-
A novel, finite-element-based framework for sparse data solution reconstruction and multiple choices
Authors:
Wiera Bielajewa,
Michelle Baxter,
Perumal Nithiarasu
Abstract:
Digital twinning offers a capability of effective real-time monitoring and control, which are vital for cost-intensive experimental facilities, particularly the ones where extreme conditions exist. Sparse experimental measurements collected by various diagnostic sensors are usually the only source of information available during the course of a physical experiment. Consequently, in order to enable…
▽ More
Digital twinning offers a capability of effective real-time monitoring and control, which are vital for cost-intensive experimental facilities, particularly the ones where extreme conditions exist. Sparse experimental measurements collected by various diagnostic sensors are usually the only source of information available during the course of a physical experiment. Consequently, in order to enable monitoring and control of the experiment (digital twinning), the ability to perform inverse analysis, facilitating the full field solution reconstruction from the sparse experimental data in real time, is crucial. This paper shows for the first time that it is possible to directly solve inverse problems, such as solution reconstruction, where some or all boundary conditions (BCs) are unknown, by purely using a finite-element (FE) approach, without needing to employ any traditional inverse analysis techniques or any machine learning models, as is normally done in the field. This novel and efficient FE-based inverse analysis framework employs a conventional FE discretisation, splits the loading vector into two parts corresponding to the known and unknown BCs, and then defines a loss function based on that split. In spite of the loading vector split, the loss function preserves the element connectivity. This function is minimised using a gradient-based optimisation. Furthermore, this paper presents a novel modification of this approach, which allows it to generate a range of different solutions satisfying given requirements in a controlled manner. Controlled multiple solution generation in the context of inverse problems and their intrinsic ill-posedness is a novel notion, which has not been explored before. This is done in order to potentially introduce the capability of semi-autonomous system control with intermittent human intervention to the workflow.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Ultrafast imaging of polariton propagation and interactions
Authors:
Ding Xu,
Arkajit Mandal,
James M. Baxter,
Shan-Wen Cheng,
Inki Lee,
Haowen Su,
Song Liu,
David R. Reichman,
Milan Delor
Abstract:
Semiconductor excitations can hybridize with cavity photons to form exciton-polaritons (EPs) with remarkable properties, including light-like energy flow combined with matter-like interactions. To fully harness these properties, EPs must retain ballistic, coherent transport despite matter-mediated interactions with lattice phonons. Here we develop a nonlinear momentum-resolved optical approach tha…
▽ More
Semiconductor excitations can hybridize with cavity photons to form exciton-polaritons (EPs) with remarkable properties, including light-like energy flow combined with matter-like interactions. To fully harness these properties, EPs must retain ballistic, coherent transport despite matter-mediated interactions with lattice phonons. Here we develop a nonlinear momentum-resolved optical approach that directly images EPs in real space on femtosecond scales in a range of polaritonic architectures. We focus our analysis on EP propagation in layered halide perovskite microcavities. We reveal that EP-phonon interactions lead to a large renormalization of EP velocities at high excitonic fractions at room temperature. Despite these strong EP-phonon interactions, ballistic transport is maintained for up to half-exciton EPs, in agreement with quantum simulations of dynamic disorder shielding through light-matter hybridization. Above 50% excitonic character, rapid decoherence leads to diffusive transport. Our work provides a general framework to precisely balance EP coherence, velocity, and nonlinear interactions.
△ Less
Submitted 15 June, 2023; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Context-Based Music Recommendation Algorithm Evaluation
Authors:
Marissa Baxter,
Lisa Ha,
Kirill Perfiliev,
Natalie Sayre
Abstract:
Artificial Intelligence (AI ) has been very successful in creating and predicting music playlists for online users based on their data; data received from users experience using the app such as searching the songs they like. There are lots of current technological advancements in AI due to the competition between music platform owners such as Spotify, Pandora, and more. In this paper, 6 machine le…
▽ More
Artificial Intelligence (AI ) has been very successful in creating and predicting music playlists for online users based on their data; data received from users experience using the app such as searching the songs they like. There are lots of current technological advancements in AI due to the competition between music platform owners such as Spotify, Pandora, and more. In this paper, 6 machine learning algorithms and their individual accuracy for predicting whether a user will like a song are explored across 3 different platforms including Weka, SKLearn, and Orange. The algorithms explored include Logistic Regression, Naive Bayes, Sequential Minimal Optimization (SMO), Multilayer Perceptron (Neural Network), Nearest Neighbor, and Random Forest. With the analysis of the specific characteristics of each song provided by the Spotify API [1], Random Forest is the most successful algorithm for predicting whether a user will like a song with an accuracy of 84%. This is higher than the accuracy of 82.72% found by Mungekar using the Random Forest technique and slightly different characteristics of a song [2]. The characteristics in Mungekars Random Forest algorithm focus more on the artist and popularity rather than the sonic features of the songs. Removing the popularity aspect and focusing purely on the sonic qualities improve the accuracy of recommendations. Finally, this paper shows how song prediction can be accomplished without any monetary investments, and thus, inspires an idea of what amazing results can be accomplished with full financial research.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
The Magnetorotational Instability Prefers Three Dimensions
Authors:
Jeffrey S. Oishi,
Geoffrey M. Vasil,
Morgan Baxter,
Andrew Swan,
Keaton J. Burns,
Daniel Lecoanet,
Benjamin P. Brown
Abstract:
The magnetorotational instability (MRI) occurs when a weak magnetic field destabilises a rotating, electrically conducting fluid with inwardly increasing angular velocity. The MRI is essential to astrophysical disk theory where the shear is typically Keplerian. Internal shear layers in stars may also be MRI unstable, and they take a wide range of profiles, including near-critical. We show that the…
▽ More
The magnetorotational instability (MRI) occurs when a weak magnetic field destabilises a rotating, electrically conducting fluid with inwardly increasing angular velocity. The MRI is essential to astrophysical disk theory where the shear is typically Keplerian. Internal shear layers in stars may also be MRI unstable, and they take a wide range of profiles, including near-critical. We show that the fastest growing modes of an ideal magnetofluid are three-dimensional provided the shear rate, $S$, is near the two-dimensional onset value, $S_c$. For a Keplerian shear, three-dimensional modes are unstable above $S\approx0.10S_c$, and dominate the two-dimensional modes until $S\approx2.05S_{c}$. These three-dimensional modes dominate for shear profiles relevant to stars and at magnetic Prandtl numbers relevant to liquid-metal laboratory experiments. Significant numbers of rapidly growing three-dimensional modes remain well past $2.05S_{c}$. These finding are significant in three ways. First, weakly nonlinear theory suggests that the MRI saturates by pushing the shear rate to its critical value. This can happen for systems, like stars and laboratory experiments, that can rearrange their angular velocity profiles. Second, the non-normal character and large transient growth of MRI modes should be important whenever three-dimensionality exists. Finally, three-dimensional growth suggests direct dynamo action driven from the linear instability.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Ascent sequences avoiding pairs of patterns
Authors:
Andrew M. Baxter,
Lara K. Pudwell
Abstract:
Ascent sequences were introduced by Bousquet-Melou et al. in connection with (2+2)-avoiding posets and their pattern avoidance properties were first considered by Duncan and Steingrimsson. In this paper, we consider ascent sequences of length $n$ avoiding two patterns of length 3, and we determine an exact enumeration for 16 different pairs of patterns. Methods include simple recurrences, bijectio…
▽ More
Ascent sequences were introduced by Bousquet-Melou et al. in connection with (2+2)-avoiding posets and their pattern avoidance properties were first considered by Duncan and Steingrimsson. In this paper, we consider ascent sequences of length $n$ avoiding two patterns of length 3, and we determine an exact enumeration for 16 different pairs of patterns. Methods include simple recurrences, bijections to other combinatorial objects (including Dyck paths and pattern-avoiding permutations), and generating trees. We also provide an analogue of the Erdos-Szekeres Theorem to prove that any sufficiently long ascent sequence contains either many copies of the same number or a long increasing subsequence, with a precise bound.
△ Less
Submitted 14 February, 2015; v1 submitted 16 June, 2014;
originally announced June 2014.
-
Refining enumeration schemes to count according to permutation statistics
Authors:
Andrew M. Baxter
Abstract:
We consider the question of computing the distribution of a permutation statistics over restricted permutations via enumeration schemes. The restricted permutations are those avoiding sets of vincular patterns (which include both classical and consecutive patterns), and the statistics are described in the number of copies of certain vincular patterns such as the descent statistic and major index.…
▽ More
We consider the question of computing the distribution of a permutation statistics over restricted permutations via enumeration schemes. The restricted permutations are those avoiding sets of vincular patterns (which include both classical and consecutive patterns), and the statistics are described in the number of copies of certain vincular patterns such as the descent statistic and major index. An enumeration scheme is a polynomial-time algorithm (specifically, a system of recurrence relations) to compute the number of permutations avoiding a given set of vincular patterns. Enumeration schemes' most notable feature is that they may be discovered and proven via only finite computation. We prove that when a finite enumeration scheme exists to compute the number of permutations avoiding a given set of vincular patterns, the scheme can also compute the distribution of certain permutation statistics with very little extra computation.
△ Less
Submitted 1 January, 2014;
originally announced January 2014.
-
Some Wilf-equivalences for vincular patterns
Authors:
Andrew M. Baxter,
Mark Shattuck
Abstract:
We prove several Wilf-equivalences for vincular patterns of length 4, some of which generalize to infinite families of vincular patterns. We also present functional equations for the generating functions for the number of permutations of length n avoiding a single pattern for the patterns 124-3, 134-2, 231-4, 241-3, 132-4, and 142-3. This nearly completes the Wilf-classification of vincular patter…
▽ More
We prove several Wilf-equivalences for vincular patterns of length 4, some of which generalize to infinite families of vincular patterns. We also present functional equations for the generating functions for the number of permutations of length n avoiding a single pattern for the patterns 124-3, 134-2, 231-4, 241-3, 132-4, and 142-3. This nearly completes the Wilf-classification of vincular patterns of length 4. As a corollary, these results imply Wilf-equivalences for certain barred patterns of length 5 with a single bar.
△ Less
Submitted 23 August, 2014; v1 submitted 26 September, 2013;
originally announced September 2013.
-
Shape-Wilf-equivalences for vincular patterns
Authors:
Andrew M. Baxter
Abstract:
We extend the notion of shape-Wilf-equivalence to vincular patterns (also known as "generalized patterns" or "dashed patterns"). First we introduce a stronger equivalence on patterns which we call filling-shape-Wilf-equivalence. When vincular patterns $α$ and $β$ are filling-shape-Wilf-equivalent, we prove that the direct sum $α\oplusσ$ is filling-shape-Wilf-equivalent to $β\oplusσ$. We also disco…
▽ More
We extend the notion of shape-Wilf-equivalence to vincular patterns (also known as "generalized patterns" or "dashed patterns"). First we introduce a stronger equivalence on patterns which we call filling-shape-Wilf-equivalence. When vincular patterns $α$ and $β$ are filling-shape-Wilf-equivalent, we prove that the direct sum $α\oplusσ$ is filling-shape-Wilf-equivalent to $β\oplusσ$. We also discover two new pairs of patterns which are filling-shape-Wilf-equivalent: when $α$, $β$, and $σ$ are nonempty consecutive patterns which are Wilf-equivalent, $α\oplusσ$ is filling-shape-Wilf-equivalent to $β\oplusσ$; and for any consecutive pattern $α$, $1\oplusα$ is filling-shape-Wilf-equivalent to $1\ominusα$. These equivalences generalize Wilf-equivalences found by Elizalde and Kitaev. These new equivalences imply many new Wilf-equivalences for vincular patterns
△ Less
Submitted 1 February, 2013; v1 submitted 23 January, 2012;
originally announced January 2012.
-
Enumeration schemes for vincular patterns
Authors:
Andrew M. Baxter,
Lara K. Pudwell
Abstract:
We extend the notion of an enumeration scheme developed by Zeilberger and Vatter to the case of vincular patterns (also called "generalized patterns" or "dashed patterns"). In particular we provide an algorithm which takes in as input a set $B$ of vincular patterns and search parameters and returns a recurrence (called a "scheme") to compute the number of permutations of length $n$ avoiding $B$ or…
▽ More
We extend the notion of an enumeration scheme developed by Zeilberger and Vatter to the case of vincular patterns (also called "generalized patterns" or "dashed patterns"). In particular we provide an algorithm which takes in as input a set $B$ of vincular patterns and search parameters and returns a recurrence (called a "scheme") to compute the number of permutations of length $n$ avoiding $B$ or confirmation that no such scheme exists within the search parameters. We also prove that if $B$ contains only consecutive patterns and patterns of the form $σ_1σ_2 ... σ_{t-1}-σ_t$, then such a scheme must exist and provide the relevant search parameters. The algorithms are implemented in Maple and we provide empirical data on the number of small pattern sets admitting schemes. We make several conjectures on Wilf-classification based on this data. We also outline how to refine schemes to compute the number of $B$-avoiding permutations of length $n$ with $k$ inversions.
△ Less
Submitted 16 January, 2012; v1 submitted 12 August, 2011;
originally announced August 2011.
-
Pattern avoidance by even permutations
Authors:
Andrew M. Baxter,
Aaron D. Jaggard
Abstract:
We study questions of even-Wilf-equivalence, the analogue of Wilf-equivalence when attention is restricted to pattern avoidance by permutations in the alternating group. Although some Wilf-equivalence results break when considering even-Wilf-equivalence analogues, we prove that other Wilf-equivalence results continue to hold in the even-Wilf-equivalence setting. In particular, we prove that t(t-1)…
▽ More
We study questions of even-Wilf-equivalence, the analogue of Wilf-equivalence when attention is restricted to pattern avoidance by permutations in the alternating group. Although some Wilf-equivalence results break when considering even-Wilf-equivalence analogues, we prove that other Wilf-equivalence results continue to hold in the even-Wilf-equivalence setting. In particular, we prove that t(t-1)...321 and (t-1)(t-2)...21t are even-shape-Wilf-equivalent for odd t, paralleling a result (which held for all t) of Backelin, West, and Xin for shape-Wilf-equivalence. This allows us to classify the patterns of length 4, and to partially classify patterns of length 5 and 6. As with transition to involution-Wilf-equivalence, some (but not all) of the classical Wilf-equivalence results are preserved when we make the transition to even-Wilf-equivalence.
△ Less
Submitted 18 June, 2011;
originally announced June 2011.
-
Applying the Cluster Method to Count Occurrences of Generalized Permutation Patterns
Authors:
Andrew M. Baxter
Abstract:
We apply ideas from the cluster method to q-count the permutations of a multiset according to the number of occurrences of certain generalized patterns, as defined by Babson and Steingrimsson. In particular, we consider those patterns with three letters and one internal dash, as well as permutation statistics composed of counting the number of occurrences of multisets of such patterns. Counting…
▽ More
We apply ideas from the cluster method to q-count the permutations of a multiset according to the number of occurrences of certain generalized patterns, as defined by Babson and Steingrimsson. In particular, we consider those patterns with three letters and one internal dash, as well as permutation statistics composed of counting the number of occurrences of multisets of such patterns. Counting is done via recurrences which simplify in the case of permutations. A collection of Maple procedures implementing these recurrences accompanies the article.
△ Less
Submitted 29 May, 2009;
originally announced May 2009.
-
Periodic Orbits of Billiards on an Equilateral Triangle
Authors:
Andrew M. Baxter,
Ron Umble
Abstract:
We give a complete solution of the following problem: Find, classify and count the (classes of) periodic orbits on an equilateral triangle. We prove that Fagnano's period 3 orbit is the only periodic orbit with odd period. A periodic orbit is either prime or some d-fold iterate thereof. We count prime and iterate periodic orbits of period $2n$ via a bijection with a certain partition of $n$, the…
▽ More
We give a complete solution of the following problem: Find, classify and count the (classes of) periodic orbits on an equilateral triangle. We prove that Fagnano's period 3 orbit is the only periodic orbit with odd period. A periodic orbit is either prime or some d-fold iterate thereof. We count prime and iterate periodic orbits of period $2n$ via a bijection with a certain partition of $n$, then count only prime orbits using the prime factorization of $n$.
△ Less
Submitted 1 April, 2007; v1 submitted 13 September, 2005;
originally announced September 2005.
-
Quenched Hadrons using Wilson and O(a)-Improved Fermion Actions at beta=6.2
Authors:
The UKQCD Collaboration,
C. R. Allton,
H. Duong,
C. T. Sachrajda,
R. M. Baxter,
S. P. Booth,
K. C. Bowler,
S. Collins,
D. S. Henty,
R. D. Kenway,
C. McNeile,
B. J. Pendleton,
D. G. Richards,
J. N. Simone,
A. D. Simpson,
B. E. Wilkes,
A. Hulsebos,
A. C. Irving,
A. McKerrell,
C. Michael,
M. Prisznyak,
P. W. Stephenson,
G. Martinelli
Abstract:
We present the first study of the light hadron spectrum and decay constants for quenched QCD using an O(a)-improved nearest-neighbour Wilson fermion action at β=6.2. We compare the results with those obtained using the standard Wilson fermion action, on the same set of 18 gauge field configurations of a 24^3 times 48 lattice. For pseudoscalar meson masses in the range 330-800 MeV, we find no sig…
▽ More
We present the first study of the light hadron spectrum and decay constants for quenched QCD using an O(a)-improved nearest-neighbour Wilson fermion action at β=6.2. We compare the results with those obtained using the standard Wilson fermion action, on the same set of 18 gauge field configurations of a 24^3 times 48 lattice. For pseudoscalar meson masses in the range 330-800 MeV, we find no significant difference between the results for the two actions. The scales obtained from the string tension and mesonic sector are consistent, but differ from that derived from baryon masses. The ratio of the pseudoscalar decay constant to the vector meson mass is roughly independent of quark mass as observed experimentally, and in approximate agreement with the measured value.
△ Less
Submitted 21 May, 1992;
originally announced May 1992.