-
The contribution of T2 relaxation time to diffusion MRI quantification and its clinical implications: a hypothesis
Authors:
Yi Xiang J Wang,
Kai-Xuan Zhao,
Fu-Zhao Ma,
Ben-Heng Xiao
Abstract:
Considering liver as the reference, that both fast diffusion (PF) and slow diffusion (Dslow) of the spleen are much underestimated is likely due to the MRI properties of the spleen such as the much longer T2 relaxation time. It is possible that longer T2 relaxation time partially mitigates the signal decay effect of various gradients on diffusion weighted image. This phenomenon will not be limited…
▽ More
Considering liver as the reference, that both fast diffusion (PF) and slow diffusion (Dslow) of the spleen are much underestimated is likely due to the MRI properties of the spleen such as the much longer T2 relaxation time. It is possible that longer T2 relaxation time partially mitigates the signal decay effect of various gradients on diffusion weighted image. This phenomenon will not be limited to the spleen. Most liver tumors have a longer T2 relaxation time than their native normal tissue and this is considered to be associated with oedema. On the other hand, most tumors are measured with lower MRI diffusion (despite being oedematous). The reason why malignant tumors have lower diffusion value [apparent diffusion coefficient (ADC) and Dslow] are poorly understood but has been proposed to be related to a combination of higher cellularity, tissue disorganization, and increased extracellular space tortuosity. These explanations may be true, but it is also possible to that many tumors have MRI properties similar to the spleen such as longer T2 (relative to the liver) and these MRI properties may also contribute to the lower MRI measured ADC and Dslow . In other words, if we could hypothetically plant a piece of spleen tissue in the liver, MRI would recognize this planted spleen tissue as being similar to a tumor and measure it to have lower diffusion than the liver.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
Table Detection for Visually Rich Document Images
Authors:
Bin Xiao,
Murat Simsek,
Burak Kantarci,
Ala Abu Alkheir
Abstract:
Table Detection (TD) is a fundamental task to enable visually rich document understanding, which requires the model to extract information without information loss. However, popular Intersection over Union (IoU) based evaluation metrics and IoU-based loss functions for the detection models cannot directly represent the degree of information loss for the prediction results. Therefore, we propose to…
▽ More
Table Detection (TD) is a fundamental task to enable visually rich document understanding, which requires the model to extract information without information loss. However, popular Intersection over Union (IoU) based evaluation metrics and IoU-based loss functions for the detection models cannot directly represent the degree of information loss for the prediction results. Therefore, we propose to decouple IoU into a ground truth coverage term and a prediction coverage term, in which the former can be used to measure the information loss of the prediction results. Besides, considering the sparse distribution of tables in document images, we use SparseR-CNN as the base model and further improve the model by using Gaussian Noise Augmented Image Size region proposals and many-to-one label assignments. Results under comprehensive experiments show that the proposed method can consistently outperform state-of-the-art methods with different IoU-based metrics under various datasets and demonstrate that the proposed decoupled IoU loss can enable the model to alleviate information loss.
△ Less
Submitted 26 October, 2023; v1 submitted 30 May, 2023;
originally announced May 2023.
-
The case for an EIC Theory Alliance: Theoretical Challenges of the EIC
Authors:
Raktim Abir,
Igor Akushevich,
Tolga Altinoluk,
Daniele Paolo Anderle,
Fatma P. Aslan,
Alessandro Bacchetta,
Baha Balantekin,
Joao Barata,
Marco Battaglieri,
Carlos A. Bertulani,
Guillaume Beuf,
Chiara Bissolotti,
Daniël Boer,
M. Boglione,
Radja Boughezal,
Eric Braaten,
Nora Brambilla,
Vladimir Braun,
Duane Byer,
Francesco Giovanni Celiberto,
Yang-Ting Chien,
Ian C. Cloët,
Martha Constantinou,
Wim Cosyn,
Aurore Courtoy
, et al. (146 additional authors not shown)
Abstract:
We outline the physics opportunities provided by the Electron Ion Collider (EIC). These include the study of the parton structure of the nucleon and nuclei, the onset of gluon saturation, the production of jets and heavy flavor, hadron spectroscopy and tests of fundamental symmetries. We review the present status and future challenges in EIC theory that have to be addressed in order to realize thi…
▽ More
We outline the physics opportunities provided by the Electron Ion Collider (EIC). These include the study of the parton structure of the nucleon and nuclei, the onset of gluon saturation, the production of jets and heavy flavor, hadron spectroscopy and tests of fundamental symmetries. We review the present status and future challenges in EIC theory that have to be addressed in order to realize this ambitious and impactful physics program, including how to engage a diverse and inclusive workforce. In order to address these many-fold challenges, we propose a coordinated effort involving theory groups with differing expertise is needed. We discuss the scientific goals and scope of such an EIC Theory Alliance.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Hierarchical Integration Diffusion Model for Realistic Image Deblurring
Authors:
Zheng Chen,
Yulun Zhang,
Ding Liu,
Bin Xia,
**** Gu,
Linghe Kong,
Xin Yuan
Abstract:
Diffusion models (DMs) have recently been introduced in image deblurring and exhibited promising performance, particularly in terms of details reconstruction. However, the diffusion model requires a large number of inference iterations to recover the clean image from pure Gaussian noise, which consumes massive computational resources. Moreover, the distribution synthesized by the diffusion model i…
▽ More
Diffusion models (DMs) have recently been introduced in image deblurring and exhibited promising performance, particularly in terms of details reconstruction. However, the diffusion model requires a large number of inference iterations to recover the clean image from pure Gaussian noise, which consumes massive computational resources. Moreover, the distribution synthesized by the diffusion model is often misaligned with the target results, leading to restrictions in distortion-based metrics. To address the above issues, we propose the Hierarchical Integration Diffusion Model (HI-Diff), for realistic image deblurring. Specifically, we perform the DM in a highly compacted latent space to generate the prior feature for the deblurring process. The deblurring process is implemented by a regression-based method to obtain better distortion accuracy. Meanwhile, the highly compact latent space ensures the efficiency of the DM. Furthermore, we design the hierarchical integration module to fuse the prior into the regression-based model from multiple scales, enabling better generalization in complex blurry scenarios. Comprehensive experiments on synthetic and real-world blur datasets demonstrate that our HI-Diff outperforms state-of-the-art methods. Code and trained models are available at https://github.com/zhengchen1999/HI-Diff.
△ Less
Submitted 25 September, 2023; v1 submitted 22 May, 2023;
originally announced May 2023.
-
i-Code V2: An Autoregressive Generation Framework over Vision, Language, and Speech Data
Authors:
Ziyi Yang,
Mahmoud Khademi,
Yichong Xu,
Reid Pryzant,
Yuwei Fang,
Chenguang Zhu,
Dongdong Chen,
Yao Qian,
Mei Gao,
Yi-Ling Chen,
Robert Gmyr,
Naoyuki Kanda,
Noel Codella,
Bin Xiao,
Yu Shi,
Lu Yuan,
Takuya Yoshioka,
Michael Zeng,
Xuedong Huang
Abstract:
The convergence of text, visual, and audio data is a key step towards human-like artificial intelligence, however the current Vision-Language-Speech landscape is dominated by encoder-only models which lack generative abilities. We propose closing this gap with i-Code V2, the first model capable of generating natural language from any combination of Vision, Language, and Speech data. i-Code V2 is a…
▽ More
The convergence of text, visual, and audio data is a key step towards human-like artificial intelligence, however the current Vision-Language-Speech landscape is dominated by encoder-only models which lack generative abilities. We propose closing this gap with i-Code V2, the first model capable of generating natural language from any combination of Vision, Language, and Speech data. i-Code V2 is an integrative system that leverages state-of-the-art single-modality encoders, combining their outputs with a new modality-fusing encoder in order to flexibly project combinations of modalities into a shared representational space. Next, language tokens are generated from these representations via an autoregressive decoder. The whole framework is pretrained end-to-end on a large collection of dual- and single-modality datasets using a novel text completion objective that can be generalized across arbitrary combinations of modalities. i-Code V2 matches or outperforms state-of-the-art single- and dual-modality baselines on 7 multimodal tasks, demonstrating the power of generative multimodal pretraining across a diversity of tasks and signals.
△ Less
Submitted 20 May, 2023;
originally announced May 2023.
-
QB4AIRA: A Question Bank for AI Risk Assessment
Authors:
Sung Une Lee,
Harsha Perera,
Boming Xia,
Yue Liu,
Qinghua Lu,
Liming Zhu,
Olivier Salvado,
Jon Whittle
Abstract:
The rapid advancement of Artificial Intelligence (AI), represented by ChatGPT, has raised concerns about responsible AI development and utilization. Existing frameworks lack a comprehensive synthesis of AI risk assessment questions. To address this, we introduce QB4AIRA, a novel question bank developed by refining questions from five globally recognized AI risk frameworks, categorized according to…
▽ More
The rapid advancement of Artificial Intelligence (AI), represented by ChatGPT, has raised concerns about responsible AI development and utilization. Existing frameworks lack a comprehensive synthesis of AI risk assessment questions. To address this, we introduce QB4AIRA, a novel question bank developed by refining questions from five globally recognized AI risk frameworks, categorized according to Australia's AI ethics principles. QB4AIRA comprises 293 prioritized questions covering a wide range of AI risk areas, facilitating effective risk assessment. It serves as a valuable resource for stakeholders in assessing and managing AI risks, while paving the way for new risk frameworks and guidelines. By promoting responsible AI practices, QB4AIRA contributes to responsible AI deployment, mitigating potential risks and harms.
△ Less
Submitted 10 July, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Fusion-Based Multi-User Semantic Communications for Wireless Image Transmission over Degraded Broadcast Channels
Authors:
Tong Wu,
Zhiyong Chen,
Meixia Tao,
Bin Xia,
Wenjun Zhang
Abstract:
Degraded broadcast channels (DBC) are a typical multi-user communications scenario. There exist classic transmission methods, such as superposition coding with successive interference cancellation, to achieve the DBC capacity region. However, semantic communications method over DBC remains lack of in-depth research. To address this, we design a fusion-based multi-user semantic communications syste…
▽ More
Degraded broadcast channels (DBC) are a typical multi-user communications scenario. There exist classic transmission methods, such as superposition coding with successive interference cancellation, to achieve the DBC capacity region. However, semantic communications method over DBC remains lack of in-depth research. To address this, we design a fusion-based multi-user semantic communications system for wireless image transmission over DBC in this paper. The proposed architecture supports a transmitter extracting semantic features for two users separately, and learns to dynamically fuse these semantic features into a joint latent representation for broadcasting. The key here is to design a flexible image semantic fusion (FISF) module to fuse the semantic features of two users, and to use a multi-layer perceptron (MLP) based neural network to adjust the weights of different user semantic features for flexible adaptability to different users channels. Experiments present the semantic performance region based on the peak signal-to-noise ratio (PSNR) of both users, and show that the proposed system dominates the traditional methods.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Revisiting Table Detection Datasets for Visually Rich Documents
Authors:
Bin Xiao,
Murat Simsek,
Burak Kantarci,
Ala Abu Alkheir
Abstract:
Table Detection has become a fundamental task for visually rich document understanding with the surging number of electronic documents. However, popular public datasets widely used in related studies have inherent limitations, including noisy and inconsistent samples, limited training samples, and limited data sources. These limitations make these datasets unreliable to evaluate the model performa…
▽ More
Table Detection has become a fundamental task for visually rich document understanding with the surging number of electronic documents. However, popular public datasets widely used in related studies have inherent limitations, including noisy and inconsistent samples, limited training samples, and limited data sources. These limitations make these datasets unreliable to evaluate the model performance and cannot reflect the actual capacity of models. Therefore, this study revisits some open datasets with high-quality annotations, identifies and cleans the noise, and aligns the annotation definitions of these datasets to merge a larger dataset, termed Open-Tables. Moreover, to enrich the data sources, we propose a new ICT-TD dataset using the PDF files of Information and Communication Technologies (ICT) commodities, a different domain containing unique samples that hardly appear in open datasets. To ensure the label quality of the dataset, we annotated the dataset manually following the guidance of a domain expert. The proposed dataset is challenging and can be a sample of actual cases in the business context. We built strong baselines using various state-of-the-art object detection models. Our experimental results show that the domain differences among existing open datasets are minor despite having different data sources. Our proposed Open-Tables and ICT-TD can provide a more reliable evaluation for models because of their high quality and consistent annotations. Besides, they are more suitable for cross-domain settings. Our experimental results show that in the cross-domain setting, benchmark models trained with cleaned Open-Tables dataset can achieve 0.6\%-2.6\% higher weighted average F1 than the corresponding ones trained with the noisy version of Open-Tables, demonstrating the reliability of the proposed datasets. The datasets are public available.
△ Less
Submitted 8 November, 2023; v1 submitted 3 May, 2023;
originally announced May 2023.
-
On the Way to SBOMs: Investigating Design Issues and Solutions in Practice
Authors:
Tingting Bi,
Boming Xia,
Zhenchang Xing,
Qinghua Lu,
Liming Zhu
Abstract:
The Software Bill of Materials (SBOM) has emerged as a promising solution, providing a machine-readable inventory of software components used, thus bolstering supply chain security. This paper presents an extensive study concerning the practical aspects of SBOM practice. Leveraging an analysis of 4,786 GitHub discussions from 510 SBOM-related projects, our research delineates key topics, challenge…
▽ More
The Software Bill of Materials (SBOM) has emerged as a promising solution, providing a machine-readable inventory of software components used, thus bolstering supply chain security. This paper presents an extensive study concerning the practical aspects of SBOM practice. Leveraging an analysis of 4,786 GitHub discussions from 510 SBOM-related projects, our research delineates key topics, challenges, and solutions intrinsic to the effective utilization of SBOMs. Furthermore, we shed light on commonly used tools and frameworks for generating SBOMs, exploring their respective strengths and limitations. Our findings underscore the pivotal role SBOMs play in ensuring resilient software development practices and underscore the imperative of their widespread integration to bolster supply chain security. The insights accrued from our study hold significance as valuable input for prospective research and development in this crucial domain.
△ Less
Submitted 30 August, 2023; v1 submitted 25 April, 2023;
originally announced April 2023.
-
StyLess: Boosting the Transferability of Adversarial Examples
Authors:
Kaisheng Liang,
Bin Xiao
Abstract:
Adversarial attacks can mislead deep neural networks (DNNs) by adding imperceptible perturbations to benign examples. The attack transferability enables adversarial examples to attack black-box DNNs with unknown architectures or parameters, which poses threats to many real-world applications. We find that existing transferable attacks do not distinguish between style and content features during op…
▽ More
Adversarial attacks can mislead deep neural networks (DNNs) by adding imperceptible perturbations to benign examples. The attack transferability enables adversarial examples to attack black-box DNNs with unknown architectures or parameters, which poses threats to many real-world applications. We find that existing transferable attacks do not distinguish between style and content features during optimization, limiting their attack transferability. To improve attack transferability, we propose a novel attack method called style-less perturbation (StyLess). Specifically, instead of using a vanilla network as the surrogate model, we advocate using stylized networks, which encode different style features by perturbing an adaptive instance normalization. Our method can prevent adversarial examples from using non-robust style features and help generate transferable perturbations. Comprehensive experiments show that our method can significantly improve the transferability of adversarial examples. Furthermore, our approach is generic and can outperform state-of-the-art transferable attacks when combined with other attack techniques.
△ Less
Submitted 23 April, 2023;
originally announced April 2023.
-
SARF: Aliasing Relation Assisted Self-Supervised Learning for Few-shot Relation Reasoning
Authors:
Lingyuan Meng,
Ke Liang,
Bin Xiao,
Sihang Zhou,
Yue Liu,
Meng Liu,
Xihong Yang,
Xinwang Liu
Abstract:
Few-shot relation reasoning on knowledge graphs (FS-KGR) aims to infer long-tail data-poor relations, which has drawn increasing attention these years due to its practicalities. The pre-training of previous methods needs to manually construct the meta-relation set, leading to numerous labor costs. Self-supervised learning (SSL) is treated as a solution to tackle the issue, but still at an early st…
▽ More
Few-shot relation reasoning on knowledge graphs (FS-KGR) aims to infer long-tail data-poor relations, which has drawn increasing attention these years due to its practicalities. The pre-training of previous methods needs to manually construct the meta-relation set, leading to numerous labor costs. Self-supervised learning (SSL) is treated as a solution to tackle the issue, but still at an early stage for FS-KGR task. Moreover, most of the existing methods ignore leveraging the beneficial information from aliasing relations (AR), i.e., data-rich relations with similar contextual semantics to the target data-poor relation. Therefore, we proposed a novel Self-Supervised Learning model by leveraging Aliasing Relations to assist FS-KGR, termed SARF. Concretely, four main components are designed in our model, i.e., SSL reasoning module, AR-assisted mechanism, fusion module, and scoring function. We first generate the representation of the co-occurrence patterns in a generative manner. Meanwhile, the representations of aliasing relations are learned to enhance reasoning in the AR-assist mechanism. Besides, multiple strategies, i.e., simple summation and learnable fusion, are offered for representation fusion. Finally, the generated representation is used for scoring. Extensive experiments on three few-shot benchmarks demonstrate that SARF achieves state-of-the-art performance compared with other methods in most cases.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Spectrum of linearized operator at ground states of a system of Klein-Gordon equations
Authors:
Yan Cui,
Bo Xia,
Kai Yang
Abstract:
Previously, the existence of ground state solutions of a family of systems of Klein-Gordon equations has been widely studied. In this article, we will study the linearized operator at the ground state and give a complete description of the spectrum for this operator in the radial case: the existence of a unique negative eigenvalue, no resonance at '1'(the bottom of the essential spectrum), no embe…
▽ More
Previously, the existence of ground state solutions of a family of systems of Klein-Gordon equations has been widely studied. In this article, we will study the linearized operator at the ground state and give a complete description of the spectrum for this operator in the radial case: the existence of a unique negative eigenvalue, no resonance at '1'(the bottom of the essential spectrum), no embedded eigenvalue in the essential spectrum and the spectral gap property (i.e., there is no eigenvalue in the interval (0,1]).
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Another Vertical View: A Hierarchical Network for Heterogeneous Trajectory Prediction via Spectrums
Authors:
Conghao Wong,
Beihao Xia,
Qinmu Peng,
Xinge You
Abstract:
With the fast development of AI-related techniques, the applications of trajectory prediction are no longer limited to easier scenes and trajectories. More and more heterogeneous trajectories with different representation forms, such as 2D or 3D coordinates, 2D or 3D bounding boxes, and even high-dimensional human skeletons, need to be analyzed and forecasted. Among these heterogeneous trajectorie…
▽ More
With the fast development of AI-related techniques, the applications of trajectory prediction are no longer limited to easier scenes and trajectories. More and more heterogeneous trajectories with different representation forms, such as 2D or 3D coordinates, 2D or 3D bounding boxes, and even high-dimensional human skeletons, need to be analyzed and forecasted. Among these heterogeneous trajectories, interactions between different elements within a frame of trajectory, which we call the ``Dimension-Wise Interactions'', would be more complex and challenging. However, most previous approaches focus mainly on a specific form of trajectories, which means these methods could not be used to forecast heterogeneous trajectories, not to mention the dimension-wise interaction. Besides, previous methods mostly treat trajectory prediction as a normal time sequence generation task, indicating that these methods may require more work to directly analyze agents' behaviors and social interactions at different temporal scales. In this paper, we bring a new ``view'' for trajectory prediction to model and forecast trajectories hierarchically according to different frequency portions from the spectral domain to learn to forecast trajectories by considering their frequency responses. Moreover, we try to expand the current trajectory prediction task by introducing the dimension $M$ from ``another view'', thus extending its application scenarios to heterogeneous trajectories vertically. Finally, we adopt the bilinear structure to fuse two factors, including the frequency response and the dimension-wise interaction, to forecast heterogeneous trajectories via spectrums hierarchically in a generic way. Experiments show that the proposed model outperforms most state-of-the-art methods on ETH-UCY, Stanford Drone Dataset and nuScenes with heterogeneous trajectories, including 2D coordinates, 2D and 3D bounding boxes.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
A complete classification of shuffle groups
Authors:
Binzhou Xia,
Junyang Zhang,
Zhishuo Zhang,
Wenying Zhu
Abstract:
For positive integers $k$ and $n$, the shuffle group $G_{k,kn}$ is generated by the $k!$ permutations of a deck of $kn$ cards performed by cutting the deck into $k$ piles with $n$ cards in each pile, and then perfectly interleaving these cards following certain order of the $k$ piles. For $k=2$, the shuffle group $G_{2,2n}$ was determined by Diaconis, Graham and Kantor in 1983. The Shuffle Group C…
▽ More
For positive integers $k$ and $n$, the shuffle group $G_{k,kn}$ is generated by the $k!$ permutations of a deck of $kn$ cards performed by cutting the deck into $k$ piles with $n$ cards in each pile, and then perfectly interleaving these cards following certain order of the $k$ piles. For $k=2$, the shuffle group $G_{2,2n}$ was determined by Diaconis, Graham and Kantor in 1983. The Shuffle Group Conjecture states that, for general $k$, the shuffle group $G_{k,kn}$ contains $\mathrm{A}_{kn}$ whenever $k\notin\{2,4\}$ and $n$ is not a power of $k$. In particular, the conjecture in the case $k=3$ was posed by Medvedoff and Morrison in 1987. The only values of $k$ for which the Shuffle Group Conjecture has been confirmed so far are powers of $2$, due to recent work of Amarra, Morgan and Praeger based on Classification of Finite Simple Groups. In this paper, we confirm the Shuffle Group Conjecture for all cases using results on $2$-transitive groups and elements of large fixed point ratio in primitive groups.
△ Less
Submitted 23 October, 2023; v1 submitted 3 April, 2023;
originally announced April 2023.
-
Graphical regular representations of $(2,p)$-generated groups
Authors:
Binzhou Xia
Abstract:
For groups $G$ that can be generated by an involution and an element of odd prime order, this paper gives a sufficient condition for a certain Cayley graph of $G$ to be a graphical regular representation (GRR), that is, for the Cayley graph to have full automorphism group isomorphic to $G$. This condition enables one to show the existence of GRRs of prescribed valency for a large class of groups,…
▽ More
For groups $G$ that can be generated by an involution and an element of odd prime order, this paper gives a sufficient condition for a certain Cayley graph of $G$ to be a graphical regular representation (GRR), that is, for the Cayley graph to have full automorphism group isomorphic to $G$. This condition enables one to show the existence of GRRs of prescribed valency for a large class of groups, and in this paper, $k$-valent GRRs of finite nonabelian simple groups with $k\geq5$ are considered.
△ Less
Submitted 20 February, 2024; v1 submitted 2 April, 2023;
originally announced April 2023.
-
The jet apparent motion and central engine study of Fermi blazars
Authors:
H. B. Xiao,
J. T. Zhu,
J. H. Fan,
Z. Y. Pei,
Z. J. Luo,
S. H. Zhang
Abstract:
The study of blazar jet has been performed for several decades via the VLBI technique, while its generation and propagation stay unclear. In the present work, we compiled a sample of 407 VLBI detected \textit{Fermi} blazars (VFBs) and studied the correlations between apparent velocity (${\rm log}\,β_{\rm app}$) and jet/accretion disk properties. We found a positive correlation between $γ$-ray lumi…
▽ More
The study of blazar jet has been performed for several decades via the VLBI technique, while its generation and propagation stay unclear. In the present work, we compiled a sample of 407 VLBI detected \textit{Fermi} blazars (VFBs) and studied the correlations between apparent velocity (${\rm log}\,β_{\rm app}$) and jet/accretion disk properties. We found a positive correlation between $γ$-ray luminosity (${\rm log}\,L_{\rm γ}$) and ${\rm log}\,β_{\rm app}$, the correlation suggests that the apparent motion of jet knot is related to the jet power.
△ Less
Submitted 28 March, 2023;
originally announced March 2023.
-
Disruption Precursor Onset Time Study Based on Semi-supervised Anomaly Detection
Authors:
Xinkun Ai,
Wei Zheng,
Ming Zhang,
Dalong Chen,
Chengshuo Shen,
Bihao Guo,
Bingjia Xiao,
Yu Zhong,
Nengchao Wang,
Zhoujun Yang,
Zhipeng Chen,
Zhongyong Chen,
Yonghua Ding,
Yuan Pan,
J-TEXT team
Abstract:
The full understanding of plasma disruption in tokamaks is currently lacking, and data-driven methods are extensively used for disruption prediction. However, most existing data-driven disruption predictors employ supervised learning techniques, which require labeled training data. The manual labeling of disruption precursors is a tedious and challenging task, as some precursors are difficult to a…
▽ More
The full understanding of plasma disruption in tokamaks is currently lacking, and data-driven methods are extensively used for disruption prediction. However, most existing data-driven disruption predictors employ supervised learning techniques, which require labeled training data. The manual labeling of disruption precursors is a tedious and challenging task, as some precursors are difficult to accurately identify, limiting the potential of machine learning models. To address this issue, commonly used labeling methods assume that the precursor onset occurs at a fixed time before the disruption, which may not be consistent for different types of disruptions or even the same type of disruption, due to the different speeds at which plasma instabilities escalate. This leads to mislabeled samples and suboptimal performance of the supervised learning predictor. In this paper, we present a disruption prediction method based on anomaly detection that overcomes the drawbacks of unbalanced positive and negative data samples and inaccurately labeled disruption precursor samples. We demonstrate the effectiveness and reliability of anomaly detection predictors based on different algorithms on J-TEXT and EAST to evaluate the reliability of the precursor onset time inferred by the anomaly detection predictor. The precursor onset times inferred by these predictors reveal that the labeling methods have room for improvement as the onset times of different shots are not necessarily the same. Finally, we optimize precursor labeling using the onset times inferred by the anomaly detection predictor and test the optimized labels on supervised learning disruption predictors. The results on J-TEXT and EAST show that the models trained on the optimized labels outperform those trained on fixed onset time labels.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Stochastic Graph Neural Network-based Value Decomposition for MARL in Internet of Vehicles
Authors:
Baidi Xiao,
Rongpeng Li,
Fei Wang,
Chenghui Peng,
Jianjun Wu,
Zhifeng Zhao,
Honggang Zhang
Abstract:
Autonomous driving has witnessed incredible advances in the past several decades, while Multi-Agent Reinforcement Learning (MARL) promises to satisfy the essential need of autonomous vehicle control in a wireless connected vehicle networks. In MARL, how to effectively decompose a global feedback into the relative contributions of individual agents belongs to one of the most fundamental problems. H…
▽ More
Autonomous driving has witnessed incredible advances in the past several decades, while Multi-Agent Reinforcement Learning (MARL) promises to satisfy the essential need of autonomous vehicle control in a wireless connected vehicle networks. In MARL, how to effectively decompose a global feedback into the relative contributions of individual agents belongs to one of the most fundamental problems. However, the environment volatility due to vehicle movement and wireless disturbance could significantly shape time-varying topological relationships among agents, thus making the Value Decomposition (VD) challenging. Therefore, in order to cope with this annoying volatility, it becomes imperative to design a dynamic VD framework. Hence, in this paper, we propose a novel Stochastic VMIX (SVMIX) methodology by taking account of dynamic topological features during the VD and incorporating the corresponding components into a multi-agent actor-critic architecture. In particular, Stochastic Graph Neural Network (SGNN) is leveraged to effectively capture underlying dynamics in topological features and improve the flexibility of VD against the environment volatility. Finally, the superiority of SVMIX is verified through extensive simulations.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Large AI Models in Health Informatics: Applications, Challenges, and the Future
Authors:
Jianing Qiu,
Lin Li,
Jiankai Sun,
Jiachuan Peng,
Peilun Shi,
Ruiyang Zhang,
Yinzhao Dong,
Kyle Lam,
Frank P. -W. Lo,
Bo Xiao,
Wu Yuan,
Ningli Wang,
Dong Xu,
Benny Lo
Abstract:
Large AI models, or foundation models, are models recently emerging with massive scales both parameter-wise and data-wise, the magnitudes of which can reach beyond billions. Once pretrained, large AI models demonstrate impressive performance in various downstream tasks. A prime example is ChatGPT, whose capability has compelled people's imagination about the far-reaching influence that large AI mo…
▽ More
Large AI models, or foundation models, are models recently emerging with massive scales both parameter-wise and data-wise, the magnitudes of which can reach beyond billions. Once pretrained, large AI models demonstrate impressive performance in various downstream tasks. A prime example is ChatGPT, whose capability has compelled people's imagination about the far-reaching influence that large AI models can have and their potential to transform different domains of our lives. In health informatics, the advent of large AI models has brought new paradigms for the design of methodologies. The scale of multi-modal data in the biomedical and health domain has been ever-expanding especially since the community embraced the era of deep learning, which provides the ground to develop, validate, and advance large AI models for breakthroughs in health-related areas. This article presents a comprehensive review of large AI models, from background to their applications. We identify seven key sectors in which large AI models are applicable and might have substantial influence, including 1) bioinformatics; 2) medical diagnosis; 3) medical imaging; 4) medical informatics; 5) medical education; 6) public health; and 7) medical robotics. We examine their challenges, followed by a critical discussion about potential future directions and pitfalls of large AI models in transforming the field of health informatics.
△ Less
Submitted 24 September, 2023; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Exploring TeV candidates of Fermi blazars through machine learning
Authors:
J. T. Zhu,
C. Lin,
H. B. Xiao,
J. H. Fan,
D. Bastieri,
G. G. Wang
Abstract:
In this work, we make use of a supervised machine learning algorithm based on Logistic Regression (LR) to select TeV blazar candidates from the 4FGL-DR2 / 4LAC-DR2, 3FHL, 3HSP, and 2BIGB catalogs. LR constructs a hyperplane based on a selection of optimal parameters, named features, and hyper-parameters whose values control the learning process and determine the values of features that a learning…
▽ More
In this work, we make use of a supervised machine learning algorithm based on Logistic Regression (LR) to select TeV blazar candidates from the 4FGL-DR2 / 4LAC-DR2, 3FHL, 3HSP, and 2BIGB catalogs. LR constructs a hyperplane based on a selection of optimal parameters, named features, and hyper-parameters whose values control the learning process and determine the values of features that a learning algorithm ends up learning, to discriminate TeV blazars from non-TeV blazars. In addition, it gives the probability (or logistic) that a source may be considered as a TeV blazar candidate. Non-TeV blazars with logistics greater than 80% are considered high-confidence TeV candidates. Using this technique, we identify 40 high-confidence TeV candidates from the 4FGL-DR2 / 4LAC-DR2 blazars and we build the feature hyper-plane to distinguish TeV and non-TeV blazars. We also calculate the hyper-planes for the 3FHL, 3HSP, and 2BIGB. Finally, we construct the broadband spectral energy distributions (SED) for the 40 candidates, testing for their detectability with various instruments. We find that 7 of them are likely to be detected by existing or upcoming IACT observatories, while 1 could be observed with EAS particle detector arrays.
△ Less
Submitted 18 March, 2023;
originally announced March 2023.
-
DiffIR: Efficient Diffusion Model for Image Restoration
Authors:
Bin Xia,
Yulun Zhang,
Shiyin Wang,
Yitong Wang,
Xinglong Wu,
Yapeng Tian,
Wenming Yang,
Luc Van Gool
Abstract:
Diffusion model (DM) has achieved SOTA performance by modeling the image synthesis process into a sequential application of a denoising network. However, different from image synthesis, image restoration (IR) has a strong constraint to generate results in accordance with ground-truth. Thus, for IR, traditional DMs running massive iterations on a large model to estimate whole images or feature maps…
▽ More
Diffusion model (DM) has achieved SOTA performance by modeling the image synthesis process into a sequential application of a denoising network. However, different from image synthesis, image restoration (IR) has a strong constraint to generate results in accordance with ground-truth. Thus, for IR, traditional DMs running massive iterations on a large model to estimate whole images or feature maps is inefficient. To address this issue, we propose an efficient DM for IR (DiffIR), which consists of a compact IR prior extraction network (CPEN), dynamic IR transformer (DIRformer), and denoising network. Specifically, DiffIR has two training stages: pretraining and training DM. In pretraining, we input ground-truth images into CPEN$_{S1}$ to capture a compact IR prior representation (IPR) to guide DIRformer. In the second stage, we train the DM to directly estimate the same IRP as pretrained CPEN$_{S1}$ only using LQ images. We observe that since the IPR is only a compact vector, DiffIR can use fewer iterations than traditional DM to obtain accurate estimations and generate more stable and realistic results. Since the iterations are few, our DiffIR can adopt a joint optimization of CPEN$_{S2}$, DIRformer, and denoising network, which can further reduce the estimation error influence. We conduct extensive experiments on several IR tasks and achieve SOTA performance while consuming less computational costs. Code is available at \url{https://github.com/Zj-BinXia/DiffIR}.
△ Less
Submitted 16 August, 2023; v1 submitted 16 March, 2023;
originally announced March 2023.
-
Local Search for Solving Satisfiability of Polynomial Formulas
Authors:
Haokun Li,
Bican Xia,
Tianqi Zhao
Abstract:
Satisfiability Modulo the Theory of Nonlinear Real Arithmetic, SMT(NRA) for short, concerns the satisfiability of polynomial formulas, which are quantifier-free Boolean combinations of polynomial equations and inequalities with integer coefficients and real variables. In this paper, we propose a local search algorithm for a special subclass of SMT(NRA), where all constraints are strict inequalitie…
▽ More
Satisfiability Modulo the Theory of Nonlinear Real Arithmetic, SMT(NRA) for short, concerns the satisfiability of polynomial formulas, which are quantifier-free Boolean combinations of polynomial equations and inequalities with integer coefficients and real variables. In this paper, we propose a local search algorithm for a special subclass of SMT(NRA), where all constraints are strict inequalities. An important fact is that, given a polynomial formula with $n$ variables, the zero level set of the polynomials in the formula decomposes the $n$-dimensional real space into finitely many components (cells) and every polynomial has constant sign in each cell. The key point of our algorithm is a new operation based on real root isolation, called cell-jump, which updates the current assignment along a given direction such that the assignment can `jump' from one cell to another. One cell-jump may adjust the values of several variables while traditional local search operations, such as flip for SAT and critical move for SMT(LIA), only change that of one variable. We also design a two-level operation selection to balance the success rate and efficiency. Furthermore, our algorithm can be easily generalized to a wider subclass of SMT(NRA) where polynomial equations linear with respect to some variable are allowed. Experiments show the algorithm is competitive with state-of-the-art SMT solvers, and performs particularly well on those formulas with high-degree polynomials.
△ Less
Submitted 21 March, 2023; v1 submitted 16 March, 2023;
originally announced March 2023.
-
DAA: A Delta Age AdaIN operation for age estimation via binary code transformer
Authors:
** Chen,
Xingpeng Zhang,
Ye Li,
Ju Tao,
Bin Xiao,
Bing Wang,
Zongjie Jiang
Abstract:
Naked eye recognition of age is usually based on comparison with the age of others. However, this idea is ignored by computer tasks because it is difficult to obtain representative contrast images of each age. Inspired by the transfer learning, we designed the Delta Age AdaIN (DAA) operation to obtain the feature difference with each age, which obtains the style map of each age through the learned…
▽ More
Naked eye recognition of age is usually based on comparison with the age of others. However, this idea is ignored by computer tasks because it is difficult to obtain representative contrast images of each age. Inspired by the transfer learning, we designed the Delta Age AdaIN (DAA) operation to obtain the feature difference with each age, which obtains the style map of each age through the learned values representing the mean and standard deviation. We let the input of transfer learning as the binary code of age natural number to obtain continuous age feature information. The learned two groups of values in Binary code map** are corresponding to the mean and standard deviation of the comparison ages. In summary, our method consists of four parts: FaceEncoder, DAA operation, Binary code map**, and AgeDecoder modules. After getting the delta age via AgeDecoder, we take the average value of all comparison ages and delta ages as the predicted age. Compared with state-of-the-art methods, our method achieves better performance with fewer parameters on multiple facial age datasets.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Collaborative Trolley Transportation System with Autonomous Nonholonomic Robots
Authors:
Bingyi Xia,
Hao Luan,
Ziqi Zhao,
Xuheng Gao,
Peijia Xie,
Anxing Xiao,
Jiankun Wang,
Max Q. -H. Meng
Abstract:
Cooperative object transportation using multiple robots has been intensively studied in the control and robotics literature, but most approaches are either only applicable to omnidirectional robots or lack a complete navigation and decision-making framework that operates in real time. This paper presents an autonomous nonholonomic multi-robot system and an end-to-end hierarchical autonomy framewor…
▽ More
Cooperative object transportation using multiple robots has been intensively studied in the control and robotics literature, but most approaches are either only applicable to omnidirectional robots or lack a complete navigation and decision-making framework that operates in real time. This paper presents an autonomous nonholonomic multi-robot system and an end-to-end hierarchical autonomy framework for collaborative luggage trolley transportation. This framework finds kinematic-feasible paths, computes online motion plans, and provides feedback that enables the multi-robot system to handle long lines of luggage trolleys and navigate obstacles and pedestrians while dealing with multiple inherently complex and coupled constraints. We demonstrate the designed collaborative trolley transportation system through practical transportation tasks, and the experiment results reveal their effectiveness and reliability in complex and dynamic environments.
△ Less
Submitted 21 July, 2023; v1 submitted 12 March, 2023;
originally announced March 2023.
-
Query-Utterance Attention with Joint modeling for Query-Focused Meeting Summarization
Authors:
Xingxian Liu,
Bin Duan,
Bo Xiao,
Ya**g Xu
Abstract:
Query-focused meeting summarization (QFMS) aims to generate summaries from meeting transcripts in response to a given query. Previous works typically concatenate the query with meeting transcripts and implicitly model the query relevance only at the token level with attention mechanism. However, due to the dilution of key query-relevant information caused by long meeting transcripts, the original…
▽ More
Query-focused meeting summarization (QFMS) aims to generate summaries from meeting transcripts in response to a given query. Previous works typically concatenate the query with meeting transcripts and implicitly model the query relevance only at the token level with attention mechanism. However, due to the dilution of key query-relevant information caused by long meeting transcripts, the original transformer-based model is insufficient to highlight the key parts related to the query. In this paper, we propose a query-aware framework with joint modeling token and utterance based on Query-Utterance Attention. It calculates the utterance-level relevance to the query with a dense retrieval module. Then both token-level query relevance and utterance-level query relevance are combined and incorporated into the generation process with attention mechanism explicitly. We show that the query relevance of different granularities contributes to generating a summary more related to the query. Experimental results on the QMSum dataset show that the proposed model achieves new state-of-the-art performance.
△ Less
Submitted 31 May, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
The Present and Future of QCD
Authors:
P. Achenbach,
D. Adhikari,
A. Afanasev,
F. Afzal,
C. A. Aidala,
A. Al-bataineh,
D. K. Almaalol,
M. Amaryan,
D. Androić,
W. R. Armstrong,
M. Arratia,
J. Arrington,
A. Asaturyan,
E. C. Aschenauer,
H. Atac,
H. Avakian,
T. Averett,
C. Ayerbe Gayoso,
X. Bai,
K. N. Barish,
N. Barnea,
G. Basar,
M. Battaglieri,
A. A. Baty,
I. Bautista
, et al. (378 additional authors not shown)
Abstract:
This White Paper presents the community inputs and scientific conclusions from the Hot and Cold QCD Town Meeting that took place September 23-25, 2022 at MIT, as part of the Nuclear Science Advisory Committee (NSAC) 2023 Long Range Planning process. A total of 424 physicists registered for the meeting. The meeting highlighted progress in Quantum Chromodynamics (QCD) nuclear physics since the 2015…
▽ More
This White Paper presents the community inputs and scientific conclusions from the Hot and Cold QCD Town Meeting that took place September 23-25, 2022 at MIT, as part of the Nuclear Science Advisory Committee (NSAC) 2023 Long Range Planning process. A total of 424 physicists registered for the meeting. The meeting highlighted progress in Quantum Chromodynamics (QCD) nuclear physics since the 2015 LRP (LRP15) and identified key questions and plausible paths to obtaining answers to those questions, defining priorities for our research over the coming decade. In defining the priority of outstanding physics opportunities for the future, both prospects for the short (~ 5 years) and longer term (5-10 years and beyond) are identified together with the facilities, personnel and other resources needed to maximize the discovery potential and maintain United States leadership in QCD physics worldwide. This White Paper is organized as follows: In the Executive Summary, we detail the Recommendations and Initiatives that were presented and discussed at the Town Meeting, and their supporting rationales. Section 2 highlights major progress and accomplishments of the past seven years. It is followed, in Section 3, by an overview of the physics opportunities for the immediate future, and in relation with the next QCD frontier: the EIC. Section 4 provides an overview of the physics motivations and goals associated with the EIC. Section 5 is devoted to the workforce development and support of diversity, equity and inclusion. This is followed by a dedicated section on computing in Section 6. Section 7 describes the national need for nuclear data science and the relevance to QCD research.
△ Less
Submitted 4 March, 2023;
originally announced March 2023.
-
Astrometric Apparent Motion of High-redshift Radio Sources
Authors:
Oleg Titov,
Sandor Frey,
Alexei Melnikov,
Fengchun Shu,
Bo Xia,
Javier Gonzalez,
Belen Tercero,
Leonid Gurvits,
Aletha de Witt,
Jamie McCallum,
Mikhail Kharinov,
Vladimir Zimovsky,
Mate Krezinger
Abstract:
Radio-loud quasars at high redshift (z > 4) are rare objects in the Universe and rarely observed with Very Long Baseline Interferometry (VLBI). But some of them have flux density sufficiently high for monitoring of their apparent position. The instability of the astrometric positions could be linked to the astrophysical process in the jetted active galactic nuclei in the early Universe. Regular ob…
▽ More
Radio-loud quasars at high redshift (z > 4) are rare objects in the Universe and rarely observed with Very Long Baseline Interferometry (VLBI). But some of them have flux density sufficiently high for monitoring of their apparent position. The instability of the astrometric positions could be linked to the astrophysical process in the jetted active galactic nuclei in the early Universe. Regular observations of the high-redshift quasars are used for estimating their apparent proper motion over several years. We have undertaken regular VLBI observations of several high-redshift quasars at 2.3 GHz (S band) and 8.4 GHz (X band) with a network of five radio telescopes: 40-m Yebes (Spain), 25-m Sheshan (China), and three 32-m telescopes of the Quasar VLBI Network (Russia) -- Svetloe, Zelenchukskaya, and Badary. Additional facilities joined this network occasionally. The sources have also been observed in three sessions with the European VLBI Network (EVN) in 2018--2019 and one Long Baseline Array (LBA) experiment in 2018. In addition, several experiments conducted with the Very Long Baseline Array (VLBA) in 2017--2018were used to improve the time sampling and the statistics. Based on these 37 astrometric VLBI experiments between 2017 and 2021, we estimated the apparent proper motions of four quasars: 0901+697, 1428+422, 1508+572, and 2101+600.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network
Authors:
Wenxuan Tu,
Bin Xiao,
Xinwang Liu,
Sihang Zhou,
Zhi** Cai,
Jieren Cheng
Abstract:
With the development of various applications, such as social networks and knowledge graphs, graph data has been ubiquitous in the real world. Unfortunately, graphs usually suffer from being absent due to privacy-protecting policies or copyright restrictions during data collection. The absence of graph data can be roughly categorized into attribute-incomplete and attribute-missing circumstances. Sp…
▽ More
With the development of various applications, such as social networks and knowledge graphs, graph data has been ubiquitous in the real world. Unfortunately, graphs usually suffer from being absent due to privacy-protecting policies or copyright restrictions during data collection. The absence of graph data can be roughly categorized into attribute-incomplete and attribute-missing circumstances. Specifically, attribute-incomplete indicates that a part of the attribute vectors of all nodes are incomplete, while attribute-missing indicates that the whole attribute vectors of partial nodes are missing. Although many efforts have been devoted, none of them is custom-designed for a common situation where both types of graph data absence exist simultaneously. To fill this gap, we develop a novel network termed Revisiting Initializing Then Refining (RITR), where we complete both attribute-incomplete and attribute-missing samples under the guidance of a novel initializing-then-refining imputation criterion. Specifically, to complete attribute-incomplete samples, we first initialize the incomplete attributes using Gaussian noise before network learning, and then introduce a structure-attribute consistency constraint to refine incomplete values by approximating a structure-attribute correlation matrix to a high-order structural matrix. To complete attribute-missing samples, we first adopt structure embeddings of attribute-missing samples as the embedding initialization, and then refine these initial values by adaptively aggregating the reliable information of attribute-incomplete samples according to a dynamic affinity structure. To the best of our knowledge, this newly designed method is the first unsupervised framework dedicated to handling hybrid-absent graphs. Extensive experiments on four datasets have verified that our methods consistently outperform existing state-of-the-art competitors.
△ Less
Submitted 15 February, 2023;
originally announced February 2023.
-
A tensor optimization algorithm for computing Lagrangians of hypergraphs
Authors:
**gya Chang,
Bin Xiao,
Xin Zhang
Abstract:
The Lagrangian of a hypergraph is a crucial tool for studying hypergraph extremal problems. Though Lagrangians of some special structure hypergraphs have closed-form solutions, it is a challenging problem to compute the Lagrangian of a general large scale hypergraph. In this paper, we exploit a fast computational scheme involving the adjacency tensor of a hypergraph. Furthermore, we propose to uti…
▽ More
The Lagrangian of a hypergraph is a crucial tool for studying hypergraph extremal problems. Though Lagrangians of some special structure hypergraphs have closed-form solutions, it is a challenging problem to compute the Lagrangian of a general large scale hypergraph. In this paper, we exploit a fast computational scheme involving the adjacency tensor of a hypergraph. Furthermore, we propose to utilize the gradient projection method on a simplex from nonlinear optimization for solving the Lagrangian of a large scale hypergraph iteratively. Using the Lojasiewicz gradient inequality, we analyze the global and local convergence of the gradient projection method. Numerical experiments illustrate that the proposed numerical method could compute Lagrangians of large scale hypergraphs efficiently.
△ Less
Submitted 12 February, 2023;
originally announced February 2023.
-
Topological materials or structures: Origin of higher-order topological states
Authors:
Shengjie Zheng,
Guiju Duan,
Jianting Liu,
Baizhan Xia
Abstract:
Higher-order topological states (HOTS) have been extensively investigated in classical wave systems. They do not exist in the band gaps of infinite materials, while exhibit as the in-gap localized modes once the infinite materials are truncated to be the finite structures. Here, we will experimentally reveal the origin of HOTSs in acoustic systems. We design the hollow acoustic structures exclusiv…
▽ More
Higher-order topological states (HOTS) have been extensively investigated in classical wave systems. They do not exist in the band gaps of infinite materials, while exhibit as the in-gap localized modes once the infinite materials are truncated to be the finite structures. Here, we will experimentally reveal the origin of HOTSs in acoustic systems. We design the hollow acoustic structures exclusively composed of hinge and corner resonators. We present the experimental proof that, despite the lack of surfaces and bulks, the hollow acoustic structures can still support the topologically protected hinge and corner states, indicating that the local configurations of boundaries are the sources for the generation of HOTSs. We then get the composite structures by assembling the 2D and 3D topological hollow acoustic structures, and experimentally observe the robust HOTSs in them. Our results provide a fundamental perspective on HOTSs in periodic structures, and we foresee that these findings will pave the way toward designing new topological devices for energy recovering, information processing, non-destructive testing and acoustic sensing.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
Inferred galaxy properties during Cosmic Dawn from early JWST photometry results
Authors:
Corey Brummel-Smith,
Danielle Skinner,
Snigdaa S. Sethuram,
John H. Wise,
Bin Xia,
Khushi Taori
Abstract:
Early photometric results from JWST have revealed a number of galaxy candidates above redshift 10. The initial estimates of inferred stellar masses and the associated cosmic star formation rates are above most theoretical model predictions up to a factor of 20 in the most extreme cases, while this has been moderated after the recalibration of NIRCam and subsequent spectroscopic detections. Using t…
▽ More
Early photometric results from JWST have revealed a number of galaxy candidates above redshift 10. The initial estimates of inferred stellar masses and the associated cosmic star formation rates are above most theoretical model predictions up to a factor of 20 in the most extreme cases, while this has been moderated after the recalibration of NIRCam and subsequent spectroscopic detections. Using these recent JWST observations, we use galaxy scaling relations from cosmological simulations to model the star formation history to very high redshifts, back to a starting halo mass of 10^7 solar masses, to infer the intrinsic properties of the JWST galaxies. Here we explore the contribution of supermassive black holes, stellar binaries, and an excess of massive stars to the overall luminosity of high-redshift galaxies. Despite the addition of alternative components to the spectral energy distribution, we find stellar masses equal to or slightly higher than previous stellar mass estimates. Most galaxy spectra are dominated by the stellar component, and the exact choice for the stellar population model does not appear to make a major difference. We find that four of the 12 high-redshift galaxy candidates are best fit with a non-negligible active galactic nuclei component, but the evidence from the continuum alone is insufficient to confirm their existence. Upcoming spectroscopic observations of z > 10 galaxies will confirm the presence and nature of high-energy sources in the early universe and will constrain their exact redshifts.
△ Less
Submitted 31 August, 2023; v1 submitted 9 February, 2023;
originally announced February 2023.
-
The second largest eigenvalue of normal Cayley graphs on symmetric groups generated by cycles
Authors:
Yuxuan Li,
Binzhou Xia,
Sanming Zhou
Abstract:
We study the normal Cayley graphs $\mathrm{Cay}(S_n, C(n,I))$ on the symmetric group $S_n$, where $I\subseteq \{2,3,\ldots,n\}$ and $C(n,I)$ is the set of all cycles in $S_n$ with length in $I$. We prove that the strictly second largest eigenvalue of $\mathrm{Cay}(S_n,C(n,I))$ can only be achieved by at most four irreducible representations of $S_n$, and we determine further the multiplicity of th…
▽ More
We study the normal Cayley graphs $\mathrm{Cay}(S_n, C(n,I))$ on the symmetric group $S_n$, where $I\subseteq \{2,3,\ldots,n\}$ and $C(n,I)$ is the set of all cycles in $S_n$ with length in $I$. We prove that the strictly second largest eigenvalue of $\mathrm{Cay}(S_n,C(n,I))$ can only be achieved by at most four irreducible representations of $S_n$, and we determine further the multiplicity of this eigenvalue in several special cases. As a corollary, in the case when $I$ contains neither $n-1$ nor $n$ we know exactly when $\mathrm{Cay}(S_n, C(n,I))$ has the Aldous property, namely the strictly second largest eigenvalue is attained by the standard representation of $S_n$, and we obtain that $\mathrm{Cay}(S_n, C(n,I))$ does not have the Aldous property whenever $n \in I$. As another corollary of our main results, we prove a recent conjecture on the second largest eigenvalue of $\mathrm{Cay}(S_n, C(n,\{k\}))$ where $2 \le k \le n-2$.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
First Detection of Radio Recombination Lines of Ions Heavier than Helium
Authors:
Xunchuan Liu,
Tie Liu,
Zhiqiang Shen,
Paul F. Goldsmith,
Neal J. Evans II,
Sheng-Li Qin,
Qiuyi Luo,
Yu Cheng,
Sheng-Yuan Liu,
Fengyao Zhu,
Ken'ichi Tatematsu,
Meizhu Liu,
Dongting Yang,
Chuanshou Li,
Li Cen,
Juan Li,
Xing Lu,
Qilao Gu,
Rongbing Zhao,
Bing Li,
Yajun Wu,
Weiye Zhong,
Zhang Zhao,
**qing Wang,
Qinghui Liu
, et al. (10 additional authors not shown)
Abstract:
We report the first detection of radio recombination lines (RRLs) of ions heavier than helium. In a highly sensitive multi-band (12--50 GHz) line survey toward Orion KL with the TianMa 65-m Radio Telescope (TMRT), we successfully detected more than fifteen unblended $α$ lines of RRLs of singly ionized species (XII) recombined from XIII. The Ka-band (35--50 GHz) spectrum also shows tentative signal…
▽ More
We report the first detection of radio recombination lines (RRLs) of ions heavier than helium. In a highly sensitive multi-band (12--50 GHz) line survey toward Orion KL with the TianMa 65-m Radio Telescope (TMRT), we successfully detected more than fifteen unblended $α$ lines of RRLs of singly ionized species (XII) recombined from XIII. The Ka-band (35--50 GHz) spectrum also shows tentative signals of $β$ lines of ions. The detected lines can be successfully crossmatched with the the rest frequencies of RRLs of CII and/or OII. This finding greatly expands the connotation of ion RRLs, since before this work only two blended lines (105$α$ and 121$α$) of HeII had been reported. Our detected lines can be fitted simultaneously under assumption of local thermodynamic equilibrium (LTE). An abundance of CIII and OIII of 8.8$\times$10$^{-4}$ is obtained, avoiding the complexities of optical/infrared observations and the blending of RRLs of atoms. It is consistent with but approaches the upper bound of the value (10$^{-4}$--$10^{-3}$) estimated from optical/infrared observations. The effects of dielectronic recombination may contribute to enhancing the level populations even at large $n$. We expect future observations using radio interferometers could break the degeneracy between C and O, and help to reveal the ionization structure and dynamical evolution of various ionized regions.
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
VLBI astrometry on the white dwarf pulsar AR Scorpii
Authors:
Pengfei Jiang,
Lang Cui,
Jun Yang,
Bo Zhang,
Shuang**g Xu,
Fengchun Shu,
Wu Jiang,
Wen Chen,
Guanghui Li,
Bo Xia,
Stuart Weston,
Sergei Gulyaev,
Hongmin Cao,
Xiang Liu,
Tao An
Abstract:
AR Scorpii (AR Sco), the only-known radio-pulsing white dwarf binary, shows unusual pulsating emission at the radio, infrared, optical and ultraviolet bands. To determine its astrometric parameters at the radio band independently, we conducted multi-epoch Very Long Baseline Interferometry (VLBI) phase-referencing observations with the European VLBI Network (EVN) at 5 GHz and the Chinese VLBI Netwo…
▽ More
AR Scorpii (AR Sco), the only-known radio-pulsing white dwarf binary, shows unusual pulsating emission at the radio, infrared, optical and ultraviolet bands. To determine its astrometric parameters at the radio band independently, we conducted multi-epoch Very Long Baseline Interferometry (VLBI) phase-referencing observations with the European VLBI Network (EVN) at 5 GHz and the Chinese VLBI Network (CVN) plus the Warkworth 30-metre telescope (New Zealand) at 8.6 GHz. By using the differential VLBI astrometry, we provide high-precision astrometric measurements on the parallax ($π=8.52_{-0.07}^{+0.04}$ mas), and proper motion ($μ_α=9.48_{-0.07}^{+0.04}$ mas yr$^{-1}$, $μ_δ=-51.32_{-0.38}^{+0.22}$ mas yr$^{-1}$). The new VLBI results agree with the optical Gaia astrometry. Our kinematic analysis reveals that the Galactic space velocities of AR Sco are quite consistent with that of both intermediate polars (IPs) and polars. Combined with the previous tightest VLBI constraint on the size, our parallax distance suggests that the radio emission of AR Sco should be located within the light cylinder of its white dwarf.
△ Less
Submitted 31 January, 2023;
originally announced January 2023.
-
SSR-TA: Sequence to Sequence based expert recurrent recommendation for ticket automation
Authors:
Chenhan Cao,
Xiaoyu Fang,
Bingqing Luo,
Bin Xia
Abstract:
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of tickets, inappropriate assignments will make tickets transfer frequently among experts, which causes time delays and wasted resources. Effectively and efficiently finding an appropriate ex…
▽ More
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of tickets, inappropriate assignments will make tickets transfer frequently among experts, which causes time delays and wasted resources. Effectively and efficiently finding an appropriate expert in fewer steps is vital to ticket automation. In this paper, we proposed a sequence to sequence based translation model combined with a recurrent recommendation network to recommend appropriate experts for tickets. The sequence to sequence model transforms the ticket description into the corresponding resolution for capturing the potential and useful features of representing tickets. The recurrent recommendation network recommends the appropriate expert based on the assumption that the previous expert in the recommendation sequence cannot solve the expert. To evaluate the performance, we conducted experiments to compare several baselines with SSR-TA on two real-world datasets, and the experimental results show that our proposed model outperforms the baselines. The comparative experiment results also show that SSR-TA has a better performance of expert recommendations for user-generated tickets.
△ Less
Submitted 29 January, 2023;
originally announced January 2023.
-
Weakly Supervised Image Segmentation Beyond Tight Bounding Box Annotations
Authors:
Juan Wang,
Bin Xia
Abstract:
Weakly supervised image segmentation approaches in the literature usually achieve high segmentation performance using tight bounding box supervision and decrease the performance greatly when supervised by loose bounding boxes. However, compared with loose bounding box, it is much more difficult to acquire tight bounding box due to its strict requirements on the precise locations of the four sides…
▽ More
Weakly supervised image segmentation approaches in the literature usually achieve high segmentation performance using tight bounding box supervision and decrease the performance greatly when supervised by loose bounding boxes. However, compared with loose bounding box, it is much more difficult to acquire tight bounding box due to its strict requirements on the precise locations of the four sides of the box. To resolve this issue, this study investigates whether it is possible to maintain good segmentation performance when loose bounding boxes are used as supervision. For this purpose, this work extends our previous parallel transformation based multiple instance learning (MIL) for tight bounding box supervision by integrating an MIL strategy based on polar transformation to assist image segmentation. The proposed polar transformation based MIL formulation works for both tight and loose bounding boxes, in which a positive bag is defined as pixels in a polar line of a bounding box with one endpoint located inside the object enclosed by the box and the other endpoint located at one of the four sides of the box. Moreover, a weighted smooth maximum approximation is introduced to incorporate the observation that pixels closer to the origin of the polar transformation are more likely to belong to the object in the box. The proposed approach was evaluated on two public datasets using dice coefficient when bounding boxes at different precision levels were considered in the experiments. The results demonstrate that the proposed approach achieves state-of-the-art performance for bounding boxes at all precision levels and is robust to mild and moderate errors in the loose bounding box annotations. The codes are available at \url{https://github.com/wangjuan313/wsis-beyond-tightBB}.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Towards Concrete and Connected AI Risk Assessment (C$^2$AIRA): A Systematic Map** Study
Authors:
Boming Xia,
Qinghua Lu,
Harsha Perera,
Liming Zhu,
Zhenchang Xing,
Yue Liu,
Jon Whittle
Abstract:
The rapid development of artificial intelligence (AI) has led to increasing concerns about the capability of AI systems to make decisions and behave responsibly. Responsible AI (RAI) refers to the development and use of AI systems that benefit humans, society, and the environment while minimising the risk of negative consequences. To ensure responsible AI, the risks associated with AI systems' dev…
▽ More
The rapid development of artificial intelligence (AI) has led to increasing concerns about the capability of AI systems to make decisions and behave responsibly. Responsible AI (RAI) refers to the development and use of AI systems that benefit humans, society, and the environment while minimising the risk of negative consequences. To ensure responsible AI, the risks associated with AI systems' development and use must be identified, assessed and mitigated. Various AI risk assessment frameworks have been released recently by governments, organisations, and companies. However, it can be challenging for AI stakeholders to have a clear picture of the available frameworks and determine the most suitable ones for a specific context. Additionally, there is a need to identify areas that require further research or development of new frameworks, as well as updating and maintaining existing ones. To fill the gap, we present a map** study of 16 existing AI risk assessment frameworks from the industry, governments, and non-government organizations (NGOs). We identify key characteristics of each framework and analyse them in terms of RAI principles, stakeholders, system lifecycle stages, geographical locations, targeted domains, and assessment methods. Our study provides a comprehensive analysis of the current state of the frameworks and highlights areas of convergence and divergence among them. We also identify the deficiencies in existing frameworks and outlines the essential characteristics of a concrete and connected framework AI risk assessment (C$^2$AIRA) framework. Our findings and insights can help relevant stakeholders choose suitable AI risk assessment frameworks and guide the design of future frameworks towards concreteness and connectedness.
△ Less
Submitted 23 May, 2023; v1 submitted 27 January, 2023;
originally announced January 2023.
-
Isolating Bounded and Unbounded Real Roots of a Mixed Trigonometric-Polynomial
Authors:
Rizeng Chen,
Haokun Li,
Bican Xia,
Tianqi Zhao,
Tao Zheng
Abstract:
Mixed trigonometric-polynomials (MTPs) are functions of the form $f(x,\sin{x}, \cos{x})$ with $f\in\mathbb{Q}[x_1,x_2,x_3]$. In this paper, an algorithm ``isolating" all the real roots of an MTP is provided and implemented. It automatically divides the real roots into two parts: one consists of finitely many ``bounded" roots in an interval $[μ_-,μ_+]$ while the other consists of probably countably…
▽ More
Mixed trigonometric-polynomials (MTPs) are functions of the form $f(x,\sin{x}, \cos{x})$ with $f\in\mathbb{Q}[x_1,x_2,x_3]$. In this paper, an algorithm ``isolating" all the real roots of an MTP is provided and implemented. It automatically divides the real roots into two parts: one consists of finitely many ``bounded" roots in an interval $[μ_-,μ_+]$ while the other consists of probably countably many ``periodic" roots in $\mathbb{R}\backslash[μ_-,μ_+]$. For bounded roots, the algorithm returns isolating intervals and corresponding multiplicities while for periodic roots, it returns finitely many mutually disjoint small intervals $I_i\subset[-π,π]$, integers $c_i>0$ and multisets of root multiplicity $\{m_{j,i}\}_{j=1}^{c_i}$ such that any periodic root $t>μ_+$ is in the set $(\sqcup_i\cup_{k\in\mathbb{N}}(I_i+2kπ))$ and any interval $I_i+2kπ\subset(μ_+,\infty)$ contains exactly $c_i$ periodic roots with multiplicities $m_{1,i},...,m_{c_i,i}$, respectively. The effectiveness and efficiency of the algorithm are shown by experiments. %In particular, our results indicate that the ``distributions" of the roots of an MTP in the ``periods" $(-π,π]+2kπ$ sufficiently far from $0$ share a same pattern. Besides, the method used to isolate the roots in $[μ_-,μ_+]$ is applicable to any other bounded interval as well. The algorithm takes advantages of the weak Fourier sequence technique and deals with the intervals period-by-period without scaling the coordinate so to keep the length of the sequence short. The new approaches can easily be modified to decide whether there is any root, or whether there are infinitely many roots in unbounded intervals of the form $(-\infty,a)$ or $(a,\infty)$ with $a\in\mathbb{Q}$.
△ Less
Submitted 14 January, 2023;
originally announced January 2023.
-
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead
Authors:
Boming Xia,
Tingting Bi,
Zhenchang Xing,
Qinghua Lu,
Liming Zhu
Abstract:
The rapid growth of software supply chain attacks has attracted considerable attention to software bill of materials (SBOM). SBOMs are a crucial building block to ensure the transparency of software supply chains that helps improve software supply chain security. Although there are significant efforts from academia and industry to facilitate SBOM development, it is still unclear how practitioners…
▽ More
The rapid growth of software supply chain attacks has attracted considerable attention to software bill of materials (SBOM). SBOMs are a crucial building block to ensure the transparency of software supply chains that helps improve software supply chain security. Although there are significant efforts from academia and industry to facilitate SBOM development, it is still unclear how practitioners perceive SBOMs and what are the challenges of adopting SBOMs in practice. Furthermore, existing SBOM-related studies tend to be ad-hoc and lack software engineering focuses. To bridge this gap, we conducted the first empirical study to interview and survey SBOM practitioners. We applied a mixed qualitative and quantitative method for gathering data from 17 interviewees and 65 survey respondents from 15 countries across five continents to understand how practitioners perceive the SBOM field. We summarized 26 statements and grouped them into three topics on SBOM's states of practice. Based on the study results, we derived a goal model and highlighted future directions where practitioners can put in their effort.
△ Less
Submitted 7 February, 2023; v1 submitted 12 January, 2023;
originally announced January 2023.
-
Overview of the Observing System and Initial Scientific Accomplishments of the East Asian VLBI Network (EAVN)
Authors:
Kazunori Akiyama,
Juan-Carlos Algaba,
Tao An,
Keiichi Asada,
Kitiyanee Asanok,
Do-Young Byun,
Thanapol Chanapote,
Wen Chen,
Zhong Chen,
Xiaopeng Cheng,
James O. Chibueze,
Ilje Cho,
Se-Hyung Cho,
Hyun-Soo Chung,
Lang Cui,
Yuzhu Cui,
Akihiro Doi,
Jian Dong,
Kenta Fujisawa,
Wei Gou,
Wen Guo,
Kazuhiro Hada,
Yoshiaki Hagiwara,
Tomoya Hirota,
Jeffrey A. Hodgson
, et al. (79 additional authors not shown)
Abstract:
The East Asian VLBI Network (EAVN) is an international VLBI facility in East Asia and is operated under mutual collaboration between East Asian countries, as well as part of Southeast Asian and European countries. EAVN currently consists of 16 radio telescopes and three correlators located in China, Japan, and Korea, and is operated mainly at three frequency bands, 6.7, 22, and 43 GHz with the lon…
▽ More
The East Asian VLBI Network (EAVN) is an international VLBI facility in East Asia and is operated under mutual collaboration between East Asian countries, as well as part of Southeast Asian and European countries. EAVN currently consists of 16 radio telescopes and three correlators located in China, Japan, and Korea, and is operated mainly at three frequency bands, 6.7, 22, and 43 GHz with the longest baseline length of 5078 km, resulting in the highest angular resolution of 0.28 milliarcseconds at 43 GHz. One of distinct capabilities of EAVN is multi-frequency simultaneous data reception at nine telescopes, which enable us to employ the frequency phase transfer technique to obtain better sensitivity at higher observing frequencies. EAVN started its open-use program in the second half of 2018, providing a total observing time of more than 1100 hours in a year. EAVN fills geographical gap in global VLBI array, resulting in enabling us to conduct contiguous high-resolution VLBI observations. EAVN has produced various scientific accomplishments especially in observations toward active galactic nuclei, evolved stars, and star-forming regions. These activities motivate us to initiate launch of the 'Global VLBI Alliance' to provide an opportunity of VLBI observation with the longest baselines on the earth.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Ultrasensitive Measurement of Angular Rotations via Hermite-Gaussian Pointer
Authors:
Binke Xia,
**gzheng Huang,
Hong**g Li,
Miaomiao Liu,
Tailong Xiao,
Chen Fang,
Guihua Zeng
Abstract:
Exploring high sensitivity on the measurement of angular rotations is an outstanding challenge in optics and metrology. In this work, we employ the mn-order Hermite-Gaussian beam in the weak measurement scheme with an angular rotation interaction, where the rotation information is taken by another HG mode state completely after the post-selection. By taking a projective measurement on the final li…
▽ More
Exploring high sensitivity on the measurement of angular rotations is an outstanding challenge in optics and metrology. In this work, we employ the mn-order Hermite-Gaussian beam in the weak measurement scheme with an angular rotation interaction, where the rotation information is taken by another HG mode state completely after the post-selection. By taking a projective measurement on the final light beam, the precision of angular rotation is improved by a factor of 2mn+m+n. For verification, we perform an optical experiment where the minimum detectable angular rotation improves $\sqrt{15}$-fold with HG55 mode over that of HG11 mode, and achieves a sub-microradian scale of the measurement precision. Our theoretical framework and experimental results not only provide a more practical and convenient scheme for ultrasensitive measurement of angular rotations, but also contribute to a wide range of applications in quantum metrology.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
Asymptotic enumeration of graphical regular representations
Authors:
Binzhou Xia,
Shasha Zheng
Abstract:
We estimate the number of graphical regular representations (GRRs) of a given group with large enough order. As a consequence, we show that almost all finite Cayley graphs have full automorphism groups 'as small as possible'. This confirms a conjecture of Babai-Godsil-Imrich-Lovasz on the proportion of GRRs, as well as a conjecture of Xu on the proportion of normal Cayley graphs, among Cayley grap…
▽ More
We estimate the number of graphical regular representations (GRRs) of a given group with large enough order. As a consequence, we show that almost all finite Cayley graphs have full automorphism groups 'as small as possible'. This confirms a conjecture of Babai-Godsil-Imrich-Lovasz on the proportion of GRRs, as well as a conjecture of Xu on the proportion of normal Cayley graphs, among Cayley graphs of a given finite group.
△ Less
Submitted 29 July, 2023; v1 submitted 4 December, 2022;
originally announced December 2022.
-
Knowledge Distillation based Degradation Estimation for Blind Super-Resolution
Authors:
Bin Xia,
Yulun Zhang,
Yitong Wang,
Yapeng Tian,
Wenming Yang,
Radu Timofte,
Luc Van Gool
Abstract:
Blind image super-resolution (Blind-SR) aims to recover a high-resolution (HR) image from its corresponding low-resolution (LR) input image with unknown degradations. Most of the existing works design an explicit degradation estimator for each degradation to guide SR. However, it is infeasible to provide concrete labels of multiple degradation combinations (e.g., blur, noise, jpeg compression) to…
▽ More
Blind image super-resolution (Blind-SR) aims to recover a high-resolution (HR) image from its corresponding low-resolution (LR) input image with unknown degradations. Most of the existing works design an explicit degradation estimator for each degradation to guide SR. However, it is infeasible to provide concrete labels of multiple degradation combinations (e.g., blur, noise, jpeg compression) to supervise the degradation estimator training. In addition, these special designs for certain degradation, such as blur, impedes the models from being generalized to handle different degradations. To this end, it is necessary to design an implicit degradation estimator that can extract discriminative degradation representation for all degradations without relying on the supervision of degradation ground-truth. In this paper, we propose a Knowledge Distillation based Blind-SR network (KDSR). It consists of a knowledge distillation based implicit degradation estimator network (KD-IDE) and an efficient SR network. To learn the KDSR model, we first train a teacher network: KD-IDE$_{T}$. It takes paired HR and LR patches as inputs and is optimized with the SR network jointly. Then, we further train a student network KD-IDE$_{S}$, which only takes LR images as input and learns to extract the same implicit degradation representation (IDR) as KD-IDE$_{T}$. In addition, to fully use extracted IDR, we design a simple, strong, and efficient IDR based dynamic convolution residual block (IDR-DCRB) to build an SR network. We conduct extensive experiments under classic and real-world degradation settings. The results show that KDSR achieves SOTA performance and can generalize to various degradation processes. The source codes and pre-trained models will be released.
△ Less
Submitted 16 February, 2023; v1 submitted 30 November, 2022;
originally announced November 2022.
-
ARISE: Graph Anomaly Detection on Attributed Networks via Substructure Awareness
Authors:
**gcan Duan,
Bin Xiao,
Siwei Wang,
Haifang Zhou,
Xinwang Liu
Abstract:
Recently, graph anomaly detection on attributed networks has attracted growing attention in data mining and machine learning communities. Apart from attribute anomalies, graph anomaly detection also aims at suspicious topological-abnormal nodes that exhibit collective anomalous behavior. Closely connected uncorrelated node groups form uncommonly dense substructures in the network. However, existin…
▽ More
Recently, graph anomaly detection on attributed networks has attracted growing attention in data mining and machine learning communities. Apart from attribute anomalies, graph anomaly detection also aims at suspicious topological-abnormal nodes that exhibit collective anomalous behavior. Closely connected uncorrelated node groups form uncommonly dense substructures in the network. However, existing methods overlook that the topology anomaly detection performance can be improved by recognizing such a collective pattern. To this end, we propose a new graph anomaly detection framework on attributed networks via substructure awareness (ARISE for abbreviation). Unlike previous algorithms, we focus on the substructures in the graph to discern abnormalities. Specifically, we establish a region proposal module to discover high-density substructures in the network as suspicious regions. The average node-pair similarity can be regarded as the topology anomaly degree of nodes within substructures. Generally, the lower the similarity, the higher the probability that internal nodes are topology anomalies. To distill better embeddings of node attributes, we further introduce a graph contrastive learning scheme, which observes attribute anomalies in the meantime. In this way, ARISE can detect both topology and attribute anomalies. Ultimately, extensive experiments on benchmark datasets show that ARISE greatly improves detection performance (up to 7.30% AUC and 17.46% AUPRC gains) compared to state-of-the-art attributed networks anomaly detection (ANAD) algorithms.
△ Less
Submitted 30 September, 2023; v1 submitted 28 November, 2022;
originally announced November 2022.
-
EAVN Astrometry toward the Extreme Outer Galaxy: Kinematic distance with the proper motion of G034.84-00.95
Authors:
Nobuyuki Sakai,
Bo Zhang,
Shuang**g Xu,
Daisuke Sakai,
Yoshiaki Tamura,
Takaaki Jike,
Taehyun Jung,
Chungsik Oh,
Jeong-Sook Kim,
Noriyuki Kawaguchi,
Hiroshi Imai,
Wu Jiang,
Lang Cui,
Soon-Wook Kim,
Pengfei Jiang,
Tomoharu Kurayama,
Jeong Ae Lee,
Kazuya Hachisuka,
Dong-Kyu Jung,
Bo Xia,
Guanghui Li,
Mareki Honma,
Kee-Tae Kim,
Zhi-Qiang Shen,
Na Wang
Abstract:
We aim to reveal the structure and kinematics of the Outer-Scutum-Centaurus (OSC) arm located on the far side of the Milky Way through very long baseline interferometry (VLBI) astrometry using KaVA, which is composed of KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). We report the proper motion of a 22 GHz H$_{2}$O maser source, which is associated with the star-forming…
▽ More
We aim to reveal the structure and kinematics of the Outer-Scutum-Centaurus (OSC) arm located on the far side of the Milky Way through very long baseline interferometry (VLBI) astrometry using KaVA, which is composed of KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). We report the proper motion of a 22 GHz H$_{2}$O maser source, which is associated with the star-forming region G034.84$-$00.95, to be ($μ_α \rm{cos}δ$, $μ_δ$) = ($-$1.61$\pm$0.18, $-$4.29$\pm$0.16) mas yr$^{-1}$ in equatorial coordinates (J2000). We estimate the 2D kinematic distance to the source to be 18.6$\pm$1.0 kpc, which is derived from the variance-weighted average of kinematic distances with LSR velocity and the Galactic-longitude component of the measured proper motion. Our result places the source in the OSC arm and implies that G034.84$-$00.95 is moving away from the Galactic plane with a vertical velocity of $-$38$\pm$16 km s$^{-1}$. Since the H I supershell GS033+06$-$49 is located at a kinematic distance roughly equal to that of G034.84$-$00.95, it is expected that gas circulation occurs between the outer Galactic disk around G034.84$-$00.95 with a Galactocentric distance of 12.8$^{+1.0}_{-0.9}$ kpc and halo. We evaluate possible origins of the fast vertical motion of G034.84$-$00.95, which are (1) supernova explosions and (2) cloud collisions with the Galactic disk. However, neither of the possibilities are matched with the results of VLBI astrometry as well as spatial distributions of H II regions and H I gas.
△ Less
Submitted 22 November, 2022;
originally announced November 2022.
-
A 2030 United States Macro Grid Unlocking Geographical Diversity to Accomplish Clean Energy Goals
Authors:
Yixing Xu,
Daniel Olsen,
Bainan Xia,
Dan Livengood,
Victoria Hunt,
Yifan Li,
Lane Smith
Abstract:
Some U.S. states have set clean energy goals and targets in an effort to decarbonize their electricity sectors. There are many reasons for such goals and targets, including the increasingly apparent effects of climate change. A handful of states (Washington, California, New York, and Virginia) are aiming for deep decarbonization by 2050 or earlier, a mere 30 years or less from today. The urgency o…
▽ More
Some U.S. states have set clean energy goals and targets in an effort to decarbonize their electricity sectors. There are many reasons for such goals and targets, including the increasingly apparent effects of climate change. A handful of states (Washington, California, New York, and Virginia) are aiming for deep decarbonization by 2050 or earlier, a mere 30 years or less from today. The urgency of substantial carbon emissions reduction (50% or more by 2030) needed to avoid catastrophic climate impacts requires even more ambitious efforts than some of the original targets (e.g., a 30% renewable portfolio standard) set for between now and 2030. With the cost of solar and wind energy falling faster than expected in recent years, economics are also driving rapid expansion of clean energy investments. With this in mind, this report examines combinations of interregional AC and High-Voltage DC (HVDC) transmission upgrades and additions to evaluate the benefits of large-scale transmission expansion.
△ Less
Submitted 18 November, 2022;
originally announced November 2022.
-
Forward Inclusive Jet Productions in pA Collisions
Authors:
Lei Wang,
Lin Chen,
Zhan Gao,
Yu Shi,
Shu-Yi Wei,
Bo-Wen Xiao
Abstract:
Motivated by recent experimental LHC measurements on the forward inclusive jet productions and based on our previous calculations on forward hadron productions, we calculate single inclusive jet cross-section in $pA$ collisions at forward rapidity within the color glass condensate framework up to the next-to-leading-order. Moreover, with the application of jet algorithm and proper subtraction of t…
▽ More
Motivated by recent experimental LHC measurements on the forward inclusive jet productions and based on our previous calculations on forward hadron productions, we calculate single inclusive jet cross-section in $pA$ collisions at forward rapidity within the color glass condensate framework up to the next-to-leading-order. Moreover, with the application of jet algorithm and proper subtraction of the rapidity and collinear divergences, we further demonstrate that the resulting next-to-leading-order hard coefficients are finite. In addition, in order to deal with the large logarithms that can potentially spoil the convergence of the perturbative expansion and improve the reliability of the numerical predictions, we introduce the collinear jet function and the threshold jet function and resum these large logarithms hidden in the hard coefficients.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Efficient Information Sharing in ICT Supply Chain Social Network via Table Structure Recognition
Authors:
Bin Xiao,
Yakup Akkaya,
Murat Simsek,
Burak Kantarci,
Ala Abu Alkheir
Abstract:
The global Information and Communications Technology (ICT) supply chain is a complex network consisting of all types of participants. It is often formulated as a Social Network to discuss the supply chain network's relations, properties, and development in supply chain management. Information sharing plays a crucial role in improving the efficiency of the supply chain, and datasheets are the most…
▽ More
The global Information and Communications Technology (ICT) supply chain is a complex network consisting of all types of participants. It is often formulated as a Social Network to discuss the supply chain network's relations, properties, and development in supply chain management. Information sharing plays a crucial role in improving the efficiency of the supply chain, and datasheets are the most common data format to describe e-component commodities in the ICT supply chain because of human readability. However, with the surging number of electronic documents, it has been far beyond the capacity of human readers, and it is also challenging to process tabular data automatically because of the complex table structures and heterogeneous layouts. Table Structure Recognition (TSR) aims to represent tables with complex structures in a machine-interpretable format so that the tabular data can be processed automatically. In this paper, we formulate TSR as an object detection problem and propose to generate an intuitive representation of a complex table structure to enable structuring of the tabular data related to the commodities. To cope with border-less and small layouts, we propose a cost-sensitive loss function by considering the detection difficulty of each class. Besides, we propose a novel anchor generation method using the character of tables that columns in a table should share an identical height, and rows in a table should share the same width. We implement our proposed method based on Faster-RCNN and achieve 94.79% on mean Average Precision (AP), and consistently improve more than 1.5% AP for different benchmark models.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Harmonics of Parton Saturation in Lepton-Jet Correlations at the EIC
Authors:
Xuan-Bo Tong,
Bo-Wen Xiao,
Yuan-Yuan Zhang
Abstract:
Parton saturation is one of the most intriguing phenomena in the high energy nuclear physics research frontier, especially in the upcoming era of the Electron-Ion Collider (EIC). The lepton-jet correlation in deep inelastic scattering provides us with a new gateway to the parton saturation at the EIC. In particular, we demonstrate that azimuthal angle anisotropies of the lepton-jet correlation are…
▽ More
Parton saturation is one of the most intriguing phenomena in the high energy nuclear physics research frontier, especially in the upcoming era of the Electron-Ion Collider (EIC). The lepton-jet correlation in deep inelastic scattering provides us with a new gateway to the parton saturation at the EIC. In particular, we demonstrate that azimuthal angle anisotropies of the lepton-jet correlation are sensitive to the strength of the saturation momentum in the EIC kinematic region. In contrast to the predictions based on the collinear framework calculation, significant nuclear modification of the anisotropies is observed when we compare the saturation physics results in e + p and e + Au scatterings. By measuring these harmonic coefficients at the EIC, one can conduct quantitative analysis in different collisional systems and unveil compelling evidence for saturation effects.
△ Less
Submitted 22 March, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Performance Analysis of the Full-Duplex Communicating-Radar Convergence System
Authors:
Yinghong Guo,
Cheng Li,
Chaoxian Zhang,
Yao Yao,
Bin Xia
Abstract:
This paper aims to explore the feasibility of the spectrum sharing between the communication and radar system. We investigate the full-duplex (FD) joint radar and communication multi-antenna system in which a node labeled ComRad with a dual communication and radar capability is communicating with a downlink and an uplink users, as well as detecting the target of interest simultaneously. Considerin…
▽ More
This paper aims to explore the feasibility of the spectrum sharing between the communication and radar system. We investigate the full-duplex (FD) joint radar and communication multi-antenna system in which a node labeled ComRad with a dual communication and radar capability is communicating with a downlink and an uplink users, as well as detecting the target of interest simultaneously. Considering a full interference scenario and imperfect channel state information (CSI), the fundamental performance limits of the FD JRC system are analyzed. In particular, we first obtain the downlink rate when the radar signals act as interference. Then, viewing the uplink channel and radar return channel as a multiple access channel, we propose an alternative successive interference cancellation scheme, based on which the achievable uplink communication rate is obtained. For the radar operation, we first derive the general expression of the estimation rate, which quantifies how much information is obtained about the target in terms of the direction, the range and the velocity. Considering the uniform linear antenna array and linear frequency modulated radar signals, we further obtain the exact closed-form estimation rate. Numerical simulations reveal that the joint manner of the communication and radar operations achieves larger rate regions compared to that of working independently.
△ Less
Submitted 22 October, 2022;
originally announced October 2022.