-
Efficient IoT Devices Localization Through Wi-Fi CSI Feature Fusion and Anomaly Detection
Authors:
Yan Li,
Jie Yang,
Shang-Ling Shih,
Wan-Ting Shih,
Chao-Kai Wen,
Shi **
Abstract:
Internet of Things (IoT) device localization is fundamental to smart home functionalities, including indoor navigation and tracking of individuals. Traditional localization relies on relative methods utilizing the positions of anchors within a home environment, yet struggles with precision due to inherent inaccuracies in these anchor positions. In response, we introduce a cutting-edge smartphone-b…
▽ More
Internet of Things (IoT) device localization is fundamental to smart home functionalities, including indoor navigation and tracking of individuals. Traditional localization relies on relative methods utilizing the positions of anchors within a home environment, yet struggles with precision due to inherent inaccuracies in these anchor positions. In response, we introduce a cutting-edge smartphone-based localization system for IoT devices, leveraging the precise positioning capabilities of smartphones equipped with motion sensors. Our system employs artificial intelligence (AI) to merge channel state information from proximal trajectory points of a single smartphone, significantly enhancing line of sight (LoS) angle of arrival (AoA) estimation accuracy, particularly under severe multipath conditions. Additionally, we have developed an AI-based anomaly detection algorithm to further increase the reliability of LoSAoA estimation. This algorithm improves measurement reliability by analyzing the correlation between the accuracy of reversed feature reconstruction and the LoS-AoA estimation. Utilizing a straightforward least squares algorithm in conjunction with accurate LoS-AoA estimation and smartphone positional data, our system efficiently identifies IoT device locations. Validated through extensive simulations and experimental tests with a receiving antenna array comprising just two patch antenna elements in the horizontal direction, our methodology has been shown to attain decimeter-level localization accuracy in nearly 90% of cases, demonstrating robust performance even in challenging real-world scenarios. Additionally, our proposed anomaly detection algorithm trained on Wi-Fi data can be directly applied to ultra-wideband, also outperforming the most advanced techniques.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Algorithms for Multi-Criteria Decision-Making and Efficiency Analysis Problems
Authors:
Fuh-Hwa Franklin Liu,
Su-Chuan Shih
Abstract:
Multi-criteria decision-making (MCDM) problems involve the evaluation of alternatives based on various minimization and maximization criteria. Similarly, efficiency evaluation (EA) methods assess decision-making units (DMUs) by analyzing their input consumption and output production. MCDM and EA methods face challenges in managing alternatives and DMUs with varying capacities across different crit…
▽ More
Multi-criteria decision-making (MCDM) problems involve the evaluation of alternatives based on various minimization and maximization criteria. Similarly, efficiency evaluation (EA) methods assess decision-making units (DMUs) by analyzing their input consumption and output production. MCDM and EA methods face challenges in managing alternatives and DMUs with varying capacities across different criteria (inputs and outputs). That leads to performance assessments often skewed by subjective biases in criteria weighting. We introduce two innovative scenarios utilizing linear programming-based Virtual Gap Analysis (VGA) models to address these limitations. This dual-scenario approach aims to mitigate traditional biases, offering robust solutions for comprehensively assessing alternatives and DMUs. Our methodology allows for the influential ranking of alternatives in MCDM problems and enables each DMU to adjust its input and output ratios to achieve efficiency.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Binaural Angular Separation Network
Authors:
Yang Yang,
George Sung,
Shao-Fu Shih,
Hakan Erdogan,
Chehung Lee,
Matthias Grundmann
Abstract:
We propose a neural network model that can separate target speech sources from interfering sources at different angular regions using two microphones. The model is trained with simulated room impulse responses (RIRs) using omni-directional microphones without needing to collect real RIRs. By relying on specific angular regions and multiple room simulations, the model utilizes consistent time diffe…
▽ More
We propose a neural network model that can separate target speech sources from interfering sources at different angular regions using two microphones. The model is trained with simulated room impulse responses (RIRs) using omni-directional microphones without needing to collect real RIRs. By relying on specific angular regions and multiple room simulations, the model utilizes consistent time difference of arrival (TDOA) cues, or what we call delay contrast, to separate target and interference sources while remaining robust in various reverberation environments. We demonstrate the model is not only generalizable to a commercially available device with a slightly different microphone geometry, but also outperforms our previous work which uses one additional microphone on the same device. The model runs in real-time on-device and is suitable for low-latency streaming applications such as telephony and video conferencing.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Eisenstein points on the Hilbert cuspidal eigenvariety
Authors:
Adel Betina,
Mladen Dimitrov,
Sheng-Chi Shih
Abstract:
We present a comprehensive study of the geometry of Hilbert $p$-adic eigenvarieties at parallel weight one intersection points of their cuspidal and Eisenstein loci. The Galois theoretic approach presents genuine difficulties due to the lack of good deformation theory for pseudo-characters irregular at $p$ and reflects the rich local geometry at such points. We believe that our geometric results l…
▽ More
We present a comprehensive study of the geometry of Hilbert $p$-adic eigenvarieties at parallel weight one intersection points of their cuspidal and Eisenstein loci. The Galois theoretic approach presents genuine difficulties due to the lack of good deformation theory for pseudo-characters irregular at $p$ and reflects the rich local geometry at such points. We believe that our geometric results lead to deeper insight into the arithmetic of Hilbert automorphic forms and we produce several applications in Iwasawa theory to support that.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Data envelopment analysis models or the virtual gap analysis model: Which should be used for identifying the best benchmark for each unit in a group?
Authors:
Fun-Hwa Franklin Liu,
Su-Chuan Shih
Abstract:
Decision-making units (DMUs) in a group convert the same resources (i.e., input indices) into the same products (i.e., output indices) at different scales. Performance indices have different measurement units, and their market prices per unit are unobtainable. Data envelopment analysis (DEA) programs employ linear programming to estimate the virtual weight and best slack of every input and output…
▽ More
Decision-making units (DMUs) in a group convert the same resources (i.e., input indices) into the same products (i.e., output indices) at different scales. Performance indices have different measurement units, and their market prices per unit are unobtainable. Data envelopment analysis (DEA) programs employ linear programming to estimate the virtual weight and best slack of every input and output index for each DMU, named DMU-o, to obtain the minimum relative inefficiency against the DMUs. DMU-o reduces each input's slack, the surplus, and expands each output's slack, the shortage, to the benchmark. Each DEA program specifies an artificial goal weight for each performance index. The relative inefficiencies in the primal and dual models are the sum of the weighted slacks and the virtual gap of the total virtual weighted inputs to the outputs, respectively. DEA programs have failed the uncountable attempts to conceive the artificial goal weight equal to the estimated virtual weight for each performance index; therefore, they have incomplete solutions that some of the slacks could not be aggregated into the efficiency score. Our new virtual gap analysis program assesses DMU-o comprehensively. The four-phase procedure ensures DMU-o has the achievable best benchmarks for implementation and its compatible best peers to learn. Each DMU is a point in the 2D geometric intuition of the virtual technology set in assessing DMU-o. The best peers and the improved DMU-o are on the best efficiency boundary. Inefficient DMUs are situated underneath the boundary.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
MIMO Evolution toward 6G: End-User-Centric Collaborative MIMO
Authors:
Lung-Sheng Tsai,
Shang-Ling Shih,
Pei-Kai Liao,
Chao-Kai Wen
Abstract:
In 6G, the trend of transitioning from massive antenna elements to even more massive ones is continued. However, installing additional antennas in the limited space of user equipment (UE) is challenging, resulting in limited capacity scaling gain for end users, despite network side support for increasing numbers of antennas. To address this issue, we propose an end-user-centric collaborative MIMO…
▽ More
In 6G, the trend of transitioning from massive antenna elements to even more massive ones is continued. However, installing additional antennas in the limited space of user equipment (UE) is challenging, resulting in limited capacity scaling gain for end users, despite network side support for increasing numbers of antennas. To address this issue, we propose an end-user-centric collaborative MIMO (UE-CoMIMO) framework that groups several fixed or portable devices to provide a virtual abundance of antennas. This article outlines how advanced L1 relays and conventional relays enable device collaboration to offer diversity, rank, and localization enhancements. We demonstrate through system-level simulations how the UE-CoMIMO approaches lead to significant performance gains. Lastly, we discuss necessary research efforts to make UE-CoMIMO available for 6G and future research directions.
△ Less
Submitted 14 November, 2023; v1 submitted 20 May, 2023;
originally announced May 2023.
-
Guided Speech Enhancement Network
Authors:
Yang Yang,
Shao-Fu Shih,
Hakan Erdogan,
Jamie Menjay Lin,
Chehung Lee,
Yunpeng Li,
George Sung,
Matthias Grundmann
Abstract:
High quality speech capture has been widely studied for both voice communication and human computer interface reasons. To improve the capture performance, we can often find multi-microphone speech enhancement techniques deployed on various devices. Multi-microphone speech enhancement problem is often decomposed into two decoupled steps: a beamformer that provides spatial filtering and a single-cha…
▽ More
High quality speech capture has been widely studied for both voice communication and human computer interface reasons. To improve the capture performance, we can often find multi-microphone speech enhancement techniques deployed on various devices. Multi-microphone speech enhancement problem is often decomposed into two decoupled steps: a beamformer that provides spatial filtering and a single-channel speech enhancement model that cleans up the beamformer output. In this work, we propose a speech enhancement solution that takes both the raw microphone and beamformer outputs as the input for an ML model. We devise a simple yet effective training scheme that allows the model to learn from the cues of the beamformer by contrasting the two inputs and greatly boost its capability in spatial rejection, while conducting the general tasks of denoising and dereverberation. The proposed solution takes advantage of classical spatial filtering algorithms instead of competing with them. By design, the beamformer module then could be selected separately and does not require a large amount of data to be optimized for a given form factor, and the network model can be considered as a standalone module which is highly transferable independently from the microphone array. We name the ML module in our solution as GSENet, short for Guided Speech Enhancement Network. We demonstrate its effectiveness on real world data collected on multi-microphone devices in terms of the suppression of noise and interfering speech.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
Your ViT is Secretly a Hybrid Discriminative-Generative Diffusion Model
Authors:
Xiulong Yang,
Sheng-Min Shih,
Yinlin Fu,
Xiaoting Zhao,
Shihao Ji
Abstract:
Diffusion Denoising Probability Models (DDPM) and Vision Transformer (ViT) have demonstrated significant progress in generative tasks and discriminative tasks, respectively, and thus far these models have largely been developed in their own domains. In this paper, we establish a direct connection between DDPM and ViT by integrating the ViT architecture into DDPM, and introduce a new generative mod…
▽ More
Diffusion Denoising Probability Models (DDPM) and Vision Transformer (ViT) have demonstrated significant progress in generative tasks and discriminative tasks, respectively, and thus far these models have largely been developed in their own domains. In this paper, we establish a direct connection between DDPM and ViT by integrating the ViT architecture into DDPM, and introduce a new generative model called Generative ViT (GenViT). The modeling flexibility of ViT enables us to further extend GenViT to hybrid discriminative-generative modeling, and introduce a Hybrid ViT (HybViT). Our work is among the first to explore a single ViT for image generation and classification jointly. We conduct a series of experiments to analyze the performance of proposed models and demonstrate their superiority over prior state-of-the-arts in both generative and discriminative tasks. Our code and pre-trained models can be found in https://github.com/sndnyang/Diffusion_ViT .
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
On Iwasawa invariants of modular forms with reducible and non-$p$-distinguished residual Galois representations
Authors:
Sheng-Chi Shih,
Jun Wang
Abstract:
In the present paper, we study the $p$-adic $L$-functions and the (strict) Selmer groups over $\mathbb{Q}_{\infty}$, the cyclotomic $\mathbb{Z}_p$-extension of $\mathbb{Q}$, of the $p$-adic weight one cusp forms $f$, obtained via the $p$-stabilization of weight one Eisenstein series, under the assumption that a certain Eisenstein component of the $p$-ordinary universal cuspidal Hecke algebra is Go…
▽ More
In the present paper, we study the $p$-adic $L$-functions and the (strict) Selmer groups over $\mathbb{Q}_{\infty}$, the cyclotomic $\mathbb{Z}_p$-extension of $\mathbb{Q}$, of the $p$-adic weight one cusp forms $f$, obtained via the $p$-stabilization of weight one Eisenstein series, under the assumption that a certain Eisenstein component of the $p$-ordinary universal cuspidal Hecke algebra is Gorenstein. As an application, we compute the Iwasawa invariants of ordinary modular forms of weight $k\geq 2$ with the same residual Galois representations as the one of $f$, which in our setting, is reducible and non-$p$-distinguished. Combining this with a result of Kato \cite[Theorem~17.4.2]{kato04}, we prove the Iwasawa main conjecture for these forms. Also, we give numerical examples that satisfy the Gorenstein hypothesis.
The crucial point on the analytic counter part is that under the Gorenstein hypothesis, we are able to define, following Greenberg--Vatsal, the $p$-adic $L$-functions of $p$-adic weight one forms $f$ as an element in the one-dimensional Iwasawa algebra by using Mazur--Kitagawa two-variable $p$-adic $L$-function and then, to compute them explicitly via local explicit reciprocity law. On the algebraic counter part, we compute the (strict) Selmer groups of $f$ over $\mathbb{Q}_{\infty}$ via the knowledge of the Galois representations of $f$ studied in \cite{BDP}.
△ Less
Submitted 3 August, 2022; v1 submitted 29 June, 2022;
originally announced June 2022.
-
A Projection-Based K-space Transformer Network for Undersampled Radial MRI Reconstruction with Limited Training Subjects
Authors:
Chang Gao,
Shu-Fu Shih,
J. Paul Finn,
Xiaodong Zhong
Abstract:
The recent development of deep learning combined with compressed sensing enables fast reconstruction of undersampled MR images and has achieved state-of-the-art performance for Cartesian k-space trajectories. However, non-Cartesian trajectories such as the radial trajectory need to be transformed onto a Cartesian grid in each iteration of the network training, slowing down the training process and…
▽ More
The recent development of deep learning combined with compressed sensing enables fast reconstruction of undersampled MR images and has achieved state-of-the-art performance for Cartesian k-space trajectories. However, non-Cartesian trajectories such as the radial trajectory need to be transformed onto a Cartesian grid in each iteration of the network training, slowing down the training process and posing inconvenience and delay during training. Multiple iterations of nonuniform Fourier transform in the networks offset the deep learning advantage of fast inference. Current approaches typically either work on image-to-image networks or grid the non-Cartesian trajectories before the network training to avoid the repeated gridding process. However, the image-to-image networks cannot ensure the k-space data consistency in the reconstructed images and the pre-processing of non-Cartesian k-space leads to gridding errors which cannot be compensated by the network training. Inspired by the Transformer network to handle long-range dependencies in sequence transduction tasks, we propose to rearrange the radial spokes to sequential data based on the chronological order of acquisition and use the Transformer to predict unacquired radial spokes from acquired ones. We propose novel data augmentation methods to generate a large amount of training data from a limited number of subjects. The network can be generated to different anatomical structures. Experimental results show superior performance of the proposed framework compared to state-of-the-art deep neural networks.
△ Less
Submitted 25 July, 2022; v1 submitted 14 June, 2022;
originally announced June 2022.
-
Enabling Real-time On-chip Audio Super Resolution for Bone Conduction Microphones
Authors:
Yuang Li,
Yuntao Wang,
Xin Liu,
Yuanchun Shi,
Shao-fu Shih
Abstract:
Voice communication using the air conduction microphone in noisy environments suffers from the degradation of speech audibility. Bone conduction microphones (BCM) are robust against ambient noises but suffer from limited effective bandwidth due to their sensing mechanism. Although existing audio super resolution algorithms can recover the high frequency loss to achieve high-fidelity audio, they re…
▽ More
Voice communication using the air conduction microphone in noisy environments suffers from the degradation of speech audibility. Bone conduction microphones (BCM) are robust against ambient noises but suffer from limited effective bandwidth due to their sensing mechanism. Although existing audio super resolution algorithms can recover the high frequency loss to achieve high-fidelity audio, they require considerably more computational resources than available in low-power hearable devices. This paper proposes the first-ever real-time on-chip speech audio super resolution system for BCM. To accomplish this, we built and compared a series of lightweight audio super resolution deep learning models. Among all these models, ATS-UNet is the most cost-efficient because the proposed novel Audio Temporal Shift Module (ATSM) reduces the network's dimensionality while maintaining sufficient temporal features from speech audios. Then we quantized and deployed the ATS-UNet to low-end ARM micro-controller units for real-time embedded prototypes. Evaluation results show that our system achieved real-time inference speed on Cortex-M7 and higher quality than the baseline audio super resolution method. Finally, we conducted a user study with ten experts and ten amateur listeners to evaluate our method's effectiveness to human ears. Both groups perceived a significantly higher speech quality with our method when compared to the solutions with the original BCM or air conduction microphone with cutting-edge noise reduction algorithms.
△ Less
Submitted 24 December, 2021;
originally announced December 2021.
-
Robust Information Retrieval for False Claims with Distracting Entities In Fact Extraction and Verification
Authors:
Mingwen Dong,
Christos Christodoulopoulos,
Sheng-Min Shih,
Xiaofei Ma
Abstract:
Accurate evidence retrieval is essential for automated fact checking. Little previous research has focused on the differences between true and false claims and how they affect evidence retrieval. This paper shows that, compared with true claims, false claims more frequently contain irrelevant entities which can distract evidence retrieval model. A BERT-based retrieval model made more mistakes in r…
▽ More
Accurate evidence retrieval is essential for automated fact checking. Little previous research has focused on the differences between true and false claims and how they affect evidence retrieval. This paper shows that, compared with true claims, false claims more frequently contain irrelevant entities which can distract evidence retrieval model. A BERT-based retrieval model made more mistakes in retrieving refuting evidence for false claims than supporting evidence for true claims. When tested with adversarial false claims (synthetically generated) containing irrelevant entities, the recall of the retrieval model is significantly lower than that for original claims. These results suggest that the vanilla BERT-based retrieval model is not robust to irrelevant entities in the false claims. By augmenting the training data with synthetic false claims containing irrelevant entities, the trained model achieved higher evidence recall, including that of false claims with irrelevant entities. In addition, using separate models to retrieve refuting and supporting evidence and then aggregating them can also increase the evidence recall, including that of false claims with irrelevant entities. These results suggest that we can increase the BERT-based retrieval model's robustness to false claims with irrelevant entities via data augmentation and model ensemble.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
Labeling Multipath via Reconfigurable Intelligent Surface
Authors:
Chang-Jen Wang,
Shang-Ling Shih,
Chao-Kai Wen,
Shi **
Abstract:
Reconfigurable intelligent surface (RIS) has shown promise in providing apparent benefits in wireless communication and positioning. Most of the existing research focuses on the ability of RIS to adjust the direction of propagation. In this paper, we present another application based on RIS, named multipath labeling, which intends to inject a label on propagation paths through the RISs. Each label…
▽ More
Reconfigurable intelligent surface (RIS) has shown promise in providing apparent benefits in wireless communication and positioning. Most of the existing research focuses on the ability of RIS to adjust the direction of propagation. In this paper, we present another application based on RIS, named multipath labeling, which intends to inject a label on propagation paths through the RISs. Each labeled path contains spatial knowledge between the RIS and the receiver, thus opening the door for sensing the surrounding world by RISs. The critical challenge is how the labeled paths can be extracted and distinguish from other paths, especially with multipath effects. To address this challenge, we present a complete labeling procedure consisting of channel flip**, parameter extraction, and RIS association. Simulations under a practice ray-tracing model reveal the feasibility of the proposed labeling technique even under the sub 6GHz channels with severe multipath effect. We also apply the multipath labeling technique to localization, which assists user equipment in obtaining its precise location through only a single base station.
△ Less
Submitted 2 October, 2021; v1 submitted 25 April, 2021;
originally announced April 2021.
-
GANMEX: One-vs-One Attributions Guided by GAN-based Counterfactual Explanation Baselines
Authors:
Sheng-Min Shih,
Pin-Ju Tien,
Zohar Karnin
Abstract:
Attribution methods have been shown as promising approaches for identifying key features that led to learned model predictions. While most existing attribution methods rely on a baseline input for performing feature perturbations, limited research has been conducted to address the baseline selection issues. Poor choices of baselines limit the ability of one-vs-one (1-vs-1) explanations for multi-c…
▽ More
Attribution methods have been shown as promising approaches for identifying key features that led to learned model predictions. While most existing attribution methods rely on a baseline input for performing feature perturbations, limited research has been conducted to address the baseline selection issues. Poor choices of baselines limit the ability of one-vs-one (1-vs-1) explanations for multi-class classifiers, which means the attribution methods were not able to explain why an input belongs to its original class but not the other specified target class. 1-vs-1 explanation is crucial when certain classes are more similar than others, e.g. two bird types among multiple animals, by focusing on key differentiating features rather than shared features across classes. In this paper, we present GAN-based Model EXplainability (GANMEX), a novel approach applying Generative Adversarial Networks (GAN) by incorporating the to-be-explained classifier as part of the adversarial networks. Our approach effectively selects the counterfactual baseline as the closest realistic sample belong to the target class, which allows attribution methods to provide true 1-vs-1 explanations. We showed that GANMEX baselines improved the saliency maps and led to stronger performance on perturbation-based evaluation metrics over the existing baselines. Existing attribution results are known for being insensitive to model randomization, and we demonstrated that GANMEX baselines led to better outcome under the cascading randomization of the model.
△ Less
Submitted 23 June, 2021; v1 submitted 11 November, 2020;
originally announced November 2020.
-
On Sharifi's conjecture: exceptional case
Authors:
Sheng-Chi Shih,
Jun Wang
Abstract:
In the present article, we study the conjecture of Sharifi on the surjectivity of the map $\varpi_θ$. Here $θ$ is a primitive even Dirichlet character of conductor $Np$, which is exceptional in the sense of Ohta. After localizing at the prime ideal $\mathfrak{p}$ of the Iwasawa algebra related to the trivial zero of the Kubota\textendash Leopoldt $p$-adic $L$-function $L_p(s,θ^{-1}ω^2)$, we comput…
▽ More
In the present article, we study the conjecture of Sharifi on the surjectivity of the map $\varpi_θ$. Here $θ$ is a primitive even Dirichlet character of conductor $Np$, which is exceptional in the sense of Ohta. After localizing at the prime ideal $\mathfrak{p}$ of the Iwasawa algebra related to the trivial zero of the Kubota\textendash Leopoldt $p$-adic $L$-function $L_p(s,θ^{-1}ω^2)$, we compute the image of $\varpi_{θ,\mathfrak{p}}$ in a local Galois cohomology group and prove that it is an isomorphism. Also, we prove that the residual Galois representations associated to the cohomology of modular curves are decomposable after taking the same localization.
△ Less
Submitted 12 March, 2021; v1 submitted 15 September, 2020;
originally announced September 2020.
-
Automatic, Personalized, and Flexible Playlist Generation using Reinforcement Learning
Authors:
Shun-Yao Shih,
Heng-Yu Chi
Abstract:
Songs can be well arranged by professional music curators to form a riveting playlist that creates engaging listening experiences. However, it is time-consuming for curators to timely rearrange these playlists for fitting trends in future. By exploiting the techniques of deep learning and reinforcement learning, in this paper, we consider music playlist generation as a language modeling problem an…
▽ More
Songs can be well arranged by professional music curators to form a riveting playlist that creates engaging listening experiences. However, it is time-consuming for curators to timely rearrange these playlists for fitting trends in future. By exploiting the techniques of deep learning and reinforcement learning, in this paper, we consider music playlist generation as a language modeling problem and solve it by the proposed attention language model with policy gradient. We develop a systematic and interactive approach so that the resulting playlists can be tuned flexibly according to user preferences. Considering a playlist as a sequence of words, we first train our attention RNN language model on baseline recommended playlists. By optimizing suitable imposed reward functions, the model is thus refined for corresponding preferences. The experimental results demonstrate that our approach not only generates coherent playlists automatically but is also able to flexibly recommend personalized playlists for diversity, novelty and freshness.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Temporal Pattern Attention for Multivariate Time Series Forecasting
Authors:
Shun-Yao Shih,
Fan-Keng Sun,
Hung-yi Lee
Abstract:
Forecasting multivariate time series data, such as prediction of electricity consumption, solar power production, and polyphonic piano pieces, has numerous valuable applications. However, complex and non-linear interdependencies between time steps and series complicate the task. To obtain accurate prediction, it is crucial to model long-term dependency in time series data, which can be achieved to…
▽ More
Forecasting multivariate time series data, such as prediction of electricity consumption, solar power production, and polyphonic piano pieces, has numerous valuable applications. However, complex and non-linear interdependencies between time steps and series complicate the task. To obtain accurate prediction, it is crucial to model long-term dependency in time series data, which can be achieved to some good extent by recurrent neural network (RNN) with attention mechanism. Typical attention mechanism reviews the information at each previous time step and selects the relevant information to help generate the outputs, but it fails to capture the temporal patterns across multiple time steps. In this paper, we propose to use a set of filters to extract time-invariant temporal patterns, which is similar to transforming time series data into its "frequency domain". Then we proposed a novel attention mechanism to select relevant time series, and use its "frequency domain" information for forecasting. We applied the proposed model on several real-world tasks and achieved state-of-the-art performance in all of them with only one exception.
△ Less
Submitted 18 September, 2019; v1 submitted 11 September, 2018;
originally announced September 2018.
-
Shimura varieties at level $Γ_1(p^\infty)$ and Galois representations
Authors:
Ana Caraiani,
Daniel R. Gulotta,
Chi-Yun Hsu,
Christian Johansson,
Lucia Mocz,
Emanuel Reinecke,
Sheng-Chi Shih
Abstract:
We show that the compactly supported cohomology of certain $\mathrm{U}(n,n)$ or $\mathrm{Sp}(2n)$-Shimura varieties with $Γ_1(p^\infty)$-level vanishes above the middle degree. The only assumption is that we work over a CM field $F$ in which the prime $p$ splits completely. We also give an application to Galois representations for torsion in the cohomology of the locally symmetric spaces for…
▽ More
We show that the compactly supported cohomology of certain $\mathrm{U}(n,n)$ or $\mathrm{Sp}(2n)$-Shimura varieties with $Γ_1(p^\infty)$-level vanishes above the middle degree. The only assumption is that we work over a CM field $F$ in which the prime $p$ splits completely. We also give an application to Galois representations for torsion in the cohomology of the locally symmetric spaces for $\mathrm{GL}_n/F$. More precisely, we use the vanishing result for Shimura varieties to eliminate the nilpotent ideal in the construction of these Galois representations. This strengthens recent results of Scholze and Newton-Thorne.
△ Less
Submitted 25 July, 2019; v1 submitted 31 March, 2018;
originally announced April 2018.
-
On congruence modules related to Hilbert Eisenstein series
Authors:
Sheng-Chi Shih
Abstract:
We generalize the work of Ohta on the congruence modules attached to elliptic Eisenstein series to the setting of Hilbert modular forms. Our work involves three parts. In the first part, we construct Eisenstein series adelically and compute their constant terms by computing local integrals. In the second part, we prove a control theorem for one-variable ordinary $Λ$-adic Hilbert modular forms foll…
▽ More
We generalize the work of Ohta on the congruence modules attached to elliptic Eisenstein series to the setting of Hilbert modular forms. Our work involves three parts. In the first part, we construct Eisenstein series adelically and compute their constant terms by computing local integrals. In the second part, we prove a control theorem for one-variable ordinary $Λ$-adic Hilbert modular forms following Hida's work on the space of multivariable ordinary $Λ$-adic Hilbert cusp forms. In part three, we compute congruence modules related to Hilbert Eisenstein series through an analog of Ohta's methods.
△ Less
Submitted 9 February, 2020; v1 submitted 5 January, 2018;
originally announced January 2018.
-
Orientation-dependent surface composition of in situ annealed strontium titanate
Authors:
Luiz F. Zagonel,
Nicholas Barrett,
Olivier Renault,
Aude Bailly,
Michael Bäurer,
Michael Hoffmann,
Shao-Ju Shih,
David Cockayne
Abstract:
The surface composition of polycrystalline niobium-doped strontium titanate (SrTiO3 : Nb) is studied using X-ray photoelectron emission microscopy (XPEEM) for many grain orientations in order to characterise the surface chemistry with high spatial resolution. The surface sensitivity is maximised by the use of soft X-ray synchrotron radiation (SR). The grain orientation is determined by electron ba…
▽ More
The surface composition of polycrystalline niobium-doped strontium titanate (SrTiO3 : Nb) is studied using X-ray photoelectron emission microscopy (XPEEM) for many grain orientations in order to characterise the surface chemistry with high spatial resolution. The surface sensitivity is maximised by the use of soft X-ray synchrotron radiation (SR). The grain orientation is determined by electron backscattering diffraction (EBSD). Stereographic plots are used to show the correlation between surface composition and orientation for several grains. Predominant surface terminations are assigned to major orientations.
△ Less
Submitted 20 October, 2012;
originally announced October 2012.
-
Orientation dependent work function of in situ annealed strontium titanate
Authors:
L F Zagonel,
M Bäurer,
A Bailly,
O Renault,
M Hoffmann,
S-J Shih,
D Cockayne,
N Barrett
Abstract:
We have used energy filtered x-ray photoelectron emission microscopy (XPEEM) and synchrotron radiation to measure the grain orientation dependence of the work function of a sintered niobium doped strontium titanate ceramic. A significant spread in work function values is found. Grain orientation and surface reducing/oxidizing conditions are the main factors in determining the work function. Energy…
▽ More
We have used energy filtered x-ray photoelectron emission microscopy (XPEEM) and synchrotron radiation to measure the grain orientation dependence of the work function of a sintered niobium doped strontium titanate ceramic. A significant spread in work function values is found. Grain orientation and surface reducing/oxidizing conditions are the main factors in determining the work function. Energy filtered XPEEM looks ideally suited for analysis of other technologically interesting polycrystalline samples.
△ Less
Submitted 10 October, 2012;
originally announced October 2012.
-
Genomic tests of variation in inbreeding among individuals and among chromosomes
Authors:
Joshua G. Schraiber,
Stephannie Shih,
Montgomery Slatkin
Abstract:
We examine the distribution of heterozygous sites in nine European and nine Yoruban individuals whose genomic sequences were made publicly available by Complete Genomics. We show that it is possible to obtain detailed information about inbreeding when a relatively small set of whole-genome sequences is available. Rather than focus on testing for deviations from Hardy-Weinberg genotype frequencies…
▽ More
We examine the distribution of heterozygous sites in nine European and nine Yoruban individuals whose genomic sequences were made publicly available by Complete Genomics. We show that it is possible to obtain detailed information about inbreeding when a relatively small set of whole-genome sequences is available. Rather than focus on testing for deviations from Hardy-Weinberg genotype frequencies at each site, we analyze the entire distribution of heterozygotes conditioned on the number of copies of the derived (non-chimpanzee) allele. Using Levene's exact test, we reject Hardy-Weinberg in both populations. We generalized Levene's distribution to obtain the exact distribution of the number of heterozygous individuals given that every individual has the same inbreeding coefficient, F. We estimated F to be 0.0026 in Europeans and 0.0005 in Yorubans, but we could also reject the hypothesis that F was the same in each individual. We used a composite likelihood method to estimate F in each individual and within each chromosome. Variation in F across chromosomes within individuals was too large to be consistent with sampling effects alone. Furthermore, estimates of F for each chromosome in different populations were not correlated. Our results show how detailed comparisons of population genomic data can be made to theoretical predictions. The application of methods to the Complete Genomics data set shows that the extent of apparent inbreeding varies across chromosomes and across individuals, and estimates of inbreeding coefficients are subject to unexpected levels of variation which might be partly accounted for by selection.
△ Less
Submitted 26 September, 2012;
originally announced September 2012.
-
Freudenthal Gauge Theory
Authors:
Alessio Marrani,
Cong-Xin Qiu,
Sheng-Yu Darren Shih,
Anthony Tagliaferro,
Bruno Zumino
Abstract:
We present a novel gauge field theory, based on the Freudenthal Triple System (FTS), a ternary algebra with mixed symmetry (not completely symmetric) structure constants. The theory, named Freudenthal Gauge Theory (FGT), is invariant under two (off-shell) symmetries: the gauge Lie algebra constructed from the FTS triple product and a novel global non-polynomial symmetry, the so-called Freudenthal…
▽ More
We present a novel gauge field theory, based on the Freudenthal Triple System (FTS), a ternary algebra with mixed symmetry (not completely symmetric) structure constants. The theory, named Freudenthal Gauge Theory (FGT), is invariant under two (off-shell) symmetries: the gauge Lie algebra constructed from the FTS triple product and a novel global non-polynomial symmetry, the so-called Freudenthal duality. Interestingly, a broad class of FGT gauge algebras is provided by the Lie algebras "of type e7" which occur as conformal symmetries of Euclidean Jordan algebras of rank 3, and as U-duality algebras of the corresponding (super)gravity theories in D = 4. We prove a No-Go Theorem, stating the incompatibility of the invariance under Freudenthal duality and the coupling to space-time vector and/or spinor fields, thus forbidding non-trivial supersymmetric extensions of FGT. We also briefly discuss the relation between FTS and the triple systems occurring in BLG-type theories, in particular focusing on superconformal Chern-Simons-matter gauge theories in D = 3.
△ Less
Submitted 22 February, 2013; v1 submitted 31 July, 2012;
originally announced August 2012.
-
Holomorphic Anomaly in Gauge Theory on ALE space
Authors:
Daniel Krefl,
Sheng-Yu Darren Shih
Abstract:
We consider four-dimensional Omega-deformed N=2 supersymmetric SU(2) gauge theory on A1 space and its lift to five dimensions. We find that the partition functions can be reproduced via special geometry and the holomorphic anomaly equation. Schwinger type integral expressions for the boundary conditions at the monopole/dyon point in moduli space are inferred. The interpretation of the five-dimensi…
▽ More
We consider four-dimensional Omega-deformed N=2 supersymmetric SU(2) gauge theory on A1 space and its lift to five dimensions. We find that the partition functions can be reproduced via special geometry and the holomorphic anomaly equation. Schwinger type integral expressions for the boundary conditions at the monopole/dyon point in moduli space are inferred. The interpretation of the five-dimensional partition function as the partition function of a refined topological string on A1x(local P1xP1) is suggested.
△ Less
Submitted 12 December, 2011;
originally announced December 2011.
-
Embeddings of fields in simple algebras over global fields
Authors:
Sheng-Chi Shih,
Tse-Chung Yang,
Chia-Fu Yu
Abstract:
Let $F$ be a global field, $A$ a central simple algebra over $F$ and $K$ a finite (separable or not) field extension of $F$ with degree $[K:F]$ dividing the degree of $A$ over $F$. An embedding of $K$ in $A$ over $F$ exists implies an embedding exists locally everywhere. In this paper we give detailed discussions when the converse (i.e. the local-global principle in question) may hold.
Let $F$ be a global field, $A$ a central simple algebra over $F$ and $K$ a finite (separable or not) field extension of $F$ with degree $[K:F]$ dividing the degree of $A$ over $F$. An embedding of $K$ in $A$ over $F$ exists implies an embedding exists locally everywhere. In this paper we give detailed discussions when the converse (i.e. the local-global principle in question) may hold.
△ Less
Submitted 2 March, 2013; v1 submitted 3 August, 2011;
originally announced August 2011.
-
Macroscopic loop amplitudes in the multi-cut two-matrix models
Authors:
Chuan-Tsung Chan,
Hirotaka Irie,
Sheng-Yu Darren Shih,
Chi-Hsien Yeh
Abstract:
Multi-cut critical points and their macroscopic loop amplitudes are studied in the multi-cut two-matrix models, based on an extension of the prescription developed by Daul, Kazakov and Kostov. After identifying possible critical points and potentials in the multi-cut matrix models, we calculate the macroscopic loop amplitudes in the Z_k symmetric background. With a natural large N ansatz for the…
▽ More
Multi-cut critical points and their macroscopic loop amplitudes are studied in the multi-cut two-matrix models, based on an extension of the prescription developed by Daul, Kazakov and Kostov. After identifying possible critical points and potentials in the multi-cut matrix models, we calculate the macroscopic loop amplitudes in the Z_k symmetric background. With a natural large N ansatz for the matrix Lax operators, a sequence of new solutions for the amplitudes in the Z_k symmetric k-cut two-matrix models are obtained, which are realized by the Jacobi polynomials.
△ Less
Submitted 26 October, 2009; v1 submitted 7 September, 2009;
originally announced September 2009.
-
Pseudo-potential of a power-law decaying interaction in two-dimensional systems
Authors:
Sheng-Min Shih,
Daw-Wei Wang
Abstract:
We analytically derive the general pseudo-potential operator of an arbitrary isotropic interaction for particles confined in two-dimensional (2D) systems, using the frame work developed by Huang and Yang for 3D scattering. We also analytically derive the low energy dependence of the scattering phase-shift for an arbitrary interaction with a power-law decaying tail, $V_{\rm 2D}(ρ)\propto ρ^{-α}$…
▽ More
We analytically derive the general pseudo-potential operator of an arbitrary isotropic interaction for particles confined in two-dimensional (2D) systems, using the frame work developed by Huang and Yang for 3D scattering. We also analytically derive the low energy dependence of the scattering phase-shift for an arbitrary interaction with a power-law decaying tail, $V_{\rm 2D}(ρ)\propto ρ^{-α}$ (for $α>2$). We apply our results to the 2D dipolar gases ($α=3$) as an example, calculating the momentum and dipole moment dependence of the pseudo-potential for both $s$- and p-wave scattering channels if the two scattering particles are in the same 2D layer. Results for the s-wave scattering between particles in two different (parallel) layers are also investigated. Our results can be directly applied to the systems of dipolar atoms and/or polar molecules in a general 2D geometry.
△ Less
Submitted 17 April, 2009; v1 submitted 17 February, 2009;
originally announced February 2009.
-
M-Theory Superalgebra From Multiple Membranes
Authors:
Kazuyuki Furuuchi,
Sheng-Yu Darren Shih,
Tomohisa Takimi
Abstract:
We investigate space-time supersymmetry of the model of multiple M2-branes proposed by Bagger-Lambert and Gustavsson. When there is a central element in Lie 3-algebra, the model possesses an extra symmetry shifting the fermions in the central element. Together with the original worldvolume supersymmetry transformation, we construct major part of the eleven dimensional space-time super-Poincaré a…
▽ More
We investigate space-time supersymmetry of the model of multiple M2-branes proposed by Bagger-Lambert and Gustavsson. When there is a central element in Lie 3-algebra, the model possesses an extra symmetry shifting the fermions in the central element. Together with the original worldvolume supersymmetry transformation, we construct major part of the eleven dimensional space-time super-Poincaré algebra with central extensions. Implications to transverse five-branes in the matrix model for M-theory are also discussed.
△ Less
Submitted 29 June, 2008; v1 submitted 25 June, 2008;
originally announced June 2008.
-
Discrete States in Light-Like Linear Dilaton Background
Authors:
Pei-Ming Ho,
Sheng-Yu Darren Shih
Abstract:
We study the spectrum of bosonic strings in the light-like linear dilaton background and find discrete states. These are physical states which exist only at specific values of momentum. All except one discrete states generate spacetime symmetries. The exceptional discrete state corresponds to constraints which are deformations of conservation laws. The constraints resemble those arising from sym…
▽ More
We study the spectrum of bosonic strings in the light-like linear dilaton background and find discrete states. These are physical states which exist only at specific values of momentum. All except one discrete states generate spacetime symmetries. The exceptional discrete state corresponds to constraints which are deformations of conservation laws. The constraints resemble those arising from symmetries, and are equally powerful, suggesting that our notion of symmetry should be generalized.
△ Less
Submitted 25 November, 2007; v1 submitted 18 November, 2007;
originally announced November 2007.
-
The massive neutron star or low-mass black hole in 2S0921-630
Authors:
T. Shahbaz,
J. Casares,
C. Watson,
P. A. Charles,
R. I. Hynes,
S. C. Shih,
D. Steeghs
Abstract:
We report on optical spectroscopy of the eclipsing Halo LMXB 2S0921-630, that reveals the absorption line radial velocity curve of the K0III secondary star with a semi-amplitude K_2=92.89 +/- 3.84 km/s, a systemic velocity $γ$=34.9 +/- 3.3 \kms and an orbital period P_orb of 9.0035 +/- 0.0029 day (1-sigma). Given the quality of the data, we find no evidence for the effects of X-ray irradiation.…
▽ More
We report on optical spectroscopy of the eclipsing Halo LMXB 2S0921-630, that reveals the absorption line radial velocity curve of the K0III secondary star with a semi-amplitude K_2=92.89 +/- 3.84 km/s, a systemic velocity $γ$=34.9 +/- 3.3 \kms and an orbital period P_orb of 9.0035 +/- 0.0029 day (1-sigma). Given the quality of the data, we find no evidence for the effects of X-ray irradiation. Using the previously determined rotational broadening of the mass donor, and applying conservative limits on the orbital inclination, we constrain the compact object mass to be 2.0-4.3 Msolar (1-sigma), ruling out a canonical neutron star at the 99% level. Since the nature of the compact object is unclear, this mass range implies that the compact object is either a low-mass black hole with a mass slightly higher than the maximum neutron star mass (2.9 Msolar) or a massive neutron star. If the compact object is a black hole, it confirms the prediction of the existence of low-mass black holes, while if the object is a massive neutron star its high mass severely constrains the equation of state of nuclear matter.
△ Less
Submitted 30 September, 2004;
originally announced September 2004.