## Generalized Short Circuit Ratio for Grid Strength Assessment in Inhomogeneous Multi infeed LCC HVDC Systems

Generalized short circuit ratio (gSCR) for gird strength assessment of multi-infeed high voltage direct current (MIDC) systems is a rigoroustheoretical extension of traditional short circuit ratios . gSCR was originally derived based on the assumption of homogeneous MIDC systems, where all HVDC converters have an identical control configuration .…

## Stability Analysis of Complementarity Systems with Neural Network Controllers

Complementarity problems are widely used in many robotics tasks, such aslocomotion and manipulation, due to their ability to model non-smooth phenomena . In this paper, we propose a method to analyze the stability of complementarity systems with neural network controllers .…

## Networked Multi Virus Spread with a Shared Resource Analysis and Mitigation Strategies

The paper studies multi-competitive continuous-time epidemic processes in the presence of a shared resource . We consider the setting where multiple viruses are simultaneously prevalent in the population, and the spread occurs due tonot only individual-to-individual interaction but also due to individual interaction .…

## Good proctor or Big Brother AI Ethics and Online Exam Supervision Technologies

Online exam supervision technologies have been thrust into the public spotlight due to campus lockdowns during the COVID-19 pandemic and the growing demand for online courses . Such technologies havealarmed some students who see them as `Big Brother-like’, yet some universities defend their judicious use .…

## Dynamic backdoor attacks against federated learning

Federated Learning (FL) is a new machine learning framework, which enablesmillions of participants to collaboratively train machine learning model without compromising data privacy and security . FL does not guarantee that all clients are honest by design, which makes it vulnerable to adversarial attack naturally .…

## New Confocal Hyperbola based Ellipse Fitting with Applications to Estimating Parameters of Mechanical Pipes from Point Clouds

The confocal hyperbola is an excellent approximation to the true geometric distance of points to ellipses . The proposed method outperformed the gold standardgeometric method of Ahn . It was observed that the proposed ellipse fitting method achieved almost identical results (and in some cases better) than the gold-standardgeometrificalic and Sampson methods .…

## Model Driven Synthesis for Programming Tutors

Wepropose to investigate how we can overcome this problem by using programsynthesis . We generate correct solutions that closely match astudent programs . We give feedback based on the results of a program . We hope to find a way to give constructive feedback to a student working on a beginner’s exercise .…

Wireless communications are often subject to fading conditions . We propose a collaborative neuralnetwork-based symbol detection mechanism for downlink fading channels called FedRec . FedRec is based on the maximum a-posteriori probability (MAP)detector . The performance of the resulting FedRec receiver is shown to approach the MAP performance in diverse channel conditions, while inducing asubstantially reduced communication overhead in its training procedure compared to training in a centralized fashion .…

## On Relaxed Filtered Krylov Subspace Method for Non Symmetric Eigenvalue Problems

Relaxed filtered Krylov subspace method for computing theeigenvalues with the largest real parts and the corresponding eigenvectors of non-symmetric matrices . We give the convergenceanalysis of the complex Chebyshev polynomial, which plays a significant role inthe polynnomine acceleration technique . In addition, numerical experiments are carried out to show the robustness of the relaxed filtered filtered Kryov subspachod and its great superiority over some state-of-the art iteration methods .…

## Learning Frame Similarity using Siamese networks for Audio to Score Alignment

Audio-to-score alignment aims at generating an accurate mapping between a performance audio and the score of a piece . Standard alignment methods are based on Dynamic Time Warping (DTW) and employ handcrafted features, which cannot be adapted to different acoustic conditions .…

## Intention Based Lane Changing and Lane Keeping Haptic Guidance Steering System

Haptic guidance in a shared steering assistance system has drawn significant attention in intelligent vehicle fields, owing to its mutual communicationability for vehicle control . By exerting continuous torque on the steeringwheel, both the driver and support system can share lateral control of the vehicle .…

## Declarative Approaches to Counterfactual Explanations for Classification

We propose answer-set programs that specify and compute counterfactualinterventions as a basis for causality-based explanations to the outcomes from classification models . They can be applied with black-box models, and also with logic programs that can be specified as logic programs, such as rule-based classifiers .…

## Quantum communication capacity transition of complex quantum networks

Quantum network is the key to enable distributed quantum information processing . As the single-link communication rate decays exponentially with the distance, to enable reliable end-to-end quantum communication, the number of nodes need to grow with the network scale . For highly connected networks, weidentify a threshold transition in the capacity as the density of network nodes increases .…

## 2CP Decentralized Protocols to Transparently Evaluate Contributivity in Blockchain Federated Learning Environments

Federated Learning harnesses data from multiple sources to build a single model . The initial model might belong solely to the actor bringing it to the network for training, but determining the ownership of the trained model remains an open question .…

## Learning of Structurally Unambiguous Probabilistic Grammars

The problem of identifying a probabilistic context free grammar has two aspects: the grammar’s topology and the weights of the grammar . We provide a query learning algorithm for structurally unambiguousprobabilisticcontext-free grammars (SUPCFG) We show that SUWCFG can be represented using co-linear multiplicity tree automata (CMTA) and provide apolynomial learning algorithm that learns CMTAs.…

## GENNI Visualising the Geometry of Equivalences for Neural Network Identifiability

We propose an efficient algorithm to visualise symmetries in neural networks . We are now able to better explore questions surrounding identifiability, with applications to optimisation and optimisation, for commonly used or newly developed neural networkarchitectures . By doing so, we are able to explore questionssurrounding the questions surroundingIdentifiability .…

## Does spontaneous motion lead to intuitive Body Machine Interfaces A fitness study of different body segments for wearable telerobotics

Human-Robot Interfaces (HRIs) represent a crucial component in teleroboticsystems . Data-driven approaches select a set of body segments and transform their motion into commands for the robot based on their spontaneous motion patterns . Despite being a versatile and genericmethod, there is no scientific evidence that implementing an interface based on spontaneous motion maximizes its effectiveness.…

## MuSCLE Multi Sweep Compression of LiDAR using Deep Entropy Models

We present a novel compression algorithm for reducing the storage of LiDARsensor data streams . Our model exploits spatio-temporal relationships across multipleLiDAR sweeps to reduce the bitrate of both geometry and intensity values . We then usethe learned probability to encode the full data stream into a compact one .…

## Quantitative towers in finite difference calculus approximating the continuum

Multivector fields and differential forms at the continuum level have commutative associative products, a third composition product between them and various operators like $d$ and $*$ which are used to describe many nonlinear problems . The point of this paper is to construct consistent direct and inverse systems of finite dimensional approximations to these structures and to calculate combinatorially how these finite dimensionalmodels differ from their continuum idealizations .…

## FDD Massive MIMO Antenna Duplex Pattern an Reciprocity A Missing Brick

Obtaining down link (DL) channel state information (CSI) at the base station is challenging for frequencydivision-duplex (FDD) massive MIMO (MM) systems . Considerable overhead is required for DL training and feedback . Instead studies often assume highly correlated average spatial signalsignatures (i.e.…

## Predictive Coding Variational Autoencoders and Biological Connections

This paper identifies connections between predictive coding, from theoreticalneuroscience, and variational autoencoders, from machine learning . These connections imply striking correspondences for biological neural circuits, suggesting that pyramidal dendrites are functionally analogous to non-lineardeep networks .…

## Recoverable Abortable and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity

We present the first recoverable mutual exclusion (RME) algorithm that issimultaneously abortable, adaptive to point contention, and with sublogarithmicRMR complexity . We obtain this algorithm byusing the Fetch-And-Add (FAA) primitive, unlike prior work on RME that uses FAS/SWAP . Our key building blocksare: A $D$-process abortable RME algorithm, for $D \leq W$ with $O(1)$ passagecomplexity and $O(1+F)$ super-passage complexity .…

## Echo CGC A Communication Efficient Byzantine tolerant Distributed Machine Learning Algorithm in Single Hop Radio Network

In Echo-CGC, if a worker “agrees” with a combination of priorgradients, it will broadcast the “echo message” instead of the its raw local gradient . The echo message contains a vector of coefficients (of size at most$n$) and the ratio of the magnitude between two gradients (a float) In the radio network, each worker is able to overhearprevious gradients that were transmitted to the parameter server .…

## Tight Bounds for Adversarially Robust Streams and Sliding Windows via Difference Estimators

We introduce difference estimators for data stream computation, which provideroximations to $F(v)-F(u)$ for frequency vectors $v\succeq u$ and a givenfunction $F$ We show how to use such estimators to carefully trade error formemory in an iterative manner . Using these, we resolve a number of central open questions in adversarial robust streaming and sliding windowmodels .…

## Software must be recognised as an important output of scholarly research

Software should, in many instances, be recognised as an output of research, equivalent to an academic paper . The article discusses the different roles that software may play in research and highlights the relationship between software and researchsustainability and reproducibility .…

## Designing Human Robot Coexistence Space

When the human-robot interactions become ubiquitous, the environments surrounding these interactions will have significant impact on the safety and comfort of the human and the effectiveness and efficiency of the robot . The key enabling technique is a motion planner that can evaluate hundreds of similar motion planning problems .…

## Communication Cost Aware Microphone Selection For Neural Speech Enhancement with Ad hoc Microphone Arrays

When performing multi-channel speech enhancement with a wireless acousticsensor network, streaming information from all sensors can be prohibitive interms of communication costs . We propose a data-driven technique to leverage these opportunities by jointly learning a speech enhancement and data-request neural network .…

## Debiasing Convolutional Neural Networks via Meta Orthogonalization

The Meta Orthogonalization method encourages CNN representations of different concepts to be orthogonal to one another inactivation space while maintaining strong downstream task performance . It significantly mitigates model bias and is competitive against current debiasing methods, authors say . The method is based on existing work on debiases word embeddings and model interpretability, they say .…

## Full Attitude Intelligent Controller Design of a Heliquad under Complete Failure of an Actuator

A neural network-based control allocation is designed to provide complete control authority even under a complete loss of one actuator . Heliquad is a multi-coptersimilar to Quadcopter, with four actuators diagonally symmetric from the center . Each actuator has two control inputs; the first input changes thepropeller blades collective pitch (also called variable pitch) and the otherinput changes the rotation speed.…

## Almost Tight L0 norm Certified Robustness of Top k Predictions against Adversarial Perturbations

Top-$k$ predictions are used in many real-world applications such as machinelearning as a service, recommender systems, and web searches . Our approach is based on randomized smoothing, which builds a provably robust classifier from an arbitrary classifier via randomizing an input .…

## Acceleration of stochastic methods on the example of decentralized SGD

In this paper, we present an algorithm for accelerating decentralizedstochastic gradient descent . decentralized stochastic optimizationmethods have attracted a lot of attention, mainly due to their low iterationcost, data locality and data exchange efficiency . They are generalizations of SGD and Local SGD .…

## Accelerating Distributed SGD for Linear Least Squares Problem

This paper considers the multi-agent distributed linear least-squaresproblem . The system comprises multiple agents, each agent with a locallyobserved set of data points, and a common server with whom the agents can interact . In the IPG algorithm, the server and the agents perform numerous iterative computations .…

## Crowdsharing Wireless Energy Services

We propose a novel self-sustained ecosystem for energy sharing in the IoTenvironment . We leverage energy harvesting, wireless power transfer, and crowd-sourcing that facilitate the development of an energy crowdsharingframework to charge IoT devices . The ubiquity of IoT devices, coupled with the potential ability for sharing energy, provides new and exciting opportunitiesto crowdsource wireless energy .…

## Uncertainty as a Form of Transparency Measuring Communicating and Using Uncertainty

The machine learning (ML) community has mostly considered explainability as a proxy for transparency . With this work, we seek to encourage researchers to study uncertainty as a form of transparency . We describe the utility of uncertainty for mitigating model unfairness, augmenting decision-making, and building trustworthy systems .…

## Conformer Kernel with Query Term Independence at TREC 2020 Deep Learning Track

We benchmark Conformer-Kernel models under the strict blind evaluationsetting of the TREC 2020 Deep Learning track . We study the impact of incorporating: (i) Explicit term matching to complement matching, (ii) query termindependence (i.e., the “QTI assumption”) to scale the model to the full evaluation setting .…

## Throughput maximization in a UAV enabled Two way Relaying System with Multi pair Users

In this letter, we propose a UAV-enabled two-way relaying system . A UAVrelay assists the information exchange of multiple pairs of ground users (GUs) The numerical results show that the proposed UAV system outperforms its counterparts with static relay . We formulate a mixed integer non-convex optimizationproblem which is hard to solve directly.…

## Well balanced algorithms for relativistic fluids on a Schwarzschild background

We design well-balanced numerical algorithms with first-, second-, and third-order of accuracy for the spherically symmetry evolution of acompressible fluid on a Schwarzschild black hole . We treat both therelativistic Burgers-Schwarzschild model and the relativisticEuler-Schwartzschild model . Our schemes follow the finite volume methodology and preserve the stationary solutions .…

## Performance Analysis and Optimization of a UAV Enabled Two Way Relaying Network under FSMH NC and PNC Schemes

Unmanned aerial vehicles (UAVs) have played an important role in wireless communications due to the advantages such as highly controllable mobility in three-dimensional (3D) space, swift deployment, line-of-sight (LoS)aerial-ground links, and so on . In this paper, we consider a UAV-enabledtwo-way relaying system where the UAV relay assists the information exchangebetween two ground users (GUs) under three different schemes, i.e.,…

## Structure Preserving Model Order Reduction by Parameter Optimization

Model order reduction (MOR) methods that are designed to preserve structuralfeatures of a given full order model (FOM) often suffer from a lower accuracy . In this paper, we present a framework for MOR based on direct parameter optimization . Structural constraints are encoded in theparametrization of the ROM .…

## Safety Synthesis Sans Specification

We define the problem of learning a transducer from a target language$U$ containing possibly conflicting transducers . We argue that this is a natural question in many situations in hardware and software verification . We devise a learning algorithm for this problem and show that its time and query complexity is polynomial with respect to the rank of the target language, its incompatibility measure, and the maximal length of a given counterexample .…

## Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exist in a discrete logarithm based public-key cryptosystem set in a group of primeorder $p$ where $p-1$ has small divisors . We present algorithms that can determine whether a key is weak, and if so, recover the private key from the corresponding public key .…

## Respiratory Distress Detection from Telephone Speech using Acoustic and Prosodic Features

Speech samples are collected from de-identified telemedicine phonecalls from a healthcare provider in Bangladesh . The recordings include conversational speechsamples of patients talking to doctors showing mild or severe respiratorydistress or asthma symptoms . We hypothesize that respiratory distress may alterspeech features such as voice quality, speaking pattern, loudness, and speech-pause duration .…

## Audio Visual Event Recognition through the lens of Adversary

This work aims to study several key questions related to multimodal learning through the lens of adversarialnoises . We construct adversarial examples to attack state-of-the-art neural models trained on Google AudioSet . We compare how much attack potency in terms of .…

## Assessing the Economic Value of Renewable Resource Complementarity for Power Systems an ENTSO E Study

Spatiotemporal complementarity between variable renewable energy sources has received a great deal of attention in recent years . However, itsvalue for power systems is still not properly understood . The analysis is conducted on a realistic case study targeting the deployment of 450 GW of offshore wind in Europe .…

## User Centered Programming Language Design A Course Based Case Study

User-centered programming languages have been proposed to improve the design of programming languages . In order to explore what benefits these methods mighthave for novice programming language designers, we taught a collection of user-centered language design methods to a group of eight students .…

## Speech enhancement guided by contextual articulatory information

Previous studies have confirmed the effectiveness of leveraging articulatoryinformation to attain improved speech enhancement (SE) performance . In this study, we propose an SE system that incorporates contextual articulatory information . Such information is obtained using broad phone class (BPC) end-to-end automatic speech recognition(ASR) Meanwhile, two training strategies are developed to train the SE systembased on the BPC-based ASR: multitask-learning and deep-feature trainingstrategies .…

## Co optimisation and Settlement of Power Gas Coupled System in Day ahead Market under Multiple Uncertainties

The interdependency of power systems and natural gas systems is beingreinforced by the emerging power-to-gas facilities (PtGs), and the existing gas-fired generators . To jointly improve the efficiency and security underdiverse uncertainties from renewable energy resources and load demands, it is essential to co-optimise these two energy systems for day-ahead marketclearance .…

## Nonlinear Cooperative Control of Double Drone Bar Transportation System

Two drones are required to lift the load together, which brings significant challenges to the control problem . A nonlinear cooperative control method is proposed, with both rigorousstability analysis and experimental results demonstrating its greatperformance . Without the need to distinguish the identities between the leaderand the follower, the proposed method successfully realizes effective controlfor the two drones separately, mainly owning to the deep analysis for the system dynamics and the elaborate design for the control law .…

## A Distributed Privacy Preserving Learning Dynamics in General Social Networks

In this paper, we study a distributed privacy-preserving learning problem ingeneral social networks . Each agent is allowed to interact with its peersthrough multi-hop communications but with its privacy preserved . We propose a four-staged distributed social learning algorithm . In a nutshell, our algorithm proceeds iteratively, and in every round, each agent randomly perturbs its adoption for privacy preservation .…

## Energy Efficient Resource Allocation in UAV Enabled Detection and Communication Systems

This paper investigates the problem of resource allocation for unmannedaerial vehicle (UAV) enabled radar and communication systems withrate-splitting multiple access (RSMA) In the considered system, UAV serves as an aerial base station to communicate with multiple users and probe signals to targets of interest .…