-
Wearable Sensor-Based Few-Shot Continual Learning on Hand Gestures for Motor-Impaired Individuals via Latent Embedding Exploitation
Authors:
Riyad Bin Rafiq,
Weishi Shi,
Mark V. Albert
Abstract:
Hand gestures can provide a natural means of human-computer interaction and enable people who cannot speak to communicate efficiently. Existing hand gesture recognition methods heavily depend on pre-defined gestures, however, motor-impaired individuals require new gestures tailored to each individual's gesture motion and style. Gesture samples collected from different persons have distribution shi…
▽ More
Hand gestures can provide a natural means of human-computer interaction and enable people who cannot speak to communicate efficiently. Existing hand gesture recognition methods heavily depend on pre-defined gestures, however, motor-impaired individuals require new gestures tailored to each individual's gesture motion and style. Gesture samples collected from different persons have distribution shifts due to their health conditions, the severity of the disability, motion patterns of the arms, etc. In this paper, we introduce the Latent Embedding Exploitation (LEE) mechanism in our replay-based Few-Shot Continual Learning (FSCL) framework that significantly improves the performance of fine-tuning a model for out-of-distribution data. Our method produces a diversified latent feature space by leveraging a preserved latent embedding known as gesture prior knowledge, along with intra-gesture divergence derived from two additional embeddings. Thus, the model can capture latent statistical structure in highly variable gestures with limited samples. We conduct an experimental evaluation using the SmartWatch Gesture and the Motion Gesture datasets. The proposed method results in an average test accuracy of 57.0%, 64.6%, and 69.3% by using one, three, and five samples for six different gestures. Our method helps motor-impaired persons leverage wearable devices, and their unique styles of movement can be learned and applied in human-computer interaction and social communication. Code is available at: https://github.com/riyadRafiq/wearable-latent-embedding-exploitation
△ Less
Submitted 11 June, 2024; v1 submitted 14 May, 2024;
originally announced May 2024.
-
Learning in Online Principal-Agent Interactions: The Power of Menus
Authors:
Minbiao Han,
Michael Albert,
Haifeng Xu
Abstract:
We study a ubiquitous learning challenge in online principal-agent problems during which the principal learns the agent's private information from the agent's revealed preferences in historical interactions. This paradigm includes important special cases such as pricing and contract design, which have been widely studied in recent literature. However, existing work considers the case where the pri…
▽ More
We study a ubiquitous learning challenge in online principal-agent problems during which the principal learns the agent's private information from the agent's revealed preferences in historical interactions. This paradigm includes important special cases such as pricing and contract design, which have been widely studied in recent literature. However, existing work considers the case where the principal can only choose a single strategy at every round to interact with the agent and then observe the agent's revealed preference through their actions. In this paper, we extend this line of study to allow the principal to offer a menu of strategies to the agent and learn additionally from observing the agent's selection from the menu. We provide a thorough investigation of several online principal-agent problem settings and characterize their sample complexities, accompanied by the corresponding algorithms we have developed. We instantiate this paradigm to several important design problems $-$ including Stackelberg (security) games, contract design, and information design. Finally, we also explore the connection between our findings and existing results about online learning in Stackelberg games, and we offer a solution that can overcome a key hard instance of Peng et al. (2019).
△ Less
Submitted 28 December, 2023; v1 submitted 15 December, 2023;
originally announced December 2023.
-
Gene-SGAN: a method for discovering disease subtypes with imaging and genetic signatures via multi-view weakly-supervised deep clustering
Authors:
Zhijian Yang,
Junhao Wen,
Ahmed Abdulkadir,
Yuhan Cui,
Guray Erus,
Elizabeth Mamourian,
Randa Melhem,
Dhivya Srinivasan,
Sindhuja T. Govindarajan,
Jiong Chen,
Mohamad Habes,
Colin L. Masters,
Paul Maruff,
Jurgen Fripp,
Luigi Ferrucci,
Marilyn S. Albert,
Sterling C. Johnson,
John C. Morris,
Pamela LaMontagne,
Daniel S. Marcus,
Tammie L. S. Benzinger,
David A. Wolk,
Li Shen,
**gxuan Bao,
Susan M. Resnick
, et al. (3 additional authors not shown)
Abstract:
Disease heterogeneity has been a critical challenge for precision diagnosis and treatment, especially in neurologic and neuropsychiatric diseases. Many diseases can display multiple distinct brain phenotypes across individuals, potentially reflecting disease subtypes that can be captured using MRI and machine learning methods. However, biological interpretability and treatment relevance are limite…
▽ More
Disease heterogeneity has been a critical challenge for precision diagnosis and treatment, especially in neurologic and neuropsychiatric diseases. Many diseases can display multiple distinct brain phenotypes across individuals, potentially reflecting disease subtypes that can be captured using MRI and machine learning methods. However, biological interpretability and treatment relevance are limited if the derived subtypes are not associated with genetic drivers or susceptibility factors. Herein, we describe Gene-SGAN - a multi-view, weakly-supervised deep clustering method - which dissects disease heterogeneity by jointly considering phenotypic and genetic data, thereby conferring genetic correlations to the disease subtypes and associated endophenotypic signatures. We first validate the generalizability, interpretability, and robustness of Gene-SGAN in semi-synthetic experiments. We then demonstrate its application to real multi-site datasets from 28,858 individuals, deriving subtypes of Alzheimer's disease and brain endophenotypes associated with hypertension, from MRI and SNP data. Derived brain phenotypes displayed significant differences in neuroanatomical patterns, genetic determinants, biological and clinical biomarkers, indicating potentially distinct underlying neuropathologic processes, genetic drivers, and susceptibility factors. Overall, Gene-SGAN is broadly applicable to disease subty** and endophenotype discovery, and is herein tested on disease-related, genetically-driven neuroimaging phenotypes.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
Electrocardiographic Deep Learning for Predicting Post-Procedural Mortality
Authors:
David Ouyang,
John Theurer,
Nathan R. Stein,
J. Weston Hughes,
Pierre Elias,
Bryan He,
Neal Yuan,
Grant Duffy,
Roopinder K. Sandhu,
Joseph Ebinger,
Patrick Botting,
Melvin Jujjavarapu,
Brian Claggett,
James E. Tooley,
Tim Poterucha,
Jonathan H. Chen,
Michael Nurok,
Marco Perez,
Adler Perotte,
James Y. Zou,
Nancy R. Cook,
Sumeet S. Chugh,
Susan Cheng,
Christine M. Albert
Abstract:
Background. Pre-operative risk assessments used in clinical practice are limited in their ability to identify risk for post-operative mortality. We hypothesize that electrocardiograms contain hidden risk markers that can help prognosticate post-operative mortality. Methods. In a derivation cohort of 45,969 pre-operative patients (age 59+- 19 years, 55 percent women), a deep learning algorithm was…
▽ More
Background. Pre-operative risk assessments used in clinical practice are limited in their ability to identify risk for post-operative mortality. We hypothesize that electrocardiograms contain hidden risk markers that can help prognosticate post-operative mortality. Methods. In a derivation cohort of 45,969 pre-operative patients (age 59+- 19 years, 55 percent women), a deep learning algorithm was developed to leverage waveform signals from pre-operative ECGs to discriminate post-operative mortality. Model performance was assessed in a holdout internal test dataset and in two external hospital cohorts and compared with the Revised Cardiac Risk Index (RCRI) score. Results. In the derivation cohort, there were 1,452 deaths. The algorithm discriminates mortality with an AUC of 0.83 (95% CI 0.79-0.87) surpassing the discrimination of the RCRI score with an AUC of 0.67 (CI 0.61-0.72) in the held out test cohort. Patients determined to be high risk by the deep learning model's risk prediction had an unadjusted odds ratio (OR) of 8.83 (5.57-13.20) for post-operative mortality as compared to an unadjusted OR of 2.08 (CI 0.77-3.50) for post-operative mortality for RCRI greater than 2. The deep learning algorithm performed similarly for patients undergoing cardiac surgery with an AUC of 0.85 (CI 0.77-0.92), non-cardiac surgery with an AUC of 0.83 (0.79-0.88), and catherization or endoscopy suite procedures with an AUC of 0.76 (0.72-0.81). The algorithm similarly discriminated risk for mortality in two separate external validation cohorts from independent healthcare systems with AUCs of 0.79 (0.75-0.83) and 0.75 (0.74-0.76) respectively. Conclusion. The findings demonstrate how a novel deep learning algorithm, applied to pre-operative ECGs, can improve discrimination of post-operative mortality.
△ Less
Submitted 30 April, 2022;
originally announced May 2022.
-
MMD Aggregated Two-Sample Test
Authors:
Antonin Schrab,
Ilmun Kim,
Mélisande Albert,
Béatrice Laurent,
Benjamin Guedj,
Arthur Gretton
Abstract:
We propose two novel nonparametric two-sample kernel tests based on the Maximum Mean Discrepancy (MMD). First, for a fixed kernel, we construct an MMD test using either permutations or a wild bootstrap, two popular numerical procedures to determine the test threshold. We prove that this test controls the probability of type I error non-asymptotically. Hence, it can be used reliably even in setting…
▽ More
We propose two novel nonparametric two-sample kernel tests based on the Maximum Mean Discrepancy (MMD). First, for a fixed kernel, we construct an MMD test using either permutations or a wild bootstrap, two popular numerical procedures to determine the test threshold. We prove that this test controls the probability of type I error non-asymptotically. Hence, it can be used reliably even in settings with small sample sizes as it remains well-calibrated, which differs from previous MMD tests which only guarantee correct test level asymptotically. When the difference in densities lies in a Sobolev ball, we prove minimax optimality of our MMD test with a specific kernel depending on the smoothness parameter of the Sobolev ball. In practice, this parameter is unknown and, hence, the optimal MMD test with this particular kernel cannot be used. To overcome this issue, we construct an aggregated test, called MMDAgg, which is adaptive to the smoothness parameter. The test power is maximised over the collection of kernels used, without requiring held-out data for kernel selection (which results in a loss of test power), or arbitrary kernel choices such as the median heuristic. We prove that MMDAgg still controls the level non-asymptotically, and achieves the minimax rate over Sobolev balls, up to an iterated logarithmic term. Our guarantees are not restricted to a specific type of kernel, but hold for any product of one-dimensional translation invariant characteristic kernels. We provide a user-friendly parameter-free implementation of MMDAgg using an adaptive collection of bandwidths. We demonstrate that MMDAgg significantly outperforms alternative state-of-the-art MMD-based two-sample tests on synthetic data satisfying the Sobolev smoothness assumption, and that, on real-world image data, MMDAgg closely matches the power of tests leveraging the use of models such as neural networks.
△ Less
Submitted 21 August, 2023; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Multidimensional representations in late-life depression: convergence in neuroimaging, cognition, clinical symptomatology and genetics
Authors:
Junhao Wen,
Cynthia H. Y. Fu,
Duygu Tosun,
Yogasudha Veturi,
Zhijian Yang,
Ahmed Abdulkadir,
Elizabeth Mamourian,
Dhivya Srinivasan,
**gxuan Bao,
Guray Erus,
Haochang Shou,
Mohamad Habes,
Jimit Doshi,
Erdem Varol,
Scott R Mackin,
Aristeidis Sotiras,
Yong Fan,
Andrew J. Saykin,
Yvette I. Sheline,
Li Shen,
Marylyn D. Ritchie,
David A. Wolk,
Marilyn Albert,
Susan M. Resnick,
Christos Davatzikos
Abstract:
Late-life depression (LLD) is characterized by considerable heterogeneity in clinical manifestation. Unraveling such heterogeneity would aid in elucidating etiological mechanisms and pave the road to precision and individualized medicine. We sought to delineate, cross-sectionally and longitudinally, disease-related heterogeneity in LLD linked to neuroanatomy, cognitive functioning, clinical sympto…
▽ More
Late-life depression (LLD) is characterized by considerable heterogeneity in clinical manifestation. Unraveling such heterogeneity would aid in elucidating etiological mechanisms and pave the road to precision and individualized medicine. We sought to delineate, cross-sectionally and longitudinally, disease-related heterogeneity in LLD linked to neuroanatomy, cognitive functioning, clinical symptomatology, and genetic profiles. Multimodal data from a multicentre sample (N=996) were analyzed. A semi-supervised clustering method (HYDRA) was applied to regional grey matter (GM) brain volumes to derive dimensional representations. Two dimensions were identified, which accounted for the LLD-related heterogeneity in voxel-wise GM maps, white matter (WM) fractional anisotropy (FA), neurocognitive functioning, clinical phenotype, and genetics. Dimension one (Dim1) demonstrated relatively preserved brain anatomy without WM disruptions relative to healthy controls. In contrast, dimension two (Dim2) showed widespread brain atrophy and WM integrity disruptions, along with cognitive impairment and higher depression severity. Moreover, one de novo independent genetic variant (rs13120336) was significantly associated with Dim 1 but not with Dim 2. Notably, the two dimensions demonstrated significant SNP-based heritability of 18-27% within the general population (N=12,518 in UKBB). Lastly, in a subset of individuals having longitudinal measurements, Dim2 demonstrated a more rapid longitudinal decrease in GM and brain age, and was more likely to progress to Alzheimers disease, compared to Dim1 (N=1,413 participants and 7,225 scans from ADNI, BLSA, and BIOCARD datasets).
△ Less
Submitted 25 October, 2021; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Disentangling Alzheimer's disease neurodegeneration from typical brain aging using machine learning
Authors:
Gyujoon Hwang,
Ahmed Abdulkadir,
Guray Erus,
Mohamad Habes,
Raymond Pomponio,
Haochang Shou,
Jimit Doshi,
Elizabeth Mamourian,
Tanweer Rashid,
Murat Bilgel,
Yong Fan,
Aristeidis Sotiras,
Dhivya Srinivasan,
John C. Morris,
Daniel Marcus,
Marilyn S. Albert,
Nick R. Bryan,
Susan M. Resnick,
Ilya M. Nasrallah,
Christos Davatzikos,
David A. Wolk
Abstract:
Neuroimaging biomarkers that distinguish between typical brain aging and Alzheimer's disease (AD) are valuable for determining how much each contributes to cognitive decline. Machine learning models can derive multi-variate brain change patterns related to the two processes, including the SPARE-AD (Spatial Patterns of Atrophy for Recognition of Alzheimer's Disease) and SPARE-BA (of Brain Aging) in…
▽ More
Neuroimaging biomarkers that distinguish between typical brain aging and Alzheimer's disease (AD) are valuable for determining how much each contributes to cognitive decline. Machine learning models can derive multi-variate brain change patterns related to the two processes, including the SPARE-AD (Spatial Patterns of Atrophy for Recognition of Alzheimer's Disease) and SPARE-BA (of Brain Aging) investigated herein. However, substantial overlap between brain regions affected in the two processes confounds measuring them independently. We present a methodology toward disentangling the two. T1-weighted MRI images of 4,054 participants (48-95 years) with AD, mild cognitive impairment (MCI), or cognitively normal (CN) diagnoses from the iSTAGING (Imaging-based coordinate SysTem for AGIng and NeurodeGenerative diseases) consortium were analyzed. First, a subset of AD patients and CN adults were selected based purely on clinical diagnoses to train SPARE-BA1 (regression of age using CN individuals) and SPARE-AD1 (classification of CN versus AD). Second, analogous groups were selected based on clinical and molecular markers to train SPARE-BA2 and SPARE-AD2: amyloid-positive (A+) AD continuum group (consisting of A+AD, A+MCI, and A+ and tau-positive CN individuals) and amyloid-negative (A-) CN group. Finally, the combined group of the AD continuum and A-/CN individuals was used to train SPARE-BA3, with the intention to estimate brain age regardless of AD-related brain changes. Disentangled SPARE models derived brain patterns that were more specific to the two types of the brain changes. Correlation between the SPARE-BA and SPARE-AD was significantly reduced. Correlation of disentangled SPARE-AD was non-inferior to the molecular measurements and to the number of APOE4 alleles, but was less to AD-related psychometric test scores, suggesting contribution of advanced brain aging to these scores.
△ Less
Submitted 8 September, 2021;
originally announced September 2021.
-
Medical Image Harmonization Using Deep Learning Based Canonical Map**: Toward Robust and Generalizable Learning in Imaging
Authors:
Vishnu M. Bashyam,
Jimit Doshi,
Guray Erus,
Dhivya Srinivasan,
Ahmed Abdulkadir,
Mohamad Habes,
Yong Fan,
Colin L. Masters,
Paul Maruff,
Chuanjun Zhuo,
Henry Völzke,
Sterling C. Johnson,
Jurgen Fripp,
Nikolaos Koutsouleris,
Theodore D. Satterthwaite,
Daniel H. Wolf,
Raquel E. Gur,
Ruben C. Gur,
John C. Morris,
Marilyn S. Albert,
Hans J. Grabe,
Susan M. Resnick,
R. Nick Bryan,
David A. Wolk,
Haochang Shou
, et al. (2 additional authors not shown)
Abstract:
Conventional and deep learning-based methods have shown great potential in the medical imaging domain, as means for deriving diagnostic, prognostic, and predictive biomarkers, and by contributing to precision medicine. However, these methods have yet to see widespread clinical adoption, in part due to limited generalization performance across various imaging devices, acquisition protocols, and pat…
▽ More
Conventional and deep learning-based methods have shown great potential in the medical imaging domain, as means for deriving diagnostic, prognostic, and predictive biomarkers, and by contributing to precision medicine. However, these methods have yet to see widespread clinical adoption, in part due to limited generalization performance across various imaging devices, acquisition protocols, and patient populations. In this work, we propose a new paradigm in which data from a diverse range of acquisition conditions are "harmonized" to a common reference domain, where accurate model learning and prediction can take place. By learning an unsupervised image to image canonical map** from diverse datasets to a reference domain using generative deep learning models, we aim to reduce confounding data variation while preserving semantic information, thereby rendering the learning task easier in the reference domain. We test this approach on two example problems, namely MRI-based brain age prediction and classification of schizophrenia, leveraging pooled cohorts of neuroimaging MRI data spanning 9 sites and 9701 subjects. Our results indicate a substantial improvement in these tasks in out-of-sample data, even when training is restricted to a single site.
△ Less
Submitted 11 October, 2020;
originally announced October 2020.
-
Testing with Jupyter notebooks: NoteBook VALidation (nbval) plug-in for pytest
Authors:
Hans Fangohr,
Vidar Fauske,
Thomas Kluyver,
Maximilian Albert,
Oliver Laslett,
David Cortés-Ortuño,
Marijan Beg,
Min Ragan-Kelly
Abstract:
The Notebook validation tool nbval allows to load and execute Python code from a Jupyter notebook file. While computing outputs from the cells in the notebook, these outputs are compared with the outputs saved in the notebook file, treating each cell as a test. Deviations are reported as test failures, with various configuration options available to control the behaviour. Application use cases inc…
▽ More
The Notebook validation tool nbval allows to load and execute Python code from a Jupyter notebook file. While computing outputs from the cells in the notebook, these outputs are compared with the outputs saved in the notebook file, treating each cell as a test. Deviations are reported as test failures, with various configuration options available to control the behaviour. Application use cases include the validation of notebook-based documentation, tutorials and textbooks, as well as the use of notebooks as additional unit, integration and system tests for the libraries that are used in the notebook. Nbval is implemented as a plugin for the pytest testing software.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Estimating the resilience to natural disasters by using call detail records to analyse the mobility of internally displaced persons
Authors:
Tracey Li,
Jesper Dejby,
Maximilian Albert,
Linus Bengtsson,
Veronique Lefebvre
Abstract:
We use mobile phone call detail records to estimate the resettlement times of a subset of individuals that have been previously identified to be internally displaced persons (IDPs) following a sudden-onset disaster. Four different mobility metrics - two versions of radius of gyration and two versions of entropy - are used to study the behaviour of populations during three disasters - the 2010 eart…
▽ More
We use mobile phone call detail records to estimate the resettlement times of a subset of individuals that have been previously identified to be internally displaced persons (IDPs) following a sudden-onset disaster. Four different mobility metrics - two versions of radius of gyration and two versions of entropy - are used to study the behaviour of populations during three disasters - the 2010 earthquake in Haiti, the 2015 Gorkha earthquake in Nepal, and Hurricane Matthew in Haiti in 2016. We characterise the rate at which a disrupted population resettles by the fraction of individuals who remain disrupted each week after the disaster. We find that this rate can be modelled very well as the sum of two exponential decays and observe that the resettling rate for all three disasters is similar, with half the original number of displaced persons having resettled within four to five weeks of the disaster. If the study of further disasters leads to the observation of similar exponential decay rates, then it would imply that the number of IDPs at any time can be inferred from an estimate of the initial number of IDPs immediately following the disaster. Alternatively, the method provides a way to monitor disaster resilience and compare recovery rates across disasters. The method has the advantage that no assumptions need to be made regarding the location or time of resettlement. Our results indicate that CDRs can significantly contribute to measuring and predicting displacement durations, distances, and locations of IDPs in post-disaster scenarios. We believe that information and estimates provided by specifically developed CDR analytics, coupled with field data collection and traditional survey methods, can assist the humanitarian response to natural disasters and the subsequent resettlement efforts.
△ Less
Submitted 6 August, 2019;
originally announced August 2019.
-
Detecting individual internal displacements following a sudden-onset disaster using time series analysis of call detail records
Authors:
Tracey Li,
Jesper Dejby,
Maximilian Albert,
Linus Bengtsson,
Veronique Lefebvre
Abstract:
We present a method for analysing mobile phone call detail records to identify individuals whom we believe to be have been internally displaced as a result of a sudden-onset disaster. We model each anonymous individual's movements trajectory as a piecewise-constant time series signal, assume that a disaster-induced displacement is exhibited as a level shift from an individual's 'normal' location,…
▽ More
We present a method for analysing mobile phone call detail records to identify individuals whom we believe to be have been internally displaced as a result of a sudden-onset disaster. We model each anonymous individual's movements trajectory as a piecewise-constant time series signal, assume that a disaster-induced displacement is exhibited as a level shift from an individual's 'normal' location, and then apply a step detection algorithm to identify level shifts in the signal. In contrast to typical methods that are used to analyse mobility patterns from call detail records, where the aggregate movements of large groups of individuals are analysed, our method offers the advantage that no assumptions regarding the destination or duration of an individual's displacement are necessary. We have applied the method to the datasets from three disasters - the 2010 earthquake in Haiti, the 2015 Gorkha earthquake in Nepal, and Hurricane Matthew in Haiti in 2016. Our results demonstrate that this method can facilitate improvements in the analysis and modelling of the mobility of internally displaced persons in post-disaster scenarios, using call detail records. Such analyses can be used to complement traditional survey methods to assess the scale and characteristics of disaster-induced displacements in a timely manner.
△ Less
Submitted 6 August, 2019;
originally announced August 2019.
-
Prolific Compositions
Authors:
Murray Tannock,
Michael Albert
Abstract:
Under what circumstances might every extension of a combinatorial structure contain more copies of another one than the original did? This property, which we call prolificity, holds universally in some cases (e.g., finite linear orders) and only trivially in others (e.g., permutations). Integer compositions, or equivalently layered permutations, provide a middle ground. In that setting, there are…
▽ More
Under what circumstances might every extension of a combinatorial structure contain more copies of another one than the original did? This property, which we call prolificity, holds universally in some cases (e.g., finite linear orders) and only trivially in others (e.g., permutations). Integer compositions, or equivalently layered permutations, provide a middle ground. In that setting, there are prolific compositions for a given pattern if and only if that pattern begins and ends with 1. For each pattern, there is an easily constructed automaton that recognises prolific compositions for that pattern. Some instances where there is a unique minimal prolific composition for a pattern are classified.
△ Less
Submitted 1 December, 2019; v1 submitted 11 April, 2019;
originally announced April 2019.
-
Uniquely-Wilf classes
Authors:
Michael Albert,
**ge Li
Abstract:
Two permutations in a class are Wilf-equivalent if, for every size, $n$, the number of permutations in the class of size $n$ containing each of them is the same. Those infinite classes that have only one equivalence class in each size for this relation are characterised provided either that they avoid at least one permutation of size 3, or at least three permutations of size 4.
Two permutations in a class are Wilf-equivalent if, for every size, $n$, the number of permutations in the class of size $n$ containing each of them is the same. Those infinite classes that have only one equivalence class in each size for this relation are characterised provided either that they avoid at least one permutation of size 3, or at least three permutations of size 4.
△ Less
Submitted 20 October, 2019; v1 submitted 10 April, 2019;
originally announced April 2019.
-
The effect of the choice of neural network depth and breadth on the size of its hypothesis space
Authors:
Lech Szymanski,
Brendan McCane,
Michael Albert
Abstract:
We show that the number of unique function map**s in a neural network hypothesis space is inversely proportional to $\prod_lU_l!$, where $U_{l}$ is the number of neurons in the hidden layer $l$.
We show that the number of unique function map**s in a neural network hypothesis space is inversely proportional to $\prod_lU_l!$, where $U_{l}$ is the number of neurons in the hidden layer $l$.
△ Less
Submitted 6 June, 2018;
originally announced June 2018.
-
Traffic Optimization For a Mixture of Self-interested and Compliant Agents
Authors:
Guni Sharon,
Michael Albert,
Tarun Rambha,
Stephen Boyles,
Peter Stone
Abstract:
This paper focuses on two commonly used path assignment policies for agents traversing a congested network: self-interested routing, and system-optimum routing. In the self-interested routing policy each agent selects a path that optimizes its own utility, while the system-optimum routing agents are assigned paths with the goal of maximizing system performance. This paper considers a scenario wher…
▽ More
This paper focuses on two commonly used path assignment policies for agents traversing a congested network: self-interested routing, and system-optimum routing. In the self-interested routing policy each agent selects a path that optimizes its own utility, while the system-optimum routing agents are assigned paths with the goal of maximizing system performance. This paper considers a scenario where a centralized network manager wishes to optimize utilities over all agents, i.e., implement a system-optimum routing policy. In many real-life scenarios, however, the system manager is unable to influence the route assignment of all agents due to limited influence on route choice decisions. Motivated by such scenarios, a computationally tractable method is presented that computes the minimal amount of agents that the system manager needs to influence (compliant agents) in order to achieve system optimal performance. Moreover, this methodology can also determine whether a given set of compliant agents is sufficient to achieve system optimum and compute the optimal route assignment for the compliant agents to do so. Experimental results are presented showing that in several large-scale, realistic traffic networks optimal flow can be achieved with as low as 13% of the agent being compliant and up to 54%.
△ Less
Submitted 27 September, 2017;
originally announced September 2017.
-
Complexity of Scheduling Charging in the Smart Grid
Authors:
Mathijs de Weerdt,
Michael Albert,
Vincent Conitzer
Abstract:
In the smart grid, the intent is to use flexibility in demand, both to balance demand and supply as well as to resolve potential congestion. A first prominent example of such flexible demand is the charging of electric vehicles, which do not necessarily need to be charged as soon as they are plugged in. The problem of optimally scheduling the charging demand of electric vehicles within the constra…
▽ More
In the smart grid, the intent is to use flexibility in demand, both to balance demand and supply as well as to resolve potential congestion. A first prominent example of such flexible demand is the charging of electric vehicles, which do not necessarily need to be charged as soon as they are plugged in. The problem of optimally scheduling the charging demand of electric vehicles within the constraints of the electricity infrastructure is called the charge scheduling problem. The models of the charging speed, horizon, and charging demand determine the computational complexity of the charge scheduling problem. For about 20 variants, we show, using a dynamic programming approach, that the problem is either in P or weakly NP-hard. We also show that about 10 variants of the problem are strongly NP-hard, presenting a potentially significant obstacle to their use in practical situations of scale.
△ Less
Submitted 21 September, 2017;
originally announced September 2017.
-
Virtual Micromagnetics: A Framework for Accessible and Reproducible Micromagnetic Simulation
Authors:
Mark Vousden,
Marc-Antonio Bisotti,
Maximilian Albert,
Hans Fangohr
Abstract:
Computational micromagnetics requires numerical solution of partial differential equations to resolve complex interactions in magnetic nanomaterials. The Virtual Micromagnetics project described here provides virtual machine simulation environments to run open-source micromagnetic simulation packages. These environments allow easy access to simulation packages that are often difficult to compile a…
▽ More
Computational micromagnetics requires numerical solution of partial differential equations to resolve complex interactions in magnetic nanomaterials. The Virtual Micromagnetics project described here provides virtual machine simulation environments to run open-source micromagnetic simulation packages. These environments allow easy access to simulation packages that are often difficult to compile and install, and enable simulations and their data to be shared and stored in a single virtual hard disk file, which encourages reproducible research. Virtual Micromagnetics can be extended to automate the installation of micromagnetic simulation packages on non-virtual machines, and to support closed-source and new open-source simulation packages, including packages from disciplines other than micromagnetics, encouraging reuse. Virtual Micromagnetics is stored in a public GitHub repository under a three-clause Berkeley Software Distribution (BSD) license.
△ Less
Submitted 25 November, 2016; v1 submitted 11 August, 2016;
originally announced September 2016.
-
Auto-JacoBin: Auto-encoder Jacobian Binary Hashing
Authors:
Xi** Fu,
Brendan McCane,
Steven Mills,
Michael Albert,
Lech Szymanski
Abstract:
Binary codes can be used to speed up nearest neighbor search tasks in large scale data sets as they are efficient for both storage and retrieval. In this paper, we propose a robust auto-encoder model that preserves the geometric relationships of high-dimensional data sets in Hamming space. This is done by considering a noise-removing function in a region surrounding the manifold where the training…
▽ More
Binary codes can be used to speed up nearest neighbor search tasks in large scale data sets as they are efficient for both storage and retrieval. In this paper, we propose a robust auto-encoder model that preserves the geometric relationships of high-dimensional data sets in Hamming space. This is done by considering a noise-removing function in a region surrounding the manifold where the training data points lie. This function is defined with the property that it projects the data points near the manifold into the manifold wisely, and we approximate this function by its first order approximation. Experimental results show that the proposed method achieves better than state-of-the-art results on three large scale high dimensional data sets.
△ Less
Submitted 1 March, 2016; v1 submitted 25 February, 2016;
originally announced February 2016.
-
Nmag micromagnetic simulation tool - software engineering lessons learned
Authors:
Hans Fangohr,
Maximilian Albert,
Matteo Franchin
Abstract:
We review design and development decisions and their impact for the open source code Nmag from a software engineering in computational science point of view. We summarise lessons learned and recommendations for future computational science projects. Key lessons include that encapsulating the simulation functionality in a library of a general purpose language, here Python, provides great flexibilit…
▽ More
We review design and development decisions and their impact for the open source code Nmag from a software engineering in computational science point of view. We summarise lessons learned and recommendations for future computational science projects. Key lessons include that encapsulating the simulation functionality in a library of a general purpose language, here Python, provides great flexibility in using the software. The choice of Python for the top-level user interface was very well received by users from the science and engineering community. The from-source installation in which required external libraries and dependencies are compiled from a tarball was remarkably robust. In places, the code is a lot more ambitious than necessary, which introduces unnecessary complexity and reduces main- tainability. Tests distributed with the package are useful, although more unit tests and continuous integration would have been desirable. The detailed documentation, together with a tutorial for the usage of the system, was perceived as one of its main strengths by the community.
△ Less
Submitted 28 February, 2016; v1 submitted 27 January, 2016;
originally announced January 2016.
-
The Complexity of Pattern Matching for $321$-Avoiding and Skew-Merged Permutations
Authors:
Michael H. Albert,
Marie-Louise Lackner,
Martin Lackner,
Vincent Vatter
Abstract:
The Permutation Pattern Matching problem, asking whether a pattern permutation $π$ is contained in a permutation $τ$, is known to be NP-complete. In this paper we present two polynomial time algorithms for special cases. The first algorithm is applicable if both $π$ and $τ$ are $321$-avoiding; the second is applicable if $π$ and $τ$ are skew-merged. Both algorithms have a runtime of $O(kn)$, where…
▽ More
The Permutation Pattern Matching problem, asking whether a pattern permutation $π$ is contained in a permutation $τ$, is known to be NP-complete. In this paper we present two polynomial time algorithms for special cases. The first algorithm is applicable if both $π$ and $τ$ are $321$-avoiding; the second is applicable if $π$ and $τ$ are skew-merged. Both algorithms have a runtime of $O(kn)$, where $k$ is the length of $π$ and $n$ the length of $τ$.
△ Less
Submitted 18 December, 2016; v1 submitted 20 October, 2015;
originally announced October 2015.
-
Operators of equivalent sorting power and related Wilf-equivalences
Authors:
Michael Albert,
Mathilde Bouvel
Abstract:
We study sorting operators $\mathbf{A}$ on permutations that are obtained composing Knuth's stack sorting operator $\mathbf{S}$ and the reversal operator $\mathbf{R}$, as many times as desired. For any such operator $\mathbf{A}$, we provide a size-preserving bijection between the set of permutations sorted by $\mathbf{S} \circ \mathbf{A}$ and the set of those sorted by…
▽ More
We study sorting operators $\mathbf{A}$ on permutations that are obtained composing Knuth's stack sorting operator $\mathbf{S}$ and the reversal operator $\mathbf{R}$, as many times as desired. For any such operator $\mathbf{A}$, we provide a size-preserving bijection between the set of permutations sorted by $\mathbf{S} \circ \mathbf{A}$ and the set of those sorted by $\mathbf{S} \circ \mathbf{R} \circ \mathbf{A}$, proving that these sets are enumerated by the same sequence, but also that many classical permutation statistics are equidistributed across these two sets. The description of this family of bijections is based on a bijection between the set of permutations avoiding the pattern $231$ and the set of those avoiding $132$ which preserves many permutation statistics. We also present other properties of this bijection, in particular for finding pairs of Wilf-equivalent permutation classes.
△ Less
Submitted 9 February, 2014;
originally announced February 2014.
-
Pattern classes and priority queues
Authors:
Michael Albert,
M. D. Atkinson
Abstract:
When a set of permutations comprising a pattern class C is submitted as input to a priority queue the resulting output is again a pattern class C'. The basis of C' is determined for pattern classes C whose basis elements have length 3, and is finite in these cases. An example is given of a class C with basis 2431 for which C is not finitely based.
When a set of permutations comprising a pattern class C is submitted as input to a priority queue the resulting output is again a pattern class C'. The basis of C' is determined for pattern classes C whose basis elements have length 3, and is finite in these cases. An example is given of a class C with basis 2431 for which C is not finitely based.
△ Less
Submitted 7 February, 2012;
originally announced February 2012.
-
Sorting with a forklift
Authors:
M. H. Albert,
M. D. Atkinson
Abstract:
A fork stack is a generalised stack which allows pushes and pops of several items at a time. We consider the problem of determining which input streams can be sorted using a single forkstack, or dually, which permutations of a fixed input stream can be produced using a single forkstack. An algorithm is given to solve the sorting problem and the minimal unsortable sequences are found. The results…
▽ More
A fork stack is a generalised stack which allows pushes and pops of several items at a time. We consider the problem of determining which input streams can be sorted using a single forkstack, or dually, which permutations of a fixed input stream can be produced using a single forkstack. An algorithm is given to solve the sorting problem and the minimal unsortable sequences are found. The results are extended to fork stacks where there are bounds on how many items can be pushed and popped at one time. In this context we also establish how to enumerate the collection of sortable sequences.
△ Less
Submitted 10 September, 2002;
originally announced September 2002.