-
Slab tilings, flips and the triple twist
Authors:
George L. D. Alencar,
Nicolau C. Saldanha,
Arthur M. M. Vieira
Abstract:
A domino is a $2\times 1\times 1$ parallelepiped formed by the union of two unit cubes and a slab is a $2\times 2\times 1$ parallelepiped formed by the union of four unit cubes. We are interested in tiling regions formed by the finite union of unit cubes. We investigate domino tilings, slab tilings and mixed tilings (vertical dominoes and horizontal slabs). A flip is a local move: in a slab (resp.…
▽ More
A domino is a $2\times 1\times 1$ parallelepiped formed by the union of two unit cubes and a slab is a $2\times 2\times 1$ parallelepiped formed by the union of four unit cubes. We are interested in tiling regions formed by the finite union of unit cubes. We investigate domino tilings, slab tilings and mixed tilings (vertical dominoes and horizontal slabs). A flip is a local move: in a slab (resp. domino) tiling, two neighboring parallel slabs (resp. dominoes) are removed and placed back in a different position.
We may interpret a three dimensional region as being made of floors. A slab or domino which crosses two floors is vertical, and horizontal otherwise. We can also define a flip in a mixed tiling, we replace four vertical dominoes in a $2\times 2\times 2$ box by two horizontal slabs and vice-versa.
Inspired by the twist for domino tilings we construct a flip invariant for mixed tilings. Based on this, we then construct the triple twist for slab tilings: an invariant under flips assuming values in $\mathbb{Z}^3$. We show that if the region is a large box then the triple twist assumes a large number of possible values, at least proportional to the fourth power of the volume. We also give examples of smaller regions for which the triple twist assumes only one value and the set of tilings is connected under flips.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Gap theorems in Yang-Mills theory for complete four-dimensional manifolds with positive Yamabe constant
Authors:
Matheus Vieira
Abstract:
In this paper we prove gap theorems in Yang-Mills theory for complete four-dimensional manifolds with positive Yamabe constant. We extend the results of Gursky-Kelleher-Streets to complete manifolds. We also describe the equality in the gap theorem in terms of the basic instanton, which is interesting even for compact manifolds.
In this paper we prove gap theorems in Yang-Mills theory for complete four-dimensional manifolds with positive Yamabe constant. We extend the results of Gursky-Kelleher-Streets to complete manifolds. We also describe the equality in the gap theorem in terms of the basic instanton, which is interesting even for compact manifolds.
△ Less
Submitted 11 June, 2024; v1 submitted 10 June, 2024;
originally announced June 2024.
-
Current and future cosmological impact of microwave background temperature measurements
Authors:
C. J. A. P. Martins,
A. M. M. Vieira
Abstract:
The redshift dependence of the cosmic microwave background temperature, $T(z)=T_0(1+z)$, is a key prediction of standard cosmology, but this relation is violated in many extensions thereof. Current astrophysical facilities can probe it in the redshift range $0\le z\le6.34$. We extend recent work by Gelo {\it et al.} (2022) showing that for several classes of models (all of which aim to provide alt…
▽ More
The redshift dependence of the cosmic microwave background temperature, $T(z)=T_0(1+z)$, is a key prediction of standard cosmology, but this relation is violated in many extensions thereof. Current astrophysical facilities can probe it in the redshift range $0\le z\le6.34$. We extend recent work by Gelo {\it et al.} (2022) showing that for several classes of models (all of which aim to provide alternative mechanisms for the recent acceleration of the universe) the constraining power of these measurements is comparable to that of other background cosmology probes. Specifically, we discuss constraints on two classes of models not considered in the earlier work: a model with torsion and a recently proposed phenomenological dynamical dark energy model which can be thought of as a varying speed of light model. Moreover, for both these models and also for those in the earlier work, we discuss how current constraints may be improved by next-generation ground and space astrophysical facilities. Overall, we conclude that these measurements have a significant cosmological impact, mainly because they often constrain combinations of model parameters that are orthogonal, in the relevant parameter space, to those of other probes.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
A face-centred finite volume method for laminar and turbulent incompressible flows
Authors:
Luan M. Vieira,
Matteo Giacomini,
Ruben Sevilla,
Antonio Huerta
Abstract:
This work develops, for the first time, a face-centred finite volume (FCFV) solver for the simulation of laminar and turbulent viscous incompressible flows. The formulation relies on the Reynolds-averaged Navier-Stokes (RANS) equations coupled with the negative Spalart-Allmaras (SA) model and three novel convective stabilisations, inspired by Riemann solvers, are derived and compared numerically.…
▽ More
This work develops, for the first time, a face-centred finite volume (FCFV) solver for the simulation of laminar and turbulent viscous incompressible flows. The formulation relies on the Reynolds-averaged Navier-Stokes (RANS) equations coupled with the negative Spalart-Allmaras (SA) model and three novel convective stabilisations, inspired by Riemann solvers, are derived and compared numerically. The resulting method achieves first-order convergence of the velocity, the velocity-gradient tensor and the pressure. FCFV accurately predicts engineering quantities of interest, such as drag and lift, on unstructured meshes and, by avoiding gradient reconstruction, the method is less sensitive to mesh quality than other FV methods, even in the presence of highly distorted and stretched cells. A monolithic and a staggered solution strategies for the RANS-SA system are derived and compared numerically. Numerical benchmarks, involving laminar and turbulent, steady and transient cases are used to assess the performance, accuracy and robustness of the proposed FCFV method.
△ Less
Submitted 11 June, 2024; v1 submitted 3 March, 2024;
originally announced March 2024.
-
The Gauss map of hypersurfaces with constant weighted mean curvature in the Gaussian space
Authors:
Michael Gomez,
Matheus Vieira
Abstract:
In this paper we study the Gauss map of hypersurfaces with constant weighted mean curvature in the Gaussian space. We show that if the image of the Gauss map is in a closed hemisphere, then the hypersurface is a hyperplane or a generalized cylinder. We also show that if the image of the Gauss map is in $S^{n}\setminus\bar{S}_{+}^{n-1}$, then the hypersurface is a hyperplane. This generalizes previ…
▽ More
In this paper we study the Gauss map of hypersurfaces with constant weighted mean curvature in the Gaussian space. We show that if the image of the Gauss map is in a closed hemisphere, then the hypersurface is a hyperplane or a generalized cylinder. We also show that if the image of the Gauss map is in $S^{n}\setminus\bar{S}_{+}^{n-1}$, then the hypersurface is a hyperplane. This generalizes previous results for self-shrinkers obtained by Ding-Xin-Yang.
△ Less
Submitted 23 January, 2024; v1 submitted 1 December, 2023;
originally announced December 2023.
-
Weak Stability and Quasistability
Authors:
C. S. Kubrusly,
P. C. M. Vieira
Abstract:
It is known that weak l-sequential supercyclicity implies weak quasistability, and it is still unknown weather weak l-sequential supercyclicity implies weak stability, much less whether weak supercyclicity implies weak stability (although it is known for a long time that strong supercyclicity implies strong stability). It is shown that weak l-sequential supercyclicity implies weak stability under…
▽ More
It is known that weak l-sequential supercyclicity implies weak quasistability, and it is still unknown weather weak l-sequential supercyclicity implies weak stability, much less whether weak supercyclicity implies weak stability (although it is known for a long time that strong supercyclicity implies strong stability). It is shown that weak l-sequential supercyclicity implies weak stability under the assumption of boundedly spaced subsequences. It is given an example of a power bounded quasistable operator which is not weakly stable.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
Hybrid Minimax-MCTS and Difficulty Adjustment for General Game Playing
Authors:
Marco Antônio Athayde de Aguiar Vieira,
Anderson Rocha Tavares,
Renato Perez Ribas
Abstract:
Board games are a great source of entertainment for all ages, as they create a competitive and engaging environment, as well as stimulating learning and strategic thinking. It is common for digital versions of board games, as any other type of digital games, to offer the option to select the difficulty of the game. This is usually done by customizing the search parameters of the AI algorithm. Howe…
▽ More
Board games are a great source of entertainment for all ages, as they create a competitive and engaging environment, as well as stimulating learning and strategic thinking. It is common for digital versions of board games, as any other type of digital games, to offer the option to select the difficulty of the game. This is usually done by customizing the search parameters of the AI algorithm. However, this approach cannot be extended to General Game Playing agents, as different games might require different parametrization for each difficulty level. In this paper, we present a general approach to implement an artificial intelligence opponent with difficulty levels for zero-sum games, together with a propose of a Minimax-MCTS hybrid algorithm, which combines the minimax search process with GGP aspects of MCTS. This approach was tested in our mobile application LoBoGames, an extensible board games platform, that is intended to have an broad catalog of games, with an emphasis on accessibility: the platform is friendly to visually-impaired users, and is compatible with more than 92\% of Android devices. The tests in this work indicate that both the hybrid Minimax-MCTS and the new difficulty adjustment system are promising GGP approaches that could be expanded in future work.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Predictive Maintenance Model Based on Anomaly Detection in Induction Motors: A Machine Learning Approach Using Real-Time IoT Data
Authors:
Sergio F. Chevtchenko,
Monalisa C. M. dos Santos,
Diego M. Vieira,
Ricardo L. Mota,
Elisson Rocha,
Bruna V. Cruz,
Danilo Araújo,
Ermeson Andrade
Abstract:
With the support of Internet of Things (IoT) devices, it is possible to acquire data from degradation phenomena and design data-driven models to perform anomaly detection in industrial equipment. This approach not only identifies potential anomalies but can also serve as a first step toward building predictive maintenance policies. In this work, we demonstrate a novel anomaly detection system on i…
▽ More
With the support of Internet of Things (IoT) devices, it is possible to acquire data from degradation phenomena and design data-driven models to perform anomaly detection in industrial equipment. This approach not only identifies potential anomalies but can also serve as a first step toward building predictive maintenance policies. In this work, we demonstrate a novel anomaly detection system on induction motors used in pumps, compressors, fans, and other industrial machines. This work evaluates a combination of pre-processing techniques and machine learning (ML) models with a low computational cost. We use a combination of pre-processing techniques such as Fast Fourier Transform (FFT), Wavelet Transform (WT), and binning, which are well-known approaches for extracting features from raw data. We also aim to guarantee an optimal balance between multiple conflicting parameters, such as anomaly detection rate, false positive rate, and inference speed of the solution. To this end, multiobjective optimization and analysis are performed on the evaluated models. Pareto-optimal solutions are presented to select which models have the best results regarding classification metrics and computational effort. Differently from most works in this field that use publicly available datasets to validate their models, we propose an end-to-end solution combining low-cost and readily available IoT sensors. The approach is validated by acquiring a custom dataset from induction motors. Also, we fuse vibration, temperature, and noise data from these sensors as the input to the proposed ML model. Therefore, we aim to propose a methodology general enough to be applied in different industrial contexts in the future.
△ Less
Submitted 15 October, 2023;
originally announced October 2023.
-
The role of pressure-induced stacking faults on the magnetic properties of gadolinium
Authors:
Rafael Martinho Vieira,
Olle Eriksson,
Torbjörn Björkman,
Ondřej Šipr,
Heike C. Herper
Abstract:
Experimental data show that under pressure, Gd goes through a series of structural transitions hcp to Sm-type (close-packed rhombohedral) to dhcp that is accompanied by a gradual decrease of the Curie temperature and magnetization till the collapse of a finite magnetization close to the dhcp structure. We explore theoretically the pressure-induced changes of the magnetic properties, by describing…
▽ More
Experimental data show that under pressure, Gd goes through a series of structural transitions hcp to Sm-type (close-packed rhombohedral) to dhcp that is accompanied by a gradual decrease of the Curie temperature and magnetization till the collapse of a finite magnetization close to the dhcp structure. We explore theoretically the pressure-induced changes of the magnetic properties, by describing these structural transitions as the formation of fcc stackings faults. Using this approach, we are able to describe correctly the variation of the Curie temperature with pressure, in contrast to a static structural model using the hcp structure.
△ Less
Submitted 21 December, 2023; v1 submitted 3 September, 2023;
originally announced September 2023.
-
Anomaly Detection in Industrial Machinery using IoT Devices and Machine Learning: a Systematic Map**
Authors:
Sérgio F. Chevtchenko,
Elisson da Silva Rocha,
Monalisa Cristina Moura Dos Santos,
Ricardo Lins Mota,
Diego Moura Vieira,
Ermeson Carneiro de Andrade,
Danilo Ricardo Barbosa de Araújo
Abstract:
Anomaly detection is critical in the smart industry for preventing equipment failure, reducing downtime, and improving safety. Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery, providing a rich source of information for Anomaly Detection. However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult…
▽ More
Anomaly detection is critical in the smart industry for preventing equipment failure, reducing downtime, and improving safety. Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery, providing a rich source of information for Anomaly Detection. However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult for humans to detect anomalies manually. Machine learning (ML) algorithms can automate anomaly detection in industrial machinery by analyzing generated data. Besides, each technique has specific strengths and weaknesses based on the data nature and its corresponding systems. However, the current systematic map** studies on Anomaly Detection primarily focus on addressing network and cybersecurity-related problems, with limited attention given to the industrial sector. Additionally, these studies do not cover the challenges involved in using ML for Anomaly Detection in industrial machinery within the context of the IoT ecosystems. This paper presents a systematic map** study on Anomaly Detection for industrial machinery using IoT devices and ML algorithms to address this gap. The study comprehensively evaluates 84 relevant studies spanning from 2016 to 2023, providing an extensive review of Anomaly Detection research. Our findings identify the most commonly used algorithms, preprocessing techniques, and sensor types. Additionally, this review identifies application areas and points to future challenges and research opportunities.
△ Less
Submitted 14 November, 2023; v1 submitted 28 July, 2023;
originally announced July 2023.
-
Giant magnetocaloric effect in the (Mn,Fe)NiSi-system
Authors:
Sagar Ghorai,
Rafael Martinho Vieira,
Vitalii Shtender,
Erna K. Delczeg-Czirjak,
Heike C. Herper,
Torbjörn Björkman,
Sergei I. Simak,
Olle Eriksson,
Martin Sahlberg,
Peter Svedlindh
Abstract:
The search for energy-efficient and environmentally friendly cooling technologies is a key driver for the development of magnetic refrigeration based on the magnetocaloric effect (MCE). This phenomenon arises from the interplay between magnetic and lattice degrees of freedom that is strong in certain materials, leading to a change in temperature upon application or removal of a magnetic field. Her…
▽ More
The search for energy-efficient and environmentally friendly cooling technologies is a key driver for the development of magnetic refrigeration based on the magnetocaloric effect (MCE). This phenomenon arises from the interplay between magnetic and lattice degrees of freedom that is strong in certain materials, leading to a change in temperature upon application or removal of a magnetic field. Here we report on a new material, Mn$_{1-x}$Fe$_x$NiSi$_{0.95}$Al$_{0.05}$, with an exceptionally large isothermal entropy at room temperature. By combining experimental and theoretical methods we outline the microscopic mechanism behind the large MCE in this material. It is demonstrated that the competition between the Ni$_2$In-type hexagonal phase and the MnNiSi-type orthorhombic phase, that coexist in this system, combined with the distinctly different magnetic properties of these phases, is a key parameter for the functionality of this material for magnetic cooling.
△ Less
Submitted 30 June, 2023;
originally announced July 2023.
-
Scheduling Network Function Chains Under Sub-Millisecond Latency SLOs
Authors:
Jianfeng Wang,
Siddhant Gupta,
Marcos A. M. Vieira,
Barath Raghavan,
Ramesh Govindan
Abstract:
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, clo…
▽ More
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, cloud-based NFV systems need to achieve such low latency while minimizing CPU core usage.
We find that real-world traffic exhibits burstiness that causes latency spikes of up to 10s of milliseconds in existing NFV systems. To address this, we built NetBlaze, which achieves sub-millisecond p99 latency SLOs, even for adversarial traffic, using a novel multi-scale core-scaling strategy. NetBlaze makes traffic-to-core allocation decisions at rack, server, and core-spatial scales, and at increasingly finer timescales, to accommodate multi-timescale bursts. In comparison with state-of-the-art approaches, NetBlaze is the only one capable of achieving sub-millisecond p99 latency SLOs while using a comparable number of cores.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
A study on a Q-Learning algorithm application to a manufacturing assembly problem
Authors:
Miguel Neves,
Miguel Vieira,
Pedro Neto
Abstract:
The development of machine learning algorithms has been gathering relevance to address the increasing modelling complexity of manufacturing decision-making problems. Reinforcement learning is a methodology with great potential due to the reduced need for previous training data, i.e., the system learns along time with actual operation. This study focuses on the implementation of a reinforcement lea…
▽ More
The development of machine learning algorithms has been gathering relevance to address the increasing modelling complexity of manufacturing decision-making problems. Reinforcement learning is a methodology with great potential due to the reduced need for previous training data, i.e., the system learns along time with actual operation. This study focuses on the implementation of a reinforcement learning algorithm in an assembly problem of a given object, aiming to identify the effectiveness of the proposed approach in the optimisation of the assembly process time. A model-free Q-Learning algorithm is applied, considering the learning of a matrix of Q-values (Q-table) from the successive interactions with the environment to suggest an assembly sequence solution. This implementation explores three scenarios with increasing complexity so that the impact of the Q-Learning\textsc's parameters and rewards is assessed to improve the reinforcement learning agent performance. The optimisation approach achieved very promising results by learning the optimal assembly sequence 98.3% of the times.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Cosmological impact of microwave background temperature measurements
Authors:
L. Gelo,
C. J. A. P. Martins,
N. Quevedo,
A. M. M. Vieira
Abstract:
The cosmic microwave background temperature is a cornerstone astrophysical observable. Its present value is tightly constrained, but its redshift dependence, which can now be determined until redshift $z\sim6.34$, is also an important probe of fundamental cosmology. We show that its constraining power is now comparable to that of other background cosmology probes, including Type Ia supernovae and…
▽ More
The cosmic microwave background temperature is a cornerstone astrophysical observable. Its present value is tightly constrained, but its redshift dependence, which can now be determined until redshift $z\sim6.34$, is also an important probe of fundamental cosmology. We show that its constraining power is now comparable to that of other background cosmology probes, including Type Ia supernovae and Hubble parameter measurements. We illustrate this with three models, each based on a different conceptual paradigm, which aim to explain the recent acceleration of the universe. We find that for parametric extension of $Λ$CDM the combination of temperature and cosmological data significantly improves constraints on the model parameters, while for alternative models without a $Λ$CDM limit this data combination rules them out.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
ABL: An original active blacklist based on a modification of the SMTP
Authors:
Pablo M. Oliveira,
Mateus B. Vieira,
Isaac C. Ferreira,
João P. R. R. Leite,
Edvard M. Oliveira,
Bruno T. Kuehne,
Edmilson M. Moreira,
Otávio A. S. Carpinteiro
Abstract:
This paper presents a novel Active Blacklist (ABL) based on a modification of the Simple Mail Transfer Protocol (SMTP). ABL was implemented in the Mail Transfer Agent (MTA) Postfix of the e-mail server Zimbra and assessed exhaustively in a series of experiments. The modified server Zimbra showed computational performance and costs similar to those of the original server Zimbra when receiving legit…
▽ More
This paper presents a novel Active Blacklist (ABL) based on a modification of the Simple Mail Transfer Protocol (SMTP). ABL was implemented in the Mail Transfer Agent (MTA) Postfix of the e-mail server Zimbra and assessed exhaustively in a series of experiments. The modified server Zimbra showed computational performance and costs similar to those of the original server Zimbra when receiving legitimate e-mails. When receiving spam, however, it showed better computing performance and costs than the original Zimbra. Moreover, there was a considerable computational cost on the spammer's server when it sent spam e-mails. ABL was assessed at the Federal University of Itajubá, Brazil, during a period of sixty-one days. It was responsible for rejecting a percentage of 20.94% of the spam e-mails received by the university during this period. After this period, it was deployed and remained in use, from July-2015 to July-2019, at the university. ABL is part of the new Open Machine-Learning-Based Anti-Spam (Open-MaLBAS). Both ABL and Open-MaLBAS are freely available on GitHub.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation
Authors:
Danny Weyns,
Ilias Gerostathopoulos,
Barbora Buhnova,
Nicolas Cardozo,
Emilia Cioroaica,
Ivana Dusparic,
Lars Grunske,
Pooyan Jamshidi,
Christine Julien,
Judith Michael,
Gabriel Moreno,
Shiva Nejati,
Patrizio Pelliccione,
Federico Quin,
Genaina Rodrigues,
Bradley Schmerl,
Marco Vieira,
Thomas Vogel,
Rebekka Wohlrab
Abstract:
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevan…
▽ More
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevant to industry. This paper provides a set of guidelines for artifacts that aim at supporting industry-relevant research on self-adaptation. The guidelines that are grounded on data obtained from a survey with practitioners were derived during working sessions at the 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Artifact providers can use the guidelines for aligning future artifacts with industry needs; they can also be used to evaluate the industrial relevance of existing artifacts. We also propose an artifact template.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Convolutional Neural Network to Restore Low-Dose Digital Breast Tomosynthesis Projections in a Variance Stabilization Domain
Authors:
Rodrigo de Barros Vimieiro,
Chuang Niu,
Hongming Shan,
Lucas Rodrigues Borges,
Ge Wang,
Marcelo Andrade da Costa Vieira
Abstract:
Digital breast tomosynthesis (DBT) exams should utilize the lowest possible radiation dose while maintaining sufficiently good image quality for accurate medical diagnosis. In this work, we propose a convolution neural network (CNN) to restore low-dose (LD) DBT projections to achieve an image quality equivalent to a standard full-dose (FD) acquisition. The proposed network architecture benefits fr…
▽ More
Digital breast tomosynthesis (DBT) exams should utilize the lowest possible radiation dose while maintaining sufficiently good image quality for accurate medical diagnosis. In this work, we propose a convolution neural network (CNN) to restore low-dose (LD) DBT projections to achieve an image quality equivalent to a standard full-dose (FD) acquisition. The proposed network architecture benefits from priors in terms of layers that were inspired by traditional model-based (MB) restoration methods, considering a model-based deep learning approach, where the network is trained to operate in the variance stabilization transformation (VST) domain. To accurately control the network operation point, in terms of noise and blur of the restored image, we propose a loss function that minimizes the bias and matches residual noise between the input and the output. The training dataset was composed of clinical data acquired at the standard FD and low-dose pairs obtained by the injection of quantum noise. The network was tested using real DBT projections acquired with a physical anthropomorphic breast phantom. The proposed network achieved superior results in terms of the mean normalized squared error (MNSE), training time and noise spatial correlation compared with networks trained with traditional data-driven methods. The proposed approach can be extended for other medical imaging application that requires LD acquisitions.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Powers of posinormal operators
Authors:
C. S. Kubrusly,
P. C. M. Vieira,
J. Zanni
Abstract:
Square of a posinormal operator is not necessarily posinormal$.$ But (i) powers of quasiposinormal operators are quasiposinormal and, under closed ranges assumption, powers of (ii) posinormal operators are posinormal, (iii) of operators that are both posinormal and coposinormal are posinormal and coposinormal, and (iv) of semi-Fredholm posinormal operators are posinormal.
Square of a posinormal operator is not necessarily posinormal$.$ But (i) powers of quasiposinormal operators are quasiposinormal and, under closed ranges assumption, powers of (ii) posinormal operators are posinormal, (iii) of operators that are both posinormal and coposinormal are posinormal and coposinormal, and (iv) of semi-Fredholm posinormal operators are posinormal.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Automatic evaluation of scientific abstracts through natural language processing
Authors:
Lucas G. O. Lopes,
Thales M. A. Vieira,
William W. M. Lira
Abstract:
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems…
▽ More
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems intended to be solved by employing a text classification approach. Then, the abstract text is segmented into problem description, methodology and results. Finally, the methodology of the abstract is ranked based on the sentiment analysis of its results. The proposed framework allows us to quickly rank the best methods to solve specific problems. To validate the proposed framework, oil production anomaly abstracts were experimented and achieved promising results.
△ Less
Submitted 14 November, 2021;
originally announced December 2021.
-
Impact of loss functions on the performance of a deep neural network designed to restore low-dose digital mammography
Authors:
Hongming Shan,
Rodrigo de Barros Vimieiro,
Lucas Rodrigues Borges,
Marcelo Andrade da Costa Vieira,
Ge Wang
Abstract:
Digital mammography is still the most common imaging tool for breast cancer screening. Although the benefits of using digital mammography for cancer screening outweigh the risks associated with the x-ray exposure, the radiation dose must be kept as low as possible while maintaining the diagnostic utility of the generated images, thus minimizing patient risks. Many studies investigated the feasibil…
▽ More
Digital mammography is still the most common imaging tool for breast cancer screening. Although the benefits of using digital mammography for cancer screening outweigh the risks associated with the x-ray exposure, the radiation dose must be kept as low as possible while maintaining the diagnostic utility of the generated images, thus minimizing patient risks. Many studies investigated the feasibility of dose reduction by restoring low-dose images using deep neural networks. In these cases, choosing the appropriate training database and loss function is crucial and impacts the quality of the results. In this work, a modification of the ResNet architecture, with hierarchical skip connections, is proposed to restore low-dose digital mammography. We compared the restored images to the standard full-dose images. Moreover, we evaluated the performance of several loss functions for this task. For training purposes, we extracted 256,000 image patches from a dataset of 400 images of retrospective clinical mammography exams, where different dose levels were simulated to generate low and standard-dose pairs. To validate the network in a real scenario, a physical anthropomorphic breast phantom was used to acquire real low-dose and standard full-dose images in a commercially avaliable mammography system, which were then processed through our trained model. An analytical restoration model for low-dose digital mammography, previously presented, was used as a benchmark in this work. Objective assessment was performed through the signal-to-noise ratio (SNR) and mean normalized squared error (MNSE), decomposed into residual noise and bias. Results showed that the perceptual loss function (PL4) is able to achieve virtually the same noise levels of a full-dose acquisition, while resulting in smaller signal bias compared to other loss functions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Small Data and Process in Data Visualization: The Radical Translations Case Study
Authors:
Arianna Ciula,
Miguel Vieira,
Ginestra Ferraro,
Tiffany Ong,
Sanja Perovic,
Rosa Mucignat,
Niccolò Valmori,
Brecht Deseure,
Erica Joy Mannucci
Abstract:
This paper uses the collaborative project Radical Translations as case study to examine some of the theoretical perspectives informing the adoption and critique of data visualization in the digital humanities with applied examples in context. It showcases how data visualization is used within a King's Digital Lab project lifecycle to facilitate collaborative data exploration within the project int…
▽ More
This paper uses the collaborative project Radical Translations as case study to examine some of the theoretical perspectives informing the adoption and critique of data visualization in the digital humanities with applied examples in context. It showcases how data visualization is used within a King's Digital Lab project lifecycle to facilitate collaborative data exploration within the project interdisciplinary team - to support data curation and cleaning and/or to guide the design process - as well as data analysis by users external to the team. Theoretical issues around bridging the gap between approaches adopted for small and/or large-scale datasets are addressed from functional perspectives with reference to evolving data modelling and software development lifecycle approaches and workflows. While anchored to the specific context of the project under examination, some of the identified trade-offs have epistemological value beyond the specific case study iterations and its design solutions.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Constant weighted mean curvature hypersurfaces in Shrinking Ricci Solitons
Authors:
Igor Miranda,
Matheus Vieira
Abstract:
In this paper, we study constant weighted mean curvature hypersurfaces in shrinking Ricci solitons. First, we show that a constant weighted mean curvature hypersurface with finite weighted volume cannot lie in a region determined by a special level set of the potential function, unless it is the level set. Next, we show that a compact constant weighted mean curvature hypersurface with a certain up…
▽ More
In this paper, we study constant weighted mean curvature hypersurfaces in shrinking Ricci solitons. First, we show that a constant weighted mean curvature hypersurface with finite weighted volume cannot lie in a region determined by a special level set of the potential function, unless it is the level set. Next, we show that a compact constant weighted mean curvature hypersurface with a certain upper bound or lower bound on the mean curvature is a level set of the potential function. We can apply both results to the cylinder shrinking Ricci soliton ambient space. Finally, we show that a constant weighted mean curvature hypersurface in the Gaussian shrinking Ricci soliton (not necessarily properly immersed) with a certain assumption on the integral of the second fundamental form must be a generalized cylinder.
△ Less
Submitted 5 March, 2022; v1 submitted 30 August, 2021;
originally announced August 2021.
-
BlockColdChain: Vaccine Cold Chain Blockchain
Authors:
Ronan D. Mendonça,
Otávio S. Gomes,
Luiz F. M. Vieira,
Marcos A. M. Vieira,
Alex B. Vieira,
José A. M. Nacif
Abstract:
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under control temperature during the whole process, from fabrication to the hands of the health professionals who will immunize the population. However, the…
▽ More
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under control temperature during the whole process, from fabrication to the hands of the health professionals who will immunize the population. However, there are numerous reports of vaccine loss due to temperature variations, and, currently, people getting vaccinated have no control if their vaccine was kept safe. Blockchain is a technology solution that can provide public and verifiable records. We review the World Health Organization (WHO) cool chain and Blockchain technology. Moreover, we describe current IoT temperature monitoring devices and propose Blockcoldchain to track vaccine cold chain using blockchain, thus proving an unalterable vaccine temperature history. Our experimental results using smart contracts demonstrate the system's feasibility.
△ Less
Submitted 28 April, 2021;
originally announced April 2021.
-
Predicting the pseudocapacitive windows for MXene electrodes with voltage-dependent cluster expansion models
Authors:
James M. Goff,
Francisco Marques dos Santos Vieira,
Nathan D. Keilbart,
Yasuaki Okada,
Ismaila Dabo
Abstract:
MXene transition-metal carbides and nitrides are of growing interest for energy storage applications. These compounds are especially promising for use as pseudocapacitive electrodes due to their ability to convert energy electrochemically at fast rates. Using voltage-dependent cluster expansion models, we predict the charge storage performance of MXene pseudocapacitors for a range of electrode com…
▽ More
MXene transition-metal carbides and nitrides are of growing interest for energy storage applications. These compounds are especially promising for use as pseudocapacitive electrodes due to their ability to convert energy electrochemically at fast rates. Using voltage-dependent cluster expansion models, we predict the charge storage performance of MXene pseudocapacitors for a range of electrode compositions. $M_3C_2O_2$ electrodes based on group-VI transition metals have up to 80% larger areal energy densities than prototypical titanium-based ( e.g. $Ti_3C_2O_2$) MXene electrodes. We attribute this high pseudocapacitance to the Faradaic voltage windows of group-VI MXene electrodes, which are predicted to be 1.2 to 1.8 times larger than those of titanium-based MXenes. The size of the pseudocapacitive voltage window increases with the range of oxidation states that is accessible to the MXene transition metals. By similar mechanisms, the presence of multiple ions in the solvent (Li$^+$ and H$^+$) leads to sharp changes in the transition-metal oxidation states and can significantly increase the charge capacity of MXene pseudocapacitors.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
A Machine Learning model of the combination of normalized SD1 and SD2 indexes from 24h-Heart Rate Variability as a predictor of myocardial infarction
Authors:
Antonio Carlos Silva-Filho,
Sara Raquel Dutra-Macedo,
Adeilson Serra Mendes Vieira,
Cristiano Mostarda
Abstract:
Aim: to evaluate the ability of the nonlinear 24-HRV as a predictor of MI using Machine Learning Methods: The sample was composed of 218 patients divided into two groups (Healthy, n=128; MI n=90). The sample dataset is part of the Telemetric and Holter Electrocardiogram Warehouse (THEW) database, from the University of Rochester Medical Center. We used the most common ML algorithms for accuracy co…
▽ More
Aim: to evaluate the ability of the nonlinear 24-HRV as a predictor of MI using Machine Learning Methods: The sample was composed of 218 patients divided into two groups (Healthy, n=128; MI n=90). The sample dataset is part of the Telemetric and Holter Electrocardiogram Warehouse (THEW) database, from the University of Rochester Medical Center. We used the most common ML algorithms for accuracy comparison with a setting of 10-fold cross-validation (briefly, Linear Regression, Linear Discriminant Analysis, k-Nearest Neighbour, Random Forest, Supporting Vector Machine, Naïve Bayes, C 5.0 and Stochastic Gradient Boosting). Results: The main findings of this study show that the combination of SD1nu + SD2nu has greater predictive power for MI in comparison to other HRV indexes. Conclusion: The ML model using nonlinear HRV indexes showed to be more effective than the linear domain, evidenced through the application of ML, represented by a good precision of the Stochastic Gradient Boosting model.
Keywords: heart rate variability, machine learning, nonlinear domain, cardiovascular disease
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Galleon: Resha** the Square Peg of NFV
Authors:
Jianfeng Wang,
Tamás Lévai,
Zhuo** Li,
Marcos A. M. Vieira,
Ramesh Govindan,
Barath Raghavan
Abstract:
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet proce…
▽ More
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet processing with the round hole of cloud computing infrastructures and abstractions, all while delivering performance, scalability, and isolation. Past work has led to the belief that NFV is different enough that it requires novel, custom approaches that deviate from today's norms. To the contrary, we show that we can achieve performance, scalability, and isolation in NFV judiciously using mechanisms and abstractions of FaaS, the Linux kernel, NIC hardware, and OpenFlow switches. As such, with our system Galleon, NFV can be practically-deployable today in conventional cloud environments while delivering up to double the performance per core compared to the state of the art.
△ Less
Submitted 16 January, 2021;
originally announced January 2021.
-
New classes of spaceable sets of analytic functions on the open unit disk
Authors:
M. Lilian Lourenço,
Daniela M. Vieira
Abstract:
In this paper we study an algebraic and topological structure inside the following sets of special functions: Bloch functions defined on the open unit disk that are unbounded and analytic functions of bounded type defined a Banach algebra E into E, which are not Lorch-analytic.
In this paper we study an algebraic and topological structure inside the following sets of special functions: Bloch functions defined on the open unit disk that are unbounded and analytic functions of bounded type defined a Banach algebra E into E, which are not Lorch-analytic.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.
-
How additive manufacturing can boost the bioactivity of baked functional foods
Authors:
Sara M Oliveira,
Alice Gruppi,
Marta V. Vieira,
Gabriela M. Souza,
António A. Vicente,
José A. C. Teixeira,
Pablo Fuciños,
Giorgia Spigno,
Lorenzo M. Pastrana
Abstract:
The antioxidant activity of baked foods is of utmost interest when envisioning enhancing their health benefits. Incorporating functional ingredients is challenging since their bioactivity naturally declines during baking. In this study, 3D food printing and design of experiments are employed to clarify how the antioxidant activity of cookies enriched with encapsulated polyphenols can be maximized.…
▽ More
The antioxidant activity of baked foods is of utmost interest when envisioning enhancing their health benefits. Incorporating functional ingredients is challenging since their bioactivity naturally declines during baking. In this study, 3D food printing and design of experiments are employed to clarify how the antioxidant activity of cookies enriched with encapsulated polyphenols can be maximized. A synergistic effect between encapsulation, time, temperature, number of layers, and infill of the printed cookies was observed on the moisture and antioxidant activity. Four-layer cookies with 30 % infill provided the highest bioactivity and phenolic content if baked for 10 min and at 180 °C. The bioacitivity and total phenolic content improved by 115 % and 173 %, respectively, comparing to free extract cookies. Moreover, the proper combination of the design and baking variables allowed to vary the bioactivity of cooked cookies (moisture 3-5 %) between 300 to 700 μmolTR/gdry. The additive manufacture of foods with interconnected pores could accelerate baking and browning, or reduce thermal degradation. This represents a potential approach to enhance the functional and healthy properties of cookies or other thermal treated bioactive food products.
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
Boundedly Spaced Subsequences and Weak Dynamics
Authors:
C. S. Kubrusly,
P. C. M. Vieira
Abstract:
The purpose of this paper is to characterize weak supercyclicity for Hilbert-space contractions, which is shown to be equivalent to characterizing weak supercyclicity for unitary operators$.$ This is naturally motivated by an open question that asks whether every weakly supercyclic power bounded operator is weakly stable (which in turn is naturally motivated by a result that asserts that every sup…
▽ More
The purpose of this paper is to characterize weak supercyclicity for Hilbert-space contractions, which is shown to be equivalent to characterizing weak supercyclicity for unitary operators$.$ This is naturally motivated by an open question that asks whether every weakly supercyclic power bounded operator is weakly stable (which in turn is naturally motivated by a result that asserts that every supercyclic power bounded operator is strongly stable)$.$ Precisely, weakly supercyclicity is investigated in light of boundedly spaced subsequences as discussed in Lemma 3.1$.$ The main result in Theorem 4.1 characterizes weakly l-sequentially supercyclic unitary operators $U\!$ that are weakly unstable in terms of boundedly spaced subsequences of the power sequence $\{U^n\}.$ Remark 4.1 shows that characterizing any form of weak super\-cyclicity for weakly unstable unitary operators is equivalent to characterizing any form of weak supercyclicity for weakly unstable contractions after the Nagy--Foia\c s--Langer decomposition.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Biharmonic hypersurfaces in hemispheres
Authors:
Matheus Vieira
Abstract:
In this paper we consider the Balmuş-Montaldo-Oniciuc's conjecture in the case of hemispheres. We prove that a compact non-minimal biharmonic hypersurface in a hemisphere of $S^{n+1}$ must be the small hypersphere $S^{n}\left(1/\sqrt{2}\right)$, provided that $n^{2}-H^{2}$ does not change sign.
In this paper we consider the Balmuş-Montaldo-Oniciuc's conjecture in the case of hemispheres. We prove that a compact non-minimal biharmonic hypersurface in a hemisphere of $S^{n+1}$ must be the small hypersphere $S^{n}\left(1/\sqrt{2}\right)$, provided that $n^{2}-H^{2}$ does not change sign.
△ Less
Submitted 1 November, 2020; v1 submitted 19 August, 2020;
originally announced August 2020.
-
Applying Lie Groups Approaches for Rigid Registration of Point Clouds
Authors:
Liliane Rodrigues de Almeida,
Gilson A. Giraldi,
Marcelo Bernardes Vieira
Abstract:
In the last decades, some literature appeared using the Lie groups theory to solve problems in computer vision. On the other hand, Lie algebraic representations of the transformations therein were introduced to overcome the difficulties behind group structure by map** the transformation groups to linear spaces. In this paper we focus on application of Lie groups and Lie algebras to find the rigi…
▽ More
In the last decades, some literature appeared using the Lie groups theory to solve problems in computer vision. On the other hand, Lie algebraic representations of the transformations therein were introduced to overcome the difficulties behind group structure by map** the transformation groups to linear spaces. In this paper we focus on application of Lie groups and Lie algebras to find the rigid transformation that best register two surfaces represented by point clouds. The so called pairwise rigid registration can be formulated by comparing intrinsic second-order orientation tensors that encode local geometry. These tensors can be (locally) represented by symmetric non-negative definite matrices. In this paper we interpret the obtained tensor field as a multivariate normal model. So, we start with the fact that the space of Gaussians can be equipped with a Lie group structure, that is isomorphic to a subgroup of the upper triangular matrices. Consequently, the associated Lie algebra structure enables us to handle Gaussians, and consequently, to compare orientation tensors, with Euclidean operations. We apply this methodology to variants of the Iterative Closest Point (ICP), a known technique for pairwise registration. We compare the obtained results with the original implementations that apply the comparative tensor shape factor (CTSF), which is a similarity notion based on the eigenvalues of the orientation tensors. We notice that the similarity measure in tensor spaces directly derived from Lie's approach is not invariant under rotations, which is a problem in terms of rigid registration. Despite of this, the performed computational experiments show promising results when embedding orientation tensor fields in Lie algebras.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Authors:
Charles F. Gonçalves,
Daniel S. Menasché,
Alberto Avritzer,
Nuno Antunes,
Marco Vieira
Abstract:
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To…
▽ More
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To tackle those challenges, we focus on anomaly detection approaches based on system performance signatures. In particular, performance signatures have the potential of detecting zero-day attacks, as those approaches are based on detecting performance deviations and do not require detailed knowledge of attack history. The proposed methodology leverages an analytical performance model and experimentation and allows to control the rate of false positives in a principled manner. The methodology is evaluated using the TPCx-V workload, which was profiled during a set of executions using resource exhaustion anomalies that emulate the effects of anomalies affecting system performance. The proposed approach was able to successfully detect the anomalies, with a low number of false positives (precision 90%-98%).
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
On Localizing a Camera from a Single Image
Authors:
Pradipta Ghosh,
Xiaochen Liu,
Hang Qiu,
Marcos A. M. Vieira,
Gaurav S. Sukhatme,
Ramesh Govindan
Abstract:
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show…
▽ More
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show that, using a judicious combination of projective geometry, neural networks, and crowd-sourced annotations from human workers, it is possible to position 95% of the images in our test data set to within 12 m. This performance is two orders of magnitude better than PoseNet, a state-of-the-art neural network that, when trained on a large corpus of images in an area, can estimate the pose of a single image. Finally, we show that the camera's inferred position and intrinsic parameters can help design a number of virtual sensors, all of which are reasonably accurate.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Characterizing Synchronous Writes in Stable Memory Devices
Authors:
William B. Mingardi,
Gustavo M. D. Vieira
Abstract:
Distributed algorithms that operate in the fail-recovery model rely on the state stored in stable memory to guarantee the irreversibility of operations even in the presence of failures. The performance of these algorithms lean heavily on the performance of stable memory. Current storage technologies have a defined performance profile: data is accessed in blocks of hundreds or thousands of bytes, r…
▽ More
Distributed algorithms that operate in the fail-recovery model rely on the state stored in stable memory to guarantee the irreversibility of operations even in the presence of failures. The performance of these algorithms lean heavily on the performance of stable memory. Current storage technologies have a defined performance profile: data is accessed in blocks of hundreds or thousands of bytes, random access to these blocks is expensive and sequential access is somewhat better. File system implementations hide some of the performance limitations of the underlying storage devices using buffers and caches. However, fail-recovery distributed algorithms bypass some of these techniques and perform synchronous writes to be able to tolerate a failure during the write itself. Assuming the distributed system designer is able to buffer the algorithm's writes, we ask how buffer size and latency complement each other. In this paper we start to answer this question by characterizing the performance (throughput and latency) of typical stable memory devices using a representative set of current file systems.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Decentralized Validation for Non-malicious Arbitrary Fault Tolerance in Paxos
Authors:
Rodrigo R. Barbieri,
Enrique S. dos Santos,
Gustavo M. D. Vieira
Abstract:
Fault-tolerant distributed systems offer high reliability because even if faults in their components occur, they do not exhibit erroneous behavior. Depending on the fault model adopted, hardware and software errors that do not result in a process crashing are usually not tolerated. To tolerate these rather common failures the usual solution is to adopt a stronger fault model, such as the arbitrary…
▽ More
Fault-tolerant distributed systems offer high reliability because even if faults in their components occur, they do not exhibit erroneous behavior. Depending on the fault model adopted, hardware and software errors that do not result in a process crashing are usually not tolerated. To tolerate these rather common failures the usual solution is to adopt a stronger fault model, such as the arbitrary or Byzantine fault model. Algorithms created for this fault model, however, are considerably more complex and require more system resources than the ones developed for less strict fault models. One approach to reach a middle ground is the non-malicious arbitrary fault model. This model assumes it is possible to detect and filter faults with a given probability, if these faults are not created with malicious intent, allowing the isolation and map** of these faults to benign faults. In this paper we describe how we incremented an implementation of active replication in the non-malicious fault model with a basic type of distributed validation, where a deviation from the expected algorithm behavior will make a process crash. We experimentally evaluate this implementation using a fault injection framework showing that it is feasible to extend the concept of non-malicious failures beyond hardware failures.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Rapid Top-Down Synthesis of Large-Scale IoT Networks
Authors:
Pradipta Ghosh,
Jonathan Bunton,
Dimitrios Pylorof,
Marcos Vieira,
Kevin Chan,
Ramesh Govindan,
Gaurav Sukhatme,
Paulo Tabuada,
Gunjan Verma
Abstract:
Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synthesis of ad-hoc IoT networks for disaster response and search and rescue operations. This synthesis problem must satisfy complex and competing constrai…
▽ More
Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synthesis of ad-hoc IoT networks for disaster response and search and rescue operations. This synthesis problem must satisfy complex and competing constraints: sensor coverage, line-of-sight visibility, and network connectivity. The central challenge in our synthesis problem is quickly scaling to large regions while producing cost-effective solutions. We explore two qualitatively different representations of the synthesis problems satisfiability modulo convex optimization (SMC), and mixed-integer linear programming (MILP). The former is more expressive, for our problem, than the latter, but is less well-suited for solving optimization problems like ours. We show how to express our network synthesis in these frameworks, and, to scale to problem sizes beyond what these frameworks are capable of, develop a hierarchical synthesis technique that independently synthesizes networks in sub-regions of the deployment area, then combines these. We find that, while MILP outperforms SMC in some settings for smaller problem sizes, the fact that SMC's expressivity matches our problem ensures that it uniformly generates better quality solutions at larger problem sizes.
△ Less
Submitted 27 March, 2020; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Gravitational cubic-in-spin interaction at the next-to-leading post-Newtonian order
Authors:
Michèle Levi,
Stavros Mougiakakos,
Mariana Vieira
Abstract:
In this work we derive for the first time the complete gravitational cubic-in-spin effective action at the next-to-leading order in the post-Newtonian (PN) expansion for the interaction of generic compact binaries via the effective field theory for gravitating spinning objects, which we extend in this work. This sector, which enters at the fourth and a half PN (4.5PN) order for rapidly-rotating co…
▽ More
In this work we derive for the first time the complete gravitational cubic-in-spin effective action at the next-to-leading order in the post-Newtonian (PN) expansion for the interaction of generic compact binaries via the effective field theory for gravitating spinning objects, which we extend in this work. This sector, which enters at the fourth and a half PN (4.5PN) order for rapidly-rotating compact objects, completes finite-size effects up to this PN order, and is the first sector completed beyond the current state of the art for generic compact binary dynamics at the 4PN order. At this order in spins with gravitational nonlinearities we have to take into account additional terms, which arise from a new type of worldline couplings, due to the fact that at this order the Tulczyjew gauge for the rotational degrees of freedom, which involves the linear momentum, can no longer be approximated only in terms of the four-velocity. One of the main motivations for us to tackle this sector is also to see what happens when we go to a sector, which corresponds to the gravitational Compton scattering with quantum spins larger than one, and maybe possibly also get an insight on the inability to uniquely fix its amplitude from factorization when spins larger than two are involved. A general observation that we can clearly make already is that even-parity sectors in the order of the spin are easier to handle than odd ones. In the quantum context this corresponds to the greater ease of dealing with bosons compared to fermions.
△ Less
Submitted 13 January, 2021; v1 submitted 12 December, 2019;
originally announced December 2019.
-
Volume growth of complete submanifolds in gradient Ricci Solitons with bounded weighted mean curvature
Authors:
Xu Cheng,
Matheus Vieira,
Detang Zhou
Abstract:
In this article, we study properly immersed complete noncompact submanifolds in a complete shrinking gradient Ricci soliton with weighted mean curvature vector bounded in norm. We prove that such a submanifold must have polynomial volume growth under some mild assumption on the potential function. On the other hand, if the ambient manifold is of bounded geometry, we prove that such a submanifold m…
▽ More
In this article, we study properly immersed complete noncompact submanifolds in a complete shrinking gradient Ricci soliton with weighted mean curvature vector bounded in norm. We prove that such a submanifold must have polynomial volume growth under some mild assumption on the potential function. On the other hand, if the ambient manifold is of bounded geometry, we prove that such a submanifold must have at least linear volume growth. In particular, we show that a properly immersed complete noncompact hypersurface in the Euclidean space with bounded Gaussian weighted mean curvature must have polynomial volume growth and at least linear volume growth.
△ Less
Submitted 12 September, 2019;
originally announced September 2019.
-
Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense
Authors:
Matheus Torquato,
Marco Vieira
Abstract:
Security is one of the most relevant concerns in cloud computing. With the evolution of cyber-security threats, develo** innovative techniques to thwart attacks is of utmost importance. One recent method to improve cloud computing security is Moving Target Defense (MTD). MTD makes use of dynamic reconfiguration in virtualized environments to "confuse" attackers or to nullify their knowledge abou…
▽ More
Security is one of the most relevant concerns in cloud computing. With the evolution of cyber-security threats, develo** innovative techniques to thwart attacks is of utmost importance. One recent method to improve cloud computing security is Moving Target Defense (MTD). MTD makes use of dynamic reconfiguration in virtualized environments to "confuse" attackers or to nullify their knowledge about the system state. However, there is still no consolidated mechanism to evaluate the trade-offs between availability and security when using MTD on cloud computing. The evaluation through measurements is complex as one needs to deal with unexpected events as failures and attacks. To overcome this challenge, we intend to propose a set of models to evaluate the availability and security of MTD in cloud computing environments. The expected results include the quantification of availability and security levels under different conditions (e.g., different software aging rates, varying workloads, different attack intensities).
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
A second-order face-centred finite volume method for elliptic problems
Authors:
Luan M Vieira,
Matteo Giacomini,
Ruben Sevilla,
Antonio Huerta
Abstract:
A second-order face-centred finite volume method (FCFV) is proposed. Contrary to the more popular cell-centred and vertex-centred finite volume (FV) techniques, the proposed method defines the solution on the faces of the mesh (edges in two dimensions). The method is based on a mixed formulation and therefore considers the solution and its gradient as independent unknowns. They are computed solvin…
▽ More
A second-order face-centred finite volume method (FCFV) is proposed. Contrary to the more popular cell-centred and vertex-centred finite volume (FV) techniques, the proposed method defines the solution on the faces of the mesh (edges in two dimensions). The method is based on a mixed formulation and therefore considers the solution and its gradient as independent unknowns. They are computed solving an element-by-element problem after the solution at the faces is determined. The proposed approach avoids the need of reconstructing the solution gradient, as required by cell-centred and vertex-centred FV methods. This strategy leads to a method that is insensitive to mesh distortion and stretching. The current method is second-order and requires the solution of a global system of equations of identical size and identical number of non-zero elements when compared to the recently proposed first-order FCFV. The formulation is presented for Poisson and Stokes problems. Numerical examples are used to illustrate the approximation properties of the method as well as to demonstrate its potential in three dimensional problems with complex geometries. The integration of a mesh adaptive procedure in the FCFV solution algorithm is also presented.
△ Less
Submitted 8 August, 2019;
originally announced August 2019.
-
Plasmonic Properties of Close-packed Metallic Nanoparticle Mono- and Bilayers
Authors:
Bruno G. M. Vieira,
Niclas S. Mueller,
Eduardo B. Barros,
Stephanie Reich
Abstract:
The self-assembly of metallic nanoparticles is a promising route to metasurfaces with unique properties for many optical applications, such as surface-enhanced spectroscopy, light manipulation, and sensing. We present an in-depth theoretical study of the optical properties of mono- and bilayers assembled from gold and silver nanoparticles. With finite-difference time-domain simulations, we predict…
▽ More
The self-assembly of metallic nanoparticles is a promising route to metasurfaces with unique properties for many optical applications, such as surface-enhanced spectroscopy, light manipulation, and sensing. We present an in-depth theoretical study of the optical properties of mono- and bilayers assembled from gold and silver nanoparticles. With finite-difference time-domain simulations, we predict the occurrence of two plasmon modes, a bright and a dark mode, which exhibit symmetric and antisymmetric dipole configurations between the layers, respectively. The dark mode resonance energy depends sensitively on the size of the particles and the interparticle gaps. Hotspots with a nearfield intensity enhancement of up to 3000 are expected, which, together with the fact that the dark mode is roughly four times narrower than the bright mode, reveals how promising these materials are for spectroscopy purposes.
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
Lévy like patterns in the small-scale movements of marsupials in an unfamiliar and risky environment
Authors:
B. Ríos-Uzeda,
E. Brigatti,
M. V. Vieira
Abstract:
We investigate the movement patterns of three different Neotropical marsupials in an unfamiliar and risky environment. Animals are released in a matrix from which they try to reach a patch of forest. Their movements, performed on a small spacial scale, are best approximated by Lévy flights. Patterns of oriented and non-oriented individuals - with forest patches within or beyond their perceptual ra…
▽ More
We investigate the movement patterns of three different Neotropical marsupials in an unfamiliar and risky environment. Animals are released in a matrix from which they try to reach a patch of forest. Their movements, performed on a small spacial scale, are best approximated by Lévy flights. Patterns of oriented and non-oriented individuals - with forest patches within or beyond their perceptual range - differ only slightly in the value of their exponents. These facts suggest that, for these species, the appearance of Lévy flights is the product of animals innate behaviour that emerges spontaneously, as a neutral characteristic proper of a default movement mode for alerted animals.
△ Less
Submitted 28 February, 2019;
originally announced March 2019.
-
Gap theorems in Yang-Mills theory for complete four-dimensional manifolds with a weighted Poincaré inequality
Authors:
Matheus Vieira
Abstract:
In this paper we prove some gap theorems in Yang-Mills theory for complete four-dimensional manifolds with a weighted Poincaré inequality. We apply the results to many examples of manifolds and we prove a uniqueness theorem for the basic instanton.
In this paper we prove some gap theorems in Yang-Mills theory for complete four-dimensional manifolds with a weighted Poincaré inequality. We apply the results to many examples of manifolds and we prove a uniqueness theorem for the basic instanton.
△ Less
Submitted 2 February, 2022; v1 submitted 16 January, 2019;
originally announced January 2019.
-
The algebra of bounded type holomorphic functions on the ball
Authors:
Daniel Carando,
Daniela M. Vieira,
Santiago Muro
Abstract:
We study the spectrum $M_b(U)$ of the algebra of bounded type holomorphic functions on a complete Reinhardt domain in a symmetrically regular Banach space $E$ as an analytic manifold over the bidual of the space. In the case that $U$ is the unit ball of $\ell_p$, $1<p<\infty$, we prove that each connected component of $M_b(B_{\ell_p})$ naturally identifies with a ball of a certain radius. We also…
▽ More
We study the spectrum $M_b(U)$ of the algebra of bounded type holomorphic functions on a complete Reinhardt domain in a symmetrically regular Banach space $E$ as an analytic manifold over the bidual of the space. In the case that $U$ is the unit ball of $\ell_p$, $1<p<\infty$, we prove that each connected component of $M_b(B_{\ell_p})$ naturally identifies with a ball of a certain radius. We also provide estimates for this radius and in many natural cases we have the precise value. As a consequence, we obtain that for connected components different from that of evaluations, these radii are strictly smaller than one, and can be arbitrarily small. We also show that for other Banach sequence spaces, connected components do not necessarily identify with balls.
△ Less
Submitted 9 November, 2018;
originally announced November 2018.
-
A Generative Adversarial Model for Right Ventricle Segmentation
Authors:
Nicoló Savioli,
Miguel Silva Vieira,
Pablo Lamata,
Giovanni Montana
Abstract:
The clinical management of several cardiovascular conditions, such as pulmonary hypertension, require the assessment of the right ventricular (RV) function. This work addresses the fully automatic and robust access to one of the key RV biomarkers, its ejection fraction, from the gold standard imaging modality, MRI. The problem becomes the accurate segmentation of the RV blood pool from cine MRI se…
▽ More
The clinical management of several cardiovascular conditions, such as pulmonary hypertension, require the assessment of the right ventricular (RV) function. This work addresses the fully automatic and robust access to one of the key RV biomarkers, its ejection fraction, from the gold standard imaging modality, MRI. The problem becomes the accurate segmentation of the RV blood pool from cine MRI sequences. This work proposes a solution based on Fully Convolutional Neural Networks (FCNN), where our first contribution is the optimal combination of three concepts (the convolution Gated Recurrent Units (GRU), the Generative Adversarial Networks (GAN), and the L1 loss function) that achieves an improvement of 0.05 and 3.49 mm in Dice Index and Hausdorff Distance respectively with respect to the baseline FCNN. This improvement is then doubled by our second contribution, the ROI-GAN, that sets two GANs to cooperate working at two fields of view of the image, its full resolution and the region of interest (ROI). Our rationale here is to better guide the FCNN learning by combining global (full resolution) and local Region Of Interest (ROI) features. The study is conducted in a large in-house dataset of $\sim$ 23.000 segmented MRI slices, and its generality is verified in a publicly available dataset.
△ Less
Submitted 27 September, 2018;
originally announced October 2018.
-
Propheticus: Generalizable Machine Learning Framework
Authors:
João R. Campos,
Marco Vieira,
Ernesto Costa
Abstract:
Due to recent technological developments, Machine Learning (ML), a subfield of Artificial Intelligence (AI), has been successfully used to process and extract knowledge from a variety of complex problems. However, a thorough ML approach is complex and highly dependent on the problem at hand. Additionally, implementing the logic required to execute the experiments is no small nor trivial deed, cons…
▽ More
Due to recent technological developments, Machine Learning (ML), a subfield of Artificial Intelligence (AI), has been successfully used to process and extract knowledge from a variety of complex problems. However, a thorough ML approach is complex and highly dependent on the problem at hand. Additionally, implementing the logic required to execute the experiments is no small nor trivial deed, consequentially increasing the probability of faulty code which can compromise the results. Propheticus is a data-driven framework which results of the need for a tool that abstracts some of the inherent complexity of ML, whilst being easy to understand and use, as well as to adapt and expand to assist the user's specific needs. Propheticus systematizes and enforces various complex concepts of an ML experiment workflow, taking into account the nature of both the problem and the data. It contains functionalities to execute all the different tasks, from data preprocessing, to results analysis and comparison. Notwithstanding, it can be fairly easily adapted to different problems due to its flexible architecture, and customized as needed to address the user's needs.
△ Less
Submitted 6 September, 2018;
originally announced September 2018.
-
Automated segmentation on the entire cardiac cycle using a deep learning work-flow
Authors:
Nicoló Savioli,
Miguel Silva Vieira,
Pablo Lamata,
Giovanni Montana
Abstract:
The segmentation of the left ventricle (LV) from CINE MRI images is essential to infer important clinical parameters. Typically, machine learning algorithms for automated LV segmentation use annotated contours from only two cardiac phases, diastole, and systole. In this work, we present an analysis work-flow for fully-automated LV segmentation that learns from images acquired through the cardiac c…
▽ More
The segmentation of the left ventricle (LV) from CINE MRI images is essential to infer important clinical parameters. Typically, machine learning algorithms for automated LV segmentation use annotated contours from only two cardiac phases, diastole, and systole. In this work, we present an analysis work-flow for fully-automated LV segmentation that learns from images acquired through the cardiac cycle. The workflow consists of three components: first, for each image in the sequence, we perform an automated localization and subsequent crop** of the bounding box containing the cardiac silhouette. Second, we identify the LV contours using a Temporal Fully Convolutional Neural Network (T-FCNN), which extends Fully Convolutional Neural Networks (FCNN) through a recurrent mechanism enforcing temporal coherence across consecutive frames. Finally, we further defined the boundaries using either one of two components: fully-connected Conditional Random Fields (CRFs) with Gaussian edge potentials and Semantic Flow. Our initial experiments suggest that significant improvement in performance can potentially be achieved by using a recurrent neural network component that explicitly learns cardiac motion patterns whilst performing LV segmentation.
△ Less
Submitted 31 August, 2018;
originally announced September 2018.
-
Data Augmentation for Detection of Architectural Distortion in Digital Mammography using Deep Learning Approach
Authors:
Arthur C. Costa,
Helder C. R. Oliveira,
Juliana H. Catani,
Nestor de Barros,
Carlos F. E. Melo,
Marcelo A. C. Vieira
Abstract:
Early detection of breast cancer can increase treatment efficiency. Architectural Distortion (AD) is a very subtle contraction of the breast tissue and may represent the earliest sign of cancer. Since it is very likely to be unnoticed by radiologists, several approaches have been proposed over the years but none using deep learning techniques. To train a Convolutional Neural Network (CNN), which i…
▽ More
Early detection of breast cancer can increase treatment efficiency. Architectural Distortion (AD) is a very subtle contraction of the breast tissue and may represent the earliest sign of cancer. Since it is very likely to be unnoticed by radiologists, several approaches have been proposed over the years but none using deep learning techniques. To train a Convolutional Neural Network (CNN), which is a deep neural architecture, is necessary a huge amount of data. To overcome this problem, this paper proposes a data augmentation approach applied to clinical image dataset to properly train a CNN. Results using receiver operating characteristic analysis showed that with a very limited dataset we could train a CNN to detect AD in digital mammography with area under the curve (AUC = 0.74).
△ Less
Submitted 5 July, 2018;
originally announced July 2018.
-
Overdamped dynamics of particles with repulsive power-law interactions
Authors:
André A. Moreira,
César M. Vieira,
Humberto A. Carmona,
José S. Andrade Jr.,
Constantino Tsallis
Abstract:
We investigate the dynamics of overdamped $D$-dimensional systems of particles repulsively interacting through short-ranged power-law potentials, $V(r)\sim r^{-λ}\;(λ/D>1)$. We show that such systems obey a non-linear diffusion equation, and that their stationary state extremizes a $q$-generalized nonadditive entropy. Here we focus on the dynamical evolution of these systems. Our first-principle…
▽ More
We investigate the dynamics of overdamped $D$-dimensional systems of particles repulsively interacting through short-ranged power-law potentials, $V(r)\sim r^{-λ}\;(λ/D>1)$. We show that such systems obey a non-linear diffusion equation, and that their stationary state extremizes a $q$-generalized nonadditive entropy. Here we focus on the dynamical evolution of these systems. Our first-principle $D=1,2$ many-body numerical simulations (based on Newton's law) confirm the predictions obtained from the time-dependent solution of the non-linear diffusion equation, and show that the one-particle space-distribution $P(x,t)$ appears to follow a compact-support $q$-Gaussian form, with $q=1-λ/D$. We also calculate the velocity distributions $P(v_x,t)$ and, interestingly enough, they follow the same $q$-Gaussian form (apparently precisely for $D=1$, and nearly so for $D=2$). The satisfactory match between the continuum description and the molecular dynamics simulations in a more general, time-dependent, framework neatly confirms the idea that the present dissipative systems indeed represent suitable applications of the $q$-generalized thermostatistical theory.
△ Less
Submitted 15 May, 2018;
originally announced May 2018.
-
UEFI BIOS Accessibility for the Visually Impaired
Authors:
Rafael R. Machado,
Gustavo M. D. Vieira
Abstract:
People with some kind of disability face a high level of difficulty for everyday tasks because, in many cases, accessibility was not considered necessary when the task or process was designed. An example of this scenario is a computer's BIOS configuration screens, which do not consider the specific needs, such as screen readers, of visually impaired people. This paper proposes the idea that it is…
▽ More
People with some kind of disability face a high level of difficulty for everyday tasks because, in many cases, accessibility was not considered necessary when the task or process was designed. An example of this scenario is a computer's BIOS configuration screens, which do not consider the specific needs, such as screen readers, of visually impaired people. This paper proposes the idea that it is possible to make the pre-operating system environment accessible to visually impaired people. We report our work-in-progress in creating a screen reader prototype, accessing audio cards compatible with the High Definition Audio specification in systems running UEFI compliant firmware.
△ Less
Submitted 7 December, 2017;
originally announced December 2017.