-
Network Theory in Galaxy Distributions: The Coma Supercluster Neighborhood
Authors:
Evelise Gausmann,
Fabricio Ferrari
Abstract:
In this work, we use the theory of spatial networks to analyze galaxy distributions. The aim is to develop new approaches to study the spatial galaxy environment properties by means of the network parameters. We investigate how each of the network parameters (degree, closeness and betweeness centrality; diameter; giant component; transitivity) map the cluster structure and properties. We measure t…
▽ More
In this work, we use the theory of spatial networks to analyze galaxy distributions. The aim is to develop new approaches to study the spatial galaxy environment properties by means of the network parameters. We investigate how each of the network parameters (degree, closeness and betweeness centrality; diameter; giant component; transitivity) map the cluster structure and properties. We measure the network parameters of galaxy samples comprising the Coma Supercluster and 4 regions in their neighborhood ($z<0.0674$) using the catalog produced by \citet{tempel2014flux}. For comparison we repeat the same procedures for Random Geometric Graphs and Segment Cox process, generated with the same dimensions and mean density of nodes. We found that there is a strong correlation between degree centrality and the normalized environmental density. Also, at high degrees there are more elliptical than spiral galaxies, which confirms the density-morphology relation. The mean degree as a function of the connection radius is an estimator of the count-of-spheres and consequently provides the correlation dimension as a function of the connection radius. The correlation dimension indicates high clustering at scales indicated by the network diameter. Further, at this scales, high values of betweeness centrality characterize galaxy bridges connecting dense regions, tracing very well the filamentary structures. Then, since galaxies with the highest closeness centrality belongs to the largest components of the network, associated to supercluster regions, we can produce a catalog of superclusters only by extracting the largest connected components of the network. Establishing the correlation between the well-studied normalized environmental densities and the parameters of the network theory allows us to develop alternative tools to the study of the large-scale structures.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Bayesian Joint Additive Factor Models for Multiview Learning
Authors:
Niccolo Anceschi,
Federico Ferrari,
David B. Dunson,
Himel Mallick
Abstract:
It is increasingly common in a wide variety of applied settings to collect data of multiple different types on the same set of samples. Our particular focus in this article is on studying relationships between such multiview features and responses. A motivating application arises in the context of precision medicine where multi-omics data are collected to correlate with clinical outcomes. It is of…
▽ More
It is increasingly common in a wide variety of applied settings to collect data of multiple different types on the same set of samples. Our particular focus in this article is on studying relationships between such multiview features and responses. A motivating application arises in the context of precision medicine where multi-omics data are collected to correlate with clinical outcomes. It is of interest to infer dependence within and across views while combining multimodal information to improve the prediction of outcomes. The signal-to-noise ratio can vary substantially across views, motivating more nuanced statistical tools beyond standard late and early fusion. This challenge comes with the need to preserve interpretability, select features, and obtain accurate uncertainty quantification. We propose a joint additive factor regression model (JAFAR) with a structured additive design, accounting for shared and view-specific components. We ensure identifiability via a novel dependent cumulative shrinkage process (D-CUSP) prior. We provide an efficient implementation via a partially collapsed Gibbs sampler and extend our approach to allow flexible feature and outcome distributions. Prediction of time-to-labor onset from immunome, metabolome, and proteome data illustrates performance gains against state-of-the-art competitors. Our open-source software (R package) is available at https://github.com/niccoloanceschi/jafar.
△ Less
Submitted 2 June, 2024;
originally announced June 2024.
-
Design optimization of advanced tow-steered composites with manufacturing constraints
Authors:
Chuan Luo,
Federico Ferrari,
James K. Guest
Abstract:
Tow steering technologies, such as Automated fiber placement, enable the fabrication of composite laminates with curvilinear fiber, tow, or tape paths. Designers may therefore tailor tow orientations locally according to the expected local stress state within a structure, such that strong and stiff orientations of the tow are (for example) optimized to provide maximal mechanical benefit. Tow path…
▽ More
Tow steering technologies, such as Automated fiber placement, enable the fabrication of composite laminates with curvilinear fiber, tow, or tape paths. Designers may therefore tailor tow orientations locally according to the expected local stress state within a structure, such that strong and stiff orientations of the tow are (for example) optimized to provide maximal mechanical benefit. Tow path optimization can be an effective tool in automating this design process, yet has a tendency to create complex designs that may be challenging to manufacture. In the context of tow steering, these complexities can manifest in defects such as tow wrinkling, gaps, overlaps. In this work, we implement manufacturing constraints within the tow path optimization formulation to restrict the minimum tow turning radius and the maximum density of gaps between and overlaps of tows. This is achieved by bounding the local value of the curl and divergence of the vector field associated with the tow orientations. The resulting local constraints are effectively enforced in the optimization framework through the Augmented Lagrangian method. The resulting optimization methodology is demonstrated by designing 2D and 3D structures with optimized tow orientation paths that maximize stiffness (minimize compliance) considering various levels of manufacturing restrictions. The optimized tow paths are shown to be structurally efficient and to respect imposed manufacturing constraints. As expected, the more geometrical complexity that can be achieved by the feedstock tow and placement technology, the higher the stiffness of the resulting optimized design.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Topology Optimization with linearized buckling criteria in 250 lines of Matlab
Authors:
Federico Ferrari,
Ole Sigmund,
James K. Guest
Abstract:
We present a 250 line Matlab code for topology optimization for linearized buckling criteria. The code is conceived to handle stiffness, volume and Buckling Load Factors (BLFs) either as the objective function or as constraints. We use the Kreisselmeier-Steinhauser aggregation function in order to reduce multiple objectives (viz. constraints) to a single, differentiable one. Then, the problem is s…
▽ More
We present a 250 line Matlab code for topology optimization for linearized buckling criteria. The code is conceived to handle stiffness, volume and Buckling Load Factors (BLFs) either as the objective function or as constraints. We use the Kreisselmeier-Steinhauser aggregation function in order to reduce multiple objectives (viz. constraints) to a single, differentiable one. Then, the problem is sequentially approximated by using MMA-like expansions and an OC-like scheme is tailored to update the variables. The inspection of the stress stiffness matrix leads to a vectorized implementation for its efficient construction and for the sensitivity analysis of the BLFs. This, coupled with the efficiency improvements already presented by Ferrari and Sigmund 2020, cuts all the computational bottlenecks associated with setting up the buckling analysis and allows buckling topology optimization problems of an interesting size to be solved on a laptop. The efficiency and flexibility of the code is demonstrated over a few structural design examples and some ideas are given for possible extensions.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Revisiting element removal for density-based structural topology optimization with reintroduction by Heaviside projection
Authors:
Reza Behrou,
Reza Lotfi,
Josephine Voigt Carstensen,
Federico Ferrari,
James K. Guest
Abstract:
We present a strategy grounded in the element removal idea of Bruns and Tortorelli [1] and aimed at reducing computational cost and circumventing potential numerical instabilities of density-based topology optimization. The design variables and the relative densities are both represented on a fixed, uniform finite element grid, and linked through filtering and Heaviside projection. The regions in…
▽ More
We present a strategy grounded in the element removal idea of Bruns and Tortorelli [1] and aimed at reducing computational cost and circumventing potential numerical instabilities of density-based topology optimization. The design variables and the relative densities are both represented on a fixed, uniform finite element grid, and linked through filtering and Heaviside projection. The regions in the analysis domain where the relative density is below a specified threshold are removed from the forward analysis and replaced by fictitious nodal boundary conditions. This brings a progressive cut of the computational cost as the optimization proceeds and helps to mitigate numerical instabilities associated with low-density regions. Removed regions can be readily reintroduced since all the design variables remain active and are modeled in the formal sensitivity analysis. A key feature of the proposed approach is that the Heaviside functions promote material reintroduction along the structural boundaries by amplifying the magnitude of the sensitivities inside the filter reach. Several 2D and 3D structural topology optimization examples are presented, including linear and nonlinear compliance minimization, the design of a force inverter, and frequency and buckling load maximization. The approach is shown to be effective at producing optimized designs equivalent or nearly equivalent to those obtained without the element removal, while providing remarkable computational savings.
△ Less
Submitted 4 December, 2020;
originally announced December 2020.
-
Initiatives and Challenges of Using Gamification in Software Engineering: A Systematic Map**
Authors:
Daniel Porto,
Gabriela Jesus,
Fabiano Ferrari,
Sandra Fabbri
Abstract:
Context: Gamification is an emerging subject that has been applied in different areas, bringing contributions to different types of activities. Objective: This paper aims to characterize how gamification has been adopted in non-educational contexts of software engineering (SE) activities. Method: We performed a Systematic Map** of the literature obtained from relevant databases of the area. The…
▽ More
Context: Gamification is an emerging subject that has been applied in different areas, bringing contributions to different types of activities. Objective: This paper aims to characterize how gamification has been adopted in non-educational contexts of software engineering (SE) activities. Method: We performed a Systematic Map** of the literature obtained from relevant databases of the area. The searches retrieved 2640 studies (published up to January 2020), of which 548 were duplicates, 82 were selected after applying the inclusion and exclusion criteria, and 21 were included via the backward snowballing technique, thus reaching a total of 103 studies to be analyzed. Results: Gamification provided benefits to activities like requirements specification, development, testing, project management, and support process. There is evidence of gamified support to some CMMI 2.0 Practice Areas. The most commonly used gamification elements are points and leaderboards. The main benefit achieved is the increased engagement and motivation to perform tasks. Conclusion: The number of publications and new research initiatives have increased over the years and, from the original authors' reports, many positive results were achieved in SE activities. Despite this, gamification can still be explored for many SE tasks; for the addressed ones, empirical evidence is very limited.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.
-
Micro-controllers: Promoting Structurally Flexible Controllers in Self-Adaptive Software Systems
Authors:
B. R. Siqueira,
F. C. Ferrari,
T. Vogel,
R. De Lemos
Abstract:
To promote structurally flexible controllers in self-adaptive software systems, this paper proposes the use of micro-controllers. Instead of generic monolithic controllers, like Rainbow, we advocate the use of service-specific micro-controllers which can be based on microservices. Although traditional generic controllers can be configured parametrically according to system needs, their use and reu…
▽ More
To promote structurally flexible controllers in self-adaptive software systems, this paper proposes the use of micro-controllers. Instead of generic monolithic controllers, like Rainbow, we advocate the use of service-specific micro-controllers which can be based on microservices. Although traditional generic controllers can be configured parametrically according to system needs, their use and reuse are nevertheless restrictive because of the wide range of services expected from the different stages of the feedback control loop.The solution being advocated is to have structurally flexible controllers that can be composed from micro-controllers. Controlling the architectural configuration of these micro-controllers is a meta-controller that is able to configure the controller according to the services required for controlling the target system. The feasibility of the proposed approach of using micro-controllers at the level of the controller is demonstrated in the context of the PhoneAdapter case study in which micro-controllers are configured at run-time depending on changes affecting the system or its environment.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
A new generation 99 line Matlab code for compliance Topology Optimization and its extension to 3D
Authors:
Federico Ferrari,
Ole Sigmund
Abstract:
Compact and efficient Matlab implementations of compliance Topology Optimization (TO) for 2D and 3D continua are given, consisting of 99 and 125 lines respectively. On discretizations ranging from $3\cdot 10^{4}$ to $4.8\cdot10^{5}$ elements, the 2D version, named top99neo, shows speedups from 2.55 to 5.5 times compared to the well-known top88 code (Andreassen-etal 2011). The 3D version, named top…
▽ More
Compact and efficient Matlab implementations of compliance Topology Optimization (TO) for 2D and 3D continua are given, consisting of 99 and 125 lines respectively. On discretizations ranging from $3\cdot 10^{4}$ to $4.8\cdot10^{5}$ elements, the 2D version, named top99neo, shows speedups from 2.55 to 5.5 times compared to the well-known top88 code (Andreassen-etal 2011). The 3D version, named top3D125, is the most compact and efficient Matlab implementation for 3D TO to date, showing a speedup of 1.9 times compared to the code of Amir-etal 2014, on a discretization with $2.2\cdot10^{5}$ elements. For both codes, improvements are due to much more efficient procedures for the assembly and implementation of filters and shortcuts in the design update step. The use of an acceleration strategy, yielding major cuts in the overall computational time, is also discussed, stressing its easy integration within the basic codes.
△ Less
Submitted 28 July, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
A parallel-GPU code for asteroid aggregation problems with angular particles
Authors:
F. Ferrari,
M. Lavagna,
E. Blazquez
Abstract:
The paper presents a numerical implementation of the gravitational N-body problem with contact interactions between non-spherically shaped bodies. The work builds up on a previous implementation of the code and extends its capabilities. The number of bodies handled is significantly increased through the use of a CUDA/GPU-parallel octree structure. The implementation of the code is discussed and it…
▽ More
The paper presents a numerical implementation of the gravitational N-body problem with contact interactions between non-spherically shaped bodies. The work builds up on a previous implementation of the code and extends its capabilities. The number of bodies handled is significantly increased through the use of a CUDA/GPU-parallel octree structure. The implementation of the code is discussed and its performance are compared against direct N$^2$ integration. The code features both smooth (force-based) and non-smooth (impulse-based) methods, as well as a visco-elastic non-smooth method, to handle contact interaction between bodies. The numerical problem of simulating "rubble-pile" asteroid gravitational aggregation processes is addressed. We discuss the features of the problem and derive criteria to set up the numerical simulation from the dynamical constraints of the combined gravitational-collisional problem. Examples of asteroid aggregation scenarios that could benefit from such implementation are finally presented.
△ Less
Submitted 9 December, 2019;
originally announced December 2019.
-
The dangerous path towards your own cryptography method
Authors:
Warley M. S. Alves,
Thiago L. Prado,
Antonio M. Batista,
Fabiano A. S. Ferrari
Abstract:
Would you like to have your own cryptography method? Experts say you should not do it. If you think you can develop a better cryptography method anyway. We present a brief discussion about some well known cryptography methods and how our model fails against the traditional attacks. We do not want to discourage anybody, we just want to show that, despite of the importance of develo** better crypt…
▽ More
Would you like to have your own cryptography method? Experts say you should not do it. If you think you can develop a better cryptography method anyway. We present a brief discussion about some well known cryptography methods and how our model fails against the traditional attacks. We do not want to discourage anybody, we just want to show that, despite of the importance of develo** better cryptography models, it is a very hard task.
△ Less
Submitted 26 September, 2018;
originally announced December 2018.