-
Weyls's law for Compact Rank One Symmetric Spaces
Authors:
Anupam Pal Choudhury,
Sai Sriharsha Indukuri,
Ritwik Mukherjee
Abstract:
Weyls law is a fundamental result governing the asymptotic behaviour of the eigenvalues of teh Laplacian. It states that for a compact d dimensional manifold M (without boundary), the eigenvalue counting function has an asymptotic growth, whose leading term is of the order of d and the error term is no worse than order d-1.
A natural question is: when is the error term sharp and when can it be i…
▽ More
Weyls law is a fundamental result governing the asymptotic behaviour of the eigenvalues of teh Laplacian. It states that for a compact d dimensional manifold M (without boundary), the eigenvalue counting function has an asymptotic growth, whose leading term is of the order of d and the error term is no worse than order d-1.
A natural question is: when is the error term sharp and when can it be improved? It has been known for a long time that the error term is sharp for the round sphere (since 1968). In contrast, it has only recently been shown (in 2019) by Iosevich and Wyman that for the product of spheres, the error term can be polynomially improved. They conjecture that a polynomial improvement should be true for products in general. In this paper we extend both these results to Compact Rank One Symmetric Spaces (CROSSes). We show that for CROSSes, the error term is sharp. Furthermore, we show that for a product of CROSSes, the error term can be polynomially improved. This gives further evidence to the conjecture made by Iosevich and Wyman.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
BharatBench: Dataset for data-driven weather forecasting over India
Authors:
Animesh Choudhury,
Jagabandhu Panda,
Asmita Mukherjee
Abstract:
Advanced weather and climate models use numerical techniques on grided meshes to simulate atmospheric and ocean dynamics, which are computationally expensive. Data-driven approaches are gaining popularity in weather and climate modeling, with a broad scope of applications. Although Machine Learning (ML) has been employed in this domain, significant progress has occurred in the past decade, leading…
▽ More
Advanced weather and climate models use numerical techniques on grided meshes to simulate atmospheric and ocean dynamics, which are computationally expensive. Data-driven approaches are gaining popularity in weather and climate modeling, with a broad scope of applications. Although Machine Learning (ML) has been employed in this domain, significant progress has occurred in the past decade, leading to ML applications that are now competitive with traditional numerical methods. This study presents a user-friendly dataset for data-driven medium-range weather forecasting focused on India. The dataset is derived from IMDAA reanalysis datasets and optimized for ML applications. The study provides clear evaluation metrics and a few baseline scores from simple linear regression techniques and deep learning models. The dataset can be found at https://www.kaggle.com/datasets/maslab/bharatbench, while the codes are available at https://github.com/MASLABnitrkl/BharatBench. We hope this dataset will boost data-driven weather forecasting over India. We also address limitations in the current evaluation process and future challenges in data-driven weather forecasting.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Searches for the BSM scenarios at the LHC using decision tree based machine learning algorithms: A comparative study and review of Random Forest, Adaboost, XGboost and LightGBM frameworks
Authors:
Arghya Choudhury,
Arpita Mondal,
Subhadeep Sarkar
Abstract:
Machine learning algorithms are now being extensively used in our daily lives, spanning across diverse industries as well as academia. In the field of high energy physics (HEP), the most common and challenging task is separating a rare signal from a much larger background. The boosted decision tree (BDT) algorithm has been a cornerstone of the high energy physics for analyzing event triggering, pa…
▽ More
Machine learning algorithms are now being extensively used in our daily lives, spanning across diverse industries as well as academia. In the field of high energy physics (HEP), the most common and challenging task is separating a rare signal from a much larger background. The boosted decision tree (BDT) algorithm has been a cornerstone of the high energy physics for analyzing event triggering, particle identification, jet tagging, object reconstruction, event classification, and other related tasks for quite some time. This article presents a comprehensive overview of research conducted by both HEP experimental and phenomenological groups that utilize decision tree algorithms in the context of the Standard Model and Supersymmetry (SUSY). We also summarize the basic concept of machine learning and decision tree algorithm along with the working principle of \texttt{Random Forest}, \texttt{AdaBoost} and two gradient boosting frameworks, such as \texttt{XGBoost}, and \texttt{LightGBM}. Using a case study of electroweakino productions at the high luminosity LHC, we demonstrate how these algorithms lead to improvement in the search sensitivity compared to traditional cut-based methods in both compressed and non-compressed R-parity conserving SUSY scenarios. The effect of different hyperparameters and their optimization, feature importance study using SHapley values are also discussed in detail.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Tokenization of Real Estate Assets Using Blockchain
Authors:
Shashank Joshi,
Arhan Choudhury
Abstract:
Blockchain technology is one of the key technologies that have revolutionized various facets of society, such as the banking, healthcare, and other critical ecosystems. One area that can harness the usage of blockchain is the real estate sector. The most lucrative long-term investment is real estate, followed by gold, equities, mutual funds, and savings accounts. Nevertheless, it has administrativ…
▽ More
Blockchain technology is one of the key technologies that have revolutionized various facets of society, such as the banking, healthcare, and other critical ecosystems. One area that can harness the usage of blockchain is the real estate sector. The most lucrative long-term investment is real estate, followed by gold, equities, mutual funds, and savings accounts. Nevertheless, it has administrative overheads such as lack of transparency, fraud, several intermediaries, title issues, paperwork, an increasing number of arbitrations, and the lack of liquidity. This paper proposes a framework that uses blockchain as an underlying technology. With the aid of blockchain and the suite of tools, it supports many of these problems that can be alleviated in the real estate investment ecosystem. These include smart contracts, immutable record management, tokenization, record tracking, and time-stamped storage. Tokenization of real estate lowers the entry barrier by fixing liquidity and interoperability and improving the interaction between various stakeholders.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
MICROSIM: A high performance phase-field solver based on CPU and GPU implementations
Authors:
Tanmay Dutta,
Dasari Mohan,
Saurav Shenoy,
Nasir Attar,
Abhikshek Kalokhe,
Ajay Sagar,
Swapnil Bhure,
Swaroop . S. Pradhan,
Jitendriya Praharaj,
Subham Mridha,
Anshika Kushwaha,
Vaishali Shah,
M. P. Gururajan,
V. Venkatesh Shenoi,
Gandham Phanikumar,
Saswata Bhattacharyya,
Abhik Choudhury
Abstract:
The phase-field method has become a useful tool for the simulation of classical metallurgical phase transformations as well as other phenomena related to materials science. The thermodynamic consistency that forms the basis of these formulations lends to its strong predictive capabilities and utility. However, a strong impediment to the usage of the method for typical applied problems of industria…
▽ More
The phase-field method has become a useful tool for the simulation of classical metallurgical phase transformations as well as other phenomena related to materials science. The thermodynamic consistency that forms the basis of these formulations lends to its strong predictive capabilities and utility. However, a strong impediment to the usage of the method for typical applied problems of industrial and academic relevance is the significant overhead with regard to the code development and know-how required for quantitative model formulations. In this paper, we report the development of an open-source phase-field software stack that contains generic formulations for the simulation of multi-phase and multi-component phase transformations. The solvers incorporate thermodynamic coupling that allows the realization of simulations with real alloys in scenarios directly relevant to the materials industry. Further, the solvers utilize parallelization strategies using either multiple CPUs or GPUs to provide cross-platform portability and usability on available supercomputing machines. Finally, the solver stack also contains a graphical user interface to gradually introduce the usage of the software. The user interface also provides a collection of post-processing tools that allow the estimation of useful metrics related to microstructural evolution.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Large Language Models and User Trust: Consequence of Self-Referential Learning Loop and the Deskilling of Healthcare Professionals
Authors:
Avishek Choudhury,
Zaria Chaudhry
Abstract:
This paper explores the evolving relationship between clinician trust in LLMs, the transformation of data sources from predominantly human-generated to AI-generated content, and the subsequent impact on the precision of LLMs and clinician competence. One of the primary concerns identified is the potential feedback loop that arises as LLMs become more reliant on their outputs for learning, which ma…
▽ More
This paper explores the evolving relationship between clinician trust in LLMs, the transformation of data sources from predominantly human-generated to AI-generated content, and the subsequent impact on the precision of LLMs and clinician competence. One of the primary concerns identified is the potential feedback loop that arises as LLMs become more reliant on their outputs for learning, which may lead to a degradation in output quality and a reduction in clinician skills due to decreased engagement with fundamental diagnostic processes. While theoretical at this stage, this feedback loop poses a significant challenge as the integration of LLMs in healthcare deepens, emphasizing the need for proactive dialogue and strategic measures to ensure the safe and effective use of LLM technology. A key takeaway from our investigation is the critical role of user expertise and the necessity for a discerning approach to trusting and validating LLM outputs. The paper highlights how expert users, particularly clinicians, can leverage LLMs to enhance productivity by offloading routine tasks while maintaining a critical oversight to identify and correct potential inaccuracies in AI-generated content. This balance of trust and skepticism is vital for ensuring that LLMs augment rather than undermine the quality of patient care. Moreover, we delve into the potential risks associated with LLMs' self-referential learning loops and the deskilling of healthcare professionals. The risk of LLMs operating within an echo chamber, where AI-generated content feeds into the learning algorithms, threatens the diversity and quality of the data pool, potentially entrenching biases and reducing the efficacy of LLMs.
△ Less
Submitted 1 April, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Entropy solutions in $BV^s$ for a class of triangular systems involving a transport equation
Authors:
Christian Bourdarias,
Anupam Pal Choudhury,
Billel Guelmame,
Stéphane Junca
Abstract:
In this article, we consider a class of strictly hyperbolic triangular systems involving a transport equation. Such systems are known to create measure solutions for the initial value problem. Adding a stronger transversality assumption on the fields, we are able to obtain solutions in $L^\infty$ under optimal fractional $BV$ regularity of the initial data. Our results show that the critical fract…
▽ More
In this article, we consider a class of strictly hyperbolic triangular systems involving a transport equation. Such systems are known to create measure solutions for the initial value problem. Adding a stronger transversality assumption on the fields, we are able to obtain solutions in $L^\infty$ under optimal fractional $BV$ regularity of the initial data. Our results show that the critical fractional regularity is $s=1/3$. We also construct an initial data that is not in $BV^{1/3}$ but for which a blow-up in $L^\infty$ occurs, proving the optimality of our results.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Pinching Dynamics of Thin Films of Binary Mixtures
Authors:
A. Choudhury,
L. Duchemin,
F. Lequeux,
L. Talini
Abstract:
In binary mixtures, the lifetimes of surface bubbles can be five orders of magnitude longer than those in pure liquids because of slightly different compositions of the bulk and the surfaces, leading to a thickness-dependent surface tension of thin films. Taking profit of the resulting simple surface rheology, we derive the equations describing the thickness, flow velocity and surface tension of a…
▽ More
In binary mixtures, the lifetimes of surface bubbles can be five orders of magnitude longer than those in pure liquids because of slightly different compositions of the bulk and the surfaces, leading to a thickness-dependent surface tension of thin films. Taking profit of the resulting simple surface rheology, we derive the equations describing the thickness, flow velocity and surface tension of a single liquid film. Numerical resolution shows that, after a first step of tension equilibration, a parabolic flow with mobile interfaces is associated with film pinching in a further drainage step. Our model paves the way for a better understanding of the rupture dynamics of liquid films.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Status of R-parity violating SUSY
Authors:
Arghya Choudhury,
Arpita Mondal,
Subhadeep Mondal
Abstract:
In this article, we discuss various phenomenological implications of possible R-parity violating (RPV) supersymmetric scenarios. In this context, the implications of both bilinear and trilinear RPV terms are reviewed from the viewpoint of neutrino physics, anomalous muon magnetic moment, different flavor observables, and collider physics. Apart from discussing the distinctive phenomenological impl…
▽ More
In this article, we discuss various phenomenological implications of possible R-parity violating (RPV) supersymmetric scenarios. In this context, the implications of both bilinear and trilinear RPV terms are reviewed from the viewpoint of neutrino physics, anomalous muon magnetic moment, different flavor observables, and collider physics. Apart from discussing the distinctive phenomenological implications of the RPV scenarios, we also survey the updated results from different studies to highlight the present status of the RPV couplings.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
Emerging topological states in EuMn$_2$Bi$_2$: A first principles prediction
Authors:
Amarjyoti Choudhury,
T. Maitra
Abstract:
New materials with magnetic order driven topological phases are hugely sought after for their immense application potential. In this work, we propose a new compound EuMn$_2$Bi$_2$ from our first principles density functional theory calculations to host novel topological phases such as Dirac/Weyl semimetal and topological insulator in its different magnetic states which are energetically close to o…
▽ More
New materials with magnetic order driven topological phases are hugely sought after for their immense application potential. In this work, we propose a new compound EuMn$_2$Bi$_2$ from our first principles density functional theory calculations to host novel topological phases such as Dirac/Weyl semimetal and topological insulator in its different magnetic states which are energetically close to one another. We started with an isostructural compound EuMn$_2$As$_2$ where the magnetic structure has been studied experimentally. From our calculations we could explain the nature of two magnetic transitions observed experimentally in this system and could also establish the correct magnetic ground state. Our electronic structure calculations reveal the insulating nature of the ground state consistent with the experiments. By replacing all As by Bi in EuMn$_2$As$_2$ and by optimizing the new structure, we obtained the new compound EuMn$_2$Bi$_2$. We observe this compound to be dynamically stable from our phonon calculations supporting its experimental preparation in future. By comparing the total energies of various possible magnetic structures we identified the ground state. Though the magnetic ground state is found to be insulating in nature with tiny band gap which is an order of magnitude less than the same in EuMn$_2$As$_2$, there were other magnetic states energetically very close to the ground state which display remarkable non-trivial band topology such as Dirac/Weyl points close to the Fermi level and topological insulator state. The energetic proximity of these magnetic order driven topological phases makes them tunable via external handle which indicates that the proposed new material EuMn$_2$Bi$_2$ would be a very versatile magnetic topological material.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Splitting Instability in Superalloys: A Phase-Field Study
Authors:
Tushar Jogi,
Saurav Shenoy,
R. Sankarasubramanian,
Abhik Choudhury,
Saswata Bhattacharyya
Abstract:
Precipitation-strengthened alloys, such as Ni-base, Co-base and Fe-base superalloys, show the development of dendrite-like precipitates in the solid state during aging at near-$γ^{\prime}$ solvus temperatures. These features arise out of a diffusive instability wherein, due to the point effect of diffusion, morphological perturbations over a growing sphere/cylinder are unstable. These dendrite-lik…
▽ More
Precipitation-strengthened alloys, such as Ni-base, Co-base and Fe-base superalloys, show the development of dendrite-like precipitates in the solid state during aging at near-$γ^{\prime}$ solvus temperatures. These features arise out of a diffusive instability wherein, due to the point effect of diffusion, morphological perturbations over a growing sphere/cylinder are unstable. These dendrite-like perturbations exhibit anisotropic growth resulting from anisotropy in interfacial/elastic energies. Further, microstructures in these alloys also exhibit "split" morphologies wherein dendritic precipitates fragment beyond a critical size, giving rise to a regular octet or quartet pattern of near-equal-sized precipitates separated by thin matrix channels. The mechanism of formation of such morphologies has remained a subject of intense investigation, and multiple theories have been proposed to explain their occurrence. Here, we developed a phase-field model incorporating anisotropy in elastic and interfacial energies to investigate the evolution of these split microstructures during growth and coarsening of dendritic $γ^{\prime}$ precipitates. Our principal finding is that the reduction in elastic energy density drives the development of split morphology, albeit a concomitant increase in the surface energy density. We also find that factors such as supersaturation, elastic misfit, degree of elastic anisotropy and interfacial energy strongly modulate the formation of these microstructures. We analyze our simulation results in the light of classical theories of elastic stress effects on coarsening and prove that negative elastic interaction energy leads to the stability of split precipitates.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
Counting curves with tangencies
Authors:
Indranil Biswas,
Apratim Choudhury,
Ritwik Mukherjee,
Anantadulal Paul
Abstract:
Interpreting tangency as a limit of two transverse intersections, we obtain a concrete formula to enumerate smooth degree d plane curves tangent to a given line at multiple points with arbitrary order of tangency. One nodal curves with multiple tangencies of any order are enumerated. Also, one cuspidal curves, that are tangent to first order to a given line at multiple points, are enumerated.
We…
▽ More
Interpreting tangency as a limit of two transverse intersections, we obtain a concrete formula to enumerate smooth degree d plane curves tangent to a given line at multiple points with arbitrary order of tangency. One nodal curves with multiple tangencies of any order are enumerated. Also, one cuspidal curves, that are tangent to first order to a given line at multiple points, are enumerated.
We also present a new way to enumerate curves with one node; it is interpreted as a degeneration of a curve tangent to a given line. That method is extended to enumerate curves with two nodes, and also curves with one tacnode are enumerated. In the final part of the paper, it is shown how this idea can be applied in the setting of stable maps and perform a concrete computation to enumerate rational curves with first order tangency. A large number of low degree cases have been worked out explicitly.
△ Less
Submitted 31 March, 2024; v1 submitted 17 December, 2023;
originally announced December 2023.
-
An experimental study of flow near an advancing contact line: a rigorous test of theoretical models
Authors:
Charul Gupta,
Anjishnu Choudhury,
Lakshmana D Chandrala,
Harish N Dixit
Abstract:
The flow near a moving contact line depends on the dynamic contact angle, viscosity ratio, and capillary number. We report experiments involving immersing a plate into a liquid bath, concurrently measuring the interface shape, interfacial velocity, and fluid flow using digital image processing and particle image velocimetry. All experiments were performed at low plate speeds to maintain small Reyn…
▽ More
The flow near a moving contact line depends on the dynamic contact angle, viscosity ratio, and capillary number. We report experiments involving immersing a plate into a liquid bath, concurrently measuring the interface shape, interfacial velocity, and fluid flow using digital image processing and particle image velocimetry. All experiments were performed at low plate speeds to maintain small Reynolds and capillary numbers for comparison with viscous theories. The dynamic contact angle, measured in the viscous phase, was kept below $90^{\circ}$, an unexplored region of parameter space. An important aim of the present study is to provide valuable experimental data using which new contact line models can be developed and validated. Interface shapes reveal that the strong viscous bending predicted by theoretical models is absent in the experimental data. The flow field is directly compared against the prediction from the viscous theory of \cite{huh1971hydrodynamic} but with a slight modification involving the curved interface. Remarkable agreement is found between experiments and theory across a wide parameter range. The prediction for interfacial speed from \cite{huh1971hydrodynamic} is also in excellent agreement with experiments except in the vicinity of the contact line. Material points along the interface were found to rapidly slow down near the contact line, thus alleviating the singularity at the moving contact line. To the best of our knowledge, such a detailed test of theoretical models has not been performed before and we hope the present study will spur new modeling efforts in the field.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
The Impact of Performance Expectancy, Workload, Risk, and Satisfaction on Trust in ChatGPT: Cross-sectional Survey Analysis
Authors:
Hamid Shamszare,
Avishek Choudhury
Abstract:
This study investigated how perceived workload, satisfaction, performance expectancy, and risk-benefit perception influenced users' trust in Chat Generative Pre-Trained Transformer (ChatGPT). We aimed to understand the nuances of user engagement and provide insights to improve future design and adoption strategies for similar technologies. A semi-structured, web-based survey was conducted among ad…
▽ More
This study investigated how perceived workload, satisfaction, performance expectancy, and risk-benefit perception influenced users' trust in Chat Generative Pre-Trained Transformer (ChatGPT). We aimed to understand the nuances of user engagement and provide insights to improve future design and adoption strategies for similar technologies. A semi-structured, web-based survey was conducted among adults in the United States who actively use ChatGPT at least once a month. The survey was conducted from 22nd February 2023 through 24th March 2023. We used structural equation modeling to understand the relationships among the constructs of perceived workload, satisfaction, performance expectancy, risk-benefit, and trust. The analysis of 607 survey responses revealed a significant negative relationship between perceived workload and user satisfaction, a negative but insignificant relationship between perceived workload and trust, and a positive relationship between user satisfaction and trust. Trust was also found to increase with performance expectancy. In contrast, the relationship between the benefit-to-risk ratio of using ChatGPT and trust was insignificant. The findings underscore the importance of ensuring user-friendly design and functionality in AI-based applications to reduce workload and enhance user satisfaction, thereby increasing user trust. Future research should further explore the relationship between the benefit-to-risk ratio and trust in the context of AI chatbots.
△ Less
Submitted 20 October, 2023;
originally announced November 2023.
-
MASON-NLP at eRisk 2023: Deep Learning-Based Detection of Depression Symptoms from Social Media Texts
Authors:
Fardin Ahsan Sakib,
Ahnaf Atef Choudhury,
Ozlem Uzuner
Abstract:
Depression is a mental health disorder that has a profound impact on people's lives. Recent research suggests that signs of depression can be detected in the way individuals communicate, both through spoken words and written texts. In particular, social media posts are a rich and convenient text source that we may examine for depressive symptoms. The Beck Depression Inventory (BDI) Questionnaire,…
▽ More
Depression is a mental health disorder that has a profound impact on people's lives. Recent research suggests that signs of depression can be detected in the way individuals communicate, both through spoken words and written texts. In particular, social media posts are a rich and convenient text source that we may examine for depressive symptoms. The Beck Depression Inventory (BDI) Questionnaire, which is frequently used to gauge the severity of depression, is one instrument that can aid in this study. We can narrow our study to only those symptoms since each BDI question is linked to a particular depressive symptom. It's important to remember that not everyone with depression exhibits all symptoms at once, but rather a combination of them. Therefore, it is extremely useful to be able to determine if a sentence or a piece of user-generated content is pertinent to a certain condition. With this in mind, the eRisk 2023 Task 1 was designed to do exactly that: assess the relevance of different sentences to the symptoms of depression as outlined in the BDI questionnaire. This report is all about how our team, Mason-NLP, participated in this subtask, which involved identifying sentences related to different depression symptoms. We used a deep learning approach that incorporated MentalBERT, RoBERTa, and LSTM. Despite our efforts, the evaluation results were lower than expected, underscoring the challenges inherent in ranking sentences from an extensive dataset about depression, which necessitates both appropriate methodological choices and significant computational resources. We anticipate that future iterations of this shared task will yield improved results as our understanding and techniques evolve.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
Slepton searches in the trilinear RPV SUSY scenarios at the HL-LHC and HE-LHC
Authors:
Arghya Choudhury,
Arpita Mondal,
Subhadeep Mondal,
Subhadeep Sarkar
Abstract:
In this work we have studied a multi-lepton final state arising from sneutrino and left-handed slepton production at the high luminosity and high energy LHC in the context of R-parity violating supersymmetry when only the lepton number violating $λ_{121}$ and/or $λ_{122}$ couplings are non-zero. We have taken into account both pair production and associated production of the three generations of l…
▽ More
In this work we have studied a multi-lepton final state arising from sneutrino and left-handed slepton production at the high luminosity and high energy LHC in the context of R-parity violating supersymmetry when only the lepton number violating $λ_{121}$ and/or $λ_{122}$ couplings are non-zero. We have taken into account both pair production and associated production of the three generations of left-handed sleptons and sneutrinos, which are assumed to be mass degenerate. The lightest supersymmetric particle is assumed to be bino and it decays via the R-parity violating couplings into light leptons and neutrinos. Our final state has a large lepton multiplicity, $N_{l}\geq 4~(l=e,~μ)$. We perform both cut-based and machine learning based analyses for comparison. We present our results in the bino-slepton/sneutrino mass plane in terms of exclusion and discovery reach at the LHC. Following our analysis, the slepton mass can be discovered upto $\sim$ 1.54 TeV and excluded upto $\sim$ 1.87 TeV at the high luminosity LHC while these ranges go upto $\sim$ 2.46 TeV and $\sim$ 3.06 TeV respectively at the high energy LHC.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Improving sensitivity of trilinear RPV SUSY searches using machine learning at the LHC
Authors:
Arghya Choudhury,
Arpita Mondal,
Subhadeep Mondal,
Subhadeep Sarkar
Abstract:
In this work, we have explored the sensitivity of multilepton final states in probing the gaugino sector of R-parity violating supersymmetric scenario with specific lepton number violating trilinear couplings ($λ_{ijk}$) being non-zero. The gaugino spectrum is such that the charged leptons in the final state can arise from the R-parity violating decays of the lightest supersymmetric particle (LSP)…
▽ More
In this work, we have explored the sensitivity of multilepton final states in probing the gaugino sector of R-parity violating supersymmetric scenario with specific lepton number violating trilinear couplings ($λ_{ijk}$) being non-zero. The gaugino spectrum is such that the charged leptons in the final state can arise from the R-parity violating decays of the lightest supersymmetric particle (LSP) as well as R-parity conserving decays of the next-to-LSP (NLSP). Apart from a detailed cut-based analysis, we have also performed a machine learning-based analysis using boosted decision tree algorithm which provides much better sensitivity. In the scenarios with non-zero $λ_{121}$ and/or $λ_{122}$ couplings, the LSP pair in the final states decays to $4l~(l = e, μ) + \rm E{\!\!\!/}_T$ final states with $100\%$ branching ratio. We have shown that under this circumstance, a final state with $\ge 4l$ has the highest sensitivity in probing the gaugino masses. We also discuss how the sensitivity can change in the presence of $τ$ lepton(s) in the final state due to other choices of trilinear couplings. We present our results through the estimation of the discovery and exclusion contours in the gaugino mass plane for both the HL-LHC and the HE-LHC. For $λ_{121}$ and/or $λ_{122}$ nonzero scenario, the projected 2$σ$ exclusion limit on NLSP masses reaches upto 2.37 TeV and 4 TeV for the HL-LHC and the HE-LHC respectively by using a machine learning based algorithm. We obtain an enhancement of $\sim$ 380 (190) GeV in the projected 2$σ$ exclusion limit on the NLSP masses at the 27 (14) TeV LHC. Considering the same final state ($N_l \geq 4$) for $λ_{133}$ and/or $λ_{233}$ non-zero scenario, we find that the corresponding 2$σ$ projected limits are $\sim$ 1.97 TeV and $\sim$ 3.25 TeV for the HL-LHC and HE-LHC respectively.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Network Agnostic MPC with Statistical Security
Authors:
Ananya Appan,
Ashish Choudhury
Abstract:
We initiate the study of the network agnostic MPC protocols with statistical security. Network agnostic protocols give the best possible security guarantees irrespective of the underlying network type. We consider the general-adversary model, where the adversary is characterized by an adversary structure which enumerates all possible candidate subsets of corrupt parties. The $\mathcal{Q}^{(k)}$ co…
▽ More
We initiate the study of the network agnostic MPC protocols with statistical security. Network agnostic protocols give the best possible security guarantees irrespective of the underlying network type. We consider the general-adversary model, where the adversary is characterized by an adversary structure which enumerates all possible candidate subsets of corrupt parties. The $\mathcal{Q}^{(k)}$ condition enforces that the union of no $k$ subsets from the adversary structure covers the party set. Given an unconditionally-secure PKI setup, known statistically-secure synchronous MPC protocols are secure against adversary structures satisfying the $\mathcal{Q}^{(2)}$ condition. Known statistically-secure asynchronous MPC protocols can tolerate $\mathcal{Q}^{(3)}$ adversary structures. Fix a set of $n$ parties $\mathcal{P} = \{P_1, ... ,P_n\}$ and adversary structures $\mathcal{Z}_s$ and $\mathcal{Z}_a$, satisfying the $\mathcal{Q}^{(2)}$ and $\mathcal{Q}^{(3)}$ conditions respectively, where $\mathcal{Z}_a \subset \mathcal{Z}_s$. Then, given an unconditionally-secure PKI, we ask whether it is possible to design a statistically-secure MPC protocol resilient against $\mathcal{Z}_s$ and $\mathcal{Z}_a$ in a synchronous and an asynchronous network respectively if the parties in $\mathcal{P}$ are unaware of the network type. We show that it is possible iff $\mathcal{Z}_s$ and $\mathcal{Z}_a$ satisfy the $\mathcal{Q}^{(2,1)}$ condition, meaning that the union of any two subsets from $\mathcal{Z}_s$ and any one subset from $\mathcal{Z}_a$ is a proper subset of $\mathcal{P}$. We design several important network agnostic building blocks with the $\mathcal{Q}^{(2,1)}$ condition, such as Byzantine broadcast, Byzantine agreement, information checking protocol, verifiable secret-sharing and secure multiplication protocol, whose complexity is polynomial in $n$ and $|\mathcal{Z}_s|$.
△ Less
Submitted 2 June, 2023;
originally announced June 2023.
-
Bilinear R-parity violating supersymmetry under the light of neutrino oscillation, higgs and flavor data
Authors:
Arghya Choudhury,
Sourav Mitra,
Arpita Mondal,
Subhadeep Mondal
Abstract:
In this work, we explore a well motivated beyond the Standard Model scenario, namely, R-parity violating Supersymmetry, in the context of light neutrino masses and mixing. We assume that the R-parity is only broken by the lepton number violating bilinear term. We try to fit two non-zero neutrino mass square differences and three mixing angle values obtained from the global $χ^2$ analysis of neutri…
▽ More
In this work, we explore a well motivated beyond the Standard Model scenario, namely, R-parity violating Supersymmetry, in the context of light neutrino masses and mixing. We assume that the R-parity is only broken by the lepton number violating bilinear term. We try to fit two non-zero neutrino mass square differences and three mixing angle values obtained from the global $χ^2$ analysis of neutrino oscillation data. We have also taken into account the updated data of the standard model (SM) Higgs mass and its coupling strengths with other SM particles from LHC Run-II along with low energy flavor violating constraints like rare b-hadron decays. We have used a Markov Chain Monte Carlo (MCMC) analysis to constrain the new physics parameter space. While doing so, we ensure that all the existing collider constraints are duly taken into account. Through our analysis, we have derived the most stringent constraints possible to date with existing data on the 9 bilinear R-parity violating parameters along with $μ$ and $\tanβ$. We further explore the possibility of explaining the anomalous muon~(g~-~2) measurement staying within the parameter space allowed by neutrino, Higgs and flavor data while satisfying the collider constraints as well. We find that there still remains a small sub-TeV parameter space where the required excess can be obtained.
△ Less
Submitted 6 February, 2024; v1 submitted 24 May, 2023;
originally announced May 2023.
-
Emergence of the Gambier equation in cosmology
Authors:
D. Batic,
P. Guha,
A. Ghose Choudhury
Abstract:
We show how the Gambier equation arises in connection to Friedmann-Lema$\mbox{î}$tre-Robertson-Walker (FLRW) cosmology and a Dark Matter equation of state. Moreover, we provide a correspondence between the Friedmann equations and the Gambier equations that possess the Painlev$\acute{\mbox{e}}$ property in $2+1$ dimensions. We also consider special cases of the Gambier G27 equation such as the gene…
▽ More
We show how the Gambier equation arises in connection to Friedmann-Lema$\mbox{î}$tre-Robertson-Walker (FLRW) cosmology and a Dark Matter equation of state. Moreover, we provide a correspondence between the Friedmann equations and the Gambier equations that possess the Painlev$\acute{\mbox{e}}$ property in $2+1$ dimensions. We also consider special cases of the Gambier G27 equation such as the generalized Pinney equation. For an extended FLRW model with dynamic scalar field as matter model, the Einstein equations correspond to the Milne-Pinney equation which in turn can be mapped to the parametric Gambier equation of second order.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Impact of Surface Roughness in Measuring Optoelectronic Characteristics of Thin-Film Solar Cells
Authors:
David Magginetti,
Seokmin Jeon,
Yohan Yoon,
Ashif Choudhury,
Ashraful Mamun,
Yang Qian,
Jordan Gerton,
Heayoung Yoon
Abstract:
Microstructural properties of thin-film absorber layers play a vital role in develo** high-performance solar cells. Scanning probe microscopy is frequently used for measuring spatially inhomogeneous properties of thin-film solar cells. While powerful, the nanoscale probe can be sensitive to the roughness of samples, introducing convoluted signals and unintended artifacts into the measurement. He…
▽ More
Microstructural properties of thin-film absorber layers play a vital role in develo** high-performance solar cells. Scanning probe microscopy is frequently used for measuring spatially inhomogeneous properties of thin-film solar cells. While powerful, the nanoscale probe can be sensitive to the roughness of samples, introducing convoluted signals and unintended artifacts into the measurement. Here, we apply a glancing-angle focused ion beam (FIB) technique to reduce the surface roughness of CdTe while preserving the subsurface optoelectronic properties of the solar cells. We compare the nanoscale optoelectronic properties before and after the FIB polishing. Simultaneously collected Kelvin-probe force microscopy (KPFM) and atomic force microscopy (AFM) images show that the contact potential difference (CPD) of CdTe pristine (peak-to-valley roughness of approximately 600 nm) follows the topography. In contrast, the CPD map of polished CdTe (roughness of approximately 20 nm) is independent of the surface roughness. We demonstrate the smooth CdTe surface also enables high-resolution photoluminescence (PL) imaging at a resolution much smaller than individual grains (< 1 micrometer). Our finite-difference time-domain (FDTD) simulations illustrate how the local light excitation interacts with CdTe surfaces. Our work supports low-angle FIB polishing can be beneficial in studying buried sub-microstructural properties of thin-film solar cells with care for possible ion-beam damage near the surface.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
Counting rational curves with an $m$-fold point
Authors:
Indranil Biswas,
Chitrabhanu Chaudhuri,
Apratim Choudhury,
Ritwik Mukherjee,
Anantadulal Paul
Abstract:
We obtain a recursive formula for the number of rational degree $d$ curves in $\mathbb{CP}^2$ that pass through $3d+1-m$ generic points and that have an $m$-fold singular point. The special case of counting curves with a triple point was solved earlier by other authors. We obtain the formula by considering a family version of Kontsevich's recursion formula, in contrast to the excess intersection t…
▽ More
We obtain a recursive formula for the number of rational degree $d$ curves in $\mathbb{CP}^2$ that pass through $3d+1-m$ generic points and that have an $m$-fold singular point. The special case of counting curves with a triple point was solved earlier by other authors. We obtain the formula by considering a family version of Kontsevich's recursion formula, in contrast to the excess intersection theoretic approach of others. A large number of low degree cases have been worked out explicitly.
△ Less
Submitted 3 August, 2023; v1 submitted 3 December, 2022;
originally announced December 2022.
-
Spontaneous entanglement leakage of two static entangled Unruh-DeWitt detectors
Authors:
Dipankar Barman,
Angshuman Choudhury,
Bhushan Kad,
Bibhas Ranjan Majhi
Abstract:
Two entangled two-level Unruh-DeWitt detectors, which are in rest, spontaneously loose entanglement when at least any one of them is not isolated from the environment quantum fields. For eternal interaction between the detectors and environment, the spontaneous emission from the detectors' exited states and vacuum fluctuations of field influence this negative effect. Consequently, it suggests that…
▽ More
Two entangled two-level Unruh-DeWitt detectors, which are in rest, spontaneously loose entanglement when at least any one of them is not isolated from the environment quantum fields. For eternal interaction between the detectors and environment, the spontaneous emission from the detectors' exited states and vacuum fluctuations of field influence this negative effect. Consequently, it suggests that two entangled qubits become less communicated during their free-fall towards the black hole horizon.
△ Less
Submitted 18 January, 2023; v1 submitted 1 November, 2022;
originally announced November 2022.
-
Interplay of magnetism and band topology in Eu$_{1-x}$Ca$_x$Mg$_2$Bi$_2$ (x=0, 0.5) from first principles study
Authors:
Amarjyoti Choudhury,
N. Mohanta,
T. Maitra
Abstract:
Recent discovery of the time reversal symmetry breaking magnetic Weyl semimetals has created a huge surge of activities in the field of quantum topological materials. In this work, we have studied systematically the ground state magnetic order, electronic structure and the interplay between the magnetic order and band topology in one such materials, EuMg$_2$Bi$_2$ (EMB) and its Ca doped variant us…
▽ More
Recent discovery of the time reversal symmetry breaking magnetic Weyl semimetals has created a huge surge of activities in the field of quantum topological materials. In this work, we have studied systematically the ground state magnetic order, electronic structure and the interplay between the magnetic order and band topology in one such materials, EuMg$_2$Bi$_2$ (EMB) and its Ca doped variant using first principles method within the framework of density functional theory (DFT). The detailed investigation unravels the existence of different topological phases in this single material which can be tuned by an external probe such as magnetic field or chemical substitution. Our DFT calculations including Coulomb correlation (U) and spin-orbit (SO) interaction within GGA+U+SO approximation confirms that the magnetic ground state of EMB is A-type Antiferromagnetic (A-AFM) with Eu magnetic moments aligned along the crystallographic $a$ or $b$ direction. Although the ground state of EMB is A-AFM, the Ferromagnetic (FM) state lies very close in energy. We observe a single pair of Weyl points connecting valence and conduction band very close to the Fermi level (FL) along $Γ$-A direction in the FM state of EuMg$_2$Bi$_2$ with Eu moments aligned along crystallographic $c$ direction. On do** 50\% Ca at Eu sites, we observe single pair of Weyl points moving closer to the FL which is highly desirable for application purposes. Further we observe that the separation between the Weyl points in the pair decreases in doped compound compared to that in the parent compound which has direct consequence on anomalous Hall conductivity (AHC). Our first principles calculation of AHC shows high peak values exactly at these Weyl points and the peak height decreases when we dope the system with Ca. Therefore, Ca do** can be a good external handle to tune AHC in this system.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
Blockchain-Based Decentralized Knowledge Marketplace Using Active Inference
Authors:
Shashank Joshi,
Arhan Choudhury
Abstract:
A knowledge market can be described as a type of market where there is a consistent supply of data to satisfy the demand for information and is responsible for the map** of potential problem solvers with the entities which need these solutions. It is possible to define them as value-exchange systems in which the dynamic features of the creation and exchange of intellectual assets serve as the fu…
▽ More
A knowledge market can be described as a type of market where there is a consistent supply of data to satisfy the demand for information and is responsible for the map** of potential problem solvers with the entities which need these solutions. It is possible to define them as value-exchange systems in which the dynamic features of the creation and exchange of intellectual assets serve as the fundamental drivers of the frequency, nature, and outcomes of interactions among various stakeholders. Furthermore, the provision of financial backing for research is an essential component in the process of develo** a knowledge market that is capable of enduring over time, and it is also an essential driver of the progression of scientific investigation. This paper underlines flaws associated with the conventional knowledge-based market, including but not limited to excessive financing concentration, ineffective information exchange, a lack of security, map** of entities, etc. The authors present a decentralized framework for the knowledge marketplace incorporating technologies such as blockchain, active inference, zero-knowledge proof, etc. The proposed decentralized framework provides not only an efficient map** mechanism to map entities in the marketplace but also a more secure and controlled way to share knowledge and services among various stakeholders.
△ Less
Submitted 4 October, 2022;
originally announced October 2022.
-
Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Authors:
Ananya Appan,
Anirudh Chandramouli,
Ashish Choudhury
Abstract:
In this work, we study perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries. Known protocols in a synchronous network are secure against $Q^{(3)}$ adversary structures, while in an asynchronous network, known protocols are secure against $Q^{(4)}$ adversary structures. A natural question is whether there exists a single protocol which remains secure against…
▽ More
In this work, we study perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries. Known protocols in a synchronous network are secure against $Q^{(3)}$ adversary structures, while in an asynchronous network, known protocols are secure against $Q^{(4)}$ adversary structures. A natural question is whether there exists a single protocol which remains secure against $Q^{(3)}$ and $Q^{(4)}$ adversary structures in a synchronous and in an asynchronous network respectively, where the parties are not aware of the network type. We design the first such best-of-both-worlds protocol against general adversaries. Our result generalizes the result of Appan, Chandramouli and Choudhury (PODC 2022), which presents a best-of-both-worlds perfectly-secure protocol against threshold adversaries.
To design our protocol, we present two important building blocks which are of independent interest. The first building block is a best-of-both-worlds perfectly-secure Byzantine agreement (BA) protocol for $Q^{(3)}$ adversary structures, which remains secure both in a synchronous, as well as an asynchronous network. The second building block is a best-of-both-worlds perfectly-secure verifiable secret-sharing (VSS) protocol, which remains secure against $Q^{(3)}$ and $Q^{(4)}$ adversary structures in a synchronous network and an asynchronous network respectively.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries
Authors:
Ananya Appan,
Anirudh Chandramouli,
Ashish Choudhury
Abstract:
In this paper, we design secure multi-party computation (MPC) protocols in the asynchronous communication setting with optimal resilience. Our protocols are secure against a computationally-unbounded malicious adversary, characterized by an adversary structure $\mathcal{Z}$, which enumerates all possible subsets of potentially corrupt parties. Our protocols incur a communication of…
▽ More
In this paper, we design secure multi-party computation (MPC) protocols in the asynchronous communication setting with optimal resilience. Our protocols are secure against a computationally-unbounded malicious adversary, characterized by an adversary structure $\mathcal{Z}$, which enumerates all possible subsets of potentially corrupt parties. Our protocols incur a communication of $\mathcal{O}(|\mathcal{Z}|^2)$ and $\mathcal{O}(|\mathcal{Z}|)$ bits per multiplication for perfect and statistical security respectively. These are the first protocols with this communication complexity, as such protocols were known only in the synchronous communication setting (Hirt and Tschudi, ASIACRYPT 2013).
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Robust Phase Retrieval via Reverse Kullback-Leibler Divergence
Authors:
Nazia Afroz Choudhury,
Bariscan Yonel,
Birsen Yazici
Abstract:
Robustness to noise and outliers is a desirable trait in phase retrieval algorithms for many applications in imaging and signal processing. In this paper, we develop novel robust phase retrieval algorithms based on the minimization of reverse Kullback-Leibler divergence (RKLD) within the Wirtinger Flow (WF) framework. We use RKLD over intensity-only measurements in two distinct ways: i) to design…
▽ More
Robustness to noise and outliers is a desirable trait in phase retrieval algorithms for many applications in imaging and signal processing. In this paper, we develop novel robust phase retrieval algorithms based on the minimization of reverse Kullback-Leibler divergence (RKLD) within the Wirtinger Flow (WF) framework. We use RKLD over intensity-only measurements in two distinct ways: i) to design a novel initial estimate based on minimum distortion design of spectral estimates, and ii) as a loss function for iterative refinement based on WF. The RKLD-based loss function offers implicit regularization by processing data at the logarithmic scale and provides the following benefits: suppressing the influence of outliers and promoting projections orthogonal to noise subspace. We perform a quantitative analysis demonstrating the robustness of RKLD-based minimization as compared to that of the $\ell_2$ and Poisson loss-based minimization. We present three algorithms based on RKLD minimization, including two with truncation schemes to enhance the robustness to significant contamination. Our numerical study uses data generated based on synthetic coded diffraction patterns and real optical imaging data. The results demonstrate the advantages of our algorithms in terms of sample efficiency, convergence speed, and robustness with respect to outliers over the state-of-the-art techniques.
△ Less
Submitted 13 February, 2024; v1 submitted 20 April, 2022;
originally announced April 2022.
-
Enhancing Healthcare System Using Blockchain Smart Contracts
Authors:
Shashank Joshi,
Arhan Choudhury,
Ojas Saraswat
Abstract:
The concept of blockchain has emerged as an effective solution for data-sensitive domains, such as healthcare, financial services, etc., due to its various attributes like immutability, non-repudiation, and availability. Thus, implementation of this technology in various domains rose exponentially; one of such fields is the healthcare supply chain. Managing healthcare supply chain processes effect…
▽ More
The concept of blockchain has emerged as an effective solution for data-sensitive domains, such as healthcare, financial services, etc., due to its various attributes like immutability, non-repudiation, and availability. Thus, implementation of this technology in various domains rose exponentially; one of such fields is the healthcare supply chain. Managing healthcare supply chain processes effectively is very crucial for the healthcare system. Despite various innovations in the method of treatment methodologies, the healthcare supply chain management system is not up to the mark and lacks efficiency. The traditional healthcare supply chain system is time-consuming and lacks the work synergy among the various stakeholders of the supply chain. Thus, In this paper, we propose a framework based on blockchain smart contracts and decentralized storage to connect all the supply chain stakeholders. Smart contracts in the framework enforce and depict various interactions and transactions among the stakeholders, thus hel** to automate these processes, promote transparency, improve efficiency, and minimize service time. The preliminary results show that the proposed framework is more efficient, secure, and economically feasible.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Authors:
Ananya Appan,
Anirudh Chandramouli,
Ashish Choudhury
Abstract:
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of $n$ mutually distrusting parties to carry out any joint computation of their private inputs, without disclosing any additional information about their inputs. MPC with information-theoretic security provides the strongest security guarantees and remains secure even against…
▽ More
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of $n$ mutually distrusting parties to carry out any joint computation of their private inputs, without disclosing any additional information about their inputs. MPC with information-theoretic security provides the strongest security guarantees and remains secure even against computationally unbounded adversaries. Perfectly-secure MPC protocols is a class of information-theoretically secure MPC protocols, which provides all the security guarantees in an error-free fashion. The focus of this work is perfectly-secure MPC. Known protocols are designed assuming either a synchronous or asynchronous communication network. It is well known that perfectly-secure synchronous MPC protocol is possible as long as adversary can corrupt any $t_s < n/3$ parties. On the other hand, perfectly-secure asynchronous MPC protocol can tolerate up to $t_a < n/4$ corrupt parties. A natural question is does there exist a single MPC protocol for the setting where the parties are not aware of the exact network type and which can tolerate up to $t_s < n/3$ corruptions in a synchronous network and up to $t_a < n/4$ corruptions in an asynchronous network. We design such a best-of-both-worlds perfectly-secure MPC protocol, provided $3t_s + t_a < n$ holds.
For designing our protocol, we design two important building blocks, which are of independent interest. The first building block is a best-of-both-worlds Byzantine agreement (BA) protocol tolerating $t < n/3$ corruptions and which remains secure, both in a synchronous as well as asynchronous network. The second building block is a polynomial-based best-of-both-worlds verifiable secret-sharing (VSS) protocol, which can tolerate up to $t_s$ and $t_a$ corruptions in a synchronous and in an asynchronous network respectively.
△ Less
Submitted 9 August, 2022; v1 submitted 28 January, 2022;
originally announced January 2022.
-
Rightsizing Clusters for Time-Limited Tasks
Authors:
Venkatesan T. Chakaravarthy,
Padmanabha V. Seshadri,
Pooja Aggarwal,
Anamitra R. Choudhury,
Ashok Pon Kumar,
Yogish Sabharwal,
Amith Singhee
Abstract:
In conventional public clouds, designing a suitable initial cluster for a given application workload is important in reducing the computational foot-print during run-time. In edge or on-premise clouds, cold-start rightsizing the cluster at the time of installation is crucial in avoiding the recurrent capital expenditure. In both these cases, rightsizing has to balance cost-performance trade-off fo…
▽ More
In conventional public clouds, designing a suitable initial cluster for a given application workload is important in reducing the computational foot-print during run-time. In edge or on-premise clouds, cold-start rightsizing the cluster at the time of installation is crucial in avoiding the recurrent capital expenditure. In both these cases, rightsizing has to balance cost-performance trade-off for a given application with multiple tasks, where each task can demand multiple resources, and the cloud offers nodes with different capacity and cost. Multidimensional bin-packing can address this cold-start rightsizing problem, but assumes that every task is always active. In contrast, real-world tasks (e.g. load bursts, batch and dead-lined tasks with time-limits) may be active only during specific time-periods or may have dynamic load profiles. The cluster cost can be reduced by reusing resources via time sharing and optimal packing. This motivates our generalized problem of cold-start rightsizing for time-limited tasks: given a timeline, time-periods and resource demands for tasks, the objective is to place the tasks on a minimum cost cluster of nodes without violating node capacities at any time instance. We design a baseline two-phase algorithm that performs penalty-based map** of task to node-type and then, solves each node-type independently. We prove that the algorithm has an approximation ratio of O(D min(m, T)), where D, m and T are the number of resources, node-types and timeslots, respectively. We then present an improved linear programming based map** strategy, enhanced further with a cross-node-type filling mechanism. Our experiments on synthetic and real-world cluster traces show significant cost reduction by LP-based map** compared to the baseline, and the filling mechanism improves further to produce solutions within 20% of (a lower-bound to) the optimal solution.
△ Less
Submitted 21 December, 2021;
originally announced December 2021.
-
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Authors:
Anirudh Chandramouli,
Ashish Choudhury,
Arpita Patra
Abstract:
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly-secure VSS…
▽ More
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly-secure VSS schemes in three different communication settings, namely synchronous, asynchronous and hybrid setting and provide full details of the existing schemes in these settings. The aim of this survey is to provide a clear knowledge and foundation to researchers who are interested in knowing and extending the state-of-the-art perfectly-secure VSS schemes.
△ Less
Submitted 4 February, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Role of Artificial Intelligence, Clinicians & Policymakers in Clinical Decision Making: A Systems Viewpoint
Authors:
Avishek Choudhury,
Onur Asan,
Mo Mansouri
Abstract:
What is a system? Is one of those questions that is yet not clear to most individuals in this world. A system is an assemblage of interacting, interrelated and interdependent components forming a complex and integrated whole with an unambiguous and common goal. This paper emphasizes on the fact that all components of a complex system are inter-related and interdependent in some way and the behavio…
▽ More
What is a system? Is one of those questions that is yet not clear to most individuals in this world. A system is an assemblage of interacting, interrelated and interdependent components forming a complex and integrated whole with an unambiguous and common goal. This paper emphasizes on the fact that all components of a complex system are inter-related and interdependent in some way and the behavior of that system depends on these independences. A health care system as portrayed in this article is widespread and complex. This encompasses not only hospitals but also governing bodies like the FDA, technologies such as AI, biomedical devices, Cloud computing and many more. The interactions between all these components govern the behavior and existence of the overall healthcare system. In this paper, we focus on the interaction of artificial intelligence, care providers and policymakers and analyze using systems thinking approach, their impact on clinical decision making
△ Less
Submitted 31 October, 2021;
originally announced December 2021.
-
Use of machine learning in geriatric clinical care for chronic diseases: a systematic literature review
Authors:
Avishek Choudhury,
Emily Renjilian,
Onur Asan
Abstract:
Objectives-Geriatric clinical care is a multidisciplinary assessment designed to evaluate older patients (age 65 years and above) functional ability, physical health, and cognitive wellbeing. The majority of these patients suffer from multiple chronic conditions and require special attention. Recently, hospitals utilize various artificial intelligence (AI) systems to improve care for elderly patie…
▽ More
Objectives-Geriatric clinical care is a multidisciplinary assessment designed to evaluate older patients (age 65 years and above) functional ability, physical health, and cognitive wellbeing. The majority of these patients suffer from multiple chronic conditions and require special attention. Recently, hospitals utilize various artificial intelligence (AI) systems to improve care for elderly patients. The purpose of this systematic literature review is to understand the current use of AI systems, particularly machine learning (ML), in geriatric clinical care for chronic diseases. Materials and Methods-We restricted our search to eight databases, namely PubMed, WorldCat, MEDLINE, ProQuest, ScienceDirect, SpringerLink, Wiley, and ERIC, to analyze research articles published in English between January 2010 and June 2019. We focused on studies that used ML algorithms in the care of geriatrics patients with chronic conditions. Results-We identified 35 eligible studies and classified in three groups-psychological disorder (n=22), eye diseases (n=6), and others (n=7). This review identified the lack of standardized ML evaluation metrics and the need for data governance specific to health care applications. Conclusion- More studies and ML standardization tailored to health care applications are required to confirm whether ML could aid in improving geriatric clinical care.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
Predicting Cancer Using Supervised Machine Learning: Mesothelioma
Authors:
Avishek Choudhury
Abstract:
Background: Pleural Mesothelioma (PM) is an unusual, belligerent tumor that rapidly develops into cancer in the pleura of the lungs. Pleural Mesothelioma is a common type of Mesothelioma that accounts for about 75% of all Mesothelioma diagnosed yearly in the U.S. Diagnosis of Mesothelioma takes several months and is expensive. Given the risk and constraints associated with PM diagnosis, early iden…
▽ More
Background: Pleural Mesothelioma (PM) is an unusual, belligerent tumor that rapidly develops into cancer in the pleura of the lungs. Pleural Mesothelioma is a common type of Mesothelioma that accounts for about 75% of all Mesothelioma diagnosed yearly in the U.S. Diagnosis of Mesothelioma takes several months and is expensive. Given the risk and constraints associated with PM diagnosis, early identification of this ailment is essential for patient health. Objective: In this study, we use artificial intelligence algorithms recommending the best fit model for early diagnosis and prognosis of MPM. Methods: We retrospectively retrieved patients clinical data collected by Dicle University, Turkey, and applied multilayered perceptron (MLP), voted perceptron (VP), Clojure classifier (CC), kernel logistic regression (KLR), stochastic gradient decent SGD), adaptive boosting (AdaBoost), Hoeffding tree (VFDT), and primal estimated sub-gradient solver for support vector machine (s-Pegasos). We evaluated the models, compared and tested using paired T-test (corrected) at 0.05 significance based on their respective classification accuracy, f-measure, precision, recall, root mean squared error, receivers characteristic curve (ROC), and precision-recall curve (PRC). Results: In phase-1, SGD, AdaBoost. M1, KLR, MLP, VFDT generate optimal results with the highest possible performance measures. In phase 2, AdaBoost, with a classification accuracy of 71.29%, outperformed all other algorithms. C-reactive protein, platelet count, duration of symptoms, gender, and pleural protein were found to be the most relevant predictors that can prognosticate Mesothelioma. Conclusion: This study confirms that data obtained from Biopsy and imagining tests are strong predictors of Mesothelioma but are associated with a high cost; however, they can identify Mesothelioma with optimal accuracy.
△ Less
Submitted 31 October, 2021;
originally announced November 2021.
-
Optimal Placement of Roadside Infrastructure Sensors towards Safer Autonomous Vehicle Deployments
Authors:
Roshan Vijay,
Jim Cherian,
Rachid Riah,
Niels de Boer,
Apratim Choudhury
Abstract:
Vehicles with driving automation are increasingly being developed for deployment across the world. However, the onboard sensing and perception capabilities of such automated or autonomous vehicles (AV) may not be sufficient to ensure safety under all scenarios and contexts. Infrastructure-augmented environment perception using roadside infrastructure sensors can be considered as an effective solut…
▽ More
Vehicles with driving automation are increasingly being developed for deployment across the world. However, the onboard sensing and perception capabilities of such automated or autonomous vehicles (AV) may not be sufficient to ensure safety under all scenarios and contexts. Infrastructure-augmented environment perception using roadside infrastructure sensors can be considered as an effective solution, at least for selected regions of interest such as urban road intersections or curved roads that present occlusions to the AV. However, they incur significant costs for procurement, installation and maintenance. Therefore these sensors must be placed strategically and optimally to yield maximum benefits in terms of the overall safety of road users. In this paper, we propose a novel methodology towards obtaining an optimal placement of V2X (Vehicle-to-everything) infrastructure sensors, which is particularly attractive to urban AV deployments, with various considerations including costs, coverage and redundancy. We combine the latest advances made in raycasting and linear optimization literature to deliver a tool for urban city planners, traffic analysis and AV deployment operators. Through experimental evaluation in representative environments, we prove the benefits and practicality of our approach.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Role of interfacial energy and liquid diffusivities on pattern formation during thin-film three-phase eutectic growth
Authors:
Sumeet Khanna,
Abhik Choudhury
Abstract:
In this paper, we investigate three-phase eutectic growth during thin-film directional solidification of a model symmetric ternary eutectic alloy. In contrast to two-phase eutectics that have only a single possibility, $αβαβ$..., as the growth pattern, during three-phase eutectic growth infinite possibilities exist. Here, we explore the possible existence of pattern selection influenced by the cha…
▽ More
In this paper, we investigate three-phase eutectic growth during thin-film directional solidification of a model symmetric ternary eutectic alloy. In contrast to two-phase eutectics that have only a single possibility, $αβαβ$..., as the growth pattern, during three-phase eutectic growth infinite possibilities exist. Here, we explore the possible existence of pattern selection influenced by the change in the solid-solid interfacial energies and the diffusivities. We begin the study by estimating the undercooling vs. spacing variation for the simplest possible configurations of pattern lengths 3 and 4, where phase-field simulations are utilized to quantify the influence of the solid-solid interfacial energy and the contrast in the component diffusivities. Subsequently, extended simulations consisting of multiple periods of $αβδ$... as well as $αβδβ$... are carried out for assessing the stability of the configurations to long-wavelength perturbations in spacing. Thereafter, growth competition among the simplest patterns is investigated through phase-field simulations of coupled growth of configurations of the type [$αβδ]_m[αβδβ]_n$, (m,n) being the respective number of periods. Finally, pattern selection is studied by initializing with random initial configurations and classifying the emerging patterns based on the phase sequences. The principal finding is that, while there is no strong phase selection, between the solid-solid interfacial energies and the contrast in the component diffusivities, we find the latter to strongly influence pattern morphology.
△ Less
Submitted 7 August, 2021;
originally announced August 2021.
-
Evidence for profile changes in PSR J1713+0747 using the uGMRT
Authors:
Jaikhomba Singha,
Mayuresh P Surnis,
Bhal Chandra Joshi,
Pratik Tarafdar,
Prerna Rana,
Abhimanyu Susobhanan,
Raghav Girgaonkar,
Neel Kolhe,
Nikita Agarwal,
Shantanu Desai,
T Prabu,
Adarsh Bathula,
Subhajit Dandapat,
Lankeswar Dey,
Shinnosuke Hisano,
Ryo Kato,
Divyansh Kharbanda,
Tomonosuke Kikunaga,
Piyush Marmat,
Sai Chaitanya Susarla,
Manjari Bagchi,
Neelam Dhanda Batra,
Arpita Choudhury,
A Gopakumar,
Yashwant Gupta
, et al. (7 additional authors not shown)
Abstract:
PSR J1713+0747 is one of the most precisely timed pulsars in the international pulsar timing array experiment. This pulsar showed an abrupt profile shape change between April 16, 2021 (MJD 59320) and April 17, 2021 (MJD 59321). In this paper, we report the results from multi-frequency observations of this pulsar carried out with the upgraded Giant Metrewave Radio Telescope (uGMRT) before and after…
▽ More
PSR J1713+0747 is one of the most precisely timed pulsars in the international pulsar timing array experiment. This pulsar showed an abrupt profile shape change between April 16, 2021 (MJD 59320) and April 17, 2021 (MJD 59321). In this paper, we report the results from multi-frequency observations of this pulsar carried out with the upgraded Giant Metrewave Radio Telescope (uGMRT) before and after the event. We demonstrate the profile change seen in Band 5 (1260 MHz - 1460 MHz) and Band 3 (300 MHz - 500 MHz). The timing analysis of this pulsar shows a disturbance accompanying this profile change followed by a recovery with a timescale of $\sim 159$ days. Our data suggest that a model with chromatic index as a free parameter is preferred over models with combinations of achromaticity with DM bump or scattering bump. We determine the frequency dependence to be $\simν^{+1.34}$.
△ Less
Submitted 16 August, 2021; v1 submitted 9 July, 2021;
originally announced July 2021.
-
A Knowledge graph representation of baseline characteristics for the Dutch proton therapy research registry
Authors:
Matthijs Sloep,
Petros Kalendralis,
Ananya Choudhury,
Lerau Seyben,
Jasper Snel,
Nibin Moni George,
Martijn Veening,
Johannes A. Langendijk,
Andre Dekker,
Johan van Soest,
Rianne Fijten
Abstract:
Cancer registries collect multisource data and provide valuable information that can lead to unique research opportunities. In the Netherlands, a registry and model-based approach (MBA) are used for the selection of patients that are eligible for proton therapy. We collected baseline characteristics including demographic, clinical, tumour and treatment information. These data were transformed into…
▽ More
Cancer registries collect multisource data and provide valuable information that can lead to unique research opportunities. In the Netherlands, a registry and model-based approach (MBA) are used for the selection of patients that are eligible for proton therapy. We collected baseline characteristics including demographic, clinical, tumour and treatment information. These data were transformed into a machine readable format using the FAIR (Findable, Accessible, Interoperable, Reusable) data principles and resulted in a knowledge graph with baseline characteristics of proton therapy patients. With this approach, we enable the possibility of linking external data sources and optimal flexibility to easily adapt the data structure of the existing knowledge graph to the needs of the clinic.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
High frequency stability estimates for a partial data inverse problem
Authors:
Anupam Pal Choudhury,
Venkateswaran P. Krishnan
Abstract:
In this article, high frequency stability estimates for the determination of the potential in the Schrödinger equation are studied when the boundary measurements are made on slightly more than half the boundary. The estimates reflect the increasing stability property with growing frequency.
In this article, high frequency stability estimates for the determination of the potential in the Schrödinger equation are studied when the boundary measurements are made on slightly more than half the boundary. The estimates reflect the increasing stability property with growing frequency.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Formation of solid-state dendrites under the influence of coherency stresses: A diffuse interface approach
Authors:
Bhalchandra Bhadak,
Tushar Jogi,
Saswata Bhattacharya,
Abhik Choudhury
Abstract:
In this paper, we have formulated a phase-field model based on the grand-potential functional for the simulation of precipitate growth in the presence of coherency stresses. In particular, we study the development of dendrite-like patterns arising out of diffusive instabilities during the growth of a precipitate in a supersaturated matrix. Here, we characterize the role of elastic energy anisotrop…
▽ More
In this paper, we have formulated a phase-field model based on the grand-potential functional for the simulation of precipitate growth in the presence of coherency stresses. In particular, we study the development of dendrite-like patterns arising out of diffusive instabilities during the growth of a precipitate in a supersaturated matrix. Here, we characterize the role of elastic energy anisotropy and its strength on the selection of a dendrite tip radius and velocity. We find that there is no selection of a unique tip shape as observed in the case of solidification, and the selection constant $σ^{*}=2d_0D/R_{tip}^{2}V_{tip}$ increases linearly with simulation time for all the simulation conditions (where $R_{tip}$ and $V_{tip}$ are the tip radius and velocity). Therefore, structures derived in solid-state in the presence of elastic anisotropy may only be referred to as dendrite-like.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
The IITM Earth System Model (IITM ESM)
Authors:
R. Krishnan,
P. Swapna,
Ayantika Dey Choudhury,
Sandeep Narayansetti,
A. G. Prajeesh,
Manmeet Singh,
Aditi Modi,
Roxy Mathew,
Ramesh Vellore,
J. Jyoti,
T. P. Sabin,
J. Sanjay,
Sandip Ingle
Abstract:
Earth System Models (ESM) are important tools that allow us to understand and quantify the physical, chemical & biological mechanisms governing the rates of change of elements of the Earth System, comprising of the atmosphere, ocean, land, cryosphere and biosphere (terrestrial and marine) and related components. ESMs are essentially coupled numerical models which incorporate processes within and a…
▽ More
Earth System Models (ESM) are important tools that allow us to understand and quantify the physical, chemical & biological mechanisms governing the rates of change of elements of the Earth System, comprising of the atmosphere, ocean, land, cryosphere and biosphere (terrestrial and marine) and related components. ESMs are essentially coupled numerical models which incorporate processes within and across the different Earth system components and are expressed as set of mathematical equations. ESMs are useful for enhancing our fundamental understanding of the climate system, its multi-scale variability, global and regional climatic phenomena and making projections of future climate change. In this chapter, we briefly describe the salient aspects of the Indian Institute of Tropical Meteorology ESM (IITM ESM), that has been developed recently at the IITM, Pune, India, for investigating long-term climate variability and change with focus on the South Asian monsoon.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
A short perspective on the Mascarene High and the abnormal Indian Monsoon during 2015
Authors:
R. Krishnan,
Bhupendra Singh,
R. Vellore,
M. Mujumdar,
P. Swapna,
Ayantika Choudhury,
Manmeet Singh,
B. Preethi,
M. Rajeevan
Abstract:
The initiation of the Indian summer monsoon circulation during late May / early June arises through large-scale land-sea thermal contrast and setting up of negative pressure gradient between the Monsoon Trough over the Indo-Gangetic plains and the Mascarene High over the subtropical Indian Ocean. The meridional pressure gradient together with the Earth's rotation (Coriolis force) creates the summe…
▽ More
The initiation of the Indian summer monsoon circulation during late May / early June arises through large-scale land-sea thermal contrast and setting up of negative pressure gradient between the Monsoon Trough over the Indo-Gangetic plains and the Mascarene High over the subtropical Indian Ocean. The meridional pressure gradient together with the Earth's rotation (Coriolis force) creates the summer monsoon cross-equatorial flow, while feedbacks between moisture-laden winds and latent heat release from precipitating systems maintain the monsoon circulation during the June-September (JJAS) rainy season (Krishnamurti and Surgi, 1987). This simplified view of the Indian monsoon is a useful starting point to draw insights into the variability of the large-scale monsoon circulation.
△ Less
Submitted 24 November, 2020; v1 submitted 23 November, 2020;
originally announced November 2020.
-
Electroweakino searches at the HL-LHC in the baryon number violating MSSM
Authors:
Rahool Kumar Barman,
Biplob Bhattacherjee,
Indrani Chakraborty,
Arghya Choudhury,
Najimuddin Khan
Abstract:
The projected reach of direct electroweakino searches at the HL-LHC ($\sqrt{s}=14~{\rm TeV}, ~3000~{\rm fb^{-1}}$ LHC) in the framework of simplified models with R-parity violating (RPV) operators: $λ_{112}^{\prime \prime}u^{c}d^{c}s^{c}$ and $λ_{113}^{\prime\prime}u^{c}d^{c}b^{c}$, is studied. Four different analysis channels are chosen: $Wh$ mediated $1l+2b+jets+\rm E{\!\!\!/}_T$, $Wh$ mediated…
▽ More
The projected reach of direct electroweakino searches at the HL-LHC ($\sqrt{s}=14~{\rm TeV}, ~3000~{\rm fb^{-1}}$ LHC) in the framework of simplified models with R-parity violating (RPV) operators: $λ_{112}^{\prime \prime}u^{c}d^{c}s^{c}$ and $λ_{113}^{\prime\prime}u^{c}d^{c}b^{c}$, is studied. Four different analysis channels are chosen: $Wh$ mediated $1l+2b+jets+\rm E{\!\!\!/}_T$, $Wh$ mediated $1l+2γ+jets+\rm E{\!\!\!/}_T$, $WZ$ mediated $3l+jets+\rm E{\!\!\!/}_T$ and $WZ$ mediated $3l+2b+jets+\rm E{\!\!\!/}_T$ and the projected exclusion/discovery reach of direct wino searches in these channels is analyzed by performing a detailed cut based collider analysis. The projected exclusion contour reaches up to $600-700~{\rm GeV}$ for a massless bino-like $χ_{1}^{0}$ from searches in the $Wh$ mediated $1l+2b+jets+\rm E{\!\!\!/}_T$, $Wh$ mediated $1l+2γ+jets+\rm E{\!\!\!/}_T$ and $WZ$ mediated $3l+jets+\rm E{\!\!\!/}_T$ channels, while the $WZ$ mediated $3l+2b+jets+\rm E{\!\!\!/}_T$ search channel is found to have a projected exclusion reach up to $600~{\rm GeV}$ for $150~{\rm GeV} < M_{χ_{1}^{0}} < 250~{\rm GeV}$. The baryon number violating simplified scenario considered in this work is found to furnish a weaker projected reach (typically by a factor of $\sim 1/2$) than the R-parity conserving (RPC) case. The projected reach at the HL-LHC in these four channels is also recast for realistic benchmark scenarios.
△ Less
Submitted 6 January, 2021; v1 submitted 24 March, 2020;
originally announced March 2020.
-
Missing Data Imputation for Classification Problems
Authors:
Arkopal Choudhury,
Michael R. Kosorok
Abstract:
Imputation of missing data is a common application in various classification problems where the feature training matrix has missingness. A widely used solution to this imputation problem is based on the lazy learning technique, $k$-nearest neighbor (kNN) approach. However, most of the previous work on missing data does not take into account the presence of the class label in the classification pro…
▽ More
Imputation of missing data is a common application in various classification problems where the feature training matrix has missingness. A widely used solution to this imputation problem is based on the lazy learning technique, $k$-nearest neighbor (kNN) approach. However, most of the previous work on missing data does not take into account the presence of the class label in the classification problem. Also, existing kNN imputation methods use variants of Minkowski distance as a measure of distance, which does not work well with heterogeneous data. In this paper, we propose a novel iterative kNN imputation technique based on class weighted grey distance between the missing datum and all the training data. Grey distance works well in heterogeneous data with missing instances. The distance is weighted by Mutual Information (MI) which is a measure of feature relevance between the features and the class label. This ensures that the imputation of the training data is directed towards improving classification performance. This class weighted grey kNN imputation algorithm demonstrates improved performance when compared to other kNN imputation algorithms, as well as standard imputation algorithms such as MICE and missForest, in imputation and classification problems. These problems are based on simulated scenarios and UCI datasets with various rates of missingness.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
PoWER-BERT: Accelerating BERT Inference via Progressive Word-vector Elimination
Authors:
Saurabh Goyal,
Anamitra R. Choudhury,
Saurabh M. Raje,
Venkatesan T. Chakaravarthy,
Yogish Sabharwal,
Ashish Verma
Abstract:
We develop a novel method, called PoWER-BERT, for improving the inference time of the popular BERT model, while maintaining the accuracy. It works by: a) exploiting redundancy pertaining to word-vectors (intermediate encoder outputs) and eliminating the redundant vectors. b) determining which word-vectors to eliminate by develo** a strategy for measuring their significance, based on the self-att…
▽ More
We develop a novel method, called PoWER-BERT, for improving the inference time of the popular BERT model, while maintaining the accuracy. It works by: a) exploiting redundancy pertaining to word-vectors (intermediate encoder outputs) and eliminating the redundant vectors. b) determining which word-vectors to eliminate by develo** a strategy for measuring their significance, based on the self-attention mechanism. c) learning how many word-vectors to eliminate by augmenting the BERT model and the loss function. Experiments on the standard GLUE benchmark shows that PoWER-BERT achieves up to 4.5x reduction in inference time over BERT with <1% loss in accuracy. We show that PoWER-BERT offers significantly better trade-off between accuracy and inference time compared to prior methods. We demonstrate that our method attains up to 6.8x reduction in inference time with <1% loss in accuracy when applied over ALBERT, a highly compressed version of BERT. The code for PoWER-BERT is publicly available at https://github.com/IBM/PoWER-BERT.
△ Less
Submitted 8 September, 2020; v1 submitted 24 January, 2020;
originally announced January 2020.
-
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Authors:
Harsh Chaudhari,
Ashish Choudhury,
Arpita Patra,
Ajith Suresh
Abstract:
The concrete efficiency of secure computation has been the focus of many recent works. In this work, we present concretely-efficient protocols for secure $3$-party computation (3PC) over a ring of integers modulo $2^{\ell}$ tolerating one corruption, both with semi-honest and malicious security. Owing to the fact that computation over ring emulates computation over the real-world system architectu…
▽ More
The concrete efficiency of secure computation has been the focus of many recent works. In this work, we present concretely-efficient protocols for secure $3$-party computation (3PC) over a ring of integers modulo $2^{\ell}$ tolerating one corruption, both with semi-honest and malicious security. Owing to the fact that computation over ring emulates computation over the real-world system architectures, secure computation over ring has gained momentum of late.
Cast in the offline-online paradigm, our constructions present the most efficient online phase in concrete terms. In the semi-honest setting, our protocol requires communication of $2$ ring elements per multiplication gate during the {\it online} phase, attaining a per-party cost of {\em less than one element}. This is achieved for the first time in the regime of 3PC. In the {\it malicious} setting, our protocol requires communication of $4$ elements per multiplication gate during the online phase, beating the state-of-the-art protocol by $5$ elements. Realized with both the security notions of selective abort and fairness, the malicious protocol with fairness involves slightly more communication than its counterpart with abort security for the output gates {\em alone}.
We apply our techniques from $3$PC in the regime of secure server-aided machine-learning (ML) inference for a range of prediction functions-- linear regression, linear SVM regression, logistic regression, and linear SVM classification. Our setting considers a model-owner with trained model parameters and a client with a query, with the latter willing to learn the prediction of her query based on the model parameters of the former. The inputs and computation are outsourced to a set of three non-colluding servers. Our constructions catering to both semi-honest and the malicious world, invariably perform better than the existing constructions.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.
-
SLSNet: Skin lesion segmentation using a lightweight generative adversarial network
Authors:
Md. Mostafa Kamal Sarker,
Hatem A. Rashwan,
Farhan Akram,
Vivek Kumar Singh,
Syeda Furruka Banu,
Forhad U H Chowdhury,
Kabir Ahmed Choudhury,
Sylvie Chambon,
Petia Radeva,
Domenec Puig,
Mohamed Abdel-Nasser
Abstract:
The determination of precise skin lesion boundaries in dermoscopic images using automated methods faces many challenges, most importantly, the presence of hair, inconspicuous lesion edges and low contrast in dermoscopic images, and variability in the color, texture and shapes of skin lesions. Existing deep learning-based skin lesion segmentation algorithms are expensive in terms of computational t…
▽ More
The determination of precise skin lesion boundaries in dermoscopic images using automated methods faces many challenges, most importantly, the presence of hair, inconspicuous lesion edges and low contrast in dermoscopic images, and variability in the color, texture and shapes of skin lesions. Existing deep learning-based skin lesion segmentation algorithms are expensive in terms of computational time and memory. Consequently, running such segmentation algorithms requires a powerful GPU and high bandwidth memory, which are not available in dermoscopy devices. Thus, this article aims to achieve precise skin lesion segmentation with minimum resources: a lightweight, efficient generative adversarial network (GAN) model called SLSNet, which combines 1-D kernel factorized networks, position and channel attention, and multiscale aggregation mechanisms with a GAN model. The 1-D kernel factorized network reduces the computational cost of 2D filtering. The position and channel attention modules enhance the discriminative ability between the lesion and non-lesion feature representations in spatial and channel dimensions, respectively. A multiscale block is also used to aggregate the coarse-to-fine features of input skin images and reduce the effect of the artifacts. SLSNet is evaluated on two publicly available datasets: ISBI 2017 and the ISIC 2018. Although SLSNet has only 2.35 million parameters, the experimental results demonstrate that it achieves segmentation results on a par with the state-of-the-art skin lesion segmentation methods with an accuracy of 97.61%, and Dice and Jaccard similarity coefficients of 90.63% and 81.98%, respectively. SLSNet can run at more than 110 frames per second (FPS) in a single GTX1080Ti GPU, which is faster than well-known deep learning-based image segmentation models, such as FCN. Therefore, SLSNet can be used for practical dermoscopic applications.
△ Less
Submitted 17 June, 2021; v1 submitted 1 July, 2019;
originally announced July 2019.
-
On the role of variable surface viscosity in free viscous films
Authors:
Anjishnu Choudhury,
Venkatesh Kumar Paidi,
Sreeram K. Kalpathy,
Harish N. Dixit
Abstract:
The stability of a thin liquid film bounded by two free surfaces is examined in the presence of insoluble surface active agents. The surface active agents not only cause gradients in surface tension, but could also render surface viscosity to be significant, and variable, as a function of their concentration. A set of three coupled nonlinear evolution equations are derived for the film height, con…
▽ More
The stability of a thin liquid film bounded by two free surfaces is examined in the presence of insoluble surface active agents. The surface active agents not only cause gradients in surface tension, but could also render surface viscosity to be significant, and variable, as a function of their concentration. A set of three coupled nonlinear evolution equations are derived for the film height, concentration of surface active agents, and the horizontal liquid velocity which governs the dynamics of the free film. Suitable phenomenological models for variation of surface tension and surface viscosity with the concentration of surface active agents are incorporated in the interfacial stress boundary condition. Linear stability analysis reveals the effect of various non-dimensional parameters, specifically the retarding nature of surface viscosity and Marangoni effects on film rupture. An analysis of the `jamming' limit of surfactant concentration reveals that $Γ_0^{(nl)}<3 \mathbb{D}/M$ is a sufficient criteria for instability of the system, where $Γ_0^{(nl)}$ is a normalized initial surface particle concentration, $\mathbb{D}$ is the disjoining pressure number and $\textit{M}$ is the Marangoni number. Nonlinear simulations suggest film profiles at rupture are also qualitatively different from those reported in earlier studies, revealing that free films in the jamming limit are remarkably stable and their free surfaces behave like immobile interfaces. Furthermore, self-similar exponents extracted from our nonlinear simulations are used to explain topological differences between zero and constant surface viscosity in the vicinity of rupture.
△ Less
Submitted 28 February, 2019;
originally announced February 2019.
-
Hourly Forecasting of Emergency Department Arrivals : Time Series Analysis
Authors:
Avishek Choudhury
Abstract:
Background: The stochastic behavior of patient arrival at an emergency department (ED) complicates the management of an ED. More than 50% of hospitals ED capacity tends to operate beyond its normal capacity and eventually fails to deliver high-quality care. To address the concern of stochastics ED arrivals, many types of research has been done using yearly, monthly and weekly time series forecasti…
▽ More
Background: The stochastic behavior of patient arrival at an emergency department (ED) complicates the management of an ED. More than 50% of hospitals ED capacity tends to operate beyond its normal capacity and eventually fails to deliver high-quality care. To address the concern of stochastics ED arrivals, many types of research has been done using yearly, monthly and weekly time series forecasting. Aim: Our research team believes that hourly time-series forecasting of the load can improve ED management by predicting the arrivals of future patients, and thus, can support strategic decisions in terms of quality enhancement. Methods: Our research does not involve any human subject, only ED admission data from January 2014 to August 2017 retrieved from the UnityPoint Health database. Autoregressive integrated moving average (ARIMA), Holt Winters, TBATS, and neural network methods were implemented to forecast hourly ED patient arrival. Findings: ARIMA (3,0,0) (2,1,0) was selected as the best fit model with minimum Akaike information criterion and Schwartz Bayesian criterion. The model was stationary and qualified the Box Ljung correlation test and the Jarque Bera test for normality. The mean error (ME) and root mean square error (RMSE) were selected as performance measures. An ME of 1.001 and an RMSE of 1.55 was obtained. Conclusions: ARIMA can be used to provide hourly forecasts for ED arrivals and can be utilized as a decision support system in the healthcare industry. Application: This technique can be implemented in hospitals worldwide to predict ED patient arrival.
△ Less
Submitted 5 January, 2019;
originally announced January 2019.