Bounds on complexity of matrix multiplication away from CW tensors

We present three families of minimal border rank tensors: they come from highest weight vectors, smoothable algebras, or monomial algesbras . We analyseethem using Strassen’s laser method and obtain an upper bound $2.431$ on$\omega$. We also explain how in certain monomial cases using the laser methoddirectly is less profitable than first degenerating .…

Detecting Phishing Sites An Overview

Phishing is one of the most severe cyber-attacks where researchers are trying to find a solution . In phishing, attackers lure end-users and steal their personal in-formation . There are various phishing attacks like spearphishing, whaling, vishing, smishing, pharming and so on .…

ESCORT Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

ESCORT leverages a multi-output NNarchitecture that consists of two parts: (i) A common feature extractor that learns the semantics of the input contract; (ii) Multiple branch structures where each branch learns a specific vulnerability type based on features . ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract .…

Epidemic Spreading and Digital Contact Tracing Effects of Heterogeneous Mixing and Quarantine Failures

Contact tracing via digital tracking applications installed on mobile phones is an important tool for controlling epidemic spreading . Our results are based on a combination of explicitsimulations and mean-field analysis . They indicate that there can be majordifferences in the epidemic size and epidemic probabilities which are equivalent in the normal SIR processes.…

Privacy preserving Identity Broadcast for Contact Tracing Applications

Wireless contact tracing has emerged as an important tool for managing theCOVID-19 pandemic and relies on continuous broadcasting of a person’s presence using Bluetooth Low Energy beacons . The limitation of current contact tracingsystems is in that a reception of a single beacon is sufficient to reveal the user’s identity, potentially exposing users to malicious trackers installed along theroads, passageways, and other infrastructure .…

Non intrusive reduced order modeling of parametric electromagnetic scattering problems through Gaussian process regression

This paper is concerned with the design of a non-intrusive model orderreduction (MOR) for the system of parametric time-domain Maxwell equations . Atime- and parameter-independent reduced basis (RB) is constructed by using atwo-step proper orthogonal decomposition (POD) technique from a collection offull-order electromagnetic field solutions, which are generated via adiscontinuous Galerkin time- domain (DGTD) solver .…

A geometric characterization of unstable blow up solutions with computer assisted proof

Blow-up solutions of autonomous ordinary differentialequations (ODEs) which are unstable under perturbations of initial conditions are studied . They are obtained as trajectories on stable manifolds of hyperbolic (saddle) equilibria atinfinity . In this process, important features are obtained: smooth dependenceof blow-up times on initial points near blow-ups, level set distribution ofblow-upsolutions, singular behavior of blow- upsolutions, organization of the phase space via separatrices (stable manifolds) In particular, we show that unstable blow up solutions themselves canseparate initial conditions into two regions where solution trajectories are globally bounded or blow up, no matter how large initial points are…

A parallel implementation of a diagonalization based parallel in time integrator

We present an open-source space-and doubly-time-parallel implementation and evaluate its performance for twodifferent test problems . We use a collocationmethod of arbitrary order to add another level of parallelization in time . We derive an adaptive strategy to select a new $alpha$-circulantpreconditioner for each iteration during runtime for balancing convergencerates, round-off errors and inexactness in the individual time-steps .…

Evolving Learning Rate Optimizers for Deep Neural Networks

Artificial Neural Networks (ANNs) became popular due to their successfulapplication difficult problems such as image and speech recognition . We propose a framework called AutoLR to automatically design Learning RateOptimizers . The results are competitive with the best state of the art methods, even outperforming them in some scenarios .…

Majorant series for the N body problem

This work considers {\emuniform global time-renormalization functions for the {\em gravitational}$N$-body problem . It improves on the estimates of the radii of convergence by using a completely different technique . The technique which the new estimates are built upon is known as {\em majorants .…

Can I Solve It Identifying APIs Required to Complete OSS Task

Open Source Software projects add labels to open issues to help contributors choose tasks . Current automatic approaches for creating labels are mostly limited to classifying issues as a bug/non-bug . We leverage the issues’ description and the project history to build prediction models, which resulted in precision up to82% and recall up to 97.8% .…

Female ICT participation in South Eastern Nigerian Tertiary Institutions Inhibiting Factors

The study examined the participation of female students of South EasternNigerian tertiary institutions in Information and Communication Technologies(ICTs) The study discussed the attendant gender divide in ICTs participation . Findings suggest that high cost of ICT and highlevel of male dominance, which made females think that ICT is for males were the major reasons for low female participation .…

A Review Framework for Modeling Complex Engineered System Development Processes

Developing complex engineered systems poses significant challenges forengineers, managers, designers, and businesspeople alike . Experts have expressed great interest in filling the gap in theory about how CES develop . The ComplEx System IntegratedUtilities Model (CESIUM) is a novel framework for exploring how numerous systemand development process characteristics may affect the performance of CES .…

CubeFlow Money Laundering Detection with Coupled Tensors

Money laundering (ML) is the behavior to conceal the source of money achievedby illegitimate activities . CubeFlow is a scalable, flow-based approach to spot fraud from a mass of transactions by modeling them as two coupled tensors and applying a novelmulti-attribute metric which can reveal the transfer chains accurately .…

Efficiently Answering Durability Prediction Queries

We devise ageneral method called Multi-Level Splitting Sampling (MLSS) that can handle complex queries and complex models . Our method addresses the inefficiency of standard Monte Carlo (MC) methods by applying the idea of importance splitting to let one “promising” sample path prefix generate multiple “offspring” paths .…

Is radicalization reinforced by social media censorship

Understanding how beliefs are accepted, spread, and intensified is critical for any attempt to mitigate radicalization and avoid increased political polarization . This article presents an agent-based model of a social media network that enables investigation of the effects of censorship on the amount of dissenting information to which agents become exposed and thecertainty of their radicalized views .…

An Approach for the Automation of IaaS Cloud Upgrade

An Infrastructure as a Service (IaaS) cloud provider is committed to eachtenant by a service level agreement (SLA) This may violate the SLAs towards thetenants and result in penalty . The upgrade of IaaS cloud systems inherits all the challenges of clustered systems and faces other cloud specific challenges, such as size and dynamicitydue to elasticity .…

Low order preconditioning of the Stokes equations

Low-order finite-element discretizations are well-known to provide effectivepreconditioners for linear systems that arise from higher-orderdiscretizations of the Poisson equation . In this work, we show thathigh-quality preconditioners can also be derived for the Taylor-Hooddiscretization of the Stokes equations in much the same manner .…

Non invasive multigrid for semi structured grids

Multigrid solvers for hierarchical hybrid grids (HHG) have been proposed topromote the efficient utilization of high performance computer architectures . HHG meshes are constructed by uniformly refining a relatively coarsefully unstructured mesh . This paper focuses ongeneralizing the HHG idea so that it is applicable to a broader community ofcomputational scientists .…

Hardware Acceleration of Explainable Machine Learning using Tensor Processing Units

Machine learning (ML) is successful in achieving human-level performance invarious fields . However, it lacks the ability to explain an outcome due to its black-box nature . We propose a novel framework for accelerating explainable ML using Tensor Processing Units (TPUs) The proposed framework exploits the synergy between matrix convolution and Fourier transform, and takes full advantage of TPU’s natural ability in accelerating matrix computations .…

Formal verification of Zagier s one sentence proof

We comment on two formal proofs of Fermat’s sum of two squares theorem . The first one follows Zagier’s celebrated one-sentence proof; the second relies on partition-theoretic arguments . Both formal proofs rely on a general property of involutions offinite sets, of independent interest .…

Identifying Machine Paraphrased Plagiarism

The best performing technique, Longformer, achieved an average F1 score of 80.99% (F1=99.68% for SpinBot and F1=71.64% for SpinnerChief cases) We show that the automated classificationalleviates shortcomings of widely-used text-matching systems, such as Turnitinand PlagScan . To facilitate future research, all data, code, and two webapplications showcasing our contributions are openly available .…

A matrix theoretic spectral analysis of incompressible Navier Stokes staggered DG approximation and related solvers

The incompressible Navier-Stokes equations are solved in a channel, using aDiscontinuous Galerkin method over staggered grids . The resulting linearsystems are studied both in terms of the structure and in terms the spectralfeatures of the related coefficient matrices . In fact, the resulting matricesare of block type, each block showing Toeplitz-like, band, and tensor structure at the same time .…

Federated Quantum Machine Learning

Distributed training across several quantum computers could significantlyimprove the training time . If we could share the learned model, not the data, it could potentially improve the data privacy as the training would happen where the data is located . However, to the best of our knowledge, nowork has been done in quantum machine learning (QML) in federation setting yet .…

Feature Selection for Imbalanced Data with Deep Sparse Autoencoders Ensemble

Feature Selection (FS) offers several advantages, s.a. decreasing computational costs, aiding inference and interpretability . Traditional FS techniques may become sub-optimal in the presence of imbalanced data . We propose a filtering FS algorithm ranking feature importance on the basis of theReconstruction Error of a Deep Sparse AutoEncoders Ensemble (DSAEE) We use each DSAE trained only on majority class to reconstruct both classes .…

Fairness Perceptions of Algorithmic Decision Making A Systematic Review of the Empirical Literature

Algorithmic decision-making (ADM) increasingly shapes people’s daily lives . We provide a comprehensive,systematic literature review synthesizing the existing empirical insights on the perception of algorithmic fairness . We hope our work will contribute to a society-in-the-loop framework, we say . By advocating for more interdisciplinary research, we hope to contribute to fairer and more responsible ADM.…

Tangent Space Backpropogation for 3D Transformation Groups

We address the problem of performing backpropagation for computation graphs involving 3D transformation groups . 3Dtransformation groups are widely used in 3D vision and robotics, but they donot form vector spaces and instead lie on smooth manifolds . We show that our approach is numericallymore stable, easier to implement, and beneficial to a diverse set of tasks .…

LaneAF Robust Multi Lane Detection with Affinity Fields

This study presents an approach to lane detection involving the prediction of binary segmentation masks and per-pixel affinity fields . These affinity fields,along with the binary masks, can then be used to cluster lane pixelshorizontally and vertically into corresponding lane instances in apost-processing step .…

FEniCS preCICE Coupling FEniCS to other Simulation Software

New software FEniCS-preCICE is a middle software layer, sitting inbetween the existing finite-element library FeniCS and the coupling library preCICE . The middle layer simplifies coupling (existing) applicationcodes to other simulation software . Only a few lines of additional code are necessary to prepare a code for coupling .…