Dynamic Function Learning Through Control Of Ensemble Systems,
2023
Washington University in St. Louis
Dynamic Function Learning Through Control Of Ensemble Systems, Wei Zhang, Vignesh Narayanan, Jr-Shin Li
Publications
Learning tasks involving function approximation are preva- lent in numerous domains of science and engineering. The underlying idea is to design a learning algorithm that gener- ates a sequence of functions converging to the desired target function with arbitrary accuracy by using the available data samples. In this paper, we present a novel interpretation of iterative function learning through the lens of ensemble dy- namical systems, with an emphasis on establishing the equiv- alence between convergence of function learning algorithms and asymptotic behavior of ensemble systems. In particular, given a set of observation data in a function learning task, we …
Hydrogen Bonding In Small Model Peptides; The Dft And Mp2 Study,
2022
Kennesaw State University
Hydrogen Bonding In Small Model Peptides; The Dft And Mp2 Study, Gracie Smith, Martina Kaledin
Symposium of Student Scholars
Formamide is a small model compound for the study of the peptide bond. The peptide bond links amino acids together, specifies rigidity to the protein backbone, and includes the essential docking sites for hydrogen-bond-mediated protein folding and protein aggregation, namely, the C=O acceptor and the N-H donor parts. Therefore, the infrared C=O (amide-I) and N-H (amide-A) vibrations provide sensitive and widely used probes into the structure of peptides. This computational chemistry work, we study hydrogen bonds in formamide dimer isomers. We evaluate the accuracy of the density functional theory (DFT) and many-body perturbation theory to the 2nd order (MP2) …
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing,
2022
University of South Alabama
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Theses and Dissertations
Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …
Denoising And Deconvolving Sperm Whale Data In The Northern Gulf Of Mexico Using Fourier And Wavelet Techniques,
2022
University of New Orleans, New Orleans
Denoising And Deconvolving Sperm Whale Data In The Northern Gulf Of Mexico Using Fourier And Wavelet Techniques, Kendal Mccain Leftwich
University of New Orleans Theses and Dissertations
The use of underwater acoustics can be an important component in obtaining information from the oceans of the world. It is desirable (but difficult) to compile an acoustic catalog of sounds emitted by various underwater objects to complement optical catalogs. For example, the current visual catalog for whale tail flukes of large marine mammals (whales) can identify even individual whales from their individual fluke characteristics. However, since sperm whales, Physeter microcephalus, do not fluke up when they dive, they cannot be identified in this manner. A corresponding acoustic catalog for sperm whale clicks could be compiled to identify individual …
An Efficient Annealing-Assisted Differential Evolution For Multi-Parameter Adaptive Latent Factor Analysis,
2022
Chongqing University of Post and Telecommunications
An Efficient Annealing-Assisted Differential Evolution For Multi-Parameter Adaptive Latent Factor Analysis, Qing Li, Guansong Pang, Mingsheng Shang
Research Collection School Of Computing and Information Systems
A high-dimensional and incomplete (HDI) matrix is a typical representation of big data. However, advanced HDI data analysis models tend to have many extra parameters. Manual tuning of these parameters, generally adopting the empirical knowledge, unavoidably leads to additional overhead. Although variable adaptive mechanisms have been proposed, they cannot balance the exploration and exploitation with early convergence. Moreover, learning such multi-parameters brings high computational time, thereby suffering gross accuracy especially when solving a bilinear problem like conducting the commonly used latent factor analysis (LFA) on an HDI matrix. Herein, an efficient annealing-assisted differential evolution for multi-parameter adaptive latent factor analysis …
Evaluation Of Distributed Programming Models And Extensions To Task-Based Runtime Systems,
2022
University of Tennessee, Knoxville
Evaluation Of Distributed Programming Models And Extensions To Task-Based Runtime Systems, Yu Pei
Doctoral Dissertations
High Performance Computing (HPC) has always been a key foundation for scientific simulation and discovery. And more recently, deep learning models' training have further accelerated the demand of computational power and lower precision arithmetic. In this era following the end of Dennard's Scaling and when Moore's Law seemingly still holds true to a lesser extent, it is not a coincidence that HPC systems are equipped with multi-cores CPUs and a variety of hardware accelerators that are all massively parallel. Coupling this with interconnect networks' speed improvements lagging behind those of computational power increases, the current state of HPC systems is …
Three Contributions To The Theory And Practice Of Optimizing Compilers,
2022
The University of Western Ontario
Three Contributions To The Theory And Practice Of Optimizing Compilers, Linxiao Wang
Electronic Thesis and Dissertation Repository
The theory and practice of optimizing compilers gather techniques that, from input computer programs, aim at generating code making the best use of modern computer hardware. On the theory side, this thesis contributes new results and algorithms in polyhedral geometry. On the practical side, this thesis contributes techniques for the tuning of parameters of programs targeting GPUs. We detailed these two fronts of our work below.
Consider a convex polyhedral set P given by a system of linear inequalities A*x <= b, where A is an integer matrix and b is an integer vector. We are interested in the integer hull PI of P which is the smallest convex polyhedral set that contains all the integer points in P. In Chapter …=>
Physics-Informed Neural Networks For Informed Vaccine Distribution In Heterogeneously Mixed Populations,
2022
George Mason University
Physics-Informed Neural Networks For Informed Vaccine Distribution In Heterogeneously Mixed Populations, Alvan Arulandu, Padmanabhan Seshaiyer
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Meta-Complementing The Semantics Of Short Texts In Neural Topic Models,
2022
Singapore Management University
Meta-Complementing The Semantics Of Short Texts In Neural Topic Models, Ce Zhang, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
Topic models infer latent topic distributions based on observed word co-occurrences in a text corpus. While typically a corpus contains documents of variable lengths, most previous topic models treat documents of different lengths uniformly, assuming that each document is sufficiently informative. However, shorter documents may have only a few word co-occurrences, resulting in inferior topic quality. Some other previous works assume that all documents are short, and leverage external auxiliary data, e.g., pretrained word embeddings and document connectivity. Orthogonal to existing works, we remedy this problem within the corpus itself by proposing a Meta-Complement Topic Model, which improves topic quality …
Morphologically-Aware Vocabulary Reduction Of Word Embeddings,
2022
Singapore Management University
Morphologically-Aware Vocabulary Reduction Of Word Embeddings, Chong Cher Chia, Maksim Tkachenko, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
We propose SubText, a compression mechanism via vocabulary reduction. The crux is to judiciously select a subset of word embeddings which support the reconstruction of the remaining word embeddings based on their form alone. The proposed algorithm considers the preservation of the original embeddings, as well as a word’s relationship to other words that are morphologically or semantically similar. Comprehensive evaluation of the compressed vocabulary reveals SubText’s efficacy on diverse tasks over traditional vocabulary reduction techniques, as validated on English, as well as a collection of inflected languages.
Hyperspectral Unmixing: A Theoretical Aspect And Applications To Crism Data Processing,
2022
University of Massachusetts Amherst
Hyperspectral Unmixing: A Theoretical Aspect And Applications To Crism Data Processing, Yuki Itoh
Doctoral Dissertations
Hyperspectral imaging has been deployed in earth and planetary remote sensing, and has contributed the development of new methods for monitoring the earth environment and new discoveries in planetary science. It has given scientists and engineers a new way to observe the surface of earth and planetary bodies by measuring the spectroscopic spectrum at a pixel scale.
Hyperspectal images require complex processing before practical use. One of the important goals of hyperspectral imaging is to obtain the images of reflectance spectrum. A raw image obtained by hyperspectral remote sensing usually undergoes conversion to a physical quantity representing the intensity of …
Towards Qos-Based Embedded Machine Learning,
2022
Chapman University
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Engineering Faculty Articles and Research
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …
Dynamic Return Relationships In The Market For Cryptocurrency: A Var Approach,
2022
James Madison University
Dynamic Return Relationships In The Market For Cryptocurrency: A Var Approach, Julian Gouffray
James Madison Undergraduate Research Journal (JMURJ)
This paper examines how the Bitcoin-altcoin return relationship has evolved in periods between 2015 and 2020. To understand this relation, we observe data on the cryptocurrency Bitcoin and prominent altcoins Ethereum, Litecoin, Ripple, Stellar, and Monero, which collectively represent over 90% of the market throughout the observed period. We employ a vector autoregressive model (VAR) to produce forecast error variance decompositions, orthogonal impulse response functions, and Granger-causality tests. We find evidence that Bitcoin return variation has increasingly explained altcoin returns and that market inefficiency increased between 2017 and 2020, as shown by increased Granger causality between Bitcoin and altcoins. These …
Application Of Probabilistic Ranking Systems On Women’S Junior Division Beach Volleyball,
2022
Southern Methodist University
Application Of Probabilistic Ranking Systems On Women’S Junior Division Beach Volleyball, Cameron Stewart, Michael Mazel, Bivin Sadler
SMU Data Science Review
Women’s beach volleyball is one of the fastest growing collegiate sports today. The increase in popularity has come with an increase in valuable scholarship opportunities across the country. With thousands of athletes to sort through, college scouts depend on websites that aggregate tournament results and rank players nationally. This project partnered with the company Volleyball Life, who is the current market leader in the ranking space of junior beach volleyball players. Utilizing the tournament information provided by Volleyball Life, this study explored replacements to the current ranking systems, which are designed to aggregate player points from recent tournament placements. Three …
A Kuramoto Model Approach To Predicting Chaotic Systems With Echo State Networks,
2022
Western University
A Kuramoto Model Approach To Predicting Chaotic Systems With Echo State Networks, Sophie Wu, Jackson Howe
Undergraduate Student Research Internships Conference
An Echo State Network (ESN) with an activation function based on the Kuramoto model (Kuramoto ESN) is implemented, which can successfully predict the logistic map for a non-trivial number of time steps. The reservoir in the prediction stage exhibits binary dynamics when a good prediction is made, but the oscillators in the reservoir display a larger variability in states as the ESN’s prediction becomes worse. Analytical approaches to quantify how the Kuramoto ESN’s dynamics relate to its prediction are explored, as well as how the dynamics of the Kuramoto ESN relate to another widely studied physical model, the Ising model.
Gpgpu Microbenchmarking For Irregular Application Optimization,
2022
Mississippi State University
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Theses and Dissertations
Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …
The Design And Implementation Of A High-Performance Polynomial System Solver,
2022
The University of Western Ontario
The Design And Implementation Of A High-Performance Polynomial System Solver, Alexander Brandt
Electronic Thesis and Dissertation Repository
This thesis examines the algorithmic and practical challenges of solving systems of polynomial equations. We discuss the design and implementation of triangular decomposition to solve polynomials systems exactly by means of symbolic computation.
Incremental triangular decomposition solves one equation from the input list of polynomials at a time. Each step may produce several different components (points, curves, surfaces, etc.) of the solution set. Independent components imply that the solving process may proceed on each component concurrently. This so-called component-level parallelism is a theoretical and practical challenge characterized by irregular parallelism. Parallelism is not an algorithmic property but rather a geometrical …
Direct Calculation Of Configurational Entropy: Pair Correlation Functions And Disorder,
2022
University of Tennessee, Knoxville
Direct Calculation Of Configurational Entropy: Pair Correlation Functions And Disorder, Clifton C. Sluss
Doctoral Dissertations
Techniques such as classical molecular dynamics [MD] simulation provide ready access to the thermodynamic data of model material systems. However, the calculation of the Helmholtz and Gibbs free energies remains a difficult task due to the tedious nature of extracting accurate values of the excess entropy from MD simulation data. Thermodynamic integration, a common technique for the calculation of entropy requires numerous simulations across a range of temperatures. Alternative approaches to the direct calculation of entropy based on functionals of pair correlation functions [PCF] have been developed over the years. This work builds upon the functional approach tradition by extending …
P-Meta: Towards On-Device Deep Model Adaptation,
2022
Singapore Management University
P-Meta: Towards On-Device Deep Model Adaptation, Zhongnan Qu, Zimu Zhou, Yongxin Tong, Lothar Thiele
Research Collection School Of Computing and Information Systems
Data collected by IoT devices are often private and have a large diversity across users. Therefore, learning requires pre-training a model with available representative data samples, deploying the pre-trained model on IoT devices, and adapting the deployed model on the device with local data. Such an on-device adaption for deep learning empowered applications demands data and memory efficiency. However, existing gradient-based meta learning schemes fail to support memory-efficient adaptation. To this end, we propose p-Meta, a new meta learning method that enforces structure-wise partial parameter updates while ensuring fast generalization to unseen tasks. Evaluations on few-shot image classification and reinforcement …
Extract Human Mobility Patterns Powered By City Semantic Diagram,
2022
Fudan University
Extract Human Mobility Patterns Powered By City Semantic Diagram, Zhangqing Shan, Weiwei Shan, Baihua Zheng
Research Collection School Of Computing and Information Systems
With widespread deployment of GPS devices, massive spatiotemporal trajectories became more accessible. This booming trend paved the solid data ground for researchers to discover the regularities or patterns of human mobility. However, there are still three challenges in semantic pattern extraction including semantic absence, semantic bias and semantic complexity. In this paper, we invent and apply a novel data structure namely City Semantic Diagram to overcome above three challenges. First, our approach resolves semantic absence by exactly identifying semantic behaviours from raw trajectories. Second, the delicate design of semantic purification helps us to detect semantic complexity from human mobility. Third, …