-
Tracking Mouse from Incomplete Body-Part Observations and Deep-Learned Deformable-Mouse Model Motion-Track Constraint for Behavior Analysis
Authors:
Olaf Hellwich,
Niek Andresen,
Katharina Hohlbaum,
Marcus N. Boon,
Monika Kwiatkowski,
Simon Matern,
Patrik Reiske,
Henning Sprekeler,
Christa ThöneReineke,
Lars Lewejohann,
Huma Ghani Zada,
Michael Brück,
Soledad Traverso
Abstract:
Tracking mouse body parts in video is often incomplete due to occlusions such that - e.g. - subsequent action and behavior analysis is impeded. In this conceptual work, videos from several perspectives are integrated via global exterior camera orientation; body part positions are estimated by 3D triangulation and bundle adjustment. Consistency of overall 3D track reconstruction is achieved by intr…
▽ More
Tracking mouse body parts in video is often incomplete due to occlusions such that - e.g. - subsequent action and behavior analysis is impeded. In this conceptual work, videos from several perspectives are integrated via global exterior camera orientation; body part positions are estimated by 3D triangulation and bundle adjustment. Consistency of overall 3D track reconstruction is achieved by introduction of a 3D mouse model, deep-learned body part movements, and global motion-track smoothness constraint. The resulting 3D body and body part track estimates are substantially more complete than the original single-frame-based body part detection, therefore, allowing improved animal behavior analysis.
△ Less
Submitted 19 January, 2025;
originally announced January 2025.
-
SoK: Prompt Hacking of Large Language Models
Authors:
Baha Rababah,
Shang,
Wu,
Matthew Kwiatkowski,
Carson Leung,
Cuneyt Gurcan Akcora
Abstract:
The safety and robustness of large language models (LLMs) based applications remain critical challenges in artificial intelligence. Among the key threats to these applications are prompt hacking attacks, which can significantly undermine the security and reliability of LLM-based systems. In this work, we offer a comprehensive and systematic overview of three distinct types of prompt hacking: jailb…
▽ More
The safety and robustness of large language models (LLMs) based applications remain critical challenges in artificial intelligence. Among the key threats to these applications are prompt hacking attacks, which can significantly undermine the security and reliability of LLM-based systems. In this work, we offer a comprehensive and systematic overview of three distinct types of prompt hacking: jailbreaking, leaking, and injection, addressing the nuances that differentiate them despite their overlapping characteristics. To enhance the evaluation of LLM-based applications, we propose a novel framework that categorizes LLM responses into five distinct classes, moving beyond the traditional binary classification. This approach provides more granular insights into the AI's behavior, improving diagnostic precision and enabling more targeted enhancements to the system's safety and robustness.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
ConDL: Detector-Free Dense Image Matching
Authors:
Monika Kwiatkowski,
Simon Matern,
Olaf Hellwich
Abstract:
In this work, we introduce a deep-learning framework designed for estimating dense image correspondences. Our fully convolutional model generates dense feature maps for images, where each pixel is associated with a descriptor that can be matched across multiple images. Unlike previous methods, our model is trained on synthetic data that includes significant distortions, such as perspective changes…
▽ More
In this work, we introduce a deep-learning framework designed for estimating dense image correspondences. Our fully convolutional model generates dense feature maps for images, where each pixel is associated with a descriptor that can be matched across multiple images. Unlike previous methods, our model is trained on synthetic data that includes significant distortions, such as perspective changes, illumination variations, shadows, and specular highlights. Utilizing contrastive learning, our feature maps achieve greater invariance to these distortions, enabling robust matching. Notably, our method eliminates the need for a keypoint detector, setting it apart from many existing image-matching techniques.
△ Less
Submitted 5 August, 2024;
originally announced August 2024.
-
Red-Teaming Segment Anything Model
Authors:
Krzysztof Jankowski,
Bartlomiej Sobieski,
Mateusz Kwiatkowski,
Jakub Szulc,
Michal Janik,
Hubert Baniecki,
Przemyslaw Biecek
Abstract:
Foundation models have emerged as pivotal tools, tackling many complex tasks through pre-training on vast datasets and subsequent fine-tuning for specific applications. The Segment Anything Model is one of the first and most well-known foundation models for computer vision segmentation tasks. This work presents a multi-faceted red-teaming analysis that tests the Segment Anything Model against chal…
▽ More
Foundation models have emerged as pivotal tools, tackling many complex tasks through pre-training on vast datasets and subsequent fine-tuning for specific applications. The Segment Anything Model is one of the first and most well-known foundation models for computer vision segmentation tasks. This work presents a multi-faceted red-teaming analysis that tests the Segment Anything Model against challenging tasks: (1) We analyze the impact of style transfer on segmentation masks, demonstrating that applying adverse weather conditions and raindrops to dashboard images of city roads significantly distorts generated masks. (2) We focus on assessing whether the model can be used for attacks on privacy, such as recognizing celebrities' faces, and show that the model possesses some undesired knowledge in this task. (3) Finally, we check how robust the model is to adversarial attacks on segmentation masks under text prompts. We not only show the effectiveness of popular white-box attacks and resistance to black-box attacks but also introduce a novel approach - Focused Iterative Gradient Attack (FIGA) that combines white-box approaches to construct an efficient attack resulting in a smaller number of modified pixels. All of our testing methods and analyses indicate a need for enhanced safety measures in foundation models for image segmentation.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Maximal cliques in the graph of $5$-ary simplex codes of dimension two
Authors:
Mariusz Kwiatkowski,
Andrzej Matraś,
Mark Pankov,
Adam Tyc
Abstract:
We consider the induced subgraph of the corresponding Grassmann graph formed by $q$-ary simplex codes of dimension $2$, $q\ge 5$. This graph contains precisely two types of maximal cliques. If $q=5$, then for any two maximal cliques of the same type there is a monomial linear automorphism transferring one of them to the other. Examples concerning the cases $q=7,11$ finish the note.
We consider the induced subgraph of the corresponding Grassmann graph formed by $q$-ary simplex codes of dimension $2$, $q\ge 5$. This graph contains precisely two types of maximal cliques. If $q=5$, then for any two maximal cliques of the same type there is a monomial linear automorphism transferring one of them to the other. Examples concerning the cases $q=7,11$ finish the note.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Decomposer: Semi-supervised Learning of Image Restoration and Image Decomposition
Authors:
Boris Meinardus,
Mariusz Trzeciakiewicz,
Tim Herzig,
Monika Kwiatkowski,
Simon Matern,
Olaf Hellwich
Abstract:
We present Decomposer, a semi-supervised reconstruction model that decomposes distorted image sequences into their fundamental building blocks - the original image and the applied augmentations, i.e., shadow, light, and occlusions. To solve this problem, we use the SIDAR dataset that provides a large number of distorted image sequences: each sequence contains images with shadows, lighting, and occ…
▽ More
We present Decomposer, a semi-supervised reconstruction model that decomposes distorted image sequences into their fundamental building blocks - the original image and the applied augmentations, i.e., shadow, light, and occlusions. To solve this problem, we use the SIDAR dataset that provides a large number of distorted image sequences: each sequence contains images with shadows, lighting, and occlusions applied to an undistorted version. Each distortion changes the original signal in different ways, e.g., additive or multiplicative noise. We propose a transformer-based model to explicitly learn this decomposition. The sequential model uses 3D Swin-Transformers for spatio-temporal encoding and 3D U-Nets as prediction heads for individual parts of the decomposition. We demonstrate that by separately pre-training our model on weakly supervised pseudo labels, we can steer our model to optimize for our ambiguous problem definition and learn to differentiate between the different image distortions.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
DIAR: Deep Image Alignment and Reconstruction using Swin Transformers
Authors:
Monika Kwiatkowski,
Simon Matern,
Olaf Hellwich
Abstract:
When taking images of some occluded content, one is often faced with the problem that every individual image frame contains unwanted artifacts, but a collection of images contains all relevant information if properly aligned and aggregated. In this paper, we attempt to build a deep learning pipeline that simultaneously aligns a sequence of distorted images and reconstructs them. We create a datase…
▽ More
When taking images of some occluded content, one is often faced with the problem that every individual image frame contains unwanted artifacts, but a collection of images contains all relevant information if properly aligned and aggregated. In this paper, we attempt to build a deep learning pipeline that simultaneously aligns a sequence of distorted images and reconstructs them. We create a dataset that contains images with image distortions, such as lighting, specularities, shadows, and occlusion. We create perspective distortions with corresponding ground-truth homographies as labels. We use our dataset to train Swin transformer models to analyze sequential image data. The attention maps enable the model to detect relevant image content and differentiate it from outliers and artifacts. We further explore using neural feature maps as alternatives to classical key point detectors. The feature maps of trained convolutional layers provide dense image descriptors that can be used to find point correspondences between images. We utilize this to compute coarse image alignments and explore its limitations.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
On maximal cliques in the graph of simplex codes
Authors:
Mariusz Kwiatkowski,
Mark Pankov
Abstract:
The induced subgraph of the corresponding Grassmann graph formed by simplex codes is considered. We show that this graph, as the Grassmann graph, contains two types of maximal cliques. For any two cliques of the first type there is a monomial linear automorphism transferring one of them to the other. Cliques of the second type are more complicated and can contain different numbers of elements.
The induced subgraph of the corresponding Grassmann graph formed by simplex codes is considered. We show that this graph, as the Grassmann graph, contains two types of maximal cliques. For any two cliques of the first type there is a monomial linear automorphism transferring one of them to the other. Cliques of the second type are more complicated and can contain different numbers of elements.
△ Less
Submitted 29 September, 2023; v1 submitted 11 August, 2023;
originally announced August 2023.
-
SIDAR: Synthetic Image Dataset for Alignment & Restoration
Authors:
Monika Kwiatkowski,
Simon Matern,
Olaf Hellwich
Abstract:
Image alignment and image restoration are classical computer vision tasks. However, there is still a lack of datasets that provide enough data to train and evaluate end-to-end deep learning models. Obtaining ground-truth data for image alignment requires sophisticated structure-from-motion methods or optical flow systems that often do not provide enough data variance, i.e., typically providing a h…
▽ More
Image alignment and image restoration are classical computer vision tasks. However, there is still a lack of datasets that provide enough data to train and evaluate end-to-end deep learning models. Obtaining ground-truth data for image alignment requires sophisticated structure-from-motion methods or optical flow systems that often do not provide enough data variance, i.e., typically providing a high number of image correspondences, while only introducing few changes of scenery within the underlying image sequences. Alternative approaches utilize random perspective distortions on existing image data. However, this only provides trivial distortions, lacking the complexity and variance of real-world scenarios. Instead, our proposed data augmentation helps to overcome the issue of data scarcity by using 3D rendering: images are added as textures onto a plane, then varying lighting conditions, shadows, and occlusions are added to the scene. The scene is rendered from multiple viewpoints, generating perspective distortions more consistent with real-world scenarios, with homographies closely resembling those of camera projections rather than randomized homographies. For each scene, we provide a sequence of distorted images with corresponding occlusion masks, homographies, and ground-truth labels. The resulting dataset can serve as a training and evaluation set for a multitude of tasks involving image alignment and artifact removal, such as deep homography estimation, dense image matching, 2D bundle adjustment, inpainting, shadow removal, denoising, content retrieval, and background subtraction. Our data generation pipeline is customizable and can be applied to any existing dataset, serving as a data augmentation to further improve the feature learning of any existing method.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
Content-Based Landmark Retrieval Combining Global and Local Features using Siamese Neural Networks
Authors:
Tianyi Hu,
Monika Kwiatkowski,
Simon Matern,
Olaf Hellwich
Abstract:
In this work, we present a method for landmark retrieval that utilizes global and local features. A Siamese network is used for global feature extraction and metric learning, which gives an initial ranking of the landmark search. We utilize the extracted feature maps from the Siamese architecture as local descriptors, the search results are then further refined using a cosine similarity between lo…
▽ More
In this work, we present a method for landmark retrieval that utilizes global and local features. A Siamese network is used for global feature extraction and metric learning, which gives an initial ranking of the landmark search. We utilize the extracted feature maps from the Siamese architecture as local descriptors, the search results are then further refined using a cosine similarity between local descriptors. We conduct a deeper analysis of the Google Landmark Dataset, which is used for evaluation, and augment the dataset to handle various intra-class variances. Furthermore, we conduct several experiments to compare the effects of transfer learning and metric learning, as well as experiments using other local descriptors. We show that a re-ranking using local features can improve the search results. We believe that the proposed local feature extraction using cosine similarity is a simple approach that can be extended to many other retrieval tasks.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
Image-based Detection of Surface Defects in Concrete during Construction
Authors:
Dominik Kuhnke,
Monika Kwiatkowski,
Olaf Hellwich
Abstract:
Defects increase the cost and duration of construction projects as they require significant inspection and documentation efforts. Automating defect detection could significantly reduce these efforts. This work focuses on detecting honeycombs, a substantial defect in concrete structures that may affect structural integrity. We compared honeycomb images scraped from the web with images obtained from…
▽ More
Defects increase the cost and duration of construction projects as they require significant inspection and documentation efforts. Automating defect detection could significantly reduce these efforts. This work focuses on detecting honeycombs, a substantial defect in concrete structures that may affect structural integrity. We compared honeycomb images scraped from the web with images obtained from real construction inspections. We found that web images do not capture the complete variance found in real-case scenarios and that there is still a lack of data in this domain. Our dataset is therefore freely available for further research. A Mask R-CNN and EfficientNet-B0 were trained for honeycomb detection. The Mask R-CNN model allows detecting honeycombs based on instance segmentation, whereas the EfficientNet-B0 model allows a patch-based classification. Our experiments demonstrate that both approaches are suitable for solving and automating honeycomb detection. In the future, this solution can be incorporated into defect documentation systems.
△ Less
Submitted 6 December, 2022; v1 submitted 3 August, 2022;
originally announced August 2022.
-
On the Grassmann Graph of Linear Codes
Authors:
Ilaria Cardinali,
Luca Giuzzi,
Mariusz Kwiatkowski
Abstract:
Let $Γ(n,k)$ be the Grassmann graph formed by the $k$-dimensional subspaces of a vector space of dimension $n$ over a field $\mathbb F$ and, for $t\in \mathbb{N}\setminus \{0\}$, let $Δ_t(n,k)$ be the subgraph of $Γ(n,k)$ formed by the set of linear $[n,k]$-codes having minimum dual distance at least $t+1$. We show that if $|{\mathbb F}|\geq{n\choose t}$ then $Δ_t(n,k)$ is connected and it is isom…
▽ More
Let $Γ(n,k)$ be the Grassmann graph formed by the $k$-dimensional subspaces of a vector space of dimension $n$ over a field $\mathbb F$ and, for $t\in \mathbb{N}\setminus \{0\}$, let $Δ_t(n,k)$ be the subgraph of $Γ(n,k)$ formed by the set of linear $[n,k]$-codes having minimum dual distance at least $t+1$. We show that if $|{\mathbb F}|\geq{n\choose t}$ then $Δ_t(n,k)$ is connected and it is isometrically embedded in $Γ(n,k)$. This generalizes some results of [M. Kwiatkowski, M. Pankov, "On the distance between linear codes", Finite Fields Appl. 39 (2016), 251--263] and [M. Kwiatkowski, M. Pankov, A. Pasini, "The graphs of projective codes" Finite Fields Appl. 54 (2018), 15--29].
△ Less
Submitted 2 July, 2021; v1 submitted 9 May, 2020;
originally announced May 2020.
-
Graphs related to $2$-dimensional simplex codes
Authors:
Mariusz Kwiatkowski,
Mark Pankov
Abstract:
We give a complete description of the distance relation on the graph of $4$-ary simplex codes of dimension $2$. This is a connected graph of diameter $3$. For every vertex we determine the sets of all vertices at distance $i\in\{1,2,3\}$ and describe their symmetries.
We give a complete description of the distance relation on the graph of $4$-ary simplex codes of dimension $2$. This is a connected graph of diameter $3$. For every vertex we determine the sets of all vertices at distance $i\in\{1,2,3\}$ and describe their symmetries.
△ Less
Submitted 10 August, 2019;
originally announced August 2019.
-
Exactly solvable model of gene expression in proliferating bacterial cell population with stochastic protein bursts and protein partitioning
Authors:
Jakub Jędrak,
Maciej Kwiatkowski,
Anna Ochab-Marcinek
Abstract:
Many of the existing stochastic models of gene expression contain the first-order decay reaction term that may describe active protein degradation or dilution. If the model variable is interpreted as the molecule number, and not concentration, the decay term may also approximate the loss of protein molecules due to cell division as a continuous degradation process. The seminal model of that kind l…
▽ More
Many of the existing stochastic models of gene expression contain the first-order decay reaction term that may describe active protein degradation or dilution. If the model variable is interpreted as the molecule number, and not concentration, the decay term may also approximate the loss of protein molecules due to cell division as a continuous degradation process. The seminal model of that kind leads to gamma distributions of protein levels, whose parameters are defined by the mean frequency of protein bursts and mean burst size. However, such models (whether interpreted in terms of molecule numbers or concentrations) do not correctly account for the noise due to protein partitioning between daughter cells.
We present an exactly solvable stochastic model of gene expression in cells dividing at random times, where we assume description in terms of molecule numbers with a constant mean protein burst size. The model is based on a population balance equation supplemented with protein production in random bursts.
If protein molecules are partitioned equally between daughter cells, we obtain at steady state the analytical expressions for probability distributions similar in shape to gamma distribution, yet with quite different values of mean burst size and mean burst frequency than would result from fitting of the classical continuous-decay model to these distributions. For random partitioning of protein molecules between daughter cells, we obtain the moment equations for the protein number distribution and thus the analytical formulas for the squared coefficient of variation.
△ Less
Submitted 17 April, 2019;
originally announced April 2019.
-
Hammerhead, an ultrahigh resolution ePix camera for wavelength-dispersive spectrometers
Authors:
G. Blaj,
D. Bhogadi,
C. -E. Chang,
D. Doering,
C. J. Kenney,
T. Kroll,
M. Kwiatkowski,
J. Segal,
D. Sokaras,
G. Haller
Abstract:
Wavelength-dispersive spectrometers (WDS) are often used in synchrotron and FEL applications where high energy resolution (in the order of eV) is important. Increasing WDS energy resolution requires increasing spatial resolution of the detectors in the dispersion direction. The common approaches with strip detectors or small pixel detectors are not ideal. We present a novel approach, with a sensor…
▽ More
Wavelength-dispersive spectrometers (WDS) are often used in synchrotron and FEL applications where high energy resolution (in the order of eV) is important. Increasing WDS energy resolution requires increasing spatial resolution of the detectors in the dispersion direction. The common approaches with strip detectors or small pixel detectors are not ideal. We present a novel approach, with a sensor using rectangular pixels with a high aspect ratio (between strips and pixels, further called "strixels"), and strixel redistribution to match the square pixel arrays of typical ASICs while avoiding the considerable effort of redesigning ASICs. This results in a sensor area of 17.4 mm x 77 mm, with a fine pitch of 25 $μ$m in the horizontal direction resulting in 3072 columns and 176 rows. The sensors use ePix100 readout ASICs, leveraging their low noise (43 e$^-$, or 180 eV rms). We present results obtained with a Hammerhead ePix100 camera, showing that the small pitch (25 $μ$m) in the dispersion direction maximizes performance for both high and low photon occupancies, resulting in optimal WDS energy resolution. The low noise level at high photon occupancy allows precise photon counting, while at low occupancy, both the energy and the subpixel position can be reconstructed for every photon, allowing an ultrahigh resolution (in the order of 1 $μ$m) in the dispersion direction and rejection of scattered beam and harmonics. Using strixel sensors with redistribution and flip-chip bonding to standard ePix readout ASICs results in ultrahigh position resolution ($\sim$1 $μ$m) and low noise in WDS applications, leveraging the advantages of hybrid pixel detectors (high production yield, good availability, relatively inexpensive) while minimizing development complexity through sharing the ASIC, hardware, software and DAQ development with existing versions of ePix cameras.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
Performance of ePix10K, a high dynamic range, gain auto-ranging pixel detector for FELs
Authors:
G. Blaj,
A. Dragone,
C. J. Kenney,
F. Abu-Nimeh,
P. Caragiulo,
D. Doering,
M. Kwiatkowski,
J. Pines,
M. Weaver,
S. Boutet,
G. Carini,
C. -E. Chang,
P. Hart,
J. Hasi,
M. Hayes,
R. Herbst,
J. Koglin,
K. Nakahara,
J. Segal,
G. Haller
Abstract:
ePix10K is a hybrid pixel detector developed at SLAC for demanding free-electron laser (FEL) applications, providing an ultrahigh dynamic range (245 eV to 88 MeV) through gain auto-ranging. It has three gain modes (high, medium and low) and two auto-ranging modes (high-to-low and medium-to-low). The first ePix10K cameras are built around modules consisting of a sensor flip-chip bonded to 4 ASICs,…
▽ More
ePix10K is a hybrid pixel detector developed at SLAC for demanding free-electron laser (FEL) applications, providing an ultrahigh dynamic range (245 eV to 88 MeV) through gain auto-ranging. It has three gain modes (high, medium and low) and two auto-ranging modes (high-to-low and medium-to-low). The first ePix10K cameras are built around modules consisting of a sensor flip-chip bonded to 4 ASICs, resulting in 352x384 pixels of 100 $μ$m x 100 $μ$m each. We present results from extensive testing of three ePix10K cameras with FEL beams at LCLS, resulting in a measured noise floor of 245 eV rms, or 67 e$^-$ equivalent noise charge (ENC), and a range of 11000 photons at 8 keV. We demonstrate the linearity of the response in various gain combinations: fixed high, fixed medium, fixed low, auto-ranging high to low, and auto-ranging medium-to-low, while maintaining a low noise (well within the counting statistics), a very low cross-talk, perfect saturation response at fluxes up to 900 times the maximum range, and acquisition rates of up to 480 Hz. Finally, we present examples of high dynamic range x-ray imaging spanning more than 4 orders of magnitude dynamic range (from a single photon to 11000 photons/pixel/pulse at 8 keV). Achieving this high performance with only one auto-ranging switch leads to relatively simple calibration and reconstruction procedures. The low noise levels allow usage with long integration times at non-FEL sources. ePix10K cameras leverage the advantages of hybrid pixel detectors with high production yield and good availability, minimize development complexity through sharing the hardware, software and DAQ development with all other versions of ePix cameras, while providing an upgrade path to 5 kHz, 25 kHz and 100 kHz in three steps over the next few years, matching the LCLS-II requirements.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
Triangulations with homogeneous zigzags
Authors:
Mariusz Kwiatkowski,
Mark Pankov,
Adam Tyc
Abstract:
We investigate zigzags in triangulations of connected closed $2$-dimensional surfaces and show that there is a one-to-one correspondence between triangulations with homogeneous zigzags and closed $2$-cell embeddings of directed Eulerian graphs in surfaces. A triangulation is called $z$-knotted if it has a single zigzag. We construct a family of tree structured $z$-knotted spherical triangulations…
▽ More
We investigate zigzags in triangulations of connected closed $2$-dimensional surfaces and show that there is a one-to-one correspondence between triangulations with homogeneous zigzags and closed $2$-cell embeddings of directed Eulerian graphs in surfaces. A triangulation is called $z$-knotted if it has a single zigzag. We construct a family of tree structured $z$-knotted spherical triangulations whose zigzags are homogeneous.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
The graphs of projective codes
Authors:
Mariusz Kwiatkowski,
Mark Pankov,
Antonio Pasini
Abstract:
Consider the Grassmann graph formed by $k$-dimensional subspaces of an $n$-dimensional vector space over the field of $q$ elements ($1<k<n-1$) and denote by $Π(n,k)_q$ the restriction of this graph to the set of projective $[n,k]_q$ codes. In the case when $q\ge \binom{n}{2}$, we show that the graph $Π(n,k)_q$ is connected, its diameter is equal to the diameter of the Grassmann graph and the dista…
▽ More
Consider the Grassmann graph formed by $k$-dimensional subspaces of an $n$-dimensional vector space over the field of $q$ elements ($1<k<n-1$) and denote by $Π(n,k)_q$ the restriction of this graph to the set of projective $[n,k]_q$ codes. In the case when $q\ge \binom{n}{2}$, we show that the graph $Π(n,k)_q$ is connected, its diameter is equal to the diameter of the Grassmann graph and the distance between any two vertices coincides with the distance between these vertices in the Grassmann graph. Also, we give some observations concerning the graphs of simplex codes. For example, binary simplex codes of dimension $3$ are precisely maximal singular subspaces of a non-degenerate quadratic form.
△ Less
Submitted 29 December, 2017;
originally announced December 2017.
-
Risk and Machine Protection for Stored Magnetic and Beam Energies
Authors:
B. Todd,
M. Kwiatkowski
Abstract:
Risk is a fundamental consideration when designing electronic systems. For most systems a view of risk can assist in setting design objectives, whereas both a qualitative and quantitative understanding of risk is mandatory when considering protection systems. This paper gives an overview of the risks due to stored magnetic and beam energies in high-energy physics, and shows how a risk-based approa…
▽ More
Risk is a fundamental consideration when designing electronic systems. For most systems a view of risk can assist in setting design objectives, whereas both a qualitative and quantitative understanding of risk is mandatory when considering protection systems. This paper gives an overview of the risks due to stored magnetic and beam energies in high-energy physics, and shows how a risk-based approach can be used to design new systems mitigating these risks, using a lifecycle inspired by IEC 61508. Designing new systems in high-energy physics can be challenging as new and novel techniques are difficult to quantify and predict. This paper shows how the same lifecycle approach can be used in reverse to analyse existing systems, following their operation and first experiences.
△ Less
Submitted 6 July, 2016;
originally announced July 2016.
-
Chow's theorem for linear codes
Authors:
Mariusz Kwiatkowski,
Mark Pankov
Abstract:
Let $Γ_{k}(V)$ be the Grassmann graph formed by $k$-dimensional subspaces of an $n$-dimensional vector space over the finite field ${\mathbb F}_{q}$ consisting of $q$ elements and $1<k<n-1$. Denote by $Γ(n,k)_q$ the restriction of the Grassmann graph to the set of all non-degenerate linear $[n,k]_q$ codes. We describe maximal cliques of the graph $Γ(n,k)_q$ and show that every automorphism of this…
▽ More
Let $Γ_{k}(V)$ be the Grassmann graph formed by $k$-dimensional subspaces of an $n$-dimensional vector space over the finite field ${\mathbb F}_{q}$ consisting of $q$ elements and $1<k<n-1$. Denote by $Γ(n,k)_q$ the restriction of the Grassmann graph to the set of all non-degenerate linear $[n,k]_q$ codes. We describe maximal cliques of the graph $Γ(n,k)_q$ and show that every automorphism of this graph is induced by a monomial semilinear automorphism of $V$.
△ Less
Submitted 19 March, 2016;
originally announced March 2016.
-
On the distance between linear codes
Authors:
Mariusz Kwiatkowski,
Mark Pankov
Abstract:
Let $V$ be an $n$-dimensional vector space over the finite field consisting of $q$ elements and let $Γ_{k}(V)$ be the Grassmann graph formed by $k$-dimensional subspaces of $V$, $1<k<n-1$. Denote by $Γ(n,k)_{q}$ the restriction of $Γ_{k}(V)$ to the set of all non-degenerate linear $[n,k]_{q}$ codes. We show that for any two codes the distance in $Γ(n,k)_{q}$ coincides with the distance in…
▽ More
Let $V$ be an $n$-dimensional vector space over the finite field consisting of $q$ elements and let $Γ_{k}(V)$ be the Grassmann graph formed by $k$-dimensional subspaces of $V$, $1<k<n-1$. Denote by $Γ(n,k)_{q}$ the restriction of $Γ_{k}(V)$ to the set of all non-degenerate linear $[n,k]_{q}$ codes. We show that for any two codes the distance in $Γ(n,k)_{q}$ coincides with the distance in $Γ_{k}(V)$ only in the case when $n<(q+1)^2+k-2$, i.e. if $n$ is sufficiently large then for some pairs of codes the distances in the graphs $Γ_{k}(V)$ and $Γ(n,k)_{q}$ are distinct. We describe one class of such pairs.
△ Less
Submitted 31 May, 2015;
originally announced June 2015.
-
Isometric embeddings of polar Grassmannians and metric characterizations of their apartments
Authors:
Mariusz Kwiatkowski,
Mark Pankov
Abstract:
We describe isometric embeddings of polar Grassmann graphs formed by non-maximal singular subspaces. In almost all cases, they are induced by collinearity preserving injections of polar spaces. As a simple consequence of this result, we get a metric characterization of apartments in polar Grassmannians.
We describe isometric embeddings of polar Grassmann graphs formed by non-maximal singular subspaces. In almost all cases, they are induced by collinearity preserving injections of polar spaces. As a simple consequence of this result, we get a metric characterization of apartments in polar Grassmannians.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
Opposite relation on dual polar spaces and half-spin Grassmann spaces
Authors:
Mariusz Kwiatkowski,
Mark Pankov
Abstract:
We characterize the collinearity (adjacency) relation of half-spin Grassmann spaces in terms of the relation to be opposite in the corresponding collinearity graphs. Also we show that this characterization does not hold for dual polar spaces.
We characterize the collinearity (adjacency) relation of half-spin Grassmann spaces in terms of the relation to be opposite in the corresponding collinearity graphs. Also we show that this characterization does not hold for dual polar spaces.
△ Less
Submitted 15 June, 2008; v1 submitted 7 March, 2008;
originally announced March 2008.