-
SeCTIS: A Framework to Secure CTI Sharing
Authors:
Dincy R. Arikkat,
Mert Cihangiroglu,
Mauro Conti,
Rafidha Rehiman K. A.,
Serena Nicolazzo,
Antonino Nocera,
Vinod P
Abstract:
The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. As a growing number of organizations include smart, interconnected devices in their systems to automate their processes, the attack surface becomes much bigger, and the complexity and frequency of attacks pose a significant threat. Consequently, organizations have been compelled to seek…
▽ More
The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. As a growing number of organizations include smart, interconnected devices in their systems to automate their processes, the attack surface becomes much bigger, and the complexity and frequency of attacks pose a significant threat. Consequently, organizations have been compelled to seek innovative approaches to mitigate the menaces inherent in their infrastructure. In response, considerable research efforts have been directed towards creating effective solutions for sharing Cyber Threat Intelligence (CTI). Current information-sharing methods lack privacy safeguards, leaving organizations vulnerable to leaks of both proprietary and confidential data. To tackle this problem, we designed a novel framework called SeCTIS (Secure Cyber Threat Intelligence Sharing), integrating Swarm Learning and Blockchain technologies to enable businesses to collaborate, preserving the privacy of their CTI data. Moreover, our approach provides a way to assess the data and model quality, and the trustworthiness of all the participants leveraging some validators through Zero Knowledge Proofs. An extensive experimental campaign demonstrates our framework's correctness and performance, and the detailed attack model discusses its robustness against attacks in the context of data and model quality.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features
Authors:
Jahez Abraham Johny,
Vinod P.,
Asmitha K. A.,
G. Radhamani,
Rafidha Rehiman K. A.,
Mauro Conti
Abstract:
Malware has become a formidable threat as it has been growing exponentially in number and sophistication, thus, it is imperative to have a solution that is easy to implement, reliable, and effective. While recent research has introduced deep learning multi-feature fusion algorithms, they lack a proper explanation. In this work, we investigate the power of fusing Convolutional Neural Network models…
▽ More
Malware has become a formidable threat as it has been growing exponentially in number and sophistication, thus, it is imperative to have a solution that is easy to implement, reliable, and effective. While recent research has introduced deep learning multi-feature fusion algorithms, they lack a proper explanation. In this work, we investigate the power of fusing Convolutional Neural Network models trained on different modalities of a malware executable. We are proposing a novel multimodal fusion algorithm, leveraging three different visual malware features: Grayscale Image, Entropy Graph, and SimHash Image, with which we conducted exhaustive experiments independently on each feature and combinations of all three of them using fusion operators such as average, maximum, add, and concatenate for effective malware detection and classification. The proposed strategy has a detection rate of 1.00 (on a scale of 0-1) in identifying malware in the given dataset. We explained its interpretability with visualization techniques such as t-SNE and Grad-CAM. Experimental results show the model works even for a highly imbalanced dataset. We also assessed the effectiveness of the proposed method on obfuscated malware and achieved state-of-the-art results. The proposed methodology is more reliable as our findings prove VGG16 model can detect and classify malware in a matter of seconds in real-time.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
MIPI 2024 Challenge on Nighttime Flare Removal: Methods and Results
Authors:
Yuekun Dai,
Dafeng Zhang,
Xiaoming Li,
Zongsheng Yue,
Chongyi Li,
Shangchen Zhou,
Ruicheng Feng,
Peiqing Yang,
Zhezhu **,
Guanqun Liu,
Chen Change Loy,
Lize Zhang,
Shuai Liu,
Chaoyu Feng,
Luyang Wang,
Shuan Chen,
Guangqi Shao,
Xiaotao Wang,
Lei Lei,
Qirui Yang,
Qihua Cheng,
Zhiqiang Xu,
Yihao Liu,
Huan**g Yue,
**gyu Yang
, et al. (38 additional authors not shown)
Abstract:
The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the scarcity of high-quality data for research and the rare opportunity for in-depth exchange of views from industry and academia constrain the development of mobile intelligent photogra…
▽ More
The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the scarcity of high-quality data for research and the rare opportunity for in-depth exchange of views from industry and academia constrain the development of mobile intelligent photography and imaging (MIPI). Building on the achievements of the previous MIPI Workshops held at ECCV 2022 and CVPR 2023, we introduce our third MIPI challenge including three tracks focusing on novel image sensors and imaging algorithms. In this paper, we summarize and review the Nighttime Flare Removal track on MIPI 2024. In total, 170 participants were successfully registered, and 14 teams submitted results in the final testing phase. The developed solutions in this challenge achieved state-of-the-art performance on Nighttime Flare Removal. More details of this challenge and the link to the dataset can be found at https://mipi-challenge.org/MIPI2024/.
△ Less
Submitted 27 May, 2024; v1 submitted 30 April, 2024;
originally announced April 2024.
-
Trustworthy Self-Attention: Enabling the Network to Focus Only on the Most Relevant References
Authors:
Yu **g,
Tan Yujuan,
Ren Ao,
Liu Duo
Abstract:
The prediction of optical flow for occluded points is still a difficult problem that has not yet been solved. Recent methods use self-attention to find relevant non-occluded points as references for estimating the optical flow of occluded points based on the assumption of self-similarity. However, they rely on visual features of a single image and weak constraints, which are not sufficient to cons…
▽ More
The prediction of optical flow for occluded points is still a difficult problem that has not yet been solved. Recent methods use self-attention to find relevant non-occluded points as references for estimating the optical flow of occluded points based on the assumption of self-similarity. However, they rely on visual features of a single image and weak constraints, which are not sufficient to constrain the trained network to focus on erroneous and weakly relevant reference points. We make full use of online occlusion recognition information to construct occlusion extended visual features and two strong constraints, allowing the network to learn to focus only on the most relevant references without requiring occlusion ground truth to participate in the training of the network. Our method adds very few network parameters to the original framework, making it very lightweight. Extensive experiments show that our model has the greatest cross-dataset generalization. Our method achieves much greater error reduction, 18.6%, 16.2%, and 20.1% for all points, non-occluded points, and occluded points respectively from the state-of-the-art GMA-base method, MATCHFlow(GMA), on Sintel Albedo pass. Furthermore, our model achieves state-of-the-art performance on the Sintel bench-marks, ranking \#1 among all published methods on Sintel clean pass. The code will be open-source.
△ Less
Submitted 26 March, 2024; v1 submitted 29 February, 2024;
originally announced March 2024.
-
Online Local False Discovery Rate Control: A Resource Allocation Approach
Authors:
Ruicheng Ao,
Hongyu Chen,
David Simchi-Levi,
Feng Zhu
Abstract:
We consider the problem of sequentially conducting multiple experiments where each experiment corresponds to a hypothesis testing task. At each time point, the experimenter must make an irrevocable decision of whether to reject the null hypothesis (or equivalently claim a discovery) before the next experimental result arrives. The goal is to maximize the number of discoveries while maintaining a l…
▽ More
We consider the problem of sequentially conducting multiple experiments where each experiment corresponds to a hypothesis testing task. At each time point, the experimenter must make an irrevocable decision of whether to reject the null hypothesis (or equivalently claim a discovery) before the next experimental result arrives. The goal is to maximize the number of discoveries while maintaining a low error rate at all time points measured by local False Discovery Rate (FDR). We formulate the problem as an online knapsack problem with exogenous random budget replenishment. We start with general arrival distributions and show that a simple policy achieves a $O(\sqrt{T})$ regret. We complement the result by showing that such regret rate is in general not improvable. We then shift our focus to discrete arrival distributions. We find that many existing re-solving heuristics in the online resource allocation literature, albeit achieve bounded loss in canonical settings, may incur a $Ω(\sqrt{T})$ or even a $Ω(T)$ regret. With the observation that canonical policies tend to be too optimistic and over claim discoveries, we propose a novel policy that incorporates budget safety buffers. It turns out that a little more safety can greatly enhance efficiency -- small additional logarithmic buffers suffice to reduce the regret from $Ω(\sqrt{T})$ or even $Ω(T)$ to $O(\ln^2 T)$. From a practical perspective, we extend the policy to the scenario with continuous arrival distributions as well as time-dependent information structures. We conduct both synthetic experiments and empirical applications on a time series data from New York City taxi passengers to validate the performance of our proposed policies. Our results emphasize how effective policies should be designed in online resource allocation problems with exogenous budget replenishment.
△ Less
Submitted 1 April, 2024; v1 submitted 17 February, 2024;
originally announced February 2024.
-
YOIO: You Only Iterate Once by mining and fusing multiple necessary global information in the optical flow estimation
Authors:
Yu **g,
Tan Yujuan,
Ren Ao,
Liu Duo
Abstract:
Occlusions pose a significant challenge to optical flow algorithms that even rely on global evidences. We consider an occluded point to be one that is imaged in the reference frame but not in the next. Estimating the motion of these points is extremely difficult, particularly in the two-frame setting. Previous work only used the current frame as the only input, which could not guarantee providing…
▽ More
Occlusions pose a significant challenge to optical flow algorithms that even rely on global evidences. We consider an occluded point to be one that is imaged in the reference frame but not in the next. Estimating the motion of these points is extremely difficult, particularly in the two-frame setting. Previous work only used the current frame as the only input, which could not guarantee providing correct global reference information for occluded points, and had problems such as long calculation time and poor accuracy in predicting optical flow at occluded points. To enable both high accuracy and efficiency, We fully mine and utilize the spatiotemporal information provided by the frame pair, design a loopback judgment algorithm to ensure that correct global reference information is obtained, mine multiple necessary global information, and design an efficient refinement module that fuses these global information. Specifically, we propose a YOIO framework, which consists of three main components: an initial flow estimator, a multiple global information extraction module, and a unified refinement module. We demonstrate that optical flow estimates in the occluded regions can be significantly improved in only one iteration without damaging the performance in non-occluded regions. Compared with GMA, the optical flow prediction accuracy of this method in the occluded area is improved by more than 10%, and the occ_out area exceeds 15%, while the calculation time is 27% shorter. This approach, running up to 18.9fps with 436*1024 image resolution, obtains new state-of-the-art results on the challenging Sintel dataset among all published and unpublished approaches that can run in real-time, suggesting a new paradigm for accurate and efficient optical flow estimation.
△ Less
Submitted 11 January, 2024;
originally announced January 2024.
-
Privacy-Preserving in Blockchain-based Federated Learning Systems
Authors:
Sameera K. M.,
Serena Nicolazzo,
Marco Arazzi,
Antonino Nocera,
Rafidha Rehiman K. A.,
Vinod P,
Mauro Conti
Abstract:
Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their local data. As FL gains popularity in diverse domains, security, and privacy concerns arise due to the distributed nature…
▽ More
Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their local data. As FL gains popularity in diverse domains, security, and privacy concerns arise due to the distributed nature of this solution. Therefore, integrating this strategy with Blockchain technology has been consolidated as a preferred choice to ensure the privacy and security of participants.
This paper explores the research efforts carried out by the scientific community to define privacy solutions in scenarios adopting Blockchain-Enabled FL. It comprehensively summarizes the background related to FL and Blockchain, evaluates existing architectures for their integration, and the primary attacks and possible countermeasures to guarantee privacy in this setting. Finally, it reviews the main application scenarios where Blockchain-Enabled FL approaches have been proficiently applied. This survey can help academia and industry practitioners understand which theories and techniques exist to improve the performance of FL through Blockchain to preserve privacy and which are the main challenges and future directions in this novel and still under-explored context. We believe this work provides a novel contribution respect to the previous surveys and is a valuable tool to explore the current landscape, understand perspectives, and pave the way for advancements or improvements in this amalgamation of Blockchain and Federated Learning.
△ Less
Submitted 7 January, 2024;
originally announced January 2024.
-
Deep Learning based CNN Model for Classification and Detection of Individuals Wearing Face Mask
Authors:
R. Chinnaiyan,
Iyyappan M,
Al Raiyan Shariff A,
Kondaveeti Sai,
Mallikarjunaiah B M,
P Bharath
Abstract:
In response to the global COVID-19 pandemic, there has been a critical demand for protective measures, with face masks emerging as a primary safeguard. The approach involves a two-fold strategy: first, recognizing the presence of a face by detecting faces, and second, identifying masks on those faces. This project utilizes deep learning to create a model that can detect face masks in real-time str…
▽ More
In response to the global COVID-19 pandemic, there has been a critical demand for protective measures, with face masks emerging as a primary safeguard. The approach involves a two-fold strategy: first, recognizing the presence of a face by detecting faces, and second, identifying masks on those faces. This project utilizes deep learning to create a model that can detect face masks in real-time streaming video as well as images. Face detection, a facet of object detection, finds applications in diverse fields such as security, biometrics, and law enforcement. Various detector systems worldwide have been developed and implemented, with convolutional neural networks chosen for their superior performance accuracy and speed in object detection. Experimental results attest to the model's excellent accuracy on test data. The primary focus of this research is to enhance security, particularly in sensitive areas. The research paper proposes a rapid image pre-processing method with masks centred on faces. Employing feature extraction and Convolutional Neural Network, the system classifies and detects individuals wearing masks. The research unfolds in three stages: image pre-processing, image crop**, and image classification, collectively contributing to the identification of masked faces. Continuous surveillance through webcams or CCTV cameras ensures constant monitoring, triggering a security alert if a person is detected without a mask.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
NLP-Based Techniques for Cyber Threat Intelligence
Authors:
Marco Arazzi,
Dincy R. Arikkat,
Serena Nicolazzo,
Antonino Nocera,
Rafidha Rehiman K. A.,
Vinod P.,
Mauro Conti
Abstract:
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and…
▽ More
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and mitigating threats and enabling proactive defense strategies. In this context, NLP, an artificial intelligence branch, has emerged as a powerful tool for enhancing threat intelligence capabilities. This survey paper provides a comprehensive overview of NLP-based techniques applied in the context of threat intelligence. It begins by describing the foundational definitions and principles of CTI as a major tool for safeguarding digital assets. It then undertakes a thorough examination of NLP-based techniques for CTI data crawling from Web sources, CTI data analysis, Relation Extraction from cybersecurity data, CTI sharing and collaboration, and security threats of CTI. Finally, the challenges and limitations of NLP in threat intelligence are exhaustively examined, including data quality issues and ethical considerations. This survey draws a complete framework and serves as a valuable resource for security professionals and researchers seeking to understand the state-of-the-art NLP-based threat intelligence techniques and their potential impact on cybersecurity.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Volterra Accentuated Non-Linear Dynamical Admittance (VANYA) to model Deforestation: An Exemplification from the Amazon Rainforest
Authors:
Karthik R.,
Ramamoorthy A.
Abstract:
Intelligent automation supports us against cyclones, droughts, and seismic events with recent technology advancements. Algorithmic learning has advanced fields like neuroscience, genetics, and human-computer interaction. Time-series data boosts progress. Challenges persist in adopting these approaches in traditional fields. Neural networks face comprehension and bias issues. AI's expansion across…
▽ More
Intelligent automation supports us against cyclones, droughts, and seismic events with recent technology advancements. Algorithmic learning has advanced fields like neuroscience, genetics, and human-computer interaction. Time-series data boosts progress. Challenges persist in adopting these approaches in traditional fields. Neural networks face comprehension and bias issues. AI's expansion across scientific areas is due to adaptable descriptors and combinatorial argumentation. This article focuses on modeling Forest loss using the VANYA Model, incorporating Prey Predator Dynamics. VANYA predicts forest cover, demonstrated on Amazon Rainforest data against other forecasters like Long Short-Term Memory, N-BEATS, RCN.
△ Less
Submitted 12 August, 2023;
originally announced August 2023.
-
Purely antiferromagnetic frustrated Heisenberg model in spin ladder compound BaFe$_2$Se$_3$
Authors:
Roll A.,
Petit S.,
Forget A.,
Colson D.,
Banerjee A.,
Foury-Leylekian P.,
Balédent V
Abstract:
The spin dynamics in the block magnetic phase of the iron-based ladder compound \bfs\ has been studied by means of single crystal inelastic neutron scattering. Using linear spin wave theory and Monte-Carlo simulations, our analysis points to a magnetic Heisenberg model with effective frustrated antiferromagnetic couplings only, able to describe both the exotic block order and its dynamics. This ne…
▽ More
The spin dynamics in the block magnetic phase of the iron-based ladder compound \bfs\ has been studied by means of single crystal inelastic neutron scattering. Using linear spin wave theory and Monte-Carlo simulations, our analysis points to a magnetic Heisenberg model with effective frustrated antiferromagnetic couplings only, able to describe both the exotic block order and its dynamics. This new and purely antiferromagnetic picture offers a fruitful perspective to describe multiferroic properties but also understand the origin of the stripe-like magnetic instability observed under pressure as well as in other parent compounds with similar crystalline structure.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
Monte Carlo Policy Gradient Method for Binary Optimization
Authors:
Cheng Chen,
Ruitao Chen,
Tianyou Li,
Ruichen Ao,
Zaiwen Wen
Abstract:
Binary optimization has a wide range of applications in combinatorial optimization problems such as MaxCut, MIMO detection, and MaxSAT. However, these problems are typically NP-hard due to the binary constraints. We develop a novel probabilistic model to sample the binary solution according to a parameterized policy distribution. Specifically, minimizing the KL divergence between the parameterized…
▽ More
Binary optimization has a wide range of applications in combinatorial optimization problems such as MaxCut, MIMO detection, and MaxSAT. However, these problems are typically NP-hard due to the binary constraints. We develop a novel probabilistic model to sample the binary solution according to a parameterized policy distribution. Specifically, minimizing the KL divergence between the parameterized policy distribution and the Gibbs distributions of the function value leads to a stochastic optimization problem whose policy gradient can be derived explicitly similar to reinforcement learning. For coherent exploration in discrete spaces, parallel Markov Chain Monte Carlo (MCMC) methods are employed to sample from the policy distribution with diversity and approximate the gradient efficiently. We further develop a filter scheme to replace the original objective function by the one with the local search technique to broaden the horizon of the function landscape. Convergence to stationary points in expectation of the policy gradient method is established based on the concentration inequality for MCMC. Numerical results show that this framework is very promising to provide near-optimal solutions for quite a few binary optimization problems.
△ Less
Submitted 3 July, 2023;
originally announced July 2023.
-
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
Authors:
Dincy R Arikkat,
Vinod P.,
Rafidha Rehiman K. A.,
Andrea Di Sorbo,
Corrado A. Visaggio,
Mauro Conti
Abstract:
Time-relevant and accurate threat information from public domains are essential for cyber security. In a constantly evolving threat landscape, such information assists security researchers in thwarting attack strategies. In this work, we collect and analyze threat-related information from Twitter to extract intelligence for proactive security. We first use a convolutional neural network to classif…
▽ More
Time-relevant and accurate threat information from public domains are essential for cyber security. In a constantly evolving threat landscape, such information assists security researchers in thwarting attack strategies. In this work, we collect and analyze threat-related information from Twitter to extract intelligence for proactive security. We first use a convolutional neural network to classify the tweets as containing or not valuable threat indicators. In particular, to gather threat intelligence from social media, the proposed approach collects pertinent Indicators of Compromise (IoCs) from tweets, such as IP addresses, URLs, File hashes, domain addresses, and CVE IDs. Then, we analyze the IoCs to confirm whether they are reliable and valuable for threat intelligence using performance indicators, such as correctness, timeliness, and overlap. We also evaluate how fast Twitter shares IoCs compared to existing threat intelligence services. Furthermore, through machine learning models, we classify Twitter accounts as either automated or human-operated and delve into the role of bot accounts in disseminating cyber threat information on social media. Our results demonstrate that Twitter is growing into a powerful platform for gathering precise and pertinent malware IoCs and a reliable source for mining threat intelligence.
△ Less
Submitted 28 June, 2023;
originally announced June 2023.
-
Automated Speckle Interferometry of Known Binaries
Authors:
Nick Hardy,
Leon Bewersdorff,
David Rowe,
Russell Genet,
Rick Wasson,
James Armstrong,
Scott Dixon,
Mark Harris,
Tom Smith,
Rachel Freed,
Paul McCudden,
S. Stephen Rajkumar Inbanathan,
Marie Davis,
Christopher Giavarini,
Ronald Snyder,
Roger Wholly,
Maaike Calvin,
Sumner Cotton,
Julia Carter,
Mario Terrazas,
Shane Christopher R.,
Arun Kumar A.,
Sithara Naskath H.,
Mariam Ronald Rabin A
Abstract:
Astronomers have been measuring the separations and position angles between the two components of binary stars since William Herschel began his observations in 1781. In 1970, Anton Labeyrie pioneered a method, speckle interferometry, that overcomes the usual resolution limits induced by atmospheric turbulence by taking hundreds or thousands of short exposures and reducing them in Fourier space. Ou…
▽ More
Astronomers have been measuring the separations and position angles between the two components of binary stars since William Herschel began his observations in 1781. In 1970, Anton Labeyrie pioneered a method, speckle interferometry, that overcomes the usual resolution limits induced by atmospheric turbulence by taking hundreds or thousands of short exposures and reducing them in Fourier space. Our 2022 automation of speckle interferometry allowed us to use a fully robotic 1.0-meter PlaneWave Instruments telescope, located at the El Sauce Observatory in the Atacama Desert of Chile, to obtain observations of many known binaries with established orbits. The long-term objective of these observations is to establish the precision, accuracy, and limitations of this telescope's automated speckle interferometry measurements. This paper provides an early overview of the Known Binaries Project and provide example results on a small-separation (0.27") binary, WDS 12274-2843 B 228.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Progression of Digital-Receiver Architecture: From MWA to SKA1-Low,and beyond
Authors:
Girish B. S.,
Harshavardhan Reddy S.,
Shiv Sethi,
Srivani K. S.,
Abhishek R.,
Ajithkumar B.,
Sahana Bhattramakki,
Kaushal Buch,
Sandeep Chaudhuri,
Yashwant Gupta,
Kamini P. A.,
Sanjay Kudale,
Madhavi S.,
Mekhala Muley,
Prabu T.,
Raghunathan A.,
Shelton G. J
Abstract:
Backed by advances in digital electronics, signal processing, computation, and storage technologies, aperture arrays, which had strongly influenced the design of telescopes in the early years of radio astronomy, have made a comeback. Amid all these developments, an international effort to design and build the world's largest radio telescope, the Square Kilometre Array (SKA), is ongoing. With its v…
▽ More
Backed by advances in digital electronics, signal processing, computation, and storage technologies, aperture arrays, which had strongly influenced the design of telescopes in the early years of radio astronomy, have made a comeback. Amid all these developments, an international effort to design and build the world's largest radio telescope, the Square Kilometre Array (SKA), is ongoing. With its vast collecting area of 1 sq-km, the SKA is envisaged to provide unsurpassed sensitivity and leverage technological advances to implement a complex receiver to provide a large field of view through multiple beams on the sky. Many pathfinders and precursor aperture array telescopes for the SKA, operating in the frequency range of 10-300 MHz, have been constructed and operationalized to obtain valuable feedback on scientific, instrumental, and functional aspects. This review article looks explicitly into the progression of digital-receiver architecture from the Murchison Widefield Array (precursor) to the SKA1-Low. It highlights the technological advances in analog-to-digital converters (ADCs),field-programmable gate arrays (FPGAs), and central processing unit-graphics processing unit (CPU-GPU) hybrid platforms around which complex digital signal processing systems implement efficient channelizers, beamformers, and correlators. The article concludes with a preview of the design of a new generation signal processing platform based on radio frequency system-on-chip (RFSoC).
△ Less
Submitted 17 January, 2023;
originally announced January 2023.
-
The MUSE second-generation VLT instrument
Authors:
Bacon R.,
Accardo M.,
Adjali L.,
Anwand H.,
Bauer S.,
Biswas I.,
Blaizot J.,
Boudon D.,
Brau-Nogue S.,
Brinchmann J.,
Caillier P.,
Capoani L.,
Carollo C. M.,
Contini T.,
Couderc P.,
Daguise E.,
Deiries S.,
Delabre B.,
Dreizler S.,
Dubois J. P.,
Dupieux M.,
Dupuy C.,
Emsellem E.,
Fechner T.,
Fleischmann A.
, et al. (43 additional authors not shown)
Abstract:
The Multi Unit Spectroscopic Explorer (MUSE) is a second-generation VLT panoramic integral-field spectrograph currently in manufacturing, assembly and integration phase. MUSE has a field of 1x1 arcmin2 sampled at 0.2x0.2 arcsec2 and is assisted by the VLT ground layer adaptive optics ESO facility using four laser guide stars. The instrument is a large assembly of 24 identical high performance inte…
▽ More
The Multi Unit Spectroscopic Explorer (MUSE) is a second-generation VLT panoramic integral-field spectrograph currently in manufacturing, assembly and integration phase. MUSE has a field of 1x1 arcmin2 sampled at 0.2x0.2 arcsec2 and is assisted by the VLT ground layer adaptive optics ESO facility using four laser guide stars. The instrument is a large assembly of 24 identical high performance integral field units, each one composed of an advanced image slicer, a spectrograph and a 4kx4k detector. In this paper we review the progress of the manufacturing and report the performance achieved with the first integral field unit.
△ Less
Submitted 30 November, 2022;
originally announced November 2022.
-
Asynchronous Gradient Play in Zero-Sum Multi-agent Games
Authors:
Ruicheng Ao,
Shicong Cen,
Yuejie Chi
Abstract:
Finding equilibria via gradient play in competitive multi-agent games has been attracting a growing amount of attention in recent years, with emphasis on designing efficient strategies where the agents operate in a decentralized and symmetric manner with guaranteed convergence. While significant efforts have been made in understanding zero-sum two-player matrix games, the performance in zero-sum m…
▽ More
Finding equilibria via gradient play in competitive multi-agent games has been attracting a growing amount of attention in recent years, with emphasis on designing efficient strategies where the agents operate in a decentralized and symmetric manner with guaranteed convergence. While significant efforts have been made in understanding zero-sum two-player matrix games, the performance in zero-sum multi-agent games remains inadequately explored, especially in the presence of delayed feedbacks, leaving the scalability and resiliency of gradient play open to questions.
In this paper, we make progress by studying asynchronous gradient plays in zero-sum polymatrix games under delayed feedbacks. We first establish that the last iterate of entropy-regularized optimistic multiplicative weight updates (OMWU) method converges linearly to the quantal response equilibrium (QRE), the solution concept under bounded rationality, in the absence of delays. While the linear convergence continues to hold even when the feedbacks are randomly delayed under mild statistical assumptions, it converges at a noticeably slower rate due to a smaller tolerable range of learning rates. Moving beyond, we demonstrate entropy-regularized OMWU -- by adopting two-timescale learning rates in a delay-aware manner -- enjoys faster last-iterate convergence under fixed delays, and continues to converge provably even when the delays are arbitrarily bounded in an average-iterate manner. Our methods also lead to finite-time guarantees to approximate the Nash equilibrium (NE) by moderating the amount of regularization. To the best of our knowledge, this work is the first that aims to understand asynchronous gradient play in zero-sum polymatrix games under a wide range of delay assumptions, highlighting the role of learning rates separation.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Riemannian Natural Gradient Methods
Authors:
Jiang Hu,
Ruicheng Ao,
Anthony Man-Cho So,
Minghan Yang,
Zaiwen Wen
Abstract:
This paper studies large-scale optimization problems on Riemannian manifolds whose objective function is a finite sum of negative log-probability losses. Such problems arise in various machine learning and signal processing applications. By introducing the notion of Fisher information matrix in the manifold setting, we propose a novel Riemannian natural gradient method, which can be viewed as a na…
▽ More
This paper studies large-scale optimization problems on Riemannian manifolds whose objective function is a finite sum of negative log-probability losses. Such problems arise in various machine learning and signal processing applications. By introducing the notion of Fisher information matrix in the manifold setting, we propose a novel Riemannian natural gradient method, which can be viewed as a natural extension of the natural gradient method from the Euclidean setting to the manifold setting. We establish the almost-sure global convergence of our proposed method under standard assumptions. Moreover, we show that if the loss function satisfies certain convexity and smoothness conditions and the input-output map satisfies a Riemannian Jacobian stability condition, then our proposed method enjoys a local linear -- or, under the Lipschitz continuity of the Riemannian Jacobian of the input-output map, even quadratic -- rate of convergence. We then prove that the Riemannian Jacobian stability condition will be satisfied by a two-layer fully connected neural network with batch normalization with high probability, provided that the width of the network is sufficiently large. This demonstrates the practical relevance of our convergence rate result. Numerical experiments on applications arising from machine learning demonstrate the advantages of the proposed method over state-of-the-art ones.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Three new brown dwarfs and a massive hot Jupiter revealed by TESS around early-type stars
Authors:
Psaridi A.,
Bouchy F.,
Lendl M.,
Grieves N.,
Stassun K. G.,
Carmichael T.,
Gill S.,
Peña Rojas P. A.,
Gan T.,
Shporer A.,
Bieryla A.,
Christiansen J. L,
Crossfield I. J. M,
Galland F. Hooton M. J. Jenkins J. M,
Jenkins J. S,
Latham D. W,
Lund M. B,
Rodriguez J. E,
Ting E. B,
Udry S. Ulmer-Moll S. Wittenmyer R. A,
Yanzhe Zhang Y.,
Zhou G.,
Addison B.,
Cointepas M.,
Collins K. A.
, et al. (18 additional authors not shown)
Abstract:
The detection and characterization of exoplanets and brown dwarfs (BDs) around massive AF-type stars is essential to investigate and constrain the impact of stellar mass on planet properties. However, such targets are still poorly explored in radial velocity (RV) surveys because they only feature a small number of stellar lines and those are usually broadened and blended by stellar rotation as wel…
▽ More
The detection and characterization of exoplanets and brown dwarfs (BDs) around massive AF-type stars is essential to investigate and constrain the impact of stellar mass on planet properties. However, such targets are still poorly explored in radial velocity (RV) surveys because they only feature a small number of stellar lines and those are usually broadened and blended by stellar rotation as well as stellar jitter. As a result, the available information about the formation and evolution of planets and BDs around hot stars is limited. We aim to increase the sample and precisely measure the masses and eccentricities of giant planets and BDs transiting AF-type stars detected by the Transiting Exoplanet Survey Satellite (TESS). We followed bright (V < 12 mag) stars with $T_{\mathrm{eff}}$ > 6200 K that host giant companions (R > 7 $\mathrm{R_{\rm \oplus}}$) using ground-based photometric observations as well as high precision RV measurements from the CORALIE, CHIRON, TRES, FEROS, and MINERVA-Australis spectrographs. In the context, we present the discovery of three BD companions, TOI-629b, TOI-1982b, and TOI-2543b, and one massive planet, TOI-1107b. From the joint analysis we find the BDs have masses between 66 and 68 $\mathrm{M_{\rm Jup}}$, periods between 7.54 and 17.17 days, and radii between 0.95 and 1.11 $\mathrm{R_{\rm Jup}}$. The hot Jupiter TOI-1107b has an orbital period of 4.08 days, a radius of 1.30 $\mathrm{R_{\rm Jup}}$, and a mass of 3.35 $\mathrm{M_{\rm Jup}}$. As a by-product of this program, we identified four low-mass eclipsing components (TOI-288b, TOI-446b, TOI-478b, and TOI-764b). Both TOI-1107b and TOI-1982b present an anomalously inflated radius with respect to the age of these systems. TOI-629 is among the hottest stars with a known transiting brown dwarf. TOI-629b and TOI-1982b are among the most eccentric brown dwarfs.
△ Less
Submitted 22 May, 2022;
originally announced May 2022.
-
P-Operators on Hilbert Spaces
Authors:
Rashid A.,
P. Sam Johnson
Abstract:
A real square matrix $A$ is called a P-matrix if all its principal minors are positive. Using the sign non-reversal property of matrices, the notion of P-matrix has been recently extended by Kannan and Sivakumar to infinite-dimensional Banach spaces relative to a given Schauder basis. Motivated by their work, we discuss P-operators on separable real Hilbert spaces. We also investigate P-operators…
▽ More
A real square matrix $A$ is called a P-matrix if all its principal minors are positive. Using the sign non-reversal property of matrices, the notion of P-matrix has been recently extended by Kannan and Sivakumar to infinite-dimensional Banach spaces relative to a given Schauder basis. Motivated by their work, we discuss P-operators on separable real Hilbert spaces. We also investigate P-operators relative to various orthonormal bases.
△ Less
Submitted 5 May, 2022;
originally announced May 2022.
-
Interactive Attention AI to translate low light photos to captions for night scene understanding in women safety
Authors:
Rajagopal A,
Nirmala V,
Arun Muthuraj Vedamanickam
Abstract:
There is amazing progress in Deep Learning based models for Image captioning and Low Light image enhancement. For the first time in literature, this paper develops a Deep Learning model that translates night scenes to sentences, opening new possibilities for AI applications in the safety of visually impaired women. Inspired by Image Captioning and Visual Question Answering, a novel Interactive Ima…
▽ More
There is amazing progress in Deep Learning based models for Image captioning and Low Light image enhancement. For the first time in literature, this paper develops a Deep Learning model that translates night scenes to sentences, opening new possibilities for AI applications in the safety of visually impaired women. Inspired by Image Captioning and Visual Question Answering, a novel Interactive Image Captioning is developed. A user can make the AI focus on any chosen person of interest by influencing the attention scoring. Attention context vectors are computed from CNN feature vectors and user-provided start word. The Encoder-Attention-Decoder neural network learns to produce captions from low brightness images. This paper demonstrates how women safety can be enabled by researching a novel AI capability in the Interactive Vision-Language model for perception of the environment in the night.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
AI visualization in Nanoscale Microscopy
Authors:
Rajagopal A,
Nirmala V,
Andrew J,
Arun Muthuraj Vedamanickam.
Abstract:
Artificial Intelligence & Nanotechnology are promising areas for the future of humanity. While Deep Learning based Computer Vision has found applications in many fields from medicine to automotive, its application in nanotechnology can open doors for new scientific discoveries. Can we apply AI to explore objects that our eyes can't see such as nano scale sized objects? An AI platform to visualize…
▽ More
Artificial Intelligence & Nanotechnology are promising areas for the future of humanity. While Deep Learning based Computer Vision has found applications in many fields from medicine to automotive, its application in nanotechnology can open doors for new scientific discoveries. Can we apply AI to explore objects that our eyes can't see such as nano scale sized objects? An AI platform to visualize nanoscale patterns learnt by a Deep Learning neural network can open new frontiers for nanotechnology. The objective of this paper is to develop a Deep Learning based visualization system on images of nanomaterials obtained by scanning electron microscope. This paper contributes an AI platform to enable any nanoscience researcher to use AI in visual exploration of nanoscale morphologies of nanomaterials. This AI is developed by a technique of visualizing intermediate activations of a Convolutional AutoEncoder. In this method, a nano scale specimen image is transformed into its feature representations by a Convolution Neural Network. The Convolutional AutoEncoder is trained on 100% SEM dataset, and then CNN visualization is applied. This AI generates various conceptual feature representations of the nanomaterial.
While Deep Learning based image classification of SEM images are widely published in literature, there are not much publications that have visualized Deep neural networks of nanomaterials. There is a significant opportunity to gain insights from the learnings extracted by machine learning. This paper unlocks the potential of applying Deep Learning based Visualization on electron microscopy to offer AI extracted features and architectural patterns of various nanomaterials. This is a contribution in Explainable AI in nano scale objects. This paper contributes an open source AI with reproducible results at URL (https://sites.google.com/view/aifornanotechnology)
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Of Access and Inclusivity Digital Divide in Online Education
Authors:
Bheemeshwar Reddy A,
Sunny Jose,
Vaidehi R
Abstract:
Can online education enable all students to participate in and benefit from it equally? Massive online education without addressing the huge access gap and disparities in digital infrastructure would not only exclude a vast majority of students from learning opportunities but also exacerbate the existing socio-economic disparities in educational opportunities.
Can online education enable all students to participate in and benefit from it equally? Massive online education without addressing the huge access gap and disparities in digital infrastructure would not only exclude a vast majority of students from learning opportunities but also exacerbate the existing socio-economic disparities in educational opportunities.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
What Explains Gender Gap in Unpaid Household and Care Work in India?
Authors:
Athary Janiso,
Prakash Kumar Shukla,
Bheemeshwar Reddy A
Abstract:
Due to the unavailability of nationally representative data on time use, a systematic analysis of the gender gap in unpaid household and care work has not been undertaken in the context of India. The present paper, using the recent Time Use Survey (2019) data, examines the socioeconomic and demographic factors associated with variation in time spent on unpaid household and care work among men and…
▽ More
Due to the unavailability of nationally representative data on time use, a systematic analysis of the gender gap in unpaid household and care work has not been undertaken in the context of India. The present paper, using the recent Time Use Survey (2019) data, examines the socioeconomic and demographic factors associated with variation in time spent on unpaid household and care work among men and women. It analyses how much of the gender gap in the time allocated to unpaid work can be explained by differences in these factors. The findings show that women spend much higher time compared to men in unpaid household and care work. The decomposition results reveal that differences in socioeconomic and demographic factors between men and women do not explain most of the gender gap in unpaid household work. Our results indicate that unobserved gender norms and practices most crucially govern the allocation of unpaid work within Indian households.
△ Less
Submitted 21 July, 2021; v1 submitted 29 June, 2021;
originally announced June 2021.
-
Covid-19 diagnosis from x-ray using neural networks
Authors:
Dinesh J,
Mohammed Rhithick A
Abstract:
Corona virus or COVID-19 is a pandemic illness, which has influenced more than million of causalities worldwide and infected a few large number of individuals .Innovative instrument empowering quick screening of the COVID-19 contamination with high precision can be critically useful to the medical care experts. The primary clinical device presently being used for the analysis of COVID-19 is the Re…
▽ More
Corona virus or COVID-19 is a pandemic illness, which has influenced more than million of causalities worldwide and infected a few large number of individuals .Innovative instrument empowering quick screening of the COVID-19 contamination with high precision can be critically useful to the medical care experts. The primary clinical device presently being used for the analysis of COVID-19 is the Reverse record polymerase chain response as known as RT-PCR, which is costly, less-delicate and requires specific clinical work force. X-Ray imaging is an effectively available apparatus that can be a great option in the COVID-19 conclusion. This exploration was taken to examine the utility of computerized reasoning in the quick and exact recognition of COVID-19 from chest X-Ray pictures. The point of this paper is to propose a procedure for programmed recognition of COVID-19 from advanced chest X-Ray images applying pre-prepared profound learning calculations while boosting the discovery exactness. The point is to give over-focused on clinical experts a second pair of eyes through a learning picture characterization models. We distinguish an appropriate Convolutional Neural Network-CNN model through beginning similar investigation of a few mainstream CNN models.
△ Less
Submitted 29 May, 2021;
originally announced May 2021.
-
Automatic Stroke Classification of Tabla Accompaniment in Hindustani Vocal Concert Audio
Authors:
Rohit M. A.,
Preeti Rao
Abstract:
The tabla is a unique percussion instrument due to the combined harmonic and percussive nature of its timbre, and the contrasting harmonic frequency ranges of its two drums. This allows a tabla player to uniquely emphasize parts of the rhythmic cycle (theka) in order to mark the salient positions. An analysis of the loudness dynamics and timing deviations at various cycle positions is an important…
▽ More
The tabla is a unique percussion instrument due to the combined harmonic and percussive nature of its timbre, and the contrasting harmonic frequency ranges of its two drums. This allows a tabla player to uniquely emphasize parts of the rhythmic cycle (theka) in order to mark the salient positions. An analysis of the loudness dynamics and timing deviations at various cycle positions is an important part of musicological studies on the expressivity in tabla accompaniment. To achieve this at a corpus-level, and not restrict it to the few recordings that manual annotation can afford, it is helpful to have access to an automatic tabla transcription system. Although a few systems have been built by training models on labeled tabla strokes, the achieved accuracy does not necessarily carry over to unseen instruments. In this article, we report our work towards building an instrument-independent stroke classification system for accompaniment tabla based on the more easily available tabla solo audio tracks. We present acoustic features that capture the distinctive characteristics of tabla strokes and build an automatic system to predict the label as one of a reduced, but musicologically motivated, target set of four stroke categories. To address the lack of sufficient labeled training data, we turn to common data augmentation methods and find the use of pitch-shifting based augmentation to be most promising. We then analyse the important features and highlight the problem of their instrument-dependence while motivating the use of more task-specific data augmentation strategies to improve the diversity of training data.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
LOCNES: a solar telescope to study stellar activity in the near infrared
Authors:
Claudi R.,
Ghedina A.,
Pace E.,
Di Giorgio A. M.,
D'Orazi V.,
Gallorini L.,
Lanza A. F.,
Liu S. J.,
Rainer M.,
Tozzi A.,
Carleo I.,
Maldonado Prado J.,
Micela G.,
Molinari E.,
Poretti E.,
Phillips D.,
Tripodo G.,
Cecconi M.,
Galli A.,
Gonzalez M. D.,
Guerra Padilla V.,
Guerra Ramòn J. G.,
Harutyunyan A.,
Hernàndez Càceres N.,
Hernàndez Dìaz M.
, et al. (5 additional authors not shown)
Abstract:
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an ent…
▽ More
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an entirely new area of investigation that will provide timely results to improve the search of telluric planets with NIR spectrographs such as iSHELL, CARMENES, and GIANO-B. We will extract several disc-integrated activity indicators and average magnetic field measurements for the Sun in the NIR. Eventually, they will be correlated with both the RV of the Sun-as-a -star and the resolved images of the solar disc in visible and NIR. Such an approach will allow for a better understanding of the origin of activity-induced RV variations in the two spectral domains and will help in improving the techniques for their corrections. In this paper, we outline the science drivers for the LOCNES project and its first commissioning results.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Planetary Nebulae with UVIT: A Progress Report
Authors:
N. Kameswara Rao,
Sutaria F.,
Murthy J.,
Ray A.,
Pandey G.
Abstract:
The spectral region between 1250 Angstroms - 3000 Angstroms contains important spectral lines to understand the morphological structures and evolution of planetary
nebulae. This is the region sampled by UVIT through various filter bands both in the continuum and in emission lines (e.g. C IV, He I, Mg II etc.). We have mapped several planetary nebulae with different characteristics, ranging in mo…
▽ More
The spectral region between 1250 Angstroms - 3000 Angstroms contains important spectral lines to understand the morphological structures and evolution of planetary
nebulae. This is the region sampled by UVIT through various filter bands both in the continuum and in emission lines (e.g. C IV, He I, Mg II etc.). We have mapped several planetary nebulae with different characteristics, ranging in morphology from bipolar to wide and diffuse, and in various states of ionization, comparing the UV with the x-ray morphologies wherever the x-ray images were also available. The major unanticipated discovery with UVIT has been the detection of previously undetected, cold, fluorescent, molecular hydrogen gas surrounding some planetary nebulae. This may be a possible solution to the missing mass problem. Here we present a review of our studies so far done (both published and on going) with UVIT.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Analysing Long Short Term Memory Models for Cricket Match Outcome Prediction
Authors:
Rahul Chakwate,
Madhan R A
Abstract:
As the technology advances, an ample amount of data is collected in sports with the help of advanced sensors. Sports Analytics is the study of this data to provide a constructive advantage to the team and its players. The game of international cricket is popular all across the globe. Recently, various machine learning techniques have been used to analyse the cricket match data and predict the matc…
▽ More
As the technology advances, an ample amount of data is collected in sports with the help of advanced sensors. Sports Analytics is the study of this data to provide a constructive advantage to the team and its players. The game of international cricket is popular all across the globe. Recently, various machine learning techniques have been used to analyse the cricket match data and predict the match outcome as win or lose. Generally these models make use of the overall match level statistics such as teams, venue, average run rate, win margin, etc to predict the match results before the beginning of the match. However, very few works provide insights based on the ball-by-ball level statistics. Here we propose a novel Recurrent Neural Network model which can predict the win probability of a match at regular intervals given the ball-by-ball statistics. The Long Short Term Memory (LSTM) Model takes as input the ball wise features as well as the match level details available from the training dataset. It gives a prediction of winning the match at any time stamp during the match. This level of insight will help the team to predict the probability of them winning the match after every ball and help them determine the critical in-game changes they should make in their game strategies.
△ Less
Submitted 3 November, 2020;
originally announced November 2020.
-
Structure and Automatic Segmentation of Dhrupad Vocal Bandish Audio
Authors:
Rohit M. A.,
Preeti Rao
Abstract:
A Dhrupad vocal concert comprises a composition section that is interspersed with improvised episodes of increased rhythmic activity involving the interaction between the vocals and the percussion. Tracking the changing rhythmic density, in relation to the underlying metric tempo of the piece, thus facilitates the detection and labeling of the improvised sections in the concert structure. This wor…
▽ More
A Dhrupad vocal concert comprises a composition section that is interspersed with improvised episodes of increased rhythmic activity involving the interaction between the vocals and the percussion. Tracking the changing rhythmic density, in relation to the underlying metric tempo of the piece, thus facilitates the detection and labeling of the improvised sections in the concert structure. This work concerns the automatic detection of the musically relevant rhythmic densities as they change in time across the bandish (composition) performance. An annotated dataset of Dhrupad bandish concert sections is presented. We investigate a CNN-based system, trained to detect local tempo relationships, and follow it with temporal smoothing. We also employ audio source separation as a pre-processing step to the detection of the individual surface densities of the vocals and the percussion. This helps us obtain the complete musical description of the concert sections in terms of capturing the changing rhythmic interaction of the two performers.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
Satellite-based estimates of decline and rebound in China's CO$_2$ emissions during COVID-19 pandemic
Authors:
Bo Zheng,
Guannan Geng,
Philippe Ciais,
Steven J. Davis,
Randall V. Martin,
Jun Meng,
Nana Wu,
Frederic Chevallier,
Gregoire Broquet,
Folkert Boersma,
Ronald van der A,
**tai Lin,
Dabo Guan,
Yu Lei,
Kebin He,
Qiang Zhang
Abstract:
Changes in CO$_2$ emissions during the COVID-19 pandemic have been estimated from indicators on activities like transportation and electricity generation. Here, we instead use satellite observations together with bottom-up information to track the daily dynamics of CO$_2$ emissions during the pandemic. Unlike activity data, our observation-based analysis can be independently evaluated and can prov…
▽ More
Changes in CO$_2$ emissions during the COVID-19 pandemic have been estimated from indicators on activities like transportation and electricity generation. Here, we instead use satellite observations together with bottom-up information to track the daily dynamics of CO$_2$ emissions during the pandemic. Unlike activity data, our observation-based analysis can be independently evaluated and can provide more detailed insights into spatially-explicit changes. Specifically, we use TROPOMI observations of NO$_2$ to deduce ten-day moving averages of NO$_x$ and CO$_2$ emissions over China, differentiating emissions by sector and province. Between January and April 2020, China's CO$_2$ emissions fell by 11.5% compared to the same period in 2019, but emissions have since rebounded to pre-pandemic levels owing to the fast economic recovery in provinces where industrial activity is concentrated.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications
Authors:
Rajan M A,
Manish Shukla,
Sachin Lodha
Abstract:
Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time consuming and also requires active participation of a large number of people to realize it. In order to overcome these drawbacks, digital contact tracin…
▽ More
Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time consuming and also requires active participation of a large number of people to realize it. In order to overcome these drawbacks, digital contact tracing has been proposed that typically involves deploying a contact tracing application on people's mobile devices which can track their movements and close social interactions. While studies suggest that digital contact tracing is more effective than manual contact tracing, it has been observed that higher adoption rates of the contact tracing app may result in a better controlled epidemic. This also increases the confidence in the accuracy of the collected data and the subsequent analytics. One key reason for low adoption rate of contact tracing applications is the concern about individual privacy. In fact, several studies report that contact tracing applications deployed in multiple countries are not privacy friendly and have potential to be used for mass surveillance by the concerned governments. Hence, privacy respecting contact tracing application is the need of the hour that can lead to highly effective, efficient contact tracing. As part of this study, we focus on various cryptographic techniques that can help in addressing the Private Set Intersection problem which lies at the heart of privacy respecting contact tracing. We analyze the computation and communication complexities of these techniques under the typical client-server architecture utilized by contact tracing applications. Further we evaluate those computation and communication complexity expressions for India scenario and thus identify cryptographic techniques that can be more suitably deployed there.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Assessing Car Damage using Mask R-CNN
Authors:
Sarath P,
Soorya M,
Shaik Abdul Rahman A,
S Suresh Kumar,
K Devaki
Abstract:
Picture based vehicle protection handling is a significant region with enormous degree for mechanization. In this paper we consider the issue of vehicle harm characterization, where a portion of the classifications can be fine-granular. We investigate profound learning based procedures for this reason. At first, we attempt legitimately preparing a CNN. In any case, because of little arrangement of…
▽ More
Picture based vehicle protection handling is a significant region with enormous degree for mechanization. In this paper we consider the issue of vehicle harm characterization, where a portion of the classifications can be fine-granular. We investigate profound learning based procedures for this reason. At first, we attempt legitimately preparing a CNN. In any case, because of little arrangement of marked information, it doesn't function admirably. At that point, we investigate the impact of space explicit pre-preparing followed by tweaking. At last, we explore different avenues regarding move learning and outfit learning. Trial results show that move learning works superior to space explicit tweaking. We accomplish precision of 89.5% with blend of move and gathering learning.
△ Less
Submitted 4 May, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Privacy Guidelines for Contact Tracing Applications
Authors:
Manish Shukla,
Rajan M A,
Sachin Lodha,
Gautam Shroff,
Ramesh Raskar
Abstract:
Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a comb…
▽ More
Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a combination of GPS based absolute location and Bluetooth based relative location remitted from user's smartphone to infer various insights. These applications have eased the task of contact tracing; however, they also have severe implication on user's privacy, for example, mass surveillance, personal information leakage and additionally revealing the behavioral patterns of the user. This impact on user's privacy leads to trust deficit in these applications, and hence defeats their purpose.
In this work we discuss the various scenarios which a contact tracing application should be able to handle. We highlight the privacy handling of some of the prominent contact tracing applications. Additionally, we describe the various threat actors who can disrupt its working, or misuse end user's data, or hamper its mass adoption. Finally, we present privacy guidelines for contact tracing applications from different stakeholder's perspective. To best of our knowledge, this is the first generic work which provides privacy guidelines for contact tracing applications.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Color Image Segmentation using Adaptive Particle Swarm Optimization and Fuzzy C-means
Authors:
Narayana Reddy A,
Ranjita Das
Abstract:
Segmentation partitions an image into different regions containing pixels with similar attributes. A standard non-contextual variant of Fuzzy C-means clustering algorithm (FCM), considering its simplicity is generally used in image segmentation. Using FCM has its disadvantages like it is dependent on the initial guess of the number of clusters and highly sensitive to noise. Satisfactory visual seg…
▽ More
Segmentation partitions an image into different regions containing pixels with similar attributes. A standard non-contextual variant of Fuzzy C-means clustering algorithm (FCM), considering its simplicity is generally used in image segmentation. Using FCM has its disadvantages like it is dependent on the initial guess of the number of clusters and highly sensitive to noise. Satisfactory visual segments cannot be obtained using FCM. Particle Swarm Optimization (PSO) belongs to the class of evolutionary algorithms and has good convergence speed and fewer parameters compared to Genetic Algorithms (GAs). An optimized version of PSO can be combined with FCM to act as a proper initializer for the algorithm thereby reducing its sensitivity to initial guess. A hybrid PSO algorithm named Adaptive Particle Swarm Optimization (APSO) which improves in the calculation of various hyper parameters like inertia weight, learning factors over standard PSO, using insights from swarm behaviour, leading to improvement in cluster quality can be used. This paper presents a new image segmentation algorithm called Adaptive Particle Swarm Optimization and Fuzzy C-means Clustering Algorithm (APSOF), which is based on Adaptive Particle Swarm Optimization (APSO) and Fuzzy C-means clustering. Experimental results show that APSOF algorithm has edge over FCM in correctly identifying the optimum cluster centers, there by leading to accurate classification of the image pixels. Hence, APSOF algorithm has superior performance in comparison with classic Particle Swarm Optimization (PSO) and Fuzzy C-means clustering algorithm (FCM) for image segmentation.
△ Less
Submitted 18 April, 2020;
originally announced April 2020.
-
Abrupt declines in tropospheric nitrogen dioxide over China after the outbreak of COVID-19
Authors:
Fei Liu,
Aaron Page,
Sarah A. Strode,
Yasuko Yoshida,
Sungyeon Choi,
Bo Zheng,
Lok N. Lamsal,
Can Li,
Nickolay A. Krotkov,
Henk Eskes,
Ronald van der A,
Pepijn Veefkind,
Pieternel Levelt,
Joanna Joiner,
Oliver P. Hauser
Abstract:
China's policy interventions to reduce the spread of the coronavirus disease 2019 have environmental and economic impacts. Tropospheric nitrogen dioxide indicates economic activities, as nitrogen dioxide is primarily emitted from fossil fuel consumption. Satellite measurements show a 48% drop in tropospheric nitrogen dioxide vertical column densities from the 20 days averaged before the 2020 Lunar…
▽ More
China's policy interventions to reduce the spread of the coronavirus disease 2019 have environmental and economic impacts. Tropospheric nitrogen dioxide indicates economic activities, as nitrogen dioxide is primarily emitted from fossil fuel consumption. Satellite measurements show a 48% drop in tropospheric nitrogen dioxide vertical column densities from the 20 days averaged before the 2020 Lunar New Year to the 20 days averaged after. This is 20% larger than that from recent years. We relate to this reduction to two of the government's actions: the announcement of the first report in each province and the date of a province's lockdown. Both actions are associated with nearly the same magnitude of reductions. Our analysis offers insights into the unintended environmental and economic consequences through reduced economic activities.
△ Less
Submitted 14 April, 2020;
originally announced April 2020.
-
TOI-257b (HD 19916b): A Warm sub-Saturn Orbiting an Evolved F-type Star
Authors:
Brett C. Addison,
Duncan J. Wright,
Belinda A. Nicholson,
Bryson Cale,
Teo Mocnik,
Daniel Huber,
Peter Plavchan,
Robert A. Wittenmyer,
Andrew Vanderburg,
William J. Chaplin,
Ashley Chontos,
Jake T. Clark,
Jason D. Eastman,
Carl Ziegler,
Rafael Brahm,
Bradley D. Carter,
Mathieu Clerte,
Néstor Espinoza,
Jonathan Horner,
John Bentley,
Andrés Jordán,
Stephen R. Kane,
John F. Kielkopf,
Emilie Laychock,
Matthew W. Mengel
, et al. (69 additional authors not shown)
Abstract:
We report the discovery of a warm sub-Saturn, TOI-257b (HD 19916b), based on data from NASA's Transiting Exoplanet Survey Satellite (TESS). The transit signal was detected by TESS and confirmed to be of planetary origin based on radial velocity observations. An analysis of the TESS photometry, the Minerva-Australis, FEROS, and HARPS radial velocities, and the asteroseismic data of the stellar osci…
▽ More
We report the discovery of a warm sub-Saturn, TOI-257b (HD 19916b), based on data from NASA's Transiting Exoplanet Survey Satellite (TESS). The transit signal was detected by TESS and confirmed to be of planetary origin based on radial velocity observations. An analysis of the TESS photometry, the Minerva-Australis, FEROS, and HARPS radial velocities, and the asteroseismic data of the stellar oscillations reveals that TOI-257b has a mass of $M_P=0.138\pm0.023$\,$\rm{M_J}$ ($43.9\pm7.3$\,$M_{\rm \oplus}$), a radius of $R_P=0.639\pm0.013$\,$\rm{R_J}$ ($7.16\pm0.15$\,$R_{\rm \oplus}$), bulk density of $0.65^{+0.12}_{-0.11}$ (cgs), and period $18.38818^{+0.00085}_{-0.00084}$\,$\rm{days}$. TOI-257b orbits a bright ($\mathrm{V}=7.612$\,mag) somewhat evolved late F-type star with $M_*=1.390\pm0.046$\,$\rm{M_{\odot}}$, $R_*=1.888\pm0.033$\,$\rm{R_{\odot}}$, $T_{\rm eff}=6075\pm90$\,$\rm{K}$, and $v\sin{i}=11.3\pm0.5$\,km\,s$^{-1}$. Additionally, we find hints for a second non-transiting sub-Saturn mass planet on a $\sim71$\,day orbit using the radial velocity data. This system joins the ranks of a small number of exoplanet host stars ($\sim100$) that have been characterized with asteroseismology. Warm sub-Saturns are rare in the known sample of exoplanets, and thus the discovery of TOI-257b is important in the context of future work studying the formation and migration history of similar planetary systems.
△ Less
Submitted 11 April, 2021; v1 submitted 21 January, 2020;
originally announced January 2020.
-
The CALOCUBE project for a space based cosmic ray experiment: design, construction, and first performance of a high granularity calorimeter prototype
Authors:
Adriani O.,
Albergo S.,
Auditore L.,
Basti A.,
Berti E.,
Bigongiari G.,
Bonechi L.,
Bongi M.,
Bonvicini V.,
Bottai S.,
Brogi P.,
Cappello G.,
Carotenuto G.,
Castellini G.,
Cattaneo P. W.,
Cecchi R.,
Checchia C.,
D'Alessandro R.,
Detti S.,
Fasoli M.,
Finetti N.,
Italiano A.,
Lenzi P.,
Maestro P.,
Manetti M.
, et al. (26 additional authors not shown)
Abstract:
Current research in High Energy Cosmic Ray Physics touches on fundamental questions regarding the origin of cosmic rays, their composition, the acceleration mechanisms, and their production. Unambiguous measurements of the energy spectra and of the composition of cosmic rays at the "knee" region could provide some of the answers to the above questions. So far only ground based observations, which…
▽ More
Current research in High Energy Cosmic Ray Physics touches on fundamental questions regarding the origin of cosmic rays, their composition, the acceleration mechanisms, and their production. Unambiguous measurements of the energy spectra and of the composition of cosmic rays at the "knee" region could provide some of the answers to the above questions. So far only ground based observations, which rely on sophisticated models describing high energy interactions in the earth's atmosphere, have been possible due to the extremely low particle rates at these energies. A calorimetry based space experiment that could provide not only flux measurements but also energy spectra and particle identification, would certainly overcome some of the uncertainties of ground based experiments. Given the expected particle fluxes, a very large acceptance is needed to collect a sufficient quantity of data, in a time compatible with the duration of a space mission. This in turn, contrasts with the lightness and compactness requirements for space based experiments. We present a novel idea in calorimetry which addresses these issues whilst limiting the mass and volume of the detector. In this paper we report on a four year R&D program where we investigated materials, coatings, photo-sensors, Front End electronics, and mechanical structures with the aim of designing a high performance, high granularity calorimeter with the largest possible acceptance. Details are given of the design choices, component characterisation, and of the construction of a sizeable prototype (Calocube) which has been used in various tests with particle beams.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
NAOMI: the adaptive optics system of the Auxiliary Telescopes of the VLTI
Authors:
Woillez J.,
Abad J. A.,
Abuter R.,
Aller Carpentier E.,
Alonso J.,
Andolfato L.,
Barriga P.,
Berger J. -P.,
Beuzit J. -L.,
Bonnet H.,
Bourdarot G.,
Bourget P.,
Brast R.,
Caniguante L.,
Cottalorda E.,
Darré P.,
Delabre B.,
Delboulbé A.,
Delplancke-Ströbele F.,
Dembet R.,
Donaldson R.,
Dorn R.,
Dupeyron J.,
Dupuy C.,
Egner S.
, et al. (58 additional authors not shown)
Abstract:
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking e…
▽ More
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking even in degraded conditions. We deployed a new adaptive optics module for interferometry (NAOMI) on the Auxiliary Telescopes. We present its design, performance, and effect on the observations that are carried out with the interferometric instruments.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Federated AI lets a team imagine together: Federated Learning of GANs
Authors:
Rajagopal. A,
Nirmala. V
Abstract:
Envisioning a new imaginative idea together is a popular human need. Imagining together as a team can often lead to breakthrough ideas, but the collaboration effort can also be challenging, especially when the team members are separated by time and space. What if there is a AI that can assist the team to collaboratively envision new ideas?. Is it possible to develop a working model of such an AI?…
▽ More
Envisioning a new imaginative idea together is a popular human need. Imagining together as a team can often lead to breakthrough ideas, but the collaboration effort can also be challenging, especially when the team members are separated by time and space. What if there is a AI that can assist the team to collaboratively envision new ideas?. Is it possible to develop a working model of such an AI? This paper aims to design such an intelligence. This paper proposes a approach to design a creative and collaborative intelligence by employing a form of distributed machine learning approach called Federated Learning along with fusion on Generative Adversarial Networks, GAN. This collaborative creative AI presents a new paradigm in AI, one that lets a team of two or more to come together to imagine and envision ideas that synergies well with interests of all members of the team. In short, this paper explores the design of a novel type of AI paradigm, called Federated AI Imagination, one that lets geographically distributed teams to collaboratively imagine.
△ Less
Submitted 9 June, 2019;
originally announced June 2019.
-
Strategies to architect AI Safety: Defense to guard AI from Adversaries
Authors:
Rajagopal. A,
Nirmala. V
Abstract:
The impact of designing for security of AI is critical for humanity in the AI era. With humans increasingly becoming dependent upon AI, there is a need for neural networks that work reliably, inspite of Adversarial attacks. The vision for Safe and secure AI for popular use is achievable. To achieve safety of AI, this paper explores strategies and a novel deep learning architecture. To guard AI fro…
▽ More
The impact of designing for security of AI is critical for humanity in the AI era. With humans increasingly becoming dependent upon AI, there is a need for neural networks that work reliably, inspite of Adversarial attacks. The vision for Safe and secure AI for popular use is achievable. To achieve safety of AI, this paper explores strategies and a novel deep learning architecture. To guard AI from adversaries, paper explores combination of 3 strategies:
1. Introduce randomness at inference time to hide the representation learning from adversaries.
2. Detect presence of adversaries by analyzing the sequence of inferences.
3. Exploit visual similarity.
To realize these strategies, this paper designs a novel architecture, Dynamic Neural Defense, DND. This defense has 3 deep learning architectural features:
1. By hiding the way a neural network learns from exploratory attacks using a random computation graph, DND evades attack.
2. By analyzing input sequence to cloud AI inference engine with LSTM, DND detects attack sequence.
3. By inferring with visual similar inputs generated by VAE, any AI defended by DND approach does not succumb to hackers.
Thus, a roadmap to develop reliable, safe and secure AI is presented.
△ Less
Submitted 8 June, 2019;
originally announced June 2019.
-
Wiener index and Steiner 3-Wiener index of a graph
Authors:
Matjaž Kovše,
Rasila V A,
Ambat Vijayakumar
Abstract:
Let $S$ be a set of vertices of a connected graph $G$. The Steiner distance of $S$ is the minimum size of a connected subgraph of $G$ containing all the vertices of $S$. The sum of all Steiner distances on sets of size $k$ is called the Steiner $k$-Wiener index, hence for $k=2$ we get the Wiener index. The modular graphs are graphs in which every three vertices $x, y$ and $z$ have at least one med…
▽ More
Let $S$ be a set of vertices of a connected graph $G$. The Steiner distance of $S$ is the minimum size of a connected subgraph of $G$ containing all the vertices of $S$. The sum of all Steiner distances on sets of size $k$ is called the Steiner $k$-Wiener index, hence for $k=2$ we get the Wiener index. The modular graphs are graphs in which every three vertices $x, y$ and $z$ have at least one median vertex $m(x,y,z)$ that belongs to shortest paths between each pair of $x, y$ and $z$. The Steiner 3-Wiener index of a modular graph is expressed in terms of its Wiener index. As a corollary formulae for the Steiner 3-Wiener index of Fibonacci and Lucas cubes are obtained.
△ Less
Submitted 27 September, 2018;
originally announced September 2018.
-
Steiner Wiener index of block graphs
Authors:
Matjaž Kovše,
Rasila V A,
Ambat Vijayakumar
Abstract:
Let $S$ be a set of vertices of a connected graph $G$. The Steiner distance of $S$ is the minimum size of a connected subgraph of $G$ containing all the vertices of $S$. The Steiner $k$-Wiener index is the sum of all Steiner distances on sets of $k$ vertices of $G$. Different simple methods for calculating the Steiner $k$-Wiener index of block graphs are presented.
Let $S$ be a set of vertices of a connected graph $G$. The Steiner distance of $S$ is the minimum size of a connected subgraph of $G$ containing all the vertices of $S$. The Steiner $k$-Wiener index is the sum of all Steiner distances on sets of $k$ vertices of $G$. Different simple methods for calculating the Steiner $k$-Wiener index of block graphs are presented.
△ Less
Submitted 13 September, 2018; v1 submitted 21 May, 2018;
originally announced May 2018.
-
SDSS IV MaNGA - Rotation Velocity Lags in the Extraplanar Ionized Gas from MaNGA Observations of Edge-on Galaxies
Authors:
D. Bizyaev,
R. A. M. Walterbos,
P. Yoachim,
P.,
R. A. Riffel,
R. A.,
J. G. Fernández-Trincado,
K. Pan,
A. M. Diamond-Stanic,
A. Jones,
D. Thomas,
J. Cleary,
J. Brinkmann
Abstract:
We present a study of the kinematics of the extraplanar ionized gas around several dozen galaxies observed by the Map** of Nearby Galaxies at the Apache Point Observatory (MaNGA) survey. We considered a sample of 67 edge-on galaxies out of more than 1400 extragalactic targets observed by MaNGA, in which we found 25 galaxies (or 37%) with regular lagging of the rotation curve at large distances f…
▽ More
We present a study of the kinematics of the extraplanar ionized gas around several dozen galaxies observed by the Map** of Nearby Galaxies at the Apache Point Observatory (MaNGA) survey. We considered a sample of 67 edge-on galaxies out of more than 1400 extragalactic targets observed by MaNGA, in which we found 25 galaxies (or 37%) with regular lagging of the rotation curve at large distances from the galactic midplane. We model the observed $Hα$ emission velocity fields in the galaxies, taking projection effects and a simple model for the dust extinction into the account. We show that the vertical lag of the rotation curve is necessary in the modeling, and estimate the lag amplitude in the galaxies. We find no correlation between the lag and the star formation rate in the galaxies. At the same time, we report a correlation between the lag and the galactic stellar mass, central stellar velocity dispersion, and axial ratio of the light distribution. These correlations suggest a possible higher ratio of infalling-to-local gas in early-type disk galaxies or a connection between lags and the possible presence of hot gaseous halos, which may be more prevalent in more massive galaxies. These results again demonstrate that observations of extraplanar gas can serve as a potential probe for accretion of gas.
△ Less
Submitted 9 April, 2017;
originally announced April 2017.
-
Asteroseismic inference on rotation, gyrochronology and planetary system dynamics of 16 Cygni
Authors:
G. R. Davies,
W. J. Chaplin,
W. M. Farr,
R. A. Garcí a,
M. N. Lund,
S. Mathis,
T. S. Metcalfe,
T. Appourchaux,
S. Basu,
O. Benomar,
T. L. Campante,
T. Ceillier,
Y. Elsworth,
R. Handberg,
D. Salabert,
D. Stello
Abstract:
The solar analogs 16 Cyg A and 16 Cyg B are excellent asteroseismic targets in the \Kepler field of view and together with a red dwarf and a Jovian planet form an interesting system. For these more evolved Sun-like stars we cannot detect surface rotation with the current \Kepler data but instead use the technique of asteroseimology to determine rotational properties of both 16 Cyg A and B. We find…
▽ More
The solar analogs 16 Cyg A and 16 Cyg B are excellent asteroseismic targets in the \Kepler field of view and together with a red dwarf and a Jovian planet form an interesting system. For these more evolved Sun-like stars we cannot detect surface rotation with the current \Kepler data but instead use the technique of asteroseimology to determine rotational properties of both 16 Cyg A and B. We find the rotation periods to be $23.8^{+1.5}_{-1.8} \rm \, days$ and $23.2^{+11.5}_{-3.2} \rm \, days$, and the angles of inclination to be $56^{+6}_{-5} \, ^{\circ}$ and $36^{+17}_{-7} \, ^{\circ}$, for A and B respectively. Together with these results we use the published mass and age to suggest that, under the assumption of a solar-like rotation profile, 16 Cyg A could be used when calibrating gyrochronology relations. In addition, we discuss the known 16 Cyg B star-planet eccentricity and measured low obliquity which is consistent with Kozai cycling and tidal theory.
△ Less
Submitted 5 November, 2014;
originally announced November 2014.
-
New Superconductor (Na0.25K0.45) Ba3Bi4O12: A First-principles Study
Authors:
Ali M. S.,
Aftabuzzaman M.,
Roknuzzaman M.,
Rayhan M. A.,
Parvin F.,
Ali M. M.,
Rubel M. H. K.,
Islam A. K. M. A
Abstract:
A new superconductor (Na0.25K0.45)Ba3Bi4O12, having an A-site-ordered double perovskite structure, with a maximum Tc ~ 27 K has very recently been discovered through hydrothermal synthesis at 593 K. The structural, elastic, electronic, and thermal properties of the new synthesized compound have been investigated theoretically. Here we have employed the pseudo-potential plane-wave (PP-PW) approach…
▽ More
A new superconductor (Na0.25K0.45)Ba3Bi4O12, having an A-site-ordered double perovskite structure, with a maximum Tc ~ 27 K has very recently been discovered through hydrothermal synthesis at 593 K. The structural, elastic, electronic, and thermal properties of the new synthesized compound have been investigated theoretically. Here we have employed the pseudo-potential plane-wave (PP-PW) approach based on the density functional (DFT) theory, within the generalized gradient approximation (GGA). The elastic constants (Cij), Pugh`s ratio, Cauchy`s pressure and other elastic parameters are derived and analyzed using energy strain method for the first time. We have discussed the bonding nature in the light of the electronic valence charge density. Both electron and hole-like Fermi surfaces are present in the compound under study which indicate the multiple-band nature of (Na0.25K0.45)Ba3Bi4O12. The compound is indicated to be a strongly coupled superconductor which is based on the estimated e-ph coupling constant. The thermodynamic properties such as bulk modulus, Debye temperature, heat capacities and volume thermal expansion coefficient at elevated temperature and pressure are calculated and analyzed for the first time by using quasi-harmonic model.
Key words: double perovskite, superconductor, elastic properties, electronic properties, thermal properties
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Architectural Pattern of Health Care System Using GSM Networks
Authors:
Meiappane. A,
Dr. V. Prasanna Venkatesan,
Selva Murugan. S,
Arun. A,
Ramachandran. A
Abstract:
Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or…
▽ More
Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or a health care information portal is still in its infancy. The shortcomings of the currently available tools have made the use of mobile devices more appealing. In mobile computing, the issues such as low bandwidth, high latency wireless Networks, loss or degradation of wireless connections, and network errors or failures need to be dealt with. Other issues to be addressed include system adaptability, reliability, robustness, extensibility, flexibility, and maintainability. GSM approach has emerged as the most viable approach for development of intelligent software applications for wireless mobile devices in a centralized environment, which gives higher band width of 900 MHz for transmission. The e-healthcare system that we have developed provides support for physicians, nurses, pharmacists and other healthcare professionals, as well as for patients and medical devices used to monitor patients. In this paper, we present the architecture and the demonstration prototype.
△ Less
Submitted 9 December, 2013;
originally announced December 2013.
-
An Exact, Time-Independent Approach to Clone Size Distributions in Normal and Mutated Cells
Authors:
Roshan A,
Jones PH,
Greenman CD
Abstract:
Biological tools such as genetic lineage tracing, three dimensional confocal microscopy and next generation DNA sequencing are providing new ways to quantify the distribution of clones of normal and mutated cells. Population-wide clone size distributions in vivo are complicated by multiple cell types, and overlap** birth and death processes. This has led to the increased need for mathematically…
▽ More
Biological tools such as genetic lineage tracing, three dimensional confocal microscopy and next generation DNA sequencing are providing new ways to quantify the distribution of clones of normal and mutated cells. Population-wide clone size distributions in vivo are complicated by multiple cell types, and overlap** birth and death processes. This has led to the increased need for mathematically informed models to understand their biological significance. Standard approaches usually require knowledge of clonal age. We show that modelling on clone size independent of time is an alternative method that offers certain analytical advantages; it can help parameterize these models, and obtain distributions for counts of mutated or proliferating cells, for example. When applied to a general birth-death process common in epithelial progenitors this takes the form of a gamblers ruin problem, the solution of which relates to counting Motzkin lattice paths. Applying this approach to mutational processes, an alternative, exact, formulation of the classic Luria Delbruck problem emerges. This approach can be extended beyond neutral models of mutant clonal evolution, and also describe some distributions relating to sub-clones within a tumour. The approaches above are generally applicable to any Markovian branching process where the dynamics of different "coloured" daughter branches are of interest.
△ Less
Submitted 22 November, 2013;
originally announced November 2013.
-
Observation of the decay $ψ(3686)$ $\rightarrow$ $Λ\barΣ^{\pm}π^{\mp}+c.c.$
Authors:
BESIII collaboration,
M. Ablikim,
M. N. Achasov,
X. C. Ai,
O. Albayrak,
D. J. Ambrose,
F. F. An,
Q. An,
J. Z. Bai,
R. Baldini Ferroli A,
Y. Ban,
J. V. Bennett,
M. Bertani A,
J. M. Bian,
E. Boger,
O. Bondarenko,
I. Boyko,
S. Braun,
R. A. Briere,
H. Cai,
X. Cai,
O. Cakir A,
A. Calcaterra A,
G. F. Cao,
S. A. Cetin B
, et al. (353 additional authors not shown)
Abstract:
Using a sample of $1.06\times10^{8}$ $ψ(3686)$ events collected with the BESIII detector, we present the first observation of the decays of $ψ(3686)$ $\rightarrow$ $Λ\barΣ^{+}π^{-}+c.c.$ and $ψ(3686)$ $\rightarrow$ $Λ\barΣ^{-}π^{+}+c.c.$. The branching fractions are measured to be $\mathcal{B}(ψ(3686) \rightarrow Λ\barΣ^{+}π^{-} + c.c.)=(1.40\pm 0.03 \pm 0.13)\times10^{-4}$ and…
▽ More
Using a sample of $1.06\times10^{8}$ $ψ(3686)$ events collected with the BESIII detector, we present the first observation of the decays of $ψ(3686)$ $\rightarrow$ $Λ\barΣ^{+}π^{-}+c.c.$ and $ψ(3686)$ $\rightarrow$ $Λ\barΣ^{-}π^{+}+c.c.$. The branching fractions are measured to be $\mathcal{B}(ψ(3686) \rightarrow Λ\barΣ^{+}π^{-} + c.c.)=(1.40\pm 0.03 \pm 0.13)\times10^{-4}$ and $\mathcal{B}(ψ(3686) \rightarrow Λ\barΣ^{-}π^{+}+c.c.)=(1.54\pm 0.04 \pm 0.13)\times10^{-4}$, where the first errors are statistical and the second ones systematic.
△ Less
Submitted 22 October, 2013;
originally announced October 2013.
-
A Secure And High Capacity Image Steganography Technique
Authors:
Hemalatha S,
U Dinesh Acharya,
Renuka A,
Priya R. Kamath
Abstract:
Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer Wavelet Transform (IWT). There is no visu…
▽ More
Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted secret images are also similar to the original secret images. Very good PSNR (Peak Signal to Noise Ratio) values are obtained for both stego and extracted secret images. The results are compared with the results of other techniques, where single image is hidden and it is found that the proposed technique is simple and gives better PSNR values than others.
△ Less
Submitted 11 April, 2013;
originally announced April 2013.