-
Timelike Entanglement Entropy and Phase Transitions in non-Conformal Theories
Authors:
Mir Afrasiar,
Jaydeep Kumar Basak,
Dimitrios Giataganas
Abstract:
We propose a holographic formalism for a timelike entanglement entropy in non-conformal theories. This pseudoentropy is a complex-valued measure of information, which, in holographic non-conformal theories, receives contributions from a set of spacelike surfaces and a finite timelike bulk surface with mirror symmetry. We suggest a method of merging the surfaces so that the boundary length of the s…
▽ More
We propose a holographic formalism for a timelike entanglement entropy in non-conformal theories. This pseudoentropy is a complex-valued measure of information, which, in holographic non-conformal theories, receives contributions from a set of spacelike surfaces and a finite timelike bulk surface with mirror symmetry. We suggest a method of merging the surfaces so that the boundary length of the subregion is exclusively specified by holography. We show that in confining theories, the surfaces can be merged in the bulk at the infrared tip of the geometry and are homologous to the boundary region. The timelike entanglement entropy receives its imaginary and real contributions from the timelike and the spacelike surfaces, respectively. Additionally, we demonstrate that in confining theories, there exists a critical length within which a connected non-trivial surface can exist, and the imaginary part of the timelike entanglement entropy is non-zero. Therefore, the timelike entanglement entropy exhibits unique behavior in confining theories, making it a probe of confinement and phase transitions. Finally, we discuss the entanglement entropy in Euclidean spacetime in confining theories and the effect of a simple analytical continuation from a spacelike subsystem to a timelike one.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts
Authors:
Setu Kumar Basak,
K. Virgil English,
Ken Ogura,
Vitesh Kambara,
Bradley Reaves,
Laurie Williams
Abstract:
GitGuardian monitored secrets exposure in public GitHub repositories and reported developers leaked over 12 million secrets (database and other credentials) in 2023, indicating a 113% surge from 2021. Despite the availability of secret detection tools, developers ignore the tools' reported warnings because of false positives (25%-99%). However, each secret protects assets of different values acces…
▽ More
GitGuardian monitored secrets exposure in public GitHub repositories and reported developers leaked over 12 million secrets (database and other credentials) in 2023, indicating a 113% surge from 2021. Despite the availability of secret detection tools, developers ignore the tools' reported warnings because of false positives (25%-99%). However, each secret protects assets of different values accessible through asset identifiers (a DNS name and a public or private IP address). The asset information for a secret can aid developers in filtering false positives and prioritizing secret removal from the source code. However, existing secret detection tools do not provide the asset information, thus presenting difficulty to developers in filtering secrets only by looking at the secret value or finding the assets manually for each reported secret. The goal of our study is to aid software practitioners in prioritizing secrets removal by providing the assets information protected by the secrets through our novel static analysis tool. We present AssetHarvester, a static analysis tool to detect secret-asset pairs in a repository. Since the location of the asset can be distant from where the secret is defined, we investigated secret-asset co-location patterns and found four patterns. To identify the secret-asset pairs of the four patterns, we utilized three approaches (pattern matching, data flow analysis, and fast-approximation heuristics). We curated a benchmark of 1,791 secret-asset pairs of four database types extracted from 188 public GitHub repositories to evaluate the performance of AssetHarvester. AssetHarvester demonstrates precision of (97%), recall (90%), and F1-score (94%) in detecting secret-asset pairs. Our findings indicate that data flow analysis employed in AssetHarvester detects secret-asset pairs with 0% false positives and aids in improving the recall of secret detection tools.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports
Authors:
Md Rayhanur Rahman,
Setu Kumar Basak,
Rezvan Mahdavi Hezaveh,
Laurie Williams
Abstract:
Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring to the written artifacts on technical and forensic analysis of the techniques used by the malware in APT attacks. Objective: The goal of this research is to inform cybersecurity practitioners about how adversaries form cyberattacks through an analysis of adversarial techniques documented in cyberthreat…
▽ More
Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring to the written artifacts on technical and forensic analysis of the techniques used by the malware in APT attacks. Objective: The goal of this research is to inform cybersecurity practitioners about how adversaries form cyberattacks through an analysis of adversarial techniques documented in cyberthreat intelligence reports. Dataset: We use 594 adversarial techniques cataloged in MITRE ATT\&CK. We systematically construct a set of 667 CTI reports that MITRE ATT\&CK used as citations in the descriptions of the cataloged adversarial techniques. Methodology: We analyze the frequency and trend of adversarial techniques, followed by a qualitative analysis of the implementation of techniques. Next, we perform association rule mining to identify pairs of techniques recurring in APT attacks. We then perform qualitative analysis to identify the underlying relations among the techniques in the recurring pairs. Findings: The set of 667 CTI reports documents 10,370 techniques in total, and we identify 19 prevalent techniques accounting for 37.3\% of documented techniques. We also identify 425 statistically significant recurring pairs and seven types of relations among the techniques in these pairs. The top three among the seven relationships suggest that techniques used by the malware inter-relate with one another in terms of (a) abusing or affecting the same system assets, (b) executing in sequences, and (c) overlap** in their implementations. Overall, the study quantifies how adversaries leverage techniques through malware in APT attacks based on publicly reported documents. We advocate organizations prioritize their defense against the identified prevalent techniques and actively hunt for potential malicious intrusion based on the identified pairs of techniques.
△ Less
Submitted 3 January, 2024;
originally announced January 2024.
-
Massless Lifshitz Field Theory for Arbitrary $z$
Authors:
Jaydeep Kumar Basak,
Adrita Chakraborty,
Chong-Sun Chu,
Dimitrios Giataganas,
Himanshu Parihar
Abstract:
By using the notion of fractional derivatives, we introduce a class of massless Lifshitz scalar field theory in (1+1)-dimension with an arbitrary anisotropy index $z$. The Lifshitz scale invariant ground state of the theory is constructed explicitly and takes the form of Rokhsar-Kivelson (RK). We show that there is a continuous family of ground states with degeneracy parameterized by the choice of…
▽ More
By using the notion of fractional derivatives, we introduce a class of massless Lifshitz scalar field theory in (1+1)-dimension with an arbitrary anisotropy index $z$. The Lifshitz scale invariant ground state of the theory is constructed explicitly and takes the form of Rokhsar-Kivelson (RK). We show that there is a continuous family of ground states with degeneracy parameterized by the choice of solution to the equation of motion of an auxiliary classical system. The quantum mechanical path integral establishes a 2d/1d correspondence with the equal time correlation functions of the Lifshitz scalar field theory. We study the entanglement properties of the Lifshitz theory for arbitrary $z$ using the path integral representation. The entanglement measures are expressed in terms of certain cross ratio functions we specify, and satisfy the $c$-function monotonicity theorems. We also consider the holographic description of the Lifshitz theory. In order to match with the field theory result for the entanglement entropy, we propose a $z$-dependent radius scale for the Lifshitz background. This relation is consistent with the $z$-dependent scaling symmetry respected by the Lifshitz vacuum. Furthermore, the time-like entanglement entropy is determined using holography. Our result suggests that there should exist a fundamental definition of time-like entanglement other than employing analytic continuation as performed in relativistic field theory.
△ Less
Submitted 16 May, 2024; v1 submitted 26 December, 2023;
originally announced December 2023.
-
Holographic Reflected Entropy and Islands in Interface CFTs
Authors:
Jaydeep Kumar Basak,
Debarshi Basu,
Vinay Malvimat,
Himanshu Parihar,
Gautam Sengupta
Abstract:
We investigate the reflected entropy for various mixed state configurations in the two dimensional holographic conformal field theories sharing a common interface (ICFTs). In the AdS$_3$/ICFT$_2$ framework, we compute the holographic reflected entropy for the required configurations in the vacuum state of the ICFT$_{\text{2}}$ which is given by twice the entanglement wedge cross section (EWCS) in…
▽ More
We investigate the reflected entropy for various mixed state configurations in the two dimensional holographic conformal field theories sharing a common interface (ICFTs). In the AdS$_3$/ICFT$_2$ framework, we compute the holographic reflected entropy for the required configurations in the vacuum state of the ICFT$_{\text{2}}$ which is given by twice the entanglement wedge cross section (EWCS) in a spacetime involving two AdS$_3$ geometries glued along a thin interface brane. Subsequently, we evaluate the EWCS in the bulk geometry involving eternal BTZ black strings with an AdS$_2$ interface brane, which is dual to an ICFT$_2$ in the thermofield double (TFD) state. We explore the system from a doubly holographic perspective and determine the island contributions to the reflected entropy in the two dimensional semi-classical description involving two CFT$_{\text{2}}$s coupled to an AdS$_2$ brane. We demonstrate that the results from the island formula match precisely with the bulk AdS$_3$ results in the large tension limit of the interface brane. We illustrate that the phase structure of the reflected entropy is quite rich involving many novel induced island phases and demonstrate that it obeys the expected Page curve for the reflected entropy in a radiation bath coupled to the AdS$_2$ black hole.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
A Comparative Study of Software Secrets Reporting by Secret Detection Tools
Authors:
Setu Kumar Basak,
Jamison Cox,
Bradley Reaves,
Laurie Williams
Abstract:
Background: According to GitGuardian's monitoring of public GitHub repositories, secrets sprawl continued accelerating in 2022 by 67% compared to 2021, exposing over 10 million secrets (API keys and other credentials). Though many open-source and proprietary secret detection tools are available, these tools output many false positives, making it difficult for developers to take action and teams to…
▽ More
Background: According to GitGuardian's monitoring of public GitHub repositories, secrets sprawl continued accelerating in 2022 by 67% compared to 2021, exposing over 10 million secrets (API keys and other credentials). Though many open-source and proprietary secret detection tools are available, these tools output many false positives, making it difficult for developers to take action and teams to choose one tool out of many. To our knowledge, the secret detection tools are not yet compared and evaluated. Aims: The goal of our study is to aid developers in choosing a secret detection tool to reduce the exposure of secrets through an empirical investigation of existing secret detection tools. Method: We present an evaluation of five open-source and four proprietary tools against a benchmark dataset. Results: The top three tools based on precision are: GitHub Secret Scanner (75%), Gitleaks (46%), and Commercial X (25%), and based on recall are: Gitleaks (88%), SpectralOps (67%) and TruffleHog (52%). Our manual analysis of reported secrets reveals that false positives are due to employing generic regular expressions and ineffective entropy calculation. In contrast, false negatives are due to faulty regular expressions, skip** specific file types, and insufficient rulesets. Conclusions: We recommend developers choose tools based on secret types present in their projects to prevent missing secrets. In addition, we recommend tool vendors update detection rules periodically and correctly employ secret verification mechanisms by collaborating with API vendors to improve accuracy.
△ Less
Submitted 2 July, 2023;
originally announced July 2023.
-
Reflected entropy and Markov gap in non-inertial frames
Authors:
Jaydeep Kumar Basak,
Dimitrios Giataganas,
Sayid Mondal,
Wen-Yu Wen
Abstract:
We explore the reflected entropy and the Markov gap between two modes of a free fermionic field as observed by accelerating observers. This is done for both bipartite system which is described by Bell state and tripartite systems which are represented by Werner and Greenberger-Horne-Zeilinger states. The reflected entropy degrades monotonically as a result of the Unruh effect, eventually reaching…
▽ More
We explore the reflected entropy and the Markov gap between two modes of a free fermionic field as observed by accelerating observers. This is done for both bipartite system which is described by Bell state and tripartite systems which are represented by Werner and Greenberger-Horne-Zeilinger states. The reflected entropy degrades monotonically as a result of the Unruh effect, eventually reaching a non-zero minimum value in the limit of infinite acceleration. Furthermore, we show that the Markov gap exhibits monotonic behavior with regard to acceleration in all three cases. In addition, we suggest a function for reflected entropy which decreases monotonically with decreasing Unruh temperature for all states. Finally, we confirm that the reflected entropy for our system does reduce under the partial tracing of the degrees of freedom for our states.
△ Less
Submitted 30 June, 2023;
originally announced June 2023.
-
SecretBench: A Dataset of Software Secrets
Authors:
Setu Kumar Basak,
Lorenzo Neil,
Bradley Reaves,
Laurie Williams
Abstract:
According to GitGuardian's monitoring of public GitHub repositories, the exposure of secrets (API keys and other credentials) increased two-fold in 2021 compared to 2020, totaling more than six million secrets. However, no benchmark dataset is publicly available for researchers and tool developers to evaluate secret detection tools that produce many false positive warnings. The goal of our paper i…
▽ More
According to GitGuardian's monitoring of public GitHub repositories, the exposure of secrets (API keys and other credentials) increased two-fold in 2021 compared to 2020, totaling more than six million secrets. However, no benchmark dataset is publicly available for researchers and tool developers to evaluate secret detection tools that produce many false positive warnings. The goal of our paper is to aid researchers and tool developers in evaluating and improving secret detection tools by curating a benchmark dataset of secrets through a systematic collection of secrets from open-source repositories. We present a labeled dataset of source codes containing 97,479 secrets (of which 15,084 are true secrets) of various secret types extracted from 818 public GitHub repositories. The dataset covers 49 programming languages and 311 file types.
△ Less
Submitted 12 March, 2023;
originally announced March 2023.
-
Reflected Entropy for Communicating Black Holes II: Planck Braneworlds
Authors:
Mir Afrasiar,
Jaydeep Kumar Basak,
Ashish Chandra,
Gautam Sengupta
Abstract:
We obtain the reflected entropy for bipartite mixed state configurations of two adjacent and disjoint subsystems at a finite temperature in finite-sized non-gravitating reservoirs described by $CFT_2$s each coupled to two quantum dots at their boundaries in the large central charge limit through a replica technique. These field theory results are substantiated through a holographic computation inv…
▽ More
We obtain the reflected entropy for bipartite mixed state configurations of two adjacent and disjoint subsystems at a finite temperature in finite-sized non-gravitating reservoirs described by $CFT_2$s each coupled to two quantum dots at their boundaries in the large central charge limit through a replica technique. These field theory results are substantiated through a holographic computation involving the entanglement wedge cross section in the dual bulk BTZ black hole geometry truncated by two Planck branes. The two Planck branes are the holographic duals of the quantum dots described by $AdS_2$ slices with JT black holes. Our results reproduce the holographic duality between the reflected entropy and the bulk entanglement wedge cross section in the context of the $AdS_3/CFT_2$ correspondence. Subsequently we analyze the behaviour of the holographic Markov gap between the reflected entropy and the mutual information for different scenarios involving the subsystem sizes and time.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Authors:
Setu Kumar Basak,
Lorenzo Neil,
Bradley Reaves,
Laurie Williams
Abstract:
Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. To our knowledge, the challenges developers face to avoid checked-in secrets are not yet characterized. The goal of our paper is to aid researchers…
▽ More
Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. To our knowledge, the challenges developers face to avoid checked-in secrets are not yet characterized. The goal of our paper is to aid researchers and tool developers in understanding and prioritizing opportunities for future research and tool automation for mitigating checked-in secrets through an empirical investigation of challenges and solutions related to checked-in secrets. We extract 779 questions related to checked-in secrets on Stack Exchange and apply qualitative analysis to determine the challenges and the solutions posed by others for each of the challenges. We identify 27 challenges and 13 solutions. The four most common challenges, in ranked order, are: (i) store/version of secrets during deployment; (ii) store/version of secrets in source code; (iii) ignore/hide of secrets in source code; and (iv) sanitize VCS history. The three most common solutions, in ranked order, are: (i) move secrets out of source code/version control and use template config file; (ii) secret management in deployment; and (iii) use local environment variables. Our findings indicate that the same solution has been mentioned to mitigate multiple challenges. However, our findings also identify an increasing trend in questions lacking accepted solutions substantiating the need for future research and tool automation on managing secrets.
△ Less
Submitted 29 January, 2023;
originally announced January 2023.
-
Reflected Entropy for Communicating Black Holes I: Karch-Randall Braneworlds
Authors:
Mir Afrasiar,
Jaydeep Kumar Basak,
Ashish Chandra,
Gautam Sengupta
Abstract:
We obtain the reflected entropy for bipartite mixed state configurations of two adjacent and disjoint intervals at a finite temperature in $BCFT_2$s with two distinct boundaries through a replica technique in the large central charge limit. Subsequently these field theory results are reproduced from bulk computations involving the entanglement wedge cross section in the dual BTZ black hole geometr…
▽ More
We obtain the reflected entropy for bipartite mixed state configurations of two adjacent and disjoint intervals at a finite temperature in $BCFT_2$s with two distinct boundaries through a replica technique in the large central charge limit. Subsequently these field theory results are reproduced from bulk computations involving the entanglement wedge cross section in the dual BTZ black hole geometry truncated by two Karch-Randall branes. Our result confirms the holographic duality between the reflected entropy and the bulk entanglement wedge cross section in the context of the $AdS_3/BCFT_2$ scenario. We further investigate the critical issue of the holographic Markov gap between the reflected entropy and the mutual information for these configurations from the bulk braneworld geometry and study its variation with subsystem sizes and time.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
What are the Practices for Secret Management in Software Artifacts?
Authors:
Setu Kumar Basak,
Lorenzo Neil,
Bradley Reaves,
Laurie Williams
Abstract:
Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. A systematic derivation of practices for managing secrets can help practitioners in secure development. The goal of our paper is to aid practitioner…
▽ More
Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. A systematic derivation of practices for managing secrets can help practitioners in secure development. The goal of our paper is to aid practitioners in avoiding the exposure of secrets by identifying secret management practices in software artifacts through a systematic derivation of practices disseminated in Internet artifacts. We conduct a grey literature review of Internet artifacts, such as blog articles and question and answer posts. We identify 24 practices grouped in six categories comprised of developer and organizational practices. Our findings indicate that using local environment variables and external secret management services are the most recommended practices to move secrets out of source code and to securely store secrets. We also observe that using version control system scanning tools and employing short-lived secrets are the most recommended practices to avoid accidentally committing secrets and limit secret exposure, respectively.
△ Less
Submitted 23 August, 2022;
originally announced August 2022.
-
Time evolution of spread complexity in quenched Lipkin-Meshkov-Glick model
Authors:
Mir Afrasiar,
Jaydeep Kumar Basak,
Bidyut Dey,
Kunal Pal,
Kuntal Pal
Abstract:
We use the spread complexity of a time evolved state after a sudden quantum quench in the Lipkin-Meshkov-Glick (LMG) model prepared in the ground state as a probe of quantum phase transition when the system is quenched towards the critical point. By studying the growth of the effective number of elements of the Krylov basis, those contribute to the spread complexity more than a preassigned cut off…
▽ More
We use the spread complexity of a time evolved state after a sudden quantum quench in the Lipkin-Meshkov-Glick (LMG) model prepared in the ground state as a probe of quantum phase transition when the system is quenched towards the critical point. By studying the growth of the effective number of elements of the Krylov basis, those contribute to the spread complexity more than a preassigned cut off, we show how the two phases of the LMG model can be distinguished. We also explore the time evolution of spread entropy after both non-critical and critical quenches. We show that the sum contributing to the spread entropy converges slowly in the symmetric phase of the LMG model compared to that of the broken phase, and for a critical quench, the spread entropy diverges logarithmically at late times.
△ Less
Submitted 6 November, 2023; v1 submitted 22 August, 2022;
originally announced August 2022.
-
Islands for Entanglement Negativity in Communicating Black Holes
Authors:
Mir Afrasiar,
Jaydeep Kumar Basak,
Ashish Chandra,
Gautam Sengupta
Abstract:
We obtain the holographic entanglement negativity for bipartite mixed states at a finite temperature in baths described by conformal field theories dual to configurations involving two communicating black holes in a braneworld geometry. In this context, we analyze the mixed state entanglement structure characterized by the information transfer between the black holes. The model corresponds to a co…
▽ More
We obtain the holographic entanglement negativity for bipartite mixed states at a finite temperature in baths described by conformal field theories dual to configurations involving two communicating black holes in a braneworld geometry. In this context, we analyze the mixed state entanglement structure characterized by the information transfer between the black holes. The model corresponds to a configuration of two dimensional eternal JT black holes in a braneworld geometry involving two Planck branes coupled through shared bath systems described by $CFT_2$s. Our results reproduce analogue of the Page curves for the entanglement negativity obtained earlier in the context of random matrix theory and from geometric evaporation in JT black hole configurations.
△ Less
Submitted 27 August, 2023; v1 submitted 16 May, 2022;
originally announced May 2022.
-
Reflected Entropy and Entanglement Negativity for Holographic Moving Mirrors
Authors:
Jaydeep Kumar Basak,
Debarshi Basu,
Vinay Malvimat,
Himanshu Parihar,
Gautam Sengupta
Abstract:
We investigate the time evolution of reflected entropy and entanglement negativity for mixed state configurations involving two adjacent and disjoint intervals in the radiation flux of moving mirrors by utilizing the $AdS/BCFT$ duality. These measures are computed for the required mixed state configurations by using the respective replica techniques in the large central charge limit of the…
▽ More
We investigate the time evolution of reflected entropy and entanglement negativity for mixed state configurations involving two adjacent and disjoint intervals in the radiation flux of moving mirrors by utilizing the $AdS/BCFT$ duality. These measures are computed for the required mixed state configurations by using the respective replica techniques in the large central charge limit of the $BCFT_{1+1}$. We demonstrate that the results obtained exactly agree with the corresponding holographic computations in the dual bulk $AdS_3$ geometry with an end of the world brane. In this context, the analogues of the Page curves for these measures are obtained for the required configurations in the radiation flux of kink and esca** mirrors which mimic the Hawking radiation from evaporating and eternal black holes respectively.
△ Less
Submitted 25 May, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
Odd entanglement entropy in Galilean conformal field theories and flat holography
Authors:
Jaydeep Kumar Basak,
Himanshu Chourasiya,
Vinayak Raj,
Gautam Sengupta
Abstract:
The odd entanglement entropy (OEE) for bipartite states in a class of $(1+1)$-dimensional Galilean conformal field theories ($GCFT_{1+1}$) is obtained through an appropriate replica technique. In this context our results are compared with the entanglement wedge cross section (EWCS) for $(2+1)$-dimensional asymptotically flat geometries dual to the $GCFT_{1+1}$ in the framework of flat holography.…
▽ More
The odd entanglement entropy (OEE) for bipartite states in a class of $(1+1)$-dimensional Galilean conformal field theories ($GCFT_{1+1}$) is obtained through an appropriate replica technique. In this context our results are compared with the entanglement wedge cross section (EWCS) for $(2+1)$-dimensional asymptotically flat geometries dual to the $GCFT_{1+1}$ in the framework of flat holography. We find that our results are consistent with the duality of the difference between the odd entanglement entropy and the entanglement entropy of bipartite states, with the bulk EWCS for flat holographic scenarios.
△ Less
Submitted 26 December, 2022; v1 submitted 8 March, 2022;
originally announced March 2022.
-
Reflected entropy in Galilean conformal field theories and flat holography
Authors:
Jaydeep Kumar Basak,
Himanshu Chourasiya,
Vinayak Raj,
Gautam Sengupta
Abstract:
We obtain the reflected entropy for bipartite states in a class of $(1+1)$-dimensional Galilean conformal field theories ($GCFT_{1+1}$) through a replica technique. Furthermore we compare our results with the entanglement wedge cross section (EWCS) obtained for the dual (2+1) dimensional asymptotically flat geometries in the context of flat holography. We find that our results are consistent with…
▽ More
We obtain the reflected entropy for bipartite states in a class of $(1+1)$-dimensional Galilean conformal field theories ($GCFT_{1+1}$) through a replica technique. Furthermore we compare our results with the entanglement wedge cross section (EWCS) obtained for the dual (2+1) dimensional asymptotically flat geometries in the context of flat holography. We find that our results are consistent with the duality between the reflected entropy and the bulk EWCS for flat holographic scenarios.
△ Less
Submitted 26 December, 2022; v1 submitted 2 February, 2022;
originally announced February 2022.
-
Optimal Lockdown Strategy in a Pandemic: An Exploratory Analysis for Covid-19
Authors:
Gopal K. Basak,
Chandramauli Chakraborty,
Pranab Kumar Das
Abstract:
The paper addresses the question of lives versus livelihood in an SIRD model augmented with a macroeconomic structure. The constraints on the availability of health facilities - both infrastructure and health workers determine the probability of receiving treatment which is found to be higher for the patients with severe infection than the patients with mild infection for the specific parametric c…
▽ More
The paper addresses the question of lives versus livelihood in an SIRD model augmented with a macroeconomic structure. The constraints on the availability of health facilities - both infrastructure and health workers determine the probability of receiving treatment which is found to be higher for the patients with severe infection than the patients with mild infection for the specific parametric configuration of the paper. Distinguishing between two types of direct intervention policy - hard lockdown and soft lockdown, the study derives alternative policy options available to the government. The study further indicates that the soft lockdown policy is optimal from a public policy perspective under the specific parametric configuration considered in this paper.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Deep Learning-based Frozen Section to FFPE Translation
Authors:
Kutsev Bengisu Ozyoruk,
Sermet Can,
Guliz Irem Gokceler,
Kayhan Basak,
Derya Demir,
Gurdeniz Serin,
Uguray Payam Hacisalihoglu,
Emirhan Kurtuluş,
Berkan Darbaz,
Ming Y. Lu,
Tiffany Y. Chen,
Drew F. K. Williamson,
Funda Yilmaz,
Faisal Mahmood,
Mehmet Turan
Abstract:
Frozen sectioning (FS) is the preparation method of choice for microscopic evaluation of tissues during surgical operations. The high speed of the procedure allows pathologists to rapidly assess the key microscopic features, such as tumour margins and malignant status to guide surgical decision-making and minimise disruptions to the course of the operation. However, FS is prone to introducing many…
▽ More
Frozen sectioning (FS) is the preparation method of choice for microscopic evaluation of tissues during surgical operations. The high speed of the procedure allows pathologists to rapidly assess the key microscopic features, such as tumour margins and malignant status to guide surgical decision-making and minimise disruptions to the course of the operation. However, FS is prone to introducing many misleading artificial structures (histological artefacts), such as nuclear ice crystals, compression, and cutting artefacts, hindering timely and accurate diagnostic judgement of the pathologist. Additional training and prolonged experience is often required to make highly effective and time-critical diagnosis on frozen sections. On the other hand, the gold standard tissue preparation technique of formalin-fixation and paraffin-embedding (FFPE) provides significantly superior image quality, but is a very time-consuming process (12-48 hours), making it unsuitable for intra-operative use. In this paper, we propose an artificial intelligence (AI) method that improves FS image quality by computationally transforming frozen-sectioned whole-slide images (FS-WSIs) into whole-slide FFPE-style images in minutes. AI-FFPE rectifies FS artefacts with the guidance of an attention mechanism that puts a particular emphasis on artefacts while utilising a self-regularization mechanism established between FS input image and synthesized FFPE-style image that preserves clinically relevant features. As a result, AI-FFPE method successfully generates FFPE-style images without significantly extending tissue processing time and consequently improves diagnostic accuracy. We demonstrate the efficacy of AI-FFPE on lung and brain frozen sections using a variety of different qualitative and quantitative metrics including visual Turing tests from 20 board certified pathologists.
△ Less
Submitted 2 November, 2021; v1 submitted 25 July, 2021;
originally announced July 2021.
-
Holographic Entanglement Negativity for Disjoint Subsystems in Conformal Field Theories with a Conserved Charge
Authors:
Mir Afrasiar,
Jaydeep Kumar Basak,
Vinayak Raj,
Gautam Sengupta
Abstract:
We investigate the extension of a holographic construction for the entanglement negativity of two disjoint subsystems in proximity to $CFT_d$s with a conserved charge dual to bulk $AdS_{d+1}$ geometries. The construction involves a specific algebraic sum of the areas of bulk co-dimension two static minimal surfaces homologous to certain appropriate combinations of the subsystems in question. In th…
▽ More
We investigate the extension of a holographic construction for the entanglement negativity of two disjoint subsystems in proximity to $CFT_d$s with a conserved charge dual to bulk $AdS_{d+1}$ geometries. The construction involves a specific algebraic sum of the areas of bulk co-dimension two static minimal surfaces homologous to certain appropriate combinations of the subsystems in question. In this connection we compute the holographic entanglement negativity for two disjoint subsystems in proximity, with long rectangular strip geometries in $CFT_d$s dual to bulk non extremal and extremal RN-$AdS_{d+1}$ black holes. Our results conform to quantum information theory expectations and also reproduces earlier results for adjacent subsystems in the appropriate limit which constitutes strong consistency checks for our holographic construction.
△ Less
Submitted 6 July, 2022; v1 submitted 28 June, 2021;
originally announced June 2021.
-
Page Curve for Entanglement Negativity through Geometric Evaporation
Authors:
Jaydeep Kumar Basak,
Debarshi Basu,
Vinay Malvimat,
Himanshu Parihar,
Gautam Sengupta
Abstract:
We compute the entanglement negativity for various pure and mixed state configurations in a bath coupled to an evaporating two dimensional non-extremal Jackiw-Teitelboim (JT) black hole obtained through the partial dimensional reduction of a three dimensional BTZ black hole. Our results exactly reproduce the analogues of the Page curve for the entanglement negativity which were recently determined…
▽ More
We compute the entanglement negativity for various pure and mixed state configurations in a bath coupled to an evaporating two dimensional non-extremal Jackiw-Teitelboim (JT) black hole obtained through the partial dimensional reduction of a three dimensional BTZ black hole. Our results exactly reproduce the analogues of the Page curve for the entanglement negativity which were recently determined through diagrammatic technique developed in the context of random matrix theory.
△ Less
Submitted 21 January, 2022; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Covariant holographic negativity from the entanglement wedge in AdS$_3/$CFT$_2$
Authors:
Jaydeep Kumar Basak,
Himanshu Parihar,
Boudhayan Paul,
Gautam Sengupta
Abstract:
We propose a covariant holographic construction based on the extremal entanglement wedge cross section, for the entanglement negativity of bipartite states in $CFT_{1+1}$s dual to non static bulk $AdS_3$ geometries. Utilizing our proposal we obtain the holographic entanglement negativity for bipartite mixed states in $CFT_{1+1}$s dual to bulk extremal and non extremal rotating BTZ black holes and…
▽ More
We propose a covariant holographic construction based on the extremal entanglement wedge cross section, for the entanglement negativity of bipartite states in $CFT_{1+1}$s dual to non static bulk $AdS_3$ geometries. Utilizing our proposal we obtain the holographic entanglement negativity for bipartite mixed states in $CFT_{1+1}$s dual to bulk extremal and non extremal rotating BTZ black holes and the time dependent Vaidya-$AdS_3$ geometries. Our results correctly reproduce the replica technique results modulo certain constants for the corresponding dual $CFT_{1+1}$s in the large central charge limit for the bulk black hole geometries. Furthermore for all the cases our results also match upto such constants with the corresponding results from an earlier alternate covariant holographic construction in the literature. This demonstrates the equivalence modulo constants of the two constructions for the $AdS_3/CFT_2$ scenario.
△ Less
Submitted 18 February, 2022; v1 submitted 10 February, 2021;
originally announced February 2021.
-
Islands for Entanglement Negativity
Authors:
Jaydeep Kumar Basak,
Debarshi Basu,
Vinay Malvimat,
Himanshu Parihar,
Gautam Sengupta
Abstract:
We advance two alternative proposals for the island contributions to the entanglement negativity of various pure and mixed state configurations in quantum field theories coupled to semiclassical gravity. The first construction involves the extremization of an algebraic sum of the generalized Renyi entropies of order half. The second proposal involves the extremization of the sum of the effective e…
▽ More
We advance two alternative proposals for the island contributions to the entanglement negativity of various pure and mixed state configurations in quantum field theories coupled to semiclassical gravity. The first construction involves the extremization of an algebraic sum of the generalized Renyi entropies of order half. The second proposal involves the extremization of the sum of the effective entanglement negativity of quantum matter fields and the backreacted area of a cosmic brane spanning the entanglement wedge cross section which also extremizes the generalized Renyi reflected entropy of order half. These proposals are utilized to obtain the island contributions to the entanglement negativity of various pure and mixed state configurations involving the bath systems coupled to extremal and non-extremal black holes in JT gravity demonstrating an exact match with each other. Furthermore, the results from both the proposals match precisely with the island contribution to half the Renyi reflected entropy of order half providing a strong consistency check. We then allude to a possible doubly holographic picture of our island proposals and provide a derivation of the first proposal by determining the corresponding replica wormhole contributions.
△ Less
Submitted 6 June, 2021; v1 submitted 7 December, 2020;
originally announced December 2020.
-
Finding Optimal Cancer Treatment using Markov Decision Process to Improve Overall Health and Quality of Life
Authors:
Navonil Deb,
Abhinandan Dalal,
Gopal Krishna Basak
Abstract:
Markov Decision Processes and Dynamic Treatment Regimes have grown increasingly popular in the treatment of diseases, including cancer. However, cancer treatment often impacts quality of life drastically, and people often fail to take treatments that are sustainable, affordable and can be adhered to. In this paper, we emphasize the usage of ambient factors like profession, radioactive exposure, fo…
▽ More
Markov Decision Processes and Dynamic Treatment Regimes have grown increasingly popular in the treatment of diseases, including cancer. However, cancer treatment often impacts quality of life drastically, and people often fail to take treatments that are sustainable, affordable and can be adhered to. In this paper, we emphasize the usage of ambient factors like profession, radioactive exposure, food habits on the treatment choice, kee** in mind that the aim is not just to relieve the patient of his disease, but rather to maximize his overall physical, social and mental well being. We delineate a general framework which can directly incorporate a net benefit function from a physician as well as patient's utility, and can incorporate the varying probabilities of exposure and survival of patients of varying medical profiles. We also show by simulations that the optimal choice of actions often is sensitive to extraneous factors, like the financial status of a person (as a proxy for the affordability of treatment), and that these actions should be welcome kee** in mind the overall quality of life.
△ Less
Submitted 27 November, 2020;
originally announced November 2020.
-
Understanding the origin of extreme events in El Niño-Southern Oscillation
Authors:
Arnob Ray,
Sarbendu Rakshit,
Gopal K. Basak,
Syamal K. Dana,
Dibakar Ghosh
Abstract:
We investigate a low-dimensional slow-fast model to understand the dynamical origin of El Niño-Southern Oscillation. A close inspection of the system dynamics using several bifurcation plots reveals that a sudden large expansion of the attractor occurs at a critical system parameter via a type of interior crisis. This interior crisis evolves through merging of a cascade of period-doubling and peri…
▽ More
We investigate a low-dimensional slow-fast model to understand the dynamical origin of El Niño-Southern Oscillation. A close inspection of the system dynamics using several bifurcation plots reveals that a sudden large expansion of the attractor occurs at a critical system parameter via a type of interior crisis. This interior crisis evolves through merging of a cascade of period-doubling and period-adding bifurcations that leads to the origin of occasional amplitude-modulated extremely large events. More categorically, a situation similar to homoclinic chaos arises near the critical point, however, atypical global instability evolves as a channel-like structure in phase space of the system that modulates variability of amplitude and return time of the occasional large events and makes a difference from the homoclinic chaos. The slow-fast timescale of the low-dimensional model plays an important role on the onset of occasional extremely large events. Such extreme events are characterized by their heights when they exceed a threshold level measured by a mean-excess function. The probability density of events' height displays multimodal distribution with an upper-bounded tail. We identify the dependence structure of interevent intervals to understand the predictability of return time of such extreme events using autoregressive integrated moving average model and box plot analysis.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
On minimal entanglement wedge cross section for holographic entanglement negativity
Authors:
Jaydeep Kumar Basak,
Vinay Malvimat,
Himanshu Parihar,
Boudhayan Paul,
Gautam Sengupta
Abstract:
We demonstrate the equivalence of two different conjectures in the literature for the holographic entanglement negativity in AdS$_3$/CFT$_2$, modulo certain constants. These proposals involve certain algebraic sums of bulk geodesics homologous to specific combinations of subsystems, and the entanglement wedge cross section (EWCS) backreacted by a cosmic brane for the conical defect geometry in the…
▽ More
We demonstrate the equivalence of two different conjectures in the literature for the holographic entanglement negativity in AdS$_3$/CFT$_2$, modulo certain constants. These proposals involve certain algebraic sums of bulk geodesics homologous to specific combinations of subsystems, and the entanglement wedge cross section (EWCS) backreacted by a cosmic brane for the conical defect geometry in the bulk gravitational path integral. It is observed that the former conjectures reproduce the field theory replica technique results in the large central charge limit whereas the latter involves constants related to the Markov gap. In this context we establish an alternative construction for the EWCS of a single interval in a CFT$_2$ at a finite temperature to resolve an issue for the latter proposal involving the thermal entropy elimination for the holographic entanglement negativity. Our construction for the EWCS correctly reproduces the corresponding field theory results modulo the Markov gap constant in the large central charge limit.
△ Less
Submitted 9 March, 2024; v1 submitted 24 February, 2020;
originally announced February 2020.
-
Holographic entanglement negativity for disjoint subsystems in $\mathrm{AdS_{d+1}/CFT_d}$
Authors:
Jaydeep Kumar Basak,
Himanshu Parihar,
Boudhayan Paul,
Gautam Sengupta
Abstract:
We propose a construction to compute the holographic entanglement negativity for bipartite mixed state configurations of two disjoint subsystems in higher dimensional conformal field theories (CFT$_d$s) dual to bulk AdS$_{d+1}$ geometries. Our proposal follows from the corresponding AdS$_3$/CFT$_2$ scenario and involves an algebraic sum of the areas of bulk RT surfaces for certain combinations of…
▽ More
We propose a construction to compute the holographic entanglement negativity for bipartite mixed state configurations of two disjoint subsystems in higher dimensional conformal field theories (CFT$_d$s) dual to bulk AdS$_{d+1}$ geometries. Our proposal follows from the corresponding AdS$_3$/CFT$_2$ scenario and involves an algebraic sum of the areas of bulk RT surfaces for certain combinations of subsystems. Utilizing our construction we compute the holographic entanglement negativity at the leading order through a perturbative expansion, for such bipartite mixed states of two disjoint subsystems with long rectangular strip geometries in CFT$_d$s dual to bulk pure AdS$_{d+1}$ geometries and AdS$_{d+1}$-Schwarzschild black holes.
△ Less
Submitted 3 March, 2024; v1 submitted 28 January, 2020;
originally announced January 2020.
-
Relative Efficiency of Higher Normed Estimators Over the Least Squares Estimator
Authors:
Gopal K Basak,
Samarjit Das,
Arijit De,
Atanu Biswas
Abstract:
In this article, we study the performance of the estimator that minimizes $L_{2k}- $ order loss function (for $ k \ge \; 2 )$ against the estimators which minimizes the $L_2-$ order loss function (or the least squares estimator). Commonly occurring examples illustrate the differences in efficiency between $L_{2k}$ and $L_2 -$ based estimators. We derive an empirically testable condition under whic…
▽ More
In this article, we study the performance of the estimator that minimizes $L_{2k}- $ order loss function (for $ k \ge \; 2 )$ against the estimators which minimizes the $L_2-$ order loss function (or the least squares estimator). Commonly occurring examples illustrate the differences in efficiency between $L_{2k}$ and $L_2 -$ based estimators. We derive an empirically testable condition under which the $L_{2k}$ estimator is more efficient than the least squares estimator. We construct a simple decision rule to choose between $L_{2k}$ and $L_2$ estimator. Special emphasis is provided to study $L_{4}$ estimator. A detailed simulation study verifies the effectiveness of this decision rule. Also, the superiority of the $L_{2k}$ estimator is demonstrated in a real life data set.
△ Less
Submitted 19 March, 2019;
originally announced March 2019.
-
A Deep Ensemble Framework for Fake News Detection and Classification
Authors:
Arjun Roy,
Kingshuk Basak,
Asif Ekbal,
Pushpak Bhattacharyya
Abstract:
Fake news, rumor, incorrect information, and misinformation detection are nowadays crucial issues as these might have serious consequences for our social fabrics. The rate of such information is increasing rapidly due to the availability of enormous web information sources including social media feeds, news blogs, online newspapers etc.
In this paper, we develop various deep learning models for…
▽ More
Fake news, rumor, incorrect information, and misinformation detection are nowadays crucial issues as these might have serious consequences for our social fabrics. The rate of such information is increasing rapidly due to the availability of enormous web information sources including social media feeds, news blogs, online newspapers etc.
In this paper, we develop various deep learning models for detecting fake news and classifying them into the pre-defined fine-grained categories.
At first, we develop models based on Convolutional Neural Network (CNN) and Bi-directional Long Short Term Memory (Bi-LSTM) networks. The representations obtained from these two models are fed into a Multi-layer Perceptron Model (MLP) for the final classification. Our experiments on a benchmark dataset show promising results with an overall accuracy of 44.87\%, which outperforms the current state of the art.
△ Less
Submitted 12 November, 2018;
originally announced November 2018.
-
Understanding Cross-sectional Dependence in Panel Data
Authors:
Gopal K Basak,
Samarjit Das
Abstract:
We provide various norm-based definitions of different types of cross-sectional dependence and the relations between them. These definitions facilitate to comprehend and to characterize the various forms of cross-sectional dependence, such as strong, semi-strong, and weak dependence. Then we examine the asymptotic properties of parameter estimators both for fixed (within) effect estimator and rand…
▽ More
We provide various norm-based definitions of different types of cross-sectional dependence and the relations between them. These definitions facilitate to comprehend and to characterize the various forms of cross-sectional dependence, such as strong, semi-strong, and weak dependence. Then we examine the asymptotic properties of parameter estimators both for fixed (within) effect estimator and random effect (pooled) estimator for linear panel data models incorporating various forms of cross-sectional dependence. The asymptotic properties are also derived when both cross-sectional and temporal dependence are present. Subsequently, we develop consistent and robust standard error of the parameter estimators both for fixed effect and random effect model separately. Robust standard errors are developed (i) for pure cross-sectional dependence; and (ii) also for cross-sectional and time series dependence. Under strong or semi-strong cross-sectional dependence, it is established that when the time dependence comes through the idiosyncratic errors, such time dependence does not have any influence in the asymptotic variance of $(\hatβ_{FE/RE}). $ Hence, it is argued that in estimating $Var(\hatβ_{FE/RE}),$ Newey-West kind of correction injects bias in the variance estimate. Furthermore, this article lay down conditions under which $t$, $F$ and the $Wald$ statistics based on the robust covariance matrix estimator give valid inference.
△ Less
Submitted 23 April, 2018;
originally announced April 2018.
-
A Mathematical Model of Foreign Capital Inflow
Authors:
Gopal K. Basak,
Pranab Kumar Das,
Allena Rohit
Abstract:
The paper models foreign capital inflow from the developed to the develo** countries in a stochastic dynamic programming (SDP) framework. Under some regularity conditions, the existence of the solutions to the SDP problem is proved and they are then obtained by numerical technique because of the non-linearity of the related functions. A number of comparative dynamic analyses explore the impact o…
▽ More
The paper models foreign capital inflow from the developed to the develo** countries in a stochastic dynamic programming (SDP) framework. Under some regularity conditions, the existence of the solutions to the SDP problem is proved and they are then obtained by numerical technique because of the non-linearity of the related functions. A number of comparative dynamic analyses explore the impact of parameters of the model on dynamic paths of capital inflow, interest rate in the international loan market and the exchange rate.
△ Less
Submitted 20 May, 2017; v1 submitted 8 March, 2016;
originally announced March 2016.
-
Lipophilic Force Driven Dynamics in Langmuir monolayers: In-plane Coalescence and Out-of-plane Diffusion
Authors:
Uttam Kumar Basak,
Alokmay Datta
Abstract:
While monolayer area fraction versus time ($A_{n}-t$) curves obtained from surface pressure-area ($π-A$) isotherms for desorption-dominated (DD) processes in Langmuir monolayers of fatty acids represent continuous loss, those from Brewster Angle Microscopy (BAM) also show a 2D coalescence. For nucleation-dominated (ND) processes both techniques suggest competing processes, with BAM showing 2D coal…
▽ More
While monolayer area fraction versus time ($A_{n}-t$) curves obtained from surface pressure-area ($π-A$) isotherms for desorption-dominated (DD) processes in Langmuir monolayers of fatty acids represent continuous loss, those from Brewster Angle Microscopy (BAM) also show a 2D coalescence. For nucleation-dominated (ND) processes both techniques suggest competing processes, with BAM showing 2D coalescence alongside multilayer formation. $π$ enhances both DD and ND with a lower cut-off for ND, while temperature has a lower cut-off for DD but negligible effect on ND. Hydrocarbon chain length has the strongest effect, causing a cross-over from DD to ND dynamics. Imaging Ellipsometry (IE) of horizontally transferred films onto Si(100) shows Stranski-Krastanov (SK) like growth for ND process in arachidic acid monolayer resulting in succesive stages of monolayer, trilayer, multilayer islands, ridges from lateral island-coalescence and shallow wavelike structures from ridge-coalescence on the film surface. These studies show that lipophilic attraction between hydrocarbon chains is the driving force at all stages of long term monolayer dynamics.
△ Less
Submitted 21 October, 2014;
originally announced October 2014.
-
An Ornstein-Uhlenbeck process associated to self-normalized sums
Authors:
Gopal K. Basak,
Amites Dasgupta
Abstract:
We consider an Ornstein-Uhleneck (OU) process associated to self-normalised sums in i.i.d. symmetric random variables from the domain of attraction of $N(0, 1)$ distribution. We proved the self-normalised sums converge to the OU process (in $C[0, \infty)$). Importance of this is that the OU process is a stationary process as opposed to the Brownian motion, which is a non-stationary distribution (s…
▽ More
We consider an Ornstein-Uhleneck (OU) process associated to self-normalised sums in i.i.d. symmetric random variables from the domain of attraction of $N(0, 1)$ distribution. We proved the self-normalised sums converge to the OU process (in $C[0, \infty)$). Importance of this is that the OU process is a stationary process as opposed to the Brownian motion, which is a non-stationary distribution (see for example, the invariance principle proved by Csorgo et al (2003, Ann Probab) for self-normalised sums that converges to Brownian motion). The proof uses recursive equations similar to those that arise in the area of stochastic approximation and it shows (through examples) that one can simulate any functionals of any segment of the OU process. The similar things can be done for any diffusion process as well.
△ Less
Submitted 1 February, 2013;
originally announced February 2013.
-
Diffusive Limits for Adaptive MCMC for Normal Target densities
Authors:
Gopal K. Basak,
Arunangshu Biswas
Abstract:
In this paper we apply the Diffusion approximation procedure to a discrete time Adaptive Markov Chain Monte Carlo (AMCMC) method when the target distribution is standard Normal. We show that the limiting distribution of the diffusion admits a density which we identify as the standard Normal distribution.
In this paper we apply the Diffusion approximation procedure to a discrete time Adaptive Markov Chain Monte Carlo (AMCMC) method when the target distribution is standard Normal. We show that the limiting distribution of the diffusion admits a density which we identify as the standard Normal distribution.
△ Less
Submitted 28 November, 2014; v1 submitted 17 January, 2013;
originally announced January 2013.
-
Langevin type limiting processes for Adaptive MCMC
Authors:
Gopal K. Basak,
Arunangshu Biswas
Abstract:
Adaptive Markov Chain Monte Carlo (AMCMC) is a class of MCMC algorithms where the proposal distribution changes at every iteration of the chain. In this case it is important to verify that such a Markov Chain indeed has a stationary distribution. In this paper we discuss a diffusion approximation to a discrete time AMCMC. This diffusion approximation is different when compared to the diffusion app…
▽ More
Adaptive Markov Chain Monte Carlo (AMCMC) is a class of MCMC algorithms where the proposal distribution changes at every iteration of the chain. In this case it is important to verify that such a Markov Chain indeed has a stationary distribution. In this paper we discuss a diffusion approximation to a discrete time AMCMC. This diffusion approximation is different when compared to the diffusion approximation as in Gelman, Gilks and Roberts (1997) where the state space increases in dimension to infinity. In our approach the time parameter is sped up in such a way that the limiting distribution (as the mesh size goes to 0) is to a non-trivial continuous time diffusion process.
△ Less
Submitted 4 September, 2015; v1 submitted 6 January, 2012;
originally announced January 2012.
-
Process convergence of self normalized sums of i.i.d. random variables coming from domain of attraction of stable distributions
Authors:
G K Basak,
Arunangshu Biswas
Abstract:
In this paper we show that the continuous version of the self normalised process $Y_{n,p}(t)= S_n(t)/V_{n,p}+(nt-[nt])X_{[nt]+1}/V_{n,p}$ where $S_n(t)=\sum_{i=1}^{[nt]} X_i$ and $V_{(n,p)}= \sum_{i=1}^{n}|X_i|^p)^{\frac{1}{p}}$ and $X_i$ i.i.d. random variables belong to $DA(α)$, has a non trivial distribution iff $p=α=2$. The case
for $2 > p > α$ and $p \le α< 2$
is systematically eliminated by…
▽ More
In this paper we show that the continuous version of the self normalised process $Y_{n,p}(t)= S_n(t)/V_{n,p}+(nt-[nt])X_{[nt]+1}/V_{n,p}$ where $S_n(t)=\sum_{i=1}^{[nt]} X_i$ and $V_{(n,p)}= \sum_{i=1}^{n}|X_i|^p)^{\frac{1}{p}}$ and $X_i$ i.i.d. random variables belong to $DA(α)$, has a non trivial distribution iff $p=α=2$. The case
for $2 > p > α$ and $p \le α< 2$
is systematically eliminated by showing that either of tightness or finite
dimensional convergence to a non-degenerate limiting distribution does not hold. This work is an extension of the work by Csörgö et al. who showed Donsker's theorem for $Y_{n,2}(\cdot)$, i.e., for $p=2$, holds iff $α=2$
and identified the limiting process as standard Brownian motion in sup norm.
△ Less
Submitted 2 August, 2010;
originally announced August 2010.
-
Asymptotic Properties of an Estimator of the Drift Coefficients of Multidimensional Ornstein-Uhlenbeck Processes that are not Necessarily Stable
Authors:
Gopal K. Basak,
Philip Lee
Abstract:
In this paper, we investigate the consistency and asymptotic efficiency of an estimator of the drift matrix, $F$, of Ornstein-Uhlenbeck processes that are not necessarily stable. We consider all the cases. (1) The eigenvalues of $F$ are in the right half space (i.e., eigenvalues with positive real parts). In this case the process grows exponentially fast. (2) The eigenvalues of $F$ are on the le…
▽ More
In this paper, we investigate the consistency and asymptotic efficiency of an estimator of the drift matrix, $F$, of Ornstein-Uhlenbeck processes that are not necessarily stable. We consider all the cases. (1) The eigenvalues of $F$ are in the right half space (i.e., eigenvalues with positive real parts). In this case the process grows exponentially fast. (2) The eigenvalues of $F$ are on the left half space (i.e., the eigenvalues with negative or zero real parts). The process where all eigenvalues of $F$ have negative real parts is called a stable process and has a unique invariant (i.e., stationary) distribution. In this case the process does not grow. When the eigenvalues of $F$ have zero real parts (i.e., the case of zero eigenvalues and purely imaginary eigenvalues) the process grows polynomially fast. Considering (1) and (2) separately, we first show that an estimator, $\hat{F}$, of $F$ is consistent. We then combine them to present results for the general Ornstein-Uhlenbeck processes. We adopt similar procedure to show the asymptotic efficiency of the estimator.
△ Less
Submitted 3 September, 2008; v1 submitted 29 May, 2008;
originally announced May 2008.
-
A functional central limit theorem for a class of urn models
Authors:
Gopal K Basak,
Amites Dasgupta
Abstract:
We construct an independent increments Gaussian process associated to a class of multicolor urn models. The construction uses random variables from the urn model which are different from the random variables for which central limit theorems are available in the two color case.
We construct an independent increments Gaussian process associated to a class of multicolor urn models. The construction uses random variables from the urn model which are different from the random variables for which central limit theorems are available in the two color case.
△ Less
Submitted 14 December, 2005;
originally announced December 2005.
-
Stationarity of Switching VAR and Other Related Models
Authors:
Gopal K. Basak,
Zhan-Qian Lu
Abstract:
Switching ARMA models greatly enhance the standard linear models to the extent that different ARMA model is allowed in a different regime, and the regime switching is typically assumed a Markov chain on the finite states of potential regimes. Although statistical issues have been the subject of many recent papers, there is few systematic study of the probabilistic aspects of this new class of no…
▽ More
Switching ARMA models greatly enhance the standard linear models to the extent that different ARMA model is allowed in a different regime, and the regime switching is typically assumed a Markov chain on the finite states of potential regimes. Although statistical issues have been the subject of many recent papers, there is few systematic study of the probabilistic aspects of this new class of nonlinear models. This paper discusses some basic issues concerning this class of models including strict stationarity, influence of initial conditions, and second-order property by studying SVAR models. A number of examples are given to illustrate the theory and the variety of applications. Extensions to other models such as mean-shifting, and inhomogeneous transition probabilities are discussed.
△ Less
Submitted 13 July, 2005;
originally announced July 2005.
-
Central limit theorems for a class of irreducible multicolor urn models
Authors:
Gopal K. Basak,
Amites Dasgupta
Abstract:
We take a unified approach to central limit theorems for a class of irreducible urn models with constant replacement matrix. Depending on the eigenvalue, we consider appropriate linear combinations of the number of balls of different colors. Then under appropriate norming the multivariate distribution of the weak limits of these linear combinations is obtained and independence and dependence iss…
▽ More
We take a unified approach to central limit theorems for a class of irreducible urn models with constant replacement matrix. Depending on the eigenvalue, we consider appropriate linear combinations of the number of balls of different colors. Then under appropriate norming the multivariate distribution of the weak limits of these linear combinations is obtained and independence and dependence issues are investigated.
△ Less
Submitted 5 July, 2005;
originally announced July 2005.