-
Non-Destructive Peat Analysis using Hyperspectral Imaging and Machine Learning
Authors:
Yijun Yan,
Jinchang Ren,
Barry Harrison,
Oliver Lewis,
Yinhe Li,
Ping Ma
Abstract:
Peat, a crucial component in whisky production, imparts distinctive and irreplaceable flavours to the final product. However, the extraction of peat disrupts ancient ecosystems and releases significant amounts of carbon, contributing to climate change. This paper aims to address this issue by conducting a feasibility study on enhancing peat use efficiency in whisky manufacturing through non-destru…
▽ More
Peat, a crucial component in whisky production, imparts distinctive and irreplaceable flavours to the final product. However, the extraction of peat disrupts ancient ecosystems and releases significant amounts of carbon, contributing to climate change. This paper aims to address this issue by conducting a feasibility study on enhancing peat use efficiency in whisky manufacturing through non-destructive analysis using hyperspectral imaging. Results show that shot-wave infrared (SWIR) data is more effective for analyzing peat samples and predicting total phenol levels, with accuracies up to 99.81%.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
A Sierpinski Triangle Data Structure for Efficient Array Value Update and Prefix Sum Calculation
Authors:
Brent Harrison,
Jason Necaise,
Andrew Projansky,
James D. Whitfield
Abstract:
The binary indexed tree, or Fenwick tree, is a data structure that can efficiently update values and calculate prefix sums in an array. It allows both of these operations to be performed in $O(\log_2 N)$ time. Here we present a novel data structure resembling the Sierpinski triangle, which accomplishes these operations with the same memory usage in $O(\log_3 N)$ time instead. We show this order to…
▽ More
The binary indexed tree, or Fenwick tree, is a data structure that can efficiently update values and calculate prefix sums in an array. It allows both of these operations to be performed in $O(\log_2 N)$ time. Here we present a novel data structure resembling the Sierpinski triangle, which accomplishes these operations with the same memory usage in $O(\log_3 N)$ time instead. We show this order to be optimal by making use of a connection to quantum computing.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
DenseNet and Support Vector Machine classifications of major depressive disorder using vertex-wise cortical features
Authors:
Vladimir Belov,
Tracy Erwin-Grabner,
Ling-Li Zeng,
Christopher R. K. Ching,
Andre Aleman,
Alyssa R. Amod,
Zeynep Basgoze,
Francesco Benedetti,
Bianca Besteher,
Katharina Brosch,
Robin Bülow,
Romain Colle,
Colm G. Connolly,
Emmanuelle Corruble,
Baptiste Couvy-Duchesne,
Kathryn Cullen,
Udo Dannlowski,
Christopher G. Davey,
Annemiek Dols,
Jan Ernsting,
Jennifer W. Evans,
Lukas Fisch,
Paola Fuentes-Claramonte,
Ali Saffet Gonul,
Ian H. Gotlib
, et al. (63 additional authors not shown)
Abstract:
Major depressive disorder (MDD) is a complex psychiatric disorder that affects the lives of hundreds of millions of individuals around the globe. Even today, researchers debate if morphological alterations in the brain are linked to MDD, likely due to the heterogeneity of this disorder. The application of deep learning tools to neuroimaging data, capable of capturing complex non-linear patterns, h…
▽ More
Major depressive disorder (MDD) is a complex psychiatric disorder that affects the lives of hundreds of millions of individuals around the globe. Even today, researchers debate if morphological alterations in the brain are linked to MDD, likely due to the heterogeneity of this disorder. The application of deep learning tools to neuroimaging data, capable of capturing complex non-linear patterns, has the potential to provide diagnostic and predictive biomarkers for MDD. However, previous attempts to demarcate MDD patients and healthy controls (HC) based on segmented cortical features via linear machine learning approaches have reported low accuracies. In this study, we used globally representative data from the ENIGMA-MDD working group containing an extensive sample of people with MDD (N=2,772) and HC (N=4,240), which allows a comprehensive analysis with generalizable results. Based on the hypothesis that integration of vertex-wise cortical features can improve classification performance, we evaluated the classification of a DenseNet and a Support Vector Machine (SVM), with the expectation that the former would outperform the latter. As we analyzed a multi-site sample, we additionally applied the ComBat harmonization tool to remove potential nuisance effects of site. We found that both classifiers exhibited close to chance performance (balanced accuracy DenseNet: 51%; SVM: 53%), when estimated on unseen sites. Slightly higher classification performance (balanced accuracy DenseNet: 58%; SVM: 55%) was found when the cross-validation folds contained subjects from all sites, indicating site effect. In conclusion, the integration of vertex-wise morphometric features and the use of the non-linear classifier did not lead to the differentiability between MDD and HC. Our results support the notion that MDD classification on this combination of features and classifiers is unfeasible.
△ Less
Submitted 18 November, 2023;
originally announced November 2023.
-
Machine Learning Approaches for Principle Prediction in Naturally Occurring Stories
Authors:
Md Sultan Al Nahian,
Spencer Frazier,
Brent Harrison,
Mark Riedl
Abstract:
Value alignment is the task of creating autonomous systems whose values align with those of humans. Past work has shown that stories are a potentially rich source of information on human values; however, past work has been limited to considering values in a binary sense. In this work, we explore the use of machine learning models for the task of normative principle prediction on naturally occurrin…
▽ More
Value alignment is the task of creating autonomous systems whose values align with those of humans. Past work has shown that stories are a potentially rich source of information on human values; however, past work has been limited to considering values in a binary sense. In this work, we explore the use of machine learning models for the task of normative principle prediction on naturally occurring story data. To do this, we extend a dataset that has been previously used to train a binary normative classifier with annotations of moral principles. We then use this dataset to train a variety of machine learning models, evaluate these models and compare their results against humans who were asked to perform the same task. We show that while individual principles can be classified, the ambiguity of what "moral principles" represent, poses a challenge for both human participants and autonomous systems which are faced with the same task.
△ Less
Submitted 18 November, 2022;
originally announced December 2022.
-
Reducing the qubit requirement of Jordan-Wigner encodings of $N$-mode, $K$-fermion systems from $N$ to $\lceil \log_2 {N \choose K} \rceil$
Authors:
Brent Harrison,
Dylan Nelson,
Daniel Adamiak,
James Whitfield
Abstract:
To simulate a fermionic system on a quantum computer, it is necessary to encode the state of the fermions onto qubits. Fermion-to-qubit mappings such as the Jordan-Wigner and Bravyi-Kitaev transformations do this using $N$ qubits to represent systems of $N$ fermionic modes. In this work, we demonstrate that for particle number conserving systems of $K$ fermions and $N$ modes, the qubit requirement…
▽ More
To simulate a fermionic system on a quantum computer, it is necessary to encode the state of the fermions onto qubits. Fermion-to-qubit mappings such as the Jordan-Wigner and Bravyi-Kitaev transformations do this using $N$ qubits to represent systems of $N$ fermionic modes. In this work, we demonstrate that for particle number conserving systems of $K$ fermions and $N$ modes, the qubit requirement can be reduced to the information theoretic minimum of $\lceil \log_2 {N \choose K} \rceil$. This will improve the feasibility of simulation of molecules and many-body systems on near-term quantum computers with limited qubit number.
△ Less
Submitted 15 August, 2023; v1 submitted 8 November, 2022;
originally announced November 2022.
-
DinoDroid: Testing Android Apps Using Deep Q-Networks
Authors:
Yu Zhao,
Brent Harrison,
Tingting Yu
Abstract:
The large demand of mobile devices creates significant concerns about the quality of mobile applications (apps). Developers need to guarantee the quality of mobile apps before it is released to the market. There have been many approaches using different strategies to test the GUI of mobile apps. However, they still need improvement due to their limited effectiveness. In this paper, we propose Dino…
▽ More
The large demand of mobile devices creates significant concerns about the quality of mobile applications (apps). Developers need to guarantee the quality of mobile apps before it is released to the market. There have been many approaches using different strategies to test the GUI of mobile apps. However, they still need improvement due to their limited effectiveness. In this paper, we propose DinoDroid, an approach based on deep Q-networks to automate testing of Android apps. DinoDroid learns a behavior model from a set of existing apps and the learned model can be used to explore and generate tests for new apps. DinoDroid is able to capture the fine-grained details of GUI events (e.g., the content of GUI widgets) and use them as features that are fed into deep neural network, which acts as the agent to guide app exploration. DinoDroid automatically adapts the learned model during the exploration without the need of any modeling strategies or pre-defined rules. We conduct experiments on 64 open-source Android apps. The results showed that DinoDroid outperforms existing Android testing tools in terms of code coverage and bug detection.
△ Less
Submitted 12 October, 2022;
originally announced October 2022.
-
Multi-site benchmark classification of major depressive disorder using machine learning on cortical and subcortical measures
Authors:
Vladimir Belov,
Tracy Erwin-Grabner,
Ali Saffet Gonul,
Alyssa R. Amod,
Amar Ojha,
Andre Aleman,
Annemiek Dols,
Anouk Scharntee,
Aslihan Uyar-Demir,
Ben J Harrison,
Benson M. Irungu,
Bianca Besteher,
Bonnie Klimes-Dougan,
Brenda W. J. H. Penninx,
Bryon A. Mueller,
Carlos Zarate,
Christopher G. Davey,
Christopher R. K. Ching,
Colm G. Connolly,
Cynthia H. Y. Fu,
Dan J. Stein,
Danai Dima,
David E. J. Linden,
David M. A. Mehler,
Edith Pomarol-Clotet
, et al. (41 additional authors not shown)
Abstract:
Machine learning (ML) techniques have gained popularity in the neuroimaging field due to their potential for classifying neuropsychiatric disorders. However, the diagnostic predictive power of the existing algorithms has been limited by small sample sizes, lack of representativeness, data leakage, and/or overfitting. Here, we overcome these limitations with the largest multi-site sample size to da…
▽ More
Machine learning (ML) techniques have gained popularity in the neuroimaging field due to their potential for classifying neuropsychiatric disorders. However, the diagnostic predictive power of the existing algorithms has been limited by small sample sizes, lack of representativeness, data leakage, and/or overfitting. Here, we overcome these limitations with the largest multi-site sample size to date (n=5,356) to provide a generalizable ML classification benchmark of major depressive disorder (MDD). Using brain measures from standardized ENIGMA analysis pipelines in FreeSurfer, we were able to classify MDD vs healthy controls (HC) with around 62% balanced accuracy, but when harmonizing the data using ComBat balanced accuracy dropped to approximately 52%. Similar results were observed in stratified groups according to age of onset, antidepressant use, number of episodes and sex. Future studies incorporating higher dimensional brain imaging/phenotype features, and/or using more advanced machine and deep learning methods may achieve more encouraging prospects.
△ Less
Submitted 25 October, 2022; v1 submitted 16 June, 2022;
originally announced June 2022.
-
Quantum Computing 2022
Authors:
James D. Whitfield,
Jun Yang,
Weishi Wang,
Joshuah T. Heath,
Brent Harrison
Abstract:
Quantum technology is full of figurative and literal noise obscuring its promise. In this overview, we will attempt to provide a sober assessment of the promise of quantum technology with a focus on computing. We provide a tour of quantum computing and quantum technology that is aimed to be comprehensible to scientists and engineers without becoming a popular account. The goal is not a comprehensi…
▽ More
Quantum technology is full of figurative and literal noise obscuring its promise. In this overview, we will attempt to provide a sober assessment of the promise of quantum technology with a focus on computing. We provide a tour of quantum computing and quantum technology that is aimed to be comprehensible to scientists and engineers without becoming a popular account. The goal is not a comprehensive review nor a superficial introduction but rather to serve as a useful map to navigate the hype, the scientific literature, and upcoming press releases about quantum technology and quantum computing. We have aimed to cite the most recent topical reviews, key results, and guide the reader away from fallacies and towards active discussions in the current quantum computing literature. The goal of this article was to be pedantic and introductory without compromising on the science.
△ Less
Submitted 7 June, 2022; v1 submitted 24 January, 2022;
originally announced January 2022.
-
Modelling Cournot Games as Multi-agent Multi-armed Bandits
Authors:
Kshitija Taywade,
Brent Harrison,
Adib Bagh
Abstract:
We investigate the use of a multi-agent multi-armed bandit (MA-MAB) setting for modeling repeated Cournot oligopoly games, where the firms acting as agents choose from the set of arms representing production quantity (a discrete value). Agents interact with separate and independent bandit problems. In this formulation, each agent makes sequential choices among arms to maximize its own reward. Agen…
▽ More
We investigate the use of a multi-agent multi-armed bandit (MA-MAB) setting for modeling repeated Cournot oligopoly games, where the firms acting as agents choose from the set of arms representing production quantity (a discrete value). Agents interact with separate and independent bandit problems. In this formulation, each agent makes sequential choices among arms to maximize its own reward. Agents do not have any information about the environment; they can only see their own rewards after taking an action. However, the market demand is a stationary function of total industry output, and random entry or exit from the market is not allowed. Given these assumptions, we found that an $ε$-greedy approach offers a more viable learning mechanism than other traditional MAB approaches, as it does not require any additional knowledge of the system to operate. We also propose two novel approaches that take advantage of the ordered action space: $ε$-greedy+HL and $ε$-greedy+EL. These new approaches help firms to focus on more profitable actions by eliminating less profitable choices and hence are designed to optimize the exploration. We use computer simulations to study the emergence of various equilibria in the outcomes and do the empirical analysis of joint cumulative regrets.
△ Less
Submitted 1 January, 2022;
originally announced January 2022.
-
StyleM: Stylized Metrics for Image Captioning Built with Contrastive N-grams
Authors:
Chengxi Li,
Brent Harrison
Abstract:
In this paper, we build two automatic evaluation metrics for evaluating the association between a machine-generated caption and a ground truth stylized caption: OnlyStyle and StyleCIDEr.
In this paper, we build two automatic evaluation metrics for evaluating the association between a machine-generated caption and a ground truth stylized caption: OnlyStyle and StyleCIDEr.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Using Non-Stationary Bandits for Learning in Repeated Cournot Games with Non-Stationary Demand
Authors:
Kshitija Taywade,
Brent Harrison,
Judy Goldsmith
Abstract:
Many past attempts at modeling repeated Cournot games assume that demand is stationary. This does not align with real-world scenarios in which market demands can evolve over a product's lifetime for a myriad of reasons. In this paper, we model repeated Cournot games with non-stationary demand such that firms/agents face separate instances of non-stationary multi-armed bandit problem. The set of ar…
▽ More
Many past attempts at modeling repeated Cournot games assume that demand is stationary. This does not align with real-world scenarios in which market demands can evolve over a product's lifetime for a myriad of reasons. In this paper, we model repeated Cournot games with non-stationary demand such that firms/agents face separate instances of non-stationary multi-armed bandit problem. The set of arms/actions that an agent can choose from represents discrete production quantities; here, the action space is ordered. Agents are independent and autonomous, and cannot observe anything from the environment; they can only see their own rewards after taking an action, and only work towards maximizing these rewards. We propose a novel algorithm 'Adaptive with Weighted Exploration (AWE) $ε$-greedy' which is remotely based on the well-known $ε$-greedy approach. This algorithm detects and quantifies changes in rewards due to varying market demand and varies learning rate and exploration rate in proportion to the degree of changes in demand, thus enabling agents to better identify new optimal actions. For efficient exploration, it also deploys a mechanism for weighing actions that takes advantage of the ordered action space. We use simulations to study the emergence of various equilibria in the market. In addition, we study the scalability of our approach in terms number of total agents in the system and the size of action space. We consider both symmetric and asymmetric firms in our models. We found that using our proposed method, agents are able to swiftly change their course of action according to the changes in demand, and they also engage in collusive behavior in many simulations.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
A Self-Explainable Stylish Image Captioning Framework via Multi-References
Authors:
Chengxi Li,
Brent Harrison
Abstract:
In this paper, we propose to build a stylish image captioning model through a Multi-style Multi modality mechanism (2M). We demonstrate that with 2M, we can build an effective stylish captioner and that multi-references produced by the model can also support explaining the model through identifying erroneous input features on faulty examples. We show how this 2M mechanism can be used to build styl…
▽ More
In this paper, we propose to build a stylish image captioning model through a Multi-style Multi modality mechanism (2M). We demonstrate that with 2M, we can build an effective stylish captioner and that multi-references produced by the model can also support explaining the model through identifying erroneous input features on faulty examples. We show how this 2M mechanism can be used to build stylish captioning models and show how these models can be utilized to provide explanations of likely errors in the models.
△ Less
Submitted 18 November, 2021; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Training Value-Aligned Reinforcement Learning Agents Using a Normative Prior
Authors:
Md Sultan Al Nahian,
Spencer Frazier,
Brent Harrison,
Mark Riedl
Abstract:
As more machine learning agents interact with humans, it is increasingly a prospect that an agent trained to perform a task optimally, using only a measure of task performance as feedback, can violate societal norms for acceptable behavior or cause harm. Value alignment is a property of intelligent agents wherein they solely pursue non-harmful behaviors or human-beneficial goals. We introduce an a…
▽ More
As more machine learning agents interact with humans, it is increasingly a prospect that an agent trained to perform a task optimally, using only a measure of task performance as feedback, can violate societal norms for acceptable behavior or cause harm. Value alignment is a property of intelligent agents wherein they solely pursue non-harmful behaviors or human-beneficial goals. We introduce an approach to value-aligned reinforcement learning, in which we train an agent with two reward signals: a standard task performance reward, plus a normative behavior reward. The normative behavior reward is derived from a value-aligned prior model previously shown to classify text as normative or non-normative. We show how variations on a policy shaping technique can balance these two sources of reward and produce policies that are both effective and perceived as being more normative. We test our value-alignment technique on three interactive text-based worlds; each world is designed specifically to challenge agents with a task as well as provide opportunities to deviate from the task to engage in normative and/or altruistic behavior.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
Influencing Reinforcement Learning through Natural Language Guidance
Authors:
Tasmia Tasrin,
Md Sultan Al Nahian,
Habarakadage Perera,
Brent Harrison
Abstract:
Interactive reinforcement learning agents use human feedback or instruction to help them learn in complex environments. Often, this feedback comes in the form of a discrete signal that is either positive or negative. While informative, this information can be difficult to generalize on its own. In this work, we explore how natural language advice can be used to provide a richer feedback signal to…
▽ More
Interactive reinforcement learning agents use human feedback or instruction to help them learn in complex environments. Often, this feedback comes in the form of a discrete signal that is either positive or negative. While informative, this information can be difficult to generalize on its own. In this work, we explore how natural language advice can be used to provide a richer feedback signal to a reinforcement learning agent by extending policy shaping, a well-known Interactive reinforcement learning technique. Usually policy shaping employs a human feedback policy to help an agent to learn more about how to achieve its goal. In our case, we replace this human feedback policy with policy generated based on natural language advice. We aim to inspect if the generated natural language reasoning provides support to a deep reinforcement learning agent to decide its actions successfully in any given environment. So, we design our model with three networks: first one is the experience driven, next is the advice generator and third one is the advice driven. While the experience driven reinforcement learning agent chooses its actions being influenced by the environmental reward, the advice driven neural network with generated feedback by the advice generator for any new state selects its actions to assist the reinforcement learning agent to better policy shaping.
△ Less
Submitted 10 April, 2021; v1 submitted 3 April, 2021;
originally announced April 2021.
-
3M: Multi-style image caption generation using Multi-modality features under Multi-UPDOWN model
Authors:
Chengxi Li,
Brent Harrison
Abstract:
In this paper, we build a multi-style generative model for stylish image captioning which uses multi-modality image features, ResNeXt features and text features generated by DenseCap. We propose the 3M model, a Multi-UPDOWN caption model that encodes multi-modality features and decode them to captions. We demonstrate the effectiveness of our model on generating human-like captions by examining its…
▽ More
In this paper, we build a multi-style generative model for stylish image captioning which uses multi-modality image features, ResNeXt features and text features generated by DenseCap. We propose the 3M model, a Multi-UPDOWN caption model that encodes multi-modality features and decode them to captions. We demonstrate the effectiveness of our model on generating human-like captions by examining its performance on two datasets, the PERSONALITY-CAPTIONS dataset and the FlickrStyle10K dataset. We compare against a variety of state-of-the-art baselines on various automatic NLP metrics such as BLEU, ROUGE-L, CIDEr, SPICE, etc. A qualitative study has also been done to verify our 3M model can be used for generating different stylized captions.
△ Less
Submitted 20 March, 2021;
originally announced March 2021.
-
Multi-agent Reinforcement Learning for Decentralized Stable Matching
Authors:
Kshitija Taywade,
Judy Goldsmith,
Brent Harrison
Abstract:
In the real world, people/entities usually find matches independently and autonomously, such as finding jobs, partners, roommates, etc. It is possible that this search for matches starts with no initial knowledge of the environment. We propose the use of a multi-agent reinforcement learning (MARL) paradigm for a spatially formulated decentralized two-sided matching market with independent and auto…
▽ More
In the real world, people/entities usually find matches independently and autonomously, such as finding jobs, partners, roommates, etc. It is possible that this search for matches starts with no initial knowledge of the environment. We propose the use of a multi-agent reinforcement learning (MARL) paradigm for a spatially formulated decentralized two-sided matching market with independent and autonomous agents. Having autonomous agents acting independently makes our environment very dynamic and uncertain. Moreover, agents lack the knowledge of preferences of other agents and have to explore the environment and interact with other agents to discover their own preferences through noisy rewards. We think such a setting better approximates the real world and we study the usefulness of our MARL approach for it. Along with conventional stable matching case where agents have strictly ordered preferences, we check the applicability of our approach for stable matching with incomplete lists and ties. We investigate our results for stability, level of instability (for unstable results), and fairness. Our MARL approach mostly yields stable and fair outcomes.
△ Less
Submitted 3 December, 2021; v1 submitted 3 May, 2020;
originally announced May 2020.
-
Visual Question Answering Using Semantic Information from Image Descriptions
Authors:
Tasmia Tasrin,
Md Sultan Al Nahian,
Brent Harrison
Abstract:
In this work, we propose a deep neural architecture that uses an attention mechanism which utilizes region based image features, the natural language question asked, and semantic knowledge extracted from the regions of an image to produce open-ended answers for questions asked in a visual question answering (VQA) task. The combination of both region based features and region based textual informat…
▽ More
In this work, we propose a deep neural architecture that uses an attention mechanism which utilizes region based image features, the natural language question asked, and semantic knowledge extracted from the regions of an image to produce open-ended answers for questions asked in a visual question answering (VQA) task. The combination of both region based features and region based textual information about the image bolsters a model to more accurately respond to questions and potentially do so with less required training data. We evaluate our proposed architecture on a VQA task against a strong baseline and show that our method achieves excellent results on this task.
△ Less
Submitted 3 April, 2021; v1 submitted 23 April, 2020;
originally announced April 2020.
-
Learning Norms from Stories: A Prior for Value Aligned Agents
Authors:
Spencer Frazier,
Md Sultan Al Nahian,
Mark Riedl,
Brent Harrison
Abstract:
Value alignment is a property of an intelligent agent indicating that it can only pursue goals and activities that are beneficial to humans. Traditional approaches to value alignment use imitation learning or preference learning to infer the values of humans by observing their behavior. We introduce a complementary technique in which a value aligned prior is learned from naturally occurring storie…
▽ More
Value alignment is a property of an intelligent agent indicating that it can only pursue goals and activities that are beneficial to humans. Traditional approaches to value alignment use imitation learning or preference learning to infer the values of humans by observing their behavior. We introduce a complementary technique in which a value aligned prior is learned from naturally occurring stories which encode societal norms. Training data is sourced from the childrens educational comic strip, Goofus and Gallant. In this work, we train multiple machine learning models to classify natural language descriptions of situations found in the comic strip as normative or non normative by identifying if they align with the main characters behavior. We also report the models performance when transferring to two unrelated tasks with little to no additional training on the new task.
△ Less
Submitted 7 December, 2019;
originally announced December 2019.
-
Smart Advertisement for Maximal Clicks in Online Social Networks Without User Data
Authors:
Nathaniel Hudson,
Hana Khamfroush,
Brent Harrison,
Adam Craig
Abstract:
Click-through rate (CTR) prediction of advertisements on online social network platforms to optimize advertising is of much interest. Prior works build machine learning models that take a user-centric approach in terms of training -- using predominantly user data to classify whether a user will click on an advertisement or not. While this approach has proven effective, it is inaccessible to most e…
▽ More
Click-through rate (CTR) prediction of advertisements on online social network platforms to optimize advertising is of much interest. Prior works build machine learning models that take a user-centric approach in terms of training -- using predominantly user data to classify whether a user will click on an advertisement or not. While this approach has proven effective, it is inaccessible to most entities and relies heavily on user data. To accommodate for this, we first consider a large set of advertisement data on Facebook and use natural language processing (NLP) to extract key concepts that we call conceptual nodes. To predict the value of CTR for a combination of conceptual nodes, we use the advertisement data to train four machine learning (ML) models. We then cast the problem of finding the optimal combination of conceptual nodes as an optimization problem. Given a certain budget $k$, we are interested in finding the optimal combination of conceptual nodes that maximize the CTR. A discussion of the hardness and possible NP-hardness of the optimization problem is provided. Then, we propose a greedy algorithm and a genetic algorithm to find near-optimal combinations of conceptual nodes in polynomial time, with the genetic algorithm nearly matching the optimal solution. We observe that Decision Tree Regressor and Random Forest Regressor exhibit the highest Pearson correlation coefficients w.r.t. click predictions and real click values. Additionally, we find that the conceptual nodes of "politics", "celebrity", and "organization" are notably more influential than other considered conceptual nodes.
△ Less
Submitted 16 September, 2020; v1 submitted 5 November, 2019;
originally announced November 2019.
-
A Hierarchical Approach for Visual Storytelling Using Image Description
Authors:
Md Sultan Al Nahian,
Tasmia Tasrin,
Sagar Gandhi,
Ryan Gaines,
Brent Harrison
Abstract:
One of the primary challenges of visual storytelling is developing techniques that can maintain the context of the story over long event sequences to generate human-like stories. In this paper, we propose a hierarchical deep learning architecture based on encoder-decoder networks to address this problem. To better help our network maintain this context while also generating long and diverse senten…
▽ More
One of the primary challenges of visual storytelling is developing techniques that can maintain the context of the story over long event sequences to generate human-like stories. In this paper, we propose a hierarchical deep learning architecture based on encoder-decoder networks to address this problem. To better help our network maintain this context while also generating long and diverse sentences, we incorporate natural language image descriptions along with the images themselves to generate each story sentence. We evaluate our system on the Visual Storytelling (VIST) dataset and show that our method outperforms state-of-the-art techniques on a suite of different automatic evaluation metrics. The empirical results from this evaluation demonstrate the necessities of different components of our proposed architecture and shows the effectiveness of the architecture for visual storytelling.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
Monte-Carlo Tree Search for Simulation-based Strategy Analysis
Authors:
Alexander Zook,
Brent Harrison,
Mark O. Riedl
Abstract:
Games are often designed to shape player behavior in a desired way; however, it can be unclear how design decisions affect the space of behaviors in a game. Designers usually explore this space through human playtesting, which can be time-consuming and of limited effectiveness in exhausting the space of possible behaviors. In this paper, we propose the use of automated planning agents to simulate…
▽ More
Games are often designed to shape player behavior in a desired way; however, it can be unclear how design decisions affect the space of behaviors in a game. Designers usually explore this space through human playtesting, which can be time-consuming and of limited effectiveness in exhausting the space of possible behaviors. In this paper, we propose the use of automated planning agents to simulate humans of varying skill levels to generate game playthroughs. Metrics can then be gathered from these playthroughs to evaluate the current game design and identify its potential flaws. We demonstrate this technique in two games: the popular word game Scrabble and a collectible card game of our own design named Cardonomicon. Using these case studies, we show how using simulated agents to model humans of varying skill levels allows us to extract metrics to describe game balance (in the case of Scrabble) and highlight potential design flaws (in the case of Cardonomicon).
△ Less
Submitted 4 August, 2019;
originally announced August 2019.
-
Automated Rationale Generation: A Technique for Explainable AI and its Effects on Human Perceptions
Authors:
Upol Ehsan,
Pradyumna Tambwekar,
Larry Chan,
Brent Harrison,
Mark Riedl
Abstract:
Automated rationale generation is an approach for real-time explanation generation whereby a computational model learns to translate an autonomous agent's internal state and action data representations into natural language. Training on human explanation data can enable agents to learn to generate human-like explanations for their behavior. In this paper, using the context of an agent that plays F…
▽ More
Automated rationale generation is an approach for real-time explanation generation whereby a computational model learns to translate an autonomous agent's internal state and action data representations into natural language. Training on human explanation data can enable agents to learn to generate human-like explanations for their behavior. In this paper, using the context of an agent that plays Frogger, we describe (a) how to collect a corpus of explanations, (b) how to train a neural rationale generator to produce different styles of rationales, and (c) how people perceive these rationales. We conducted two user studies. The first study establishes the plausibility of each type of generated rationale and situates their user perceptions along the dimensions of confidence, humanlike-ness, adequate justification, and understandability. The second study further explores user preferences between the generated rationales with regard to confidence in the autonomous agent, communicating failure and unexpected behavior. Overall, we find alignment between the intended differences in features of the generated rationales and the perceived differences by users. Moreover, context permitting, participants preferred detailed rationales to form a stable mental model of the agent's behavior.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Controllable Neural Story Plot Generation via Reward Shaping
Authors:
Pradyumna Tambwekar,
Murtaza Dhuliawala,
Lara J. Martin,
Animesh Mehta,
Brent Harrison,
Mark O. Riedl
Abstract:
Language-modeling--based approaches to story plot generation attempt to construct a plot by sampling from a language model (LM) to predict the next character, word, or sentence to add to the story. LM techniques lack the ability to receive guidance from the user to achieve a specific goal, resulting in stories that don't have a clear sense of progression and lack coherence. We present a reward-sha…
▽ More
Language-modeling--based approaches to story plot generation attempt to construct a plot by sampling from a language model (LM) to predict the next character, word, or sentence to add to the story. LM techniques lack the ability to receive guidance from the user to achieve a specific goal, resulting in stories that don't have a clear sense of progression and lack coherence. We present a reward-shaping technique that analyzes a story corpus and produces intermediate rewards that are backpropagated into a pre-trained LM in order to guide the model towards a given goal. Automated evaluations show our technique can create a model that generates story plots which consistently achieve a specified goal. Human-subject studies show that the generated stories have more plausible event ordering than baseline plot generation techniques.
△ Less
Submitted 18 January, 2023; v1 submitted 27 September, 2018;
originally announced September 2018.
-
Explore, Exploit or Listen: Combining Human Feedback and Policy Model to Speed up Deep Reinforcement Learning in 3D Worlds
Authors:
Zhiyu Lin,
Brent Harrison,
Aaron Keech,
Mark O. Riedl
Abstract:
We describe a method to use discrete human feedback to enhance the performance of deep learning agents in virtual three-dimensional environments by extending deep-reinforcement learning to model the confidence and consistency of human feedback. This enables deep reinforcement learning algorithms to determine the most appropriate time to listen to the human feedback, exploit the current policy mode…
▽ More
We describe a method to use discrete human feedback to enhance the performance of deep learning agents in virtual three-dimensional environments by extending deep-reinforcement learning to model the confidence and consistency of human feedback. This enables deep reinforcement learning algorithms to determine the most appropriate time to listen to the human feedback, exploit the current policy model, or explore the agent's environment. Managing the trade-off between these three strategies allows DRL agents to be robust to inconsistent or intermittent human feedback. Through experimentation using a synthetic oracle, we show that our technique improves the training speed and overall performance of deep reinforcement learning in navigating three-dimensional environments using Minecraft. We further show that our technique is robust to highly innacurate human feedback and can also operate when no human feedback is given.
△ Less
Submitted 22 June, 2021; v1 submitted 12 September, 2017;
originally announced September 2017.
-
Guiding Reinforcement Learning Exploration Using Natural Language
Authors:
Brent Harrison,
Upol Ehsan,
Mark O. Riedl
Abstract:
In this work we present a technique to use natural language to help reinforcement learning generalize to unseen environments. This technique uses neural machine translation, specifically the use of encoder-decoder networks, to learn associations between natural language behavior descriptions and state-action information. We then use this learned model to guide agent exploration using a modified ve…
▽ More
In this work we present a technique to use natural language to help reinforcement learning generalize to unseen environments. This technique uses neural machine translation, specifically the use of encoder-decoder networks, to learn associations between natural language behavior descriptions and state-action information. We then use this learned model to guide agent exploration using a modified version of policy shaping to make it more effective at learning in unseen environments. We evaluate this technique using the popular arcade game, Frogger, under ideal and non-ideal conditions. This evaluation shows that our modified policy shaping algorithm improves over a Q-learning agent as well as a baseline version of policy shaping.
△ Less
Submitted 13 September, 2017; v1 submitted 26 July, 2017;
originally announced July 2017.
-
Event Representations for Automated Story Generation with Deep Neural Nets
Authors:
Lara J. Martin,
Prithviraj Ammanabrolu,
Xinyu Wang,
William Hancock,
Shruti Singh,
Brent Harrison,
Mark O. Riedl
Abstract:
Automated story generation is the problem of automatically selecting a sequence of events, actions, or words that can be told as a story. We seek to develop a system that can generate stories by learning everything it needs to know from textual story corpora. To date, recurrent neural networks that learn language models at character, word, or sentence levels have had little success generating cohe…
▽ More
Automated story generation is the problem of automatically selecting a sequence of events, actions, or words that can be told as a story. We seek to develop a system that can generate stories by learning everything it needs to know from textual story corpora. To date, recurrent neural networks that learn language models at character, word, or sentence levels have had little success generating coherent stories. We explore the question of event representations that provide a mid-level of abstraction between words and sentences in order to retain the semantic information of the original data while minimizing event sparsity. We present a technique for preprocessing textual story data into event sequences. We then present a technique for automated story generation whereby we decompose the problem into the generation of successive events (event2event) and the generation of natural language sentences from events (event2sentence). We give empirical results comparing different event representations and their effects on event successor generation and the translation of events to natural language.
△ Less
Submitted 12 September, 2017; v1 submitted 5 June, 2017;
originally announced June 2017.
-
Enter the Matrix: Safely Interruptible Autonomous Systems via Virtualization
Authors:
Mark O. Riedl,
Brent Harrison
Abstract:
Autonomous systems that operate around humans will likely always rely on kill switches that stop their execution and allow them to be remote-controlled for the safety of humans or to prevent damage to the system. It is theoretically possible for an autonomous system with sufficient sensor and effector capability that learn online using reinforcement learning to discover that the kill switch depriv…
▽ More
Autonomous systems that operate around humans will likely always rely on kill switches that stop their execution and allow them to be remote-controlled for the safety of humans or to prevent damage to the system. It is theoretically possible for an autonomous system with sufficient sensor and effector capability that learn online using reinforcement learning to discover that the kill switch deprives it of long-term reward and thus learn to disable the switch or otherwise prevent a human operator from using the switch. This is referred to as the big red button problem. We present a technique that prevents a reinforcement learning agent from learning to disable the kill switch. We introduce an interruption process in which the agent's sensors and effectors are redirected to a virtual simulation where it continues to believe it is receiving reward. We illustrate our technique in a simple grid world environment.
△ Less
Submitted 26 November, 2018; v1 submitted 29 March, 2017;
originally announced March 2017.
-
Rationalization: A Neural Machine Translation Approach to Generating Natural Language Explanations
Authors:
Upol Ehsan,
Brent Harrison,
Larry Chan,
Mark O. Riedl
Abstract:
We introduce AI rationalization, an approach for generating explanations of autonomous system behavior as if a human had performed the behavior. We describe a rationalization technique that uses neural machine translation to translate internal state-action representations of an autonomous agent into natural language. We evaluate our technique in the Frogger game environment, training an autonomous…
▽ More
We introduce AI rationalization, an approach for generating explanations of autonomous system behavior as if a human had performed the behavior. We describe a rationalization technique that uses neural machine translation to translate internal state-action representations of an autonomous agent into natural language. We evaluate our technique in the Frogger game environment, training an autonomous game playing agent to rationalize its action choices using natural language. A natural language training corpus is collected from human players thinking out loud as they play the game. We motivate the use of rationalization as an approach to explanation generation and show the results of two experiments evaluating the effectiveness of rationalization. Results of these evaluations show that neural machine translation is able to accurately generate rationalizations that describe agent behavior, and that rationalizations are more satisfying to humans than other alternative methods of explanation.
△ Less
Submitted 19 December, 2017; v1 submitted 24 February, 2017;
originally announced February 2017.
-
An empirical template library of stellar spectra for a wide range of spectral classes, luminosity classes, and metallicities using SDSS BOSS spectra
Authors:
Aurora Y. Kesseli,
Andrew A. West,
Mark Veyette,
Brandon Harrison,
Dan Feldman,
John J. Bochanski
Abstract:
We present a library of empirical stellar spectra created using spectra from the Sloan Digital Sky Survey's Baryon Oscillation Spectroscopic Survey (BOSS). The templates cover spectral types O5 through L3, are binned by metallicity from -2.0 dex through +1.0 dex and are separated into main sequence (dwarf) stars and giant stars. With recently developed M dwarf metallicity indicators, we are able t…
▽ More
We present a library of empirical stellar spectra created using spectra from the Sloan Digital Sky Survey's Baryon Oscillation Spectroscopic Survey (BOSS). The templates cover spectral types O5 through L3, are binned by metallicity from -2.0 dex through +1.0 dex and are separated into main sequence (dwarf) stars and giant stars. With recently developed M dwarf metallicity indicators, we are able to extend the metallicity bins down through the spectral subtype M8, making this the first empirical library with this degree of temperature \emph{and} metallicity coverage. The wavelength coverage for the templates is from 3650 Angstroms through 10200 Angstroms at a resolution better than R~2000. Using the templates, we identify trends in color space with metallicity and surface gravity, which will be useful for analyzing large data sets from upcoming missions like LSST. Along with the templates, we are releasing a code for automatically (and/or visually) identifying the spectral type and metallicity of a star.
△ Less
Submitted 22 March, 2017; v1 submitted 22 February, 2017;
originally announced February 2017.
-
Three Hours a Day: Understanding Current Teen Practices of Smartphone Application Use
Authors:
Frank Bentley,
Karen Church,
Beverly Harrison,
Kent Lyons,
Matthew Rafalow
Abstract:
Teens are using mobile devices for an increasing number of activities. Smartphones and a variety of mobile apps for communication, entertainment, and productivity have become an integral part of their lives. This mobile phone use has evolved rapidly as technology has changed and thus studies from even 2 or 3 years ago may not reflect new patterns and practices as smartphones have become more sophi…
▽ More
Teens are using mobile devices for an increasing number of activities. Smartphones and a variety of mobile apps for communication, entertainment, and productivity have become an integral part of their lives. This mobile phone use has evolved rapidly as technology has changed and thus studies from even 2 or 3 years ago may not reflect new patterns and practices as smartphones have become more sophisticated. In order to understand current teen's practices around smartphone use, we conducted a two week, mixed-methods study with 14 diverse teens. Through voicemail diaries, interviews, and real world usage data from a logging application installed on their smartphones, we developed an understanding of the types of apps used by teens, when they use these apps, and their reasons for using specific apps in particular situations. We found that the teens in our study used their smartphones for an average of almost 3 hours per day and that two-thirds of all app use involved interacting with an average of almost 10 distinct communications applications. From our study data, we highlight key implications for the design of future mobile apps or services, specifically new social and communications-related applications that allow teens to maintain desired levels of privacy and permanence on the content that they share.
△ Less
Submitted 17 October, 2015;
originally announced October 2015.
-
Parsec-Scale Behavior of Blazars during High Gamma-Ray States
Authors:
S. Jorstad,
A. Marscher,
I. Agudo,
B. Harrison
Abstract:
We compare the γ-ray light curves of the blazars, constructed with data provided by the Fermi Large Area Telescope, with flux and polarization variations in the VLBI core and bright superluminal knots obtained via monthly monitoring with the Very Long Baseline Array at 43 GHz. For all blazars in the sample that exhibit a high γ-ray state on time scales from several weeks to several months, an incr…
▽ More
We compare the γ-ray light curves of the blazars, constructed with data provided by the Fermi Large Area Telescope, with flux and polarization variations in the VLBI core and bright superluminal knots obtained via monthly monitoring with the Very Long Baseline Array at 43 GHz. For all blazars in the sample that exhibit a high γ-ray state on time scales from several weeks to several months, an increase of the total flux in the mm-wave core is contemporaneous with the γ-ray activity (more than a third of the sample). Here we present the results for quasars with the most extreme γ-ray behavior (3C 454.3, 3C 273, 3C 279, 1222+216, and 1633+382). The sources show that in addition to the total flux intensity behavior, a maximum in the degree of polarization in the core or bright superluminal knot nearest to the core coincides with the time of a γ-ray peak to within the accuracy of the sampling of the radio data. These argue in favor of location of many of γ-ray outbursts in blazars outside of the broad line region, either in the vicinity or downstream of the mm-wave VLBI core.
△ Less
Submitted 31 October, 2011;
originally announced November 2011.
-
Symmetric Encapsulated Multi-Methods
Authors:
David Lievens,
Bill Harrison
Abstract:
In object systems, classes take the role of modules, and interfaces consist of methods. Because methods are encapsulated in objects, interfaces in object systems do not allow abstracting over \emph{where} methods are implemented. This implies that any change to the implementation structure may cause a rippling effect. Sometimes this unduly restricts the scope of software evolution, in particular f…
▽ More
In object systems, classes take the role of modules, and interfaces consist of methods. Because methods are encapsulated in objects, interfaces in object systems do not allow abstracting over \emph{where} methods are implemented. This implies that any change to the implementation structure may cause a rippling effect. Sometimes this unduly restricts the scope of software evolution, in particular for methods with multiple parameters where there is no clear owner. We propose a simple scheme where symmetric methods may be defined in the classes of any of their parameters. This allows client code to be oblivious of what class contains a method implementation, and therefore immune against it changing. When combined with multiple dynamic dispatch, this scheme allows for modular extensibility where a method defined in one class is overridden by a method defined in a class that is not its subtype. In this paper, we illustrate the scheme by extending a core calculus of class-based languages with these symmetric encapsulated multi-methods, and prove the result sound.
△ Less
Submitted 16 October, 2011;
originally announced October 2011.
-
Connection between the Accretion Disk and Jet in the Radio Galaxy 3C 111
Authors:
Ritaban Chatterjee,
Alan P. Marscher,
Svetlana G. Jorstad,
Alex Markowitz,
Elizabeth Rivers,
Richard E. Rothschild,
Ian M. McHardy,
Margo F. Aller,
Hugh D. Aller,
Anne Lahteenmaki,
Merja Tornikoski,
Brandon Harrison,
Iv'an Agudo,
Jos'e L. Gomez,
Brian W. Taylor,
Mark Gurwell
Abstract:
We present the results of extensive multi-frequency monitoring of the radio galaxy 3C 111 between 2004 and 2010 at X-ray (2.4--10 keV), optical (R band), and radio (14.5, 37, and 230 GHz) wave bands, as well as multi-epoch imaging with the Very Long Baseline Array (VLBA) at 43 GHz. Over the six years of observation, significant dips in the X-ray light curve are followed by ejections of bright supe…
▽ More
We present the results of extensive multi-frequency monitoring of the radio galaxy 3C 111 between 2004 and 2010 at X-ray (2.4--10 keV), optical (R band), and radio (14.5, 37, and 230 GHz) wave bands, as well as multi-epoch imaging with the Very Long Baseline Array (VLBA) at 43 GHz. Over the six years of observation, significant dips in the X-ray light curve are followed by ejections of bright superluminal knots in the VLBA images. This shows a clear connection between the radiative state near the black hole, where the X-rays are produced, and events in the jet. The X-ray continuum flux and Fe line intensity are strongly correlated, with a time lag shorter than 90 days and consistent with zero. This implies that the Fe line is generated within 90 light-days of the source of the X-ray continuum. The power spectral density function of X-ray variations contains a break, with steeper slope at shorter timescales. The break timescale of 13 (+12,-6) days is commensurate with scaling according to the mass of the central black hole based on observations of Seyfert galaxies and black hole X-ray binaries (BHXRBs). The data are consistent with the standard paradigm, in which the X-rays are predominantly produced by inverse Compton scattering of thermal optical/UV seed photons from the accretion disk by a distribution of hot electrons --- the corona --- situated near the disk. Most of the optical emission is generated in the accretion disk due to reprocessing of the X-ray emission. The relationships that we have uncovered between the accretion disk and the jet in 3C 111, as well as in the FR I radio galaxy 3C 120 in a previous paper, support the paradigm that active galactic nuclei and Galactic BHXRBs are fundamentally similar, with characteristic time and size scales proportional to the mass of the central black hole
△ Less
Submitted 4 April, 2011;
originally announced April 2011.
-
Connection between Gamma-Ray Variations and Disturbances in the Jets of Blazars
Authors:
S. Jorstad,
A. Marscher,
F. D'Arcangelo,
B. Harrison
Abstract:
We perform monthly total and polarized intensity imaging of a sample of $γ$-ray blazars (33 sources) with the Very Long Baseline Array (VLBA) at 43 GHz with the high resolution of 0.1 milliarcseconds. From Summer 2008 to October 2009 several of these blazars triggered Astronomical Telegrams due to a high $γ$-ray state detected by the Fermi Large Area Telescope (LAT): AO 0235+164, 3C 273, 3C 279,…
▽ More
We perform monthly total and polarized intensity imaging of a sample of $γ$-ray blazars (33 sources) with the Very Long Baseline Array (VLBA) at 43 GHz with the high resolution of 0.1 milliarcseconds. From Summer 2008 to October 2009 several of these blazars triggered Astronomical Telegrams due to a high $γ$-ray state detected by the Fermi Large Area Telescope (LAT): AO 0235+164, 3C 273, 3C 279, PKS 1510-089, and 3C 454.3. We have found that 1) $γ$-ray flares in these blazars occur during an increase of the flux in the 43 GHz VLBI core; 2) strong $γ$-ray activity, consisting of several flares of various amplitudes and durations (weeks to months), is simultaneous with the propagation of a superluminal knot in the inner jet, as found previously for BL Lac (Marscher et al. 2008); 3) coincidence of a superluminal knot with the 43 GHz core precedes the most intense $γ$-ray flare by 36$\pm$24 days. Our results strongly support the idea that the most dramatic $γ$-ray outbursts of blazars originate in the vicinity of the mm-wave core of the relativistic jet. These results are preliminary and should be tested by future monitoring with the VLBA and Fermi.
△ Less
Submitted 14 January, 2010; v1 submitted 28 December, 2009;
originally announced December 2009.
-
Backlund-Transformation-Related Recursion Operators: Application to the Self-Dual Yang-Mills Equation
Authors:
C. J. Papachristou,
B. Kent Harrison
Abstract:
By using the self-dual Yang-Mills (SDYM) equation as an example, we study a method for relating symmetries and recursion operators of two partial differential equations connected to each other by a non-auto-Backlund transformation. We prove the Lie-algebra isomorphism between the symmetries of the SDYM equation and those of the potential SDYM (PSDYM) equation, and we describe the construction of t…
▽ More
By using the self-dual Yang-Mills (SDYM) equation as an example, we study a method for relating symmetries and recursion operators of two partial differential equations connected to each other by a non-auto-Backlund transformation. We prove the Lie-algebra isomorphism between the symmetries of the SDYM equation and those of the potential SDYM (PSDYM) equation, and we describe the construction of the recursion operators for these two systems. Using certain known aspects of the PSDYM symmetry algebra, we draw conclusions regarding the Lie algebraic structure of the "potential symmetries" of the SDYM equation.
△ Less
Submitted 20 June, 2023; v1 submitted 5 September, 2008;
originally announced September 2008.
-
A Method for Constructing a Lax Pair for the Ernst Equation
Authors:
C. J. Papachristou,
B. Kent Harrison
Abstract:
A systematic construction of a Lax pair and an infinite set of conservation laws for the Ernst equation is described. The matrix form of this equation is rewritten as a differential ideal of gl(2,R)-valued differential forms, and its symmetry condition is expressed as an exterior equation which is linear in the symmetry characteristic and has the form of a conservation law. By means of a recursi…
▽ More
A systematic construction of a Lax pair and an infinite set of conservation laws for the Ernst equation is described. The matrix form of this equation is rewritten as a differential ideal of gl(2,R)-valued differential forms, and its symmetry condition is expressed as an exterior equation which is linear in the symmetry characteristic and has the form of a conservation law. By means of a recursive process, an infinite collection of such laws is then obtained, and the conserved "charges" are used to derive a linear exterior equation whose components constitute a Lax pair.
△ Less
Submitted 26 October, 2009; v1 submitted 9 May, 2008;
originally announced May 2008.
-
The Differential Form Method for Finding Symmetries
Authors:
B. Kent Harrison
Abstract:
This article reviews the use of differential forms and Lie derivatives to find symmetries of differential equations, as originally presented by Harrison and Estabrook, J. Math. Phys., 12 (1971), 653. An outline of the method is given, followed by examples and references to recent papers using the method.
This article reviews the use of differential forms and Lie derivatives to find symmetries of differential equations, as originally presented by Harrison and Estabrook, J. Math. Phys., 12 (1971), 653. An outline of the method is given, followed by examples and references to recent papers using the method.
△ Less
Submitted 18 October, 2005;
originally announced October 2005.