proposed framework. Experimentally, it outperforms all detection benchmarks in terms of all evaluation metrics. Specifically, our proposed framework improves COCO mAP metrics by 9.4% over Faster R-CNN and 12.0% compared to vanilla YOLOv5. Our study opens up new opportunities for protecting patients from medication errors using an AI-based pill identification solution.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Retrieval of material properties of monolayer transition-metal dichalcogenides from magnetoexciton energy spectra
Authors:
Duy-Nhat Ly,
Dai-Nam Le,
Duy-Anh P. Nguyen,
Ngoc-Tram D. Hoang,
Ngoc-Hung Phan,
Hoang-Minh L. Nguyen,
Van-Hoang Le
Abstract:
Reduced exciton mass, polarizability, and dielectric constant of the surrounding medium are essential properties for semiconducting materials, and they have been extracted recently from the magnetoexciton energies. However, the acceptable accuracy of the suggested method requires very high magnetic intensity. Therefore, in the present paper, we propose an alternative method of extracting these mat…
▽ More
Reduced exciton mass, polarizability, and dielectric constant of the surrounding medium are essential properties for semiconducting materials, and they have been extracted recently from the magnetoexciton energies. However, the acceptable accuracy of the suggested method requires very high magnetic intensity. Therefore, in the present paper, we propose an alternative method of extracting these material properties from recently available experimental magnetoexciton s-state energies in monolayer transition-metal dichalcogenides (TMDCs). The method is based on the high sensitivity of exciton energies to the material parameters in the Rytova-Keldysh model. It allows us to vary the considered material parameters to get the best fit of the theoretical calculation to the experimental exciton energies for the $1s$, $2s$, and $3s$ states. This procedure gives values of the exciton reduced mass and $2D$ polarizability. Then, the experimental magnetoexciton spectra compared to the theoretical calculation also determine the average dielectric constant. Concrete applications are presented only for monolayers WSe$_2$ and WS$_2$ from the recently available experimental data; however, the presented approach is universal and can be applied to other monolayer TMDCs. The mentioned fitting procedure requires a fast and effective method of solving the Schrödinger equation of an exciton in monolayer TMDCs with a magnetic field. Therefore, we also develop such a method in this paper for highly accurate magnetoexciton energies.
△ Less
Submitted 24 April, 2023; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
Authors:
Linh T. Nguyen,
Lam Duc Nguyen,
Thong Hoang,
Dilum Bandara,
Qin Wang,
Qinghua Lu,
Xiwei Xu,
Liming Zhu,
Petar Popovski,
Shi** Chen
Abstract:
Various data-sharing platforms have emerged with the growing public demand for open data and legislation mandating certain data to remain open. Most of these platforms remain opaque, leading to many questions about data accuracy, provenance and lineage, privacy implications, consent management, and the lack of fair incentives for data providers. With their transparency, immutability, non-repudiati…
▽ More
Various data-sharing platforms have emerged with the growing public demand for open data and legislation mandating certain data to remain open. Most of these platforms remain opaque, leading to many questions about data accuracy, provenance and lineage, privacy implications, consent management, and the lack of fair incentives for data providers. With their transparency, immutability, non-repudiation, and decentralization properties, blockchains could not be more apt to answer these questions and enhance trust in a data-sharing platform. However, blockchains are not good at handling the four Vs of big data (i.e., volume, variety, velocity, and veracity) due to their limited performance, scalability, and high cost. Given many related works proposes blockchain-based trustworthy data-sharing solutions, there is increasing confusion and difficulties in understanding and selecting these technologies and platforms in terms of their sharing mechanisms, sharing services, quality of services, and applications. In this paper, we conduct a comprehensive survey on blockchain-based data-sharing architectures and applications to fill the gap. First, we present the foundations of blockchains and discuss the challenges of current data-sharing techniques. Second, we focus on the convergence of blockchain and data sharing to give a clear picture of this landscape and propose a reference architecture for blockchain-based data sharing. Third, we discuss the industrial applications of blockchain-based data sharing, ranging from healthcare and smart grid to transportation and decarbonization. For each application, we provide lessons learned for the deployment of Blockchain-based data sharing. Finally, we discuss research challenges and open research directions.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Handheld Burst Super-Resolution Meets Multi-Exposure Satellite Imagery
Authors:
Jamy Lafenetre,
Ngoc Long Nguyen,
Gabriele Facciolo,
Thomas Eboli
Abstract:
Image resolution is an important criterion for many applications based on satellite imagery. In this work, we adapt a state-of-the-art kernel regression technique for smartphone camera burst super-resolution to satellites. This technique leverages the local structure of the image to optimally steer the fusion kernels, limiting blur in the final high-resolution prediction, denoising the image, and…
▽ More
Image resolution is an important criterion for many applications based on satellite imagery. In this work, we adapt a state-of-the-art kernel regression technique for smartphone camera burst super-resolution to satellites. This technique leverages the local structure of the image to optimally steer the fusion kernels, limiting blur in the final high-resolution prediction, denoising the image, and recovering details up to a zoom factor of 2. We extend this approach to the multi-exposure case to predict from a sequence of multi-exposure low-resolution frames a high-resolution and noise-free one. Experiments on both single and multi-exposure scenarios show the merits of the approach. Since the fusion is learning-free, the proposed method is ensured to not hallucinate details, which is crucial for many remote sensing applications.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Semantic-Preserving Augmentation for Robust Image-Text Retrieval
Authors:
Sunwoo Kim,
Kyuhong Shim,
Luong Trung Nguyen,
Byonghyo Shim
Abstract:
Image text retrieval is a task to search for the proper textual descriptions of the visual world and vice versa. One challenge of this task is the vulnerability to input image and text corruptions. Such corruptions are often unobserved during the training, and degrade the retrieval model decision quality substantially. In this paper, we propose a novel image text retrieval technique, referred to a…
▽ More
Image text retrieval is a task to search for the proper textual descriptions of the visual world and vice versa. One challenge of this task is the vulnerability to input image and text corruptions. Such corruptions are often unobserved during the training, and degrade the retrieval model decision quality substantially. In this paper, we propose a novel image text retrieval technique, referred to as robust visual semantic embedding (RVSE), which consists of novel image-based and text-based augmentation techniques called semantic preserving augmentation for image (SPAugI) and text (SPAugT). Since SPAugI and SPAugT change the original data in a way that its semantic information is preserved, we enforce the feature extractors to generate semantic aware embedding vectors regardless of the corruption, improving the model robustness significantly. From extensive experiments using benchmark datasets, we show that RVSE outperforms conventional retrieval schemes in terms of image-text retrieval performance.
△ Less
Submitted 9 March, 2023;
originally announced March 2023.
-
Backdoor Attacks and Defenses in Federated Learning: Survey, Challenges and Future Research Directions
Authors:
Thuy Dung Nguyen,
Tuan Nguyen,
Phi Le Nguyen,
Hieu H. Pham,
Khoa Doan,
Kok-Seng Wong
Abstract:
Federated learning (FL) is a machine learning (ML) approach that allows the use of distributed data without compromising personal privacy. However, the heterogeneous distribution of data among clients in FL can make it difficult for the orchestration server to validate the integrity of local model updates, making FL vulnerable to various threats, including backdoor attacks. Backdoor attacks involv…
▽ More
Federated learning (FL) is a machine learning (ML) approach that allows the use of distributed data without compromising personal privacy. However, the heterogeneous distribution of data among clients in FL can make it difficult for the orchestration server to validate the integrity of local model updates, making FL vulnerable to various threats, including backdoor attacks. Backdoor attacks involve the insertion of malicious functionality into a targeted model through poisoned updates from malicious clients. These attacks can cause the global model to misbehave on specific inputs while appearing normal in other cases. Backdoor attacks have received significant attention in the literature due to their potential to impact real-world deep learning applications. However, they have not been thoroughly studied in the context of FL. In this survey, we provide a comprehensive survey of current backdoor attack strategies and defenses in FL, including a comprehensive analysis of different approaches. We also discuss the challenges and potential future directions for attacks and defenses in the context of FL.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
A Geometrical Structure for Predator-Avoidance Fish Schooling
Authors:
Aditya Dewanto Hartono,
Ton Viet Ta,
Linh Thi Hoai Nguyen
Abstract:
This paper conducts a numerical study of a geometrical structure called $ε$-school for predator-avoidance fish schools, based on our previous mathematical model. Our results show that during a predator attack, the number of $ε$-school increases from one to a certain value. After the attack, the number of $ε$-school decreases in the first two predator-avoidance patterns, but continues to increase i…
▽ More
This paper conducts a numerical study of a geometrical structure called $ε$-school for predator-avoidance fish schools, based on our previous mathematical model. Our results show that during a predator attack, the number of $ε$-school increases from one to a certain value. After the attack, the number of $ε$-school decreases in the first two predator-avoidance patterns, but continues to increase in the third pattern. A constant value for the number of the $ε$-school is observed in the last pattern. These suggests that when the predator is approaching, each individual in the school focuses more on avoiding the predator, rather than on interacting with its schoolmates. Such a trait is in agreement with real-life behavior in the natural ecosystem.
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Improved Space Bounds for Learning with Experts
Authors:
Anders Aamand,
Justin Y. Chen,
Huy Lê Nguyen,
Sandeep Silwal
Abstract:
We give improved tradeoffs between space and regret for the online learning with expert advice problem over $T$ days with $n$ experts. Given a space budget of $n^δ$ for $δ\in (0,1)$, we provide an algorithm achieving regret $\tilde{O}(n^2 T^{1/(1+δ)})$, improving upon the regret bound $\tilde{O}(n^2 T^{2/(2+δ)})$ in the recent work of [PZ23]. The improvement is particularly salient in the regime…
▽ More
We give improved tradeoffs between space and regret for the online learning with expert advice problem over $T$ days with $n$ experts. Given a space budget of $n^δ$ for $δ\in (0,1)$, we provide an algorithm achieving regret $\tilde{O}(n^2 T^{1/(1+δ)})$, improving upon the regret bound $\tilde{O}(n^2 T^{2/(2+δ)})$ in the recent work of [PZ23]. The improvement is particularly salient in the regime $δ\rightarrow 1$ where the regret of our algorithm approaches $\tilde{O}_n(\sqrt{T})$, matching the $T$ dependence in the standard online setting without space restrictions.
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Proton \textit{s}-resonance states of $^{12}$C and $^{14,15}$O within the Skyrme Hartree-Fock mean-field framework
Authors:
Le-Anh Nguyen,
Young-ho Song,
Minh-Loc Bui
Abstract:
The excitation functions of proton elastic scattering on $^{12}$C and $^{14,15}$O nuclei at the energies near the proton-emission threshold are calculated using the Skyrme Hartree-Fock (SHF) in continuum approach. For each excitation function, the first resonance is identified as the $s$-state resonance of the mean-field theory. For $^{15}$O, whose ground-state spin is nonzero, the $s$-state reson…
▽ More
The excitation functions of proton elastic scattering on $^{12}$C and $^{14,15}$O nuclei at the energies near the proton-emission threshold are calculated using the Skyrme Hartree-Fock (SHF) in continuum approach. For each excitation function, the first resonance is identified as the $s$-state resonance of the mean-field theory. For $^{15}$O, whose ground-state spin is nonzero, the $s$-state resonance splits into two resonances via the spin-spin component of the optical potential. With a slight adjustment of the strength of central potential, which is obtained from the SHF in continuum approach, the excitation functions of proton elastic scattering for the three nuclei can be explained with high accuracy. The proposed framework can provide a practical method to explain nuclear scattering at the energies near the proton-emission threshold with minimal experimental input.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
High Probability Convergence of Stochastic Gradient Methods
Authors:
Zijian Liu,
Ta Duy Nguyen,
Thien Hang Nguyen,
Alina Ene,
Huy Lê Nguyen
Abstract:
In this work, we describe a generic approach to show convergence with high probability for both stochastic convex and non-convex optimization with sub-Gaussian noise. In previous works for convex optimization, either the convergence is only in expectation or the bound depends on the diameter of the domain. Instead, we show high probability convergence with bounds depending on the initial distance…
▽ More
In this work, we describe a generic approach to show convergence with high probability for both stochastic convex and non-convex optimization with sub-Gaussian noise. In previous works for convex optimization, either the convergence is only in expectation or the bound depends on the diameter of the domain. Instead, we show high probability convergence with bounds depending on the initial distance to the optimal solution. The algorithms use step sizes analogous to the standard settings and are universal to Lipschitz functions, smooth functions, and their linear combinations. This method can be applied to the non-convex case. We demonstrate an $O((1+σ^{2}\log(1/δ))/T+σ/\sqrt{T})$ convergence rate when the number of iterations $T$ is known and an $O((1+σ^{2}\log(T/δ))/\sqrt{T})$ convergence rate when $T$ is unknown for SGD, where $1-δ$ is the desired success probability. These bounds improve over existing bounds in the literature. Additionally, we demonstrate that our techniques can be used to obtain high probability bound for AdaGrad-Norm (Ward et al., 2019) that removes the bounded gradients assumption from previous works. Furthermore, our technique for AdaGrad-Norm extends to the standard per-coordinate AdaGrad algorithm (Duchi et al., 2011), providing the first noise-adapted high probability convergence for AdaGrad.
△ Less
Submitted 28 February, 2023;
originally announced February 2023.
-
Interval optimization problems on Hadamard manifolds:Solvability and Duality
Authors:
Le Tram Nguyen,
Yu-Lin Chang,
Chu-Chin Hu,
Jein-Shan Chen
Abstract:
In this paper, we will study about the solvability and duality of interval optimization problems on Hadamard manifolds. It includes the KKT conditions, and Wofle dual problem with weak duality and strong duality. These results are the complement for the solvability of interval optimization problems on Hadamard manifolds.
In this paper, we will study about the solvability and duality of interval optimization problems on Hadamard manifolds. It includes the KKT conditions, and Wofle dual problem with weak duality and strong duality. These results are the complement for the solvability of interval optimization problems on Hadamard manifolds.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
EVJVQA Challenge: Multilingual Visual Question Answering
Authors:
Ngan Luu-Thuy Nguyen,
Nghia Hieu Nguyen,
Duong T. D Vo,
Khanh Quoc Tran,
Kiet Van Nguyen
Abstract:
Visual Question Answering (VQA) is a challenging task of natural language processing (NLP) and computer vision (CV), attracting significant attention from researchers. English is a resource-rich language that has witnessed various developments in datasets and models for visual question answering. Visual question answering in other languages also would be developed for resources and models. In addi…
▽ More
Visual Question Answering (VQA) is a challenging task of natural language processing (NLP) and computer vision (CV), attracting significant attention from researchers. English is a resource-rich language that has witnessed various developments in datasets and models for visual question answering. Visual question answering in other languages also would be developed for resources and models. In addition, there is no multilingual dataset targeting the visual content of a particular country with its own objects and cultural characteristics. To address the weakness, we provide the research community with a benchmark dataset named EVJVQA, including 33,000+ pairs of question-answer over three languages: Vietnamese, English, and Japanese, on approximately 5,000 images taken from Vietnam for evaluating multilingual VQA systems or models. EVJVQA is used as a benchmark dataset for the challenge of multilingual visual question answering at the 9th Workshop on Vietnamese Language and Speech Processing (VLSP 2022). This task attracted 62 participant teams from various universities and organizations. In this article, we present details of the organization of the challenge, an overview of the methods employed by shared-task participants, and the results. The highest performances are 0.4392 in F1-score and 0.4009 in BLUE on the private test set. The multilingual QA systems proposed by the top 2 teams use ViT for the pre-trained vision model and mT5 for the pre-trained language model, a powerful pre-trained language model based on the transformer architecture. EVJVQA is a challenging dataset that motivates NLP and CV researchers to further explore the multilingual models or systems for visual question answering systems. We released the challenge on the Codalab evaluation system for further research.
△ Less
Submitted 17 April, 2024; v1 submitted 22 February, 2023;
originally announced February 2023.
-
On The Role of Alias and Band-Shift for Sentinel-2 Super-Resolution
Authors:
Ngoc Long Nguyen,
Jérémy Anger,
Lara Raad,
Bruno Galerne,
Gabriele Facciolo
Abstract:
In this work, we study the problem of single-image super-resolution (SISR) of Sentinel-2 imagery. We show that thanks to its unique sensor specification, namely the inter-band shift and alias, that deep-learning methods are able to recover fine details. By training a model using a simple $L_1$ loss, results are free of hallucinated details. For this study, we build a dataset of pairs of images Sen…
▽ More
In this work, we study the problem of single-image super-resolution (SISR) of Sentinel-2 imagery. We show that thanks to its unique sensor specification, namely the inter-band shift and alias, that deep-learning methods are able to recover fine details. By training a model using a simple $L_1$ loss, results are free of hallucinated details. For this study, we build a dataset of pairs of images Sentinel-2/PlanetScope to train and evaluate our super-resolution (SR) model.
△ Less
Submitted 17 April, 2023; v1 submitted 22 February, 2023;
originally announced February 2023.
-
Eight-node solid brick element high-order stiffness matrix template
Authors:
Boning Zhang,
Lan Nguyen
Abstract:
In this paper, the template will be developed from an assumed Stress Method, which its formulation is based on the Hellinger-Reissner principle developed according to Kang's study in 1986. The element stiffness is decomposed into a basic part that takes care of consistency and mix-ability, and a HO element stiffness part that takes care of stability (also known as rank sufficient) and accuracy. In…
▽ More
In this paper, the template will be developed from an assumed Stress Method, which its formulation is based on the Hellinger-Reissner principle developed according to Kang's study in 1986. The element stiffness is decomposed into a basic part that takes care of consistency and mix-ability, and a HO element stiffness part that takes care of stability (also known as rank sufficient) and accuracy. In the FE method, the HO stiffness is based on a displacement formulation, whereas the basis stiffness is method independent. To start, one should be familiar with the definition of a solid brick element. Solid brick element is three-dimensional finite elements that can model solid bodies and structures without any a priori geometric simplification.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
CADIS: Handling Cluster-skewed Non-IID Data in Federated Learning with Clustered Aggregation and Knowledge DIStilled Regularization
Authors:
Nang Hung Nguyen,
Duc Long Nguyen,
Trong Bang Nguyen,
Thanh-Hung Nguyen,
Huy Hieu Pham,
Truong Thao Nguyen,
Phi Le Nguyen
Abstract:
Federated learning enables edge devices to train a global model collaboratively without exposing their data. Despite achieving outstanding advantages in computing efficiency and privacy protection, federated learning faces a significant challenge when dealing with non-IID data, i.e., data generated by clients that are typically not independent and identically distributed. In this paper, we tackle…
▽ More
Federated learning enables edge devices to train a global model collaboratively without exposing their data. Despite achieving outstanding advantages in computing efficiency and privacy protection, federated learning faces a significant challenge when dealing with non-IID data, i.e., data generated by clients that are typically not independent and identically distributed. In this paper, we tackle a new type of Non-IID data, called cluster-skewed non-IID, discovered in actual data sets. The cluster-skewed non-IID is a phenomenon in which clients can be grouped into clusters with similar data distributions. By performing an in-depth analysis of the behavior of a classification model's penultimate layer, we introduce a metric that quantifies the similarity between two clients' data distributions without violating their privacy. We then propose an aggregation scheme that guarantees equality between clusters. In addition, we offer a novel local training regularization based on the knowledge-distillation technique that reduces the overfitting problem at clients and dramatically boosts the training scheme's performance. We theoretically prove the superiority of the proposed aggregation over the benchmark FedAvg. Extensive experimental results on both standard public datasets and our in-house real-world dataset demonstrate that the proposed approach improves accuracy by up to 16% compared to the FedAvg algorithm.
△ Less
Submitted 15 April, 2023; v1 submitted 20 February, 2023;
originally announced February 2023.
-
Assessing Domain Gap for Continual Domain Adaptation in Object Detection
Authors:
Anh-Dzung Doan,
Bach Long Nguyen,
Surabhi Gupta,
Ian Reid,
Markus Wagner,
Tat-Jun Chin
Abstract:
To ensure reliable object detection in autonomous systems, the detector must be able to adapt to changes in appearance caused by environmental factors such as time of day, weather, and seasons. Continually adapting the detector to incorporate these changes is a promising solution, but it can be computationally costly. Our proposed approach is to selectively adapt the detector only when necessary,…
▽ More
To ensure reliable object detection in autonomous systems, the detector must be able to adapt to changes in appearance caused by environmental factors such as time of day, weather, and seasons. Continually adapting the detector to incorporate these changes is a promising solution, but it can be computationally costly. Our proposed approach is to selectively adapt the detector only when necessary, using new data that does not have the same distribution as the current training data. To this end, we investigate three popular metrics for domain gap evaluation and find that there is a correlation between the domain gap and detection accuracy. Therefore, we apply the domain gap as a criterion to decide when to adapt the detector. Our experiments show that our approach has the potential to improve the efficiency of the detector's operation in real-world scenarios, where environmental conditions change in a cyclical manner, without sacrificing the overall performance of the detector. Our code is publicly available at https://github.com/dadung/DGE-CDA.
△ Less
Submitted 21 November, 2023; v1 submitted 20 February, 2023;
originally announced February 2023.
-
koopmans: an open-source package for accurately and efficiently predicting spectral properties with Koopmans functionals
Authors:
Edward Linscott,
Nicola Colonna,
Riccardo De Gennaro,
Ngoc Linh Nguyen,
Giovanni Borghi,
Andrea Ferretti,
Ismaila Dabo,
Nicola Marzari
Abstract:
Over the past decade we have developed Koopmans functionals, a computationally efficient approach for predicting spectral properties with an orbital-density-dependent functional framework. These functionals impose a generalized piecewise linearity condition to the entire electronic manifold, ensuring that orbital energies match the corresponding electron removal/addition energy differences (in con…
▽ More
Over the past decade we have developed Koopmans functionals, a computationally efficient approach for predicting spectral properties with an orbital-density-dependent functional framework. These functionals impose a generalized piecewise linearity condition to the entire electronic manifold, ensuring that orbital energies match the corresponding electron removal/addition energy differences (in contrast to semi-local DFT, where a mismatch between the two lies at the heart of the band gap problem and, more generally, the unreliability of Kohn-Sham orbital energies). This strategy has proven to be very powerful, yielding molecular orbital energies and solid-state band structures with comparable accuracy to many-body perturbation theory but at greatly reduced computational cost while preserving a functional formulation. This paper reviews the theory of Koopmans functionals, discusses the algorithms necessary for their implementation, and introduces koopmans, an open-source package that contains all of the code and workflows needed to perform Koopmans functional calculations and obtain reliable spectral properties of molecules and materials.
△ Less
Submitted 7 August, 2023; v1 submitted 15 February, 2023;
originally announced February 2023.
-
ConCerNet: A Contrastive Learning Based Framework for Automated Conservation Law Discovery and Trustworthy Dynamical System Prediction
Authors:
Wang Zhang,
Tsui-Wei Weng,
Subhro Das,
Alexandre Megretski,
Luca Daniel,
Lam M. Nguyen
Abstract:
Deep neural networks (DNN) have shown great capacity of modeling a dynamical system; nevertheless, they usually do not obey physics constraints such as conservation laws. This paper proposes a new learning framework named ConCerNet to improve the trustworthiness of the DNN based dynamics modeling to endow the invariant properties. ConCerNet consists of two steps: (i) a contrastive learning method…
▽ More
Deep neural networks (DNN) have shown great capacity of modeling a dynamical system; nevertheless, they usually do not obey physics constraints such as conservation laws. This paper proposes a new learning framework named ConCerNet to improve the trustworthiness of the DNN based dynamics modeling to endow the invariant properties. ConCerNet consists of two steps: (i) a contrastive learning method to automatically capture the system invariants (i.e. conservation properties) along the trajectory observations; (ii) a neural projection layer to guarantee that the learned dynamics models preserve the learned invariants. We theoretically prove the functional relationship between the learned latent representation and the unknown system invariant function. Experiments show that our method consistently outperforms the baseline neural networks in both coordinate error and conservation metrics by a large margin. With neural network based parameterization and no dependence on prior knowledge, our method can be extended to complex and large-scale dynamics by leveraging an autoencoder.
△ Less
Submitted 19 July, 2023; v1 submitted 11 February, 2023;
originally announced February 2023.
-
High Probability Convergence of Clipped-SGD Under Heavy-tailed Noise
Authors:
Ta Duy Nguyen,
Thien Hang Nguyen,
Alina Ene,
Huy Le Nguyen
Abstract:
While the convergence behaviors of stochastic gradient methods are well understood \emph{in expectation}, there still exist many gaps in the understanding of their convergence with \emph{high probability}, where the convergence rate has a logarithmic dependency on the desired success probability parameter. In the \emph{heavy-tailed noise} setting, where the stochastic gradient noise only has bound…
▽ More
While the convergence behaviors of stochastic gradient methods are well understood \emph{in expectation}, there still exist many gaps in the understanding of their convergence with \emph{high probability}, where the convergence rate has a logarithmic dependency on the desired success probability parameter. In the \emph{heavy-tailed noise} setting, where the stochastic gradient noise only has bounded $p$-th moments for some $p\in(1,2]$, existing works could only show bounds \emph{in expectation} for a variant of stochastic gradient descent (SGD) with clipped gradients, or high probability bounds in special cases (such as $p=2$) or with extra assumptions (such as the stochastic gradients having bounded non-central moments). In this work, using a novel analysis framework, we present new and time-optimal (up to logarithmic factors) \emph{high probability} convergence bounds for SGD with clip** under heavy-tailed noise for both convex and non-convex smooth objectives using only minimal assumptions.
△ Less
Submitted 3 April, 2023; v1 submitted 10 February, 2023;
originally announced February 2023.
-
Quantum Computation of Frequency-Domain Molecular Response Properties Using a Three-Qubit iToffoli Gate
Authors:
Shi-Ning Sun,
Brian Marinelli,
** Ming Koh,
Yosep Kim,
Long B. Nguyen,
Larry Chen,
John Mark Kreikebaum,
David I. Santiago,
Irfan Siddiqi,
Austin J. Minnich
Abstract:
The quantum computation of molecular response properties on near-term quantum hardware is a topic of significant interest. While computing time-domain response properties is in principle straightforward due to the natural ability of quantum computers to simulate unitary time evolution, circuit depth limitations restrict the maximum time that can be simulated and hence the extraction of frequency-d…
▽ More
The quantum computation of molecular response properties on near-term quantum hardware is a topic of significant interest. While computing time-domain response properties is in principle straightforward due to the natural ability of quantum computers to simulate unitary time evolution, circuit depth limitations restrict the maximum time that can be simulated and hence the extraction of frequency-domain properties. Computing properties directly in the frequency domain is therefore desirable, but the circuits require large depth when the typical hardware gate set consisting of single- and two-qubit gates is used. Here, we report the experimental quantum computation of the response properties of diatomic molecules directly in the frequency domain using a three-qubit iToffoli gate, enabling a reduction in circuit depth by a factor of two. We show that the molecular properties obtained with the iToffoli gate exhibit comparable or better agreement with theory than those obtained with the native CZ gates. Our work is among the first demonstrations of the practical usage of a native multi-qubit gate in quantum simulation, with diverse potential applications to the simulation of quantum many-body systems on near-term digital quantum computers.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
Just-in-Time Code Duplicates Extraction
Authors:
Eman Abdullah AlOmar,
Anton Ivanov,
Zarina Kurbatova,
Yaroslav Golubev,
Mohamed Wiem Mkaouer,
Ali Ouni,
Timofey Bryksin,
Le Nguyen,
Amit Kini,
Aditya Thakur
Abstract:
Refactoring is a critical task in software maintenance, and is usually performed to enforce better design and coding practices, while co** with design defects. The Extract Method refactoring is widely used for merging duplicate code fragments into a single new method. Several studies attempted to recommend Extract Method refactoring opportunities using different techniques, including program sli…
▽ More
Refactoring is a critical task in software maintenance, and is usually performed to enforce better design and coding practices, while co** with design defects. The Extract Method refactoring is widely used for merging duplicate code fragments into a single new method. Several studies attempted to recommend Extract Method refactoring opportunities using different techniques, including program slicing, program dependency graph analysis, change history analysis, structural similarity, and feature extraction. However, irrespective of the method, most of the existing approaches interfere with the developer's workflow: they require the developer to stop coding and analyze the suggested opportunities, and also consider all refactoring suggestions in the entire project without focusing on the development context.
To increase the adoption of the Extract Method refactoring, in this paper, we aim to investigate the effectiveness of machine learning and deep learning algorithms for its recommendation while maintaining the workflow of the developer.
The proposed approach relies on mining prior applied Extract Method refactorings and extracting their features to train a deep learning classifier that detects them in the user's code. We implemented our approach as a plugin for IntelliJ IDEA called AntiCopyPaster. To develop our approach, we trained and evaluated various popular models on a dataset of 18,942 code fragments from 13 Open Source Apache projects.
The results show that the best model is the Convolutional Neural Network (CNN), which recommends appropriate Extract Method refactorings with an F-measure of 0.82. We also conducted a qualitative study with 72 developers to evaluate the usefulness of the developed plugin.
The results show that developers tend to appreciate the idea of the approach and are satisfied with various aspects of the plugin's operation.
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
Holistic Cube Analysis: A Query Framework for Data Insights
Authors:
Xi Wu,
Shaleen Deep,
Joe Benassi,
Fengan Li,
Yaqi Zhang,
Uyeong Jang,
James Foster,
Stella Kim,
Yu**g Sun,
Long Nguyen,
Stratis Viglas,
Somesh Jha,
John Cieslewicz,
Jeffrey F. Naughton
Abstract:
Many data insight questions can be viewed as searching in a large space of tables and finding important ones, where the notion of importance is defined in some adhoc user defined manner. This paper presents Holistic Cube Analysis (HoCA), a framework that augments the capabilities of relational queries for such problems. HoCA first augments the relational data model and introduces a new data type A…
▽ More
Many data insight questions can be viewed as searching in a large space of tables and finding important ones, where the notion of importance is defined in some adhoc user defined manner. This paper presents Holistic Cube Analysis (HoCA), a framework that augments the capabilities of relational queries for such problems. HoCA first augments the relational data model and introduces a new data type AbstractCube, defined as a function which maps a region-features pair to a relational table (a region is a tuple which specifies values of a set of dimensions). AbstractCube provides a logical form of data, and HoCA operators are cube-to-cube transformations. We describe two basic but fundamental HoCA operators, cube crawling and cube join (with many possible extensions). Cube crawling explores a region space, and outputs a cube that maps regions to signal vectors. Cube join, in turn, is critical for composition, allowing one to join information from different cubes for deeper analysis. Cube crawling introduces two novel programming features, (programmable) Region Analysis Models (RAMs) and Multi-Model Crawling. Crucially, RAM has a notion of population features, which allows one to go beyond only analyzing local features at a region, and program region-population analysis that compares region and population features, capturing a large class of importance notions. HoCA has a rich algorithmic space, such as optimizing crawling and join performance, and physical design of cubes. We have implemented and deployed HoCA at Google. Our early HoCA offering has attracted more than 30 teams building applications with it, across a diverse spectrum of fields including system monitoring, experimentation analysis, and business intelligence. For many applications, HoCA empowers novel and powerful analyses, such as instances of recurrent crawling, which are challenging to achieve otherwise.
△ Less
Submitted 1 July, 2023; v1 submitted 31 January, 2023;
originally announced February 2023.