-
Size biased Multinomial Modelling of detection data in Software testing
Authors:
Pallabi Ghosh,
Ashis Kr. Chakraborty,
Soumen Dey
Abstract:
Estimation of software reliability often poses a considerable challenge, particularly for critical softwares. Several methods of estimation of reliability of software are already available in the literature. But, so far almost nobody used the concept of size of a bug for estimating software reliability. In this article we make used of the bug size or the eventual bug size which helps us to determi…
▽ More
Estimation of software reliability often poses a considerable challenge, particularly for critical softwares. Several methods of estimation of reliability of software are already available in the literature. But, so far almost nobody used the concept of size of a bug for estimating software reliability. In this article we make used of the bug size or the eventual bug size which helps us to determine reliability of software more precisely. The size-biased model developed here can also be used for similar fields like hydrocarbon exploration. The model has been validated through simulation and subsequently used for a critical space application software testing data. The estimated results match the actual observations to a large extent.
△ Less
Submitted 24 May, 2024;
originally announced June 2024.
-
A Minimal Framework for Optimizing Vaccination Protocols Targeting Highly Mutable Pathogens
Authors:
Saeed Mahdisoltani,
Pranav Murugan,
Arup K Chakraborty,
Mehran Kardar
Abstract:
A persistent public health challenge is finding immunization schemes that are effective in combating highly mutable pathogens such as HIV and influenza viruses. To address this, we analyze a simplified model of affinity maturation, the Darwinian evolutionary process B cells undergo during immunization. The vaccination protocol dictates selection forces that steer affinity maturation to generate an…
▽ More
A persistent public health challenge is finding immunization schemes that are effective in combating highly mutable pathogens such as HIV and influenza viruses. To address this, we analyze a simplified model of affinity maturation, the Darwinian evolutionary process B cells undergo during immunization. The vaccination protocol dictates selection forces that steer affinity maturation to generate antibodies. We focus on determining the optimal selection forces exerted by a generic time-dependent vaccination protocol to maximize production of broadly neutralizing antibodies (bnAbs) that can protect against a broad spectrum of pathogen strains. The model lends itself to a path integral representation and operator approximations within a mean-field limit, providing guiding principles for optimizing time-dependent vaccine-induced selection forces to enhance bnAb generation. We compare our analytical mean-field results with the outcomes of stochastic simulations and discuss their similarities and differences.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Early detection of disease outbreaks and non-outbreaks using incidence data
Authors:
Shan Gao,
Amit K. Chakraborty,
Russell Greiner,
Mark A. Lewis,
Hao Wang
Abstract:
Forecasting the occurrence and absence of novel disease outbreaks is essential for disease management. Here, we develop a general model, with no real-world training data, that accurately forecasts outbreaks and non-outbreaks. We propose a novel framework, using a feature-based time series classification method to forecast outbreaks and non-outbreaks. We tested our methods on synthetic data from a…
▽ More
Forecasting the occurrence and absence of novel disease outbreaks is essential for disease management. Here, we develop a general model, with no real-world training data, that accurately forecasts outbreaks and non-outbreaks. We propose a novel framework, using a feature-based time series classification method to forecast outbreaks and non-outbreaks. We tested our methods on synthetic data from a Susceptible-Infected-Recovered model for slowly changing, noisy disease dynamics. Outbreak sequences give a transcritical bifurcation within a specified future time window, whereas non-outbreak (null bifurcation) sequences do not. We identified incipient differences in time series of infectives leading to future outbreaks and non-outbreaks. These differences are reflected in 22 statistical features and 5 early warning signal indicators. Classifier performance, given by the area under the receiver-operating curve, ranged from 0.99 for large expanding windows of training data to 0.7 for small rolling windows. Real-world performances of classifiers were tested on two empirical datasets, COVID-19 data from Singapore and SARS data from Hong Kong, with two classifiers exhibiting high accuracy. In summary, we showed that there are statistical features that distinguish outbreak and non-outbreak sequences long before outbreaks occur. We could detect these differences in synthetic and real-world data sets, well before potential outbreaks occur.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
An early warning indicator trained on stochastic disease-spreading models with different noises
Authors:
Amit K. Chakraborty,
Shan Gao,
Reza Miry,
Pouria Ramazi,
Russell Greiner,
Mark A. Lewis,
Hao Wang
Abstract:
The timely detection of disease outbreaks through reliable early warning signals (EWSs) is indispensable for effective public health mitigation strategies. Nevertheless, the intricate dynamics of real-world disease spread, often influenced by diverse sources of noise and limited data in the early stages of outbreaks, pose a significant challenge in develo** reliable EWSs, as the performance of e…
▽ More
The timely detection of disease outbreaks through reliable early warning signals (EWSs) is indispensable for effective public health mitigation strategies. Nevertheless, the intricate dynamics of real-world disease spread, often influenced by diverse sources of noise and limited data in the early stages of outbreaks, pose a significant challenge in develo** reliable EWSs, as the performance of existing indicators varies with extrinsic and intrinsic noises. Here, we address the challenge of modeling disease when the measurements are corrupted by additive white noise, multiplicative environmental noise, and demographic noise into a standard epidemic mathematical model. To navigate the complexities introduced by these noise sources, we employ a deep learning algorithm that provides EWS in infectious disease outbreak by training on noise-induced disease-spreading models. The indicator's effectiveness is demonstrated through its application to real-world COVID-19 cases in Edmonton and simulated time series derived from diverse disease spread models affected by noise. Notably, the indicator captures an impending transition in a time series of disease outbreaks and outperforms existing indicators. This study contributes to advancing early warning capabilities by addressing the intricate dynamics inherent in real-world disease spread, presenting a promising avenue for enhancing public health preparedness and response efforts.
△ Less
Submitted 24 March, 2024;
originally announced March 2024.
-
Performance of a modular ton-scale pixel-readout liquid argon time projection chamber
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
A. Alton,
R. Alvarez,
T. Alves,
H. Amar,
P. Amedo,
J. Anderson,
D. A. Andrade
, et al. (1340 additional authors not shown)
Abstract:
The Module-0 Demonstrator is a single-phase 600 kg liquid argon time projection chamber operated as a prototype for the DUNE liquid argon near detector. Based on the ArgonCube design concept, Module-0 features a novel 80k-channel pixelated charge readout and advanced high-coverage photon detection system. In this paper, we present an analysis of an eight-day data set consisting of 25 million cosmi…
▽ More
The Module-0 Demonstrator is a single-phase 600 kg liquid argon time projection chamber operated as a prototype for the DUNE liquid argon near detector. Based on the ArgonCube design concept, Module-0 features a novel 80k-channel pixelated charge readout and advanced high-coverage photon detection system. In this paper, we present an analysis of an eight-day data set consisting of 25 million cosmic ray events collected in the spring of 2021. We use this sample to demonstrate the imaging performance of the charge and light readout systems as well as the signal correlations between the two. We also report argon purity and detector uniformity measurements, and provide comparisons to detector simulations.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Three point interaction of Dirac fermions with higher spin particles and discrete symmetries
Authors:
Kushal Chakraborty,
Aakash Kumar,
Arnab Rudra,
Amey Yeole
Abstract:
We constructed all possible kinematically allowed three-point interactions of two massless Dirac spinors with massive higher-spin bosons. In any $D$ spacetime, the interactions have been constructed using the projections of the massive higher spin representations of $Spin(D-1)$ over the massless complex spinor representations of $Spin(D-2)\times Spin(D-2)$. Based on this analysis, we have further…
▽ More
We constructed all possible kinematically allowed three-point interactions of two massless Dirac spinors with massive higher-spin bosons. In any $D$ spacetime, the interactions have been constructed using the projections of the massive higher spin representations of $Spin(D-1)$ over the massless complex spinor representations of $Spin(D-2)\times Spin(D-2)$. Based on this analysis, we have further classified the space of theories involving one massless Dirac spinor and a single (or multiple) massive higher spins based on the discrete symmetries: $C,\, R,$ and $ T$. We found that in any $D=2m+1/2m$, the interacting theories of a single massive higher spin have a $``m"$ mod $2$ (or $D$ mod $4$) classification.
△ Less
Submitted 7 May, 2024; v1 submitted 19 February, 2024;
originally announced February 2024.
-
A Novel Technique to Parameterize Congestion Control in 6TiSCH IIoT Networks
Authors:
Kushal Chakraborty,
Aritra Kumar Dutta,
Mohammad Avesh Hussain,
Syed Raafay Mohiuddin,
Nikumani Choudhury,
Rakesh Matam,
Mithun Mukherjee
Abstract:
The Industrial Internet of Things (IIoT) refers to the use of interconnected smart devices, sensors, and other technologies to create a network of intelligent systems that can monitor and manage industrial processes. 6TiSCH (IPv6 over the Time Slotted Channel Hop** mode of IEEE 802.15.4e) as an enabling technology facilitates low-power and low-latency communication between IoT devices in industr…
▽ More
The Industrial Internet of Things (IIoT) refers to the use of interconnected smart devices, sensors, and other technologies to create a network of intelligent systems that can monitor and manage industrial processes. 6TiSCH (IPv6 over the Time Slotted Channel Hop** mode of IEEE 802.15.4e) as an enabling technology facilitates low-power and low-latency communication between IoT devices in industrial environments. The Routing Protocol for Low power and lossy networks (RPL), which is used as the de-facto routing protocol for 6TiSCH networks is observed to suffer from several limitations, especially during congestion in the network. Therefore, there is an immediate need for some modifications to the RPL to deal with this problem. Under traffic load which keeps on changing continuously at different instants of time, the proposed mechanism aims at finding the appropriate parent for a node that can forward the packet to the destination through the least congested path with minimal packet loss. This facilitates congestion management under dynamic traffic loads. For this, a new metric for routing using the concept of exponential weighting has been proposed, which takes the number of packets present in the queue of the node into account when choosing the parent at a particular instance of time. Additionally, the paper proposes a parent selection and swap** mechanism for congested networks. Performance evaluations are carried out in order to validate the proposed work. The results show an improvement in the performance of RPL under heavy and dynamic traffic loads.
△ Less
Submitted 11 February, 2024;
originally announced February 2024.
-
Do** Liquid Argon with Xenon in ProtoDUNE Single-Phase: Effects on Scintillation Light
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
A. Alton,
R. Alvarez,
H. Amar Es-sghir,
P. Amedo,
J. Anderson,
D. A. Andrade,
C. Andreopoulos
, et al. (1300 additional authors not shown)
Abstract:
Do** of liquid argon TPCs (LArTPCs) with a small concentration of xenon is a technique for light-shifting and facilitates the detection of the liquid argon scintillation light. In this paper, we present the results of the first do** test ever performed in a kiloton-scale LArTPC. From February to May 2020, we carried out this special run in the single-phase DUNE Far Detector prototype (ProtoDUN…
▽ More
Do** of liquid argon TPCs (LArTPCs) with a small concentration of xenon is a technique for light-shifting and facilitates the detection of the liquid argon scintillation light. In this paper, we present the results of the first do** test ever performed in a kiloton-scale LArTPC. From February to May 2020, we carried out this special run in the single-phase DUNE Far Detector prototype (ProtoDUNE-SP) at CERN, featuring 770 t of total liquid argon mass with 410 t of fiducial mass. The goal of the run was to measure the light and charge response of the detector to the addition of xenon, up to a concentration of 18.8 ppm. The main purpose was to test the possibility for reduction of non-uniformities in light collection, caused by deployment of photon detectors only within the anode planes. Light collection was analysed as a function of the xenon concentration, by using the pre-existing photon detection system (PDS) of ProtoDUNE-SP and an additional smaller set-up installed specifically for this run. In this paper we first summarize our current understanding of the argon-xenon energy transfer process and the impact of the presence of nitrogen in argon with and without xenon dopant. We then describe the key elements of ProtoDUNE-SP and the injection method deployed. Two dedicated photon detectors were able to collect the light produced by xenon and the total light. The ratio of these components was measured to be about 0.65 as 18.8 ppm of xenon were injected. We performed studies of the collection efficiency as a function of the distance between tracks and light detectors, demonstrating enhanced uniformity of response for the anode-mounted PDS. We also show that xenon do** can substantially recover light losses due to contamination of the liquid argon by nitrogen.
△ Less
Submitted 9 February, 2024; v1 submitted 2 February, 2024;
originally announced February 2024.
-
On Safety and Liveness Filtering Using Hamilton-Jacobi Reachability Analysis
Authors:
Javier Borquez,
Kaustav Chakraborty,
Hao Wang,
Somil Bansal
Abstract:
Hamilton-Jacobi (HJ) reachability-based filtering provides a powerful framework to co-optimize performance and safety (or liveness) for autonomous systems. Under this filtering scheme, a nominal controller is minimally modified to ensure system safety or liveness. However, the resulting controllers can exhibit abrupt switching and bang-bang behavior, which is not suitable for applications of auton…
▽ More
Hamilton-Jacobi (HJ) reachability-based filtering provides a powerful framework to co-optimize performance and safety (or liveness) for autonomous systems. Under this filtering scheme, a nominal controller is minimally modified to ensure system safety or liveness. However, the resulting controllers can exhibit abrupt switching and bang-bang behavior, which is not suitable for applications of autonomous systems in the real world. This work presents a novel, unifying framework to design safety and liveness filters through reachability analysis. We explicitly characterize the maximal set of control inputs that ensures safety (or liveness) at a given state. Different safety filters can then be constructed using different subsets of this maximal set along with a projection operator to modify the nominal controller. We use the proposed framework to design three safety filters, each balancing performance, computation time, and smoothness differently. The proposed filters can easily handle dynamics uncertainties, disturbances, and bounded control inputs. We highlight their relative strengths and limitations by applying these filters to autonomous navigation and rocket landing scenarios and on a physical robot testbed. We also discuss practical aspects associated with implementing these filters on real-world autonomous systems. Our research advances the understanding and potential application of reachability-based controllers on real-world autonomous systems.
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
The DUNE Far Detector Vertical Drift Technology, Technical Design Report
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
A. Alton,
R. Alvarez,
H. Amar,
P. Amedo,
J. Anderson,
D. A. Andrade,
C. Andreopoulos
, et al. (1304 additional authors not shown)
Abstract:
DUNE is an international experiment dedicated to addressing some of the questions at the forefront of particle physics and astrophysics, including the mystifying preponderance of matter over antimatter in the early universe. The dual-site experiment will employ an intense neutrino beam focused on a near and a far detector as it aims to determine the neutrino mass hierarchy and to make high-precisi…
▽ More
DUNE is an international experiment dedicated to addressing some of the questions at the forefront of particle physics and astrophysics, including the mystifying preponderance of matter over antimatter in the early universe. The dual-site experiment will employ an intense neutrino beam focused on a near and a far detector as it aims to determine the neutrino mass hierarchy and to make high-precision measurements of the PMNS matrix parameters, including the CP-violating phase. It will also stand ready to observe supernova neutrino bursts, and seeks to observe nucleon decay as a signature of a grand unified theory underlying the standard model.
The DUNE far detector implements liquid argon time-projection chamber (LArTPC) technology, and combines the many tens-of-kiloton fiducial mass necessary for rare event searches with the sub-centimeter spatial resolution required to image those events with high precision. The addition of a photon detection system enhances physics capabilities for all DUNE physics drivers and opens prospects for further physics explorations. Given its size, the far detector will be implemented as a set of modules, with LArTPC designs that differ from one another as newer technologies arise.
In the vertical drift LArTPC design, a horizontal cathode bisects the detector, creating two stacked drift volumes in which ionization charges drift towards anodes at either the top or bottom. The anodes are composed of perforated PCB layers with conductive strips, enabling reconstruction in 3D. Light-trap-style photon detection modules are placed both on the cryostat's side walls and on the central cathode where they are optically powered.
This Technical Design Report describes in detail the technical implementations of each subsystem of this LArTPC that, together with the other far detector modules and the near detector, will enable DUNE to achieve its physics goals.
△ Less
Submitted 5 December, 2023;
originally announced December 2023.
-
Joint State and Input Estimation for Linear Dynamical Systems with Sparse Control
Authors:
Rupam Kalyan Chakraborty,
Geethu Joseph,
Chandra R. Murthy
Abstract:
Sparsity constraints on the control inputs of a linear dynamical system naturally arise in several practical applications such as networked control, computer vision, seismic signal processing, and cyber-physical systems. In this work, we consider the problem of jointly estimating the states and sparse inputs of such systems from low-dimensional (compressive) measurements. Due to the low-dimensiona…
▽ More
Sparsity constraints on the control inputs of a linear dynamical system naturally arise in several practical applications such as networked control, computer vision, seismic signal processing, and cyber-physical systems. In this work, we consider the problem of jointly estimating the states and sparse inputs of such systems from low-dimensional (compressive) measurements. Due to the low-dimensional measurements, conventional Kalman filtering and smoothing algorithms fail to accurately estimate the states and inputs. We present a Bayesian approach that exploits the input sparsity to significantly improve estimation accuracy. Sparsity in the input estimates is promoted by using different prior distributions on the input. We investigate two main approaches: regularizer-based MAP, and {Bayesian learning-based estimation}. We also extend the approaches to handle control inputs with common support and analyze the time and memory complexities of the presented algorithms. Finally, using numerical simulations, we show that our algorithms outperform the state-of-the-art methods in terms of accuracy and time/memory complexities, especially in the low-dimensional measurement regime.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
$U(N)$ Torus Link Invariants in the Large $N$ limit from Matrix Model Approach
Authors:
Archana Maji,
Kushal Chakraborty,
Suvankar Dutta,
P. Ramadevi
Abstract:
In this paper we study $U(N)$ colored HOMFLY-PT polynomials of torus links in the double scaling limit (polynomial variable $q\rightarrow 1$, $N\rightarrow \infty$ kee** $q^N$ fixed). We show that, in this limit, the colored HOMFLY-PT polynomial of any $(Lα,Lβ)$ torus link can be expressed in terms of the colored HOMFLY-PT polynomial of $(L,L)$ torus link. Using the connection between matrix mod…
▽ More
In this paper we study $U(N)$ colored HOMFLY-PT polynomials of torus links in the double scaling limit (polynomial variable $q\rightarrow 1$, $N\rightarrow \infty$ kee** $q^N$ fixed). We show that, in this limit, the colored HOMFLY-PT polynomial of any $(Lα,Lβ)$ torus link can be expressed in terms of the colored HOMFLY-PT polynomial of $(L,L)$ torus link. Using the connection between matrix models and the Chern-Simons field theoretic invariants, we show that the colored torus link invariants are uniquely expressed in terms of connected correlation functions of operators in $U(N)$ matrix model. We determine the leading and subleading contribution to some of the correlators at large $N$ from the matrix model approach and find that they match exactly with those obtained from the corresponding colored HOMFLY-PT polynomials.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
Correlated orientational disorder in entropic crystals
Authors:
Sumitava Kundu,
Kaustav Chakraborty,
Avisek Das
Abstract:
We report computational evidence for a new type of disordered phase in crystals resulting from entropy driven self-assembly of hard convex polyhedra. The disorder was reflected in the orientations of the anisotropic particles and not in the positions of the centers of geometry. Despite the lack of order, particle orientations were not random, and exhibited strong correlations. The orientational co…
▽ More
We report computational evidence for a new type of disordered phase in crystals resulting from entropy driven self-assembly of hard convex polyhedra. The disorder was reflected in the orientations of the anisotropic particles and not in the positions of the centers of geometry. Despite the lack of order, particle orientations were not random, and exhibited strong correlations. The orientational correlations possessed certain special properties that remained constant across the pressure range where this phase was observed. The rotational motions of all particles became discrete, characterized by a fixed number of absolute orientations. The particles were equally partitioned among them at all time, while maintaining specific values of pairwise orientational differences. The sense of ``order'' in the disorder was conserved irrespective of the extent of rotational mobility of the particles. This gave rise to a discretely mobile phase in the low density solid and a frozen disordered state at high pressure. The newly identified ``discrete plastic crystal'' phase transitioned into a freely rotating one, where rotational degrees of freedom were completely random. The resulting solid-solid transition was purely orientational in nature without the change in the face centered cubic crystalline arrangements of the centers of the anisotropic particles. This finding can be interpreted as the simplest example of correlated disorder in colloidal crystals.
△ Less
Submitted 24 February, 2024; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Elimination of Static Hazards in Asynchronous Sequential Circuits using Quantum dot Cellular Automata
Authors:
Angshuman Khan,
Chiradeep Mukherjee,
Ankan Kumar Chakraborty,
Ratna Chakrabarty,
Debashis De
Abstract:
There is nowhere else in emerging technology, but in Quantum-dot Cellular Automata, one can find high speed, low power operation, and high packaging density, which deals with electrostatic interaction between electrons within a cell. Literature survey lacks in hazards free design of QCA circuit. Hazards create ambiguous and unpredictable output, which can be avoided. This work considers both hazar…
▽ More
There is nowhere else in emerging technology, but in Quantum-dot Cellular Automata, one can find high speed, low power operation, and high packaging density, which deals with electrostatic interaction between electrons within a cell. Literature survey lacks in hazards free design of QCA circuit. Hazards create ambiguous and unpredictable output, which can be avoided. This work considers both hazards and hazards-free asynchronous sequential circuits; both are compared in terms of kink energy, and a better one has been proposed. The circuit simulation has been verified in the QCADesigner tool.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
On the plus parts of the class numbers of cyclotomic fields
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We exhibit some new families of cyclotomic fields which have non-trivial plus parts of their class numbers. We also prove the $3$ - divisibility of the plus part of the class number of another family consisting of infinitely many cyclotomic fields. At the end, we provide some numerical examples supporting our results.
We exhibit some new families of cyclotomic fields which have non-trivial plus parts of their class numbers. We also prove the $3$ - divisibility of the plus part of the class number of another family consisting of infinitely many cyclotomic fields. At the end, we provide some numerical examples supporting our results.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Detecting and Mitigating System-Level Anomalies of Vision-Based Controllers
Authors:
Aryaman Gupta,
Kaustav Chakraborty,
Somil Bansal
Abstract:
Autonomous systems, such as self-driving cars and drones, have made significant strides in recent years by leveraging visual inputs and machine learning for decision-making and control. Despite their impressive performance, these vision-based controllers can make erroneous predictions when faced with novel or out-of-distribution inputs. Such errors can cascade to catastrophic system failures and c…
▽ More
Autonomous systems, such as self-driving cars and drones, have made significant strides in recent years by leveraging visual inputs and machine learning for decision-making and control. Despite their impressive performance, these vision-based controllers can make erroneous predictions when faced with novel or out-of-distribution inputs. Such errors can cascade to catastrophic system failures and compromise system safety. In this work, we introduce a run-time anomaly monitor to detect and mitigate such closed-loop, system-level failures. Specifically, we leverage a reachability-based framework to stress-test the vision-based controller offline and mine its system-level failures. This data is then used to train a classifier that is leveraged online to flag inputs that might cause system breakdowns. The anomaly detector highlights issues that transcend individual modules and pertain to the safety of the overall system. We also design a fallback controller that robustly handles these detected anomalies to preserve system safety. We validate the proposed approach on an autonomous aircraft taxiing system that uses a vision-based controller for taxiing. Our results show the efficacy of the proposed approach in identifying and handling system-level anomalies, outperforming methods such as prediction error-based detection, and ensembling, thereby enhancing the overall safety and robustness of autonomous systems.
△ Less
Submitted 8 April, 2024; v1 submitted 23 September, 2023;
originally announced September 2023.
-
On the exponential Diophantine equation $x^2+p^mq^n=2y^p$
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We study the exponential Diophantine equation $x^2+p^mq^n=2y^p$ in positive integers $x,y,m,n$, and odd primes $p$ and $q$ using primitive divisors of Lehmer sequences in combination with elementary number theory. We discuss the solvability of this equation.
We study the exponential Diophantine equation $x^2+p^mq^n=2y^p$ in positive integers $x,y,m,n$, and odd primes $p$ and $q$ using primitive divisors of Lehmer sequences in combination with elementary number theory. We discuss the solvability of this equation.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
Sensitivity to CP Discovery in the Presence of Lorentz Invariance Violating Potential at T2HK/T2HKK
Authors:
Supriya Pan,
Kaustav Chakraborty,
Srubabati Goswami
Abstract:
Investigation of conservation/violation of CP symmetry in the leptonic sector is very essential in understanding the evolution of the universe. Lorentz invariance and CPT are fundamental symmetries of nature. The violation of Lorentz invariance can also lead to CPT violations. The standard three flavour neutrino oscillation framework presents a scenario to observe the signature of Lorentz invarian…
▽ More
Investigation of conservation/violation of CP symmetry in the leptonic sector is very essential in understanding the evolution of the universe. Lorentz invariance and CPT are fundamental symmetries of nature. The violation of Lorentz invariance can also lead to CPT violations. The standard three flavour neutrino oscillation framework presents a scenario to observe the signature of Lorentz invariance and CP violations. This work focuses on the effect of Lorentz invariance violating (LIV) parameters on the sensitivity to CP violation. We investigate the sensitivity in two proposed configurations of the upcoming T2HK experiment: (i) one detector each placed at 295 km and 1100 km, and (ii) two identical detectors at 295 km. This study probes the effect of CPT violating parameters $a_{eμ},a_{eτ},a_{μτ}$.
△ Less
Submitted 22 September, 2023; v1 submitted 15 August, 2023;
originally announced August 2023.
-
Impact of cross-section uncertainties on supernova neutrino spectral parameter fitting in the Deep Underground Neutrino Experiment
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson,
D. A. Andrade
, et al. (1294 additional authors not shown)
Abstract:
A primary goal of the upcoming Deep Underground Neutrino Experiment (DUNE) is to measure the $\mathcal{O}(10)$ MeV neutrinos produced by a Galactic core-collapse supernova if one should occur during the lifetime of the experiment. The liquid-argon-based detectors planned for DUNE are expected to be uniquely sensitive to the $ν_e$ component of the supernova flux, enabling a wide variety of physics…
▽ More
A primary goal of the upcoming Deep Underground Neutrino Experiment (DUNE) is to measure the $\mathcal{O}(10)$ MeV neutrinos produced by a Galactic core-collapse supernova if one should occur during the lifetime of the experiment. The liquid-argon-based detectors planned for DUNE are expected to be uniquely sensitive to the $ν_e$ component of the supernova flux, enabling a wide variety of physics and astrophysics measurements. A key requirement for a correct interpretation of these measurements is a good understanding of the energy-dependent total cross section $σ(E_ν)$ for charged-current $ν_e$ absorption on argon. In the context of a simulated extraction of supernova $ν_e$ spectral parameters from a toy analysis, we investigate the impact of $σ(E_ν)$ modeling uncertainties on DUNE's supernova neutrino physics sensitivity for the first time. We find that the currently large theoretical uncertainties on $σ(E_ν)$ must be substantially reduced before the $ν_e$ flux parameters can be extracted reliably: in the absence of external constraints, a measurement of the integrated neutrino luminosity with less than 10\% bias with DUNE requires $σ(E_ν)$ to be known to about 5%. The neutrino spectral shape parameters can be known to better than 10% for a 20% uncertainty on the cross-section scale, although they will be sensitive to uncertainties on the shape of $σ(E_ν)$. A direct measurement of low-energy $ν_e$-argon scattering would be invaluable for improving the theoretical precision to the needed level.
△ Less
Submitted 7 July, 2023; v1 submitted 29 March, 2023;
originally announced March 2023.
-
Diophantine $D(n)$-quadruples in $\mathbb{Z}[\sqrt{4k + 2}]$
Authors:
Kalyan Chakraborty,
Shubham Gupta,
Azizul Hoque
Abstract:
Let $d$ be a square-free integer and $\mathbb{Z}[\sqrt{d}]$ a quadratic ring of integers. For a given $n\in\mathbb{Z}[\sqrt{d}]$, a set of $m$ non-zero distinct elements in $\mathbb{Z}[\sqrt{d}]$ is called a Diophantine $D(n)$-$m$-tuple (or simply $D(n)$-$m$-tuple) in $\mathbb{Z}[\sqrt{d}]$ if product of any two of them plus $n$ is a square in $\mathbb{Z}[\sqrt{d}]$. Assume that…
▽ More
Let $d$ be a square-free integer and $\mathbb{Z}[\sqrt{d}]$ a quadratic ring of integers. For a given $n\in\mathbb{Z}[\sqrt{d}]$, a set of $m$ non-zero distinct elements in $\mathbb{Z}[\sqrt{d}]$ is called a Diophantine $D(n)$-$m$-tuple (or simply $D(n)$-$m$-tuple) in $\mathbb{Z}[\sqrt{d}]$ if product of any two of them plus $n$ is a square in $\mathbb{Z}[\sqrt{d}]$. Assume that $d \equiv 2 \pmod 4$ is a positive integer such that $x^2 - dy^2 = -1$ and $x^2 - dy^2 = 6$ are solvable in integers. In this paper, we prove the existence of infinitely many $D(n)$-quadruples in $\mathbb{Z}[\sqrt{d}]$ for $n = 4m + 4k\sqrt{d}$ with $m, k \in \mathbb{Z}$ satisfying $m \not\equiv 5 \pmod{6}$ and $k \not\equiv 3 \pmod{6}$. Moreover, we prove the same for $n = (4m + 2) + 4k\sqrt{d}$ when either $m \not\equiv 9 \pmod{12}$ and $k \not\equiv 3 \pmod{6}$, or $m \not\equiv 0 \pmod{12}$ and $k \not\equiv 0 \pmod{6}$. At the end, some examples supporting the existence of quadruples in $\mathbb{Z}[\sqrt{d}]$ with the property $D(n)$ for the above exceptional $n$'s are provided for $d = 10$.
△ Less
Submitted 26 June, 2024; v1 submitted 8 February, 2023;
originally announced February 2023.
-
Generalized Fruit Diophantine equation and Hyperelliptic curves
Authors:
Om Prakash,
Kalyan Chakraborty
Abstract:
We show the insolvability of the Diophantine equation $ax^d-y^2-z^2+xyz-b=0$ in $\mathbb{Z}$ for fixed $a$ and $b$ such that $a\equiv 1 \pmod {12}$ and $b=2^da-3$, where $d$ is an odd integer and is a multiple of $3$. Further, we investigate the more general family with $b=2^da-3^r$, where $r$ is a positive odd integer. As a consequence, we found an infinite family of hyperelliptic curves with tri…
▽ More
We show the insolvability of the Diophantine equation $ax^d-y^2-z^2+xyz-b=0$ in $\mathbb{Z}$ for fixed $a$ and $b$ such that $a\equiv 1 \pmod {12}$ and $b=2^da-3$, where $d$ is an odd integer and is a multiple of $3$. Further, we investigate the more general family with $b=2^da-3^r$, where $r$ is a positive odd integer. As a consequence, we found an infinite family of hyperelliptic curves with trivial torsion over $\mathbb{Q}$. We conclude by providing some numerical evidence corroborating the main results.
△ Less
Submitted 31 January, 2023;
originally announced January 2023.
-
Nanomaterials for Supercapacitors: Uncovering Research Themes with Unsupervised Machine Learning
Authors:
Mridhula Venkatanarayanan,
Amit K Chakraborty,
Sayantari Ghosh
Abstract:
Identification of important topics in a text can facilitate knowledge curation, discover thematic trends, and predict future directions. In this paper, we aim to quantitatively detect the most common research themes in the emerging supercapacitor research area, and summarize their trends and characteristics through the proposed unsupervised, machine learning approach. We have retrieved the complet…
▽ More
Identification of important topics in a text can facilitate knowledge curation, discover thematic trends, and predict future directions. In this paper, we aim to quantitatively detect the most common research themes in the emerging supercapacitor research area, and summarize their trends and characteristics through the proposed unsupervised, machine learning approach. We have retrieved the complete reference entries of article abstracts from Scopus database for all original research articles from 2004 to 2021. Abstracts were processed through a natural language processing pipeline and analyzed by a latent Dirichlet allocation topic modeling algorithm for unsupervised topic discovery. Nine major topics were further examined through topic-word associations, Inter-topic distance map and topic-specific word cloud. We observed the greatest importance is being given to performance metrics (28.2%), flexible electronics (8%), and graphene-based nanocomposites (10.9%). The analysis also points out crucial future research directions towards bio-derived carbon nanomaterials (such as RGO) and flexible supercapacitors.
△ Less
Submitted 27 December, 2022;
originally announced December 2022.
-
Highly-parallelized simulation of a pixelated LArTPC on a GPU
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson
, et al. (1282 additional authors not shown)
Abstract:
The rapid development of general-purpose computing on graphics processing units (GPGPU) is allowing the implementation of highly-parallelized Monte Carlo simulation chains for particle physics experiments. This technique is particularly suitable for the simulation of a pixelated charge readout for time projection chambers, given the large number of channels that this technology employs. Here we pr…
▽ More
The rapid development of general-purpose computing on graphics processing units (GPGPU) is allowing the implementation of highly-parallelized Monte Carlo simulation chains for particle physics experiments. This technique is particularly suitable for the simulation of a pixelated charge readout for time projection chambers, given the large number of channels that this technology employs. Here we present the first implementation of a full microphysical simulator of a liquid argon time projection chamber (LArTPC) equipped with light readout and pixelated charge readout, developed for the DUNE Near Detector. The software is implemented with an end-to-end set of GPU-optimized algorithms. The algorithms have been written in Python and translated into CUDA kernels using Numba, a just-in-time compiler for a subset of Python and NumPy instructions. The GPU implementation achieves a speed up of four orders of magnitude compared with the equivalent CPU version. The simulation of the current induced on $10^3$ pixels takes around 1 ms on the GPU, compared with approximately 10 s on the CPU. The results of the simulation are compared against data from a pixel-readout LArTPC prototype.
△ Less
Submitted 28 February, 2023; v1 submitted 19 December, 2022;
originally announced December 2022.
-
On a conjecture of Franu\v sić and Jadrijevi\' c: Counter-examples
Authors:
Kalyan Chakraborty,
Shubham Gupta,
Azizul Hoque
Abstract:
Let $d\equiv 2\pmod 4$ be a square-free integer such that $x^2 - dy^2 =- 1$ and $x^2 - dy^2 = 6$ are solvable in integers. We prove the existence of infinitely many quadruples in $\mathbb{Z}[\sqrt{d}]$ with the property $D(n)$ when $n \in \{(4m + 1) + 4k\sqrt{d}, (4m + 1) + (4k + 2)\sqrt{d}, (4m + 3) + 4k\sqrt{d}, (4m + 3) + (4k + 2)\sqrt{d}, (4m + 2) + (4k + 2)\sqrt{d}\}$ for…
▽ More
Let $d\equiv 2\pmod 4$ be a square-free integer such that $x^2 - dy^2 =- 1$ and $x^2 - dy^2 = 6$ are solvable in integers. We prove the existence of infinitely many quadruples in $\mathbb{Z}[\sqrt{d}]$ with the property $D(n)$ when $n \in \{(4m + 1) + 4k\sqrt{d}, (4m + 1) + (4k + 2)\sqrt{d}, (4m + 3) + 4k\sqrt{d}, (4m + 3) + (4k + 2)\sqrt{d}, (4m + 2) + (4k + 2)\sqrt{d}\}$ for $m, k \in \mathbb{Z}$. As a consequence, we provide few counter examples to a conjecture of Franu\v sić and Jadrijevi\' c (see Conjecture 1.1).
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Discovering Closed-Loop Failures of Vision-Based Controllers via Reachability Analysis
Authors:
Kaustav Chakraborty,
Somil Bansal
Abstract:
Machine learning driven image-based controllers allow robotic systems to take intelligent actions based on the visual feedback from their environment. Understanding when these controllers might lead to system safety violations is important for their integration in safety-critical applications and engineering corrective safety measures for the system. Existing methods leverage simulation-based test…
▽ More
Machine learning driven image-based controllers allow robotic systems to take intelligent actions based on the visual feedback from their environment. Understanding when these controllers might lead to system safety violations is important for their integration in safety-critical applications and engineering corrective safety measures for the system. Existing methods leverage simulation-based testing (or falsification) to find the failures of vision-based controllers, i.e., the visual inputs that lead to closed-loop safety violations. However, these techniques do not scale well to the scenarios involving high-dimensional and complex visual inputs, such as RGB images. In this work, we cast the problem of finding closed-loop vision failures as a Hamilton-Jacobi (HJ) reachability problem. Our approach blends simulation-based analysis with HJ reachability methods to compute an approximation of the backward reachable tube (BRT) of the system, i.e., the set of unsafe states for the system under vision-based controllers. Utilizing the BRT, we can tractably and systematically find the system states and corresponding visual inputs that lead to closed-loop failures. These visual inputs can be subsequently analyzed to find the input characteristics that might have caused the failure. Besides its scalability to high-dimensional visual inputs, an explicit computation of BRT allows the proposed approach to capture non-trivial system failures that are difficult to expose via random simulations. We demonstrate our framework on two case studies involving an RGB image-based neural network controller for (a) autonomous indoor navigation, and (b) autonomous aircraft taxiing.
△ Less
Submitted 10 April, 2024; v1 submitted 4 November, 2022;
originally announced November 2022.
-
Identification and reconstruction of low-energy electrons in the ProtoDUNE-SP detector
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson
, et al. (1235 additional authors not shown)
Abstract:
Measurements of electrons from $ν_e$ interactions are crucial for the Deep Underground Neutrino Experiment (DUNE) neutrino oscillation program, as well as searches for physics beyond the standard model, supernova neutrino detection, and solar neutrino measurements. This article describes the selection and reconstruction of low-energy (Michel) electrons in the ProtoDUNE-SP detector. ProtoDUNE-SP is…
▽ More
Measurements of electrons from $ν_e$ interactions are crucial for the Deep Underground Neutrino Experiment (DUNE) neutrino oscillation program, as well as searches for physics beyond the standard model, supernova neutrino detection, and solar neutrino measurements. This article describes the selection and reconstruction of low-energy (Michel) electrons in the ProtoDUNE-SP detector. ProtoDUNE-SP is one of the prototypes for the DUNE far detector, built and operated at CERN as a charged particle test beam experiment. A sample of low-energy electrons produced by the decay of cosmic muons is selected with a purity of 95%. This sample is used to calibrate the low-energy electron energy scale with two techniques. An electron energy calibration based on a cosmic ray muon sample uses calibration constants derived from measured and simulated cosmic ray muon events. Another calibration technique makes use of the theoretically well-understood Michel electron energy spectrum to convert reconstructed charge to electron energy. In addition, the effects of detector response to low-energy electron energy scale and its resolution including readout electronics threshold effects are quantified. Finally, the relation between the theoretical and reconstructed low-energy electron energy spectrum is derived and the energy resolution is characterized. The low-energy electron selection presented here accounts for about 75% of the total electron deposited energy. After the addition of lost energy using a Monte Carlo simulation, the energy resolution improves from about 40% to 25% at 50~MeV. These results are used to validate the expected capabilities of the DUNE far detector to reconstruct low-energy electrons.
△ Less
Submitted 31 May, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Lehmer sequence approach to the divisibility of class numbers of imaginary quadratic fields
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
Let $k\geq 3$ and $n\geq 3$ be odd integers, and let $m\geq 0$ be any integer. For a prime number $\ell$, we prove that the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{\ell^{2m}-2k^n})$ is either divisible by $n$ or by a specific divisor of $n$. Applying this result, we construct an infinite family of certain tuples of imaginary quadratic fields of the form…
▽ More
Let $k\geq 3$ and $n\geq 3$ be odd integers, and let $m\geq 0$ be any integer. For a prime number $\ell$, we prove that the class number of the imaginary quadratic field $\mathbb{Q}(\sqrt{\ell^{2m}-2k^n})$ is either divisible by $n$ or by a specific divisor of $n$. Applying this result, we construct an infinite family of certain tuples of imaginary quadratic fields of the form $$\left(\mathbb{Q}(\sqrt{d}), \mathbb{Q}(\sqrt{d+1}), \mathbb{Q}(\sqrt{4d+1}), \mathbb{Q}(\sqrt{2d+4}), \mathbb{Q}(\sqrt{2d+16}), \cdots, \mathbb{Q}(\sqrt{2d+4^t}) \right)$$ with $d\in \mathbb{Z}$ and $1\leq 4^t\leq 2|d|$ whose class numbers are all divisible by $n$. Our proofs use some deep results about primitive divisors of Lehmer sequences.
△ Less
Submitted 2 October, 2022;
originally announced October 2022.
-
On-shell Supersymmetry and higher-spin amplitudes
Authors:
Mahesh K. N. Balasubramanian,
Kushal Chakraborty,
Arnab Rudra,
Arnab Priya Saha
Abstract:
We use on-shell Supersymmetry to constrain the three-point function of two massless particles and one massive particle in 3+1 dimensions. We use this information to write down the tree-level four-point function of massless particles for $\mathcal{N}=1$, $2$ and $4$ theories. In particular, we derive the expressions for four-photon/gluon amplitudes with massive higher spin exchange in theories with…
▽ More
We use on-shell Supersymmetry to constrain the three-point function of two massless particles and one massive particle in 3+1 dimensions. We use this information to write down the tree-level four-point function of massless particles for $\mathcal{N}=1$, $2$ and $4$ theories. In particular, we derive the expressions for four-photon/gluon amplitudes with massive higher spin exchange in theories with $\mathcal{N}=4$ Supersymmetry in 3+1 dimensions.
△ Less
Submitted 14 September, 2022;
originally announced September 2022.
-
Results on $\mathrm{K}_1$ of general quadratic groups
Authors:
Rabeya Basu,
Kuntal Chakraborty
Abstract:
In the first part of this article we discuss the relative cases of Quillen-Suslin's local-global principle for the general quadratic (Bak's unitary) groups, and its applications for the (relative) stable and unstable $\mathrm{K}_1$-groups. The second part is dedicated to the graded version of the local-global principle for the general quadratic groups and its application to deduce a result for Bas…
▽ More
In the first part of this article we discuss the relative cases of Quillen-Suslin's local-global principle for the general quadratic (Bak's unitary) groups, and its applications for the (relative) stable and unstable $\mathrm{K}_1$-groups. The second part is dedicated to the graded version of the local-global principle for the general quadratic groups and its application to deduce a result for Bass' nil groups.
△ Less
Submitted 25 March, 2023; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Diophantine triples with the property $D(n)$ for distinct $n$
Authors:
Kalyan Chakraborty,
Shubham Gupta,
Azizul Hoque
Abstract:
We prove that for every integer $n$, there exist infinitely many $D(n)$-triples which are also $D(t)$-triples for $t\in\mathbb{Z}$ with $n\ne t$. We also prove that there are infinitely many triples with the property $D(-1)$ in $\mathbb{Z}[i]$ which are also $D(n)$-triple in $\mathbb{Z}[i]$ for two distinct $n$'s other than $n = -1$ and these triples are not equivalent to any triple with the prope…
▽ More
We prove that for every integer $n$, there exist infinitely many $D(n)$-triples which are also $D(t)$-triples for $t\in\mathbb{Z}$ with $n\ne t$. We also prove that there are infinitely many triples with the property $D(-1)$ in $\mathbb{Z}[i]$ which are also $D(n)$-triple in $\mathbb{Z}[i]$ for two distinct $n$'s other than $n = -1$ and these triples are not equivalent to any triple with the property $D(1)$.
△ Less
Submitted 29 April, 2022;
originally announced April 2022.
-
Analytic treatment of 3-flavor neutrino oscillation and decay in matter
Authors:
Dibya S. Chattopadhyay,
Kaustav Chakraborty,
Amol Dighe,
Srubabati Goswami
Abstract:
We present compact analytic expressions for 3-flavor neutrino oscillation probabilities with invisible neutrino decay, where matter effects have been explicitly included. We take into account the possibility that the oscillation and decay components of the effective Hamiltonian do not commute. This is achieved by employing the techniques of inverse Baker-Campbell-Hausdorff (BCH) expansion and the…
▽ More
We present compact analytic expressions for 3-flavor neutrino oscillation probabilities with invisible neutrino decay, where matter effects have been explicitly included. We take into account the possibility that the oscillation and decay components of the effective Hamiltonian do not commute. This is achieved by employing the techniques of inverse Baker-Campbell-Hausdorff (BCH) expansion and the Cayley-Hamilton theorem applied in the 3-flavor framework. If only the vacuum mass eigenstate $ν_3$ decays, we show that the treatment of neutrino propagation may be reduced to an effective 2-flavor analysis in the One Mass Scale Dominance (OMSD) approximation. The oscillation probabilities for $P_{μμ}$, $P_{ee}$, $P_{eμ}$ and $P_{μe}$ -- relevant for reactor, long baseline and atmospheric neutrino experiments -- are obtained as perturbative expansions for the case of only $ν_3$ decay, as well as for the more general scenario where all components of the decay matrix are non-zero. The analytic results thus obtained match the exact numerical results for constant density matter to a high precision and provide physical insights into possible effects of the decay of neutrinos as they propagate through Earth matter. We find that the effects of neutrino decay are most likely to be observable in $P_{μμ}$. We also point out that at any long baseline, the oscillation dips in $P_{μμ}$ can show higher survival probabilities in the case with decay than without decay, and explain this feature using our analytic approximations.
△ Less
Submitted 25 April, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
Snowmass White Paper: Beyond the Standard Model effects on Neutrino Flavor
Authors:
C. A. Argüelles,
G. Barenboim,
M. Bustamante,
P. Coloma,
P. B. Denton,
I. Esteban,
Y. Farzan,
E. Fernández Martínez,
D. V. Forero,
A. M. Gago,
T. Katori,
R. Lehnert,
M. Ross-Lonergan,
A. M. Suliga,
Z. Tabrizi,
L. Anchordoqui,
K. Chakraborty,
J. Conrad,
A. Das,
C. S. Fong,
B. R. Littlejohn,
M. Maltoni,
D. Parno,
J. Spitz,
J. Tang
, et al. (1 additional authors not shown)
Abstract:
Neutrinos are one of the most promising messengers for signals of new physics Beyond the Standard Model (BSM). On the theoretical side, their elusive nature, combined with their unknown mass mechanism, seems to indicate that the neutrino sector is indeed opening a window to new physics. On the experimental side, several long-standing anomalies have been reported in the past decades, providing a st…
▽ More
Neutrinos are one of the most promising messengers for signals of new physics Beyond the Standard Model (BSM). On the theoretical side, their elusive nature, combined with their unknown mass mechanism, seems to indicate that the neutrino sector is indeed opening a window to new physics. On the experimental side, several long-standing anomalies have been reported in the past decades, providing a strong motivation to thoroughly test the standard three-neutrino oscillation paradigm. In this Snowmass21 white paper, we explore the potential of current and future neutrino experiments to explore BSM effects on neutrino flavor during the next decade.
△ Less
Submitted 14 July, 2022; v1 submitted 21 March, 2022;
originally announced March 2022.
-
Estimating Software Reliability Using Size-biased Modelling
Authors:
Soumen Dey,
Ashis Kumar Chakraborty
Abstract:
Software reliability estimation is one of the most active areas of research in software testing. Since time between failures (TBF) has often been challenging to record, software testing data are commonly recorded as test-case-wise in a discrete set up. We have developed a Bayesian generalised linear mixed model (GLMM) based on software testing detection data and a size-biased strategy which not…
▽ More
Software reliability estimation is one of the most active areas of research in software testing. Since time between failures (TBF) has often been challenging to record, software testing data are commonly recorded as test-case-wise in a discrete set up. We have developed a Bayesian generalised linear mixed model (GLMM) based on software testing detection data and a size-biased strategy which not only estimates the software reliability, but also estimates the total number of bugs present in the software. Our approach provides a flexible, unified modelling framework and can be adopted to various real-life situations. We have assessed the performance of our model via simulation study and found that each of the key parameters could be estimated with a satisfactory level of accuracy. We have also applied our model to two empirical software testing data sets. While there can be other fields of study for application of our model (e.g., hydrocarbon exploration), we anticipate that our novel modelling approach to estimate software reliability could be very useful for the users and can potentially be a key tool in the field of software reliability estimation.
△ Less
Submitted 20 April, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
Stochastic models of Jaya and semi-steady-state Jaya algorithms
Authors:
Uday K. Chakraborty
Abstract:
We build stochastic models for analyzing Jaya and semi-steady-state Jaya algorithms. The analysis shows that for semi-steady-state Jaya (a) the maximum expected value of the number of worst-index updates per generation is a paltry 1.7 regardless of the population size; (b) regardless of the population size, the expectation of the number of best-index updates per generation decreases monotonically…
▽ More
We build stochastic models for analyzing Jaya and semi-steady-state Jaya algorithms. The analysis shows that for semi-steady-state Jaya (a) the maximum expected value of the number of worst-index updates per generation is a paltry 1.7 regardless of the population size; (b) regardless of the population size, the expectation of the number of best-index updates per generation decreases monotonically with generations; (c) exact upper bounds as well as asymptotics of the expected best-update counts can be obtained for specific distributions; the upper bound is 0.5 for normal and logistic distributions, $\ln 2$ for the uniform distribution, and $e^{-γ} \ln 2$ for the exponential distribution, where $γ$ is the Euler-Mascheroni constant; the asymptotic is $e^{-γ} \ln 2$ for logistic and exponential distributions and $\ln 2$ for the uniform distribution (the asymptotic cannot be obtained analytically for the normal distribution). The models lead to the derivation of computational complexities of Jaya and semi-steady-state Jaya. The theoretical analysis is supported with empirical results on a benchmark suite. The insights provided by our stochastic models should help design new, improved population-based search/optimization heuristics.
△ Less
Submitted 14 February, 2022;
originally announced February 2022.
-
Anisotropic compact star with a linear pressure-density relationship
Authors:
Shyam Das,
Bikram Keshari Parida,
Koushik Chakraborty,
Saibal Ray
Abstract:
We present a model of compact astrophysical object under General Theory of Relativity using the anisotropic extension of Tolman IV solution. The anisotropy function, derived from the model, remains well behaved throughout the interior of the star. The model satisfies several necessary conditions for a physically realistic compact star. Physical viability of the model is verified specifically by pl…
▽ More
We present a model of compact astrophysical object under General Theory of Relativity using the anisotropic extension of Tolman IV solution. The anisotropy function, derived from the model, remains well behaved throughout the interior of the star. The model satisfies several necessary conditions for a physically realistic compact star. Physical viability of the model is verified specifically by plugging in the estimated parameter values of the Low Mass X-ray Binary (LMXB) candidate 4U 1608 - 52. Our stability analysis of this star, by using various criteria for stability, provide satisfactory results. In connection to anisotropy, we compute the Tidal Love Number (TLN) for the compact stellar model and compare the calculated values with existing literature.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
On a family of elliptic curves of rank at least $2$
Authors:
Kalyan Chakraborty,
Richa Sharma
Abstract:
Let $C_{m} : y^{2} = x^{3} - m^{2}x +p^{2}q^{2}$ be a family of elliptic curves over $\mathbb{Q}$, where $m$ is a positive integer and $p, q$ are distinct odd primes. We study the torsion part and the rank of $C_m(\mathbb{Q})$. More specifically, we prove that the torsion subgroup of $C_{m}(\mathbb{Q})$ is trivial and the $\mathbb{Q}$-rank of this family is at least $2$, whenever…
▽ More
Let $C_{m} : y^{2} = x^{3} - m^{2}x +p^{2}q^{2}$ be a family of elliptic curves over $\mathbb{Q}$, where $m$ is a positive integer and $p, q$ are distinct odd primes. We study the torsion part and the rank of $C_m(\mathbb{Q})$. More specifically, we prove that the torsion subgroup of $C_{m}(\mathbb{Q})$ is trivial and the $\mathbb{Q}$-rank of this family is at least $2$, whenever $m \not \equiv 0 \pmod 4$ and $m \equiv 2 \pmod {64}$ with neither $p$ nor $q$ divides $m$.
△ Less
Submitted 2 January, 2022;
originally announced January 2022.
-
Neutrino propagation when mass eigenstates and decay eigenstates mismatch
Authors:
Dibya S. Chattopadhyay,
Kaustav Chakraborty,
Amol Dighe,
Srubabati Goswami,
S. M. Lakshmi
Abstract:
We point out that the Hermitian and anti-Hermitian components of the effective Hamiltonian for decaying neutrinos cannot be simultaneously diagonalized by unitary transformations for all matter densities. We develop a formalism for the two-flavor neutrino propagation through matter of uniform density, for neutrino decay to invisible states. Employing a resummation of the Zassenhaus expansion, we o…
▽ More
We point out that the Hermitian and anti-Hermitian components of the effective Hamiltonian for decaying neutrinos cannot be simultaneously diagonalized by unitary transformations for all matter densities. We develop a formalism for the two-flavor neutrino propagation through matter of uniform density, for neutrino decay to invisible states. Employing a resummation of the Zassenhaus expansion, we obtain compact analytic expressions for neutrino survival and conversion probabilities, to first and second order in the "mismatch parameter" $\barγ$.
△ Less
Submitted 25 November, 2021;
originally announced November 2021.
-
Large $N$ Invariants of Torus Links in Lens Spaces
Authors:
Kushal Chakraborty,
Suvankar Dutta
Abstract:
We compute the invariants for a class of knots and links in arbitrary representations in $S^3/\mathbb{Z}_p$ in the large $k$ (level), large $N$ (rank) limit, kee** $N/(k+N)=λ$ fixed, in $U(N)$ and $Sp(N)$ Chern-Simons theories. Using the relation between the saddle point description and collective field theory, we first find that the invariants for the Hopf link and unknot are given by the on sh…
▽ More
We compute the invariants for a class of knots and links in arbitrary representations in $S^3/\mathbb{Z}_p$ in the large $k$ (level), large $N$ (rank) limit, kee** $N/(k+N)=λ$ fixed, in $U(N)$ and $Sp(N)$ Chern-Simons theories. Using the relation between the saddle point description and collective field theory, we first find that the invariants for the Hopf link and unknot are given by the on shell collective field theory action. We next show that the results of these two invariants can be used to compute the invariants of other torus knots and links. We also discuss the large $N$ phase structure of the Hopf link invariant and observe that the same may admit a Douglas-Kazakov type phase transition depending on the choice of representations and $λ$.
△ Less
Submitted 24 February, 2022; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Constraining general U(1) interactions from neutrino-electron scattering measurements at DUNE near detector
Authors:
Kaustav Chakraborty,
Arindam Das,
Srubabati Goswami,
Samiran Roy
Abstract:
The neutrino-electron scattering process is a powerful tool to explore new physics beyond the standard model. Recently the possibility of DUNE Near Detector (ND) to constrain various new physics scenarios using this process have been highlighted in the literature. In this work, we consider the most general U(1) model and probe the constraints on the mass and coupling strength of the additional…
▽ More
The neutrino-electron scattering process is a powerful tool to explore new physics beyond the standard model. Recently the possibility of DUNE Near Detector (ND) to constrain various new physics scenarios using this process have been highlighted in the literature. In this work, we consider the most general U(1) model and probe the constraints on the mass and coupling strength of the additional $Z'$ from $ν-e$ scattering at DUNE ND. The presence of the $Z^\prime$ gives rise to extra interference effects. In the context of the general U(1) model, the destructive interference can occur in either neutrino or anti-neutrino channel or for both or none. This opens up the possibilities of getting four different type of signal in the neutrino and ant-neutrino runs of DUNE. We perform the analysis using both the total rate and binned events spectrum. Our results show that in a bin by bin analysis the effect of destructive interference is less compared to the analysis using total rate. We present the bounds on the $ m_{Z^\prime} - g_X$ plane from $ν-e$ scattering measurements at DUNE ND and compare these with those obtained from other $ν-e$ scattering, COHERENT, and beam dump experiments. We show that the DUNE ND can give the best bound for certain mass ranges of $Z^\prime$.
△ Less
Submitted 5 April, 2022; v1 submitted 16 November, 2021;
originally announced November 2021.
-
On the Connection Between Quantum Pseudorandomness and Quantum Hardware Assumptions
Authors:
Mina Doosti,
Niraj Kumar,
Elham Kashefi,
Kaushik Chakraborty
Abstract:
This paper, for the first time, addresses the questions related to the connections between the quantum pseudorandomness and quantum hardware assumptions, specifically quantum physical unclonable functions (qPUFs). Our results show that the efficient pseudorandom quantum states (PRS) are sufficient to construct the challenge set for the universally unforgeable qPUF, improving the previous existing…
▽ More
This paper, for the first time, addresses the questions related to the connections between the quantum pseudorandomness and quantum hardware assumptions, specifically quantum physical unclonable functions (qPUFs). Our results show that the efficient pseudorandom quantum states (PRS) are sufficient to construct the challenge set for the universally unforgeable qPUF, improving the previous existing constructions that are based on the Haar-random states. We also show that both the qPUFs and the quantum pseudorandom unitaries (PRUs) can be constructed from each other, providing new ways to obtain PRS from the hardware assumptions. Moreover, we provide a sufficient condition (in terms of the diamond norm) that a set of unitaries should have to be a PRU in order to construct a universally unforgeable qPUF, giving yet another novel insight into the properties of the PRUs. Later, as an application of our results, we show that the efficiency of an existing qPUF-based client-server identification protocol can be improved without losing the security requirements of the protocol.
△ Less
Submitted 30 March, 2022; v1 submitted 22 October, 2021;
originally announced October 2021.
-
Quantum Lock: A Provable Quantum Communication Advantage
Authors:
Kaushik Chakraborty,
Mina Doosti,
Yao Ma,
Chirag Wadhwa,
Myrto Arapinis,
Elham Kashefi
Abstract:
Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We address this problem by integrating classical PUFs and existing quantum communication technology. Specifically, this paper proposes a generic design o…
▽ More
Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We address this problem by integrating classical PUFs and existing quantum communication technology. Specifically, this paper proposes a generic design of provably secure PUFs, called hybrid locked PUFs(HLPUFs), providing a practical solution for securing classical PUFs. An HLPUF uses a classical PUF(CPUF), and encodes the output into non-orthogonal quantum states to hide the outcomes of the underlying CPUF from any adversary. Here we introduce a quantum lock to protect the HLPUFs from any general adversaries. The indistinguishability property of the non-orthogonal quantum states, together with the quantum lockdown technique prevents the adversary from accessing the outcome of the CPUFs. Moreover, we show that by exploiting non-classical properties of quantum states, the HLPUF allows the server to reuse the challenge-response pairs for further client authentication. This result provides an efficient solution for running PUF-based client authentication for an extended period while maintaining a small-sized challenge-response pairs database on the server side. Later, we support our theoretical contributions by instantiating the HLPUFs design using accessible real-world CPUFs. We use the optimal classical machine-learning attacks to forge both the CPUFs and HLPUFs, and we certify the security gap in our numerical simulation for construction which is ready for implementation.
△ Less
Submitted 12 May, 2023; v1 submitted 18 October, 2021;
originally announced October 2021.
-
QEnclave -- A practical solution for secure quantum cloud computing
Authors:
Yao Ma,
Elham Kashefi,
Myrto Arapinis,
Kaushik Chakraborty,
Marc Kaplan
Abstract:
We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing the classical concept of a secure enclave which isolates a computation from its environment to provide privacy and tamper-resistance. Remarkably, our QEnclave only performs single-qubit rotations, but can nev…
▽ More
We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing the classical concept of a secure enclave which isolates a computation from its environment to provide privacy and tamper-resistance. Remarkably, our QEnclave only performs single-qubit rotations, but can nevertheless be used to secure an arbitrary quantum computation even if the qubit source is controlled by an adversary. More precisely, attaching a QEnclave to a quantum computer, a remote client controlling the QEnclave can securely delegate its computation to the server solely using classical communication. We investigate the security of our QEnclave by modeling it as an ideal functionality named Remote State Rotation. We show that this resource, similar to previously introduced functionality of remote state preparation, allows blind delegated quantum computing with perfect security. Our proof relies on standard tools from delegated quantum computing. Working in the Abstract Cryptography framework, we show a construction of remote state preparation from remote state rotation preserving the security. An immediate consequence is the weakening of the requirements for blind delegated computation. While previous delegated protocols were relying on a client that can either generate or measure quantum states, we show that this same functionality can be achieved with a client that only transforms quantum states without generating or measuring them.
△ Less
Submitted 21 September, 2021; v1 submitted 7 September, 2021;
originally announced September 2021.
-
Probabilistic Verification for Reliability of a Two-by-Two Network-on-Chip System
Authors:
Riley Roberts,
Benjamin Lewis,
Arnd Hartmanns,
Prabal Basu,
Sanghamitra Roy,
Koushik Chakraborty,
Zhen Zhang
Abstract:
Modern network-on-chip (NoC) systems face reliability issues due to process and environmental variations. The power supply noise (PSN) in the power delivery network of a NoC plays a key role in determining reliability. PSN leads to voltage droop, which can cause timing errors in the NoC. This paper makes a novel contribution towards formally analyzing PSN in NoC systems. We present a probabilistic…
▽ More
Modern network-on-chip (NoC) systems face reliability issues due to process and environmental variations. The power supply noise (PSN) in the power delivery network of a NoC plays a key role in determining reliability. PSN leads to voltage droop, which can cause timing errors in the NoC. This paper makes a novel contribution towards formally analyzing PSN in NoC systems. We present a probabilistic model checking approach to observe the PSN in a generic 2x2 mesh NoC with a uniform random traffic load. Key features of PSN are measured at the behavioral level. To tackle state explosion, we apply incremental abstraction techniques, including a novel probabilistic choice abstraction, based on observations of NoC behavior. The Modest Toolset is used for probabilistic modeling and verification. Results are obtained for several flit injection patterns to reveal their impacts on PSN. Our analysis finds an optimal flit pattern generation with zero probability of PSN events and suggests spreading flits rather than releasing them in consecutive cycles in order to minimize PSN.
△ Less
Submitted 28 May, 2021;
originally announced August 2021.
-
On some symmetries of the base $ n $ expansion of $ 1/m $ : The Class Number connection
Authors:
Kalyan Chakraborty,
Krishnarjun Krishnamoorthy
Abstract:
Suppose that $ m\equiv 1\mod 4 $ is a prime and that $ n\equiv 3\mod 4 $ is a primitive root modulo $ m $. In this paper we obtain a relation between the class number of the imaginary quadratic field $ \Q(\sqrt{-nm}) $ and the digits of the base $ n $ expansion of $ 1/m $.
Secondly, if $ m\equiv 3\mod 4 $, we study some convoluted sums involving the base $ n $ digits of $ 1/m $ and arrive at cer…
▽ More
Suppose that $ m\equiv 1\mod 4 $ is a prime and that $ n\equiv 3\mod 4 $ is a primitive root modulo $ m $. In this paper we obtain a relation between the class number of the imaginary quadratic field $ \Q(\sqrt{-nm}) $ and the digits of the base $ n $ expansion of $ 1/m $.
Secondly, if $ m\equiv 3\mod 4 $, we study some convoluted sums involving the base $ n $ digits of $ 1/m $ and arrive at certain congruence relations involving the class number of $ \Q(\sqrt{-m}) $ modulo certain primes $ p $ which properly divide $ n+1 $.
△ Less
Submitted 15 February, 2024; v1 submitted 26 July, 2021;
originally announced July 2021.
-
On some symmetries of the base $ n $ expansion of $ 1/m $ : Comments on Artin's Primitive root conjecture
Authors:
Kalyan Chakraborty,
Krishnarjun Krishnamoorthy
Abstract:
Suppose $ m,n\geq 2 $ are co prime integers. We prove certain new symmetries of the base $ n $ representation of $ 1/m $, and in particular characterize the subgroup generated by $ n $ inside $ (\mathbb{Z}/m\mathbb{Z})^\times $. As an application we give a sufficient condition for a prime $ p $ such that a non square number $ n $ is a primitive root modulo $ p $.
Suppose $ m,n\geq 2 $ are co prime integers. We prove certain new symmetries of the base $ n $ representation of $ 1/m $, and in particular characterize the subgroup generated by $ n $ inside $ (\mathbb{Z}/m\mathbb{Z})^\times $. As an application we give a sufficient condition for a prime $ p $ such that a non square number $ n $ is a primitive root modulo $ p $.
△ Less
Submitted 26 July, 2021;
originally announced July 2021.
-
Lindenbaum-type Logical Structures
Authors:
Sayantan Roy,
Sankha S. Basu,
Mihir K. Chakraborty
Abstract:
In this paper, we study some classes of logical structures from the universal logic standpoint, viz., those of the Tarski- and the Lindenbaum-types. The characterization theorems for the Tarski- and two of the four different Lindenbaum-type logical structures have been proved as well. The separations between the five classes of logical structures, viz., the four Lindenbaum-types and the Tarski-typ…
▽ More
In this paper, we study some classes of logical structures from the universal logic standpoint, viz., those of the Tarski- and the Lindenbaum-types. The characterization theorems for the Tarski- and two of the four different Lindenbaum-type logical structures have been proved as well. The separations between the five classes of logical structures, viz., the four Lindenbaum-types and the Tarski-type have been established via examples. Finally, we study the logical structures that are of both Tarski- and a Lindenbaum-type, show their separations, and end with characterization, adequacy, minimality, and representation theorems for one of the Tarski-Lindenbaum-type logical structures.
△ Less
Submitted 4 September, 2022; v1 submitted 22 July, 2021;
originally announced July 2021.
-
Sentiment Analysis of Covid-19 Tweets using Evolutionary Classification-Based LSTM Model
Authors:
Arunava Kumar Chakraborty,
Sourav Das,
Anup Kumar Kolya
Abstract:
As the Covid-19 outbreaks rapidly all over the world day by day and also affects the lives of million, a number of countries declared complete lock-down to check its intensity. During this lockdown period, social media plat-forms have played an important role to spread information about this pandemic across the world, as people used to express their feelings through the social networks. Considerin…
▽ More
As the Covid-19 outbreaks rapidly all over the world day by day and also affects the lives of million, a number of countries declared complete lock-down to check its intensity. During this lockdown period, social media plat-forms have played an important role to spread information about this pandemic across the world, as people used to express their feelings through the social networks. Considering this catastrophic situation, we developed an experimental approach to analyze the reactions of people on Twitter taking into ac-count the popular words either directly or indirectly based on this pandemic. This paper represents the sentiment analysis on collected large number of tweets on Coronavirus or Covid-19. At first, we analyze the trend of public sentiment on the topics related to Covid-19 epidemic using an evolutionary classification followed by the n-gram analysis. Then we calculated the sentiment ratings on collected tweet based on their class. Finally, we trained the long-short term network using two types of rated tweets to predict sentiment on Covid-19 data and obtained an overall accuracy of 84.46%.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
Entanglement Distribution in Multi-Platform Buffered-Router-Assisted Frequency-Multiplexed Automated Repeater Chains
Authors:
Mohsen Falamarzi Askarani,
Kaushik Chakraborty,
Gustavo Castro do Amaral
Abstract:
Realization of a globe-spanning quantum network is a current worldwide goal, where near and long term implementations will benefit from connectivity between platforms optimized for specific tasks. Towards this goal, a quantum network architecture is herewith proposed whereby quantum processing devices based on NV$^-$ colour centers act as quantum routers and, between which, long-distance entanglem…
▽ More
Realization of a globe-spanning quantum network is a current worldwide goal, where near and long term implementations will benefit from connectivity between platforms optimized for specific tasks. Towards this goal, a quantum network architecture is herewith proposed whereby quantum processing devices based on NV$^-$ colour centers act as quantum routers and, between which, long-distance entanglement distribution is enabled by spectrally-multiplexed quantum repeaters based on absorptive quantum memories in rare-earth ion-doped crystals and imperfect entangled photon-pair sources. The inclusion of a quantum buffer structure between repeaters and routers is shown to, albeit the increased complexity, improve the achievable entanglement distribution rates in the network. Although the expected rate and fidelity results are presented for a simple linear network (point-to-point), complex topologies are compatible with the proposed architecture through the inclusion of an extra layer of temporal multiplexing in the quantum router's operation. Figures of merit are extracted based on parameters found in the literature for near-term scenarios and attest the availability of the proposed buffered-router-assisted frequency-multiplexed automated repeater chain network.
△ Less
Submitted 9 June, 2021; v1 submitted 8 June, 2021;
originally announced June 2021.
-
On the Diophantine equation $dx^2+p^{2a}q^{2b}=4y^p$
Authors:
Kalyan Chakraborty,
Azizul Hoque
Abstract:
We investigate the solvability of the Diophantine equation in the title, where $d>1$ is a square-free integer, $p, q$ are distinct odd primes and $x,y,a,b$ are unknown positive integers with $\gcd(x,y)=1$. We describe all the integer solutions of this equation, and then use the main finding to deduce some results concerning the integers solutions of some of its variants. The methods adopted here a…
▽ More
We investigate the solvability of the Diophantine equation in the title, where $d>1$ is a square-free integer, $p, q$ are distinct odd primes and $x,y,a,b$ are unknown positive integers with $\gcd(x,y)=1$. We describe all the integer solutions of this equation, and then use the main finding to deduce some results concerning the integers solutions of some of its variants. The methods adopted here are elementary in nature and are primarily based on the existence of the primitive divisors of certain Lehmer numbers.
△ Less
Submitted 10 November, 2021; v1 submitted 3 June, 2021;
originally announced June 2021.
-
Quark matter supported wormhole in third order Lovelock gravity
Authors:
Koushik Chakraborty,
Abdul Aziz,
Farook Rahaman,
Saibal Ray
Abstract:
It is generally believed that wormholes are supported by exotic matter violating Null Energy Condition (NEC). However, various studies of wormhole geometries under Lovelock theories of gravity have reported existence of wormhole supported by matter satisfying NEC. Being inspired by these results, we explore the possibility of the existence of wormhole supported by normal quark matter in third orde…
▽ More
It is generally believed that wormholes are supported by exotic matter violating Null Energy Condition (NEC). However, various studies of wormhole geometries under Lovelock theories of gravity have reported existence of wormhole supported by matter satisfying NEC. Being inspired by these results, we explore the possibility of the existence of wormhole supported by normal quark matter in third order Lovelock gravity theory. Well known MIT Bag Model Equation of state is chosen for describing the quark matter. Taking physically acceptable approximations, we solve the field equations for shape function which satisfies flare out condition. The residual of the approximate solution is studied for accuracy and found to be acceptable.
△ Less
Submitted 13 June, 2021; v1 submitted 24 April, 2021;
originally announced April 2021.