1,491 results on '"Rejection sampling"'
Search Results
2. Rank-transformed subsampling: inference for multiple data splitting and exchangeable p-values.
- Author
-
Guo, F Richard and Shah, Rajen D
- Subjects
FALSE positive error ,GOODNESS-of-fit tests ,REGRESSION analysis ,CONFIDENCE intervals ,MACHINE learning ,QUANTILE regression - Abstract
Many testing problems are readily amenable to randomized tests, such as those employing data splitting. However, despite their usefulness in principle, randomized tests have obvious drawbacks. Firstly, two analyses of the same dataset may lead to different results. Secondly, the test typically loses power because it does not fully utilize the entire sample. As a remedy to these drawbacks, we study how to combine the test statistics or p -values resulting from multiple random realizations, such as through random data splits. We develop rank-transformed subsampling as a general method for delivering large-sample inference about the combined statistic or p -value under mild assumptions. We apply our methodology to a wide range of problems, including testing unimodality in high-dimensional data, testing goodness-of-fit of parametric quantile regression models, testing no direct effect in a sequentially randomized trial and calibrating cross-fit double machine learning confidence intervals. In contrast to existing p -value aggregation schemes that can be highly conservative, our method enjoys Type I error control that asymptotically approaches the nominal level. Moreover, compared to using the ordinary subsampling, we show that our rank transform can remove the first-order bias in approximating the null under alternatives and greatly improve power. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
3. A Laser-Based SLAM Algorithm of the Unmanned Surface Vehicle for Accurate Localization and Mapping in an Inland Waterway Scenario.
- Author
-
Wang, Yang, Liu, Chao, Liu, Jiahe, Wang, Jinzhe, Liu, Jianbin, Zheng, Kai, and Zheng, Rencheng
- Subjects
POINT cloud ,AUTONOMOUS vehicles ,UNITS of measurement ,ACCURACY of information ,LIDAR - Abstract
It is important to improve the localization accuracy of the unmanned surface vehicle (USV) for ensuring safe navigation in an inland waterway scenario. However, the localization accuracy of the USV is affected by the limited availability of global navigation satellite system signals, the sparsity of feature points, and the high scene similarity in inland waterway scenarios. Therefore, this paper proposes a laser-based simultaneous localization and mapping (SLAM) algorithm for accurate localization and mapping in inland waterway scenarios. Inertial measurement unit (IMU) data are integrated with lidar data to address motion distortion caused by the frequent motion of the USV. Subsequently, a generalized iterative closest point (GICP) algorithm incorporating rejection sampling is integrated to enhance the accuracy of point cloud matching, involving a two-phase filtering process to select key feature points for matching. Additionally, a mixed global descriptor is constructed by combining point cloud intensity and distance information to improve the accuracy of loop closure detection. Experiments are conducted on the USV-Inland datasets to evaluate the performance of the proposed algorithm. The experimental results show that the proposed algorithm generates accurate mapping and significantly improves localization accuracy by 25.6%, 18.5%, and 23.6% compared to A-LOAM, LeGO-LOAM, and ISC-LOAM, respectively. These results demonstrate that the proposed algorithm achieves accurate localization and mapping in an inland waterway scenario. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Reliable simulation of extremely-truncated log-concave distributions.
- Author
-
Lambardi di San Miniato, M. and Kenne Pagui, E. C.
- Subjects
- *
RANDOM numbers , *DISTRIBUTION (Probability theory) , *REGRESSION analysis , *MOTIVATION (Psychology) - Abstract
Inverse transform sampling is a general method to generate non-uniform-distributed random numbers, but it can be unstable when simulating extremely truncated distributions. Many famous probability distributions are log-concave; this feature is preserved under truncation, so Devroye's automatic rejection sampler is available for this task. This method is more stable than inverse transform sampling and uses a very simple envelope with an acceptance rate greater than 20%, independent of the distribution. The aim of this paper is threefold: firstly, to warn the public against incorrect simulation of truncated distributions; secondly, to motivate a more extensive use of rejection sampling to mitigate these issues; lastly, to propose Devroye's automatic sampler as a practical standard for log-concave distributions. We illustrate the proposal with simulations based on Tweedie distributions due to their relevance in regression analysis. The proposed sampler is shown to work under more extreme truncations than the inverse transform method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Efficient Sampling From the Watson Distribution in Arbitrary Dimensions.
- Author
-
Sablica, Lukas, Hornik, Kurt, and Leydold, Josef
- Subjects
- *
MATRIX inversion , *SAMPLING methods , *ALGORITHMS , *SAWS - Abstract
AbstractIn this article, we present two efficient methods for sampling from the Watson distribution in arbitrary dimensions. The first method adapts the rejection sampling algorithm from
Kent, Ganeiber, and Mardia , originally designed for Bingham distributions, using angular central Gaussian envelopes. For the Watson distribution, we derive a closed-form expression for the parameters that maximize sampling efficiency, which is further investigated and bounded by asymptotic results. This approach avoids the curse of dimensionality through a smart matrix inversion, enabling fast runtimes even in high dimensions. The second method, based onSaw , employs adaptive rejection sampling from a projected distribution. This algorithm is also effective in all dimensions and offers rapid sampling capabilities. Finally, our simulation study compares the two main methods, revealing that each excels under different conditions: the first method is more efficient for small samples or large dimensions, while the second performs better with larger samples and more concentrated distributions. Both algorithms are available in the R package watson on CRAN. Supplementary materials for this article are available online. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
6. The Transformed MG-Extended Exponential Distribution: Properties and Applications.
- Author
-
Menberu, Addisalem Assaye and Goshu, Ayele Taye
- Subjects
MONTE Carlo method ,DISTRIBUTION (Probability theory) ,LOGNORMAL distribution ,MAXIMUM likelihood statistics ,HAZARD function (Statistics) - Abstract
Our research paper introduces a newly developed probability distribution called the transformed MG-extended exponential (TMGEE) distribution. This distribution is derived from the exponential distribution using the modified Frechet approach, but it has a more adaptable hazard function and unique features that we have explained in detail. We conducted simulation studies using two methods: rejection sampling and inverse transform sampling, to produce summaries and show distributional properties. Moreover, we applied the TMGEE distribution to three real datasets from the health area to demonstrate its applicability. We used the maximum likelihood estimation technique to estimate the distribution's parameters. Our results indicate that the TMGEE distribution provides a better fit for the three sets of data as compared to nine other commonly used probability distributions, including Weibull, exponential, and lognormal distributions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. 随机预言机模型下基于身份的格基可链接环签名.
- Author
-
谢 佳, 王 露, 刘仕钊, 高军涛, and 王保仓
- Abstract
Copyright of Journal of Frontiers of Computer Science & Technology is the property of Beijing Journal of Computer Engineering & Applications Journal Co Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
8. -GPTs: A New Approach to Autoregressive Models
- Author
-
Pannatier, Arnaud, Courdier, Evann, Fleuret, François, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Bifet, Albert, editor, Davis, Jesse, editor, Krilavičius, Tomas, editor, Kull, Meelis, editor, Ntoutsi, Eirini, editor, and Žliobaitė, Indrė, editor
- Published
- 2024
- Full Text
- View/download PDF
9. Polytopes in the Fiat-Shamir with Aborts Paradigm
- Author
-
Bambury, Henry, Beguinet, Hugo, Ricosset, Thomas, Sageloli, Éric, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Reyzin, Leonid, editor, and Stebila, Douglas, editor
- Published
- 2024
- Full Text
- View/download PDF
10. The Transformed MG-Extended Exponential Distribution: Properties and Applications
- Author
-
Addisalem Assaye Menberu and Ayele Taye Goshu
- Subjects
Exponential distribution ,Inverse transform sampling ,Maximum likelihood estimates ,Monte Carlo simulation ,Rejection sampling ,Probabilities. Mathematical statistics ,QA273-280 - Abstract
Abstract Our research paper introduces a newly developed probability distribution called the transformed MG-extended exponential (TMGEE) distribution. This distribution is derived from the exponential distribution using the modified Frechet approach, but it has a more adaptable hazard function and unique features that we have explained in detail. We conducted simulation studies using two methods: rejection sampling and inverse transform sampling, to produce summaries and show distributional properties. Moreover, we applied the TMGEE distribution to three real datasets from the health area to demonstrate its applicability. We used the maximum likelihood estimation technique to estimate the distribution’s parameters. Our results indicate that the TMGEE distribution provides a better fit for the three sets of data as compared to nine other commonly used probability distributions, including Weibull, exponential, and lognormal distributions.
- Published
- 2024
- Full Text
- View/download PDF
11. A Laser-Based SLAM Algorithm of the Unmanned Surface Vehicle for Accurate Localization and Mapping in an Inland Waterway Scenario
- Author
-
Yang Wang, Chao Liu, Jiahe Liu, Jinzhe Wang, Jianbin Liu, Kai Zheng, and Rencheng Zheng
- Subjects
unmanned surface vehicle ,inland waterway ,laser-based SLAM ,rejection sampling ,loop closure detection ,mixed global descriptor ,Naval architecture. Shipbuilding. Marine engineering ,VM1-989 ,Oceanography ,GC1-1581 - Abstract
It is important to improve the localization accuracy of the unmanned surface vehicle (USV) for ensuring safe navigation in an inland waterway scenario. However, the localization accuracy of the USV is affected by the limited availability of global navigation satellite system signals, the sparsity of feature points, and the high scene similarity in inland waterway scenarios. Therefore, this paper proposes a laser-based simultaneous localization and mapping (SLAM) algorithm for accurate localization and mapping in inland waterway scenarios. Inertial measurement unit (IMU) data are integrated with lidar data to address motion distortion caused by the frequent motion of the USV. Subsequently, a generalized iterative closest point (GICP) algorithm incorporating rejection sampling is integrated to enhance the accuracy of point cloud matching, involving a two-phase filtering process to select key feature points for matching. Additionally, a mixed global descriptor is constructed by combining point cloud intensity and distance information to improve the accuracy of loop closure detection. Experiments are conducted on the USV-Inland datasets to evaluate the performance of the proposed algorithm. The experimental results show that the proposed algorithm generates accurate mapping and significantly improves localization accuracy by 25.6%, 18.5%, and 23.6% compared to A-LOAM, LeGO-LOAM, and ISC-LOAM, respectively. These results demonstrate that the proposed algorithm achieves accurate localization and mapping in an inland waterway scenario.
- Published
- 2024
- Full Text
- View/download PDF
12. Quantum inference for Bayesian networks: an empirical study
- Author
-
Ohno, Hiroshi
- Published
- 2025
- Full Text
- View/download PDF
13. To Reject or Not Reject: That Is the Question. The Case of BIKE Post Quantum KEM
- Author
-
Drucker, Nir, Gueron, Shay, Kostic, Dusan, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Latifi, Shahram, editor
- Published
- 2023
- Full Text
- View/download PDF
14. Estimating the information content of genetic sequence data.
- Author
-
Thorvaldsen, Steinar and Hössjer, Ola
- Subjects
MOLECULAR biology ,STATISTICAL models - Abstract
A prominent problem in analysing genetic information has been a lack of mathematical frameworks for doing so. This article offers some new statistical methods to model and analyse information content in proteins, protein families, and their sequences. We discuss how to understand the qualitative aspects of genetic information, how to estimate the quantitative aspects of it, and implement a statistical model where the qualitative genetic function is represented jointly with its probabilistic metric of self-information. The functional information of protein families in the Cath and Pfam databases are estimated using a method inspired by rejection sampling. Scientific work may place these components of information as one of the fundamental aspects of molecular biology. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. An Efficient Self-Tuning Proposal Distribution for Random Variate Generation With Complex Density Representation
- Author
-
Rui Lyu, Bopeng Fang, Zhurong Dong, Chen Zhao, and Jing Wang
- Subjects
Monte Carlo methods ,generative model ,parameter optimization ,rejection sampling ,machine learning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Random variate generation has been widely used in various engineering applications and model frameworks. The introduction of the proposal distribution makes this kind of methods can deal with more general sampling problems with complex probability density representation. However, the design of proposal distribution is usually difficult, especially when the target distribution is so complex that it contains asymmetric, multimodal and skewed, or even unsmooth, heavy tailed and illegal density, the sampling performance and efficiency will be greatly affected. In this paper, a novel parameter optimization method with efficient self-tuning strategy is proposed in order to automatically construct the optimal proposal distribution for any complex target density, which treats the design of proposal distribution as a parameter search process and search the optimal solution in an infeasible region by evaluating the loss of solution. The significant advantage of the proposed method is that the search based on infeasible region can converge to a good solution with only a few iterations, making our method far superior to other existing methods in efficiency, which is very suitable for the complex target distribution model with time-consuming density calculation process. Experimental results show the advantages of the proposed method in terms of search strategy, optimal solution performance, search efficiency and robustness.
- Published
- 2023
- Full Text
- View/download PDF
16. An Overview of MCMC Methods: From Theory to Applications
- Author
-
Karras, Christos, Karras, Aristeidis, Avlonitis, Markos, Sioutas, Spyros, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Maglogiannis, Ilias, editor, Iliadis, Lazaros, editor, Macintyre, John, editor, and Cortez, Paulo, editor
- Published
- 2022
- Full Text
- View/download PDF
17. Generic, efficient and isochronous Gaussian sampling over the integers
- Author
-
Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, and Yang Tao
- Subjects
Lattice-based cryptography ,Gaussian sampler ,Rejection sampling ,Timing attacks ,Trapdoor ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Gaussian sampling over the integers is one of the fundamental building blocks of lattice-based cryptography. Among the extensively used trapdoor sampling algorithms, it is ineluctable until now. Under the influence of numerous side-channel attacks, it is still challenging to construct a Gaussian sampler that is generic, efficient, and resistant to timing attacks. In this paper, our contribution is three-fold. First, we propose a secure, efficient exponential Bernoulli sampling algorithm. It can be applied to Gaussian samplers based on rejection samplings. We apply it to FALCON, a candidate of round 3 of the NIST post-quantum cryptography standardization project, and reduce its signature generation time by 13–14%. Second, we develop an isochronous Gaussian sampler based on rejection sampling. Our Algorithm can securely sample from Gaussian distributions with different standard deviations and arbitrary centers. We apply it to PALISADE (S&P 2018), an open-source lattice-based cryptography library. During the online phase of trapdoor sampling, the running time of the G-lattice sampling algorithm is reduced by 44.12% while resisting timing attacks. Third, we improve the efficiency of the COSAC sampler (PQC 2020). The new COSAC sampler is 1.46x–1.63x faster than the original and has the lowest expected number of trials among all Gaussian samplers based on rejection samplings. But it needs a more efficient algorithm sampling from the normal distribution to improve its performance.
- Published
- 2022
- Full Text
- View/download PDF
18. ADS-B中基于格的分层无证书消息可恢复认证方案.
- Author
-
农 强, 邵 猛, 张棒棒, and 刘梓禹
- Abstract
As the key technology of the new generation air traffic control, automatic dependent surveillance-broadcast (ADS-B) has been deployed in most airspace around the world. The existing ADS-B message authentication schemes mainly utilize traditional public key cryptosystem to achieve data security, which are complex for computation and vulnerable to the quantum attack. We apply latticebased cryptography to ADS-B communication security for the first time, and propose a hierarchical certificateless message authentication scheme supporting message recovery and batch verification simultaneously. The ADS-B airborne equipments are not required to manage certificates, and there is no key escrow problem. The ADS-B messages do not need to be transmitted with the signature, but can be recovered during verification. By utilizing rejection sampling and trapdoor-free technology, the proposed scheme requires just some computationally simple linear operations to realize message authentication. Our scheme is provably secure in the random oracle model under the assumption of the small integer solution (SIS). Experimental results of performance evaluation indicate that this scheme has significant performance improvement in saving computing overhead compared with related works under the same bit security level. It is very suitable for typical aeronautic electronic devices with limited computational resources. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. An Uncertain Optimization Method Based on Adaptive Discrete Approximation Rejection Sampling for Stochastic Programming with Incomplete Knowledge of Uncertainty.
- Author
-
Fang, Bopeng, Dong, Zhurong, Zhao, Chen, Liu, Zhi, and Wang, Jing
- Subjects
- *
STOCHASTIC programming , *MONTE Carlo method , *HEURISTIC , *STOCHASTIC models - Abstract
Stochastic programming has been widely used in various application scenarios and theoretical research works. However, these excellent methods depend on specific explicit probability modeling with complete knowledge of uncertainty, which is very limited in practical problem since there is usually no way to abstract complex uncertainties into the commonly used known probability models. In this paper, a novel generative model named the Adaptive Discrete Approximation Rejection Sampling is proposed for stochastic programming with incomplete knowledge of uncertainty, which can not only simulate uncertain scenarios from a complex explicit probability model that cannot meet the constraints of existing sampling methods, but also even simulate scenarios from a sample set related to uncertainty when the specific explicit probability model of uncertainty is missing or unavailable. The method is to establish the easy-to-sample proposal distribution by approximately transforming the complex hard-to-sample target probability model, to make the proposal distribution close enough to the target distribution, so as to achieve an efficient sampling while ensuring the performance of the model. On this basis, combining the Monte Carlo method and heuristic optimization, an uncertain optimization model for stochastic programming with incomplete knowledge of uncertainty is further constructed, to solve the unavailability of the existing stochastic programming methods in the absence of explicit probability model of uncertainty. Experimental results show the advantages of the proposed method in terms of applicability, adaptability, accuracy, efficiency and model performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Efficient simulation of p-tempered α-stable OU processes.
- Author
-
Grabchak, Michael and Sabino, Piergiacomo
- Abstract
We develop efficient methods for simulating processes of Ornstein–Uhlenbeck type related to the class of p-tempered α -stable ( TS α p ) distributions. Our results hold for both the univariate and multivariate cases and we consider both the case where the TS α p distribution is the stationary law and where it is the distribution of the background driving Lévy process. In the latter case, we also derive an explicit representation for the transition law as this was previous known only in certain special cases and only for p = 1 and α ∈ [ 0 , 1) . Simulation results suggest that our methods work well in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Hybrid uncertainty analysis and optimisation based on probability box for bus powertrain mounting system.
- Author
-
Zheng, Zhengzhong, Bu, Xiangjian, Hou, Liang, and Wang, Shaojie
- Subjects
- *
MONTE Carlo method , *EPISTEMIC uncertainty , *PROBABILITY theory , *BUSES , *UNCERTAINTY (Information theory) - Abstract
In engineering practice, the bus powertrain mounting system (BPMS) may have both epistemic and aleatory uncertainty under the influence of manufacturing, measurement, and assembly errors. The hybrid uncertainty in BPMS may result in over-design or insufficient design. Therefore, the probability box (p-box) model, which can handle both aleatory and epistemic variables, is introduced into the uncertainty analysis of BPMS. Considering the elastic connection between the compressor and powertrain, a 12-degree-of-freedom dynamic model is constructed to calculate the inherent characteristic of BPMS. A rejection sampling method based on the fast envelope function (RSMBFEF) is proposed to propagate the hybrid uncertainties. Then double-loop Monte Carlo method is used to be compared with RSMBFEF. To reduce the number of uncertainty analyses, a two-step uncertainty optimisation method is proposed. Finally, the proposed method's efficacy and accuracy are verified through a numerical case. The applicability of the p-box model is illustrated by comparing it with the BPMS model with only pure aleatory or pure interval variables. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. On the Rejection Rate of Exact Sampling Algorithm for Discrete Gaussian Distributions over the Integers.
- Author
-
Du, Yusong and Ma, Xiao
- Subjects
- *
INTEGERS , *GAUSSIAN integers , *STANDARD deviations , *RANDOM numbers , *ALGORITHMS - Abstract
A discrete Gaussian distribution over the integers is a Gaussian distribution restricted so that its support is the set of all the integers. This paper studies the problem of sampling exactly from discrete Gaussian distributions over the integers. It is required to generate integers according to a given discrete Gaussian distribution without any statistical discrepancy. In 2016, Karney proposed an exact sampling algorithm for discrete Gaussian distributions whose parameters are rational numbers. This algorithm uses rejection sampling, and it is a discretization of his algorithm for sampling exactly from the standard normal distribution. In this paper, we give a rigorous and complete analysis of the rejection rate of this algorithm, which was not given by Karney, and show that it cannot generate integers efficiently in the case where the standard deviation of the distribution is very small (e.g. much smaller than 1/2). Then, we present an alternative algorithm for this special case, which can sample exactly and efficiently from discrete Gaussian distributions with very small standard deviations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Exact simulation of the first passage time through a given level of jump diffusions.
- Author
-
Herrmann, Samuel and Massin, Nicolas
- Subjects
- *
DISTRIBUTION (Probability theory) , *STOCHASTIC differential equations , *POISSON processes , *SAMPLING (Process) , *BROWNIAN motion - Abstract
Continuous-time stochastic processes play an important role in the description of random phenomena. It is therefore important to study particular stopping times dependent on the trajectories of these processes. Two approaches are possible: introducing an explicit expression of their probability distribution, and evaluating values generated by numerical models. Choosing the second alternative, we propose an algorithm to generate the first passage time through a given level. The stochastic process under consideration is a one-dimensional jump diffusion that satisfies a stochastic differential equation driven by a Brownian motion. It is subject to random shocks that are characterised by an independent Poisson process. The proposed algorithm belongs to the family of rejection sampling procedures: the outcome of the algorithm and the stopping time under consideration are identically distributed. This algorithm is based on both the exact simulation of the diffusion value at a fixed time and on the exact simulation of the first passage time for continuous diffusion processes (see Herrmann and Zucca (2019)). At a fixed point in time, the main challenge is to generate the position of a continuous diffusion that is conditioned not to reach a given level before that time. We present the construction of the algorithm and numerical examples. We also discuss specific conditions leading to the recurrence of a jump diffusion process. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Sampling and filtering with Markov chains.
- Author
-
Kouritzin, Michael A.
- Subjects
- *
HIDDEN Markov models , *STOCHASTIC analysis , *MARKOV processes , *DISEASE progression , *EQUATIONS - Abstract
A new continuous-time Markov chain rate change formula is proven. This theorem is used to derive existence and uniqueness of novel filtering equations akin to the Duncan–Mortensen–Zakai equation and the Fujisaki–Kallianpur–Kunita equation but for Markov signals with general continuous-time Markov chain observations. The equations in this second theorem have the unique feature of being driven by both the observations and the process counting the observation transitions. A direct method of solving these filtering equations is also derived. Most results apply as special cases to the continuous-time Hidden Markov Models (CTHMM), which have become important in applications like disease progression tracking, The corresponding CTHMM results are stated as corollaries. Finally, application of our general theorems to Markov chain importance sampling, rejection sampling and branching particle filtering algorithms is also explained and these are illustrated by way of disease tracking simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Rejection-Based Simulation of Non-Markovian Agents on Complex Networks
- Author
-
Großmann, Gerrit, Bortolussi, Luca, Wolf, Verena, Kacprzyk, Janusz, Series Editor, Cherifi, Hocine, editor, Gaito, Sabrina, editor, Mendes, José Fernendo, editor, Moro, Esteban, editor, and Rocha, Luis Mateus, editor
- Published
- 2020
- Full Text
- View/download PDF
26. Arbitrary-Centered Discrete Gaussian Sampling over the Integers
- Author
-
Du, Yusong, Fan, Baoying, Wei, Baodian, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Liu, Joseph K., editor, and Cui, Hui, editor
- Published
- 2020
- Full Text
- View/download PDF
27. Some Statistical Aspects of the Truncated Multivariate Skew- t Distribution.
- Author
-
Morán-Vásquez, Raúl Alejandro, Zarrazola, Edwin, and Nagar, Daya K.
- Subjects
- *
SKEWNESS (Probability theory) , *AFFINE transformations , *MARGINAL distributions , *STATISTICAL sampling - Abstract
The multivariate skew-t distribution plays an important role in statistics since it combines skewness with heavy tails, a very common feature in real-world data. A generalization of this distribution is the truncated multivariate skew-t distribution which contains the truncated multivariate t distribution and the truncated multivariate skew-normal distribution as special cases. In this article, we study several distributional properties of the truncated multivariate skew-t distribution involving affine transformations, marginalization, and conditioning. The generation of random samples from this distribution is described. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. Mismatch-introduced DNA probes constructed on the basis of thermodynamic analysis enable the discrimination of single nucleotide variants.
- Author
-
Shin, Seung Won, Baek, Changyoon, and Min, Junhong
- Subjects
- *
SINGLE nucleotide polymorphisms , *DNA probes , *NUCLEIC acids - Abstract
Genotyping of single nucleotide variants (SNVs) has enabled the assessment of disease-related risk factors and significantly improved the potency of diagnosis and prognosis. Meanwhile, genotyping of SNVs is challenging due to the high sequence similarity between wild-type (WT) and SNV. To increase the discrimination between WT and SNV, probes are modified with nucleic acid analogues such as locked nucleic acid (LNA), or deliberate mismatches are introduced to the probe sequence. However, nucleic acid analogues have limitation in high cost and complexity in their synthesis. And a generalized methodology has not been proposed for determining the position and type of deliberate mismatches at the designated experimental conditions to the best of our knowledge. Herein, we propose a reliable workflow for designing mismatch-introduced probes (MIPs) based on nucleic acid thermodynamic analysis and rejection sampling. The theoretical hybridization state of MIP was calculated using nucleic acid thermodynamics, and the detectability was estimated by rejection sampling that simulates the errors from experimental environments. We fabricated MIPs for SNVs in epidermal growth factor receptor, and experimentally demonstrated optimized detectability. The detectability increased up to 7.19-fold depending on the position and type of mismatch; moreover, the optimized MIP showed higher detectability than the LNA probe. This indicates that the workflow can be broadly applied to the optimization of probe sequence for the detection of various disease-related SNVs. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. Adaptive methods for stochastic differential equations via natural embeddings and rejection sampling with memory
- Author
-
Rackauckas, Christopher and Nie, Qing
- Subjects
Applied Mathematics ,Mathematical Sciences ,Generic health relevance ,Stochastic differential equations ,adaptive methods ,rejection sampling ,embedded algorithms ,stochastic Runge-Kutta ,strong approximation ,60H10 ,Primary: 65C30 ,Secondary: 68P05 ,Pure Mathematics ,Applied mathematics ,Pure mathematics - Abstract
Adaptive time-stepping with high-order embedded Runge-Kutta pairs and rejection sampling provides efficient approaches for solving differential equations. While many such methods exist for solving deterministic systems, little progress has been made for stochastic variants. One challenge in developing adaptive methods for stochastic differential equations (SDEs) is the construction of embedded schemes with direct error estimates. We present a new class of embedded stochastic Runge-Kutta (SRK) methods with strong order 1.5 which have a natural embedding of strong order 1.0 methods. This allows for the derivation of an error estimate which requires no additional function evaluations. Next we derive a general method to reject the time steps without losing information about the future Brownian path termed Rejection Sampling with Memory (RSwM). This method utilizes a stack data structure to do rejection sampling, costing only a few floating point calculations. We show numerically that the methods generate statistically-correct and tolerance-controlled solutions. Lastly, we show that this form of adaptivity can be applied to systems of equations, and demonstrate that it solves a stiff biological model 12.28x faster than common fixed timestep algorithms. Our approach only requires the solution to a bridging problem and thus lends itself to natural generalizations beyond SDEs.
- Published
- 2017
30. An efficient algorithm for sampling from sink (x) for generating random correlation matrices.
- Author
-
Makalic, Enes and Schmidt, Daniel F.
- Subjects
- *
RANDOM matrices , *PROBABILITY density function , *BETA distribution , *ALGORITHMS , *RANDOM numbers , *RANDOM graphs - Abstract
In this note, we develop a novel algorithm for generating random numbers from a distribution with a probability density function proportional to sin k (x) , x ∈ (0 , π) and k ≥ 1. Our algorithm is highly efficient and is based on rejection sampling where the envelope distribution is an appropriately chosen beta distribution. An example application illustrating how the new algorithm can be used to generate random correlation matrices is discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Generic, efficient and isochronous Gaussian sampling over the integers.
- Author
-
Sun, Shuo, Zhou, Yongbin, Ji, Yunfeng, Zhang, Rui, and Tao, Yang
- Subjects
INTEGERS ,GAUSSIAN distribution ,QUANTUM information science ,STANDARD deviations ,CRYPTOGRAPHY - Abstract
Gaussian sampling over the integers is one of the fundamental building blocks of lattice-based cryptography. Among the extensively used trapdoor sampling algorithms, it is ineluctable until now. Under the influence of numerous side-channel attacks, it is still challenging to construct a Gaussian sampler that is generic, efficient, and resistant to timing attacks. In this paper, our contribution is three-fold. First, we propose a secure, efficient exponential Bernoulli sampling algorithm. It can be applied to Gaussian samplers based on rejection samplings. We apply it to FALCON, a candidate of round 3 of the NIST post-quantum cryptography standardization project, and reduce its signature generation time by 13–14%. Second, we develop an isochronous Gaussian sampler based on rejection sampling. Our Algorithm can securely sample from Gaussian distributions with different standard deviations and arbitrary centers. We apply it to PALISADE (S&P 2018), an open-source lattice-based cryptography library. During the online phase of trapdoor sampling, the running time of the G-lattice sampling algorithm is reduced by 44.12% while resisting timing attacks. Third, we improve the efficiency of the COSAC sampler (PQC 2020). The new COSAC sampler is 1.46x–1.63x faster than the original and has the lowest expected number of trials among all Gaussian samplers based on rejection samplings. But it needs a more efficient algorithm sampling from the normal distribution to improve its performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
32. An improved exact sampling algorithm for the standard normal distribution.
- Author
-
Du, Yusong, Fan, Baoying, and Wei, Baodian
- Subjects
- *
GAUSSIAN distribution , *ALGORITHMS , *COMPUTATIONAL complexity , *RANDOM numbers - Abstract
In 2016, Karney proposed an exact sampling algorithm for the standard normal distribution. In this paper, we study the computational complexity of this algorithm under the random deviate model. Specifically, Karney's algorithm requires the access to an infinite sequence of independently and uniformly random deviates over the range (0, 1). We give a theoretical estimate of the expected number of uniform deviates used by this algorithm until it completes, and present an improved algorithm with lower uniform deviate consumption. The experimental results also shows that our improved algorithm has better performance than Karney's algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
33. Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
- Author
-
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, and Robin Leander Schröder
- Subjects
Timing Attack ,Rejection Sampling ,Fujisaki-Okamoto Transformation ,Post-Quantum Cryptography ,HQC ,BIKE ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Well before large-scale quantum computers will be available, traditional cryptosystems must be transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims to standardize suitable cryptographic schemes. Candidates are evaluated not only on their formal security strengths, but are also judged based on the security with regard to resistance against side-channel attacks. Although round 3 candidates have already been intensively vetted with regard to such attacks, one important attack vector has hitherto been missed: PQ schemes often rely on rejection sampling techniques to obtain pseudorandomness from a specific distribution. In this paper, we reveal that rejection sampling routines that are seeded with secretdependent information and leak timing information result in practical key recovery attacks in the code-based key encapsulation mechanisms HQC and BIKE. Both HQC and BIKE have been selected as alternate candidates in the third round of the NIST competition, which puts them on track for getting standardized separately o the finalists. They have already been specifically hardened with constant-time decoders to avoid side-channel attacks. However, in this paper, we show novel timing vulnerabilities in both schemes: (1) Our secret key recovery attack on HQC requiresonly approx. 866,000 idealized decapsulation timing oracle queries in the 128-bit security setting. It is structurally different from previously identified attacks on the scheme: Previously, exploitable side-channel leakages have been identified in the BCH decoder of a previously submitted HQC version, in the ciphertext check as well as in the pseudorandom function of the Fujisaki-Okamoto transformation. In contrast, our attack uses the fact that the rejection sampling routine invoked during the deterministic re-encryption of the decapsulation leaks secret-dependent timing information, which can be efficiently exploited to recover the secret key when HQC is instantiated with the (now constant-time) BCH decoder, as well as with the RMRS decoder of the current submission. (2) From the timing information of the constant weight word sampler in the BIKE decapsulation, we demonstrate how to distinguish whether the decoding step is successful or not, and how this distinguisher is then used in the framework of the GJS attack to derive the distance spectrum of the secret key, using 5.8 x 107 idealized timing oracle queries. We provide details and analyses of the fully implemented attacks, as well as a discussion on possible countermeasures and their limits.
- Published
- 2022
- Full Text
- View/download PDF
34. Faster SeaSign Signatures Through Improved Rejection Sampling
- Author
-
Decru, Thomas, Panny, Lorenz, Vercauteren, Frederik, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ding, Jintai, editor, and Steinwandt, Rainer, editor
- Published
- 2019
- Full Text
- View/download PDF
35. Continuous-Time Simulation of Epidemic Processes on Dynamic Interaction Networks
- Author
-
Ahmad, Rehan, Xu, Kevin S., Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Thomson, Robert, editor, Bisgin, Halil, editor, Dancy, Christopher, editor, and Hyder, Ayaz, editor
- Published
- 2019
- Full Text
- View/download PDF
36. 基于拒绝抽样算法的结构体系可靠度更新.
- Author
-
马君明, 李 惠, 兰成明, and 刘彩平
- Abstract
Copyright of Engineering Mechanics / Gongcheng Lixue is the property of Engineering Mechanics Editorial Department and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
37. Adjoint Klein-Nishina Sampling Methods: Efficiency, Speed, and Applications.
- Author
-
Robinson, Alex P., Henderson, Douglass, Kersting, Luke, and Moll, Eli
- Subjects
- *
SAMPLING methods , *MONTE Carlo method , *NUCLEAR engineering , *NUCLEAR research , *NUCLEAR science - Abstract
Three new rejection sampling methods for generating samples from the adjoint Klein-Nishina cross section are discussed: the two-branch rejection sampling procedure, the three-branch linear rejection sampling procedure and the three-branch inverse rejection sampling procedure. These methods have all been implemented in the Framework for REsearch in Nuclear ScIence and Engineering (FRENSIE). The efficiency and sample generation rate of each of these methods are evaluated to characterize the methods and to make recommendations regarding their use. The use of these methods in realistic transport simulations is also evaluated by incorporating a scattering function into the sampling process. The results of an infinite medium problem are presented to verify that the sampling procedure can be used in an adjoint Monte Carlo simulation to generate results that are in agreement with an equivalent forward simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. Exact simulation of diffusion first exit times: algorithm acceleration.
- Author
-
Herrmann, Samuel and Zucca, Cristina
- Subjects
- *
REACTION-diffusion equations , *RANDOM variables , *ALGORITHMS , *TIME management , *BROWNIAN motion - Abstract
In order to describe or estimate different quantities related to a specific random variable, it is of prime interest to numerically generate such a variate. In specific situations, the exact generation of random variables might be either momentarily unavailable or too expensive in terms of computation time. It therefore needs to be replaced by an approximation procedure. As was previously the case, the ambitious exact simulation of first exit times for diffusion processes was unreachable though it concerns many applications in different fields like mathematical finance, neuroscience or reliability. The usual way to describe first exit times was to use discretization schemes, that are of course approximation procedures. Recently, Herrmann and Zucca (Herrmann and Zucca, 2020) proposed a new algorithm, the so-called GDET-algorithm (General Diffusion Exit Time), which permits to simulate exactly the first exit time for one-dimensional diffusions. The only drawback of exact simulation methods using an acceptance-rejection sampling is their time consumption. In this paper the authors highlight an acceleration procedure for the GDET-algorithm based on a multi-armed bandit model. The efficiency of this acceleration is pointed out through numerical examples. [ABSTRACT FROM AUTHOR]
- Published
- 2022
39. An intuitive framework for Bayesian posterior simulation methods
- Author
-
Razieh Bidhendi Yarandi, Mohammad Ali Mansournia, Hojjat Zeraati, and Kazem Mohammad
- Subjects
Bayesian methods ,Data augmentation ,Importance sampling ,MCMC ,Rejection sampling ,Infectious and parasitic diseases ,RC109-216 - Abstract
Purpose: Bayesian inference has become popular. It offers several pragmatic approaches to account for uncertainty in inference decision-making. Various estimation methods have been introduced to implement Bayesian methods. Although these algorithms are powerful, they are not always easy to grasp for non-statisticians. This paper aims to provide an intuitive framework of four essential Bayesian computational methods for epidemiologists and other health researchers. We do not cover an extensive mathematical discussion of these approaches, but instead offer a non-quantitative description of these algorithms and provide some illuminating examples. Materials and methods: Bayesian computational methods, namely importance sampling, rejection sampling, Markov chain Monte Carlo, and data augmentation are presented. Results and conclusions: The substantial amount of research published on Bayesian inference has highlighted its popularity among researchers, while the basic concepts are not always straightforward for interested learners. We show that alternative approaches such as a weighted prior approach, which are intuitively appealing and easy-to-understand, work well in the case of low-dimensional problems and appropriate prior information. Otherwise, MCMC is a trouble-free tool in those cases.
- Published
- 2021
- Full Text
- View/download PDF
40. Fast uniform generation of random graphs with given degree sequences.
- Author
-
Arman, Andrii, Gao, Pu, and Wormald, Nicholas
- Subjects
RANDOM graphs ,ALGORITHMS - Abstract
In this paper we provide an algorithm that generates a graph with given degree sequence uniformly at random. Provided that Δ4=O(m), where Δ is the maximal degree and m is the number of edges, the algorithm runs in expected time O(m). Our algorithm significantly improves the previously most efficient uniform sampler, which runs in expected time O(m2Δ2) for the same family of degree sequences. Our method uses a novel ingredient which progressively relaxes restrictions on an object being generated uniformly at random, and we use this to give fast algorithms for uniform sampling of graphs with other degree sequences as well. Using the same method, we also obtain algorithms with expected run time which is (i) linear for power‐law degree sequences in cases where the previous best was O(n4.081), and (ii) O(nd + d4) for d‐regular graphs when d=o(n), where the previous best was O(nd3). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
41. Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
- Author
-
Boschini, Cecilia, Camenisch, Jan, Neven, Gregory, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Chen, Liqun, editor, Manulis, Mark, editor, and Schneider, Steve, editor
- Published
- 2018
- Full Text
- View/download PDF
42. From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature
- Author
-
Bert, Pauline, Roux-Langlois, Adeline, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Inomata, Atsuo, editor, and Yasuda, Kan, editor
- Published
- 2018
- Full Text
- View/download PDF
43. Bayesian Inference, Model Selection and Likelihood Estimation using Fast Rejection Sampling: The Conway-Maxwell-Poisson Distribution.
- Author
-
Benson, Alan and Friel, Nial
- Subjects
BAYESIAN analysis ,POISSON distribution ,MARKOV chain Monte Carlo ,CENTRAL processing units ,REGRESSION analysis - Abstract
Bayesian inference for models with intractable likelihood functions represents a challenging suite of problems in modern statistics. In this work we analyse the Conway-Maxwell-Poisson (COM-Poisson) distribution, a two parameter generalisation of the Poisson distribution. COM-Poisson regression modelling allows the flexibility to model dispersed count data as part of a generalised linear model (GLM) with a COM-Poisson response, where exogenous covariates control the mean and dispersion level of the response. The major difficulty with COMPoisson regression is that the likelihood function contains multiple intractable normalising constants and is not amenable to standard inference and Markov Chain Monte Carlo (MCMC) techniques. Recent work by Chanialidis et al. (2018) has seen the development of a sampler to draw random variates from the COM-Poisson likelihood using a rejection sampling algorithm. We provide a new rejection sampler for the COM-Poisson distribution which significantly reduces the central processing unit (CPU) time required to perform inference for COM-Poisson regression models. An extension of this work shows that for any intractable likelihood function with an associated rejection sampler it is possible to construct unbiased estimators of the intractable likelihood which proves useful for model selection or for use within pseudo-marginal MCMC algorithms (Andrieu and Roberts, 2009). We demonstrate all of these methods on a real-world dataset of takeover bids. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
44. Analysis and rejection sampling of Wright–Fisher diffusion bridges
- Author
-
Schraiber, Joshua G, Griffiths, Robert C, and Evans, Steven N
- Subjects
Mathematical Sciences ,Statistics ,Genetics ,Population ,Models ,Theoretical ,Diffusion ,Wright-Fisher ,Bridge ,Rejection sampling ,Wright–Fisher ,Ecological Applications ,Ecology ,Genetics ,Evolutionary Biology ,Evolutionary biology ,Applied mathematics - Abstract
We investigate the properties of a Wright-Fisher diffusion process starting at frequency x at time 0 and conditioned to be at frequency y at time T. Such a process is called a bridge. Bridges arise naturally in the analysis of selection acting on standing variation and in the inference of selection from allele frequency time series. We establish a number of results about the distribution of neutral Wright-Fisher bridges and develop a novel rejection-sampling scheme for bridges under selection that we use to study their behavior.
- Published
- 2013
45. On the transition laws of p-tempered α-stable OU-processes.
- Author
-
Grabchak, Michael
- Subjects
- *
GAMMA distributions , *ORNSTEIN-Uhlenbeck process - Abstract
We derive an explicit representation for the transition law of a p-tempered α -stable process of Ornstein–Uhlenbeck-type and use it to develop a methodology for simulation. Our results apply in both the univariate and multivariate cases. Special attention is given to the case where p ≤ α , which is more complicated and requires developing the new class of so-called incomplete gamma distributions. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
46. A simple method for rejection sampling efficiency improvement on SIMT architectures.
- Author
-
Ridley, Gavin and Forget, Benoit
- Abstract
We derive a probability distribution for the possible number of iterations required for a SIMT (single instruction multiple thread) program using rejection sampling to finish creating a sample across all threads. This distribution is found to match a recently proposed distribution from Chakraborty and Gupta (in: Communications in statistics: theory and methods, 2015) that was shown as a good approximation of certain datasets. This work demonstrates an exact application of this distribution. The distribution can be used to evaluate the relative merit of some sampling methods on the GPU without resort to numerical tests. The distribution reduces to the expected geometric distribution in the single thread per warp limit. A simplified formula to approximate the expected number of iterations required to obtain rejection iteration samples is provided. With this new result, a simple, efficient layout for assigning sampling tasks to threads on a GPU is found as a function of the rejection probability without recourse to more complicated rejection sampling methods. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
47. Epidemiological inference at the threshold of data availability: an influenza A(H1N2)v spillover event in the United Kingdom.
- Author
-
Fozard JA, Thomson EC, and Illingworth CJR
- Subjects
- United Kingdom epidemiology, Humans, Influenza A Virus, H1N2 Subtype, Swine, Animals, Disease Outbreaks, Orthomyxoviridae Infections epidemiology, Orthomyxoviridae Infections virology, Swine Diseases epidemiology, Swine Diseases virology, Influenza, Human epidemiology
- Abstract
Viruses that infect animals regularly spill over into the human population, but individual events may lead to anything from a single case to a novel pandemic. Rapidly gaining an understanding of a spillover event is critical to calibrating a public health response. We here propose a novel method, using likelihood-free rejection sampling, to evaluate the properties of an outbreak of swine-origin influenza A(H1N2)v in the United Kingdom, detected in November 2023. From the limited data available, we generate historical estimates of the probability that the outbreak had died out in the days following the detection of the first case. Our method suggests that the outbreak could have been said to be over with 95% certainty between 19 and 29 days after the first case was detected, depending upon the probability of a case being detected. We further estimate the number of undetected cases conditional upon the outbreak still being live, the epidemiological parameter R
0 , and the date on which the spillover event itself occurred. Our method requires minimal data to be effective. While our calculations were performed after the event, the real-time application of our method has potential value for public health responses to cases of emerging viral infection.- Published
- 2024
- Full Text
- View/download PDF
48. Fast Lattice-Based Encryption: Stretching Spring
- Author
-
Bouillaguet, Charles, Delaplace, Claire, Fouque, Pierre-Alain, Kirchner, Paul, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Lange, Tanja, editor, and Takagi, Tsuyoshi, editor
- Published
- 2017
- Full Text
- View/download PDF
49. Sequential Inference Methods for Non-Homogeneous Poisson Processes With State-Space Prior.
- Author
-
Li, Chenhao and Godsill, Simon
- Subjects
- *
MONTE Carlo method , *POISSON processes , *MARKOV chain Monte Carlo , *BATCH processing - Abstract
The non-homogeneous Poisson process provides a generalised framework for the modelling of random point data by allowing the intensity of point generation to vary across its domain of interest (time or space). The use of non-homogeneous Poisson processes have arisen in many areas of signal processing and machine learning, but application is still largely limited by its intractable likelihood function and the lack of computationally efficient inference schemes, although some methods do exist for the batch data case. In this paper, we propose for the first time a sequential framework for intensity inference which combines the non-homogeneous model of Poisson data with continuous-time state-space models for their time-varying intensity. This approach enables us to design efficient online inference schemes, for which we propose a novel sequential Markov chain Monte Carlo (SMCMC) algorithm, as is demanded by many applications where point data arrive sequentially and decisions need to be made with low latency. The proposed approach is compared with competing methods on synthetic datasets and tested with high-frequency financial order book data, showing in general improved performance and better computational efficiency than the main batch-based competitor algorithm, and better performance than a simple baseline kernel estimation scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
50. Linguistic Steganography: From Symbolic Space to Semantic Space.
- Author
-
Zhang, Siyu, Yang, Zhongliang, Yang, Jinshuai, and Huang, Yongfeng
- Subjects
NATURAL languages ,CRYPTOGRAPHY ,TASK analysis - Abstract
Previous works about linguistic steganography such as synonym substitution and sampling-based methods usually manipulate observed symbols explicitly to conceal secret information, which may give rise to security risks. In this letter, in order to preclude straightforward operation on observed symbols, we explored generation-based linguistic steganography in latent space by means of encoding secret messages in the selection of implicit attributes (semanteme) of natural language. We proposed a novel framework of linguistic semantic steganography based on rejection sampling strategy. Concretely, we utilized controllable text generation model for embedding and semantic classifier for extraction. In experiments, a model based on CTRL and BERT is implemented for further quantitative assessment. Results reveal that our approach is able to achieve satisfactory efficiency as well as nearly perfect imperceptibility. Our code is available at https://github.com/YangzlTHU/Linguistic-Steganography-and-Steganalysis/tree/master/Steganography/Linguistic-Semantic-Steganography. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.