-
A note on MDS Property of Circulant Matrices
Authors:
Tapas Chatterjee,
Ayantika Laha
Abstract:
In $2014$, Gupta and Ray proved that the circulant involutory matrices over the finite field $\mathbb{F}_{2^m}$ can not be maximum distance separable (MDS). This non-existence also extends to circulant orthogonal matrices of order $2^d \times 2^d$ over finite fields of characteristic $2$. These findings inspired many authors to generalize the circulant property for constructing lightweight MDS mat…
▽ More
In $2014$, Gupta and Ray proved that the circulant involutory matrices over the finite field $\mathbb{F}_{2^m}$ can not be maximum distance separable (MDS). This non-existence also extends to circulant orthogonal matrices of order $2^d \times 2^d$ over finite fields of characteristic $2$. These findings inspired many authors to generalize the circulant property for constructing lightweight MDS matrices with practical applications in mind. Recently, in $2022,$ Chatterjee and Laha initiated a study of circulant matrices by considering semi-involutory and semi-orthogonal properties. Expanding on their work, this article delves into circulant matrices possessing these characteristics over the finite field $\mathbb{F}_{2^m}.$ Notably, we establish a correlation between the trace of associated diagonal matrices and the MDS property of the matrix. We prove that this correlation holds true for even order semi-orthogonal matrices and semi-involutory matrices of all orders. Additionally, we provide examples that for circulant, semi-orthogonal matrices of odd orders over a finite field with characteristic $2$, the trace of associated diagonal matrices may possess non-zero values.
△ Less
Submitted 22 June, 2024;
originally announced June 2024.
-
On MDS Property of g-Circulant Matrices
Authors:
Tapas Chatterjee,
Ayantika Laha
Abstract:
Circulant Maximum Distance Separable (MDS) matrices have gained significant importance due to their applications in the diffusion layer of the AES block cipher. In $2013$, Gupta and Ray established that circulant involutory matrices of order greater than $3$ cannot be MDS. This finding prompted a generalization of circulant matrices and the involutory property of matrices by various authors. In…
▽ More
Circulant Maximum Distance Separable (MDS) matrices have gained significant importance due to their applications in the diffusion layer of the AES block cipher. In $2013$, Gupta and Ray established that circulant involutory matrices of order greater than $3$ cannot be MDS. This finding prompted a generalization of circulant matrices and the involutory property of matrices by various authors. In $2016$, Liu and Sim introduced cyclic matrices by changing the permutation of circulant matrices. In $1961,$ Friedman introduced $g$-circulant matrices which form a subclass of cyclic matrices. In this article, we first discuss $g$-circulant matrices with involutory and MDS properties. We prove that $g$-circulant involutory matrices of order $k \times k$ cannot be MDS unless $g \equiv -1 \pmod k.$ Next, we delve into $g$-circulant semi-involutory and semi-orthogonal matrices with entries from finite fields. We establish that the $k$-th power of the associated diagonal matrices of a $g$-circulant semi-orthogonal (semi-involutory) matrix of order $k \times k$ results in a scalar matrix. These findings can be viewed as an extension of the results concerning circulant matrices established by Chatterjee {\it{et al.}} in $2022.$
△ Less
Submitted 22 June, 2024;
originally announced June 2024.
-
A note on cyclic non-MDS matrices
Authors:
Tapas Chatterjee,
Ayantika Laha
Abstract:
In $1998,$ Daemen {\it{ et al.}} introduced a circulant Maximum Distance Separable (MDS) matrix in the diffusion layer of the Rijndael block cipher, drawing significant attention to circulant MDS matrices. This block cipher is now universally acclaimed as the AES block cipher. In $2016,$ Liu and Sim introduced cyclic matrices by modifying the permutation of circulant matrices and established the e…
▽ More
In $1998,$ Daemen {\it{ et al.}} introduced a circulant Maximum Distance Separable (MDS) matrix in the diffusion layer of the Rijndael block cipher, drawing significant attention to circulant MDS matrices. This block cipher is now universally acclaimed as the AES block cipher. In $2016,$ Liu and Sim introduced cyclic matrices by modifying the permutation of circulant matrices and established the existence of MDS property for orthogonal left-circulant matrices, a notable subclass within cyclic matrices. While circulant matrices have been well-studied in the literature, the properties of cyclic matrices are not. Back in $1961$, Friedman introduced $g$-circulant matrices which form a subclass of cyclic matrices. In this article, we first establish a permutation equivalence between a cyclic matrix and a circulant matrix. We explore properties of cyclic matrices similar to $g$-circulant matrices. Additionally, we determine the determinant of $g$-circulant matrices of order $2^d \times 2^d$ and prove that they cannot be simultaneously orthogonal and MDS over a finite field of characteristic $2$. Furthermore, we prove that this result holds for any cyclic matrix.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
A Characterization of Semi-Involutory MDS Matrices
Authors:
Tapas Chatterjee,
Ayantika Laha
Abstract:
In symmetric cryptography, maximum distance separable (MDS) matrices with computationally simple inverses have wide applications. Many block ciphers like AES, SQUARE, SHARK, and hash functions like PHOTON use an MDS matrix in the diffusion layer. In this article, we first characterize all $3 \times 3$ irreducible semi-involutory matrices over the finite field of characteristic $2$. Using this matr…
▽ More
In symmetric cryptography, maximum distance separable (MDS) matrices with computationally simple inverses have wide applications. Many block ciphers like AES, SQUARE, SHARK, and hash functions like PHOTON use an MDS matrix in the diffusion layer. In this article, we first characterize all $3 \times 3$ irreducible semi-involutory matrices over the finite field of characteristic $2$. Using this matrix characterization, we provide a necessary and sufficient condition to construct MDS semi-involutory matrices using only their diagonal entries and the entries of an associated diagonal matrix. Finally, we count the number of $3 \times 3$ semi-involutory MDS matrices over any finite field of characteristic $2$.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Linear independence of $q$-analogue of the generalized Stieltjes constants over number fields
Authors:
Tapas Chatterjee,
Sonam Garg
Abstract:
In this article, we aim to extend the research conducted by Chatterjee and Garg in 2024, particularly focusing on the $q$-analogue of the generalized Stieltjes constants. These constants constitute the coefficients in the Laurent series expansion of a $q$-analogue of the Hurwitz zeta function around $s=1$. Chatterjee and Garg previously established arithmetic results related to $γ_0(q,x)$, for…
▽ More
In this article, we aim to extend the research conducted by Chatterjee and Garg in 2024, particularly focusing on the $q$-analogue of the generalized Stieltjes constants. These constants constitute the coefficients in the Laurent series expansion of a $q$-analogue of the Hurwitz zeta function around $s=1$. Chatterjee and Garg previously established arithmetic results related to $γ_0(q,x)$, for $q>1$ and $0 < x <1$ over the field of rational numbers. Here, we broaden their findings to encompass number fields $\mathbb{F}$ in two scenarios: firstly, when $\mathbb{F}$ is linearly disjoint from the cyclotomic field $\mathbb{Q}(ζ_b)$, and secondly, when $\mathbb{F}$ has non-trivial intersection with $\mathbb{Q}(ζ_b)$, with $b \geq 3$ being any positive integer.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
On arithmetic nature of $q$-analogue of the generalized Stieltjes constants
Authors:
Tapas Chatterjee,
Sonam Garg
Abstract:
In this article, our aim is to extend the research conducted by Kurokawa and Wakayama in 2003, particularly focusing on the $q$-analogue of the Hurwitz zeta function. Our specific emphasis lies in exploring the coefficients in the Laurent series expansion of a $q$-analogue of the Hurwitz zeta function around $s=1$. We establish the closed-form expressions for the first two coefficients in the Laur…
▽ More
In this article, our aim is to extend the research conducted by Kurokawa and Wakayama in 2003, particularly focusing on the $q$-analogue of the Hurwitz zeta function. Our specific emphasis lies in exploring the coefficients in the Laurent series expansion of a $q$-analogue of the Hurwitz zeta function around $s=1$. We establish the closed-form expressions for the first two coefficients in the Laurent series of the $q$-Hurwitz zeta function. Additionally, utilizing the reflection formula for the digamma function and the identity of Bernoulli polynomials, we explore transcendence results related to $γ_0(q,x)$ for $q>1$ and $0 < x <1$, where $γ_0(q,x)$ is the constant term which appears in the Laurent series expansion of $q$-Hurwitz zeta function around $s=1$.
Furthermore, we put forth a conjecture about the linear independence of special values of $γ_0(q,x)$ along with $1$ at rational arguments with co-prime conditions, over the field of rational numbers. Finally, we show that at least one more than half of the numbers are linearly independent over the field of rationals.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Transcendental nature of $p$-adic digamma values
Authors:
Tapas Chatterjee,
Sonam Garg
Abstract:
For a fixed prime $p$, Murty and Saradha (2008) studied the transcendental nature of special values of the $p$-adic digamma function, denoted as $ψ_p(r/p)+ γ_p$. This research was later extended by Chatterjee and Gun in 2014, who investigated the case of $ψ_p(r/p^n)+ γ_p$, for any integer $n>1$. In this article, we generalize their results for distinct prime powers and explore the transcendental n…
▽ More
For a fixed prime $p$, Murty and Saradha (2008) studied the transcendental nature of special values of the $p$-adic digamma function, denoted as $ψ_p(r/p)+ γ_p$. This research was later extended by Chatterjee and Gun in 2014, who investigated the case of $ψ_p(r/p^n)+ γ_p$, for any integer $n>1$. In this article, we generalize their results for distinct prime powers and explore the transcendental nature of the $p$-adic digamma values, with at most one exception. Further, we investigate the multiplicative independence of cyclotomic numbers satisfying certain conditions. Using this, we prove the transcendental nature of $p$-adic digamma values corresponding to $ψ_p(r/pq)+ γ_p$, where $p, q$ are distinct primes.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Algebraic identities among $q$- analogue of Euler double zeta values
Authors:
Tapas Chatterjee,
Sonam Garg
Abstract:
In 2003, Zudilin presented a $q$-analogue of Euler's identity for one of the variants of $q$-double zeta function. This article focuses on exploring identities related to another variant of $q$-double zeta function and its star variant. Using a $q$-analogue of the Nielsen Reflexion Formula for $q>1$, we investigate identities involving different versions of $q$-analogues of the Riemann zeta functi…
▽ More
In 2003, Zudilin presented a $q$-analogue of Euler's identity for one of the variants of $q$-double zeta function. This article focuses on exploring identities related to another variant of $q$-double zeta function and its star variant. Using a $q$-analogue of the Nielsen Reflexion Formula for $q>1$, we investigate identities involving different versions of $q$-analogues of the Riemann zeta function and the double-zeta function. Additionally, we analyze the behavior of $ζ_q(s_1, s_2)$ as $s_1$ and $s_2$ approach to $0$ and compare these limits to those of the classical double-zeta function. Finally, we discuss the $q$-analogue of the Mordell-Tornheim $r$-ple zeta function and its relation with the $q$-double zeta function.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Action of the relative Weyl group on partial Springer sheaf
Authors:
Tamanna Chatterjee,
Laura Rider
Abstract:
In the context of the Springer correspondence, the Weyl group action on the Springer sheaf can be defined in two ways: via restriction or the Fourier transform. It is well-known that these two actions differ by the sign character. This was proven by Hotta for sheaves with characteristic 0 coefficients in 1981, and more recently extended to arbitrary coefficients by Achar, Henderson, Juteau, and Ri…
▽ More
In the context of the Springer correspondence, the Weyl group action on the Springer sheaf can be defined in two ways: via restriction or the Fourier transform. It is well-known that these two actions differ by the sign character. This was proven by Hotta for sheaves with characteristic 0 coefficients in 1981, and more recently extended to arbitrary coefficients by Achar, Henderson, Juteau, and Riche in 2014. In this short article, we study an extension of this problem to the partial Springer sheaf with arbitrary field coefficients. This involves an action of the so-called relative Weyl group $W(L)$.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Charge-transfer-driven enhanced room-temperature ferromagnetism in BiFeO$_3$/Ag nanocomposite
Authors:
Tania Chatterjee,
Shubhankar Mishra,
Arnab Mukherjee,
Prabir Pal,
Biswarup Satpati,
Dipten Bhattacharya
Abstract:
We report observation of more than an order of magnitude jump in saturation magnetization in BiFeO$_3$/Ag nanocomposite at room temperature compared to what is observed in bare BiFeO$_3$ nanoparticles. Using transmission electron microscopy together with energy dispersive x-ray spectra (which maps the element concentration across the BiFeO$_3$/Ag interface) and x-ray photoelectron spectroscopy, we…
▽ More
We report observation of more than an order of magnitude jump in saturation magnetization in BiFeO$_3$/Ag nanocomposite at room temperature compared to what is observed in bare BiFeO$_3$ nanoparticles. Using transmission electron microscopy together with energy dispersive x-ray spectra (which maps the element concentration across the BiFeO$_3$/Ag interface) and x-ray photoelectron spectroscopy, we show that both the observed specific self-assembly pattern of BiFeO$_3$ and Ag nanoparticles and the charge transfer between Ag and O are responsible for such an enormous rise in room-temperature magnetization. The BiFeO$_3$/Ag nanocomposites, therefore, could prove to be extremely useful for a variety of applications including biomedical.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Beyond Counting Datasets: A Survey of Multilingual Dataset Construction and Necessary Resources
Authors:
Xinyan Velocity Yu,
Akari Asai,
Trina Chatterjee,
Junjie Hu,
Eunsol Choi
Abstract:
While the NLP community is generally aware of resource disparities among languages, we lack research that quantifies the extent and types of such disparity. Prior surveys estimating the availability of resources based on the number of datasets can be misleading as dataset quality varies: many datasets are automatically induced or translated from English data. To provide a more comprehensive pictur…
▽ More
While the NLP community is generally aware of resource disparities among languages, we lack research that quantifies the extent and types of such disparity. Prior surveys estimating the availability of resources based on the number of datasets can be misleading as dataset quality varies: many datasets are automatically induced or translated from English data. To provide a more comprehensive picture of language resources, we examine the characteristics of 156 publicly available NLP datasets. We manually annotate how they are created, including input text and label sources and tools used to build them, and what they study, tasks they address and motivations for their creation. After quantifying the qualitative NLP resource gap across languages, we discuss how to improve data collection in low-resource languages. We survey language-proficient NLP researchers and crowd workers per language, finding that their estimated availability correlates with dataset availability. Through crowdsourcing experiments, we identify strategies for collecting high-quality multilingual data on the Mechanical Turk platform. We conclude by making macro and micro-level suggestions to the NLP community and individual researchers for future multilingual data development.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
Graded Lie algebras, Fourier transform and primitive pairs
Authors:
Tamanna Chatterjee
Abstract:
In this paper we study the Fourier transform on graded Lie algebras. Let $G$ be a complex, connected, reductive, algebraic group, and $χ:\mathbb{C}^\times \to G$ be a fixed cocharacter that defines a grading on $\mathfrak{g}$, the Lie algebra of $G$. Let $G_0$ be the centralizer of $χ(\mathbb{C}^\times)$. Here under some assumptions on the field $\Bbbk$ and also assuming two conjectures for the gr…
▽ More
In this paper we study the Fourier transform on graded Lie algebras. Let $G$ be a complex, connected, reductive, algebraic group, and $χ:\mathbb{C}^\times \to G$ be a fixed cocharacter that defines a grading on $\mathfrak{g}$, the Lie algebra of $G$. Let $G_0$ be the centralizer of $χ(\mathbb{C}^\times)$. Here under some assumptions on the field $\Bbbk$ and also assuming two conjectures for the group $G$, we prove that the Fourier transform sends parity complexes to parity complexes. Primitive pairs have played an important role in Lusztig's paper \cite{Lu} to prove a block decomposition in the graded setting. A long term goal of this project is to prove a similar block decomposition in positive characteristic. In this paper we have tried to understand the primitive pair and its relation with the Fourier transform.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
QuDiet: A Classical Simulation Platform for Qubit-Qudit Hybrid Quantum Systems
Authors:
Turbasu Chatterjee,
Arnav Das,
Subhayu Kumar Bala,
Amit Saha,
Anupam Chattopadhyay,
Amlan Chakrabarti
Abstract:
In the recent years, numerous research advancements have extended the limit of classical simulation of quantum algorithms. Although, most of the state-of-the-art classical simulators are only limited to binary quantum systems, which restrict the classical simulation of higher-dimensional quantum computing systems. Through recent developments in higher-dimensional quantum computing systems, it is r…
▽ More
In the recent years, numerous research advancements have extended the limit of classical simulation of quantum algorithms. Although, most of the state-of-the-art classical simulators are only limited to binary quantum systems, which restrict the classical simulation of higher-dimensional quantum computing systems. Through recent developments in higher-dimensional quantum computing systems, it is realized that implementing qudits improves the overall performance of a quantum algorithm by increasing memory space and reducing the asymptotic complexity of a quantum circuit. Hence, in this article, we introduce \textbf{QuDiet}, a state-of-the-art user-friendly python-based higher-dimensional quantum computing simulator. \textbf{QuDiet} offers multi-valued logic operations by utilizing generalized quantum gates with an abstraction so that any naive user can simulate qudit systems with ease as compared to the existing ones. We simulate various benchmark quantum circuits in \textbf{QuDiet} and show the considerable speedup in simulation time as compared to the other simulators without loss in precision. Finally, \textbf{QuDiet} provides a full qubit-qudit hybrid quantum simulator package with quantum circuit templates of well-known quantum algorithms for fast prototy** and simulation. The complete code and packages of \textbf{QuDiet} is available at https://github.com/LegacYFTw/QuDiet so that other platforms can incorporate it as a classical simulation option for qubit-qudit hybrid systems to their platforms.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
longhorns at DADC 2022: How many linguists does it take to fool a Question Answering model? A systematic approach to adversarial attacks
Authors:
Venelin Kovatchev,
Trina Chatterjee,
Venkata S Govindarajan,
Jifan Chen,
Eunsol Choi,
Gabriella Chronis,
Anubrata Das,
Katrin Erk,
Matthew Lease,
Junyi Jessy Li,
Yating Wu,
Kyle Mahowald
Abstract:
Develo** methods to adversarially challenge NLP systems is a promising avenue for improving both model performance and interpretability. Here, we describe the approach of the team "longhorns" on Task 1 of the The First Workshop on Dynamic Adversarial Data Collection (DADC), which asked teams to manually fool a model on an Extractive Question Answering task. Our team finished first, with a model…
▽ More
Develo** methods to adversarially challenge NLP systems is a promising avenue for improving both model performance and interpretability. Here, we describe the approach of the team "longhorns" on Task 1 of the The First Workshop on Dynamic Adversarial Data Collection (DADC), which asked teams to manually fool a model on an Extractive Question Answering task. Our team finished first, with a model error rate of 62%. We advocate for a systematic, linguistically informed approach to formulating adversarial questions, and we describe the results of our pilot experiments, as well as our official submission.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Intermediate Qutrit-based Improved Quantum Arithmetic Operations with Application on Financial Derivative Pricing
Authors:
Amit Saha,
Turbasu Chatterjee,
Anupam Chattopadhyay,
Amlan Chakrabarti
Abstract:
In some quantum algorithms, arithmetic operations are of utmost importance for resource estimation. In binary quantum systems, some efficient implementation of arithmetic operations like, addition/subtraction, multiplication/division, square root, exponential and arcsine etc. have been realized, where resources are reported as a number of Toffoli gates or T gates with ancilla. Recently it has been…
▽ More
In some quantum algorithms, arithmetic operations are of utmost importance for resource estimation. In binary quantum systems, some efficient implementation of arithmetic operations like, addition/subtraction, multiplication/division, square root, exponential and arcsine etc. have been realized, where resources are reported as a number of Toffoli gates or T gates with ancilla. Recently it has been demonstrated that intermediate qutrits can be used in place of ancilla, allowing us to operate efficiently in the ancilla-free frontier zone. In this article, we have incorporated intermediate qutrit approach to realize efficient implementation of all the quantum arithmetic operations mentioned above with respect to gate count and circuit-depth without T gate and ancilla. Our resource estimates with intermediate qutrits could guide future research aimed at lowering costs considering arithmetic operations for computational problems. As an application of computational problems, related to finance, are poised to reap the benefit of quantum computers, in which quantum arithmetic circuits are going to play an important role. In particular, quantum arithmetic circuits of arcsine and square root are necessary for path loading using the re-parameterization method, as well as the payoff calculation for derivative pricing. Hence, the improvements are studied in the context of the core arithmetic circuits as well as the complete application of derivative pricing. Since our intermediate qutrit approach requires to access higher energy levels, making the design prone to errors, nevertheless, we show that the percentage decrease in the probability of error is significant owing to the fact that we achieve circuit robustness compared to qubit-only works.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
Signal Quality Assessment of Photoplethysmogram Signals using Quantum Pattern Recognition and lightweight CNN Architecture
Authors:
Tamaghno Chatterjee,
Aayushman Ghosh,
Sayan Sarkar
Abstract:
Photoplethysmography (PPG) signal comprises physiological information related to cardiorespiratory health. However, while recording, these PPG signals are easily corrupted by motion artifacts and body movements, leading to noise enriched, poor quality signals. Therefore ensuring high-quality signals is necessary to extract cardiorespiratory information accurately. Although there exists several rul…
▽ More
Photoplethysmography (PPG) signal comprises physiological information related to cardiorespiratory health. However, while recording, these PPG signals are easily corrupted by motion artifacts and body movements, leading to noise enriched, poor quality signals. Therefore ensuring high-quality signals is necessary to extract cardiorespiratory information accurately. Although there exists several rule-based and Machine-Learning (ML) - based approaches for PPG signal quality estimation, those algorithms' efficacy is questionable. Thus, this work proposes a lightweight CNN architecture for signal quality assessment employing a novel Quantum pattern recognition (QPR) technique. The proposed algorithm is validated on manually annotated data obtained from the University of Queensland database. A total of 28366, 5s signal segments are preprocessed and transformed into image files of 20 x 500 pixels. The image files are treated as an input to the 2D CNN architecture. The developed model classifies the PPG signal as `good' or `bad' with an accuracy of 98.3% with 99.3% sensitivity, 94.5% specificity and 98.9% F1-score. Finally, the performance of the proposed framework is validated against the noisy `Welltory app' collected PPG database. Even in a noisy environment, the proposed architecture proved its competence. Experimental analysis concludes that a slim architecture along with a novel Spatio-temporal pattern recognition technique improve the system's performance. Hence, the proposed approach can be useful to classify good and bad PPG signals for a resource-constrained wearable implementation.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Towards 6G Communications: Architecture, Challenges, and Future Directions
Authors:
Purbita Mitra,
Rouprita Bhattacharjee,
Twinkle Chatterjee,
Soumalya De,
Raja Karmakar,
Arindam Ghosh,
Tinku Adhikari
Abstract:
The cellular network standard is gradually step** towards the 6th Generation (6G). In 6G, the pioneering and exclusive features, such as creating connectivity even in space and under water, are attracting Governments, organizations and researchers to spend time, money, effort extensively in this area. In the direction of intelligent network management and distributed secured systems, Artificial…
▽ More
The cellular network standard is gradually step** towards the 6th Generation (6G). In 6G, the pioneering and exclusive features, such as creating connectivity even in space and under water, are attracting Governments, organizations and researchers to spend time, money, effort extensively in this area. In the direction of intelligent network management and distributed secured systems, Artificial Intelligence (AI) and blockchain are going to form the backbone of 6G, respectively. However, there is a need for the study of the 6g architecture and technology, such that researchers can identify the scopes of improvement in 6G. Therefore, in this survey, we discuss the primary requirements of 6G along with its overall architecture and technological aspects. We also highlight crucial challenges and future research directions in 6G networks, which can lead to the successful practical implementation of 6G, as per the objective of its introduction in next generation cellular networks.
△ Less
Submitted 16 January, 2022;
originally announced January 2022.
-
On The Variational Perspectives To The Graph Isomorphism Problem
Authors:
Turbasu Chatterjee,
Shah Ishmam Mohtashim,
Akash Kundu
Abstract:
This paper studies the Graph Isomorphism Problem from a variational algorithmic perspective, specifically studying the Quadratic Unconstrained Binary Optimization (QUBO) formulation of the Graph Isomorphism Problem and subsequent execution using the Quantum Approximate Optimization Algorithm (QAOA) and the Variational Quantum Eigensolver (VQE). This study presents the results of these algorithms a…
▽ More
This paper studies the Graph Isomorphism Problem from a variational algorithmic perspective, specifically studying the Quadratic Unconstrained Binary Optimization (QUBO) formulation of the Graph Isomorphism Problem and subsequent execution using the Quantum Approximate Optimization Algorithm (QAOA) and the Variational Quantum Eigensolver (VQE). This study presents the results of these algorithms and the variations that occur therein for graphs of four and five nodes. The main findings of this paper include the clustering in the energy landscape for the QAOA in isomorphic graphs having an equal number of nodes and edges. This trend found in the QAOA study was further reinforced by studying the ground state energy reduction using VQEs. Furthermore, this paper examines the trend under which isomorphic pairs of graphs vary in the ground state energies, with varying edges and nodes.
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
Nonmonotonic magnetic field dependence of remanent ferroelectric polarization in reduced-graphene-oxide-BiFeO$_3$ nanocomposite
Authors:
Tania Chatterjee,
Arnab Mukherjee,
Prabir Pal,
S. D. Kaushik,
V. Siruguri,
Swarupananda Bhattacharjee,
Chandan Kumar Ghosh,
Dipten Bhattacharya
Abstract:
In a nanocomposite of reduced graphene oxide (RGO) and BiFeO$_3$ (BFO), the remanent ferroelectric polarization is found to follow nonmonotonic magnetic field dependence at room temperature as the applied magnetic field is swept across 0-20 kOe on a pristine sample. The remanent ferroelectric polarization is determined both from direct electrical measurements on an assembly of nanoparticles and po…
▽ More
In a nanocomposite of reduced graphene oxide (RGO) and BiFeO$_3$ (BFO), the remanent ferroelectric polarization is found to follow nonmonotonic magnetic field dependence at room temperature as the applied magnetic field is swept across 0-20 kOe on a pristine sample. The remanent ferroelectric polarization is determined both from direct electrical measurements on an assembly of nanoparticles and powder neutron diffraction patterns recorded under 0-20 kOe field. The nanosized ($\sim$20 nm) particles of BFO are anchored onto the graphene sheets of RGO via Fe-C bonds with concomitant rise in covalency in the Fe-O bonds. The field-dependent competition between the positive and negative magnetoelectric coupling arising from magnetostriction due to, respectively, interface and bulk magnetization appears to be giving rise to the observed nonmonotonic field dependence of polarization. The emergence of Fe-C bonds and consequent change in the magnetic and electronic structure of the interface region has influenced the coupling between ferroelectric and magnetic properties remarkably and thus creates a new way of tuning the magnetoelectric properties via reconstruction of interfaces in nanocomposites or heterostructures of graphene/single-phase-multiferroic systems.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Qurzon: A Prototype for a Divide and Conquer Based Quantum Compiler
Authors:
Turbasu Chatterjee,
Arnav Das,
Shah Ishmam Mohtashim,
Amit Saha,
Amlan Chakrabarti
Abstract:
When working with algorithms on quantum devices, quantum memory becomes a crucial bottleneck due to low qubit count in NISQ-era devices. In this context, the concept of `divide and compute', wherein a quantum circuit is broken into several subcircuits and executed separately, while stitching the results of the circuits via classical post-processing, becomes a viable option, especially in NISQ-era…
▽ More
When working with algorithms on quantum devices, quantum memory becomes a crucial bottleneck due to low qubit count in NISQ-era devices. In this context, the concept of `divide and compute', wherein a quantum circuit is broken into several subcircuits and executed separately, while stitching the results of the circuits via classical post-processing, becomes a viable option, especially in NISQ-era devices. This paper introduces \textbf{Qurzon}, a proposed novel quantum compiler that incorporates the marriage of techniques of divide and compute with the state-of-the-art algorithms of optimal qubit placement for executing on real quantum devices. A scheduling algorithm is also introduced within the compiler that can explore the power of distributed quantum computing while paving the way for quantum parallelism for large algorithms. Several benchmark circuits have been executed using the compiler, thereby demonstrating the power of the divide and compute when working with real NISQ-era quantum devices.
△ Less
Submitted 24 November, 2021; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Disordered Phase in Ising and Metastability in Cellular Potts Models Hint at Glassy Dynamics
Authors:
Shah Ishmam Mohtashim,
Turbasu Chatterjee,
Arnav Das,
Rishabh Gupta,
Sumit Suresh Kale
Abstract:
In this paper, quantum algorithms are to be used to simulate glassy systems in toy models. To look for glassy behavior, the energy landscape and spin configurations of the transverse field Ising model in a longitudinal field are studied. The Variational Quantum Eigensolver (VQE) is used to obtain the ground-state energies and corresponding eigenstates for a $6 \times 6$ Ising lattice using 36 qubi…
▽ More
In this paper, quantum algorithms are to be used to simulate glassy systems in toy models. To look for glassy behavior, the energy landscape and spin configurations of the transverse field Ising model in a longitudinal field are studied. The Variational Quantum Eigensolver (VQE) is used to obtain the ground-state energies and corresponding eigenstates for a $6 \times 6$ Ising lattice using 36 qubits and a 1-dimensional Ising chain of length 25. For the $8 \times 8$ Cellular Potts model, the original Hamiltonian is converted to an Ising formulation for the VQE to reduce to its ground state. The energy change during minimization is carefully analyzed to find whether the effects of interfacial tension among cells could probably induce glassiness in the cell system.
△ Less
Submitted 9 April, 2023; v1 submitted 21 June, 2021;
originally announced June 2021.
-
Detecting over/under-translation errors for determining adequacy in human translations
Authors:
Prabhakar Gupta,
Ridha Juneja,
Anil Nelakanti,
Tamojit Chatterjee
Abstract:
We present a novel approach to detecting over and under translations (OT/UT) as part of adequacy error checks in translation evaluation. We do not restrict ourselves to machine translation (MT) outputs and specifically target applications with human generated translation pipeline. The goal of our system is to identify OT/UT errors from human translated video subtitles with high error recall. We ac…
▽ More
We present a novel approach to detecting over and under translations (OT/UT) as part of adequacy error checks in translation evaluation. We do not restrict ourselves to machine translation (MT) outputs and specifically target applications with human generated translation pipeline. The goal of our system is to identify OT/UT errors from human translated video subtitles with high error recall. We achieve this without reference translations by learning a model on synthesized training data. We compare various classification networks that we trained on embeddings from pre-trained language model with our best hybrid network of GRU + CNN achieving 89.3% accuracy on high-quality human-annotated evaluation data in 8 languages.
△ Less
Submitted 1 April, 2021;
originally announced April 2021.
-
Study of parity sheaves arising from graded Lie algebra
Authors:
Tamanna Chatterjee
Abstract:
Let $G$ be a complex, connected, reductive, algebraic group, and $χ:\mathbb{C}^\times \to G$ be a fixed cocharacter that defines a grading on $\mathfrak{g}$, the Lie algebra of $G$. Let $G_0$ be the centralizer of $χ(\mathbb{C}^\times)$. In this paper, we study $G_0$-equivariant parity sheaves on $\mathfrak{g}_n$, under some assumptions on the field $\Bbbk$ and the group $G$. The assumption on…
▽ More
Let $G$ be a complex, connected, reductive, algebraic group, and $χ:\mathbb{C}^\times \to G$ be a fixed cocharacter that defines a grading on $\mathfrak{g}$, the Lie algebra of $G$. Let $G_0$ be the centralizer of $χ(\mathbb{C}^\times)$. In this paper, we study $G_0$-equivariant parity sheaves on $\mathfrak{g}_n$, under some assumptions on the field $\Bbbk$ and the group $G$. The assumption on $G$ holds for $GL_n$ and for any $G$, it recovers results of Lusztig in characteristic $0$. The main result is that every parity sheaf occurs as a direct summand of the parabolic induction of some cuspidal pair.
△ Less
Submitted 24 July, 2020;
originally announced July 2020.
-
On partisan bias in redistricting: computational complexity meets the science of gerrymandering
Authors:
Tanima Chatterjee,
Bhaskar DasGupta
Abstract:
The topic of this paper is "gerrymandering", namely the curse of deliberate creations of district maps with highly asymmetric electoral outcomes to disenfranchise voters, and it has a long legal history. Measuring and eliminating gerrymandering has enormous implications to sustain the backbone of democratic principles of a society. Although there is no dearth of legal briefs involving gerrymanderi…
▽ More
The topic of this paper is "gerrymandering", namely the curse of deliberate creations of district maps with highly asymmetric electoral outcomes to disenfranchise voters, and it has a long legal history. Measuring and eliminating gerrymandering has enormous implications to sustain the backbone of democratic principles of a society. Although there is no dearth of legal briefs involving gerrymandering over many years, it is only more recently that mathematicians and applied computational researchers have started to investigate this topic. However, it has received relatively little attention so far from the computational complexity researchers dealing with theoretical analysis of computational complexity issues, such as computational hardness, approximability issues, etc. There could be many reasons for this, such as descriptions of these problem non-CS non-math (often legal or political) journals that theoretical CS (TCS) people usually do not follow, or the lack of coverage of these topics in TCS publication venues. One of our modest goals in writing this article is to improve upon this situation by stimulating further interactions between the gerrymandering and TCS researchers. To this effect, our main contributions are twofold: (1) we provide formalization of several models, related concepts, and corresponding problem statements using TCS frameworks from the descriptions of these problems as available in existing non-TCS (perhaps legal) venues, and (2) we also provide computational complexity analysis of some versions of these problems, leaving other versions for future research.
The goal of writing this article is not to have the final word on gerrymandering, but to introduce a series of concepts, models and problems to the TCS community and to show that science of gerrymandering involves an intriguing set of partitioning problems involving geometric and combinatorial optimization.
△ Less
Submitted 3 October, 2019;
originally announced October 2019.
-
Shifted Euler constants and a generalization of Euler-Stieltjes constants
Authors:
Tapas Chatterjee,
Suraj Singh Khurana
Abstract:
The purpose of this article is twofold. First, we introduce the constants $ζ_k(α,r,q)$ where $α\in (0,1)$ and study them along the lines of work done on Euler constant in arithmetic progression $γ(r,q)$ by Briggs, Dilcher, Knopfmacher, Lehmer and some other authors. These constants are used for evaluation of certain integrals involving error term for Dirichlet divisor problem with congruence condi…
▽ More
The purpose of this article is twofold. First, we introduce the constants $ζ_k(α,r,q)$ where $α\in (0,1)$ and study them along the lines of work done on Euler constant in arithmetic progression $γ(r,q)$ by Briggs, Dilcher, Knopfmacher, Lehmer and some other authors. These constants are used for evaluation of certain integrals involving error term for Dirichlet divisor problem with congruence conditions and also to provide a closed form expression for the value of a class of Dirichlet L-series at any real critical point. In the second half of this paper, we consider the behaviour of the Laurent Stieltjes constants $γ_k(χ)$ for a principal character $χ.$ In particular, we study a generalization of the "Generalized Euler constants" introduced by Diamond and Ford in 2008. We conclude with a short proof for a closed form expression for the first generalized Stieltjes constant $γ_1(r/q)$ which was given by Blagouchine in 2015.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
Linear Independence of Harmonic Numbers over the field of Algebraic Numbers
Authors:
Tapas Chatterjee,
Sonika Dhillon
Abstract:
Let $H_n =\sum\limits_{k=1}^n \frac{1}{k}$ be the $n$-th harmonic number. Euler extended it to complex arguments and defined $H_r$ for any complex number $r$ except for the negative integers. In this paper, we give a new proof of the transcendental nature of $H_r$ for rational $r$. For some special values of $q>1,$ we give an upper bound for the number of linearly independent harmonic numbers…
▽ More
Let $H_n =\sum\limits_{k=1}^n \frac{1}{k}$ be the $n$-th harmonic number. Euler extended it to complex arguments and defined $H_r$ for any complex number $r$ except for the negative integers. In this paper, we give a new proof of the transcendental nature of $H_r$ for rational $r$. For some special values of $q>1,$ we give an upper bound for the number of linearly independent harmonic numbers $H_{a/q}$ with $ 1 \leq a \leq q$ over the field of algebraic numbers. Also, for any finite set of odd primes $J$ with $|J|=n,$ define $$W_J=\overline{\mathbb{Q}}-\text {span of } \{ H_1, \ H_{a_{j_i}/q_i} | \ 1 \leq a_{j_i} \leq q_i -1, \ 1 \leq j_i \leq q_i-1, \ \ \forall q_i \in J\}.$$
Finally, we show that $$\text{ dim }_{\overline{\mathbb{Q}}} ~W_J=\sum\limits_{\substack{i=1 \\ q_i \in J}}^n \frac{φ(q_i )}{2} + 2.$$
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
A vanishing criterion for Dirichlet series with periodic coefficients
Authors:
Tapas Chatterjee,
M. Ram Murty,
Siddhi Pathak
Abstract:
We address the question of non-vanishing of $L(1,f)$ where $f$ is an algebraic-valued, periodic arithmetical function. We do this by characterizing algebraic-valued, periodic functions $f$ for which $L(1,f)=0$. The case of odd functions was resolved by Baker, Birch and Wirsing in 1973. We apply a result of Bass to obtain a characterization for the even functions. We also describe a theorem of the…
▽ More
We address the question of non-vanishing of $L(1,f)$ where $f$ is an algebraic-valued, periodic arithmetical function. We do this by characterizing algebraic-valued, periodic functions $f$ for which $L(1,f)=0$. The case of odd functions was resolved by Baker, Birch and Wirsing in 1973. We apply a result of Bass to obtain a characterization for the even functions. We also describe a theorem of the first two authors which says that it is enough to consider only the even and the odd functions in order to obtain a complete characterization.
△ Less
Submitted 6 September, 2018;
originally announced September 2018.
-
Alleviating partisan gerrymandering: can math and computers help to eliminate wasted votes?
Authors:
Tanima Chatterjee,
Bhaskar DasGupta,
Laura Palmieri,
Zainab Al-Qurashi,
Anastasios Sidiropoulos
Abstract:
Partisan gerrymandering is a major cause for voter disenfranchisement in United States. However, convincing US courts to adopt specific measures to quantify gerrymandering has been of limited success to date. Recently, Stephanopoulos and McGhee introduced a new and precise measure of partisan gerrymandering via the so-called "efficiency gap" that computes the absolutes difference of wasted votes b…
▽ More
Partisan gerrymandering is a major cause for voter disenfranchisement in United States. However, convincing US courts to adopt specific measures to quantify gerrymandering has been of limited success to date. Recently, Stephanopoulos and McGhee introduced a new and precise measure of partisan gerrymandering via the so-called "efficiency gap" that computes the absolutes difference of wasted votes between two political parties in a two-party system. Quite importantly from a legal point of view, this measure was found legally convincing enough in a US appeals court in a case that claims that the legislative map of the state of Wisconsin was gerrymandered; the case is now pending in US Supreme Court. In this article, we show the following:
(a) We provide interesting mathematical and computational complexity properties of the problem of minimizing the efficiency gap measure. To the best of our knowledge, these are the first non-trivial theoretical and algorithmic analyses of this measure of gerrymandering.
(b) We provide a simple and fast algorithm that can "un-gerrymander" the district maps for the states of Texas, Virginia, Wisconsin and Pennsylvania by bring their efficiency gaps to acceptable levels from the current unacceptable levels. Our work thus shows that, notwithstanding the general worst case approximation hardness of the efficiency gap measure as shown by us,finding district maps with acceptable levels of efficiency gaps is a computationally tractable problem from a practical point of view. Based on these empirical results, we also provide some interesting insights into three practical issues related the efficiency gap measure.
We believe that, should the US Supreme Court uphold the decision of lower courts, our research work and software will provide a crucial supporting hand to remove partisan gerrymandering.
△ Less
Submitted 27 April, 2018;
originally announced April 2018.
-
On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack
Authors:
Tanima Chatterjee,
Bhaskar DasGupta,
Nasim Mobasheri,
Venkatkumar Srinivasan,
Ismael G. Yero
Abstract:
With the arrival of modern internet era, large public networks of various types have come to existence to benefit the society as a whole and several research areas such as sociology, economics and geography in particular. However, the societal and research benefits of these networks have also given rise to potentially significant privacy issues in the sense that malicious entities may violate the…
▽ More
With the arrival of modern internet era, large public networks of various types have come to existence to benefit the society as a whole and several research areas such as sociology, economics and geography in particular. However, the societal and research benefits of these networks have also given rise to potentially significant privacy issues in the sense that malicious entities may violate the privacy of the users of such a network by analyzing the network and deliberately using such privacy violations for deleterious purposes. Such considerations have given rise to a new active research area that deals with the quantification of privacy of users in large networks and the corresponding investigation of computational complexity issues of computing such quantified privacy measures. In this paper, we formalize three such privacy measures for large networks and provide non-trivial theoretical computational complexity results for computing these measures. Our results show the first two measures can be computed efficiently, whereas the third measure is provably hard to compute within a logarithmic approximation factor. Furthermore, we also provide computational complexity results for the case when the privacy requirement of the network is severely restricted, including an efficient logarithmic approximation.
△ Less
Submitted 5 July, 2016;
originally announced July 2016.
-
A number field extension of a question of Milnor
Authors:
Tapas Chatterjee,
Sanoli Gun,
Purusottam Rath
Abstract:
Milnor formulated a conjecture about rational linear independence of some special Hurwitz zeta values. The second and third authors along with Ram Murty studied this conjecture and suggested an extension of Milnor's conjecture. In this note, we investigate the number field generalisation of this extended Milnor conjecture. We indicate the motivation for considering this number field case by noting…
▽ More
Milnor formulated a conjecture about rational linear independence of some special Hurwitz zeta values. The second and third authors along with Ram Murty studied this conjecture and suggested an extension of Milnor's conjecture. In this note, we investigate the number field generalisation of this extended Milnor conjecture. We indicate the motivation for considering this number field case by noting that such a phenomenon is true in an analogous context. We also study some new spaces related to normalised Hurwitz zeta values.
△ Less
Submitted 10 January, 2016;
originally announced January 2016.
-
On a conjecture of Erdös and certain Dirichlet series
Authors:
Tapas Chatterjee,
M. Ram Murty
Abstract:
Let $f:\Z/q\Z\rightarrow\Z$ be such that $f(a)=\pm 1$ for $1\le a<q$, and $f(q)=0$. Then Erdös conjectured that $\sum_{n\ge1}\frac{f(n)}{n} \ne 0$. For $q$ even, this is trivially true. If $q\equiv 3$ ( mod $4$), Murty and Saradha proved the conjecture. We show that this conjecture is true for $82\%$ of the remaining integers $q\equiv 1$ ( mod $4$).
Let $f:\Z/q\Z\rightarrow\Z$ be such that $f(a)=\pm 1$ for $1\le a<q$, and $f(q)=0$. Then Erdös conjectured that $\sum_{n\ge1}\frac{f(n)}{n} \ne 0$. For $q$ even, this is trivially true. If $q\equiv 3$ ( mod $4$), Murty and Saradha proved the conjecture. We show that this conjecture is true for $82\%$ of the remaining integers $q\equiv 1$ ( mod $4$).
△ Less
Submitted 17 January, 2015;
originally announced January 2015.
-
On the zeros of generalized Hurwitz zeta functions
Authors:
Tapas Chatterjee,
Sanoli Gun
Abstract:
In this note, we prove the existence of infinitely many zeros of certain generalized Hurwitz zeta functions in the domain of absolute convergence. This is a generalization of a classical problem of Davenport, Heilbronn and Cassels about the zeros of the Hurwitz zeta function.
In this note, we prove the existence of infinitely many zeros of certain generalized Hurwitz zeta functions in the domain of absolute convergence. This is a generalization of a classical problem of Davenport, Heilbronn and Cassels about the zeros of the Hurwitz zeta function.
△ Less
Submitted 31 July, 2014;
originally announced July 2014.
-
Non-vanishing of Dirichlet series with periodic coefficients
Authors:
Tapas Chatterjee,
M. Ram Murty
Abstract:
For any periodic function $f:{\mathbb N} \to {\mathbb C}$ with period $q$, we study the Dirichlet series $L(s,f):=\sum_{n\geq 1} f(n)/n^s.$ It is well-known that this admits an analytic continuation to the entire complex plane except at $s=1$, where it has a simple pole with residue $$ρ:= q^{-1}\sum_{1\leq a\leq q} f(a).$$ Thus, the function is analytic at $s=1$ when $ρ=0$ and in this case, we stu…
▽ More
For any periodic function $f:{\mathbb N} \to {\mathbb C}$ with period $q$, we study the Dirichlet series $L(s,f):=\sum_{n\geq 1} f(n)/n^s.$ It is well-known that this admits an analytic continuation to the entire complex plane except at $s=1$, where it has a simple pole with residue $$ρ:= q^{-1}\sum_{1\leq a\leq q} f(a).$$ Thus, the function is analytic at $s=1$ when $ρ=0$ and in this case, we study its non-vanishing using the theory of linear forms in logarithms and Dirichlet $L$-series. In this way, we give new proofs of an old criterion of Okada for the non-vanishing of $L(1,f)$ as well as a classical theorem of Baker, Birch and Wirsing. We also give some new necessary and sufficient conditions for the non-vanishing of $L(1,f)$.
△ Less
Submitted 27 May, 2014;
originally announced May 2014.
-
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
Authors:
Tanusree Chatterjee,
Abhishek Bhattacharya
Abstract:
The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes. The cost of temporary or permanent damages caused by unauthorized access of the intruders to computer systems has urged different organizations to increasingly implement various…
▽ More
The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes. The cost of temporary or permanent damages caused by unauthorized access of the intruders to computer systems has urged different organizations to increasingly implement various systems to monitor data flow in their network. The systems are generally known as Intrusion Detection System (IDS).Our objective is to implement an artificial network approach to the design of intrusion detection and prevention system and finally convert the designed model to a VHDL (Very High Speed Integrated Circuit Hardware Descriptive Language) code. This feature enables the system to suggest proper actions against possible attacks. The promising results of the present study show the potential applicability of ANNs for develo** practical IDSs.
△ Less
Submitted 21 February, 2014;
originally announced February 2014.
-
An Estimation Method of Measuring Image Quality for Compressed Images of Human Face
Authors:
Abhishek Bhattacharya,
Tanusree Chatterjee
Abstract:
Nowadays digital image compression and decompression techniques are very much important. So our aim is to calculate the quality of face and other regions of the compressed image with respect to the original image. Image segmentation is typically used to locate objects and boundaries (lines, curves etc.)in images. After segmentation the image is changed into something which is more meaningful to an…
▽ More
Nowadays digital image compression and decompression techniques are very much important. So our aim is to calculate the quality of face and other regions of the compressed image with respect to the original image. Image segmentation is typically used to locate objects and boundaries (lines, curves etc.)in images. After segmentation the image is changed into something which is more meaningful to analyze. Using Universal Image Quality Index(Q),Structural Similarity Index(SSIM) and Gradient-based Structural Similarity Index(G-SSIM) it can be shown that face region is less compressed than any other region of the image.
△ Less
Submitted 6 February, 2014;
originally announced February 2014.
-
The Digamma function, Euler-Lehmer constants and their $p$-adic counterparts
Authors:
Tapas Chatterjee,
Sanoli Gun
Abstract:
The goal of this article is twofold. We first extend a result of Murty and Saradha \cite{MS} related to the digamma function at rational arguments. Further, we extend another result of the same authors \cite{MS1} about the nature of $p$-adic Euler-Lehmer constants.
The goal of this article is twofold. We first extend a result of Murty and Saradha \cite{MS} related to the digamma function at rational arguments. Further, we extend another result of the same authors \cite{MS1} about the nature of $p$-adic Euler-Lehmer constants.
△ Less
Submitted 29 August, 2013;
originally announced August 2013.
-
The Strong Chowla-Milnor spaces and a conjecture of Gun, Murty and Rath
Authors:
Tapas Chatterjee
Abstract:
In a recent work, Gun, Murty and Rath formulated the Strong Chowla-Milnor conjecture and defined the Strong Chowla-Milnor space. In this paper, we prove a non-trivial lower bound for the dimension of these spaces. We also obtain a conditional improvement of this lower bound and noted that an unconditional improvement of this lower bound will lead to irrationality of both $ζ(k)$ and $ζ(k)/ π^k$ for…
▽ More
In a recent work, Gun, Murty and Rath formulated the Strong Chowla-Milnor conjecture and defined the Strong Chowla-Milnor space. In this paper, we prove a non-trivial lower bound for the dimension of these spaces. We also obtain a conditional improvement of this lower bound and noted that an unconditional improvement of this lower bound will lead to irrationality of both $ζ(k)$ and $ζ(k)/ π^k$ for all odd positive integers $k>1$. Following Gun, Murty and Rath, we define generalized Zagier spaces $V_p(K)$ for multiple zeta values over a number field $K$. We prove that the dimension of $V_{4d+2}(K)$ for $d\geq 1$, is at least 2, assuming a conjecture of Gun, Murty and Rath.
△ Less
Submitted 29 August, 2013;
originally announced August 2013.
-
On the dimension of Chowla-Milnor space
Authors:
Tapas Chatterjee
Abstract:
In a recent work, Gun, Murty and Rath defined the Chowla-Milnor space and proved a non-trivial lower bound for these spaces. They also obtained a conditional improvement of this lower bound and noted that an unconditional improvement of their lower bound will lead to irrationality of $ζ(k)/ π^k$ for odd positive integers $k>1$. In this paper, we give an alternate proof of their theorem about the c…
▽ More
In a recent work, Gun, Murty and Rath defined the Chowla-Milnor space and proved a non-trivial lower bound for these spaces. They also obtained a conditional improvement of this lower bound and noted that an unconditional improvement of their lower bound will lead to irrationality of $ζ(k)/ π^k$ for odd positive integers $k>1$. In this paper, we give an alternate proof of their theorem about the conditional lower bound.
△ Less
Submitted 29 August, 2013;
originally announced August 2013.