-
Mitigation of fine hydrophobic liquid aerosols by polydispersed uncharged and charged water droplets
Authors:
Debabrat Biswal,
Bahni Ray,
Debabrata Dasgupta,
Rochish M. Thaokar,
Y. S. Mayya
Abstract:
One of the harmful contaminants in the atmosphere, which negatively affects the well-being of both humans and animals, is the suspended respirable particles. The most difficult aspect of the study is now removing these fine respirable particles from the atmosphere. This study investigates the scavenging phenomenon of fine hydrophobic liquid aerosols (10 nm to 1050 nm) by uncharged and charged drop…
▽ More
One of the harmful contaminants in the atmosphere, which negatively affects the well-being of both humans and animals, is the suspended respirable particles. The most difficult aspect of the study is now removing these fine respirable particles from the atmosphere. This study investigates the scavenging phenomenon of fine hydrophobic liquid aerosols (10 nm to 1050 nm) by uncharged and charged droplets in a self-made scaled test rig. In this study, a hollow cone nozzle with a 1 mm orifice diameter uses tap water to disperse liquid into fine droplets. The paraffin oil and Di-Ethyl-Hexyl-Sebacat (DEHS) solution are aerosolized to be scavenged by water droplets. This research employs a high-speed imaging technique and theoretical modeling approach to measure the size distribution and charge acquired by water droplets respectively. The findings of this study show that uncharged droplets dispersed
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Charged drop im**ing on particles dispersed over a metallic plate: A method of particle cleaning
Authors:
D. Biswal,
S. K. Saroj,
B. Ray,
Debabrata Dasgupta,
R. M. Thaokar,
Y. S. Mayya
Abstract:
An electric field applied to a droplet im**ing on a hydrophobic surface has an extensive variety of applications, including ant-icing, heat transfer enhancement, self-cleaning, droplet manipulation, and electrostatic spraying. The present study demonstrates an effective method of particle removal using a charged droplet. This method employs a pin-plate electrode setup to investigate the dynamics…
▽ More
An electric field applied to a droplet im**ing on a hydrophobic surface has an extensive variety of applications, including ant-icing, heat transfer enhancement, self-cleaning, droplet manipulation, and electrostatic spraying. The present study demonstrates an effective method of particle removal using a charged droplet. This method employs a pin-plate electrode setup to investigate the dynamics of a charged droplet impact on the surface covered with particles. The particles of different properties such as wettability, electrical conductivity, etc. have been used. Silane-coated glass beads, carbon black, and glass beads are dispersed over the ground copper electrode. The applied potential is also varied from 2 kV to 4 kV. A high-speed imaging is employed to visualize the drop motion, dynamic behavior, and self-cleaning phenomenon. The experimental results indicate that drop generation and impact occur at applied potentials of 2.5, 3, and 3.5 kV, in contrast, at 2 kV, there is no droplet pinch-off. At 4 kV, electric breakdown and bridging of the droplet between the capillary and ground electrode are observed. The drop impact on the silane-coated glass bead leads to their attachment due to the adhesiveness of the particles and the droplet. The silane-coated particles are removed from the droplet surface due to the deformation of the drop and the electric repulsive force. In the case of carbon black and glass beads, the particles are captured by the droplet due to the electrostatic force of attraction. Higher electric potentials lead to an increased spreading diameter of the droplet. The higher electric field enhances the contact area between the droplet and the particles, thereby removing more particles.
△ Less
Submitted 16 June, 2024;
originally announced June 2024.
-
Characteristic classes on certain quotients of Stiefel manifolds
Authors:
Debanil Dasgupta
Abstract:
In this paper, we calculate characteristic classes for certain quotients of real Stiefel manifolds $V_{n,k}$ and then derive results on certain numerical invariants, such as characteristic rank and skew embedding dimension, for those spaces.
In this paper, we calculate characteristic classes for certain quotients of real Stiefel manifolds $V_{n,k}$ and then derive results on certain numerical invariants, such as characteristic rank and skew embedding dimension, for those spaces.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
The flow of ideas in word embeddings
Authors:
Debayan Dasgupta
Abstract:
The flow of ideas has been extensively studied by physicists, psychologists, and machine learning engineers. This paper adopts specific tools from microrheology to investigate the similarity-based flow of ideas. We introduce a random walker in word embeddings and study its behavior. Such similarity-mediated random walks through the embedding space show signatures of anomalous diffusion commonly ob…
▽ More
The flow of ideas has been extensively studied by physicists, psychologists, and machine learning engineers. This paper adopts specific tools from microrheology to investigate the similarity-based flow of ideas. We introduce a random walker in word embeddings and study its behavior. Such similarity-mediated random walks through the embedding space show signatures of anomalous diffusion commonly observed in complex structured systems such as biological cells and complex fluids. The paper concludes by proposing the application of popular tools employed in the study of random walks and diffusion of particles under Brownian motion to assess quantitatively the incorporation of diverse ideas in a document. Overall, this paper presents a self-referenced method combining microrheology and machine learning concepts to explore the meandering tendencies of language models and their potential association with creativity.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Eating Smart: Free-ranging dogs follow an optimal foraging strategy while scavenging in groups
Authors:
Rohan Sarkar,
Sreelekshmi R,
Abhijit Nayek,
Anirban Bhowmick,
Poushali Chakraborty,
Rituparna Sonowal,
Debsruti Dasgupta,
Rounak Banerjee,
Aritra Roy,
Amartya Baran Mandal,
Anindita Bhadra
Abstract:
Foraging and acquiring of food is a delicate balance between managing the costs, both energy and social, and individual preferences. Previous research on the solitary foraging of free ranging dogs showed that they prioritized the nutritionally highest valued food patch first but do not ignore other less valuable food either, displaying typical scavenger behaviour. The current experiment was carrie…
▽ More
Foraging and acquiring of food is a delicate balance between managing the costs, both energy and social, and individual preferences. Previous research on the solitary foraging of free ranging dogs showed that they prioritized the nutritionally highest valued food patch first but do not ignore other less valuable food either, displaying typical scavenger behaviour. The current experiment was carried out on groups of dogs with the same set up to see the change in foraging strategies, if any, under the influence of social cost like intra-group competition. We found multiple differences between the strategies of dogs foraging alone versus in groups with competition playing an implicit role in the decision making of dogs when foraging in groups. Dogs were able to continually assess and evaluate the available resources in a patch and adjust their behaviour accordingly. Foraging in groups also provided benefits of reduced individual vigilance. The various decisions and choices made seemed to have a basis in the optimal foraging theory wherein the dogs harvested the nutritionally richest patch possible with the least risk and cost involved but was willing to compromise if that was not possible. This underscores the cognitive, quick decision-making abilities and adaptable behaviour of these dogs.
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
$p$-local decompositions of projective Stiefel manifolds
Authors:
Samik Basu,
Debanil Dasgupta,
Shilpa Gondhali,
Swagata Sarkar
Abstract:
The main objective of this paper is to analyze the $p$-local homotopy type of the complex projective Stiefel manifolds, and other analogous quotients of Stiefel manifolds. We take the cue from a result of Yamaguchi about the $p$-regularity of the complex Stiefel manifolds which lays down some hypotheses under which the Stiefel manifold is $p$-locally a product of odd dimensional spheres. We show t…
▽ More
The main objective of this paper is to analyze the $p$-local homotopy type of the complex projective Stiefel manifolds, and other analogous quotients of Stiefel manifolds. We take the cue from a result of Yamaguchi about the $p$-regularity of the complex Stiefel manifolds which lays down some hypotheses under which the Stiefel manifold is $p$-locally a product of odd dimensional spheres. We show that in many cases, the projective Stiefel manifolds are $p$-locally a product of a complex projective space and some odd dimensional spheres. As an application, we prove that in these cases, the $p$-regularity result of Yamaguchi is also $S^1$-equivariant.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Elasticity can affect droplet coalescence
Authors:
Sarath Chandra Varma,
Debayan Dasgupta,
Aloke Kumar
Abstract:
Recent investigations on the coalescence of polymeric droplets on a solid substrate have reported strong disagreements; the heart of the issue is whether coalescence of polymeric drops is similar to that of Newtonian fluid and is independent of molecular relaxation, or whether the role of entanglement of polymeric chains leads to a transition kinetics different from that of Newtonian fluid. Via th…
▽ More
Recent investigations on the coalescence of polymeric droplets on a solid substrate have reported strong disagreements; the heart of the issue is whether coalescence of polymeric drops is similar to that of Newtonian fluid and is independent of molecular relaxation, or whether the role of entanglement of polymeric chains leads to a transition kinetics different from that of Newtonian fluid. Via this report, we resolve the disagreements through a discussion on the effects of merging method on the dominant forces governing the coalescence process, i.e., inertia, dissipation, and relaxation. Our study unveils that the coalescence dynamics of polymeric drops is not universal and in fact, it is contingent of the method by which the coalescence is triggered. Additionally, we demonstrate the spatial features of the bridge at different time instants by a similarity analysis. We also theoretically obtain a universal bridge profile by employing the similarity parameter in a modified thin film lubrication equation for polymeric fluids.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging
Authors:
Lokesh Chandra Das,
Dipankar Dasgupta,
Myounggyu Won
Abstract:
Dynamic wireless charging (DWC) is an emerging technology that allows electric vehicles (EVs) to be wirelessly charged while in motion. It is gaining significant momentum as it can potentially address the range limitation issue for EVs. However, due to significant power loss caused by wireless power transfer, improving charging efficiency remains as a major challenge for DWC systems. This paper pr…
▽ More
Dynamic wireless charging (DWC) is an emerging technology that allows electric vehicles (EVs) to be wirelessly charged while in motion. It is gaining significant momentum as it can potentially address the range limitation issue for EVs. However, due to significant power loss caused by wireless power transfer, improving charging efficiency remains as a major challenge for DWC systems. This paper presents the first LSTM-based vehicle motion control system for DWC designed to maximize charging efficiency. The dynamics of the electromagnetic field generated by the transmitter coils of a DWC system are modeled based on a multi-layer LSTM. The LSTM model is used to make a prediction of the lateral position where the electromagnetic strength is expected to be maximal and to control the EV motion accordingly to optimize charging efficiency. Simulations were conducted to demonstrate that our LSTM-based approach achieves by up to 162.3% higher charging efficiency compared with state-of-the-art vehicle motion control systems focused on kee** an EV in the center of lane.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
BP-cohomology of projective Stiefel manifolds
Authors:
Samik Basu,
Debanil Dasgupta
Abstract:
In this paper, we compute the BP-cohomology of complex projective Stiefel manifolds. The method involves the homotopy fixed point spectral sequence, and works for complex oriented cohomology theories. We also use these calculations and BP-operations to prove new results about equivariant maps between Stiefel manifolds.
In this paper, we compute the BP-cohomology of complex projective Stiefel manifolds. The method involves the homotopy fixed point spectral sequence, and works for complex oriented cohomology theories. We also use these calculations and BP-operations to prove new results about equivariant maps between Stiefel manifolds.
△ Less
Submitted 10 September, 2021;
originally announced September 2021.
-
Who is Responsible for Adversarial Defense?
Authors:
Kishor Datta Gupta,
Dipankar Dasgupta
Abstract:
We have seen a surge in research aims toward adversarial attacks and defenses in AI/ML systems. While it is crucial to formulate new attack methods and devise novel defense strategies for robustness, it is also imperative to recognize who is responsible for implementing, validating, and justifying the necessity of these defenses. In particular, which components of the system are vulnerable to what…
▽ More
We have seen a surge in research aims toward adversarial attacks and defenses in AI/ML systems. While it is crucial to formulate new attack methods and devise novel defense strategies for robustness, it is also imperative to recognize who is responsible for implementing, validating, and justifying the necessity of these defenses. In particular, which components of the system are vulnerable to what type of adversarial attacks, and the expertise needed to realize the severity of adversarial attacks. Also how to evaluate and address the adversarial challenges in order to recommend defense strategies for different applications. This paper opened a discussion on who should examine and implement the adversarial defenses and the reason behind such efforts.
△ Less
Submitted 27 June, 2021;
originally announced June 2021.
-
Negative Selection Algorithm Research and Applications in the last decade: A Review
Authors:
Kishor Datta Gupta,
Dipankar Dasgupta
Abstract:
The Negative selection Algorithm (NSA) is one of the important methods in the field of Immunological Computation (or Artificial Immune Systems). Over the years, some progress was made which turns this algorithm (NSA) into an efficient approach to solve problems in different domain. This review takes into account these signs of progress during the last decade and categorizes those based on differen…
▽ More
The Negative selection Algorithm (NSA) is one of the important methods in the field of Immunological Computation (or Artificial Immune Systems). Over the years, some progress was made which turns this algorithm (NSA) into an efficient approach to solve problems in different domain. This review takes into account these signs of progress during the last decade and categorizes those based on different characteristics and performances. Our study shows that NSA's evolution can be labeled in four ways highlighting the most notable NSA variations and their limitations in different application domains. We also present alternative approaches to NSA for comparison and analysis. It is evident that NSA performs better for nonlinear representation than most of the other methods, and it can outperform neural-based models in computation time. We summarize NSA's development and highlight challenges in NSA research in comparison with other similar models.
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
Authors:
Manoj Basnet,
Subash Poudyal,
Mohd. Hasan Ali,
Dipankar Dasgupta
Abstract:
The Supervisory control and data acquisition (SCADA) systems have been continuously leveraging the evolution of network architecture, communication protocols, next-generation communication techniques (5G, 6G, Wi-Fi 6), and the internet of things (IoT). However, SCADA system has become the most profitable and alluring target for ransomware attackers. This paper proposes the deep learning-based nove…
▽ More
The Supervisory control and data acquisition (SCADA) systems have been continuously leveraging the evolution of network architecture, communication protocols, next-generation communication techniques (5G, 6G, Wi-Fi 6), and the internet of things (IoT). However, SCADA system has become the most profitable and alluring target for ransomware attackers. This paper proposes the deep learning-based novel ransomware detection framework in the SCADA controlled electric vehicle charging station (EVCS) with the performance analysis of three deep learning algorithms, namely deep neural network (DNN), 1D convolution neural network (CNN), and long short-term memory (LSTM) recurrent neural network. All three-deep learning-based simulated frameworks achieve around 97% average accuracy (ACC), more than 98% of the average area under the curve (AUC), and an average F1-score under 10-fold stratified cross-validation with an average false alarm rate (FAR) less than 1.88%. Ransomware driven distributed denial of service (DDoS) attack tends to shift the SOC profile by exceeding the SOC control thresholds. The severity has been found to increase as the attack progress and penetration increases. Also, ransomware driven false data injection (FDI) attack has the potential to damage the entire BES or physical system by manipulating the SOC control thresholds. It's a design choice and optimization issue that a deep learning algorithm can deploy based on the tradeoffs between performance metrics.
△ Less
Submitted 15 April, 2021;
originally announced April 2021.
-
Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
Authors:
Kishor Datta Gupta,
Zahid Akhtar,
Dipankar Dasgupta
Abstract:
Develo** secure machine learning models from adversarial examples is challenging as various methods are continually being developed to generate adversarial attacks. In this work, we propose an evolutionary approach to automatically determine Image Processing Techniques Sequence (IPTS) for detecting malicious inputs. Accordingly, we first used a diverse set of attack methods including adaptive at…
▽ More
Develo** secure machine learning models from adversarial examples is challenging as various methods are continually being developed to generate adversarial attacks. In this work, we propose an evolutionary approach to automatically determine Image Processing Techniques Sequence (IPTS) for detecting malicious inputs. Accordingly, we first used a diverse set of attack methods including adaptive attack methods (on our defense) to generate adversarial samples from the clean dataset. A detection framework based on a genetic algorithm (GA) is developed to find the optimal IPTS, where the optimality is estimated by different fitness measures such as Euclidean distance, entropy loss, average histogram, local binary pattern and loss functions. The "image difference" between the original and processed images is used to extract the features, which are then fed to a classification scheme in order to determine whether the input sample is adversarial or clean. This paper described our methodology and performed experiments using multiple data-sets tested with several adversarial attacks. For each attack-type and dataset, it generates unique IPTS. A set of IPTS selected dynamically in testing time which works as a filter for the adversarial attack. Our empirical experiments exhibited promising results indicating the approach can efficiently be used as processing for any AI model.
△ Less
Submitted 7 July, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Analysis of chemical pathways for n-dodecane/air turbulent premixed flames
Authors:
D. Dasgupta,
W. Sun,
M. Day,
A. J. Aspden,
nd T. Lieuwen
Abstract:
This paper analyzes turbulence-chemistry interactions for an n-dodecane-air flame, focusing on the degree to which fuel oxidation pathways change in turbulent flames relative to their corresponding laminar flames. This work is based on a lean n-dodecane-air flame DNS database from Aspden et al. (Proc. Combust. Institute, 36 (2017) 2005-2016). The relative roles of dominant reactions that release h…
▽ More
This paper analyzes turbulence-chemistry interactions for an n-dodecane-air flame, focusing on the degree to which fuel oxidation pathways change in turbulent flames relative to their corresponding laminar flames. This work is based on a lean n-dodecane-air flame DNS database from Aspden et al. (Proc. Combust. Institute, 36 (2017) 2005-2016). The relative roles of dominant reactions that release heat and produce/consume radicals are examined at various turbulence intensities and compared with stretched flame calculations from counterflow flames and perfectly stirred reactors. These results show that spatially integrated (i.e. integrated heat release or radical production rate metrics averaged over the entire flame) chemical pathways are relatively insensitive to turbulence intensity and mimic the behavior of stretched flames. In other words, the contribution of a given reaction to heat release or radical production, integrated over the entire flame, is nearly independent to turbulence. Localized analysis conditioned on topological feature of the flame and on temperature is also performed. The former analysis reveals that much larger alteration of pathways occurs in the positively-curved regions of the flame. The latter localized analysis shows that peak activity in the low temperature (i.e. below 1200K) region shift towards higher temperatures with increases in Karlovitz number. This result is particularly interesting given that prior work with lighter fuels showed the opposite behavior suggesting a disparate response of the reactions involved in the fuel oxidation process to increased turbulence.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
Electrothermally modulated stop-go microvalves for capillary transport systems
Authors:
Golak Kunti,
Debabrata DasGupta,
Anandaroop Bhattacharya,
Suman Chakraborty
Abstract:
In this article, we show a novel approach to implementing valving action in a dynamically evolving capillary filling process, by exploiting alternating current electrothermal (ACET) mechanism. The surfaces of the top and bottom walls of the capillary are asymmetrically patched with two different wettabilities. Our observations reveal that by exploiting an intricate interplay of the electrothermal…
▽ More
In this article, we show a novel approach to implementing valving action in a dynamically evolving capillary filling process, by exploiting alternating current electrothermal (ACET) mechanism. The surfaces of the top and bottom walls of the capillary are asymmetrically patched with two different wettabilities. Our observations reveal that by exploiting an intricate interplay of the electrothermal effects and interfacial tension modulation, the acceleration-deceleration motion of the interface and interface pinning at specific locations may be delicately tuned. This, in turn, modulates the flow speed and residence time of the interface at designated locations, with a simple tuning of the frequency of the electrical signal. The present study, thus, unveils a novel micro valving mechanism achieved via effective manoeuvring of the interfacial electrochemistry where active and passive control mechanisms can be utilized simultaneously to achieve control over the interfacial motion of the two-phase system. This may bear far-reaching consequence in optimizing several applications in the bio-microfluidic domain, including devising novel miniaturized platforms for locally investigating reaction chemistries.
△ Less
Submitted 17 April, 2018;
originally announced April 2018.
-
A theoretical approach to understand spatial organization in complex ecologies
Authors:
Ahmed Roman,
Debanjan Dasgupta,
Michel Pleimling
Abstract:
Predicting the fate of ecologies is a daunting, albeit extremely important, task. As part of this task one needs to develop an understanding of the organization, hierarchies, and correlations among the species forming the ecology. Focusing on complex food networks we present a theoretical method that allows to achieve this understanding. Starting from the adjacency matrix the method derives specif…
▽ More
Predicting the fate of ecologies is a daunting, albeit extremely important, task. As part of this task one needs to develop an understanding of the organization, hierarchies, and correlations among the species forming the ecology. Focusing on complex food networks we present a theoretical method that allows to achieve this understanding. Starting from the adjacency matrix the method derives specific matrices that encode the various inter-species relationships. The full potential of the method is achieved in a spatial setting where one obtains detailed predictions for the emerging space-time patterns. For a variety of cases these theoretical predictions are verified through numerical simulations.
△ Less
Submitted 6 May, 2016;
originally announced May 2016.
-
Shape Evolution of Sandwitched Droplet in Microconfined Shear Flow
Authors:
Kaustav Chaudhury,
Debabrata DasGupta,
Tamal Roy,
Suman Chakraborty
Abstract:
Droplets confined in a microfluidic channel often exhibit intriguing shapes, primarily attributable to complex hydrodynamic interactions over small scales. We show that effect of varied substrate wettability conditions may further complicate these interactions remarkably, and often non-trivially. Our studies reveal that the combined influence of substrate wettability and fluidic confinement eventu…
▽ More
Droplets confined in a microfluidic channel often exhibit intriguing shapes, primarily attributable to complex hydrodynamic interactions over small scales. We show that effect of varied substrate wettability conditions may further complicate these interactions remarkably, and often non-trivially. Our studies reveal that the combined influence of substrate wettability and fluidic confinement eventually culminates towards influencing the droplet transients, distortion of the local shear flow field, as well as drop stabilization against breakup or detachment, allowing one to develop different regimes of shapes evolution that are fascinatingly distinct from the ones reported in earlier studies on drop breakup in micro-confined shear flows. We further demonstrate that combined consequences of wall effects and interfacial wettability characteristics can be exploited to pattern microfluidic substrates with pre-designed patches, bearing far-ranging scientific and technological consequences in several scientific and technological applications of contemporary relevance.
△ Less
Submitted 10 September, 2015;
originally announced September 2015.
-
Clustering online social network communities using genetic algorithms
Authors:
Mustafa H. Hajeer,
Alka Singh,
Dipankar Dasgupta,
Sugata Sanyal
Abstract:
To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where…
▽ More
To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN - comments, emails, chat expressions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of this GA-based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach.
△ Less
Submitted 8 December, 2013;
originally announced December 2013.
-
Artificial Immune Systems (INTROS 2)
Authors:
Uwe Aickelin,
Dipankar Dasgupta,
Feng Gu
Abstract:
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self or non-self substances. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for commu…
▽ More
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self or non-self substances. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years.
A novel computational intelligence technique, inspired by immunology, has emerged, called Artificial Immune Systems. Several concepts from the immune system have been extracted and applied for solution to real world science and engineering problems. In this tutorial, we briefly describe the immune system metaphors that are relevant to existing Artificial Immune Systems methods. We will then show illustrative real-world problems suitable for Artificial Immune Systems and give a step-by-step algorithm walkthrough for one such problem. A comparison of the Artificial Immune Systems to other well-known algorithms, areas for future work, tips & tricks and a list of resources will round this tutorial off. It should be noted that as Artificial Immune Systems is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from time to time and from those examples given here.
△ Less
Submitted 23 August, 2013;
originally announced August 2013.
-
Interplay between partnership formation and competition in generalized May-Leonard games
Authors:
Ahmed Roman,
Debanjan Dasgupta,
Michel Pleimling
Abstract:
In order to better understand the interplay of partnership and competition in population dynamics we study a family of generalized May-Leonard models with $N$ species. These models have a very rich structure, characterized by different types of space-time patterns. Interesting partnership formations emerge following the maxim that "the enemy of my enemy is my friend." In specific cases cyclic domi…
▽ More
In order to better understand the interplay of partnership and competition in population dynamics we study a family of generalized May-Leonard models with $N$ species. These models have a very rich structure, characterized by different types of space-time patterns. Interesting partnership formations emerge following the maxim that "the enemy of my enemy is my friend." In specific cases cyclic dominance within coarsening clusters yields a peculiar coarsening behavior with intriguing pattern formation. We classify the different types of dynamics through the analysis of the square of the adjacency matrix. The dependence of the population densities on emerging pattern and propagating wave fronts is elucidated through a Fourier analysis. Finally, after having identified collaborating teams, we study interface fluctuations where we initially populate different parts of the system with different teams.
△ Less
Submitted 13 March, 2013;
originally announced March 2013.
-
The confinement energy of quantum dots
Authors:
Samrat Dey,
Devkant Swargiary,
kishan Chakraborty,
Debasmita Dasgupta,
Darsana Bordoloi,
Rituja Saikia,
Darsana Neog,
Shishila Shimray,
Supriyanka Paul,
Kabita Brahma,
Joydeep Dey,
Saurav Choudhury
Abstract:
One of the most significant research interests in the field of electronics is that on quantum dot, because such materials have electronic properties intermediate between those of bulk semiconductors and those of discrete molecules. Confinement energy is a very important property of quantum dot. In this study, quantum confinement energy of a quantum dot is concluded to be h2/8md2 (d being the diame…
▽ More
One of the most significant research interests in the field of electronics is that on quantum dot, because such materials have electronic properties intermediate between those of bulk semiconductors and those of discrete molecules. Confinement energy is a very important property of quantum dot. In this study, quantum confinement energy of a quantum dot is concluded to be h2/8md2 (d being the diameter of the confinement) and not h2/8ma2 (a being the radius of the confinement), as reported in the available literature. This is in the light of a recent study [1]. This finding should have a significant impact in the understanding of the physics of quantum dot and its technological application.
△ Less
Submitted 11 December, 2012;
originally announced December 2012.
-
Indications of room-temperature superconductivity at a metal-PZT interface
Authors:
Dhruba Dasgupta
Abstract:
We report the observation of an exceptionally large room-temperature electrical conductivity in silver and aluminum layers deposited on a lead zirconate titanate (PZT) substrate. The surface resistance of the silver-coated samples also shows a sharp change near 313 K. The results are strongly suggestive of a superconductive interfacial layer, and have been interpreted in the framework of Bose-Eins…
▽ More
We report the observation of an exceptionally large room-temperature electrical conductivity in silver and aluminum layers deposited on a lead zirconate titanate (PZT) substrate. The surface resistance of the silver-coated samples also shows a sharp change near 313 K. The results are strongly suggestive of a superconductive interfacial layer, and have been interpreted in the framework of Bose-Einstein condensation of bipolarons as the suggested mechanism for high-temperature superconductivity in cuprates.
△ Less
Submitted 16 July, 2010;
originally announced July 2010.
-
Artificial Immune Systems
Authors:
Uwe Aickelin,
Dipankar Dasgupta
Abstract:
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for co…
▽ More
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years. A novel computational intelligence technique, inspired by immunology, has emerged, called Artificial Immune Systems. Several concepts from the immune have been extracted and applied for solution to real world science and engineering problems. In this tutorial, we briefly describe the immune system metaphors that are relevant to existing Artificial Immune Systems methods. We will then show illustrative real-world problems suitable for Artificial Immune Systems and give a step-by-step algorithm walkthrough for one such problem. A comparison of the Artificial Immune Systems to other well-known algorithms, areas for future work, tips & tricks and a list of resources will round this tutorial off. It should be noted that as Artificial Immune Systems is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from time to time and from those examples given here.
△ Less
Submitted 26 October, 2009;
originally announced October 2009.
-
Artificial Immune Systems Tutorial
Authors:
Uwe Aickelin,
Dipankar Dasgupta
Abstract:
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for co…
▽ More
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years. A novel computational intelligence technique, inspired by immunology, has emerged, called Artificial Immune Systems. Several concepts from the immune have been extracted and applied for solution to real world science and engineering problems. In this tutorial, we briefly describe the immune system metaphors that are relevant to existing Artificial Immune Systems methods. We will then show illustrative real-world problems suitable for Artificial Immune Systems and give a step-by-step algorithm walkthrough for one such problem. A comparison of the Artificial Immune Systems to other well-known algorithms, areas for future work, tips & tricks and a list of resources will round this tutorial off. It should be noted that as Artificial Immune Systems is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from time to time and from those examples given here.
△ Less
Submitted 27 March, 2008;
originally announced March 2008.
-
Comparison of History Effects in Magnetization in Weakly pinned Crystals of high-$T_c$ and low-T$_c$ Superconductors
Authors:
D. Pal,
S. Sarkar,
A. Tulapurkar,
S. Ramakrishnan,
A. K. Grover,
G. Ravikumar,
D. Dasgupta,
Bimal K. Sarma,
C. V. Tomy,
G. Balakrishnan,
D. Mck Paul
Abstract:
A comparison of the history effects in weakly pinned single crystals of a high $T_c$ YBa$_2$Cu$_3$O$_{7 - δ}$ (for H $\parallel$ c) and a low $T_c$ Ca$_3$Rh$_4$Sn$_{13}$, which show anomalous variations in critical current density $J_c(H)$ are presented via tracings of the minor magnetization hysteresis loops using a vibrating sample magnetometer. The sample histories focussed are, (i) the field…
▽ More
A comparison of the history effects in weakly pinned single crystals of a high $T_c$ YBa$_2$Cu$_3$O$_{7 - δ}$ (for H $\parallel$ c) and a low $T_c$ Ca$_3$Rh$_4$Sn$_{13}$, which show anomalous variations in critical current density $J_c(H)$ are presented via tracings of the minor magnetization hysteresis loops using a vibrating sample magnetometer. The sample histories focussed are, (i) the field cooled (FC), (ii) the zero field cooled (ZFC) and (iii) an isothermal reversal of field from the normal state. An understanding of the results in terms of the modulation in the plastic deformation of the elastic vortex solid and supercooling across order-disorder transition is sought.
△ Less
Submitted 6 June, 2001;
originally announced June 2001.
-
Vortex Phase Diagram of weakly pinned YBa$_2$Cu$_3$O$_{7-δ}$ for H $\parallel$ c
Authors:
D. Pal,
S. Ramakrishnan,
A. K. Grover,
D. Dasgupta,
Bimal K. Sarma
Abstract:
Vortex phase diagram in a weakly pinned crystal of YBCO for H $\parallel$ c is reviewed in the light of a recent elucidation of the process of `inverse melting' in a Bismuth cuprate system and the imaging of an interface between the ordered and the disordered regions across the peak effect in 2H-NbSe$_2$. In the given YBCO crystal, a clear distinction can be made between the second magnetization…
▽ More
Vortex phase diagram in a weakly pinned crystal of YBCO for H $\parallel$ c is reviewed in the light of a recent elucidation of the process of `inverse melting' in a Bismuth cuprate system and the imaging of an interface between the ordered and the disordered regions across the peak effect in 2H-NbSe$_2$. In the given YBCO crystal, a clear distinction can be made between the second magnetization peak (SMP) and the peak effect (PE) between 65 K and 75 K. The field region between the peak fields of the SMP (H$^m_{smp}$) and the onset fields of the PE (H$^{on}_{pe}$)is not only continuously connected to the Bragg glass phase at lower fields but it is also sandwiched between the higher temperature vortex liquid phase and the lower temperature vortex glass phase. Thus, an ordered vortex state between H$^m_{smp}$ and H$^{on}_{pe}$ can get transformed to the (disordered) vortex liquid state on heating as well as to the (disordered) vortex glass state on cooling, a situation analogous to the thermal melting and the inverse melting phenomenon seen in a Bismuth cuprate.
△ Less
Submitted 6 June, 2001;
originally announced June 2001.
-
Amorphization of Vortex Matter and Reentrant Peak Effect in YBa$_2$Cu$_3$O$_{7-δ}$
Authors:
D. Pal,
D. Dasgupta,
B. K. Sarma,
S. Bhattacharya,
S. Ramakrishnan,
A. K. Grover
Abstract:
The peak effect (PE) has been observed in a twinned crystal of YBa$_2$Cu$_3$O$_{7-δ}$ for H$\parallel$c in the low field range, close to the zero field superconducting transition temperature (T$_c$(0)) . A sharp depinning transition succeeds the peak temperature T$_p$ of the PE. The PE phenomenon broadens and its internal structure smoothens out as the field is increased or decreased beyond the…
▽ More
The peak effect (PE) has been observed in a twinned crystal of YBa$_2$Cu$_3$O$_{7-δ}$ for H$\parallel$c in the low field range, close to the zero field superconducting transition temperature (T$_c$(0)) . A sharp depinning transition succeeds the peak temperature T$_p$ of the PE. The PE phenomenon broadens and its internal structure smoothens out as the field is increased or decreased beyond the interval between 250 Oe and 1000 Oe. Moreover, the PE could not be observed above 10 kOe and below 20 Oe. The locus of the T$_p$(H) values shows a reentrant characteristic with a nose like feature located at T$_p$(H)/T$_c$(0)$\approx$0.99 and H$\approx$100 Oe (where the FLL constant a$_0$$\approx$penetration depth $λ$). The upper part of the PE curve (0.5 kOe$<$H$<$10 kOe) can be fitted to a melting scenario with the Lindemann number c$_L$$\approx$0.25. The vortex phase diagram near T$_c$(0) determined from the characteristic features of the PE in YBa$_2$Cu$_3$O$_{7-δ}$(H$\parallel$c) bears close resemblance to that in the 2H-NbSe$_2$ system, in which a reentrant PE had been observed earlier.
△ Less
Submitted 15 January, 2000;
originally announced January 2000.