-
On the Expressive Power of Spectral Invariant Graph Neural Networks
Authors:
Bohang Zhang,
Lingxiao Zhao,
Haggai Maron
Abstract:
Incorporating spectral information to enhance Graph Neural Networks (GNNs) has shown promising results but raises a fundamental challenge due to the inherent ambiguity of eigenvectors. Various architectures have been proposed to address this ambiguity, referred to as spectral invariant architectures. Notable examples include GNNs and Graph Transformers that use spectral distances, spectral project…
▽ More
Incorporating spectral information to enhance Graph Neural Networks (GNNs) has shown promising results but raises a fundamental challenge due to the inherent ambiguity of eigenvectors. Various architectures have been proposed to address this ambiguity, referred to as spectral invariant architectures. Notable examples include GNNs and Graph Transformers that use spectral distances, spectral projection matrices, or other invariant spectral features. However, the potential expressive power of these spectral invariant architectures remains largely unclear. The goal of this work is to gain a deep theoretical understanding of the expressive power obtainable when using spectral features. We first introduce a unified message-passing framework for designing spectral invariant GNNs, called Eigenspace Projection GNN (EPNN). A comprehensive analysis shows that EPNN essentially unifies all prior spectral invariant architectures, in that they are either strictly less expressive or equivalent to EPNN. A fine-grained expressiveness hierarchy among different architectures is also established. On the other hand, we prove that EPNN itself is bounded by a recently proposed class of Subgraph GNNs, implying that all these spectral invariant architectures are strictly less expressive than 3-WL. Finally, we discuss whether using spectral features can gain additional expressiveness when combined with more expressive GNNs.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Non-linear microlocal cut-off functors
Authors:
Bingyu Zhang
Abstract:
To any conic closed set of a cotangent bundle, one can associate 4 functors on the category of sheaves, which are called non-linear microlocal cut-off functors. Here we explain their relation with the microlocal cut-off functor defined by Kashiwara and Schapira, and prove a microlocal cut-off lemma for non-linear microlocal cut-off functors, adapting inputs from symplectic geometry. We also prove…
▽ More
To any conic closed set of a cotangent bundle, one can associate 4 functors on the category of sheaves, which are called non-linear microlocal cut-off functors. Here we explain their relation with the microlocal cut-off functor defined by Kashiwara and Schapira, and prove a microlocal cut-off lemma for non-linear microlocal cut-off functors, adapting inputs from symplectic geometry. We also prove two Künneth formulas and a functor classification result for categories of sheaves with microsupport conditions.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
Score-based generative models are provably robust: an uncertainty quantification perspective
Authors:
Nikiforos Mimikos-Stamatopoulos,
Benjamin J. Zhang,
Markos A. Katsoulakis
Abstract:
Through an uncertainty quantification (UQ) perspective, we show that score-based generative models (SGMs) are provably robust to the multiple sources of error in practical implementation. Our primary tool is the Wasserstein uncertainty propagation (WUP) theorem, a model-form UQ bound that describes how the $L^2$ error from learning the score function propagates to a Wasserstein-1 ($\mathbf{d}_1$)…
▽ More
Through an uncertainty quantification (UQ) perspective, we show that score-based generative models (SGMs) are provably robust to the multiple sources of error in practical implementation. Our primary tool is the Wasserstein uncertainty propagation (WUP) theorem, a model-form UQ bound that describes how the $L^2$ error from learning the score function propagates to a Wasserstein-1 ($\mathbf{d}_1$) ball around the true data distribution under the evolution of the Fokker-Planck equation. We show how errors due to (a) finite sample approximation, (b) early stop**, (c) score-matching objective choice, (d) score function parametrization expressiveness, and (e) reference distribution choice, impact the quality of the generative model in terms of a $\mathbf{d}_1$ bound of computable quantities. The WUP theorem relies on Bernstein estimates for Hamilton-Jacobi-Bellman partial differential equations (PDE) and the regularizing properties of diffusion processes. Specifically, PDE regularity theory shows that stochasticity is the key mechanism ensuring SGM algorithms are provably robust. The WUP theorem applies to integral probability metrics beyond $\mathbf{d}_1$, such as the total variation distance and the maximum mean discrepancy. Sample complexity and generalization bounds in $\mathbf{d}_1$ follow directly from the WUP theorem. Our approach requires minimal assumptions, is agnostic to the manifold hypothesis and avoids absolute continuity assumptions for the target distribution. Additionally, our results clarify the trade-offs among multiple error sources in SGMs.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Distributions of statistics on separable permutations
Authors:
Joanna N. Chen,
Sergey Kitaev,
Philip B. Zhang
Abstract:
We derive functional equations for distributions of six classical statistics (ascents, descents, left-to-right maxima, right-to-left maxima, left-to-right minima, and right-to-left minima) on separable and irreducible separable permutations. The equations are used to find a third degree equation for joint distribution of ascents and descents on separable permutations that generalizes the respectiv…
▽ More
We derive functional equations for distributions of six classical statistics (ascents, descents, left-to-right maxima, right-to-left maxima, left-to-right minima, and right-to-left minima) on separable and irreducible separable permutations. The equations are used to find a third degree equation for joint distribution of ascents and descents on separable permutations that generalizes the respective known result for the descent distribution. Moreover, our general functional equations allow us to derive explicitly (joint) distribution of any subset of maxima and minima statistics on irreducible, reducible and all separable permutations. In particular, there are two equivalence classes of distributions of a pair of maxima or minima statistics. Finally, we present three unimodality conjectures about distributions of statistics on separable permutations.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
New second-order optimality conditions for directional optimality of a general set-constrained optimization problem
Authors:
Wei Ouyang,
Jane Ye,
Binbin Zhang
Abstract:
In this paper we derive new second-order optimality conditions for a very general set-constrained optimization problem where the underlying set may be nononvex. We consider local optimality in specific directions (i.e., optimal in a directional neighborhood) in pursuit of develo** these new optimality conditions. First-order necessary conditions for local optimality in given directions are provi…
▽ More
In this paper we derive new second-order optimality conditions for a very general set-constrained optimization problem where the underlying set may be nononvex. We consider local optimality in specific directions (i.e., optimal in a directional neighborhood) in pursuit of develo** these new optimality conditions. First-order necessary conditions for local optimality in given directions are provided by virtue of the corresponding directional normal cones. Utilizing the classical and/or the lower generalized support function, we obtain new second-order necessary and sufficient conditions for local optimality of general nonconvex constrained optimization problem in given directions via both the corresponding asymptotic second-order tangent cone and outer second-order tangent set. Our results do not require convexity and/or nonemptyness of the outer second-order tangent set. This is an important improvement to other results in the literature since the outer second-order tangent set can be nonconvex and empty even when the set is convex.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
On the CR Nirenberg problem: density and multiplicity of solutions
Authors:
Zhongwei Tang,
Heming Wang,
Bingwei Zhang
Abstract:
We prove some results on the density and multiplicity of positive solutions to the prescribed Webster scalar curvature problem on the $(2n+1)$-dimensional standard unit CR sphere $(\mathbb{S} ^{2n+1},θ_0)$. Specifically, we construct arbitrarily many multi-bump solutions via the variational gluing method. In particular, we show the Webster scalar curvature functions of contact forms conformal to…
▽ More
We prove some results on the density and multiplicity of positive solutions to the prescribed Webster scalar curvature problem on the $(2n+1)$-dimensional standard unit CR sphere $(\mathbb{S} ^{2n+1},θ_0)$. Specifically, we construct arbitrarily many multi-bump solutions via the variational gluing method. In particular, we show the Webster scalar curvature functions of contact forms conformal to $θ_0$ are $C^{0}$-dense among bounded functions which are positive somewhere. Existence results of infinitely many positive solutions to the related equation $-Δ_{\mathbb{H}} u=R(ξ) u^{(n+2) /n}$ on the Heisenberg group $\Hn $ with $R(ξ)$ being asymptotically periodic with respect to left translation are also obtained. Our proofs make use of a refined analysis of bubbling behavior, gradient flow, Pohozaev identity, as well as blow up arguments.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
Stable multivariate Narayana polynomials and labeled plane trees
Authors:
Harold R. L. Yang,
Philip B. Zhang
Abstract:
In this paper, we introduce stable multivariate generalizations of Narayana polynomials of type A and type B. We give an insertion algorithm for labeled plane trees and introduce the notion of improper edges. Our polynomials are multivariate generating polynomials of labeled plane trees and can be generated by a grammatical labeling based on a context-free grammar. Our proof of real stability uses…
▽ More
In this paper, we introduce stable multivariate generalizations of Narayana polynomials of type A and type B. We give an insertion algorithm for labeled plane trees and introduce the notion of improper edges. Our polynomials are multivariate generating polynomials of labeled plane trees and can be generated by a grammatical labeling based on a context-free grammar. Our proof of real stability uses a characterization of stable-preserving linear operators due to Borcea and Brändén. In particular, we get an alternative multivariate stable refinement of the second-order Eulerian polynomials, which is different from the one given by Haglund and Visontai.
△ Less
Submitted 8 April, 2024; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Increasing stability for inverse acoustic source problems in the time domain
Authors:
Chun Liu,
Suliang Si,
Guanghui Hu,
Bo Zhang
Abstract:
This paper is concerned with inverse source problems for the acoustic wave equation in the full space R^3, where the source term is compactly supported in both time and spatial variables. The main goal is to investigate increasing stability for the wave equation in terms of the interval length of given parameters (e.g., bandwith of the temporal component of the source function). We establish incre…
▽ More
This paper is concerned with inverse source problems for the acoustic wave equation in the full space R^3, where the source term is compactly supported in both time and spatial variables. The main goal is to investigate increasing stability for the wave equation in terms of the interval length of given parameters (e.g., bandwith of the temporal component of the source function). We establish increasing stability estimates of the L^2 -norm of the source function by using only the Dirichlet boundary data. Our method relies on the Huygens principle, the Fourier transform and explicit bounds for the continuation of analytic functions.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Beyond Weisfeiler-Lehman: A Quantitative Framework for GNN Expressiveness
Authors:
Bohang Zhang,
**gchu Gai,
Yiheng Du,
Qiwei Ye,
Di He,
Liwei Wang
Abstract:
Designing expressive Graph Neural Networks (GNNs) is a fundamental topic in the graph learning community. So far, GNN expressiveness has been primarily assessed via the Weisfeiler-Lehman (WL) hierarchy. However, such an expressivity measure has notable limitations: it is inherently coarse, qualitative, and may not well reflect practical requirements (e.g., the ability to encode substructures). In…
▽ More
Designing expressive Graph Neural Networks (GNNs) is a fundamental topic in the graph learning community. So far, GNN expressiveness has been primarily assessed via the Weisfeiler-Lehman (WL) hierarchy. However, such an expressivity measure has notable limitations: it is inherently coarse, qualitative, and may not well reflect practical requirements (e.g., the ability to encode substructures). In this paper, we introduce a unified framework for quantitatively studying the expressiveness of GNN architectures, addressing all the above limitations. Specifically, we identify a fundamental expressivity measure termed homomorphism expressivity, which quantifies the ability of GNN models to count graphs under homomorphism. Homomorphism expressivity offers a complete and practical assessment tool: the completeness enables direct expressivity comparisons between GNN models, while the practicality allows for understanding concrete GNN abilities such as subgraph counting. By examining four classes of prominent GNNs as case studies, we derive simple, unified, and elegant descriptions of their homomorphism expressivity for both invariant and equivariant settings. Our results provide novel insights into a series of previous work, unify the landscape of different subareas in the community, and settle several open questions. Empirically, extensive experiments on both synthetic and real-world tasks verify our theory, showing that the practical performance of GNN models aligns well with the proposed metric.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Shuffle Hopf algebra of Multiple zeta values
Authors:
Wenchuan Hu,
Hongyu Xiang,
Bin Zhang
Abstract:
The shuffle relation among multiple zeta values is algebraically expressed as the shuffle algebra. In this paper, the shuffle algebra structure for multiple zeta values is extended to a Hopf algebra structure, for which the key idea is the lifting of the shuffle multiplication to Chen fractions as the function multiplication. The linear span of Chen fractions can be equipped with a locality Hopf a…
▽ More
The shuffle relation among multiple zeta values is algebraically expressed as the shuffle algebra. In this paper, the shuffle algebra structure for multiple zeta values is extended to a Hopf algebra structure, for which the key idea is the lifting of the shuffle multiplication to Chen fractions as the function multiplication. The linear span of Chen fractions can be equipped with a locality Hopf algebra structure, and the pushforward of the coproduct gives us the desired construction on the shuffle algebra.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
A New Global Optimization Method Based on Simplex Branching for Solving a Class of Non-Convex QCQP Problems
Authors:
Bo Zhang,
YueLin Gao,
Xia Liu,
XiaoLi Huang
Abstract:
Quadratic constrained quadratic programming problems often occur in various fields such as engineering practice, management science, and network communication. This article mainly studies a non convex quadratic programming problem with convex quadratic constraints. Firstly, based on our existing results, the problem is reconstructed as an equivalent problem with a simple concave quadratic objectiv…
▽ More
Quadratic constrained quadratic programming problems often occur in various fields such as engineering practice, management science, and network communication. This article mainly studies a non convex quadratic programming problem with convex quadratic constraints. Firstly, based on our existing results, the problem is reconstructed as an equivalent problem with a simple concave quadratic objective function in the result space, with a convex feasible domain. A global optimization algorithm for solving equivalent problems is proposed based on a branch and bound framework that can ensure the global optimality of the solution. This algorithm combines effective relaxation processes with branching processes related to new external approximation techniques. Finally, the theoretical feasibility of the algorithm was analyzed.
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
Outer-space branch-and-bound algorithm for generalized linear multiplicative programs
Authors:
Bo Zhang
Abstract:
This paper introduces a new global optimization algorithm for solving the generalized linear multiplicative problem (GLMP). The algorithm starts by introducing $\bar{p}$ new variables and applying a logarithmic transformation to convert the problem into an equivalent problem (EP). By using the strong duality of linear program, a new convex relaxation subproblem is formulated to obtain the lower bo…
▽ More
This paper introduces a new global optimization algorithm for solving the generalized linear multiplicative problem (GLMP). The algorithm starts by introducing $\bar{p}$ new variables and applying a logarithmic transformation to convert the problem into an equivalent problem (EP). By using the strong duality of linear program, a new convex relaxation subproblem is formulated to obtain the lower bounds for the optimal value of EP. This relaxation subproblem, combined with a simplicial branching process, forms the foundation of a simplicial branch-and-bound algorithm that can globally solve the problem. The paper also includes an analysis of the theoretical convergence and computational complexity of the algorithm. Additionally, numerical experiments are conducted to demonstrate the effectiveness of the proposed algorithm in various test instances.
△ Less
Submitted 2 January, 2024; v1 submitted 23 December, 2023;
originally announced December 2023.
-
On the Hochschild cohomology of Tamarkin categories
Authors:
Christopher Kuo,
Vivek Shende,
Bingyu Zhang
Abstract:
To any open subset of a cotangent bundle, Tamarkin has associated a certain quotient of a category of sheaves. Here we show that the Hochschild cohomology of this category agrees with filtered symplectic cohomology.
To any open subset of a cotangent bundle, Tamarkin has associated a certain quotient of a category of sheaves. Here we show that the Hochschild cohomology of this category agrees with filtered symplectic cohomology.
△ Less
Submitted 5 March, 2024; v1 submitted 18 December, 2023;
originally announced December 2023.
-
Effect of lower order terms on the well-posedness of Majda-Biello systems
Authors:
Xin Yang,
Shenghao Li,
Bing-Yu Zhang
Abstract:
This paper investigates a noteworthy phenomenon within the framework of Majda-Biello systems, wherein the inclusion of lower-order terms can enhance the well-posedness of the system. Specifically, we investigate the initial value problem (IVP) of the following system:
\[
\left\{
\begin{array}{l}
u_{t} + u_{xxx} = - v v_x,
v_{t} + αv_{xxx} + βv_x = - (uv)_{x},
(u,v)|_{t=0} = (u_0,v_0) \…
▽ More
This paper investigates a noteworthy phenomenon within the framework of Majda-Biello systems, wherein the inclusion of lower-order terms can enhance the well-posedness of the system. Specifically, we investigate the initial value problem (IVP) of the following system:
\[
\left\{
\begin{array}{l}
u_{t} + u_{xxx} = - v v_x,
v_{t} + αv_{xxx} + βv_x = - (uv)_{x},
(u,v)|_{t=0} = (u_0,v_0) \in H^{s}(\mathbb{R}) \times H^{s}(\mathbb{R}),
\end{array}
\right. \quad x \in \mathbb{R}, \, t \in \mathbb{R}, \] where $α\in \mathbb{R}\setminus \{0\}$ and $β\in \mathbb{R}$. Let $s^{*}(α, β)$ be the smallest value for which the IVP is locally analytically well-posed in $H^{s}(\mathbb{R})\times H^{s}(\mathbb{R}) $ when $s > s^{}(α, β)$.
Two interesting facts have already been known in literature: $s^{*}(α, 0) = 0$ for $α\in (0,4)\setminus\{1\}$ and $s^*(4,0) = \frac34$. Our key findings include the following:
For $s^{*}(4,β)$, a significant reduction is observed, reaching $\frac12$ for $β> 0$ and $\frac14$ for $β< 0$.
Conversely, when $α\neq 4$, we demonstrate that the value of $β$ exerts no influence on $s^*(α, β)$.
These results shed light on the intriguing behavior of Majda-Biello systems when lower-order terms are introduced and provide valuable insights into the role of $α$ and $β$ in the well-posedness of the system.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
On regular 2-path Hamiltonian graphs
Authors:
Xia Li,
Weihua Yang,
Bo Zhang,
Shuang Zhao
Abstract:
Kronk introduced the $l$-path hamiltonianicity of graphs in 1969. A graph is $l$-path Hamiltonian if every path of length not exceeding $l$ is contained in a Hamiltonian cycle. We have shown that if $P=uvz$ is a 2-path of a 2-connected, $k$-regular graph on at most $2k$ vertices and $G - V(P)$ is connected, then there must exist a Hamiltonian cycle in $G$ that contains the 2-path $P$. In this pape…
▽ More
Kronk introduced the $l$-path hamiltonianicity of graphs in 1969. A graph is $l$-path Hamiltonian if every path of length not exceeding $l$ is contained in a Hamiltonian cycle. We have shown that if $P=uvz$ is a 2-path of a 2-connected, $k$-regular graph on at most $2k$ vertices and $G - V(P)$ is connected, then there must exist a Hamiltonian cycle in $G$ that contains the 2-path $P$. In this paper, we characterize a class of graphs that illustrate the sharpness of the bound $2k$. Additionally, we show that by excluding the class of graphs, both 2-connected, $k$-regular graphs on at most $2k + 1$ vertices and 3-connected, $k$-regular graphs on at most $3k-6$ vertices satisfy that there is a Hamiltonian cycle containing the 2-path $P$ if $G\setminus V(P)$ is connected.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Non-overlap** descents and ascents in stack-sortable permutations
Authors:
Sergey Kitaev,
Philip B. Zhang
Abstract:
The Eulerian polynomials $A_n(x)$ give the distribution of descents over permutations. It is also known that the distribution of descents over stack-sortable permutations (i.e. permutations sortable by a certain algorithm whose internal storage is limited to a single stack data structure) is given by the Narayana numbers $\frac{1}{n}{n \choose k}{n \choose k+1}$. On the other hand, as a corollary…
▽ More
The Eulerian polynomials $A_n(x)$ give the distribution of descents over permutations. It is also known that the distribution of descents over stack-sortable permutations (i.e. permutations sortable by a certain algorithm whose internal storage is limited to a single stack data structure) is given by the Narayana numbers $\frac{1}{n}{n \choose k}{n \choose k+1}$. On the other hand, as a corollary of a much more general result, the distribution of the statistic ``maximum number of non-overlap** descents'', MND, over all permutations is given by $\sum_{n,k \geq 0}D_{n,k}x^k\ frac{t^n}{n!}=\frac{e^t}{1-x(1+(t-1)e^t)}$.
In this paper, we show that the distribution of MND over stack-sortable permutations is given by $\frac{1}{n+1}{n+1\choose 2k+1}{n+k \choose k}$. We give two proofs of the result via bijections with rooted plane (binary) trees allowing us to control MND. Moreover, we show combinatorially that MND is equidistributed with the statistic MNA, the maximum number of non-overlap** ascents, over stack-sortable permutations. The last fact is obtained by establishing an involution on stack-sortable permutations that gives equidistribution of 8 statistics.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Contact non-squeezing at large scale via generating functions
Authors:
Maia Fraser,
Sheila Sandon,
Bingyu Zhang
Abstract:
Using SFT techniques, Eliashberg, Kim and Polterovich (2006) proved that if $πR_2^2 \leq K \leq πR_1^2$ for some integer $K$ then there is no contact squeezing in $\mathbb{R}^{2n} \times S^1$ of the prequantization of the ball of radius $R_1$ into the prequantization of the ball of radius $R_2$. This result was extended to the case of balls of radius $R_1$ and $R_2$ with…
▽ More
Using SFT techniques, Eliashberg, Kim and Polterovich (2006) proved that if $πR_2^2 \leq K \leq πR_1^2$ for some integer $K$ then there is no contact squeezing in $\mathbb{R}^{2n} \times S^1$ of the prequantization of the ball of radius $R_1$ into the prequantization of the ball of radius $R_2$. This result was extended to the case of balls of radius $R_1$ and $R_2$ with $1 \leq πR_2^2 \leq πR_1^2$ by Chiu (2017) and the first author (2016), using respectively microlocal sheaves and SFT. In the present article we recover this general contact non-squeezing theorem using generating functions, a classical method based on finite dimensional Morse theory. More precisely, we develop an equivariant version, with respect to a certain action of a finite cyclic group, of the generating function homology for domains of $\mathbb{R}^{2n} \times S^1$ defined by the second author (2011). A key role in the construction is played by translated chains of contactomorphisms, a generalization of translated points.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
An efficient two-grid fourth-order compact difference scheme with variable-step BDF2 method for the semilinear parabolic equation
Authors:
Bingyin Zhang,
Hongfei Fu
Abstract:
Due to the lack of corresponding analysis on appropriate map** operator between two grids, high-order two-grid difference algorithms are rarely studied. In this paper, we firstly discuss the boundedness of a local bi-cubic Lagrange interpolation operator. And then, taking the semilinear parabolic equation as an example, we first construct a variable-step high-order nonlinear difference algorithm…
▽ More
Due to the lack of corresponding analysis on appropriate map** operator between two grids, high-order two-grid difference algorithms are rarely studied. In this paper, we firstly discuss the boundedness of a local bi-cubic Lagrange interpolation operator. And then, taking the semilinear parabolic equation as an example, we first construct a variable-step high-order nonlinear difference algorithm using compact difference technique in space and the second-order backward differentiation formula (BDF2) with variable temporal stepsize in time. With the help of discrete orthogonal convolution (DOC) kernels and a cut-off numerical technique, the unique solvability and corresponding error estimates of the high-order nonlinear difference scheme are established under assumptions that the temporal stepsize ratio satisfies rk < 4.8645 and the maximum temporal stepsize satisfies tau = o(h^1/2 ). Then, an efficient two-grid high-order difference algorithm is developed by combining a small-scale variable-step high-order nonlinear difference algorithm on the coarse grid and a large-scale variable-step high-order linearized difference algorithm on the fine grid, in which the constructed piecewise bi-cubic Lagrange interpolation map** operator is adopted to project the coarse-grid solution to the fine grid. Under the same temporal stepsize ratio restriction rk < 4.8645 and a weaker maximum temporal stepsize condition tau = o(H^1.2 ), optimal fourth-order in space and second-order in time error estimates of the two-grid difference scheme is established if the coarse-fine grid stepsizes satisfy H = O(h^4/7). Finally, several numerical experiments are carried out to demonstrate the effectiveness and efficiency of the proposed scheme.
△ Less
Submitted 14 October, 2023;
originally announced October 2023.
-
High order numerical methods based on quadratic spline collocation method and averaged L1 scheme for the variable-order time fractional mobile/immobile diffusion equation
Authors:
Xiao Ye,
Jun Liu,
Bingyin Zhang,
Hongfei Fu,
Yue Liu
Abstract:
In this paper, we consider the variable-order time fractional mobile/immobile diffusion (TF-MID) equation in two-dimensional spatial domain, where the fractional order $α(t)$ satisfies $0<α_{*}\leq α(t)\leq α^{*}<1$. We combine the quadratic spline collocation (QSC) method and the $L1^+$ formula to propose a QSC-$L1^+$ scheme. It can be proved that, the QSC-$L1^+$ scheme is unconditionally stable…
▽ More
In this paper, we consider the variable-order time fractional mobile/immobile diffusion (TF-MID) equation in two-dimensional spatial domain, where the fractional order $α(t)$ satisfies $0<α_{*}\leq α(t)\leq α^{*}<1$. We combine the quadratic spline collocation (QSC) method and the $L1^+$ formula to propose a QSC-$L1^+$ scheme. It can be proved that, the QSC-$L1^+$ scheme is unconditionally stable and convergent with $\mathcal{O}(τ^{\min{\{3-α^*-α(0),2\}}} + Δx^{2}+Δy^{2})$, where $τ$, $Δx$ and $Δy$ are the temporal and spatial step sizes, respectively. With some proper assumptions on $α(t)$, the QSC-$L1^+$ scheme has second temporal convergence order even on the uniform mesh, without any restrictions on the solution of the equation. We further construct a novel alternating direction implicit (ADI) framework to develop an ADI-QSC-$L1^+$ scheme, which has the same unconditionally stability and convergence orders. In addition, a fast implementation for the ADI-QSC-$L1^+$ scheme based on the exponential-sum-approximation (ESA) technique is proposed. Moreover, we also introduce the optimal QSC method to improve the spatial convergence to fourth-order. Numerical experiments are attached to support the theoretical analysis, and to demonstrate the effectiveness of the proposed schemes.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Convex Restriction of Feasible Sets for AC Radial Networks
Authors:
Ling Zhang,
Daniel Tabas,
Baosen Zhang
Abstract:
Many problems in power systems involve optimizing a certain objective function subject to power flow equations and engineering constraints. A long-standing challenge in solving them is the nonconvexity of their feasible sets. In this paper, we propose an analytical method to construct the convex restriction of the feasible set for AC power flows in radial networks. The construction relies on simpl…
▽ More
Many problems in power systems involve optimizing a certain objective function subject to power flow equations and engineering constraints. A long-standing challenge in solving them is the nonconvexity of their feasible sets. In this paper, we propose an analytical method to construct the convex restriction of the feasible set for AC power flows in radial networks. The construction relies on simple geometrical ideas and is explicit, in the sense that it does not involve solving other complicated optimization problems. We also show that the construct restrictions are in some sense maximal, that is, the best possible ones. Optimization problems constrained to these sets are not only simpler to solve but also offer feasibility guarantee for the solutions to the original OPF problem. Furthermore, we present an iterative algorithm to improve on the solution quality by successively constructing a sequence of convex restricted sets and solving the optimization on them. The numerical experiments on the IEEE 123-bus distribution network show that our method finds good feasible solutions within just a few iterations and works well with various objective functions, even in situations where traditional methods fail to return a solution.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
AONN-2: An adjoint-oriented neural network method for PDE-constrained shape optimization
Authors:
Xili Wang,
Pengfei Yin,
Bo Zhang,
Chao Yang
Abstract:
Shape optimization has been playing an important role in a large variety of engineering applications. Existing shape optimization methods are generally mesh-dependent and therefore encounter challenges due to mesh deformation. To overcome this limitation, we present a new adjoint-oriented neural network method, AONN-2, for PDE-constrained shape optimization problems. This method extends the capabi…
▽ More
Shape optimization has been playing an important role in a large variety of engineering applications. Existing shape optimization methods are generally mesh-dependent and therefore encounter challenges due to mesh deformation. To overcome this limitation, we present a new adjoint-oriented neural network method, AONN-2, for PDE-constrained shape optimization problems. This method extends the capabilities of the original AONN method [1], which is developed for efficiently solving parametric optimal control problems. AONN-2 inherits the direct-adjoint loo** (DAL) framework for computing the extremum of an objective functional and the neural network methods for solving complicated PDEs from AONN. Furthermore, AONN-2 expands the application scope to shape optimization by taking advantage of the shape derivatives to optimize the shape represented by discrete boundary points. AONN-2 is a fully mesh-free shape optimization approach, naturally sidestep** issues related to mesh deformation, with no need for maintaining mesh quality and additional mesh corrections. A series of experimental results are presented, highlighting the flexibility, robustness, and accuracy of AONN-2.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Serving Time: Real-Time, Safe Motion Planning and Control for Manipulation of Unsecured Objects
Authors:
Zachary Brei,
Jonathan Michaux,
Bohao Zhang,
Patrick Holmes,
Ram Vasudevan
Abstract:
A key challenge to ensuring the rapid transition of robotic systems from the industrial sector to more ubiquitous applications is the development of algorithms that can guarantee safe operation while in close proximity to humans. Motion planning and control methods, for instance, must be able to certify safety while operating in real-time in arbitrary environments and in the presence of model unce…
▽ More
A key challenge to ensuring the rapid transition of robotic systems from the industrial sector to more ubiquitous applications is the development of algorithms that can guarantee safe operation while in close proximity to humans. Motion planning and control methods, for instance, must be able to certify safety while operating in real-time in arbitrary environments and in the presence of model uncertainty. This paper proposes Wrench Analysis for Inertial Transport using Reachability (WAITR), a certifiably safe motion planning and control framework for serial link manipulators that manipulate unsecured objects in arbitrary environments. WAITR uses reachability analysis to construct over-approximations of the contact wrench applied to unsecured objects, which captures uncertainty in the manipulator dynamics, the object dynamics, and contact parameters such as the coefficient of friction. An optimization problem formulation is presented that can be solved in real-time to generate provably-safe motions for manipulating the unsecured objects. This paper illustrates that WAITR outperforms state of the art methods in a variety of simulation experiments and demonstrates its performance in the real-world.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Ring structures in singular instanton homology
Authors:
Yi Xie,
Boyu Zhang
Abstract:
We calculate the ring structure of the singular instanton Floer homology of $(S^1\times Σ, S^1\times \{p_1,\dots,p_n\})$ with C-coefficients, where $Σ$ is a closed oriented surface. As an application, we prove an excision formula for singular instanton homology when n=1. This settles the last unknown case of excision formula for instanton Floer homology.
We calculate the ring structure of the singular instanton Floer homology of $(S^1\times Σ, S^1\times \{p_1,\dots,p_n\})$ with C-coefficients, where $Σ$ is a closed oriented surface. As an application, we prove an excision formula for singular instanton homology when n=1. This settles the last unknown case of excision formula for instanton Floer homology.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
Idempotence of microlocal kernels and $S^1$-equivariant Chiu-Tamarkin invariant
Authors:
Bingyu Zhang
Abstract:
In this article, we present some results and constructions about the Chiu-Tamarkin invariant motivated by the idempotence of microlocal kernels, including: (1) a natural explanation for the definition of the $\mathbb{Z}/\ell$-equivariant Chiu-Tamarkin invariant; (2) a graded commutative product on the non-equivariant Chiu-Tamarkin invariant; and (3) a construction of the $S^1$-equivariant Chiu-Tam…
▽ More
In this article, we present some results and constructions about the Chiu-Tamarkin invariant motivated by the idempotence of microlocal kernels, including: (1) a natural explanation for the definition of the $\mathbb{Z}/\ell$-equivariant Chiu-Tamarkin invariant; (2) a graded commutative product on the non-equivariant Chiu-Tamarkin invariant; and (3) a construction of the $S^1$-equivariant Chiu-Tamarkin invariant. As applications, we: (1) construct a sequence of symplectic capacities $(\overline{c}_k)_{k\in \mathbb{N}}$ and prove that it coincides with the symplectic capacities $({c}_k)_{k\in \mathbb{N}}$ we defined using the $\mathbb{Z}/\ell$-equivariant Chiu-Tamarkin invariant under certain conditions; and (2) prove a Viterbo isomorphism. In the Appendix, we provide a proof of admissibility for all open sets in a cotangent bundle under the setup of triangulated categories.
△ Less
Submitted 18 December, 2023; v1 submitted 21 June, 2023;
originally announced June 2023.
-
Gauss diagram formulae for Vassiliev invariants from Kauffman polynomial
Authors:
Butian Zhang
Abstract:
A state model for Kauffman polynomial of Dubrovnik-version is given. Based on the state model, the Gauss diagram formulae for Vassiliev invariants are given from the coefficients of Kauffman polynomial following the method of Chmutov and Polyak. Some arrow diagram identities are given to simplify the Gauss diagram formulae of order 3, which give Polyak-Viro and Chmutov-Polyak formulae for the Vass…
▽ More
A state model for Kauffman polynomial of Dubrovnik-version is given. Based on the state model, the Gauss diagram formulae for Vassiliev invariants are given from the coefficients of Kauffman polynomial following the method of Chmutov and Polyak. Some arrow diagram identities are given to simplify the Gauss diagram formulae of order 3, which give Polyak-Viro and Chmutov-Polyak formulae for the Vassiliev invariant of order 3. The models of Kauffman polynomial and HOMFLY-PT polynomial give different Gauss diagram expressions when specializing to Jones poynomial.
△ Less
Submitted 2 June, 2023;
originally announced June 2023.
-
Improved Dynamic Regret of Distributed Online Multiple Frank-Wolfe Convex Optimization
Authors:
Wentao Zhang,
Yang Shi,
Baoyong Zhang,
Deming Yuan
Abstract:
In this paper, we consider a distributed online convex optimization problem over a time-varying multi-agent network. The goal of this network is to minimize a global loss function through local computation and communication with neighbors. To effectively handle the optimization problem with a high-dimensional and structural constraint set, we develop a distributed online multiple Frank-Wolfe algor…
▽ More
In this paper, we consider a distributed online convex optimization problem over a time-varying multi-agent network. The goal of this network is to minimize a global loss function through local computation and communication with neighbors. To effectively handle the optimization problem with a high-dimensional and structural constraint set, we develop a distributed online multiple Frank-Wolfe algorithm to avoid the expensive computational cost of projection operation. The dynamic regret bounds are established as $\mathcal{O}(T^{1-γ}+H_T)$ with the linear oracle number $\mathcal{O} (T^{1+γ})$, which depends on the horizon (total iteration number) $T$, the function variation $H_T$, and the tuning parameter $0<γ<1$. In particular, when the prior knowledge of $H_T$ and $T$ is available, the bound can be enhanced to $\mathcal{O} (1+H_T)$. Moreover, we illustrate the significant advantages of the multiple iteration technique and reveal a trade-off between dynamic regret bound, computational cost, and communication cost. Finally, the performance of our algorithm is verified and compared through the distributed online ridge regression problems with two constraint sets.
△ Less
Submitted 24 September, 2023; v1 submitted 22 May, 2023;
originally announced May 2023.
-
Direct imaging methods for reconstructing a locally rough interface from phaseless total-field data or phased far-field data
Authors:
Long Li,
Jiansheng Yang,
Bo Zhang,
Haiwen Zhang
Abstract:
This paper is concerned with the problem of inverse scattering of time-harmonic acoustic plane waves by a two-layered medium with a locally rough interface in 2D. A direct imaging method is proposed to reconstruct the locally rough interface from the phaseless total-field data measured on the upper half of the circle with a large radius at a fixed frequency or from the phased far-field data measur…
▽ More
This paper is concerned with the problem of inverse scattering of time-harmonic acoustic plane waves by a two-layered medium with a locally rough interface in 2D. A direct imaging method is proposed to reconstruct the locally rough interface from the phaseless total-field data measured on the upper half of the circle with a large radius at a fixed frequency or from the phased far-field data measured on the upper half of the unit circle at a fixed frequency. The presence of the locally rough interface poses challenges in the theoretical analysis of the imaging methods. To address these challenges, a technically involved asymptotic analysis is provided for the relevant oscillatory integrals involved in the imaging methods, based mainly on the techniques and results in our recent work [L. Li, J. Yang, B. Zhang and H. Zhang, arXiv:2208.00456] on the uniform far-field asymptotics of the scattered field for acoustic scattering in a two-layered medium. Finally, extensive numerical experiments are conducted to demonstrate the feasibility and robustness of our imaging algorithms.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
A polar Brauer category and Lie superalgebra representations
Authors:
G. I. Lehrer,
R. B. Zhang
Abstract:
We introduce a diagram category, study its structure, and investigate some of its applications to the representation theory of Lie algebras and Lie superalgebras.
The morphisms of the category, which contains a subcategory isomorphic to the Brauer category, are linear combinations of `polar enhancements' of Brauer diagrams. The endomorphism algebra of each of its objects is a quotient of an alge…
▽ More
We introduce a diagram category, study its structure, and investigate some of its applications to the representation theory of Lie algebras and Lie superalgebras.
The morphisms of the category, which contains a subcategory isomorphic to the Brauer category, are linear combinations of `polar enhancements' of Brauer diagrams. The endomorphism algebra of each of its objects is a quotient of an algebra of chord diagrams. Analogues of the affine Temperley-Lieb category and Temperley-Lieb category of type B, whose structures are thoroughly understood, arise from particular quotients of our category.
We construct a functor from our category to the full subcategory of modules for the Lie superalgebra $\mathfrak{osp}(V; ω)$ with objects $M\otimes V^{\otimes r}$ for all $r=0, 1, \dots$, where $M$ is an arbitrary module, and $V$ is the natural module. When $M$ is the universal envelo** superalgebra $\text{U}(\mathfrak{osp}(V; ω))$, this functor provides an effective tool for the study of $\text{U}(\mathfrak{osp}(V; ω))$. An analysis of this functor leads to a diagrammatic construction of explicit generators for the centre of the universal envelo** superalgebra and, in the special cases when $V$ is purely even or purely odd (i.e. the classical cases), categorical interpretations of certain widely studied ``characteristic identities'' of the orthogonal and symplectic Lie algebras. In the case $V=\mathbb{C}^{0|2}$ so that $\mathfrak{osp}(V; ω))=\mathfrak{sp}_2(\mathbb{C})$, we prove that our type B Temperley-Lieb category is isomorphic to a full subcategory of category $\mathcal O$ for $\mathfrak{sp}_2(\mathbb{C})$.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
PINNSim: A Simulator for Power System Dynamics based on Physics-Informed Neural Networks
Authors:
Jochen Stiasny,
Baosen Zhang,
Spyros Chatzivasileiadis
Abstract:
The dynamic behaviour of a power system can be described by a system of differential-algebraic equations. Time-domain simulations are used to simulate the evolution of these dynamics. They often require the use of small time step sizes and therefore become computationally expensive. To accelerate these simulations, we propose a simulator -- PINNSim -- that allows to take significantly larger time…
▽ More
The dynamic behaviour of a power system can be described by a system of differential-algebraic equations. Time-domain simulations are used to simulate the evolution of these dynamics. They often require the use of small time step sizes and therefore become computationally expensive. To accelerate these simulations, we propose a simulator -- PINNSim -- that allows to take significantly larger time steps. It is based on Physics-Informed Neural Networks (PINNs) for the solution of the dynamics of single components in the power system. To resolve their interaction we employ a scalable root-finding algorithm. We demonstrate PINNSim on a 9-bus system and show the increased time step size compared to a trapezoidal integration rule. We discuss key characteristics of PINNSim and important steps for develo** PINNSim into a fully fledged simulator. As such, it could offer the opportunity for significantly increasing time step sizes and thereby accelerating time-domain simulations.
△ Less
Submitted 23 October, 2023; v1 submitted 17 March, 2023;
originally announced March 2023.
-
A Nyström Method for Scattering by a Two-layered Medium with a Rough Boundary
Authors:
Haiyang Liu,
Long Li,
Jiansheng Yang,
Bo Zhang,
Haiwen Zhang
Abstract:
This paper considers the problems of scattering of time-harmonic acoustic waves by a two-layered medium with a non-locally perturbed boundary (called a rough boundary in this paper) in two dimensions, where a Dirichlet or impedance boundary condition is imposed on the boundary. The two-layered medium is composed of two unbounded media with different physical properties and the interface between th…
▽ More
This paper considers the problems of scattering of time-harmonic acoustic waves by a two-layered medium with a non-locally perturbed boundary (called a rough boundary in this paper) in two dimensions, where a Dirichlet or impedance boundary condition is imposed on the boundary. The two-layered medium is composed of two unbounded media with different physical properties and the interface between the two media is considered to be a planar surface. We formulate the considered scattering problems as the boundary value problems and prove that each boundary value problem has a unique solution by utilizing the integral equation method associated with the two-layered Green function. Moreover, we develop the Nyström method for numerically solving the considered boundary value problems, based on the proposed integral equation formulations. We establish the convergence results of the Nyström method with the convergence rates depending on the smoothness of the rough boundary. It is worth noting that in establishing the well-posedness of the boundary value problems as well as the convergence results of the Nyström method, an essential role is played by the investigation of the asymptotic properties of the two-layered Green function for small and large arguments. Finally, numerical experiments are carried out to show the effectiveness of the Nyström method.
△ Less
Submitted 11 June, 2024; v1 submitted 4 March, 2023;
originally announced March 2023.
-
Enumerations of some pattern-avoiding Fishburn permutations
Authors:
Yujie Du,
Philip B. Zhang
Abstract:
In this paper, we prove two conjectures of Egge on the enumeration of several classes of pattern-avoiding Fishburn permutations. Our results include enumerating Fishburn permutations avoiding pattern 321 and one of the following three types of classical patterns: a pattern of size 4, two patterns of size 4, or a pattern of size 5.
In this paper, we prove two conjectures of Egge on the enumeration of several classes of pattern-avoiding Fishburn permutations. Our results include enumerating Fishburn permutations avoiding pattern 321 and one of the following three types of classical patterns: a pattern of size 4, two patterns of size 4, or a pattern of size 5.
△ Less
Submitted 21 February, 2024; v1 submitted 27 February, 2023;
originally announced February 2023.
-
Quantized Distributed Online Projection-free Convex Optimization
Authors:
Wentao Zhang,
Yang Shi,
Baoyong Zhang,
Kaihong Lu,
Deming Yuan
Abstract:
This paper considers online distributed convex constrained optimization over a time-varying multi-agent network. Agents in this network cooperate to minimize the global objective function through information exchange with their neighbors and local computation. Since the capacity or bandwidth of communication channels often is limited, a random quantizer is introduced to reduce the transmission bit…
▽ More
This paper considers online distributed convex constrained optimization over a time-varying multi-agent network. Agents in this network cooperate to minimize the global objective function through information exchange with their neighbors and local computation. Since the capacity or bandwidth of communication channels often is limited, a random quantizer is introduced to reduce the transmission bits. Through incorporating this quantizer, we develop a quantized distributed online projection-free optimization algorithm, which can achieve the saving of communication resources and computational costs. For different parameter settings of the quantizer, we establish the corresponding dynamic regret upper bounds of the proposed algorithm and reveal the trade-off between the convergence performance and the quantization effect. Finally, the theoretical results are illustrated by the simulation of distributed online linear regression problem.
△ Less
Submitted 7 May, 2023; v1 submitted 27 February, 2023;
originally announced February 2023.
-
A deformation of Asaeda-Przytycki-Sikora homology
Authors:
Zhenkun Li,
Yi Xie,
Boyu Zhang
Abstract:
We define a 1-parameter family of homology invariants for links in thickened oriented surfaces. It recovers the homology invariant of Asaeda-Przytycki-Sikora (arxiv:0409414) and the invariant defined by Winkeler (arxiv:2106.03834). The new invariant can be regarded as a deformation of Asaeda-Przytycki-Sikora homology; it is not a Lee-type deformation as the deformation is only non-trivial when the…
▽ More
We define a 1-parameter family of homology invariants for links in thickened oriented surfaces. It recovers the homology invariant of Asaeda-Przytycki-Sikora (arxiv:0409414) and the invariant defined by Winkeler (arxiv:2106.03834). The new invariant can be regarded as a deformation of Asaeda-Przytycki-Sikora homology; it is not a Lee-type deformation as the deformation is only non-trivial when the surface is not simply connected. Our construction is motivated by computations in singular instanton Floer homology. We also prove a detection property for the new invariant, which is a stronger result than the main theorem of arxiv:2208.13963.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Eight-node solid brick element high-order stiffness matrix template
Authors:
Boning Zhang,
Lan Nguyen
Abstract:
In this paper, the template will be developed from an assumed Stress Method, which its formulation is based on the Hellinger-Reissner principle developed according to Kang's study in 1986. The element stiffness is decomposed into a basic part that takes care of consistency and mix-ability, and a HO element stiffness part that takes care of stability (also known as rank sufficient) and accuracy. In…
▽ More
In this paper, the template will be developed from an assumed Stress Method, which its formulation is based on the Hellinger-Reissner principle developed according to Kang's study in 1986. The element stiffness is decomposed into a basic part that takes care of consistency and mix-ability, and a HO element stiffness part that takes care of stability (also known as rank sufficient) and accuracy. In the FE method, the HO stiffness is based on a displacement formulation, whereas the basis stiffness is method independent. To start, one should be familiar with the definition of a solid brick element. Solid brick element is three-dimensional finite elements that can model solid bodies and structures without any a priori geometric simplification.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Weather2K: A Multivariate Spatio-Temporal Benchmark Dataset for Meteorological Forecasting Based on Real-Time Observation Data from Ground Weather Stations
Authors:
Xun Zhu,
Yutong Xiong,
Ming Wu,
Gaozhen Nie,
Bin Zhang,
Ziheng Yang
Abstract:
Weather forecasting is one of the cornerstones of meteorological work. In this paper, we present a new benchmark dataset named Weather2K, which aims to make up for the deficiencies of existing weather forecasting datasets in terms of real-time, reliability, and diversity, as well as the key bottleneck of data quality. To be specific, our Weather2K is featured from the following aspects: 1) Reliabl…
▽ More
Weather forecasting is one of the cornerstones of meteorological work. In this paper, we present a new benchmark dataset named Weather2K, which aims to make up for the deficiencies of existing weather forecasting datasets in terms of real-time, reliability, and diversity, as well as the key bottleneck of data quality. To be specific, our Weather2K is featured from the following aspects: 1) Reliable and real-time data. The data is hourly collected from 2,130 ground weather stations covering an area of 6 million square kilometers. 2) Multivariate meteorological variables. 20 meteorological factors and 3 constants for position information are provided with a length of 40,896 time steps. 3) Applicable to diverse tasks. We conduct a set of baseline tests on time series forecasting and spatio-temporal forecasting. To the best of our knowledge, our Weather2K is the first attempt to tackle weather forecasting task by taking full advantage of the strengths of observation data from ground weather stations. Based on Weather2K, we further propose Meteorological Factors based Multi-Graph Convolution Network (MFMGCN), which can effectively construct the intrinsic correlation among geographic locations based on meteorological factors. Sufficient experiments show that MFMGCN improves both the forecasting performance and temporal robustness. We hope our Weather2K can significantly motivate researchers to develop efficient and accurate algorithms to advance the task of weather forecasting. The dataset can be available at https://github.com/bycnfz/weather2k/.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Transport map unadjusted Langevin algorithms: learning and discretizing perturbed samplers
Authors:
Benjamin J. Zhang,
Youssef M. Marzouk,
Konstantinos Spiliopoulos
Abstract:
Langevin dynamics are widely used in sampling high-dimensional, non-Gaussian distributions whose densities are known up to a normalizing constant. In particular, there is strong interest in unadjusted Langevin algorithms (ULA), which directly discretize Langevin dynamics to estimate expectations over the target distribution. We study the use of transport maps that approximately normalize a target…
▽ More
Langevin dynamics are widely used in sampling high-dimensional, non-Gaussian distributions whose densities are known up to a normalizing constant. In particular, there is strong interest in unadjusted Langevin algorithms (ULA), which directly discretize Langevin dynamics to estimate expectations over the target distribution. We study the use of transport maps that approximately normalize a target distribution as a way to precondition and accelerate the convergence of Langevin dynamics. We show that in continuous time, when a transport map is applied to Langevin dynamics, the result is a Riemannian manifold Langevin dynamics (RMLD) with metric defined by the transport map. We also show that applying a transport map to an irreversibly-perturbed ULA results in a geometry-informed irreversible perturbation (GiIrr) of the original dynamics. These connections suggest more systematic ways of learning metrics and perturbations, and also yield alternative discretizations of the RMLD described by the map, which we study. Under appropriate conditions, these discretized processes can be endowed with non-asymptotic bounds describing convergence to the target distribution in 2-Wasserstein distance. Illustrative numerical results complement our theoretical claims.
△ Less
Submitted 28 September, 2023; v1 submitted 14 February, 2023;
originally announced February 2023.
-
A Monte Carlo packing algorithm for poly-ellipsoids and its comparison with packing generation using Discrete Element Model
Authors:
Boning Zhang,
Eric B. Herbold,
Richard A. Regueiro
Abstract:
Granular material is showing very often in geotechnical engineering, petroleum engineering, material science and physics. The packings of the granular material play a very important role in their mechanical behaviors, such as stress-strain response, stability, permeability and so on. Although packing is such an important research topic that its generation has been attracted lots of attentions for…
▽ More
Granular material is showing very often in geotechnical engineering, petroleum engineering, material science and physics. The packings of the granular material play a very important role in their mechanical behaviors, such as stress-strain response, stability, permeability and so on. Although packing is such an important research topic that its generation has been attracted lots of attentions for a long time in theoretical, experimental, and numerical aspects, packing of granular material is still a difficult and active research topic, especially the generation of random packing of non-spherical particles. To this end, we will generate packings of same particles with same shapes, numbers, and same size distribution using geometry method and dynamic method, separately. Specifically, we will extend one of Monte Carlo models for spheres to ellipsoids and poly-ellipsoids.
△ Less
Submitted 14 May, 2023; v1 submitted 10 February, 2023;
originally announced February 2023.
-
Dynamic Regret of Distributed Online Frank-Wolfe Convex Optimization
Authors:
Wentao Zhang,
Yang Shi,
Baoyong Zhang,
Deming Yuan
Abstract:
This paper considers distributed online convex constrained optimization, in which various agents in a multi-agent system cooperate to minimize a global cost function through communicating with neighbors over a time-varying network. When the constraint set of optimization problem is high-dimensional and complicated, the computational cost of the projection operation often becomes prohibitive. To ha…
▽ More
This paper considers distributed online convex constrained optimization, in which various agents in a multi-agent system cooperate to minimize a global cost function through communicating with neighbors over a time-varying network. When the constraint set of optimization problem is high-dimensional and complicated, the computational cost of the projection operation often becomes prohibitive. To handle this problem, we develop a distributed online Frank-Wolfe optimization algorithm combining with gradient tracking technique. We rigorously establish the dynamic regret bound of the proposed optimization algorithm as $\mathcal{O}(\sqrt{T(1+H_T)}+D_T)$, which explicitly depends on the iteration round $T$, function variation $H_T$, and gradient variation $D_T$. Finally, the theoretical results are verified and compared in the case of distributed online ridge regression problems.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
Can't Touch This: Real-Time, Safe Motion Planning and Control for Manipulators Under Uncertainty
Authors:
Jonathan Michaux,
Patrick Holmes,
Bohao Zhang,
Che Chen,
Baiyue Wang,
Shrey Sahgal,
Tiancheng Zhang,
Sidhartha Dey,
Shreyas Kousik,
Ram Vasudevan
Abstract:
Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and trac…
▽ More
Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and tracking controller framework for robotic manipulators to address these challenges. ARMOUR first constructs a robust controller that tracks desired trajectories with bounded error despite uncertain dynamics. ARMOUR then uses a novel recursive Newton-Euler method to compute all inputs required to track any trajectory within a continuum of desired trajectories. Finally, ARMOUR over-approximates the swept volume of the manipulator; this enables one to formulate an optimization problem that can be solved in real-time to synthesize provably-safe motions. This paper compares ARMOUR to state of the art methods on a set of challenging manipulation examples in simulation and demonstrates its ability to ensure safety on real hardware in the presence of model uncertainty without sacrificing performance. Project page: https://roahmlab.github.io/armour/.
△ Less
Submitted 1 November, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Locality Galois groups of meromorphic germs in several variables
Authors:
Li Guo,
Sylvie Paycha,
Bin Zhang
Abstract:
Meromorphic germs in several variables with linear poles naturally arise in mathematics in various disguises. We investigate their rich structures under the prism of locality, including locality subalgebras, locality transformation groups and locality characters. The key technical tool is the dependence subspace for a meromorphic germ with which we define a locality orthogonal relation between two…
▽ More
Meromorphic germs in several variables with linear poles naturally arise in mathematics in various disguises. We investigate their rich structures under the prism of locality, including locality subalgebras, locality transformation groups and locality characters. The key technical tool is the dependence subspace for a meromorphic germ with which we define a locality orthogonal relation between two meromorphic germs. We describe the structure of locality subalgebras generated by classes of meromorphic germs with certain types of poles. We also define and determine their group of locality transformations which fix the holomorphic germs and preserve multivariable residues, a group we call the locality Galois group.
We then specialise to two classes of meromorphic germs with prescribed types of nested poles, arising from multiple zeta functions in number theory and Feynman integrals in perturbative quantum field theory respectively. We show that they are locality polynomial subalgebras with locality polynomial bases given by the locality counterpart of Lyndon words. This enables us to explicitly describe their locality Galois group.
As an application, we propose a mathematical interpretation of Speer's analytic renormalisation for Feynman amplitudes. We study a class of locality characters, called generalised evaluators after Speer. We show that the locality Galois group acts transitively on generalised evaluators by composition, thus providing a candidate for a renormalisation group in this multivariable approach.
△ Less
Submitted 5 January, 2023;
originally announced January 2023.
-
Solving the Wide-band Inverse Scattering Problem via Equivariant Neural Networks
Authors:
Borong Zhang,
Leonardo Zepeda-Núñez,
Qin Li
Abstract:
This paper introduces a novel deep neural network architecture for solving the inverse scattering problem in frequency domain with wide-band data, by directly approximating the inverse map, thus avoiding the expensive optimization loop of classical methods. The architecture is motivated by the filtered back-projection formula in the full aperture regime and with homogeneous background, and it leve…
▽ More
This paper introduces a novel deep neural network architecture for solving the inverse scattering problem in frequency domain with wide-band data, by directly approximating the inverse map, thus avoiding the expensive optimization loop of classical methods. The architecture is motivated by the filtered back-projection formula in the full aperture regime and with homogeneous background, and it leverages the underlying equivariance of the problem and compressibility of the integral operator. This drastically reduces the number of training parameters, and therefore the computational and sample complexity of the method. In particular, we obtain an architecture whose number of parameters scale sub-linearly with respect to the dimension of the inputs, while its inference complexity scales super-linearly but with very small constants. We provide several numerical tests that show that the current approach results in better reconstruction than optimization-based techniques such as full-waveform inversion, but at a fraction of the cost while being competitive with state-of-the-art machine learning methods.
△ Less
Submitted 11 October, 2023; v1 submitted 12 December, 2022;
originally announced December 2022.
-
A combinatorial one-cocycle in a moduli space of knots from the Vassiliev invariant of order 3
Authors:
Baptiste Gros,
Butian Zhang
Abstract:
The theory of Gauss diagrams and Gauss diagram formulas provides convenient ways to compute knot invariants, such as coefficients of the HOMFLYPT polynomial. In \cite{4,5}, the author uses Gauss diagram formulas to find combinatorial 1-cocycles in the moduli space of knots in the solid torus. Evaluated on canonical loops, one can then obtain new, non trivial knot invariants. In those books, the au…
▽ More
The theory of Gauss diagrams and Gauss diagram formulas provides convenient ways to compute knot invariants, such as coefficients of the HOMFLYPT polynomial. In \cite{4,5}, the author uses Gauss diagram formulas to find combinatorial 1-cocycles in the moduli space of knots in the solid torus. Evaluated on canonical loops, one can then obtain new, non trivial knot invariants. In those books, the author conjectures that a new formula, based on the Vassiliev invariant $v_3$ also gives a 1-cocycle. We prove that it is in fact true by using the same methods developed by the author in those books.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
Diagram categories and invariant theory for classical groups and supergroups
Authors:
G. I. Lehrer,
R. B. Zhang
Abstract:
We introduce the notion of a diagram category and discuss its application to the invariant theory of classical groups and super groups, with some indications concerning extensions to quantum groups and quantum super groups. Tensor functors from various diagram categories to categories of representnations are introduced and their properties investigated, leading to first and second fundamental theo…
▽ More
We introduce the notion of a diagram category and discuss its application to the invariant theory of classical groups and super groups, with some indications concerning extensions to quantum groups and quantum super groups. Tensor functors from various diagram categories to categories of representnations are introduced and their properties investigated, leading to first and second fundamental theorems of invariant theory for classical super groups, which include the classical groups as special cases. Application of diagrammatic methods enables the constructionof a presentation for endomorphism algebras for te orthogonal and symplectic groups, leading to the solution ofproblems raised by the work of Brauer and Weyl.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Edge-fault-tolerance about the SM-λ property of hypercube-like networks
Authors:
Dong Liu. **shan Li,
Bicheng Zhang
Abstract:
The edge-fault-tolerance of networks is of great significance to the design and maintenance of networks. For any pair of vertices $u$ and $v$ of the connected graph $G$, if they are connected by $\min \{ °_G(u),°_G(v)\}$ edge-disjoint paths, then $G$ is strong Menger edge connected (SM-$λ$ for short).
The conditional edge-fault-tolerance about the SM-$ λ$ property of $G$, written $sm_λ^r(G)$, is…
▽ More
The edge-fault-tolerance of networks is of great significance to the design and maintenance of networks. For any pair of vertices $u$ and $v$ of the connected graph $G$, if they are connected by $\min \{ °_G(u),°_G(v)\}$ edge-disjoint paths, then $G$ is strong Menger edge connected (SM-$λ$ for short).
The conditional edge-fault-tolerance about the SM-$ λ$ property of $G$, written $sm_λ^r(G)$, is the maximum value of $m$ such that $G-F$ is still SM-$λ$ for any edge subset $F$ with $|F|\leq m$ and $δ(G-F)\geq r$, where $δ(G-F)$ is the minimum degree of $G-F$.
Previously, most of the exact value for $sm_λ^r(G)$ is aimed at some well-known networks when $r\leq 2$, and a few of the lower bounds on some well-known networks for $r\geq 3$. In this paper, we firstly determine the exact value of $sm_λ^r(G)$ on class of hypercube-like networks (HL-networks for short, including hypercubes, twisted cubes, crossed cubes etc.) for a general $r$, that is, $sm_λ^r(G_n)=2^r(n-r)-n$ for every $G_n\in HL_n$, where $n\geq 3$ and $1\leq r \leq n-2$.
△ Less
Submitted 24 September, 2022;
originally announced September 2022.
-
Instanton homology and knot detection on thickened surfaces
Authors:
Zhenkun Li,
Yi Xie,
Boyu Zhang
Abstract:
Suppose $Σ$ is a compact oriented surface (possibly with boundary) that has genus zero, and L is a link in the interior of $(-1,1)\timesΣ$. We prove that the Asaeda-Przytycki-Sikora (APS) homology of L has rank 2 if and only if L is isotopic to an embedded knot in $\{0\}\timesΣ$. As a consequence, the APS homology detects the unknot in $(-1,1)\timesΣ$. This is the first detection result for genera…
▽ More
Suppose $Σ$ is a compact oriented surface (possibly with boundary) that has genus zero, and L is a link in the interior of $(-1,1)\timesΣ$. We prove that the Asaeda-Przytycki-Sikora (APS) homology of L has rank 2 if and only if L is isotopic to an embedded knot in $\{0\}\timesΣ$. As a consequence, the APS homology detects the unknot in $(-1,1)\timesΣ$. This is the first detection result for generalized Khovanov homology that is valid on an infinite family of manifolds, and it partially solves a conjecture in arxiv:2005.12863. Our proof is different from the previous detection results obtained by instanton homology because in this case, the second page of Kronheimer-Mrowka's spectral sequence is not isomorphic to the APS homology. We also characterize all links in product manifolds that have minimal sutured instanton homology, which may be of independent interest.
△ Less
Submitted 29 August, 2022;
originally announced August 2022.
-
Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions
Authors:
Fernando Castañeda,
Jason J. Choi,
Wonsuhk Jung,
Bike Zhang,
Claire J. Tomlin,
Koushil Sreenath
Abstract:
Learning-based control schemes have recently shown great efficacy performing complex tasks for a wide variety of applications. However, in order to deploy them in real systems, it is of vital importance to guarantee that the system will remain safe during online training and execution. Among the currently most popular methods to tackle this challenge, Control Barrier Functions (CBFs) serve as math…
▽ More
Learning-based control schemes have recently shown great efficacy performing complex tasks for a wide variety of applications. However, in order to deploy them in real systems, it is of vital importance to guarantee that the system will remain safe during online training and execution. Among the currently most popular methods to tackle this challenge, Control Barrier Functions (CBFs) serve as mathematical tools that provide a formal safety-preserving control synthesis procedure for systems with known dynamics. In this paper, we first introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers using Gaussian Process (GP) regression to bridge the gap between an approximate mathematical model and the real system. Compared to previous approaches, we study the feasibility of the resulting robust safety-critical controller. This feasibility analysis results in a set of richness conditions that the available information about the system should satisfy to guarantee that a safe control action can be found at all times. We then use these conditions to devise an event-triggered online data collection strategy that ensures the recursive feasibility of the learned safety-critical controller. Our proposed methodology endows the system with the ability to reason at all times about whether the current information at its disposal is enough to ensure safety or if new measurements are required. This, in turn, allows us to provide formal results of forward invariance of a safe set with high probability, even in a priori unexplored regions. Finally, we validate the proposed framework in numerical simulations of an adaptive cruise control system and a kinematic vehicle.
△ Less
Submitted 26 September, 2023; v1 submitted 23 August, 2022;
originally announced August 2022.
-
Non-homogeneous boundary value problems for coupled KdV-KdV systems posed on the half line
Authors:
Shenghao Li,
Min Chen,
Xin Yang,
Bing-Yu Zhang
Abstract:
In this article, we study an initial-boundary-value problem of a coupled KdV-KdV system on the half line $ \mathbb{R}^+ $ with non-homogeneous boundary conditions: \begin{equation*} \left\{ \begin{array}{l}
u_t+v_x+u u_x+v_{xxx}=0, \quad
v_t+u_x+(vu)_x+u_{xxx}=0, \quad
u(x,0)=φ(x),\quad v(x,0)=ψ(x), \quad
u(0,t)=h_1(t),\quad v(0,t)=h_2(t),\quad v_x(0,t)=h_3(t), \end{array} \right. \qquad x…
▽ More
In this article, we study an initial-boundary-value problem of a coupled KdV-KdV system on the half line $ \mathbb{R}^+ $ with non-homogeneous boundary conditions: \begin{equation*} \left\{ \begin{array}{l}
u_t+v_x+u u_x+v_{xxx}=0, \quad
v_t+u_x+(vu)_x+u_{xxx}=0, \quad
u(x,0)=φ(x),\quad v(x,0)=ψ(x), \quad
u(0,t)=h_1(t),\quad v(0,t)=h_2(t),\quad v_x(0,t)=h_3(t), \end{array} \right. \qquad x,\,t>0. \end{equation*} It is shown that the problem is locally unconditionally well-posed in $H^s(\mathbb{R}^+)\times H^s(\mathbb{R}^+)$ for $s> -\frac34 $ with initial data $(φ,ψ)$ in $H^s(\mathbb{R}^+)\times H^{s}(\mathbb{R}^+)$ and boundary data $(h_1,h_2,h_3) $ in $H^{\frac{s+1}{3}}(\mathbb{R}^+)\times H^{\frac{s+1}{3}}(\mathbb{R}^+)\times H^{\frac{s}{3}}(\mathbb{R}^+)$. The approach developed in this paper can also be applied to study more general KdV-KdV systems posed on the half line.
△ Less
Submitted 2 January, 2023; v1 submitted 15 August, 2022;
originally announced August 2022.
-
Uniform far-field asymptotics of the two-layered Green function in 2D and application to wave scattering in a two-layered medium
Authors:
Long Li,
Jiansheng Yang,
Bo Zhang,
Haiwen Zhang
Abstract:
In this paper, we establish new results for the uniform far-field asymptotics of the two-layered Green function (together with its derivatives) in 2D in the frequency domain. To the best of our knowledge, our results are the sharpest yet obtained. The steepest descent method plays an important role in the proofs of our results. Further, as an application of our new results, we derive the uniform f…
▽ More
In this paper, we establish new results for the uniform far-field asymptotics of the two-layered Green function (together with its derivatives) in 2D in the frequency domain. To the best of our knowledge, our results are the sharpest yet obtained. The steepest descent method plays an important role in the proofs of our results. Further, as an application of our new results, we derive the uniform far-field asymptotics of the scattered field to the acoustic scattering problem by buried obstacles in a two-layered medium with a locally rough interface. The results obtained in this paper provide a theoretical foundation for our recent work, where direct imaging methods have been developed to image the locally rough interface from phaseless total-field data or phased far-field data at a fixed frequency. It is believed that the results obtained in this paper will also be useful on its own right.
△ Less
Submitted 25 December, 2023; v1 submitted 31 July, 2022;
originally announced August 2022.
-
Reconstruction of inhomogeneous media by an iteration algorithm with a learned projector
Authors:
Kai Li,
Bo Zhang,
Haiwen Zhang
Abstract:
This paper is concerned with the inverse problem of reconstructing an inhomogeneous medium from the acoustic far-field data at a fixed frequency in two dimensions. This inverse problem is severely ill-posed (and also strongly nonlinear), and certain regularization strategy is thus needed. However, it is difficult to select an appropriate regularization strategy which should enforce some a priori i…
▽ More
This paper is concerned with the inverse problem of reconstructing an inhomogeneous medium from the acoustic far-field data at a fixed frequency in two dimensions. This inverse problem is severely ill-posed (and also strongly nonlinear), and certain regularization strategy is thus needed. However, it is difficult to select an appropriate regularization strategy which should enforce some a priori information of the unknown scatterer. To address this issue, we plan to use a deep learning approach to learn some a priori information of the unknown scatterer from certain ground truth data, which is then combined with a traditional iteration method to solve the inverse problem. Specifically, we propose a deep learning-based iterative reconstruction algorithm for the inverse problem, based on a repeated application of a deep neural network and the iteratively regularized Gauss-Newton method (IRGNM). Our deep neural network (called the learned projector in this paper) mainly focuses on learning the a priori information of the shape of the unknown contrast with a normalization technique in the training process and is trained to act like a projector which is helpful for projecting the solution into some feasible region. Extensive numerical experiments show that our reconstruction algorithm provides good reconstruction results even for the high contrast case and has a satisfactory generalization ability.
△ Less
Submitted 20 September, 2023; v1 submitted 26 July, 2022;
originally announced July 2022.
-
Large deviation principle for reflected SPDE on infinite spatial domain
Authors:
Ran Wang,
Beibei Zhang
Abstract:
We study a large deviation principle for a reflected stochastic partial differential equation on infinite spatial domain. A new sufficient condition for the weak convergence criterion proposed by Matoussi, Sabbagh and Zhang ({\it Appl. Math. Optim.} 83: 849-879, 2021) plays an important role in the proof.
We study a large deviation principle for a reflected stochastic partial differential equation on infinite spatial domain. A new sufficient condition for the weak convergence criterion proposed by Matoussi, Sabbagh and Zhang ({\it Appl. Math. Optim.} 83: 849-879, 2021) plays an important role in the proof.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.