-
Performances in solving the Bethe-Salpeter equation with the Yambo code
Authors:
Petru Milev,
Blanca Mellado-Pinto,
Muralidhar Nalabothula,
Ali Esquembre Kucukalic,
Fernando Alvarruiz,
Enrique Ramos,
Ludger Wirtz,
Jose E. Roman,
Davide Sangalli
Abstract:
In this work, we analyze the performances of two different strategies in solving the structured eigenvalue problem deriving from the Bethe-Salpeter equation (BSE) in condensed matter physics. The first strategy employs direct diagonalization, while the second is based on an iterative solver. The BSE matrix is constructed with the Yambo code, and the two strategies are implemented by interfacing Ya…
▽ More
In this work, we analyze the performances of two different strategies in solving the structured eigenvalue problem deriving from the Bethe-Salpeter equation (BSE) in condensed matter physics. The first strategy employs direct diagonalization, while the second is based on an iterative solver. The BSE matrix is constructed with the Yambo code, and the two strategies are implemented by interfacing Yambo with the ScaLAPACK and ELPA libraries for direct diagonalization, and with the SLEPc library for the iterative approach. We consider both the hermitian (Tamm-Dancoff approximation) and pseudo-hermitian forms, addressing dense matrices of three different sizes. A description of the implementation is also provided, with details for the pseudo-hermitian case. Timing and memory utilization are analyzed on both CPU and GPU clusters. The CPU simulations are performed on a local cluster in Rome, while the GPU simulations are performed on the Leonardo HPC cluster of CINECA. Our results demonstrate that it is now feasible to handle dense BSE matrices of the order 10$^5$.
△ Less
Submitted 14 April, 2025;
originally announced April 2025.
-
Edge AI for Real-time Fetal Assessment in Rural Guatemala
Authors:
Nasim Katebi,
Mohammad Ahmad,
Mohsen Motie-Shirazi,
Daniel Phan,
Ellen Kolesnikova,
Sepideh Nikookar,
Alireza Rafiei,
Murali K. Korikana,
Rachel Hall-Clifford,
Esteban Castro,
Rosibely Sut,
Enma Coyote,
Anahi Venzor Strader,
Edlyn Ramos,
Peter Rohloff,
Reza Sameni,
Gari D. Clifford
Abstract:
Perinatal complications, defined as conditions that arise during pregnancy, childbirth, and the immediate postpartum period, represent a significant burden on maternal and neonatal health worldwide. Factors contributing to these disparities include limited access to quality healthcare, socioeconomic inequalities, and variations in healthcare infrastructure. Addressing these issues is crucial for i…
▽ More
Perinatal complications, defined as conditions that arise during pregnancy, childbirth, and the immediate postpartum period, represent a significant burden on maternal and neonatal health worldwide. Factors contributing to these disparities include limited access to quality healthcare, socioeconomic inequalities, and variations in healthcare infrastructure. Addressing these issues is crucial for improving health outcomes for mothers and newborns, particularly in underserved communities. To mitigate these challenges, we have developed an AI-enabled smartphone application designed to provide decision support at the point-of-care. This tool aims to enhance health monitoring during pregnancy by leveraging machine learning (ML) techniques. The intended use of this application is to assist midwives during routine home visits by offering real-time analysis and providing feedback based on collected data. The application integrates TensorFlow Lite (TFLite) and other Python-based algorithms within a Kotlin framework to process data in real-time. It is designed for use in low-resource settings, where traditional healthcare infrastructure may be lacking. The intended patient population includes pregnant women and new mothers in underserved areas and the developed system was piloted in rural Guatemala. This ML-based solution addresses the critical need for accessible and quality perinatal care by empowering healthcare providers with decision support tools to improve maternal and neonatal health outcomes.
△ Less
Submitted 18 March, 2025; v1 submitted 12 March, 2025;
originally announced March 2025.
-
Multimodal semantic retrieval for product search
Authors:
Dong Liu,
Esther Lopez Ramos
Abstract:
Semantic retrieval (also known as dense retrieval) based on textual data has been extensively studied for both web search and product search application fields, where the relevance of a query and a potential target document is computed by their dense vector representation comparison. Product image is crucial for e-commerce search interactions and is a key factor for customers at product exploratio…
▽ More
Semantic retrieval (also known as dense retrieval) based on textual data has been extensively studied for both web search and product search application fields, where the relevance of a query and a potential target document is computed by their dense vector representation comparison. Product image is crucial for e-commerce search interactions and is a key factor for customers at product explorations. However, its impact on semantic retrieval has not been well studied yet. In this research, we build a multimodal representation for product items in e-commerce search in contrast to pure-text representation of products, and investigate the impact of such representations. The models are developed and evaluated on e-commerce datasets. We demonstrate that a multimodal representation scheme for a product can show improvement either on purchase recall or relevance accuracy in semantic retrieval. Additionally, we provide numerical analysis for exclusive matches retrieved by a multimodal semantic retrieval model versus a text-only semantic retrieval model, to demonstrate the validation of multimodal solutions.
△ Less
Submitted 17 February, 2025; v1 submitted 13 January, 2025;
originally announced January 2025.
-
ABI Approach: Automatic Bias Identification in Decision-Making Under Risk based in an Ontology of Behavioral Economics
Authors:
Eduardo da C. Ramos,
Maria Luiza M. Campos,
Fernanda Baião
Abstract:
Organizational decision-making is crucial for success, yet cognitive biases can significantly affect risk preferences, leading to suboptimal outcomes. Risk seeking preferences for losses, driven by biases such as loss aversion, pose challenges and can result in severe negative consequences, including financial losses. This research introduces the ABI approach, a novel solution designed to support…
▽ More
Organizational decision-making is crucial for success, yet cognitive biases can significantly affect risk preferences, leading to suboptimal outcomes. Risk seeking preferences for losses, driven by biases such as loss aversion, pose challenges and can result in severe negative consequences, including financial losses. This research introduces the ABI approach, a novel solution designed to support organizational decision-makers by automatically identifying and explaining risk seeking preferences during decision-making. This research makes a novel contribution by automating the identification and explanation of risk seeking preferences using Cumulative Prospect theory (CPT) from Behavioral Economics. The ABI approach transforms theoretical insights into actionable, real-time guidance, making them accessible to a broader range of organizations and decision-makers without requiring specialized personnel. By contextualizing CPT concepts into business language, the approach facilitates widespread adoption and enhances decision-making processes with deep behavioral insights. Our systematic literature review identified significant gaps in existing methods, especially the lack of automated solutions with a concrete mechanism for automatically identifying risk seeking preferences, and the absence of formal knowledge representation, such as ontologies, for identifying and explaining the risk preferences. The ABI Approach addresses these gaps, offering a significant contribution to decision-making research and practice. Furthermore, it enables automatic collection of historical decision data with risk preferences, providing valuable insights for enhancing strategic management and long-term organizational performance. An experiment provided preliminary evidence on its effectiveness in helping decision-makers recognize their risk seeking preferences during decision-making in the loss domain.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
NotNets: Accelerating Microservices by Bypassing the Network
Authors:
Peter Alvaro,
Matthew Adiletta,
Adrian Cockroft,
Frank Hady,
Ramesh Illikkal,
Esteban Ramos,
James Tsai,
Robert Soulé
Abstract:
Remote procedure calls are the workhorse of distributed systems. However, as software engineering trends, such as micro-services and serverless computing, push applications towards ever finer-grained decompositions, the overhead of RPC-based communication is becoming too great to bear. In this paper, we argue that point solutions that attempt to optimize one aspect of RPC logic are unlikely to mit…
▽ More
Remote procedure calls are the workhorse of distributed systems. However, as software engineering trends, such as micro-services and serverless computing, push applications towards ever finer-grained decompositions, the overhead of RPC-based communication is becoming too great to bear. In this paper, we argue that point solutions that attempt to optimize one aspect of RPC logic are unlikely to mitigate these ballooning communication costs. Rather, we need a dramatic reappraisal of how we provide communication. Towards this end, we propose to emulate message-passing RPCs by sharing message payloads and metadata on CXL 3.0-backed far memory. We provide initial evidence of feasibility and analyze the expected benefits.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Bayesian Paired-Comparison with the bpcs Package
Authors:
David Issa Mattos,
Érika Martins Silva Ramos
Abstract:
This article introduces the bpcs R package (Bayesian Paired Comparison in Stan) and the statistical models implemented in the package. This package aims to facilitate the use of Bayesian models for paired comparison data in behavioral research. Bayesian analysis of paired comparison data allows parameter estimation even in conditions where the maximum likelihood does not exist, allows easy extensi…
▽ More
This article introduces the bpcs R package (Bayesian Paired Comparison in Stan) and the statistical models implemented in the package. This package aims to facilitate the use of Bayesian models for paired comparison data in behavioral research. Bayesian analysis of paired comparison data allows parameter estimation even in conditions where the maximum likelihood does not exist, allows easy extension of paired comparison models, provide straightforward interpretation of the results with credible intervals, have better control of type I error, have more robust evidence towards the null hypothesis, allows propagation of uncertainties, includes prior information, and perform well when handling models with many parameters and latent variables. The bpcs package provides a consistent interface for R users and several functions to evaluate the posterior distribution of all parameters, to estimate the posterior distribution of any contest between items, and to obtain the posterior distribution of the ranks. Three reanalyses of recent studies that used the frequentist Bradley-Terry model are presented. These reanalyses are conducted with the Bayesian models of the bpcs package, and all the code used to fit the models, generate the figures, and the tables are available in the online appendix.
△ Less
Submitted 20 September, 2021; v1 submitted 27 January, 2021;
originally announced January 2021.
-
A Mathematical Assessment of the Isolation Tree Method for Outliers Detection in Big Data
Authors:
Fernando A. Morales,
Jorge M. Ramírez,
Edgar A. Ramos
Abstract:
In this paper, the mathematical analysis of the Isolation Random Forest Method (IRF Method) for anomaly detection is presented. We show that the IRF space can be endowed with a probability induced by the Isolation Tree algorithm (iTree). In this setting, the convergence of the IRF method is proved using the Law of Large Numbers. A couple of counterexamples are presented to show that the original m…
▽ More
In this paper, the mathematical analysis of the Isolation Random Forest Method (IRF Method) for anomaly detection is presented. We show that the IRF space can be endowed with a probability induced by the Isolation Tree algorithm (iTree). In this setting, the convergence of the IRF method is proved using the Law of Large Numbers. A couple of counterexamples are presented to show that the original method is inconclusive and no quality certificate can be given, when using it as a means to detect anomalies. Hence, an alternative version of IRF is proposed, whose mathematical foundation, as well as its limitations, are fully justified. Finally, numerical experiments are presented to compare the performance of the classic IRF with the proposed one.
△ Less
Submitted 3 May, 2022; v1 submitted 9 April, 2020;
originally announced April 2020.
-
Distributing Intelligence to the Edge and Beyond
Authors:
Edgar Ramos,
Roberto Morabito,
Jani-Pekka Kainulainen
Abstract:
Machine Intelligence (MI) technologies have revolutionized the design and applications of computational intelligence systems, by introducing remarkable scientific and technological enhancements across domains. MI can improve Internet of Things (IoT) in several ways, such as optimizing the management of large volumes of data or improving automation and transmission in large-scale IoT deployments. W…
▽ More
Machine Intelligence (MI) technologies have revolutionized the design and applications of computational intelligence systems, by introducing remarkable scientific and technological enhancements across domains. MI can improve Internet of Things (IoT) in several ways, such as optimizing the management of large volumes of data or improving automation and transmission in large-scale IoT deployments. When considering MI in the IoT context, MI services deployment must account for the latency demands and network bandwidth requirements. To this extent, moving the intelligence towards the IoT end-device aims to address such requirements and introduces the notion of Distributed MI (D-MI) also in the IoT context. However, current D-MI deployments are limited by the lack of MI interoperability. Currently, the intelligence is tightly bound to the application that exploits it, limiting the provisioning of that specific intelligence service to additional applications. The objective of this article is to propose a novel approach to cope with such constraints. It focuses on decoupling the intelligence from the application by revising the traditional device's stack and introducing an intelligence layer that provides services to the overlying application layer. This paradigm aims to provide final users with more control and accessibility of intelligence services by boosting providers' incentives to develop solutions that could theoretically reach any device. Based on the definition of this emerging paradigm, we explore several aspects related to the intelligence distribution and its impact in the whole MI ecosystem.
△ Less
Submitted 25 July, 2019;
originally announced August 2019.
-
Intelligence Stratum for IoT. Architecture Requirements and Functions
Authors:
Edgar Ramos,
Roberto Morabito
Abstract:
The use of Artificial Intelligence (AI) is becoming increasingly pervasive and relevant in many different application areas. Researchers are putting a considerable effort to take full advantage of the power of AI, while trying to overcome the technical challenges that are intrinsically linked to almost any domain area of application, such as the Internet of Things (IoT). One of the biggest problem…
▽ More
The use of Artificial Intelligence (AI) is becoming increasingly pervasive and relevant in many different application areas. Researchers are putting a considerable effort to take full advantage of the power of AI, while trying to overcome the technical challenges that are intrinsically linked to almost any domain area of application, such as the Internet of Things (IoT). One of the biggest problems related to the use of AI in IoT is related to the difficulty of coping with the wide variety of protocols and software technologies used, as well as with the heterogeneity of the hardware resources consuming the AI. The scattered IoT landscape accentuates the limitations on interoperability, especially visible in the deployment of AI, affecting the seamless AI life-cycle management as well. In this paper, it is discussed how to enable AI distribution in IoT by introducing a layered intelligence architecture that aims to face the undertaken challenges taking into account the special requirements of nowadays IoT networks. It describes the main characteristics of the new paradigm architecture, highlighting what are the implications of its adoption from use cases perspective and their requirements. Finally, a set of open technical and research challenges are enumerated to reach the full potential of the intelligence distribution's vision.
△ Less
Submitted 25 July, 2019;
originally announced August 2019.
-
Effects of Beamforming and Antenna Configurations on Mobility in 5G NR
Authors:
Edgar Ramos,
Antonino Orsino
Abstract:
The future 5G systems are getting closer to be a reality. It is envisioned, indeed, that the roll-out of first 5G network will happen around end of 2018 and beginning of 2019. However, there are still a number of issues and problems that have to be faces and new solutions and methods are needed to solve them. Along these lines, the effects that beamforming and antenna configurations may have on th…
▽ More
The future 5G systems are getting closer to be a reality. It is envisioned, indeed, that the roll-out of first 5G network will happen around end of 2018 and beginning of 2019. However, there are still a number of issues and problems that have to be faces and new solutions and methods are needed to solve them. Along these lines, the effects that beamforming and antenna configurations may have on the mobility in 5G New Radio (NR) is still unclear. In fact, with the use of directive antennas and high frequencies (e.g., above 10 GHz), in order to meet the stringent requirements of 5G (e.g., support of 500km/h) it is crucial to understand how the envisioned 5G NR antenna configurations may impact mobility (and thus handovers). In this article, first we will briefly survey mobility enhancements and solution currently under discussion in 3GPP Release 15. In particular, we focus our analysis on the physical layer signals involved in the measurement reporting and the new radio measurement model used in 5G NR to filter the multiple beams typical of directive antenna with a large number of antenna elements. Finally, the critical aspect of mobility identified in the previous sections will be analyzed in more details through the obtained results of an extensive system-level evaluation analysis.
△ Less
Submitted 15 November, 2018;
originally announced November 2018.
-
Geometric and Combinatorial Properties of Well-Centered Triangulations in Three and Higher Dimensions
Authors:
Evan VanderZee,
Anil N. Hirani,
Damrong Guoy,
Vadim Zharnitsky,
Edgar Ramos
Abstract:
An n-simplex is said to be n-well-centered if its circumcenter lies in its interior. We introduce several other geometric conditions and an algebraic condition that can be used to determine whether a simplex is n-well-centered. These conditions, together with some other observations, are used to describe restrictions on the local combinatorial structure of simplicial meshes in which every simple…
▽ More
An n-simplex is said to be n-well-centered if its circumcenter lies in its interior. We introduce several other geometric conditions and an algebraic condition that can be used to determine whether a simplex is n-well-centered. These conditions, together with some other observations, are used to describe restrictions on the local combinatorial structure of simplicial meshes in which every simplex is well-centered. In particular, it is shown that in a 3-well-centered (2-well-centered) tetrahedral mesh there are at least 7 (9) edges incident to each interior vertex, and these bounds are sharp. Moreover, it is shown that, in stark contrast to the 2-dimensional analog, where there are exactly two vertex links that prevent a well-centered triangle mesh in R^2, there are infinitely many vertex links that prohibit a well-centered tetrahedral mesh in R^3.
△ Less
Submitted 16 December, 2009;
originally announced December 2009.
-
Well-Centered Triangulation
Authors:
Evan VanderZee,
Anil N. Hirani,
Damrong Guoy,
Edgar Ramos
Abstract:
Meshes composed of well-centered simplices have nice orthogonal dual meshes (the dual Voronoi diagram). This is useful for certain numerical algorithms that prefer such primal-dual mesh pairs. We prove that well-centered meshes also have optimality properties and relationships to Delaunay and minmax angle triangulations. We present an iterative algorithm that seeks to transform a given triangula…
▽ More
Meshes composed of well-centered simplices have nice orthogonal dual meshes (the dual Voronoi diagram). This is useful for certain numerical algorithms that prefer such primal-dual mesh pairs. We prove that well-centered meshes also have optimality properties and relationships to Delaunay and minmax angle triangulations. We present an iterative algorithm that seeks to transform a given triangulation in two or three dimensions into a well-centered one by minimizing a cost function and moving the interior vertices while keeping the mesh connectivity and boundary vertices fixed. The cost function is a direct result of a new characterization of well-centeredness in arbitrary dimensions that we present. Ours is the first optimization-based heuristic for well-centeredness, and the first one that applies in both two and three dimensions. We show the results of applying our algorithm to small and large two-dimensional meshes, some with a complex boundary, and obtain a well-centered tetrahedralization of the cube. We also show numerical evidence that our algorithm preserves gradation and that it improves the maximum and minimum angles of acute triangulations created by the best known previous method.
△ Less
Submitted 18 August, 2009; v1 submitted 14 February, 2008;
originally announced February 2008.