Conformance Checking of Mixed paradigm Process Models

Mixed-paradigm process models integrate strengths of procedural and Declare representations . They are specifically interesting for process mining because they allow capturing complex behaviour in a compact way . A key research challenge for the proliferation of process mining is the lack of corresponding conformance checking techniques .…

Studying Taxonomy Enrichment on Diachronic WordNet Versions

Ontologies, taxonomies, and thesauri are used in many NLP tasks . However, studies are focused on the creation of these lexical resources rather than maintenance of the existing ones . We explore the possibilities of taxonomy extension in aresource-poor setting and present methods which are applicable to a largenumber of languages .…

Does BERT Understand Sentiment Leveraging Comparisons Between Contextual and Non Contextual Embeddings to Improve Aspect Based Sentiment Models

When performing Polarity Detection for different words in a sentence, we need to look at the words around to understand the sentiment . We also show that if we finetune a subset ofweights the model built on comparison of BERT and generic word embedding, it can get state of the art results for Polarity detection in Aspect BasedSentiment Classification datasets.…

Development and evaluation of the use of a virtual health filter survey in a private primary education system in Baja California Mexico during the SARS CoV 2 contingency COVID 19

This work reports on the design, implementation and evaluation of a surveyused as a remote sanitary filter, which was applied in the Adventist Educational System of Baja California . Accessible and easily distributed digital resources were used in orderto meet the necessary requirements of distribution, acquisition and management of the information .…

Unsupervised Domain Adaptation of a Pretrained Cross Lingual Language Model

Recent research indicates that pretraining cross-lingual language models on large-scale unlabeled texts yields significant performance improvements overvarious cross and low-resource tasks . We propose a novel unsupervised feature decomposition method that can automatically extract domain-specific features and domain-invariant features from the entangled pretrained language representations, givenunlabeled raw texts in the source language .…

From Pixels to Legs Hierarchical Learning of Quadruped Locomotion

A quadruped robot can acquire both of these skills by means of hierarchical reinforcementlearning (HRL) We train policies towalk in two different environments: a curved cliff and a maze . We show thathierarchical policies can concurrently learn to locomote and navigate in these environments .…

Algorithmic Causal Sets and the Wolfram Model

The Wolfram model can effectively beinterpreted as providing an underlying algorithmic dynamics for causal set evolution . We show how causal invariance of the hypergraph rewriting system can be used to infer conformal involvement of the induced causal partial order, in amanner that is provably compatible with the measure-theoretic arguments ofBombelli, Henson and Sorkin .…

A difference method for solving the nonlinear q factional differential equations on time scale

The $q$-fractional differential equation usually describe the physics processimposed on the time scale set $T_q$ In this paper, we first propose adifference formula for discretizing the fractional $q$. We establish a rigours truncation error boundness and prove that thisdifference formula is unconditionally stable .…

Computing Feasible Trajectories for an Articulated Probe in Three Dimensions

An articulated probe is modeled as two line segments $ab$ and $bc$ connected at point $b$. The length of $ab$ab can be equal to or greater than $R$ while $bc$BC$is of a given length$r \leqR$The goal isto find a feasible (obstacle-avoiding) probe trajectory to reach$t .…

Fast sixth order algorithm based on the generalized Cayley transform for the Zakharov Shabat system in optical applications

Family of conservative one-stepschemes of the sixth order of accuracy for Zakharov-Shabat system is constructed . The exponential integrator is a special case . Schemes based onrational approximation allow the use of fast algorithms to solve the initialproblem for a large number of values of the spectral parameter .…

Automatic differentiation of Sylvester Lyapunov and algebraic Riccati equations

Sylvester, Lyapunov, and algebraic Riccati equations are the bread and butter of control theorists . They are used to compute infinite-horizon Gramians, solve optimal control problems in continuous or discrete time, and design observers . Here, we derive the forward and reverse-mode derivatives of the solutions to all three types of equations, and showcase their application on an inverse control problem .…

Lower Bound on the Capacity of the Continuous Space SSFM Model of Optical Fiber

Capacity of a discrete-time model of optical fiber described by thesplit-step Fourier method (SSFM) as a function of the average input power$\mathcal P$ and the number of segments in distance $K$ is considered . The capacity of the resulting continuous-space lossless model is lower bounded by $o(1)$ .…

The Dynamic of Body and Brain Co Evolution

Method permits to co-evolve the body and the controlproperties of robots . It can be used to adapt the morphological traits of robots with a hand-designed morphological bauplan . Our results indicate that robots with co-adapted body and control traits outperform robots with fixed morphologies .…

Two families of Entanglement assisted Quantum MDS Codes from cyclic Codes

With entanglement-assisted (EA) formalism, arbitrary classical linear codes are allowed to transform into EAQECCs by using pre-shared entanglements betweenthe sender and the receiver . All of $q$-ary EAQMDS codes have minimum distance upper limit much larger than known quantum MDS codes of the same length .…

MEG Multi Evidence GNN for Multimodal Semantic Forensics

Fake news often involves semantic manipulations across modalities such asimage, text, location etc and requires the development of multimodal semanticforensics for its detection . The proposed model outperforms existing state-of-the-art algorithms with an error reduction of up to 25% . Existing methods arelimited to using a single evidence (retrieved package) which ignores potential improvement from the use of multiple evidences .…

A Better and Faster End to End Model for Streaming ASR

End-to-end (E2E) models have shown to outperform state-of-the-art models for streaming speech recognition . However, the model still tends to delay the predictionstowards the end and thus has much higher partial latency compared to aconventional ASR model . We explore replacing the LSTM layers in the encoder of our E2E model withConformer layers [4], which has shown good improvements for ASR .…

On InstaHide Phase Retrieval and Sparse Matrix Factorization

InstaHide is a scheme recently proposed by [Huang, Song, Li and Arora, ICML’20] for preserving the security of private datasets in the context of distributed learning . We show that the answer to this appears to be quite subtle and closelyrelated to the average-case complexity of a new multi-task, missing-dataversion of the classic problem of phase retrieval.…

DeepClimGAN A High Resolution Climate Data Generator

Earth system models (ESMs) are often used to generate future projections of climate change scenarios . Emulators are substantially less expensive but may not have all of the complexity of anESM . Here we demonstrate the use of a conditional generative adversarialnetwork (GAN) to act as an ESM emulator .…

An Interactive Foreign Language Trainer Using Assessment and Feedback Modalities

This study is designed to help students learn from one or all of the four most commonlyused foreign languages in the field of Information Technology namely Korean,Mandarin Chinese, Japanese, and Spanish . Composed of a set of words, phrases,and sentences, the program is intended to quickly teach the students in the form of basic, intermediate, and advanced levels .…

Cost and QoS Efficient Serverless Cloud Computing

Cloud-based serverless computing systems aim to provide the illusion of infinite resources and abstract users from details of the allocation decisions . We explore two main approaches to (A) reuse part of computation needed toprocessing the services and (B) proactively pruning tasks with a low chance of success to improve the overall QoS of the system .…

Restricted Airspace Protection using Multi UAV Spatio TemporalMulti Task Allocation

This paper addresses the problem of restricted airspace protection frominvaders using the cooperative multi-UAV system . The objective is to detect and capture the invaders cooperatively by a team of homogeneous UAVs (calledevaders) before invaders enter the restricted airspace . The performance of MUST-MTA with the consensus approach is evaluated in a simulated environment .…

Arithmetic Expression Construction

When can $n$ given numbers be combined using arithmetic operators to obtain a given target number? Westudy three variations of this problem of Arithmetic Expression Construction: When the expression (1) is unconstrained; (2) has a specified pattern ofparentheses and operators (and only the numbers need to be assigned to blanks) or (3) must match a specified ordering of the numbers (but the operators and parenthesization are free) For each of these variants, and many of the subsetsof $\{+,-,\times,\div\}$ we prove the problem NP-complete .…

Algorithmic random duality theory large scale CLuP

Based on our Random Duality Theory (RDT), we developed a powerful algorithmic mechanism (called CLuP) that can be utilized to solve NP hard optimization problems in polynomial time . Here we move things further and utilize another ofremarkable RDT features that we established in a long line of work in the past .…

Mechanical Search on Shelves using Lateral Access X RAY

LAX-RAY (Lateral Access maXimal Reduction of OccupancY support Area) is a system to automate the mechanical search for occluded objects on shelves . LAx-RAY couples a perception pipelinepredicting a target object occupancy support distribution with a mechanicalsearch policy that sequentially selects occluding objects to push to the sideto reveal the target as efficiently as possible .…

An Approximation Algorithm for Covering Linear Programs and its Application to Bin Packing

We give an algorithm for solving coveringLPs, assuming the presence of a $(1/\alpha)$-approximation algorithm for acertain optimization problem . Our algorithm is based on a simple modification of the Plotkin-Shmoys-Tardos algorithm (MOR 1995) We then apply our algorithmto solve the configuration LP for a largeclass of bin-packing problems .…

Analysis of Empirical Mode Decomposition based Load and Renewable Time Series Forecasting

The empirical mode decomposition (EMD) method is prone to several issues, including modalaliasing and boundary effect problems . Underestimating these issues can lead to poor performance of the forecast model in real-time applications . Using real-world data, EMD-based models are presented, and the impact of the boundary effect is illustrated .…

Bi ISCA Bidirectional Inter Sentence Contextual Attention Mechanism for Detecting Sarcasm in User Generated Noisy Short Text

Many online comments on social media platforms are hateful, humorous, orsarcastic . The sarcastic nature of these comments (especially the short ones) alters their actual implied sentiments . This paper proposes a new state-of-the-art deep learning architecture that uses a novel Bidirectional Inter-Sentence Contextual Attention mechanism (Bi-ISCA) to capture inter-sentence dependencies for detecting sarcasm in the user-generated short text using only theconversational context .…

Modeling Functional Similarity in Source Code with Graph Based Siamese Networks

Code clones are duplicate code fragments that share (nearly) similar syntaxor semantics . Code clone detection plays an important role in software maintenance, code refactoring, and reuse . Researchers have attempted to adopt deep learning techniques to detect code clones .…

Learning a Deep Generative Model like a Program the Free Category Prior

Humans surpass the cognitive abilities of most other animals in our ability to “chunk” concepts into words . In this process, we make “infinite use of finite means”, enabling usto learn new concepts quickly and nest concepts within each-other . We show how our formalismallows neural networks to serve as primitives in probabilistic programs .…

Distributed algorithms to determine eigenvectors of matrices on spatially distributed networks

Eigenvectors of matrices on a network have been used for understandingspectral clustering and influence of a vertice . For matrices with smallgeodesic-width, we propose a distributed iterative algorithm in this letter to find eigenvector associated with given eigenvalues .…

Managing Latency in Edge Cloud Environment

Cyber-physical Systems (CPS) include applications like smart traffic, smart agriculture, smart power grid, etc. Commonly, these systems are distributed and composed of end-user applications and microservices that typically run in the cloud . As thecloud becomes part of the computation loop, the real-time requirements have to be also reflected by the cloud.…

Characterization and Computation of Feasible Trajectories for an Articulated Probe with a Variable Length End Segment

An articulated probe is modeled in the plane as two line segments, $ab$ and $bc$ joined at $b$ . The goal is to compute a feasibleobstacle-avoiding trajectory for the probe so that, after a sequence ofmoves, $c$ coincides with $t$. We prove that, for $n$ line segment obstacles, the smallest length $r$ forwhich there exists a feasible probe trajectory can be found in $O(n^{2+\epsilon)$ time .…

Alone or With Others Understanding Eating Episodes of College Students with Mobile Sensing

Understanding food consumption patterns and contexts using mobile sensing is fundamental to build mobile health applications that require minimal user interaction to generate mobile food diaries . Social context of eating (alone, with friends, with family, with a partner, etc.) is an important self-reported feature that influences aspects such as food type, psychological state while eating, and the amount of food .…

Urgency aware Optimal Routing in Repeated Games through Artificial Currencies

When people choose routes minimizing their individual delay, the aggregatecongestion can be much higher compared to that experienced by acentrally-imposed routing . Yet centralized routing is incompatible with the presence of self-interested agents . In this paper, we propose a fairincentive mechanism based on artificial currencies that routes selfish agents in a system-optimal fashion, while accounting for their temporal preferences .…

Tight Bounds for Potential Maximal Cliques Parameterized by Vertex Cover

A graph with $n$ vertices has atmost $4^k + n$ potential maximal cliques . We also show that for each positive integer $k$ there exists a graph with vertices with $O(k^2)$vertices, and $Omega(4/k)$ potential maximal cliques. Our results extend the results of Fomin, Liedloff, Montealegre and Todinca [Algorithmica,80(4):1146–1169, 2018]…

Reachable Polyhedral Marching RPM A Safety Verification Algorithm for Robotic Systems with Deep Neural Network Components

We present a method for computing exact reachable sets for deep neuralnetworks with rectified linear unit (ReLU) activation . Our method is well-suited for use in rigorous safety analysis of robotic perception and control systems with deep neural network components .…

Multi task Language Modeling for Improving Speech Recognition of Rare Words

We propose a second-pass system with multi-task learning, utilizingsemantic targets (such as intent and slot prediction) to improve speech recognition performance . We show that our rescoring model with trained with these additional tasks outperforms the baseline rescoring . model .…

Simulating an Object Oriented Financial System in a Functional Language

This paper summarises a successful application of functional programming within a commercial environment . We report on experience at Accenture’sFinancial Services Solution Centre in London with simulating an object-oriented financial system . The work was part of alarge IT project for an international investment bank and provides a pragmaticcase study .…

Distance based Data Cleaning A Survey Technical Report

Data cleaning approaches are designed to preprocess the dirty data before conducting applications . Distance-based technology plays an important role inthe data cleaning area, says study . Survey provides a classification of four main data cleaning tasks . It also comprehensively reviews the state of the art for each class of the cleaning tasks, i.e.,…

Validity and Reliability of the Scale Internet Users Information Privacy Concern IUIPC Extended Version

Internet Users’ Information Privacy Concerns (IUIPC-10) is widely used in the evaluation of human factors of PETs and the investigation of the privacy paradox . We propose a respecified instrument with improved psychometric properties . The sub-par reliability could yieldspurious and erratic results as well as attenuate relations with other latentvariables, such as behavior .…

The Zero Resource Speech Benchmark 2021 Metrics and baselines for unsupervised spoken language modeling

We introduce a new unsupervised task, spoken language modeling: the learningof linguistic representations from raw audio signals without any labels . This simple pipeline shows better than chance performance onall four metrics, demonstrating the feasibility of spoken language models from raw speech .…

Resonance Replacing Software Constants with Context Aware Models in Real time Communication

A ‘one-size-fits-all’ approach is often sub-optimal as the bestvalue depends on runtime context . We present Resonance, asystem based on contextual bandits (CB) We describe experiences from threereal-world experiments: applying it to the audio, video, and transport components in Skype .…

Model Predictive Control for Micro Aerial Vehicles A Survey

This paper presents a review of the design and application of modelpredictive control strategies for Micro Aerial Vehicles and specifically multirotor configurations such as quadrotors . The diverse set of works in the domain is organized based on the control law being optimized over linear or nonlinear dynamics, the integration of state and input constraints, possiblefault-tolerant design, if reinforcement learning methods have been utilized and if the controller refers to free-flight or other tasks such as physicalinteraction or load transportation .…

Data Driven Stabilization of Nonlinear Systems with Rational Dynamics

In this paper, we present a data-driven controller design method forcontinuous-time nonlinear systems with rational system dynamics . We use no model knowledge but only measured data affected by noise . We apply robust control techniques to this parametrization . We obtain sum-of-squares based criteria for designing controllers with closed-loop stability guarantees for all continuous-time systems withrational system dynamics which are consistent with the measured data and the assumed noise bound .…

The Chunks and Tasks Matrix Library 2 0

We present a C++ header-only parallel sparse matrix library based on sparsequadtree representation of matrices . The library implements a number of sparse matrix algorithms for distributed memory parallelization that are able to dynamically exploit datalocality to avoid movement of data .…

An off the grid approach to multi compartment magnetic resonance fingerprinting

We propose a novel numerical approach to separate multiple tissuecompartments in image voxels . We estimate quantitatively their nuclearmagnetic resonance (NMR) properties and mixture fractions, given magneticresonance fingerprinting (MRF) measurements . The number of tissues, their types or quantitative properties are not a-priori known, but the image is assumed to be composed of sparse compartments with linearly mixed Bloch magnetisationresponses .…

End to end Silent Speech Recognition with Acoustic Sensing

Silent speech interfaces (SSI) has been an exciting area of recent interest . We present a non-invasive silent speech interface that usesinaudible acoustic signals to capture people’s lip movements when they speak . We exploit the speaker and microphone of the smartphone to emit signals and listen to their reflections .…

Path Design and Resource Management for NOMA enhanced Indoor Intelligent Robots

A communication enabled indoor intelligent robots (IRs) service framework is proposed . Non-orthogonal multiple access (NOMA) technique is adopted to enable highly reliable communications . Lego modeling method is proposed, which can deterministicallydescribe indoor layout and channel state in order to construct the radiomap .…

A Mathematical Dashboard for the Analysis of Italian COVID 19 Epidemic Data

A data analysis of the COVID-19 epidemic is proposed on the basis of thedashboard publicly accessible at https://www.epimox.polimi.it that focuses on the characterization of the first and second epidemic outbreaks in Italy . Thescope of this tool is to foster a deeperinterpretation of available data as well as to provide a hint on the nearfuture evolution of the most relevant epidemic indicators .…

The Bloom Clock for Causality Testing

The probabilistic Bloom clock can determine causality between events with lowerspace, time, and message-space overhead than vector clocks . However, predictions suffer from false positives . The Bloom clock design can serve as a viablespace-, time-, time-and-message-space-efficient alternative to vector clocks if false positives can be tolerated by an application .…