-
An argument in favor of strong scaling for deep neural networks with small datasets
Authors:
Renato L. de F. Cunha,
Eduardo R. Rodrigues,
Matheus Palhares Viana,
Dario Augusto Borges Oliveira
Abstract:
In recent years, with the popularization of deep learning frameworks and large datasets, researchers have started parallelizing their models in order to train faster. This is crucially important, because they typically explore many hyperparameters in order to find the best ones for their applications. This process is time consuming and, consequently, speeding up training improves productivity. One…
▽ More
In recent years, with the popularization of deep learning frameworks and large datasets, researchers have started parallelizing their models in order to train faster. This is crucially important, because they typically explore many hyperparameters in order to find the best ones for their applications. This process is time consuming and, consequently, speeding up training improves productivity. One approach to parallelize deep learning models followed by many researchers is based on weak scaling. The minibatches increase in size as new GPUs are added to the system. In addition, new learning rates schedules have been proposed to fix optimization issues that occur with large minibatch sizes. In this paper, however, we show that the recommendations provided by recent work do not apply to models that lack large datasets. In fact, we argument in favor of using strong scaling for achieving reliable performance in such cases. We evaluated our approach with up to 32 GPUs and show that weak scaling not only does not have the same accuracy as the sequential model, it also fails to converge most of time. Meanwhile, strong scaling has good scalability while having exactly the same accuracy of a sequential implementation.
△ Less
Submitted 13 July, 2020; v1 submitted 24 July, 2018;
originally announced July 2018.
-
Invariant multi-graphs in step skew-products
Authors:
Katrin Gelfert,
Daniel Oliveira
Abstract:
We study step skew-products over a finite-state shift (base) space whose fiber maps are $C^1$ injective maps on the unit interval. We show that certain invariant sets have a multi-graph structure and can be written graphs of one, two or more functions defined on the base. In particular, this applies to any hyperbolic set and to the support of any ergodic hyperbolic measure. Moreover, within the cl…
▽ More
We study step skew-products over a finite-state shift (base) space whose fiber maps are $C^1$ injective maps on the unit interval. We show that certain invariant sets have a multi-graph structure and can be written graphs of one, two or more functions defined on the base. In particular, this applies to any hyperbolic set and to the support of any ergodic hyperbolic measure. Moreover, within the class of step skew-products whose interval maps are 'absorbing', open and densely the phase space decomposes into attracting and repelling double-strips such that their attractors and repellers are graphs of one single-valued or bi-valued continuous function almost everywhere, respectively.
△ Less
Submitted 23 July, 2018;
originally announced July 2018.
-
On the existence and stability for non-instantaneuos impulsive fractional integrodifferential equation
Authors:
J. Vanterler da C. Sousa,
D. S. Oliveira,
E. Capelas de Oliveira
Abstract:
In this paper, by means of Banach fixed point theorem, we investigate the existence and Ulam--Hyers--Rassias stability of the non-instantaneous impulsive integrodifferential equation by means of $ψ$-Hilfer fractional derivative. In this sense, some examples are presented, in order to consolidate the results obtained.
In this paper, by means of Banach fixed point theorem, we investigate the existence and Ulam--Hyers--Rassias stability of the non-instantaneous impulsive integrodifferential equation by means of $ψ$-Hilfer fractional derivative. In this sense, some examples are presented, in order to consolidate the results obtained.
△ Less
Submitted 5 December, 2018; v1 submitted 4 June, 2018;
originally announced June 2018.
-
Non-Extensive Transport Equations in Magnetized Plasmas
Authors:
Diego S. Oliveira,
Ricardo M. O. Galvão
Abstract:
In this work we introduce, for the first time, as far as we know, a complete self-consist kinetic model for collisional transport in the nonextensive statistics, i.e., the generalization of the ordinary Maxwell-Boltmzann statistics according to the Tsallis entropy. Starting only from the definition of this entropy, we derive the kinetic model, find its solutions for the electrons in a strongly mag…
▽ More
In this work we introduce, for the first time, as far as we know, a complete self-consist kinetic model for collisional transport in the nonextensive statistics, i.e., the generalization of the ordinary Maxwell-Boltmzann statistics according to the Tsallis entropy. Starting only from the definition of this entropy, we derive the kinetic model, find its solutions for the electrons in a strongly magnetized plasmas, and calculate the respective transport coefficients in order to set the closed fluid equations. The results are further applied to model heat transport in space plasmas and the cold pulse phenomenon in magnetic confined plasmas.
△ Less
Submitted 6 June, 2018; v1 submitted 4 June, 2018;
originally announced June 2018.
-
Limit cycles for two classes of control piecewise linear differential systems
Authors:
J. Llibre,
R. D. S. Oliveira,
C. A. B. Rodrigues
Abstract:
We study the bifurcation of limit cycles from the periodic orbits of $2n$--dimensional linear centers $\dot{x} = A_0 x$ when they are perturbed inside classes of continuous and discontinuous piecewise linear differential systems of control theory of the form $\dot{x} = A_0 x + \varepsilon \big(A x + φ(x_1) b\big)$, where $φ$ is a continuous or discontinuous piecewise linear function, $A_0$ is a…
▽ More
We study the bifurcation of limit cycles from the periodic orbits of $2n$--dimensional linear centers $\dot{x} = A_0 x$ when they are perturbed inside classes of continuous and discontinuous piecewise linear differential systems of control theory of the form $\dot{x} = A_0 x + \varepsilon \big(A x + φ(x_1) b\big)$, where $φ$ is a continuous or discontinuous piecewise linear function, $A_0$ is a $2n\times 2n$ matrix with only purely imaginary eigenvalues, $\varepsilon$ is a small parameter, $A$ is an arbitrary $2n\times 2n$ matrix, and $b$ is an arbitrary vector of $\mathbb{R}^n$.
△ Less
Submitted 22 April, 2018;
originally announced April 2018.
-
An Ensemble Generation Method Based on Instance Hardness
Authors:
Felipe N. Walmsley,
George D. C. Cavalcanti,
Dayvid V. R. Oliveira,
Rafael M. O. Cruz,
Robert Sabourin
Abstract:
In Machine Learning, ensemble methods have been receiving a great deal of attention. Techniques such as Bagging and Boosting have been successfully applied to a variety of problems. Nevertheless, such techniques are still susceptible to the effects of noise and outliers in the training data. We propose a new method for the generation of pools of classifiers based on Bagging, in which the probabili…
▽ More
In Machine Learning, ensemble methods have been receiving a great deal of attention. Techniques such as Bagging and Boosting have been successfully applied to a variety of problems. Nevertheless, such techniques are still susceptible to the effects of noise and outliers in the training data. We propose a new method for the generation of pools of classifiers based on Bagging, in which the probability of an instance being selected during the resampling process is inversely proportional to its instance hardness, which can be understood as the likelihood of an instance being misclassified, regardless of the choice of classifier. The goal of the proposed method is to remove noisy data without sacrificing the hard instances which are likely to be found on class boundaries. We evaluate the performance of the method in nineteen public data sets, and compare it to the performance of the Bagging and Random Subspace algorithms. Our experiments show that in high noise scenarios the accuracy of our method is significantly better than that of Bagging.
△ Less
Submitted 30 April, 2018; v1 submitted 19 April, 2018;
originally announced April 2018.
-
K-Nearest Oracles Borderline Dynamic Classifier Ensemble Selection
Authors:
Dayvid V. R. Oliveira,
George D. C. Cavalcanti,
Thyago N. Porpino,
Rafael M. O. Cruz,
Robert Sabourin
Abstract:
Dynamic Ensemble Selection (DES) techniques aim to select locally competent classifiers for the classification of each new test sample. Most DES techniques estimate the competence of classifiers using a given criterion over the region of competence of the test sample (its the nearest neighbors in the validation set). The K-Nearest Oracles Eliminate (KNORA-E) DES selects all classifiers that correc…
▽ More
Dynamic Ensemble Selection (DES) techniques aim to select locally competent classifiers for the classification of each new test sample. Most DES techniques estimate the competence of classifiers using a given criterion over the region of competence of the test sample (its the nearest neighbors in the validation set). The K-Nearest Oracles Eliminate (KNORA-E) DES selects all classifiers that correctly classify all samples in the region of competence of the test sample, if such classifier exists, otherwise, it removes from the region of competence the sample that is furthest from the test sample, and the process repeats. When the region of competence has samples of different classes, KNORA-E can reduce the region of competence in such a way that only samples of a single class remain in the region of competence, leading to the selection of locally incompetent classifiers that classify all samples in the region of competence as being from the same class. In this paper, we propose two DES techniques: K-Nearest Oracles Borderline (KNORA-B) and K-Nearest Oracles Borderline Imbalanced (KNORA-BI). KNORA-B is a DES technique based on KNORA-E that reduces the region of competence but maintains at least one sample from each class that is in the original region of competence. KNORA-BI is a variation of KNORA-B for imbalance datasets that reduces the region of competence but maintains at least one minority class sample if there is any in the original region of competence. Experiments are conducted comparing the proposed techniques with 19 DES techniques from the literature using 40 datasets. The results show that the proposed techniques achieved interesting results, with KNORA-BI outperforming state-of-art techniques.
△ Less
Submitted 18 April, 2018;
originally announced April 2018.
-
Index Estimates for Free Boundary Constant Mean Curvature Surfaces
Authors:
Marcos P. Cavalcante,
Darlan F. de Oliveira
Abstract:
In this paper, we consider compact free boundary constant mean curvature surfaces immersed in a mean convex body of the Euclidean space or in the unit sphere. We prove that the Morse index is bounded from below by a linear function of the genus and number of boundary components.
In this paper, we consider compact free boundary constant mean curvature surfaces immersed in a mean convex body of the Euclidean space or in the unit sphere. We prove that the Morse index is bounded from below by a linear function of the genus and number of boundary components.
△ Less
Submitted 15 March, 2018;
originally announced March 2018.
-
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation
Authors:
Ruimin Sun,
Marcus Botacin,
Nikolaos Sapountzis,
Xiaoyong Yuan,
Matt Bishop,
Donald E Porter,
Xiaolin Li,
Andre Gregio,
Daniela Oliveira
Abstract:
A promising avenue for improving the effectiveness of behavioral-based malware detectors would be to combine fast traditional machine learning detectors with high-accuracy, but time-consuming deep learning models. The main idea would be to place software receiving borderline classifications by traditional machine learning methods in an environment where uncertainty is added, while software is anal…
▽ More
A promising avenue for improving the effectiveness of behavioral-based malware detectors would be to combine fast traditional machine learning detectors with high-accuracy, but time-consuming deep learning models. The main idea would be to place software receiving borderline classifications by traditional machine learning methods in an environment where uncertainty is added, while software is analyzed by more time-consuming deep learning models. The goal of uncertainty would be to rate-limit actions of potential malware during the time consuming deep analysis. In this paper, we present a detailed description of the analysis and implementation of CHAMELEON, a framework for realizing this uncertain environment for Linux. CHAMELEON offers two environments for software: (i) standard - for any software identified as benign by conventional machine learning methods and (ii) uncertain - for software receiving borderline classifications when analyzed by these conventional machine learning methods. The uncertain environment adds obstacles to software execution through random perturbations applied probabilistically on selected system calls. We evaluated CHAMELEON with 113 applications and 100 malware samples for Linux. Our results showed that at threshold 10%, intrusive and non-intrusive strategies caused approximately 65% of malware to fail accomplishing their tasks, while approximately 30% of the analyzed benign software to meet with various levels of disruption. With a dynamic, per-system call threshold, CHAMELEON caused 92% of the malware to fail, and only 10% of the benign software to be disrupted. We also found that I/O-bound software was three times more affected by uncertainty than CPU-bound software. Further, we analyzed the logs of software crashed with non-intrusive strategies, and found that some crashes are due to the software bugs.
△ Less
Submitted 12 June, 2020; v1 submitted 7 February, 2018;
originally announced February 2018.
-
Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Authors:
Ruimin Sun,
Xiaoyong Yuan,
Pan He,
Qile Zhu,
Aokun Chen,
Andre Gregio,
Daniela Oliveira,
Xiaolin Li
Abstract:
Existing malware detectors on safety-critical devices have difficulties in runtime detection due to the performance overhead. In this paper, we introduce PROPEDEUTICA, a framework for efficient and effective real-time malware detection, leveraging the best of conventional machine learning (ML) and deep learning (DL) techniques. In PROPEDEUTICA, all software start execution are considered as benign…
▽ More
Existing malware detectors on safety-critical devices have difficulties in runtime detection due to the performance overhead. In this paper, we introduce PROPEDEUTICA, a framework for efficient and effective real-time malware detection, leveraging the best of conventional machine learning (ML) and deep learning (DL) techniques. In PROPEDEUTICA, all software start execution are considered as benign and monitored by a conventional ML classifier for fast detection. If the software receives a borderline classification from the ML detector (e.g. the software is 50% likely to be benign and 50% likely to be malicious), the software will be transferred to a more accurate, yet performance demanding DL detector. To address spatial-temporal dynamics and software execution heterogeneity, we introduce a novel DL architecture (DEEPMALWARE) for PROPEDEUTICA with multi-stream inputs. We evaluated PROPEDEUTICA with 9,115 malware samples and 1,338 benign software from various categories for the Windows OS. With a borderline interval of [30%-70%], PROPEDEUTICA achieves an accuracy of 94.34% and a false-positive rate of 8.75%, with 41.45% of the samples moved for DEEPMALWARE analysis. Even using only CPU, PROPEDEUTICA can detect malware within less than 0.1 seconds.
△ Less
Submitted 17 October, 2021; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Lower bounds for the index of compact constant mean curvature surfaces in $\mathbb R^{3}$ and $\mathbb S^{3}$
Authors:
Marcos P. Cavalcante,
Darlan F. de Oliveira
Abstract:
Let $M$ be a compact constant mean curvature surface either in $\mathbb{S}^3$ or $\mathbb{R}^3$. In this paper we prove that the stability index of $M$ is bounded below by a linear function of the genus. As a by product we obtain a comparison theorem between the spectrum of the Jacobi operator of $M$ and those of Hodge Laplacian of $1$-forms on $M$.
Let $M$ be a compact constant mean curvature surface either in $\mathbb{S}^3$ or $\mathbb{R}^3$. In this paper we prove that the stability index of $M$ is bounded below by a linear function of the genus. As a by product we obtain a comparison theorem between the spectrum of the Jacobi operator of $M$ and those of Hodge Laplacian of $1$-forms on $M$.
△ Less
Submitted 15 March, 2018; v1 submitted 20 November, 2017;
originally announced November 2017.
-
Ionosphere-thermosphere global time response to geomagnetic storms
Authors:
D. M. Oliveira,
E. Zesta,
P. W. Schuck,
H. K. Connor,
E. K. Sutton
Abstract:
In this study, we investigate thermospheric neutral mass density heating associated with 168 CME-driven geomagnetic storms in the period of May 2001 to September 2011. We use neutral density measured by two low-Earth orbit satellites: CHAMP and GRACE. For each storm, we superpose geomagnetic and density data for the time when the IMF B$_\mathrm{z}$ component turns sharply southward chosen as the z…
▽ More
In this study, we investigate thermospheric neutral mass density heating associated with 168 CME-driven geomagnetic storms in the period of May 2001 to September 2011. We use neutral density measured by two low-Earth orbit satellites: CHAMP and GRACE. For each storm, we superpose geomagnetic and density data for the time when the IMF B$_\mathrm{z}$ component turns sharply southward chosen as the zero epoch time. This indicates the storm main phase onset. We find that the average SYM-H index reaches the minimum of $-$42 nT near 12 hours after storm main phase onset. The Joule heating is enhanced by approximately 200\% in comparison to quiet values. In respect to thermosphere density, on average, high latitude regions (auroral zones and polar caps) of both hemispheres are highly heated in the first 1.5 hour of the storm. The equatorial response is presumably associated with direct equator-ward propagation of TADs (traveling atmospheric disturbances). A slight north-south asymmetry in thermosphere heating is found and is most likely due to a positive B$_\mathrm{y}$ component in the first hours of the storm main phase.
△ Less
Submitted 20 October, 2017;
originally announced October 2017.
-
Two proposals to protect a qubit using CQED techniques: inequality between atomic velocity dispersion and losses of a quantum memory
Authors:
J. L. Santos,
J. G. G. de Oliveira Jr.,
J. G. Peixoto de Faria,
M. C. Nemes
Abstract:
We present in this work an analysis of the damage imposed by the atom on the field state inside a lossy superconducting cavity. To access such effects, we propose two procedures to preserve a qubit of the decay effects of an imperfect quantum memory: the first by means of an quasi-instantaneous phase kick applied in the atom, and the second by means of controlled resonant and dispersive interactio…
▽ More
We present in this work an analysis of the damage imposed by the atom on the field state inside a lossy superconducting cavity. To access such effects, we propose two procedures to preserve a qubit of the decay effects of an imperfect quantum memory: the first by means of an quasi-instantaneous phase kick applied in the atom, and the second by means of controlled resonant and dispersive interactions. We immediately demonstrate that, in both procedures, the dwell time of the qubit in the cavity increases significantly, being expressively higher for the second. A relation between the inaccuracy of the preparation of the atomic beam and the quality of the cavity arises naturally from our calculations for each procedure. This result is unprecedented, and sets out the rules to increase the dwell time of the qubit.
△ Less
Submitted 8 October, 2017;
originally announced October 2017.
-
Automatic tracking of vessel-like structures from a single starting point
Authors:
Dario Augusto Borges Oliveira,
Laura Leal-Taixe,
Raul Queiroz Feitosa,
Bodo Rosenhahn
Abstract:
The identification of vascular networks is an important topic in the medical image analysis community. While most methods focus on single vessel tracking, the few solutions that exist for tracking complete vascular networks are usually computationally intensive and require a lot of user interaction. In this paper we present a method to track full vascular networks iteratively using a single starti…
▽ More
The identification of vascular networks is an important topic in the medical image analysis community. While most methods focus on single vessel tracking, the few solutions that exist for tracking complete vascular networks are usually computationally intensive and require a lot of user interaction. In this paper we present a method to track full vascular networks iteratively using a single starting point. Our approach is based on a cloud of sampling points distributed over concentric spherical layers. We also proposed a vessel model and a metric of how well a sample point fits this model. Then, we implement the network tracking as a min-cost flow problem, and propose a novel optimization scheme to iteratively track the vessel structure by inherently handling bifurcations and paths. The method was tested using both synthetic and real images. On the 9 different data-sets of synthetic blood vessels, we achieved maximum accuracies of more than 98\%. We further use the synthetic data-set to analyse the sensibility of our method to parameter setting, showing the robustness of the proposed algorithm. For real images, we used coronary, carotid and pulmonary data to segment vascular structures and present the visual results. Still for real images, we present numerical and visual results for networks of nerve fibers in the olfactory system. Further visual results also show the potential of our approach for identifying vascular networks topologies. The presented method delivers good results for the several different datasets tested and have potential for segmenting vessel-like structures. Also, the topology information, inherently extracted, can be used for further analysis to computed aided diagnosis and surgical planning. Finally, the method's modular aspect holds potential for problem-oriented adjustments and improvements.
△ Less
Submitted 7 June, 2017;
originally announced June 2017.
-
Weyl fermions in a family of Gödel-type geometries with a topological defect
Authors:
G. Q. Garcia,
J. R. de S. Oliveira,
Claudio Furtado
Abstract:
In this paper we study Weyl fermions in a family of Gödel-type geometries in Einstein general relativity. We also consider that these solutions are embedded in a topological defect background. We solve the Weyl equation and find the energy eigenvalues and eigenspinors for all three cases of Gödel-type geometries where a topological defect is passing through them. We show that the presence of a top…
▽ More
In this paper we study Weyl fermions in a family of Gödel-type geometries in Einstein general relativity. We also consider that these solutions are embedded in a topological defect background. We solve the Weyl equation and find the energy eigenvalues and eigenspinors for all three cases of Gödel-type geometries where a topological defect is passing through them. We show that the presence of a topological in these geometries contributes to modification of the spectrum of energy. The energy zero modes for all three cases of the Gödel geometries are discussed.
△ Less
Submitted 29 November, 2017; v1 submitted 28 May, 2017;
originally announced May 2017.
-
Exotic looped trajectories via quantum marking
Authors:
J. G. G. de Oliveira Jr.,
Gustavo de Souza,
L. A. Cabral,
I. G. da Paz,
Marcos Sampaio
Abstract:
We provide an analytical and theoretical study of exotic looped trajectories (ELTs) in a double-slit interferometer with quantum marking. We use an excited Rydberg-like atom and which-way detectors such as superconducting cavities, just as in the Scully-Englert-Walther interferometer. We indicate appropriate conditions on the atomic beam or superconducting cavities so that we determine an interfer…
▽ More
We provide an analytical and theoretical study of exotic looped trajectories (ELTs) in a double-slit interferometer with quantum marking. We use an excited Rydberg-like atom and which-way detectors such as superconducting cavities, just as in the Scully-Englert-Walther interferometer. We indicate appropriate conditions on the atomic beam or superconducting cavities so that we determine an interference pattern and fringe visibility exclusive from the ELTs. We quantitatively describe our results for Rubidium atoms and propose this framework as an alternative scheme to the double-slit experiment modified to interfere only these exotic trajectories.
△ Less
Submitted 26 May, 2017;
originally announced May 2017.
-
Hilfer-Katugampola fractional derivative
Authors:
D. S. Oliveira,
E. Capelas de Oliveira
Abstract:
We propose a new fractional derivative, the Hilfer-Katugampola fractional derivative. Motivated by the Hilfer derivative this formulation interpolates the well-known fractional derivatives of Hilfer, Hilfer-Hadamard, Riemann-Liouville, Hadamard, Caputo, Caputo-Hadamard, Liouville, Weyl, generalized and Caputo-type. As an application, we consider a nonlinear fractional differential equation with an…
▽ More
We propose a new fractional derivative, the Hilfer-Katugampola fractional derivative. Motivated by the Hilfer derivative this formulation interpolates the well-known fractional derivatives of Hilfer, Hilfer-Hadamard, Riemann-Liouville, Hadamard, Caputo, Caputo-Hadamard, Liouville, Weyl, generalized and Caputo-type. As an application, we consider a nonlinear fractional differential equation with an initial condition using this new formulation. We show that this equation is equivalent to a Volterra integral equation and demonstrate the existence and uniqueness of solution to the nonlinear initial value problem.
△ Less
Submitted 10 November, 2017; v1 submitted 15 May, 2017;
originally announced May 2017.
-
Gruss-type inequality by mean of a fractional integral
Authors:
J. Vanterler da C. Sousa,
D. S. Oliveira,
E. Capelas de Oliveira
Abstract:
In this paper, using a fractional integral as proposed by Katugampola we establish a generalization of integral inequalities of Gruss-type. We prove two theorems associated with these inequalities and then immediately we enunciate and prove others inequalities associated with these fractional operator.
In this paper, using a fractional integral as proposed by Katugampola we establish a generalization of integral inequalities of Gruss-type. We prove two theorems associated with these inequalities and then immediately we enunciate and prove others inequalities associated with these fractional operator.
△ Less
Submitted 19 June, 2017; v1 submitted 27 April, 2017;
originally announced May 2017.
-
Zeros of Dirichlet Polynomials via a Density Criterion
Authors:
Willian D. Oliveira
Abstract:
We obtain a necessary and sufficient condition in order that a semi-plane of the form $\Re(s)>r$, $r\in \mathbb{R}$, is free of zeros of a given Dirichlet polynomial. The result may be considered a natural generalization of a well-known criterion for the truth of the Riemann hypothesis due to Báez-Duarte. An analog for the case of Dirichlet polynomials of a result of Burnol which is closely relate…
▽ More
We obtain a necessary and sufficient condition in order that a semi-plane of the form $\Re(s)>r$, $r\in \mathbb{R}$, is free of zeros of a given Dirichlet polynomial. The result may be considered a natural generalization of a well-known criterion for the truth of the Riemann hypothesis due to Báez-Duarte. An analog for the case of Dirichlet polynomials of a result of Burnol which is closely related to Báez-Duarte's one is also established.
△ Less
Submitted 4 April, 2017;
originally announced April 2017.
-
Limited individual attention and online virality of low-quality information
Authors:
Xiaoyan Qiu,
Diego F. M. Oliveira,
Alireza Sahami Shirazi,
Alessandro Flammini,
Filippo Menczer
Abstract:
Social media are massive marketplaces where ideas and news compete for our attention. Previous studies have shown that quality is not a necessary condition for online virality and that knowledge about peer choices can distort the relationship between quality and popularity. However, these results do not explain the viral spread of low-quality information, such as the digital misinformation that th…
▽ More
Social media are massive marketplaces where ideas and news compete for our attention. Previous studies have shown that quality is not a necessary condition for online virality and that knowledge about peer choices can distort the relationship between quality and popularity. However, these results do not explain the viral spread of low-quality information, such as the digital misinformation that threatens our democracy. We investigate quality discrimination in a stylized model of online social network, where individual agents prefer quality information, but have behavioral limitations in managing a heavy flow of information. We measure the relationship between the quality of an idea and its likelihood to become prevalent at the system level. We find that both information overload and limited attention contribute to a degradation in the market's discriminative power. A good tradeoff between discriminative power and diversity of information is possible according to the model. However, calibration with empirical data characterizing information load and finite attention in real social media reveals a weak correlation between quality and popularity of information. In these realistic conditions, the model predicts that high-quality information has little advantage over low-quality information.
△ Less
Submitted 10 January, 2019; v1 submitted 10 January, 2017;
originally announced January 2017.
-
Spin phonon interactions and magneto-thermal transport behavior in p-Si
Authors:
Paul Lou,
Laura de Sousa Oliveira,
Chi Tang,
Alex Greaney,
Sandeep Kumar
Abstract:
The spin-phonon interaction is the dominant process for spin relaxation in Si, and as thermal transport in Si is dominated by phonons, one would expect spin polarization to influence Si's thermal conductivity. Here we report the experimental evidence of just such a coupling. We have performed concurrent measurements of spin, charge, and phonon transport in p-doped Si across a wide range of tempera…
▽ More
The spin-phonon interaction is the dominant process for spin relaxation in Si, and as thermal transport in Si is dominated by phonons, one would expect spin polarization to influence Si's thermal conductivity. Here we report the experimental evidence of just such a coupling. We have performed concurrent measurements of spin, charge, and phonon transport in p-doped Si across a wide range of temperatures. In an experimental system of a freestanding two um p-Si beam coated on one side with a thin (25 nm) ferromagnetic spin injection layer, we use the self-heating 3 omega method to measure changes in electrical and thermal conductivity under the influence of a magnetic field. These magneto-thermal transport measurements reveal signatures in the variation of electrical and thermal transport that are consistent with spin-phonon interaction. Raman spectroscopy measurements and first principle's calculations support that these variations are due to spin-phonon interaction. Spin polarization leads to softening of phonon modes, a reduction in the group velocity of acoustic modes, and a subsequent decrease in thermal conductivity at room temperature. Moreover, magneto-thermal transport measurements as a function of temperature indicate a change in the spin-phonon relaxation behavior at low temperature.
△ Less
Submitted 15 August, 2018; v1 submitted 5 January, 2017;
originally announced January 2017.
-
Thermodynamics of a time dependent and dissipative oval billiard: a heat transfer and billiard approach
Authors:
Edson D. Leonel,
Marcus Vinicius Camillo Galia,
Luiz Antonio Barreiro,
Diego F. M. Oliveira
Abstract:
We study some statistical properties for the behavior of the average squared velocity -- hence the temperature -- for an ensemble of classical particles moving in a billiard whose boundary is time dependent. We assume the collisions of the particles with the boundary of the billiard are inelastic leading the average squared velocity to reach a steady state dynamics for large enough time. The descr…
▽ More
We study some statistical properties for the behavior of the average squared velocity -- hence the temperature -- for an ensemble of classical particles moving in a billiard whose boundary is time dependent. We assume the collisions of the particles with the boundary of the billiard are inelastic leading the average squared velocity to reach a steady state dynamics for large enough time. The description of the stationary state is made by using two different approaches: (i) heat transfer motivated by the Fourier law and, (ii) billiard dynamics using either numerical simulations and theoretical description.
△ Less
Submitted 11 December, 2016;
originally announced December 2016.
-
An open quantum system approach to complementarity in neutral kaon interferometry
Authors:
Gustavo de Souza,
J. G. G. de Oliveira Jr.,
Adalberto D. Varizi,
Edson C. Nogueira,
Marcos D. Sampaio
Abstract:
In bipartite quantum systems, entanglement correlations between the parties exerts direct influence in the phenomenon of wave-particle duality. This effect has been quantitatively analyzed in the context of two qubits by M. Jakob and J. Bergou [Optics Communications 283(5) (2010) 827]. Employing a description of the $K$-meson propagation in free space where its weak decay states are included as a…
▽ More
In bipartite quantum systems, entanglement correlations between the parties exerts direct influence in the phenomenon of wave-particle duality. This effect has been quantitatively analyzed in the context of two qubits by M. Jakob and J. Bergou [Optics Communications 283(5) (2010) 827]. Employing a description of the $K$-meson propagation in free space where its weak decay states are included as a second party, we study here this effect in the kaon-antikaon oscillations. We show that a new quantitative "triality" relation holds, similar to the one considered by Jakob and Bergou. In our case, it relates the distinguishability between the decay products states corresponding to the distinct kaon propagation modes $K_S $, $K_L $, the amount of wave-like path interference between these states, and the amount of entanglement given by the reduced von Neumann entropy. The inequality can account for the complementarity between strangeness oscillations and lifetime information previously considered in the literature, therefore allowing one to see how it is affected by entanglement correlations. As we will discuss, it allows one to visualize clearly through the $K^{0}$$\overline{K}\,^{0}$ oscillations the fundamental role of entanglement in quantum complementarity.
△ Less
Submitted 8 December, 2016; v1 submitted 10 November, 2016;
originally announced November 2016.
-
Network segregation in a model of misinformation and fact checking
Authors:
Marcella Tambuscio,
Diego F. M. Oliveira,
Giovanni Luca Ciampaglia,
Giancarlo Ruffo
Abstract:
Misinformation under the form of rumor, hoaxes, and conspiracy theories spreads on social media at alarming rates. One hypothesis is that, since social media are shaped by homophily, belief in misinformation may be more likely to thrive on those social circles that are segregated from the rest of the network. One possible antidote is fact checking which, in some cases, is known to stop rumors from…
▽ More
Misinformation under the form of rumor, hoaxes, and conspiracy theories spreads on social media at alarming rates. One hypothesis is that, since social media are shaped by homophily, belief in misinformation may be more likely to thrive on those social circles that are segregated from the rest of the network. One possible antidote is fact checking which, in some cases, is known to stop rumors from spreading further. However, fact checking may also backfire and reinforce the belief in a hoax. Here we take into account the combination of network segregation, finite memory and attention, and fact-checking efforts. We consider a compartmental model of two interacting epidemic processes over a network that is segregated between gullible and skeptic users. Extensive simulation and mean-field analysis show that a more segregated network facilitates the spread of a hoax only at low forgetting rates, but has no effect when agents forget at faster rates. This finding may inform the development of mitigation techniques and overall inform on the risks of uncontrolled misinformation online.
△ Less
Submitted 17 January, 2018; v1 submitted 13 October, 2016;
originally announced October 2016.
-
A Near-Quadratic Lower Bound for the Size of Quantum Circuits of Constant Treewidth
Authors:
Mateus de Oliveira Oliveira
Abstract:
We show that any quantum circuit of treewidth $t$, built from $r$-qubit gates, requires at least $Ω(\frac{n^{2}}{2^{O(r\cdot t)}\cdot \log^4 n})$ gates to compute the element distinctness function. Our result generalizes a near-quadratic lower bound for quantum formula size obtained by Roychowdhury and Vatan [SIAM J. on Computing, 2001]. The proof of our lower bound follows by an extension of Neči…
▽ More
We show that any quantum circuit of treewidth $t$, built from $r$-qubit gates, requires at least $Ω(\frac{n^{2}}{2^{O(r\cdot t)}\cdot \log^4 n})$ gates to compute the element distinctness function. Our result generalizes a near-quadratic lower bound for quantum formula size obtained by Roychowdhury and Vatan [SIAM J. on Computing, 2001]. The proof of our lower bound follows by an extension of Nečiporuk's method to the context of quantum circuits of constant treewidth. This extension is made via a combination of techniques from structural graph theory, tensor-network theory, and the connected-component counting method, which is a classic tool in algebraic geometry.
△ Less
Submitted 30 September, 2016;
originally announced September 2016.
-
Poisson's spot and Gouy phase
Authors:
I. G. da Paz,
Rodolfo Soldati,
L. A. Cabral,
J. G. G. de Oliveira Jr,
Marcos Sampaio
Abstract:
Recently there have been experimental results on Poisson spot matter wave interferometry followed by theoretical models describing the relative importance of the wave and particle behaviors for the phenomenon. We propose an analytical theoretical model for the Poisson's spot with matter waves based on Babinet principle in which we use the results for a free propagation and single slit diffraction.…
▽ More
Recently there have been experimental results on Poisson spot matter wave interferometry followed by theoretical models describing the relative importance of the wave and particle behaviors for the phenomenon. We propose an analytical theoretical model for the Poisson's spot with matter waves based on Babinet principle in which we use the results for a free propagation and single slit diffraction. We take into account effects of loss of coherence and finite detection area using the propagator for a quantum particle interacting with an environment. We observe that the matter wave Gouy phase plays a role in the existence of the central peak and thus corroborates the predominantly wavelike character of the Poisson's spot. Our model shows remarkable agreement with the experimental data for deuterium ($D_{2}$) molecules.
△ Less
Submitted 28 September, 2016;
originally announced September 2016.
-
An extremal problem related to generalizations of the Nyman-Beurling and Báez-Duarte criteria
Authors:
Dimitar K. Dimitrov,
Willian D. Oliveira
Abstract:
We establish generalizations of the Nyman-Beurling and Báez-Duarte criteria concerning lack of zeros of Dirichlet $L$-functions in the semi-plane $\Re(s) >1/p$ for $p\in (1,2]$. We pose and solve a natural extremal problem for Dirichlet polynomials which take values one at the zeros of the corresponding $L$-function on the vertical line $\Re(s)=1/p$.
We establish generalizations of the Nyman-Beurling and Báez-Duarte criteria concerning lack of zeros of Dirichlet $L$-functions in the semi-plane $\Re(s) >1/p$ for $p\in (1,2]$. We pose and solve a natural extremal problem for Dirichlet polynomials which take values one at the zeros of the corresponding $L$-function on the vertical line $\Re(s)=1/p$.
△ Less
Submitted 28 August, 2016;
originally announced August 2016.
-
Fermions in Gödel-type background space-times with torsion and the Landau quantization
Authors:
G. Q. Garcia,
J. R. de S. Oliveira,
K. Bakke,
C. Furtado
Abstract:
In this paper, we analyze Dirac fermions in Gödel-type background space-times with torsion. We also consider the Gödel-type spacetimes embedded in a topological defect background. We show that relativistic bound states solutions to the Dirac equation can be obtained by dealing with three cases of the Gödel-type solutions with torsion, where a cosmic string passes through these three cases of the s…
▽ More
In this paper, we analyze Dirac fermions in Gödel-type background space-times with torsion. We also consider the Gödel-type spacetimes embedded in a topological defect background. We show that relativistic bound states solutions to the Dirac equation can be obtained by dealing with three cases of the Gödel-type solutions with torsion, where a cosmic string passes through these three cases of the space-time. We obtain the relativistic energy levels for all cases of the Gödel-type solutions with torsion with a cosmic string, where we show that there exists an analogy with the Landau levels for Dirac particles. We also show that the presence of torsion in the space-time yields new contributions to the relativistic spectrum of energies and that the presence of the topological defect modifies the degeneracy of the relativistic energy levels.
△ Less
Submitted 14 March, 2017; v1 submitted 1 July, 2016;
originally announced July 2016.
-
Teaching Physics in the first years of Elementary School to children with ADHD
Authors:
Eduardo Folco Capossoli,
Andréa Teixeira de Siqueira Oliveira,
Sandro Soares Fernandes
Abstract:
In this paper we report on a Science Fair activity developed at Colegio Pedro II, a traditional Brazilian school, with a group of eight 8-12 years old Attention Deficit Hyperactivity Disorder (ADHD) students. ADHD is usually a condition associated with underachievement at school. As part of working toward scientific literacy for students, we explored the idea of conservation of energy based on STS…
▽ More
In this paper we report on a Science Fair activity developed at Colegio Pedro II, a traditional Brazilian school, with a group of eight 8-12 years old Attention Deficit Hyperactivity Disorder (ADHD) students. ADHD is usually a condition associated with underachievement at school. As part of working toward scientific literacy for students, we explored the idea of conservation of energy based on STS paradigm. At the same time, the learning experience was designed to stimulate children's poor executive function, or, more specifically, their ability to manage time and planning future tasks.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
On the mediation of program allocation in high-demand environments
Authors:
Fabiano de S. Oliveira,
Valmir C. Barbosa
Abstract:
In this paper we challenge the widely accepted premise that, in order to carry out a distributed computation, say on the cloud, users have to inform, along with all the inputs that the algorithm in use requires, the number of processors to be used. We discuss the complicated nature of deciding the value of such parameter, should it be chosen optimally, and propose the alternative scenario in which…
▽ More
In this paper we challenge the widely accepted premise that, in order to carry out a distributed computation, say on the cloud, users have to inform, along with all the inputs that the algorithm in use requires, the number of processors to be used. We discuss the complicated nature of deciding the value of such parameter, should it be chosen optimally, and propose the alternative scenario in which this choice is passed on to the server side for automatic determination. We show that the allocation problem arising from this alternative is NP-hard only weakly, being therefore solvable in pseudo-polynomial time. In our proposal, one key component on which the automatic determination of the number of processors is based is the cost model. The one we use, which is being increasingly adopted in the wake of the cloud-computing movement, posits that each single execution of a program is to be subject to current circumstances on both user and server side, and as such be priced independently of all others. Running through our proposal is thus a critique of the established common sense that sizing a set of processors to handle a submission to some provider is entirely up to the user.
△ Less
Submitted 20 September, 2019; v1 submitted 27 April, 2016;
originally announced April 2016.
-
Evolution to the equilibrium in a dissipative and time dependent billiard
Authors:
Marcus Vinicius Camillo Galia,
Diego F. M. Oliveira,
Edson D. Leonel
Abstract:
We study the convergence towards the equilibrium for a dissipative and stochastic time-dependent oval billiard. The dynamics of the system is described by using a generic four dimensional nonlinear map for the variables: the angular position of the particle, the angle formed by the trajectory of the article with the tangent line at the position of the collision, the absolute velocity of the partic…
▽ More
We study the convergence towards the equilibrium for a dissipative and stochastic time-dependent oval billiard. The dynamics of the system is described by using a generic four dimensional nonlinear map for the variables: the angular position of the particle, the angle formed by the trajectory of the article with the tangent line at the position of the collision, the absolute velocity of the particle, and the instant of the hit with the boundary. The dynamics of the stationary state as well as the dynamical evolution towards the equilibrium is made by using an ensemble of non interacting particles. Finally, we make a connection with the thermodynamic by using the energy equipartition theorem.
△ Less
Submitted 22 February, 2016;
originally announced February 2016.
-
Sign regularity of Maclaurin coefficients of functions in the Laguerre-Pólya class
Authors:
Dimitar K. Dimitrov,
Willian D. Oliveira
Abstract:
We prove that the signs of the Maclaurin coefficients of a wide class of entire functions that belong to the Laguerre-Pólya class posses a regular behaviour.
We prove that the signs of the Maclaurin coefficients of a wide class of entire functions that belong to the Laguerre-Pólya class posses a regular behaviour.
△ Less
Submitted 20 January, 2016;
originally announced January 2016.
-
Counting independent terms in big-oh notation
Authors:
Fabiano de S. Oliveira,
Valmir C. Barbosa
Abstract:
The field of computational complexity is concerned both with the intrinsic hardness of computational problems and with the efficiency of algorithms to solve them. Given such a problem, normally one designs an algorithm to solve it and sets about establishing bounds on its performance as functions of the algorithm's variables, particularly upper bounds expressed via the big-oh notation. But if we w…
▽ More
The field of computational complexity is concerned both with the intrinsic hardness of computational problems and with the efficiency of algorithms to solve them. Given such a problem, normally one designs an algorithm to solve it and sets about establishing bounds on its performance as functions of the algorithm's variables, particularly upper bounds expressed via the big-oh notation. But if we were given some inscrutable code and were asked to figure out its big-oh profile from performance data on a given set of inputs, how hard would we have to grapple with the various possibilities before zooming in on a reasonably small set of candidates? Here we show that, even if we restricted our search to upper bounds given by polynomials, the number of possibilities could be arbitrarily large for two or more variables. This is unexpected, given the available body of examples on algorithmic efficiency, and serves to illustrate the many facets of the big-oh notation, as well as its counter-intuitive twists.
△ Less
Submitted 31 December, 2015;
originally announced December 2015.
-
ADMM for the SDP relaxation of the QAP
Authors:
Danilo Elias Oliveira,
Henry Wolkowicz,
Yangyang Xu
Abstract:
The semidefinite programming (SDP) relaxation has proven to be extremely strong for many hard discrete optimization problems. This is in particular true for the quadratic assignment problem (QAP), arguably one of the hardest NP-hard discrete optimization problems. There are several difficulties that arise in efficiently solving the SDP relaxation, e.g.,~increased dimension; inefficiency of the cur…
▽ More
The semidefinite programming (SDP) relaxation has proven to be extremely strong for many hard discrete optimization problems. This is in particular true for the quadratic assignment problem (QAP), arguably one of the hardest NP-hard discrete optimization problems. There are several difficulties that arise in efficiently solving the SDP relaxation, e.g.,~increased dimension; inefficiency of the current primal-dual interior point solvers in terms of both time and accuracy; and difficulty and high expense in adding cutting plane constraints.
We propose using the alternating direction method of multipliers (ADMM) to solve the SDP relaxation. This first order approach allows for inexpensive iterations, a method of cheaply obtaining low rank solutions, as well a trivial way of adding cutting plane inequalities. When compared to current approaches and current best available bounds we obtain remarkable robustness, efficiency and improved bounds.
△ Less
Submitted 16 December, 2015;
originally announced December 2015.
-
Detecting and Handling Flash-Crowd Events on Cloud Environments
Authors:
Ubiratam de Paula,
Daniel de Oliveira,
Yuri Frota,
Valmir C. Barbosa,
Lúcia Drummond
Abstract:
Cloud computing is a highly scalable computing paradigm where resources are delivered to users on demand via Internet. There are several areas that can benefit from cloud computing and one in special is gaining much attention: the flash-crowd handling. Flash-crowd events happen when servers are unable to handle the volume of requests for a specific content (or a set of contents) that actually reac…
▽ More
Cloud computing is a highly scalable computing paradigm where resources are delivered to users on demand via Internet. There are several areas that can benefit from cloud computing and one in special is gaining much attention: the flash-crowd handling. Flash-crowd events happen when servers are unable to handle the volume of requests for a specific content (or a set of contents) that actually reach it, thus causing some requests to be denied. For the handling of flash-crowd events in Web applications, clouds can offer elastic computing and storage capacity during these events in order to process all requests. However, it is important that flash-crowd events are quickly detected and the amount of resources to be instantiated during flash crowds is correctly estimated. In this paper, a new mechanism for detection of flash crowds based on concepts of entropy and total correlation is proposed. Moreover, the Flash-Crowd Handling Problem (FCHP) is precisely defined and formulated as an integer programming problem. A new algorithm for solving it, named FCHP-ILS, is also proposed. With FCHP-ILS the Web provider is able to replicate contents in the available resources and define the types and amount of resources to instantiate in the cloud during a flash-crowd event. Finally we present a case study, based on a synthetic dataset representing flash-crowd events in small scenarios aiming at comparing the proposed approach with de facto standard Amazon's Auto Scaling mechanism.
△ Less
Submitted 13 October, 2015;
originally announced October 2015.
-
The zero-inflated promotion cure rate regression model applied to fraud propensity in bank loan applications
Authors:
Francisco Louzada,
Mauro R. de Oliveira Jr,
Fernando F. Moreira
Abstract:
In this paper we extend the promotion cure rate model proposed by Chen et al (1999), by incorporating excess of zeros in the modelling. Despite allowing to relate the covariates to the fraction of cure, the current approach, which is based on a biological interpretation of the causes that trigger the event of interest, does not enable to relate the covariates to the fraction of zeros. The presence…
▽ More
In this paper we extend the promotion cure rate model proposed by Chen et al (1999), by incorporating excess of zeros in the modelling. Despite allowing to relate the covariates to the fraction of cure, the current approach, which is based on a biological interpretation of the causes that trigger the event of interest, does not enable to relate the covariates to the fraction of zeros. The presence of zeros in survival data, unusual in medical studies, can frequently occur in banking loan portfolios, as presented in Louzada et al (2015), where they deal with propensity to fraud in lending loans in a major Brazilian bank. To illustrate the new cure rate survival method, the same real dataset analyzed in Louzada et al (2015) is fitted here, and the results are compared.
△ Less
Submitted 1 October, 2015;
originally announced October 2015.
-
The zero-inflated cure rate regression model: Applications to fraud detection in bank loan portfolios
Authors:
Francisco Louzada,
Mauro R. de Oliveira Jr,
Fernando F. Moreira
Abstract:
In this paper, we introduce a methodology based on the zero-inflated cure rate model to detect fraudsters in bank loan applications. In fact, our approach enables us to accommodate three different types of loan applicants, i.e., fraudsters, those who are susceptible to default and finally, those who are not susceptible to default. An advantage of our approach is to accommodate zero-inflated times,…
▽ More
In this paper, we introduce a methodology based on the zero-inflated cure rate model to detect fraudsters in bank loan applications. In fact, our approach enables us to accommodate three different types of loan applicants, i.e., fraudsters, those who are susceptible to default and finally, those who are not susceptible to default. An advantage of our approach is to accommodate zero-inflated times, which is not possible in the standard cure rate model. To illustrate the proposed method, a real dataset of loan survival times is fitted by the zero-inflated Weibull cure rate model. The parameter estimation is reached by maximum likelihood estimation procedure and Monte Carlo simulations are carried out to check its finite sample performance.
△ Less
Submitted 19 September, 2015; v1 submitted 17 September, 2015;
originally announced September 2015.
-
Magnetosphere-Ionosphere Coupling and Field-Aligned Currents
Authors:
D. M. Oliveira
Abstract:
It is presented in this paper a review of one of several interactions between the magnetosphere and the ionosphere through the field-aligned currents (FACs). Some characteristics and physical implications of the currents flowing in a plane perpendicular to the magnetic field at high latitudes are discussed. The behavior of this system as an electric circuit is explained, where momentum and energy…
▽ More
It is presented in this paper a review of one of several interactions between the magnetosphere and the ionosphere through the field-aligned currents (FACs). Some characteristics and physical implications of the currents flowing in a plane perpendicular to the magnetic field at high latitudes are discussed. The behavior of this system as an electric circuit is explained, where momentum and energy are transferred via Poynting flux from the magnetosphere into the ionosphere.
△ Less
Submitted 23 July, 2015;
originally announced July 2015.
-
Impact Angle Control of Interplanetary Shock Geoeffectiveness: A Statistical Study
Authors:
D. M. Oliveira,
J. Raeder
Abstract:
We present a survey of interplanetary (IP) shocks using Wind and ACE satellite data from January 1995 to December 2013 to study how IP shock geoeffectiveness is controlled by IP shock impact angles. A shock list covering one and a half solar cycle is compiled. The yearly number of IP shocks is found to correlate well with the monthly sunspot number. We use data from SuperMAG, a large chain with mo…
▽ More
We present a survey of interplanetary (IP) shocks using Wind and ACE satellite data from January 1995 to December 2013 to study how IP shock geoeffectiveness is controlled by IP shock impact angles. A shock list covering one and a half solar cycle is compiled. The yearly number of IP shocks is found to correlate well with the monthly sunspot number. We use data from SuperMAG, a large chain with more than 300 geomagnetic stations, to study geoeffectiveness triggered by IP shocks. The SuperMAG SML index, an enhanced version of the familiar AL index, is used in our statistical analysis. The jumps of the SML index triggered by IP shock impacts on the Earth's magnetosphere is investigated in terms of IP shock orientation and speed. We find that, in general, strong (high speed) and almost frontal (small impact angle) shocks are more geoeffective than inclined shocks with low speed. The strongest correlation (correlation coefficient R = 0.70) occurs for fixed IP shock speed and varying the IP shock impact angle. We attribute this result, predicted previously with simulations, to the fact that frontal shocks compress the magnetosphere symmetrically from all sides, which is a favorable condition for the release of magnetic energy stored in the magnetotail, which in turn can produce moderate to strong auroral substorms, which are then observed by ground based magnetometers.
△ Less
Submitted 16 July, 2015; v1 submitted 10 July, 2015;
originally announced July 2015.
-
Impact Angle Control of Interplanetary Shock Geoeffectiveness
Authors:
D. M. Oliveira,
J. Raeder
Abstract:
We use OpenGGCM global MHD simulations to study the nightside magnetospheric, magnetotail, and ionospheric responses to interplanetary (IP) fa st forward shocks. Three cases are presented in this study: two inclined oblique shocks, here after IOS-1 and IOS-2, where the latter has a Mach number twice stronger than the former. Both shocks have impact angles of 30$^o$ in relation to the Sun-Earth lin…
▽ More
We use OpenGGCM global MHD simulations to study the nightside magnetospheric, magnetotail, and ionospheric responses to interplanetary (IP) fa st forward shocks. Three cases are presented in this study: two inclined oblique shocks, here after IOS-1 and IOS-2, where the latter has a Mach number twice stronger than the former. Both shocks have impact angles of 30$^o$ in relation to the Sun-Earth line. Lastly, we choose a frontal perpendicular shock, FPS, whose shock normal is along the Sun-Earth line, with the same Mach number as IOS-1. We find that, in the IOS-1 case, due to the north-south asymmetry, the magnetotail is deflected southward, leading to a mild compression. The geomagnetic activity observed in the nightside ionosphere is then weak. On the other hand, in the head-on case, the FPS compresses the magnetotail from both sides symmetrically. This compression triggers a substorm allowing a larger amount of stored energy in the magnetotail to be released to the nightside ionosphere, resulting in stronger geomagnetic activity. By comparing IOS-2 and FPS, we find that, despite the IOS-2 having a larger Mach number, the FPS leads to a larger geomagnetic response in the nightside ionosphere. As a result, we conclude that IP shocks with similar upstream conditions, such as magnetic field, speed, density, and Mach number, can have different geoeffectiveness, depending on their shock normal orientation.
△ Less
Submitted 14 July, 2015; v1 submitted 8 July, 2015;
originally announced July 2015.
-
Effects of interplanetary shock inclinations on nightside auroral power intensity
Authors:
D. M. Oliveira,
J. Raeder,
B. T. Tsurutani,
J. W. Gjerloev
Abstract:
We derive fast forward interplanetary (IP) shock speeds and impact angles to study the geoeffectivness of 461 IP shocks that occurred from January 1995 to December 2013 using ACE and WIND spacecraft data. The geomagnetic activity is inferred from the SuperMAG project data. SuperMAG is a large chain which employs more than 300 ground stations to compute enhanced versions of the traditional geomagne…
▽ More
We derive fast forward interplanetary (IP) shock speeds and impact angles to study the geoeffectivness of 461 IP shocks that occurred from January 1995 to December 2013 using ACE and WIND spacecraft data. The geomagnetic activity is inferred from the SuperMAG project data. SuperMAG is a large chain which employs more than 300 ground stations to compute enhanced versions of the traditional geomagnetic indices. The SuperMAG auroral electroject SME index, an enhanced version of the traditional AE index, is used as an auroral power (AP) indicator. AP intensity jumps triggered by shock impacts are correlated with both shock speed and impact angle. It is found that high AP intensity events typically occur when high speed IP shocks impact the Earths magnetosphere with the shock normal almost parallel to the Sun-Earth line. This result suggests that symmetric and strong magnetospheric compression leads to favorable conditions for intense auroral power release, as shown previously by simulations and observations. Some potential mechanisms will be discussed.
△ Less
Submitted 8 January, 2016; v1 submitted 8 July, 2015;
originally announced July 2015.
-
Measuring Online Social Bubbles
Authors:
Dimitar Nikolov,
Diego F. M. Oliveira,
Alessandro Flammini,
Filippo Menczer
Abstract:
Social media have quickly become a prevalent channel to access information, spread ideas, and influence opinions. However, it has been suggested that social and algorithmic filtering may cause exposure to less diverse points of view, and even foster polarization and misinformation. Here we explore and validate this hypothesis quantitatively for the first time, at the collective and individual leve…
▽ More
Social media have quickly become a prevalent channel to access information, spread ideas, and influence opinions. However, it has been suggested that social and algorithmic filtering may cause exposure to less diverse points of view, and even foster polarization and misinformation. Here we explore and validate this hypothesis quantitatively for the first time, at the collective and individual levels, by mining three massive datasets of web traffic, search logs, and Twitter posts. Our analysis shows that collectively, people access information from a significantly narrower spectrum of sources through social media and email, compared to search. The significance of this finding for individual exposure is revealed by investigating the relationship between the diversity of information sources experienced by users at the collective and individual level. There is a strong correlation between collective and individual diversity, supporting the notion that when we use social media we find ourselves inside "social bubbles". Our results could lead to a deeper understanding of how technology biases our exposure to new information.
△ Less
Submitted 28 October, 2015; v1 submitted 25 February, 2015;
originally announced February 2015.
-
Euclid Space Mission: building the sky survey
Authors:
I. Tereno,
C. S. Carvalho,
J. Dinis,
R. Scaramella,
J. Amiaux,
C. Burigana,
J. C. Cuillandre,
A. da Silva,
A. Derosa,
E. Maiorano,
M. Maris,
D. Oliveira,
P. Franzetti,
B. Garilli,
P. Gomez-Alvarez,
M. Meneghetti,
S. Wachter,
the Euclid Collaboration
Abstract:
The Euclid space mission proposes to survey 15000 square degrees of the extragalactic sky during 6 years, with a step-and-stare technique. The scheduling of observation sequences is driven by the primary scientific objectives, spacecraft constraints, calibration requirements and physical properties of the sky. We present the current reference implementation of the Euclid survey and on-going work o…
▽ More
The Euclid space mission proposes to survey 15000 square degrees of the extragalactic sky during 6 years, with a step-and-stare technique. The scheduling of observation sequences is driven by the primary scientific objectives, spacecraft constraints, calibration requirements and physical properties of the sky. We present the current reference implementation of the Euclid survey and on-going work on survey optimization.
△ Less
Submitted 28 January, 2015;
originally announced February 2015.
-
Evaluating Feasibility of Using Wireless Sensor Networks in a Coffee Crop Through Simulation of AODV, AOMDV, DSDV and Their Variants with 802.15.4 Mac Protocol
Authors:
Ederval Pablo Ferreira da Cruz,
Luis Eduardo Gottardo,
Franciele Pereira Rossini,
Vinicius de Souza Oliveira,
Lucas Cellim Pereira
Abstract:
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to extract a specific metric, depending of the application. We would like to analyse the feasibility to use sensors in a coffee crop. In this work we are evaluating routing protocols using real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV…
▽ More
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to extract a specific metric, depending of the application. We would like to analyse the feasibility to use sensors in a coffee crop. In this work we are evaluating routing protocols using real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol. For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End -to-End Delay and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Handling Flash-Crowd Events to Improve the Performance of Web Applications
Authors:
Ubiratam de Paula Junior,
Lúcia M. A. Drummond,
Daniel de Oliveira,
Yuri Frota,
Valmir C. Barbosa
Abstract:
Cloud computing can offer a set of computing resources according to users' demand. It is suitable to be used to handle flash-crowd events in Web applications due to its elasticity and on-demand characteristics. Thus, when Web applications need more computing or storage capacity, they just instantiate new resources. However, providers have to estimate the amount of resources to instantiate to handl…
▽ More
Cloud computing can offer a set of computing resources according to users' demand. It is suitable to be used to handle flash-crowd events in Web applications due to its elasticity and on-demand characteristics. Thus, when Web applications need more computing or storage capacity, they just instantiate new resources. However, providers have to estimate the amount of resources to instantiate to handle with the flash-crowd event. This estimation is far from trivial since each cloud environment provides several kinds of heterogeneous resources, each one with its own characteristics such as bandwidth, CPU, memory and financial cost. In this paper, the Flash Crowd Handling Problem (FCHP) is precisely defined and formulated as an integer programming problem. A new algorithm for handling with a flash crowd named FCHP-ILS is also proposed. With FCHP-ILS the Web applications can replicate contents in the already instantiated resources and define the types and amount of resources to instantiate in the cloud during a flash crowd. Our approach is evaluated considering real flash crowd traces obtained from the related literature. We also present a case study, based on a synthetic dataset representing flash-crowd events in small scenarios aiming at the comparison of the proposed approach against Amazon's Auto-Scale mechanism.
△ Less
Submitted 10 October, 2014;
originally announced October 2014.
-
An Algorithmic Metatheorem for Directed Treewidth
Authors:
Mateus de Oliveira Oliveira
Abstract:
The notion of directed treewidth was introduced by Johnson, Robertson, Seymour and Thomas [Journal of Combinatorial Theory, Series B, Vol 82, 2001] as a first step towards an algorithmic metatheory for digraphs. They showed that some NP-complete properties such as Hamiltonicity can be decided in polynomial time on digraphs of constant directed treewidth. Nevertheless, despite more than one decade…
▽ More
The notion of directed treewidth was introduced by Johnson, Robertson, Seymour and Thomas [Journal of Combinatorial Theory, Series B, Vol 82, 2001] as a first step towards an algorithmic metatheory for digraphs. They showed that some NP-complete properties such as Hamiltonicity can be decided in polynomial time on digraphs of constant directed treewidth. Nevertheless, despite more than one decade of intensive research, the list of hard combinatorial problems that are known to be solvable in polynomial time when restricted to digraphs of constant directed treewidth has remained scarce. In this work we enrich this list by providing for the first time an algorithmic metatheorem connecting the monadic second order logic of graphs to directed treewidth. We show that most of the known positive algorithmic results for digraphs of constant directed treewidth can be reformulated in terms of our metatheorem. Additionally, we show how to use our metatheorem to provide polynomial time algorithms for two classes of combinatorial problems that have not yet been studied in the context of directed width measures. More precisely, for each fixed $k,w \in \mathbb{N}$, we show how to count in polynomial time on digraphs of directed treewidth $w$, the number of minimum spanning strong subgraphs that are the union of $k$ directed paths, and the number of maximal subgraphs that are the union of $k$ directed paths and satisfy a given minor closed property. To prove our metatheorem we devise two technical tools which we believe to be of independent interest. First, we introduce the notion of tree-zig-zag number of a digraph, a new directed width measure that is at most a constant times directed treewidth. Second, we introduce the notion of $z$-saturated tree slice language, a new formalism for the specification and manipulation of infinite sets of digraphs.
△ Less
Submitted 8 October, 2015; v1 submitted 2 October, 2014;
originally announced October 2014.
-
Obtaining adjusted prevalence ratios from logistic regression model in cross-sectional studies
Authors:
Leonardo Soares Bastos,
Raquel de Vasconcellos Carvalhaes de Oliveira,
Luciane de Souza Velasque
Abstract:
In the last decades, it has been discussed the use of epidemiological prevalence ratio (PR) rather than odds ratio as a measure of association to be estimated in cross-sectional studies. The main difficulties in use of statistical models for the calculation of PR are convergence problems, availability of adequate tools and strong assumptions. The goal of this study is to illustrate how to estimate…
▽ More
In the last decades, it has been discussed the use of epidemiological prevalence ratio (PR) rather than odds ratio as a measure of association to be estimated in cross-sectional studies. The main difficulties in use of statistical models for the calculation of PR are convergence problems, availability of adequate tools and strong assumptions. The goal of this study is to illustrate how to estimate PR and its confidence interval directly from logistic regression estimates. We present three examples and compare the adjusted estimates of PR with the estimates obtained by use of log-binomial, robust Poisson regression and adjusted prevalence odds ratio (POR). The marginal and conditional prevalence ratios estimated from logistic regression showed the following advantages: no numerical instability; simple to implement in a statistical software; and assumes the adequate probability distribution for the outcome.
△ Less
Submitted 22 September, 2014;
originally announced September 2014.
-
Event and Anomaly Detection Using Tucker3 Decomposition
Authors:
Hadi Fanaee-T,
Márcia D. B. Oliveira,
João Gama,
Simon Malinowski,
Ricardo Morla
Abstract:
Failure detection in telecommunication networks is a vital task. So far, several supervised and unsupervised solutions have been provided for discovering failures in such networks. Among them unsupervised approaches has attracted more attention since no label data is required. Often, network devices are not able to provide information about the type of failure. In such cases the type of failure is…
▽ More
Failure detection in telecommunication networks is a vital task. So far, several supervised and unsupervised solutions have been provided for discovering failures in such networks. Among them unsupervised approaches has attracted more attention since no label data is required. Often, network devices are not able to provide information about the type of failure. In such cases the type of failure is not known in advance and the unsupervised setting is more appropriate for diagnosis. Among unsupervised approaches, Principal Component Analysis (PCA) is a well-known solution which has been widely used in the anomaly detection literature and can be applied to matrix data (e.g. Users-Features). However, one of the important properties of network data is their temporal sequential nature. So considering the interaction of dimensions over a third dimension, such as time, may provide us better insights into the nature of network failures. In this paper we demonstrate the power of three-way analysis to detect events and anomalies in time-evolving network data.
△ Less
Submitted 12 June, 2014;
originally announced June 2014.
-
On the Satisfiability of Quantum Circuits of Small Treewidth
Authors:
Mateus de Oliveira Oliveira
Abstract:
It has been known for almost three decades that many $\mathrm{NP}$-hard optimization problems can be solved in polynomial time when restricted to structures of constant treewidth. In this work we provide the first extension of such results to the quantum setting. We show that given a quantum circuit $C$ with $n$ uninitialized inputs, $\mathit{poly}(n)$ gates, and treewidth $t$, one can compute in…
▽ More
It has been known for almost three decades that many $\mathrm{NP}$-hard optimization problems can be solved in polynomial time when restricted to structures of constant treewidth. In this work we provide the first extension of such results to the quantum setting. We show that given a quantum circuit $C$ with $n$ uninitialized inputs, $\mathit{poly}(n)$ gates, and treewidth $t$, one can compute in time $(\frac{n}δ)^{\exp(O(t))}$ a classical assignment $y\in \{0,1\}^n$ that maximizes the acceptance probability of $C$ up to a $δ$ additive factor. In particular, our algorithm runs in polynomial time if $t$ is constant and $1/poly(n) < δ< 1$. For unrestricted values of $t$, this problem is known to be complete for the complexity class $\mathrm{QCMA}$, a quantum generalization of MA. In contrast, we show that the same problem is $\mathrm{NP}$-complete if $t=O(\log n)$ even when $δ$ is constant.
On the other hand, we show that given a $n$-input quantum circuit $C$ of treewidth $t=O(\log n)$, and a constant $δ<1/2$, it is $\mathrm{QMA}$-complete to determine whether there exists a quantum state $\mid\!\varphi\rangle \in (\mathbb{C}^d)^{\otimes n}$ such that the acceptance probability of $C\mid\!\varphi\rangle$ is greater than $1-δ$, or whether for every such state $\mid\!\varphi\rangle$, the acceptance probability of $C\mid\!\varphi\rangle$ is less than $δ$. As a consequence, under the widely believed assumption that $\mathrm{QMA} \neq \mathrm{NP}$, we have that quantum witnesses are strictly more powerful than classical witnesses with respect to Merlin-Arthur protocols in which the verifier is a quantum circuit of logarithmic treewidth.
△ Less
Submitted 7 February, 2016; v1 submitted 22 April, 2014;
originally announced April 2014.
-
Microtubule shuttles on kinesin-coated glass micro-wire tracks
Authors:
Kyongwan Kim,
Andrew L. Liao,
Aurelien Sikora,
Daniel Oliveira,
Hikaru Nakazawa,
Mitsuo Umetsu,
Izumi Kumagai,
Tadafumi Adschiri,
Wonmuk Hwangb,
Winfried Teizer
Abstract:
Gliding of microtubule filaments on surfaces coated with the motor protein kinesin has potential applications for nano-scale devices. The ability to guide the gliding direction in three dimensions allows the fabrication of tracks of arbitrary geometry in space. Here, we achieve this by using kinesin-coated glass wires of micrometer diameter range. Unlike previous methods in which the guiding track…
▽ More
Gliding of microtubule filaments on surfaces coated with the motor protein kinesin has potential applications for nano-scale devices. The ability to guide the gliding direction in three dimensions allows the fabrication of tracks of arbitrary geometry in space. Here, we achieve this by using kinesin-coated glass wires of micrometer diameter range. Unlike previous methods in which the guiding tracks are fixed on flat two-dimensional surfaces, the flexibility of glass wires in shape and size facilitates building in-vitro devices that have deformable tracks.
△ Less
Submitted 20 February, 2014;
originally announced February 2014.