The approach is general for any class of mobile system, we run simulations and experiments with indoor drones . We provide a detailed analysis of the uncertainty of the positioning system while the UWB infrastructure grows . We developed a genetic algorithm that minimizes the deployment of newanchors, saving energy and resources on the mobile robot and maximizing the mission .…

## A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

Geofences are proposed as one line of defence to limit UAVs from flying into perimeters of other aircraft and restricted locations . Geofencing algorithms lack accuracy during the calculation of complex geofences, particularly in dynamic urban environments . We propose a new algorithm based on alpha shapes and Voronoi diagrams, which we integrate into an on-drone framework using an open-source mapping database from OpenStreetMap .…

## Minimal Multi Layer Modifications of Deep Neural Networks

Deep neural networks may err and produce incorrect outputs in safety-critical settings, such as autonomousdriving, medical diagnosis, and airborne collision avoidance systems . New tool, called 3M-DNN, for repairing agiven DNN, which is known to err on some set of inputs .…

## Ranking Facts for Explaining Answers to Elementary Science Questions

Explanations are created from a human-annotated set ofnearly 5,000 candidate facts in the WorldTree corpus . Our aim is to obtainbetter matches for valid facts of an explanation for the correct answer of a question over the available fact candidates .…

## Diameter constrained Steiner tree and related problems

We give a dynamic programming solution to find the minimum cost of a diameterconstrained Steiner tree in case of directed graphs . Then we show a simple reduction from undirected version to the directed version to realize an analgorithm of similar complexity i.e,…

## Investigating Man in the Middle based False Data Injection in a Smart Grid Laboratory Environment

The security of energy supply is increasingly threatened by cyber-attacks . Traditional cyber-security measures can be used as mitigation and prevention measures, but their effective use requires a deep understanding of the potential threat landscape and complex attack processes in energyinformation systems .…

## Learning Realtime One Counter Automata

Ouralgorithm uses membership and equivalence queries as in Angluin’s L* algorithm . In a partialequivalence query, we ask the teacher whether the language of a givenfinite-state automaton coincides with a counter-bounded subset of the targetlanguage . We evaluate an implementation of our algorithm on a number of randombenchmarks .…

## A dynamic mode decomposition extension for the forecasting of parametric dynamical systems

Dynamic mode decomposition (DMD) has recently become a popular tool for thenon-intrusive analysis of dynamical systems . Exploiting the proper orthogonaldecomposition as dimensionality reduction technique, DMD is able to approximatea dynamical system as a sum of (spatial) basis evolving linearly in time .…

## Mobility Label Based Network Hierarchical Mobility Management and Packet Forwarding Architecture

Mobility LabelBased Network (MLBN) is a new approach to the network layer mobility management problem that relies solely on MPLS to provide both macro- and micro-mobility for IPv4 and IPv6 mobile hosts and routers . This new approach does not rely on the existing IP mobility management protocols such as Mobile IP and is based on the combination of Multi- Protocol BGP (MP-BGP) and MPLS .…

## Learning to Learn a Cold start Sequential Recommender

The cold-start recommendation is an urgent problem in contemporary online applications . Many data-driven algorithms, suchas the widely used matrix factorization, underperform because of datasparseness . This work adopts the idea of meta-learning to solve the user’scold start recommendation problem .…

## Algorithms Using Local Graph Features to Predict Epidemics

We study a simple model of epidemics where an infected node transmits theinfection to its neighbors independently with probability $p$. This is alsoknown as the independent cascade or Susceptible-Infected-Recovered (SIR) model . The size of an outbreak in this model is closelyrelated to that of the giant connected component in “edge percolation”, whereeach edge of the graph is kept independently .…

## Understanding Players Interaction Patterns with Mobile Game App UI via Visualizations

Understanding how players interact with the mobile game app on smartphonedevices is important for game experts to develop and refine their app products . Visualizing therecorded logs of users’ UI operations is a promising way for quantitativelyunderstanding the interaction patterns .…

## The complexity of the Quantified CSP having the polynomially generated powers property

The Quantified CSP can be reduced to the CSP over the same constraint language with constants . The only limitation of this reduction is that it is applicable only for theconstraint languages with constant . We drastically simplified the reductionand generalized it for constraint languages without constants .…

## Dynamic Tolling for Inducing Socially Optimal Traffic Loads

How to design tolls that induce socially optimal traffic loads? We propose atwo-timescale discrete-time stochastic dynamics that adaptively adjusts thetoll prices on a parallel link network . We show that the loads and the tolls concentrate in a neighborhood of the fixed point, which correspondsto the socially optimal load and toll price .…

## RL4RS A Real World Benchmark for Reinforcement Learning based Recommender System

Reinforcement learning based recommender systems (RL-based RS) aims at learning a good policy from a batch of collected data . However, current RL-basedRS benchmarks commonly have a large reality gap, because they involve artificial RL datasets or semi-simulated RS datasets .…

## DNA Codes over the Ring mathbb Z _4 w mathbb Z _4

We extend the Gau map andGau distance, defined in DKBG, over all the $16$ rings$\mathcal{R}__\theta . An isometry between the codes over the rings and the analogous DNA codes is established in general . We propose family of DNA codes that satisfies reverse and reverse-complement constraints using the Reed-Muller type codes .…

## Empirical Policy Optimization for n Player Markov Games

In single-agent Markov decision processes, an agent can optimize its policy based on the interaction with environment . In multi-player Markov games, the interaction is non-stationary due to the behaviors of other players . The core is to evolve one’s policy according to not just its current in-game performance, but an aggregation of its performance over history .…

## Newsalyze Effective Communication of Person Targeting Biases in News Articles

Media bias and its extreme form, fake news, can decisively affect public opinion, authors say . Slanted news coverage may influence societal decisions, e.g., in democratic elections . Study suggests that our content-driven identification method detects groups of similarly slanted news articles due to substantial biases present in individual news articles.…

## Approximate Sampling and Counting of Graphs with Near Regular Degree Intervals

The approximate uniform sampling of graphs with a given degree sequence is awell-known, extensively studied problem in theoretical computer science . In this work we study an extension of the problem, where degree intervals are specified rather than a single degree sequence .…

## Projected Model Counting Beyond Independent Support

The past decade has witnessed a surge of interest in practical techniques forprojected model counting . Despite significant advancements, performance scaling remains the Achilles’ heel of this field . Inapplications such as verification of binarized neural networks, quantification of information flow, reliability of power grids etc.,…

## Comparing Deep Neural Nets with UMAP Tour

A tool, UMAP Tour, is built to visually inspect and compare behavior of real-world neural network models . The method used in the visualization alsoimplies a new similarity measure between neural network layers . Using the tool and the similarity measure, we find concepts learned instate-of-the-art models and dissimilarities between them, such as GoogLeNet andResNet .…

## State Space Constraints Improve the Generalization of the Differentiable Neural Computer in some Algorithmic Tasks

Memory-augmented neural networks (MANNs) can solve algorithmic tasks like sorting . However, they often do not generalize to lengths of input sequences seen in the training phase . We introduce two approaches: state compression and state regularization . We show that both approaches can improve the generalization capability of a particular type of MANN, the differentiableneural computer (DNC) We also compare our approaches to a stateful and a statelesscontroller on a set of tasks .…

## Anti Factor is FPT Parameterized by Treewidth and List Size but Counting is Hard

In the general AntiFactor problem, a graph $G$ is given with a set$X_v\subseteq \mathbb{N}$ of forbidden degrees . Standard techniques (dynamic programming + fast convolution) can be used to show that if $M$ is the largest forbidden degree, then the problem can be solved in time .…

## The complexity of the Quantified CSP having the polynomially generated powers property

The Quantified CSP can be reduced to the CSP over the same constraint language with constants . The only limitation of this reduction is that it is applicable only for theconstraint languages with constant . We drastically simplified the reductionand generalized it for constraint languages without constants .…

## Newsalyze Effective Communication of Person Targeting Biases in News Articles

Media bias and its extreme form, fake news, can decisively affect public opinion, authors say . Slanted news coverage may influence societal decisions, e.g., in democratic elections . Study suggests that our content-driven identification method detects groups of similarly slanted news articles due to substantial biases present in individual news articles.…

## Mode I and Mode II stress intensity factors and dislocation density behaviour in strain gradient plasticity

In this study, we use the mechanism-based strain gradient plasticity theory to evaluate both crack tip dislocation density behaviour and the coupled effectof the material plastic properties and the intrinsic material length onnon-linear amplitude factors . The constitutive relations are based on Taylor’s dislocation model, which enables gaining insights into the role of the increased dislocationdensity associated with large gradients in plastic strain near cracks .…

## Don t Judge Me by My Face An Indirect Adversarial Approach to Remove Sensitive Information From Multimodal Neural Representation in Asynchronous Job Video Interviews

Adversarial methods have been proven to effectively remove sensitive information from the latent representation of neural networks without the need to collect any sensitive variable . This is the first application of adversarial techniques for obtaining a multimodal fair representation in the context of video job interviews .…

## Online Motion Planning with Soft Timed Temporal Logic in Dynamic and Unknown Environment

Motion planning of an autonomous system with high-level specifications has wide applications . Research of formal languages involving timedtemporal logic is still under investigation . Many existing resultsrely on a key assumption that user-specified tasks are feasible in the given environment .…

## Turing Tumble is Turing Complete

It is shown that the toy Turing Tumble, suitably extended with an infinitelylong game board and unlimited supply of pieces, is Turing-Complete . This isachieved via direct simulation of a Turing machine . Unlike previouslyinformally presented constructions, we do not encode the finite controlinfinitely many times, we need only one trigger/ball-hopper pair, and we proveour construction correct .…

## Color Image Segmentation Using Multi Objective Swarm Optimizer and Multi level Histogram Thresholding

This paper presents a new way forunsupervised image segmentation by combining histogram thresholding methods and multi-objective swarm intelligence algorithms . Segmenting entire color channels with the same thresholds also benefits from the fact that our proposed method needs fewer thresholds to segment the image than otherthresholding algorithms; thus, it requires less memory space to savethresholds .…

## Brilliant Challenges Optimization Problem Submission Contest Final Report

This paper concludes the Brilliant Challenges contest . Participants had to submit interesting optimization problems and publish them using the Optil.ioplatform . It was the first widely-advertised contest in the area of operational research where the objective was to submit the problem definition instead of the algorithmic solutions .…

## Evaluating NISQ Devices with Quadratic Nonresidues

Algorithmsshowing a quantum advantage are often tailored precisely to what a particular NISQ does well . We prove quantum computers can find quadratic nonresidues indeterministic polynomial time . Classical version of this problem remains unsolved after hundreds of years . A success rate greater than 75% provides evidence of quantumadvantage.…

## Sim to Real Transfer in Multi agent Reinforcement Networking for Federated Edge Computing

FedEdge simulator is a high-fidelity Linux-based simulator, which enables fast prototyping, sim-to-real code, and knowledgetransfer for multi-hop FL systems . The simulator exploits trace-based channel modeling and dynamic link scheduling to minimize the reality gap between the simulator and the physical testbed .…

## Context aware Reranking with Utility Maximization for Recommendation

Reranking rearranges items in the initial rankinglists from the previous ranking stage to better meet users’ demands . An ideal reranking algorithm should consider the counterfactual context — the position and the alignment of the items in reranked lists . CRUM significantly outperforms the state-of-the-art models in terms of both relevance-based metrics and utility-based metric metrics.…

## Neural network learning of SPOD latent dynamics

We aim to reconstruct the latent space dynamics of high dimensional systems using model order reduction via the spectral proper orthogonal decomposition(SPOD) The proposed method is based on three fundamental steps: in the first,we compress the data from a high-dimensional representation to a lowerdimensional one by constructing the SPOD latent space .…

## A Stable FDTD Subgridding Scheme with SBP SAT for Transient Electromagnetic Analysis

We proposed a provably stable FDTD subgridding method for accurate and efficient transient electromagnetic analysis . In the proposed method, severalfield components are properly added to the boundaries of Yee’s grid to makeure that the discrete operators meet the summation-by-parts (SBP) property .…

## NeuralArTS Structuring Neural Architecture Search with Type Theory

Neural Architecture Search (NAS) algorithms automate the task of finding optimal deep learning architectures given an initial search space of possible operations . In this paper we present a new framework called Neural ArchitectureType System (NeuralArTS) that categorizes the infinite set of network operations in a structured type system .…

## Arjun An Efficient Independent Support Computation Technique and its Applications to Counting and Sampling

The notion of independentsupport is related to the classical notion of definability dating back to 1901 . The computational problem of determining independent support for a given formula has attained importance . We design an efficient and scalable independent supportcomputation technique .…

## SmartGridToolbox A Library for Simulating Modern and Future Electricity Networks

SmartGridToolbox is a C++ library for simulating modern and future electricity networks . It is distinguished by the fact that it is a general purpose library (rather than an application) that emphasizesflexibility, extensibility, and ability to interface with other tools .…

## How to Effectively Identify and Communicate Person Targeting Media Bias in Daily News Consumption

Slanted news coverage has long been studied in the socialsciences, resulting in comprehensive models to describe it and effective yetcostly methods to analyze it . We present anin-progress system for news recommendation that is the first to automate themanual procedure of content analysis to reveal person-targeting biases in news articles reporting on policy issues .…

## An Empirical Study of Protocols in Smart Contracts

Smart contracts are programs that are executed on a blockhain . They have been used for applications in voting, decentralized finance, and supply chainmanagement . But vulnerabilities in smart contracts have been abused by hackers, leading to financial losses . Understanding state machine protocols has been identified as important to catching common bugs, improving documentation, and optimizing smart contracts .…

## Semantics of Conjectures

This paper aims to expand and detail the notion of formal semantics of Conjectures by applying a theoretic-model approach . After a short introduction to the concepts and basics, we will start from the concept ofSimple Interpretation of RDF, applying and extending the semantic rules and conditions to fully cover the concepts .…

## Ctrl Shift How Privacy Sentiment Changed from 2019 to 2021

People’s privacy sentiments drive changes in legislation and may influencetheir willingness to use a variety of technologies . After the onset of COVID-19, we observe significant changes in Americans’ privacy sentimentstoward government- and health-related data uses . We observe additionalchanges in the context of other national events such as the U.S.…

## Small Data and Process in Data Visualization The Radical Translations Case Study

This paper uses the collaborative project Radical Translations as case study to examine some of the theoretical perspectives informing the adoption andcritique of data visualization in the digital humanities . It showcases how data visualization is used within a King’s DigitalLab project lifecycle to facilitate collaborative data exploration within the project interdisciplinary team .…

## Fair and Efficient Allocations of Chores under Bivalued Preferences

We study the problem of fair and efficient allocation of a set of indivisible chores to agents with additive cost functions . We consider the popular fairnessnotion of envy-freeness up to one good (EF1) with the efficiency notion ofPareto-optimality (PO) While it is known that an EF1+PO allocation exists andcan be computed in pseudo-polynomial time in the case of goods, the same problem is open for chores .…

## Wideband and Entropy Aware Deep Soft Bit Quantization

Deep learning has been recently applied to physical layer processing indigital communication systems . We introduce a novel deep learning solution for soft bitquantization across wideband channels . Our method is trained end-to-end withquantization- and entropy-aware augmentations to the loss function .…

## A Primer on the Statistical Relation between Wireless Ultra Reliability and Location Estimation

This letter statistically characterizes the impact of location estimationuncertainty in the wireless communication reliability . The reliability – characterized by how likely the outage probabilityis to be above a target threshold – can be sensitive to location errors . We highlight the difficulty of choosing a rate that both meets targetreliability and accounts for the location uncertainty, and that the most directsolutions suffer from being too conservative .…

## Semantic network analysis of abstract and concrete word associations

In recent years, a new interest for the use of graph-theory based networks has emerged within the field of cognitive science . In the present work, we applied semantic network analyses to explore norms of Frenchword associations for concrete and abstract concepts (Lakhzoum et al.,…

## The search of Type I codes

A self-dual binary linear code is called Type I code if it has singly-evencodewords, i.e.~it has codewords with weight divisible by $2.$ The purpose of this paper is to investigate interesting properties of Type I codes . Further, we build up a computer-based code-searching program .…

## DNA Codes over the Ring mathbb Z _4 w mathbb Z _4

We extend the Gau map andGau distance, defined in DKBG, over all the $16$ rings$\mathcal{R}__\theta . An isometry between the codes over the rings and the analogous DNA codes is established in general . We propose family of DNA codes that satisfies reverse and reverse-complement constraints using the Reed-Muller type codes .…