-
Maximum likelihood discretization of the transport equation
Authors:
Brook Eyob,
Florian Schäfer
Abstract:
The transport of positive quantities underlies countless physical processes, including fluid, gas, and plasma dynamics. Discretizing the associated partial differential equations with Galerkin methods can result in spurious nonpositivity of solutions. We observe that these methods amount to performing statistical inference using the method of moments (MoM) and that the loss of positivity arises fr…
▽ More
The transport of positive quantities underlies countless physical processes, including fluid, gas, and plasma dynamics. Discretizing the associated partial differential equations with Galerkin methods can result in spurious nonpositivity of solutions. We observe that these methods amount to performing statistical inference using the method of moments (MoM) and that the loss of positivity arises from MoM's susceptibility to producing estimates inconsistent with the observed data. We overcome this problem by replacing MoM with maximum likelihood estimation, introducing $\textit{maximum likelihood discretization} $(MLD). In the continuous limit, MLD simplifies to the Fisher-Rao Galerkin (FRG) semidiscretization, which replaces the $L^2$ inner product in Galerkin projection with the Fisher-Rao metric of probability distributions. We show empirically that FRG preserves positivity. We prove rigorously that it yields error bounds in the Kullback-Leibler divergence.
△ Less
Submitted 15 May, 2025;
originally announced May 2025.
-
Simulating many-engine spacecraft: Exceeding 100 trillion grid points via information geometric regularization and the MFC flow solver
Authors:
Benjamin Wilfong,
Anand Radhakrishnan,
Henry Le Berre,
Nikolaos Tselepidis,
Benedikt Dorschner,
Reuben Budiardja,
Brian Cornille,
Stephen Abbott,
Florian Schäfer,
Spencer H. Bryngelson
Abstract:
This work proposes a method and optimized implementation for exascale simulations of high-speed compressible fluid flows, enabling the simulation of multi-engine rocket craft at an unprecedented scale. We significantly improve upon the state-of-the-art in terms of computational cost and memory footprint through a carefully crafted implementation of the recently proposed information geometric regul…
▽ More
This work proposes a method and optimized implementation for exascale simulations of high-speed compressible fluid flows, enabling the simulation of multi-engine rocket craft at an unprecedented scale. We significantly improve upon the state-of-the-art in terms of computational cost and memory footprint through a carefully crafted implementation of the recently proposed information geometric regularization, which eliminates the need for numerical shock capturing. Unified addressing on tightly coupled CPU--GPU platforms increases the total problem size with negligible performance hit. Despite linear stencil algorithms being memory-bound, we achieve wall clock times that are four times faster than optimized baseline numerics. This enables the execution of CFD simulations at more than 100 trillion grid points, surpassing the largest state-of-the-art publicly available simulations by an order of magnitude. Ideal weak scaling is demonstrated on OLCF Frontier and CSCS Alps using the full system, entailing 37.8K AMD MI250X GPUs (Frontier) or 9.2K NVIDIA GH200 superchips (Alps).
△ Less
Submitted 14 May, 2025; v1 submitted 12 May, 2025;
originally announced May 2025.
-
Semantic Communication: From Philosophical Conceptions Towards a Mathematical Framework
Authors:
Javad Gholipour,
Rafael F. Schaefer,
Gerhard P. Fettweis
Abstract:
Semantic communication has emerged as a promising paradigm to address the challenges of next-generation communication networks. While some progress has been made in its conceptualization, fundamental questions remain unresolved. In this paper, we propose a probabilistic model for semantic communication that, unlike prior works primarily rooted in intuitions from human language, is grounded in a ri…
▽ More
Semantic communication has emerged as a promising paradigm to address the challenges of next-generation communication networks. While some progress has been made in its conceptualization, fundamental questions remain unresolved. In this paper, we propose a probabilistic model for semantic communication that, unlike prior works primarily rooted in intuitions from human language, is grounded in a rigorous philosophical conception of information and its relationship with data as Constraining Affordances, mediated by Levels of Abstraction (LoA). This foundation not only enables the modeling of linguistic semantic communication but also provides a domain-independent definition of semantic content, extending its applicability beyond linguistic contexts. As the semantic communication problem involves a complex interplay of various factors, making it difficult to tackle in its entirety, we propose to orthogonalize it by classifying it into simpler sub-problems and approach the general problem step by step. Notably, we show that Shannon's framework constitutes a special case of semantic communication, in which each message conveys a single, unambiguous meaning. Consequently, the capacity in Shannon's model-defined as the maximum rate of reliably transmissible messages-coincides with the semantic capacity under this constrained scenario. In this paper, we specifically focus on the sub-problem where semantic ambiguity arises solely from physical channel noise and derive a lower bound for its semantic capacity, which reduces to Shannon's capacity in the corresponding special case. We also demonstrate that the achievable rate of all transmissible messages for reliable semantic communication, exceeds Shannon's capacity by the added term H(X|S).
△ Less
Submitted 2 May, 2025;
originally announced May 2025.
-
Frequency Hopping Waveform Design for Secure Integrated Sensing and Communications
Authors:
Ali Khandan Boroujeni,
Giuseppe Thadeu Freitas de Abreu,
Stefan Köpsell,
Ghazal Bagheri,
Kuranage Roche Rayan Ranasinghe,
Rafael F. Schaefer
Abstract:
We introduce a comprehensive approach to enhance the security, privacy, and sensing capabilities of integrated sensing and communications (ISAC) systems by leveraging random frequency agility (RFA) and random pulse repetition interval (PRI) agility (RPA) techniques. The combination of these techniques, which we refer to collectively as random frequency and PRI agility (RFPA), with channel reciproc…
▽ More
We introduce a comprehensive approach to enhance the security, privacy, and sensing capabilities of integrated sensing and communications (ISAC) systems by leveraging random frequency agility (RFA) and random pulse repetition interval (PRI) agility (RPA) techniques. The combination of these techniques, which we refer to collectively as random frequency and PRI agility (RFPA), with channel reciprocity-based key generation (CRKG) obfuscates both Doppler frequency and PRIs, significantly hindering the chances that passive adversaries can successfully estimate radar parameters. In addition, a hybrid information embedding method integrating amplitude shift keying (ASK), phase shift keying (PSK), index modulation (IM), and spatial modulation (SM) is incorporated to increase the achievable bit rate of the system significantly. Next, a sparse-matched filter receiver design is proposed to efficiently decode the embedded information with a low bit error rate (BER). Finally, a novel RFPA-based secret generation scheme using CRKG ensures secure code creation without a coordinating authority. The improved range and velocity estimation and reduced clutter effects achieved with the method are demonstrated via the evaluation of the ambiguity function (AF) of the proposed waveforms.
△ Less
Submitted 14 April, 2025;
originally announced April 2025.
-
Optimal Krylov On Average
Authors:
Qi Luo,
Florian Schäfer
Abstract:
We propose an adaptive randomized truncation estimator for Krylov subspace methods that optimizes the trade-off between the solution variance and the computational cost, while remaining unbiased. The estimator solves a constrained optimization problem to compute the truncation probabilities on the fly, with minimal computational overhead. The problem has a closed-form solution when the improvement…
▽ More
We propose an adaptive randomized truncation estimator for Krylov subspace methods that optimizes the trade-off between the solution variance and the computational cost, while remaining unbiased. The estimator solves a constrained optimization problem to compute the truncation probabilities on the fly, with minimal computational overhead. The problem has a closed-form solution when the improvement of the deterministic algorithm satisfies a diminishing returns property. We prove that obtaining the optimal adaptive truncation distribution is impossible in the general case. Without the diminishing return condition, our estimator provides a suboptimal but still unbiased solution. We present experimental results in GP hyperparameter training and competitive physics-informed neural networks problem to demonstrate the effectiveness of our approach.
△ Less
Submitted 4 April, 2025;
originally announced April 2025.
-
Leveraging Angle of Arrival Estimation against Impersonation Attacks in Physical Layer Authentication
Authors:
Thuy M. Pham,
Linda Senigagliesi,
Marco Baldi,
Rafael F. Schaefer,
Gerhard P. Fettweis,
Arsenia Chorti
Abstract:
In this paper, we investigate the utilization of the angle of arrival (AoA) as a feature for robust physical layer authentication (PLA). While most of the existing approaches to PLA focus on common features of the physical layer of communication channels, such as channel frequency response, channel impulse response or received signal strength, the use of AoA in this domain has not yet been studied…
▽ More
In this paper, we investigate the utilization of the angle of arrival (AoA) as a feature for robust physical layer authentication (PLA). While most of the existing approaches to PLA focus on common features of the physical layer of communication channels, such as channel frequency response, channel impulse response or received signal strength, the use of AoA in this domain has not yet been studied in depth, particularly regarding the ability to thwart impersonation attacks. In this work, we demonstrate that an impersonation attack targeting AoA based PLA is only feasible under strict conditions on the attacker's location and hardware capabilities, which highlights the AoA's potential as a strong feature for PLA. We extend previous works considering a single-antenna attacker to the case of a multiple-antenna attacker, and we develop a theoretical characterization of the conditions in which a successful impersonation attack can be mounted. Furthermore, we leverage extensive simulations in support of theoretical analyses, to validate the robustness of AoA-based PLA.
△ Less
Submitted 14 March, 2025;
originally announced March 2025.
-
MinGRU-Based Encoder for Turbo Autoencoder Frameworks
Authors:
Rick Fritschek,
Rafael F. Schaefer
Abstract:
Early neural channel coding approaches leveraged dense neural networks with one-hot encodings to design adaptive encoder-decoder pairs, improving block error rate (BLER) and automating the design process. However, these methods struggled with scalability as the size of message sets and block lengths increased. TurboAE addressed this challenge by focusing on bit-sequence inputs rather than symbol-l…
▽ More
Early neural channel coding approaches leveraged dense neural networks with one-hot encodings to design adaptive encoder-decoder pairs, improving block error rate (BLER) and automating the design process. However, these methods struggled with scalability as the size of message sets and block lengths increased. TurboAE addressed this challenge by focusing on bit-sequence inputs rather than symbol-level representations, transforming the scalability issue associated with large message sets into a sequence modeling problem. While recurrent neural networks (RNNs) were a natural fit for sequence processing, their reliance on sequential computations made them computationally expensive and inefficient for long sequences. As a result, TurboAE adopted convolutional network blocks, which were faster to train and more scalable, but lacked the sequential modeling advantages of RNNs. Recent advances in efficient RNN architectures, such as minGRU and minLSTM, and structured state space models (SSMs) like S4 and S6, overcome these limitations by significantly reducing memory and computational overhead. These models enable scalable sequence processing, making RNNs competitive for long-sequence tasks. In this work, we revisit RNNs for Turbo autoencoders by integrating the lightweight minGRU model with a Mamba block from SSMs into a parallel Turbo autoencoder framework. Our results demonstrate that this hybrid design matches the performance of convolutional network-based Turbo autoencoder approaches for short sequences while significantly improving scalability and training efficiency for long block lengths. This highlights the potential of efficient RNNs in advancing neural channel coding for long-sequence scenarios.
△ Less
Submitted 11 March, 2025;
originally announced March 2025.
-
Influence of Chemistry and Topography on the Wettability of Copper
Authors:
Sarah Marie Lößlein,
Rolf Merz,
Yerila Rodríguez-Martínez,
Florian Schäfer,
Philipp Grützmacher,
David Horwat,
Michael Kopnarski,
Frank Mücklich
Abstract:
To understand the complex interplay of topography and surface chemistry in wetting, fundamental studies investigating both parameters are needed. Due to the sensitivity of wetting to miniscule changes in one of the parameters it is imperative to precisely control the experimental approach. A profound understanding of their influence on wetting facilitates a tailored design of surfaces with unique…
▽ More
To understand the complex interplay of topography and surface chemistry in wetting, fundamental studies investigating both parameters are needed. Due to the sensitivity of wetting to miniscule changes in one of the parameters it is imperative to precisely control the experimental approach. A profound understanding of their influence on wetting facilitates a tailored design of surfaces with unique functionality. We present a multi-step study: The influence of surface chemistry is analyzed by determining the adsorption of volatile carbonous species (A) and by sputter deposition of metallic copper and copper oxides on flat copper substrates (B). A precise surface topography is created by laser processing. Isotropic topography is created by ps laser processing (C), and hierarchical anisotropic line patterns are produced by direct laser interference patterning (DLIP) with different pulse durations (D). Our results reveal that the long-term wetting response of polished copper surfaces stabilizes with time despite ongoing accumulation of hydrocarbons and is dominated by this adsorption layer over the oxide state of the substrate (Cu, CuO, Cu2O). The surfaces' wetting response can be precisely tuned by tailoring the topography via laser processing. The sub-pattern morphology of primary line-like patterns showed great impact on the static contact angle, wetting anisotropy, and water adhesion. An increased roughness inside the pattern valleys combined with a minor roughness on the peaks favors air-inclusions, isotropic hydrophobicity, and low water adhesion. Increasing the aspect ratio showed to enhance air-inclusions and hydrophobicity despite increased peak roughness while time dependent wetting transitions were observed.
△ Less
Submitted 26 February, 2025;
originally announced February 2025.
-
Characterization of the Arithmetic Complexity of the Secrecy Capacity of Fast-Fading Gaussian Channels
Authors:
Holger Boche,
Andrea Grigorescu,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
This paper studies the computability of the secrecy capacity of fast-fading wiretap channels from an algorithmic perspective, examining whether it can be computed algorithmically or not. To address this question, the concept of Turing machines is used, which establishes fundamental performance limits of digital computers. It is shown that certain computable continuous fading probability distributi…
▽ More
This paper studies the computability of the secrecy capacity of fast-fading wiretap channels from an algorithmic perspective, examining whether it can be computed algorithmically or not. To address this question, the concept of Turing machines is used, which establishes fundamental performance limits of digital computers. It is shown that certain computable continuous fading probability distribution functions yield secrecy capacities that are non-computable numbers. Additionally, we assess the secrecy capacity's classification within the arithmetical hierarchy, revealing the absence of computable achievability and converse bounds.
△ Less
Submitted 20 January, 2025;
originally announced January 2025.
-
A fast approximate scenario addition method for two-stage robust mixed-integer programs
Authors:
Marc Goerigk,
Dorothee Henke,
Johannes Kager,
Fabian Schäfer,
Clemens Thielen
Abstract:
This paper presents a new scenario addition method for two-stage robust mixed-integer programs with finite uncertainty sets. Our method combines and extends speed-up techniques used in previous scenario addition methods (also called column-and-constraint generation methods) and introduces several new techniques. In particular, it uses dual bounds for second-stage problems in order to allow a faste…
▽ More
This paper presents a new scenario addition method for two-stage robust mixed-integer programs with finite uncertainty sets. Our method combines and extends speed-up techniques used in previous scenario addition methods (also called column-and-constraint generation methods) and introduces several new techniques. In particular, it uses dual bounds for second-stage problems in order to allow a faster identification of the next promising scenario to be added to the master problem. Moreover, adaptive time limits are imposed to avoid getting stuck on particularly hard second-stage problems, and a gap propagation between master problem and second-stage problems is used to stop solving them earlier if only a given non-zero optimality gap is to be reached overall. This makes our method particularly effective for problems where solving the second-stage problem is computationally challenging. To evaluate the method's performance, we compare it to two recent scenario addition methods from the literature on two applications: a robust capacitated location routing problem and a robust integrated berth allocation and quay crane assignment and scheduling problem. The first problem features a particularly hard second stage, and we show that our method is able to solve considerably more and larger instances in a given time limit. Using the second problem, we verify the general applicability of our method, even for problems where the second stage is relatively easy.
△ Less
Submitted 9 January, 2025;
originally announced January 2025.
-
Machine learning the Ising transition: A comparison between discriminative and generative approaches
Authors:
Difei Zhang,
Frank Schäfer,
Julian Arnold
Abstract:
The detection of phase transitions is a central task in many-body physics. To automate this process, the task can be phrased as a classification problem. Classification problems can be approached in two fundamentally distinct ways: through either a discriminative or a generative method. In general, it is unclear which of these two approaches is most suitable for a given problem. The choice is expe…
▽ More
The detection of phase transitions is a central task in many-body physics. To automate this process, the task can be phrased as a classification problem. Classification problems can be approached in two fundamentally distinct ways: through either a discriminative or a generative method. In general, it is unclear which of these two approaches is most suitable for a given problem. The choice is expected to depend on factors such as the availability of system knowledge, dataset size, desired accuracy, computational resources, and other considerations. In this work, we answer the question of how one should approach the solution of phase-classification problems by performing a numerical case study on the thermal phase transition in the classical two-dimensional square-lattice ferromagnetic Ising model.
△ Less
Submitted 28 November, 2024;
originally announced November 2024.
-
Information geometric regularization of unidimensional pressureless Euler equations yields global strong solutions
Authors:
Ruijia Cao,
Florian Schäfer
Abstract:
Partial differential equations describing compressible fluids are prone to the formation of shock singularities, arising from faster upstream fluid particles catching up to slower, downstream ones. In geometric terms, this causes the deformation map to leave the manifold of diffeomorphisms. Information geometric regularization addresses this issue by changing the manifold geometry to make it geode…
▽ More
Partial differential equations describing compressible fluids are prone to the formation of shock singularities, arising from faster upstream fluid particles catching up to slower, downstream ones. In geometric terms, this causes the deformation map to leave the manifold of diffeomorphisms. Information geometric regularization addresses this issue by changing the manifold geometry to make it geodesically complete. Empirical evidence suggests that this results in smooth solutions without adding artificial viscosity. This work makes a first step towards understanding this phenomenon rigorously, in the setting of the unidimensional pressureless Euler equations. It shows that their information geometric regularization has smooth global solutions. By establishing $Γ$-convergence of its variational description, it proves convergence of these solutions to entropy solutions of the nominal problem, in the limit of vanishing regularization parameter. A consequence of these results is that manifolds of unidimensional diffeomorphisms with information geometric regularization are geodesically complete.
△ Less
Submitted 22 November, 2024;
originally announced November 2024.
-
Modular Neural Wiretap Codes for Fading Channels
Authors:
Daniel Seifert,
Onur Günlü,
Rafael F. Schaefer
Abstract:
The wiretap channel is a well-studied problem in the physical layer security literature. Although it is proven that the decoding error probability and information leakage can be made arbitrarily small in the asymptotic regime, further research on finite-blocklength codes is required on the path towards practical, secure communication systems. This work provides the first experimental characterizat…
▽ More
The wiretap channel is a well-studied problem in the physical layer security literature. Although it is proven that the decoding error probability and information leakage can be made arbitrarily small in the asymptotic regime, further research on finite-blocklength codes is required on the path towards practical, secure communication systems. This work provides the first experimental characterization of a deep learning-based, finite-blocklength code construction for multi-tap fading wiretap channels without channel state information. In addition to the evaluation of the average probability of error and information leakage, we examine the designed codes in the presence of fading in terms of the equivocation rate and illustrate the influence of (i) the number of fading taps, (ii) differing variances of the fading coefficients, and (iii) the seed selection for the hash function-based security layer.
△ Less
Submitted 18 March, 2025; v1 submitted 13 September, 2024;
originally announced September 2024.
-
Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading
Authors:
Martin Mittelbach,
Rafael F. Schaefer,
Matthieu Bloch,
Aylin Yener,
Onur Günlü
Abstract:
We consider a secure integrated sensing and communication (ISAC) scenario, in which a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel is modeled as two state-dependent fast-fading channels with correlated Rayleigh fading…
▽ More
We consider a secure integrated sensing and communication (ISAC) scenario, in which a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel is modeled as two state-dependent fast-fading channels with correlated Rayleigh fading coefficients and independent additive Gaussian noise components. Delayed channel outputs are fed back to the transmitter to improve the communication performance and to estimate the channel state sequence. We establish and illustrate an achievable secrecy-distortion region for degraded secure ISAC channels under correlated Rayleigh fading. We also evaluate the inner bound for a large set of parameters to derive practical design insights for secure ISAC methods. The presented results include in particular parameter ranges for which the secrecy capacity of a classical wiretap channel setup is surpassed and for which the channel capacity is approached.
△ Less
Submitted 30 August, 2024;
originally announced August 2024.
-
Möbius inversion and the bootstrap
Authors:
Florian Schäfer
Abstract:
Estimating nonlinear functionals of probability distributions from samples is a fundamental statistical problem. The "plug-in" estimator obtained by applying the target functional to the empirical distribution of samples is biased. Resampling methods such as the bootstrap derive artificial datasets from the original one by resampling. Comparing the outcome of the plug-in estimator in the original…
▽ More
Estimating nonlinear functionals of probability distributions from samples is a fundamental statistical problem. The "plug-in" estimator obtained by applying the target functional to the empirical distribution of samples is biased. Resampling methods such as the bootstrap derive artificial datasets from the original one by resampling. Comparing the outcome of the plug-in estimator in the original and resampled datasets allows estimating and thus correcting the bias. In the asymptotic setting, iterations of this procedure attain an arbitrarily high order of bias correction, but finite sample results are scarce. This work develops a new theoretical understanding of bootstrap bias correction by viewing it as an iterative linear solver for the combinatorial operation of Möbius inversion. It sharply characterizes the regime of linear convergence of the bootstrap bias reduction for moment polynomials. It uses these results to show its superalgebraic convergence rate for band-limited functionals. Finally, it derives a modified bootstrap iteration enabling the unbiased estimation of unknown order-$m$ moment polynomials in $m$ bootstrap iterations.
△ Less
Submitted 11 August, 2024;
originally announced August 2024.
-
Flow-induced anisotropy in a carbon black-filled silicone elastomer: electromechanical properties and structure
Authors:
Bettina Zimmer,
Bart-Jan Niebuur,
Florian Schaefer,
Fabian Coupette,
Victor Tänzel,
Tanja Schilling,
Tobias Kraus
Abstract:
Carbon black (CB)-elastomers can serve as low-cost, highly deformable sensor materials, but hardly any work exists on their structure-property relationships. We report on flow-induced anisotropy, considering CB-silicone films generated via doctor blade coating. Cured films showed slight electrical anisotropy, with conductivity parallel to the coating direction being lower than perpendicular to it.…
▽ More
Carbon black (CB)-elastomers can serve as low-cost, highly deformable sensor materials, but hardly any work exists on their structure-property relationships. We report on flow-induced anisotropy, considering CB-silicone films generated via doctor blade coating. Cured films showed slight electrical anisotropy, with conductivity parallel to the coating direction being lower than perpendicular to it. Furthermore, piezoresistive sensitivity was much larger for stretch perpendicular to the coating direction than for parallel stretch. Structural analysis for length scales up to the CB agglomerate level yielded only weak evidence of anisotropy. Based on this evidence and insight from CB network simulations, we hypothesize that shear flow during coating fragments the CB network and then induces a preferential aggregate alignment, as well as increased inter-particle distances, parallel to the coating direction. As a practical conclusion, already weak anisotropic structuration suffices to cause significant electric anisotropy.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Building Resilience in Wireless Communication Systems With a Secret-Key Budget
Authors:
Karl-Ludwig Besser,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
Resilience and power consumption are two important performance metrics for many modern communication systems, and it is therefore important to define, analyze, and optimize them. In this work, we consider a wireless communication system with secret-key generation, in which the secret-key bits are added to and used from a pool of available key bits. We propose novel physical layer resilience metric…
▽ More
Resilience and power consumption are two important performance metrics for many modern communication systems, and it is therefore important to define, analyze, and optimize them. In this work, we consider a wireless communication system with secret-key generation, in which the secret-key bits are added to and used from a pool of available key bits. We propose novel physical layer resilience metrics for the survivability of such systems. In addition, we propose multiple power allocation schemes and analyze their trade-off between resilience and power consumption. In particular, we investigate and compare constant power allocation, an adaptive analytical algorithm, and a reinforcement learning-based solution. It is shown how the transmit power can be minimized such that a specified resilience is guaranteed. These results can be used directly by designers of such systems to optimize the system parameters for the desired performance in terms of reliability, security, and resilience.
△ Less
Submitted 10 June, 2025; v1 submitted 16 July, 2024;
originally announced July 2024.
-
Finite Blocklength Performance of Capacity-achieving Codes in the Light of Complexity Theory
Authors:
Holger Boche,
Andrea Grigorescu,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
Since the work of Polyanskiy, Poor and Verdú on the finite blocklength performance of capacity-achieving codes for discrete memoryless channels, many papers have attempted to find further results for more practically relevant channels. However, it seems that the complexity of computing capacity-achieving codes has not been investigated until now. We study this question for the simplest non-trivial…
▽ More
Since the work of Polyanskiy, Poor and Verdú on the finite blocklength performance of capacity-achieving codes for discrete memoryless channels, many papers have attempted to find further results for more practically relevant channels. However, it seems that the complexity of computing capacity-achieving codes has not been investigated until now. We study this question for the simplest non-trivial Gaussian channels, i.e., the additive colored Gaussian noise channel. To assess the computational complexity, we consider the classes $\mathrm{FP}_1$ and $\#\mathrm{P}_1$. $\mathrm{FP}_1$ includes functions computable by a deterministic Turing machine in polynomial time, whereas $\#\mathrm{P}_1$ encompasses functions that count the number of solutions verifiable in polynomial time. It is widely assumed that $\mathrm{FP}_1\neq\#\mathrm{P}_1$. It is of interest to determine the conditions under which, for a given $M \in \mathbb{N}$, where $M$ describes the precision of the deviation of $C(P,N)$, for a certain blocklength $n_M$ and a decoding error $ε> 0$ with $ε\in\mathbb{Q}$, the following holds: $R_{n_M}(ε)>C(P,N)-\frac{1}{2^M}$. It is shown that there is a polynomial-time computable $N_*$ such that for sufficiently large $P_*\in\mathbb{Q}$, the sequences $\{R_{n_M}(ε)\}_{{n_M}\in\mathbb{N}}$, where each $R_{n_M}(ε)$ satisfies the previous condition, cannot be computed in polynomial time if $\mathrm{FP}_1\neq\#\mathrm{P}_1$. Hence, the complexity of computing the sequence $\{R_{n_M}(ε)\}_{n_M\in\mathbb{N}}$ grows faster than any polynomial as $M$ increases. Consequently, it is shown that either the sequence of achievable rates $\{R_{n_M}(ε)\}_{n_M\in\mathbb{N}}$ as a function of the blocklength, or the sequence of blocklengths $\{n_M\}_{M\in\mathbb{N}}$ corresponding to the achievable rates, is not a polynomial-time computable sequence.
△ Less
Submitted 12 July, 2024; v1 submitted 10 July, 2024;
originally announced July 2024.
-
Differentiable Programming for Differential Equations: A Review
Authors:
Facundo Sapienza,
Jordi Bolibar,
Frank Schäfer,
Brian Groenke,
Avik Pal,
Victor Boussange,
Patrick Heimbach,
Giles Hooker,
Fernando Pérez,
Per-Olof Persson,
Christopher Rackauckas
Abstract:
The differentiable programming paradigm is a cornerstone of modern scientific computing. It refers to numerical methods for computing the gradient of a numerical model's output. Many scientific models are based on differential equations, where differentiable programming plays a crucial role in calculating model sensitivities, inverting model parameters, and training hybrid models that combine diff…
▽ More
The differentiable programming paradigm is a cornerstone of modern scientific computing. It refers to numerical methods for computing the gradient of a numerical model's output. Many scientific models are based on differential equations, where differentiable programming plays a crucial role in calculating model sensitivities, inverting model parameters, and training hybrid models that combine differential equations with data-driven approaches. Furthermore, recognizing the strong synergies between inverse methods and machine learning offers the opportunity to establish a coherent framework applicable to both fields. Differentiating functions based on the numerical solution of differential equations is non-trivial. Numerous methods based on a wide variety of paradigms have been proposed in the literature, each with pros and cons specific to the type of problem investigated. Here, we provide a comprehensive review of existing techniques to compute derivatives of numerical solutions of differential equations. We first discuss the importance of gradients of solutions of differential equations in a variety of scientific domains. Second, we lay out the mathematical foundations of the various approaches and compare them with each other. Third, we cover the computational considerations and explore the solutions available in modern scientific software. Last but not least, we provide best-practices and recommendations for practitioners. We hope that this work accelerates the fusion of scientific models and data, and fosters a modern approach to scientific modelling.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Phase Transitions in the Output Distribution of Large Language Models
Authors:
Julian Arnold,
Flemming Holtorf,
Frank Schäfer,
Niels Lörch
Abstract:
In a physical system, changing parameters such as temperature can induce a phase transition: an abrupt change from one state of matter to another. Analogous phenomena have recently been observed in large language models. Typically, the task of identifying phase transitions requires human analysis and some prior understanding of the system to narrow down which low-dimensional properties to monitor…
▽ More
In a physical system, changing parameters such as temperature can induce a phase transition: an abrupt change from one state of matter to another. Analogous phenomena have recently been observed in large language models. Typically, the task of identifying phase transitions requires human analysis and some prior understanding of the system to narrow down which low-dimensional properties to monitor and analyze. Statistical methods for the automated detection of phase transitions from data have recently been proposed within the physics community. These methods are largely system agnostic and, as shown here, can be adapted to study the behavior of large language models. In particular, we quantify distributional changes in the generated output via statistical distances, which can be efficiently estimated with access to the probability distribution over next-tokens. This versatile approach is capable of discovering new phases of behavior and unexplored transitions -- an ability that is particularly exciting in light of the rapid development of language models and their emergent capabilities.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Toward Practical and Theoretical Integration of Sensing and Communication in URA Systems
Authors:
Mohammad Javad Ahmadi,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
This work addresses the problem of integrated sensing and communications (ISAC) involving a massive number of unsourced and uncoordinated users. In the proposed model, known as the unsourced ISAC system (UNISAC), all active communication and sensing users simultaneously share a short frame to transmit their signals without requiring scheduling by the base station or the need to announce their iden…
▽ More
This work addresses the problem of integrated sensing and communications (ISAC) involving a massive number of unsourced and uncoordinated users. In the proposed model, known as the unsourced ISAC system (UNISAC), all active communication and sensing users simultaneously share a short frame to transmit their signals without requiring scheduling by the base station or the need to announce their identities. Consequently, the received signal from each user is heavily affected by interference from numerous other users, making it challenging to extract individual transmissions. UNISAC is designed to decode the message sequences from communication users while simultaneously detecting active sensing users and estimating their angles of arrival, regardless of the senders' identities. We derive an approximate achievable result for UNISAC and demonstrate its advantages over conventional methods, such as ALOHA, time-division multiple access, treating interference as noise, and multiple signal classification. Additionally, we propose a practical model that validates the feasibility of the approximate achievable result, showing comparable or even superior performance in scenarios with a small number of users. Through numerical simulations, we demonstrate the effectiveness of both the practical UNISAC model and the approximate achievable result.
△ Less
Submitted 8 June, 2025; v1 submitted 30 April, 2024;
originally announced April 2024.
-
Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers
Authors:
Amitha Mayya,
Arsenia Chorti,
Rafael F. Schaefer,
Gerhard P. Fettweis
Abstract:
In this paper, the feasibility of implementing a lightweight key distribution scheme using physical layer security for secret key generation (SKG) is explored. Specifically, we focus on examining SKG with the received signal strength (RSS) serving as the primary source of shared randomness. Our investigation centers on a frequency-selective line-of-sight (LoS) multipath channel, with a particular…
▽ More
In this paper, the feasibility of implementing a lightweight key distribution scheme using physical layer security for secret key generation (SKG) is explored. Specifically, we focus on examining SKG with the received signal strength (RSS) serving as the primary source of shared randomness. Our investigation centers on a frequency-selective line-of-sight (LoS) multipath channel, with a particular emphasis on assessing SKG rates derived from the distributions of RSS. We derive the received signal distributions based on how the multipath components resolve at the receiver. The mutual information (MI) is evaluated based on LoS 3GPP channel models using a numerical estimator. We study how the bandwidth, delay spread, and Rician K-factor impact the estimated MI. This MI then serves as a benchmark setting bounds for the SKG rates in our exploration.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
NonlinearSolve.jl: High-Performance and Robust Solvers for Systems of Nonlinear Equations in Julia
Authors:
Avik Pal,
Flemming Holtorf,
Axel Larsson,
Torkel Loman,
Utkarsh,
Frank Schäefer,
Qingyu Qu,
Alan Edelman,
Chris Rackauckas
Abstract:
Efficiently solving nonlinear equations underpins numerous scientific and engineering disciplines, yet scaling these solutions for challenging system models remains a challenge. This paper presents NonlinearSolve.jl -- a suite of high-performance open-source nonlinear equation solvers implemented natively in the Julia programming language. NonlinearSolve.jl distinguishes itself by offering a unifi…
▽ More
Efficiently solving nonlinear equations underpins numerous scientific and engineering disciplines, yet scaling these solutions for challenging system models remains a challenge. This paper presents NonlinearSolve.jl -- a suite of high-performance open-source nonlinear equation solvers implemented natively in the Julia programming language. NonlinearSolve.jl distinguishes itself by offering a unified API that accommodates a diverse range of solver specifications alongside features such as automatic algorithm selection based on runtime analysis, support for GPU-accelerated computation through static array kernels, and the utilization of sparse automatic differentiation and Jacobian-free Krylov methods for large-scale problem-solving. Through rigorous comparison with established tools such as PETSc SNES, Sundials KINSOL, and MINPACK, NonlinearSolve.jl demonstrates robustness and efficiency, achieving significant advancements in solving nonlinear equations while being implemented in a high-level programming language. The capabilities of NonlinearSolve.jl unlock new potentials in modeling and simulation across various domains, making it a valuable addition to the computational toolkit of researchers and practitioners alike.
△ Less
Submitted 25 April, 2025; v1 submitted 24 March, 2024;
originally announced March 2024.
-
Asymptotic properties of Vecchia approximation for Gaussian processes
Authors:
Myeongjong Kang,
Florian Schäfer,
Joseph Guinness,
Matthias Katzfuss
Abstract:
Vecchia approximation has been widely used to accurately scale Gaussian-process (GP) inference to large datasets, by expressing the joint density as a product of conditional densities with small conditioning sets. We study fixed-domain asymptotic properties of Vecchia-based GP inference for a large class of covariance functions (including Matérn covariances) with boundary conditioning. In this set…
▽ More
Vecchia approximation has been widely used to accurately scale Gaussian-process (GP) inference to large datasets, by expressing the joint density as a product of conditional densities with small conditioning sets. We study fixed-domain asymptotic properties of Vecchia-based GP inference for a large class of covariance functions (including Matérn covariances) with boundary conditioning. In this setting, we establish that consistency and asymptotic normality of maximum exact-likelihood estimators imply those of maximum Vecchia-likelihood estimators, and that exact GP prediction can be approximated accurately by Vecchia GP prediction, given that the size of conditioning sets grows polylogarithmically with the data size. Hence, Vecchia-based inference with quasilinear complexity is asymptotically equivalent to exact GP inference with cubic complexity. This also provides a general new result on the screening effect. Our findings are illustrated by numerical experiments, which also show that Vecchia approximation can be more accurate than alternative approaches such as covariance tapering and reduced-rank approximations.
△ Less
Submitted 5 February, 2024; v1 submitted 28 January, 2024;
originally announced January 2024.
-
Global sensitivity analysis with multifidelity Monte Carlo and polynomial chaos expansion for carotid artery haemodynamics
Authors:
Friederike Schäfer,
Daniele E. Schiavazzi,
Leif Rune Hellevik,
Jacob Sturdy
Abstract:
Computational models of the cardiovascular system are increasingly used for the diagnosis, treatment, and prevention of cardiovascular disease. Before being used for translational applications, the predictive abilities of these models need to be thoroughly demonstrated through verification, validation, and uncertainty quantification. When results depend on multiple uncertain inputs, sensitivity an…
▽ More
Computational models of the cardiovascular system are increasingly used for the diagnosis, treatment, and prevention of cardiovascular disease. Before being used for translational applications, the predictive abilities of these models need to be thoroughly demonstrated through verification, validation, and uncertainty quantification. When results depend on multiple uncertain inputs, sensitivity analysis is typically the first step required to separate relevant from unimportant inputs, and is key to determine an initial reduction on the problem dimensionality that will significantly affect the cost of all downstream analysis tasks. For computationally expensive models with numerous uncertain inputs, sample-based sensitivity analysis may become impractical due to the substantial number of model evaluations it typically necessitates. To overcome this limitation, we consider recently proposed Multifidelity Monte Carlo estimators for Sobol' sensitivity indices, and demonstrate their applicability to an idealized model of the common carotid artery. Variance reduction is achieved combining a small number of three-dimensional fluid-structure interaction simulations with affordable one- and zero-dimensional reduced order models. These multifidelity Monte Carlo estimators are compared with traditional Monte Carlo and polynomial chaos expansion estimates. Specifically, we show consistent sensitivity ranks for both bi- (1D/0D) and tri-fidelity (3D/1D/0D) estimators, and superior variance reduction compared to traditional single-fidelity Monte Carlo estimators for the same computational budget. As the computational burden of Monte Carlo estimators for Sobol' indices is significantly affected by the problem dimensionality, polynomial chaos expansion is found to have lower computational cost for idealized models with smooth stochastic response.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Machine learning phase transitions: Connections to the Fisher information
Authors:
Julian Arnold,
Niels Lörch,
Flemming Holtorf,
Frank Schäfer
Abstract:
Despite the widespread use and success of machine-learning techniques for detecting phase transitions from data, their working principle and fundamental limits remain elusive. Here, we explain the inner workings and identify potential failure modes of these techniques by rooting popular machine-learning indicators of phase transitions in information-theoretic concepts. Using tools from information…
▽ More
Despite the widespread use and success of machine-learning techniques for detecting phase transitions from data, their working principle and fundamental limits remain elusive. Here, we explain the inner workings and identify potential failure modes of these techniques by rooting popular machine-learning indicators of phase transitions in information-theoretic concepts. Using tools from information geometry, we prove that several machine-learning indicators of phase transitions approximate the square root of the system's (quantum) Fisher information from below -- a quantity that is known to indicate phase transitions but is often difficult to compute from data. We numerically demonstrate the quality of these bounds for phase transitions in classical and quantum systems.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
Fast Detection of Phase Transitions with Multi-Task Learning-by-Confusion
Authors:
Julian Arnold,
Frank Schäfer,
Niels Lörch
Abstract:
Machine learning has been successfully used to study phase transitions. One of the most popular approaches to identifying critical points from data without prior knowledge of the underlying phases is the learning-by-confusion scheme. As input, it requires system samples drawn from a grid of the parameter whose change is associated with potential phase transitions. Up to now, the scheme required tr…
▽ More
Machine learning has been successfully used to study phase transitions. One of the most popular approaches to identifying critical points from data without prior knowledge of the underlying phases is the learning-by-confusion scheme. As input, it requires system samples drawn from a grid of the parameter whose change is associated with potential phase transitions. Up to now, the scheme required training a distinct binary classifier for each possible splitting of the grid into two sides, resulting in a computational cost that scales linearly with the number of grid points. In this work, we propose and showcase an alternative implementation that only requires the training of a single multi-class classifier. Ideally, such multi-task learning eliminates the scaling with respect to the number of grid points. In applications to the Ising model and an image dataset generated with Stable Diffusion, we find significant speedups that closely correspond to the ideal case, with only minor deviations.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Targeted computation of nonlocal closure operators via an adjoint-based macroscopic forcing method
Authors:
Jessie Liu,
Florian Schäfer,
Spencer H. Bryngelson,
Tamer A. Zaki,
Ali Mani
Abstract:
Reynolds-averaged Navier--Stokes (RANS) closure must be sensitive to the flow physics, including nonlocality and anisotropy of the effective eddy viscosity. Recent approaches used forced direct numerical simulations to probe these effects, including the macroscopic forcing method (MFM) of Mani and Park ($\textit{Phys. Rev. Fluids}$ $\textbf{6}$, 054607 (2021)) and the Green's function approach of…
▽ More
Reynolds-averaged Navier--Stokes (RANS) closure must be sensitive to the flow physics, including nonlocality and anisotropy of the effective eddy viscosity. Recent approaches used forced direct numerical simulations to probe these effects, including the macroscopic forcing method (MFM) of Mani and Park ($\textit{Phys. Rev. Fluids}$ $\textbf{6}$, 054607 (2021)) and the Green's function approach of Hamba ($\textit{Phys. Fluids}$ $\textbf{17}$, 115102 (2005)). The resulting nonlocal and anisotropic eddy viscosities are exact and relate Reynolds stresses to mean velocity gradients at all locations. They can be used to inform RANS models of the sensitivity to the mean velocity gradient and the suitability of local and isotropic approximations. However, these brute-force approaches are expensive. They force the mean velocity gradient at each point in the averaged space and measure the Reynolds stress response, requiring a separate simulation for each mean velocity gradient location. Thus, computing the eddy viscosity requires as many simulations as degrees of freedom in the averaged space, which can be cost-prohibitive for problems with many degrees of freedom. In this work, we develop an adjoint-based MFM to obtain the eddy viscosity at a given Reynolds stress location using a single simulation. This approach recovers the Reynolds stress dependence at a location of interest, such as a separation point or near a wall, on the mean velocity gradient at all locations. We demonstrate using adjoint MFM to compute the eddy viscosity for a specified wall-normal location in an incompressible turbulent channel flow using one simulation. In contrast, a brute-force approach for the same problem requires $N=144$ simulations (the number of grid points in the non-averaged coordinate direction). We show that a local approximation for the eddy viscosity would have been inappropriate.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
Characterization of the Complexity of Computing the Capacity of Colored Noise Gaussian Channels
Authors:
Holger Boche,
Andrea Grigorescu,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
This paper explores the computational complexity involved in determining the capacity of the band-limited additive colored Gaussian noise (ACGN) channel and its capacity-achieving power spectral density (p.s.d.). The study reveals that when the noise p.s.d. is a strictly positive computable continuous function, computing the capacity of the band-limited ACGN channel becomes a $\#\mathrm{P}_1$-comp…
▽ More
This paper explores the computational complexity involved in determining the capacity of the band-limited additive colored Gaussian noise (ACGN) channel and its capacity-achieving power spectral density (p.s.d.). The study reveals that when the noise p.s.d. is a strictly positive computable continuous function, computing the capacity of the band-limited ACGN channel becomes a $\#\mathrm{P}_1$-complete problem within the set of polynomial time computable noise p.s.d.s. Meaning that it is even more complex than problems that are $\mathrm{NP}_1$-complete. Additionally, it is shown that the capacity-achieving distribution is also $\#\mathrm{P}_1$-complete. Furthermore, under the widely accepted assumption that $\mathrm{FP}_1 \neq \#\mathrm{P}_1$, it has two significant implications for the ACGN channel. The first implication is the existence of a polynomial time computable noise p.s.d. for which the computation of its capacity cannot be performed in polynomial time, i.e., the number of computational steps on a Turing Machine grows faster than all polynomials. The second one is the existence of a polynomial time computable noise p.s.d. for which determining its capacity-achieving p.s.d. cannot be done within polynomial time.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Integrated patient-to-room and nurse-to-patient assignment in hospital wards
Authors:
Tabea Brandt,
Tom Lorenz Klein,
Melanie Reuter-Oppermann,
Fabian Schäfer,
Clemens Thielen,
Maartje van de Vrugt,
Joe Viana
Abstract:
Assigning patients to rooms and nurses to patients are critical tasks within hospitals that directly affect patient and staff satisfaction, quality of care, and hospital efficiency. Both patient-to-room assignments and nurse-to-patient assignments are typically agreed upon at the ward level, and they interact in several ways such as jointly determining the walking distances nurses must cover betwe…
▽ More
Assigning patients to rooms and nurses to patients are critical tasks within hospitals that directly affect patient and staff satisfaction, quality of care, and hospital efficiency. Both patient-to-room assignments and nurse-to-patient assignments are typically agreed upon at the ward level, and they interact in several ways such as jointly determining the walking distances nurses must cover between different patient rooms. This motivates to consider both problems jointly in an integrated fashion.
This paper presents the first optimization models and algorithms for the integrated patient-to-room and nurse-to-patient assignment problem. We provide a mixed integer programming formulation of the integrated problem that considers the typical objectives from the single problems as well as additional objectives that can only be properly evaluated when integrating both problems. Moreover, motivated by the inherent complexity that results from integrating these two NP-hard and already computationally challenging problems, we devise an efficient heuristic for the integrated patient-to-room and nurse-to-patient assignment problem. To evaluate the running time and quality of the solution obtained with the heuristic, we conduct extensive computational experiments on both artificial and real-world instances. The artificial instances are generated by a parameterized instance generator for the integrated problem that is made freely available.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Diffusion Models for Accurate Channel Distribution Generation
Authors:
Muah Kim,
Rick Fritschek,
Rafael F. Schaefer
Abstract:
Strong generative models can accurately learn channel distributions. This could save recurring costs for physical measurements of the channel. Moreover, the resulting differentiable channel model supports training neural encoders by enabling gradient-based optimization. The initial approach in the literature draws upon the modern advancements in image generation, utilizing generative adversarial n…
▽ More
Strong generative models can accurately learn channel distributions. This could save recurring costs for physical measurements of the channel. Moreover, the resulting differentiable channel model supports training neural encoders by enabling gradient-based optimization. The initial approach in the literature draws upon the modern advancements in image generation, utilizing generative adversarial networks (GANs) or their enhanced variants to generate channel distributions. In this paper, we address this channel approximation challenge with diffusion models (DMs), which have demonstrated high sample quality and mode coverage in image generation. In addition to testing the generative performance of the channel distributions, we use an end-to-end (E2E) coded-modulation framework underpinned by DMs and propose an efficient training algorithm. Our simulations with various channel models show that a DM can accurately learn channel distributions, enabling an E2E framework to achieve near-optimal symbol error rates (SERs). Furthermore, we examine the trade-off between mode coverage and sampling speed through skipped sampling using sliced Wasserstein distance (SWD) and the E2E SER. We investigate the effect of noise scheduling on this trade-off, demonstrating that with an appropriate choice of parameters and techniques, sampling time can be significantly reduced with a minor increase in SWD and SER. Finally, we show that the DM can generate a correlated fading channel, whereas a strong GAN variant fails to learn the covariance. This paper highlights the potential benefits of using DMs for learning channel distributions, which could be further investigated for various channels and advanced techniques of DMs.
△ Less
Submitted 11 June, 2024; v1 submitted 19 September, 2023;
originally announced September 2023.
-
Generalized Rainbow Differential Privacy
Authors:
Yuzhou Gu,
Ziqi Zhou,
Onur Günlü,
Rafael G. L. D'Oliveira,
Parastoo Sadeghi,
Muriel Médard,
Rafael F. Schaefer
Abstract:
We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different…
▽ More
We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different rainbows partition the graph of connected datasets into different regions. We show that if a DP mechanism at the boundary of such regions is fixed and it behaves identically for all same-rainbow boundary datasets, then a unique optimal $(ε,δ)$-DP mechanism exists (as long as the boundary condition is valid) and can be expressed in closed-form. Our proof technique is based on an interesting relationship between dominance ordering and DP, which applies to any finite number of colors and for $(ε,δ)$-DP, improving upon previous results that only apply to at most three colors and for $ε$-DP. We justify the homogeneous boundary condition assumption by giving an example with non-homogeneous boundary condition, for which there exists no optimal DP mechanism.
△ Less
Submitted 5 April, 2024; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Information geometric regularization of the barotropic Euler equation
Authors:
Ruijia Cao,
Florian Schäfer
Abstract:
A key numerical difficulty in compressible fluid dynamics is the formation of shock waves. Shock waves feature jump discontinuities in the velocity and density of the fluid and thus preclude the existence of classical solutions to the compressible Euler equations. Weak entropy solutions are commonly defined by viscous regularization, but even small amounts of viscosity can substantially change the…
▽ More
A key numerical difficulty in compressible fluid dynamics is the formation of shock waves. Shock waves feature jump discontinuities in the velocity and density of the fluid and thus preclude the existence of classical solutions to the compressible Euler equations. Weak entropy solutions are commonly defined by viscous regularization, but even small amounts of viscosity can substantially change the long-term behavior of the solution. In this work, we propose the first inviscid regularization of the multidimensional Euler equation based on ideas from semidefinite programming, information geometry, geometric hydrodynamics, and nonlinear elasticity. From a Lagrangian perspective, shock formation in entropy solutions amounts to inelastic collisions of fluid particles. Their trajectories are akin to that of projected gradient descent on a feasible set of non-intersecting paths. We regularize these trajectories by replacing them with solution paths of interior point methods based on log determinantal barrier functions. These paths are geodesic curves with respect to the information geometry induced by the barrier function. Thus, our regularization replaces the Euclidean geometry of trajectories with a suitable information geometry. We extend this idea to infinite families of paths by viewing Euler's equations as a dynamical system on a diffeomorphism manifold. Our regularization embeds this manifold into an information geometric ambient space, equipping it with a geodesically complete geometry. Expressing the resulting Lagrangian equations in Eulerian form, we derive a regularized Euler equation in conservation form. Numerical experiments on one and two-dimensional problems show its promise as a numerical tool. While we focus on the barotropic Euler equations for concreteness and simplicity of exposition, our regularization easily extends to more general Euler and Navier-Stokes-type equations.
△ Less
Submitted 18 March, 2024; v1 submitted 27 August, 2023;
originally announced August 2023.
-
Sparse inverse Cholesky factorization of dense kernel matrices by greedy conditional selection
Authors:
Stephen Huan,
Joseph Guinness,
Matthias Katzfuss,
Houman Owhadi,
Florian Schäfer
Abstract:
Dense kernel matrices resulting from pairwise evaluations of a kernel function arise naturally in machine learning and statistics. Previous work in constructing sparse approximate inverse Cholesky factors of such matrices by minimizing Kullback-Leibler divergence recovers the Vecchia approximation for Gaussian processes. These methods rely only on the geometry of the evaluation points to construct…
▽ More
Dense kernel matrices resulting from pairwise evaluations of a kernel function arise naturally in machine learning and statistics. Previous work in constructing sparse approximate inverse Cholesky factors of such matrices by minimizing Kullback-Leibler divergence recovers the Vecchia approximation for Gaussian processes. These methods rely only on the geometry of the evaluation points to construct the sparsity pattern. In this work, we instead construct the sparsity pattern by leveraging a greedy selection algorithm that maximizes mutual information with target points, conditional on all points previously selected. For selecting $k$ points out of $N$, the naive time complexity is $\mathcal{O}(N k^4)$, but by maintaining a partial Cholesky factor we reduce this to $\mathcal{O}(N k^2)$. Furthermore, for multiple ($m$) targets we achieve a time complexity of $\mathcal{O}(N k^2 + N m^2 + m^3)$, which is maintained in the setting of aggregated Cholesky factorization where a selected point need not condition every target. We apply the selection algorithm to image classification and recovery of sparse Cholesky factors. By minimizing Kullback-Leibler divergence, we apply the algorithm to Cholesky factorization, Gaussian process regression, and preconditioning with the conjugate gradient, improving over $k$-nearest neighbors selection.
△ Less
Submitted 8 May, 2025; v1 submitted 21 July, 2023;
originally announced July 2023.
-
Mapping out phase diagrams with generative classifiers
Authors:
Julian Arnold,
Frank Schäfer,
Alan Edelman,
Christoph Bruder
Abstract:
One of the central tasks in many-body physics is the determination of phase diagrams. However, mapping out a phase diagram generally requires a great deal of human intuition and understanding. To automate this process, one can frame it as a classification task. Typically, classification problems are tackled using discriminative classifiers that explicitly model the probability of the labels for a…
▽ More
One of the central tasks in many-body physics is the determination of phase diagrams. However, mapping out a phase diagram generally requires a great deal of human intuition and understanding. To automate this process, one can frame it as a classification task. Typically, classification problems are tackled using discriminative classifiers that explicitly model the probability of the labels for a given sample. Here we show that phase-classification problems are naturally suitable to be solved using generative classifiers based on probabilistic models of the measurement statistics underlying the physical system. Such a generative approach benefits from modeling concepts native to the realm of statistical and quantum physics, as well as recent advances in machine learning. This leads to a powerful framework for the autonomous determination of phase diagrams with little to no human supervision that we showcase in applications to classical equilibrium systems and quantum ground states.
△ Less
Submitted 10 October, 2023; v1 submitted 26 June, 2023;
originally announced June 2023.
-
Fast Macroscopic Forcing Method
Authors:
Spencer H. Bryngelson,
Florian Schäfer,
Jessie Liu,
Ali Mani
Abstract:
The macroscopic forcing method (MFM) of Mani and Park and similar methods for obtaining turbulence closure operators, such as the Green's function-based approach of Hamba, recover reduced solution operators from repeated direct numerical simulations (DNS). MFM has been used to quantify RANS-like operators for homogeneous isotropic turbulence and turbulent channel flows. Standard algorithms for MFM…
▽ More
The macroscopic forcing method (MFM) of Mani and Park and similar methods for obtaining turbulence closure operators, such as the Green's function-based approach of Hamba, recover reduced solution operators from repeated direct numerical simulations (DNS). MFM has been used to quantify RANS-like operators for homogeneous isotropic turbulence and turbulent channel flows. Standard algorithms for MFM force each coarse-scale degree of freedom (i.e., degree of freedom in the RANS space) and conduct a corresponding fine-scale simulation (i.e., DNS), which is expensive. We combine this method with an approach recently proposed by Schäfer and Owhadi (2023) to recover elliptic integral operators from a polylogarithmic number of matrix-vector products. The resulting Fast MFM introduced in this work applies sparse reconstruction to expose local features in the closure operator and reconstructs this coarse-grained differential operator in only a few matrix-vector products and correspondingly, a few MFM simulations. For flows with significant nonlocality, the algorithm first "peels" long-range effects with dense matrix-vector products to expose a local operator. We demonstrate the algorithm's performance for scalar transport in a laminar channel flow and momentum transport in a turbulent one. For these, we recover eddy diffusivity operators at 1% of the cost of computing the exact operator via a brute-force approach for the laminar channel flow problem and 13% for the turbulent one. We observe that we can reconstruct these operators with an increase in accuracy by about a factor of 100 over randomized low-rank methods. We glean that for problems in which the RANS space is reducible to one dimension, eddy diffusivity and eddy viscosity operators can be reconstructed with reasonable accuracy using only a few simulations, regardless of simulation resolution or degrees of freedom.
△ Less
Submitted 23 June, 2023;
originally announced June 2023.
-
InRank: Incremental Low-Rank Learning
Authors:
Jiawei Zhao,
Yifei Zhang,
Beidi Chen,
Florian Schäfer,
Anima Anandkumar
Abstract:
The theory of greedy low-rank learning (GLRL) aims to explain the impressive generalization capabilities of deep learning. It proves that stochastic gradient-based training implicitly regularizes neural networks towards low-rank solutions through a gradual increase of the rank during training. However, there is a gap between theory and practice since GLRL requires an infinitesimal initialization o…
▽ More
The theory of greedy low-rank learning (GLRL) aims to explain the impressive generalization capabilities of deep learning. It proves that stochastic gradient-based training implicitly regularizes neural networks towards low-rank solutions through a gradual increase of the rank during training. However, there is a gap between theory and practice since GLRL requires an infinitesimal initialization of the weights, which is not practical due to the fact that it is a saddle point. In this work, we remove the assumption of infinitesimal initialization by focusing on cumulative weight updates. We prove the cumulative weight updates follow an incremental low-rank trajectory for arbitrary orthogonal initialization of weights in a three-layer linear network. Empirically, we demonstrate that our theory holds on a broad range of neural networks (e.g., transformers) and standard training algorithms (e.g., SGD, Adam). However, existing training algorithms do not exploit the low-rank property to improve computational efficiency as the networks are not parameterized in low-rank. To remedy this, we design a new training algorithm Incremental Low-Rank Learning (InRank), which explicitly expresses cumulative weight updates as low-rank matrices while incrementally augmenting their ranks during training. We evaluate InRank on GPT-2, and our results indicate that InRank achieves comparable prediction performance as the full-rank counterpart while requiring at most 33% of the total ranks throughout training. We also propose an efficient version of InRank that achieves a reduction of 37% in total training time and 36% in model size when training GPT-medium on WikiText-103 from scratch.
△ Less
Submitted 31 December, 2023; v1 submitted 19 June, 2023;
originally announced June 2023.
-
Differentiating Metropolis-Hastings to Optimize Intractable Densities
Authors:
Gaurav Arya,
Ruben Seyer,
Frank Schäfer,
Kartik Chandra,
Alexander K. Lew,
Mathieu Huot,
Vikash K. Mansinghka,
Jonathan Ragan-Kelley,
Christopher Rackauckas,
Moritz Schauer
Abstract:
We develop an algorithm for automatic differentiation of Metropolis-Hastings samplers, allowing us to differentiate through probabilistic inference, even if the model has discrete components within it. Our approach fuses recent advances in stochastic automatic differentiation with traditional Markov chain coupling schemes, providing an unbiased and low-variance gradient estimator. This allows us t…
▽ More
We develop an algorithm for automatic differentiation of Metropolis-Hastings samplers, allowing us to differentiate through probabilistic inference, even if the model has discrete components within it. Our approach fuses recent advances in stochastic automatic differentiation with traditional Markov chain coupling schemes, providing an unbiased and low-variance gradient estimator. This allows us to apply gradient-based optimization to objectives expressed as expectations over intractable target densities. We demonstrate our approach by finding an ambiguous observation in a Gaussian mixture model and by maximizing the specific heat in an Ising model.
△ Less
Submitted 30 June, 2023; v1 submitted 13 June, 2023;
originally announced June 2023.
-
Score Operator Newton transport
Authors:
Nisha Chandramoorthy,
Florian Schaefer,
Youssef Marzouk
Abstract:
We propose a new approach for sampling and Bayesian computation that uses the score of the target distribution to construct a transport from a given reference distribution to the target. Our approach is an infinite-dimensional Newton method, involving a linear PDE, for finding a zero of a ``score-residual'' operator. We prove sufficient conditions for convergence to a valid transport map. Our Newt…
▽ More
We propose a new approach for sampling and Bayesian computation that uses the score of the target distribution to construct a transport from a given reference distribution to the target. Our approach is an infinite-dimensional Newton method, involving a linear PDE, for finding a zero of a ``score-residual'' operator. We prove sufficient conditions for convergence to a valid transport map. Our Newton iterates can be computed by exploiting fast solvers for elliptic PDEs, resulting in new algorithms for Bayesian inference and other sampling tasks. We identify elementary settings where score-operator Newton transport achieves fast convergence while avoiding mode collapse.
△ Less
Submitted 9 March, 2024; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Algorithmic Computability of the Capacity of Gaussian Channels with Colored Noise
Authors:
Holger Boche,
Andrea Grigorescu,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
Designing capacity-achieving coding schemes for the band-limited additive colored Gaussian noise (ACGN) channel has been and is still a challenge. In this paper, the capacity of the band-limited ACGN channel is studied from a fundamental algorithmic point of view by addressing the question of whether or not the capacity can be algorithmically computed. To this aim, the concept of Turing machines i…
▽ More
Designing capacity-achieving coding schemes for the band-limited additive colored Gaussian noise (ACGN) channel has been and is still a challenge. In this paper, the capacity of the band-limited ACGN channel is studied from a fundamental algorithmic point of view by addressing the question of whether or not the capacity can be algorithmically computed. To this aim, the concept of Turing machines is used, which provides fundamental performance limits of digital computers. t is shown that there are band-limited ACGN channels having computable continuous spectral densities whose capacity are non-computable numbers. Moreover, it is demonstrated that for those channels, it is impossible to find computable sequences of asymptotically sharp upper bounds for their capacities.
△ Less
Submitted 1 June, 2023; v1 submitted 4 May, 2023;
originally announced May 2023.
-
Performance Bounds for Quantum Feedback Control
Authors:
Flemming Holtorf,
Frank Schäfer,
Julian Arnold,
Christopher Rackauckas,
Alan Edelman
Abstract:
The limits of quantum feedback control have immediate consequences for quantum information science at large, yet remain largely unexplored. Here, we combine quantum filtering theory and moment-sum-of-squares techniques to construct a hierarchy of convex optimization problems that furnish monotonically improving, computable bounds on the best attainable performance for a broad class of quantum feed…
▽ More
The limits of quantum feedback control have immediate consequences for quantum information science at large, yet remain largely unexplored. Here, we combine quantum filtering theory and moment-sum-of-squares techniques to construct a hierarchy of convex optimization problems that furnish monotonically improving, computable bounds on the best attainable performance for a broad class of quantum feedback control problems. These bounds may serve as witnesses of fundamental limitations, optimality certificates, or performance targets. We prove convergence of the bounds to the optimal control performance under technical conditions and demonstrate the practical utility of our approach by designing certifiably near-optimal controllers for a qubit in a cavity subjected to photon counting and homodyne detection measurements.
△ Less
Submitted 5 December, 2024; v1 submitted 6 April, 2023;
originally announced April 2023.
-
Reliability and Latency Analysis for Wireless Communication Systems with a Secret-Key Budget
Authors:
Karl-Ludwig Besser,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the budget of available key bits will be exhausted. In a…
▽ More
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the budget of available key bits will be exhausted. In addition, we investigate the latency before a transmission can take place. Since security, reliability, and latency are three important metrics for modern communication systems, it is of great interest to jointly analyze them in relation to the system parameters. In particular, we show under what conditions the system may remain in an active state indefinitely, i.e., never run out of available secret-key bits. The results presented in this work will allow system designers to adjust the system parameters in such a way that the requirements of the application in terms of both reliability and latency are met.
△ Less
Submitted 12 January, 2024; v1 submitted 5 April, 2023;
originally announced April 2023.
-
Sparse Cholesky Factorization for Solving Nonlinear PDEs via Gaussian Processes
Authors:
Yifan Chen,
Houman Owhadi,
Florian Schäfer
Abstract:
In recent years, there has been widespread adoption of machine learning-based approaches to automate the solving of partial differential equations (PDEs). Among these approaches, Gaussian processes (GPs) and kernel methods have garnered considerable interest due to their flexibility, robust theoretical guarantees, and close ties to traditional methods. They can transform the solving of general non…
▽ More
In recent years, there has been widespread adoption of machine learning-based approaches to automate the solving of partial differential equations (PDEs). Among these approaches, Gaussian processes (GPs) and kernel methods have garnered considerable interest due to their flexibility, robust theoretical guarantees, and close ties to traditional methods. They can transform the solving of general nonlinear PDEs into solving quadratic optimization problems with nonlinear, PDE-induced constraints. However, the complexity bottleneck lies in computing with dense kernel matrices obtained from pointwise evaluations of the covariance kernel, and its \textit{partial derivatives}, a result of the PDE constraint and for which fast algorithms are scarce.
The primary goal of this paper is to provide a near-linear complexity algorithm for working with such kernel matrices. We present a sparse Cholesky factorization algorithm for these matrices based on the near-sparsity of the Cholesky factor under a novel ordering of pointwise and derivative measurements. The near-sparsity is rigorously justified by directly connecting the factor to GP regression and exponential decay of basis functions in numerical homogenization. We then employ the Vecchia approximation of GPs, which is optimal in the Kullback-Leibler divergence, to compute the approximate factor. This enables us to compute $ε$-approximate inverse Cholesky factors of the kernel matrices with complexity $O(N\log^d(N/ε))$ in space and $O(N\log^{2d}(N/ε))$ in time. We integrate sparse Cholesky factorizations into optimization algorithms to obtain fast solvers of the nonlinear PDE. We numerically illustrate our algorithm's near-linear space/time complexity for a broad class of nonlinear PDEs such as the nonlinear elliptic, Burgers, and Monge-Ampère equations.
△ Less
Submitted 8 March, 2024; v1 submitted 3 April, 2023;
originally announced April 2023.
-
Secure Integrated Sensing and Communication
Authors:
Onur Günlü,
Matthieu R. Bloch,
Rafael F. Schaefer,
Aylin Yener
Abstract:
This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers…
▽ More
This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers is treated as an eavesdropper whose state should be estimated but which should remain oblivious to part of the transmitted information. The model abstracts the challenges behind security for joint communication and sensing if one views the channel state as a key attribute, e.g., location. For independent and identically distributed states, perfect output feedback, and when part of the transmitted message should be kept secret, a partial characterization of the secrecy-distortion region is developed. The characterization is exact when the broadcast channel is either physically-degraded or reversely-physically-degraded. The partial characterization is also extended to the situation in which the entire transmitted message should be kept secret. The benefits of a joint approach compared to separation-based secure communication and state-sensing methods are illustrated with binary joint communication and sensing models.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Trade Reliability for Security: Leakage-Failure Probability Minimization for Machine-Type Communications in URLLC
Authors:
Yao Zhu,
Xiaopeng Yuan,
Yulin Hu,
Rafael F. Schaefer,
Anke Schmeink
Abstract:
How to provide information security while fulfilling ultra reliability and low-latency requirements is one of the major concerns for enabling the next generation of ultra-reliable and low-latency communications service (xURLLC), specially in machine-type communications. In this work, we investigate the reliability-security tradeoff via defining the leakage-failure probability, which is a metric th…
▽ More
How to provide information security while fulfilling ultra reliability and low-latency requirements is one of the major concerns for enabling the next generation of ultra-reliable and low-latency communications service (xURLLC), specially in machine-type communications. In this work, we investigate the reliability-security tradeoff via defining the leakage-failure probability, which is a metric that jointly characterizes both reliability and security performances for short-packet transmissions. We discover that the system performance can be enhanced by counter-intuitively allocating fewer resources for the transmission with finite blocklength (FBL) codes. In order to solve the corresponding optimization problem for the joint resource allocation, we propose an optimization framework, that leverages lower-bounded approximations for the decoding error probability in the FBL regime. We characterize the convexity of the reformulated problem and establish an efficient iterative searching method, the convergence of which is guaranteed. To show the extendability of the framework, we further discuss the blocklength allocation schemes with practical requirements of reliable-secure performance, as well as the transmissions with the statistical channel state information (CSI). Numerical results verify the accuracy of the proposed approach and demonstrate the reliability-security tradeoff under various setups.
△ Less
Submitted 8 March, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Observation of Feshbach resonances in an ${}^{167}$Er-${}^6$Li Fermi-Fermi mixture
Authors:
Florian Schäfer,
Yuki Haruna,
Yoshiro Takahashi
Abstract:
We present our experimental investigation of the interspecies Feshbach spectrum in a mixture of ${}^{167}$Er($F = 19/2, m_F = -19/2$)-${}^6$Li($F = 1/2, m_F = 1/2$) atoms in the microkelvin temperature regime. These temperatures are achieved by means of sympathetic cooling with ${}^{174}$Yb as a third species. Interspecies Feshbach resonances are then identified by investigation of the Er-Li inela…
▽ More
We present our experimental investigation of the interspecies Feshbach spectrum in a mixture of ${}^{167}$Er($F = 19/2, m_F = -19/2$)-${}^6$Li($F = 1/2, m_F = 1/2$) atoms in the microkelvin temperature regime. These temperatures are achieved by means of sympathetic cooling with ${}^{174}$Yb as a third species. Interspecies Feshbach resonances are then identified by investigation of the Er-Li inelastic collisional properties for magnetic fields up to 800 G. Numerous narrow resonances as well as six resonances with widths above 1 G could be identified. It is these broader resonances that hold much promise for interesting future investigations of, for exmample, novel superfluid states and Efimov states in large mass-imbalanced, all-fermionic two-component systems.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Learning End-to-End Channel Coding with Diffusion Models
Authors:
Muah Kim,
Rick Fritschek,
Rafael F. Schaefer
Abstract:
It is a known problem that deep-learning-based end-to-end (E2E) channel coding systems depend on a known and differentiable channel model, due to the learning process and based on the gradient-descent optimization methods. This places the challenge to approximate or generate the channel or its derivative from samples generated by pilot signaling in real-world scenarios. Currently, there are two pr…
▽ More
It is a known problem that deep-learning-based end-to-end (E2E) channel coding systems depend on a known and differentiable channel model, due to the learning process and based on the gradient-descent optimization methods. This places the challenge to approximate or generate the channel or its derivative from samples generated by pilot signaling in real-world scenarios. Currently, there are two prevalent methods to solve this problem. One is to generate the channel via a generative adversarial network (GAN), and the other is to, in essence, approximate the gradient via reinforcement learning methods. Other methods include using score-based methods, variational autoencoders, or mutual-information-based methods. In this paper, we focus on generative models and, in particular, on a new promising method called diffusion models, which have shown a higher quality of generation in image-based tasks. We will show that diffusion models can be used in wireless E2E scenarios and that they work as good as Wasserstein GANs while having a more stable training procedure and a better generalization ability in testing.
△ Less
Submitted 29 November, 2023; v1 submitted 3 February, 2023;
originally announced February 2023.
-
Variational sparse inverse Cholesky approximation for latent Gaussian processes via double Kullback-Leibler minimization
Authors:
Jian Cao,
Myeongjong Kang,
Felix Jimenez,
Huiyan Sang,
Florian Schafer,
Matthias Katzfuss
Abstract:
To achieve scalable and accurate inference for latent Gaussian processes, we propose a variational approximation based on a family of Gaussian distributions whose covariance matrices have sparse inverse Cholesky (SIC) factors. We combine this variational approximation of the posterior with a similar and efficient SIC-restricted Kullback-Leibler-optimal approximation of the prior. We then focus on…
▽ More
To achieve scalable and accurate inference for latent Gaussian processes, we propose a variational approximation based on a family of Gaussian distributions whose covariance matrices have sparse inverse Cholesky (SIC) factors. We combine this variational approximation of the posterior with a similar and efficient SIC-restricted Kullback-Leibler-optimal approximation of the prior. We then focus on a particular SIC ordering and nearest-neighbor-based sparsity pattern resulting in highly accurate prior and posterior approximations. For this setting, our variational approximation can be computed via stochastic gradient descent in polylogarithmic time per iteration. We provide numerical comparisons showing that the proposed double-Kullback-Leibler-optimal Gaussian-process approximation (DKLGP) can sometimes be vastly more accurate for stationary kernels than alternative approaches such as inducing-point and mean-field approximations at similar computational complexity.
△ Less
Submitted 26 May, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Realization of a quantum degenerate mixture of highly magnetic and nonmagnetic atoms
Authors:
Florian Schäfer,
Yuki Haruna,
Yoshiro Takahashi
Abstract:
We report on the experimental realization of a bosonic quantum degenerate mixture of highly-magnetic 168Er and nonmagnetic 174Yb. Quantum degeneracy is reached by forced evaporation in an all-optical trap. Formation of the two Bose-Einstein condensates is confirmed by analysis of the cloud shape and the observed inversions of the aspect ratios. The results open a path for possible new experiments…
▽ More
We report on the experimental realization of a bosonic quantum degenerate mixture of highly-magnetic 168Er and nonmagnetic 174Yb. Quantum degeneracy is reached by forced evaporation in an all-optical trap. Formation of the two Bose-Einstein condensates is confirmed by analysis of the cloud shape and the observed inversions of the aspect ratios. The results open a path for possible new experiments on magnetic and nonmagnetic impurity physics as well as on the quantum chaotic behavior of Feshbach resonances and their dependencies on minor variations of the reduced masses.
△ Less
Submitted 31 March, 2023; v1 submitted 21 January, 2023;
originally announced January 2023.
-
On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks
Authors:
Holger Boche,
Rafael F. Schaefer,
H. Vincent Poor,
Frank H. P. Fitzek
Abstract:
As we are more and more dependent on the communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks tackle the problem of resilience by in-network computing approaches for higher protocol layers, while the physical layer remains an open problem. This is particularl…
▽ More
As we are more and more dependent on the communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks tackle the problem of resilience by in-network computing approaches for higher protocol layers, while the physical layer remains an open problem. This is particularly true for wireless communication systems which are inherently vulnerable to adversarial attacks due to the open nature of the wireless medium. In denial-of-service (DoS) attacks, an active adversary is able to completely disrupt the communication and it has been shown that Turing machines are incapable of detecting such attacks. As Turing machines provide the fundamental limits of digital information processing and therewith of digital twins, this implies that even the most powerful digital twins that preserve all information of the physical network error-free are not capable of detecting such attacks. This stimulates the question of how powerful the information processing hardware must be to enable the detection of DoS attacks. Therefore, in the paper the need of neuromorphic twins is advocated and by the use of Blum-Shub-Smale machines a first implementation that enables the detection of DoS attacks is shown. This result holds for both cases of with and without constraints on the input and jamming sequences of the adversary.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.