-
Algebraic description of complex conjugation on cohomology of a smooth projective hypersurface
Authors:
Jeehoon Park,
Junyeong Park,
Philsang Yoo
Abstract:
We describe complex conjugation on the primitive middle-dimensional algebraic de Rham cohomology of a smooth projective hypersurface defined over a number field that admits a real embedding. We use Griffiths' description of the cohomology in terms of a Jacobian ring. The resulting description is algebraic up to transcendental factors explicitly given by certain periods.
We describe complex conjugation on the primitive middle-dimensional algebraic de Rham cohomology of a smooth projective hypersurface defined over a number field that admits a real embedding. We use Griffiths' description of the cohomology in terms of a Jacobian ring. The resulting description is algebraic up to transcendental factors explicitly given by certain periods.
△ Less
Submitted 5 April, 2024; v1 submitted 22 February, 2024;
originally announced February 2024.
-
Empirical and Experimental Perspectives on Big Data in Recommendation Systems: A Comprehensive Survey
Authors:
Kamal Taha,
Paul D. Yoo,
Aya Taha
Abstract:
This survey paper provides a comprehensive analysis of big data algorithms in recommendation systems, addressing the lack of depth and precision in existing literature. It proposes a two-pronged approach: a thorough analysis of current algorithms and a novel, hierarchical taxonomy for precise categorization. The taxonomy is based on a tri-level hierarchy, starting with the methodology category and…
▽ More
This survey paper provides a comprehensive analysis of big data algorithms in recommendation systems, addressing the lack of depth and precision in existing literature. It proposes a two-pronged approach: a thorough analysis of current algorithms and a novel, hierarchical taxonomy for precise categorization. The taxonomy is based on a tri-level hierarchy, starting with the methodology category and narrowing down to specific techniques. Such a framework allows for a structured and comprehensive classification of algorithms, assisting researchers in understanding the interrelationships among diverse algorithms and techniques. Covering a wide range of algorithms, this taxonomy first categorizes algorithms into four main analysis types: User and Item Similarity-Based Methods, Hybrid and Combined Approaches, Deep Learning and Algorithmic Methods, and Mathematical Modeling Methods, with further subdivisions into sub-categories and techniques. The paper incorporates both empirical and experimental evaluations to differentiate between the techniques. The empirical evaluation ranks the techniques based on four criteria. The experimental assessments rank the algorithms that belong to the same category, sub-category, technique, and sub-technique. Also, the paper illuminates the future prospects of big data techniques in recommendation systems, underscoring potential advancements and opportunities for further research in this field
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Text Classification: A Review, Empirical, and Experimental Evaluation
Authors:
Kamal Taha,
Paul D. Yoo,
Chan Yeun,
Aya Taha
Abstract:
The explosive and widespread growth of data necessitates the use of text classification to extract crucial information from vast amounts of data. Consequently, there has been a surge of research in both classical and deep learning text classification methods. Despite the numerous methods proposed in the literature, there is still a pressing need for a comprehensive and up-to-date survey. Existing…
▽ More
The explosive and widespread growth of data necessitates the use of text classification to extract crucial information from vast amounts of data. Consequently, there has been a surge of research in both classical and deep learning text classification methods. Despite the numerous methods proposed in the literature, there is still a pressing need for a comprehensive and up-to-date survey. Existing survey papers categorize algorithms for text classification into broad classes, which can lead to the misclassification of unrelated algorithms and incorrect assessments of their qualities and behaviors using the same metrics. To address these limitations, our paper introduces a novel methodological taxonomy that classifies algorithms hierarchically into fine-grained classes and specific techniques. The taxonomy includes methodology categories, methodology techniques, and methodology sub-techniques. Our study is the first survey to utilize this methodological taxonomy for classifying algorithms for text classification. Furthermore, our study also conducts empirical evaluation and experimental comparisons and rankings of different algorithms that employ the same specific sub-technique, different sub-techniques within the same technique, different techniques within the same category, and categories
△ Less
Submitted 11 January, 2024;
originally announced January 2024.
-
Neural Bounding
Authors:
Stephanie Wenxin Liu,
Michael Fischer,
Paul D. Yoo,
Tobias Ritschel
Abstract:
Bounding volumes are an established concept in computer graphics and vision tasks but have seen little change since their early inception. In this work, we study the use of neural networks as bounding volumes. Our key observation is that bounding, which so far has primarily been considered a problem of computational geometry, can be redefined as a problem of learning to classify space into free or…
▽ More
Bounding volumes are an established concept in computer graphics and vision tasks but have seen little change since their early inception. In this work, we study the use of neural networks as bounding volumes. Our key observation is that bounding, which so far has primarily been considered a problem of computational geometry, can be redefined as a problem of learning to classify space into free or occupied. This learning-based approach is particularly advantageous in high-dimensional spaces, such as animated scenes with complex queries, where neural networks are known to excel. However, unlocking neural bounding requires a twist: allowing -- but also limiting -- false positives, while ensuring that the number of false negatives is strictly zero. We enable such tight and conservative results using a dynamically-weighted asymmetric loss function. Our results show that our neural bounding produces up to an order of magnitude fewer false positives than traditional methods. In addition, we propose an extension of our bounding method using early exits that accelerates query speeds by 25%. We also demonstrate that our approach is applicable to non-deep learning models that train within seconds. Our project page is at: https://wenxin-liu.github.io/neural_bounding/.
△ Less
Submitted 24 May, 2024; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Suspicion-Agent: Playing Imperfect Information Games with Theory of Mind Aware GPT-4
Authors:
Jiaxian Guo,
Bo Yang,
Paul Yoo,
Bill Yuchen Lin,
Yusuke Iwasawa,
Yutaka Matsuo
Abstract:
Unlike perfect information games, where all elements are known to every player, imperfect information games emulate the real-world complexities of decision-making under uncertain or incomplete information. GPT-4, the recent breakthrough in large language models (LLMs) trained on massive passive data, is notable for its knowledge retrieval and reasoning abilities. This paper delves into the applica…
▽ More
Unlike perfect information games, where all elements are known to every player, imperfect information games emulate the real-world complexities of decision-making under uncertain or incomplete information. GPT-4, the recent breakthrough in large language models (LLMs) trained on massive passive data, is notable for its knowledge retrieval and reasoning abilities. This paper delves into the applicability of GPT-4's learned knowledge for imperfect information games. To achieve this, we introduce \textbf{Suspicion-Agent}, an innovative agent that leverages GPT-4's capabilities for performing in imperfect information games. With proper prompt engineering to achieve different functions, Suspicion-Agent based on GPT-4 demonstrates remarkable adaptability across a range of imperfect information card games. Importantly, GPT-4 displays a strong high-order theory of mind (ToM) capacity, meaning it can understand others and intentionally impact others' behavior. Leveraging this, we design a planning strategy that enables GPT-4 to competently play against different opponents, adapting its gameplay style as needed, while requiring only the game rules and descriptions of observations as input. In the experiments, we qualitatively showcase the capabilities of Suspicion-Agent across three different imperfect information games and then quantitatively evaluate it in Leduc Hold'em. The results show that Suspicion-Agent can potentially outperform traditional algorithms designed for imperfect information games, without any specialized training or examples. In order to encourage and foster deeper insights within the community, we make our game-related data publicly available.
△ Less
Submitted 6 October, 2023; v1 submitted 29 September, 2023;
originally announced September 2023.
-
GenDOM: Generalizable One-shot Deformable Object Manipulation with Parameter-Aware Policy
Authors:
So Kuroki,
Jiaxian Guo,
Tatsuya Matsushima,
Takuya Okubo,
Masato Kobayashi,
Yuya Ikeda,
Ryosuke Takanami,
Paul Yoo,
Yutaka Matsuo,
Yusuke Iwasawa
Abstract:
Due to the inherent uncertainty in their deformability during motion, previous methods in deformable object manipulation, such as rope and cloth, often required hundreds of real-world demonstrations to train a manipulation policy for each object, which hinders their applications in our ever-changing world. To address this issue, we introduce GenDOM, a framework that allows the manipulation policy…
▽ More
Due to the inherent uncertainty in their deformability during motion, previous methods in deformable object manipulation, such as rope and cloth, often required hundreds of real-world demonstrations to train a manipulation policy for each object, which hinders their applications in our ever-changing world. To address this issue, we introduce GenDOM, a framework that allows the manipulation policy to handle different deformable objects with only a single real-world demonstration. To achieve this, we augment the policy by conditioning it on deformable object parameters and training it with a diverse range of simulated deformable objects so that the policy can adjust actions based on different object parameters. At the time of inference, given a new object, GenDOM can estimate the deformable object parameters with only a single real-world demonstration by minimizing the disparity between the grid density of point clouds of real-world demonstrations and simulations in a differentiable physics simulator. Empirical validations on both simulated and real-world object manipulation setups clearly show that our method can manipulate different objects with a single demonstration and significantly outperforms the baseline in both environments (a 62% improvement for in-domain ropes and a 15% improvement for out-of-distribution ropes in simulation, as well as a 26% improvement for ropes and a 50% improvement for cloths in the real world), demonstrating the effectiveness of our approach in one-shot deformable object manipulation.
△ Less
Submitted 23 February, 2024; v1 submitted 16 September, 2023;
originally announced September 2023.
-
3-dimensional mirror symmetry
Authors:
Ben Webster,
Philsang Yoo
Abstract:
This expository article discusses recent advances in understanding 3-dimensional mirror symmetry and the mathematical definitions of the Higgs and Coulomb branches. This is a slightly expanded version of an article appearing in the Notices of the AMS.
This expository article discusses recent advances in understanding 3-dimensional mirror symmetry and the mathematical definitions of the Higgs and Coulomb branches. This is a slightly expanded version of an article appearing in the Notices of the AMS.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
GenORM: Generalizable One-shot Rope Manipulation with Parameter-Aware Policy
Authors:
So Kuroki,
Jiaxian Guo,
Tatsuya Matsushima,
Takuya Okubo,
Masato Kobayashi,
Yuya Ikeda,
Ryosuke Takanami,
Paul Yoo,
Yutaka Matsuo,
Yusuke Iwasawa
Abstract:
Due to the inherent uncertainty in their deformability during motion, previous methods in rope manipulation often require hundreds of real-world demonstrations to train a manipulation policy for each rope, even for simple tasks such as rope goal reaching, which hinder their applications in our ever-changing world. To address this issue, we introduce GenORM, a framework that allows the manipulation…
▽ More
Due to the inherent uncertainty in their deformability during motion, previous methods in rope manipulation often require hundreds of real-world demonstrations to train a manipulation policy for each rope, even for simple tasks such as rope goal reaching, which hinder their applications in our ever-changing world. To address this issue, we introduce GenORM, a framework that allows the manipulation policy to handle different deformable ropes with a single real-world demonstration. To achieve this, we augment the policy by conditioning it on deformable rope parameters and training it with a diverse range of simulated deformable ropes so that the policy can adjust actions based on different rope parameters. At the time of inference, given a new rope, GenORM estimates the deformable rope parameters by minimizing the disparity between the grid density of point clouds of real-world demonstrations and simulations. With the help of a differentiable physics simulator, we require only a single real-world demonstration. Empirical validations on both simulated and real-world rope manipulation setups clearly show that our method can manipulate different ropes with a single demonstration and significantly outperforms the baseline in both environments (62% improvement in in-domain ropes, and 15% improvement in out-of-distribution ropes in simulation, 26% improvement in real-world), demonstrating the effectiveness of our approach in one-shot rope manipulation.
△ Less
Submitted 19 June, 2023; v1 submitted 13 June, 2023;
originally announced June 2023.
-
Paste, Inpaint and Harmonize via Denoising: Subject-Driven Image Editing with Pre-Trained Diffusion Model
Authors:
Xin Zhang,
Jiaxian Guo,
Paul Yoo,
Yutaka Matsuo,
Yusuke Iwasawa
Abstract:
Text-to-image generative models have attracted rising attention for flexible image editing via user-specified descriptions. However, text descriptions alone are not enough to elaborate the details of subjects, often compromising the subjects' identity or requiring additional per-subject fine-tuning. We introduce a new framework called \textit{Paste, Inpaint and Harmonize via Denoising} (PhD), whic…
▽ More
Text-to-image generative models have attracted rising attention for flexible image editing via user-specified descriptions. However, text descriptions alone are not enough to elaborate the details of subjects, often compromising the subjects' identity or requiring additional per-subject fine-tuning. We introduce a new framework called \textit{Paste, Inpaint and Harmonize via Denoising} (PhD), which leverages an exemplar image in addition to text descriptions to specify user intentions. In the pasting step, an off-the-shelf segmentation model is employed to identify a user-specified subject within an exemplar image which is subsequently inserted into a background image to serve as an initialization capturing both scene context and subject identity in one. To guarantee the visual coherence of the generated or edited image, we introduce an inpainting and harmonizing module to guide the pre-trained diffusion model to seamlessly blend the inserted subject into the scene naturally. As we keep the pre-trained diffusion model frozen, we preserve its strong image synthesis ability and text-driven ability, thus achieving high-quality results and flexible editing with diverse texts. In our experiments, we apply PhD to both subject-driven image editing tasks and explore text-driven scene generation given a reference subject. Both quantitative and qualitative comparisons with baseline methods demonstrate that our approach achieves state-of-the-art performance in both tasks. More qualitative results can be found at \url{https://sites.google.com/view/phd-demo-page}.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
DreamSparse: Esca** from Plato's Cave with 2D Frozen Diffusion Model Given Sparse Views
Authors:
Paul Yoo,
Jiaxian Guo,
Yutaka Matsuo,
Shixiang Shane Gu
Abstract:
Synthesizing novel view images from a few views is a challenging but practical problem. Existing methods often struggle with producing high-quality results or necessitate per-object optimization in such few-view settings due to the insufficient information provided. In this work, we explore leveraging the strong 2D priors in pre-trained diffusion models for synthesizing novel view images. 2D diffu…
▽ More
Synthesizing novel view images from a few views is a challenging but practical problem. Existing methods often struggle with producing high-quality results or necessitate per-object optimization in such few-view settings due to the insufficient information provided. In this work, we explore leveraging the strong 2D priors in pre-trained diffusion models for synthesizing novel view images. 2D diffusion models, nevertheless, lack 3D awareness, leading to distorted image synthesis and compromising the identity. To address these problems, we propose DreamSparse, a framework that enables the frozen pre-trained diffusion model to generate geometry and identity-consistent novel view image. Specifically, DreamSparse incorporates a geometry module designed to capture 3D features from sparse views as a 3D prior. Subsequently, a spatial guidance model is introduced to convert these 3D feature maps into spatial information for the generative process. This information is then used to guide the pre-trained diffusion model, enabling it to generate geometrically consistent images without tuning it. Leveraging the strong image priors in the pre-trained diffusion models, DreamSparse is capable of synthesizing high-quality novel views for both object and scene-level images and generalising to open-set images. Experimental results demonstrate that our framework can effectively synthesize novel view images from sparse views and outperforms baselines in both trained and open-set category images. More results can be found on our project page: https://sites.google.com/view/dreamsparse-webpage.
△ Less
Submitted 16 June, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
High Pressure and Temperature Neural Network Reactive Force Field for Energetic Materials
Authors:
Brenden W. Hamilton,
Pilsun Yoo,
Michael N. Sakano,
Md Mahbubul Islam,
Alejandro Strachan
Abstract:
Reactive force fields for molecular dynamics have enabled a wide range of studies in numerous material classes. These force fields are computationally inexpensive as compared to electronic structure calculations and allow for simulations of millions of atoms. However, the accuracy of traditional force fields is limited by their functional forms, preventing continual refinement and improvement. The…
▽ More
Reactive force fields for molecular dynamics have enabled a wide range of studies in numerous material classes. These force fields are computationally inexpensive as compared to electronic structure calculations and allow for simulations of millions of atoms. However, the accuracy of traditional force fields is limited by their functional forms, preventing continual refinement and improvement. Therefore, we develop a neural network based reactive interatomic potential for the prediction of the mechanical, thermal, and chemical response of energetic materials at extreme conditions for energetic materials. The training set is expanded in an automatic iterative approach and consists of various CHNO materials and their reactions under ambient and under shock loading conditions. This new potential shows improved accuracy over the current state of the art force fields for a wide range of properties such as detonation performance, decomposition product formation, and vibrational spectra under ambient and shock loading conditions.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Time-Travel Rephotography
Authors:
Xuan Luo,
Xuaner Zhang,
Paul Yoo,
Ricardo Martin-Brualla,
Jason Lawrence,
Steven M. Seitz
Abstract:
Many historical people were only ever captured by old, faded, black and white photos, that are distorted due to the limitations of early cameras and the passage of time. This paper simulates traveling back in time with a modern camera to rephotograph famous subjects. Unlike conventional image restoration filters which apply independent operations like denoising, colorization, and superresolution,…
▽ More
Many historical people were only ever captured by old, faded, black and white photos, that are distorted due to the limitations of early cameras and the passage of time. This paper simulates traveling back in time with a modern camera to rephotograph famous subjects. Unlike conventional image restoration filters which apply independent operations like denoising, colorization, and superresolution, we leverage the StyleGAN2 framework to project old photos into the space of modern high-resolution photos, achieving all of these effects in a unified framework. A unique challenge with this approach is retaining the identity and pose of the subject in the original photo, while discarding the many artifacts frequently seen in low-quality antique photos. Our comparisons to current state-of-the-art restoration filters show significant improvements and compelling results for a variety of important historical people.
△ Less
Submitted 13 December, 2021; v1 submitted 22 December, 2020;
originally announced December 2020.
-
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms
Authors:
Song-Kyoo Kim,
Chan Yeob Yeun,
Paul D. Yoo,
Nai-Wei Lo,
Ernesto Damiani
Abstract:
Deep learning applied to electrocardiogram (ECG) data can be used to achieve personal authentication in biometric security applications, but it has not been widely used to diagnose cardiovascular disorders. We developed a deep learning model for the detection of arrhythmia in which time-sliced ECG data representing the distance between successive R-peaks are used as the input for a convolutional n…
▽ More
Deep learning applied to electrocardiogram (ECG) data can be used to achieve personal authentication in biometric security applications, but it has not been widely used to diagnose cardiovascular disorders. We developed a deep learning model for the detection of arrhythmia in which time-sliced ECG data representing the distance between successive R-peaks are used as the input for a convolutional neural network (CNN). The main objective is develo** the compact deep learning based detect system which minimally uses the dataset but delivers the confident accuracy rate of the Arrhythmia detection. This compact system can be implemented in wearable devices or real-time monitoring equipment because the feature extraction step is not required for complex ECG waveforms, only the R-peak data is needed. The results of both tests indicated that the Compact Arrhythmia Detection System (CADS) matched the performance of conventional systems for the detection of arrhythmia in two consecutive test runs. All features of the CADS are fully implemented and publicly available in MATLAB.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
Quantum Geometric Langlands Categories from N = 4 Super Yang-Mills Theory
Authors:
Chris Elliott,
Philsang Yoo
Abstract:
We describe the family of supersymmetric twists of $\mathcal N = 4$ super Yang--Mills theory using derived algebraic geometry, starting from holomorphic Chern--Simons theory on $ \mathcal N = 4$ super twistor space. By considering an ansatz for categorical geometric quantization of the family of further twists of a fixed holomorphic twist, we give a quantum field-theoretic synthesis of the categor…
▽ More
We describe the family of supersymmetric twists of $\mathcal N = 4$ super Yang--Mills theory using derived algebraic geometry, starting from holomorphic Chern--Simons theory on $ \mathcal N = 4$ super twistor space. By considering an ansatz for categorical geometric quantization of the family of further twists of a fixed holomorphic twist, we give a quantum field-theoretic synthesis of the categories of twisted D-modules occuring in the quantum geometric Langlands correspondence.
△ Less
Submitted 22 February, 2024; v1 submitted 25 August, 2020;
originally announced August 2020.
-
Twisted S-Duality
Authors:
Surya Raghavendran,
Philsang Yoo
Abstract:
S-duality is a nontrivial self-duality of type IIB string theory that exchanges strong and weak coupling. We give a mathematically rigorous description of how S-duality acts on a low-energy supersymmetry-protected sector of IIB string theory, using a conjectural description of such protected sectors in terms of topological string theory. We then give some applications which are of relevance to Geo…
▽ More
S-duality is a nontrivial self-duality of type IIB string theory that exchanges strong and weak coupling. We give a mathematically rigorous description of how S-duality acts on a low-energy supersymmetry-protected sector of IIB string theory, using a conjectural description of such protected sectors in terms of topological string theory. We then give some applications which are of relevance to Geometric Langlands Theory and the representation theory of the Yangian.
△ Less
Submitted 29 October, 2019;
originally announced October 2019.
-
Dispersionless Integrable Hierarchy via Kodaira-Spencer Gravity
Authors:
Weiqiang He,
Si Li,
Xinxing Tang,
Philsang Yoo
Abstract:
We explain how dispersionless integrable hierarchy in 2d topological field theory arises from the Kodaira-Spencer gravity (BCOV theory). The infinitely many commuting Hamiltonians are given by the current observables associated to the infinite abelian symmetries of the Kodaira-Spencer gravity. We describe a BV framework of effective field theories that leads to the B-model interpretation of disper…
▽ More
We explain how dispersionless integrable hierarchy in 2d topological field theory arises from the Kodaira-Spencer gravity (BCOV theory). The infinitely many commuting Hamiltonians are given by the current observables associated to the infinite abelian symmetries of the Kodaira-Spencer gravity. We describe a BV framework of effective field theories that leads to the B-model interpretation of dispersionless integrable hierarchy.
△ Less
Submitted 12 October, 2019;
originally announced October 2019.
-
An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms
Authors:
Amang Song-Kyoo Kim,
Chan Yeob Yeun,
Paul D. Yoo
Abstract:
This paper is targeted in the area of biometric data enabled security system based on the machine learning for the digital health. The disadvantages of traditional authentication systems include the risks of forgetfulness, loss, and theft. Biometric authentication is therefore rapidly replacing traditional authentication methods and is becoming an everyday part of life. The electrocardiogram (ECG)…
▽ More
This paper is targeted in the area of biometric data enabled security system based on the machine learning for the digital health. The disadvantages of traditional authentication systems include the risks of forgetfulness, loss, and theft. Biometric authentication is therefore rapidly replacing traditional authentication methods and is becoming an everyday part of life. The electrocardiogram (ECG) was recently introduced as a biometric authentication system suitable for security checks. The proposed authentication system helps investigators studying ECG-based biometric authentication techniques to reshape input data by slicing based on the RR-interval, and defines the Overall Performance (OP), which is the combined performance metric of multiple authentication measures. We evaluated the performance of the proposed system using a confusion matrix and achieved up to 95% accuracy by compact data analysis. We also used the Amang ECG (amgecg) toolbox in MATLAB to investigate the upper-range control limit (UCL) based on the mean square error, which directly affects three authentication performance metrics: the accuracy, the number of accepted samples, and the OP. Using this approach, we found that the OP can be optimized by using a UCL of 0.0028, which indicates 61 accepted samples out of 70 and ensures that the proposed authentication system achieves an accuracy of 95%.
△ Less
Submitted 30 November, 2019; v1 submitted 27 July, 2019;
originally announced July 2019.
-
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning
Authors:
Ebrahim Al Alkeem,
Song-Kyoo Kim,
Chan Yeob Yeun,
M. Jamal Zemerly,
Kin Poon,
Paul D. Yoo
Abstract:
Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require "something you know and something you have". The disadvantages of these systems include the risks of forgetfulness, loss, and theft. To address these shortcomings, biometric authentication is rapidly replacing traditional authentication methods and is becoming a part of everyday life.…
▽ More
Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require "something you know and something you have". The disadvantages of these systems include the risks of forgetfulness, loss, and theft. To address these shortcomings, biometric authentication is rapidly replacing traditional authentication methods and is becoming a part of everyday life. The electrocardiogram (ECG) is one of the most recent traits considered for biometric purposes. In this work we describe an ECG-based authentication system suitable for security checks and hospital environments. The proposed system will help investigators studying ECG-based biometric authentication techniques to define dataset boundaries and to acquire high-quality training data. We evaluated the performance of the proposed system and found that it could achieve up to the 92 percent identification accuracy. In addition, by applying the Amang ECG (amgecg) toolbox within MATLAB, we investigated the two parameters that directly affect the accuracy of authentication: the ECG slicing time (sliding window) and the sampling time period, and found their optimal values.
△ Less
Submitted 24 September, 2019; v1 submitted 30 June, 2019;
originally announced July 2019.
-
A Physical Origin for Singular Support Conditions in Geometric Langlands Theory
Authors:
Chris Elliott,
Philsang Yoo
Abstract:
We explain how the nilpotent singular support condition introduced into the geometric Langlands conjecture by Arinkin and Gaitsgory arises naturally from the point of view of N = 4 supersymmetric gauge theory. We define what it means in topological quantum field theory to restrict a category of boundary conditions to the full subcategory of objects compatible with a fixed choice of vacuum, both in…
▽ More
We explain how the nilpotent singular support condition introduced into the geometric Langlands conjecture by Arinkin and Gaitsgory arises naturally from the point of view of N = 4 supersymmetric gauge theory. We define what it means in topological quantum field theory to restrict a category of boundary conditions to the full subcategory of objects compatible with a fixed choice of vacuum, both in functorial field theory and in the language of factorization algebras. For B-twisted N = 4 gauge theory with gauge group G, the moduli space of vacua is equivalent to h*/W , and the nilpotent singular support condition arises by restricting to the vacuum 0 in h*/W. We then investigate the categories obtained by restricting to points in larger strata, and conjecture that these categories are equivalent to the geometric Langlands categories with gauge symmetry broken to a Levi subgroup, and furthermore that by assembling such for the groups GL_n for all positive integers n one finds a hidden factorization structure for the geometric Langlands theory.
△ Less
Submitted 15 January, 2019; v1 submitted 5 July, 2017;
originally announced July 2017.
-
Assembly of 3D plasmonic metamolecules by 2D AFM nanomanipulation of highly uniform and smooth gold nanospheres
Authors:
Kyung ** Park,
Ji-Hyeok Huh,
Dae-Woong Jung,
**-Sung Park,
Gwan H. Choi,
Gaehang Lee,
Pil J. Yoo,
Hong-Gyu Park,
Gi-Ra Yi,
Seungwoo Lee
Abstract:
Atomic force microscopy (AFM) nanomanipulation has been viewed as a deterministic method for the assembly of plasmonic metamolecules because it enables unprecedented engineering of clusters with exquisite control over particle number and geometry. Nevertheless, the dimensionality of plasmonic metamolecules via AFM nanomanipulation is limited to 2D, so as to restrict the design space of available a…
▽ More
Atomic force microscopy (AFM) nanomanipulation has been viewed as a deterministic method for the assembly of plasmonic metamolecules because it enables unprecedented engineering of clusters with exquisite control over particle number and geometry. Nevertheless, the dimensionality of plasmonic metamolecules via AFM nanomanipulation is limited to 2D, so as to restrict the design space of available artificial electromagnetisms. Here, we show that 2D nanomanipulation of the AFM tip can be used to assemble 3D plasmonic metamolecules in a versatile and deterministic way by dribbling highly spherical and smooth gold nanospheres (NSs) on a nanohole template rather than on a flat surface. Various 3D plasmonic clusters with controlled symmetry were successfully assembled with nanometer precision, the relevant 3D plasmonic modes (i.e., artificial magnetism and magnetic-based Fano resonance) were fully rationalized by both numerical calculation and dark-field spectroscopy. This templating strategy for advancing AFM nanomanipulation can be generalized to exploit the fundamental understanding of various electromagnetic 3D couplings and can serve as the basis for the design of metamolecules, metafluids, and metamaterials.
△ Less
Submitted 25 March, 2017;
originally announced March 2017.
-
Asymptotic Freedom in the BV Formalism
Authors:
Chris Elliott,
Brian Williams,
Philsang Yoo
Abstract:
We define the beta-function of a perturbative quantum field theory in the mathematical framework introduced by Costello -- combining perturbative renormalization and the BV formalism -- as the cohomology class of a certain element in the obstruction-deformation complex. We show that the one-loop beta-function is a well-defined element of the local deformation complex for translation-invariant and…
▽ More
We define the beta-function of a perturbative quantum field theory in the mathematical framework introduced by Costello -- combining perturbative renormalization and the BV formalism -- as the cohomology class of a certain element in the obstruction-deformation complex. We show that the one-loop beta-function is a well-defined element of the local deformation complex for translation-invariant and classically scale-invariant theories, and furthermore that it is locally constant as a function on the space of classical interactions and computable as a rescaling anomaly, or as the logarithmic one-loop counterterm. We compute the one-loop beta-function in first-order Yang--Mills theory, recovering the famous asymptotic freedom for Yang--Mills in a mathematical context.
△ Less
Submitted 30 March, 2017; v1 submitted 20 February, 2017;
originally announced February 2017.
-
Degenerate Classical Field Theories and Boundary Theories
Authors:
Dylan Butson,
Philsang Yoo
Abstract:
We introduce a framework for degenerate classical field theories in the BV formalism, which allows us to discuss many interesting examples of theories which do not admit a Lagrangian description. Further, we study phase spaces and boundary conditions for classical field theories on manifolds with boundary, and from a fixed classical field theory together with a choice of boundary condition, constr…
▽ More
We introduce a framework for degenerate classical field theories in the BV formalism, which allows us to discuss many interesting examples of theories which do not admit a Lagrangian description. Further, we study phase spaces and boundary conditions for classical field theories on manifolds with boundary, and from a fixed classical field theory together with a choice of boundary condition, construct a degenerate classical field theory on the boundary. We apply these ideas to many physically interesting examples including the Kapustin-Witten twists of N=4 supersymmetric Yang-Mills, Chern-Simons theory, the chiral Wess-Zumino-Witten model, chiral Toda theory, and a new 3d classical field theory called Whittaker theory.
△ Less
Submitted 4 January, 2017; v1 submitted 1 November, 2016;
originally announced November 2016.
-
Geometric Langlands Twists of N = 4 Gauge Theory from Derived Algebraic Geometry
Authors:
Chris Elliott,
Philsang Yoo
Abstract:
We develop techniques for describing the derived moduli spaces of solutions to the equations of motion in twists of supersymmetric gauge theories as derived algebraic stacks. We introduce a holomorphic twist of N=4 supersymmetric gauge theory and compute the derived moduli space. We then compute the moduli spaces for the Kapustin-Witten topological twists as its further twists. The resulting space…
▽ More
We develop techniques for describing the derived moduli spaces of solutions to the equations of motion in twists of supersymmetric gauge theories as derived algebraic stacks. We introduce a holomorphic twist of N=4 supersymmetric gauge theory and compute the derived moduli space. We then compute the moduli spaces for the Kapustin-Witten topological twists as its further twists. The resulting spaces for the A- and B-twist are closely related to the de Rham stack of the moduli space of algebraic bundles and the de Rham moduli space of flat bundles, respectively. In particular, we find the unexpected result that the moduli spaces following a topological twist need not be entirely topological, but can continue to capture subtle algebraic structures of interest for the geometric Langlands program.
△ Less
Submitted 30 July, 2018; v1 submitted 10 July, 2015;
originally announced July 2015.
-
Efficient Machine Learning for Big Data: A Review
Authors:
O. Y. Al-Jarrah,
P. D. Yoo,
S Muhaidat,
G. K. Karagiannidis,
K. Taha
Abstract:
With the emerging technologies and all associated devices, it is predicted that massive amount of data will be created in the next few years, in fact, as much as 90% of current data were created in the last couple of years,a trend that will continue for the foreseeable future. Sustainable computing studies the process by which computer engineer/scientist designs computers and associated subsystems…
▽ More
With the emerging technologies and all associated devices, it is predicted that massive amount of data will be created in the next few years, in fact, as much as 90% of current data were created in the last couple of years,a trend that will continue for the foreseeable future. Sustainable computing studies the process by which computer engineer/scientist designs computers and associated subsystems efficiently and effectively with minimal impact on the environment. However, current intelligent machine-learning systems are performance driven, the focus is on the predictive/classification accuracy, based on known properties learned from the training samples. For instance, most machine-learning-based nonparametric models are known to require high computational cost in order to find the global optima. With the learning task in a large dataset, the number of hidden nodes within the network will therefore increase significantly, which eventually leads to an exponential rise in computational complexity. This paper thus reviews the theoretical and experimental data-modeling literature, in large-scale data-intensive fields, relating to: (1) model efficiency, including computational requirements in learning, and data-intensive areas structure and design, and introduces (2) new algorithmic approaches with the least memory requirements and processing to minimize computational cost, while maintaining/improving its predictive/classification accuracy and stability.
△ Less
Submitted 18 March, 2015;
originally announced March 2015.