-
New insights on divertor parallel flows, ExB drifts, and fluctuations from in situ, two-dimensional probe measurement in the Tokamak à Configuration Variable
Authors:
H. De Oliveira,
C. Theiler,
O. Février,
H. Reimerdes,
B. P. Duval,
C. K. Tsui,
S. Gorno,
D. S. Oliveira,
A. Perek
Abstract:
In-situ, two-dimensional (2D) Langmuir probe measurements across a large part of the TCV divertor are reported in L-mode discharges with and without divertor baffles. This provides detailed insights into time averaged profiles, particle fluxes, and fluctuations behavior in different divertor regimes. The presence of the baffles is shown to substantially increase the divertor neutral pressure for a…
▽ More
In-situ, two-dimensional (2D) Langmuir probe measurements across a large part of the TCV divertor are reported in L-mode discharges with and without divertor baffles. This provides detailed insights into time averaged profiles, particle fluxes, and fluctuations behavior in different divertor regimes. The presence of the baffles is shown to substantially increase the divertor neutral pressure for a given upstream density and to facilitate the access to detachment, an effect that increases with plasma current. The detailed, 2D probe measurements allow for a divertor particle balance, including ion flux contributions from parallel flows and ExB drifts. The poloidal flux contribution from the latter is often comparable or even larger than the former, such that the divertor parallel flow direction reverses in some conditions, pointing away from the target. In most conditions, the integrated particle flux at the outer target can be predominantly ascribed to ionization along the outer divertor leg, consistent with a closed-box approximation of the divertor. The exception is a strongly detached divertor, achieved here only with baffles, where the total poloidal ion flux even decreases towards the outer target, indicative of significant plasma recombination. The most striking observation from relative density fluctuation measurements along the outer divertor leg is the transition from poloidally uniform fluctuation levels in attached conditions to fluctuations strongly peaking near the X-point when approaching detachment.
△ Less
Submitted 18 May, 2022; v1 submitted 9 April, 2022;
originally announced April 2022.
-
X-point and divertor filament dynamics from Gas Puff Imaging on TCV
Authors:
Curdin Wüthrich,
Christian Theiler,
Nicola Offeddu,
Davide Galassi,
Diego Sales de Oliveira,
Basil Duval,
Olivier Février,
Theodore Golfinopoulos,
Woonghee Han,
Earl Marmar,
Jim Terry,
Cedric Tsui
Abstract:
A new Gas Puff Imaging (GPI) diagnostic has been installed on the TCV tokamak, providing two-dimensional insights into Scrape-Off-Layer (SOL) turbulence dynamics above, at and below the magnetic X-point. A detailed study in L-mode, attached, lower single-null discharges shows that statistical properties have little poloidal variations, while vast differences are present in the 2D behaviour of inte…
▽ More
A new Gas Puff Imaging (GPI) diagnostic has been installed on the TCV tokamak, providing two-dimensional insights into Scrape-Off-Layer (SOL) turbulence dynamics above, at and below the magnetic X-point. A detailed study in L-mode, attached, lower single-null discharges shows that statistical properties have little poloidal variations, while vast differences are present in the 2D behaviour of intermittent filaments. Strongly elongated filaments, just above the X-point and in the divertor far-SOL, show a good consistency in shape and dynamics with field-line tracing from filaments at the outboard midplane, highlighting their connection. In the near-SOL of the outer divertor leg, shortlived, high frequency and more circular (diameter $\sim$15 sound Larmour radii) filaments are observed. These divertor-localised filaments appear born radially at the position of maximum density and display a radially outward motion with velocity $\approx$400\,m/s that is comparable to radial velocities of upstream-connected filaments. Conversely, in these discharges ($B\times\nabla B$ pointing away from the divertor), these divertor filaments' poloidal velocities differ strongly from those of upstream-connected filaments. The importance of divertor-localised filaments upon radial transport and profile broadening is explored using filament statistics and in-situ kinetic profile measurements along the divertor leg. This provides evidence that these filaments contribute significantly to electron density profile broadening in the divertor.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
On some H-cleft extensions which are distinguished by their polynomial H-identities
Authors:
Abel Gomes de Oliveira Jr.,
Waldeck Schützer
Abstract:
Let H be the Taft algebra over a finite commutative ring R. When N is a unit in R, we show that all H-cleft extensions over R are determined up to H-comodule algebra isomorphism by their polynomial H-identities.
Let H be the Taft algebra over a finite commutative ring R. When N is a unit in R, we show that all H-cleft extensions over R are determined up to H-comodule algebra isomorphism by their polynomial H-identities.
△ Less
Submitted 20 March, 2022;
originally announced March 2022.
-
On some H-Galois objects which are distinguished by their polynomial H-identities
Authors:
Waldeck Schützer,
Abel Gomes de Oliveira Jr
Abstract:
When k is an algebraically closed field of characteristic 0 and H is a non-semisimple monomial Hopf algebra, we show that all Galois objects over H are determined up to H-comodule algebra isomorphism by their polynomial H-identities, extending a previous result by Kassel.
When k is an algebraically closed field of characteristic 0 and H is a non-semisimple monomial Hopf algebra, we show that all Galois objects over H are determined up to H-comodule algebra isomorphism by their polynomial H-identities, extending a previous result by Kassel.
△ Less
Submitted 20 March, 2022;
originally announced March 2022.
-
QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum Circuits
Authors:
Daniel Oliveira,
Edoardo Giusto,
Emanuele Dri,
Nadir Casciola,
Betis Baheri,
Qiang Guan,
Bartolomeo Montrucchio,
Paolo Rech
Abstract:
Quantum computing is a new technology that is expected to revolutionize the computation paradigm in the next few years. Qubits exploit the quantum physics proprieties to increase the parallelism and speed of computation. Unfortunately, besides being intrinsically noisy, qubits have also been shown to be highly susceptible to external sources of faults, such as ionizing radiation. The latest discov…
▽ More
Quantum computing is a new technology that is expected to revolutionize the computation paradigm in the next few years. Qubits exploit the quantum physics proprieties to increase the parallelism and speed of computation. Unfortunately, besides being intrinsically noisy, qubits have also been shown to be highly susceptible to external sources of faults, such as ionizing radiation. The latest discoveries highlight a much higher radiation sensitivity of qubits than traditional transistors and identify a much more complex fault model than bit-flip. We propose a framework to identify the quantum circuits sensitivity to radiation-induced faults and the probability for a fault in a qubit to propagate to the output. Based on the latest studies and radiation experiments performed on real quantum machines, we model the transient faults in a qubit as a phase shift with a parametrized magnitude. Additionally, our framework can inject multiple qubit faults, tuning the phase shift magnitude based on the proximity of the qubit to the particle strike location. As we show in the paper, the proposed fault injector is highly flexible, and it can be used on both quantum circuit simulators and real quantum machines. We report the finding of more than 285M injections on the Qiskit simulator and 53K injections on real IBM machines. We consider three quantum algorithms and identify the faults and qubits that are more likely to impact the output. We also consider the fault propagation dependence on the circuit scale, showing that the reliability profile for some quantum algorithms is scale-dependent, with increased impact from radiation-induced faults as we increase the number of qubits. Finally, we also consider multi qubits faults, showing that they are much more critical than single faults. The fault injector and the data presented in this paper are available in a public repository to allow further analysis.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Evaluating the accuracy of the actuator line model against blade element momentum theory in uniform inflow
Authors:
Luoqin Liu,
Lucas Franceschini,
Daniel F. Oliveira,
Flavio C. C. Galeazzo,
Bruno S. Carmo,
Richard J. A. M. Stevens
Abstract:
We evaluate the accuracy of the actuator line model (ALM) approach by performing simulations for the NREL~5~MW wind turbine in uniform inflow using three large eddy simulation codes. The power and thrust coefficients obtained using the three codes agrees within $1\%$ when the grid spacing $Δ_{\rm grid} \le 5.25$~m, and are cross-validated against blade element momentum (BEM) theory. We find that t…
▽ More
We evaluate the accuracy of the actuator line model (ALM) approach by performing simulations for the NREL~5~MW wind turbine in uniform inflow using three large eddy simulation codes. The power and thrust coefficients obtained using the three codes agrees within $1\%$ when the grid spacing $Δ_{\rm grid} \le 5.25$~m, and are cross-validated against blade element momentum (BEM) theory. We find that the results of ALM converge towards BEM theory without the need for tip correction when the numerical resolution is increased. For $Δ_{\rm grid}=0.98$~m the difference between the power and thrust coefficient obtained using ALM and BEM is $4.5\%$ and $2.1\%$, respectively, although we note that no absolute convergence between ALM and BEM can be obtained as both models use different assumptions, such as the use of a force projection method in the ALM. The difference in the local axial and tangential forces along the blades obtained from ALM simulations using $Δ_{\rm grid} = 1.97$~m and $Δ_{\rm grid} = 0.98$~m can be as large as $10\%$. The effect of the number of actuator points on the obtained turbine power and thrust coefficients is limited as the results converge when the spacing between the actuator points is about three times the grid spacing. This insight on the required number of blade points can be used to improve the efficiency of actuator line simulations.
△ Less
Submitted 23 January, 2022;
originally announced January 2022.
-
Discovery of 74 new bright ZZ Ceti stars in the first three years of TESS
Authors:
A. D. Romero,
S. O. Kepler,
J. J. Hermes,
Larissa Antunes Amaral,
Murat Uzundag,
Zsófia Bognár,
Keaton J. Bell,
Madison VanWyngarden,
Andy Baran,
Ingrid Pelisoli,
Gabriela da Rosa Oliveira,
Detlev Koester,
T. S. Klippel,
Luciano Fraga,
Paul A. Bradley,
Maja Vučković,
Tyler M. Heintz,
Joshua S. Reding,
B. C. Kaiser,
Stéphane Charpinet
Abstract:
We report the discovery of 74 new pulsating DA white dwarf stars, or ZZ Cetis, from the data obtained by the Transiting Exoplanet Survey Satellite (TESS) mission, from Sectors 1 to 39, corresponding to the first 3 cycles. This includes objects from the Southern Hemisphere (Sectors 1-13 and 27-39) and the Northern Hemisphere (Sectors 14-26), observed with 120 s- and 20 s-cadence. Our sample likely…
▽ More
We report the discovery of 74 new pulsating DA white dwarf stars, or ZZ Cetis, from the data obtained by the Transiting Exoplanet Survey Satellite (TESS) mission, from Sectors 1 to 39, corresponding to the first 3 cycles. This includes objects from the Southern Hemisphere (Sectors 1-13 and 27-39) and the Northern Hemisphere (Sectors 14-26), observed with 120 s- and 20 s-cadence. Our sample likely includes 13 low-mass and one extremely low-mass white dwarf candidate, considering the mass determinations from fitting Gaia magnitudes and parallax. In addition, we present follow-up time series photometry from ground-based telescopes for 11 objects, which allowed us to detect a larger number of periods. For each object, we analysed the period spectra and performed an asteroseismological analysis, and we estimate the structure parameters of the sample, i.e., stellar mass, effective temperature and hydrogen envelope mass. We estimate a mean asteroseismological mass of <Msis>_~ 0.635 +/-0.015 Msun, excluding the candidate low or extremely-low mass objects. This value is in agreement with the mean mass using estimates from Gaia data, which is <Mphot> ~ 0.631 +/- 0.040 Msun, and with the mean mass of previously known ZZ Cetis of <M*>= 0.644 +/-0.034 Msun. Our sample of 74 new bright ZZ~Cetis increases the number of known ZZ~Cetis by $\sim$20 per cent.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
More Software Analytics Patterns: Broad-Spectrum Diagnostic and Embedded Improvements
Authors:
Duarte Oliveira,
João Fidalgo,
Joelma Choma,
Eduardo Guerra,
Filipe Correia
Abstract:
Software analytics is a data-driven approach to decision making, which allows software practitioners to leverage valuable insights from data about software to achieve higher development process productivity and improve different aspects of software quality. In previous work, a set of patterns for adopting a lean software analytics process was identified through a literature review. This paper pres…
▽ More
Software analytics is a data-driven approach to decision making, which allows software practitioners to leverage valuable insights from data about software to achieve higher development process productivity and improve different aspects of software quality. In previous work, a set of patterns for adopting a lean software analytics process was identified through a literature review. This paper presents two patterns to add to the original set, forming a pattern language for adopting software analytics practices that aims to inform decision-making activities of software practitioners. The writing of these two patterns was informed by the solutions employed in the context of two case studies on software analytics practices, and the patterns were further validated by searching for their occurrence in the literature. The pattern Broad-Spectrum Diagnostic proposes to conduct more broad analysis based on common metrics when the team does not have the expertise to understand the kind of problems that software analytics can help to solve; and the pattern Embedded Improvements suggests adding improvement tasks as part of other routine activities.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Gait Recognition Based on Deep Learning: A Survey
Authors:
Claudio Filipi Gonçalves dos Santos,
Diego de Souza Oliveira,
Leandro A. Passos,
Rafael Gonçalves Pires,
Daniel Felipe Silva Santos,
Lucas Pascotti Valem,
Thierry P. Moreira,
Marcos Cleison S. Santana,
Mateus Roder,
João Paulo Papa,
Danilo Colombo
Abstract:
In general, biometry-based control systems may not rely on individual expected behavior or cooperation to operate appropriately. Instead, such systems should be aware of malicious procedures for unauthorized access attempts. Some works available in the literature suggest addressing the problem through gait recognition approaches. Such methods aim at identifying human beings through intrinsic perce…
▽ More
In general, biometry-based control systems may not rely on individual expected behavior or cooperation to operate appropriately. Instead, such systems should be aware of malicious procedures for unauthorized access attempts. Some works available in the literature suggest addressing the problem through gait recognition approaches. Such methods aim at identifying human beings through intrinsic perceptible features, despite dressed clothes or accessories. Although the issue denotes a relatively long-time challenge, most of the techniques developed to handle the problem present several drawbacks related to feature extraction and low classification rates, among other issues. However, deep learning-based approaches recently emerged as a robust set of tools to deal with virtually any image and computer-vision related problem, providing paramount results for gait recognition as well. Therefore, this work provides a surveyed compilation of recent works regarding biometric detection through gait recognition with a focus on deep learning approaches, emphasizing their benefits, and exposing their weaknesses. Besides, it also presents categorized and characterized descriptions of the datasets, approaches, and architectures employed to tackle associated constraints.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Impact angle control of local intense d$B$/d$t$ variations during shock-induced substorms
Authors:
Denny M. Oliveira,
James M. Weygand,
Eftyhia Zesta,
Chigomezyo M. Ngwira,
Michael D. Hartinger,
Zhonghua Xu,
Barbara L. Giles,
Dan J. Gershman,
Marcos V. D. Silveira,
Vitor M. Souza
Abstract:
The impact of interplanetary shocks on the magnetosphere can trigger magnetic substorms that intensify auroral electrojet currents. These currents enhance ground magnetic field perturbations (d$B$/d$t$), which in turn generate geomagnetically induced currents (GICs) that can be detrimental to power transmission infrastructure. We perform a comparative study of d$B$/d$t$ variations in response to t…
▽ More
The impact of interplanetary shocks on the magnetosphere can trigger magnetic substorms that intensify auroral electrojet currents. These currents enhance ground magnetic field perturbations (d$B$/d$t$), which in turn generate geomagnetically induced currents (GICs) that can be detrimental to power transmission infrastructure. We perform a comparative study of d$B$/d$t$ variations in response to two similarly strong shocks, but with one being nearly frontal, and the other, highly inclined. Multi-instrument analyses by the Time History of Events and Macroscale Interactions during Substorms (THEMIS) and Los Alamos National Laboratory spacecraft show that nightside substorm-time energetic particle injections are more intense and occur faster in the case of the nearly head-on impact. The same trend is observed in d$B$/d$t$ variations recorded by THEMIS ground magnetometers. THEMIS all-sky imager data show a fast and clear poleward auroral expansion in the first case, which does not clearly occur in the second case. Strong field-aligned currents computed with the spherical elementary current system (SECS) technique occur in both cases, but the current variations resulting from the inclined shock impact are weaker and slower compared to the nearly frontal case. SECS analyses also reveal that geographic areas with d$B$/d$t$ surpassing the thresholds 1.5 and 5 nT/s, usually linked to high-risk GICs, are larger and occur earlier due to the symmetric compression caused by the nearly head-on impact. These results, with profound space weather implications, suggest that shock impact angles affect the geospace driving conditions and the location and intensity of the subsequent d$B$/d$t$ variations during substorm activity.
△ Less
Submitted 30 November, 2021;
originally announced December 2021.
-
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits
Authors:
Daniel Oliveira,
Edoardo Giusto,
Betis Baheri,
Qiang Guan,
Bartolomeo Montrucchio,
Paolo Rech
Abstract:
Quantum computing is one of the most promising technology advances of the latest years. Once only a conceptual idea to solve physics simulations, quantum computation is today a reality, with numerous machines able to execute quantum algorithms. One of the hardest challenges in quantum computing is reliability. Qubits are highly sensitive to noise, which can make the output useless. Moreover, latel…
▽ More
Quantum computing is one of the most promising technology advances of the latest years. Once only a conceptual idea to solve physics simulations, quantum computation is today a reality, with numerous machines able to execute quantum algorithms. One of the hardest challenges in quantum computing is reliability. Qubits are highly sensitive to noise, which can make the output useless. Moreover, lately it has been shown that superconducting qubits are extremely susceptible to external sources of faults, such as ionizing radiation. When adopted in large scale, radiation-induced errors are expected to become a serious challenge for qubits reliability. In this paper, we propose an evaluation of the impact of transient faults in the execution of quantum circuits. Inspired by the Architectural and Program Vulnerability Factors, widely adopted to characterize the reliability of classical computing architectures and algorithms, we propose the Quantum Vulnerability Factor (QVF) as a metric to measure the impact that the corruption of a qubit has on the circuit output probability distribution. First, we model faults based on the latest studies on real machines and recently performed radiation experiments. Then, we design a quantum fault injector, built over Qiskit, and characterize the propagation of faults in quantum circuits. We report the finding of more than 15,000,000 fault injections, evaluating the reliability of three quantum circuits and identifying the faults and qubits that are more likely than others to impact the output. With our results, we give guidelines on how to map the qubits in the real quantum computer to reduce the output error and to reduce the probability of having a radiation-induced corruption to modify the output. Finally, we compare the simulation results with experiments on physical quantum computers.
△ Less
Submitted 13 November, 2021;
originally announced November 2021.
-
Efficient solvers for Armijo's backtracking problem
Authors:
Ivo Fagundes David de Oliveira,
Ricardo Hiroshi Caldeira Takahashi
Abstract:
Backtracking is an inexact line search procedure that selects the first value in a sequence $x_0, x_0β, x_0β^2...$ that satisfies $g(x)\leq 0$ on $\mathbb{R}_+$ with $g(x)\leq 0$ iff $x\leq x^*$. This procedure is widely used in descent direction optimization algorithms with Armijo-type conditions. It both returns an estimate in $(βx^*,x^*]$ and enjoys an upper-bound $\lceil \log_β ε/x_0 \rceil$ o…
▽ More
Backtracking is an inexact line search procedure that selects the first value in a sequence $x_0, x_0β, x_0β^2...$ that satisfies $g(x)\leq 0$ on $\mathbb{R}_+$ with $g(x)\leq 0$ iff $x\leq x^*$. This procedure is widely used in descent direction optimization algorithms with Armijo-type conditions. It both returns an estimate in $(βx^*,x^*]$ and enjoys an upper-bound $\lceil \log_β ε/x_0 \rceil$ on the number of function evaluations to terminate, with $ε$ a lower bound on $x^*$. The basic bracketing mechanism employed in several root-searching methods is adapted here for the purpose of performing inexact line searches, leading to a new class of inexact line search procedures. The traditional bisection algorithm for root-searching is transposed into a very simple method that completes the same inexact line search in at most $\lceil \log_2 \log_β ε/x_0 \rceil$ function evaluations. A recent bracketing algorithm for root-searching which presents both minmax function evaluation cost (as the bisection algorithm) and superlinear convergence is also transposed, asymptotically requiring $\sim \log \log \log ε/x_0 $ function evaluations for sufficiently smooth functions. Other bracketing algorithms for root-searching can be adapted in the same way. Numerical experiments suggest time savings of 50\% to 80\% in each call to the inexact search procedure.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Super-Suppression of Long Phonon Mean-Free-Paths in Nano-engineered Si due to Heat Current Anticorrelations
Authors:
S. Aria Hosseini,
Alathea Davies,
Ian Dickey,
Neophytos Neophytou,
P. Alex Greaney,
Laura de Sousa Oliveira
Abstract:
The ability to minimize the thermal conductivity of dielectrics with minimal structural intervention that could affect electrical properties is an important capability for engineering thermoelectric efficiency in low-cost materials such as Si. We recently reported the discovery of special arrangements for nanoscale pores in Si that produce a particularly large reduction in thermal conductivity acc…
▽ More
The ability to minimize the thermal conductivity of dielectrics with minimal structural intervention that could affect electrical properties is an important capability for engineering thermoelectric efficiency in low-cost materials such as Si. We recently reported the discovery of special arrangements for nanoscale pores in Si that produce a particularly large reduction in thermal conductivity accompanied by strongly anticorrelated heat current fluctuations, a phenomenon that is missed by the diffuse adiabatic boundary conditions conventionally used in numerical Boltzmann transport models. This manuscript presents the results of molecular dynamics simulations and a Monte Carlo ray tracing model that teases apart this phenomenon to reveal that special pore layouts elastically backscatter long-wavelength heat-carrying phonons. This means that heat carriage by a phonon before scattering is undone by the scattered phonon, resulting in an effective mean-free-path that is significantly shorter than the geometric line-of-sight to the pores. This effect is particularly noticeable for the long-wavelength, long mean-free-path phonons whose transport is impeded drastically more than is expected purely from the usual considerations of scattering defined by the distance between defects. This super-suppression of the mean-free-path below the characteristic length scale of the nanostructuring offers a route for minimizing thermal conductivity with minimal structural impact, while the stronger impact on long wavelengths offers possibilities for the design of band-pass phonon filtering. Moreover, the ray tracing model developed in this paper shows that different forms of correlated scattering imprint a unique signature in the heat current autocorrelation function that could be used as a diagnostic in other nanostructured systems.
△ Less
Submitted 14 May, 2022; v1 submitted 21 October, 2021;
originally announced October 2021.
-
The current state and future directions of modeling thermosphere density enhancements during extreme magnetic storms
Authors:
Denny M. Oliveira,
Eftyhia Zesta,
Piyush M. Mehta,
Richard J. Licata,
Marcin D. Pilinski,
W. Kent Tobiska,
Hisashi Hayakawa
Abstract:
Satellites, crewed spacecraft and stations in low-Earth orbit (LEO) are very sensitive to atmospheric drag. A satellite's lifetime and orbital tracking become increasingly inaccurate or uncertain during magnetic storms. Given the planned increase of government and private satellite presence in LEO, the need for accurate density predictions for collision avoidance and lifetime optimization, particu…
▽ More
Satellites, crewed spacecraft and stations in low-Earth orbit (LEO) are very sensitive to atmospheric drag. A satellite's lifetime and orbital tracking become increasingly inaccurate or uncertain during magnetic storms. Given the planned increase of government and private satellite presence in LEO, the need for accurate density predictions for collision avoidance and lifetime optimization, particularly during extreme events, has become an urgent matter and requires comprehensive international collaboration. Additionally, long-term solar activity models and historical data suggest that solar activity will significantly increase in the following years and decades. In this article, we briefly summarize the main achievements in the research of thermosphere response to extreme magnetic storms occurring particularly after the launching of many satellites with state-of-the-art accelerometers from which high-accuracy density can be determined. We find that the performance of an empirical model with data assimilation is higher than its performance without data assimilation during all extreme storm phases. We discuss how forecasting models can be improved by looking into two directions: first, to the past, by adapting historical extreme storm datasets for density predictions, and second, to the future, by facilitating the assimilation of large-scale thermosphere data sets that will be collected in future events. Therefore, this topic is relevant to the scientific community, government agencies that operate satellites, and the private sector with assets operating in LEO.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
M dwarf spectral indices at moderate resolution: accurate $T_{\mathrm{eff}}$ and [Fe/H] for 178 southern stars
Authors:
E. Costa-Almeida,
G. F. Porto de Mello,
R. E. Giribaldi,
D. Lorenzo Oliveira,
M. L. Ubaldo-Melo
Abstract:
We present a spectroscopic and photometric calibration to derive effective temperatures $T_{\mathrm{eff}}$ and metallicities [Fe/H] for M dwarfs, based on a Principal Component Analysis of 147 spectral indices measured off moderate resolution $R \sim 11\,000$), high S/N ($>100$) spectra in the $λλ$ 8390-8834 region, plus the J$-$H color. Internal uncertainties, estimated by the residuals, are 81 K…
▽ More
We present a spectroscopic and photometric calibration to derive effective temperatures $T_{\mathrm{eff}}$ and metallicities [Fe/H] for M dwarfs, based on a Principal Component Analysis of 147 spectral indices measured off moderate resolution $R \sim 11\,000$), high S/N ($>100$) spectra in the $λλ$ 8390-8834 region, plus the J$-$H color. Internal uncertainties, estimated by the residuals, are 81 K and 0.12 dex, respectively, for $T_{\mathrm{eff}}$ and [Fe/H], the calibrations being valid for 3050 K $< T_{\mathrm{eff}} <$ 4100 K and $-$0.45 $<$ [Fe/H] $<$ $+$0.50 dex. The PCA calibration is a competitive model-independent method to derive $T_{\mathrm{eff}}$ and [Fe/H] for large samples of M dwarfs, well suited to the available database of far-red spectra. The median uncertainties are 105 K and 0.23 dex for $T_{\mathrm{eff}}$ and [Fe/H], respectively, estimated by Monte Carlo simulations. We compare our values to other works based on photometric and spectroscopic techniques and find median differences 75 $\pm$ 273 K and 0.02 $\pm$ 0.31 dex for $T_{\mathrm{eff}}$ and [Fe/H], respectively, achieving good accuracy but relatively low precision. We find considerable disagreement in the literature between atmospheric parameters for stars in common. We use the new calibration to derive $T_{\mathrm{eff}}$ and [Fe/H] for 178 K7-M5 dwarfs, many previously unstudied. Our metallicity distribution function for nearby M dwarfs peaks at [Fe/H]$\sim$-0.10 dex, in good agreement with the RAVE distribution for GK dwarfs. We present radial velocities (internal precision 1.4 km/s) for 99 objects without previous measurements. The kinematics of the sample shows it to be fully dominated by thin/thick disk stars, excepting the well-known high-velocity Kapteyn's star.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
On the Complexity of Intersection Non-emptiness for Star-Free Language Classes
Authors:
Emmanuel Arrighi,
Henning Fernau,
Stefan Hoffmann,
Markus Holzer,
Ismaël Jecker,
Mateus de Oliveira Oliveira,
Petra Wolf
Abstract:
In the Intersection Non-Emptiness problem, we are given a list of finite automata $A_1,A_2,\dots,A_m$ over a common alphabet $Σ$ as input, and the goal is to determine whether some string $w\in Σ^*$ lies in the intersection of the languages accepted by the automata in the list. We analyze the complexity of the Intersection Non-Emptiness problem under the promise that all input automata accept a la…
▽ More
In the Intersection Non-Emptiness problem, we are given a list of finite automata $A_1,A_2,\dots,A_m$ over a common alphabet $Σ$ as input, and the goal is to determine whether some string $w\in Σ^*$ lies in the intersection of the languages accepted by the automata in the list. We analyze the complexity of the Intersection Non-Emptiness problem under the promise that all input automata accept a language in some level of the dot-depth hierarchy, or some level of the Straubing-Thérien hierarchy. Automata accepting languages from the lowest levels of these hierarchies arise naturally in the context of model checking. We identify a dichotomy in the dot-depth hierarchy by showing that the problem is already NP-complete when all input automata accept languages of the levels zero or one half and already PSPACE-hard when all automata accept a language from the level one. Conversely, we identify a tetrachotomy in the Straubing-Thérien hierarchy. More precisely, we show that the problem is in AC$^0$ when restricted to level zero; complete for LOGSPACE or NLOGSPACE, depending on the input representation, when restricted to languages in the level one half; NP-complete when the input is given as DFAs accepting a language in from level one or three half; and finally, PSPACE-complete when the input automata accept languages in level two or higher. Moreover, we show that the proof technique used to show containment in NP for DFAs accepting languages in the Straubing-Thérien hierarchy levels one ore three half does not generalize to the context of NFAs. To prove this, we identify a family of languages that provide an exponential separation between the state complexity of general NFAs and that of partially ordered NFAs. To the best of our knowledge, this is the first superpolynomial separation between these two models of computation.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Evaluating Code Readability and Legibility: An Examination of Human-centric Studies
Authors:
Delano Oliveira,
Reydne Bruno,
Fernanda Madeiral,
Fernando Castor
Abstract:
Reading code is an essential activity in software maintenance and evolution. Several studies with human subjects have investigated how different factors, such as the employed programming constructs and naming conventions, can impact code readability, i.e., what makes a program easier or harder to read and apprehend by developers, and code legibility, i.e., what influences the ease of identifying e…
▽ More
Reading code is an essential activity in software maintenance and evolution. Several studies with human subjects have investigated how different factors, such as the employed programming constructs and naming conventions, can impact code readability, i.e., what makes a program easier or harder to read and apprehend by developers, and code legibility, i.e., what influences the ease of identifying elements of a program. These studies evaluate readability and legibility by means of different comprehension tasks and response variables. In this paper, we examine these tasks and variables in studies that compare programming constructs, coding idioms, naming conventions, and formatting guidelines, e.g., recursive vs. iterative code. To that end, we have conducted a systematic literature review where we found 54 relevant papers. Most of these studies evaluate code readability and legibility by measuring the correctness of the subjects' results (83.3%) or simply asking their opinions (55.6%). Some studies (16.7%) rely exclusively on the latter variable.There are still few studies that monitor subjects' physical signs, such as brain activation regions (5%). Moreover, our study shows that some variables are multi-faceted. For instance, correctness can be measured as the ability to predict the output of a program, answer questions about its behavior, or recall parts of it. These results make it clear that different evaluation approaches require different competencies from subjects, e.g., tracing the program vs. summarizing its goal vs. memorizing its text. To assist researchers in the design of new studies and improve our comprehension of existing ones, we model program comprehension as a learning activity by adapting a preexisting learning taxonomy. This adaptation indicates that some competencies are often exercised in these evaluations whereas others are rarely targeted.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
Recommending Code Understandability Improvements based on Code Reviews
Authors:
Delano Oliveira
Abstract:
Developers spend 70% of their time understanding code. Code that is easy to read can save time, while hard-to-read code can lead to the introduction of bugs. However, it is difficult to establish what makes code more understandable. Although there are guides and directives on improving code understandability, in some contexts, these practices can have a detrimental effect. Practical software devel…
▽ More
Developers spend 70% of their time understanding code. Code that is easy to read can save time, while hard-to-read code can lead to the introduction of bugs. However, it is difficult to establish what makes code more understandable. Although there are guides and directives on improving code understandability, in some contexts, these practices can have a detrimental effect. Practical software development projects often employ code review to improve code quality, including understandability. Reviewers are often senior developers who have contributed extensively to projects and have an in-depth understanding of the impacts of different solutions on code understandability. This paper is an early research proposal to recommend code understandability improvements based on code reviewer knowledge. The core of the proposal comprises a dataset of code understandability improvements extracted from code reviews. This dataset will serve as a basis to train machine learning systems to recommend understandability improvements.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
Toward Reusable Science with Readable Code and Reproducibility
Authors:
Layan Bahaidarah,
Ethan Hung,
Andreas F. De Melo Oliveira,
Jyotsna Penumaka,
Lukas Rosario,
Ana Trisovic
Abstract:
An essential part of research and scientific communication is researchers' ability to reproduce the results of others. While there have been increasing standards for authors to make data and code available, many of these files are hard to re-execute in practice, leading to a lack of research reproducibility. This poses a major problem for students and researchers in the same field who cannot lever…
▽ More
An essential part of research and scientific communication is researchers' ability to reproduce the results of others. While there have been increasing standards for authors to make data and code available, many of these files are hard to re-execute in practice, leading to a lack of research reproducibility. This poses a major problem for students and researchers in the same field who cannot leverage the previously published findings for study or further inquiry. To address this, we propose an open-source platform named RE3 that helps improve the reproducibility and readability of research projects involving R code. Our platform incorporates assessing code readability with a machine learning model trained on a code readability survey and an automatic containerization service that executes code files and warns users of reproducibility errors. This process helps ensure the reproducibility and readability of projects and therefore fast-track their verification and reuse.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
A Tutorial on Trusted and Untrusted non-3GPP Accesses in 5G Systems -- First Steps Towards a Unified Communications Infrastructure
Authors:
Mario Teixeira Lemes,
Antonio Marcos Alberti,
Cristiano Bonato Both,
Antonio C. de Oliveira Jr.,
Kleber Vieira Cardoso
Abstract:
Fifth-generation (5G) systems are designed to enable convergent access-agnostic service availability. This means that 5G services will be available over 5G New Radio air interface and also through other non-Third Generation Partnership Project (3GPP) access networks, e.g., IEEE 802.11 (Wi-Fi). 3GPP has recently published the Release 16 that includes trusted non-3GPP access network concept and wire…
▽ More
Fifth-generation (5G) systems are designed to enable convergent access-agnostic service availability. This means that 5G services will be available over 5G New Radio air interface and also through other non-Third Generation Partnership Project (3GPP) access networks, e.g., IEEE 802.11 (Wi-Fi). 3GPP has recently published the Release 16 that includes trusted non-3GPP access network concept and wireless wireline convergence. The main goal of this tutorial is to present an overview of access to 5G core via non-3GPP access networks specified by 3GPP until Release 16 (i.e., untrusted, trusted, and wireline access). The tutorial describes aspects of the convergence of a 5G system and these non-3GPP access networks, such as the authentication and authorization procedures and the data session establishment from the point of view of protocol stack and exchanged messages between the network functions. In order to illustrate several concepts and part of 3GPP specification, we present a basic but fully operational implementation of untrusted non-3GPP access using WLAN. We perform experiments that demonstrate how a Wi-Fi user is authorized in a 5G core and establishes user plane connectivity to a data network. Moreover, we evaluate the performance of this access in terms of time consumed, number of messages, and protocol overhead to established data sessions.
△ Less
Submitted 11 November, 2022; v1 submitted 18 September, 2021;
originally announced September 2021.
-
On the Compression of Neural Networks Using $\ell_0$-Norm Regularization and Weight Pruning
Authors:
Felipe Dennis de Resende Oliveira,
Eduardo Luiz Ortiz Batista,
Rui Seara
Abstract:
Despite the growing availability of high-capacity computational platforms, implementation complexity still has been a great concern for the real-world deployment of neural networks. This concern is not exclusively due to the huge costs of state-of-the-art network architectures, but also due to the recent push towards edge intelligence and the use of neural networks in embedded applications. In thi…
▽ More
Despite the growing availability of high-capacity computational platforms, implementation complexity still has been a great concern for the real-world deployment of neural networks. This concern is not exclusively due to the huge costs of state-of-the-art network architectures, but also due to the recent push towards edge intelligence and the use of neural networks in embedded applications. In this context, network compression techniques have been gaining interest due to their ability for reducing deployment costs while keeping inference accuracy at satisfactory levels. The present paper is dedicated to the development of a novel compression scheme for neural networks. To this end, a new form of $\ell_0$-norm-based regularization is firstly developed, which is capable of inducing strong sparseness in the network during training. Then, targeting the smaller weights of the trained network with pruning techniques, smaller yet highly effective networks can be obtained. The proposed compression scheme also involves the use of $\ell_2$-norm regularization to avoid overfitting as well as fine tuning to improve the performance of the pruned network. Experimental results are presented aiming to show the effectiveness of the proposed scheme as well as to make comparisons with competing approaches.
△ Less
Submitted 18 December, 2023; v1 submitted 10 September, 2021;
originally announced September 2021.
-
HELIX: Data-driven characterization of Brazilian land snails
Authors:
Marcelo N. Almeida,
Rodolfo Alves de Oliveira,
Luiz Olmes,
Gustavo S. Semaan,
Daniel de Oliveira,
Lucio Santos,
Marcos Bedo
Abstract:
Decision-support systems benefit from hidden patterns extracted from digital information. In the specific domain of gastropod characterization, morphometrical measurements support biologists in the identification of land snail specimens. Although snails can be easily identified by their excretory and reproductive systems, the after-death mollusk body is commonly inaccessible because of either soft…
▽ More
Decision-support systems benefit from hidden patterns extracted from digital information. In the specific domain of gastropod characterization, morphometrical measurements support biologists in the identification of land snail specimens. Although snails can be easily identified by their excretory and reproductive systems, the after-death mollusk body is commonly inaccessible because of either soft material deterioration or fossilization. This study aims at characterizing Brazilian land snails by morphometrical data features manually taken from the shells. In particular, we examined a dataset of shells by using different learning models that labeled snail specimens with a precision up to 97.5% (F1-Score = .975, CKC = .967 and ROC Area = .998). The extracted patterns describe similarities and trends among land snail species and indicates possible outliers physiologies due to climate traits and breeding. Finally, we show some morphometrical characteristics dominate others according to different feature selection biases. Those data-based patterns can be applied to fast land snail identification whenever their bodies are unavailable, as in the recurrent cases of lost shells in nature or private and museum collections.
△ Less
Submitted 14 September, 2021; v1 submitted 10 September, 2021;
originally announced September 2021.
-
Validation of edge turbulence codes against the TCV-X21 diverted L-mode reference case
Authors:
D. S. Oliveira,
T. Body,
D. Galassi,
C. Theiler,
E. Laribi,
P. Tamain,
A. Stegmeir,
M. Giacomin,
W. Zholobenko,
P. Ricci,
H. Bufferand,
J. A. Boedo,
G. Ciraolo,
C. Colandrea,
D. Coster,
H. de Oliveira,
G. Fourestey,
S. Gorno,
F. Imbeaux,
F. Jenko,
V. Naulin,
N. Offeddu,
H. Reimerdes,
E. Serre,
C. K. Tsui
, et al. (5 additional authors not shown)
Abstract:
Self-consistent full-size turbulent-transport simulations of the divertor and SOL of existing tokamaks have recently become feasible. This enables the direct comparison of turbulence simulations against experimental measurements. In this work, we perform a series of diverted Ohmic L-mode discharges on the TCV tokamak, building a first-of-a-kind dataset for the validation of edge turbulence models.…
▽ More
Self-consistent full-size turbulent-transport simulations of the divertor and SOL of existing tokamaks have recently become feasible. This enables the direct comparison of turbulence simulations against experimental measurements. In this work, we perform a series of diverted Ohmic L-mode discharges on the TCV tokamak, building a first-of-a-kind dataset for the validation of edge turbulence models. This dataset, referred to as TCV-X21, contains measurements from 5 diagnostic systems -- giving a total of 45 1- and 2-D comparison observables in two toroidal magnetic field directions. The dataset is used to validate three flux-driven 3D fluid-turbulence models: GBS, GRILLIX and TOKAM3X. With each model, we perform simulations of the TCV-X21 scenario, tuning the particle and power source rates to achieve a reasonable match of the upstream separatrix value of density and electron temperature. We find that the simulations match the experimental profiles for most observables at the OMP -- both in terms of profile shape and absolute magnitude -- while a poorer agreement is found towards the divertor targets. The match between simulation and experiment is seen to be sensitive to the value of the resistivity, the heat conductivities, the power injection rate and the choice of sheath boundary conditions. Additionally, despite targeting a sheath-limited regime, the discrepancy between simulations and experiment also suggests that the neutral dynamics should be included. The results of this validation show that turbulence models are able to perform simulations of existing devices and achieve reasonable agreement with experimental measurements. Where disagreement is found, the validation helps to identify how the models can be improved. By publicly releasing the experimental dataset, this work should help to guide and accelerate the development of predictive turbulence simulations of the edge and SOL.
△ Less
Submitted 29 November, 2021; v1 submitted 3 September, 2021;
originally announced September 2021.
-
Second-Order Finite Automata
Authors:
Alexsander Andrade de Melo,
Mateus de Oliveira Oliveira
Abstract:
Traditionally, finite automata theory has been used as a framework for the representation of possibly infinite sets of strings. In this work, we introduce the notion of second-order finite automata, a formalism that combines finite automata with ordered decision diagrams, with the aim of representing possibly infinite {\em sets of sets} of strings. Our main result states that second-order finite a…
▽ More
Traditionally, finite automata theory has been used as a framework for the representation of possibly infinite sets of strings. In this work, we introduce the notion of second-order finite automata, a formalism that combines finite automata with ordered decision diagrams, with the aim of representing possibly infinite {\em sets of sets} of strings. Our main result states that second-order finite automata can be canonized with respect to the second-order languages they represent. Using this canonization result, we show that sets of sets of strings represented by second-order finite automata are closed under the usual Boolean operations, such as union, intersection, difference and even under a suitable notion of complementation. Additionally, emptiness of intersection and inclusion are decidable.
We provide two algorithmic applications for second-order automata. First, we show that several width/size minimization problems for deterministic and nondeterministic ODDs are solvable in fixed-parameter tractable time when parameterized by the width of the input ODD. In particular, our results imply FPT algorithms for corresponding width/size minimization problems for ordered binary decision diagrams (OBDDs) with a fixed variable ordering. Previously, only algorithms that take exponential time in the size of the input OBDD were known for width minimization, even for OBDDs of constant width. Second, we show that for each $k$ and $w$ one can count the number of distinct functions computable by ODDs of width at most $w$ and length $k$ in time $h(|Σ|,w)\cdot k^{O(1)}$, for a suitable $h:\mathbb{N}\times \mathbb{N}\rightarrow \mathbb{N}$. This improves exponentially on the time necessary to explicitly enumerate all such functions, which is exponential in both the width parameter $w$ and in the length $k$ of the ODDs.
△ Less
Submitted 29 August, 2021;
originally announced August 2021.
-
Early-exit deep neural networks for distorted images: providing an efficient edge offloading
Authors:
Roberto G. Pacheco,
Fernanda D. V. R. Oliveira,
Rodrigo S. Couto
Abstract:
Edge offloading for deep neural networks (DNNs) can be adaptive to the input's complexity by using early-exit DNNs. These DNNs have side branches throughout their architecture, allowing the inference to end earlier in the edge. The branches estimate the accuracy for a given input. If this estimated accuracy reaches a threshold, the inference ends on the edge. Otherwise, the edge offloads the infer…
▽ More
Edge offloading for deep neural networks (DNNs) can be adaptive to the input's complexity by using early-exit DNNs. These DNNs have side branches throughout their architecture, allowing the inference to end earlier in the edge. The branches estimate the accuracy for a given input. If this estimated accuracy reaches a threshold, the inference ends on the edge. Otherwise, the edge offloads the inference to the cloud to process the remaining DNN layers. However, DNNs for image classification deals with distorted images, which negatively impact the branches' estimated accuracy. Consequently, the edge offloads more inferences to the cloud. This work introduces expert side branches trained on a particular distortion type to improve robustness against image distortion. The edge detects the distortion type and selects appropriate expert branches to perform the inference. This approach increases the estimated accuracy on the edge, improving the offloading decisions. We validate our proposal in a realistic scenario, in which the edge offloads DNN inference to Amazon EC2 instances.
△ Less
Submitted 25 August, 2021; v1 submitted 20 August, 2021;
originally announced August 2021.
-
A technique to enable frequency dependent power savings in a level crossing analog-to-digital converter
Authors:
Lucas Moura Santana,
Duarte Lopes de Oliveira,
Lester de Abreu Faria
Abstract:
The level crossing analog-to-digital converters are meant for the effective conversion of sparse signals by construction. In these converters, the bandwidth-power trade-off requires a re-design of the comparators which takes a lot of time and effort to reach the application optimum point. Inspired by synchronous converters that have a dynamic power component that can be traded with bandwidth with…
▽ More
The level crossing analog-to-digital converters are meant for the effective conversion of sparse signals by construction. In these converters, the bandwidth-power trade-off requires a re-design of the comparators which takes a lot of time and effort to reach the application optimum point. Inspired by synchronous converters that have a dynamic power component that can be traded with bandwidth with the change of a clock frequency, a technique to allow such trade-off in the level crossing converter was developed. The resulting level crossing ADC has an input signal dependent dynamic power which can reach up to 42\% OFF time during the conversion of sine waves, achieving 45.5% power reduction in the simulated design with TSMC 180nm PDK.
△ Less
Submitted 17 August, 2021;
originally announced August 2021.
-
A 1V 5-bits Low Power Level Crossing ADC with OFF state in idle time for bio-medical applications in 0.18um CMOS
Authors:
Lucas Moura Santana,
Duarte Lopes de Oliveira,
Lester de Abreu Faria
Abstract:
The ubiquitous use of sensing and signal processing is increasing exponentially with the advance of the Internet of Everything (IoE). In this context, the design of every time more power efficient sensor nodes is a must. Within these nodes, one of the most power-hungry components are the analog-to-digital converters (ADC). These components are used everywhere to translate real-world analog signals…
▽ More
The ubiquitous use of sensing and signal processing is increasing exponentially with the advance of the Internet of Everything (IoE). In this context, the design of every time more power efficient sensor nodes is a must. Within these nodes, one of the most power-hungry components are the analog-to-digital converters (ADC). These components are used everywhere to translate real-world analog signals into computer intelligible digital signals. One of the promising architecture for the sensing of physiological signals is the level crossing ADC due to the sparse characteristics of those signals. One of the challenges to improve the power efficiency of this type of ADC lies in the use of continuous comparators to keep track of the input signal within the voltage references. The aim of this work is to investigate the impact of using continuous comparator which can be turned off without incurring error to the conversion of the level crossing ADC. New boundaries will be set for the correct behavior of the level crossing ADC together with the conditions for power saving with the proposed architecture. A 1V 5-bits level crossing ADC was implemented using the TSMC 0.18um process and fabricated for laboratory measurements. The ADC consumes 12.2uW during tracking state and with the proposed technique, the reduction of the average power can go from 4.2% to 45.5% depending on the activity and the type of the input signal.
△ Less
Submitted 17 August, 2021;
originally announced August 2021.
-
Controlling Weather Field Synthesis Using Variational Autoencoders
Authors:
Dario Augusto Borges Oliveira,
Jorge Guevara Diaz,
Bianca Zadrozny,
Campbell Watson
Abstract:
One of the consequences of climate change is anobserved increase in the frequency of extreme cli-mate events. That poses a challenge for weatherforecast and generation algorithms, which learnfrom historical data but should embed an often un-certain bias to create correct scenarios. This paperinvestigates how mapping climate data to a knowndistribution using variational autoencoders mighthelp explo…
▽ More
One of the consequences of climate change is anobserved increase in the frequency of extreme cli-mate events. That poses a challenge for weatherforecast and generation algorithms, which learnfrom historical data but should embed an often un-certain bias to create correct scenarios. This paperinvestigates how mapping climate data to a knowndistribution using variational autoencoders mighthelp explore such biases and control the synthesisof weather fields towards more extreme climatescenarios. We experimented using a monsoon-affected precipitation dataset from southwest In-dia, which should give a roughly stable pattern ofrainy days and ease our investigation. We reportcompelling results showing that mapping complexweather data to a known distribution implementsan efficient control for weather field synthesis to-wards more (or less) extreme scenarios.
△ Less
Submitted 30 July, 2021;
originally announced August 2021.
-
Lumen: A Machine Learning Framework to Expose Influence Cues in Text
Authors:
Hanyu Shi,
Mirela Silva,
Daniel Capecci,
Luiz Giovanini,
Lauren Czech,
Juliana Fernandes,
Daniela Oliveira
Abstract:
Phishing and disinformation are popular social engineering attacks with attackers invariably applying influence cues in texts to make them more appealing to users. We introduce Lumen, a learning-based framework that exposes influence cues in text: (i) persuasion, (ii) framing, (iii) emotion, (iv) objectivity/subjectivity, (v) guilt/blame, and (vi) use of emphasis. Lumen was trained with a newly de…
▽ More
Phishing and disinformation are popular social engineering attacks with attackers invariably applying influence cues in texts to make them more appealing to users. We introduce Lumen, a learning-based framework that exposes influence cues in text: (i) persuasion, (ii) framing, (iii) emotion, (iv) objectivity/subjectivity, (v) guilt/blame, and (vi) use of emphasis. Lumen was trained with a newly developed dataset of 3K texts comprised of disinformation, phishing, hyperpartisan news, and mainstream news. Evaluation of Lumen in comparison to other learning models showed that Lumen and LSTM presented the best F1-micro score, but Lumen yielded better interpretability. Our results highlight the promise of ML to expose influence cues in text, towards the goal of application in automatic labeling tools to improve the accuracy of human-based detection and reduce the likelihood of users falling for deceptive online content.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
AGNIFS survey of local AGN: GMOS-IFU data and outflows in 30 sources
Authors:
D. Ruschel-Dutra,
T. Storchi-Bergmann,
A. Schnorr-Müller,
R. A. Riffel,
B. Dall'Agnol de Oliveira,
D. Lena,
A. Robinson,
N. Nagar,
M. Elvis
Abstract:
We analyse optical datacubes of the inner kiloparsec of 30 local ($z\le0.02$) active galactic nuclei (AGN) hosts that our research group, AGNIFS, has collected over the past decade via observations with the integral field units of the Gemini Multi-Object Spectrographs. Spatial resolutions range between $50~{\rm pc}$ and $300~{\rm pc}$ and spectral coverage is from $4800~\mathring{A}$ or…
▽ More
We analyse optical datacubes of the inner kiloparsec of 30 local ($z\le0.02$) active galactic nuclei (AGN) hosts that our research group, AGNIFS, has collected over the past decade via observations with the integral field units of the Gemini Multi-Object Spectrographs. Spatial resolutions range between $50~{\rm pc}$ and $300~{\rm pc}$ and spectral coverage is from $4800~\mathring{A}$ or $5600~\mathring{A}$ to $7000~\mathring{A}$, at velocity resolutions of $\approx 50~{\rm km~s^{-1}}$. We derive maps of the gas excitation and kinematics, determine the AGN ionisation axis -- which has random orientation relative to the galaxy, and the kinematic major axes of the emitting gas. We find that rotation dominates the gas kinematics in most cases, but is disturbed by the presence of inflows and outflows. Outflows have been found in 21 nuclei, usually along the ionisation axis. The gas velocity dispersion is traced by $W_{80}$ (velocity width encompassing 80 per cent of the line flux), adopted as a tracer of outflows. In 7 sources $W_{80}$ is enhanced perpendicularly to the ionisation axis, indicating lateral expansion of the outflow. We have estimated mass-outflow rates $\dot{M}$ and powers $\dot{E}$, finding median values of $\log\,[\dot{M}/({\rm\,M_\odot\,yr^{-1}})]=-2.1_{-1.0}^{+1.6}$ and $\log\,[\dot{E}/({\rm\,erg\,s^{-1}})]=38.5_{-0.9}^{+1.8}$, respectively. Both quantities show a mild correlation with the AGN luminosity ($L_{\rm AGN}$). $\dot{E}$ is of the order of 0.01 $L_{\rm AGN}$ for 4 sources, but much lower for the majority (9) of the sources, with a median value of $\log\,[\dot{E}/L_{\rm AGN}]=-5.34_{-0.9}^{+3.2}$ indicating that typical outflows in the local Universe are unlikely to significantly impact their host galaxy evolution.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Extremum seeking control applied to airfoil trailing-edge noise suppression
Authors:
Tarcísio Costa Déda Oliveira,
William Roberto Wolf
Abstract:
Extremum seeking control (ESC) and its slope seeking generalization are applied in a high-fidelity flow simulation framework for reduction of acoustic noise generated by a NACA0012 airfoil. Two Reynolds numbers are studied for which different noise generation mechanisms are excited. For a low Reynolds number flow, the scattering of vortex shedding at the airfoil trailing edge produces tonal noise…
▽ More
Extremum seeking control (ESC) and its slope seeking generalization are applied in a high-fidelity flow simulation framework for reduction of acoustic noise generated by a NACA0012 airfoil. Two Reynolds numbers are studied for which different noise generation mechanisms are excited. For a low Reynolds number flow, the scattering of vortex shedding at the airfoil trailing edge produces tonal noise while, for a moderate Reynolds number case, boundary layer instabilities scatter at the trailing edge leading to noise emission at multiple tones superimposed on a broadband hump. Different control setups are investigated and they are configured to either find an optimal steady actuator intensity or an optimal position for a blowing/suction device. Implementation details are discussed regarding the control modules and design of digital filters.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Leveraging Team Dynamics to Predict Open-source Software Projects' Susceptibility to Social Engineering Attacks
Authors:
Luiz Giovanini,
Daniela Oliveira,
Huascar Sanchez,
Deborah Shands
Abstract:
Open-source software (OSS) is a critical part of the software supply chain. Recent social engineering attacks against OSS development teams have enabled attackers to become code contributors and later inject malicious code or vulnerabilities into the project with the goal of compromising dependent software. The attackers have exploited interactions among development team members and the social dyn…
▽ More
Open-source software (OSS) is a critical part of the software supply chain. Recent social engineering attacks against OSS development teams have enabled attackers to become code contributors and later inject malicious code or vulnerabilities into the project with the goal of compromising dependent software. The attackers have exploited interactions among development team members and the social dynamics of team behavior to enable their attacks. We introduce a security approach that leverages signatures and patterns of team dynamics to predict the susceptibility of a software development team to social engineering attacks that enable access to the OSS project code. The proposed approach is programming language-, platform-, and vulnerability-agnostic because it assesses the artifacts of OSS team interactions, rather than OSS code.
△ Less
Submitted 2 July, 2021; v1 submitted 30 June, 2021;
originally announced June 2021.
-
Predicting Different Types of Subtle Toxicity in Unhealthy Online Conversations
Authors:
Shlok Gilda,
Mirela Silva,
Luiz Giovanini,
Daniela Oliveira
Abstract:
This paper investigates the use of machine learning models for the classification of unhealthy online conversations containing one or more forms of subtler abuse, such as hostility, sarcasm, and generalization. We leveraged a public dataset of 44K online comments containing healthy and unhealthy comments labeled with seven forms of subtle toxicity. We were able to distinguish between these comment…
▽ More
This paper investigates the use of machine learning models for the classification of unhealthy online conversations containing one or more forms of subtler abuse, such as hostility, sarcasm, and generalization. We leveraged a public dataset of 44K online comments containing healthy and unhealthy comments labeled with seven forms of subtle toxicity. We were able to distinguish between these comments with a top micro F1-score, macro F1-score, and ROC-AUC of 88.76%, 67.98%, and 0.71, respectively. Hostile comments were easier to detect than other types of unhealthy comments. We also conducted a sentiment analysis which revealed that most types of unhealthy comments were associated with a slight negative sentiment, with hostile comments being the most negative ones.
△ Less
Submitted 7 June, 2021;
originally announced June 2021.
-
NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training
Authors:
Adam Yala,
Homa Esfahanizadeh,
Rafael G. L. D' Oliveira,
Ken R. Duffy,
Manya Ghobadi,
Tommi S. Jaakkola,
Vinod Vaikuntanathan,
Regina Barzilay,
Muriel Medard
Abstract:
Balancing the needs of data privacy and predictive utility is a central challenge for machine learning in healthcare. In particular, privacy concerns have led to a dearth of public datasets, complicated the construction of multi-hospital cohorts and limited the utilization of external machine learning resources. To remedy this, new methods are required to enable data owners, such as hospitals, to…
▽ More
Balancing the needs of data privacy and predictive utility is a central challenge for machine learning in healthcare. In particular, privacy concerns have led to a dearth of public datasets, complicated the construction of multi-hospital cohorts and limited the utilization of external machine learning resources. To remedy this, new methods are required to enable data owners, such as hospitals, to share their datasets publicly, while preserving both patient privacy and modeling utility. We propose NeuraCrypt, a private encoding scheme based on random deep neural networks. NeuraCrypt encodes raw patient data using a randomly constructed neural network known only to the data-owner, and publishes both the encoded data and associated labels publicly. From a theoretical perspective, we demonstrate that sampling from a sufficiently rich family of encoding functions offers a well-defined and meaningful notion of privacy against a computationally unbounded adversary with full knowledge of the underlying data-distribution. We propose to approximate this family of encoding functions through random deep neural networks. Empirically, we demonstrate the robustness of our encoding to a suite of adversarial attacks and show that NeuraCrypt achieves competitive accuracy to non-private baselines on a variety of x-ray tasks. Moreover, we demonstrate that multiple hospitals, using independent private encoders, can collaborate to train improved x-ray models. Finally, we release a challenge dataset to encourage the development of new attacks on NeuraCrypt.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Multi-task fully convolutional network for tree species mapping in dense forests using small training hyperspectral data
Authors:
Laura Elena Cué La Rosa,
Camile Sothe,
Raul Queiroz Feitosa,
Cláudia Maria de Almeida,
Marcos Benedito Schimalski,
Dario Augusto Borges Oliveira
Abstract:
This work proposes a multi-task fully convolutional architecture for tree species mapping in dense forests from sparse and scarce polygon-level annotations using hyperspectral UAV-borne data. Our model implements a partial loss function that enables dense tree semantic labeling outcomes from non-dense training samples, and a distance regression complementary task that enforces tree crown boundary…
▽ More
This work proposes a multi-task fully convolutional architecture for tree species mapping in dense forests from sparse and scarce polygon-level annotations using hyperspectral UAV-borne data. Our model implements a partial loss function that enables dense tree semantic labeling outcomes from non-dense training samples, and a distance regression complementary task that enforces tree crown boundary constraints and substantially improves the model performance. Our multi-task architecture uses a shared backbone network that learns common representations for both tasks and two task-specific decoders, one for the semantic segmentation output and one for the distance map regression. We report that introducing the complementary task boosts the semantic segmentation performance compared to the single-task counterpart in up to 11% reaching an average user's accuracy of 88.63% and an average producer's accuracy of 88.59%, achieving state-of-art performance for tree species classification in tropical forests.
△ Less
Submitted 6 September, 2021; v1 submitted 1 June, 2021;
originally announced June 2021.
-
Decoupling Shape and Density for Liver Lesion Synthesis Using Conditional Generative Adversarial Networks
Authors:
Dario Augusto Borges Oliveira
Abstract:
Lesion synthesis received much attention with the rise of efficient generative models for augmenting training data, drawing lesion evolution scenarios, or aiding expert training. The quality and diversity of synthesized data are highly dependent on the annotated data used to train the models, which not rarely struggle to derive very different yet realistic samples from the training ones. That adds…
▽ More
Lesion synthesis received much attention with the rise of efficient generative models for augmenting training data, drawing lesion evolution scenarios, or aiding expert training. The quality and diversity of synthesized data are highly dependent on the annotated data used to train the models, which not rarely struggle to derive very different yet realistic samples from the training ones. That adds an inherent bias to lesion segmentation algorithms and limits synthesizing lesion evolution scenarios efficiently. This paper presents a method for decoupling shape and density for liver lesion synthesis, creating a framework that allows straight-forwardly driving the synthesis. We offer qualitative results that show the synthesis control by modifying shape and density individually, and quantitative results that demonstrate that embedding the density information in the generator model helps to increase lesion segmentation performance compared to using the shape solely.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Minmax-optimal list searching with $O(\log_2\log_2 n)$ average cost
Authors:
I. F. D. Oliveira,
R. H. C. Takahashi
Abstract:
We find a searching method on ordered lists that surprisingly outperforms binary searching with respect to average query complexity while retaining minmax optimality. The method is shown to require $O(\log_2\log_2 n)$ queries on average while never exceeding $\lceil \log_2 n \rceil$ queries in the worst case, i.e. the minmax bound of binary searching. Our average results assume a uniform distribut…
▽ More
We find a searching method on ordered lists that surprisingly outperforms binary searching with respect to average query complexity while retaining minmax optimality. The method is shown to require $O(\log_2\log_2 n)$ queries on average while never exceeding $\lceil \log_2 n \rceil$ queries in the worst case, i.e. the minmax bound of binary searching. Our average results assume a uniform distribution hypothesis similar to those of prevous authors under which the expected query complexity of interpolation search of $O(\log_2\log_2 n)$ is known to be optimal. Hence our method turns out to be optimal with respect to both minmax and average performance. We further provide robustness guarantees and perform several numerical experiments with both artificial and real data. Our results suggest that time savings range roughly from a constant factor of 10\% to 50\% to a logarithmic factor spanning orders of magnitude when different metrics are considered.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
An incremental descent method for multi-objective optimization
Authors:
I. F. D. Oliveira,
R. H. C. Takahashi
Abstract:
Current state-of-the-art multi-objective optimization solvers, by computing gradients of all $m$ objective functions per iteration, produce after $k$ iterations a measure of proximity to critical conditions that is upper-bounded by $O(1/\sqrt{k})$ when the objective functions are assumed to have $L-$Lipschitz continuous gradients; i.e. they require $O(m/ε^2)$ gradient and function computations to…
▽ More
Current state-of-the-art multi-objective optimization solvers, by computing gradients of all $m$ objective functions per iteration, produce after $k$ iterations a measure of proximity to critical conditions that is upper-bounded by $O(1/\sqrt{k})$ when the objective functions are assumed to have $L-$Lipschitz continuous gradients; i.e. they require $O(m/ε^2)$ gradient and function computations to produce a measure of proximity to critical conditions bellow some target $ε$. We reduce this to $O(1/ε^2)$ with a method that requires only a constant number of gradient and function computations per iteration; and thus, we obtain for the first time a multi-objective descent-type method with a query complexity cost that is unaffected by increasing values of $m$. For this, a brand new multi-objective descent direction is identified, which we name the \emph{central descent direction}, and, an incremental approach is proposed. Robustness properties of the central descent direction are established, measures of proximity to critical conditions are derived, and, the incremental strategy for finding solutions to the multi-objective problem is shown to attain convergence properties unattained by previous methods. To the best of our knowledge, this is the first method to achieve this with no additional a-priori information on the structure of the problem, such as done by scalarizing techniques, and, with no pre-known information on the regularity of the objective functions other than Lipschitz continuity of the gradients.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles
Authors:
Luiz Giovanini,
Fabrício Ceschin,
Mirela Silva,
Aokun Chen,
Ramchandra Kulkarni,
Sanjay Banda,
Madison Lysaght,
Heng Qiao,
Nikolaos Sapountzis,
Ruimin Sun,
Brandon Matthews,
Dapeng Oliver Wu,
André Grégio,
Daniela Oliveira
Abstract:
This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profiles from 31 MS Windows 10 computer users over 8 we…
▽ More
This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profiles from 31 MS Windows 10 computer users over 8 weeks and submitted this data to comprehensive machine learning analysis involving a diverse set of online and offline classifiers. We found that: (i) profiles were mostly consistent over the 8-week data collection period, with most (83.9%) repeating computer usage habits on a daily basis; (ii) computer usage profiling has the potential to uniquely characterize computer users (with a maximum F-score of 99.90%); (iii) network-related events were the most relevant features to accurately recognize profiles (95.69% of the top features distinguishing users were network-related); and (iv) binary models were the most well-suited for profile recognition, with better results achieved in the online setting compared to the offline setting (maximum F-score of 99.90% vs. 95.50%).
△ Less
Submitted 2 September, 2021; v1 submitted 20 May, 2021;
originally announced May 2021.
-
Diversity in Kemeny Rank Aggregation: A Parameterized Approach
Authors:
Emmanuel Arrighi,
Henning Fernau,
Daniel Lokshtanov,
Mateus de Oliveira Oliveira,
Petra Wolf
Abstract:
In its most traditional setting, the main concern of optimization theory is the search for optimal solutions for instances of a given computational problem. A recent trend of research in artificial intelligence, called solution diversity, has focused on the development of notions of optimality that may be more appropriate in settings where subjectivity is essential. The idea is that instead of aim…
▽ More
In its most traditional setting, the main concern of optimization theory is the search for optimal solutions for instances of a given computational problem. A recent trend of research in artificial intelligence, called solution diversity, has focused on the development of notions of optimality that may be more appropriate in settings where subjectivity is essential. The idea is that instead of aiming at the development of algorithms that output a single optimal solution, the goal is to investigate algorithms that output a small set of sufficiently good solutions that are sufficiently diverse from one another. In this way, the user has the opportunity to choose the solution that is most appropriate to the context at hand. It also displays the richness of the solution space.
When combined with techniques from parameterized complexity theory, the paradigm of diversity of solutions offers a powerful algorithmic framework to address problems of practical relevance. In this work, we investigate the impact of this combination in the field of Kemeny Rank Aggregation, a well-studied class of problems lying in the intersection of order theory and social choice theory and also in the field of order theory itself. In particular, we show that the Kemeny Rank Aggregation problem is fixed-parameter tractable with respect to natural parameters providing natural formalizations of the notions of diversity and of the notion of a sufficiently good solution. Our main results work both when considering the traditional setting of aggregation over linearly ordered votes, and in the more general setting where votes are partially ordered.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Distributed In-memory Data Management for Workflow Executions
Authors:
Renan Souza,
Vítor Silva,
Alexandre A. B. Lima,
Daniel de Oliveira,
Patrick Valduriez,
Marta Mattoso
Abstract:
Complex scientific experiments from various domains are typically modeled as workflows and executed on large-scale machines using a Parallel Workflow Management System (WMS). Since such executions usually last for hours or days, some WMSs provide user steering support, i.e., they allow users to run data analyses and, depending on the results, adapt the workflows at runtime. A challenge in the para…
▽ More
Complex scientific experiments from various domains are typically modeled as workflows and executed on large-scale machines using a Parallel Workflow Management System (WMS). Since such executions usually last for hours or days, some WMSs provide user steering support, i.e., they allow users to run data analyses and, depending on the results, adapt the workflows at runtime. A challenge in the parallel execution control design is to manage workflow data for efficient executions while enabling user steering support. Data access for high scalability is typically transaction-oriented, while for data analysis, it is online analytical-oriented so that managing such hybrid workloads makes the challenge even harder. In this work, we present SchalaDB, an architecture with a set of design principles and techniques based on distributed in-memory data management for efficient workflow execution control and user steering. We propose a distributed data design for scalable workflow task scheduling and high availability driven by a parallel and distributed in-memory DBMS. To evaluate our proposal, we develop d-Chiron, a WMS designed according to SchalaDB's principles. We carry out an extensive experimental evaluation on an HPC cluster with up to 960 computing cores. Among other analyses, we show that even when running data analyses for user steering, SchalaDB's overhead is negligible for workloads composed of hundreds of concurrent tasks on shared data. Our results encourage workflow engine developers to follow a parallel and distributed data-oriented approach not only for scheduling and monitoring but also for user steering.
△ Less
Submitted 11 May, 2021; v1 submitted 10 May, 2021;
originally announced May 2021.
-
On the Width of Regular Classes of Finite Structures
Authors:
Alexsander Andrade de Melo,
Mateus de Oliveira Oliveira
Abstract:
In this work, we introduce the notion of decisional width of a finite relational structure and the notion of decisional width of a regular class of finite structures. Our main result states that given a first-order formula ψ over a vocabulary τ, and a finite automaton F over a suitable alphabet B(Σ,w,τ) representing a width-w regular-decisional class of τ-structures C, one can decide in time f(τ,Σ…
▽ More
In this work, we introduce the notion of decisional width of a finite relational structure and the notion of decisional width of a regular class of finite structures. Our main result states that given a first-order formula ψ over a vocabulary τ, and a finite automaton F over a suitable alphabet B(Σ,w,τ) representing a width-w regular-decisional class of τ-structures C, one can decide in time f(τ,Σ,ψ,w)|F| whether some τ-structure in C satisfies ψ. Here, f is a function that depends on the parameters τ,Σ,ψ,w, but not on the size of the automaton F representing the class. Therefore, besides implying that the first-order theory of any given regular-decisional class of finite structures is decidable, it also implies that when the parameters τ, ψ, Σ and w are fixed, decidability can be achieved in linear time on the size of the input automaton F. Building on the proof of our main result, we show that the problem of counting satisfying assignments for a first-order logic formula in a given structure A of width w is fixed-parameter tractable with respect to w, and can be solved in quadratic time on the length of the input representation of A.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
Gauging the effect of Supermassive Black Holes feedback on Quasar host galaxies
Authors:
B. Dall'Agnol de Oliveira,
T. Storchi-Bergmann,
S. B. Kraemer,
M. Villar Martín,
A. Schnorr-Müller,
H. R. Schmitt,
D. Ruschel-Dutra,
D. M. Crenshaw,
T. C. Fischer
Abstract:
In order to gauge the role that active galactic nuclei (AGN) play in the evolution of galaxies via the effect of kinetic feedback in nearby QSO$\,$2's ($z\sim0.3$), we observed eight such objects with bolometric luminosities $L_{bol} \sim 10^{46}\rm{erg\,s^{-1}}$ using Gemini GMOS-IFU's. The emission lines were fitted with at least two Gaussian curves, the broadest of which we attributed to gas ki…
▽ More
In order to gauge the role that active galactic nuclei (AGN) play in the evolution of galaxies via the effect of kinetic feedback in nearby QSO$\,$2's ($z\sim0.3$), we observed eight such objects with bolometric luminosities $L_{bol} \sim 10^{46}\rm{erg\,s^{-1}}$ using Gemini GMOS-IFU's. The emission lines were fitted with at least two Gaussian curves, the broadest of which we attributed to gas kinetically disturbed by an outflow. We found that the maximum extent of the outflow ranges from $\sim$1 to 8 kpc, being ${\sim}\,0.5\,{\pm}\,0.3$ times the extent of the [O$\,$III] ionized gas region. Our `${\tt default}$' assumptions for the gas density (obtained from the {[S$\,$II] doublet) and outflow velocities resulted in peak mass outflow rates of $\dot{M}_{out}^{\tt defa}{\sim}\,3\,{-}\,30\,\rm{M_{\odot}}\,yr^{-1}$ and outflow power of $\dot{E}_{out}^{\tt defa}\sim\,10^{41}\,{-}\,10^{43}\,\mathrm{erg\,s^{-1}}$. The corresponding kinetic coupling efficiencies are $\varepsilon_f^{\tt defa}=\dot{E}_{out}^{\tt defa}/L_{bol}\,\sim7\times10^{-4}\,{-}\,0.5\,\%$, with the average efficiency being only $0.06\,\%$ ($0.01\,\%$ median), implying little feedback powers from ionized gas outflows in the host galaxies. We investigated the effects of varying assumptions and calculations on $\dot{M}_{out}$ and $\dot{E}_{out}$ regarding the ionized gas densities, velocities, masses and inclinations of the outflow relative to the plane of the sky, resulting in average uncertainties of one dex. In particular, we found that better indicators of the [O$\,$III] emitting gas density than the default [S$\,$II] line ratio, such as the [Ar$\,$IV]$λλ$4711,40 line ratio, result in almost an order of magnitude decrease in the $\varepsilon_f$.
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
A new interpretable unsupervised anomaly detection method based on residual explanation
Authors:
David F. N. Oliveira,
Lucio F. Vismari,
Alexandre M. Nascimento,
Jorge R. de Almeida Jr,
Paulo S. Cugnasca,
Joao B. Camargo Jr,
Leandro Almeida,
Rafael Gripp,
Marcelo Neves
Abstract:
Despite the superior performance in modeling complex patterns to address challenging problems, the black-box nature of Deep Learning (DL) methods impose limitations to their application in real-world critical domains. The lack of a smooth manner for enabling human reasoning about the black-box decisions hinder any preventive action to unexpected events, in which may lead to catastrophic consequenc…
▽ More
Despite the superior performance in modeling complex patterns to address challenging problems, the black-box nature of Deep Learning (DL) methods impose limitations to their application in real-world critical domains. The lack of a smooth manner for enabling human reasoning about the black-box decisions hinder any preventive action to unexpected events, in which may lead to catastrophic consequences. To tackle the unclearness from black-box models, interpretability became a fundamental requirement in DL-based systems, leveraging trust and knowledge by providing ways to understand the model's behavior. Although a current hot topic, further advances are still needed to overcome the existing limitations of the current interpretability methods in unsupervised DL-based models for Anomaly Detection (AD). Autoencoders (AE) are the core of unsupervised DL-based for AD applications, achieving best-in-class performance. However, due to their hybrid aspect to obtain the results (by requiring additional calculations out of network), only agnostic interpretable methods can be applied to AE-based AD. These agnostic methods are computationally expensive to process a large number of parameters. In this paper we present the RXP (Residual eXPlainer), a new interpretability method to deal with the limitations for AE-based AD in large-scale systems. It stands out for its implementation simplicity, low computational cost and deterministic behavior, in which explanations are obtained through the deviation analysis of reconstructed input features. In an experiment using data from a real heavy-haul railway line, the proposed method achieved superior performance compared to SHAP, demonstrating its potential to support decision making in large scale critical systems.
△ Less
Submitted 14 March, 2021;
originally announced March 2021.
-
Interactions between the large-scale radio structures and the gas in a sample of optically selected type 2 quasars
Authors:
Montserrat Villar-Martin,
Bjorn Emonts,
Antonio Cabrera Lavers,
Enrica Bellocchi,
Almudena Alonso Herrero,
Andrew Humphrey,
Bruno Dall'Agnol de Oliveira,
Thaisa Storchi-Bergmann
Abstract:
The role of radio mode feedback in non radio-loud quasars needs to be explored in depth to determine its true importance. Its effects can be identified based on the evidence of interactions between the radio structures and the ambient ionised gas. We investigate this in a sample of 13 optically selected type-2 quasars (QSO2) at z<0.2 with FIRST radio detections. None are radio loud. All show compl…
▽ More
The role of radio mode feedback in non radio-loud quasars needs to be explored in depth to determine its true importance. Its effects can be identified based on the evidence of interactions between the radio structures and the ambient ionised gas. We investigate this in a sample of 13 optically selected type-2 quasars (QSO2) at z<0.2 with FIRST radio detections. None are radio loud. All show complex optical morphologies, with signs of distortion across tens of kpc due to mergers/interactions. The radio luminosity has an AGN component in 11/13 QSO2. It is spatially extended in 9 of them (jets/lobes/bubbles/other). The maximum sizes are in the range few kpc to ~500 kpc. Evidence for radio-gas interactions exist in 10/13 QSO2; that is, all but one with confirmed AGN radio components. The interactions are identified across different spatial scales, from the nuclear narrow line region up to tens of kpc from the AGN. Large scale low/modest power radio sources can exist in radio-quiet QSO2, which can provide a source of feedback on scales of the spheroidal component of galaxies and well into the circumgalactic medium in systems where radiative mode feedback is expected to dominate.
△ Less
Submitted 11 March, 2021;
originally announced March 2021.
-
A modular framework for extreme weather generation
Authors:
Bianca Zadrozny,
Campbell D. Watson,
Daniela Szwarcman,
Daniel Civitarese,
Dario Oliveira,
Eduardo Rodrigues,
Jorge Guevara
Abstract:
Extreme weather events have an enormous impact on society and are expected to become more frequent and severe with climate change. In this context, resilience planning becomes crucial for risk mitigation and coping with these extreme events. Machine learning techniques can play a critical role in resilience planning through the generation of realistic extreme weather event scenarios that can be us…
▽ More
Extreme weather events have an enormous impact on society and are expected to become more frequent and severe with climate change. In this context, resilience planning becomes crucial for risk mitigation and coping with these extreme events. Machine learning techniques can play a critical role in resilience planning through the generation of realistic extreme weather event scenarios that can be used to evaluate possible mitigation actions. This paper proposes a modular framework that relies on interchangeable components to produce extreme weather event scenarios. We discuss possible alternatives for each of the components and show initial results comparing two approaches on the task of generating precipitation scenarios.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
uTango: an open-source TEE for IoT devices
Authors:
Daniel Oliveira,
Tiago Gomes,
Sandro Pinto
Abstract:
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security mechanisms to separate security-critical applications from less critical components. Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security so…
▽ More
Security is one of the main challenges of the Internet of Things (IoT). IoT devices are mainly powered by low-cost microcontrollers (MCUs) that typically lack basic hardware security mechanisms to separate security-critical applications from less critical components. Recently, Arm has started to release Cortex-M MCUs enhanced with TrustZone technology (i.e., TrustZone-M), a system-wide security solution aiming at providing robust protection for IoT devices. Trusted Execution Environments (TEEs) relying on TrustZone hardware have been perceived as safe havens for securing mobile devices. However, for the past few years, considerable effort has gone into unveiling hundreds of vulnerabilities and proposing a collection of relevant defense techniques to address several issues. While new TEE solutions built on TrustZone-M start flourishing, the lessons gathered from the research community appear to be falling short, as these new systems are trapping into the same pitfalls of the past.
In this paper, we present uTango, the first multi-world TEE for modern IoT devices. uTango proposes a novel architecture aiming at tackling the major architectural deficiencies currently affecting TrustZone(-M)-assisted TEEs. In particular, we leverage the very same TrustZone hardware primitives used by dual-world implementations to create multiple and equally secure execution environments within the normal world. We demonstrate the benefits of uTango by conducting an extensive evaluation on a real TrustZone-M hardware platform, i.e., Arm Musca-B1. uTango will be open-sourced and freely available on GitHub in hopes of engaging academia and industry on securing the foreseeable trillion IoT devices.
△ Less
Submitted 16 February, 2022; v1 submitted 6 February, 2021;
originally announced February 2021.
-
Two Coupled Double Quantum Dots Systems as an working substance for Heat Machines
Authors:
Jefferson Luan D. de Oliveira,
Moises Rojas,
Cleverson Filgueiras
Abstract:
This paper presents a conceptual design for quantum heat machines using a pair of coupled double quantum dots (DQDs), each DQD with an excess electron to interact, as an working substance. We define a compression ratio as the ratio between the Coulomb couplings which describes the interaction between the electrons during the isochoric processes of the quantum Otto cycle and then we analyse the ari…
▽ More
This paper presents a conceptual design for quantum heat machines using a pair of coupled double quantum dots (DQDs), each DQD with an excess electron to interact, as an working substance. We define a compression ratio as the ratio between the Coulomb couplings which describes the interaction between the electrons during the isochoric processes of the quantum Otto cycle and then we analyse the arising of different regimes of operations of our thermal machine. We also show how we can achieve a classically inconceivable Otto engine, when considering the effects due to the parameters related to the quantum tunneling of a single electron between each individual DQD.
△ Less
Submitted 5 May, 2021; v1 submitted 1 February, 2021;
originally announced February 2021.
-
Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them
Authors:
Mirela Silva,
Daniela Oliveira
Abstract:
Brazil is home to over 200M people, the majority of which have access to the Internet. Over 11M Brazilians live in favelas, or informal settlements with no outside government regulation, often ruled by narcos or militias. Victims of intimate partner violence (IPV) in these communities are made extra vulnerable not only by lack of access to resources, but by the added layer of violence caused by cr…
▽ More
Brazil is home to over 200M people, the majority of which have access to the Internet. Over 11M Brazilians live in favelas, or informal settlements with no outside government regulation, often ruled by narcos or militias. Victims of intimate partner violence (IPV) in these communities are made extra vulnerable not only by lack of access to resources, but by the added layer of violence caused by criminal activity and police confrontations. In this paper, we use an unintended harms framework to analyze the unique online privacy needs of favela women and present research questions that we urge tech abuse researchers to consider.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
Low-latency Perception in Off-Road Dynamical Low Visibility Environments
Authors:
Nelson Alves,
Marco Ruiz,
Marco Reis,
Tiago Cajahyba,
Davi Oliveira,
Ana Barreto,
Eduardo F. Simas Filho,
Wagner L. A. de Oliveira,
Leizer Schnitman,
Roberto L. S. Monteiro
Abstract:
This work proposes a perception system for autonomous vehicles and advanced driver assistance specialized on unpaved roads and off-road environments. In this research, the authors have investigated the behavior of Deep Learning algorithms applied to semantic segmentation of off-road environments and unpaved roads under differents adverse conditions of visibility. Almost 12,000 images of different…
▽ More
This work proposes a perception system for autonomous vehicles and advanced driver assistance specialized on unpaved roads and off-road environments. In this research, the authors have investigated the behavior of Deep Learning algorithms applied to semantic segmentation of off-road environments and unpaved roads under differents adverse conditions of visibility. Almost 12,000 images of different unpaved and off-road environments were collected and labeled. It was assembled an off-road proving ground exclusively for its development. The proposed dataset also contains many adverse situations such as rain, dust, and low light. To develop the system, we have used convolutional neural networks trained to segment obstacles and areas where the car can pass through. We developed a Configurable Modular Segmentation Network (CMSNet) framework to help create different architectures arrangements and test them on the proposed dataset. Besides, we also have ported some CMSNet configurations by removing and fusing many layers using TensorRT, C++, and CUDA to achieve embedded real-time inference and allow field tests. The main contributions of this work are: a new dataset for unpaved roads and off-roads environments containing many adverse conditions such as night, rain, and dust; a CMSNet framework; an investigation regarding the feasibility of applying deep learning to detect region where the vehicle can pass through when there is no clear boundary of the track; a study of how our proposed segmentation algorithms behave in different severity levels of visibility impairment; and an evaluation of field tests carried out with semantic segmentation architectures ported for real-time inference.
△ Less
Submitted 23 December, 2020;
originally announced December 2020.