-
How could Neural Networks understand Programs?
Authors:
Dinglan Peng,
Shuxin Zheng,
Yatao Li,
Guolin Ke,
Di He,
Tie-Yan Liu
Abstract:
Semantic understanding of programs is a fundamental problem for programming language processing (PLP). Recent works that learn representations of code based on pre-training techniques in NLP have pushed the frontiers in this direction. However, the semantics of PL and NL have essential differences. These being ignored, we believe it is difficult to build a model to better understand programs, by e…
▽ More
Semantic understanding of programs is a fundamental problem for programming language processing (PLP). Recent works that learn representations of code based on pre-training techniques in NLP have pushed the frontiers in this direction. However, the semantics of PL and NL have essential differences. These being ignored, we believe it is difficult to build a model to better understand programs, by either directly applying off-the-shelf NLP pre-training techniques to the source code, or adding features to the model by the heuristic. In fact, the semantics of a program can be rigorously defined by formal semantics in PL theory. For example, the operational semantics, describes the meaning of a valid program as updating the environment (i.e., the memory address-value function) through fundamental operations, such as memory I/O and conditional branching. Inspired by this, we propose a novel program semantics learning paradigm, that the model should learn from information composed of (1) the representations which align well with the fundamental operations in operational semantics, and (2) the information of environment transition, which is indispensable for program understanding. To validate our proposal, we present a hierarchical Transformer-based pre-training model called OSCAR to better facilitate the understanding of programs. OSCAR learns from intermediate representation (IR) and an encoded representation derived from static analysis, which are used for representing the fundamental operations and approximating the environment transitions respectively. OSCAR empirically shows the outstanding capability of program semantics understanding on many practical software engineering tasks.
△ Less
Submitted 31 May, 2021; v1 submitted 10 May, 2021;
originally announced May 2021.
-
Probing Negative Sampling Strategies to Learn GraphRepresentations via Unsupervised Contrastive Learning
Authors:
Shiyi Chen,
Ziao Wang,
Xinni Zhang,
Xiaofeng Zhang,
Dan Peng
Abstract:
Graph representation learning has long been an important yet challenging task for various real-world applications. However, their downstream tasks are mainly performed in the settings of supervised or semi-supervised learning. Inspired by recent advances in unsupervised contrastive learning, this paper is thus motivated to investigate how the node-wise contrastive learning could be performed. Part…
▽ More
Graph representation learning has long been an important yet challenging task for various real-world applications. However, their downstream tasks are mainly performed in the settings of supervised or semi-supervised learning. Inspired by recent advances in unsupervised contrastive learning, this paper is thus motivated to investigate how the node-wise contrastive learning could be performed. Particularly, we respectively resolve the class collision issue and the imbalanced negative data distribution issue. Extensive experiments are performed on three real-world datasets and the proposed approach achieves the SOTA model performance.
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
Verifying Design through Generative Visualization of Neural Activities
Authors:
Pan Wang,
Danlin Peng,
Simiao Yu,
Chao Wu,
Peter Childs,
Yike Guo,
Ling Li
Abstract:
Current neuroscience focused approaches for evaluating the effectiveness of a design do not use direct visualisation of mental activity. A recurrent neural network is used as the encoder to learn latent representation from electroencephalogram (EEG) signals, recorded while subjects looked at 50 categories of images. A generative adversarial network (GAN) conditioned on the EEG latent representatio…
▽ More
Current neuroscience focused approaches for evaluating the effectiveness of a design do not use direct visualisation of mental activity. A recurrent neural network is used as the encoder to learn latent representation from electroencephalogram (EEG) signals, recorded while subjects looked at 50 categories of images. A generative adversarial network (GAN) conditioned on the EEG latent representation is trained for reconstructing these images. After training, the neural network is able to reconstruct images from brain activity recordings. To demonstrate the proposed method in the context of the mental association with a design, we performed a study that indicates an iconic design image could inspire the subject to create cognitive associations with branding and valued products. The proposed method could have the potential in verifying designs by visualizing the cognitive understanding of underlying brain activity.
△ Less
Submitted 28 March, 2021;
originally announced March 2021.
-
Design Principles for Data Analysis
Authors:
Lucy D'Agostino McGowan,
Roger D. Peng,
Stephanie C. Hicks
Abstract:
The data science revolution has led to an increased interest in the practice of data analysis. While much has been written about statistical thinking, a complementary form of thinking that appears in the practice of data analysis is design thinking -- the problem-solving process to understand the people for whom a product is being designed. For a given problem, there can be significant or subtle d…
▽ More
The data science revolution has led to an increased interest in the practice of data analysis. While much has been written about statistical thinking, a complementary form of thinking that appears in the practice of data analysis is design thinking -- the problem-solving process to understand the people for whom a product is being designed. For a given problem, there can be significant or subtle differences in how a data analyst (or producer of a data analysis) constructs, creates, or designs a data analysis, including differences in the choice of methods, tooling, and workflow. These choices can affect the data analysis products themselves and the experience of the consumer of the data analysis. Therefore, the role of a producer can be thought of as designing the data analysis with a set of design principles. Here, we introduce design principles for data analysis and describe how they can be mapped to data analyses in a quantitative, objective and informative manner. We also provide empirical evidence of variation of principles within and between both producers and consumers of data analyses. Our work leads to two insights: it suggests a formal mechanism to describe data analyses based on the design principles for data analysis, and it provides a framework to teach students how to build data analyses using formal design principles.
△ Less
Submitted 9 March, 2021;
originally announced March 2021.
-
Rethinking Co-design of Neural Architectures and Hardware Accelerators
Authors:
Yanqi Zhou,
Xuanyi Dong,
Berkin Akin,
Mingxing Tan,
Daiyi Peng,
Tianjian Meng,
Amir Yazdanbakhsh,
Da Huang,
Ravi Narayanaswami,
James Laudon
Abstract:
Neural architectures and hardware accelerators have been two driving forces for the progress in deep learning. Previous works typically attempt to optimize hardware given a fixed model architecture or model architecture given fixed hardware. And the dominant hardware architecture explored in this prior work is FPGAs. In our work, we target the optimization of hardware and software configurations o…
▽ More
Neural architectures and hardware accelerators have been two driving forces for the progress in deep learning. Previous works typically attempt to optimize hardware given a fixed model architecture or model architecture given fixed hardware. And the dominant hardware architecture explored in this prior work is FPGAs. In our work, we target the optimization of hardware and software configurations on an industry-standard edge accelerator. We systematically study the importance and strategies of co-designing neural architectures and hardware accelerators. We make three observations: 1) the software search space has to be customized to fully leverage the targeted hardware architecture, 2) the search for the model architecture and hardware architecture should be done jointly to achieve the best of both worlds, and 3) different use cases lead to very different search outcomes. Our experiments show that the joint search method consistently outperforms previous platform-aware neural architecture search, manually crafted models, and the state-of-the-art EfficientNet on all latency targets by around 1% on ImageNet top-1 accuracy. Our method can reduce energy consumption of an edge accelerator by up to 2x under the same accuracy constraint, when co-adapting the model architecture and hardware accelerator configurations.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
PyGlove: Symbolic Programming for Automated Machine Learning
Authors:
Daiyi Peng,
Xuanyi Dong,
Esteban Real,
Mingxing Tan,
Yifeng Lu,
Hanxiao Liu,
Gabriel Bender,
Adam Kraft,
Chen Liang,
Quoc V. Le
Abstract:
Neural networks are sensitive to hyper-parameter and architecture choices. Automated Machine Learning (AutoML) is a promising paradigm for automating these choices. Current ML software libraries, however, are quite limited in handling the dynamic interactions among the components of AutoML. For example, efficientNAS algorithms, such as ENAS and DARTS, typically require an implementation coupling b…
▽ More
Neural networks are sensitive to hyper-parameter and architecture choices. Automated Machine Learning (AutoML) is a promising paradigm for automating these choices. Current ML software libraries, however, are quite limited in handling the dynamic interactions among the components of AutoML. For example, efficientNAS algorithms, such as ENAS and DARTS, typically require an implementation coupling between the search space and search algorithm, the two key components in AutoML. Furthermore, implementing a complex search flow, such as searching architectures within a loop of searching hardware configurations, is difficult. To summarize, changing the search space, search algorithm, or search flow in current ML libraries usually requires a significant change in the program logic. In this paper, we introduce a new way of programming AutoML based on symbolic programming. Under this paradigm, ML programs are mutable, thus can be manipulated easily by another program. As a result, AutoML can be reformulated as an automated process of symbolic manipulation. With this formulation, we decouple the triangle of the search algorithm, the search space and the child program. This decoupling makes it easy to change the search space and search algorithm (without and with weight sharing), as well as to add search capabilities to existing code and implement complex search flows. We then introduce PyGlove, a new Python library that implements this paradigm. Through case studies on ImageNet and NAS-Bench-101, we show that with PyGlove users can easily convert a static program into a search space, quickly iterate on the search spaces and search algorithms, and craft complex search flows to achieve better results.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
ES-ENAS: Efficient Evolutionary Optimization for Large Hybrid Search Spaces
Authors:
Xingyou Song,
Krzysztof Choromanski,
Jack Parker-Holder,
Yunhao Tang,
Qiuyi Zhang,
Daiyi Peng,
Deepali Jain,
Wenbo Gao,
Aldo Pacchiano,
Tamas Sarlos,
Yuxiang Yang
Abstract:
In this paper, we approach the problem of optimizing blackbox functions over large hybrid search spaces consisting of both combinatorial and continuous parameters. We demonstrate that previous evolutionary algorithms which rely on mutation-based approaches, while flexible over combinatorial spaces, suffer from a curse of dimensionality in high dimensional continuous spaces both theoretically and e…
▽ More
In this paper, we approach the problem of optimizing blackbox functions over large hybrid search spaces consisting of both combinatorial and continuous parameters. We demonstrate that previous evolutionary algorithms which rely on mutation-based approaches, while flexible over combinatorial spaces, suffer from a curse of dimensionality in high dimensional continuous spaces both theoretically and empirically, which thus limits their scope over hybrid search spaces as well. In order to combat this curse, we propose ES-ENAS, a simple and modular joint optimization procedure combining the class of sample-efficient smoothed gradient techniques, commonly known as Evolutionary Strategies (ES), with combinatorial optimizers in a highly scalable and intuitive way, inspired by the one-shot or supernet paradigm introduced in Efficient Neural Architecture Search (ENAS). By doing so, we achieve significantly more sample efficiency, which we empirically demonstrate over synthetic benchmarks, and are further able to apply ES-ENAS for architecture search over popular RL benchmarks.
△ Less
Submitted 15 March, 2023; v1 submitted 18 January, 2021;
originally announced January 2021.
-
Evolving Reinforcement Learning Algorithms
Authors:
John D. Co-Reyes,
Yingjie Miao,
Daiyi Peng,
Esteban Real,
Sergey Levine,
Quoc V. Le,
Honglak Lee,
Aleksandra Faust
Abstract:
We propose a method for meta-learning reinforcement learning algorithms by searching over the space of computational graphs which compute the loss function for a value-based model-free RL agent to optimize. The learned algorithms are domain-agnostic and can generalize to new environments not seen during training. Our method can both learn from scratch and bootstrap off known existing algorithms, l…
▽ More
We propose a method for meta-learning reinforcement learning algorithms by searching over the space of computational graphs which compute the loss function for a value-based model-free RL agent to optimize. The learned algorithms are domain-agnostic and can generalize to new environments not seen during training. Our method can both learn from scratch and bootstrap off known existing algorithms, like DQN, enabling interpretable modifications which improve performance. Learning from scratch on simple classical control and gridworld tasks, our method rediscovers the temporal-difference (TD) algorithm. Bootstrapped from DQN, we highlight two learned algorithms which obtain good generalization performance over other classical control tasks, gridworld type tasks, and Atari games. The analysis of the learned algorithm behavior shows resemblance to recently proposed RL algorithms that address overestimation in value-based methods.
△ Less
Submitted 10 November, 2022; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Excited state fluid mechanics and mathematical principles of separation and transition
Authors:
Peng Yue,
Ke Xu,
Ming Li,
Feng Jiang,
Yiyu Lu,
Dewei Peng
Abstract:
Transition and separation are difficult but important problems in the field of fluid mechanics. Hitherto, separation and transition problems have not been described accurately in mathematical terms, leading to design errors and prediction problems in fluid machine engineering. The nonlinear uncertainty involved in separation and transition makes it difficult to accurately analyze these phenomena u…
▽ More
Transition and separation are difficult but important problems in the field of fluid mechanics. Hitherto, separation and transition problems have not been described accurately in mathematical terms, leading to design errors and prediction problems in fluid machine engineering. The nonlinear uncertainty involved in separation and transition makes it difficult to accurately analyze these phenomena using experimental methods. Thus, new ideas and methods are required for the mathematical prediction of fluid separation and transition. In this article, after an axiomatic treatment of fluid mechanics, the concept of an excited state is derived by generating a fluctuation velocity, and it is revealed that fluid separation and transition are special forms of this excited state. This allows us to clarify the state conditions of fluid separation and transition. Mathematical analysis of the Navier--Stokes equations leads to a general excited state theorem suitable for flowfields. Finally, the conditions of separation and transition are derived, and the corresponding general laws are established. The results presented in this article provide a foundation for future research on the mechanism of turbulence and the solution of engineering problems.
△ Less
Submitted 16 April, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Optimal spinor selectivity for quaternion Bass orders
Authors:
Deke Peng,
Jiangwei Xue
Abstract:
Let $A$ be a quaternion algebra over a number field $F$, and $\mathcal{O}$ be an $O_F$-order of full rank in $A$. Let $K$ be a quadratic field extension of $F$ that embeds into $A$, and $B$ be an $O_F$-order in $K$. Suppose that $\mathcal{O}$ is a Bass order that is well-behaved at all the dyadic primes of $F$. We provide a necessary and sufficient condition for $B$ to be optimally spinor selectiv…
▽ More
Let $A$ be a quaternion algebra over a number field $F$, and $\mathcal{O}$ be an $O_F$-order of full rank in $A$. Let $K$ be a quadratic field extension of $F$ that embeds into $A$, and $B$ be an $O_F$-order in $K$. Suppose that $\mathcal{O}$ is a Bass order that is well-behaved at all the dyadic primes of $F$. We provide a necessary and sufficient condition for $B$ to be optimally spinor selective for the genus of $\mathcal{O}$. This partially generalizes previous results on optimal (spinor) selectivity by C. Maclachlan [Optimal embeddings in quaternion algebras. J. Number Theory, 128(10):2852-2860, 2008] for Eichler orders of square-free levels, and independently by M. Arenas et al. [On optimal embeddings and trees. J. Number Theory, 193:91-117, 2018] and by J. Voight [Chapter 31, Quaternion algebras, volume 288 of Graduate Texts in Mathematics. Springer-Verlag, 2021] for Eichler orders of arbitrary levels.
△ Less
Submitted 18 February, 2021; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Towards NNGP-guided Neural Architecture Search
Authors:
Daniel S. Park,
Jaehoon Lee,
Daiyi Peng,
Yuan Cao,
Jascha Sohl-Dickstein
Abstract:
The predictions of wide Bayesian neural networks are described by a Gaussian process, known as the Neural Network Gaussian Process (NNGP). Analytic forms for NNGP kernels are known for many models, but computing the exact kernel for convolutional architectures is prohibitively expensive. One can obtain effective approximations of these kernels through Monte-Carlo estimation using finite networks a…
▽ More
The predictions of wide Bayesian neural networks are described by a Gaussian process, known as the Neural Network Gaussian Process (NNGP). Analytic forms for NNGP kernels are known for many models, but computing the exact kernel for convolutional architectures is prohibitively expensive. One can obtain effective approximations of these kernels through Monte-Carlo estimation using finite networks at initialization. Monte-Carlo NNGP inference is orders-of-magnitude cheaper in FLOPs compared to gradient descent training when the dataset size is small. Since NNGP inference provides a cheap measure of performance of a network architecture, we investigate its potential as a signal for neural architecture search (NAS). We compute the NNGP performance of approximately 423k networks in the NAS-bench 101 dataset on CIFAR-10 and compare its utility against conventional performance measures obtained by shortened gradient-based training. We carry out a similar analysis on 10k randomly sampled networks in the mobile neural architecture search (MNAS) space for ImageNet. We discover comparative advantages of NNGP-based metrics, and discuss potential applications. In particular, we propose that NNGP performance is an inexpensive signal independent of metrics obtained from training that can either be used for reducing big search spaces, or improving training-based performance measures.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Hierarchical Paired Channel Fusion Network for Street Scene Change Detection
Authors:
Yinjie Lei,
Duo Peng,
**** Zhang,
Qiuhong Ke,
Haifeng Li
Abstract:
Street Scene Change Detection (SSCD) aims to locate the changed regions between a given street-view image pair captured at different times, which is an important yet challenging task in the computer vision community. The intuitive way to solve the SSCD task is to fuse the extracted image feature pairs, and then directly measure the dissimilarity parts for producing a change map. Therefore, the key…
▽ More
Street Scene Change Detection (SSCD) aims to locate the changed regions between a given street-view image pair captured at different times, which is an important yet challenging task in the computer vision community. The intuitive way to solve the SSCD task is to fuse the extracted image feature pairs, and then directly measure the dissimilarity parts for producing a change map. Therefore, the key for the SSCD task is to design an effective feature fusion method that can improve the accuracy of the corresponding change maps. To this end, we present a novel Hierarchical Paired Channel Fusion Network (HPCFNet), which utilizes the adaptive fusion of paired feature channels. Specifically, the features of a given image pair are jointly extracted by a Siamese Convolutional Neural Network (SCNN) and hierarchically combined by exploring the fusion of channel pairs at multiple feature levels. In addition, based on the observation that the distribution of scene changes is diverse, we further propose a Multi-Part Feature Learning (MPFL) strategy to detect diverse changes. Based on the MPFL strategy, our framework achieves a novel approach to adapt to the scale and location diversities of the scene change regions. Extensive experiments on three public datasets (i.e., PCD, VL-CMU-CD and CDnet2014) demonstrate that the proposed framework achieves superior performance which outperforms other state-of-the-art methods with a considerable margin.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Measuring Density Functional Parameters from Electron Diffraction Patterns
Authors:
Ding Peng,
Philip N. H. Nakashima
Abstract:
We have integrated density functional theory (DFT) into quantitative convergent-beam electron diffraction (QCBED) to create a synergy between experiment and theory called QCBED-DFT. This synergy resides entirely in the electron density which, in real materials, gives rise to the experimental CBED patterns used by QCBED-DFT to refine DFT model parameters. We used it to measure the Hubbard energy, U…
▽ More
We have integrated density functional theory (DFT) into quantitative convergent-beam electron diffraction (QCBED) to create a synergy between experiment and theory called QCBED-DFT. This synergy resides entirely in the electron density which, in real materials, gives rise to the experimental CBED patterns used by QCBED-DFT to refine DFT model parameters. We used it to measure the Hubbard energy, U, for two strongly correlated electron systems, NiO and CeB6 (UNiO = 7.4 +/- 0.6 eV and UCeB6 = 3.0 +/- 0.6 eV), and the boron position parameter, x, for CeB6 (x = 0.1992 +/- 0.0003). In verifying our measurements, we demonstrate an accuracy test for any modelled electron density.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Organization of cooperation in fractal structures
Authors:
Dan Peng,
Ming Li
Abstract:
It is known that the small-world structure constitutes sufficient conditions to sustain cooperation and thus enhances cooperation. On the contrary, the network with a very long average distance is usually thought of as suppressing the emergence of the cooperation. In this paper we show that the fractal structure, of which the average distance is very long, does not always play a negative role in t…
▽ More
It is known that the small-world structure constitutes sufficient conditions to sustain cooperation and thus enhances cooperation. On the contrary, the network with a very long average distance is usually thought of as suppressing the emergence of the cooperation. In this paper we show that the fractal structure, of which the average distance is very long, does not always play a negative role in the organization of cooperation. Compared to regular networks, the fractal structure might even facilitate the emergence of cooperation. This mainly depends on the existence of locally compact clusters. The sparse inter-connection between these clusters constructs an asymmetric barrier that the defection strategy is almost impossible to cross, but the cooperation strategy has a not too small chance. More generally, the network need not to be a standard fractal, as long as such structures exist. In turn, when this typical structure is absent, the fractal structure will also suppress the emergence of the cooperation, such as the fractal configuration obtained by diluting a random tree-like network. Our findings also clarify some contradictions in the previous studies, and suggest that both removing and inserting links from/into a regular network can enhance cooperation.
△ Less
Submitted 8 March, 2021; v1 submitted 13 October, 2020;
originally announced October 2020.
-
Contrastive Clustering
Authors:
Yunfan Li,
Peng Hu,
Zitao Liu,
Dezhong Peng,
Joey Tianyi Zhou,
Xi Peng
Abstract:
In this paper, we propose a one-stage online clustering method called Contrastive Clustering (CC) which explicitly performs the instance- and cluster-level contrastive learning. To be specific, for a given dataset, the positive and negative instance pairs are constructed through data augmentations and then projected into a feature space. Therein, the instance- and cluster-level contrastive learnin…
▽ More
In this paper, we propose a one-stage online clustering method called Contrastive Clustering (CC) which explicitly performs the instance- and cluster-level contrastive learning. To be specific, for a given dataset, the positive and negative instance pairs are constructed through data augmentations and then projected into a feature space. Therein, the instance- and cluster-level contrastive learning are respectively conducted in the row and column space by maximizing the similarities of positive pairs while minimizing those of negative ones. Our key observation is that the rows of the feature matrix could be regarded as soft labels of instances, and accordingly the columns could be further regarded as cluster representations. By simultaneously optimizing the instance- and cluster-level contrastive loss, the model jointly learns representations and cluster assignments in an end-to-end manner. Extensive experimental results show that CC remarkably outperforms 17 competitive clustering methods on six challenging image benchmarks. In particular, CC achieves an NMI of 0.705 (0.431) on the CIFAR-10 (CIFAR-100) dataset, which is an up to 19\% (39\%) performance improvement compared with the best baseline.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Superlubric Schottky Generator in Microscale with High Current Density and Ultralong Life
Authors:
Xuanyu Huang,
Xiaojian Xiang,
Deli Peng,
Fuwei Yang,
Haiyang Jiang,
Zhanghui Wu,
Zhi** Xu,
Quanshui Zheng
Abstract:
Miniaturized or even microscale generators that could effectively and persistently converse weak and random mechanical energy from environments into electricity promise huge applications in the internet of things, sensor networks, big data, personal health systems, artificial intelligence, etc. However, such generators haven't appeared yet because either the current density, or persistence, or bot…
▽ More
Miniaturized or even microscale generators that could effectively and persistently converse weak and random mechanical energy from environments into electricity promise huge applications in the internet of things, sensor networks, big data, personal health systems, artificial intelligence, etc. However, such generators haven't appeared yet because either the current density, or persistence, or both of all reported attempts were too low to real applications. Here, we demonstrate a superlubric Schottky generator (SLSG) in microscale such that the sliding contact between a microsized graphite flake and an n-type silicon is in a structural superlubric state, namely a ultralow friction and wearless state. This SLSG generates a stable electrical current at a high density (~119 Am-2) for at least 5,000 cycles. Since no current decay and wear were observed during the entire experiment, we believe that the real persistence of the SLSG should be enduring or substantively unlimited. In addition, the observed results exclude the mechanism of friction excitation in our Schottky generator, and provide the first experimental support of the conjectured mechanism of depletion layer establishment and destruction (DLED). Furthermore, we demonstrate a physical process of the DLED mechanism by the use of a quasi-static semiconductor finite element simulation. Our work may guide and accelerate future SLSGs into real applications.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Time-Reversed Water Waves Generated from an Instantaneous Time Mirror
Authors:
Danming Peng,
Yiyang Fan,
Ruochen Liu,
Xiasheng Guo,
Sihui Wang
Abstract:
An instantaneous time mirror (ITM) is an interesting approach to manipulate wave propagation from the time boundaries. In the time domain, the reversed wave is previously proven to be the temporal derivative of the original pattern. Here, we further investigate into the relationship between the wave patterns in the spatial domain both theoretically and experimentally. The refraction of a square ar…
▽ More
An instantaneous time mirror (ITM) is an interesting approach to manipulate wave propagation from the time boundaries. In the time domain, the reversed wave is previously proven to be the temporal derivative of the original pattern. Here, we further investigate into the relationship between the wave patterns in the spatial domain both theoretically and experimentally. The refraction of a square array of laser beams is used to determine the three-dimensional (3D) shape of the water surface. The experimental results verify the theoretical prediction that the reversed pattern is related to the Laplacian of the initial wave field. Based on these findings, the behaviors of the ITM activated in an inhomogeneous medium are discussed, and the phenomenon of total energy change is explained.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
A Bayesian-Neural-Network Prediction for Fragment Production in Proton Induced Spallation Reaction
Authors:
Chun-Wang Ma,
Dan Peng,
Hui-Ling Wei,
Yu-Ting Wang,
Jie Pu
Abstract:
Fragments productions in spallation reactions are key infrastructure data for various applications. Based on the empirical parameterizations {\sc spacs}, a Bayesian-neural-network (BNN) approach is established to predict the fragment cross sections in the proton induced spallation reactions. A systematic investigation have been performed for the measured proton induced spallation reactions of syst…
▽ More
Fragments productions in spallation reactions are key infrastructure data for various applications. Based on the empirical parameterizations {\sc spacs}, a Bayesian-neural-network (BNN) approach is established to predict the fragment cross sections in the proton induced spallation reactions. A systematic investigation have been performed for the measured proton induced spallation reactions of systems ranging from the intermediate to the heavy nuclei and the incident energy ranging from 168 MeV/u to 1500 MeV/u. By learning the residuals between the experimental measurements and the {\sc spacs} predictions, the BNN predicted results are in good agreement with the measured results. The established method is suggested to benefit the related researches in the nuclear astrophysics, nuclear radioactive beam source, accelerator driven systems, and proton therapy, etc.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Reproducible Research: A Retrospective
Authors:
Roger D. Peng,
Stephanie C. Hicks
Abstract:
Rapid advances in computing technology over the past few decades have spurred two extraordinary phenomena in science: large-scale and high-throughput data collection coupled with the creation and implementation of complex statistical algorithms for data analysis. Together, these two phenomena have brought about tremendous advances in scientific discovery but have also raised two serious concerns,…
▽ More
Rapid advances in computing technology over the past few decades have spurred two extraordinary phenomena in science: large-scale and high-throughput data collection coupled with the creation and implementation of complex statistical algorithms for data analysis. Together, these two phenomena have brought about tremendous advances in scientific discovery but have also raised two serious concerns, one relatively new and one quite familiar. The complexity of modern data analyses raises questions about the reproducibility of the analyses, meaning the ability of independent analysts to re-create the results claimed by the original authors using the original data and analysis techniques. While seemingly a straightforward concept, reproducibility of analyses is typically thwarted by the lack of availability of the data and computer code that were used in the analyses. A much more general concern is the replicability of scientific findings, which concerns the frequency with which scientific claims are confirmed by completely independent investigations. While the concepts of reproduciblity and replicability are related, it is worth noting that they are focused on quite different goals and address different aspects of scientific progress. In this review, we will discuss the origins of reproducible research, characterize the current status of reproduciblity in public health research, and connect reproduciblity to current concerns about replicability of scientific findings. Finally, we describe a path forward for improving both the reproducibility and replicability of public health research in the future.
△ Less
Submitted 23 July, 2020;
originally announced July 2020.
-
Decoder-free Robustness Disentanglement without (Additional) Supervision
Authors:
Yifei Wang,
Dan Peng,
Furui Liu,
Zhenguo Li,
Zhitang Chen,
Jiansheng Yang
Abstract:
Adversarial Training (AT) is proposed to alleviate the adversarial vulnerability of machine learning models by extracting only robust features from the input, which, however, inevitably leads to severe accuracy reduction as it discards the non-robust yet useful features. This motivates us to preserve both robust and non-robust features and separate them with disentangled representation learning. O…
▽ More
Adversarial Training (AT) is proposed to alleviate the adversarial vulnerability of machine learning models by extracting only robust features from the input, which, however, inevitably leads to severe accuracy reduction as it discards the non-robust yet useful features. This motivates us to preserve both robust and non-robust features and separate them with disentangled representation learning. Our proposed Adversarial Asymmetric Training (AAT) algorithm can reliably disentangle robust and non-robust representations without additional supervision on robustness. Empirical results show our method does not only successfully preserve accuracy by combining two representations, but also achieve much better disentanglement than previous work.
△ Less
Submitted 2 July, 2020;
originally announced July 2020.
-
AutoHAS: Efficient Hyperparameter and Architecture Search
Authors:
Xuanyi Dong,
Mingxing Tan,
Adams Wei Yu,
Daiyi Peng,
Bogdan Gabrys,
Quoc V. Le
Abstract:
Efficient hyperparameter or architecture search methods have shown remarkable results, but each of them is only applicable to searching for either hyperparameters (HPs) or architectures. In this work, we propose a unified pipeline, AutoHAS, to efficiently search for both architectures and hyperparameters. AutoHAS learns to alternately update the shared network weights and a reinforcement learning…
▽ More
Efficient hyperparameter or architecture search methods have shown remarkable results, but each of them is only applicable to searching for either hyperparameters (HPs) or architectures. In this work, we propose a unified pipeline, AutoHAS, to efficiently search for both architectures and hyperparameters. AutoHAS learns to alternately update the shared network weights and a reinforcement learning (RL) controller, which learns the probability distribution for the architecture candidates and HP candidates. A temporary weight is introduced to store the updated weight from the selected HPs (by the controller), and a validation accuracy based on this temporary weight serves as a reward to update the controller. In experiments, we show AutoHAS is efficient and generalizable to different search spaces, baselines and datasets. In particular, AutoHAS can improve the accuracy over popular network architectures, such as ResNet and EfficientNet, on CIFAR-10/100, ImageNet, and four more other datasets.
△ Less
Submitted 7 April, 2021; v1 submitted 5 June, 2020;
originally announced June 2020.
-
Ball k-means
Authors:
Shuyin Xia,
Daowan Peng,
Deyu Meng,
Changqing Zhang,
Guoyin Wang,
Zizhong Chen,
Wei Wei
Abstract:
This paper presents a novel accelerated exact k-means algorithm called the Ball k-means algorithm, which uses a ball to describe a cluster, focusing on reducing the point-centroid distance computation. The Ball k-means can accurately find the neighbor clusters for each cluster resulting distance computations only between a point and its neighbor clusters' centroids instead of all centroids. Moreov…
▽ More
This paper presents a novel accelerated exact k-means algorithm called the Ball k-means algorithm, which uses a ball to describe a cluster, focusing on reducing the point-centroid distance computation. The Ball k-means can accurately find the neighbor clusters for each cluster resulting distance computations only between a point and its neighbor clusters' centroids instead of all centroids. Moreover, each cluster can be divided into a stable area and an active area, and the later one can be further divided into annulus areas. The assigned cluster of the points in the stable area is not changed in the current iteration while the points in the annulus area will be adjusted within a few neighbor clusters in the current iteration. Also, there are no upper or lower bounds in the proposed Ball k-means. Furthermore, reducing centroid-centroid distance computation between iterations makes it efficient for large k clustering. The fast speed, no extra parameters and simple design of the Ball k-means make it an all-around replacement of the naive k-means algorithm.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Countably infinite bounded abelian groups admit no non-discrete locally minimal group topologies
Authors:
Dekui Peng
Abstract:
In this note we show that if $G$ is a countably infinite abelian group such that $nG=0$ for some integer $n$, then the only locally minimal group topology on $G$ is the discrete one.
In this note we show that if $G$ is a countably infinite abelian group such that $nG=0$ for some integer $n$, then the only locally minimal group topology on $G$ is the discrete one.
△ Less
Submitted 29 December, 2019;
originally announced December 2019.
-
Optimizing and accelerating space-time Ripley's K function based on Apache Spark for distributed spatiotemporal point pattern analysis
Authors:
Yuan Wang,
Zhipeng Gui,
Huayi Wu,
Dehua Peng,
**ghang Wu,
Zousen Cui
Abstract:
With increasing point of interest (POI) datasets available with fine-grained spatial and temporal attributes, space-time Ripley's K function has been regarded as a powerful approach to analyze spatiotemporal point process. However, space-time Ripley's K function is computationally intensive for point-wise distance comparisons, edge correction and simulations for significance testing. Parallel comp…
▽ More
With increasing point of interest (POI) datasets available with fine-grained spatial and temporal attributes, space-time Ripley's K function has been regarded as a powerful approach to analyze spatiotemporal point process. However, space-time Ripley's K function is computationally intensive for point-wise distance comparisons, edge correction and simulations for significance testing. Parallel computing technologies like OpenMP, MPI and CUDA have been leveraged to accelerate the K function, and related experiments have demonstrated the substantial acceleration. Nevertheless, previous works have not extended optimization of Ripley's K function from space dimension to space-time dimension. Without sophisticated spatiotemporal query and partitioning mechanisms, extra computational overhead can be problematic. Meanwhile, these researches were limited by the restricted scalability and relative expensive programming cost of parallel frameworks and impeded their applications for large POI dataset and Ripley's K function variations. This paper presents a distributed computing method to accelerate space-time Ripley's K function upon state-of-the-art distributed computing framework Apache Spark, and four strategies are adopted to simplify calculation procedures and accelerate distributed computing respectively. Based on the optimized method, a web-based visual analytics framework prototype has been developed. Experiments prove the feasibility and time efficiency of the proposed method, and also demonstrate its value on promoting applications of space-time Ripley's K function in ecology, geography, sociology, economics, urban transportation and other fields.
△ Less
Submitted 10 December, 2019;
originally announced December 2019.
-
Modeling the Thermal Bulge of A Hot Jupiter with the Two-Stream Approximation
Authors:
Pin-Gao Gu,
Da-Kai Peng,
Chien-Chang Yen
Abstract:
We revisit the problem of thermal bulge of asynchronous hot Jupiters, using HD 209458 b as a fiducial study. We improve upon previous works by using a double-gray atmosphere model and interior structure from MESA as the background state, and then solve for the thermal bulge in response to the semidiurnal component of stellar insolation. The atmosphere model is based on the radiative transfer with…
▽ More
We revisit the problem of thermal bulge of asynchronous hot Jupiters, using HD 209458 b as a fiducial study. We improve upon previous works by using a double-gray atmosphere model and interior structure from MESA as the background state, and then solve for the thermal bulge in response to the semidiurnal component of stellar insolation. The atmosphere model is based on the radiative transfer with Eddington's two-stream approximation. Two opacity cases are considered: the first introduces a greenhouse effect and the second exhibits a strong temperature inversion. We find that for the predominant thermal bulges excited by g-modes of lower orders, our results are qualitatively similar to the adiabatic results from Arras and Socrates (2010). It arises because the perturbed heating due to self-absorption of thermal emissions can be significant (i.e., greenhouse effect) against Newtonian dam**, thereby leading to almost undamped thermal bulges. We also find that the contribution to the thermal bulge from the evanescent waves in the convective zone is not negligible, implying that the thermal bulge is not merely confined in the atmosphere and radiative envelope. Assuming the torque balance between the thermal and gravitational bulges, we estimate the tidal quality factor of the planet for gravitational tides to match the observed radius. The limitations of our model are also briefly discussed.
△ Less
Submitted 28 November, 2019;
originally announced November 2019.
-
Structure Matters: Towards Generating Transferable Adversarial Images
Authors:
Dan Peng,
Zizhan Zheng,
Linhao Luo,
Xiaofeng Zhang
Abstract:
Recent works on adversarial examples for image classification focus on directly modifying pixels with minor perturbations. The small perturbation requirement is imposed to ensure the generated adversarial examples being natural and realistic to humans, which, however, puts a curb on the attack space thus limiting the attack ability and transferability especially for systems protected by a defense…
▽ More
Recent works on adversarial examples for image classification focus on directly modifying pixels with minor perturbations. The small perturbation requirement is imposed to ensure the generated adversarial examples being natural and realistic to humans, which, however, puts a curb on the attack space thus limiting the attack ability and transferability especially for systems protected by a defense mechanism. In this paper, we propose the novel concepts of structure patterns and structure-aware perturbations that relax the small perturbation constraint while still kee** images natural. The key idea of our approach is to allow perceptible deviation in adversarial examples while kee** structure patterns that are central to a human classifier. Built upon these concepts, we propose a \emph{structure-preserving attack (SPA)} for generating natural adversarial examples with extremely high transferability. Empirical results on the MNIST and the CIFAR10 datasets show that SPA exhibits strong attack ability in both the white-box and black-box setting even defenses are applied. Moreover, with the integration of PGD or CW attack, its attack ability escalates sharply under the white-box setting, without losing the outstanding transferability inherited from SPA.
△ Less
Submitted 14 August, 2020; v1 submitted 22 October, 2019;
originally announced October 2019.
-
A Fast and Precise Method for Large-Scale Land-Use Map** Based on Deep Learning
Authors:
Xuan Yang,
Zhengchao Chen,
Baipeng Li,
Dailiang Peng,
Pan Chen,
Bing Zhang
Abstract:
The land-use map is an important data that can reflect the use and transformation of human land, and can provide valuable reference for land-use planning. For the traditional image classification method, producing a high spatial resolution (HSR), land-use map in large-scale is a big project that requires a lot of human labor, time, and financial expenditure. The rise of the deep learning technique…
▽ More
The land-use map is an important data that can reflect the use and transformation of human land, and can provide valuable reference for land-use planning. For the traditional image classification method, producing a high spatial resolution (HSR), land-use map in large-scale is a big project that requires a lot of human labor, time, and financial expenditure. The rise of the deep learning technique provides a new solution to the problems above. This paper proposes a fast and precise method that can achieve large-scale land-use classification based on deep convolutional neural network (DCNN). In this paper, we optimize the data tiling method and the structure of DCNN for the multi-channel data and the splicing edge effect, which are unique to remote sensing deep learning, and improve the accuracy of land-use classification. We apply our improved methods in the Guangdong Province of China using GF-1 images, and achieve the land-use classification accuracy of 81.52%. It takes only 13 hours to complete the work, which will take several months for human labor.
△ Less
Submitted 9 August, 2019;
originally announced August 2019.
-
Evaluating the Success of a Data Analysis
Authors:
Stephanie C. Hicks,
Roger D. Peng
Abstract:
A fundamental problem in the practice and teaching of data science is how to evaluate the quality of a given data analysis, which is different than the evaluation of the science or question underlying the data analysis. Previously, we defined a set of principles for describing data analyses that can be used to create a data analysis and to characterize the variation between data analyses. Here, we…
▽ More
A fundamental problem in the practice and teaching of data science is how to evaluate the quality of a given data analysis, which is different than the evaluation of the science or question underlying the data analysis. Previously, we defined a set of principles for describing data analyses that can be used to create a data analysis and to characterize the variation between data analyses. Here, we introduce a metric of quality evaluation that we call the success of a data analysis, which is different than other potential metrics such as completeness, validity, or honesty. We define a successful data analysis as the matching of principles between the analyst and the audience on which the analysis is developed. In this paper, we propose a statistical model and general framework for evaluating the success of a data analysis. We argue that this framework can be used as a guide for practicing data scientists and students in data science courses for how to build a successful data analysis.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
Elements and Principles for Characterizing Variation between Data Analyses
Authors:
Stephanie C. Hicks,
Roger D. Peng
Abstract:
The data revolution has led to an increased interest in the practice of data analysis. For a given problem, there can be significant or subtle differences in how a data analyst constructs or creates a data analysis, including differences in the choice of methods, tooling, and workflow. In addition, data analysts can prioritize (or not) certain objective characteristics in a data analysis, leading…
▽ More
The data revolution has led to an increased interest in the practice of data analysis. For a given problem, there can be significant or subtle differences in how a data analyst constructs or creates a data analysis, including differences in the choice of methods, tooling, and workflow. In addition, data analysts can prioritize (or not) certain objective characteristics in a data analysis, leading to differences in the quality or experience of the data analysis, such as an analysis that is more or less reproducible or an analysis that is more or less exhaustive. However, data analysts currently lack a formal mechanism to compare and contrast what makes analyses different from each other. To address this problem, we introduce a vocabulary to describe and characterize variation between data analyses. We denote this vocabulary as the elements and principles of data analysis, and we use them to describe the fundamental concepts for the practice and teaching of creating a data analysis. This leads to two insights: it suggests a formal mechanism to evaluate data analyses based on objective characteristics, and it provides a framework to teach students how to build data analyses.
△ Less
Submitted 25 July, 2019; v1 submitted 18 March, 2019;
originally announced March 2019.
-
A Multi-parameter regression model for interval censored survival data
Authors:
Defen Peng,
Gilbert MacKenzie,
Kevin Burke
Abstract:
We develop flexible multi-parameter regression survival models for interval censored survival data arising in longitudinal prospective studies and longitudinal randomised controlled clinical trials. A multi-parameter Weibull regression survival model, which is wholly parametric, and has non-proportional hazards, is the main focus of the paper. We describe the basic model, develop the interval-cens…
▽ More
We develop flexible multi-parameter regression survival models for interval censored survival data arising in longitudinal prospective studies and longitudinal randomised controlled clinical trials. A multi-parameter Weibull regression survival model, which is wholly parametric, and has non-proportional hazards, is the main focus of the paper. We describe the basic model, develop the interval-censored likelihood and extend the model to include gamma frailty and a dispersion model. We evaluate the models by means of a simulation study and a detailed re-analysis of data from the Signal Tandmobiel$^{\circledR}$ study. The results demonstrate that the multi-parameter regression model with frailty is computationally efficient and provides an excellent fit to the data.
△ Less
Submitted 28 January, 2019;
originally announced January 2019.
-
Domain Adaptive Transfer Learning with Specialist Models
Authors:
Jiquan Ngiam,
Daiyi Peng,
Vijay Vasudevan,
Simon Kornblith,
Quoc V. Le,
Ruoming Pang
Abstract:
Transfer learning is a widely used method to build high performing computer vision models. In this paper, we study the efficacy of transfer learning by examining how the choice of data impacts performance. We find that more pre-training data does not always help, and transfer performance depends on a judicious choice of pre-training data. These findings are important given the continued increase i…
▽ More
Transfer learning is a widely used method to build high performing computer vision models. In this paper, we study the efficacy of transfer learning by examining how the choice of data impacts performance. We find that more pre-training data does not always help, and transfer performance depends on a judicious choice of pre-training data. These findings are important given the continued increase in dataset sizes. We further propose domain adaptive transfer learning, a simple and effective pre-training method using importance weights computed based on the target dataset. Our method to compute importance weights follow from ideas in domain adaptation, and we show a novel application to transfer learning. Our methods achieve state-of-the-art results on multiple fine-grained classification datasets and are well-suited for use in practice.
△ Less
Submitted 11 December, 2018; v1 submitted 16 November, 2018;
originally announced November 2018.
-
Ultra-wideband THz/IR Metamaterial Absorber based on Doped Silicon
Authors:
Huafeng Liu,
Kai Luo,
Danhua Peng,
Fang**g Hu,
Liangcheng Tu
Abstract:
Metamaterial-based absorbers have been extensively investigated in the terahertz (THz) range with ever increasing performances. In this paper, we propose an all-dielectric THz absorber based on doped silicon. The unit cell consists of a silicon cross resonator with an internal cross-shaped air cavity. Numerical results suggest that the proposed absorber can operate from THz to mid-infrared, having…
▽ More
Metamaterial-based absorbers have been extensively investigated in the terahertz (THz) range with ever increasing performances. In this paper, we propose an all-dielectric THz absorber based on doped silicon. The unit cell consists of a silicon cross resonator with an internal cross-shaped air cavity. Numerical results suggest that the proposed absorber can operate from THz to mid-infrared, having an average power absorption of >95% between 0.6 and 10 THz. Experimental results using THz time-domain spectroscopy show a good agreement with simulations. The underlying mechanisms for broadband absorptions are attributed to the combined effects of multiple cavities modes formed by silicon resonators and bulk absorption in the substrate, as confirmed by simulated field patterns. This ultra-wideband absorption is polarization insensitive and can operate across a wide range of the incident angle. The proposed absorber can be readily integrated into silicon-based platforms and is expected to be used in sensing, imaging, energy harvesting and wireless communications systems.
△ Less
Submitted 26 September, 2018; v1 submitted 25 September, 2018;
originally announced September 2018.
-
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples
Authors:
Dan Peng,
Zizhan Zheng,
Xiaofeng Zhang
Abstract:
Adversarial examples are perturbed inputs designed to fool machine learning models. Most recent works on adversarial examples for image classification focus on directly modifying pixels with minor perturbations. A common requirement in all these works is that the malicious perturbations should be small enough (measured by an L_p norm for some p) so that they are imperceptible to humans. However, s…
▽ More
Adversarial examples are perturbed inputs designed to fool machine learning models. Most recent works on adversarial examples for image classification focus on directly modifying pixels with minor perturbations. A common requirement in all these works is that the malicious perturbations should be small enough (measured by an L_p norm for some p) so that they are imperceptible to humans. However, small perturbations can be unnecessarily restrictive and limit the diversity of adversarial examples generated. Further, an L_p norm based distance metric ignores important structure patterns hidden in images that are important to human perception. Consequently, even the minor perturbation introduced in recent works often makes the adversarial examples less natural to humans. More importantly, they often do not transfer well and are therefore less effective when attacking black-box models especially for those protected by a defense mechanism. In this paper, we propose a structure-preserving transformation (SPT) for generating natural and diverse adversarial examples with extremely high transferability. The key idea of our approach is to allow perceptible deviation in adversarial examples while kee** structure patterns that are central to a human classifier. Empirical results on the MNIST and the fashion-MNIST datasets show that adversarial examples generated by our approach can easily bypass strong adversarial training. Further, they transfer well to other target models with no loss or little loss of successful attack rate.
△ Less
Submitted 22 December, 2018; v1 submitted 8 September, 2018;
originally announced September 2018.
-
Multiobjective Test Problems with Degenerate Pareto Fronts
Authors:
Liangli Zhen,
Miqing Li,
Ran Cheng,
Dezhong Peng,
Xin Yao
Abstract:
In multiobjective optimisation, a set of scalable test problems with a variety of features allow researchers to investigate and evaluate the abilities of different optimisation algorithms, and thus can help them to design and develop more effective and efficient approaches. Existing test problem suites mainly focus on situations where all the objectives are fully conflicting with each other. In su…
▽ More
In multiobjective optimisation, a set of scalable test problems with a variety of features allow researchers to investigate and evaluate the abilities of different optimisation algorithms, and thus can help them to design and develop more effective and efficient approaches. Existing test problem suites mainly focus on situations where all the objectives are fully conflicting with each other. In such cases, an m-objective optimisation problem has an (m-1)-dimensional Pareto front in the objective space. However, in some optimisation problems, there may be unexpected characteristics among objectives, e.g., redundancy. The redundancy of some objectives can lead to the multiobjective problem having a degenerate Pareto front, i.e., the dimension of the Pareto front of the $m$-objective problem be less than (m-1). In this paper, we systematically study degenerate multiobjective problems. We abstract three general characteristics of degenerate problems, which are not formulated and systematically investigated in the literature. Based on these characteristics, we present a set of test problems to support the investigation of multiobjective optimisation algorithms under situations with redundant objectives. To the best of our knowledge, this work is the first one that explicitly formulates these three characteristics of degenerate problems, thus allowing the resulting test problems to be featured by their generality, in contrast to existing test problems designed for specific purposes (e.g., visualisation).
△ Less
Submitted 23 August, 2022; v1 submitted 7 June, 2018;
originally announced June 2018.
-
Detecting Heads using Feature Refine Net and Cascaded Multi-Scale Architecture
Authors:
Dezhi Peng,
Zikai Sun,
Zirong Chen,
Zirui Cai,
Lele Xie,
Lianwen **
Abstract:
This paper presents a method that can accurately detect heads especially small heads under the indoor scene. To achieve this, we propose a novel method, Feature Refine Net (FRN), and a cascaded multi-scale architecture. FRN exploits the multi-scale hierarchical features created by deep convolutional neural networks. The proposed channel weighting method enables FRN to make use of features alternat…
▽ More
This paper presents a method that can accurately detect heads especially small heads under the indoor scene. To achieve this, we propose a novel method, Feature Refine Net (FRN), and a cascaded multi-scale architecture. FRN exploits the multi-scale hierarchical features created by deep convolutional neural networks. The proposed channel weighting method enables FRN to make use of features alternatively and effectively. To improve the performance of small head detection, we propose a cascaded multi-scale architecture which has two detectors. One called global detector is responsible for detecting large objects and acquiring the global distribution information. The other called local detector is designed for small objects detection and makes use of the information provided by global detector. Due to the lack of head detection datasets, we have collected and labeled a new large dataset named SCUT-HEAD which includes 4405 images with 111251 heads annotated. Experiments show that our method has achieved state-of-the-art performance on SCUT-HEAD.
△ Less
Submitted 23 November, 2018; v1 submitted 25 March, 2018;
originally announced March 2018.
-
Kernel Truncated Regression Representation for Robust Subspace Clustering
Authors:
Liangli Zhen,
Dezhong Peng,
Wei Wang,
Xin Yao
Abstract:
Subspace clustering aims to group data points into multiple clusters of which each corresponds to one subspace. Most existing subspace clustering approaches assume that input data lie on linear subspaces. In practice, however, this assumption usually does not hold. To achieve nonlinear subspace clustering, we propose a novel method, called kernel truncated regression representation. Our method con…
▽ More
Subspace clustering aims to group data points into multiple clusters of which each corresponds to one subspace. Most existing subspace clustering approaches assume that input data lie on linear subspaces. In practice, however, this assumption usually does not hold. To achieve nonlinear subspace clustering, we propose a novel method, called kernel truncated regression representation. Our method consists of the following four steps: 1) projecting the input data into a hidden space, where each data point can be linearly represented by other data points; 2) calculating the linear representation coefficients of the data representations in the hidden space; 3) truncating the trivial coefficients to achieve robustness and block-diagonality; and 4) executing the graph cutting operation on the coefficient matrix by solving a graph Laplacian problem. Our method has the advantages of a closed-form solution and the capacity of clustering data points that lie on nonlinear subspaces. The first advantage makes our method efficient in handling large-scale datasets, and the second one enables the proposed method to conquer the nonlinear subspace clustering challenge. Extensive experiments on six benchmarks demonstrate the effectiveness and the efficiency of the proposed method in comparison with current state-of-the-art approaches.
△ Less
Submitted 27 March, 2020; v1 submitted 15 May, 2017;
originally announced May 2017.
-
Roles of the spreading scope and effectiveness in spreading dynamics on multiplex networks
Authors:
Ming Li,
Run-Ran Liu,
Dan Peng,
Chun-Xiao Jia,
Bing-Hong Wang
Abstract:
Comparing with single networks, the multiplex networks bring two main effects on the spreading process among individuals. First, the pathogen or information can be transmitted to more individuals through different layers at one time, which enlarges the spreading scope. Second, through different layers, an individual can also transmit the pathogen or information to the same individuals more than on…
▽ More
Comparing with single networks, the multiplex networks bring two main effects on the spreading process among individuals. First, the pathogen or information can be transmitted to more individuals through different layers at one time, which enlarges the spreading scope. Second, through different layers, an individual can also transmit the pathogen or information to the same individuals more than once at one time, which makes the spreading more effective. To understand the different roles of the spreading scope and effectiveness, we propose an epidemic model on multiplex networks with link overlap**, where the spreading effectiveness of each interaction as well as the variety of channels (spreading scope) can be controlled by the number of overlap** links. We find that for Poisson degree distribution, increasing the epidemic scope (the first effect) is more efficient than enhancing epidemic probability (the second effect) to facilitate the spreading process. However, for power-law degree distribution, the effects of the two factors on the spreading dynamics become complicated. Enhancing epidemic probability makes pathogen or rumor easier to outbreak in a finite system. But after that increasing epidemic scopes is still more effective for a wide spreading. Theoretical results along with reasonable explanation for these phenomena are all given in this paper, which indicates that the epidemic scope could play an important role in the spreading dynamics.
△ Less
Submitted 27 November, 2017; v1 submitted 18 April, 2016;
originally announced April 2016.
-
Robust Multiple-Range Coherent Quantum State Transfer
Authors:
B. Chen,
Y. D. Peng,
Y. Li,
X. F. Qian
Abstract:
We propose a multiple-range quantum communication channel to realize coherent two-way quantum state transport with high fidelity. In our scheme, an information carrier (a qubit) and its remote partner are both adiabatically coupled to the same data bus, i.e., an N}-site tight-binding chain that has a single defect at the center. At the weak interaction regime, our system is effectively equivalent…
▽ More
We propose a multiple-range quantum communication channel to realize coherent two-way quantum state transport with high fidelity. In our scheme, an information carrier (a qubit) and its remote partner are both adiabatically coupled to the same data bus, i.e., an N}-site tight-binding chain that has a single defect at the center. At the weak interaction regime, our system is effectively equivalent to a three level system of which a coherent superposition of the two carrier states constitutes a dark state. The adiabatic coupling allows a well controllable information exchange timing via the dark state between the two carriers. Numerical results show that our scheme is robust and efficient under practically inevitable perturbative defects of the data bus as well as environmental dephasing noise.
△ Less
Submitted 6 December, 2015;
originally announced December 2015.
-
A glass half full interpretation of the replicability of psychological science
Authors:
Jeffrey T. Leek,
Prasad Patil,
Roger D. Peng
Abstract:
A recent study of the replicability of key psychological findings is a major contribution toward understanding the human side of the scientific process. Despite the careful and nuanced analysis reported in the paper, mass and social media adhered to the simple narrative that only 36% of the studies replicated their original results. Here we show that 77% of the replication effect sizes reported we…
▽ More
A recent study of the replicability of key psychological findings is a major contribution toward understanding the human side of the scientific process. Despite the careful and nuanced analysis reported in the paper, mass and social media adhered to the simple narrative that only 36% of the studies replicated their original results. Here we show that 77% of the replication effect sizes reported were within a prediction interval based on the original effect size. In this light, the results of Reproducibility Project: Psychology can be viewed as a positive result for the scientific process.
△ Less
Submitted 29 September, 2015;
originally announced September 2015.
-
Reproducible Research Can Still Be Wrong: Adopting a Prevention Approach
Authors:
Jeffrey T. Leek,
Roger D. Peng
Abstract:
Reproducibility, the ability to recompute results, and replicability, the chances other experimenters will achieve a consistent result, are two foundational characteristics of successful scientific research. Consistent findings from independent investigators are the primary means by which scientific evidence accumulates for or against an hypothesis. And yet, of late there has been a crisis of conf…
▽ More
Reproducibility, the ability to recompute results, and replicability, the chances other experimenters will achieve a consistent result, are two foundational characteristics of successful scientific research. Consistent findings from independent investigators are the primary means by which scientific evidence accumulates for or against an hypothesis. And yet, of late there has been a crisis of confidence among researchers worried about the rate at which studies are either reproducible or replicable. In order to maintain the integrity of science research and maintain the public's trust in science, the scientific community must ensure reproducibility and replicability by engaging in a more preventative approach that greatly expands data analysis education and routinely employs software tools.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
Punctuated equilibrium dynamics in human communications
Authors:
Dan Peng,
Xiao-Pu Han,
Zong-Wen Wei,
Bing-Hong Wang
Abstract:
A minimal model based on individual interactions is proposed to study the non-Poisson statistical properties of human behavior: individuals in the system interact with their neighbors, the probability of an individual acting correlates to its activity, and all individuals involved in action will change their activities randomly. The model creates rich non-Poisson spatial-temporal properties in the…
▽ More
A minimal model based on individual interactions is proposed to study the non-Poisson statistical properties of human behavior: individuals in the system interact with their neighbors, the probability of an individual acting correlates to its activity, and all individuals involved in action will change their activities randomly. The model creates rich non-Poisson spatial-temporal properties in the activities of individuals, in agreement with the patterns of human communication behaviors. Our findings provide insight into various human activities, embracing a range of realistic social interacting systems, particularly, intriguing bimodal phenomenons. This model bridges priority queues and punctuated equilibrium, and our modeling and analysis is likely to shed light on non-Poisson phenomena in many complex systems.
△ Less
Submitted 20 October, 2014;
originally announced October 2014.
-
Equivalence of Particle-Particle Random Phase Approximation Correlation Energy and Ladder-Coupled-Cluster-Double
Authors:
Degao Peng,
Stephan N. Steinmann,
Helen van Aggelen,
Weitao Yang
Abstract:
We present an analytical proof and numerical demonstrations of the equivalence of the correlation energy from particle-particle random phase approximation (pp-RPA) and ladder-couple-cluster-doubles (ladder-CCD). These two theories reduce to the identical algebraic matrix equation and correlation energy expressions, under the assumption that the pp-RPA equation is stable. The numerical examples ill…
▽ More
We present an analytical proof and numerical demonstrations of the equivalence of the correlation energy from particle-particle random phase approximation (pp-RPA) and ladder-couple-cluster-doubles (ladder-CCD). These two theories reduce to the identical algebraic matrix equation and correlation energy expressions, under the assumption that the pp-RPA equation is stable. The numerical examples illustrate that the correlation energy missed by pp-RPA in comparison with couple-cluster single and double is largely canceled out when considering reaction energies. This theoretical connection will be beneficial to future pp-RPA studies based on the well established couple cluster theory.
△ Less
Submitted 24 June, 2013;
originally announced June 2013.
-
Neutron collimator design of neutron radiography based on the BNCT facility
Authors:
XP. Yang,
BX. Yu,
YG. Li,
D. Peng,
J. Lu,
GL. Zhang,
H. Zhao,
AW. Zhang,
CY. Li,
WJ. Liu,
T. Hu,
JG. Lv
Abstract:
For the research of CCD neutron radiography, a neutron collimator was designed based on the exit of thermal neutron of the Boron Neutron Capture Therapy (BNCT) reactor. Based on the Geant4 simulations, the preliminary choice of the size of the collimator was determined. The materials were selected according to the literature data. Then, a collimator was constructed and tested on site. The results…
▽ More
For the research of CCD neutron radiography, a neutron collimator was designed based on the exit of thermal neutron of the Boron Neutron Capture Therapy (BNCT) reactor. Based on the Geant4 simulations, the preliminary choice of the size of the collimator was determined. The materials were selected according to the literature data. Then, a collimator was constructed and tested on site. The results of experiment and simulation show that the thermal neutron flux at the end of theneutron collimator is greater than 10^6 n/cm^2/s, the maximum collimation ratio (L/D) is 58, the Cd-ratio(Mn) is 160 and the diameter of collimator end is 10 cm. This neutron collimator is considered to be applicable for neutron radiography.
△ Less
Submitted 3 May, 2013;
originally announced May 2013.
-
Locally linear representation for image clustering
Authors:
Liangli Zhen,
Zhang Yi,
Xi Peng,
Dezhong Peng
Abstract:
It is a key to construct a similarity graph in graph-oriented subspace learning and clustering. In a similarity graph, each vertex denotes a data point and the edge weight represents the similarity between two points. There are two popular schemes to construct a similarity graph, i.e., pairwise distance based scheme and linear representation based scheme. Most existing works have only involved one…
▽ More
It is a key to construct a similarity graph in graph-oriented subspace learning and clustering. In a similarity graph, each vertex denotes a data point and the edge weight represents the similarity between two points. There are two popular schemes to construct a similarity graph, i.e., pairwise distance based scheme and linear representation based scheme. Most existing works have only involved one of the above schemes and suffered from some limitations. Specifically, pairwise distance based methods are sensitive to the noises and outliers compared with linear representation based methods. On the other hand, there is the possibility that linear representation based algorithms wrongly select inter-subspaces points to represent a point, which will degrade the performance. In this paper, we propose an algorithm, called Locally Linear Representation (LLR), which integrates pairwise distance with linear representation together to address the problems. The proposed algorithm can automatically encode each data point over a set of points that not only could denote the objective point with less residual error, but also are close to the point in Euclidean space. The experimental results show that our approach is promising in subspace learning and subspace clustering.
△ Less
Submitted 16 May, 2017; v1 submitted 24 April, 2013;
originally announced April 2013.
-
An efficient implementation of two-component relativistic exact-decoupling methods for large molecules
Authors:
Daoling Peng,
Nils Middendorf,
Florian Weigend,
Markus Reiher
Abstract:
We present an efficient algorithm for one- and two-component relativistic exact-decoupling calculations. Spin-orbit coupling is thus taken into account for the evaluation of relativistically transformed (one-electron) Hamiltonian. As the relativistic decoupling transformation has to be evaluated with primitive functions, the construction of the relativistic one-electron Hamiltonian becomes the bot…
▽ More
We present an efficient algorithm for one- and two-component relativistic exact-decoupling calculations. Spin-orbit coupling is thus taken into account for the evaluation of relativistically transformed (one-electron) Hamiltonian. As the relativistic decoupling transformation has to be evaluated with primitive functions, the construction of the relativistic one-electron Hamiltonian becomes the bottleneck of the whole calculation for large molecules. For the established exact-decoupling protocols, a minimal matrix operation count is established and discussed in detail. Furthermore, we apply our recently developed local DLU scheme [J. Chem. Phys. 136 (2012) 244108] to accelerate this step. With our new implementation two-component relativistic density functional calculations can be performed invoking the resolution-of-identity density-fitting approximation and (Abelian as well as non-Abelian) point group symmetry to accelerate both the exact-decoupling and the two-electron part. The capability of our implementation is illustrated at the example of silver clusters with up to 309 atoms, for which the cohesive energy is calculated and extrapolated to the bulk.
△ Less
Submitted 9 May, 2013; v1 submitted 18 March, 2013;
originally announced March 2013.
-
Local Relativistic Exact Decoupling
Authors:
Daoling Peng,
Markus Reiher
Abstract:
We present a systematic hierarchy of approximations for {\it local} exact-decoupling of four-component quantum chemical Hamiltonians based on the Dirac equation. Our ansatz reaches beyond the trivial local approximation that is based on a unitary transformation of only the atomic block-diagonal part of the Hamiltonian. Systematically, off-diagonal Hamiltonian matrix blocks can be subjected to a un…
▽ More
We present a systematic hierarchy of approximations for {\it local} exact-decoupling of four-component quantum chemical Hamiltonians based on the Dirac equation. Our ansatz reaches beyond the trivial local approximation that is based on a unitary transformation of only the atomic block-diagonal part of the Hamiltonian. Systematically, off-diagonal Hamiltonian matrix blocks can be subjected to a unitary transformation to yield relativistically corrected matrix elements. The full hierarchy is investigated with respect to the accuracy reached for the electronic energy and molecular properties on a balanced test molecule set that comprises molecules with heavy elements in different bonding situations. Our atomic (local) assembly of the unitary transformation needed for exact decoupling provides an excellent local approximation for any relativistic exact-decoupling approach. Its order-$N^2$ scaling can be further reduced to linear scaling by employing the neighboring-atomic-blocks approximation. Therefore, it is an efficient relativistic method perfectly well suited for relativistic calculations on large molecules. If a large molecule contains many light atoms (typically hydrogen atoms), the computational costs can be further reduced by employing a well-defined non-relativistic approximation for these light atoms without significant loss of accuracy.
△ Less
Submitted 27 June, 2012; v1 submitted 12 April, 2012;
originally announced April 2012.
-
Hawking Radiation as tunneling and the unified first law of thermodynamics for a class of dynamical black holes
Authors:
Ke-Xia Jiang,
San-Min Ke,
Dan-Tao Peng
Abstract:
An analysis of relations between the tunneling rate and the unified first law of thermodynamics at the trap** horizons of two kinds of spherically symmetric dynamical black holes is investigated. The first kind is the Vaidya-Bardeen black hole, the tunneling rate $Γ\sim e^{\triangle S}$ can be obtained naturally from the unified first law at the apparent horizon, which holds the form…
▽ More
An analysis of relations between the tunneling rate and the unified first law of thermodynamics at the trap** horizons of two kinds of spherically symmetric dynamical black holes is investigated. The first kind is the Vaidya-Bardeen black hole, the tunneling rate $Γ\sim e^{\triangle S}$ can be obtained naturally from the unified first law at the apparent horizon, which holds the form $dE_{H}=TdS+WdV$. Another is the McVittie solution, the action of the radial null geodesic of the outgoing particles does not always has a pole at the apparent horizon, while the ingoing mode always has one. The solution of the ingoing mode of the radiation can be mathematically reduced to the case in the FRW universe smoothly. However as a black hole, the physical meaning is unclear and even puzzling.
△ Less
Submitted 3 May, 2011;
originally announced May 2011.
-
Sensitive frequency-dependence of the carrier-envelope phase effect on bound-bound transition: an interference perspective
Authors:
Dian Peng,
Biao Wu,
Panming Fu,
Bingbing Wang,
Jiangbin Gong,
Zong-Chao Yan
Abstract:
We investigate numerically with Hylleraas coordinates the frequency dependence of the carrier-envelope phase (CEP) effect on bound-bound transitions of helium induced by an ultrashort laser pulse of few cycles. We find that the CEP effect is very sensitive to the carrier frequency of the laser pulse, occurring regularly even at far-off resonance frequencies. By analyzing a two-level model, we find…
▽ More
We investigate numerically with Hylleraas coordinates the frequency dependence of the carrier-envelope phase (CEP) effect on bound-bound transitions of helium induced by an ultrashort laser pulse of few cycles. We find that the CEP effect is very sensitive to the carrier frequency of the laser pulse, occurring regularly even at far-off resonance frequencies. By analyzing a two-level model, we find that the CEP effect can be attributed to the quantum interference between neighboring multi-photon transition pathways, which is made possible by the broadened spectrum of the ultrashort laser pulse. A general picture is developed along this line to understand the sensitivity of the CEP effect to laser's carrier frequency. Multi-level influence on the CEP effect is also discussed.
△ Less
Submitted 25 September, 2010;
originally announced September 2010.
-
Construction of Frequency Hop** Sequence Set Based upon Generalized Cyclotomy
Authors:
Fang Liu,
Daiyuan Peng,
Zhengchun Zhou,
Xiaohu Tang
Abstract:
Frequency hop** (FH) sequences play a key role in frequency hop** spread spectrum communication systems. It is important to find FH sequences which have simultaneously good Hamming correlation, large family size and large period. In this paper, a new set of FH sequences with large period is proposed, and the Hamming correlation distribution of the new set is investigated. The construction of n…
▽ More
Frequency hop** (FH) sequences play a key role in frequency hop** spread spectrum communication systems. It is important to find FH sequences which have simultaneously good Hamming correlation, large family size and large period. In this paper, a new set of FH sequences with large period is proposed, and the Hamming correlation distribution of the new set is investigated. The construction of new FH sequences is based upon Whiteman's generalized cyclotomy. It is shown that the proposed FH sequence set is optimal with respect to the average Hamming correlation bound.
△ Less
Submitted 18 September, 2010;
originally announced September 2010.
-
Tunable ultranarrow linewidth of cavity induced by interacting dark resonances
Authors:
Y. D. Peng,
L. L. **,
Y. P. Niu,
S. Q. Gong
Abstract:
A scheme for getting a tunable ultranarrow linewidth of a cavity due to an embedded four-level atomic medium with double-dark resonances is proposed. It is shown that the steep dispersion induced by double-dark resonances in the transparency window leads to the ultranarrow transmission peak. Compared with the case of a single-dark-resonance system, the linewidth can be narrowed even by one order…
▽ More
A scheme for getting a tunable ultranarrow linewidth of a cavity due to an embedded four-level atomic medium with double-dark resonances is proposed. It is shown that the steep dispersion induced by double-dark resonances in the transparency window leads to the ultranarrow transmission peak. Compared with the case of a single-dark-resonance system, the linewidth can be narrowed even by one order under proper conditions. Furthermore, the position of the ultranarrow peak can be engineered by varying the intensity and detuning of the control field.
△ Less
Submitted 17 June, 2009;
originally announced June 2009.