• Device-to-Device Load Balancing for Cellular Networks(1710.02636)

Dec. 12, 2018 cs.NI
Small-cell architecture is widely adopted by cellular network operators to increase network capacity. By reducing the size of cells, operators can pack more (low-power) base stations in an area to better serve the growing demands, without causing extra interference. However, this approach suffers from low spectrum temporal efficiency. When a cell becomes smaller and covers fewer users, its total traffic fluctuates significantly due to insufficient traffic aggregation and exhibiting a large "peak-to-mean" ratio. As operators customarily provision spectrum for peak traffic, large traffic temporal fluctuation inevitably leads to low spectrum temporal efficiency. In this paper, we advocate device-to-device (D2D) load-balancing as a useful mechanism to address the fundamental drawback of small-cell architecture. The idea is to shift traffic from a congested cell to its adjacent under-utilized cells by leveraging inter-cell D2D communication, so that the traffic can be served without using extra spectrum, effectively improving the spectrum temporal efficiency. We provide theoretical modeling and analysis to characterize the benefit of D2D load balancing, in terms of total spectrum requirements of all individual cells. We also derive the corresponding cost, in terms of incurred D2D traffic overhead. We carry out empirical evaluations based on real-world 4G data traces to gauge the benefit and cost of D2D load balancing under practical settings. The results show that D2D load balancing can reduce the spectrum requirement by 25% as compared to the standard scenario without D2D load balancing, at the expense of negligible 0.7% D2D traffic overhead.
• On explicit order 1.5 approximations with varying coefficients: the case of super-linear diffusion coefficients(1707.05086)

Sept. 13, 2018 math.NA, math.PR
A conjecture appears in \cite{milsteinscheme}, in the form of a remark, where it is stated that it is possible to construct, in a specified way, any high order explicit numerical schemes to approximate the solutions of SDEs with superlinear coefficients. We answer this conjecture affirmatively for the case of order 1.5 approximations and show that the suggested methodology works. Moreover, we explore the case of having H\"{o}lder continuous derivatives for the diffusion coefficients.
• Online Product Quantization(1711.10775)

March 24, 2018 cs.CV
Approximate nearest neighbor (ANN) search has achieved great success in many tasks. However, existing popular methods for ANN search, such as hashing and quantization methods, are designed for static databases only. They cannot handle well the database with data distribution evolving dynamically, due to the high computational effort for retraining the model based on the new database. In this paper, we address the problem by developing an online product quantization (online PQ) model and incrementally updating the quantization codebook that accommodates to the incoming streaming data. Moreover, to further alleviate the issue of large scale computation for the online PQ update, we design two budget constraints for the model to update partial PQ codebook instead of all. We derive a loss bound which guarantees the performance of our online PQ model. Furthermore, we develop an online PQ model over a sliding window with both data insertion and deletion supported, to reflect the real-time behaviour of the data. The experiments demonstrate that our online PQ model is both time-efficient and effective for ANN search in dynamic large scale databases compared with baseline methods and the idea of partial PQ codebook update further reduces the update cost.
• IDEL: In-Database Entity Linking with Neural Embeddings(1803.04884)

March 13, 2018 cs.NE, cs.DB, cs.CL
We present a novel architecture, In-Database Entity Linking (IDEL), in which we integrate the analytics-optimized RDBMS MonetDB with neural text mining abilities. Our system design abstracts core tasks of most neural entity linking systems for MonetDB. To the best of our knowledge, this is the first defacto implemented system integrating entity-linking in a database. We leverage the ability of MonetDB to support in-database-analytics with user defined functions (UDFs) implemented in Python. These functions call machine learning libraries for neural text mining, such as TensorFlow. The system achieves zero cost for data shipping and transformation by utilizing MonetDB's ability to embed Python processes in the database kernel and exchange data in NumPy arrays. IDEL represents text and relational data in a joint vector space with neural embeddings and can compensate errors with ambiguous entity representations. For detecting matching entities, we propose a novel similarity function based on joint neural embeddings which are learned via minimizing pairwise contrastive ranking loss. This function utilizes a high dimensional index structures for fast retrieval of matching entities. Our first implementation and experiments using the WebNLG corpus show the effectiveness and the potentials of IDEL.
• Numerical Simulation of Oscillating Multiphase Heat Transfer in Parallel plates using Pseudopotential Multiple-Relaxation-Time Lattice Boltzmann Method(1803.01756)

March 5, 2018 physics.comp-ph
Multiphase flows frequently occur in many important engineering and scientific applications, but modeling of such flows is a rather challenging task due to complex interfacial dynamics between different phases, let alone if the flow is oscillating in the porous media. Using humid air as the working fluid in the thermoacoustic refrigerator is one of the research focus to improve the thermoacoustic performance, but the corresponding effect is the condensation of humid air in the thermal stack. Due to the small sized spacing of thermal stack and the need to explore the detailed condensation process in oscillating flow, a mesoscale numerical approach need to be developed. Over the decades, several types of Lattice Boltzmann (LB) models for multiphase flows have been developed under different physical pictures, for example the color-gradient model, the Shan-Chen model, the nonideal pressure tensor model and the HSD model. In the current study, a pseudopotential Multiple-Relaxation-Time (MRT) LBM simulation was utilized to simulate the incompressible oscillating flow and condensation in parallel plates. In the initial stage of condensation, the oscillating flow benefits to accumulate the saturated vapor at the exit regions, and the velocity vector of saturated vapor clearly showed the flow over the droplets. It was also concluded that if the condensate can be removed out from the parallel plates, the oscillating flow and condensation will continuously feed the cold surface to form more water droplets. The effect of wettability to the condensation was discussed, and it turned out that by increasing the wettability, the saturated water vapor was easier to condense on the cold walls, and the distance between each pair of droplets was also strongly affected by the wettability.
• Deep Complex Networks(1705.09792)

Feb. 25, 2018 cs.NE, cs.LG
At present, the vast majority of building blocks, techniques, and architectures for deep learning are based on real-valued operations and representations. However, recent work on recurrent neural networks and older fundamental theoretical analysis suggests that complex numbers could have a richer representational capacity and could also facilitate noise-robust memory retrieval mechanisms. Despite their attractive properties and potential for opening up entirely new neural architectures, complex-valued deep neural networks have been marginalized due to the absence of the building blocks required to design such models. In this work, we provide the key atomic components for complex-valued deep neural networks and apply them to convolutional feed-forward networks and convolutional LSTMs. More precisely, we rely on complex convolutions and present algorithms for complex batch-normalization, complex weight initialization strategies for complex-valued neural nets and we use them in experiments with end-to-end training schemes. We demonstrate that such complex-valued models are competitive with their real-valued counterparts. We test deep complex models on several computer vision tasks, on music transcription using the MusicNet dataset and on Speech Spectrum Prediction using the TIMIT dataset. We achieve state-of-the-art performance on these audio-related tasks.
• Ferroic Domains of Alternating Polar and Nonpolar Orders Regulate Photocurrent in Single Crystalline CH3NH3PbI3 Films Self-grown on FTO/TiO2 Substrate(1801.08305)

Jan. 26, 2018 cond-mat.mtrl-sci
Photovoltaic conversion efficiency (PCE) of halide perovskite solar cells has risen spectacularly, yet the very crystalline structure of CH3NH3PbI3 remains ambiguous after extensive researches, and its polar nature remains hotly debated. Here we present compelling evidences that CH3NH3PbI3 crystals self-grown on FTO/TiO2 substrate consist of ferroic domains with alternating polar and nonpolar orders, in contrast to previous experimental and theoretical expectations, and polar domains possess reduced photocurrent. It is found that polar and nonpolar orders of CH3NH3PbI3 can be distinguished from their distinct lateral piezoresponse, energy dissipation, first and second harmonic electromechanical couplings, and temperature variation, even though their difference in crystalline lattice is very subtle, and they possess two-way memory effect through cubic-tetragonal phase transition. These findings resolve key questions regarding polar nature of CH3NH3PbI3 and its implication on photovoltaics, reconcile contradictory data widely reported, and point a direction toward engineering ferroic domains for enhanced PCE.
• Evaluation of the Interplanetary Magnetic Field Strength Using the Cosmic-Ray Shadow of the Sun(1801.06942)

We analyze the Sun's shadow observed with the Tibet-III air shower array and find that the shadow's center deviates northward (southward) from the optical solar disc center in the "Away" ("Toward") IMF sector. By comparing with numerical simulations based on the solar magnetic field model, we find that the average IMF strength in the "Away" ("Toward") sector is $1.54 \pm 0.21_{\rm stat} \pm 0.20_{\rm syst}$ ($1.62 \pm 0.15_{\rm stat} \pm 0.22_{\rm syst}$) times larger than the model prediction. These demonstrate that the observed Sun's shadow is a useful tool for the quantitative evaluation of the average solar magnetic field.
• Massive neutron star with strangeness in a relativistic mean-field model with a high-density cut-off(1801.01984)

Jan. 6, 2018 nucl-th
The properties of strangeness neutron star are studied within relativistic mean-field (RMF) model via including a logarithmic interaction as a function of scalar meson field. This logarithmic interaction, named as the $\sigma$-cut potential, can largely reduce the attractive contributions of scalar meson field at high density without any influence on nuclear structure around normal saturation density. In this work, the TM1 parameter set is chosen as the RMF interaction, while the strengths of logarithmic interaction are constrained by the properties of finite nuclei so that we can obtain a reasonable effective nucleon-nucleon interaction. The hyperons, $\Lambda,~\Sigma$, and $\Xi$ are also considered in neutron stars within this framework, whose coupling constants with mesons are determined by the latest hyperon-nucleon and $\Lambda$-$\Lambda$ potentials extracted from the experimental data of hypernuclei. The maximum mass of neutron star can be larger than two solar mass with these hyperons. Furthermore, the nucleon mass at high density will be saturated due to this additional $\sigma$-cut potential, which is consistent with the conclusions from the microscopic calculations such as, Brueckner-Hartree-Fock theory and quark mean-field model.
• An open window to neutrino mass hierarchy at maximal Dirac CP violation(1710.05523)

Oct. 16, 2017 hep-ph
Non-zero leptonic CP phases in the neutrino sector are clear evidence for physics beyond the Standard Model and have many implications in particle physics and cosmology. Some clues to maximal Dirac CP violation $\delta_{CP}=3\pi/2$ are reviewed. An approach to connect the Dirac CP violation phase and the neutrino mass hierarchy in terms of the measurement of CP asymmetry is proposed. Under appropriate requirements for baseline distance and beam energy, the problem of neutrino mass hierarchy can be revealed at maximal Dirac CP violation. General allowed parameter spaces are investigated, within which the two unknown neutrino issues, mass hierarchy and Dirac CP violation, can be solved simultaneously. The abilities of addressing the mass hierarchy of current long baseline neutrino experiments are also discussed.
• Observation of Various and Spontaneous Magnetic Skyrmionic Bubbles at Room-Temperature in a Frustrated Kagome Magnet with Uniaxial Magnetic Anisotropy(1706.05177)

June 16, 2017 cond-mat.mtrl-sci
Various and spontaneous magnetic skyrmionic bubbles are experimentally observed for the first time, at room temperature in a frustrated kagome magnet Fe3Sn2 with unixial magnetic anisotropy. The magnetization dynamics were investigated using in-situ Lorentz transmission electron microscopy, revealing that the transformation between different magnetic bubbles and domains are via the motion of Bloch lines driven by applied external magnetic field. The results demonstrate that Fe3Sn2 facilitates a unique magnetic control of topological spin textures at room temperature, making it a promising candidate for further skyrmion-based spintronic devices.
• Deep Mutual Learning(1706.00384)

June 1, 2017 cs.CV
Model distillation is an effective and widely used technique to transfer knowledge from a teacher to a student network. The typical application is to transfer from a powerful large network or ensemble to a small network, that is better suited to low-memory or fast execution requirements. In this paper, we present a deep mutual learning (DML) strategy where, rather than one way transfer between a static pre-defined teacher and a student, an ensemble of students learn collaboratively and teach each other throughout the training process. Our experiments show that a variety of network architectures benefit from mutual learning and achieve compelling results on CIFAR-100 recognition and Market-1501 person re-identification benchmarks. Surprisingly, it is revealed that no prior powerful teacher network is necessary -- mutual learning of a collection of simple student networks works, and moreover outperforms distillation from a more powerful yet static teacher.
• Full-Duplex Bidirectional Secure Communications under Perfect and Distributionally Ambiguous Eavesdropper's CSI(1705.07337)

May 23, 2017 cs.IT, math.IT
Consider a full-duplex (FD) bidirectional secure communication system, where two communication nodes, named Alice and Bob, simultaneously transmit and receive confidential information from each other, and an eavesdropper, named Eve, overhears the transmissions. Our goal is to maximize the sum secrecy rate (SSR) of the bidirectional transmissions by optimizing the transmit covariance matrices at Alice and Bob. To tackle this SSR maximization (SSRM) problem, we develop an alternating difference-of-concave (ADC) programming approach to alternately optimize the transmit covariance matrices at Alice and Bob. We show that the ADC iteration has a semi-closed-form beamforming solution, and is guaranteed to converge to a stationary solution of the SSRM problem. Besides the SSRM design, this paper also deals with a robust SSRM transmit design under a moment-based random channel state information (CSI) model, where only some roughly estimated first and second-order statistics of Eve's CSI are available, but the exact distribution or other high-order statistics is not known. This moment-based error model is new and different from the widely used bounded-sphere error model and the Gaussian random error model. Under the consider CSI error model, the robust SSRM is formulated as an outage probability-constrained SSRM problem. By leveraging the Lagrangian duality theory and DC programming, a tractable safe solution to the robust SSRM problem is derived. The effectiveness and the robustness of the proposed designs are demonstrated through simulations.
• Fully Distributed and Asynchronized Stochastic Gradient Descent for Networked Systems(1704.03992)

April 13, 2017 cs.AI, cs.PF, cs.LG
This paper considers a general data-fitting problem over a networked system, in which many computing nodes are connected by an undirected graph. This kind of problem can find many real-world applications and has been studied extensively in the literature. However, existing solutions either need a central controller for information sharing or requires slot synchronization among different nodes, which increases the difficulty of practical implementations, especially for a very large and heterogeneous system. As a contrast, in this paper, we treat the data-fitting problem over the network as a stochastic programming problem with many constraints. By adapting the results in a recent paper, we design a fully distributed and asynchronized stochastic gradient descent (SGD) algorithm. We show that our algorithm can achieve global optimality and consensus asymptotically by only local computations and communications. Additionally, we provide a sharp lower bound for the convergence speed in the regular graph case. This result fits the intuition and provides guidance to design a good' network topology to speed up the convergence. Also, the merit of our design is validated by experiments on both synthetic and real-world datasets.
• Effects of pairing correlations on the neutron skin thickness and the symmetry energy(1704.02182)

April 10, 2017 nucl-th
We investigated effects of pairing correlations on the neutron skin thickness and the symmetry energy of finite nuclei. In this calculation we used Hartree-Fock-Bogoliubov (HFB) method with Skyrme forces and effective pairing interactions. The results have been compared with available experimental data, Hartree-Fock (HF) results as well as the predictions by droplet model (DM). Finally, our discussion was extended to study of the pairing interaction in nuclear matter. Roles of isospin T = 0 pairing in the nuclear matter were also discussed.
• Enumerating k-Vertex Connected Components in Large Graphs(1703.08668)

March 25, 2017 cs.SI, cs.DB
Cohesive subgraph detection is an important graph problem that is widely applied in many application domains, such as social community detection, network visualization, and network topology analysis. Most of existing cohesive subgraph metrics can guarantee good structural properties but may cause the free-rider effect. Here, by free-rider effect, we mean that some irrelevant subgraphs are combined as one subgraph if they only share a small number of vertices and edges. In this paper, we study k-vertex connected component (k-VCC) which can effectively eliminate the free-rider effect but less studied in the literature. A k-VCC is a connected subgraph in which the removal of any k-1 vertices will not disconnect the subgraph. In addition to eliminating the free-rider effect, k-VCC also has other advantages such as bounded diameter, high cohesiveness, bounded graph overlapping, and bounded subgraph number. We propose a polynomial time algorithm to enumerate all k-VCCs of a graph by recursively partitioning the graph into overlapped subgraphs. We find that the key to improving the algorithm is reducing the number of local connectivity testings. Therefore, we propose two effective optimization strategies, namely neighbor sweep and group sweep, to largely reduce the number of local connectivity testings. We conduct extensive performance studies using seven large real datasets to demonstrate the effectiveness of this model as well as the efficiency of our proposed algorithms.
• Recurrent Neural Networks With Limited Numerical Precision(1611.07065)

Feb. 26, 2017 cs.NE
Recurrent Neural Networks (RNNs) produce state-of-art performance on many machine learning tasks but their demand on resources in terms of memory and computational power are often high. Therefore, there is a great interest in optimizing the computations performed with these models especially when considering development of specialized low-power hardware for deep networks. One way of reducing the computational needs is to limit the numerical precision of the network weights and biases, and this will be addressed for the case of RNNs. We present results from the use of different stochastic and deterministic reduced precision training methods applied to two major RNN types, which are then tested on three datasets. The results show that the stochastic and deterministic ternarization, pow2- ternarization, and exponential quantization methods gave rise to low-precision RNNs that produce similar and even higher accuracy on certain datasets, therefore providing a path towards training more efficient implementations of RNNs in specialized hardware.
• Recurrent Neural Networks With Limited Numerical Precision(1608.06902)

Feb. 26, 2017 cs.NE
Recurrent Neural Networks (RNNs) produce state-of-art performance on many machine learning tasks but their demand on resources in terms of memory and computational power are often high. Therefore, there is a great interest in optimizing the computations performed with these models especially when considering development of specialized low-power hardware for deep networks. One way of reducing the computational needs is to limit the numerical precision of the network weights and biases. This has led to different proposed rounding methods which have been applied so far to only Convolutional Neural Networks and Fully-Connected Networks. This paper addresses the question of how to best reduce weight precision during training in the case of RNNs. We present results from the use of different stochastic and deterministic reduced precision training methods applied to three major RNN types which are then tested on several datasets. The results show that the weight binarization methods do not work with the RNNs. However, the stochastic and deterministic ternarization, and pow2-ternarization methods gave rise to low-precision RNNs that produce similar and even higher accuracy on certain datasets therefore providing a path towards training more efficient implementations of RNNs in specialized hardware.
• Influence of pairing correlations on the radius of neutron-rich nuclei(1701.04510)

Jan. 17, 2017 nucl-th
The influence of pairing correlations on the neutron root mean square (rms) radius of nuclei is investigated in the framework of self-consistent Skyrme Hartree-Fock-Bogoliubov calculations. The continuum is treated appropriately by the Green's function techniques. As an example the nucleus $^{124}$Zr is treated for a varying strength of pairing correlations. We find that, as the pairing strength increases, the neutron rms radius first shrinks, reaches a minimum and beyond this point it expands again. The shrinkage is due to the the so-called pairing anti-halo effect', i. e. due to the decreasing of the asymptotic density distribution with increasing pairing. However, in some cases, increasing pairing correlations can also lead to an expansion of the nucleus due to a growing occupation of so-called halo' orbits, i.e. weakly bound states and resonances in the continuum with low-$\ell$ values. In this case, the neutron radii are extended just by the influence of pairing correlations, since these halo' orbits cannot be occupied without pairing. The term `anti-halo effect' is not justified in such cases. For a full understanding of this complicated interplay self-consistent calculations are necessary.
• Towards End-to-End Speech Recognition with Deep Convolutional Neural Networks(1701.02720)

Jan. 10, 2017 cs.CL, cs.LG, stat.ML
Convolutional Neural Networks (CNNs) are effective models for reducing spectral variations and modeling spectral correlations in acoustic features for automatic speech recognition (ASR). Hybrid speech recognition systems incorporating CNNs with Hidden Markov Models/Gaussian Mixture Models (HMMs/GMMs) have achieved the state-of-the-art in various benchmarks. Meanwhile, Connectionist Temporal Classification (CTC) with Recurrent Neural Networks (RNNs), which is proposed for labeling unsegmented sequences, makes it feasible to train an end-to-end speech recognition system instead of hybrid settings. However, RNNs are computationally expensive and sometimes difficult to train. In this paper, inspired by the advantages of both CNNs and the CTC approach, we propose an end-to-end speech framework for sequence labeling, by combining hierarchical CNNs with CTC directly without recurrent connections. By evaluating the approach on the TIMIT phoneme recognition task, we show that the proposed model is not only computationally efficient, but also competitive with the existing baseline systems. Moreover, we argue that CNNs have the capability to model temporal correlations with appropriate context information.
• End-to-End Data Visualization by Metric Learning and Coordinate Transformation(1612.08499)

Dec. 27, 2016 cs.CV
This paper presents a deep nonlinear metric learning framework for data visualization on an image dataset. We propose the Triangular Similarity and prove its equivalence to the Cosine Similarity in measuring a data pair. Based on this novel similarity, a geometrically motivated loss function - the triangular loss - is then developed for optimizing a metric learning system comprising two identical CNNs. It is shown that this deep nonlinear system can be efficiently trained by a hybrid algorithm based on the conventional backpropagation algorithm. More interestingly, benefiting from classical manifold learning theories, the proposed system offers two different views to visualize the outputs, the second of which provides better classification results than the state-of-the-art methods in the visualizable spaces.
• Nuclear matter properties with nucleon-nucleon forces up to fifth order in the chiral expansion(1612.05433)

Dec. 16, 2016 nucl-th
The properties of nuclear matter are studied using state-of-the-art nucleon-nucleon forces up to fifth order in chiral effective field theory. The equations of state of symmetric nuclear matter and pure neutron matter are calculated in the framework of the Brueckner-Hartree-Fock theory. We discuss in detail the convergence pattern of the chiral expansion and the regulator dependence of the calculated equations of state and provide an estimation of the truncation uncertainty. For all employed values of the regulator, the fifth-order chiral two-nucleon potential is found to generate nuclear saturation properties similar to the available phenomenological high precision potentials. We also extract the symmetry energy of nuclear matter, which is shown to be quite robust with respect to the chiral order and the value of the regulator.
• Fitting MA(q) Models in the Closed Invertible Region(1611.04907)

Nov. 15, 2016 math.ST, stat.TH
The use of reparameterization in the maximization of the likelihood function of the MA(q) model is discussed. A general method for testing for the presence of a parameter estimate on the boundary of an MA(q) model is presented. This test is illustrated with a brief simulation experiment for the MA(q) for q=1,2,3,4 in which it is shown that the probability of an estimate being on the boundary increases with q.
• On Multiplicative Integration with Recurrent Neural Networks(1606.06630)

Nov. 12, 2016 cs.LG
We introduce a general and simple structural design called Multiplicative Integration (MI) to improve recurrent neural networks (RNNs). MI changes the way in which information from difference sources flows and is integrated in the computational building block of an RNN, while introducing almost no extra parameters. The new structure can be easily embedded into many popular RNN models, including LSTMs and GRUs. We empirically analyze its learning behaviour and conduct evaluations on several tasks using different RNN models. Our experimental results demonstrate that Multiplicative Integration can provide a substantial performance boost over many of the existing RNN models.
• Top-k Spatial-keyword Publish/Subscribe Over Sliding Window(1611.03204)

Nov. 10, 2016 cs.DB
With the prevalence of social media and GPS-enabled devices, a massive amount of geo-textual data has been generated in a stream fashion, leading to a variety of applications such as location-based recommendation and information dissemination. In this paper, we investigate a novel real-time top-k monitoring problem over sliding window of streaming data; that is, we continuously maintain the top-k most relevant geo-textual messages (e.g., geo-tagged tweets) for a large number of spatial-keyword subscriptions (e.g., registered users interested in local events) simultaneously. To provide the most recent information under controllable memory cost, sliding window model is employed on the streaming geo-textual data. To the best of our knowledge, this is the first work to study top-k spatial-keyword publish/subscribe over sliding window. A novel centralized system, called Skype (Topk Spatial-keyword Publish/Subscribe), is proposed in this paper. In Skype, to continuously maintain top-k results for massive subscriptions, we devise a novel indexing structure upon subscriptions such that each incoming message can be immediately delivered on its arrival. To reduce the expensive top-k re-evaluation cost triggered by message expiration, we develop a novel cost-based k-skyband technique to reduce the number of re-evaluations in a cost-effective way. Extensive experiments verify the great efficiency and effectiveness of our proposed techniques. Furthermore, to support better scalability and higher throughput, we propose a distributed version of Skype, namely, DSkype, on top of Storm, which is a popular distributed stream processing system. With the help of fine-tuned subscription/message distribution mechanisms, DSkype can achieve orders of magnitude speed-up than its centralized version.