• ### Learning Radio Resource Management in 5G Networks: Framework, Opportunities and Challenges(1611.10253)

May 20, 2018 cs.IT, math.IT, cs.NI, math.OC
In the fifth generation (5G) of mobile broadband systems, Radio Resources Management (RRM) will reach unprecedented levels of complexity. To cope with the ever more sophisticated RRM functionalities and with the growing variety of scenarios, while carrying out the prompt decisions required in 5G, this manuscript presents a lean 5G RRM architecture that capitalizes on recent advances in the field of machine learning in combination with the large amount of data readily available in the network from measurements and system observations. The architecture relies on a single general-purpose learning framework conceived for RRM directly using the data gathered in the network. The complexity of RRM is shifted to the design of the framework, whilst the RRM algorithms derived from this framework are executed in a computationally efficient distributed manner at the radio access nodes. The potential of this approach is verified in a pair of pertinent scenarios and future directions on applications of machine learning to RRM are discussed.
• ### A Reinforced Topic-Aware Convolutional Sequence-to-Sequence Model for Abstractive Text Summarization(1805.03616)

May 9, 2018 cs.CL, cs.LG, stat.ML
In this paper, we propose a deep learning approach to tackle the automatic summarization tasks by incorporating topic information into the convolutional sequence-to-sequence (ConvS2S) model and using self-critical sequence training (SCST) for optimization. Through jointly attending to topics and word-level alignment, our approach can improve coherence, diversity, and informativeness of generated summaries via a biased probability generation mechanism. On the other hand, reinforcement training, like SCST, directly optimizes the proposed model with respect to the non-differentiable metric ROUGE, which also avoids the exposure bias during inference. We carry out the experimental evaluation with state-of-the-art methods over the Gigaword, DUC-2004, and LCSTS datasets. The empirical results demonstrate the superiority of our proposed method in the abstractive summarization.
• ### Crime Modeling with Truncated L\'evy Flights for Residential Burglary Models(1601.03415)

May 8, 2018 physics.soc-ph
Statistical agent-based models for crime have shown that repeat victimization can lead to predictable crime hotspots (see e.g. Short et al., Math. Models Methods Appl., 2008), then a recent study in one space dimension (Chaturapruek et al., SIAM J. Appl. Math, 2013) shows that the hotspot dynamics changes when movement patterns of the criminals involve long-tailed L\'evy distributions for the jump length as opposed to classical random walks. In reality, criminals move in confined areas with a maximum jump length. In this paper we develop a mean-field continuum model with truncated L\'evy flights for residential burglary in one space dimension. The continuum model yields local Laplace diffusion, rather than fractional diffusion. We present an asymptotic theory to derive the continuum equations and show excellent agreement between the continuum model and the agent-based simulations. This suggests that local diffusion models are universal for continuum limits of this problem, the important quantity being the diffusion coefficient. Law enforcement agents are also incorporated into the model, and the relative effectiveness of their deployment strategies are compared quantitatively.
• ### Deep Learning based Inter-Modality Image Registration Supervised by Intra-Modality Similarity(1804.10735)

April 28, 2018 cs.CV
Non-rigid inter-modality registration can facilitate accurate information fusion from different modalities, but it is challenging due to the very different image appearances across modalities. In this paper, we propose to train a non-rigid inter-modality image registration network, which can directly predict the transformation field from the input multimodal images, such as CT and MR images. In particular, the training of our inter-modality registration network is supervised by intra-modality similarity metric based on the available paired data, which is derived from a pre-aligned CT and MR dataset. Specifically, in the training stage, to register the input CT and MR images, their similarity is evaluated on the warped MR image and the MR image that is paired with the input CT. So that, the intra-modality similarity metric can be directly applied to measure whether the input CT and MR images are well registered. Moreover, we use the idea of dual-modality fashion, in which we measure the similarity on both CT modality and MR modality. In this way, the complementary anatomies in both modalities can be jointly considered to more accurately train the inter-modality registration network. In the testing stage, the trained inter-modality registration network can be directly applied to register the new multimodal images without any paired data. Experimental results have shown that, the proposed method can achieve promising accuracy and efficiency for the challenging non-rigid inter-modality registration task and also outperforms the state-of-the-art approaches.
• ### Branching Brownian Motion with spatially-homogeneous and point-catalytic branching(1803.10479)

March 28, 2018 math.PR
We consider a model of Branching Brownian Motion in which the usual spatially-homogeneous and catalytic branching at a single point are simultaneously present. We establish the almost sure growth rates of population in certain time-dependent regions and as a consequence the first-order asymptotic behaviour of the rightmost particle.
• ### Type-II Dirac photons at the metasurfaces(1803.08743)

Topological characteristics of energy bands, such as Dirac/Weyl nodes, have attracted substantial interest in condensed matter systems as well as in classical wave systems. Among these energy bands, the type-II Dirac point is a nodal degeneracy with tilted conical dispersion, leading to a peculiar crossing dispersion in the constant energy plane. Such nodal points have recently been found in electronic materials. The analogous topological feature in photonic systems remains a theoretical curiosity, with experimental realization expected to be challenging. Here, we experimentally realize the type-II Dirac point using a planar metasurface architecture, where the band degeneracy point is protected by the underlying mirror symmetry of the metasurface. Gapless edge modes are found and measured at the boundary between the different domains of the symmetry-broken metasurface. Our work shows that metasurfaces are simple and practical platforms for realizing electromagnetic type-II Dirac points, and their planar structure is a distinct advantage that facilitates applications in two-dimensional topological photonics.
• ### TextZoo, a New Benchmark for Reconsidering Text Classification(1802.03656)

March 19, 2018 cs.CL
Text representation is a fundamental concern in Natural Language Processing, especially in text classification. Recently, many neural network approaches with delicate representation model (e.g. FASTTEXT, CNN, RNN and many hybrid models with attention mechanisms) claimed that they achieved state-of-art in specific text classification datasets. However, it lacks an unified benchmark to compare these models and reveals the advantage of each sub-components for various settings. We re-implement more than 20 popular text representation models for classification in more than 10 datasets. In this paper, we reconsider the text classification task in the perspective of neural network and get serval effects with analysis of the above results.
• ### Arbitrary-Oriented Scene Text Detection via Rotation Proposals(1703.01086)

March 15, 2018 cs.CV
This paper introduces a novel rotation-based framework for arbitrary-oriented text detection in natural scene images. We present the Rotation Region Proposal Networks (RRPN), which are designed to generate inclined proposals with text orientation angle information. The angle information is then adapted for bounding box regression to make the proposals more accurately fit into the text region in terms of the orientation. The Rotation Region-of-Interest (RRoI) pooling layer is proposed to project arbitrary-oriented proposals to a feature map for a text region classifier. The whole framework is built upon a region-proposal-based architecture, which ensures the computational efficiency of the arbitrary-oriented text detection compared with previous text detection systems. We conduct experiments using the rotation-based framework on three real-world scene text detection datasets and demonstrate its superiority in terms of effectiveness and efficiency over previous approaches.
• ### Time-sensitive Customer Churn Prediction based on PU Learning(1802.09788)

Feb. 27, 2018 cs.LG
With the fast development of Internet companies throughout the world, customer churn has become a serious concern. To better help the companies retain their customers, it is important to build a customer churn prediction model to identify the customers who are most likely to churn ahead of time. In this paper, we propose a Time-sensitive Customer Churn Prediction (TCCP) framework based on Positive and Unlabeled (PU) learning technique. Specifically, we obtain the recent data by shortening the observation period, and start to train model as long as enough positive samples are collected, ignoring the absence of the negative examples. We conduct thoroughly experiments on real industry data from Alipay.com. The experimental results demonstrate that TCCP outperforms the rule-based models and the traditional supervised learning models.
• ### Permissive Barrier Certificates for Safe Stabilization Using Sum-of-squares(1802.08917)

Feb. 24, 2018 math.OC
Motivated by the need to simultaneously guarantee safety and stability of safety-critical dynamical systems, we construct permissive barrier certificates in this paper that explicitly maximize the region where the system can be stabilized without violating safety constraints. An optimization strategy is developed to search for the maximum volume barrier certified region of safe stabilization. The barrier certified region, which is allowed to take any arbitrary shape, is proved to be strictly larger than safe regions generated with Lyapunov sublevel set based methods. The proposed approach effectively unites a Lyapunov function with multiple barrier functions that might not be compatible with each other. Iterative search algorithms are developed using sum-of-squares to compute the most permissive, that is, the maximum volume, barrier certificates. Simulation results of the iterative search algorithm demonstrate the effectiveness of the proposed method.
• ### Accuracy of the Muskingum-Cunge method for constant-parameter diffusion-wave channel routing with lateral inflow(1802.04429)

Channel routing is important in flood forecasting and watershed modeling. The general constant-parameter Muskingum-Cunge (CPMC) method is second-order accurate and easy to implement. With specific discretizations such that the temporal and spatial intervals maintain a unique relationship, the CPMC method can be third-order accurate. In this paper, we derive the average lateral inflow term in the second- and third-order accuracy CPMC method, and demonstrate that For spatially and temporally variable lateral inflow, the effect of lateral inflow on simulated discharge varies with spatial and temporal discretizations, the value and spatial and temporal variations of lateral inflow, wave celerity, and diffusion coefficient. Comparison of the CPMC solution with the analytical solution shows that both the second- and third-order accuracy schemes are more accurate than the simplified method by which spatial derivatives of lateral inflow are ignored. For small time steps, the third-order accuracy CPMC method results in higher accuracy than the second-order scheme even when the third-order accuracy criterion is not fully met. For large time steps, the temporal and spatial discretization of the third- and second-order scheme becomes the same, but the third-order scheme yields higher accuracy than the second-order scheme because of the third-order accurate estimation of the lateral inflow term.
• ### Analysis and computation of some tumor growth models with nutrient: from cell density models to free boundary dynamics(1802.00655)

Feb. 2, 2018 math.AP, math.NA
In this paper, we study the tumor growth equation along with various models for the nutrient component, including the \emph{in vitro} model and the \emph{in vivo} model. At the cell density level, the spatial availability of the tumor density $n$ is governed by the Darcy law via the pressure $p(n)=n^{\gamma}$. For finite $\gamma$, we prove some a priori estimates of the tumor growth model, such as boundedness of the nutrient density, and non-negativity and growth estimate of the tumor density. As $\gamma \rightarrow \infty$, the cell density models formally converge to Hele-Shaw flow models, which determine the free boundary dynamics of the tumor tissue in the incompressible limit. We derive several analytical solutions to the Hele-Shaw flow models, which serve as benchmark solutions to the geometric motion of tumor front propagation. Finally, we apply a conservative and positivity preserving numerical scheme to the cell density models, with numerical results verifying the link between cell density models and the free boundary dynamical models.

Jan. 29, 2018 cs.LG, cs.RO, cs.SY
This paper presents a safety-aware learning framework that employs an adaptive model learning method together with barrier certificates for systems with possibly nonstationary agent dynamics. To extract the dynamic structure of the model, we use a sparse optimization technique, and the resulting model will be used in combination with control barrier certificates which constrain feedback controllers only when safety is about to be violated. Under some mild assumptions, solutions to the constrained feedback-controller optimization are guaranteed to be globally optimal, and the monotonic improvement of a feedback controller is thus ensured. In addition, we reformulate the (action-)value function approximation to make any kernel-based nonlinear function estimation method applicable. We then employ a state-of-the-art kernel adaptive filtering technique for the (action-)value function approximation. The resulting framework is verified experimentally on a brushbot, whose dynamics is unknown and highly complex.
• ### Learning Hierarchical Features for Visual Object Tracking with Recursive Neural Networks(1801.02021)

Jan. 6, 2018 cs.CV
Recently, deep learning has achieved very promising results in visual object tracking. Deep neural networks in existing tracking methods require a lot of training data to learn a large number of parameters. However, training data is not sufficient for visual object tracking as annotations of a target object are only available in the first frame of a test sequence. In this paper, we propose to learn hierarchical features for visual object tracking by using tree structure based Recursive Neural Networks (RNN), which have fewer parameters than other deep neural networks, e.g. Convolutional Neural Networks (CNN). First, we learn RNN parameters to discriminate between the target object and background in the first frame of a test sequence. Tree structure over local patches of an exemplar region is randomly generated by using a bottom-up greedy search strategy. Given the learned RNN parameters, we create two dictionaries regarding target regions and corresponding local patches based on the learned hierarchical features from both top and leaf nodes of multiple random trees. In each of the subsequent frames, we conduct sparse dictionary coding on all candidates to select the best candidate as the new target location. In addition, we online update two dictionaries to handle appearance changes of target objects. Experimental results demonstrate that our feature learning algorithm can significantly improve tracking performance on benchmark datasets.
• ### Recent Advances in Convolutional Neural Networks(1512.07108)

Oct. 19, 2017 cs.NE, cs.CV, cs.LG
In the last few years, deep learning has led to very good performance on a variety of problems, such as visual recognition, speech recognition and natural language processing. Among different types of deep neural networks, convolutional neural networks have been most extensively studied. Leveraging on the rapid growth in the amount of the annotated data and the great improvements in the strengths of graphics processor units, the research on convolutional neural networks has been emerged swiftly and achieved state-of-the-art results on various tasks. In this paper, we provide a broad survey of the recent advances in convolutional neural networks. We detailize the improvements of CNN on different aspects, including layer design, activation function, loss function, regularization, optimization and fast computation. Besides, we also introduce various applications of convolutional neural networks in computer vision, speech and natural language processing.
• ### Safe Learning of Quadrotor Dynamics Using Barrier Certificates(1710.05472)

Oct. 16, 2017 cs.LG, cs.SY
To effectively control complex dynamical systems, accurate nonlinear models are typically needed. However, these models are not always known. In this paper, we present a data-driven approach based on Gaussian processes that learns models of quadrotors operating in partially unknown environments. What makes this challenging is that if the learning process is not carefully controlled, the system will go unstable, i.e., the quadcopter will crash. To this end, barrier certificates are employed for safe learning. The barrier certificates establish a non-conservative forward invariant safe region, in which high probability safety guarantees are provided based on the statistics of the Gaussian Process. A learning controller is designed to efficiently explore those uncertain states and expand the barrier certified safe region based on an adaptive sampling scheme. In addition, a recursive Gaussian Process prediction method is developed to learn the complex quadrotor dynamics in real-time. Simulation results are provided to demonstrate the effectiveness of the proposed approach.
• ### Stability of Stationary Inverse Transport Equation in Diffusion Scaling(1703.00097)

Oct. 6, 2017 math.NA
We consider the inverse problem of reconstructing the optical parameters for stationary radiative transfer equation (RTE) from velocity-averaged measurement. The RTE often contains multiple scales characterized by the magnitude of a dimensionless parameter---the Knudsen number ($K_n$). In the diffusive scaling ($K_n \ll 1$), the stationary RTE is well approximated by an elliptic equation in the forward setting. However, the inverse problem for the elliptic equation is acknowledged to be severely ill-posed as compared to the well-posedness of inverse transport equation, which raises the question of how uniqueness being lost as $K_n \rightarrow 0$. We tackle this problem by examining the stability of inverse problem with varying $K_n$. We show that, the discrepancy in two measurements is amplified in the reconstructed parameters at the order of $K_n^p~ (p = 1\text{ or} ~2)$, and as a result lead to ill-posedness in the zero limit of $K_n$. Our results apply to both continuous and discrete settings. Some numerical tests are performed in the end to validate these theoretical findings.
• ### An accurate front capturing scheme for tumor growth models with a free boundary limit(1708.08395)

Aug. 28, 2017 math.AP, math.NA
We consider a class of tumor growth models under the combined effects of density-dependent pressure and cell multiplication, with a free boundary model as its singular limit when the pressure-density relationship becomes highly nonlinear. In particular, the constitutive law connecting pressure $p$ and density $\rho$ is $p(\rho)=\frac{m}{m-1} \rho^{m-1}$, and when $m \gg 1$, the cell density $\rho$ may evolve its support due to a pressure-driven geometric motion with sharp interface along the boundary of its support. The nonlinearity and degeneracy in the diffusion bring great challenges in numerical simulations, let alone the capturing of the singular free boundary limit. Prior to the present paper, there is lack of standard mechanism to numerically capture the front propagation speed as $m\gg 1$. In this paper, we develope a numerical scheme based on a novel prediction-correction reformulation that can accurately approximate the front propagation even when the nonlinearity is extremely strong. We show that the semi-discrete scheme naturally connects to the free boundary limit equation as $m \rightarrow \infty$, and with proper spacial discretization, the fully discrete scheme has improved stability, preserves positivity, and implements without nonlinear solvers. Finally, extensive numerical examples in both one and two dimensions are provided to verify the claimed properties and showcase good performance in various applications.
• ### Realization of Flat Band with Possible Nontrivial Topology in Electronic Kagome Lattice(1708.04448)

Aug. 15, 2017 cond-mat.mtrl-sci
The energy dispersion of fermions or bosons vanishes in momentum space if destructive quantum interference occurs in a frustrated Kagome lattice with only nearest-neighbour (NN) hopping. A discrete flat band (FB) without any dispersion is consequently formed, promising emergence of fractional quantum Hall states (FQHS) at high temperatures. Here, we report experimental realization of a FB with possible nontrivial topology in an electronic Kagome lattice on a twisted multilayer silicene. The electrons are localized in the Kagome lattice due to quantum destructive interference, and thus, their kinetic energy is quenched, which gives rise to a FB peak in density of states. A robust and pronounced one-dimensional edge state has been revealed at Kagome edge, which resides at higher energy than the FB. Our observations of the FB and the exotic edge state in electronic Kagome lattice open up the possibility towards the realization of fractional Chern insulators in two-dimensional materials.
• ### Stability of inverse transport equation in diffusion scaling and Fokker-Planck limit(1708.03063)

Aug. 10, 2017 math.NA
We consider the inverse problem of reconstructing the scattering and absorption coefficients using boundary measurements for a time dependent radiative transfer equation (RTE). As the measurement is mostly polluted by errors, both experimental and computational, an important question is to quantify how the error is amplified in the process of reconstruction. In the forward setting, the solution to the RTE behaves differently in different regimes, and the stability of the inverse problem vary accordingly. In particular, we consider two scalings in this paper. The first one concerns with a diffusive scaling whose macroscopic limit is a diffusion equation. In this case, we showed, following the similar approach as in [Chen, Li and Wang, arXiv:1703.00097], that the stability degrades when the limit is taken. The second one considers a highly forward peaked scattering, wherein the scattering operator is approximated by a Fokker-Planck operator as a limit. In this case, we showed that a fully recover of the scattering coefficient is less possible in the limit, whereas obtaining a rescaled version of the scattering coefficient becomes more practice friendly.
• ### A new numerical approach to inverse transport equation with error analysis(1708.01984)

Aug. 7, 2017 math.NA
The inverse radiative transfer problem finds broad applications in medical imaging, atmospheric science, astronomy, and many other areas. This problem intends to recover the optical properties, denoted as absorption and scattering coefficient of the media, through the source-measurement pairs. A typical computational approach is to form the inverse problem as a PDE-constraint optimization, with the minimizer being the to-be-recovered coefficients. The method is tested to be efficient in practice, but lacks analytical justification: there is no guarantee of the existence or uniqueness of the minimizer, and the error is hard to quantify. In this paper, we provide a different algorithm by levering the ideas from singular decomposition analysis. Our approach is to decompose the measurements into three components, two out of which encode the information of the two coefficients respectively. We then split the optimization problem into two subproblems and use those two components to recover the absorption and scattering coefficients separately. In this regard, we prove the well-posedness of the new optimization, and the error could be quantified with better precision. In the end, we incorporate the diffusive scaling and show that the error is harder to control in the diffusive limit.
• ### Counting statistics of chaotic resonances at optical frequencies: theory and experiments(1612.02272)

A deformed dielectric microcavity is used as an experimental platform for the analysis of the statistics of chaotic resonances, in the perspective of testing fractal Weyl laws at optical frequencies. In order to surmount the difficulties that arise from reading strongly overlapping spectra, we exploit the mixed nature of the phase space at hand, and only count the high-Q whispering-gallery modes (WGMs) directly. That enables us to draw statistical information on the more lossy chaotic resonances, coupled to the high-Q regular modes via dynamical tunneling. Three different models [classical, Random-Matrix-Theory (RMT) based, semiclassical] to interpret the experimental data are discussed. On the basis of least-squares analysis, theoretical estimates of Ehrenfest time, and independent measurements, we find that a semiclassically modified RMT-based expression best describes the experiment in all its realizations, particularly when the resonator is coupled to visible light, while RMT alone still works quite well in the infrared. In this work we reexamine and substantially extend the results of a short paper published earlier [L. Wang, D. Lippolis, Z.-Y. Li, X.-F. Jiang, Q. Gong, and Y.-F. Xiao, Phys. Rev. E 93, 040201(R) (2016)].
• ### Theoretical and computational aspects of entanglement(1705.07160)

May 19, 2017 quant-ph
We show that the two notions of entanglement: the maximum of the geometric measure of entanglement and the maximum of the nuclear norm is attained for the same states. We affirm the conjecture of Higuchi-Sudberry on the maximum entangled state of four qubits. We introduce the notion of d-density tensor for mixed d-partite states. We show that d-density tensor is separable if and only if its nuclear norm is $1$. We suggest an alternating method for computing the nuclear norm of tensors. We apply the above results to symmetric tensors. We give many numerical examples.
• ### Uniform regularity for linear kinetic equations with random input based on hypocoercivity(1612.01219)

April 10, 2017 math.NA
In this paper we study the effect of randomness in kinetic equations that preserve mass. Our focus is in proving the analyticity of the solution with respect to the randomness, which naturally leads to the convergence of numerical methods. The analysis is carried out in a general setting, with the regularity result not depending on the specific form of the collision term, the probability distribution of the random variables, or the regime the system is in, and thereby termed "uniform". Applications include the linear Boltzmann equation, BGK model, Carlemann model, among many others; and the results hold true in kinetic, parabolic and high field regimes. The proof relies on the explicit expression of the high order derivatives of the solution in the random space, and the convergence in time is mainly based on hypocoercivity, which, despite the popularity in PDE analysis of kinetic theory, has rarely been used for numerical algorithms.
• ### Evolving Boxes for Fast Vehicle Detection(1702.00254)

March 29, 2017 cs.CV
We perform fast vehicle detection from traffic surveillance cameras. A novel deep learning framework, namely Evolving Boxes, is developed that proposes and refines the object boxes under different feature representations. Specifically, our framework is embedded with a light-weight proposal network to generate initial anchor boxes as well as to early discard unlikely regions; a fine-turning network produces detailed features for these candidate boxes. We show intriguingly that by applying different feature fusion techniques, the initial boxes can be refined for both localization and recognition. We evaluate our network on the recent DETRAC benchmark and obtain a significant improvement over the state-of-the-art Faster RCNN by 9.5% mAP. Further, our network achieves 9-13 FPS detection speed on a moderate commercial GPU.