-
ThermoPore: Predicting Part Porosity Based on Thermal Images Using Deep Learning
Authors:
Peter Myung-Won Pak,
Francis Ogoke,
Andrew Polonsky,
Anthony Garland,
Dan S. Bolintineanu,
Dan R. Moser,
Michael J. Heiden,
Amir Barati Farimani
Abstract:
We present a deep learning approach for quantifying and localizing ex-situ porosity within Laser Powder Bed Fusion fabricated samples utilizing in-situ thermal image monitoring data. Our goal is to build the real time porosity map of parts based on thermal images acquired during the build. The quantification task builds upon the established Convolutional Neural Network model architecture to predic…
▽ More
We present a deep learning approach for quantifying and localizing ex-situ porosity within Laser Powder Bed Fusion fabricated samples utilizing in-situ thermal image monitoring data. Our goal is to build the real time porosity map of parts based on thermal images acquired during the build. The quantification task builds upon the established Convolutional Neural Network model architecture to predict pore count and the localization task leverages the spatial and temporal attention mechanisms of the novel Video Vision Transformer model to indicate areas of expected porosity. Our model for porosity quantification achieved a $R^2$ score of 0.57 and our model for porosity localization produced an average IoU score of 0.32 and a maximum of 1.0. This work is setting the foundations of part porosity "Digital Twins" based on additive manufacturing monitoring data and can be applied downstream to reduce time-intensive post-inspection and testing activities during part qualification and certification. In addition, we seek to accelerate the acquisition of crucial insights normally only available through ex-situ part evaluation by means of machine learning analysis of in-situ process monitoring data.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Towards Large-Scale Training of Pathology Foundation Models
Authors:
kaiko. ai,
Nanne Aben,
Edwin D. de Jong,
Ioannis Gatopoulos,
Nicolas Känzig,
Mikhail Karasikov,
Axel Lagré,
Roman Moser,
Joost van Doorn,
Fei Tang
Abstract:
Driven by the recent advances in deep learning methods and, in particular, by the development of modern self-supervised learning algorithms, increased interest and efforts have been devoted to build foundation models (FMs) for medical images. In this work, we present our scalable training pipeline for large pathology imaging data, and a comprehensive analysis of various hyperparameter choices and…
▽ More
Driven by the recent advances in deep learning methods and, in particular, by the development of modern self-supervised learning algorithms, increased interest and efforts have been devoted to build foundation models (FMs) for medical images. In this work, we present our scalable training pipeline for large pathology imaging data, and a comprehensive analysis of various hyperparameter choices and training techniques for building pathology FMs. We release and make publicly available the first batch of our pathology FMs (https://github.com/kaiko-ai/towards_large_pathology_fms) trained on open-access TCGA whole slide images, a commonly used collection of pathology images. The experimental evaluation shows that our models reach state-of-the-art performance on various patch-level downstream tasks, ranging from breast cancer subty** to colorectal nuclear segmentation. Finally, to unify the evaluation approaches used in the field and to simplify future comparisons of different FMs, we present an open-source framework (https://github.com/kaiko-ai/eva) designed for the consistent evaluation of pathology FMs across various downstream tasks.
△ Less
Submitted 24 March, 2024;
originally announced April 2024.
-
Bayesian inference of an uncertain generalized diffusion operator
Authors:
Teresa Portone,
Robert D. Moser
Abstract:
This paper defines a novel Bayesian inverse problem to infer an infinite-dimensional uncertain operator appearing in a differential equation, whose action on an observable state variable affects its dynamics. Inference is made tractable by parametrizing the operator using its eigendecomposition. The plausibility of operator inference in the sparse data regime is explored in terms of an uncertain,…
▽ More
This paper defines a novel Bayesian inverse problem to infer an infinite-dimensional uncertain operator appearing in a differential equation, whose action on an observable state variable affects its dynamics. Inference is made tractable by parametrizing the operator using its eigendecomposition. The plausibility of operator inference in the sparse data regime is explored in terms of an uncertain, generalized diffusion operator appearing in an evolution equation for a contaminant's transport through a heterogeneous porous medium. Sparse data are augmented with prior information through the imposition of deterministic constraints on the eigendecomposition and the use of qualitative information about the system in the definition of the prior distribution. Limited observations of the state variable's evolution are used as data for inference, and the dependence on the solution of the inverse problem is studied as a function of the frequency of observations, as well as on whether or not the data is collected as a spatial or time series.
△ Less
Submitted 23 September, 2021; v1 submitted 4 May, 2021;
originally announced May 2021.
-
A Stochastic Operator Approach to Model Inadequacy with Applications to Contaminant Transport
Authors:
Teresa Portone,
Damon McDougall,
Robert D. Moser
Abstract:
The mathematical models used to represent physical phenomena are generally known to be imperfect representations of reality. Model inadequacies arise for numerous reasons, such as incomplete knowledge of the phenomena or computational intractability of more accurate models. In such situations it is impractical or impossible to improve the model, but necessity requires its use to make predictions.…
▽ More
The mathematical models used to represent physical phenomena are generally known to be imperfect representations of reality. Model inadequacies arise for numerous reasons, such as incomplete knowledge of the phenomena or computational intractability of more accurate models. In such situations it is impractical or impossible to improve the model, but necessity requires its use to make predictions. With this in mind, it is important to represent the uncertainty that a model's inadequacy causes in its predictions, as neglecting to do so can cause overconfidence in its accuracy. A powerful approach to addressing model inadequacy leverages the composite nature of physical models by enriching a flawed embedded closure model with a stochastic error representation. This work outlines steps in the development of a stochastic operator as an inadequacy representation by establishing the framework for inferring an infinite-dimensional operator and by introducing a novel method for interrogating available high-fidelity models to learn about modeling error.
△ Less
Submitted 24 February, 2017;
originally announced February 2017.
-
Representing model inadequacy: A stochastic operator approach
Authors:
Rebecca E Morrison,
Todd A Oliver,
Robert D Moser
Abstract:
Mathematical models of physical systems are subject to many uncertainties such as measurement errors and uncertain initial and boundary conditions. After accounting for these uncertainties, it is often revealed that discrepancies between the model output and the observations remain; if so, the model is said to be inadequate. In practice, the inadequate model may be the best that is available or tr…
▽ More
Mathematical models of physical systems are subject to many uncertainties such as measurement errors and uncertain initial and boundary conditions. After accounting for these uncertainties, it is often revealed that discrepancies between the model output and the observations remain; if so, the model is said to be inadequate. In practice, the inadequate model may be the best that is available or tractable, and so despite its inadequacy the model may be used to make predictions of unobserved quantities. In this case, a representation of the inadequacy is necessary, so the impact of the observed discrepancy can be determined. We investigate this problem in the context of chemical kinetics and propose a new technique to account for model inadequacy that is both probabilistic and physically meaningful. A stochastic inadequacy operator $\mathcal{S}$ is introduced which is embedded in the ODEs describing the evolution of chemical species concentrations and which respects certain physical constraints such as conservation laws. The parameters of $\mathcal{S}$ are governed by probability distributions, which in turn are characterized by a set of hyperparameters. The model parameters and hyperparameters are calibrated using high-dimensional hierarchical Bayesian inference. We apply the method to a typical problem in chemical kinetics---the reaction mechanism of hydrogen combustion.
△ Less
Submitted 22 May, 2018; v1 submitted 6 April, 2016;
originally announced April 2016.
-
Not All Saturated 3-Forests Are Tight
Authors:
Heidi Gebauer,
Anna Gundert,
Robin A. Moser,
Yoshio Okamoto
Abstract:
A basic statement in graph theory is that every inclusion-maximal forest is connected, i.e. a tree. Using a definiton for higher dimensional forests by Graham and Lovasz and the connectivity-related notion of tightness for hypergraphs introduced by Arocha, Bracho and Neumann-Lara in, we provide an example of a saturated, i.e. inclusion-maximal 3-forest that is not tight. This resolves an open prob…
▽ More
A basic statement in graph theory is that every inclusion-maximal forest is connected, i.e. a tree. Using a definiton for higher dimensional forests by Graham and Lovasz and the connectivity-related notion of tightness for hypergraphs introduced by Arocha, Bracho and Neumann-Lara in, we provide an example of a saturated, i.e. inclusion-maximal 3-forest that is not tight. This resolves an open problem posed by Strausz.
△ Less
Submitted 15 September, 2011;
originally announced September 2011.
-
Improving PPSZ for 3-SAT using Critical Variables
Authors:
Timon Hertli,
Robin A. Moser,
Dominik Scheder
Abstract:
A critical variable of a satisfiable CNF formula is a variable that has the same value in all satisfying assignments. Using a simple case distinction on the fraction of critical variables of a CNF formula, we improve the running time for 3-SAT from O(1.32216^n) by Rolf [2006] to O(1.32153^n). Using a different approach, Iwama et al. [2010] very recently achieved a running time of O(1.32113^n). Our…
▽ More
A critical variable of a satisfiable CNF formula is a variable that has the same value in all satisfying assignments. Using a simple case distinction on the fraction of critical variables of a CNF formula, we improve the running time for 3-SAT from O(1.32216^n) by Rolf [2006] to O(1.32153^n). Using a different approach, Iwama et al. [2010] very recently achieved a running time of O(1.32113^n). Our method nicely combines with theirs, yielding the currently fastest known algorithm with running time O(1.32065^n). We also improve the bound for 4-SAT from O(1.47390^n) [Iwama, Tamaki 2004] to O(1.46928^n), where O(1.46981^n) can be obtained using the methods of [Iwama, Tamaki 2004] and [Rolf 2006].
△ Less
Submitted 19 May, 2011; v1 submitted 24 September, 2010;
originally announced September 2010.
-
A Full Derandomization of Schoening's k-SAT Algorithm
Authors:
Robin A. Moser,
Dominik Scheder
Abstract:
Schoening in 1999 presented a simple randomized algorithm for k-SAT with running time O(a^n * poly(n)) for a = 2(k-1)/k. We give a deterministic version of this algorithm running in time O((a+epsilon)^n * poly(n)), where epsilon > 0 can be made arbitrarily small.
Schoening in 1999 presented a simple randomized algorithm for k-SAT with running time O(a^n * poly(n)) for a = 2(k-1)/k. We give a deterministic version of this algorithm running in time O((a+epsilon)^n * poly(n)), where epsilon > 0 can be made arbitrarily small.
△ Less
Submitted 24 August, 2010;
originally announced August 2010.
-
A constructive proof of the general Lovasz Local Lemma
Authors:
Robin A. Moser,
Gábor Tardos
Abstract:
The Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove the existence of combinatorial objects meeting a prescribed collection of criteria. In his breakthrough paper [Bec91], Beck demonstrated that a constructive variant can be given under certain more restrictive conditions. Simplifications of his procedure and relaxations of its restrictions were subsequently exhibited in…
▽ More
The Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove the existence of combinatorial objects meeting a prescribed collection of criteria. In his breakthrough paper [Bec91], Beck demonstrated that a constructive variant can be given under certain more restrictive conditions. Simplifications of his procedure and relaxations of its restrictions were subsequently exhibited in several publications [Alo91, MR98, CS00, Mos06, Sri08, Mos08]. In [Mos09], a constructive proof was presented that works under negligible restrictions, formulated in terms of the Bounded Occurrence Satisfiability problem. In the present paper, we reformulate and improve upon these findings so as to directly apply to almost all known applications of the general Local Lemma.
△ Less
Submitted 20 May, 2009; v1 submitted 3 March, 2009;
originally announced March 2009.
-
A constructive proof of the Lovasz Local Lemma
Authors:
Robin A. Moser
Abstract:
The Lovasz Local Lemma [EL75] is a powerful tool to prove the existence of combinatorial objects meeting a prescribed collection of criteria. The technique can directly be applied to the satisfiability problem, yielding that a k-CNF formula in which each clause has common variables with at most 2^(k-2) other clauses is always satisfiable. All hitherto known proofs of the Local Lemma are non-cons…
▽ More
The Lovasz Local Lemma [EL75] is a powerful tool to prove the existence of combinatorial objects meeting a prescribed collection of criteria. The technique can directly be applied to the satisfiability problem, yielding that a k-CNF formula in which each clause has common variables with at most 2^(k-2) other clauses is always satisfiable. All hitherto known proofs of the Local Lemma are non-constructive and do thus not provide a recipe as to how a satisfying assignment to such a formula can be efficiently found. In his breakthrough paper [Bec91], Beck demonstrated that if the neighbourhood of each clause be restricted to O(2^(k/48)), a polynomial time algorithm for the search problem exists. Alon simplified and randomized his procedure and improved the bound to O(2^(k/8)) [Alo91]. Srinivasan presented in [Sri08] a variant that achieves a bound of essentially O(2^(k/4)). In [Mos08], we improved this to O(2^(k/2)). In the present paper, we give a randomized algorithm that finds a satisfying assignment to every k-CNF formula in which each clause has a neighbourhood of at most the asymptotic optimum of 2^(k-5)-1 other clauses and that runs in expected time polynomial in the size of the formula, irrespective of k. If k is considered a constant, we can also give a deterministic variant. In contrast to all previous approaches, our analysis does not anymore invoke the standard non-constructive versions of the Local Lemma and can therefore be considered an alternative, constructive proof of it.
△ Less
Submitted 29 October, 2008; v1 submitted 27 October, 2008;
originally announced October 2008.
-
Derandomizing the Lovasz Local Lemma more effectively
Authors:
Robin A. Moser
Abstract:
The famous Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove the existence of combinatorial objects meeting a prescribed collection of criteria. Kratochvil et al. applied this technique to prove that a k-CNF in which each variable appears at most 2^k/(ek) times is always satisfiable [KST93]. In a breakthrough paper, Beck found that if we lower the occurrences to O(2^(k/48)…
▽ More
The famous Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove the existence of combinatorial objects meeting a prescribed collection of criteria. Kratochvil et al. applied this technique to prove that a k-CNF in which each variable appears at most 2^k/(ek) times is always satisfiable [KST93]. In a breakthrough paper, Beck found that if we lower the occurrences to O(2^(k/48)/k), then a deterministic polynomial-time algorithm can find a satisfying assignment to such an instance [Bec91]. Alon randomized the algorithm and required O(2^(k/8)/k) occurrences [Alo91]. In [Mos06], we exhibited a refinement of his method which copes with O(2^(k/6)/k) of them. The hitherto best known randomized algorithm is due to Srinivasan and is capable of solving O(2^(k/4)/k) occurrence instances [Sri08]. Answering two questions asked by Srinivasan, we shall now present an approach that tolerates O(2^(k/2)/k) occurrences per variable and which can most easily be derandomized. The new algorithm bases on an alternative type of witness tree structure and drops a number of limiting aspects common to all previous methods.
△ Less
Submitted 15 September, 2008; v1 submitted 14 July, 2008;
originally announced July 2008.