-
How Reliable and Stable are Explanations of XAI Methods?
Authors:
José Ribeiro,
Lucas Cardoso,
Vitor Santos,
Eduardo Carvalho,
Níkolas Carneiro,
Ronnie Alves
Abstract:
Black box models are increasingly being used in the daily lives of human beings living in society. Along with this increase, there has been the emergence of Explainable Artificial Intelligence (XAI) methods aimed at generating additional explanations regarding how the model makes certain predictions. In this sense, methods such as Dalex, Eli5, eXirt, Lofo and Shap emerged as different proposals an…
▽ More
Black box models are increasingly being used in the daily lives of human beings living in society. Along with this increase, there has been the emergence of Explainable Artificial Intelligence (XAI) methods aimed at generating additional explanations regarding how the model makes certain predictions. In this sense, methods such as Dalex, Eli5, eXirt, Lofo and Shap emerged as different proposals and methodologies for generating explanations of black box models in an agnostic way. Along with the emergence of these methods, questions arise such as "How Reliable and Stable are XAI Methods?". With the aim of shedding light on this main question, this research creates a pipeline that performs experiments using the diabetes dataset and four different machine learning models (LGBM, MLP, DT and KNN), creating different levels of perturbations of the test data and finally generates explanations from the eXirt method regarding the confidence of the models and also feature relevances ranks from all XAI methods mentioned, in order to measure their stability in the face of perturbations. As a result, it was found that eXirt was able to identify the most reliable models among all those used. It was also found that current XAI methods are sensitive to perturbations, with the exception of one specific method.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Low-Degree Polynomials Are Good Extractors
Authors:
Omar Alrabiah,
Jesse Goodman,
Jonathan Mosheiff,
João Ribeiro
Abstract:
We prove that random low-degree polynomials (over $\mathbb{F}_2$) are unbiased, in an extremely general sense. That is, we show that random low-degree polynomials are good randomness extractors for a wide class of distributions. Prior to our work, such results were only known for the small families of (1) uniform sources, (2) affine sources, and (3) local sources. We significantly generalize these…
▽ More
We prove that random low-degree polynomials (over $\mathbb{F}_2$) are unbiased, in an extremely general sense. That is, we show that random low-degree polynomials are good randomness extractors for a wide class of distributions. Prior to our work, such results were only known for the small families of (1) uniform sources, (2) affine sources, and (3) local sources. We significantly generalize these results, and prove the following.
1. Low-degree polynomials extract from small families. We show that a random low-degree polynomial is a good low-error extractor for any small family of sources. In particular, we improve the positive result of Alrabiah, Chattopadhyay, Goodman, Li, and Ribeiro (ICALP 2022) for local sources, and give new results for polynomial sources and variety sources via a single unified approach.
2. Low-degree polynomials extract from sumset sources. We show that a random low-degree polynomial is a good extractor for sumset sources, which are the most general large family of sources (capturing independent sources, interleaved sources, small-space sources, and more). This extractor achieves polynomially small error, and its min-entropy requirement is tight up to a square.
Our results on sumset extractors imply new complexity separations for linear ROBPs, and the tools that go into its proof have further applications, as well. The two main tools we use are a new structural result on sumset-punctured Reed-Muller codes, paired with a novel type of reduction between randomness extractors. Using the first new tool, we strengthen and generalize the extractor impossibility results of Chattopadhyay, Goodman, and Gurumukhani (ITCS 2024). Using the second, we show the existence of sumset extractors for min-entropy $k=O(\log(n/\varepsilon))$, resolving an open problem of Chattopadhyay and Liao (STOC 2022).
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Chiral-vacuum excited replicae in QCD modeling
Authors:
Eduardo Garnacho-Velasco,
Pedro J. de A. Bicudo,
J. Emilio F. T. Ribeiro,
Felipe J. Llanes-Estrada,
Lucas Pérez Molina,
Victor Serrano Herreros,
Jorge Vallejo Fernández
Abstract:
We present a detailed study of the Bardeen-Cooper-Schrieffer (BCS) gap equation ``replicae'' or excited vacuum states, orthogonal to the ground-state one, in the chiral-quark sector of the Hamiltonian Coulomb-gauge model of chromodynamics. Analyzing the number of negative eigenmodes of the energy density's Hessian we believe that we have identified all of the (negative energy-density) vacua of thi…
▽ More
We present a detailed study of the Bardeen-Cooper-Schrieffer (BCS) gap equation ``replicae'' or excited vacuum states, orthogonal to the ground-state one, in the chiral-quark sector of the Hamiltonian Coulomb-gauge model of chromodynamics. Analyzing the number of negative eigenmodes of the energy density's Hessian we believe that we have identified all of the (negative energy-density) vacua of this nonlinear system, namely the ground BCS state and two (or one) replicae for slightly massive (or massless) quarks, given the interaction strength typical of the strong interactions. The meson spectrum over each of the replicae looks similar, so the differences are not significant enough given model uncertainties, but matrix elements are more sensitive and allow to distinguish them. We propose to look for such excited vacua in lattice gauge theory by trying to identify excitations with scalar quantum numbers which have energies proportional to the lattice volume (unlike conventional mesons for which the mass stabilizes to a constant upon taking the infinite volume limit).
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
An Invitation to Resolvent Analysis
Authors:
Laura Victoria Rolandi,
Jean Hélder Marques Ribeiro,
Chi-An Yeh,
Kunihiko Taira
Abstract:
Resolvent analysis is a powerful tool that can reveal the linear amplification mechanisms between the forcing inputs and the response outputs about a base flow. These mechanisms can be revealed in terms of a pair of forcing and response modes and the associated gains (amplification magnitude) in the order of energy contents at a given frequency. The linear relationship that ties the forcing and th…
▽ More
Resolvent analysis is a powerful tool that can reveal the linear amplification mechanisms between the forcing inputs and the response outputs about a base flow. These mechanisms can be revealed in terms of a pair of forcing and response modes and the associated gains (amplification magnitude) in the order of energy contents at a given frequency. The linear relationship that ties the forcing and the response is represented through the resolvent operator (transfer function), which is constructed through spatially discretizing the linearized Navier-Stokes operator. One of the unique strengths of resolvent analysis is its ability to analyze statistically stationary turbulent flows. In light of the increasing interest in using resolvent analysis to study a variety of flows, we offer this guide in hopes of removing the hurdle for students and researchers to initiate the development of a resolvent analysis code and its applications to their problems of interest. To achieve this goal, we discuss various aspects of resolvent analysis and its role in identifying dominant flow structures about the base flow. The discussion in this paper revolves around the compressible Navier-Stokes equations in the most general manner. We cover essential considerations ranging from selecting the base flow and appropriate energy norms to the intricacies of constructing the linear operator and performing eigenvalue and singular value decompositions. Throughout the paper, we offer details and know-how that may not be available to readers in a collective manner elsewhere. Towards the end of this paper, examples are offered to demonstrate the practical applicability of resolvent analysis, aiming to guide readers through its implementation and inspire further extensions. We invite readers to consider resolvent analysis as a companion for their research endeavors.
△ Less
Submitted 25 April, 2024; v1 submitted 17 April, 2024;
originally announced April 2024.
-
Triglobal resolvent-analysis-based control of separated flows around low-aspect-ratio wings
Authors:
Jean Hélder Marques Ribeiro,
Kunihiko Taira
Abstract:
We perform direct numerical simulations (DNS) of actively controlled laminar separated wakes around low-aspect-ratio wings with two primary goals: (i) reducing the size of the separation bubble and (ii) attenuating the wing tip vortex. Instead of preventing separation, we modify the three-dimensional ($3$-D) dynamics to exploit wake vortices for aerodynamic enhancements. A direct wake modification…
▽ More
We perform direct numerical simulations (DNS) of actively controlled laminar separated wakes around low-aspect-ratio wings with two primary goals: (i) reducing the size of the separation bubble and (ii) attenuating the wing tip vortex. Instead of preventing separation, we modify the three-dimensional ($3$-D) dynamics to exploit wake vortices for aerodynamic enhancements. A direct wake modification is considered using optimal harmonic forcing modes from triglobal resolvent analysis. For this study, we consider wings at angles of attack of $14^\circ$ and $22^\circ$, taper ratios $0.27$ and $1$, and leading edge sweep angles of $0^\circ$ and $30^\circ$, at a mean-chord-based Reynolds number of $600$. The wakes behind these wings exhibit $3$-D reversed-flow bubble and large-scale vortical structures. For tapered swept wings, the diversity of wake vortices increases substantially, posing a challenge for flow control. To achieve the first control objective for an untapered unswept wing, root-based actuation at the shedding frequency is introduced to reduce the reversed-flow bubble size by taking advantage of the wake vortices to significantly enhance the aerodynamic performance of the wing. For both untapered and tapered swept wings, root-based actuation modifies the stalled flow, reduces the reversed-flow region, and enhances aerodynamic performance by increasing the root contribution to lift. For the goal of controlling the tip vortex, we demonstrate the effectiveness of actuation with high-frequency perturbations near the tip. This study shows how insights from resolvent analysis for unsteady actuation can enable global modification of $3$-D separated wakes and achieve improved aerodynamics of wings.
△ Less
Submitted 18 June, 2024; v1 submitted 19 February, 2024;
originally announced February 2024.
-
MEDPSeg: Hierarchical polymorphic multitask learning for the segmentation of ground-glass opacities, consolidation, and pulmonary structures on computed tomography
Authors:
Diedre S. Carmo,
Jean A. Ribeiro,
Alejandro P. Comellas,
Joseph M. Reinhardt,
Sarah E. Gerard,
Letícia Rittner,
Roberto A. Lotufo
Abstract:
The COVID-19 pandemic response highlighted the potential of deep learning methods in facilitating the diagnosis, prognosis and understanding of lung diseases through automated segmentation of pulmonary structures and lesions in chest computed tomography (CT). Automated separation of lung lesion into ground-glass opacity (GGO) and consolidation is hindered due to the labor-intensive and subjective…
▽ More
The COVID-19 pandemic response highlighted the potential of deep learning methods in facilitating the diagnosis, prognosis and understanding of lung diseases through automated segmentation of pulmonary structures and lesions in chest computed tomography (CT). Automated separation of lung lesion into ground-glass opacity (GGO) and consolidation is hindered due to the labor-intensive and subjective nature of this task, resulting in scarce availability of ground truth for supervised learning. To tackle this problem, we propose MEDPSeg. MEDPSeg learns from heterogeneous chest CT targets through hierarchical polymorphic multitask learning (HPML). HPML explores the hierarchical nature of GGO and consolidation, lung lesions, and the lungs, with further benefits achieved through multitasking airway and pulmonary artery segmentation. Over 6000 volumetric CT scans from different partially labeled sources were used for training and testing. Experiments show PML enabling new state-of-the-art performance for GGO and consolidation segmentation tasks. In addition, MEDPSeg simultaneously performs segmentation of the lung parenchyma, airways, pulmonary artery, and lung lesions, all in a single forward prediction, with performance comparable to state-of-the-art methods specialized in each of those targets. Finally, we provide an open-source implementation with a graphical user interface at https://github.com/MICLab-Unicamp/medpseg.
△ Less
Submitted 25 March, 2024; v1 submitted 4 December, 2023;
originally announced December 2023.
-
Beyond Tradition: Evaluating Agile feasibility in DO-178C for Aerospace Software Development
Authors:
J. Eduardo Ferreira Ribeiro,
João Gabriel Silva,
Ademar Aguiar
Abstract:
Domain-specific standards and guidelines play a crucial role in regulating safety-critical systems, with one notable example being the DO-178C document for the aerospace industry. This document provides guidelines for organisations seeking to ensure the safety and certification of their software systems. This paper analyses the DO-178C document within the context of software development for safety…
▽ More
Domain-specific standards and guidelines play a crucial role in regulating safety-critical systems, with one notable example being the DO-178C document for the aerospace industry. This document provides guidelines for organisations seeking to ensure the safety and certification of their software systems. This paper analyses the DO-178C document within the context of software development for safety-critical aerospace systems focusing on Agile software development, aiming to assess its feasibility. Unlike restricting specific development methods, DO-178C offers indispensable support that upholds confidence in safety, aligning seamlessly with the objectives of aerospace industries. Our analysis reveals that there are no limitations or restrictions within the DO-178C that inhibit the adoption of Agile and provides guidelines and objectives for achieving suitable evidence, allowing for various working methods, including Agile methods, contrary to the overall opinion in the industry that the traditional waterfall method is mandatory. Additionally, we emphasise that the guidelines explanation is explicitly tailored to software professionals using Agile methods, giving it a much more specific focus than publications that only provide a generic overview of the standard.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Cheeger cuts and Robin spectral minimal partitions of metric graphs
Authors:
James B. Kennedy,
João P. Ribeiro
Abstract:
We study partition problems based on two ostensibly different kinds of energy functionals defined on $k$-partitions of metric graphs: Cheeger-type functionals whose minimisers are the $k$-Cheeger cuts of the graph, and the corresponding values are the $k$-Cheeger constants of the graph; and functionals built using the first eigenvalue of the Laplacian with positive, i.e. absorbing, Robin (delta) v…
▽ More
We study partition problems based on two ostensibly different kinds of energy functionals defined on $k$-partitions of metric graphs: Cheeger-type functionals whose minimisers are the $k$-Cheeger cuts of the graph, and the corresponding values are the $k$-Cheeger constants of the graph; and functionals built using the first eigenvalue of the Laplacian with positive, i.e. absorbing, Robin (delta) vertex conditions at the boundary of the partition elements. We prove existence of minimising $k$-partitions, $k \geq 2$, for both these functionals. We also show that, for each $k \geq 2$, as the Robin parameter $α\to 0$, up to a renormalisation the spectral minimal Robin energy converges to the $k$-Cheeger constant. Moreover, up to a subsequence, the Robin spectral minimal $k$-partitions converge in a natural sense to a $k$-Cheeger cut of the graph. Finally, we show that as $α\to \infty$ there is convergence in a similar sense to the corresponding Dirichlet minimal energy and partitions.
It is strongly expected that similar results hold on general (smooth, bounded) Euclidean domains and manifolds.
△ Less
Submitted 25 June, 2024; v1 submitted 4 October, 2023;
originally announced October 2023.
-
Revolutionizing Mobile Interaction: Enabling a 3 Billion Parameter GPT LLM on Mobile
Authors:
Samuel Carreira,
Tomás Marques,
José Ribeiro,
Carlos Grilo
Abstract:
The field of Artificial Intelligence has witnessed remarkable progress in recent years, especially with the emergence of powerful large language models (LLMs) based on the transformer architecture. Cloud-based LLMs, such as OpenAI's ChatGPT, offer impressive capabilities but come with concerns regarding latency and privacy due to network dependencies. This article presents an innovative approach t…
▽ More
The field of Artificial Intelligence has witnessed remarkable progress in recent years, especially with the emergence of powerful large language models (LLMs) based on the transformer architecture. Cloud-based LLMs, such as OpenAI's ChatGPT, offer impressive capabilities but come with concerns regarding latency and privacy due to network dependencies. This article presents an innovative approach to LLM inference, envisioning a future where LLMs with billions of parameters can be executed directly on mobile devices without network connectivity. The article showcases a fine-tuned GPT LLM with 3 billion parameters that can operate smoothly on devices with as low as 4GB of memory. Through the integration of native code and model quantization techniques, the application not only serves as a general-purpose assistant but also facilitates seamless mobile interactions with text-to-actions features. The article provides insights into the training pipeline, implementation details, test results, and future directions of on-device LLM inference. This breakthrough technology opens up possibilities for empowering users with sophisticated AI capabilities while preserving their privacy and eliminating latency concerns.
△ Less
Submitted 29 September, 2023;
originally announced October 2023.
-
Kernel Interpolation of Incident Sound Field in Region Including Scattering Objects
Authors:
Shoichi Koyama,
Masaki Nakada,
Juliano G. C. Ribeiro,
Hiroshi Saruwatari
Abstract:
A method for estimating the incident sound field inside a region containing scattering objects is proposed. The sound field estimation method has various applications, such as spatial audio capturing and spatial active noise control; however, most existing methods do not take into account the presence of scatterers within the target estimation region. Although several techniques exist that employ…
▽ More
A method for estimating the incident sound field inside a region containing scattering objects is proposed. The sound field estimation method has various applications, such as spatial audio capturing and spatial active noise control; however, most existing methods do not take into account the presence of scatterers within the target estimation region. Although several techniques exist that employ knowledge or measurements of the properties of the scattering objects, it is usually difficult to obtain them precisely in advance, and their properties may change during the estimation process. Our proposed method is based on the kernel ridge regression of the incident field, with a separation from the scattering field represented by a spherical wave function expansion, thus eliminating the need for prior modeling or measurements of the scatterers. Moreover, we introduce a weighting matrix to induce smoothness of the scattering field in the angular direction, which alleviates the effect of the truncation order of the expansion coefficients on the estimation accuracy. Experimental results indicate that the proposed method achieves a higher level of estimation accuracy than the kernel ridge regression without separation.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Similarities in Massive Separation Across Reynolds Numbers for Swept and Tapered Finite Span Wings
Authors:
Jacob Neal,
Anton Burtsev,
Jean Helder Marques Ribeiro,
Kunihiko Taira,
Vassilios Theofilis,
Michael Amitay
Abstract:
Experimental investigations were performed to elucidate the features of flow fields occurring over cantilevered finite-aspect ratio NACA 0015 wings at high angles of attack with various sweep angles and taper ratios. Volumetric Stereoscopic Particle Image Velocimetry experiments were performed at mean chord based Reynolds number of 247,500 in a wind tunnel and 600 in a water tunnel. Direct Numeric…
▽ More
Experimental investigations were performed to elucidate the features of flow fields occurring over cantilevered finite-aspect ratio NACA 0015 wings at high angles of attack with various sweep angles and taper ratios. Volumetric Stereoscopic Particle Image Velocimetry experiments were performed at mean chord based Reynolds number of 247,500 in a wind tunnel and 600 in a water tunnel. Direct Numerical Simulations (DNS) of the water tunnel test section, including the cantilevered model, were also performed at the lower Reynolds number. The low Reynolds number experiments, low Reynolds number simulations, and high Reynolds number experiments all showed that swee** the leading edge back shifted the largest portion of the reversed flow towards the wingtip while swee** the trailing edge forward shifted the reversed flow towards the wing root. A detailed parametric sweep of planform geometry systematically varied the leading and trailing edge sweep angles and taper ratios of the finite wings. It was found that the large scale vortical structures resulting from varying these parameters at the two Reynolds numbers share surprisingly many three-dimensional topological features, despite the orders of magnitude different Reynolds numbers.
△ Less
Submitted 23 August, 2023;
originally announced August 2023.
-
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages
Authors:
Naresh Goud Boddu,
Vipul Goyal,
Rahul Jain,
João Ribeiro
Abstract:
Non-malleable codes are fundamental objects at the intersection of cryptography and coding theory. These codes provide security guarantees even in settings where error correction and detection are impossible, and have found applications to several other cryptographic tasks. One of the strongest and most well-studied adversarial tampering models is $2$-split-state tampering. Here, a codeword is spl…
▽ More
Non-malleable codes are fundamental objects at the intersection of cryptography and coding theory. These codes provide security guarantees even in settings where error correction and detection are impossible, and have found applications to several other cryptographic tasks. One of the strongest and most well-studied adversarial tampering models is $2$-split-state tampering. Here, a codeword is split into two parts and the adversary can then independently tamper with each part using arbitrary functions. This model can be naturally extended to the secret sharing setting with several parties by having the adversary independently tamper with each share. Previous works on non-malleable coding and secret sharing in the split-state tampering model only considered the encoding of \emph{classical} messages. Furthermore, until recent work by Aggarwal, Boddu, and Jain (IEEE Trans.\ Inf.\ Theory 2024), adversaries with quantum capabilities and \emph{shared entanglement} had not been considered, and it is a priori not clear whether previous schemes remain secure in this model.
In this work, we introduce the notions of split-state non-malleable codes and secret sharing schemes for quantum messages secure against quantum adversaries with shared entanglement. Then, we present explicit constructions of such schemes that achieve low-error non-malleability. More precisely, we construct efficiently encodable and decodable split-state non-malleable codes and secret sharing schemes for quantum messages preserving entanglement with external systems and achieving security against quantum adversaries having shared entanglement with codeword length $n$, any message length at most $n^{Ω(1)}$, and error $ε=2^{-{n^{Ω(1)}}}$. In the easier setting of \emph{average-case} non-malleability, we achieve efficient non-malleable coding with rate close to $1/11$.
△ Less
Submitted 27 February, 2024; v1 submitted 12 August, 2023;
originally announced August 2023.
-
Semi-Quantitative Group Testing for Efficient and Accurate qPCR Screening of Pathogens with a Wide Range of Loads
Authors:
Ananthan Nambiar,
Chao Pan,
Vishal Rana,
Mahdi Cheraghchi,
João Ribeiro,
Sergei Maslov,
Olgica Milenkovic
Abstract:
Pathogenic infections pose a significant threat to global health, affecting millions of people every year and presenting substantial challenges to healthcare systems worldwide. Efficient and timely testing plays a critical role in disease control and transmission prevention. Group testing is a well-established method for reducing the number of tests needed to screen large populations when the dise…
▽ More
Pathogenic infections pose a significant threat to global health, affecting millions of people every year and presenting substantial challenges to healthcare systems worldwide. Efficient and timely testing plays a critical role in disease control and transmission prevention. Group testing is a well-established method for reducing the number of tests needed to screen large populations when the disease prevalence is low. However, it does not fully utilize the quantitative information provided by qPCR methods, nor is it able to accommodate a wide range of pathogen loads. To address these issues, we introduce a novel adaptive semi-quantitative group testing (SQGT) scheme to efficiently screen populations via two-stage qPCR testing. The SQGT method quantizes cycle threshold ($Ct$) values into multiple bins, leveraging the information from the first stage of screening to improve the detection sensitivity. Dynamic $Ct$ threshold adjustments mitigate dilution effects and enhance test accuracy. Comparisons with traditional binary outcome GT methods show that SQGT reduces the number of tests by $24$% while maintaining a negligible false negative rate.
△ Less
Submitted 2 August, 2023; v1 submitted 30 July, 2023;
originally announced July 2023.
-
Computational Quantum Secret Sharing
Authors:
Alper Çakan,
Vipul Goyal,
Chen-Da Liu-Zhang,
João Ribeiro
Abstract:
Quantum secret sharing (QSS) allows a dealer to distribute a secret quantum state among a set of parties so that certain subsets can reconstruct the secret, while unauthorized subsets obtain no information. While QSS was introduced over twenty years ago, previous works focused only on existence of perfectly secure schemes, and the share size of the known schemes is exponential even for access stru…
▽ More
Quantum secret sharing (QSS) allows a dealer to distribute a secret quantum state among a set of parties so that certain subsets can reconstruct the secret, while unauthorized subsets obtain no information. While QSS was introduced over twenty years ago, previous works focused only on existence of perfectly secure schemes, and the share size of the known schemes is exponential even for access structures computed by polynomial size monotone circuits. This stands in contrast to the classical case, where efficient computationally-secure schemes have been long known for all access structures in $\mathsf{monotone~P}$, and one can even obtain shares which are much shorter than the secret which is impossible with perfect security.
In this work, we initiate the study of computationally-secure QSS and show that computational assumptions help significantly in building QSS schemes. We present a simple compiler and use it to obtain a large variety results: We construct polynomial-time QSS schemes under standard assumptions for a rich class of access structures. This includes many access structures for which previous results in QSS required exponential share size. We also construct QSS schemes for which the size of the shares is significantly smaller than the size of the secret. As in the classical case, this is impossible with perfect security.
We also use our compiler to obtain results beyond computational QSS. In the information-theoretic setting, we improve the share size of perfect QSS schemes for a large class of access structures to $1.5^{n+o(n)}$, improving upon best known schemes and matching the best known result for general access structures in the classical case. Finally, we show construct efficient schemes for all access structures in $\mathsf{P}$ and $\mathsf{NP}$ when the quantum secret sharing scheme is given multiple of copies of the secret.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.
-
Ultra-fast traveltime parameters search by a coevolutionary optimization approach using graphics processing units
Authors:
José Ribeiro,
Nicholas Okita,
Tiago A. Coimbra,
Jorge H. Faccipieri
Abstract:
The search for traveltime parameters is a global optimization problem. Several metaheuristics have been proposed to locate the global optima to compute the least amount of their objective functions. However, the theoretical limitations imposed by the no-free-lunch theorem restrict the optimality of such metaheuristics. To escape those limitations, we propose a coevolutionary approach called evolut…
▽ More
The search for traveltime parameters is a global optimization problem. Several metaheuristics have been proposed to locate the global optima to compute the least amount of their objective functions. However, the theoretical limitations imposed by the no-free-lunch theorem restrict the optimality of such metaheuristics. To escape those limitations, we propose a coevolutionary approach called evolution by neighborhood similarity, which is outside the scope of the restrictions of this theorem and allows us to speed up the search convergence. The technique's effectiveness is based on the approach to exchanging the best individuals found between suitable domains during a differential evolution metaheuristic execution. Moreover, we further expand our technique to graphics processing units, allowing us to explore the performance and memory aspects of the method. Ultimately, our complete coevolutionary algorithm can speed up the parameter search by more than five times and reduce the energy consumption by more than thirty-three times compared to a regular metaheuristic implementation. Although some overheads are still problematic in the technique, we present a first approach that effectively explores the data redundancy hidden in the estimation process, allowing us to provide qualitative, performance, and scalable improvements.
△ Less
Submitted 22 April, 2023;
originally announced April 2023.
-
Laminar post-stall wakes of tapered swept wings
Authors:
Jean Hélder Marques Ribeiro,
Jacob Neal,
Anton Burtsev,
Michael Amitay,
Vassilios Theofilis,
Kunihiko Taira
Abstract:
While tapered swept wings are widely used, the influence of taper on their post-stall wake characteristics remains largely unexplored. To address this issue, we conduct an extensive study using direct numerical simulations to characterize the wing taper and sweep effects on laminar separated wakes. We analyze flows behind NACA 0015 cross-sectional profile wings at post-stall angles of attack…
▽ More
While tapered swept wings are widely used, the influence of taper on their post-stall wake characteristics remains largely unexplored. To address this issue, we conduct an extensive study using direct numerical simulations to characterize the wing taper and sweep effects on laminar separated wakes. We analyze flows behind NACA 0015 cross-sectional profile wings at post-stall angles of attack $α=14^\circ$--$22^\circ$ with taper ratios $λ=0.27$--$1$, leading edge sweep angles $0^\circ$--$50^\circ$, and semi aspect ratios $sAR =1$ and $2$ at a mean-chord-based Reynolds number of $600$. Tapered wings have smaller tip chord length, which generates a weaker tip vortex, and attenuates inboard downwash. This results in the development of unsteadiness over a large portion of the wingspan at high angles of attack. For tapered wings with backward-swept leading edges unsteadiness emerges near the wing tip. On the other hand, wings with forward-swept trailing edges are shown to concentrate wake shedding structures near the wing root. For highly swept untapered wings, the wake is steady, while unsteady shedding vortices appear near the tip for tapered wings with high leading edge sweep angles. For such wings, larger wake oscillations emerge near the root as the taper ratio decreases. While the combination of taper and sweep increases flow unsteadiness, we find that tapered swept wings have more enhanced aerodynamic performance than untapered and unswept wings, exhibiting higher time-averaged lift and lift-to-drag ratio. The current findings shed light on the fundamental aspects of flow separation over tapered wings in the absence of turbulent flow effects.
△ Less
Submitted 19 October, 2023; v1 submitted 15 April, 2023;
originally announced April 2023.
-
Kernel interpolation of acoustic transfer functions with adaptive kernel for directed and residual reverberations
Authors:
Juliano G. C. Ribeiro,
Shoichi Koyama,
Hiroshi Saruwatari
Abstract:
An interpolation method for region-to-region acoustic transfer functions (ATFs) based on kernel ridge regression with an adaptive kernel is proposed. Most current ATF interpolation methods do not incorporate the acoustic properties for which measurements are performed. Our proposed method is based on a separate adaptation of directional weighting functions to directed and residual reverberations,…
▽ More
An interpolation method for region-to-region acoustic transfer functions (ATFs) based on kernel ridge regression with an adaptive kernel is proposed. Most current ATF interpolation methods do not incorporate the acoustic properties for which measurements are performed. Our proposed method is based on a separate adaptation of directional weighting functions to directed and residual reverberations, which are used for adapting kernel functions. Thus, the proposed method can not only impose constraints on fundamental acoustic properties, but can also adapt to the acoustic environment. Numerical experimental results indicated that our proposed method outperforms the current methods in terms of interpolation accuracy, especially at high frequencies.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
Finite Based Contraction and Expansion via Models
Authors:
Ricardo Guimarães,
Ana Ozaki,
Jandson S. Ribeiro
Abstract:
We propose a new paradigm for Belief Change in which the new information is represented as sets of models, while the agent's body of knowledge is represented as a finite set of formulae, that is, a finite base. The focus on finiteness is crucial when we consider limited agents and reasoning algorithms. Moreover, having the input as arbitrary set of models is more general than the usual treatment o…
▽ More
We propose a new paradigm for Belief Change in which the new information is represented as sets of models, while the agent's body of knowledge is represented as a finite set of formulae, that is, a finite base. The focus on finiteness is crucial when we consider limited agents and reasoning algorithms. Moreover, having the input as arbitrary set of models is more general than the usual treatment of formulae as input. In this setting, we define new Belief Change operations akin to traditional expansion and contraction, and we identify the rationality postulates that emerge due to the finite representability requirement. We also analyse different logics concerning compatibility with our framework.
△ Less
Submitted 11 September, 2023; v1 submitted 6 March, 2023;
originally announced March 2023.
-
Triglobal resolvent analysis of swept-wing wakes
Authors:
Jean Hélder Marques Ribeiro,
Chi-An Yeh,
Kunihiko Taira
Abstract:
Through triglobal resolvent analysis, we reveal the effects of wing tip and sweep angle on laminar separated wakes over swept wings. For the present study, we consider wings with semi-aspect ratios from $1$ to $4$, sweep angles from $0^\circ$ to $45^\circ$, and angles of attack of $20^\circ$ and $30^\circ$ at a chord-based Reynolds number of $400$ and a Mach number of $0.1$. Using direct numerical…
▽ More
Through triglobal resolvent analysis, we reveal the effects of wing tip and sweep angle on laminar separated wakes over swept wings. For the present study, we consider wings with semi-aspect ratios from $1$ to $4$, sweep angles from $0^\circ$ to $45^\circ$, and angles of attack of $20^\circ$ and $30^\circ$ at a chord-based Reynolds number of $400$ and a Mach number of $0.1$. Using direct numerical simulations, we observe that unswept wings develop vortex shedding near the wing root with a quasi-steady tip vortex. For swept wings, vortex shedding is seen near the wing tip for low sweep angles, while the wakes are steady for wings with high sweep angles. To gain further insights into the mechanisms of flow unsteadiness, triglobal resolvent analysis is used to identify the optimal spatial input-output mode pairs and the associated gains over a range of frequencies. The three-dimensional forcing and response modes reveal that harmonic fluctuations are directed towards the root for unswept wings and towards the wing tip for swept wings. The overlap** region of the forcing-response mode pairs uncovers triglobal resolvent wavemakers associated with self-sustained unsteady wakes of swept wings. Furthermore, we show that for low aspect ratio wings optimal perturbations develop globally over the entire wingspan. The present study uncovers physical insights on the effects of tip and sweep on the growth of optimal harmonic perturbations and the wake dynamics of separated flows over swept wings.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
QCD vacuum replicas are metastable
Authors:
Pedro Bicudo,
José Emílio Ribeiro
Abstract:
We study the meson spectra in the excited QCD vacua, denominated replicas. We find all mesons have real masses, with no tachyons, thus showing the QCD replicas are indeed metastable.
We study the meson spectra in the excited QCD vacua, denominated replicas. We find all mesons have real masses, with no tachyons, thus showing the QCD replicas are indeed metastable.
△ Less
Submitted 18 November, 2022;
originally announced November 2022.
-
Parameterized Inapproximability of the Minimum Distance Problem over all Fields and the Shortest Vector Problem in all $\ell_p$ Norms
Authors:
Huck Bennett,
Mahdi Cheraghchi,
Venkatesan Guruswami,
João Ribeiro
Abstract:
We prove that the Minimum Distance Problem (MDP) on linear codes over any fixed finite field and parameterized by the input distance bound is W[1]-hard to approximate within any constant factor. We also prove analogous results for the parameterized Shortest Vector Problem (SVP) on integer lattices. Specifically, we prove that SVP in the $\ell_p$ norm is W[1]-hard to approximate within any constant…
▽ More
We prove that the Minimum Distance Problem (MDP) on linear codes over any fixed finite field and parameterized by the input distance bound is W[1]-hard to approximate within any constant factor. We also prove analogous results for the parameterized Shortest Vector Problem (SVP) on integer lattices. Specifically, we prove that SVP in the $\ell_p$ norm is W[1]-hard to approximate within any constant factor for any fixed $p >1$ and W[1]-hard to approximate within a factor approaching $2$ for $p=1$. (We show hardness under randomized reductions in each case.)
These results answer the main questions left open (and explicitly posed) by Bhattacharyya, Bonnet, Egri, Ghoshal, Karthik C. S., Lin, Manurangsi, and Marx (Journal of the ACM, 2021) on the complexity of parameterized MDP and SVP. For MDP, they established similar hardness for binary linear codes and left the case of general fields open. For SVP in $\ell_p$ norms with $p > 1$, they showed inapproximability within some constant factor (depending on $p$) and left open showing such hardness for arbitrary constant factors. They also left open showing W[1]-hardness even of exact SVP in the $\ell_1$ norm.
△ Less
Submitted 26 February, 2024; v1 submitted 15 November, 2022;
originally announced November 2022.
-
Black Box Model Explanations and the Human Interpretability Expectations -- An Analysis in the Context of Homicide Prediction
Authors:
José Ribeiro,
Níkolas Carneiro,
Ronnie Alves
Abstract:
Strategies based on Explainable Artificial Intelligence - XAI have promoted better human interpretability of the results of black box machine learning models. The XAI measures being currently used (Ciu, Dalex, Eli5, Lofo, Shap, and Skater) provide various forms of explanations, including global rankings of relevance of attributes. Current research points to the need for further studies on how thes…
▽ More
Strategies based on Explainable Artificial Intelligence - XAI have promoted better human interpretability of the results of black box machine learning models. The XAI measures being currently used (Ciu, Dalex, Eli5, Lofo, Shap, and Skater) provide various forms of explanations, including global rankings of relevance of attributes. Current research points to the need for further studies on how these explanations meet the Interpretability Expectations of human experts and how they can be used to make the model even more transparent while taking into account specific complexities of the model and dataset being analyzed, as well as important human factors of sensitive real-world contexts/problems. Intending to shed light on the explanations generated by XAI measures and their interpretabilities, this research addresses a real-world classification problem related to homicide prediction, duly endorsed by the scientific community, replicated its proposed black box model and used 6 different XAI measures to generate explanations and 6 different human experts to generate what this research referred to as Interpretability Expectations - IE. The results were computed by means of comparative analysis and identification of relationships among all the attribute ranks produced, and ~49% concordance was found among attributes indicated by means of XAI measures and human experts, ~41% exclusively by XAI measures and ~10% exclusively by human experts. The results allow for answering: "Do the different XAI measures generate similar explanations for the proposed problem?", "Are the interpretability expectations generated among different human experts similar?", "Do the explanations generated by XAI measures meet the interpretability expectations of human experts?" and "Can Interpretability Explanations and Expectations work together?", all of which concerning the context of homicide prediction.
△ Less
Submitted 19 October, 2022;
originally announced October 2022.
-
Explanations Based on Item Response Theory (eXirt): A Model-Specific Method to Explain Tree-Ensemble Model in Trust Perspective
Authors:
José Ribeiro,
Lucas Cardoso,
Raíssa Silva,
Vitor Cirilo,
Níkolas Carneiro,
Ronnie Alves
Abstract:
In recent years, XAI researchers have been formalizing proposals and develo** new methods to explain black box models, with no general consensus in the community on which method to use to explain these models, with this choice being almost directly linked to the popularity of a specific method. Methods such as Ciu, Dalex, Eli5, Lofo, Shap and Skater emerged with the proposal to explain black box…
▽ More
In recent years, XAI researchers have been formalizing proposals and develo** new methods to explain black box models, with no general consensus in the community on which method to use to explain these models, with this choice being almost directly linked to the popularity of a specific method. Methods such as Ciu, Dalex, Eli5, Lofo, Shap and Skater emerged with the proposal to explain black box models through global rankings of feature relevance, which based on different methodologies, generate global explanations that indicate how the model's inputs explain its predictions. In this context, 41 datasets, 4 tree-ensemble algorithms (Light Gradient Boosting, CatBoost, Random Forest, and Gradient Boosting), and 6 XAI methods were used to support the launch of a new XAI method, called eXirt, based on Item Response Theory - IRT and aimed at tree-ensemble black box models that use tabular data referring to binary classification problems. In the first set of analyses, the 164 global feature relevance ranks of the eXirt were compared with 984 ranks of the other XAI methods present in the literature, seeking to highlight their similarities and differences. In a second analysis, exclusive explanations of the eXirt based on Explanation-by-example were presented that help in understanding the model trust. Thus, it was verified that eXirt is able to generate global explanations of tree-ensemble models and also local explanations of instances of models through IRT, showing how this consolidated theory can be used in machine learning in order to obtain explainable and reliable models.
△ Less
Submitted 3 July, 2024; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Explanation-by-Example Based on Item Response Theory
Authors:
Lucas F. F. Cardoso,
José de S. Ribeiro,
Vitor C. A. Santos,
Raíssa L. Silva,
Marcelle P. Mota,
Ricardo B. C. Prudêncio,
Ronnie C. O. Alves
Abstract:
Intelligent systems that use Machine Learning classification algorithms are increasingly common in everyday society. However, many systems use black-box models that do not have characteristics that allow for self-explanation of their predictions. This situation leads researchers in the field and society to the following question: How can I trust the prediction of a model I cannot understand? In th…
▽ More
Intelligent systems that use Machine Learning classification algorithms are increasingly common in everyday society. However, many systems use black-box models that do not have characteristics that allow for self-explanation of their predictions. This situation leads researchers in the field and society to the following question: How can I trust the prediction of a model I cannot understand? In this sense, XAI emerges as a field of AI that aims to create techniques capable of explaining the decisions of the classifier to the end-user. As a result, several techniques have emerged, such as Explanation-by-Example, which has a few initiatives consolidated by the community currently working with XAI. This research explores the Item Response Theory (IRT) as a tool to explaining the models and measuring the level of reliability of the Explanation-by-Example approach. To this end, four datasets with different levels of complexity were used, and the Random Forest model was used as a hypothesis test. From the test set, 83.8% of the errors are from instances in which the IRT points out the model as unreliable.
△ Less
Submitted 4 October, 2022;
originally announced October 2022.
-
A biology-driven deep generative model for cell-type annotation in cytometry
Authors:
Quentin Blampey,
Nadège Bercovici,
Charles-Antoine Dutertre,
Isabelle Pic,
Fabrice André,
Joana Mourato Ribeiro,
Paul-Henry Cournède
Abstract:
Cytometry enables precise single-cell phenoty** within heterogeneous populations. These cell types are traditionally annotated via manual gating, but this method suffers from a lack of reproducibility and sensitivity to batch-effect. Also, the most recent cytometers - spectral flow or mass cytometers - create rich and high-dimensional data whose analysis via manual gating becomes challenging and…
▽ More
Cytometry enables precise single-cell phenoty** within heterogeneous populations. These cell types are traditionally annotated via manual gating, but this method suffers from a lack of reproducibility and sensitivity to batch-effect. Also, the most recent cytometers - spectral flow or mass cytometers - create rich and high-dimensional data whose analysis via manual gating becomes challenging and time-consuming. To tackle these limitations, we introduce Scyan (https://github.com/MICS-Lab/scyan), a Single-cell Cytometry Annotation Network that automatically annotates cell types using only prior expert knowledge about the cytometry panel. We demonstrate that Scyan significantly outperforms the related state-of-the-art models on multiple public datasets while being faster and interpretable. In addition, Scyan overcomes several complementary tasks such as batch-effect removal, debarcoding, and population discovery. Overall, this model accelerates and eases cell population characterisation, quantification, and discovery in cytometry.
△ Less
Submitted 21 April, 2023; v1 submitted 11 August, 2022;
originally announced August 2022.
-
Wing sweep effects on laminar separated flows
Authors:
Jean Hélder Marques Ribeiro,
Chi-An Yeh,
Kai Zhang,
Kunihiko Taira
Abstract:
We reveal the effects of sweep on the wake dynamics around NACA 0015 wings at high angles of attack using direct numerical simulations and resolvent analysis. The influence of sweep on the wake dynamics is considered for sweep angles from $0^\circ$ to $45^\circ$ and angles of attack from $16^\circ$ to $30^\circ$ for a spanwise periodic wing at a chord-based Reynolds number of $400$ and a Mach numb…
▽ More
We reveal the effects of sweep on the wake dynamics around NACA 0015 wings at high angles of attack using direct numerical simulations and resolvent analysis. The influence of sweep on the wake dynamics is considered for sweep angles from $0^\circ$ to $45^\circ$ and angles of attack from $16^\circ$ to $30^\circ$ for a spanwise periodic wing at a chord-based Reynolds number of $400$ and a Mach number of $0.1$. Wing sweep affects the wake dynamics, especially in terms of stability and spanwise fluctuations with implications on the development of three-dimensional wakes. We observe that wing sweep attenuates spanwise fluctuations. Even as the sweep angle influences the wake, force and pressure coefficients can be collapsed for low angles of attack when examined in wall-normal and wingspan-normal independent flow components. Some small deviations at high sweep and incidence angles are attributed to vortical wake structures that impose secondary aerodynamic loads, revealed through the force element analysis. Furthermore, we conduct global resolvent analysis to uncover oblique modes with high disturbance amplification. The resolvent analysis also reveals the presence of wavemakers in the shear-dominated region associated with the emergence of three-dimensional wakes at high angles of attack. For flows at high sweep angles, the optimal convection speed of the response modes is shown to be faster than the optimal wavemakers speed suggesting a mechanism for the attenuation of perturbations. The present findings serve as a fundamental step** stone to understanding separated flows at higher Reynolds numbers.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
Low-Degree Polynomials Extract from Local Sources
Authors:
Omar Alrabiah,
Eshan Chattopadhyay,
Jesse Goodman,
Xin Li,
João Ribeiro
Abstract:
We continue a line of work on extracting random bits from weak sources that are generated by simple processes. We focus on the model of locally samplable sources, where each bit in the source depends on a small number of (hidden) uniformly random input bits. Also known as local sources, this model was introduced by De and Watson (TOCT 2012) and Viola (SICOMP 2014), and is closely related to source…
▽ More
We continue a line of work on extracting random bits from weak sources that are generated by simple processes. We focus on the model of locally samplable sources, where each bit in the source depends on a small number of (hidden) uniformly random input bits. Also known as local sources, this model was introduced by De and Watson (TOCT 2012) and Viola (SICOMP 2014), and is closely related to sources generated by $\mathsf{AC}^0$ circuits and bounded-width branching programs. In particular, extractors for local sources also work for sources generated by these classical computational models.
Despite being introduced a decade ago, little progress has been made on improving the entropy requirement for extracting from local sources. The current best explicit extractors require entropy $n^{1/2}$, and follow via a reduction to affine extractors. To start, we prove a barrier showing that one cannot hope to improve this entropy requirement via a black-box reduction of this form. In particular, new techniques are needed.
In our main result, we seek to answer whether low-degree polynomials (over $\mathbb{F}_2$) hold potential for breaking this barrier. We answer this question in the positive, and fully characterize the power of low-degree polynomials as extractors for local sources. More precisely, we show that a random degree $r$ polynomial is a low-error extractor for $n$-bit local sources with min-entropy $Ω(r(n\log n)^{1/r})$, and we show that this is tight.
Our result leverages several new ingredients, which may be of independent interest. Our existential result relies on a new reduction from local sources to a more structured family, known as local non-oblivious bit-fixing sources. To show its tightness, we prove a "local version" of a structural result by Cohen and Tal (RANDOM 2015), which relies on a new "low-weight" Chevalley-Warning theorem.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Region-to-region kernel interpolation of acoustic transfer function with directional weighting
Authors:
Juliano G. C. Ribeiro,
Shoichi Koyama,
Hiroshi Saruwatari
Abstract:
A method of interpolating the acoustic transfer function (ATF) between regions that takes into account both the physical properties of the ATF and the directionality of region configurations is proposed. Most spatial ATF interpolation methods are limited to estimation in the region of receivers. A kernel method for region-to-region ATF interpolation makes it possible to estimate the ATFs for both…
▽ More
A method of interpolating the acoustic transfer function (ATF) between regions that takes into account both the physical properties of the ATF and the directionality of region configurations is proposed. Most spatial ATF interpolation methods are limited to estimation in the region of receivers. A kernel method for region-to-region ATF interpolation makes it possible to estimate the ATFs for both source and receiver regions from a discrete set of ATF measurements. We newly formulate the reproducing kernel Hilbert space and associated kernel function incorporating directional weight to enhance the interpolation accuracy. We also investigate hyperparameter optimization methods for this kernel function. Numerical experiments indicate that the proposed method outperforms the method without the use of directional weighting.
△ Less
Submitted 5 May, 2022;
originally announced May 2022.
-
Cyclicity of Rigid Centers on Center Manifolds of Three-dimensional systems
Authors:
Claudio Pessoa,
Lucas Queiroz,
Jarne D. Ribeiro
Abstract:
We work with polynomial three-dimensional rigid differential systems. Using the Lyapunov constants, we obtain lower bounds for the cyclicity of the known rigid centers on their center manifolds. Moreover, we obtain an example of a quadratic rigid center from which is possible to bifurcate 13 limit cycles, which is a new lower bound for three-dimensional quadratic systems.
We work with polynomial three-dimensional rigid differential systems. Using the Lyapunov constants, we obtain lower bounds for the cyclicity of the known rigid centers on their center manifolds. Moreover, we obtain an example of a quadratic rigid center from which is possible to bifurcate 13 limit cycles, which is a new lower bound for three-dimensional quadratic systems.
△ Less
Submitted 24 February, 2022;
originally announced February 2022.
-
Assisting Unknown Teammates in Unknown Tasks: Ad Hoc Teamwork under Partial Observability
Authors:
João G. Ribeiro,
Cassandro Martinho,
Alberto Sardinha,
Francisco S. Melo
Abstract:
In this paper, we present a novel Bayesian online prediction algorithm for the problem setting of ad hoc teamwork under partial observability (ATPO), which enables on-the-fly collaboration with unknown teammates performing an unknown task without needing a pre-coordination protocol. Unlike previous works that assume a fully observable state of the environment, ATPO accommodates partial observabili…
▽ More
In this paper, we present a novel Bayesian online prediction algorithm for the problem setting of ad hoc teamwork under partial observability (ATPO), which enables on-the-fly collaboration with unknown teammates performing an unknown task without needing a pre-coordination protocol. Unlike previous works that assume a fully observable state of the environment, ATPO accommodates partial observability, using the agent's observations to identify which task is being performed by the teammates. Our approach assumes neither that the teammate's actions are visible nor an environment reward signal. We evaluate ATPO in three domains -- two modified versions of the Pursuit domain with partial observability and the overcooked domain. Our results show that ATPO is effective and robust in identifying the teammate's task from a large library of possible tasks, efficient at solving it in near-optimal time, and scalable in adapting to increasingly larger problem sizes.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Beyond Single-Deletion Correcting Codes: Substitutions and Transpositions
Authors:
Ryan Gabrys,
Venkatesan Guruswami,
João Ribeiro,
Ke Wu
Abstract:
We consider the problem of designing low-redundancy codes in settings where one must correct deletions in conjunction with substitutions or adjacent transpositions; a combination of errors that is usually observed in DNA-based data storage. One of the most basic versions of this problem was settled more than 50 years ago by Levenshtein, or one substitution, with nearly optimal redundancy. However,…
▽ More
We consider the problem of designing low-redundancy codes in settings where one must correct deletions in conjunction with substitutions or adjacent transpositions; a combination of errors that is usually observed in DNA-based data storage. One of the most basic versions of this problem was settled more than 50 years ago by Levenshtein, or one substitution, with nearly optimal redundancy. However, this approach fails to extend to many simple and natural variations of the binary single-edit error setting. In this work, we make progress on the code design problem above in three such variations:
We construct linear-time encodable and decodable length-$n$ non-binary codes correcting a single edit error with nearly optimal redundancy $\log n+O(\log\log n)$, providing an alternative simpler proof of a result by Cai, Chee, Gabrys, Kiah, and Nguyen (IEEE Trans. Inf. Theory 2021). This is achieved by employing what we call weighted VT sketches, a notion that may be of independent interest.
We construct linear-time encodable and list-decodable binary codes with list-size $2$ for one deletion and one substitution with redundancy $4\log n+O(\log\log n)$. This matches the existential bound up to an $O(\log\log n)$ additive term.
We show the existence of a binary code correcting one deletion or one adjacent transposition with nearly optimal redundancy $\log n+O(\log\log n)$.
△ Less
Submitted 18 December, 2021;
originally announced December 2021.
-
Kernel Learning For Sound Field Estimation With L1 and L2 Regularizations
Authors:
Ryosuke Horiuchi,
Shoichi Koyama,
Juliano G. C. Ribeiro,
Natsuki Ueno,
Hiroshi Saruwatari
Abstract:
A method to estimate an acoustic field from discrete microphone measurements is proposed. A kernel-interpolation-based method using the kernel function formulated for sound field interpolation has been used in various applications. The kernel function with directional weighting makes it possible to incorporate prior information on source directions to improve estimation accuracy. However, in prior…
▽ More
A method to estimate an acoustic field from discrete microphone measurements is proposed. A kernel-interpolation-based method using the kernel function formulated for sound field interpolation has been used in various applications. The kernel function with directional weighting makes it possible to incorporate prior information on source directions to improve estimation accuracy. However, in prior studies, parameters for directional weighting have been empirically determined. We propose a method to optimize these parameters using observation values, which is particularly useful when prior information on source directions is uncertain. The proposed algorithm is based on discretization of the parameters and representation of the kernel function as a weighted sum of sub-kernels. Two types of regularization for the weights, $L_1$ and $L_2$, are investigated. Experimental results indicate that the proposed method achieves higher estimation accuracy than the method without kernel learning.
△ Less
Submitted 12 October, 2021; v1 submitted 10 October, 2021;
originally announced October 2021.
-
Vacuum replicas in field-theory models of Coulomb QCD
Authors:
Pedro J. de A. Bicudo,
Eduardo Garnacho Velasco,
Felipe J. Llanes-Estrada,
J. Emilio Ribeiro,
Víctor Serrano Herreros,
Jorge Vallejo Fernández
Abstract:
Dynamical symmetry breaking can happen through a Higgs mechanism but also spontaneously within a strongly-enough coupled theory. We treat a field-theoretical quark model of QCD based on a linear+Coulomb Cornell potential (to account for the longitudinal interaction), together with a transverse interaction (to account for Coulomb-gauge gluons) in BCS approximation. After extracting the well-known B…
▽ More
Dynamical symmetry breaking can happen through a Higgs mechanism but also spontaneously within a strongly-enough coupled theory. We treat a field-theoretical quark model of QCD based on a linear+Coulomb Cornell potential (to account for the longitudinal interaction), together with a transverse interaction (to account for Coulomb-gauge gluons) in BCS approximation. After extracting the well-known BCS ground state on which abundant hadron phenomenology implementing dynamical chiral symmetry breaking has been built, we find two excited replica vacuumlike states shown in figure 1. At the BCS level they are classically unstable, but second quantization blocks transitions between them in volumes much larger than a hadron size. Mesons built over the replica vacua have relative masses similar to normal mesons on the ordinary vacuum; we find no negative-mass mode, confirming their stability found earlier with a harmonic oscillator potential.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
Multiple almost summing operators
Authors:
Joilson Ribeiro,
Fabrício Santos
Abstract:
In this paper, we explore the concept of multilinear operators that are multiple almost summing and present a new concept of type and cotype of multilinear operators and investigate the conditions for this new concept to recover the original concept of type and type for multilinear operators. We also show that these classes are Banach multi-ideals and establish the coherence and compatibility of t…
▽ More
In this paper, we explore the concept of multilinear operators that are multiple almost summing and present a new concept of type and cotype of multilinear operators and investigate the conditions for this new concept to recover the original concept of type and type for multilinear operators. We also show that these classes are Banach multi-ideals and establish the coherence and compatibility of these classes with the generated homogeneous polynomials.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
PAC Mode Estimation using PPR Martingale Confidence Sequences
Authors:
Shubham Anand Jain,
Rohan Shah,
Sanit Gupta,
Denil Mehta,
Inderjeet Jayakumar Nair,
Jian Vora,
Sushil Khyalia,
Sourav Das,
Vinay J. Ribeiro,
Shivaram Kalyanakrishnan
Abstract:
We consider the problem of correctly identifying the \textit{mode} of a discrete distribution $\mathcal{P}$ with sufficiently high probability by observing a sequence of i.i.d. samples drawn from $\mathcal{P}$. This problem reduces to the estimation of a single parameter when $\mathcal{P}$ has a support set of size $K = 2$. After noting that this special case is tackled very well by prior-posterio…
▽ More
We consider the problem of correctly identifying the \textit{mode} of a discrete distribution $\mathcal{P}$ with sufficiently high probability by observing a sequence of i.i.d. samples drawn from $\mathcal{P}$. This problem reduces to the estimation of a single parameter when $\mathcal{P}$ has a support set of size $K = 2$. After noting that this special case is tackled very well by prior-posterior-ratio (PPR) martingale confidence sequences \citep{waudby-ramdas-ppr}, we propose a generalisation to mode estimation, in which $\mathcal{P}$ may take $K \geq 2$ values. To begin, we show that the "one-versus-one" principle to generalise from $K = 2$ to $K \geq 2$ classes is more efficient than the "one-versus-rest" alternative. We then prove that our resulting stop** rule, denoted PPR-1v1, is asymptotically optimal (as the mistake probability is taken to $0$). PPR-1v1 is parameter-free and computationally light, and incurs significantly fewer samples than competitors even in the non-asymptotic regime. We demonstrate its gains in two practical applications of sampling: election forecasting and verification of smart contracts in blockchains.
△ Less
Submitted 11 April, 2022; v1 submitted 10 September, 2021;
originally announced September 2021.
-
Revising Ontologies via Models: The ALC-formula Case
Authors:
Jandson S. Ribeiro,
Ricardo Guimarães,
Ana Ozaki
Abstract:
Most approaches for repairing description logic (DL) ontologies aim at changing the axioms as little as possible while solving inconsistencies, incoherences and other types of undesired behaviours. As in Belief Change, these issues are often specified using logical formulae. Instead, in the new setting for updating DL ontologies that we propose here, the input for the change is given by a model wh…
▽ More
Most approaches for repairing description logic (DL) ontologies aim at changing the axioms as little as possible while solving inconsistencies, incoherences and other types of undesired behaviours. As in Belief Change, these issues are often specified using logical formulae. Instead, in the new setting for updating DL ontologies that we propose here, the input for the change is given by a model which we want to add or remove. The main goal is to minimise the loss of information, without concerning with the syntactic structure. This new setting is motivated by scenarios where an ontology is built automatically and needs to be refined or updated. In such situations, the syntactical form is often irrelevant and the incoming information is not necessarily given as a formula. We define general operations and conditions on which they are applicable, and instantiate our approach to the case of ALC-formulae.
△ Less
Submitted 21 February, 2022; v1 submitted 27 August, 2021;
originally announced August 2021.
-
Does Dataset Complexity Matters for Model Explainers?
Authors:
José Ribeiro,
Raíssa Silva,
Lucas Cardoso,
Ronnie Alves
Abstract:
Strategies based on Explainable Artificial Intelligence - XAI have emerged in computing to promote a better understanding of predictions made by black box models. Most XAI measures used today explain these types of models, generating attribute rankings aimed at explaining the model, that is, the analysis of Attribute Importance of Model. There is no consensus on which XAI measure generates an over…
▽ More
Strategies based on Explainable Artificial Intelligence - XAI have emerged in computing to promote a better understanding of predictions made by black box models. Most XAI measures used today explain these types of models, generating attribute rankings aimed at explaining the model, that is, the analysis of Attribute Importance of Model. There is no consensus on which XAI measure generates an overall explainability rank. For this reason, several proposals for tools have emerged (Ciu, Dalex, Eli5, Lofo, Shap and Skater). An experimental benchmark of explainable AI techniques capable of producing global explainability ranks based on tabular data related to different problems and ensemble models are presented herein. Seeking to answer questions such as "Are the explanations generated by the different measures the same, similar or different?" and "How does data complexity play along model explainability?" The results from the construction of 82 computational models and 592 ranks shed some light on the other side of the problem of explainability: dataset complexity!
△ Less
Submitted 17 November, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
Effects of Quantization on the Multiple-Round Secret-Key Capacity
Authors:
Onur Günlü,
Ueli Maurer,
João Ribeiro
Abstract:
We consider the strong secret key (SK) agreement problem for the satellite communication setting, where a satellite chooses a common binary phase shift keying modulated input for three statistically independent additive white Gaussian noise measurement channels whose outputs are observed by two legitimate transceivers (Alice and Bob) and an eavesdropper (Eve), respectively. Legitimate transceivers…
▽ More
We consider the strong secret key (SK) agreement problem for the satellite communication setting, where a satellite chooses a common binary phase shift keying modulated input for three statistically independent additive white Gaussian noise measurement channels whose outputs are observed by two legitimate transceivers (Alice and Bob) and an eavesdropper (Eve), respectively. Legitimate transceivers have access to an authenticated, noiseless, two-way, and public communication link, so they can exchange multiple rounds of public messages to agree on a SK hidden from Eve. Without loss of essential generality, the noise variances for Alice's and Bob's measurement channels are both fixed to a value $Q>1$, whereas the noise over Eve's measurement channel has a unit variance, so $Q$ represents a channel quality ratio. We show that when both legitimate transceivers apply a one-bit uniform quantizer to their noisy observations before SK agreement, the SK capacity decreases at least quadratically in $Q$.
△ Less
Submitted 29 August, 2021; v1 submitted 4 May, 2021;
originally announced May 2021.
-
A Regulatory System for Optimal Legal Transaction Throughput in Cryptocurrency Blockchains
Authors:
Aditya Ahuja,
Vinay J. Ribeiro,
Ranjan Pal
Abstract:
Permissionless blockchain consensus protocols have been designed primarily for defining decentralized economies for the commercial trade of assets, both virtual and physical, using cryptocurrencies. In most instances, the assets being traded are regulated, which mandates that the legal right to their trade and their trade value are determined by the governmental regulator of the jurisdiction in wh…
▽ More
Permissionless blockchain consensus protocols have been designed primarily for defining decentralized economies for the commercial trade of assets, both virtual and physical, using cryptocurrencies. In most instances, the assets being traded are regulated, which mandates that the legal right to their trade and their trade value are determined by the governmental regulator of the jurisdiction in which the trade occurs. Unfortunately, existing blockchains do not formally recognise proposal of legal cryptocurrency transactions, as part of the execution of their respective consensus protocols, resulting in rampant illegal activities in the associated crypto-economies. In this contribution, we motivate the need for regulated blockchain consensus protocols with a case study of the illegal, cryptocurrency based, Silk Road darknet market. We present a novel regulatory framework for blockchain protocols, for ensuring legal transaction confirmation as part of the blockchain distributed consensus. As per our regulatory framework, we derive conditions under which legal transaction throughput supersedes throughput of traditional transactions, which are, in the worst case, an indifferentiable mix of legal and illegal transactions. Finally, we show that with a small change to the standard blockchain consensus execution policy (appropriately introduced through regulation), the legal transaction throughput in the blockchain network can be maximized.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Mean-Based Trace Reconstruction over Oblivious Synchronization Channels
Authors:
Mahdi Cheraghchi,
Joseph Downs,
João Ribeiro,
Alexandra Veliche
Abstract:
Mean-based reconstruction is a fundamental, natural approach to worst-case trace reconstruction over channels with synchronization errors. It is known that $\exp(O(n^{1/3}))$ traces are necessary and sufficient for mean-based worst-case trace reconstruction over the deletion channel, and this result was also extended to certain channels combining deletions and geometric insertions of uniformly ran…
▽ More
Mean-based reconstruction is a fundamental, natural approach to worst-case trace reconstruction over channels with synchronization errors. It is known that $\exp(O(n^{1/3}))$ traces are necessary and sufficient for mean-based worst-case trace reconstruction over the deletion channel, and this result was also extended to certain channels combining deletions and geometric insertions of uniformly random bits. In this work, we use a simple extension of the original complex-analytic approach to show that these results are examples of a much more general phenomenon. We introduce oblivious synchronization channels, which map each input bit to an arbitrarily distributed sequence of replications and insertions of random bits. This general class captures all previously considered synchronization channels. We show that for any oblivious synchronization channel whose output length follows a sub-exponential distribution either mean-based trace reconstruction is impossible or $\exp(O(n^{1/3}))$ traces suffice for this task.
△ Less
Submitted 12 October, 2021; v1 submitted 18 February, 2021;
originally announced February 2021.
-
The orbit and stellar masses of the archetype colliding-wind binary WR 140
Authors:
Joshua D. Thomas,
Noel D. Richardson,
J. J. Eldridge,
Gail H. Schaefer,
John D. Monnier,
Hugues Sana,
Anthony F. J. Moffat,
Peredur Williams,
Michael F. Corcoran,
Ian R. Stevens,
Gerd Weigelt,
Farrah D. Zainol,
Narsireddy Anugu,
Jean-Baptiste Le Bouquin,
Theo ten Brummelaar,
Fran Campos,
Andrew Couperus,
Claire L. Davies,
Jacob Ennis,
Thomas Eversberg,
Oliver Garde,
Tyler Gardner,
Joan Guarro Fló,
Stefan Kraus,
Aaron Labdon
, et al. (11 additional authors not shown)
Abstract:
We present updated orbital elements for the Wolf-Rayet (WR) binary WR\,140 (HD\,193793; WC7pd + O5.5fc). The new orbital elements were derived using previously published measurements along with {\color{black}160} new radial velocity measurements across the 2016 periastron passage of WR 140. Additionally, four new measurements of the orbital astrometry were collected with the CHARA Array. With thes…
▽ More
We present updated orbital elements for the Wolf-Rayet (WR) binary WR\,140 (HD\,193793; WC7pd + O5.5fc). The new orbital elements were derived using previously published measurements along with {\color{black}160} new radial velocity measurements across the 2016 periastron passage of WR 140. Additionally, four new measurements of the orbital astrometry were collected with the CHARA Array. With these measurements, we derive stellar masses of $M_{\rm WR} = 10.31\pm0.45 M_\odot$ and $M_{\rm O} = 29.27\pm1.14 M_{\odot}$. We also include a discussion of the evolutionary history of this system from the Binary Population and Spectral Synthesis (BPASS) model grid to show that this WR star likely formed primarily through mass loss in the stellar winds, with only a moderate amount of mass lost or transferred through binary interactions.
△ Less
Submitted 23 April, 2021; v1 submitted 26 January, 2021;
originally announced January 2021.
-
AC-DC: Amplification Curve Diagnostics for Covid-19 Group Testing
Authors:
Ryan Gabrys,
Srilakshmi Pattabiraman,
Vishal Rana,
João Ribeiro,
Mahdi Cheraghchi,
Venkatesan Guruswami,
Olgica Milenkovic
Abstract:
The first part of the paper presents a review of the gold-standard testing protocol for Covid-19, real-time, reverse transcriptase PCR, and its properties and associated measurement data such as amplification curves that can guide the development of appropriate and accurate adaptive group testing protocols. The second part of the paper is concerned with examining various off-the-shelf group testin…
▽ More
The first part of the paper presents a review of the gold-standard testing protocol for Covid-19, real-time, reverse transcriptase PCR, and its properties and associated measurement data such as amplification curves that can guide the development of appropriate and accurate adaptive group testing protocols. The second part of the paper is concerned with examining various off-the-shelf group testing methods for Covid-19 and identifying their strengths and weaknesses for the application at hand. The third part of the paper contains a collection of new analytical results for adaptive semiquantitative group testing with probabilistic and combinatorial priors, including performance bounds, algorithmic solutions, and noisy testing protocols. The probabilistic setting is of special importance as it is designed to be simple to implement by nonexperts and handle heavy hitters. The worst-case paradigm extends and improves upon prior work on semiquantitative group testing with and without specialized PCR noise models.
△ Less
Submitted 5 June, 2021; v1 submitted 10 November, 2020;
originally announced November 2020.
-
Non-Asymptotic Capacity Upper Bounds for the Discrete-Time Poisson Channel with Positive Dark Current
Authors:
Mahdi Cheraghchi,
João Ribeiro
Abstract:
We derive improved and easily computable upper bounds on the capacity of the discrete-time Poisson channel under an average-power constraint and an arbitrary constant dark current term. This is accomplished by combining a general convex duality framework with a modified version of the digamma distribution considered in previous work of the authors (Cheraghchi, J. ACM 2019; Cheraghchi, Ribeiro, IEE…
▽ More
We derive improved and easily computable upper bounds on the capacity of the discrete-time Poisson channel under an average-power constraint and an arbitrary constant dark current term. This is accomplished by combining a general convex duality framework with a modified version of the digamma distribution considered in previous work of the authors (Cheraghchi, J. ACM 2019; Cheraghchi, Ribeiro, IEEE Trans. Inf. Theory 2019). For most choices of parameters, our upper bounds improve upon previous results even when an additional peak-power constraint is imposed on the input.
△ Less
Submitted 31 October, 2020; v1 submitted 28 October, 2020;
originally announced October 2020.
-
South American auroral reports during the Carrington storm
Authors:
Hisashi Hayakawa,
José R. Ribeiro,
Yusuke Ebihara,
Ana P. Correia,
Mitsuru Sôma
Abstract:
The importance of the investigation of magnetic superstorms is not limited to academic interest, because these superstorms can cause catastrophic impact on the modern civilisation due to our increasing dependency on technological infrastructure. In this context, the Carrington storm in September 1859 is considered as a benchmark of observational history owing to its magnetic disturbance and equato…
▽ More
The importance of the investigation of magnetic superstorms is not limited to academic interest, because these superstorms can cause catastrophic impact on the modern civilisation due to our increasing dependency on technological infrastructure. In this context, the Carrington storm in September 1859 is considered as a benchmark of observational history owing to its magnetic disturbance and equatorial extent of the auroral oval. So far, several recent auroral reports at that time have been published but those reports are mainly derived from the Northern Hemisphere. In this study, we analyse datable auroral reports from South America and its vicinity, assess the auroral extent using philological and astrometric approaches, identify the auroral visibility at - 17.3° magnetic latitude and further poleward and reconstruct the equatorial boundary of the auroral oval to be 25.1° +/- 0.5° in invariant latitude. Interestingly, brighter and more colourful auroral displays were reported in the South American sector than in the Northern Hemisphere. This north-south asymmetry is presumably associated with variations of their magnetic longitude and the weaker magnetic field over South America compared to the magnetic conjugate point and the increased amount of magnetospheric electron precipitation into the upper atmosphere. These results attest that the magnitude of the Carrington storm indicates that its extent falls within the range of other superstorms, such as those that occurred in May 1921 and February 1872, in terms of the equatorial boundary of the auroral oval.
△ Less
Submitted 30 August, 2020;
originally announced August 2020.
-
Prediction of Homicides in Urban Centers: A Machine Learning Approach
Authors:
José Ribeiro,
Lair Meneses,
Denis Costa,
Wando Miranda,
Ronnie Alves
Abstract:
Relevant research has been highlighted in the computing community to develop machine learning models capable of predicting the occurrence of crimes, analyzing contexts of crimes, extracting profiles of individuals linked to crime, and analyzing crimes over time. However, models capable of predicting specific crimes, such as homicide, are not commonly found in the current literature. This research…
▽ More
Relevant research has been highlighted in the computing community to develop machine learning models capable of predicting the occurrence of crimes, analyzing contexts of crimes, extracting profiles of individuals linked to crime, and analyzing crimes over time. However, models capable of predicting specific crimes, such as homicide, are not commonly found in the current literature. This research presents a machine learning model to predict homicide crimes, using a dataset that uses generic data (without study location dependencies) based on incident report records for 34 different types of crimes, along with time and space data from crime reports. Experimentally, data from the city of Belém - Pará, Brazil was used. These data were transformed to make the problem generic, enabling the replication of this model to other locations. In the research, analyses were performed with simple and robust algorithms on the created dataset. With this, statistical tests were performed with 11 different classification methods and the results are related to the prediction's occurrence and non-occurrence of homicide crimes in the month subsequent to the occurrence of other registered crimes, with 76% assertiveness for both classes of the problem, using Random Forest. Results are considered as a baseline for the proposed problem.
△ Less
Submitted 21 March, 2021; v1 submitted 16 August, 2020;
originally announced August 2020.
-
Better Late than Never; Scaling Computation in Blockchains by Delaying Execution
Authors:
Sourav Das,
Nitin Awathare,
Ling Ren,
Vinay Joseph Ribeiro,
Umesh Bellur
Abstract:
Proof-of-Work~(PoW) based blockchains typically allocate only a tiny fraction (e.g., less than 1% for Ethereum) of the average interarrival time~($\mathbb{I}$) between blocks for validating transactions. A trivial increase in validation time~($τ$) introduces the popularly known Verifier's Dilemma, and as we demonstrate, causes more forking and increases unfairness. Large $τ$ also reduces the toler…
▽ More
Proof-of-Work~(PoW) based blockchains typically allocate only a tiny fraction (e.g., less than 1% for Ethereum) of the average interarrival time~($\mathbb{I}$) between blocks for validating transactions. A trivial increase in validation time~($τ$) introduces the popularly known Verifier's Dilemma, and as we demonstrate, causes more forking and increases unfairness. Large $τ$ also reduces the tolerance for safety against a Byzantine adversary. Solutions that offload validation to a set of non-chain nodes (a.k.a. off-chain approaches) suffer from trust issues that are non-trivial to resolve.
In this paper, we present Tuxedo, the first on-chain protocol to theoretically scale $τ/\mathbb{I} \approx 1$ in PoW blockchains. The key innovation in Tuxedo is to separate the consensus on the ordering of transactions from their execution. We achieve this by allowing miners to delay validation of transactions in a block by up to $ζ$ blocks, where $ζ$ is a system parameter. We perform security analysis of Tuxedo considering all possible adversarial strategies in a synchronous network with end-to-end delay $Δ$ and demonstrate that Tuxedo achieves security equivalent to known results for longest chain PoW Nakamoto consensus. Additionally, we also suggest a principled approach for practical choices of parameter $ζ$ as per the application requirement. Our prototype implementation of Tuxedo atop Ethereum demonstrates that it can scale $τ$ without suffering the harmful effects of naive scaling in existing blockchains.
△ Less
Submitted 2 June, 2021; v1 submitted 24 May, 2020;
originally announced May 2020.
-
Airmed: Efficient Self-Healing Network of Low-End Devices
Authors:
Sourav Das,
Samuel Wedaj,
Kolin Paul,
Umesh Bellur,
Vinay Joseph Ribeiro
Abstract:
The proliferation of application specific cyber-physical systems coupled with the emergence of a variety of attacks on such systems (malware such as Mirai and Hajime) underlines the need to secure such networks. Most existing security efforts have focused on only detection of the presence of malware. However given the ability of most attacks to spread through the network once they infect a few dev…
▽ More
The proliferation of application specific cyber-physical systems coupled with the emergence of a variety of attacks on such systems (malware such as Mirai and Hajime) underlines the need to secure such networks. Most existing security efforts have focused on only detection of the presence of malware. However given the ability of most attacks to spread through the network once they infect a few devices, it is important to contain the spread of a virus and at the same time systematically cleanse the impacted nodes using the communication capabilities of the network. Toward this end, we present Airmed - a method and system to not just detect corruption of the application software on a IoT node, but to self correct itself using its neighbors. Airmed's decentralized mechanisms prevent the spread of self-propagating malware and can also be used as a technique for updating application code on such IoT devices. Among the novelties of Airmed are a novel bloom-filter technique along with hardware support to identify position of the malware program from the benign application code, an adaptive self-check for computational efficiency, and a uniform random-backoff and stream signatures for secure and bandwidth efficient code exchange to correct corrupted devices. We assess the performance of Airmed, using the embedded systems security architecture of TrustLite in the OMNeT++ simulator. The results show that Airmed scales up to thousands of devices, ensures guaranteed update of the entire network, and can recover 95% of the nodes in 10 minutes in both internal and external propagation models. Moreover, we evaluate memory and communication costs and show that Airmed is efficient and incurs very low overhead.
△ Less
Submitted 29 April, 2020; v1 submitted 26 April, 2020;
originally announced April 2020.
-
On Bit Commitment and Oblivious Transfer in Measurement-Device Independent settings
Authors:
Jeremy Ribeiro,
Stephanie Wehner
Abstract:
Among the most studied tasks in Quantum Cryptography one can find Bit Commitment (BC) and Oblivious Transfer (OT), two central cryptographic primitives. In this paper we propose for the first time protocols for these tasks in the measurement-device independent (MDI) settings and analyze their security. We analyze two different cases: first we assume the parties have access to perfect single photon…
▽ More
Among the most studied tasks in Quantum Cryptography one can find Bit Commitment (BC) and Oblivious Transfer (OT), two central cryptographic primitives. In this paper we propose for the first time protocols for these tasks in the measurement-device independent (MDI) settings and analyze their security. We analyze two different cases: first we assume the parties have access to perfect single photon sources (but still in the presence of noise and losses), and second we assume that they only have imperfect single photon sources. In the first case we propose a protocol for both BC and OT and prove their security in the Noisy Quantum Storage model. Interestingly, in the case where honest parties do not have access to perfect single photon sources, we find that BC is still possible, but that it is "more difficult" to get a secure protocol for OT: We show that there is a whole class of protocols that cannot be secure. All our security analyses are done in the finite round regime.
△ Less
Submitted 22 April, 2020;
originally announced April 2020.
-
Secure multi-party quantum computation with few qubits
Authors:
Victoria Lipinska,
Jérémy Ribeiro,
Stephanie Wehner
Abstract:
We consider the task of secure multi-party distributed quantum computation on a quantum network. We propose a protocol based on quantum error correction which reduces the number of necessary qubits. That is, each of the $n$ nodes in our protocol requires an operational workspace of $n^2+Θ(s) n$ qubits, as opposed to previously shown $Ω\big((n^3+n^2s^2)\log n\big)$ qubits, where $s$ is a security p…
▽ More
We consider the task of secure multi-party distributed quantum computation on a quantum network. We propose a protocol based on quantum error correction which reduces the number of necessary qubits. That is, each of the $n$ nodes in our protocol requires an operational workspace of $n^2+Θ(s) n$ qubits, as opposed to previously shown $Ω\big((n^3+n^2s^2)\log n\big)$ qubits, where $s$ is a security parameter. To achieve universal computation, we develop a distributed procedure for verifying magic states based on magic state distillation and statistical testing of randomly selected states. This allows us to apply distributed $T$ gate and which may be of independent interest. We showcase our protocol on a small example for a 7-node network.
△ Less
Submitted 3 October, 2022; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Long-range correlation studies in deep earthquakes global series
Authors:
Douglas S. R. Ferreira,
Jennifer Ribeiro,
Paulo S. L. Oliveira,
André R. Pimenta,
Renato P. Freitas,
Andrés R. R. Papa
Abstract:
In the present paper we have conducted studies on seismological properties using worldwide data of deep earthquakes (depth larger than 70 km), considering events with magnitude $m \geq 4.5$. We have addressed the problem under the perspective of complex networks, using a time window model to build the networks for deep earthquakes, which present scale-free and small-world features. This work is an…
▽ More
In the present paper we have conducted studies on seismological properties using worldwide data of deep earthquakes (depth larger than 70 km), considering events with magnitude $m \geq 4.5$. We have addressed the problem under the perspective of complex networks, using a time window model to build the networks for deep earthquakes, which present scale-free and small-world features. This work is an extension of a previous study using a similar approach, for shallow events. Our results for deep events corroborate with those found for the shallow ones, since the connectivity distribution for deep earthquakes also follows a q-exponential distribution and the scaling behavior is present. Our results were analysed using both, complex networks and Nonextensive Statistical Mechanics, contributing to strengthen the use of the time window model to construct epicenters networks. They reinforce the idea of long-range correlations between earthquakes and the criticality of the seismological system.
△ Less
Submitted 12 April, 2020;
originally announced April 2020.