-
Serendipitous Recommendation with Multimodal LLM
Authors:
Haoting Wang,
Jianling Wang,
Hao Li,
Fangjun Yi,
Mengyu Fu,
Youwei Zhang,
Yifan Liu,
Liang Liu,
Minmin Chen,
Ed H. Chi,
Lichan Hong,
Haokai Lu
Abstract:
Conventional recommendation systems succeed in identifying relevant content but often fail to provide users with surprising or novel items. Multimodal Large Language Models (MLLMs) possess the world knowledge and multimodal understanding needed for serendipity, but their integration into billion-item-scale platforms presents significant challenges. In this paper, we propose a novel hierarchical fr…
▽ More
Conventional recommendation systems succeed in identifying relevant content but often fail to provide users with surprising or novel items. Multimodal Large Language Models (MLLMs) possess the world knowledge and multimodal understanding needed for serendipity, but their integration into billion-item-scale platforms presents significant challenges. In this paper, we propose a novel hierarchical framework where fine-tuned MLLMs provide high-level guidance to conventional recommendation models, steering them towards more serendipitous suggestions. This approach leverages MLLM strengths in understanding multimodal content and user interests while retaining the efficiency of traditional models for item-level recommendation. This mitigates the complexity of applying MLLMs directly to vast action spaces. We also demonstrate a chain-of-thought strategy enabling MLLMs to discover novel user interests by first understanding video content and then identifying relevant yet unexplored interest clusters. Through live experiments within a commercial short-form video platform serving billions of users, we show that our MLLM-powered approach significantly improves both recommendation serendipity and user satisfaction.
△ Less
Submitted 9 June, 2025;
originally announced June 2025.
-
Automated, Cross-Layer Root Cause Analysis of 5G Video-Conferencing Quality Degradation
Authors:
Fan Yi,
Haoran Wan,
Kyle Jamieson,
Oliver Michel
Abstract:
5G wireless networks are complex, leveraging layers of scheduling, retransmission, and adaptation mechanisms to maximize their efficiency. But these mechanisms interact to produce significant fluctuations in uplink and downlink capacity and latency. This markedly impacts the performance of real-time applications, such as video-conferencing, which are particularly sensitive to such fluctuations, re…
▽ More
5G wireless networks are complex, leveraging layers of scheduling, retransmission, and adaptation mechanisms to maximize their efficiency. But these mechanisms interact to produce significant fluctuations in uplink and downlink capacity and latency. This markedly impacts the performance of real-time applications, such as video-conferencing, which are particularly sensitive to such fluctuations, resulting in lag, stuttering, distorted audio, and low video quality. This paper presents a cross-layer view of 5G networks and their impact on and interaction with video-conferencing applications. We conduct novel, detailed measurements of both Private CBRS and commercial carrier cellular network dynamics, capturing physical- and link-layer events and correlating them with their effects at the network and transport layers, and the video-conferencing application itself. Our two datasets comprise days of low-rate campus-wide Zoom telemetry data, and hours of high-rate, correlated WebRTC-network-5G telemetry data. Based on these data, we trace performance anomalies back to root causes, identifying 24 previously unknown causal event chains that degrade 5G video conferencing. Armed with this knowledge, we build Domino, a tool that automates this process and is user-extensible to future wireless networks and interactive applications.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
Phenotype-Guided Generative Model for High-Fidelity Cardiac MRI Synthesis: Advancing Pretraining and Clinical Applications
Authors:
Ziyu Li,
Yujian Hu,
Zhengyao Ding,
Yiheng Mao,
Haitao Li,
Fan Yi,
Hongkun Zhang,
Zhengxing Huang
Abstract:
Cardiac Magnetic Resonance (CMR) imaging is a vital non-invasive tool for diagnosing heart diseases and evaluating cardiac health. However, the limited availability of large-scale, high-quality CMR datasets poses a major challenge to the effective application of artificial intelligence (AI) in this domain. Even the amount of unlabeled data and the health status it covers are difficult to meet the…
▽ More
Cardiac Magnetic Resonance (CMR) imaging is a vital non-invasive tool for diagnosing heart diseases and evaluating cardiac health. However, the limited availability of large-scale, high-quality CMR datasets poses a major challenge to the effective application of artificial intelligence (AI) in this domain. Even the amount of unlabeled data and the health status it covers are difficult to meet the needs of model pretraining, which hinders the performance of AI models on downstream tasks. In this study, we present Cardiac Phenotype-Guided CMR Generation (CPGG), a novel approach for generating diverse CMR data that covers a wide spectrum of cardiac health status. The CPGG framework consists of two stages: in the first stage, a generative model is trained using cardiac phenotypes derived from CMR data; in the second stage, a masked autoregressive diffusion model, conditioned on these phenotypes, generates high-fidelity CMR cine sequences that capture both structural and functional features of the heart in a fine-grained manner. We synthesized a massive amount of CMR to expand the pretraining data. Experimental results show that CPGG generates high-quality synthetic CMR data, significantly improving performance on various downstream tasks, including diagnosis and cardiac phenotypes prediction. These gains are demonstrated across both public and private datasets, highlighting the effectiveness of our approach. Code is availabel at https://anonymous.4open.science/r/CPGG.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
UniForm: A Unified Multi-Task Diffusion Transformer for Audio-Video Generation
Authors:
Lei Zhao,
Linfeng Feng,
Dongxu Ge,
Rujin Chen,
Fangqiu Yi,
Chi Zhang,
Xiao-Lei Zhang,
Xuelong Li
Abstract:
With the rise of diffusion models, audio-video generation has been revolutionized. However, most existing methods rely on separate modules for each modality, with limited exploration of unified generative architectures. In addition, many are confined to a single task and small-scale datasets. To address these limitations, we first propose UniForm, a unified multi-task diffusion transformer that jo…
▽ More
With the rise of diffusion models, audio-video generation has been revolutionized. However, most existing methods rely on separate modules for each modality, with limited exploration of unified generative architectures. In addition, many are confined to a single task and small-scale datasets. To address these limitations, we first propose UniForm, a unified multi-task diffusion transformer that jointly generates audio and visual modalities in a shared latent space. A single diffusion process models both audio and video, capturing the inherent correlations between sound and vision. Second, we introduce task-specific noise schemes and task tokens, enabling a single model to support multiple tasks, including text-to-audio-video, audio-to-video, and video-to-audio generation. Furthermore, by leveraging large language models and a large-scale text-audio-video combined dataset, UniForm achieves greater generative diversity than prior approaches. Extensive experiments show that UniForm achieves the state-of-the-art performance across audio-video generation tasks, producing content that is both well-aligned and close to real-world data distributions. Our demos are available at https://uniform-t2av.github.io/.
△ Less
Submitted 15 April, 2025; v1 submitted 6 February, 2025;
originally announced February 2025.
-
VAST 1.0: A Unified Framework for Controllable and Consistent Video Generation
Authors:
Chi Zhang,
Yuanzhi Liang,
Xi Qiu,
Fangqiu Yi,
Xuelong Li
Abstract:
Generating high-quality videos from textual descriptions poses challenges in maintaining temporal coherence and control over subject motion. We propose VAST (Video As Storyboard from Text), a two-stage framework to address these challenges and enable high-quality video generation. In the first stage, StoryForge transforms textual descriptions into detailed storyboards, capturing human poses and ob…
▽ More
Generating high-quality videos from textual descriptions poses challenges in maintaining temporal coherence and control over subject motion. We propose VAST (Video As Storyboard from Text), a two-stage framework to address these challenges and enable high-quality video generation. In the first stage, StoryForge transforms textual descriptions into detailed storyboards, capturing human poses and object layouts to represent the structural essence of the scene. In the second stage, VisionForge generates videos from these storyboards, producing high-quality videos with smooth motion, temporal consistency, and spatial coherence. By decoupling text understanding from video generation, VAST enables precise control over subject dynamics and scene composition. Experiments on the VBench benchmark demonstrate that VAST outperforms existing methods in both visual quality and semantic expression, setting a new standard for dynamic and coherent video generation.
△ Less
Submitted 21 December, 2024;
originally announced December 2024.
-
Spatiotemporal pattern formations in a two-layer coupled reaction-diffusion Lengyel-Epstein system
Authors:
Qidong Wu,
Fengqi Yi
Abstract:
Spatiotemporal pattern formations in two-layer coupled reaction-diffusion Lengyel-Epstein system with distributed delayed couplings are investigated. Firstly, for the original decoupled system, it is proved that when the intra-reactor diffusion rate $\ep$ of the inhibitor is sufficiently small and the intra-reactor diffusion rate $d$ of the inhibitor is large enough, then the subsystem can exhibit…
▽ More
Spatiotemporal pattern formations in two-layer coupled reaction-diffusion Lengyel-Epstein system with distributed delayed couplings are investigated. Firstly, for the original decoupled system, it is proved that when the intra-reactor diffusion rate $\ep$ of the inhibitor is sufficiently small and the intra-reactor diffusion rate $d$ of the inhibitor is large enough, then the subsystem can exhibit non-constant positive steady state $(\widetilde{u}(x;\ep),\widetilde{v}(x;ε))$ with large amplitude, and that as the parameter $τ$ varies, the stability of $(\widetilde{u}(x;\ep),\widetilde{v}(x;ε))$ changes, leading to the emergence of periodic solutions via Hopf bifurcation. Secondly, for the two-layer coupled system, the stability of the symmetric steady state $(\widetilde{u}(x;\ep),\widetilde{v}(x;ε),\widetilde{u}(x;\ep),\widetilde{v}(x;ε))$ is studied by treating $k_1,k_2$ (the inter-reactor diffusion rates) and $\al$ (the delay parameter) as the main parameters. In case of non-delayed couplings, the first quadrant of the $(k_1, k_2)$ parameter space can be divided into two regions: one is stable region, the other one is unstable region, and the two regions have the common boundary, which is the primary Turing bifurcation curve. In case of delayed couplings, it is shown that the first quadrant of the $(k_1, k_2)$ parameter space can be re-divided into three regions: the first one is unstable region, the second one is stable region, while the third one is the potential \lq\lq bifurcation\rq\rq region, where Hopf bifurcation may occur for suitable $\al$. Our analysis is mainly based on the singular perturbation techniques and the implicit function theorem, and the results show some different phenomena from those of the original decoupled system in one reactor.
△ Less
Submitted 19 December, 2024;
originally announced December 2024.
-
ARN-LSTM: A Multi-Stream Fusion Model for Skeleton-based Action Recognition
Authors:
Chuanchuan Wang,
Ahmad Sufril Azlan Mohmamed,
Mohd Halim Bin Mohd Noor,
Xiao Yang,
Feifan Yi,
Xiang Li
Abstract:
This paper presents the ARN-LSTM architecture, a novel multi-stream action recognition model designed to address the challenge of simultaneously capturing spatial motion and temporal dynamics in action sequences. Traditional methods often focus solely on spatial or temporal features, limiting their ability to comprehend complex human activities fully. Our proposed model integrates joint, motion, a…
▽ More
This paper presents the ARN-LSTM architecture, a novel multi-stream action recognition model designed to address the challenge of simultaneously capturing spatial motion and temporal dynamics in action sequences. Traditional methods often focus solely on spatial or temporal features, limiting their ability to comprehend complex human activities fully. Our proposed model integrates joint, motion, and temporal information through a multi-stream fusion architecture. Specifically, it comprises a jointstream for extracting skeleton features, a temporal stream for capturing dynamic temporal features, and an ARN-LSTM block that utilizes Time-Distributed Long Short-Term Memory (TD-LSTM) layers followed by an Attention Relation Network (ARN) to model temporal relations. The outputs from these streams are fused in a fully connected layer to provide the final action prediction. Evaluations on the NTU RGB+D 60 and NTU RGB+D 120 datasets outperform the superior performance of our model, particularly in group activity recognition.
△ Less
Submitted 29 November, 2024; v1 submitted 3 November, 2024;
originally announced November 2024.
-
Optical intraday variability analysis for the BL Lacertae object 1ES 1426+42.8
Authors:
X. Chang,
D. R. Xiong,
T. F. Yi,
C. X. Liu,
G. Bhatta,
J. R. Xu,
Y. L. Gong
Abstract:
The observation data of blazar 1ES 1426 + 42.8 were obtained using the 1.02 m optical telescope of Yunnan Observatories during $2021$ to $2023$. Intraday variability (IDV) is detected on seven nights. We use the turbulent model to investigate the mechanism of IDV in 1ES 1426 + 42.8. The fitting light curves match the actual IDV curves well. Using this model, we obtain the parameters such as the si…
▽ More
The observation data of blazar 1ES 1426 + 42.8 were obtained using the 1.02 m optical telescope of Yunnan Observatories during $2021$ to $2023$. Intraday variability (IDV) is detected on seven nights. We use the turbulent model to investigate the mechanism of IDV in 1ES 1426 + 42.8. The fitting light curves match the actual IDV curves well. Using this model, we obtain the parameters such as the size of turbulent cells and the width of pulses in the jet. A possible short-lived Quasi-periodic oscillation (QPO) of $58.55 \pm 8.09$ minutes was detected on April 26, 2022 whose light curve exhibits eight cycles at $>3σ$ global significance and confirmed by several different techniques. Through a more detailed analysis of the light curve of this night, we find that the period is shortened from 54.23 minutes ($4σ$) to 29.71 minutes ($3σ$). The possible QPO and period shortening phenomenon are best explained by the processes of magnetic reconnections.
△ Less
Submitted 10 September, 2024;
originally announced September 2024.
-
Out-of-Distribution Detection using Neural Activation Prior
Authors:
Weilin Wan,
Weizhong Zhang,
Quan Zhou,
Fan Yi,
Cheng Jin
Abstract:
Out-of-distribution detection (OOD) is a crucial technique for deploying machine learning models in the real world to handle the unseen scenarios. In this paper, we first propose a simple yet effective Neural Activation Prior (NAP) for OOD detection. Our neural activation prior is based on a key observation that, for a channel before the global pooling layer of a fully trained neural network, the…
▽ More
Out-of-distribution detection (OOD) is a crucial technique for deploying machine learning models in the real world to handle the unseen scenarios. In this paper, we first propose a simple yet effective Neural Activation Prior (NAP) for OOD detection. Our neural activation prior is based on a key observation that, for a channel before the global pooling layer of a fully trained neural network, the probability of a few neurons being activated with a large response by an in-distribution (ID) sample is significantly higher than that by an OOD sample. An intuitive explanation is that for a model fully trained on ID dataset, each channel would play a role in detecting a certain pattern in the ID dataset, and a few neurons can be activated with a large response when the pattern is detected in an input sample. Then, a new scoring function based on this prior is proposed to highlight the role of these strongly activated neurons in OOD detection. Our approach is plug-and-play and does not lead to any performance degradation on ID data classification and requires no extra training or statistics from training or external datasets. Notice that previous methods primarily rely on post-global-pooling features of the neural networks, while the within-channel distribution information we leverage would be discarded by the global pooling operator. Consequently, our method is orthogonal to existing approaches and can be effectively combined with them in various applications. Experimental results show that our method achieves the state-of-the-art performance on CIFAR benchmark and ImageNet dataset, which demonstrates the power of the proposed prior. Finally, we extend our method to Transformers and the experimental findings indicate that NAP can also significantly enhance the performance of OOD detection on Transformers, thereby demonstrating the broad applicability of this prior knowledge.
△ Less
Submitted 24 May, 2024; v1 submitted 28 February, 2024;
originally announced February 2024.
-
WaveFlex: A Smart Surface for Private CBRS Wireless Cellular Networks
Authors:
Fan Yi,
Kun Woo Cho,
Yaxiong Xie,
Kyle Jamieson
Abstract:
We present the design and implementation of WaveFlex, the first smart surface that enhances Private LTE/5G networks operating under the shared-license framework in the Citizens Broadband Radio Service frequency band. WaveFlex works in the presence of frequency diversity: multiple nearby base stations operating on different frequencies, as dictated by a Spectrum Access System coordinator. It also h…
▽ More
We present the design and implementation of WaveFlex, the first smart surface that enhances Private LTE/5G networks operating under the shared-license framework in the Citizens Broadband Radio Service frequency band. WaveFlex works in the presence of frequency diversity: multiple nearby base stations operating on different frequencies, as dictated by a Spectrum Access System coordinator. It also handles time dynamism: due to the dynamic sharing rules of the band, base stations occasionally switch channels, especially when priority users enter the network. Finally, WaveFlex operates independently of the network itself, not requiring access to nor modification of the base station or mobile users, yet it remain compliant with and effective on prevailing cellular protocols. We have designed and fabricated WaveFlex on a custom multi-layer PCB, software defined radio-based network monitor, and supporting control software and hardware. Our experimental evaluation benchmarks an operational Private LTE network running at full line rate. Results demonstrate an 8.50 dB average SNR gain, and an average throughput gain of 4.36 Mbps for a single small cell, and 3.19 Mbps for four small cells, in a realistic indoor office scenario.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection
Authors:
Chenhao Lin,
Fangbin Yi,
Hang Wang,
Qian Li,
Deng Jingyi,
Chao Shen
Abstract:
Face forgery techniques have emerged as a forefront concern, and numerous detection approaches have been proposed to address this challenge. However, existing methods predominantly concentrate on single-face manipulation detection, leaving the more intricate and realistic realm of multi-face forgeries relatively unexplored. This paper proposes a novel framework explicitly tailored for multi-face f…
▽ More
Face forgery techniques have emerged as a forefront concern, and numerous detection approaches have been proposed to address this challenge. However, existing methods predominantly concentrate on single-face manipulation detection, leaving the more intricate and realistic realm of multi-face forgeries relatively unexplored. This paper proposes a novel framework explicitly tailored for multi-face forgery detection,filling a critical gap in the current research. The framework mainly involves two modules:(i) a facial relationships learning module, which generates distinguishable local features for each face within images,(ii) a global feature aggregation module that leverages the mutual constraints between global and local information to enhance forgery detection accuracy.Our experimental results on two publicly available multi-face forgery datasets demonstrate that the proposed approach achieves state-of-the-art performance in multi-face forgery detection scenarios.
△ Less
Submitted 7 October, 2023;
originally announced October 2023.
-
Prompting or Fine-tuning? A Comparative Study of Large Language Models for Taxonomy Construction
Authors:
Boqi Chen,
Fandi Yi,
Dániel Varró
Abstract:
Taxonomies represent hierarchical relations between entities, frequently applied in various software modeling and natural language processing (NLP) activities. They are typically subject to a set of structural constraints restricting their content. However, manual taxonomy construction can be time-consuming, incomplete, and costly to maintain. Recent studies of large language models (LLMs) have de…
▽ More
Taxonomies represent hierarchical relations between entities, frequently applied in various software modeling and natural language processing (NLP) activities. They are typically subject to a set of structural constraints restricting their content. However, manual taxonomy construction can be time-consuming, incomplete, and costly to maintain. Recent studies of large language models (LLMs) have demonstrated that appropriate user inputs (called prompting) can effectively guide LLMs, such as GPT-3, in diverse NLP tasks without explicit (re-)training. However, existing approaches for automated taxonomy construction typically involve fine-tuning a language model by adjusting model parameters. In this paper, we present a general framework for taxonomy construction that takes into account structural constraints. We subsequently conduct a systematic comparison between the prompting and fine-tuning approaches performed on a hypernym taxonomy and a novel computer science taxonomy dataset. Our result reveals the following: (1) Even without explicit training on the dataset, the prompting approach outperforms fine-tuning-based approaches. Moreover, the performance gap between prompting and fine-tuning widens when the training dataset is small. However, (2) taxonomies generated by the fine-tuning approach can be easily post-processed to satisfy all the constraints, whereas handling violations of the taxonomies produced by the prompting approach can be challenging. These evaluation findings provide guidance on selecting the appropriate method for taxonomy construction and highlight potential enhancements for both approaches.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Empirical extinction coefficients for the Swift-UVOT optical-through-ultraviolet passbands
Authors:
Fang Yi,
Yuan Haibo,
Zhang Ruoyi,
Gao Jian,
Xu Shuai
Abstract:
We calculated empirical reddening and extinction coefficients with respect to the dust reddening map of Schlegel et al. for the Swift-UVOT passbands, using the 'star pair' method and photometric data from the UVOT Serendipitous Source Catalogue and spectroscopic data from LAMOST Data Release 7 and 2MASS. The reddening coefficients for the UVW2-UVM2, UVM2-UVW1, UVW1-U, U-B, and B-V colors are -1.39…
▽ More
We calculated empirical reddening and extinction coefficients with respect to the dust reddening map of Schlegel et al. for the Swift-UVOT passbands, using the 'star pair' method and photometric data from the UVOT Serendipitous Source Catalogue and spectroscopic data from LAMOST Data Release 7 and 2MASS. The reddening coefficients for the UVW2-UVM2, UVM2-UVW1, UVW1-U, U-B, and B-V colors are -1.39, 2.08, 0.78, 0.72, and 0.84, respectively.The extinction coefficients for the UVW2, UVM2, UVW1, U, B, and V bands are 5.60, 6.99, 4.91, 4.13, 3.41 and 2.57, respectively. The numbers are consistent with predictions by the Fitzpatrick's extinction law of R(V)=3.0. Temperature-dependent variations of the coefficients are found and discussed, particularly for the ultraviolet passbands. We recommend using the new reddening and extinction coefficients in future when dereddening the Swift-UVOT data.
△ Less
Submitted 21 August, 2023;
originally announced August 2023.
-
Multiverse Transformer: 1st Place Solution for Waymo Open Sim Agents Challenge 2023
Authors:
Yu Wang,
Tiebiao Zhao,
Fan Yi
Abstract:
This technical report presents our 1st place solution for the Waymo Open Sim Agents Challenge (WOSAC) 2023. Our proposed MultiVerse Transformer for Agent simulation (MVTA) effectively leverages transformer-based motion prediction approaches, and is tailored for closed-loop simulation of agents. In order to produce simulations with a high degree of realism, we design novel training and sampling met…
▽ More
This technical report presents our 1st place solution for the Waymo Open Sim Agents Challenge (WOSAC) 2023. Our proposed MultiVerse Transformer for Agent simulation (MVTA) effectively leverages transformer-based motion prediction approaches, and is tailored for closed-loop simulation of agents. In order to produce simulations with a high degree of realism, we design novel training and sampling methods, and implement a receding horizon prediction mechanism. In addition, we introduce a variable-length history aggregation method to mitigate the compounding error that can arise during closed-loop autoregressive execution. On the WOSAC, our MVTA and its enhanced version MVTE reach a realism meta-metric of 0.5091 and 0.5168, respectively, outperforming all the other methods on the leaderboard.
△ Less
Submitted 20 June, 2023;
originally announced June 2023.
-
Multicolour Optical Variability Monitoring of Blazars with High Time Resolution
Authors:
X. Chang,
T. F. Yi,
D. R. Xiong,
C. X. Liu,
X. Yang,
H. Z. Li,
Y. L. Gong,
W. W. Na,
Y. Li,
Z. H. Chen,
J. P. Chen,
L. S. Mao
Abstract:
We carried out a high time-resolution, multicolour optical observing campaign for eight $γ$-ray detected blazars during 2010-2020. We analyze flux variations, correlations between magnitudes and colours on different timescales. Intraday variability (IDV) is detected in all eight sources of our sample. A bluer-when-brighter (BWB) chromatic trend is dominant on intraday timescales. On the short time…
▽ More
We carried out a high time-resolution, multicolour optical observing campaign for eight $γ$-ray detected blazars during 2010-2020. We analyze flux variations, correlations between magnitudes and colours on different timescales. Intraday variability (IDV) is detected in all eight sources of our sample. A bluer-when-brighter (BWB) chromatic trend is dominant on intraday timescales. On the short timescales, the BWB trend only shows up in ON 231, 3C 279, BL Lacertae and 1E 1458.8+2249. There is a BWB trend in 3C 279 on the long timescale. We estimate the upper limits of black hole mass for three blazars (i.e. ON 321, 1ES 1426+42.8, PKS 1510-089) using variability timescales. On April 13, 2010 a potential quasi-periodic oscillation (QPO) with the period of $P=48.67\pm13.90$ minutes is found in 1ES 1426+42.8. The light curve on March 16, 2021 further shows the existence of the QPO phenomenon. The QPO in this target deserves further observation and confirmation.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
AI vs. Human -- Differentiation Analysis of Scientific Content Generation
Authors:
Yongqiang Ma,
Jiawei Liu,
Fan Yi,
Qikai Cheng,
Yong Huang,
Wei Lu,
Xiaozhong Liu
Abstract:
Recent neural language models have taken a significant step forward in producing remarkably controllable, fluent, and grammatical text. Although studies have found that AI-generated text is not distinguishable from human-written text for crowd-sourcing workers, there still exist errors in AI-generated text which are even subtler and harder to spot. We primarily focus on the scenario in which scien…
▽ More
Recent neural language models have taken a significant step forward in producing remarkably controllable, fluent, and grammatical text. Although studies have found that AI-generated text is not distinguishable from human-written text for crowd-sourcing workers, there still exist errors in AI-generated text which are even subtler and harder to spot. We primarily focus on the scenario in which scientific AI writing assistant is deeply involved. First, we construct a feature description framework to distinguish between AI-generated text and human-written text from syntax, semantics, and pragmatics based on the human evaluation. Then we utilize the features, i.e., writing style, coherence, consistency, and argument logistics, from the proposed framework to analyze two types of content. Finally, we adopt several publicly available methods to investigate the gap of between AI-generated scientific text and human-written scientific text by AI-generated scientific text detection models. The results suggest that while AI has the potential to generate scientific content that is as accurate as human-written content, there is still a gap in terms of depth and overall quality. The AI-generated scientific content is more likely to contain errors in factual issues. We find that there exists a "writing style" gap between AI-generated scientific text and human-written scientific text. Based on the analysis result, we summarize a series of model-agnostic and distribution-agnostic features for detection tasks in other domains. Findings in this paper contribute to guiding the optimization of AI models to produce high-quality content and addressing related ethical and security concerns.
△ Less
Submitted 12 February, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Nucleation of Al Nanocrystals in Solute-Substituted Al Metallic Glasses I: Structural characterization
Authors:
Feng Yi,
S. D. Imhoff,
J. H. Perepezko,
P. M. Voyles
Abstract:
Primary crystallization in high Al-content metallic glasses is driven by nanometer-diameter regions with internal structure similar to fcc Al. Comparison of fluctuation electron microscopy (FEM) data to FEM simulations of fcc Al clusters dispersed in a dense-random packed matrix is used to extract the diameter and volume fraction of the ordered regions in a Al88Y7Fe5 base glass and in glasses with…
▽ More
Primary crystallization in high Al-content metallic glasses is driven by nanometer-diameter regions with internal structure similar to fcc Al. Comparison of fluctuation electron microscopy (FEM) data to FEM simulations of fcc Al clusters dispersed in a dense-random packed matrix is used to extract the diameter and volume fraction of the ordered regions in a Al88Y7Fe5 base glass and in glasses with 1 at.% Cu substituted for Y or Al. The size and density of nanocrystals were measured as a function of isothermal annealing time for the same alloys. The volume fraction of crystalline material grows under isothermal annealing, so the phase transformation is not purely grain coarsening, but the crystalline volume fraction is lower than the volume fraction of ordered regions in the as-quenched samples, so not all of the ordered regions act as nuclei. Changes in diameter and volume fraction of the ordered regions with alloying are correlated with changes in the crystallization temperature, nucleation rate, and nanocrystal density. No evidence for phase separation is observed, and FEM simulations from a molecular dynamics quenched structural model of similar composition do not show the features observed in experiment.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Optimal consumption under a drawdown constraint over a finite horizon
Authors:
Xiaoshan Chen,
Xun Li,
Fahuai Yi,
Xiang Yu
Abstract:
This paper studies a finite horizon utility maximization problem on excessive consumption under a drawdown constraint. Our control problem is an extension of the one considered in Bahman et al. (2019) to the model with a finite horizon and an extension of the one considered in Jeon and Oh (2022) to the model with zero interest rate. Contrary to Bahman et al. (2019), we encounter a parabolic nonlin…
▽ More
This paper studies a finite horizon utility maximization problem on excessive consumption under a drawdown constraint. Our control problem is an extension of the one considered in Bahman et al. (2019) to the model with a finite horizon and an extension of the one considered in Jeon and Oh (2022) to the model with zero interest rate. Contrary to Bahman et al. (2019), we encounter a parabolic nonlinear HJB variational inequality with a gradient constraint, in which some time-dependent free boundaries complicate the analysis significantly. Meanwhile, our methodology is built on technical PDE arguments, which differs from the martingale approach in Jeon and Oh (2022). Using the dual transform and considering the auxiliary variational inequality with gradient and function constraints, we establish the existence and uniqueness of the classical solution to the HJB variational inequality after the dimension reduction, and the associated free boundaries can be characterized in analytical form. Consequently, the piecewise optimal feedback controls and the time-dependent thresholds for the ratio of wealth and historical consumption peak can be obtained.
△ Less
Submitted 3 November, 2024; v1 submitted 16 July, 2022;
originally announced July 2022.
-
Edge differentially private estimation in the $β$-model via jittering and method of moments
Authors:
Jinyuan Chang,
Qiao Hu,
Eric D. Kolaczyk,
Qiwei Yao,
Fengting Yi
Abstract:
A standing challenge in data privacy is the trade-off between the level of privacy and the efficiency of statistical inference. Here we conduct an in-depth study of this trade-off for parameter estimation in the $β$-model (Chatterjee, Diaconis and Sly, 2011) for edge differentially private network data released via jittering (Karwa, Krivitsky and Slavković, 2017). Unlike most previous approaches b…
▽ More
A standing challenge in data privacy is the trade-off between the level of privacy and the efficiency of statistical inference. Here we conduct an in-depth study of this trade-off for parameter estimation in the $β$-model (Chatterjee, Diaconis and Sly, 2011) for edge differentially private network data released via jittering (Karwa, Krivitsky and Slavković, 2017). Unlike most previous approaches based on maximum likelihood estimation for this network model, we proceed via method-of-moments. This choice facilitates our exploration of a substantially broader range of privacy levels - corresponding to stricter privacy - than has been to date. Over this new range we discover our proposed estimator for the parameters exhibits an interesting phase transition, with both its convergence rate and asymptotic variance following one of three different regimes of behavior depending on the level of privacy. Because identification of the operable regime is difficult if not impossible in practice, we devise a novel adaptive bootstrap procedure to construct uniform inference across different phases. In fact, leveraging this bootstrap we are able to provide for simultaneous inference of all parameters in the $β$-model (i.e., equal to the number of nodes), which, to our best knowledge, is the first result of its kind. Numerical experiments confirm the competitive and reliable finite sample performance of the proposed inference methods, next to a comparable maximum likelihood method, as well as significant advantages in terms of computational speed and memory.
△ Less
Submitted 2 April, 2024; v1 submitted 19 December, 2021;
originally announced December 2021.
-
ASFormer: Transformer for Action Segmentation
Authors:
Fangqiu Yi,
Hongyu Wen,
Tingting Jiang
Abstract:
Algorithms for the action segmentation task typically use temporal models to predict what action is occurring at each frame for a minute-long daily activity. Recent studies have shown the potential of Transformer in modeling the relations among elements in sequential data. However, there are several major concerns when directly applying the Transformer to the action segmentation task, such as the…
▽ More
Algorithms for the action segmentation task typically use temporal models to predict what action is occurring at each frame for a minute-long daily activity. Recent studies have shown the potential of Transformer in modeling the relations among elements in sequential data. However, there are several major concerns when directly applying the Transformer to the action segmentation task, such as the lack of inductive biases with small training sets, the deficit in processing long input sequence, and the limitation of the decoder architecture to utilize temporal relations among multiple action segments to refine the initial predictions. To address these concerns, we design an efficient Transformer-based model for action segmentation task, named ASFormer, with three distinctive characteristics: (i) We explicitly bring in the local connectivity inductive priors because of the high locality of features. It constrains the hypothesis space within a reliable scope, and is beneficial for the action segmentation task to learn a proper target function with small training sets. (ii) We apply a pre-defined hierarchical representation pattern that efficiently handles long input sequences. (iii) We carefully design the decoder to refine the initial predictions from the encoder. Extensive experiments on three public datasets demonstrate that effectiveness of our methods. Code is available at \url{https://github.com/ChinaYi/ASFormer}.
△ Less
Submitted 16 October, 2021;
originally announced October 2021.
-
A consumption-investment model with state-dependent lower bound constraint on consumption
Authors:
Chonghu Guan,
Zuo Quan Xu,
Fahuai Yi
Abstract:
This paper studies a life-time consumption-investment problem under the Black-Scholes framework, where the consumption rate is subject to a lower bound constraint that linearly depends on her wealth. It is a stochastic control problem with state-dependent control constraint to which the standard stochastic control theory cannot be directly applied. We overcome this by transforming it into an equiv…
▽ More
This paper studies a life-time consumption-investment problem under the Black-Scholes framework, where the consumption rate is subject to a lower bound constraint that linearly depends on her wealth. It is a stochastic control problem with state-dependent control constraint to which the standard stochastic control theory cannot be directly applied. We overcome this by transforming it into an equivalent stochastic control problem in which the control constraint is state-independent so that the standard theory can be applied. We give an explicit optimal consumption-investment strategy when the constraint is homogeneous. When the constraint is non-homogeneous, it is shown that the value function is third-order continuously differentiable by differential equation approach, and a feedback form optimal consumption-investment strategy is provided. According to our findings, if one is concerned with long-term more than short-term consumption, then she should always consume as few as possible; otherwise, she should consume optimally when her wealth is above a threshold, and consume as few as possible when her wealth is below the threshold.
△ Less
Submitted 24 December, 2021; v1 submitted 13 September, 2021;
originally announced September 2021.
-
Not End-to-End: Explore Multi-Stage Architecture for Online Surgical Phase Recognition
Authors:
Fangqiu Yi,
Tingting Jiang
Abstract:
Surgical phase recognition is of particular interest to computer assisted surgery systems, in which the goal is to predict what phase is occurring at each frame for a surgery video. Networks with multi-stage architecture have been widely applied in many computer vision tasks with rich patterns, where a predictor stage first outputs initial predictions and an additional refinement stage operates on…
▽ More
Surgical phase recognition is of particular interest to computer assisted surgery systems, in which the goal is to predict what phase is occurring at each frame for a surgery video. Networks with multi-stage architecture have been widely applied in many computer vision tasks with rich patterns, where a predictor stage first outputs initial predictions and an additional refinement stage operates on the initial predictions to perform further refinement. Existing works show that surgical video contents are well ordered and contain rich temporal patterns, making the multi-stage architecture well suited for the surgical phase recognition task. However, we observe that when simply applying the multi-stage architecture to the surgical phase recognition task, the end-to-end training manner will make the refinement ability fall short of its wishes. To address the problem, we propose a new non end-to-end training strategy and explore different designs of multi-stage architecture for surgical phase recognition task. For the non end-to-end training strategy, the refinement stage is trained separately with proposed two types of disturbed sequences. Meanwhile, we evaluate three different choices of refinement models to show that our analysis and solution are robust to the choices of specific multi-stage models. We conduct experiments on two public benchmarks, the M2CAI16 Workflow Challenge, and the Cholec80 dataset. Results show that multi-stage architecture trained with our strategy largely boosts the performance of the current state-of-the-art single-stage model. Code is available at \url{https://github.com/ChinaYi/casual_tcn}.
△ Less
Submitted 10 July, 2021;
originally announced July 2021.
-
Deep Learning based Full-reference and No-reference Quality Assessment Models for Compressed UGC Videos
Authors:
Wei Sun,
Tao Wang,
Xiongkuo Min,
Fuwang Yi,
Guangtao Zhai
Abstract:
In this paper, we propose a deep learning based video quality assessment (VQA) framework to evaluate the quality of the compressed user's generated content (UGC) videos. The proposed VQA framework consists of three modules, the feature extraction module, the quality regression module, and the quality pooling module. For the feature extraction module, we fuse the features from intermediate layers o…
▽ More
In this paper, we propose a deep learning based video quality assessment (VQA) framework to evaluate the quality of the compressed user's generated content (UGC) videos. The proposed VQA framework consists of three modules, the feature extraction module, the quality regression module, and the quality pooling module. For the feature extraction module, we fuse the features from intermediate layers of the convolutional neural network (CNN) network into final quality-aware feature representation, which enables the model to make full use of visual information from low-level to high-level. Specifically, the structure and texture similarities of feature maps extracted from all intermediate layers are calculated as the feature representation for the full reference (FR) VQA model, and the global mean and standard deviation of the final feature maps fused by intermediate feature maps are calculated as the feature representation for the no reference (NR) VQA model. For the quality regression module, we use the fully connected (FC) layer to regress the quality-aware features into frame-level scores. Finally, a subjectively-inspired temporal pooling strategy is adopted to pool frame-level scores into the video-level score. The proposed model achieves the best performance among the state-of-the-art FR and NR VQA models on the Compressed UGC VQA database and also achieves pretty good performance on the in-the-wild UGC VQA databases.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
PBE-CC: Congestion Control via Endpoint-Centric, Physical-Layer Bandwidth Measurements
Authors:
Yaxiong Xie,
Fan Yi,
Kyle Jamieson
Abstract:
Wireless networks are becoming ever more sophisticated and overcrowded, imposing the most delay, jitter, and throughput damage to end-to-end network flows in today's internet. We therefore argue for fine-grained mobile endpoint-based wireless measurements to inform a precise congestion control algorithm through a well-defined API to the mobile's wireless physical layer. Our proposed congestion con…
▽ More
Wireless networks are becoming ever more sophisticated and overcrowded, imposing the most delay, jitter, and throughput damage to end-to-end network flows in today's internet. We therefore argue for fine-grained mobile endpoint-based wireless measurements to inform a precise congestion control algorithm through a well-defined API to the mobile's wireless physical layer. Our proposed congestion control algorithm is based on Physical-Layer Bandwidth measurements taken at the Endpoint (PBE-CC), and captures the latest 5G New Radio innovations that increase wireless capacity, yet create abrupt rises and falls in available wireless capacity that the PBE-CC sender can react to precisely and very rapidly. We implement a proof-of-concept prototype of the PBE measurement module on software-defined radios and the PBE sender and receiver in C. An extensive performance evaluation compares PBE-CC head to head against the leading cellular-aware and wireless-oblivious congestion control protocols proposed in the research community and in deployment, in mobile and static mobile scenarios, and over busy and quiet networks. Results show 6.3% higher average throughput than BBR, while simultaneously reducing 95th percentile delay by 1.8x.
△ Less
Submitted 6 July, 2020; v1 submitted 9 February, 2020;
originally announced February 2020.
-
Optimal redeeming strategy of stock loans under drift uncertainty
Authors:
Zuo Quan Xu,
Fahuai Yi
Abstract:
In practice, one must recognize the inevitable incompleteness of information while making decisions. In this paper, we consider the optimal redeeming problem of stock loans under a state of incomplete information presented by the uncertainty in the (bull or bear) trends of the underlying stock. This is called drift uncertainty. Due to the unavoidable need for the estimation of trends while making…
▽ More
In practice, one must recognize the inevitable incompleteness of information while making decisions. In this paper, we consider the optimal redeeming problem of stock loans under a state of incomplete information presented by the uncertainty in the (bull or bear) trends of the underlying stock. This is called drift uncertainty. Due to the unavoidable need for the estimation of trends while making decisions, the related Hamilton-Jacobi-Bellman (HJB) equation is of a degenerate parabolic type. Hence, it is very hard to obtain its regularity using the standard approach, making the problem different from the existing optimal redeeming problems without drift uncertainty. We present a thorough and delicate probabilistic and functional analysis to obtain the regularity of the value function and the optimal redeeming strategies. The optimal redeeming strategies of stock loans appear significantly different in the bull and bear trends.
△ Less
Submitted 20 January, 2019;
originally announced January 2019.
-
ConvPath: A Software Tool for Lung Adenocarcinoma Digital Pathological Image Analysis Aided by Convolutional Neural Network
Authors:
Shidan Wang,
Tao Wang,
Lin Yang,
Faliu Yi,
Xin Luo,
Yikun Yang,
Adi Gazdar,
Junya Fujimoto,
Ignacio I. Wistuba,
Bo Yao,
ShinYi Lin,
Yang Xie,
Yousheng Mao,
Guanghua Xiao
Abstract:
The spatial distributions of different types of cells could reveal a cancer cell growth pattern, its relationships with the tumor microenvironment and the immune response of the body, all of which represent key hallmarks of cancer. However, manually recognizing and localizing all the cells in pathology slides are almost impossible. In this study, we developed an automated cell type classification…
▽ More
The spatial distributions of different types of cells could reveal a cancer cell growth pattern, its relationships with the tumor microenvironment and the immune response of the body, all of which represent key hallmarks of cancer. However, manually recognizing and localizing all the cells in pathology slides are almost impossible. In this study, we developed an automated cell type classification pipeline, ConvPath, which includes nuclei segmentation, convolutional neural network-based tumor, stromal and lymphocytes classification, and extraction of tumor microenvironment related features for lung cancer pathology images. The overall classification accuracy is 92.9% and 90.1% in training and independent testing datasets, respectively. By identifying cells and classifying cell types, this pipeline can convert a pathology image into a spatial map of tumor, stromal and lymphocyte cells. From this spatial map, we can extracted features that characterize the tumor micro-environment. Based on these features, we developed an image feature-based prognostic model and validated the model in two independent cohorts. The predicted risk group serves as an independent prognostic factor, after adjusting for clinical variables that include age, gender, smoking status, and stage.
△ Less
Submitted 20 September, 2018;
originally announced September 2018.
-
The Radio and $γ$-ray Variability Analysis of S5 0716+714
Authors:
H. Z. Li,
Y. G. Jiang,
T. F. Yi,
D. F. Guo,
X. Chen,
H. M. Zhang,
Q. G. Gao,
F. W. Lu,
J. Y. Ren
Abstract:
We have studied the variability of \object{S5 0716+714} at radio 15 GHz and $γ$-ray band using three different methods. A possible periodicity of $P_{15 GHz}=266.0\pm11.5$ and $P_γ=344.0\pm16.4$ days are obtained for radio 15 GHz and $γ$-ray light curves, respectively. The variability may be related to the intrinsically emission mechanism. The difference between the variability timescales of radio…
▽ More
We have studied the variability of \object{S5 0716+714} at radio 15 GHz and $γ$-ray band using three different methods. A possible periodicity of $P_{15 GHz}=266.0\pm11.5$ and $P_γ=344.0\pm16.4$ days are obtained for radio 15 GHz and $γ$-ray light curves, respectively. The variability may be related to the intrinsically emission mechanism. The difference between the variability timescales of radio 15 GHz and $γ$-ray may be due to that the emission of radio 15 GHz is produced via the synchrotron process, while the $γ$-ray is produced by both the SSC and EC processes.
△ Less
Submitted 20 January, 2018;
originally announced January 2018.
-
Curvature of the spectral energy distribution, the dominant process for inverse Compton component and other jet properties in Fermi 2LAC blazars
Authors:
R. Xue,
D. Luo,
L. M. Du,
Z. R. Wang,
Z. H. Xie,
T. F. Yi,
D. R. Xiong,
Y. B. Xu,
W. G. Liu,
X. L. Yu
Abstract:
We fit the spectral energy distributions (SEDs) of members of a large sample of Fermi 2LAC blazars to synchrotron and inverse Compton (IC) models. Our main results are as follows. (i) As suggested by previous works, the correlation between peak frequency and curvature can be explained by statistical or stochastic particle acceleration mechanisms. For BL Lacs, we find a linear correlation between s…
▽ More
We fit the spectral energy distributions (SEDs) of members of a large sample of Fermi 2LAC blazars to synchrotron and inverse Compton (IC) models. Our main results are as follows. (i) As suggested by previous works, the correlation between peak frequency and curvature can be explained by statistical or stochastic particle acceleration mechanisms. For BL Lacs, we find a linear correlation between synchrotron peak frequency and its curvature. The slope of the correlation is consistent with the stochastic acceleration mechanisms and confirm previous studies. For FSRQs, we also find a linear correlation, but its slope cannot be explained by previous theoretical models. (ii) We find a significant correlation between IC luminosity and synchrotron luminosity. The slope of the correlation of FSRQs is consistent with the EC process. And the slope of the correlation of BL Lac is consistent with the SSC process. (iii) We find several significant correlations between IC curvature and several basic parameters of blazars (black hole mass, broad line luminosity, the Lorentz factor of jet). We also find significant correlations between bolometric luminosity and these basic parameters of blazars which suggest that the origin of jet is a mixture of the mechanisms proposed by Blandford $\&$ Znajek and by Blandford $\&$ Payne.
△ Less
Submitted 19 September, 2016;
originally announced September 2016.
-
Multi-band Variability Analysis of Mrk 421
Authors:
H. Z. Li,
Y. G. Jiang,
D. F. Guo,
X. Chen,
T. F. Yi
Abstract:
We have assembled the historical variability data of Mrk 421 at radio 15 GHz, X-ray and gamma-ray bands, spanning about 6.3, 10.3 and 7.5 yr, respective- ly. We analyzed the variability by using three methods. The results indicated that there is a period of 287.6 +- 4.4 days for 15 GHz, 309.5 +- 5.8 days for X- ray and 283.4+- 4.7 days for gamma-ray, respectively. This period can be reasonably exp…
▽ More
We have assembled the historical variability data of Mrk 421 at radio 15 GHz, X-ray and gamma-ray bands, spanning about 6.3, 10.3 and 7.5 yr, respective- ly. We analyzed the variability by using three methods. The results indicated that there is a period of 287.6 +- 4.4 days for 15 GHz, 309.5 +- 5.8 days for X- ray and 283.4+- 4.7 days for gamma-ray, respectively. This period can be reasonably explained by the nonballistic helical motion of the emitting material. The cor- relation analysis suggested that the variabilities of radio 15 GHz, X-ray and 0-ray are remarkable correlated, and the emission of radio 15 GHz lags behind that of X-ray, and the X-ray flux lags behind the gamma-ray. This suggests that the gamma-ray derives from inverse Compton (IC) scattering of the synchrotron photons, supporting the synchrotron self-Compton (SSC) model. Moreover, the time delay between different wavebands could be explained by the shock-in-jet models, in which a moving emission region produces the radio to gamma-ray activity, implying that the emission region of gamma-ray is closer to the center than ones of X-ray and radio emission.
△ Less
Submitted 4 March, 2016;
originally announced March 2016.
-
Optimal Investment Stopping Problem with Nonsmooth Utility in Finite Horizon
Authors:
Chonghu Guan,
Xun Li,
Zuoquan Xu,
Fahuai Yi
Abstract:
In this paper, we investigate an interesting and important stopping problem mixed with stochastic controls and a \textit{nonsmooth} utility over a finite time horizon. The paper aims to develop new methodologies, which are significantly different from those of mixed dynamic optimal control and stopping problems in the existing literature, to figure out a manager's decision. We formulate our model…
▽ More
In this paper, we investigate an interesting and important stopping problem mixed with stochastic controls and a \textit{nonsmooth} utility over a finite time horizon. The paper aims to develop new methodologies, which are significantly different from those of mixed dynamic optimal control and stopping problems in the existing literature, to figure out a manager's decision. We formulate our model to a free boundary problem of a fully \textit{nonlinear} equation. By means of a dual transformation, however, we can convert the above problem to a new free boundary problem of a \textit{linear} equation. Finally, using the corresponding inverse dual transformation, we apply the theoretical results established for the new free boundary problem to obtain the properties of the optimal strategy and the optimal stopping time to achieve a certain level for the original problem over a finite time investment horizon.
△ Less
Submitted 3 July, 2015;
originally announced July 2015.
-
Dynkin Game of Convertible Bonds and Their Optimal Strategy
Authors:
Huiwen Yan,
Zhou Yang,
Fahuai Yi,
Gechun Liang
Abstract:
This paper studies the valuation and optimal strategy of convertible bonds as a Dynkin game by using the reflected backward stochastic differential equation method and the variational inequality method. We first reduce such a Dynkin game to an optimal stopping time problem with state constraint, and then in a Markovian setting, we investigate the optimal strategy by analyzing the properties of the…
▽ More
This paper studies the valuation and optimal strategy of convertible bonds as a Dynkin game by using the reflected backward stochastic differential equation method and the variational inequality method. We first reduce such a Dynkin game to an optimal stopping time problem with state constraint, and then in a Markovian setting, we investigate the optimal strategy by analyzing the properties of the corresponding free boundary, including its position, asymptotics, monotonicity and regularity. We identify situations when call precedes conversion, and vice versa. Moreover, we show that the irregular payoff results in the possibly non-monotonic conversion boundary. Surprisingly, the price of the convertible bond is not necessarily monotonic in time: it may even increase when time approaches maturity.
△ Less
Submitted 31 March, 2015;
originally announced March 2015.
-
Optimal Investment with Stopping in Finite Horizon
Authors:
Xiongfei Jian,
Xun Li,
Fahuai Yi
Abstract:
In this paper, we investigate dynamic optimization problems featuring both stochastic control and optimal stopping in a finite time horizon. The paper aims to develop new methodologies, which are significantly different from those of mixed dynamic optimal control and stopping problems in the existing literature, to study a manager's decision. We formulate our model to a free boundary problem of a…
▽ More
In this paper, we investigate dynamic optimization problems featuring both stochastic control and optimal stopping in a finite time horizon. The paper aims to develop new methodologies, which are significantly different from those of mixed dynamic optimal control and stopping problems in the existing literature, to study a manager's decision. We formulate our model to a free boundary problem of a fully nonlinear equation. Furthermore, by means of a dual transformation for the above problem, we convert the above problem to a new free boundary problem of a linear equation. Finally, we apply the theoretical results to challenging, yet practically relevant and important, risk-sensitive problems in wealth management to obtain the properties of the optimal strategy and the right time to achieve a certain level over a finite time investment horizon.
△ Less
Submitted 26 June, 2014;
originally announced June 2014.
-
An Optimal Consumption-Investment Model with Constraint on Consumption
Authors:
Zuo Quan Xu,
Fahuai Yi
Abstract:
A continuous-time consumption-investment model with constraint is considered for a small investor whose decisions are the consumption rate and the allocation of wealth to a risk-free and a risky asset with logarithmic Brownian motion fluctuations. The consumption rate is subject to an upper bound constraint which linearly depends on the investor's wealth and bankruptcy is prohibited. The investor'…
▽ More
A continuous-time consumption-investment model with constraint is considered for a small investor whose decisions are the consumption rate and the allocation of wealth to a risk-free and a risky asset with logarithmic Brownian motion fluctuations. The consumption rate is subject to an upper bound constraint which linearly depends on the investor's wealth and bankruptcy is prohibited. The investor's objective is to maximize total expected discounted utility of consumption over an infinite trading horizon. It is shown that the value function is (second order) smooth everywhere but a unique possibility of (known) exception point and the optimal consumption-investment strategy is provided in a closed feedback form of wealth, which in contrast to the existing work does not involve the value function. According to this model, an investor should take the same optimal investment strategy as in Merton's model regardless his financial situation. By contrast, the optimal consumption strategy does depend on the investor's financial situation: he should use a similar consumption strategy as in Merton's model when he is in a bad situation, and consume as much as possible when he is in a good situation.
△ Less
Submitted 30 April, 2014;
originally announced April 2014.
-
Non-trivial $m$-quasi-Einstein metrics on quadratic Lie groups
Authors:
Zhiqi Chen,
Ke Liang,
Fahuai Yi
Abstract:
We call a metric $m$-quasi-Einstein if $Ric_X^m$ (a modification of the $m$-Bakry-Emery Ricci tensor in terms of a suitable vector field $X$) is a constant multiple of the metric tensor. It is a generalization of Einstein metrics which contains Ricci solitons. In this paper, we focus on left-invariant vector fields and left-invariant Riemannian metrics on quadratic Lie groups. First we prove that…
▽ More
We call a metric $m$-quasi-Einstein if $Ric_X^m$ (a modification of the $m$-Bakry-Emery Ricci tensor in terms of a suitable vector field $X$) is a constant multiple of the metric tensor. It is a generalization of Einstein metrics which contains Ricci solitons. In this paper, we focus on left-invariant vector fields and left-invariant Riemannian metrics on quadratic Lie groups. First we prove that any left-invariant vector field $X$ such that the left-invariant Riemannian metric on a quadratic Lie group is $m$-quasi-Einstein is a Killing field. Then we construct infinitely many non-trivial $m$-quasi-Einstein metrics on solvable quadratic Lie groups $G(n)$ for $m$ finite.
△ Less
Submitted 30 June, 2015; v1 submitted 9 January, 2014;
originally announced January 2014.
-
Study on the effect of humidity and dust on leakage current of bulk micro-MEGAS detector
Authors:
Bo Wang,
Yu-lian Zhang,
Hui-Rong Qi,
Jing Liu,
Xin-Shuai Zhang,
Tian-Chong Zhang,
Fu-Ting Yi,
Qun Ou-Yang,
Yuan-Bo Chen
Abstract:
In this paper, the effect of humidity and dust trapped in avalanche region on leakage current of bulk micro-MEGAS detector is studied. Pyralux PC1025 layers of DuPont are introduced in bulk technique and micro-MEGAS detector with pillars of 300μm in diameter is fabricated. Leakage current is tested in air with different humidity. Silicon carbide powder and PMMA (polymethyl methacrylate) powder are…
▽ More
In this paper, the effect of humidity and dust trapped in avalanche region on leakage current of bulk micro-MEGAS detector is studied. Pyralux PC1025 layers of DuPont are introduced in bulk technique and micro-MEGAS detector with pillars of 300μm in diameter is fabricated. Leakage current is tested in air with different humidity. Silicon carbide powder and PMMA (polymethyl methacrylate) powder are added as dust to avalanche region. Leakage current with and without powder is tested in air and results are depicted in the same figure. Test results indicate that leakage current increases with both storage humidity and test humidity, and also increases when powder is introduced in avalanche region.
△ Less
Submitted 25 September, 2013;
originally announced September 2013.
-
Investigation of GEM-Micromegas Detector on X-ray Beam of Synchrotron Radiation
Authors:
YuLian Zhang,
HuiRong Qi,
BiTao Hu,
ShengNan Fan,
Bo Wang,
Mei Liu,
Jian Zhang,
RongGuang Liu,
GuangCai Chang,
Peng Liu,
Qun Ouyang,
YuanBo Chen,
FuTing Yi
Abstract:
To solve the discharge of the standard Bulk Micromegas and GEM detector, the GEM-Micromegas detector was developed in Institute of High Energy Physics. Taking into account the advantages of the two detectors, one GEM foil was set as a preamplifier on the mesh of Micromegas in the structure and the GEM preamplification decreased the working voltage of Micromegas to reduce the effect of the discharg…
▽ More
To solve the discharge of the standard Bulk Micromegas and GEM detector, the GEM-Micromegas detector was developed in Institute of High Energy Physics. Taking into account the advantages of the two detectors, one GEM foil was set as a preamplifier on the mesh of Micromegas in the structure and the GEM preamplification decreased the working voltage of Micromegas to reduce the effect of the discharge significantly. In the paper, the performance of detector in X-ray beam was studied at 1W2B laboratory of Beijing Synchrotron Radiation Facility. Finally, the result of the energy resolution under various X-ray energies was given in different working gases. It indicated that the GEM-Micromegas detector had the energy response capability in all the energy range and it could work better than the standard Bulk-Micromegas.
△ Less
Submitted 1 July, 2013; v1 submitted 9 May, 2013;
originally announced May 2013.
-
Indifference Pricing of American Option Underlying Illiquid Stock under Exponential Forward Performance
Authors:
Xiaoshan Chen,
Qingshuo Song,
Fahuai Yi,
George Yin
Abstract:
This work focuses on the indifference pricing of American call option underlying a non-traded stock, which may be partially hedgeable by another traded stock. Under the exponential forward measure, the indifference price is formulated as a stochastic singular control problem. The value function is characterized as the unique solution of a partial differential equation in a Sobolev space. Together…
▽ More
This work focuses on the indifference pricing of American call option underlying a non-traded stock, which may be partially hedgeable by another traded stock. Under the exponential forward measure, the indifference price is formulated as a stochastic singular control problem. The value function is characterized as the unique solution of a partial differential equation in a Sobolev space. Together with some regularities and estimates of the value function, the existence of the optimal strategy is also obtained. The applications of the characterization result includes a derivation of a dual representation and the indifference pricing on employee stock option. As a byproduct, a generalized Ito's formula is obtained for functions in a Sobolev space.
△ Less
Submitted 30 December, 2011;
originally announced January 2012.
-
Broad-line and Multi-wave Band Emission from Blazars
Authors:
T. F. Yi,
G. Z. Xie
Abstract:
We study the correlations of the flux of the broad-line emission ($F_{BLR}$) with the X-ray emission flux, optical emission flux at 5500 Åand radio emission flux at 5 GHz, respectively, for a large sample of 50 Blazars (39 flat-spectrum radio quasars (FSRQs) and 11 BL Lac objects). Our main results are as follows. There are very strong correlations between $F_{BLR}$ and $F_{X}$ and between…
▽ More
We study the correlations of the flux of the broad-line emission ($F_{BLR}$) with the X-ray emission flux, optical emission flux at 5500 Åand radio emission flux at 5 GHz, respectively, for a large sample of 50 Blazars (39 flat-spectrum radio quasars (FSRQs) and 11 BL Lac objects). Our main results are as follows. There are very strong correlations between $F_{BLR}$ and $F_{X}$ and between $L_{BLR}$ and $L_{X}$ in both states for 39 FSRQs and the slopes of the linear regression equations are almost equal to 1. There are weak correlations between $F_{BLR}$ and $F_{X}$ and between $L_{BLR}$ and $L_{X}$ for 11 BL Lac objects in both states, and the slopes of the linear regression equations are close to 1. There are significant correlations between $F_{BLR}$ and $F_{X}$ and between $L_{BLR}$ and $L_{X}$ for 50 blazars in both states, the slopes of both the linear regression equations are also close to 1. These results support a close link between relativistic jets and accretion on to the central Kerr black hole. On the other hand, we find that BL Lac objects have low accretion efficiency $η$, whereas FSRQs have high accretion efficiency $η$. The unified model of FSRQs and BL Lac objects is also discussed.
△ Less
Submitted 24 March, 2008;
originally announced March 2008.
-
Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images
Authors:
Dao-Shun Wang,
Feng Yi,
Xiaobo Li
Abstract:
Visual secrete sharing (VSS) is an encryption technique that utilizes human visual system in the recovering of the secret image and it does not require any complex calculation. Pixel expansion has been a major issue of VSS schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for binary secret images. This paper presents a general probabilistic (k, n)-VSS…
▽ More
Visual secrete sharing (VSS) is an encryption technique that utilizes human visual system in the recovering of the secret image and it does not require any complex calculation. Pixel expansion has been a major issue of VSS schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for binary secret images. This paper presents a general probabilistic (k, n)-VSS scheme for gray-scale images and another scheme for color images. With our schemes, the pixel expansion can be set to a user-defined value. When this value is 1, there is no pixel expansion at all. The quality of reconstructed secret images, measured by Average Relative Difference, is equivalent to Relative Difference of existing deterministic schemes. Previous probabilistic VSS schemes for black-and-white images with respect to pixel expansion can be viewed as special cases of the schemes proposed here
△ Less
Submitted 26 December, 2007;
originally announced December 2007.
-
On the Analysis and Generalization of Extended Visual Cryptography Schemes
Authors:
DaoShun Wang,
Feng Yi,
Xiaobo Li,
Ping Luo,
Yiqi Dai
Abstract:
An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al. [3] to protect a binary secret image with meaningful (innocent-looking) shares. This is implemented by concatenating an extended matrix to each basis matrix. The minimum size of the extended matrix was obtained from a hypergraph coloring model and the scheme was designed for binary images only [3]. In this paper, we gi…
▽ More
An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al. [3] to protect a binary secret image with meaningful (innocent-looking) shares. This is implemented by concatenating an extended matrix to each basis matrix. The minimum size of the extended matrix was obtained from a hypergraph coloring model and the scheme was designed for binary images only [3]. In this paper, we give a more concise derivation for this matrix extension for color images. Furthermore, we present a (k, n) scheme to protect multiple color images with meaningful shares. This scheme is an extension of the (n, n) VCS for multiple binary images proposed in Droste scheme [2].
△ Less
Submitted 30 October, 2006;
originally announced October 2006.