-
Cooperation risk and Nash equilibrium: quantitative description for realistic players
Authors:
G. M. Nakamura,
G. S. Contesini,
A. S. Martinez
Abstract:
The emergence of cooperation figures among the main goal of game theory in competitive-cooperative environments. Potential games have long been hinted as viable alternatives to study realistic player behavior. Here, we expand the potential games approach by taking into account the inherent risks of cooperation. We show the Public Goods game reduce to a Hamiltonian with one-body operators, with the…
▽ More
The emergence of cooperation figures among the main goal of game theory in competitive-cooperative environments. Potential games have long been hinted as viable alternatives to study realistic player behavior. Here, we expand the potential games approach by taking into account the inherent risks of cooperation. We show the Public Goods game reduce to a Hamiltonian with one-body operators, with the correct Nash Equilibrium as the ground state. The inclusion of punishments to the Public Goods game reduces the cooperation risk, creating two-body interaction with a rich phase diagram, where phase transitions segregates the cooperative from competitive regimes.
△ Less
Submitted 19 January, 2018;
originally announced January 2018.
-
Electromagnetic energy and negative asymmetry parameter in coated magneto-optical cylinders: Applications to tunable light transport in disordered systems
Authors:
Tiago J. Arruda,
Alexandre S. Martinez,
Felipe A. Pinheiro
Abstract:
We investigate electromagnetic scattering of normally irradiated gyrotropic, magneto-optical core-shell cylinders using Lorenz-Mie theory. A general expression for time-averaged electromagnetic energy inside a coated gyroelectric and gyromagnetic scatterer is derived. Using realistic material parameters for a silica core and InSb shell, we calculate the stored electromagnetic energy and the scatte…
▽ More
We investigate electromagnetic scattering of normally irradiated gyrotropic, magneto-optical core-shell cylinders using Lorenz-Mie theory. A general expression for time-averaged electromagnetic energy inside a coated gyroelectric and gyromagnetic scatterer is derived. Using realistic material parameters for a silica core and InSb shell, we calculate the stored electromagnetic energy and the scattering anisotropy. We show that the application of an external magnetic field along the cylinder axis induces a drastic decrease in electromagnetic absorption in a frequency range in the terahertz, where absorption is maximal in the absence of the magnetic field. We demonstrate not only that the scattering anisotropy can be externally tuned by applying a magnetic field, but also that it reaches negative values in the terahertz range even in the dipolar regime. We also show that this preferential backscattering response results in an anomalous regime of multiple light scattering from a collection of magneto-optical core-shell cylinders, in which the extinction mean free path is longer than the transport mean free path. By additionally calculating the energy-transport velocity and diffusion coefficient, we demonstrate an unprecedented degree of external control of multiple light scattering, which can be achieved by either applying an external magnetic field or varying the temperature.
△ Less
Submitted 17 December, 2017;
originally announced December 2017.
-
Diffusions from Infinity
Authors:
Vincent Bansaye,
Pierre Collet,
Servet Martinez,
Sylvie Méléard,
Jaime San Martin
Abstract:
In this paper we consider diffusions on the half line (0, $\infty$) such that the expectation of the arrival time at the origin is uniformly bounded in the initial point. This implies that there is a well defined diffusion process starting from infinity, which takes finite values at positive times. We study the behaviour of hitting times of large barriers and in a dual way, the behaviour of the pr…
▽ More
In this paper we consider diffusions on the half line (0, $\infty$) such that the expectation of the arrival time at the origin is uniformly bounded in the initial point. This implies that there is a well defined diffusion process starting from infinity, which takes finite values at positive times. We study the behaviour of hitting times of large barriers and in a dual way, the behaviour of the process starting at infinity for small time. In particular we prove that the process coming down from infinity is in small time governed by a specific deterministic function. Suitably normalized fluctuations of the hitting times are asymptotically Gaussian. We also derive the tail of the distribution of the hitting time of the origin and a Yaglom limit for the diffusion starting from infinity. We finally prove that the distribution of this process killed at the origin is absolutely continuous with respect to the speed measure. The density is expressed in terms of the eigenvalues and eigenfunctions of the generator of the killed diffusion.
△ Less
Submitted 23 November, 2017;
originally announced November 2017.
-
A Note on the Quasi-Stationary Distribution of the Shiryaev Martingale on the Positive Half-Line
Authors:
Aleksey S. Polunchenko,
Servet Martinez,
Jaime San Martin
Abstract:
We obtain a closed-form formula for the quasi-stationary distribution of the classical Shiryaev martingale diffusion considered on the positive half-line $[A,+\infty)$ with $A>0$ fixed; the state space's left endpoint is assumed to be the killing boundary. The formula is obtained analytically as the solution of the appropriate singular Sturm-Liouville problem; the latter was first considered in Se…
▽ More
We obtain a closed-form formula for the quasi-stationary distribution of the classical Shiryaev martingale diffusion considered on the positive half-line $[A,+\infty)$ with $A>0$ fixed; the state space's left endpoint is assumed to be the killing boundary. The formula is obtained analytically as the solution of the appropriate singular Sturm-Liouville problem; the latter was first considered in Section 7.8.2 of Collet et al. (2013), but has heretofore remained unsolved.
△ Less
Submitted 14 November, 2017;
originally announced November 2017.
-
Maximizing Algebraic Connectivity of Constrained Graphs in Adversarial Environments
Authors:
Tor Anderson,
Chin-Yao Chang,
Sonia Martinez
Abstract:
This paper aims to maximize algebraic connectivity of networks via topology design under the presence of constraints and an adversary. We are concerned with three problems. First, we formulate the concave maximization topology design problem of adding edges to an initial graph, which introduces a nonconvex binary decision variable, in addition to subjugation to general convex constraints on the fe…
▽ More
This paper aims to maximize algebraic connectivity of networks via topology design under the presence of constraints and an adversary. We are concerned with three problems. First, we formulate the concave maximization topology design problem of adding edges to an initial graph, which introduces a nonconvex binary decision variable, in addition to subjugation to general convex constraints on the feasible edge set. Unlike previous methods, our method is justifiably not greedy and capable of accommodating these additional constraints. We also study a scenario in which a coordinator must selectively protect edges of the network from a chance of failure due to a physical disturbance or adversarial attack. The coordinator needs to strategically respond to the adversary's action without presupposed knowledge of the adversary's feasible attack actions. We propose three heuristic algorithms for the coordinator to accomplish the objective and identify worst-case preventive solutions. Each algorithm is shown to be effective in simulation and we provide some discussion on their compared performance.
△ Less
Submitted 11 November, 2017;
originally announced November 2017.
-
Virtual-Voltage Partition-Based Approach to Optimal Transmission Switching
Authors:
Chin-Yao Chang,
Sonia Martinez,
Jorge Cortes
Abstract:
This paper deals with optimal transmission switching (OTS) problems involving discrete binary decisions about network topology and non-convex power flow constraints. We adopt a semidefinite programming formulation for the OPF problem which, however, remains nonconvex due to the presence of discrete variables and bilinear products between the decision variables. To tackle the latter, we introduce a…
▽ More
This paper deals with optimal transmission switching (OTS) problems involving discrete binary decisions about network topology and non-convex power flow constraints. We adopt a semidefinite programming formulation for the OPF problem which, however, remains nonconvex due to the presence of discrete variables and bilinear products between the decision variables. To tackle the latter, we introduce a novel physically-inspired, virtual-voltage approximation that leads to provable lower and upper bounds on the solution of the original problem. To deal with the exponential complexity caused by the discrete variables, we introduce a graph partition-based algorithm which breaks the problem into several parallel mixed-integer subproblems of smaller size. Simulations demonstrate the high degree of accuracy and affordable computational requirements of our approach.
△ Less
Submitted 23 July, 2018; v1 submitted 9 October, 2017;
originally announced October 2017.
-
Scheduled-Asynchronous Distributed Algorithm for Optimal Power Flow
Authors:
Chin-Yao Chang,
Jorge Cortes,
Sonia Martinez
Abstract:
Optimal power flow (OPF) problems are non-convex and large-scale optimization problems with important applications in power networks. This paper proposes the scheduled-asynchronous algorithm to solve a distributed semidefinite programming (SDP) formulation of the OPF problem. In this formulation, every agent seeks to solve a local optimization with its own cost function, physical constraints on it…
▽ More
Optimal power flow (OPF) problems are non-convex and large-scale optimization problems with important applications in power networks. This paper proposes the scheduled-asynchronous algorithm to solve a distributed semidefinite programming (SDP) formulation of the OPF problem. In this formulation, every agent seeks to solve a local optimization with its own cost function, physical constraints on its nodal power injection, voltage, and power flow of the lines it is connected to, and decision constraints on variables shared with neighbors to ensure consistency of the obtained solution. In the scheduled-asynchronous algorithm, every pair of connected nodes in the electrical network update their local variables in an alternating fashion. This strategy is asynchronous, in the sense that no clock synchronization is required, and relies on an orientation of the electrical network that prescribes the precise ordering of node updates. We establish the asymptotic convergence properties to the primal-dual optimizer when the orientation is acyclic. Given the dependence of the convergence rate on the network orientation, we also develop a distributed graph coloring algorithm that finds an orientation with diameter at most five for electrical networks with geometric degree distribution. Simulations illustrate our results on various IEEE bus test cases.
△ Less
Submitted 8 October, 2017;
originally announced October 2017.
-
Identification of critical nodes in large-scale spatial networks
Authors:
Vishaal Krishnan,
Sonia Martínez
Abstract:
The notion of network connectivity is used to characterize the robustness and failure tolerance of networks, with high connectivity being a desirable feature. In this paper, we develop a novel approach to the problem of identifying critical nodes in large-scale networks, with algebraic connectivity (the second smallest eigenvalue of the graph Laplacian) as the chosen metric. Employing a graph-embe…
▽ More
The notion of network connectivity is used to characterize the robustness and failure tolerance of networks, with high connectivity being a desirable feature. In this paper, we develop a novel approach to the problem of identifying critical nodes in large-scale networks, with algebraic connectivity (the second smallest eigenvalue of the graph Laplacian) as the chosen metric. Employing a graph-embedding technique, we reduce the class of considered weight-balanced graphs to spatial networks with uniformly distributed nodes and nearest-neighbors communication topologies. Through a continuum approximation, we consider the Laplace operator on a manifold (with the Neumann boundary condition) as the limiting case of the graph Laplacian. We then reduce the critical node set identification problem to that of finding a ball of fixed radius, whose removal minimizes the second (Neumann) eigenvalue of the Laplace operator on the residual domain. This leads us to consider two functional and nested optimization problems. Resorting to the min-max theorem, we first treat the problem of determining the second smallest eigenvalue for a fixed domain by minimizing an energy functional. We then obtain a projected gradient flow that converges to the set of points satisfying the KKT conditions and prove that the only locally asymptotically stable critical point is the second eigenfunction of the Laplace operator. Building on these results, we consider the critical ball identification problem and construct a dynamics to converge asymptotically to these points. Finally, we provide a characterization of the location of critical nodes (for infinitesimally-small balls) as those points which belong to the nodal set of the second eigenfunction of the Laplace operator.
△ Less
Submitted 25 October, 2019; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Electromagnetic energy stored in inhomogeneous scattering systems
Authors:
Tiago J. Arruda,
Felipe A. Pinheiro,
Alexandre S. Martinez
Abstract:
We analytically study the time-averaged electromagnetic energy stored inside scatterers containing inclusions of arbitrary shapes. Assuming the low density of inclusions, we derive the expression for the energy-transport velocity through disordered media without relying on the radiative transfer equation. Moreover, this expression is independent of the shape of scatterers. In addition, we obtain a…
▽ More
We analytically study the time-averaged electromagnetic energy stored inside scatterers containing inclusions of arbitrary shapes. Assuming the low density of inclusions, we derive the expression for the energy-transport velocity through disordered media without relying on the radiative transfer equation. Moreover, this expression is independent of the shape of scatterers. In addition, we obtain a relation between the dwell and absorption times associated with inclusions by considering the relationship between internal energy and absorption cross-section. An approximation for the electromagnetic energy stored inside a disordered medium in terms of the transport mean free path and the packing fraction is also derived. This expression suggests that the enhanced electromagnetic energy within the host medium is achieved for inclusions exhibiting negative scattering asymmetry parameters. As a result, disordered media with enhanced backscattering is expected to exhibit large quality factors.
△ Less
Submitted 28 September, 2017;
originally announced September 2017.
-
Regenerative processes for Poisson zero polytopes
Authors:
Servet Martínez,
Werner Nagel
Abstract:
Let $(M_t: t > 0)$ be a Markov process of tessellations of ${\mathbb R}^\ell$ and $({\cal C}_t:\, t > 0)$ the process of their zero cells (zero polytopes) which has the same distribution as the corresponding process for Poisson hyperplane tessellations. Let $a>1$. Here we describe the stationary zero cell process $(a^t {\cal C}_{a^t}:\, t\in {\mathbb R})$ in terms of some regenerative structure an…
▽ More
Let $(M_t: t > 0)$ be a Markov process of tessellations of ${\mathbb R}^\ell$ and $({\cal C}_t:\, t > 0)$ the process of their zero cells (zero polytopes) which has the same distribution as the corresponding process for Poisson hyperplane tessellations. Let $a>1$. Here we describe the stationary zero cell process $(a^t {\cal C}_{a^t}:\, t\in {\mathbb R})$ in terms of some regenerative structure and we prove that it is a Bernoulli flow. An important application are the STIT tessellation processes.
△ Less
Submitted 29 August, 2017;
originally announced August 2017.
-
Distributed Control for Spatial Self-Organization of Multi-Agent Swarms
Authors:
Vishaal Krishnan,
Sonia Martínez
Abstract:
In this work, we design distributed control laws for spatial self-organization of multi-agent swarms in 1D and 2D spatial domains. The objective is to achieve a desired density distribution over a simply-connected spatial domain. Since individual agents in a swarm are not themselves of interest and we are concerned only with the macroscopic objective, we view the network of agents in the swarm as…
▽ More
In this work, we design distributed control laws for spatial self-organization of multi-agent swarms in 1D and 2D spatial domains. The objective is to achieve a desired density distribution over a simply-connected spatial domain. Since individual agents in a swarm are not themselves of interest and we are concerned only with the macroscopic objective, we view the network of agents in the swarm as a discrete approximation of a continuous medium and design control laws to shape the density distribution of the continuous medium. The key feature of this work is that the agents in the swarm do not have access to position information. Each individual agent is capable of measuring the current local density of agents and can communicate with its spatial neighbors. The network of agents implement a Laplacian-based distributed algorithm, which we call pseudo-localization, to localize themselves in a new coordinate frame, and a distributed control law to converge to the desired spatial density distribution. We start by studying self-organization in one-dimension, which is then followed by the two-dimensional case.
△ Less
Submitted 13 August, 2018; v1 submitted 8 May, 2017;
originally announced May 2017.
-
Weight Design of Distributed Approximate Newton Algorithms for Constrained Optimization
Authors:
Tor Anderson,
Chin-Yao Chang,
Sonia Martinez
Abstract:
Motivated by economic dispatch and linearly-constrained resource allocation problems, this paper proposes a novel Distributed Approx-Newton algorithm that approximates the standard Newton optimization method. A main property of this distributed algorithm is that it only requires agents to exchange constant-size communication messages. The convergence of this algorithm is discussed and rigorously a…
▽ More
Motivated by economic dispatch and linearly-constrained resource allocation problems, this paper proposes a novel Distributed Approx-Newton algorithm that approximates the standard Newton optimization method. A main property of this distributed algorithm is that it only requires agents to exchange constant-size communication messages. The convergence of this algorithm is discussed and rigorously analyzed. In addition, we aim to address the problem of designing communication topologies and weightings that are optimal for second-order methods. To this end, we propose an effective approximation which is loosely based on completing the square to address the NP-hard bilinear optimization involved in the design. Simulations demonstrate that our proposed weight design applied to the Distributed Approx-Newton algorithm has a superior convergence property compared to existing weighted and distributed first-order gradient descent methods.
△ Less
Submitted 22 March, 2017;
originally announced March 2017.
-
Biased Roulette Wheel: A Quantitative Trading Strategy Approach
Authors:
Giancarlo Salirrosas Martínez
Abstract:
The purpose of this research paper it is to present a new approach in the framework of a biased roulette wheel. It is used the approach of a quantitative trading strategy, commonly used in quantitative finance, in order to assess the profitability of the strategy in the short term. The tools of backtesting and walk-forward optimization were used to achieve such task. The data has been generated fr…
▽ More
The purpose of this research paper it is to present a new approach in the framework of a biased roulette wheel. It is used the approach of a quantitative trading strategy, commonly used in quantitative finance, in order to assess the profitability of the strategy in the short term. The tools of backtesting and walk-forward optimization were used to achieve such task. The data has been generated from a real European roulette wheel from an on-line casino based in Riga, Latvia. It has been recorded 10,980 spins and sent to the computer through a voice-to-text software for further numerical analysis in R. It has been observed that the probabilities of occurrence of the numbers at the roulette wheel follows an Ornstein-Uhlenbeck process. Moreover, it is shown that a flat betting system against Kelly Criterion was more profitable in the short term.
△ Less
Submitted 30 September, 2016;
originally announced September 2016.
-
Many-body methods in agent-based epidemic models
Authors:
Gilberto M. Nakamura,
Alexandre S. Martinez
Abstract:
The susceptible-infected-susceptible (SIS) agent-based model is usually employed in the investigation of epidemics. The model describes a Markov process for a single communicable disease among susceptible (S) and infected (I) agents. However, the disease spreading forecasting is often restricted to numerical simulations, while analytic formulations lack both general results and perturbative approa…
▽ More
The susceptible-infected-susceptible (SIS) agent-based model is usually employed in the investigation of epidemics. The model describes a Markov process for a single communicable disease among susceptible (S) and infected (I) agents. However, the disease spreading forecasting is often restricted to numerical simulations, while analytic formulations lack both general results and perturbative approaches since they are subjected to asymmetric time generators. Here, we discuss perturbation theory, approximations and application of many-body techniques in epidemic models in the framework for squared norm of probability vector $|P(t)| ^2$, in which asymmetric time generators are replaced by their symmetric counterparts.
△ Less
Submitted 27 September, 2016;
originally announced September 2016.
-
Finite symmetries in agent-based epidemic models
Authors:
Gilberto M. Nakamura,
Ana Carolina P. Monteiro,
George C. Cardoso,
Alexandre S. Martinez
Abstract:
We present an algorithm which explores permutation symmetries to describe the time evolution of agent-based epidemic models. The main idea to improve computation times relies on restricting the stochastic process to one sector of the vector space, labeled by a single permutation eigenvalue. In this scheme, the transition matrix reduces to block diagonal form, enhancing computational performance.
We present an algorithm which explores permutation symmetries to describe the time evolution of agent-based epidemic models. The main idea to improve computation times relies on restricting the stochastic process to one sector of the vector space, labeled by a single permutation eigenvalue. In this scheme, the transition matrix reduces to block diagonal form, enhancing computational performance.
△ Less
Submitted 27 September, 2016; v1 submitted 21 September, 2016;
originally announced September 2016.
-
STIT Tessellations -- Ergodic Limit Theorems and Bounds for the Speed of Convergence
Authors:
Servet Martínez,
Werner Nagel
Abstract:
We consider homogeneous STIT tessellations in the $\ell$-dimensional Euclidean space ${\mathbb R}^\ell$. Based on results for the spatial $β$-mixing coefficient an upper bound for the variance of additive functionals of tessellations is derived, using results by Yoshihara and Heinrich. Moreover, ergodic theorems are applied to subadditive functionals.
We consider homogeneous STIT tessellations in the $\ell$-dimensional Euclidean space ${\mathbb R}^\ell$. Based on results for the spatial $β$-mixing coefficient an upper bound for the variance of additive functionals of tessellations is derived, using results by Yoshihara and Heinrich. Moreover, ergodic theorems are applied to subadditive functionals.
△ Less
Submitted 5 September, 2016;
originally announced September 2016.
-
Server assisted distributed cooperative localization over unreliable communication links
Authors:
Solmaz S. Kia,
Jonathan Hechtbauer,
David Gogokhiya,
Sonia Martinez
Abstract:
This paper considers the problem of cooperative localization (CL) using inter-robot measurements for a group of networked robots with limited on-board resources. We propose a novel recursive algorithm in which each robot localizes itself in a global coordinate frame by local dead reckoning, and opportunistically corrects its pose estimate whenever it receives a relative measurement update message…
▽ More
This paper considers the problem of cooperative localization (CL) using inter-robot measurements for a group of networked robots with limited on-board resources. We propose a novel recursive algorithm in which each robot localizes itself in a global coordinate frame by local dead reckoning, and opportunistically corrects its pose estimate whenever it receives a relative measurement update message from a server. The computation and storage cost per robot in terms of the size of the team is of order O(1), and the robots are only required to transmit information when they are involved in a relative measurement. The server also only needs to compute and transmit update messages when it receives an inter-robot measurement. We show that under perfect communication, our algorithm is an alternative but exact implementation of a joint CL for the entire team via Extended Kalman Filter (EKF). The perfect communication however is not a hard requirement. In fact, we show that our algorithm is intrinsically robust with respect to communication failures, with formal guarantees that the updated estimates of the robots receiving the update message are of minimum variance in a first-order approximate sense at that given timestep. We demonstrate the performance of the algorithm in simulation and experiments.
△ Less
Submitted 24 December, 2017; v1 submitted 1 August, 2016;
originally announced August 2016.
-
Fast computation method for comprehensive agent-level epidemic dissemination in networks
Authors:
Gilberto M. Nakamura,
Ana Carolina P. Monteiro,
George C. Cardoso,
Alexandre S. Martinez
Abstract:
Two simple agent based models are often employed in epidemic studies: the susceptible-infected (SI) and the susceptible-infected-susceptible (SIS). Both models describe the time evolution of infectious diseases in networks in which vertices are either susceptible (S) or infected (I) agents. Predicting the effects of disease spreading is one of the major goals in epidemic studies, but often restric…
▽ More
Two simple agent based models are often employed in epidemic studies: the susceptible-infected (SI) and the susceptible-infected-susceptible (SIS). Both models describe the time evolution of infectious diseases in networks in which vertices are either susceptible (S) or infected (I) agents. Predicting the effects of disease spreading is one of the major goals in epidemic studies, but often restricted to numerical simulations. Analytical methods using operatorial content are subjected to the asymmetric eigenvalue problem, restraining the usability of standard perturbative techniques, whereas numerical methods are limited to small populations since the vector space increases exponentially with population size $N$. Here, we propose the use of the squared norm of probability vector, $\vert P(t)\vert ^2$, to obtain an algebraic equation which allows the evaluation of stationary states, in time independent Markov processes. The equation requires eigenvalues of symmetrized time generators, which take full advantage of system symmetries, reducing the problem to an $O(N)$ sparse matrix diagonalization.
Standard perturbative methods are introduced, creating precise tools to evaluate the effects of health policies.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
A probabilistic analysis of a discrete-time evolution in recombination II. (On partitions)
Authors:
Servet Martinez
Abstract:
We study the discrete-time evolution of a transformation on a set of probability measures that is up-dated combining independently the marginals on the atoms of partitions. This model was recently introduced in Baake, Baake and Salamat (Discr. and contin. dynam. syst. 36, 2016) for continuous-time evolution and generalizes previous ones based upon dyadic partitions. We associate to the discrete-ti…
▽ More
We study the discrete-time evolution of a transformation on a set of probability measures that is up-dated combining independently the marginals on the atoms of partitions. This model was recently introduced in Baake, Baake and Salamat (Discr. and contin. dynam. syst. 36, 2016) for continuous-time evolution and generalizes previous ones based upon dyadic partitions. We associate to the discrete-time evolution a natural Markov chain and describe its quasi-stationary behavior retrieving all the results we recently found for dyadic partitions.
△ Less
Submitted 18 April, 2016;
originally announced April 2016.
-
A probabilistic analysis of a discrete-time evolution in recombination
Authors:
Servet Martinez
Abstract:
We give a closed form of the discrete-time evolution of a recombination transformation in population genetics. This decomposition allows to define a Markov chain in a natural way. We describe the geometric decay rate to the limit distribution, and the quasi-stationary behavior when conditioned to the event that the chain does not hit the limit distribution.
We give a closed form of the discrete-time evolution of a recombination transformation in population genetics. This decomposition allows to define a Markov chain in a natural way. We describe the geometric decay rate to the limit distribution, and the quasi-stationary behavior when conditioned to the event that the chain does not hit the limit distribution.
△ Less
Submitted 23 March, 2016;
originally announced March 2016.
-
Finite element approximation for the fractional eigenvalue problem
Authors:
Juan Pablo Borthagaray,
Leandro M. Del Pezzo,
Sandra Martínez
Abstract:
The purpose of this work is to study a finite element method for finding solutions to the eigenvalue problem for the fractional Laplacian. We prove that the discrete eigenvalue problem converges to the continuous one and we show the order of such convergence. Finally, we perform some numerical experiments and compare our results with previous work by other authors.
The purpose of this work is to study a finite element method for finding solutions to the eigenvalue problem for the fractional Laplacian. We prove that the discrete eigenvalue problem converges to the continuous one and we show the order of such convergence. Finally, we perform some numerical experiments and compare our results with previous work by other authors.
△ Less
Submitted 6 April, 2018; v1 submitted 1 March, 2016;
originally announced March 2016.
-
t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation
Authors:
Jordi Soria-Comas,
Josep Domingo-Ferrer,
David Sánchez,
Sergio Martínez
Abstract:
Microaggregation is a technique for disclosure limitation aimed at protecting the privacy of data subjects in microdata releases. It has been used as an alternative to generalization and suppression to generate $k$-anonymous data sets, where the identity of each subject is hidden within a group of $k$ subjects. Unlike generalization, microaggregation perturbs the data and this additional masking f…
▽ More
Microaggregation is a technique for disclosure limitation aimed at protecting the privacy of data subjects in microdata releases. It has been used as an alternative to generalization and suppression to generate $k$-anonymous data sets, where the identity of each subject is hidden within a group of $k$ subjects. Unlike generalization, microaggregation perturbs the data and this additional masking freedom allows improving data utility in several ways, such as increasing data granularity, reducing the impact of outliers and avoiding discretization of numerical data. $k$-Anonymity, on the other side, does not protect against attribute disclosure, which occurs if the variability of the confidential values in a group of $k$ subjects is too small. To address this issue, several refinements of $k$-anonymity have been proposed, among which $t$-closeness stands out as providing one of the strictest privacy guarantees. Existing algorithms to generate $t$-close data sets are based on generalization and suppression (they are extensions of $k$-anonymization algorithms based on the same principles). This paper proposes and shows how to use microaggregation to generate $k$-anonymous $t$-close data sets. The advantages of microaggregation are analyzed, and then several microaggregation algorithms for $k$-anonymous $t$-closeness are presented and empirically evaluated.
△ Less
Submitted 9 December, 2015;
originally announced December 2015.
-
Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation
Authors:
David Sánchez,
Josep Domingo-Ferrer,
Sergio Martínez,
Jordi Soria-Comas
Abstract:
Being able to release and exploit open data gathered in information systems is crucial for researchers, enterprises and the overall society. Yet, these data must be anonymized before release to protect the privacy of the subjects to whom the records relate. Differential privacy is a privacy model for anonymization that offers more robust privacy guarantees than previous models, such as $k$-anonymi…
▽ More
Being able to release and exploit open data gathered in information systems is crucial for researchers, enterprises and the overall society. Yet, these data must be anonymized before release to protect the privacy of the subjects to whom the records relate. Differential privacy is a privacy model for anonymization that offers more robust privacy guarantees than previous models, such as $k$-anonymity and its extensions. However, it is often disregarded that the utility of differentially private outputs is quite limited, either because of the amount of noise that needs to be added to obtain them or because utility is only preserved for a restricted type and/or a limited number of queries. On the contrary, $k$-anonymity-like data releases make no assumptions on the uses of the protected data and, thus, do not restrict the number and type of doable analyses. Recently, some authors have proposed mechanisms to offer general-purpose differentially private data releases. This paper extends such works with a specific focus on the preservation of the utility of the protected data. Our proposal builds on microaggregation-based anonymization, which is more flexible and utility-preserving than alternative anonymization methods used in the literature, in order to reduce the amount of noise needed to satisfy differential privacy. In this way, we improve the utility of differentially private data releases. Moreover, the noise reduction we achieve does not depend on the size of the data set, but just on the number of attributes to be protected, which is a more desirable behavior for large data sets. The utility benefits brought by our proposal are empirically evaluated and compared with related works for several data sets and metrics.
△ Less
Submitted 16 December, 2015; v1 submitted 9 December, 2015;
originally announced December 2015.
-
Supplementary Materials for "How to Avoid Reidentification with Proper Anonymization"- Comment on "Unique in the shopping mall: on the reidentifiability of credit card metadata"
Authors:
David Sánchez,
Sergio Martínez,
Josep Domingo-Ferrer
Abstract:
The study by De Montjoye et al. ("Science", 30 January 2015, p. 536) claimed that most individuals can be reidentified from a deidentified credit card transaction database and that anonymization mechanisms are not effective against reidentification. Such claims deserve detailed quantitative scrutiny, as they might seriously undermine the willingness of data owners and subjects to share data for re…
▽ More
The study by De Montjoye et al. ("Science", 30 January 2015, p. 536) claimed that most individuals can be reidentified from a deidentified credit card transaction database and that anonymization mechanisms are not effective against reidentification. Such claims deserve detailed quantitative scrutiny, as they might seriously undermine the willingness of data owners and subjects to share data for research. In a recent Technical Comment published in "Science" (18 March 2016, p. 1274), we demonstrate that the reidentification risk reported by De Montjoye et al. was significantly overestimated (due to a misunderstanding of the reidentification attack) and that the alleged ineffectiveness of anonymization is due to the choice of poor and undocumented methods and to a general disregard of 40 years of anonymization literature. The technical comment also shows how to properly anonymize data, in order to reduce unequivocal reidentifications to zero while retaining even more analytical utility than with the poor anonymization mechanisms employed by De Montjoye et al. In conclusion, data owners, subjects and users can be reassured that sound privacy models and anonymization methods exist to produce safe and useful anonymized data.
Supplementary materials detailing the data sets, algorithms and extended results of our study are available here. Moreover, unlike the De Montjoye et al.'s data set, which was never made available, our data, anonymized results, and anonymization algorithms can be freely downloaded from http://crises-deim.urv.cat/opendata/SPD_Science.zip
△ Less
Submitted 18 March, 2016; v1 submitted 18 November, 2015;
originally announced November 2015.
-
An Entropy-Based Technique for Classifying Bacterial Chromosomes According to Synonymous Codon Usage
Authors:
Andrew Hart,
Servet Martínez
Abstract:
We present a framework based on conditional entropy and the Dirichlet distribution for classifying chromosomes based on the degree to which they use synonymous codons uniformly or preferentially, that is, whether or not codons that code for an amino acid appear with the same relative frequency. Applying the approach to a large collection of annotated bacterial chromosomes reveals three distinct gr…
▽ More
We present a framework based on conditional entropy and the Dirichlet distribution for classifying chromosomes based on the degree to which they use synonymous codons uniformly or preferentially, that is, whether or not codons that code for an amino acid appear with the same relative frequency. Applying the approach to a large collection of annotated bacterial chromosomes reveals three distinct groups of bacteria.
△ Less
Submitted 14 October, 2015;
originally announced October 2015.
-
Scaling Analysis of Random Walks with Persistence Lengths: Application to Self-Avoiding Walks
Authors:
C. R. F. Granzotti,
A. S. Martinez,
M. A. A. da Silva
Abstract:
We develop an approach for performing scaling analysis of $N$-step Random Walks (RWs). The mean square end-to-end distance, $\langle\vec{R}_{N}^{2}\rangle$, is written in terms of inner persistence lengths (IPLs), which we define by the ensemble averages of dot products between the walker's position and displacement vectors, at the $j$-th step. For RW models statistically invariant under orthogona…
▽ More
We develop an approach for performing scaling analysis of $N$-step Random Walks (RWs). The mean square end-to-end distance, $\langle\vec{R}_{N}^{2}\rangle$, is written in terms of inner persistence lengths (IPLs), which we define by the ensemble averages of dot products between the walker's position and displacement vectors, at the $j$-th step. For RW models statistically invariant under orthogonal transformations, we analytically introduce a relation between $\langle\vec{R}_{N}^{2}\rangle$ and the persistence length, $λ_{N}$, which is defined as the mean end-to-end vector projection in the first step direction. For Self-Avoiding Walks (SAWs) on 2D and 3D lattices we introduce a series expansion for $λ_{N}$, and by Monte Carlo simulations we find that $λ_{\infty}$ is equal to a constant; the scaling corrections for $λ_{N}$ can be second and higher order corrections to scaling for $\langle\vec{R}_{N}^{2}\rangle$. Building SAWs with typically one hundred steps, we estimate the exponents $ν_{0}$ and $Δ_{1}$ from the IPL behavior as function of $j$. The obtained results are in excellent agreement with those in the literature. This shows that only an ensemble of paths with the same length is sufficient for determining the scaling behavior of $\langle\vec{R}_{N}^{2}\rangle$, being that the whole information needed is contained in the inner part of the paths.
△ Less
Submitted 10 May, 2016; v1 submitted 27 August, 2015;
originally announced August 2015.
-
Distance statistics in random media: high dimension and/or high neighborhood order cases
Authors:
Cristiano Roberto Fabri Granzotti,
Alexandre Souto Martinez
Abstract:
Consider an unlimited homogeneous medium disturbed by points generated via Poisson process. The neighborhood of a point plays an important role in spatial statistics problems. Here, we obtain analytically the distance statistics to $k$th nearest neighbor in a $d$-dimensional media. Next, we focus our attention in high dimensionality and high neighborhood order limits. High dimensionality makes dis…
▽ More
Consider an unlimited homogeneous medium disturbed by points generated via Poisson process. The neighborhood of a point plays an important role in spatial statistics problems. Here, we obtain analytically the distance statistics to $k$th nearest neighbor in a $d$-dimensional media. Next, we focus our attention in high dimensionality and high neighborhood order limits. High dimensionality makes distance distribution behavior as a delta sequence, with mean value equal to Cerf's conjecture. Distance statistics in high neighborhood order converges to a Gaussian distribution. The general distance statistics can be applied to detect departures from Poissonian point distribution hypotheses as proposed by Thompson and generalized here.
△ Less
Submitted 10 August, 2015;
originally announced August 2015.
-
Tunable multiple Fano resonances in magnetic single-layered core-shell particles
Authors:
Tiago Jose Arruda,
Alexandre Souto Martinez,
Felipe Arruda Pinheiro
Abstract:
We investigate multiple Fano, comblike scattering resonances in single-layered, concentric core-shell nanoparticles composed of magnetic materials. Using the Lorenz-Mie theory, we derive, in the long-wavelength limit, an analytical condition for the occurrence of comblike resonances in the single scattering by coated spheres. This condition establishes that comblike scattering response uniquely de…
▽ More
We investigate multiple Fano, comblike scattering resonances in single-layered, concentric core-shell nanoparticles composed of magnetic materials. Using the Lorenz-Mie theory, we derive, in the long-wavelength limit, an analytical condition for the occurrence of comblike resonances in the single scattering by coated spheres. This condition establishes that comblike scattering response uniquely depends on material parameters and thickness of the shell, provided that it is magnetic and thin compared to the scatterer radius. We also demonstrate that comblike scattering response shows up beyond the long-wavelength limit and it is robust against absorption. Since multiple Fano resonances are shown to depend explicitly on the magnetic permeability of the shell, we argue that both the position and profile of the comblike, morphology-dependent resonances could be externally tuned by exploiting the properties of engineered magnetic materials.
△ Less
Submitted 10 August, 2015;
originally announced August 2015.
-
Cooperative localization for mobile agents: a recursive decentralized algorithm based on Kalman filter decoupling
Authors:
Solmaz S. Kia,
Stephen Rounds,
Sonia Martinez
Abstract:
We consider cooperative localization technique for mobile agents with communication and computation capabilities. We start by provide and overview of different decentralization strategies in the literature, with special focus on how these algorithms maintain an account of intrinsic correlations between state estimate of team members. Then, we present a novel decentralized cooperative localization…
▽ More
We consider cooperative localization technique for mobile agents with communication and computation capabilities. We start by provide and overview of different decentralization strategies in the literature, with special focus on how these algorithms maintain an account of intrinsic correlations between state estimate of team members. Then, we present a novel decentralized cooperative localization algorithm that is a decentralized implementation of a centralized Extended Kalman Filter for cooperative localization. In this algorithm, instead of propagating cross-covariance terms, each agent propagates new intermediate local variables that can be used in an update stage to create the required propagated cross-covariance terms. Whenever there is a relative measurement in the network, the algorithm declares the agent making this measurement as the interim master. By acquiring information from the interim landmark, the agent the relative measurement is taken from, the interim master can calculate and broadcast a set of intermediate variables which each robot can then use to update its estimates to match that of a centralized Extended Kalman Filter for cooperative localization. Once an update is done, no further communication is needed until the next relative measurement.
△ Less
Submitted 5 October, 2015; v1 submitted 21 May, 2015;
originally announced May 2015.
-
Asymptotics for the heat kernel in multicone domains
Authors:
Pierre Collet,
Mauricio Duarte,
Servet Martinez,
Arturo Prat-Waldron,
Jaime San Martin
Abstract:
A multi cone domain $Ω\subseteq \mathbb{R}^n$ is an open, connected set that resembles a finite collection of cones far away from the origin. We study the rate of decay in time of the heat kernel $p(t,x,y)$ of a Brownian motion killed upon exiting $Ω$, using both probabilistic and analytical techniques. We find that the decay is polynomial and we characterize $\lim_{t\to\infty} t^{1+α}p(t,x,y)$ in…
▽ More
A multi cone domain $Ω\subseteq \mathbb{R}^n$ is an open, connected set that resembles a finite collection of cones far away from the origin. We study the rate of decay in time of the heat kernel $p(t,x,y)$ of a Brownian motion killed upon exiting $Ω$, using both probabilistic and analytical techniques. We find that the decay is polynomial and we characterize $\lim_{t\to\infty} t^{1+α}p(t,x,y)$ in terms of the Martin boundary of $Ω$ at infinity, where $α>0$ depends on the geometry of $Ω$. We next derive an analogous result for $t^{κ/2}\mathbb{P}_x(T >t)$, with $κ= 1+α- n/2$, where $T$ is the exit time form $Ω$. Lastly, we deduce the renormalized Yaglom limit for the process conditioned on survival.
△ Less
Submitted 23 January, 2015; v1 submitted 19 January, 2015;
originally announced January 2015.
-
STIT Process and Trees
Authors:
Servet Martínez,
Werner Nagel
Abstract:
We study several constructions of the STIT tessellation process in a window of $\RR^\ell$ and supply an exact formula for its transition probability.
We study several constructions of the STIT tessellation process in a window of $\RR^\ell$ and supply an exact formula for its transition probability.
△ Less
Submitted 13 November, 2014; v1 submitted 12 November, 2014;
originally announced November 2014.
-
Reconstruction of bremsstrahlung spectra from attenuation data using generalized simulated annealing
Authors:
Olavo Henrique Menin,
Alexandre Souto Martinez,
Alessandro Martins da Costa
Abstract:
The throughout knowledge of a X-ray beam spectrum is mandatory to assess the quality of its source device. Since the techniques to directly measurement such spectra are expensive and laborious, the X-ray spectrum reconstruction using attenuation data has been a promising alternative. However, such reconstruction corresponds mathematically to an inverse, nonlinear and ill-posed problem. Therefore,…
▽ More
The throughout knowledge of a X-ray beam spectrum is mandatory to assess the quality of its source device. Since the techniques to directly measurement such spectra are expensive and laborious, the X-ray spectrum reconstruction using attenuation data has been a promising alternative. However, such reconstruction corresponds mathematically to an inverse, nonlinear and ill-posed problem. Therefore, to solve it the use of powerful optimization algorithms and good regularization functions is required. Here, we present a generalized simulated annealing algorithm combined with a suitable smoothing regularization function to solve the X-ray spectrum reconstruction inverse problem. We also propose an approach to set the initial acceptance and visitation temperatures and a standardization of the objective function terms to automatize the algorithm to address with different spectra range. Numerical tests considering three different reference spectra with its attenuation curve are presented. Results show that the algorithm provides good accuracy to retrieve the reference spectra shapes corroborating the central importance of our regularization function and the performance improvement of the generalized simulated annealing compared to its classical version.
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Could sampling make hares eat lynxes?
Authors:
Brenno Caetano Troca Cabella,
Fernando Meloni,
Alexandre Souto Martinez
Abstract:
Cycles in population dynamics are widely found in nature. These cycles are understood as emerging from the interaction between two or more coupled species. Here, we argue that data regarding population dynamics are prone to misinterpretation when sampling is conducted at a slow rate compared to the population cycle period. This effect, known as aliasing, is well described in other areas, such as s…
▽ More
Cycles in population dynamics are widely found in nature. These cycles are understood as emerging from the interaction between two or more coupled species. Here, we argue that data regarding population dynamics are prone to misinterpretation when sampling is conducted at a slow rate compared to the population cycle period. This effect, known as aliasing, is well described in other areas, such as signal processing and computer graphics. However, to the best of our knowledge, aliasing has never been addressed in the population dynamics context or in coupled oscillatory systems. To illustrate aliasing, the Lotka-Volterra model oscillatory regime is numerically sampled, creating prey-predator cycles. Inadequate sampling periods produce inversions in the cause-effect relationship and an increase in cycle period, as reported in the well-known hare-lynx paradox. More generally, slow acquisition rates may distort data, producing deceptive patterns and eventually leading to data misinterpretation.
△ Less
Submitted 14 July, 2014;
originally announced July 2014.
-
On Moebius duality and Coarse-Graining
Authors:
Thierry Huillet,
Servet Martinez
Abstract:
We study duality relations for zeta and Möbius matrices and monotone conditions on the kernels. We focus on the cases of family of sets and partitions. The conditions for positivity of the dual kernels are stated in terms of the positive Möbius cone of functions, which is described in terms of Sylvester formulae. We study duality under coarse-graining and show that an $h-$transform is needed to pr…
▽ More
We study duality relations for zeta and Möbius matrices and monotone conditions on the kernels. We focus on the cases of family of sets and partitions. The conditions for positivity of the dual kernels are stated in terms of the positive Möbius cone of functions, which is described in terms of Sylvester formulae. We study duality under coarse-graining and show that an $h-$transform is needed to preserve stochasticity. We give conditions in order that zeta and Möbius matrices admit coarse-graining, and we prove they are satisfied for sets and partitions. This is a source of relevant examples in genetics on the haploid and multi-allelic Cannings models.
△ Less
Submitted 11 July, 2014;
originally announced July 2014.
-
The $β$-Mixing Rate of STIT Tessellations
Authors:
Servet Martínez,
Werner Nagel
Abstract:
We consider homogeneous STIT tessellations $Y$ in the $\ell$-dimensional Euclidean space $R^\ell$ and show that the (spatial) $β$-mixing rate converges to zero.
We consider homogeneous STIT tessellations $Y$ in the $\ell$-dimensional Euclidean space $R^\ell$ and show that the (spatial) $β$-mixing rate converges to zero.
△ Less
Submitted 11 June, 2014;
originally announced June 2014.
-
Distributed event-triggered communication for dynamic average consensus in networked systems
Authors:
Solmaz S. Kia,
Jorge Cortes,
Sonia Martinez
Abstract:
This paper presents distributed algorithmic solutions that employ opportunistic inter-agent communication to achieve dynamic average consensus. In our solutions each agent is endowed with a local criterion that enables it to determine whether to broadcast its state to its neighbors. Our starting point is a continuous-time distributed coordination strategy that, under continuous-time communication,…
▽ More
This paper presents distributed algorithmic solutions that employ opportunistic inter-agent communication to achieve dynamic average consensus. In our solutions each agent is endowed with a local criterion that enables it to determine whether to broadcast its state to its neighbors. Our starting point is a continuous-time distributed coordination strategy that, under continuous-time communication, achieves practical asymptotic tracking of the dynamic average of the time-varying agents' reference inputs. Then, for this algorithm, depending on the directed or undirected nature of the time-varying interactions and under suitable connectivity conditions, we propose two different distributed event-triggered communication laws that prescribe agent communications at discrete time instants in an opportunistic fashion. In both cases, we establish positive lower bounds on the inter-event times of each agent and characterize their dependence on the algorithm design parameters. This analysis allows us to rule out the presence of Zeno behavior and characterize the asymptotic correctness of the resulting implementations. Several simulations illustrate the results.
△ Less
Submitted 2 March, 2015; v1 submitted 29 April, 2014;
originally announced April 2014.
-
Mapping of solutions of the Hamilton-Jacobi equation by an arbitrary canonical transformation
Authors:
G. F. Torres del Castillo,
H. H. Cruz Domínguez,
A. de Yta Hernández,
J. E. Herrera Flores,
A. Sierra Martínez
Abstract:
It is shown that given an arbitrary canonical transformation and an arbitrary Hamiltonian, there is a naturally defined mapping that sends any solution of the Hamilton-Jacobi (HJ) equation into a solution of the HJ equation corresponding to the new Hamiltonian
It is shown that given an arbitrary canonical transformation and an arbitrary Hamiltonian, there is a naturally defined mapping that sends any solution of the Hamilton-Jacobi (HJ) equation into a solution of the HJ equation corresponding to the new Hamiltonian
△ Less
Submitted 19 March, 2014;
originally announced March 2014.
-
Dynamic Average Consensus under Limited Control Authority and Privacy Requirements
Authors:
Solmaz S. Kia,
Jorge Cortes,
Sonia Martinez
Abstract:
This paper introduces a novel continuous-time dynamic average consensus algorithm for networks whose interaction is described by a strongly connected and weight-balanced directed graph. The proposed distributed algorithm allows agents to track the average of their dynamic inputs with some steady-state error whose size can be controlled using a design parameter. This steady-state error vanishes for…
▽ More
This paper introduces a novel continuous-time dynamic average consensus algorithm for networks whose interaction is described by a strongly connected and weight-balanced directed graph. The proposed distributed algorithm allows agents to track the average of their dynamic inputs with some steady-state error whose size can be controlled using a design parameter. This steady-state error vanishes for special classes of input signals. We analyze the asymptotic correctness of the algorithm under time-varying interaction topologies and characterize the requirements on the stepsize for discrete-time implementations. We show that our algorithm naturally preserves the privacy of the local input of each agent. Building on this analysis, we synthesize an extension of the algorithm that allows individual agents to control their own rate of convergence towards agreement and handle saturation bounds on the driving command. Finally, we show that the proposed extension additionally preserves the privacy of the transient response of the agreement states and the final agreement value from internal and external adversaries. Numerical examples illustrate the results.
△ Less
Submitted 24 January, 2014;
originally announced January 2014.
-
Navigating MazeMap: indoor human mobility, spatio-logical ties and future potential
Authors:
Gergely Biczok,
Santiago Diez Martinez,
Thomas Jelle,
John Krogstie
Abstract:
Global navigation systems and location-based services have found their way into our daily lives. Recently, indoor positioning techniques have also been proposed, and there are several live or trial systems already operating. In this paper, we present insights from MazeMap, the first live indoor/outdoor positioning and navigation system deployed at a large university campus in Norway. Our main cont…
▽ More
Global navigation systems and location-based services have found their way into our daily lives. Recently, indoor positioning techniques have also been proposed, and there are several live or trial systems already operating. In this paper, we present insights from MazeMap, the first live indoor/outdoor positioning and navigation system deployed at a large university campus in Norway. Our main contribution is a measurement case study; we show the spatial and temporal distribution of MazeMap geo-location and wayfinding requests, construct the aggregated human mobility map of the campus and find strong logical ties between different locations. On one hand, our findings are specific to the venue; on the other hand, the nature of available data and insights coupled with our discussion on potential usage scenarios for indoor positioning and location-based services predict a successful future for these systems and applications.
△ Less
Submitted 21 January, 2014;
originally announced January 2014.
-
Distributed convex optimization via continuous-time coordination algorithms with discrete-time communication
Authors:
Solmaz S. Kia,
Jorge Cortes,
Sonia Martinez
Abstract:
This paper proposes a novel class of distributed continuous-time coordination algorithms to solve network optimization problems whose cost function is a sum of local cost functions associated to the individual agents. We establish the exponential convergence of the proposed algorithm under (i) strongly connected and weight-balanced digraph topologies when the local costs are strongly convex with g…
▽ More
This paper proposes a novel class of distributed continuous-time coordination algorithms to solve network optimization problems whose cost function is a sum of local cost functions associated to the individual agents. We establish the exponential convergence of the proposed algorithm under (i) strongly connected and weight-balanced digraph topologies when the local costs are strongly convex with globally Lipschitz gradients, and (ii) connected graph topologies when the local costs are strongly convex with locally Lipschitz gradients. When the local cost functions are convex and the global cost function is strictly convex, we establish asymptotic convergence under connected graph topologies. We also characterize the algorithm's correctness under time-varying interaction topologies and study its privacy preservation properties. Motivated by practical considerations, we analyze the algorithm implementation with discrete-time communication. We provide an upper bound on the stepsize that guarantees exponential convergence over connected graphs for implementations with periodic communication. Building on this result, we design a provably-correct centralized event-triggered communication scheme that is free of Zeno behavior. Finally, we develop a distributed, asynchronous event-triggered communication scheme that is also free of Zeno with asymptotic convergence guarantees. Several simulations illustrate our results.
△ Less
Submitted 22 August, 2014; v1 submitted 17 January, 2014;
originally announced January 2014.
-
The decomposition-coordination method for the $p(x)$-Laplacian
Authors:
Leandro Del Pezzo,
Sandra Martinez
Abstract:
In this paper we construct two algorithms to approximate the minimizer of a discrete functional which comes from using a discontinuous Galerkin method for a variational problem related to the $p(x)$-Laplacian. We also make some numerical experiments in dimension two.
In this paper we construct two algorithms to approximate the minimizer of a discrete functional which comes from using a discontinuous Galerkin method for a variational problem related to the $p(x)$-Laplacian. We also make some numerical experiments in dimension two.
△ Less
Submitted 10 January, 2014;
originally announced January 2014.
-
Satellite image classification and segmentation using non-additive entropy
Authors:
Lucas Assirati,
Alexandre Souto Martinez,
Odemir Martinez Bruno
Abstract:
Here we compare the Boltzmann-Gibbs-Shannon (standard) with the Tsallis entropy on the pattern recognition and segmentation of coloured images obtained by satellites, via "Google Earth". By segmentation we mean split an image to locate regions of interest. Here, we discriminate and define an image partition classes according to a training basis. This training basis consists of three pattern classe…
▽ More
Here we compare the Boltzmann-Gibbs-Shannon (standard) with the Tsallis entropy on the pattern recognition and segmentation of coloured images obtained by satellites, via "Google Earth". By segmentation we mean split an image to locate regions of interest. Here, we discriminate and define an image partition classes according to a training basis. This training basis consists of three pattern classes: aquatic, urban and vegetation regions. Our numerical experiments demonstrate that the Tsallis entropy, used as a feature vector composed of distinct entropic indexes $q$ outperforms the standard entropy. There are several applications of our proposed methodology, once satellite images can be used to monitor migration form rural to urban regions, agricultural activities, oil spreading on the ocean etc.
△ Less
Submitted 10 January, 2014;
originally announced January 2014.
-
A distribution weighting a set of laws whose initial states are grouped into classes
Authors:
Servet Martinez
Abstract:
Let $I$ be a finite alphabet and $\aS\subset I$ be a nonempty strict subset. The sequences in $I^\ZZ$ are organized into connected regions which always start with a symbol in $\aS$. The regions are labelled by types $C(s)$, thus a region starting at $s'\in C(s)$ has the same type as one starting at $s$. Let $(\aP_s: s\in \aS)$ be a family of distributions on $I^\NN$ where each $\aP_s$ charges sequ…
▽ More
Let $I$ be a finite alphabet and $\aS\subset I$ be a nonempty strict subset. The sequences in $I^\ZZ$ are organized into connected regions which always start with a symbol in $\aS$. The regions are labelled by types $C(s)$, thus a region starting at $s'\in C(s)$ has the same type as one starting at $s$. Let $(\aP_s: s\in \aS)$ be a family of distributions on $I^\NN$ where each $\aP_s$ charges sequences starting with the symbol $s$. We can define a natural distribution $\PP$ on $I^\NN$, that counts the number of visits to the states from $\aP_s$, properly weighted. A dynamics of interest is such that at the first occurrence of $s'\in \aS\setminus C(s)$ the law regenerates with distribution $\aP_{s'}$. In this case we are able to find simple conditions for $\PP$ to be stationary. In addition, we study the following more complex model: once a symbol $s'\in \aS\setminus C(s)$ has been encountered, there is a decision to be made, either a new region of type $C(s')$ governed by $\aP_{s'}$ starts or the region continues to be a $C(s)$ region. This decision is modeled as random and depends on $s'$. In this setting a similar distribution to $\PP$ can be constructed and the conditions for stationarity are supplied. These models are inspired by genomic sequences where $I$ is the set of codons, the classes $(C(s): s\in \aS)$ group codons defining similar genomic classes, e.g. in bacteria there are two classes corresponding to the start and stop codons, and the random decision to continue a region or to begin a new region of a different class reflects the well-known fact that not every appearance of a start codon marks the beginning of a new coding region.
△ Less
Submitted 19 November, 2013;
originally announced November 2013.
-
Markovianness and Conditional Independence in Annotated Bacterial DNA
Authors:
Andrew Hart,
Servet Martínez
Abstract:
We explore the probabilistic structure of DNA in a number of bacterial genomes and conclude that a form of Markovianness is present at the boundaries between coding and non-coding regions, that is, the sequence of START and STOP codons annotated for the bacterial genome. This sequence is shown to satisfy a conditional independence property which allows its governing Markov chain to be uniquely ide…
▽ More
We explore the probabilistic structure of DNA in a number of bacterial genomes and conclude that a form of Markovianness is present at the boundaries between coding and non-coding regions, that is, the sequence of START and STOP codons annotated for the bacterial genome. This sequence is shown to satisfy a conditional independence property which allows its governing Markov chain to be uniquely identified from the abundances of START and STOP codons. Furthermore, the annotated sequence is shown to comply with Chargaff's second parity rule at the codon level.
△ Less
Submitted 18 November, 2013;
originally announced November 2013.
-
Order of convergence of the finite element method for the $p(x)-$Laplacian
Authors:
Leandro M. Del Pezzo,
Sandra Martínez
Abstract:
In this work, we study the rate of convergence of the finite element method for the $p(x)$Laplacian ($1< p_1\leq p(x)\leq p_2\leq 2$) in two dimensional convex domains.
In this work, we study the rate of convergence of the finite element method for the $p(x)$Laplacian ($1< p_1\leq p(x)\leq p_2\leq 2$) in two dimensional convex domains.
△ Less
Submitted 13 November, 2013; v1 submitted 13 November, 2013;
originally announced November 2013.
-
Boosted objects and jet substructure at the LHC
Authors:
BOOST2012 participants- A. Altheimer,
A. Arce,
L. Asquith,
J. Backus Mayes,
E. Bergeaas Kuutmann,
J. Berger,
D. Bjergaard,
L. Bryngemark,
A. Buckley,
J. Butterworth,
M. Cacciari,
M. Campanelli,
T. Carli,
M. Chala,
B. Chapleau,
C. Chen,
J. P. Chou,
Th. Cornelissen,
D. Curtin,
M. Dasgupta,
A. Davison,
F. de Almeida Dias,
A. de Cosa,
A. de Roeck,
C. Debenedetti
, et al. (62 additional authors not shown)
Abstract:
This report of the BOOST2012 workshop presents the results of four working groups that studied key aspects of jet substructure. We discuss the potential of the description of jet substructure in first-principle QCD calculations and study the accuracy of state-of-the-art Monte Carlo tools. Experimental limitations of the ability to resolve substructure are evaluated, with a focus on the impact of a…
▽ More
This report of the BOOST2012 workshop presents the results of four working groups that studied key aspects of jet substructure. We discuss the potential of the description of jet substructure in first-principle QCD calculations and study the accuracy of state-of-the-art Monte Carlo tools. Experimental limitations of the ability to resolve substructure are evaluated, with a focus on the impact of additional proton proton collisions on jet substructure performance in future LHC operating scenarios. A final section summarizes the lessons learnt during the deployment of substructure analyses in searches for new physics in the production of boosted top quarks.
△ Less
Submitted 4 December, 2013; v1 submitted 12 November, 2013;
originally announced November 2013.
-
Occupancy distributions arising in sampling from Gibbs-Poisson abundance models
Authors:
Thierry Huillet,
Servet Martinez
Abstract:
Estimating the number $n$ of unseen species from a $k-$sample displaying only $p\leq k$ distinct sampled species has received attention for long. It requires a model of species abundance together with a sampling model. We start with a discrete model of iid stochastic species abundances, each with Gibbs-Poisson distribution. A $k-$sample drawn from the $n-$species abundances vector is the one obtai…
▽ More
Estimating the number $n$ of unseen species from a $k-$sample displaying only $p\leq k$ distinct sampled species has received attention for long. It requires a model of species abundance together with a sampling model. We start with a discrete model of iid stochastic species abundances, each with Gibbs-Poisson distribution. A $k-$sample drawn from the $n-$species abundances vector is the one obtained while conditioning it on summing to $k$% . We discuss the sampling formulae (species occupancy distributions, frequency of frequencies) in this context. We then develop some aspects of the estimation of $n$ problem from the size $k$ of the sample and the observed value of $P_{n,k}$, the number of distinct sampled species. It is shown that it always makes sense to study these occupancy problems from a Gibbs-Poisson abundance model in the context of a population with infinitely many species. From this extension, a parameter $γ$ naturally appears, which is a measure of richness or diversity of species. We rederive the sampling formulae for a population with infinitely many species, together with the distribution of the number $P_{k}$ of distinct sampled species. We investigate the estimation of $γ$ problem from the sample size $k$ and the observed value of $P_{k}$. We then exhibit a large special class of Gibbs-Poisson distributions having the property that sampling from a discrete abundance model may equivalently be viewed as a sampling problem from a random partition of unity, now in the continuum. When $n$ is finite, this partition may be built upon normalizing $% n$ infinitely divisible iid positive random variables by its partial sum. It is shown that the sampling process in the continuum should generically be biased on the total length appearing in the latter normalization. A construction with size-biased sampling from the ranked normalized jumps of a subordinator is also supplied, would the problem under study present infinitely many species. We illustrate our point of view with many examples, some of which being new ones.
△ Less
Submitted 27 September, 2013; v1 submitted 11 July, 2013;
originally announced July 2013.
-
On the performance analysis of resilient networked control systems under replay attacks
Authors:
Minghui Zhu,
Sonia Martinez
Abstract:
This paper studies a resilient control problem for discrete-time, linear time-invariant systems subject to state and input constraints. State measurements and control commands are transmitted over a communication network and could be corrupted by adversaries. In particular, we consider the replay attackers who maliciously repeat the messages sent from the operator to the actuator. We propose a var…
▽ More
This paper studies a resilient control problem for discrete-time, linear time-invariant systems subject to state and input constraints. State measurements and control commands are transmitted over a communication network and could be corrupted by adversaries. In particular, we consider the replay attackers who maliciously repeat the messages sent from the operator to the actuator. We propose a variation of the receding-horizon control law to deal with the replay attacks and analyze the resulting system performance degradation. A class of competitive (resp. cooperative) resource allocation problems for resilient networked control systems is also investigated.
△ Less
Submitted 10 July, 2013;
originally announced July 2013.
-
Noise-assisted quantum electron transfer in photosynthetic complexes
Authors:
Alexander I. Nesterov,
Gennady P. Berman,
José Manuel Sánchez Martínez,
Richard T. Sayre
Abstract:
Electron transfer (ET) between primary electron donors and acceptors is modeled in the photosystem II reaction center (RC). Our model includes (i) two discrete energy levels associated with donor and acceptor, interacting through a dipole-type matrix element and (ii) two continuum manifolds of electron energy levels ("sinks"), which interact directly with the donor and acceptor. Namely, two discre…
▽ More
Electron transfer (ET) between primary electron donors and acceptors is modeled in the photosystem II reaction center (RC). Our model includes (i) two discrete energy levels associated with donor and acceptor, interacting through a dipole-type matrix element and (ii) two continuum manifolds of electron energy levels ("sinks"), which interact directly with the donor and acceptor. Namely, two discrete energy levels of the donor and acceptor are embedded in their independent sinks through the corresponding interaction matrix elements. We also introduce classical (external) noise which acts simultaneously on the donor and acceptor (collective interaction). We derive a closed system of integro-differential equations which describes the non-Markovian quantum dynamics of the ET. A region of parameters is found in which the ET dynamics can be simplified, and described by coupled ordinary differential equations. Using these simplified equations, both sharp and flat redox potentials are analyzed. We analytically and numerically obtain the characteristic parameters that optimize the ET rates and efficiency in this system.
△ Less
Submitted 29 April, 2013;
originally announced April 2013.
-
Electromagnetic energy within single-resonance chiral metamaterial spheres
Authors:
Tiago J. Arruda,
Felipe A. Pinheiro,
Alexandre S. Martinez
Abstract:
We derive an exact expression for the time-averaged electromagnetic energy inside a chiral dispersive sphere irradiated by a plane wave. The dispersion relations correspond to a chiral metamaterial consisting of uncoupled single-resonance helical resonators. Using a field decomposition scheme and a general expression for the electromagnetic energy density in bi-anisotropic media, we calculate the…
▽ More
We derive an exact expression for the time-averaged electromagnetic energy inside a chiral dispersive sphere irradiated by a plane wave. The dispersion relations correspond to a chiral metamaterial consisting of uncoupled single-resonance helical resonators. Using a field decomposition scheme and a general expression for the electromagnetic energy density in bi-anisotropic media, we calculate the Lorenz-Mie solution for the internal fields in a medium that is simultaneously magnetic and chiral. We also obtain an explicit analytical relation between the internal electromagnetic field and the absorption cross-section. This result is applied to demonstrate that strong chirality leads to an off-resonance field enhancement within weakly absorb.ing spheres.
△ Less
Submitted 4 March, 2013;
originally announced March 2013.