-
Exposing the Obscured Influence of State-Controlled Media: A Causal Estimation of Influence Between Media Outlets Via Quotation Propagation
Authors:
Joseph Schlessinger,
Richard Bennet,
Jacob Coakwell,
Steven T. Smith,
Edward K. Kao
Abstract:
This study quantifies influence between media outlets by applying a novel methodology that uses causal effect estimation on networks and transformer language models. We demonstrate the obscured influence of state-controlled outlets over other outlets, regardless of orientation, by analyzing a large dataset of quotations from over 100 thousand articles published by the most prominent European and R…
▽ More
This study quantifies influence between media outlets by applying a novel methodology that uses causal effect estimation on networks and transformer language models. We demonstrate the obscured influence of state-controlled outlets over other outlets, regardless of orientation, by analyzing a large dataset of quotations from over 100 thousand articles published by the most prominent European and Russian traditional media outlets, appearing between May 2018 and October 2019. The analysis maps out the network structure of influence with news wire services serving as prominent bridges that connect outlets in different geo-political spheres. Overall, this approach demonstrates capabilities to identify and quantify the channels of influence in intermedia agenda setting over specific topics.
△ Less
Submitted 16 January, 2022;
originally announced January 2022.
-
Unpacking uncertainty in the modelling process for energy policy making
Authors:
Samuele Lo Piano,
Máté János Lőrincz,
Arnald Puy,
Steve Pye,
Andrea Saltelli,
Stefán Thor Smith,
Jeroen P. van der Sluijs
Abstract:
This paper explores how the modelling of energy systems may lead to undue closure of alternatives by generating an excess of certainty around some of the possible policy options. We exemplify the problem with two cases: first, the International Institute for Applied Systems Analysis (IIASA) global modelling in the 1980s; and second, the modelling activity undertaken in support of the construction…
▽ More
This paper explores how the modelling of energy systems may lead to undue closure of alternatives by generating an excess of certainty around some of the possible policy options. We exemplify the problem with two cases: first, the International Institute for Applied Systems Analysis (IIASA) global modelling in the 1980s; and second, the modelling activity undertaken in support of the construction of a radioactive waste repository at Yucca Mountain (Nevada, USA). We discuss different methodologies for quality assessment that may help remedy this issue, which include NUSAP (Numeral Unit Spread Assessment Pedigree), diagnostic diagrams, and sensitivity auditing. We demonstrate the potential of these reflexive modelling practices in energy policy making with four additional cases: (i) stakeholders evaluation of the assessment of the external costs of a potential large-scale nuclear accident in Belgium in the context of the ExternE (External Costs of Energy) project; (ii) the case of the ESME (Energy System Modelling Environment) for the creation of UK energy policy; (iii) the NETs (Negative Emission Technologies) uptake in Integrated Assessment Models (IAMs); and (iv) the Ecological Footprint (EF) indicator. We encourage modellers to widely adopt these approaches to achieve more robust and inclusive modelling activities in the field of energy modelling.
△ Less
Submitted 1 November, 2021;
originally announced November 2021.
-
Automatic Detection of Influential Actors in Disinformation Networks
Authors:
Steven T. Smith,
Edward K. Kao,
Erika D. Mackin,
Danelle C. Shah,
Olga Simek,
Donald B. Rubin
Abstract:
The weaponization of digital communications and social media to conduct disinformation campaigns at immense scale, speed, and reach presents new challenges to identify and counter hostile influence operations (IOs). This paper presents an end-to-end framework to automate detection of disinformation narratives, networks, and influential actors. The framework integrates natural language processing,…
▽ More
The weaponization of digital communications and social media to conduct disinformation campaigns at immense scale, speed, and reach presents new challenges to identify and counter hostile influence operations (IOs). This paper presents an end-to-end framework to automate detection of disinformation narratives, networks, and influential actors. The framework integrates natural language processing, machine learning, graph analytics, and a novel network causal inference approach to quantify the impact of individual actors in spreading IO narratives. We demonstrate its capability on real-world hostile IO campaigns with Twitter datasets collected during the 2017 French presidential elections, and known IO accounts disclosed by Twitter over a broad range of IO campaigns (May 2007 to February 2020), over 50,000 accounts, 17 countries, and different account types including both trolls and bots. Our system detects IO accounts with 96% precision, 79% recall, and 96% area-under-the-PR-curve, maps out salient network communities, and discovers high-impact accounts that escape the lens of traditional impact statistics based on activity counts and network centrality. Results are corroborated with independent sources of known IO accounts from U.S. Congressional reports, investigative journalism, and IO datasets provided by Twitter.
△ Less
Submitted 7 January, 2021; v1 submitted 21 May, 2020;
originally announced May 2020.
-
Geodesically parameterized covariance estimation
Authors:
Antoni Musolas,
Steven T. Smith,
Youssef Marzouk
Abstract:
Statistical modeling of spatiotemporal phenomena often requires selecting a covariance matrix from a covariance class. Yet standard parametric covariance families can be insufficiently flexible for practical applications, while non-parametric approaches may not easily allow certain kinds of prior knowledge to be incorporated. We propose instead to build covariance families out of geodesic curves.…
▽ More
Statistical modeling of spatiotemporal phenomena often requires selecting a covariance matrix from a covariance class. Yet standard parametric covariance families can be insufficiently flexible for practical applications, while non-parametric approaches may not easily allow certain kinds of prior knowledge to be incorporated. We propose instead to build covariance families out of geodesic curves. These covariances offer more flexibility for problem-specific tailoring than classical parametric families, and are preferable to simple convex combinations. Once the covariance family has been chosen, one typically needs to select a representative member by solving an optimization problem, e.g., by maximizing the likelihood of a data set. We consider instead a differential geometric interpretation of this problem: minimizing the geodesic distance to a sample covariance matrix ("natural projection"). Our approach is consistent with the notion of distance employed to build the covariance family and does not require assuming a particular probability distribution for the data. We show that natural projection and maximum likelihood estimation within the covariance family are locally equivalent up to second order. We also demonstrate that natural projection may yield more accurate estimates with noise-corrupted data.
△ Less
Submitted 23 December, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
Influence Estimation on Social Media Networks Using Causal Inference
Authors:
Steven T. Smith,
Edward K. Kao,
Danelle C. Shah,
Olga Simek,
Donald B. Rubin
Abstract:
Estimating influence on social media networks is an important practical and theoretical problem, especially because this new medium is widely exploited as a platform for disinformation and propaganda. This paper introduces a novel approach to influence estimation on social media networks and applies it to the real-world problem of characterizing active influence operations on Twitter during the 20…
▽ More
Estimating influence on social media networks is an important practical and theoretical problem, especially because this new medium is widely exploited as a platform for disinformation and propaganda. This paper introduces a novel approach to influence estimation on social media networks and applies it to the real-world problem of characterizing active influence operations on Twitter during the 2017 French presidential elections. The new influence estimation approach attributes impact by accounting for narrative propagation over the network using a network causal inference framework applied to data arising from graph sampling and filtering. This causal framework infers the difference in outcome as a function of exposure, in contrast to existing approaches that attribute impact to activity volume or topological features, which do not explicitly measure nor necessarily indicate actual network influence. Cramér-Rao estimation bounds are derived for parameter estimation as a step in the causal analysis, and used to achieve geometrical insight on the causal inference problem. The ability to infer high causal influence is demonstrated on real-world social media accounts that are later independently confirmed to be either directly affiliated or correlated with foreign influence operations using evidence supplied by the U.S. Congress and journalistic reports.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.
-
Scale-Bridging Model Development for Coal Particle Devolatilization
Authors:
Benjamin B Schroeder,
Sean T Smith,
Philip J Smith,
Thomas H Fletcher,
Andrew Packard,
Michael Frenklach,
Arun Hegde,
Wenyu Li,
James Oreluk
Abstract:
When performing large-scale, high-performance computations of multi-physics applications, it is common to limit the complexity of physics sub-models comprising the simulation. For a hierarchical system of coal boiler simulations a scale-bridging model is constructed to capture characteristics appropriate for the application-scale from a detailed coal devolatilization model. Such scale-bridging all…
▽ More
When performing large-scale, high-performance computations of multi-physics applications, it is common to limit the complexity of physics sub-models comprising the simulation. For a hierarchical system of coal boiler simulations a scale-bridging model is constructed to capture characteristics appropriate for the application-scale from a detailed coal devolatilization model. Such scale-bridging allows full descriptions of scale-applicable physics, while functioning at reasonable computational costs. This study presents a variation on multi-fidelity modeling with a detailed physics model, the chemical percolation devolatilization model, being used to calibrate a scale-briding model for the application of interest. The application space provides essential context for designing the scale-bridging model by defining scales, determining requirements and weighting desired characteristics. A single kinetic reaction equation with functional yield model and distributed activation energy is implemented to act as the scale-bridging model-form. Consistency constraints are used to locate regions of the scale-bridging model's parameter-space that are consistent with the uncertainty identified within the detailed model. Ultimately, the performance of the scale-bridging model with consistent parameter-sets was assessed against desired characteristics of the detailed model and found to perform satisfactorily in capturing thermodynamic trends and kinetic timescales for the desired application-scale. Framing the process of model-form selection within the context of calibration and uncertainty quantification allows the credibility of the model to be established.
△ Less
Submitted 3 September, 2016;
originally announced September 2016.
-
Optimization Techniques on Riemannian Manifolds
Authors:
Steven Thomas Smith
Abstract:
The techniques and analysis presented in this paper provide new methods to solve optimization problems posed on Riemannian manifolds. A new point of view is offered for the solution of constrained optimization problems. Some classical optimization techniques on Euclidean space are generalized to Riemannian manifolds. Several algorithms are presented and their convergence properties are analyzed em…
▽ More
The techniques and analysis presented in this paper provide new methods to solve optimization problems posed on Riemannian manifolds. A new point of view is offered for the solution of constrained optimization problems. Some classical optimization techniques on Euclidean space are generalized to Riemannian manifolds. Several algorithms are presented and their convergence properties are analyzed employing the Riemannian structure of the manifold. Specifically, two apparently new algorithms, which can be thought of as Newton's method and the conjugate gradient method on Riemannian manifolds, are presented and shown to possess, respectively, quadratic and superlinear convergence. Examples of each method on certain Riemannian manifolds are given with the results of numerical experiments. Rayleigh's quotient defined on the sphere is one example. It is shown that Newton's method applied to this function converges cubically, and that the Rayleigh quotient iteration is an efficient approximation of Newton's method. The Riemannian version of the conjugate gradient method applied to this function gives a new algorithm for finding the eigenvectors corresponding to the extreme eigenvalues of a symmetric matrix. Another example arises from extremizing the function $\mathop{\rm tr} Θ^{\scriptscriptstyle\rm T}QΘN$ on the special orthogonal group. In a similar example, it is shown that Newton's method applied to the sum of the squares of the off-diagonal entries of a symmetric matrix converges cubically.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Transport of inertial particles by viscous streaming in arrays of oscillating probes
Authors:
Kwitae Chong,
Scott D. Kelly,
Stuart T. Smith,
Jeff D. Eldredge
Abstract:
A novel mechanism for the transport of microscale particles in viscous fluids is demonstrated. The mechanism exploits the trap** of such particles by rotational streaming cells established in the vicinity of an oscillating cylinder, recently analyzed in previous work. The present work explores a strategy of transporting particles between the trap** points established by multiple cylinders unde…
▽ More
A novel mechanism for the transport of microscale particles in viscous fluids is demonstrated. The mechanism exploits the trap** of such particles by rotational streaming cells established in the vicinity of an oscillating cylinder, recently analyzed in previous work. The present work explores a strategy of transporting particles between the trap** points established by multiple cylinders undergoing oscillations in sequential intervals. It is demonstrated that, by controlling the sequence of oscillation intervals, an inertial particle is effectively and predictably transported between the stable trap** points. Arrays of cylinders in various arrangements are investigated, revealing a quite general technique for constructing arbitrary particle trajectories. The timescales for transport are also discussed.
△ Less
Submitted 4 June, 2014;
originally announced June 2014.
-
Bayesian Discovery of Threat Networks
Authors:
Steven T. Smith,
Edward K. Kao,
Kenneth D. Senne,
Garrett Bernstein,
Scott Philips
Abstract:
A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to wel…
▽ More
A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to the Bayesian formulation is proven. A general diffusion model is introduced that utilizes spatio-temporal relationships between vertices, and is used for a specific space-time formulation that leads to significant performance improvements on coordinated covert networks. This performance is demonstrated using a new hybrid mixed-membership blockmodel introduced to simulate random covert networks with realistic properties.
△ Less
Submitted 8 September, 2014; v1 submitted 21 November, 2013;
originally announced November 2013.
-
Geometric Optimization Methods for Adaptive Filtering
Authors:
Steven Thomas Smith
Abstract:
The techniques and analysis presented in this thesis provide new methods to solve optimization problems posed on Riemannian manifolds. These methods are applied to the subspace tracking problem found in adaptive signal processing and adaptive control. A new point of view is offered for the constrained optimization problem. Some classical optimization techniques on Euclidean space are generalized t…
▽ More
The techniques and analysis presented in this thesis provide new methods to solve optimization problems posed on Riemannian manifolds. These methods are applied to the subspace tracking problem found in adaptive signal processing and adaptive control. A new point of view is offered for the constrained optimization problem. Some classical optimization techniques on Euclidean space are generalized to Riemannian manifolds. Several algorithms are presented and their convergence properties are analyzed employing the Riemannian structure of the manifold. Specifically, two new algorithms, which can be thought of as Newton's method and the conjugate gradient method on Riemannian manifolds, are presented and shown to possess quadratic and superlinear convergence, respectively. These methods are applied to several eigenvalue and singular value problems, which are posed as constrained optimization problems. ...
△ Less
Submitted 8 May, 2013;
originally announced May 2013.
-
On Gaussian Beams Described by Jacobi's Equation
Authors:
Steven Thomas Smith
Abstract:
Gaussian beams describe the amplitude and phase of rays and are widely used to model acoustic propagation. This paper describes four new results in the theory of Gaussian beams. (1) A new version of the Červený equations for the amplitude and phase of Gaussian beams is developed by applying the equivalence of Hamilton-Jacobi theory with Jacobi's equation that connects Riemannian curvature to geode…
▽ More
Gaussian beams describe the amplitude and phase of rays and are widely used to model acoustic propagation. This paper describes four new results in the theory of Gaussian beams. (1) A new version of the Červený equations for the amplitude and phase of Gaussian beams is developed by applying the equivalence of Hamilton-Jacobi theory with Jacobi's equation that connects Riemannian curvature to geodesic flow. Thus the paper makes a fundamental connection between Gaussian beams and an acoustic channel's so-called intrinsic Gaussian curvature from differential geometry. (2) A new formula $π(c/c")^{1/2}$ for the distance between convergence zones is derived and applied to several well-known profiles. (3) A class of "model spaces" are introduced that connect the acoustics of ducting/divergence zones with the channel's Gaussian curvature $K=cc"-(c')^2$. The "model" SSPs yield constant Gaussian curvature in which the geometry of ducts corresponds to great circles on a sphere and convergence zones correspond to antipodes. The distance between caustics $π(c/c")^{1/2}$ is equated with an ideal hyperbolic cosine SSP duct. (4) An "intrinsic" version of Červený's formulae for the amplitude and phase of Gaussian beams is derived that does not depend on an "extrinsic" arbitrary choice of coordinates such as range and depth. Direct comparisons are made between the computational frameworks used by the three different approaches to Gaussian beams: Snell's law, the extrinsic Frenet-Serret formulae, and the intrinsic Jacobi methods presented here. The relationship of Gaussian beams to Riemannian curvature is explained with an overview of the modern covariant geometric methods that provide a general framework for application to other special cases.
△ Less
Submitted 18 April, 2014; v1 submitted 6 April, 2013;
originally announced April 2013.
-
Network Detection Theory and Performance
Authors:
Steven T. Smith,
Kenneth D. Senne,
Scott Philips,
Edward K. Kao,
Garrett Bernstein
Abstract:
Network detection is an important capability in many areas of applied research in which data can be represented as a graph of entities and relationships. Oftentimes the object of interest is a relatively small subgraph in an enormous, potentially uninteresting background. This aspect characterizes network detection as a "big data" problem. Graph partitioning and network discovery have been major r…
▽ More
Network detection is an important capability in many areas of applied research in which data can be represented as a graph of entities and relationships. Oftentimes the object of interest is a relatively small subgraph in an enormous, potentially uninteresting background. This aspect characterizes network detection as a "big data" problem. Graph partitioning and network discovery have been major research areas over the last ten years, driven by interest in internet search, cyber security, social networks, and criminal or terrorist activities. The specific problem of network discovery is addressed as a special case of graph partitioning in which membership in a small subgraph of interest must be determined. Algebraic graph theory is used as the basis to analyze and compare different network detection methods. A new Bayesian network detection framework is introduced that partitions the graph based on prior information and direct observations. The new approach, called space-time threat propagation, is proved to maximize the probability of detection and is therefore optimum in the Neyman-Pearson sense. This optimality criterion is compared to spectral community detection approaches which divide the global graph into subsets or communities with optimal connectivity properties. We also explore a new generative stochastic model for covert networks and analyze using receiver operating characteristics the detection performance of both classes of optimal detection techniques.
△ Less
Submitted 22 March, 2013;
originally announced March 2013.
-
Equilibrium states of a test particle coupled to finite size heat baths
Authors:
Qun Wei,
S. Taylor Smith,
Roberto Onofrio
Abstract:
We report on numerical simulations of the dynamics of a test particle coupled to competing Boltzmann heat baths of finite size. After discussing some features of the single bath case, we show that the presence of two heat baths further constraints the conditions necessary for the test particle to thermalize with the heat baths. We find that thermalization is a spectral property in which the oscil…
▽ More
We report on numerical simulations of the dynamics of a test particle coupled to competing Boltzmann heat baths of finite size. After discussing some features of the single bath case, we show that the presence of two heat baths further constraints the conditions necessary for the test particle to thermalize with the heat baths. We find that thermalization is a spectral property in which the oscillators of the bath with frequencies in the range of the test particle characteristic frequency determine its degree of thermalization. We also find an unexpected frequency shift of the test particle response with respect to the spectra of the two heat baths. Finally, we discuss implications of our results for the study of high-frequency nanomechanical resonators through cold dam** cooling techniques, and for engineering reservoirs capable of mitigating the back-action on a mechanical system.
△ Less
Submitted 29 March, 2010; v1 submitted 26 March, 2010;
originally announced March 2010.
-
Thermalization in open classical systems with finite heat baths
Authors:
S. Taylor Smith,
Roberto Onofrio
Abstract:
We discuss thermalization of a test particle schematized as a harmonic oscillator and coupled to a Boltzmann heat bath of finite size and with a finite bandwidth for the frequencies of its particles. We find that complete thermalization only occurs when the test particle frequency is within a certain range of the bath particle frequencies, and for a certain range of mass ratios between the test…
▽ More
We discuss thermalization of a test particle schematized as a harmonic oscillator and coupled to a Boltzmann heat bath of finite size and with a finite bandwidth for the frequencies of its particles. We find that complete thermalization only occurs when the test particle frequency is within a certain range of the bath particle frequencies, and for a certain range of mass ratios between the test particle and the bath particles. These results have implications for the study of classical and quantum behaviour of high-frequency nanomechanical resonators.
△ Less
Submitted 17 October, 2008;
originally announced October 2008.
-
The Geometry of Algorithms with Orthogonality Constraints
Authors:
Alan Edelman,
T. A. Arias,
Steven T. Smith
Abstract:
In this paper we develop new Newton and conjugate gradient algorithms on the Grassmann and Stiefel manifolds. These manifolds represent the constraints that arise in such areas as the symmetric eigenvalue problem, nonlinear eigenvalue problems, electronic structures computations, and signal processing. In addition to the new algorithms, we show how the geometrical framework gives penetrating new…
▽ More
In this paper we develop new Newton and conjugate gradient algorithms on the Grassmann and Stiefel manifolds. These manifolds represent the constraints that arise in such areas as the symmetric eigenvalue problem, nonlinear eigenvalue problems, electronic structures computations, and signal processing. In addition to the new algorithms, we show how the geometrical framework gives penetrating new insights allowing us to create, understand, and compare algorithms. The theory proposed here provides a taxonomy for numerical linear algebra algorithms that provide a top level mathematical view of previously unrelated algorithms. It is our hope that developers of new algorithms and perturbation theories will benefit from the theory, methods, and examples in this paper.
△ Less
Submitted 19 June, 1998;
originally announced June 1998.