-
Learning based on neurovectors for tabular data: a new neural network approach
Authors:
J. C. Husillos,
A. Gallego,
A. Roma,
A. Troncoso
Abstract:
In this paper, we present a novel learning approach based on Neurovectors, an innovative paradigm that structures information through interconnected nodes and vector relationships for tabular data processing. Unlike traditional artificial neural networks that rely on weight adjustment through backpropagation, Neurovectors encode information by structuring data in vector spaces where energy propaga…
▽ More
In this paper, we present a novel learning approach based on Neurovectors, an innovative paradigm that structures information through interconnected nodes and vector relationships for tabular data processing. Unlike traditional artificial neural networks that rely on weight adjustment through backpropagation, Neurovectors encode information by structuring data in vector spaces where energy propagation, rather than traditional weight updates, drives the learning process, enabling a more adaptable and explainable learning process. Our method generates dynamic representations of knowledge through neurovectors, thereby improving both the interpretability and efficiency of the predictive model. Experimental results using datasets from well-established repositories such as the UCI machine learning repository and Kaggle are reported both for classification and regression. To evaluate its performance, we compare our approach with standard machine learning and deep learning models, showing that Neurovectors achieve competitive accuracy.
△ Less
Submitted 8 June, 2025;
originally announced June 2025.
-
Market-Oriented Flow Allocation for Thermal Solar Plants: An Auction-Based Methodology with Artificial Intelligence
Authors:
Sara Ruiz-Moreno,
Antonio J. Gallego,
Manuel Macías,
Eduardo F. Camacho
Abstract:
This paper presents a novel method to optimize thermal balance in parabolic trough collector (PTC) plants. It uses a market-based system to distribute flow among loops combined with an artificial neural network (ANN) to reduce computation and data requirements. This auction-based approach balances loop temperatures, accommodating varying thermal losses and collector efficiencies. Validation across…
▽ More
This paper presents a novel method to optimize thermal balance in parabolic trough collector (PTC) plants. It uses a market-based system to distribute flow among loops combined with an artificial neural network (ANN) to reduce computation and data requirements. This auction-based approach balances loop temperatures, accommodating varying thermal losses and collector efficiencies. Validation across different thermal losses, optical efficiencies, and irradiance conditions-sunny, partially cloudy, and cloudy-show improved thermal power output and intercept factors compared to a no-allocation system. It demonstrates scalability and practicality for large solar thermal plants, enhancing overall performance. The method was first validated through simulations on a realistic solar plant model, then adapted and successfully tested in a 50 MW solar trough plant, demonstrating its advantages. Furthermore, the algorithms have been implemented, commissioned, and are currently operating in 13 commercial solar trough plants.
△ Less
Submitted 2 April, 2025;
originally announced April 2025.
-
Maritime Search and Rescue Missions with Aerial Images: A Survey
Authors:
Juan P. Martinez-Esteso,
Francisco J. Castellanos,
Jorge Calvo-Zaragoza,
Antonio Javier Gallego
Abstract:
The speed of response by search and rescue teams at sea is of vital importance, as survival may depend on it. Recent technological advancements have led to the development of more efficient systems for locating individuals involved in a maritime incident, such as the use of Unmanned Aerial Vehicles (UAVs) equipped with cameras and other integrated sensors. Over the past decade, several researchers…
▽ More
The speed of response by search and rescue teams at sea is of vital importance, as survival may depend on it. Recent technological advancements have led to the development of more efficient systems for locating individuals involved in a maritime incident, such as the use of Unmanned Aerial Vehicles (UAVs) equipped with cameras and other integrated sensors. Over the past decade, several researchers have contributed to the development of automatic systems capable of detecting people using aerial images, particularly by leveraging the advantages of deep learning. In this article, we provide a comprehensive review of the existing literature on this topic. We analyze the methods proposed to date, including both traditional techniques and more advanced approaches based on machine learning and neural networks. Additionally, we take into account the use of synthetic data to cover a wider range of scenarios without the need to deploy a team to collect data, which is one of the major obstacles for these systems. Overall, this paper situates the reader in the field of detecting people at sea using aerial images by quickly identifying the most suitable methodology for each scenario, as well as providing an in-depth discussion and direction for future trends.
△ Less
Submitted 13 February, 2025; v1 submitted 12 November, 2024;
originally announced November 2024.
-
Global Stabilization for the BBM-KP equations on R2
Authors:
F. A. Gallego,
V. H. Gonzalez Martinez,
J. C. Muñoz Grajales
Abstract:
In this paper, we present results on the energy decay of the BBM-KP equations (I and II) posed on $\R^2$ with localized damping. This model offers an alternative to the KP equations, analogous to how the regularized long-wave equation relates to the classical Korteweg-de Vries (KdV) equation. We show that the energy associated with the Cauchy problem decays exponentially when a localized dissipati…
▽ More
In this paper, we present results on the energy decay of the BBM-KP equations (I and II) posed on $\R^2$ with localized damping. This model offers an alternative to the KP equations, analogous to how the regularized long-wave equation relates to the classical Korteweg-de Vries (KdV) equation. We show that the energy associated with the Cauchy problem decays exponentially when a localized dissipative mechanism is present in a subdomain. Finally, we validate the theoretical results on the exponential stabilization of solutions to the BBM-KP equations with damping through numerical experiments using a spectral-finite difference scheme.
△ Less
Submitted 18 March, 2025; v1 submitted 2 October, 2024;
originally announced October 2024.
-
Design and implementation of a synchronous Hardware Performance Monitor for a RISC-V space-oriented processor
Authors:
Miguel Jiménez Arribas,
Agustín Martínez Hellín,
Manuel Prieto Mateo,
Iván Gamino del Río,
Andrea Fernandez Gallego,
Oscar Rodríguez Polo,
Antonio da Silva,
Pablo Parra,
Sebastián Sánchez
Abstract:
The ability to collect statistics about the execution of a program within a CPU is of the utmost importance across all fields of computing since it allows characterizing the timing performance of a program. This capability is even more relevant in safety-critical software systems, where it is mandatory to analyze software timing requirements to ensure the correct operation of the programs. Moreove…
▽ More
The ability to collect statistics about the execution of a program within a CPU is of the utmost importance across all fields of computing since it allows characterizing the timing performance of a program. This capability is even more relevant in safety-critical software systems, where it is mandatory to analyze software timing requirements to ensure the correct operation of the programs. Moreover, in order to properly evaluate and verify the extra-functional properties of these systems, besides timing performance, there are many other statistics available on a CPU, such as those associated with resource utilization. In this paper, we showcase a Performance Measurement Unit, also known as Hardware Performance Monitor, integrated into a RISC-V On-Board Computer designed for space applications by our research group. The monitoring technique features a novel approach whereby the events triggered are not counted immediately but instead are propagated through the pipeline so that their annotation is synchronized with the executed instruction. Additionally, we demonstrate the use of this PMU in a process to characterize the execution model of the processor. Finally, as an example of the statistics provided by the PMU, the results obtained running the CoreMark and Dhrystone benchmarks on the RISC-V OBC are shown.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Global Point Cloud Registration Network for Large Transformations
Authors:
Hanz Cuevas-Velasquez,
Alejandro Galán-Cuenca,
Antonio Javier Gallego,
Marcelo Saval-Calvo,
Robert B. Fisher
Abstract:
Three-dimensional data registration is an established yet challenging problem that is key in many different applications, such as mapping the environment for autonomous vehicles, and modeling objects and people for avatar creation, among many others. Registration refers to the process of mapping multiple data into the same coordinate system by means of matching correspondences and transformation e…
▽ More
Three-dimensional data registration is an established yet challenging problem that is key in many different applications, such as mapping the environment for autonomous vehicles, and modeling objects and people for avatar creation, among many others. Registration refers to the process of mapping multiple data into the same coordinate system by means of matching correspondences and transformation estimation. Novel proposals exploit the benefits of deep learning architectures for this purpose, as they learn the best features for the data, providing better matches and hence results. However, the state of the art is usually focused on cases of relatively small transformations, although in certain applications and in a real and practical environment, large transformations are very common. In this paper, we present ReLaTo (Registration for Large Transformations), an architecture that faces the cases where large transformations happen while maintaining good performance for local transformations. This proposal uses a novel Softmax pooling layer to find correspondences in a bilateral consensus manner between two point sets, sampling the most confident matches. These matches are used to estimate a coarse and global registration using weighted Singular Value Decomposition (SVD). A target-guided denoising step is then applied to both the obtained matches and latent features, estimating the final fine registration considering the local geometry. All these steps are carried out following an end-to-end approach, which has been shown to improve 10 state-of-the-art registration methods in two datasets commonly used for this task (ModelNet40 and KITTI), especially in the case of large transformations.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Identifying Student Profiles Within Online Judge Systems Using Explainable Artificial Intelligence
Authors:
Juan Ramón Rico-Juan,
Víctor M. Sánchez-Cartagena,
Jose J. Valero-Mas,
Antonio Javier Gallego
Abstract:
Online Judge (OJ) systems are typically considered within programming-related courses as they yield fast and objective assessments of the code developed by the students. Such an evaluation generally provides a single decision based on a rubric, most commonly whether the submission successfully accomplished the assignment. Nevertheless, since in an educational context such information may be deemed…
▽ More
Online Judge (OJ) systems are typically considered within programming-related courses as they yield fast and objective assessments of the code developed by the students. Such an evaluation generally provides a single decision based on a rubric, most commonly whether the submission successfully accomplished the assignment. Nevertheless, since in an educational context such information may be deemed insufficient, it would be beneficial for both the student and the instructor to receive additional feedback about the overall development of the task. This work aims to tackle this limitation by considering the further exploitation of the information gathered by the OJ and automatically inferring feedback for both the student and the instructor. More precisely, we consider the use of learning-based schemes -- particularly, multi-instance learning (MIL) and classical machine learning formulations -- to model student behavior. Besides, explainable artificial intelligence (XAI) is contemplated to provide human-understandable feedback. The proposal has been evaluated considering a case of study comprising 2500 submissions from roughly 90 different students from a programming-related course in a computer science degree. The results obtained validate the proposal: The model is capable of significantly predicting the user outcome (either passing or failing the assignment) solely based on the behavioral pattern inferred by the submissions provided to the OJ. Moreover, the proposal is able to identify prone-to-fail student groups and profiles as well as other relevant information, which eventually serves as feedback to both the student and the instructor.
△ Less
Submitted 29 January, 2024;
originally announced February 2024.
-
Few-shot learning for COVID-19 Chest X-Ray Classification with Imbalanced Data: An Inter vs. Intra Domain Study
Authors:
Alejandro Galán-Cuenca,
Antonio Javier Gallego,
Marcelo Saval-Calvo,
Antonio Pertusa
Abstract:
Medical image datasets are essential for training models used in computer-aided diagnosis, treatment planning, and medical research. However, some challenges are associated with these datasets, including variability in data distribution, data scarcity, and transfer learning issues when using models pre-trained from generic images. This work studies the effect of these challenges at the intra- and…
▽ More
Medical image datasets are essential for training models used in computer-aided diagnosis, treatment planning, and medical research. However, some challenges are associated with these datasets, including variability in data distribution, data scarcity, and transfer learning issues when using models pre-trained from generic images. This work studies the effect of these challenges at the intra- and inter-domain level in few-shot learning scenarios with severe data imbalance. For this, we propose a methodology based on Siamese neural networks in which a series of techniques are integrated to mitigate the effects of data scarcity and distribution imbalance. Specifically, different initialization and data augmentation methods are analyzed, and four adaptations to Siamese networks of solutions to deal with imbalanced data are introduced, including data balancing and weighted loss, both separately and combined, and with a different balance of pairing ratios. Moreover, we also assess the inference process considering four classifiers, namely Histogram, $k$NN, SVM, and Random Forest. Evaluation is performed on three chest X-ray datasets with annotated cases of both positive and negative COVID-19 diagnoses. The accuracy of each technique proposed for the Siamese architecture is analyzed separately and their results are compared to those obtained using equivalent methods on a state-of-the-art CNN. We conclude that the introduced techniques offer promising improvements over the baseline in almost all cases, and that the selection of the technique may vary depending on the amount of data available and the level of imbalance.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Boundary Exponential Stabilization for the Linear KP-II equation without Critical Size Restrictions
Authors:
F. A. Gallego,
J. R. Muñoz
Abstract:
In this paper, we delve into the intricacies of boundary stabilization for the linearized KP-II equation within the constraints of a bounded domain, a phenomenon known as ``critical length." Our primary aim is to design a feedback law that ensures the existence and exponential stabilization of solutions in the energy space, without length restrictions on the domain $ Ω= (0, L) \times (0, L)$,…
▽ More
In this paper, we delve into the intricacies of boundary stabilization for the linearized KP-II equation within the constraints of a bounded domain, a phenomenon known as ``critical length." Our primary aim is to design a feedback law that ensures the existence and exponential stabilization of solutions in the energy space, without length restrictions on the domain $ Ω= (0, L) \times (0, L)$, $ L > 0 $. Furthermore, we examine the interaction between the drift term $ u_x $ under these constraints.
△ Less
Submitted 8 April, 2025; v1 submitted 4 December, 2023;
originally announced December 2023.
-
Positioning Political Texts with Large Language Models by Asking and Averaging
Authors:
Gaël Le Mens,
Aina Gallego
Abstract:
We use instruction-tuned Large Language Models (LLMs) like GPT-4, Llama 3, MiXtral, or Aya to position political texts within policy and ideological spaces. We ask an LLM where a tweet or a sentence of a political text stands on the focal dimension and take the average of the LLM responses to position political actors such as US Senators, or longer texts such as UK party manifestos or EU policy sp…
▽ More
We use instruction-tuned Large Language Models (LLMs) like GPT-4, Llama 3, MiXtral, or Aya to position political texts within policy and ideological spaces. We ask an LLM where a tweet or a sentence of a political text stands on the focal dimension and take the average of the LLM responses to position political actors such as US Senators, or longer texts such as UK party manifestos or EU policy speeches given in 10 different languages. The correlations between the position estimates obtained with the best LLMs and benchmarks based on text coding by experts, crowdworkers, or roll call votes exceed .90. This approach is generally more accurate than the positions obtained with supervised classifiers trained on large amounts of research data. Using instruction-tuned LLMs to position texts in policy and ideological spaces is fast, cost-efficient, reliable, and reproducible (in the case of open LLMs) even if the texts are short and written in different languages. We conclude with cautionary notes about the need for empirical validation.
△ Less
Submitted 5 September, 2024; v1 submitted 28 November, 2023;
originally announced November 2023.
-
Approximation theorem for the Kawahara operator and its application in control theory
Authors:
Roberto de A. Capistrano Filho,
Luan S. de Sousa,
Fernando A. Gallego
Abstract:
Control properties of the Kawahara equation are considered when the equation is posed on an unbounded domain. Precisely, the paper's main results are related to an approximation theorem that ensures the exact (internal) controllability in $(0,+\infty)$. Following Rosier SIAM Simon (2000), the problem is reduced to prove an approximate theorem which is achieved thanks to a global Carleman estimate…
▽ More
Control properties of the Kawahara equation are considered when the equation is posed on an unbounded domain. Precisely, the paper's main results are related to an approximation theorem that ensures the exact (internal) controllability in $(0,+\infty)$. Following Rosier SIAM Simon (2000), the problem is reduced to prove an approximate theorem which is achieved thanks to a global Carleman estimate for the Kawahara operator.
△ Less
Submitted 12 March, 2024; v1 submitted 20 May, 2023;
originally announced May 2023.
-
Boundary Effects on the Controllability of Coupled KdV Systems
Authors:
F. A. Gallego,
A. F. Pazoto,
I. Rivas
Abstract:
We study the exact boundary controllability of a nonlinear coupled system of two Korteweg-de Vries equations on a bounded interval. The model describes the interactions of two weakly nonlinear gravity waves in a stratified fluid. Due to the nature of the system, six boundary conditions are required. However, to study the controllability property, we consider a different combination of the control…
▽ More
We study the exact boundary controllability of a nonlinear coupled system of two Korteweg-de Vries equations on a bounded interval. The model describes the interactions of two weakly nonlinear gravity waves in a stratified fluid. Due to the nature of the system, six boundary conditions are required. However, to study the controllability property, we consider a different combination of the control inputs, with a maximum of four. Firstly, the results are obtained for the linearized system through a classical duality approach and some hidden regularity properties of the boundary terms. This approach reduces the controllability problem to the study of a spectral problem, which is solved by using the Paley-Wiener method introduced by Rosier. Then, the issue is to establish when a certain quotient of entire functions still turns out to be an entire function. It can be viewed as a problem of factoring an entire function that, depending on the control configuration, leads to the study of a transcendental equation. Finally, by using the contraction mapping theorem, we derive the local controllability for the full system.
△ Less
Submitted 10 March, 2025; v1 submitted 26 February, 2023;
originally announced February 2023.
-
Fast Kernel Density Estimation with Density Matrices and Random Fourier Features
Authors:
Joseph A. Gallego,
Juan F. Osorio,
Fabio A. González
Abstract:
Kernel density estimation (KDE) is one of the most widely used nonparametric density estimation methods. The fact that it is a memory-based method, i.e., it uses the entire training data set for prediction, makes it unsuitable for most current big data applications. Several strategies, such as tree-based or hashing-based estimators, have been proposed to improve the efficiency of the kernel densit…
▽ More
Kernel density estimation (KDE) is one of the most widely used nonparametric density estimation methods. The fact that it is a memory-based method, i.e., it uses the entire training data set for prediction, makes it unsuitable for most current big data applications. Several strategies, such as tree-based or hashing-based estimators, have been proposed to improve the efficiency of the kernel density estimation method. The novel density kernel density estimation method (DMKDE) uses density matrices, a quantum mechanical formalism, and random Fourier features, an explicit kernel approximation, to produce density estimates. This method has its roots in the KDE and can be considered as an approximation method, without its memory-based restriction. In this paper, we systematically evaluate the novel DMKDE algorithm and compare it with other state-of-the-art fast procedures for approximating the kernel density estimation method on different synthetic data sets. Our experimental results show that DMKDE is on par with its competitors for computing density estimates and advantages are shown when performed on high-dimensional data. We have made all the code available as an open source software repository.
△ Less
Submitted 4 August, 2022; v1 submitted 1 August, 2022;
originally announced August 2022.
-
Quantum Adaptive Fourier Features for Neural Density Estimation
Authors:
Joseph A. Gallego,
Fabio A. González
Abstract:
Density estimation is a fundamental task in statistics and machine learning applications. Kernel density estimation is a powerful tool for non-parametric density estimation in low dimensions; however, its performance is poor in higher dimensions. Moreover, its prediction complexity scale linearly with more training data points. This paper presents a method for neural density estimation that can be…
▽ More
Density estimation is a fundamental task in statistics and machine learning applications. Kernel density estimation is a powerful tool for non-parametric density estimation in low dimensions; however, its performance is poor in higher dimensions. Moreover, its prediction complexity scale linearly with more training data points. This paper presents a method for neural density estimation that can be seen as a type of kernel density estimation, but without the high prediction computational complexity. The method is based on density matrices, a formalism used in quantum mechanics, and adaptive Fourier features. The method can be trained without optimization, but it could be also integrated with deep learning architectures and trained using gradient descent. Thus, it could be seen as a form of neural density estimation method. The method was evaluated in different synthetic and real datasets, and its performance compared against state-of-the-art neural density estimation methods, obtaining competitive results.
△ Less
Submitted 4 August, 2022; v1 submitted 31 July, 2022;
originally announced August 2022.
-
Multilabel Prototype Generation for Data Reduction in k-Nearest Neighbour classification
Authors:
Jose J. Valero-Mas,
Antonio Javier Gallego,
Pablo Alonso-Jiménez,
Xavier Serra
Abstract:
Prototype Generation (PG) methods are typically considered for improving the efficiency of the $k$-Nearest Neighbour ($k$NN) classifier when tackling high-size corpora. Such approaches aim at generating a reduced version of the corpus without decreasing the classification performance when compared to the initial set. Despite their large application in multiclass scenarios, very few works have addr…
▽ More
Prototype Generation (PG) methods are typically considered for improving the efficiency of the $k$-Nearest Neighbour ($k$NN) classifier when tackling high-size corpora. Such approaches aim at generating a reduced version of the corpus without decreasing the classification performance when compared to the initial set. Despite their large application in multiclass scenarios, very few works have addressed the proposal of PG methods for the multilabel space. In this regard, this work presents the novel adaptation of four multiclass PG strategies to the multilabel case. These proposals are evaluated with three multilabel $k$NN-based classifiers, 12 corpora comprising a varied range of domains and corpus sizes, and different noise scenarios artificially induced in the data. The results obtained show that the proposed adaptations are capable of significantly improving -- both in terms of efficiency and classification performance -- the only reference multilabel PG work in the literature as well as the case in which no PG method is applied, also presenting a statistically superior robustness in noisy scenarios. Moreover, these novel PG strategies allow prioritising either the efficiency or efficacy criteria through its configuration depending on the target scenario, hence covering a wide area in the solution space not previously filled by other works.
△ Less
Submitted 20 March, 2025; v1 submitted 22 July, 2022;
originally announced July 2022.
-
The Well-posedness and Controllability of the Generalized Symmetric Regularized Long Wave System
Authors:
F. A. Gallego,
A. Montes
Abstract:
The symmetric regularized long wave system (SRLW) is a model for the weakly nonlinear ion acoustic and space-charge waves, which was introduced by C. Seyler and D. Fenstermacher. In this paper, we investigated the wellposedness and controllability properties of the generalized symmetric regularized long wave system (g-SRLW) in different structures (periodic and bounded domains). Firstly, the wellp…
▽ More
The symmetric regularized long wave system (SRLW) is a model for the weakly nonlinear ion acoustic and space-charge waves, which was introduced by C. Seyler and D. Fenstermacher. In this paper, we investigated the wellposedness and controllability properties of the generalized symmetric regularized long wave system (g-SRLW) in different structures (periodic and bounded domains). Firstly, the wellposedness and the exact controllability results for both linear and nonlinear g-SRLW system posed on the one-dimensional torus are obtained under the effect of a distributed moving control. Second, we consider the g-SRLW system in a bounded interval with some Dirichlet-Neumann conditions and we show that the system is not spectrally controllable (No finite linear combination of eigenfunctions associated with the state equations, other than zero, can be steered to zero). Although the system is not spectrally controllable, it can be shown that it is approximately controllable.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
An Artificial Neural Network Algorithm to Retrieve Chlorophyll a for Northwest European Shelf Seas from Top of Atmosphere Ocean Colour Reflectance
Authors:
Madjid Hadjal,
Encarni Medina-López,
Jinchang Ren,
Alejandro Gallego,
David McKee
Abstract:
Chlorophyll-a (Chl) retrieval from ocean colour remote sensing is problematic for relatively turbid coastal waters due to the impact of non-algal materials on atmospheric correction and standard Chl algorithm performance. Artificial neural networks (NNs) provide an alternative approach for retrieval of Chl from space and results in northwest European shelf seas over the 2002-2020 period are shown.…
▽ More
Chlorophyll-a (Chl) retrieval from ocean colour remote sensing is problematic for relatively turbid coastal waters due to the impact of non-algal materials on atmospheric correction and standard Chl algorithm performance. Artificial neural networks (NNs) provide an alternative approach for retrieval of Chl from space and results in northwest European shelf seas over the 2002-2020 period are shown. The NNs operate on 15 MODIS-Aqua visible and infrared bands and are tested using bottom of atmosphere (BOA), top of atmosphere (TOA) and Rayleigh corrected TOA reflectances (RC). In each case, a NN architecture consisting of 3 layers of 15 neurons improved performances and data availability compared to current state-of-the-art algorithms used in the region. The NN operating on TOA reflectance outperformed BOA and RC versions. By operating on TOA reflectance data, the NN approach overcomes the common but difficult problem of atmospheric correction in coastal waters. Moreover, the NN provides data for regions which other algorithms often mask out for turbid water or low zenith angle flags. A distinguishing feature of the NN approach is generation of associated product uncertainties based on multiple resampling of the training data set to produce a distribution of values for each pixel, and an example is shown for a coastal time series in the North Sea. The final output of the NN approach consists of a best-estimate image based on medians for each pixel and a second image representing uncertainty based on standard deviation for each pixel, providing pixel-specific estimates of uncertainty in the final product.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Efficient Gesture Recognition for the Assistance of Visually Impaired People using Multi-Head Neural Networks
Authors:
Samer Alashhab,
Antonio Javier Gallego,
Miguel Ángel Lozano
Abstract:
This paper proposes an interactive system for mobile devices controlled by hand gestures aimed at helping people with visual impairments. This system allows the user to interact with the device by making simple static and dynamic hand gestures. Each gesture triggers a different action in the system, such as object recognition, scene description or image scaling (e.g., pointing a finger at an objec…
▽ More
This paper proposes an interactive system for mobile devices controlled by hand gestures aimed at helping people with visual impairments. This system allows the user to interact with the device by making simple static and dynamic hand gestures. Each gesture triggers a different action in the system, such as object recognition, scene description or image scaling (e.g., pointing a finger at an object will show a description of it). The system is based on a multi-head neural network architecture, which initially detects and classifies the gestures, and subsequently, depending on the gesture detected, performs a second stage that carries out the corresponding action. This multi-head architecture optimizes the resources required to perform different tasks simultaneously, and takes advantage of the information obtained from an initial backbone to perform different processes in a second stage. To train and evaluate the system, a dataset with about 40k images was manually compiled and labeled including different types of hand gestures, backgrounds (indoors and outdoors), lighting conditions, etc. This dataset contains synthetic gestures (whose objective is to pre-train the system in order to improve the results) and real images captured using different mobile phones. The results obtained and the comparison made with the state of the art show competitive results as regards the different actions performed by the system, such as the accuracy of classification and localization of gestures, or the generation of descriptions for objects and scenes.
△ Less
Submitted 14 May, 2022;
originally announced May 2022.
-
Multi-Label Logo Recognition and Retrieval based on Weighted Fusion of Neural Features
Authors:
Marisa Bernabeu,
Antonio Javier Gallego,
Antonio Pertusa
Abstract:
Classifying logo images is a challenging task as they contain elements such as text or shapes that can represent anything from known objects to abstract shapes. While the current state of the art for logo classification addresses the problem as a multi-class task focusing on a single characteristic, logos can have several simultaneous labels, such as different colors. This work proposes a method t…
▽ More
Classifying logo images is a challenging task as they contain elements such as text or shapes that can represent anything from known objects to abstract shapes. While the current state of the art for logo classification addresses the problem as a multi-class task focusing on a single characteristic, logos can have several simultaneous labels, such as different colors. This work proposes a method that allows visually similar logos to be classified and searched from a set of data according to their shape, color, commercial sector, semantics, general characteristics, or a combination of features selected by the user. Unlike previous approaches, the proposal employs a series of multi-label deep neural networks specialized in specific attributes and combines the obtained features to perform the similarity search. To delve into the classification system, different existing logo topologies are compared and some of their problems are analyzed, such as the incomplete labeling that trademark registration databases usually contain. The proposal is evaluated considering 76,000 logos (7 times more than previous approaches) from the European Union Trademarks dataset, which is organized hierarchically using the Vienna ontology. Overall, experimentation attains reliable quantitative and qualitative results, reducing the normalized average rank error of the state-of-the-art from 0.040 to 0.018 for the Trademark Image Retrieval task. Finally, given that the semantics of logos can often be subjective, graphic design students and professionals were surveyed. Results show that the proposed methodology provides better labeling than a human expert operator, improving the label ranking average precision from 0.53 to 0.68.
△ Less
Submitted 9 December, 2022; v1 submitted 11 May, 2022;
originally announced May 2022.
-
Identification of charm jets at LHCb
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (984 additional authors not shown)
Abstract:
The identification of charm jets is achieved at LHCb for data collected in 2015-2018 using a method based on the properties of displaced vertices reconstructed and matched with jets. The performance of this method is determined using a dijet calibration dataset recorded by the LHCb detector and selected such that the jets are unbiased in quantities used in the tagging algorithm. The charm-tagging…
▽ More
The identification of charm jets is achieved at LHCb for data collected in 2015-2018 using a method based on the properties of displaced vertices reconstructed and matched with jets. The performance of this method is determined using a dijet calibration dataset recorded by the LHCb detector and selected such that the jets are unbiased in quantities used in the tagging algorithm. The charm-tagging efficiency is reported as a function of the transverse momentum of the jet. The measured efficiencies are compared to those obtained from simulation and found to be in good agreement.
△ Less
Submitted 24 February, 2022; v1 submitted 15 December, 2021;
originally announced December 2021.
-
Study of the $B_c^+$ decays into charmonia and three light hadrons
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (986 additional authors not shown)
Abstract:
Using proton-proton collision data, corresponding to an integrated luminosity of $9fb^{-1}$ collected with the LHCb detector, seven decay modes of the $B_c^+$ meson into a $J/ψ$ or $ψ(2S)$ meson and three charged hadrons, kaons or pions, are studied. The decays $B_c^+\rightarrow ( ψ(2S) \rightarrow J/ψπ^+ π^-)π^+ $, $B_c^+\rightarrow ψ(2S)π^+π^+π^-$, $B_c^+\rightarrow J/ψK^+π^+π^-$ and…
▽ More
Using proton-proton collision data, corresponding to an integrated luminosity of $9fb^{-1}$ collected with the LHCb detector, seven decay modes of the $B_c^+$ meson into a $J/ψ$ or $ψ(2S)$ meson and three charged hadrons, kaons or pions, are studied. The decays $B_c^+\rightarrow ( ψ(2S) \rightarrow J/ψπ^+ π^-)π^+ $, $B_c^+\rightarrow ψ(2S)π^+π^+π^-$, $B_c^+\rightarrow J/ψK^+π^+π^-$ and $B_c^+\rightarrow K^+K^+K^-$ are observed for the first time, and evidence for the $B_c^+\rightarrow ψ(2S)K^+K^-π^+$ decay is found, where $J/ψ$ and $ψ(2S)$ mesons are reconstructed in their dimuon decay modes. The ratios of branching fractions between the different $B_c^+$ decays are reported as well as the fractions of the decays proceeding via intermediate resonances. The results largely support the factorisation approach used for a theoretical description of the studied decays.
△ Less
Submitted 4 November, 2021;
originally announced November 2021.
-
Two Heads are Better than One: Geometric-Latent Attention for Point Cloud Classification and Segmentation
Authors:
Hanz Cuevas-Velasquez,
Antonio Javier Gallego,
Robert B. Fisher
Abstract:
We present an innovative two-headed attention layer that combines geometric and latent features to segment a 3D scene into semantically meaningful subsets. Each head combines local and global information, using either the geometric or latent features, of a neighborhood of points and uses this information to learn better local relationships. This Geometric-Latent attention layer (Ge-Latto) is combi…
▽ More
We present an innovative two-headed attention layer that combines geometric and latent features to segment a 3D scene into semantically meaningful subsets. Each head combines local and global information, using either the geometric or latent features, of a neighborhood of points and uses this information to learn better local relationships. This Geometric-Latent attention layer (Ge-Latto) is combined with a sub-sampling strategy to capture global features. Our method is invariant to permutation thanks to the use of shared-MLP layers, and it can also be used with point clouds with varying densities because the local attention layer does not depend on the neighbor order. Our proposal is simple yet robust, which allows it to achieve competitive results in the ShapeNetPart and ModelNet40 datasets, and the state-of-the-art when segmenting the complex dataset S3DIS, with 69.2% IoU on Area 5, and 89.7% overall accuracy using K-fold cross-validation on the 6 areas.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
Control of Kawahara equation with overdetermination condition: The unbounded cases
Authors:
Roberto de A. Capistrano Filho,
Luan S. de Sousa,
Fernando A. Gallego
Abstract:
In this manuscript we consider the internal control problem for the fifth order KdV type equation, commonly called the Kawahara equation, on unbounded domains. Precisely, under certain hypotheses over the initial and boundary data, we are able to prove that there exists an internal control input such that solutions of the Kawahara equation satisfies an integral overdetermination condition. This co…
▽ More
In this manuscript we consider the internal control problem for the fifth order KdV type equation, commonly called the Kawahara equation, on unbounded domains. Precisely, under certain hypotheses over the initial and boundary data, we are able to prove that there exists an internal control input such that solutions of the Kawahara equation satisfies an integral overdetermination condition. This condition is satisfied when the domain of the Kawahara equation is posed in the real line, left half-line and right half-line. Moreover, we are also able to prove that there exists a minimal time in which the integral overdetermination condition is satisfied. Finally, we show a type of exact controllability associated with the "mass" of the Kawahara equation posed in the half-line.
△ Less
Submitted 9 February, 2022; v1 submitted 17 October, 2021;
originally announced October 2021.
-
Study of $Z$ bosons produced in association with charm in the forward region
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (984 additional authors not shown)
Abstract:
Events containing a $Z$ boson and a charm jet are studied for the first time in the forward region of proton-proton collisions. The data sample used corresponds to an integrated luminosity of $6 \, {\rm fb}^{-1}$ collected at a center-of-mass energy of 13 TeV with the LHCb detector. In events with a $Z$ boson and a jet, the fraction of charm jets is determined in intervals of $Z$-boson rapidity in…
▽ More
Events containing a $Z$ boson and a charm jet are studied for the first time in the forward region of proton-proton collisions. The data sample used corresponds to an integrated luminosity of $6 \, {\rm fb}^{-1}$ collected at a center-of-mass energy of 13 TeV with the LHCb detector. In events with a $Z$ boson and a jet, the fraction of charm jets is determined in intervals of $Z$-boson rapidity in the range $2.0 < y(Z) < 4.5$. A sizable enhancement is observed in the forward-most $y(Z)$ interval, which could be indicative of a valence-like intrinsic-charm component in the proton wave function.
△ Less
Submitted 1 April, 2022; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Measurement of $χ_{c1}(3872)$ production in proton-proton collisions at $\sqrt{s}=8$ and $13$ TeV
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (987 additional authors not shown)
Abstract:
The production cross-section of the $χ_{c1}(3872)$ state relative to the $ψ(2S)$ meson is measured using proton-proton collision data collected with the LHCb experiment at centre-of-mass energies of $\sqrt{s}=8$ and 13 TeV, corresponding to integrated luminosities of 2.0 and 5.4 fb$^{-1}$, respectively. The two mesons are reconstructed in the $J/ψπ^{+}π^{-}$ final state. The ratios of the prompt a…
▽ More
The production cross-section of the $χ_{c1}(3872)$ state relative to the $ψ(2S)$ meson is measured using proton-proton collision data collected with the LHCb experiment at centre-of-mass energies of $\sqrt{s}=8$ and 13 TeV, corresponding to integrated luminosities of 2.0 and 5.4 fb$^{-1}$, respectively. The two mesons are reconstructed in the $J/ψπ^{+}π^{-}$ final state. The ratios of the prompt and nonprompt $χ_{c1}(3872)$ to $ψ(2S)$ production cross-sections are measured as a function of transverse momentum, $p_{\rm T}$, and rapidity, $y$, in the kinematic range $4 < p_{\rm T} < 20$ GeV/$c$ and $2.0 < y < 4.5$. The prompt ratio is found to increase with $p_{\rm T}$ independently of $y$. The double-differential cross-section ratio of $χ_{c1}(3872)$ relative to $ψ(2S)$ mesons between 13 and 8 TeV is also measured for the prompt component and observed to be consistent with unity, independent of $p_{\rm T}$ and centre-of-mass energy.
△ Less
Submitted 27 January, 2022; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Observation of the suppressed $Λ_b^0\to D p K^-$ decay with $D\to K^+ π^-$ and measurement of its $C\!P$ asymmetry
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (987 additional authors not shown)
Abstract:
A study of $Λ_b^0$ baryon decays to the $DpK^-$ final state is presented based on a proton-proton collision data sample corresponding to an integrated luminosity of 9 fb$^{-1}$ collected with the LHCb detector. Two $Λ_b^0$ decays are considered, $Λ_b^0\to DpK^-$ with $D\to K^-π^+$ and $D\to K^+π^-$, where $D$ represents a superposition of $D^0$ and $\overline{D}^0$ states. The latter process is ex…
▽ More
A study of $Λ_b^0$ baryon decays to the $DpK^-$ final state is presented based on a proton-proton collision data sample corresponding to an integrated luminosity of 9 fb$^{-1}$ collected with the LHCb detector. Two $Λ_b^0$ decays are considered, $Λ_b^0\to DpK^-$ with $D\to K^-π^+$ and $D\to K^+π^-$, where $D$ represents a superposition of $D^0$ and $\overline{D}^0$ states. The latter process is expected to be suppressed relative to the former, and is observed for the first time. The ratio of branching fractions of the two decays is measured, and the $C\!P$ asymmetry of the suppressed mode, which is sensitive to the CKM angle $γ$, is also reported.
△ Less
Submitted 6 January, 2022; v1 submitted 6 September, 2021;
originally announced September 2021.
-
Study of the doubly charmed tetraquark $T_{cc}^+$
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (984 additional authors not shown)
Abstract:
An exotic narrow state in the $D^0D^0π^+$ mass spectrum just below the $D^{*+}D^0$ mass threshold is studied using a data set corresponding to an integrated luminosity of 9 fb$^{-1}$ acquired with the LHCb detector in proton-proton collisions at centre-of-mass energies of 7, 8 and 13 TeV. The state is consistent with the ground isoscalar $T^+_{cc}$ tetraquark with a quark content of…
▽ More
An exotic narrow state in the $D^0D^0π^+$ mass spectrum just below the $D^{*+}D^0$ mass threshold is studied using a data set corresponding to an integrated luminosity of 9 fb$^{-1}$ acquired with the LHCb detector in proton-proton collisions at centre-of-mass energies of 7, 8 and 13 TeV. The state is consistent with the ground isoscalar $T^+_{cc}$ tetraquark with a quark content of $cc\bar{u}\bar{d}$ and spin-parity quantum numbers $\mathrm{J}^{\mathrm{P}}=1^+$. Study of the $DD$ mass spectra disfavours interpretation of the resonance as the isovector state. The decay structure via intermediate off-shell $D^{*+}$ mesons is confirmed by the $D^0π^+$ mass distribution. The mass of the resonance and its coupling to the $D^{*}D$ system are analysed. Resonance parameters including the pole position, scattering length, effective range and compositeness are measured to reveal important information about the nature of the $T^+_{cc}$ state. In addition, an unexpected dependence of the production rate on track multiplicity is observed.
△ Less
Submitted 16 June, 2022; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Observation of an exotic narrow doubly charmed tetraquark
Authors:
LHCb collaboration,
R. Aaij,
A. S. W. Abdelmotteleb,
C. Abellán Beteta,
F. J. Abudinen Gallego,
T. Ackernley,
B. Adeva,
M. Adinolfi,
H. Afsharnia,
C. Agapopoulou,
C. A. Aidala,
S. Aiola,
Z. Ajaltouni,
S. Akar,
J. Albrecht,
F. Alessio,
M. Alexander,
A. Alfonso Albero,
Z. Aliouche,
G. Alkhazov,
P. Alvarez Cartelle,
S. Amato,
J. L. Amey,
Y. Amhis,
L. An
, et al. (984 additional authors not shown)
Abstract:
Conventional hadronic matter consists of baryons and mesons made of three quarks and quark-antiquark pairs, respectively. The observation of a new type of hadronic state, a doubly charmed tetraquark containing two charm quarks, an anti-$u$ and an anti-$d$ quark, is reported using data collected by the LHCb experiment at the Large Hadron Collider. This exotic state with a mass of about 3875 MeV…
▽ More
Conventional hadronic matter consists of baryons and mesons made of three quarks and quark-antiquark pairs, respectively. The observation of a new type of hadronic state, a doubly charmed tetraquark containing two charm quarks, an anti-$u$ and an anti-$d$ quark, is reported using data collected by the LHCb experiment at the Large Hadron Collider. This exotic state with a mass of about 3875 MeV$/c^2$ manifests itself as a narrow peak in the mass spectrum of $D^0D^0π^+$ mesons just below the $D^{*+}D^0$ mass threshold. The near threshold mass together with a strikingly narrow width reveals the resonance nature of the state.
△ Less
Submitted 16 June, 2022; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Rapid Exponential Stabilization of a Boussinesq System of KdV--KdV Type
Authors:
Roberto de A. Capistrano Filho,
Eduardo Cerpa,
Fernando A. Gallego
Abstract:
This paper studies the exponential stabilization of a Boussinesq system describing the two-way propagation of small amplitude gravity waves on the surface of an ideal fluid, the so-called Boussinesq system of the Korteweg-de Vries type. We use a Gramian-based method introduced by Urquiza to design our feedback control. By means of spectral analysis and Fourier expansion, we show that the solutions…
▽ More
This paper studies the exponential stabilization of a Boussinesq system describing the two-way propagation of small amplitude gravity waves on the surface of an ideal fluid, the so-called Boussinesq system of the Korteweg-de Vries type. We use a Gramian-based method introduced by Urquiza to design our feedback control. By means of spectral analysis and Fourier expansion, we show that the solutions of the linearized system decay uniformly to zero when the feedback control is applied. The decay rate can be chosen as large as we want. The main novelty of our work is that we can exponentially stabilize this system of two coupled equations using only one scalar input.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
Learning with Density Matrices and Random Features
Authors:
Fabio A. González,
Alejandro Gallego,
Santiago Toledo-Cortés,
Vladimir Vargas-Calderón
Abstract:
A density matrix describes the statistical state of a quantum system. It is a powerful formalism to represent both the quantum and classical uncertainty of quantum systems and to express different statistical operations such as measurement, system combination and expectations as linear algebra operations. This paper explores how density matrices can be used as a building block for machine learning…
▽ More
A density matrix describes the statistical state of a quantum system. It is a powerful formalism to represent both the quantum and classical uncertainty of quantum systems and to express different statistical operations such as measurement, system combination and expectations as linear algebra operations. This paper explores how density matrices can be used as a building block for machine learning models exploiting their ability to straightforwardly combine linear algebra and probability. One of the main results of the paper is to show that density matrices coupled with random Fourier features could approximate arbitrary probability distributions over $\mathbb{R}^n$. Based on this finding the paper builds different models for density estimation, classification and regression. These models are differentiable, so it is possible to integrate them with other differentiable components, such as deep learning architectures and to learn their parameters using gradient-based optimization. In addition, the paper presents optimization-less training strategies based on estimation and model averaging. The models are evaluated in benchmark tasks and the results are reported and discussed.
△ Less
Submitted 30 April, 2024; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Unsupervised Neural Domain Adaptation for Document Image Binarization
Authors:
Francisco J. Castellanos,
Antonio-Javier Gallego,
Jorge Calvo-Zaragoza
Abstract:
Binarization is a well-known image processing task, whose objective is to separate the foreground of an image from the background. One of the many tasks for which it is useful is that of preprocessing document images in order to identify relevant information, such as text or symbols. The wide variety of document types, alphabets, and formats makes binarization challenging. There are multiple propo…
▽ More
Binarization is a well-known image processing task, whose objective is to separate the foreground of an image from the background. One of the many tasks for which it is useful is that of preprocessing document images in order to identify relevant information, such as text or symbols. The wide variety of document types, alphabets, and formats makes binarization challenging. There are multiple proposals with which to solve this problem, from classical manually-adjusted methods, to more recent approaches based on machine learning. The latter techniques require a large amount of training data in order to obtain good results; however, labeling a portion of each existing collection of documents is not feasible in practice. This is a common problem in supervised learning, which can be addressed by using the so-called Domain Adaptation (DA) techniques. These techniques take advantage of the knowledge learned in one domain, for which labeled data are available, to apply it to other domains for which there are no labeled data. This paper proposes a method that combines neural networks and DA in order to carry out unsupervised document binarization. However, when both the source and target domains are very similar, this adaptation could be detrimental. Our methodology, therefore, first measures the similarity between domains in an innovative manner in order to determine whether or not it is appropriate to apply the adaptation process. The results reported in the experimentation, when evaluating up to 20 possible combinations among five different domains, show that our proposal successfully deals with the binarization of new document domains without the need for labeled data.
△ Less
Submitted 1 July, 2021; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Incremental Unsupervised Domain-Adversarial Training of Neural Networks
Authors:
Antonio-Javier Gallego,
Jorge Calvo-Zaragoza,
Robert B. Fisher
Abstract:
In the context of supervised statistical learning, it is typically assumed that the training set comes from the same distribution that draws the test samples. When this is not the case, the behavior of the learned model is unpredictable and becomes dependent upon the degree of similarity between the distribution of the training set and the distribution of the test set. One of the research topics t…
▽ More
In the context of supervised statistical learning, it is typically assumed that the training set comes from the same distribution that draws the test samples. When this is not the case, the behavior of the learned model is unpredictable and becomes dependent upon the degree of similarity between the distribution of the training set and the distribution of the test set. One of the research topics that investigates this scenario is referred to as domain adaptation. Deep neural networks brought dramatic advances in pattern recognition and that is why there have been many attempts to provide good domain adaptation algorithms for these models. Here we take a different avenue and approach the problem from an incremental point of view, where the model is adapted to the new domain iteratively. We make use of an existing unsupervised domain-adaptation algorithm to identify the target samples on which there is greater confidence about their true label. The output of the model is analyzed in different ways to determine the candidate samples. The selected set is then added to the source training set by considering the labels provided by the network as ground truth, and the process is repeated until all target samples are labelled. Our results report a clear improvement with respect to the non-incremental case in several datasets, also outperforming other state-of-the-art domain adaptation algorithms.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Forcing operators on star graphs applied for the cubic fourth order Schrödinger equation
Authors:
Roberto de A. Capistrano Filho,
Márcio Cavalcante,
Fernando A. Gallego
Abstract:
In a recent article \textit{"Lower regularity solutions of the biharmonic Schrödinger equation in a quarter plane", to appear on Pacific Journal of Mathematics [15]}, the authors gave a starting point of the study on a series of problems concerning the initial boundary value problem and control theory of Biharmonic NLS in some non-standard domains. In this direction, this article deals to present…
▽ More
In a recent article \textit{"Lower regularity solutions of the biharmonic Schrödinger equation in a quarter plane", to appear on Pacific Journal of Mathematics [15]}, the authors gave a starting point of the study on a series of problems concerning the initial boundary value problem and control theory of Biharmonic NLS in some non-standard domains. In this direction, this article deals to present answers for some questions left in [15] concerning the study of the cubic fourth order Schrödinger equation in a star graph structure $\mathcal{G}$. Precisely, consider $\mathcal{G}$ composed by $N$ edges parameterized by half-lines $(0,+\infty)$ attached with a common vertex $ν$. With this structure the manuscript proposes to study the well-posedness of a dispersive model on star graphs with three appropriated vertex conditions by using the \textit{boundary forcing operator approach}. More precisely, we give positive answer for the Cauchy problem in low regularity Sobolev spaces. We have noted that this approach seems very efficient, since this allows to use the tools of Harmonic Analysis, for instance, the Fourier restriction method, introduced by Bourgain, while for the other known standard methods to solve partial differential partial equations on star graphs are more complicated to capture the dispersive smoothing effect in low regularity. The arguments presented in this work have prospects to be applied for other nonlinear dispersive equations in the context of star graphs with unbounded edges.
△ Less
Submitted 10 August, 2020; v1 submitted 15 September, 2019;
originally announced September 2019.
-
Lower regularity solutions of the biharmonic Schrödinger equation in a quarter plane
Authors:
Roberto A. Capistrano-Filho,
Márcio Cavalcante,
Fernando A. Gallego
Abstract:
This paper deals with the initial-boundary value problem of the biharmonic cubic nonlinear Schrödinger equation in a quarter plane with inhomogeneous Dirichlet-Neumann boundary data. We prove local well-posedness in the low regularity Sobolev spaces introducing Duhamel boundary forcing operator associated to the linear equation to construct solutions on the whole line. With this in hands, the ener…
▽ More
This paper deals with the initial-boundary value problem of the biharmonic cubic nonlinear Schrödinger equation in a quarter plane with inhomogeneous Dirichlet-Neumann boundary data. We prove local well-posedness in the low regularity Sobolev spaces introducing Duhamel boundary forcing operator associated to the linear equation to construct solutions on the whole line. With this in hands, the energy and nonlinear estimates allow us to apply Fourier restriction method, introduced by J. Bourgain, to get the main result of the article. Additionally, adaptations of this approach for the biharmonic cubic nonlinear Schrödinger equation on star graphs are also discussed.
△ Less
Submitted 10 August, 2020; v1 submitted 23 December, 2018;
originally announced December 2018.
-
Adversarial Domain Adaptation for Stable Brain-Machine Interfaces
Authors:
Ali Farshchian,
Juan A. Gallego,
Joseph P. Cohen,
Yoshua Bengio,
Lee E. Miller,
Sara A. Solla
Abstract:
Brain-Machine Interfaces (BMIs) have recently emerged as a clinically viable option to restore voluntary movements after paralysis. These devices are based on the ability to extract information about movement intent from neural signals recorded using multi-electrode arrays chronically implanted in the motor cortices of the brain. However, the inherent loss and turnover of recorded neurons requires…
▽ More
Brain-Machine Interfaces (BMIs) have recently emerged as a clinically viable option to restore voluntary movements after paralysis. These devices are based on the ability to extract information about movement intent from neural signals recorded using multi-electrode arrays chronically implanted in the motor cortices of the brain. However, the inherent loss and turnover of recorded neurons requires repeated recalibrations of the interface, which can potentially alter the day-to-day user experience. The resulting need for continued user adaptation interferes with the natural, subconscious use of the BMI. Here, we introduce a new computational approach that decodes movement intent from a low-dimensional latent representation of the neural data. We implement various domain adaptation methods to stabilize the interface over significantly long times. This includes Canonical Correlation Analysis used to align the latent variables across days; this method requires prior point-to-point correspondence of the time series across domains. Alternatively, we match the empirical probability distributions of the latent variables across days through the minimization of their Kullback-Leibler divergence. These two methods provide a significant and comparable improvement in the performance of the interface. However, implementation of an Adversarial Domain Adaptation Network trained to match the empirical probability distribution of the residuals of the reconstructed neural signals outperforms the two methods based on latent variables, while requiring remarkably few data points to solve the domain adaptation problem.
△ Less
Submitted 15 January, 2019; v1 submitted 28 September, 2018;
originally announced October 2018.
-
On the Stability of the Cauchy Problem of Timoshenko Thermoelastic Systems with Past History: Cattaneo and Fourier Law
Authors:
Hugo D. Fernandez Sare,
Fernando A. Gallego
Abstract:
In this paper, we investigate the decay properties of the thermoelastic Timoshenko system with past history in the whole space where the thermal effects are given by Cattaneo and Fourier laws. We obtain that both systems, Timoshenko-Fourier and Timoshenko-Cattaneo, have the same rate of decay $(1 + t)^{-1/8}$ and satisfy the regularity-loss type property. Moreover, for the Cattaneo case, we show t…
▽ More
In this paper, we investigate the decay properties of the thermoelastic Timoshenko system with past history in the whole space where the thermal effects are given by Cattaneo and Fourier laws. We obtain that both systems, Timoshenko-Fourier and Timoshenko-Cattaneo, have the same rate of decay $(1 + t)^{-1/8}$ and satisfy the regularity-loss type property. Moreover, for the Cattaneo case, we show that the decay rate depends of a new condition on the wave speed of propagation $χ_{0,τ}$. This new condition has been recently introduced to study the asymptotic behavior in bounded domains, see for instance [5] and [27]. We found that this number also plays an important role in unbounded situation, affecting the decay rate of the solution.
△ Less
Submitted 29 November, 2019; v1 submitted 25 August, 2018;
originally announced August 2018.
-
On the well posedness and large-time behavior of higher order Boussinesq system
Authors:
R. A. Capistrano-Filho,
F. A. Gallego,
A. F. Pazoto
Abstract:
A family of Boussinesq systems has been proposed to describe the bi-directional propagation of small amplitude long waves on the surface of shallow water. In this paper, we investigate the well-posedness and boundary stabilization of the generalized higher order Boussinesq systems of Korteweg-de Vries--type posed on a interval. We design a two-parameter family of feedback laws for which the system…
▽ More
A family of Boussinesq systems has been proposed to describe the bi-directional propagation of small amplitude long waves on the surface of shallow water. In this paper, we investigate the well-posedness and boundary stabilization of the generalized higher order Boussinesq systems of Korteweg-de Vries--type posed on a interval. We design a two-parameter family of feedback laws for which the system is locally well-posed and the solutions of the linearized system are exponentially decreasing in time.
△ Less
Submitted 28 July, 2018; v1 submitted 22 December, 2017;
originally announced December 2017.
-
Asymptotic behavior of Boussinesq system of KdV-KdV type
Authors:
Roberto A. Capistrano-Filho,
Fernando A. Gallego
Abstract:
This work deals with the local rapid exponential stabilization for a Boussinesq system of KdV-KdV type introduced by J. Bona, M. Chen and J.-C. Saut. This is a model for the motion of small amplitude long waves on the surface of an ideal fluid. Here, we will consider the Boussinesq system of KdV-KdV type posed on a finite domain, with homogeneous Dirichlet--Neumann boundary controls acting at the…
▽ More
This work deals with the local rapid exponential stabilization for a Boussinesq system of KdV-KdV type introduced by J. Bona, M. Chen and J.-C. Saut. This is a model for the motion of small amplitude long waves on the surface of an ideal fluid. Here, we will consider the Boussinesq system of KdV-KdV type posed on a finite domain, with homogeneous Dirichlet--Neumann boundary controls acting at the right end point of the interval. Our goal is to build suitable integral transformations to get a feedback control law that leads to the stabilization of the system. More precisely, we will prove that the solution of the closed-loop system decays exponentially to zero in the $L^2(0,L)$--norm and the decay rate can be tuned to be as large as desired if the initial data is small enough.
△ Less
Submitted 18 September, 2017;
originally announced September 2017.
-
Language Design as Information Renormalization
Authors:
Angel J. Gallego,
Roman Orus
Abstract:
Here we consider some well-known facts in syntax from a physics perspective, allowing us to establish equivalences between both fields with many consequences. Mainly, we observe that the operation MERGE, put forward by N. Chomsky in 1995, can be interpreted as a physical information coarse-graining. Thus, MERGE in linguistics entails information renormalization in physics, according to different t…
▽ More
Here we consider some well-known facts in syntax from a physics perspective, allowing us to establish equivalences between both fields with many consequences. Mainly, we observe that the operation MERGE, put forward by N. Chomsky in 1995, can be interpreted as a physical information coarse-graining. Thus, MERGE in linguistics entails information renormalization in physics, according to different time scales. We make this point mathematically formal in terms of language models. In this setting, MERGE amounts to a probability tensor implementing a coarse-graining, akin to a probabilistic context-free grammar. The probability vectors of meaningful sentences are given by stochastic tensor networks (TN) built from diagonal tensors and which are mostly loop-free, such as Tree Tensor Networks and Matrix Product States, thus being computationally very efficient to manipulate. We show that this implies the polynomially-decaying (long-range) correlations experimentally observed in language, and also provides arguments in favour of certain types of neural networks for language processing. Moreover, we show how to obtain such language models from quantum states that can be efficiently prepared on a quantum computer, and use this to find bounds on the perplexity of the probability distribution of words in a sentence. Implications of our results are discussed across several ambits.
△ Less
Submitted 6 February, 2022; v1 submitted 4 August, 2017;
originally announced August 2017.
-
A selectional auto-encoder approach for document image binarization
Authors:
Jorge Calvo-Zaragoza,
Antonio-Javier Gallego
Abstract:
Binarization plays a key role in the automatic information retrieval from document images. This process is usually performed in the first stages of documents analysis systems, and serves as a basis for subsequent steps. Hence it has to be robust in order to allow the full analysis workflow to be successful. Several methods for document image binarization have been proposed so far, most of which ar…
▽ More
Binarization plays a key role in the automatic information retrieval from document images. This process is usually performed in the first stages of documents analysis systems, and serves as a basis for subsequent steps. Hence it has to be robust in order to allow the full analysis workflow to be successful. Several methods for document image binarization have been proposed so far, most of which are based on hand-crafted image processing strategies. Recently, Convolutional Neural Networks have shown an amazing performance in many disparate duties related to computer vision. In this paper we discuss the use of convolutional auto-encoders devoted to learning an end-to-end map from an input image to its selectional output, in which activations indicate the likelihood of pixels to be either foreground or background. Once trained, documents can therefore be binarized by parsing them through the model and applying a threshold. This approach has proven to outperform existing binarization strategies in a number of document domains.
△ Less
Submitted 6 September, 2018; v1 submitted 30 June, 2017;
originally announced June 2017.
-
MirBot: A collaborative object recognition system for smartphones using convolutional neural networks
Authors:
Antonio Pertusa,
Antonio-Javier Gallego,
Marisa Bernabeu
Abstract:
MirBot is a collaborative application for smartphones that allows users to perform object recognition. This app can be used to take a photograph of an object, select the region of interest and obtain the most likely class (dog, chair, etc.) by means of similarity search using features extracted from a convolutional neural network (CNN). The answers provided by the system can be validated by the us…
▽ More
MirBot is a collaborative application for smartphones that allows users to perform object recognition. This app can be used to take a photograph of an object, select the region of interest and obtain the most likely class (dog, chair, etc.) by means of similarity search using features extracted from a convolutional neural network (CNN). The answers provided by the system can be validated by the user so as to improve the results for future queries. All the images are stored together with a series of metadata, thus enabling a multimodal incremental dataset labeled with synset identifiers from the WordNet ontology. This dataset grows continuously thanks to the users' feedback, and is publicly available for research. This work details the MirBot object recognition system, analyzes the statistics gathered after more than four years of usage, describes the image classification methodology, and performs an exhaustive evaluation using handcrafted features, convolutional neural codes and different transfer learning techniques. After comparing various models and transformation methods, the results show that the CNN features maintain the accuracy of MirBot constant over time, despite the increasing number of new classes. The app is freely available at the Apple and Google Play stores.
△ Less
Submitted 24 March, 2018; v1 submitted 9 June, 2017;
originally announced June 2017.
-
Controllability Aspects of the Korteweg-de Vries Burgers Equation on Unbounded Domains
Authors:
F. A. Gallego
Abstract:
The aim of this work is to consider the controllability problem of the linear system associated to Korteweg-de Vries Burgers equation posed in the whole real line. We obtain a sort of exact controllability for solutions in $L^2_{loc}(\R^2)$ by deriving an internal observability inequality and a Global Carlemann estimate. Following the ideas contained in \cite{rosier2000}, the problem is reduced to…
▽ More
The aim of this work is to consider the controllability problem of the linear system associated to Korteweg-de Vries Burgers equation posed in the whole real line. We obtain a sort of exact controllability for solutions in $L^2_{loc}(\R^2)$ by deriving an internal observability inequality and a Global Carlemann estimate. Following the ideas contained in \cite{rosier2000}, the problem is reduced to prove an approximate theorem.
△ Less
Submitted 18 February, 2017;
originally announced February 2017.
-
Decay Rates of the Solutions to the Thermoelastic Bresse System of Types I and III
Authors:
F. A. Gallego,
J. E. Muñoz Rivera
Abstract:
In this paper, we study the energy decay for the thermoelastic Bresse system in the whole line with two different dissipative mechanism, given by heat conduction (Types I and III). We prove that the decay rate of the solutions are very slow. More precisely, we show that the solutions decay with the rate of $(1+t)^{-\frac{1}{8}}$ in the $L^2$-norm, whenever the initial data belongs to…
▽ More
In this paper, we study the energy decay for the thermoelastic Bresse system in the whole line with two different dissipative mechanism, given by heat conduction (Types I and III). We prove that the decay rate of the solutions are very slow. More precisely, we show that the solutions decay with the rate of $(1+t)^{-\frac{1}{8}}$ in the $L^2$-norm, whenever the initial data belongs to $L^1(R) \cap H^{s}(R)$ for a suitable $s$. The wave speeds of propagation have influence on the decay rate with respect to the regularity of the initial data. This phenomenon is known as \textit{regularity-loss}. The main tool used to prove our results is the energy method in the Fourier space.
△ Less
Submitted 14 February, 2017;
originally announced February 2017.
-
Boundary controllability of a nonlinear coupled system of two Korteweg-de Vries equations with critical size restrictions on the spatial domain
Authors:
Roberto A. Capistrano-Filho,
Fernando A. Gallego,
Ademir F. Pazoto
Abstract:
This article is dedicated to improve the controllability results obtained by Cerpa et al. in Commun. Contemp. Math 13 (2011) and by Micu et al. in Commun. Contemp. Math 11 (5) (2009) for a nonlinear coupled system of two Korteweg-de Vries (KdV) equations posed on a bounded interval. Initially, in Micu et al., the authors proved that the nonlinear system is exactly controllable by using four bounda…
▽ More
This article is dedicated to improve the controllability results obtained by Cerpa et al. in Commun. Contemp. Math 13 (2011) and by Micu et al. in Commun. Contemp. Math 11 (5) (2009) for a nonlinear coupled system of two Korteweg-de Vries (KdV) equations posed on a bounded interval. Initially, in Micu et al., the authors proved that the nonlinear system is exactly controllable by using four boundary controls without any restriction on the length L of the interval. Later on, in Cerpa et al., two boundary controls were considered to prove that the same system is exactly controllable for small values of the length L and large time of control T. Here, we use the ideas contained in Capistrano-Filho et al. (arXiv 1508.07525) to prove that, with another configuration of four controls, it is possible to prove the existence of the so-called critical length phenomenon for the nonlinear system, i. e., whether the system is controllable depends on the length of the spatial domain. In addition, when we consider only one control input, the boundary controllability still holds for suitable values of the length L and time of control T. In both cases, the control spaces are sharp due a technical lemma which reveals a hidden regularity for the solution of the adjoint system.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
Neumann Boundary Controllability of the Gear--Grimshaw System With Critical Size Restrictions on the Spacial Domain
Authors:
Roberto de A. Capistrano-Filho,
Fernando A. Gallego,
Ademir F. Pazoto
Abstract:
In this paper we study the boundary controllability of the Gear-Grimshaw system posed on a finite domain $(0,L)$, with Neumann boundary conditions: \begin{equation} \label{abs} \begin{cases} u_t + uu_x+u_{xxx} + a v_{xxx} + a_1vv_x+a_2 (uv)_x =0, & \text{in} \,\, (0,L)\times (0,T), c v_t +rv_x +vv_x+abu_{xxx} +v_{xxx}+a_2buu_x+a_1b(uv)_x =0, & \text{in} \,\, (0,L)\times (0,T), u_{xx}(0,t)=h_0(t),\…
▽ More
In this paper we study the boundary controllability of the Gear-Grimshaw system posed on a finite domain $(0,L)$, with Neumann boundary conditions: \begin{equation} \label{abs} \begin{cases} u_t + uu_x+u_{xxx} + a v_{xxx} + a_1vv_x+a_2 (uv)_x =0, & \text{in} \,\, (0,L)\times (0,T), c v_t +rv_x +vv_x+abu_{xxx} +v_{xxx}+a_2buu_x+a_1b(uv)_x =0, & \text{in} \,\, (0,L)\times (0,T), u_{xx}(0,t)=h_0(t),\,\,u_x(L,t)=h_1(t),\,\,u_{xx}(L,t)=h_2(t), & \text{in} \,\, (0,T), v_{xx}(0,t)=g_0(t),\,\,v_x(L,t)=g_1(t),\,\,v_{xx}(L,t)=g_2(t), & \text{in} \,\, (0,T), u(x,0)= u^0(x), \quad v(x,0)= v^0(x), & \text{in} \,\, (0,L).\nonumber \end{cases} \end{equation} We first prove that the corresponding linearized system around the origin is exactly controllable in $(L^2(0,L))^2$ when $h_2(t)=g_2(t)=0$. In this case, the exact controllability property is derived for any $L>0$ with control functions $h_0, g_0\in H^{-\frac{1}{3}}(0,T)$ and $h_1, g_1\in L^2(0,T)$. If we change the position of the controls and consider $h_0(t)=h_2(t)=0$ (resp. $g_0(t)=g_2(t)=0)$ we obtain the result with control functions $g_0, g_2\in H^{-\frac{1}{3}}(0,T)$ and $h_1, g_1\in L^2(0,T)$ if and only if the length $L$ of the spatial domain $(0,L)$ belongs to a countable set. In all cases the regularity of the controls are sharp in time. If only one control act in the boundary condition, $h_0(t)=g_0(t)=h_2(t)=g_2(t)=0$ and $g_1(t)=0$ (resp. $h_1(t)=0$), the linearized system is proved to be exactly controllable for small values of the length $L$ and large time of control $T$. Finally, the nonlinear system is shown to be locally exactly controllable via the contraction mapping principle, if the associated linearized systems are exactly controllable.
△ Less
Submitted 1 February, 2016;
originally announced February 2016.
-
On the well-posedness and asymptotic behavior of the generalized KdV-Burgers equation
Authors:
Fernando Andrés Gallego,
Ademir Fernando Pazoto
Abstract:
In this paper we are concerned with the well-posedness and the exponential stabilization of the generalized Korteweg-de Vries Burgers equation, posed on the whole real line, under the effect of a damping term. Both problems are investigated when the exponent p in the nonlinear term ranges over the interval $[1,5)$. We first prove the global well-posedness in $H^s(R)$, for $0 \leq s \leq 3$ and…
▽ More
In this paper we are concerned with the well-posedness and the exponential stabilization of the generalized Korteweg-de Vries Burgers equation, posed on the whole real line, under the effect of a damping term. Both problems are investigated when the exponent p in the nonlinear term ranges over the interval $[1,5)$. We first prove the global well-posedness in $H^s(R)$, for $0 \leq s \leq 3$ and $1 \leq p < 2$, and in $H^3(R)$, when $p \geq 2$. For $2 \leq p < 5$, we prove the existence of global solutions in the $L^2$-setting. Then, by using multiplier techniques combined with interpolation theory, the exponential stabilization is obtained for a indefinite damping term and $1 \leq p < 2$. Under the effect of a localized damping term the result is obtained when $2 \leq p < 5$. Combining multiplier techniques and compactness arguments it is shown that the problem of exponential decay is reduced to prove the unique continuation property of weak solutions
△ Less
Submitted 27 September, 2015;
originally announced September 2015.
-
Inhomogeneous K-function for germ-grain models
Authors:
M. Ángeles Gallego,
M. Victoria Ibáñez,
Amelia Simó
Abstract:
In this paper, we propose a generalization to germ-grain models of the inhomogeneous K-function of Point Processes. We apply them to a sample of images of peripheral blood smears obtained from patients with Sickle Cell Disease, in order to decide whether the sample belongs to the thin, thick or morphological region.
In this paper, we propose a generalization to germ-grain models of the inhomogeneous K-function of Point Processes. We apply them to a sample of images of peripheral blood smears obtained from patients with Sickle Cell Disease, in order to decide whether the sample belongs to the thin, thick or morphological region.
△ Less
Submitted 31 January, 2014;
originally announced January 2014.
-
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
Authors:
Alexander Gallego,
Nitesh Saxena,
Jonathan Voris
Abstract:
The secure "pairing" of wireless devices based on auxiliary or out-of-band (OOB) communication, such as audio, visual, or tactile channels, is a well-established research direction. However, prior work shows that this approach to pairing can be prone to human errors of different forms that may directly or indirectly translate into man-in-the-middle attacks. To address this problem, we propose a ge…
▽ More
The secure "pairing" of wireless devices based on auxiliary or out-of-band (OOB) communication, such as audio, visual, or tactile channels, is a well-established research direction. However, prior work shows that this approach to pairing can be prone to human errors of different forms that may directly or indirectly translate into man-in-the-middle attacks. To address this problem, we propose a general direction of the use of computer games for pairing. Since games are a popular means of entertainment, our hypothesis is that they may serve as an incentive to users and make the pairing process enjoyable for them, thus improving the usability, as well as the security, of the pairing process. We consider an emerging use case of pairing whereby two different users are involved, each in possession of his or her own device (e.g., Alice and Bob pairing their smartphones for social interactions). We develop "Alice Says," a pairing game based on a popular memory game called Simon (Says), and discuss the underlying design challenges. We also present a preliminary evaluation of Alice Says via a usability study and demonstrate its feasibility in terms of usability and security. Our results indicate that overall Alice Says was deemed as a fun and an enjoyable way to pair devices, confirming our hypothesis. However, contrary to our intuition, the relatively slower speed of Alice Says pairing was found to be a cause of concern and prompts the need for the design of faster pairing games. We put forth several ways in which this issue can be ameliorated. In addition, we also discuss several other security problems which are lacking optimal solutions and suggest ideas on how entertainment can be used to improve the current state of the art solutions that have been developed to address them.
△ Less
Submitted 6 May, 2010; v1 submitted 4 May, 2010;
originally announced May 2010.