-
Observation of $J/ψ$ Electromagnetic Dalitz Decays to $X(1835)$, $X(2120)$ and $X(2370)$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
M. Albrecht,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
X. H. Bai,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
V. Batozskaya,
D. Becker,
K. Begzsuren,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
J. Bloms,
A. Bortone,
I. Boyko
, et al. (530 additional authors not shown)
Abstract:
Using a sample of about 10 billion $J/ψ$ events collected at a center-of-mass energy $\sqrt s = 3.097$ GeV with the BESIII detector, the electromagnetic Dalitz decays $J/ψ\to e^+e^- π^+ π^- η'$, with $η'\toγπ^+ π^-$ and $η'\toπ^+π^-η$, have been studied. The decay $J/ψ\to e^+ e^- X(1835)$ is observed with a significance of $15σ$, and the transition form factor of $J/ψ\to e^+e^-X(1835)$ is presente…
▽ More
Using a sample of about 10 billion $J/ψ$ events collected at a center-of-mass energy $\sqrt s = 3.097$ GeV with the BESIII detector, the electromagnetic Dalitz decays $J/ψ\to e^+e^- π^+ π^- η'$, with $η'\toγπ^+ π^-$ and $η'\toπ^+π^-η$, have been studied. The decay $J/ψ\to e^+ e^- X(1835)$ is observed with a significance of $15σ$, and the transition form factor of $J/ψ\to e^+e^-X(1835)$ is presented for the first time. The intermediate states $X(2120)$ and $X(2370)$ are also observed in the $π^+ π^- η'$ invariant mass spectrum with significances of $5.3σ$ and $7.3σ$. The corresponding product branching fractions for $J/ψ\to e^+e^-X$, $X\toπ^+π^-η'$ $(X=X(1835), X(2120)$ and $X(2370))$, are reported.
△ Less
Submitted 28 December, 2021;
originally announced December 2021.
-
Measurement of $e^{+}e^{-}\toφπ^{+}π^{-}$ cross sections at center-of-mass energies from 2.00 to 3.08 GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
J. Bloms,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (589 additional authors not shown)
Abstract:
Using data corresponding to an integrated luminosity of $651~\mathrm{pb}^{-1}$ accumulated at 22 center-of-mass energies from 2.00 to 3.08 GeV by the BESIII experiment, the process $e^{+}e^{-}\toφπ^{+}π^{-}$ is studied. The cross sections for $e^{+}e^{-}\toφπ^{+}π^{-}$ are consistent with previous results, but with improved precision. To measure the mass and width of the structure observed in the…
▽ More
Using data corresponding to an integrated luminosity of $651~\mathrm{pb}^{-1}$ accumulated at 22 center-of-mass energies from 2.00 to 3.08 GeV by the BESIII experiment, the process $e^{+}e^{-}\toφπ^{+}π^{-}$ is studied. The cross sections for $e^{+}e^{-}\toφπ^{+}π^{-}$ are consistent with previous results, but with improved precision. To measure the mass and width of the structure observed in the cross section line shape, a combine fit is performed after enhancing the contribution from $φf_{0}(980)$. The fit reveals a structure with the mass of $M=2178\pm20\pm5~{\rm MeV}/c^2$ and the width of $\varGamma=140\pm36\pm16~{\rm MeV}$, where the first uncertainties are statistical and the second ones are systematic.
△ Less
Submitted 17 August, 2023; v1 submitted 25 December, 2021;
originally announced December 2021.
-
Measurement of the Cross Section for $e^{+}e^{-}\to$ hadrons at Energies from 2.2324 to 3.6710 GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
M. Albrecht,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
X. H. Bai,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
V. Batozskaya,
D. Becker,
K. Begzsuren,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
J. Bloms,
A. Bortone,
I. Boyko
, et al. (545 additional authors not shown)
Abstract:
Based on electron-positron collision data collected with the BESIII detector operating at the Beijing Electron Positron Collider II storage rings, the value of $R\equivσ(e^{+}e^{-}\to$hadrons)/$σ(e^{+}e^{-}\toμ^{+}μ^{-})$ is measured at 14 center-of-mass energies from 2.2324 to 3.6710 GeV. The resulting uncertainties are less than $3.0\%$, and are dominated by systematic uncertainties.
Based on electron-positron collision data collected with the BESIII detector operating at the Beijing Electron Positron Collider II storage rings, the value of $R\equivσ(e^{+}e^{-}\to$hadrons)/$σ(e^{+}e^{-}\toμ^{+}μ^{-})$ is measured at 14 center-of-mass energies from 2.2324 to 3.6710 GeV. The resulting uncertainties are less than $3.0\%$, and are dominated by systematic uncertainties.
△ Less
Submitted 12 February, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Cross section measurements of the $e^+e^-\to D^{*+}D^{*-}$ and $e^+e^-\to D^{*+}D^{-}$ processes at center-of-mass energies from 4.085 to 4.600 GeV
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
M. Albrecht,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
X. H. Bai,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
V. Batozskaya,
D. Becker,
K. Begzsuren,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
J. Bloms,
A. Bortone,
I. Boyko
, et al. (537 additional authors not shown)
Abstract:
The Born cross sections of the $e^+e^-\to D^{*+}D^{*-}$ and $e^+e^-\to D^{*+}D^{-}$ processes are measured using $e^+e^-$ collision data collected with the BESIII experiment at center-of-mass energies from 4.085 to 4.600 GeV, corresponding to an integrated luminosity of $15.7~{\rm fb}^{-1}$. The results are consistent with and more precise than the previous measurements by the Belle, Babar and CLE…
▽ More
The Born cross sections of the $e^+e^-\to D^{*+}D^{*-}$ and $e^+e^-\to D^{*+}D^{-}$ processes are measured using $e^+e^-$ collision data collected with the BESIII experiment at center-of-mass energies from 4.085 to 4.600 GeV, corresponding to an integrated luminosity of $15.7~{\rm fb}^{-1}$. The results are consistent with and more precise than the previous measurements by the Belle, Babar and CLEO collaborations. The measurements are essential for understanding the nature of vector charmonium and charmonium-like states.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Observation of $J/ψ$ decays to $e^{+}e^{-}e^{+}e^{-}$ and $e^{+}e^{-}μ^{+}μ^{-}$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
M. Albrecht,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
X. H. Bai,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
V. Batozskaya,
D. Becker,
K. Begzsuren,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
J. Bloms,
A. Bortone,
I. Boyko
, et al. (530 additional authors not shown)
Abstract:
Using a data sample of $4.481\times 10^8 ψ^\prime$ events collected with the BESIII detector, we report the first observation of the four-lepton-decays $J/ψ\to e^+e^-e^+e^-$ and $J/ψ\to e^+e^-μ^+μ^-$ utilizing the process $ψ^\prime\to π^+π^- J/ψ$. The branching fractions are determined to be $[5.48\pm0.31~(\rm stat)\pm0.45~(\rm syst)]\times 10^{-5}$ and…
▽ More
Using a data sample of $4.481\times 10^8 ψ^\prime$ events collected with the BESIII detector, we report the first observation of the four-lepton-decays $J/ψ\to e^+e^-e^+e^-$ and $J/ψ\to e^+e^-μ^+μ^-$ utilizing the process $ψ^\prime\to π^+π^- J/ψ$. The branching fractions are determined to be $[5.48\pm0.31~(\rm stat)\pm0.45~(\rm syst)]\times 10^{-5}$ and $[3.53~\pm0.22~(\rm stat)\pm0.13~(\rm syst)]\times 10^{-5}$, respectively. The results are consistent with theoretical predictions. No significant signal is observed for $J/ψ\to μ^+μ^-μ^+μ^-$, and an upper limit on the branching fraction is set at $1.6\times 10^{-6}$ at the 90$\%$ confidence level. A CP asymmetry observable is constructed for the first two channels, which is measured to be $(-0.012\pm0.054\pm0.010)$ and $(0.062\pm0.059\pm0.006)$, respectively. No evidence for CP violation is observed in this process.
△ Less
Submitted 19 September, 2023; v1 submitted 27 November, 2021;
originally announced November 2021.
-
Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features
Authors:
Zekun Sun,
Yujie Han,
Zeyu Hua,
Na Ruan,
Weijia Jia
Abstract:
Deepfakes is a branch of malicious techniques that transplant a target face to the original one in videos, resulting in serious problems such as infringement of copyright, confusion of information, or even public panic. Previous efforts for Deepfakes videos detection mainly focused on appearance features, which have a risk of being bypassed by sophisticated manipulation, also resulting in high mod…
▽ More
Deepfakes is a branch of malicious techniques that transplant a target face to the original one in videos, resulting in serious problems such as infringement of copyright, confusion of information, or even public panic. Previous efforts for Deepfakes videos detection mainly focused on appearance features, which have a risk of being bypassed by sophisticated manipulation, also resulting in high model complexity and sensitiveness to noise. Besides, how to mine the temporal features of manipulated videos and exploit them is still an open question. We propose an efficient and robust framework named LRNet for detecting Deepfakes videos through temporal modeling on precise geometric features. A novel calibration module is devised to enhance the precision of geometric features, making it more discriminative, and a two-stream Recurrent Neural Network (RNN) is constructed for sufficient exploitation of temporal features. Compared to previous methods, our proposed method is lighter-weighted and easier to train. Moreover, our method has shown robustness in detecting highly compressed or noise corrupted videos. Our model achieved 0.999 AUC on FaceForensics++ dataset. Meanwhile, it has a graceful decline in performance (-0.042 AUC) when faced with highly compressed videos.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
Label Smoothing and Adversarial Robustness
Authors:
Chaohao Fu,
Hongbin Chen,
Na Ruan,
Weijia Jia
Abstract:
Recent studies indicate that current adversarial attack methods are flawed and easy to fail when encountering some deliberately designed defense. Sometimes even a slight modification in the model details will invalidate the attack. We find that training model with label smoothing can easily achieve striking accuracy under most gradient-based attacks. For instance, the robust accuracy of a WideResN…
▽ More
Recent studies indicate that current adversarial attack methods are flawed and easy to fail when encountering some deliberately designed defense. Sometimes even a slight modification in the model details will invalidate the attack. We find that training model with label smoothing can easily achieve striking accuracy under most gradient-based attacks. For instance, the robust accuracy of a WideResNet model trained with label smoothing on CIFAR-10 achieves 75% at most under PGD attack. To understand the reason underlying the subtle robustness, we investigate the relationship between label smoothing and adversarial robustness. Through theoretical analysis about the characteristics of the network trained with label smoothing and experiment verification of its performance under various attacks. We demonstrate that the robustness produced by label smoothing is incomplete based on the fact that its defense effect is volatile, and it cannot defend attacks transferred from a naturally trained model. Our study enlightens the research community to rethink how to evaluate the model's robustness appropriately.
△ Less
Submitted 17 September, 2020;
originally announced September 2020.
-
FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment Platforms
Authors:
Ruoyu Deng,
Na Ruan
Abstract:
Automated fraud behaviors detection on electronic payment platforms is a tough problem. Fraud users often exploit the vulnerability of payment platforms and the carelessness of users to defraud money, steal passwords, do money laundering, etc, which causes enormous losses to digital payment platforms and users. There are many challenges for fraud detection in practice. Traditional fraud detection…
▽ More
Automated fraud behaviors detection on electronic payment platforms is a tough problem. Fraud users often exploit the vulnerability of payment platforms and the carelessness of users to defraud money, steal passwords, do money laundering, etc, which causes enormous losses to digital payment platforms and users. There are many challenges for fraud detection in practice. Traditional fraud detection methods require a large-scale manually labeled dataset, which is hard to obtain in reality. Manually labeled data cost tremendous human efforts. Besides, the continuous and rapid evolution of fraud users makes it hard to find new fraud patterns based on existing detection rules. In our work, we propose a real-world data oriented detection paradigm which can detect fraud users and upgrade its detection ability automatically. Based on the new paradigm, we design a novel fraud detection model, FraudJudger, to analyze users behaviors on digital payment platforms and detect fraud users with fewer labeled data in training. FraudJudger can learn the latent representations of users from unlabeled data with the help of Adversarial Autoencoder (AAE). Furthermore, FraudJudger can find new fraud patterns from unknown users by cluster analysis. Our experiment is based on a real-world electronic payment dataset. Comparing with other well-known fraud detection methods, FraudJudger can achieve better detection performance with only 10% labeled data.
△ Less
Submitted 5 September, 2019;
originally announced September 2019.
-
Catfish Effect Between Internal and External Attackers:Being Semi-honest is Helpful
Authors:
Hanqing Liu,
Na Ruan,
Joseph K. Liu
Abstract:
The consensus protocol named proof of work (PoW) is widely applied by cryptocurrencies like Bitcoin. Although security of a PoW cryptocurrency is always the top priority, it is threatened by mining attacks like selfish mining. Researchers have proposed many mining attack models with one attacker, and optimized the attacker's strategy. During these mining attacks, an attacker pursues a higher relat…
▽ More
The consensus protocol named proof of work (PoW) is widely applied by cryptocurrencies like Bitcoin. Although security of a PoW cryptocurrency is always the top priority, it is threatened by mining attacks like selfish mining. Researchers have proposed many mining attack models with one attacker, and optimized the attacker's strategy. During these mining attacks, an attacker pursues a higher relative revenue (RR) by wasting a large amount of computational power of the honest miners at the cost of a small amount of computational power of himself. In this paper, we propose a mining attack model with two phases: the original system and the multi-attacker system. It is the first model to provide both theoretical and quantitative analysis of mining attacks with two attackers. We explain how the original system turns into the multi-attacker system by introducing two attackers: the internal attacker and the external attacker. If both attackers take the attacking strategy selfish mining, the RR of the internal attacker in multi-attacker system will drop by up to 31.9% compared with his RR in original system. The external attacker will overestimate his RR by up to 44.6% in multiattacker system. Unexpected competitions, auctions between attackers and overestimation of attackers' influence factor are three main causes of both attackers' dropping RR. We propose a mining strategy named Partial Initiative Release (PIR) which is a semi-honest mining strategy in multi-attacker system. In some specific situations, PIR allows the attacker to get more block reward by launching an attack in multi-attacker system.
△ Less
Submitted 19 June, 2019;
originally announced July 2019.
-
Time-sync Video Tag Extraction Using Semantic Association Graph
Authors:
Wenmian Yang,
Kun Wang,
Na Ruan,
Wenyuan Gao,
Weijia Jia,
Wei Zhao,
Nan Liu,
Yunyong Zhang
Abstract:
Time-sync comments reveal a new way of extracting the online video tags. However, such time-sync comments have lots of noises due to users' diverse comments, introducing great challenges for accurate and fast video tag extractions. In this paper, we propose an unsupervised video tag extraction algorithm named Semantic Weight-Inverse Document Frequency (SW-IDF). Specifically, we first generate corr…
▽ More
Time-sync comments reveal a new way of extracting the online video tags. However, such time-sync comments have lots of noises due to users' diverse comments, introducing great challenges for accurate and fast video tag extractions. In this paper, we propose an unsupervised video tag extraction algorithm named Semantic Weight-Inverse Document Frequency (SW-IDF). Specifically, we first generate corresponding semantic association graph (SAG) using semantic similarities and timestamps of the time-sync comments. Second, we propose two graph cluster algorithms, i.e., dialogue-based algorithm and topic center-based algorithm, to deal with the videos with different density of comments. Third, we design a graph iteration algorithm to assign the weight to each comment based on the degrees of the clustered subgraphs, which can differentiate the meaningful comments from the noises. Finally, we gain the weight of each word by combining Semantic Weight (SW) and Inverse Document Frequency (IDF). In this way, the video tags are extracted automatically in an unsupervised way. Extensive experiments have shown that SW-IDF (dialogue-based algorithm) achieves 0.4210 F1-score and 0.4932 MAP (Mean Average Precision) in high-density comments, 0.4267 F1-score and 0.3623 MAP in low-density comments; while SW-IDF (topic center-based algorithm) achieves 0.4444 F1-score and 0.5122 MAP in high-density comments, 0.4207 F1-score and 0.3522 MAP in low-density comments. It has a better performance than the state-of-the-art unsupervised algorithms in both F1-score and MAP.
△ Less
Submitted 3 May, 2019;
originally announced May 2019.
-
On Modelling and Complete Solutions to General Fixpoint Problems in Multi-Scale Systems with Applications
Authors:
Ning Ruan,
David Yang Gao
Abstract:
This paper revisits the well-studied fixed point problem from a unified viewpoint of mathematical modeling and canonical duality theory, i.e. the original problem is first reformulated as a nonconvex optimization problem, its well-posedness is discussed based on objectivity principle in continuum physics; then the canonical duality theory is applied for solving this problem to obtain not only all…
▽ More
This paper revisits the well-studied fixed point problem from a unified viewpoint of mathematical modeling and canonical duality theory, i.e. the original problem is first reformulated as a nonconvex optimization problem, its well-posedness is discussed based on objectivity principle in continuum physics; then the canonical duality theory is applied for solving this problem to obtain not only all fixed points, but also their stability properties. Applications are illustrated by challenging problems governed by nonconvex polynomial, exponential, and logarithmic operators. This paper shows that within the framework of the canonical duality theory, there is no difference between the fixed point problems and nonconvex analysis/optimization in multidisciplinary studies.
△ Less
Submitted 25 January, 2018;
originally announced January 2018.
-
Canonical Duality-Triality Theory: Bridge Between Nonconvex Analysis/Mechanics and Global Optimization in Complex Systems
Authors:
David Y Gao,
Ning Ruan,
Vittorio Latorre
Abstract:
Canonical duality-triality is a breakthrough methodological theory, which can be used not only for modeling complex systems within a unified framework, but also for solving a wide class of challenging problems from real-world applications. This paper presents a brief review on this theory, its philosophical origin, physics foundation, and mathematical statements in both finite and infinite dimensi…
▽ More
Canonical duality-triality is a breakthrough methodological theory, which can be used not only for modeling complex systems within a unified framework, but also for solving a wide class of challenging problems from real-world applications. This paper presents a brief review on this theory, its philosophical origin, physics foundation, and mathematical statements in both finite and infinite dimensional spaces, with emphasizing on its role for bridging the gap between nonconvex analysis/mechanics and global optimization. Special attentions are paid on unified understanding the fundamental difficulties in large deformation mechanics, bifurcation/chaos in nonlinear science, and the NP-hard problems in global optimization, as well as the theorems, methods, and algorithms for solving these challenging problems. Misunderstandings and confusions on some basic concepts, such as objectivity, nonlinearity, Lagrangian, and generalized convexities are discussed and classified. Breakthrough from recent challenges and conceptual mistakes by M. Voisei, C. Zalinescu and his co-worker are addressed. Some open problems and future works in global optimization and nonconvex mechanics are proposed.
△ Less
Submitted 26 November, 2014; v1 submitted 9 October, 2014;
originally announced October 2014.
-
Hub-Accelerator: Fast and Exact Shortest Path Computation in Large Social Networks
Authors:
Ruoming Jin,
Ning Ruan,
Bo You,
Haixun Wang
Abstract:
Shortest path computation is one of the most fundamental operations for managing and analyzing large social networks. Though existing techniques are quite effective for finding the shortest path on large but sparse road networks, social graphs have quite different characteristics: they are generally non-spatial, non-weighted, scale-free, and they exhibit small-world properties in addition to their…
▽ More
Shortest path computation is one of the most fundamental operations for managing and analyzing large social networks. Though existing techniques are quite effective for finding the shortest path on large but sparse road networks, social graphs have quite different characteristics: they are generally non-spatial, non-weighted, scale-free, and they exhibit small-world properties in addition to their massive size. In particular, the existence of hubs, those vertices with a large number of connections, explodes the search space, making the shortest path computation surprisingly challenging. In this paper, we introduce a set of novel techniques centered around hubs, collectively referred to as the Hub-Accelerator framework, to compute the k-degree shortest path (finding the shortest path between two vertices if their distance is within k). These techniques enable us to significantly reduce the search space by either greatly limiting the expansion scope of hubs (using the novel distance- preserving Hub-Network concept) or completely pruning away the hubs in the online search (using the Hub2-Labeling approach). The Hub-Accelerator approaches are more than two orders of magnitude faster than BFS and the state-of-the-art approximate shortest path method Sketch for the shortest path computation. The Hub- Network approach does not introduce additional index cost with light pre-computation cost; the index size and index construction cost of Hub2-Labeling are also moderate and better than or comparable to the approximation indexing Sketch method.
△ Less
Submitted 2 May, 2013;
originally announced May 2013.
-
Global Optimal Solutions to General Sensor Network Localization Problem
Authors:
Ning Ruan,
David Y Gao
Abstract:
Sensor network localization problem is to determine the position of the sensor nodes in a network given pairwise distance measurements. Such problem can be formulated as a polynomial minimization via the least squares method. This paper presents a canonical duality theory for solving this challenging problem. It is shown that the nonconvex minimization problem can be reformulated as a concave maxi…
▽ More
Sensor network localization problem is to determine the position of the sensor nodes in a network given pairwise distance measurements. Such problem can be formulated as a polynomial minimization via the least squares method. This paper presents a canonical duality theory for solving this challenging problem. It is shown that the nonconvex minimization problem can be reformulated as a concave maximization dual problem over a convex set in a symmetrical matrix space, and hence can be solved efficiently by combining a general (linear or quadratic) perturbation technique with existing optimization techniques. Applications are illustrated by solving some relatively large-scale problems. Our results show that the general sensor network localization problem is not NP-hard unless its canonical dual problem has no solution.
△ Less
Submitted 20 November, 2013; v1 submitted 14 February, 2013;
originally announced February 2013.
-
Complete solutions to nonconvex fractional programming problems
Authors:
David Yang Gao,
Ning Ruan
Abstract:
This paper presents a canonical dual approach to the problem of minimizing the sum of a quadratic function and the ratio of nonconvex function and quadratic functions, which is a type of non-convex optimization problem subject to an elliptic constraint. We first relax the fractional structure by introducing a family of parametric subproblems. Under certain conditions, we show that the canonical du…
▽ More
This paper presents a canonical dual approach to the problem of minimizing the sum of a quadratic function and the ratio of nonconvex function and quadratic functions, which is a type of non-convex optimization problem subject to an elliptic constraint. We first relax the fractional structure by introducing a family of parametric subproblems. Under certain conditions, we show that the canonical dual of each subproblem becomes a two-dimensional concave maximization problem that exhibits no duality gap. Since the infimum of the optima of the parameterized subproblems leads to a solution to the original problem, we then derive some optimality conditions and existence conditions for finding a global minimizer of the original problem.
△ Less
Submitted 19 November, 2012;
originally announced November 2012.
-
Canonical Solutions to Nonconvex Minimization Problems over Lorentz Cone
Authors:
Ning Ruan,
David Yang Gao
Abstract:
This paper presents a canonical dual approach for solving nonconvex quadratic minimization problem. By using the canonical duality theory, nonconvex primal minimization problems over n-dimensional Lorentz cone can be transformed into certain canonical dual problems with only one dual variable, which can be solved by using standard convex minimization methods. Extremality conditions of these soluti…
▽ More
This paper presents a canonical dual approach for solving nonconvex quadratic minimization problem. By using the canonical duality theory, nonconvex primal minimization problems over n-dimensional Lorentz cone can be transformed into certain canonical dual problems with only one dual variable, which can be solved by using standard convex minimization methods. Extremality conditions of these solutions are classified by the triality theory. Applications are illustrated.
△ Less
Submitted 18 October, 2012;
originally announced October 2012.
-
Canonical Duality Approach for Nonlinear Dynamical Systems
Authors:
Ning Ruan,
David Y. Gao
Abstract:
This paper presents a canonical dual approach for solving a nonlinear population growth problem governed by the well-known logistic equation. Using the finite difference and least squares methods, the nonlinear differential equation is first formulated as a nonconvex optimization problem with unknown parameters. We then prove that by the canonical duality theory, this nonconvex problem is equivale…
▽ More
This paper presents a canonical dual approach for solving a nonlinear population growth problem governed by the well-known logistic equation. Using the finite difference and least squares methods, the nonlinear differential equation is first formulated as a nonconvex optimization problem with unknown parameters. We then prove that by the canonical duality theory, this nonconvex problem is equivalent to a concave maximization problem over a convex feasible space, which can be solved easily to obtain global optimal solution to this challenging problem. Several illustrative examples are presented.
△ Less
Submitted 12 June, 2012;
originally announced June 2012.
-
Global Optimal Solution to Discrete Value Selection Problem with Inequality Constraints
Authors:
Ning Ruan,
David Yang Gao
Abstract:
This paper presents a canonical dual method for solving a quadratic discrete value selection problem subjected to inequality constraints. The problem is first transformed into a problem with quadratic objective and 0-1 integer variables. The dual problem of the 0-1 programming problem is thus constructed by using the canonical duality theory. Under appropriate conditions, this dual problem is a ma…
▽ More
This paper presents a canonical dual method for solving a quadratic discrete value selection problem subjected to inequality constraints. The problem is first transformed into a problem with quadratic objective and 0-1 integer variables. The dual problem of the 0-1 programming problem is thus constructed by using the canonical duality theory. Under appropriate conditions, this dual problem is a maximization problem of a concave function over a convex continuous space. Numerical simulation studies, including some large scale problems, are carried out so as to demonstrate the effectiveness and efficiency of the method proposed.
△ Less
Submitted 3 May, 2012;
originally announced May 2012.
-
Network Backbone Discovery Using Edge Clustering
Authors:
Ning Ruan,
Ruoming Jin,
Guan Wang,
Kun Huang
Abstract:
In this paper, we investigate the problem of network backbone discovery. In complex systems, a "backbone" takes a central role in carrying out the system functionality and carries the bulk of system traffic. It also both simplifies and highlight underlying networking structure. Here, we propose an integrated graph theoretical and information theoretical network backbone model. We develop an effici…
▽ More
In this paper, we investigate the problem of network backbone discovery. In complex systems, a "backbone" takes a central role in carrying out the system functionality and carries the bulk of system traffic. It also both simplifies and highlight underlying networking structure. Here, we propose an integrated graph theoretical and information theoretical network backbone model. We develop an efficient mining algorithm based on Kullback-Leibler divergence optimization procedure and maximal weight connected subgraph discovery procedure. A detailed experimental evaluation demonstrates both the effectiveness and efficiency of our approach. The case studies in the real world domain further illustrates the usefulness of the discovered network backbones.
△ Less
Submitted 16 February, 2012; v1 submitted 8 February, 2012;
originally announced February 2012.
-
Distance Preserving Graph Simplification
Authors:
Ning Ruan,
Ruoming Jin,
Yan Huang
Abstract:
Large graphs are difficult to represent, visualize, and understand. In this paper, we introduce "gate graph" - a new approach to perform graph simplification. A gate graph provides a simplified topological view of the original graph. Specifically, we construct a gate graph from a large graph so that for any "non-local" vertex pair (distance higher than some threshold) in the original graph, their…
▽ More
Large graphs are difficult to represent, visualize, and understand. In this paper, we introduce "gate graph" - a new approach to perform graph simplification. A gate graph provides a simplified topological view of the original graph. Specifically, we construct a gate graph from a large graph so that for any "non-local" vertex pair (distance higher than some threshold) in the original graph, their shortest-path distance can be recovered by consecutive "local" walks through the gate vertices in the gate graph. We perform a theoretical investigation on the gate-vertex set discovery problem. We characterize its computational complexity and reveal the upper bound of minimum gate-vertex set using VC-dimension theory. We propose an efficient mining algorithm to discover a gate-vertex set with guaranteed logarithmic bound. We further present a fast technique for pruning redundant edges in a gate graph. The detailed experimental results using both real and synthetic graphs demonstrate the effectiveness and efficiency of our approach.
△ Less
Submitted 3 October, 2011;
originally announced October 2011.
-
Evidence of $κ$ particle in $J/ψ\to \bar{K}^*(892)^0 K^+ π^-$
Authors:
J. Z. Bai,
H. Q. Zheng,
T. N. Ruan
Abstract:
Based on a $J/ψ$ data sample of $7.8 \times 10^6$ events at BESI, the decay of $ J/ψ\to \bar{K}^*(892)^0 K^+ π^-$ is studied and a low mass enhancement, which is believed not coming from the phase space effect or background, is visible in the $K^+ π^-$ invariant mass spectrum recoiling against $\bar{K}^*(892)^0$. Partial wave analysis of this channel favors this low mass enhancement being a broa…
▽ More
Based on a $J/ψ$ data sample of $7.8 \times 10^6$ events at BESI, the decay of $ J/ψ\to \bar{K}^*(892)^0 K^+ π^-$ is studied and a low mass enhancement, which is believed not coming from the phase space effect or background, is visible in the $K^+ π^-$ invariant mass spectrum recoiling against $\bar{K}^*(892)^0$. Partial wave analysis of this channel favors this low mass enhancement being a broad $0^{+}$ resonance with the mass and width of $771^{+164}_{-221}\pm 55$ MeV/c$^2$ and $220^{+225}_{-169} \pm 97$ MeV/c$^2$, respectively.
△ Less
Submitted 6 April, 2003; v1 submitted 1 April, 2003;
originally announced April 2003.