-
healthAIChain: Improving security and safety using Blockchain Technology applications in AI-based healthcare systems
Authors:
Naresh Kshetri,
James Hutson,
Revathy G
Abstract:
Blockchain as a digital ledger for kee** records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical…
▽ More
Blockchain as a digital ledger for kee** records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical industries and healthcare. Blockchain can promote highly configurable openness while retaining the highest security standards for critical data of medical patients. Referred to as distributed record kee** for healthcare systems which makes digital assets unalterable and transparent via a cryptographic hash and decentralized network. The study delves into the security and safety improvement associated with implementing blockchain in AI-based healthcare systems. Blockchain-enabled AI tackles the existing issues related to security, performance efficiencies, and safety in healthcare systems. We have also examined the Artificial Intelligence in healthcare and medical industry, potential areas, open questions concerning the blockchain in healthcare systems. Finally, the article proposed an AI-based healthcare blockchain model (healthAIChain) to improve patients data and security.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Performance Analysis of Vertical Axis Wind Turbine Clusters: Effect of Inter-Turbine Spacing and Turbine Rotation
Authors:
Dinesh Kumar Reddy G,
Mayank Verma,
Ashoke De
Abstract:
Wind energy has emerged as a viable alternative to fossil fuels, with vertical axis wind turbines (VAWTs) gaining popularity due to their efficiency and adaptability. Combining the Actuator Line Method (ALM) with Large Eddy Simulation (LES) enables accurate performance evaluations, facilitating the design and optimization of wind turbines. The present study invokes ALM-based methodology to perform…
▽ More
Wind energy has emerged as a viable alternative to fossil fuels, with vertical axis wind turbines (VAWTs) gaining popularity due to their efficiency and adaptability. Combining the Actuator Line Method (ALM) with Large Eddy Simulation (LES) enables accurate performance evaluations, facilitating the design and optimization of wind turbines. The present study invokes ALM-based methodology to perform calculations for the VAWTs. The results of the LES simulations of the VAWTs have been extensively validated against the available experimental and numerical data. The study further explores a VAWT cluster of three turbines by investigating the influence of turbine spacing (in both in-line and staggered configuration) on cluster performance. The study shows that the configuration with a streamwise separation (Xsep) of 0.34D and a transverse separation (Ysep) of 2.5D exhibits superior performance to other combinations owing to increased kinetic energy in the wake for the downstream turbines. Further, we have presented the effect of varying the rotation direction (in combinations of Clockwise and Counter-Clockwise rotation) for the individual turbines in the 3-turbine cluster for the two configurations: in-line (Xsep = 0D, Ysep = 2.5D) and staggered (Xsep = 0.34D, Ysep = 2.5D). Staggered counter-rotating turbine cases show reduced performance compared to co-rotating cases, specifically, the clockwise co-rotating (C-C-C) configuration. In the in-line configuration, counter-rotating setups outperform co-rotating ones. Counter-rotation analysis reveals that reducing streamwise separation allows turbines to align in line without sacrificing performance, thereby increasing the power density of the turbine cluster
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Dependence of Solar supergranular lifetime on surface magnetic activity and rotation
Authors:
Sowmya G. M.,
Rajani G.,
U. Paniveni,
R. Srikanth
Abstract:
The lifetimes and length-scales for supergranular cells in active and quiescent regions of the Solar chromosphere, and the relation between the two, were studied using a time series of Ca II K filtergrams. The lifetimes, in contrast to supergranular length scale and fractal dimension, show no significant dependence on Solar latitude, suggesting that cell lifetimes are independent of the differenti…
▽ More
The lifetimes and length-scales for supergranular cells in active and quiescent regions of the Solar chromosphere, and the relation between the two, were studied using a time series of Ca II K filtergrams. The lifetimes, in contrast to supergranular length scale and fractal dimension, show no significant dependence on Solar latitude, suggesting that cell lifetimes are independent of the differential rotation and a possible supergranular super-rotation. The functional form of the relation was obtained guided by a comparison of the distributions of the two supergranular parameters. We infer a linear dependence of cell lifetime on area, which can be understood by the assumption of the network's evolution via a diffusion of the magnetic field. Our analysis suggests that the diffusion rate in quiet regions is about 10% greater than in active regions.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Sequential Pitch Distributions for Raga Detection
Authors:
Vishwaas Narasinh,
Senthil Raja G
Abstract:
Raga is a fundamental melodic concept in Indian Art Music (IAM). It is characterized by complex patterns. All performances and compositions are based on the raga framework. Raga and tonic detection have been a long-standing research problem in the field of Music Information Retrieval. In this paper, we attempt to detect the raga using a novel feature to extract sequential or temporal information f…
▽ More
Raga is a fundamental melodic concept in Indian Art Music (IAM). It is characterized by complex patterns. All performances and compositions are based on the raga framework. Raga and tonic detection have been a long-standing research problem in the field of Music Information Retrieval. In this paper, we attempt to detect the raga using a novel feature to extract sequential or temporal information from an audio sample. We call these Sequential Pitch Distributions (SPD), which are distributions taken over pitch values between two given pitch values over time. We also achieve state-of-the-art results on both Hindustani and Carnatic music raga data sets with an accuracy of 99% and 88.13%, respectively. SPD gives a great boost in accuracy over a standard pitch distribution. The main goal of this paper, however, is to present an alternative approach to modeling the temporal aspects of the melody and thereby deducing the raga.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Rationality for arbitrary closure operations and the test ideal of full extended plus closure
Authors:
Zhan Jiang,
Rebecca R. G.
Abstract:
We extend the notion of F-rationality to other closure operations, inspired by the work of Smith, Epstein and Schwede, and Ma and Schwede, which describe F-rationality in terms of the canonical module and top local cohomology module. We give conditions for a closure operation cl on a Cohen-Macaulay complete local ring under which cl-rationality is equivalent to parameter ideals being cl-closed. We…
▽ More
We extend the notion of F-rationality to other closure operations, inspired by the work of Smith, Epstein and Schwede, and Ma and Schwede, which describe F-rationality in terms of the canonical module and top local cohomology module. We give conditions for a closure operation cl on a Cohen-Macaulay complete local ring under which cl-rationality is equivalent to parameter ideals being cl-closed. We also demonstrate that full extended plus closure as defined by Heitmann and weak full extended plus closure as defined by the first named author have no big test elements.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Heterophased grain boundary-rich superparamagnetic Iron Oxides/carbon composite for Cationic and Anionic Dye Removal
Authors:
K Priyananda Singh,
Boris Wareppam,
Raghavendra K G,
N. Joseph Singh,
A. C. de Oliveira,
V. K. Garg,
Subrata Ghosh,
L. Herojit Singh
Abstract:
Iron oxide-based nanostructures receive significant attention as an efficient adsorbent for organic dyes removal. The removal properties have strong dependency on the stoichiometry, phases, reactive edges, defect states etc present in the iron-oxides nanostructures. Herein, iron oxide/carbon composite with well-defined heterophased grain boundaries is synthesized by simple precipitation method and…
▽ More
Iron oxide-based nanostructures receive significant attention as an efficient adsorbent for organic dyes removal. The removal properties have strong dependency on the stoichiometry, phases, reactive edges, defect states etc present in the iron-oxides nanostructures. Herein, iron oxide/carbon composite with well-defined heterophased grain boundaries is synthesized by simple precipitation method and followed by calcination. The local structure, spin dynamics and magnetic properties of heterophased iron oxides/carbon composite are thoroughly investigated to explore its cationic and anionic dye removal capability. To validate the effectivity of the presence of heterogeneous grain boundaries, iron oxide/carbon nanocomposite with homogeneous grain boundaries is also examined. It was found that the hetero-phased iron oxide/carbon showed removal capacity of 35.45 mg g-1 and 45.84 mg g-1 for cationic (Crystal Violet) and anionic (Congo Red) dyes, respectively as compared to that of as-synthesised imidazole-capped superparamagnetic α-Fe2O3 (25.11 mg g-1 and 40.44 mg g-1, respectively) and homophased iron oxide/carbon nanocomposite (9.41 mg g-1 and 5.43 mg g-1, respectively). The plausible mechanism on the local structural evolution of the heterophase in the course of calcination and increase of the removal capacity is discussed. A detailed dye adsorption investigation is presented including the adsorption kinetic study. The pseudo-second order kinetic model is found to be an appropriate one and suggests that the chemisorption is dominant factor leading to adsorption of dyes. Whereas Weber-Morris model indicate the strong influence of boundary layers of nanocomposite on the adsorption process.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
FACTIFY3M: A Benchmark for Multimodal Fact Verification with Explainability through 5W Question-Answering
Authors:
Megha Chakraborty,
Khushbu Pahwa,
Anku Rani,
Shreyas Chatterjee,
Dwip Dalal,
Harshit Dave,
Ritvik G,
Preethi Gurumurthy,
Adarsh Mahor,
Samahriti Mukherjee,
Aditya Pakala,
Ishan Paul,
Janvita Reddy,
Arghya Sarkar,
Kinjal Sensharma,
Aman Chadha,
Amit P. Sheth,
Amitava Das
Abstract:
Combating disinformation is one of the burning societal crises -- about 67% of the American population believes that disinformation produces a lot of uncertainty, and 10% of them knowingly propagate disinformation. Evidence shows that disinformation can manipulate democratic processes and public opinion, causing disruption in the share market, panic and anxiety in society, and even death during cr…
▽ More
Combating disinformation is one of the burning societal crises -- about 67% of the American population believes that disinformation produces a lot of uncertainty, and 10% of them knowingly propagate disinformation. Evidence shows that disinformation can manipulate democratic processes and public opinion, causing disruption in the share market, panic and anxiety in society, and even death during crises. Therefore, disinformation should be identified promptly and, if possible, mitigated. With approximately 3.2 billion images and 720,000 hours of video shared online daily on social media platforms, scalable detection of multimodal disinformation requires efficient fact verification. Despite progress in automatic text-based fact verification (e.g., FEVER, LIAR), the research community lacks substantial effort in multimodal fact verification. To address this gap, we introduce FACTIFY 3M, a dataset of 3 million samples that pushes the boundaries of the domain of fact verification via a multimodal fake news dataset, in addition to offering explainability through the concept of 5W question-answering. Salient features of the dataset include: (i) textual claims, (ii) ChatGPT-generated paraphrased claims, (iii) associated images, (iv) stable diffusion-generated additional images (i.e., visual paraphrases), (v) pixel-level image heatmap to foster image-text explainability of the claim, (vi) 5W QA pairs, and (vii) adversarial fake news stories.
△ Less
Submitted 30 October, 2023; v1 submitted 22 May, 2023;
originally announced June 2023.
-
ChatGPT: A Study on its Utility for Ubiquitous Software Engineering Tasks
Authors:
Giriprasad Sridhara,
Ranjani H. G.,
Sourav Mazumdar
Abstract:
ChatGPT (Chat Generative Pre-trained Transformer) is a chatbot launched by OpenAI on November 30, 2022. OpenAI's GPT-3 family of large language models serve as the foundation for ChatGPT. ChatGPT is fine-tuned with both supervised and reinforcement learning techniques and has received widespread attention for its articulate responses across diverse domains of knowledge. In this study, we explore h…
▽ More
ChatGPT (Chat Generative Pre-trained Transformer) is a chatbot launched by OpenAI on November 30, 2022. OpenAI's GPT-3 family of large language models serve as the foundation for ChatGPT. ChatGPT is fine-tuned with both supervised and reinforcement learning techniques and has received widespread attention for its articulate responses across diverse domains of knowledge. In this study, we explore how ChatGPT can be used to help with common software engineering tasks. Many of the ubiquitous tasks covering the breadth of software engineering such as ambiguity resolution in software requirements, method name suggestion, test case prioritization, code review, log summarization can potentially be performed using ChatGPT. In this study, we explore fifteen common software engineering tasks using ChatGPT. We juxtapose and analyze ChatGPT's answers with the respective state of the art outputs (where available) and/or human expert ground truth. Our experiments suggest that for many tasks, ChatGPT does perform credibly and the response from it is detailed and often better than the human expert output or the state of the art output. However, for a few other tasks, ChatGPT in its present form provides incorrect answers and hence is not suited for such tasks.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
Observations on LLMs for Telecom Domain: Capabilities and Limitations
Authors:
Sumit Soman,
Ranjani H G
Abstract:
The landscape for building conversational interfaces (chatbots) has witnessed a paradigm shift with recent developments in generative Artificial Intelligence (AI) based Large Language Models (LLMs), such as ChatGPT by OpenAI (GPT3.5 and GPT4), Google's Bard, Large Language Model Meta AI (LLaMA), among others. In this paper, we analyze capabilities and limitations of incorporating such models in co…
▽ More
The landscape for building conversational interfaces (chatbots) has witnessed a paradigm shift with recent developments in generative Artificial Intelligence (AI) based Large Language Models (LLMs), such as ChatGPT by OpenAI (GPT3.5 and GPT4), Google's Bard, Large Language Model Meta AI (LLaMA), among others. In this paper, we analyze capabilities and limitations of incorporating such models in conversational interfaces for the telecommunication domain, specifically for enterprise wireless products and services. Using Cradlepoint's publicly available data for our experiments, we present a comparative analysis of the responses from such models for multiple use-cases including domain adaptation for terminology and product taxonomy, context continuity, robustness to input perturbations and errors. We believe this evaluation would provide useful insights to data scientists engaged in building customized conversational interfaces for domain-specific requirements.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Generative Pre-trained Transformer: A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions
Authors:
Gokul Yenduri,
Ramalingam M,
Chemmalar Selvi G,
Supriya Y,
Gautam Srivastava,
Praveen Kumar Reddy Maddikunta,
Deepti Raj G,
Rutvij H Jhaveri,
Prabadevi B,
Weizheng Wang,
Athanasios V. Vasilakos,
Thippa Reddy Gadekallu
Abstract:
The Generative Pre-trained Transformer (GPT) represents a notable breakthrough in the domain of natural language processing, which is propelling us toward the development of machines that can understand and communicate using language in a manner that closely resembles that of humans. GPT is based on the transformer architecture, a deep neural network designed for natural language processing tasks.…
▽ More
The Generative Pre-trained Transformer (GPT) represents a notable breakthrough in the domain of natural language processing, which is propelling us toward the development of machines that can understand and communicate using language in a manner that closely resembles that of humans. GPT is based on the transformer architecture, a deep neural network designed for natural language processing tasks. Due to their impressive performance on natural language processing tasks and ability to effectively converse, GPT have gained significant popularity among researchers and industrial communities, making them one of the most widely used and effective models in natural language processing and related fields, which motivated to conduct this review. This review provides a detailed overview of the GPT, including its architecture, working process, training procedures, enabling technologies, and its impact on various applications. In this review, we also explored the potential challenges and limitations of a GPT. Furthermore, we discuss potential solutions and future directions. Overall, this paper aims to provide a comprehensive understanding of GPT, enabling technologies, their impact on various applications, emerging challenges, and potential solutions.
△ Less
Submitted 21 May, 2023; v1 submitted 11 May, 2023;
originally announced May 2023.
-
Social Distance Detection Using Deep Learning And Risk Management System
Authors:
Dr. Sangeetha R. G,
Jaya Aravindh V. V
Abstract:
An outbreak of the coronavirus disease which occurred three years later and it has hit the world again with many evolutions. The effects on the human race have already been profound. We can only safeguard ourselves against this pandemic by mandating a "Face Mask" also maintaining the "Social Distancing." The necessity of protective face masks in all gatherings is required by many civil institution…
▽ More
An outbreak of the coronavirus disease which occurred three years later and it has hit the world again with many evolutions. The effects on the human race have already been profound. We can only safeguard ourselves against this pandemic by mandating a "Face Mask" also maintaining the "Social Distancing." The necessity of protective face masks in all gatherings is required by many civil institutions in India. As a result of the substantial human resource utilization, personally examining the whole country with a huge population like India, to determine whether the execution of mask wearing and social distance maintained is unfeasible. The COVID-19 Social Distancing Detector System is a single-stage detector that employs deep learning to integrate high-end semantic data to a CNN module in order to maintain social distances and simultaneously monitor violations within a specified region. By deploying current Security footages, CCTV cameras, and computer vision (CV), it will also be able to identify those who are experiencing the calamity of social separation. Providing tools for safety and security, this technology disposes the need for a labor-force based surveillance system, yet a manual governing body is still required to monitor, track, and inform on the violations that are committed. Any sort of infrastructure, including universities, hospitals, offices of the government, schools, and building sites, can employ the technology. Therefore, the risk management system created to report and analyze video streams along with the social distance detector system might help to ensure our protection and security as well as the security of our loved ones. Furthermore, we will discuss about deployment and improvement of the project overall.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Cardiac Arrhythmia Detection using Artificial Neural Network
Authors:
Prof Sangeetha R G,
Kishore Anand K,
Sreevatsan B,
Vishal Kumar A
Abstract:
The prime purpose of this project is to develop a portable cardiac abnormality monitoring device which can drastically improvise the quality of the monitoring and the overall safety of the device. While a generic, low cost, wearable battery powered device for such applications may not yield sufficient performance, such devices combined with the capabilities of Artificial Neural Network algorithms…
▽ More
The prime purpose of this project is to develop a portable cardiac abnormality monitoring device which can drastically improvise the quality of the monitoring and the overall safety of the device. While a generic, low cost, wearable battery powered device for such applications may not yield sufficient performance, such devices combined with the capabilities of Artificial Neural Network algorithms can however, prove to be as competent as high end flexible and wearable monitoring devices fabricated using advanced manufacturing technologies. This paper evaluates the feasibility of the Levenberg-Marquardt ANN algorithm for use in any generic low power wearable devices implemented either as a pure real-time embedded system or as an IoT device capable of uploading the monitored readings to the cloud.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
San-BERT: Extractive Summarization for Sanskrit Documents using BERT and it's variants
Authors:
Kartik Bhatnagar,
Sampath Lonka,
Jammi Kunal,
Mahabala Rao M G
Abstract:
In this work, we develop language models for the Sanskrit language, namely Bidirectional Encoder Representations from Transformers (BERT) and its variants: A Lite BERT (ALBERT), and Robustly Optimized BERT (RoBERTa) using Devanagari Sanskrit text corpus. Then we extracted the features for the given text from these models. We applied the dimensional reduction and clustering techniques on the featur…
▽ More
In this work, we develop language models for the Sanskrit language, namely Bidirectional Encoder Representations from Transformers (BERT) and its variants: A Lite BERT (ALBERT), and Robustly Optimized BERT (RoBERTa) using Devanagari Sanskrit text corpus. Then we extracted the features for the given text from these models. We applied the dimensional reduction and clustering techniques on the features to generate an extractive summary for a given Sanskrit document. Along with the extractive text summarization techniques, we have also created and released a Sanskrit Devanagari text corpus publicly.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Processing System for Coherent Dedispersion of Pulsar Radio Emission
Authors:
Girin I. A.,
Likhachev S. F.,
Andrianov A. S.,
Burgin M. S.,
Popov M. V.,
Rudnitskiy A. G.,
Soglasnov V. A.,
Zuga V. A
Abstract:
The work describes a system for converting VLBI observation data using the algorithms of coherent dedispersion and compensation of two-bit signal sampling. Coherent dedispersion is important for processing pulsar observations to obtain the best temporal resolution, while correction for signal sampling makes it possible to get rid of a number of parasitic effects that interfere with the analysis of…
▽ More
The work describes a system for converting VLBI observation data using the algorithms of coherent dedispersion and compensation of two-bit signal sampling. Coherent dedispersion is important for processing pulsar observations to obtain the best temporal resolution, while correction for signal sampling makes it possible to get rid of a number of parasitic effects that interfere with the analysis of the diffraction pattern of pulsars. A pipeline has been established that uses the developed converter and the ASC Software Correlator, which will allow reprocessing all archived data of Radioastron pulsar observations and to conduct a search for giant pulses, which requires the best temporal resolution.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
CoNIC Challenge: Pushing the Frontiers of Nuclear Detection, Segmentation, Classification and Counting
Authors:
Simon Graham,
Quoc Dang Vu,
Mostafa Jahanifar,
Martin Weigert,
Uwe Schmidt,
Wenhua Zhang,
Jun Zhang,
Sen Yang,
**xi Xiang,
Xiyue Wang,
Josef Lorenz Rumberger,
Elias Baumann,
Peter Hirsch,
Lihao Liu,
Chenyang Hong,
Angelica I. Aviles-Rivero,
Ayushi Jain,
Heeyoung Ahn,
Yiyu Hong,
Hussam Azzuni,
Min Xu,
Mohammad Yaqub,
Marie-Claire Blache,
Benoît Piégu,
Bertrand Vernay
, et al. (64 additional authors not shown)
Abstract:
Nuclear detection, segmentation and morphometric profiling are essential in hel** us further understand the relationship between histology and patient outcome. To drive innovation in this area, we setup a community-wide challenge using the largest available dataset of its kind to assess nuclear segmentation and cellular composition. Our challenge, named CoNIC, stimulated the development of repro…
▽ More
Nuclear detection, segmentation and morphometric profiling are essential in hel** us further understand the relationship between histology and patient outcome. To drive innovation in this area, we setup a community-wide challenge using the largest available dataset of its kind to assess nuclear segmentation and cellular composition. Our challenge, named CoNIC, stimulated the development of reproducible algorithms for cellular recognition with real-time result inspection on public leaderboards. We conducted an extensive post-challenge analysis based on the top-performing models using 1,658 whole-slide images of colon tissue. With around 700 million detected nuclei per model, associated features were used for dysplasia grading and survival analysis, where we demonstrated that the challenge's improvement over the previous state-of-the-art led to significant boosts in downstream performance. Our findings also suggest that eosinophils and neutrophils play an important role in the tumour microevironment. We release challenge models and WSI-level results to foster the development of further methods for biomarker discovery.
△ Less
Submitted 14 March, 2023; v1 submitted 10 March, 2023;
originally announced March 2023.
-
AIROGS: Artificial Intelligence for RObust Glaucoma Screening Challenge
Authors:
Coen de Vente,
Koenraad A. Vermeer,
Nicolas Jaccard,
He Wang,
Hongyi Sun,
Firas Khader,
Daniel Truhn,
Temirgali Aimyshev,
Yerkebulan Zhanibekuly,
Tien-Dung Le,
Adrian Galdran,
Miguel Ángel González Ballester,
Gustavo Carneiro,
Devika R G,
Hrishikesh P S,
Densen Puthussery,
Hong Liu,
Zekang Yang,
Satoshi Kondo,
Satoshi Kasai,
Edward Wang,
Ashritha Durvasula,
Jónathan Heras,
Miguel Ángel Zapata,
Teresa Araújo
, et al. (11 additional authors not shown)
Abstract:
The early detection of glaucoma is essential in preventing visual impairment. Artificial intelligence (AI) can be used to analyze color fundus photographs (CFPs) in a cost-effective manner, making glaucoma screening more accessible. While AI models for glaucoma screening from CFPs have shown promising results in laboratory settings, their performance decreases significantly in real-world scenarios…
▽ More
The early detection of glaucoma is essential in preventing visual impairment. Artificial intelligence (AI) can be used to analyze color fundus photographs (CFPs) in a cost-effective manner, making glaucoma screening more accessible. While AI models for glaucoma screening from CFPs have shown promising results in laboratory settings, their performance decreases significantly in real-world scenarios due to the presence of out-of-distribution and low-quality images. To address this issue, we propose the Artificial Intelligence for Robust Glaucoma Screening (AIROGS) challenge. This challenge includes a large dataset of around 113,000 images from about 60,000 patients and 500 different screening centers, and encourages the development of algorithms that are robust to ungradable and unexpected input data. We evaluated solutions from 14 teams in this paper, and found that the best teams performed similarly to a set of 20 expert ophthalmologists and optometrists. The highest-scoring team achieved an area under the receiver operating characteristic curve of 0.99 (95% CI: 0.98-0.99) for detecting ungradable images on-the-fly. Additionally, many of the algorithms showed robust performance when tested on three other publicly available datasets. These results demonstrate the feasibility of robust AI-enabled glaucoma screening.
△ Less
Submitted 10 February, 2023; v1 submitted 3 February, 2023;
originally announced February 2023.
-
How to extend closure and interior operations to more modules
Authors:
Neil Epstein,
Rebecca R. G.,
Janet Vassilev
Abstract:
There are several ways to convert a closure or interior operation to a different operation that has particular desirable properties. In this paper, we axiomatize 3 ways to do so, drawing on disparate examples from the literature, including tight closure, basically full closure, and various versions of integral closure. In doing so, we explore several such desirable properties, including *hereditar…
▽ More
There are several ways to convert a closure or interior operation to a different operation that has particular desirable properties. In this paper, we axiomatize 3 ways to do so, drawing on disparate examples from the literature, including tight closure, basically full closure, and various versions of integral closure. In doing so, we explore several such desirable properties, including *hereditary*, *residual*, and *cofunctorial*, and see how they interact with other properties such as the *finitistic* property.
△ Less
Submitted 3 November, 2023; v1 submitted 31 January, 2023;
originally announced February 2023.
-
The MUSE second-generation VLT instrument
Authors:
Bacon R.,
Accardo M.,
Adjali L.,
Anwand H.,
Bauer S.,
Biswas I.,
Blaizot J.,
Boudon D.,
Brau-Nogue S.,
Brinchmann J.,
Caillier P.,
Capoani L.,
Carollo C. M.,
Contini T.,
Couderc P.,
Daguise E.,
Deiries S.,
Delabre B.,
Dreizler S.,
Dubois J. P.,
Dupieux M.,
Dupuy C.,
Emsellem E.,
Fechner T.,
Fleischmann A.
, et al. (43 additional authors not shown)
Abstract:
The Multi Unit Spectroscopic Explorer (MUSE) is a second-generation VLT panoramic integral-field spectrograph currently in manufacturing, assembly and integration phase. MUSE has a field of 1x1 arcmin2 sampled at 0.2x0.2 arcsec2 and is assisted by the VLT ground layer adaptive optics ESO facility using four laser guide stars. The instrument is a large assembly of 24 identical high performance inte…
▽ More
The Multi Unit Spectroscopic Explorer (MUSE) is a second-generation VLT panoramic integral-field spectrograph currently in manufacturing, assembly and integration phase. MUSE has a field of 1x1 arcmin2 sampled at 0.2x0.2 arcsec2 and is assisted by the VLT ground layer adaptive optics ESO facility using four laser guide stars. The instrument is a large assembly of 24 identical high performance integral field units, each one composed of an advanced image slicer, a spectrograph and a 4kx4k detector. In this paper we review the progress of the manufacturing and report the performance achieved with the first integral field unit.
△ Less
Submitted 30 November, 2022;
originally announced November 2022.
-
The ASTRI Mini-Array of Cherenkov Telescopes at the Observatorio del Teide
Authors:
Scuderi S.,
Giuliani A.,
Pareschi G.,
Tosti G.,
Catalano O.,
Amato E.,
Antonelli L. A.,
Becerra Gonzáles J.,
Bellassai G.,
Bigongiari,
C.,
Biondo B.,
Böttcher M.,
Bonanno G.,
Bonnoli G.,
Bruno P.,
Bulgarelli A.,
Canestrari R.,
Capalbi M.,
Caraveo P.,
Cardillo M.,
Conforti V.,
Contino G.,
Corpora M.,
Costa A.
, et al. (73 additional authors not shown)
Abstract:
The ASTRI Mini-Array (MA) is an INAF project to build and operate a facility to study astronomical sources emitting at very high-energy in the TeV spectral band. The ASTRI MA consists of a group of nine innovative Imaging Atmospheric Cherenkov telescopes. The telescopes will be installed at the Teide Astronomical Observatory of the Instituto de Astrofisica de Canarias (IAC) in Tenerife (Canary Isl…
▽ More
The ASTRI Mini-Array (MA) is an INAF project to build and operate a facility to study astronomical sources emitting at very high-energy in the TeV spectral band. The ASTRI MA consists of a group of nine innovative Imaging Atmospheric Cherenkov telescopes. The telescopes will be installed at the Teide Astronomical Observatory of the Instituto de Astrofisica de Canarias (IAC) in Tenerife (Canary Islands, Spain) on the basis of a host agreement with INAF. Thanks to its expected overall performance, better than those of current Cherenkov telescopes' arrays for energies above \sim 5 TeV and up to 100 TeV and beyond, the ASTRI MA will represent an important instrument to perform deep observations of the Galactic and extra-Galactic sky at these energies.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Knowledge-driven Subword Grammar Modeling for Automatic Speech Recognition in Tamil and Kannada
Authors:
Madhavaraj A,
Bharathi Pilar,
Ramakrishnan A G
Abstract:
In this paper, we present specially designed automatic speech recognition (ASR) systems for the highly agglutinative and inflective languages of Tamil and Kannada that can recognize unlimited vocabulary of words. We use subwords as the basic lexical units for recognition and construct subword grammar weighted finite state transducer (SG-WFST) graphs for word segmentation that captures most of the…
▽ More
In this paper, we present specially designed automatic speech recognition (ASR) systems for the highly agglutinative and inflective languages of Tamil and Kannada that can recognize unlimited vocabulary of words. We use subwords as the basic lexical units for recognition and construct subword grammar weighted finite state transducer (SG-WFST) graphs for word segmentation that captures most of the complex word formation rules of the languages. We have identified the following category of words (i) verbs, (ii) nouns, (ii) pronouns, and (iv) numbers. The prefix, infix and suffix lists of subwords are created for each of these categories and are used to design the SG-WFST graphs. We also present a heuristic segmentation algorithm that can even segment exceptional words that do not follow the rules encapsulated in the SG-WFST graph. Most of the data-driven subword dictionary creation algorithms are computation driven, and hence do not guarantee morpheme-like units and so we have used the linguistic knowledge of the languages and manually created the subword dictionaries and the graphs. Finally, we train a deep neural network acoustic model and combine it with the pronunciation lexicon of the subword dictionary and the SG-WFST graph to build the subword-ASR systems. Since the subword-ASR produces subword sequences as output for a given test speech, we post-process its output to get the final word sequence, so that the actual number of words that can be recognized is much higher. Upon experimenting the subword-ASR system with the IISc-MILE Tamil and Kannada ASR corpora, we observe an absolute word error rate reduction of 12.39% and 13.56% over the baseline word-based ASR systems for Tamil and Kannada, respectively.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
Subword Dictionary Learning and Segmentation Techniques for Automatic Speech Recognition in Tamil and Kannada
Authors:
Madhavaraj A,
Bharathi Pilar,
Ramakrishnan A G
Abstract:
We present automatic speech recognition (ASR) systems for Tamil and Kannada based on subword modeling to effectively handle unlimited vocabulary due to the highly agglutinative nature of the languages. We explore byte pair encoding (BPE), and proposed a variant of this algorithm named extended-BPE, and Morfessor tool to segment each word as subwords. We have effectively incorporated maximum likeli…
▽ More
We present automatic speech recognition (ASR) systems for Tamil and Kannada based on subword modeling to effectively handle unlimited vocabulary due to the highly agglutinative nature of the languages. We explore byte pair encoding (BPE), and proposed a variant of this algorithm named extended-BPE, and Morfessor tool to segment each word as subwords. We have effectively incorporated maximum likelihood (ML) and Viterbi estimation techniques with weighted finite state transducers (WFST) framework in these algorithms to learn the subword dictionary from a large text corpus. Using the learnt subword dictionary, the words in training data transcriptions are segmented to subwords and we train deep neural network ASR systems which recognize subword sequence for any given test speech utterance. The output subword sequence is then post-processed using deterministic rules to get the final word sequence such that the actual number of words that can be recognized is much larger. For Tamil ASR, We use 152 hours of data for training and 65 hours for testing, whereas for Kannada ASR, we use 275 hours for training and 72 hours for testing. Upon experimenting with different combination of segmentation and estimation techniques, we find that the word error rate (WER) reduces drastically when compared to the baseline word-level ASR, achieving a maximum absolute WER reduction of 6.24% and 6.63% for Tamil and Kannada respectively.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
Supergranular Fractal Dimension and Solar Rotation
Authors:
Sowmya G. M.,
Rajani G.,
U. Paniveni,
R. Srikanth
Abstract:
We present findings from an analysis of the fractal dimension of solar supergranulation as a function of latitude, supergranular cell size and solar rotation, employing spectroheliographic data in the Ca II K line of solar cycle no. 23. We find that the fractal dimension tends to decrease from about 1.37 at the equator to about 1 at 20 degree latitude in either hemisphere, suggesting that solar ro…
▽ More
We present findings from an analysis of the fractal dimension of solar supergranulation as a function of latitude, supergranular cell size and solar rotation, employing spectroheliographic data in the Ca II K line of solar cycle no. 23. We find that the fractal dimension tends to decrease from about 1.37 at the equator to about 1 at 20 degree latitude in either hemisphere, suggesting that solar rotation rate has the effect of augmenting the irregularity of supergranular boundaries. Considering that supergranular cell size is directly correlated with fractal dimension, we conclude that the mechanism behind our observation is that solar rotation influences the cell outflow strength, and thereby cell size, with the latitude dependence of the supergranular fractal dimension being a consequence thereof.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Survival Analysis on Structured Data using Deep Reinforcement Learning
Authors:
Renith G,
Harikrishna Warrier,
Yogesh Gupta
Abstract:
Survival analysis is playing a major role in manufacturing sector by analyzing occurrence of any unwanted event based on the input data. Predictive maintenance, which is a part of survival analysis, helps to find any device failure based on the current incoming data from different sensor or any equipment. Deep learning techniques were used to automate the predictive maintenance problem to some ext…
▽ More
Survival analysis is playing a major role in manufacturing sector by analyzing occurrence of any unwanted event based on the input data. Predictive maintenance, which is a part of survival analysis, helps to find any device failure based on the current incoming data from different sensor or any equipment. Deep learning techniques were used to automate the predictive maintenance problem to some extent, but they are not very helpful in predicting the device failure for the input data which the algorithm had not learned. Since neural network predicts the output based on previous learned input features, it cannot perform well when there is more variation in input features. Performance of the model is degraded with the occurrence of changes in input data and finally the algorithm fails in predicting the device failure. This problem can be solved by our proposed method where the algorithm can predict the device failure more precisely than the existing deep learning algorithms. The proposed solution involves implementation of Deep Reinforcement Learning algorithm called Double Deep Q Network (DDQN) for classifying the device failure based on the input features. The algorithm is capable of learning different variation of the input feature and is robust in predicting whether the device will fail or not based on the input data. The proposed DDQN model is trained with limited or lesser amount of input data. The trained model predicted larger amount of test data efficiently and performed well compared to other deep learning and machine learning models.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
Network state Estimation using Raw Video Analysis: vQoS-GAN based non-intrusive Deep Learning Approach
Authors:
Renith G,
Harikrishna Warrier,
Yogesh Gupta
Abstract:
Content based providers transmits real time complex signal such as video data from one region to another. During this transmission process, the signals usually end up distorted or degraded where the actual information present in the video is lost. This normally happens in the streaming video services applications. Hence there is a need to know the level of degradation that happened in the receiver…
▽ More
Content based providers transmits real time complex signal such as video data from one region to another. During this transmission process, the signals usually end up distorted or degraded where the actual information present in the video is lost. This normally happens in the streaming video services applications. Hence there is a need to know the level of degradation that happened in the receiver side. This video degradation can be estimated by network state parameters like data rate and packet loss values. Our proposed solution vQoS GAN (video Quality of Service Generative Adversarial Network) can estimate the network state parameters from the degraded received video data using a deep learning approach of semi supervised generative adversarial network algorithm. A robust and unique design of deep learning network model has been trained with the video data along with data rate and packet loss class labels and achieves over 95 percent of training accuracy. The proposed semi supervised generative adversarial network can additionally reconstruct the degraded video data to its original form for a better end user experience.
△ Less
Submitted 22 March, 2022;
originally announced April 2022.
-
DFW-PP: Dynamic Feature Weighting based Popularity Prediction for Social Media Content
Authors:
Viswanatha Reddy G,
Chaitanya B S N V,
Prathyush P,
Sumanth M,
Mrinalini C,
Dileep Kumar P,
Snehasis Mukherjee
Abstract:
The increasing popularity of social media platforms makes it important to study user engagement, which is a crucial aspect of any marketing strategy or business model. The over-saturation of content on social media platforms has persuaded us to identify the important factors that affect content popularity. This comes from the fact that only an iota of the humongous content available online receive…
▽ More
The increasing popularity of social media platforms makes it important to study user engagement, which is a crucial aspect of any marketing strategy or business model. The over-saturation of content on social media platforms has persuaded us to identify the important factors that affect content popularity. This comes from the fact that only an iota of the humongous content available online receives the attention of the target audience. Comprehensive research has been done in the area of popularity prediction using several Machine Learning techniques. However, we observe that there is still significant scope for improvement in analyzing the social importance of media content. We propose the DFW-PP framework, to learn the importance of different features that vary over time. Further, the proposed method controls the skewness of the distribution of the features by applying a log-log normalization. The proposed method is experimented with a benchmark dataset, to show promising results. The code will be made publicly available at https://github.com/chaitnayabasava/DFW-PP.
△ Less
Submitted 16 October, 2021;
originally announced October 2021.
-
GANG-MAM: GAN based enGine for Modifying Android Malware
Authors:
Renjith G,
Sonia Laudanna,
Aji S,
Corrado Aaron Visaggio,
Vinod P
Abstract:
Malware detectors based on machine learning are vulnerable to adversarial attacks. Generative Adversarial Networks (GAN) are architectures based on Neural Networks that could produce successful adversarial samples. The interest towards this technology is quickly growing. In this paper, we propose a system that produces a feature vector for making an Android malware strongly evasive and then modify…
▽ More
Malware detectors based on machine learning are vulnerable to adversarial attacks. Generative Adversarial Networks (GAN) are architectures based on Neural Networks that could produce successful adversarial samples. The interest towards this technology is quickly growing. In this paper, we propose a system that produces a feature vector for making an Android malware strongly evasive and then modify the malicious program accordingly. Such a system could have a twofold contribution: it could be used to generate datasets to validate systems for detecting GAN-based malware and to enlarge the training and testing dataset for making more robust malware classifiers.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Integral closure, basically full closure, and duals of nonresidual closure operations
Authors:
Neil Epstein,
Rebecca R. G.,
Janet Vassilev
Abstract:
We develop a duality for operations on nested pairs of modules that generalizes the duality between absolute interior operations and residual closure operations from [ER21], extending our previous results to the expanded context. We apply this duality in particular to integral and basically full closures and their respective cores to obtain integral and basically empty interiors and their respecti…
▽ More
We develop a duality for operations on nested pairs of modules that generalizes the duality between absolute interior operations and residual closure operations from [ER21], extending our previous results to the expanded context. We apply this duality in particular to integral and basically full closures and their respective cores to obtain integral and basically empty interiors and their respective hulls. We also dualize some of the known formulas for the core of an ideal to obtain formulas for the hull of a submodule of the injective hull of the residue field. The article concludes with illustrative examples in a numerical semigroup ring.
△ Less
Submitted 31 August, 2022; v1 submitted 17 September, 2021;
originally announced September 2021.
-
'1e0a': A Computational Approach to Rhythm Training
Authors:
Noel Alben,
Ranjani H. G
Abstract:
We present a computational assessment system that promotes the learning of basic rhythmic patterns. The system is capable of generating multiple rhythmic patterns with increasing complexity within various cycle lengths. For a generated rhythm pattern the performance assessment of the learner is carried out through the statistical deviations calculated from the onset detection and temporal assessme…
▽ More
We present a computational assessment system that promotes the learning of basic rhythmic patterns. The system is capable of generating multiple rhythmic patterns with increasing complexity within various cycle lengths. For a generated rhythm pattern the performance assessment of the learner is carried out through the statistical deviations calculated from the onset detection and temporal assessment of a learner's performance. This is compared with the generated pattern, and their performance accuracy forms the feedback to the learner. The system proceeds to generate a new pattern of increased complexity when performance assessment results are within certain error bounds. The system thus mimics a learner-teacher relationship as the learner progresses in their feedback-based learning. The choice of progression within a cycle for each pattern is determined by a predefined complexity metric. This metric is based on a coded element model for the perceptual processing of sequential stimuli. The model earlier proposed for a sequence of tones and non-tones, is now used for onsets and silences. This system is developed into a web-based application and provides accessibility for learning purposes. Analysis of the performance assessments shows that the complexity metric is indicative of the perceptual processing of rhythm patterns and can be used for rhythm learning.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
Toward Blockchain for Edge-of-Things: A New Paradigm, Opportunities, and Future Directions
Authors:
Prabadevi B,
N Deepa,
Quoc-Viet Pham,
Dinh C. Nguyen,
Praveen Kumar Reddy M,
Thippa Reddy G,
Pubudu N. Pathirana,
Octavia Dobre
Abstract:
Blockchain is gaining momentum as a promising technology for many application domains, one of them being the Edge-of- Things (EoT) that is enabled by the integration of edge computing and the Internet-of-Things (IoT). Particularly, the amalgamation of blockchain and EoT leads to a new paradigm, called blockchain enabled EoT (BEoT) that is crucial for enabling future low-latency and high-security s…
▽ More
Blockchain is gaining momentum as a promising technology for many application domains, one of them being the Edge-of- Things (EoT) that is enabled by the integration of edge computing and the Internet-of-Things (IoT). Particularly, the amalgamation of blockchain and EoT leads to a new paradigm, called blockchain enabled EoT (BEoT) that is crucial for enabling future low-latency and high-security services and applications. This article envisions a novel BEoT architecture for supporting industrial applications under the management of blockchain at the network edge in a wide range of IoT use cases such as smart home, smart healthcare, smart grid, and smart transportation. The potentials of BEoT in providing security services are also explored, including access authentication, data privacy preservation, attack detection, and trust management. Finally, we point out some key research challenges and future directions in this emerging area.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
A Quasi-centralized Collision-free Path Planning Approach for Multi-Robot Systems
Authors:
Rohith G,
Madhu Vadali
Abstract:
This paper presents a novel quasi-centralized approach for collision-free path planning of multi-robot systems (MRS) in obstacle-ridden environments. A new formation potential fields (FPF) concept is proposed around a virtual agent, located at the center of the formation which ensures self-organization and maintenance of the formation. The path of the virtual agent is centrally planned and the rob…
▽ More
This paper presents a novel quasi-centralized approach for collision-free path planning of multi-robot systems (MRS) in obstacle-ridden environments. A new formation potential fields (FPF) concept is proposed around a virtual agent, located at the center of the formation which ensures self-organization and maintenance of the formation. The path of the virtual agent is centrally planned and the robots at the minima of the FPF are forced to move along with the virtual agent. In the neighborhood of obstacles, individual robots selfishly avoid collisions, thus marginally deviating from the formation. The proposed quasi-centralized approach introduces formation flexibility into the MRS, which enables MRS to effectively navigate in an obstacle-ridden workspace. Methodical analysis of the proposed approach and guidelines for selecting the FPF are presented. Results using a candidate FPF are shown that ensure a pentagonal formation effectively squeezes through a narrow passage avoiding any collisions with the walls.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
Cohen-Macaulay test ideals over rings of finite and countable Cohen-Macaulay type
Authors:
Julian Benali,
Shrunal Pothagoni,
Rebecca R. G.
Abstract:
The third named author and Pérez proved that under certain conditions the test ideal of a module closure agrees with the trace ideal of the module closure. We use this fact to compute the test ideals of various rings with respect to the closures coming from their indecomposable maximal Cohen-Macaulay modules. We also give an easier way to compute the test ideal of a hypersurface ring in 3 variable…
▽ More
The third named author and Pérez proved that under certain conditions the test ideal of a module closure agrees with the trace ideal of the module closure. We use this fact to compute the test ideals of various rings with respect to the closures coming from their indecomposable maximal Cohen-Macaulay modules. We also give an easier way to compute the test ideal of a hypersurface ring in 3 variables coming from a module with a particular type of matrix factorization.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Realization of doubly inhomogeneous waveplates for structuring of light beams
Authors:
Radhakrishna B,
Gururaj Kadiri,
Raghavan G
Abstract:
Waveplates having spatially varying fast-axis orientation and retardance provide an elegant and easy way to locally manipulate different attributes of light beams namely, polarization, amplitude and phase, leading to the generation of exotic structured light beams. The fabrication of such doubly inhomogeneous waveplates (d-plates) is more complex, compared to that of singly inhomogeneous waveplate…
▽ More
Waveplates having spatially varying fast-axis orientation and retardance provide an elegant and easy way to locally manipulate different attributes of light beams namely, polarization, amplitude and phase, leading to the generation of exotic structured light beams. The fabrication of such doubly inhomogeneous waveplates (d-plates) is more complex, compared to that of singly inhomogeneous waveplates (s-plates) having uniform retardance, which can be easily fabricated by different means such as photoalignment of liquid crystals, metasurfaces etc. Here, exploiting the SU(2) formalism, we establish analytically that any d-plate can be equivalently implemented using a pair of quarter-wave s-plates and a half-wave s-plate. An important advantage of this method is that it gives the flexibility to realize a whole family of distinct d-plates using the same triplet of s-plates. To underline the scope of this method, we propose novel d-plates for spatially tailoring the phase and complex amplitudes of light beams. Towards complex amplitude sha**, we present a generic method for carving out higher-order eigenmodes of light using a d-plate in conjugation with a polarizer. A generalized q-plate-like gadget, for imparting a polarization-dependent phase profile to a scalar light beam, is proposed as a demonstration of phase-polarization interplay. For these two illustrations, the corresponding three-s-plate gadget is constructed, and its functioning is validated with extensive numerical simulations. The main result and its illustrations are generic and agnostic to the way the s-plates are fabricated and we believe they carry the potential to push the current state of the art in interdisciplinary applications involving structured light beams.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Dynamic Prioritization for Conflict-Free Path Planning of Multi-Robot Systems
Authors:
Aditya Rathi,
Rohith G,
Madhu Vadali
Abstract:
Planning collision-free paths for multi-robot systems (MRS) is a challenging problem because of the safety and efficiency constraints required for real-world solutions. Even though coupled path planning approaches provide optimal collision-free paths for each agent of the MRS, they search the composite space of all the agents and therefore, suffer from exponential increase in computation with the…
▽ More
Planning collision-free paths for multi-robot systems (MRS) is a challenging problem because of the safety and efficiency constraints required for real-world solutions. Even though coupled path planning approaches provide optimal collision-free paths for each agent of the MRS, they search the composite space of all the agents and therefore, suffer from exponential increase in computation with the number of robots. On the other hand, prioritized approaches provide a practical solution to applications with large number of robots, especially when path computation time and collision avoidance take precedence over guaranteed globally optimal solution. While most centrally-planned algorithms use static prioritization, a dynamic prioritization algorithm, PD*, is proposed that employs a novel metric, called freedom index, to decide the priority order of the robots at each time step. This allows the PD* algorithm to simultaneously plan the next step for all robots while ensuring collision-free operation in obstacle ridden environments. Extensive simulations were performed to test and compare the performance of the proposed PD* scheme with other state-of-the-art algorithms. It was found that PD* improves upon the computational time by 25% while providing solutions of similar path lengths. Increase in efficiency was particularly prominent in scenarios with large number of robots and/or higher obstacle densities, where the probability of collisions is higher, suggesting the suitability of PD* in solving such problems.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
LOCNES: a solar telescope to study stellar activity in the near infrared
Authors:
Claudi R.,
Ghedina A.,
Pace E.,
Di Giorgio A. M.,
D'Orazi V.,
Gallorini L.,
Lanza A. F.,
Liu S. J.,
Rainer M.,
Tozzi A.,
Carleo I.,
Maldonado Prado J.,
Micela G.,
Molinari E.,
Poretti E.,
Phillips D.,
Tripodo G.,
Cecconi M.,
Galli A.,
Gonzalez M. D.,
Guerra Padilla V.,
Guerra Ramòn J. G.,
Harutyunyan A.,
Hernàndez Càceres N.,
Hernàndez Dìaz M.
, et al. (5 additional authors not shown)
Abstract:
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an ent…
▽ More
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an entirely new area of investigation that will provide timely results to improve the search of telluric planets with NIR spectrographs such as iSHELL, CARMENES, and GIANO-B. We will extract several disc-integrated activity indicators and average magnetic field measurements for the Sun in the NIR. Eventually, they will be correlated with both the RV of the Sun-as-a -star and the resolved images of the solar disc in visible and NIR. Such an approach will allow for a better understanding of the origin of activity-induced RV variations in the two spectral domains and will help in improving the techniques for their corrections. In this paper, we outline the science drivers for the LOCNES project and its first commissioning results.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Canonical Resolutions over Koszul Algebras
Authors:
Eleonore Faber,
Martina Juhnke-Kubitzke,
Haydee Lindo,
Claudia Miller,
Rebecca R. G.,
Alexandra Seceleanu
Abstract:
We generalize Buchsbaum and Eisenbud's resolutions for the powers of the maximal ideal of a polynomial ring to resolve powers of the homogeneous maximal ideal over graded Koszul algebras. Our approach has the advantage of producing resolutions that are both more explicit and minimal compared to those previously discovered by Green and Martínez-Villa \cite{GreenMartinezVilla} or Martínez-Villa and…
▽ More
We generalize Buchsbaum and Eisenbud's resolutions for the powers of the maximal ideal of a polynomial ring to resolve powers of the homogeneous maximal ideal over graded Koszul algebras. Our approach has the advantage of producing resolutions that are both more explicit and minimal compared to those previously discovered by Green and Martínez-Villa \cite{GreenMartinezVilla} or Martínez-Villa and Zacharia \cite{MartinezVillaZacharia}.
△ Less
Submitted 5 May, 2021; v1 submitted 24 November, 2020;
originally announced November 2020.
-
A Representation of Hyponormal Absolutely Norm Attaining Operators
Authors:
Neeru Bala,
Ramesh G
Abstract:
In this article, we characterize absolutely norm attaining normal operators in terms of the essential spectrum. Later we prove a structure theorem for hyponormal absolutely norm attaining (or $\mathcal{AN}$-operators in short) and deduce conditions for the normality of the operator.
In this article, we characterize absolutely norm attaining normal operators in terms of the essential spectrum. Later we prove a structure theorem for hyponormal absolutely norm attaining (or $\mathcal{AN}$-operators in short) and deduce conditions for the normality of the operator.
△ Less
Submitted 10 December, 2020; v1 submitted 8 October, 2020;
originally announced October 2020.
-
All-Digital FPGA-based DAC with None or Few External Components
Authors:
Luis E. Rueda G.,
Edward Silva,
Andres Centeno,
Elkim Roa
Abstract:
One of the many limitations with the mixed-signal design is physically testing circuit ideas. While it is easier to test digital circuits with FPGAs, this can not be done usually with mixed-signal circuits. Although some FPGAs have built-in analog-to-digital and digital-to-analog converters, regular commercial FPGAs development boards and low-cost FPGAs lack built-in data converters. Here we intro…
▽ More
One of the many limitations with the mixed-signal design is physically testing circuit ideas. While it is easier to test digital circuits with FPGAs, this can not be done usually with mixed-signal circuits. Although some FPGAs have built-in analog-to-digital and digital-to-analog converters, regular commercial FPGAs development boards and low-cost FPGAs lack built-in data converters. Here we introduce an all-digital FPGA-based DAC, which is one of the main blocks to enable mixed-signal experiments. The DAC can be synthesized entirely in an FPGA and does not require the use of external components. Furthermore, and to extend its range of applications, a discussion regarding the proposed DAC's problems and possible solutions is presented. Experimental demonstration of a 4-bit and a 5-bit DAC corroborate the theoretical analysis developed in this work. This work also suggests a scheme which includes few external resistors to improve the linearity (DNL$\leq$0.25LSB and an INL$\leq$0.5LSB), and the power consumption (5X improvement over the standalone configuration).
△ Less
Submitted 2 August, 2020;
originally announced August 2020.
-
Nakayama closures, interior operations, and core-hull duality
Authors:
Neil Epstein,
Rebecca R. G.,
Janet Vassilev
Abstract:
Exploiting the interior-closure duality developed by Epstein and R.G., we show that for the class of Matlis dualizable modules $\mathcal{M}$ over a Noetherian local ring, when cl is a Nakayama closure and i its dual interior, there is a duality between cl-reductions and i-expansions that leads to a duality between the cl-core of modules in $\mathcal{M}$ and the i-hull of modules in…
▽ More
Exploiting the interior-closure duality developed by Epstein and R.G., we show that for the class of Matlis dualizable modules $\mathcal{M}$ over a Noetherian local ring, when cl is a Nakayama closure and i its dual interior, there is a duality between cl-reductions and i-expansions that leads to a duality between the cl-core of modules in $\mathcal{M}$ and the i-hull of modules in $\mathcal{M}^\vee$. We further show that many algebra and module closures and interiors are Nakayama and describe a method to compute the interior of ideals using closures and colons. We use our methods to give a unified proof of the equivalence of F-rationality with F-regularity, and of F-injectivity with F-purity, in the complete Gorenstein local case. Additionally, we give a new characterization of the finitistic tight closure test ideal in terms of maps from $R^{1/p^e}$. Moreover, we show that the liftable integral spread of a module exists.
△ Less
Submitted 4 August, 2020; v1 submitted 23 July, 2020;
originally announced July 2020.
-
Hardy type inequalities and parametric Lamb equation
Authors:
Makarov R. V.,
Nasibullin R. G
Abstract:
This paper is devoted to Hardy type inequalities with remainders for compactly supported smooth functions on open sets in the Euclidean space. We establish new inequalities with weight functions depending on the distance function to the boundary of the domain. One-dimensional $L_1$ and $L_p$ inequalities and their multidimensional analogues are proved. We consider spatial inequalities in open conv…
▽ More
This paper is devoted to Hardy type inequalities with remainders for compactly supported smooth functions on open sets in the Euclidean space. We establish new inequalities with weight functions depending on the distance function to the boundary of the domain. One-dimensional $L_1$ and $L_p$ inequalities and their multidimensional analogues are proved. We consider spatial inequalities in open convex domains with the finite inner radius. Constants in these inequalities depend on the roots of parametric Lamb equation for the Bessel function and turn out to be sharp in some particular cases.
△ Less
Submitted 19 March, 2020;
originally announced March 2020.
-
Structural adaptation in the density model
Authors:
Lepski O. V.,
Rebelles G
Abstract:
This paper deals with non-parametric density estimation on $\bR^2$ from i.i.d observations. It is assumed that after unknown rotation of the coordinate system the coordinates of the observations are independent random variables whose densities belong to a Hölder class with unknown parameters. The minimax and adaptive minimax theories for this structural statistical model are developed.
This paper deals with non-parametric density estimation on $\bR^2$ from i.i.d observations. It is assumed that after unknown rotation of the coordinate system the coordinates of the observations are independent random variables whose densities belong to a Hölder class with unknown parameters. The minimax and adaptive minimax theories for this structural statistical model are developed.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
Image-Based Feature Representation for Insider Threat Classification
Authors:
Gayathri R G,
Atul Sajjanhar,
Yong Xiang
Abstract:
Insiders are the trusted entities in the organization, but poses threat to the with access to sensitive information network and resources. The insider threat detection is a well studied problem in security analytics. Identifying the features from data sources and using them with the right data analytics algorithms makes various kinds of threat analysis possible. The insider threat analysis is main…
▽ More
Insiders are the trusted entities in the organization, but poses threat to the with access to sensitive information network and resources. The insider threat detection is a well studied problem in security analytics. Identifying the features from data sources and using them with the right data analytics algorithms makes various kinds of threat analysis possible. The insider threat analysis is mainly done using the frequency based attributes extracted from the raw data available from data sources. In this paper, we propose an image-based feature representation of the daily resource usage pattern of users in the organization. The features extracted from the audit files of the organization are represented as gray scale images. Hence, these images are used to represent the resource access patterns and thereby the behavior of users. Classification models are applied to the representative images to detect anomalous behavior of insiders. The images are classified to malicious and non-malicious. The effectiveness of the proposed representation is evaluated using the CMU CERT data V4.2, and state-of-art image classification models like Mobilenet, VGG and ResNet. The experimental results showed improved accuracy. The comparison with existing works show a performance improvement in terms of high recall and precision values.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
Lightning Impulse Current Tests on some Electroconductive Fabrics
Authors:
Jorge A. Cristancho C.,
Carlos A. Rivera G.,
Jorge E. Rodriguez M.,
John J. Pantoja A.,
Liz K. Herrera Q.,
Francisco Roman
Abstract:
On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polym…
▽ More
On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polymeric film. Under laboratory conditions, each sample was subjected to several lengthwise subsequent lightning-like currents of 8/20 us standard waveform, recording both voltage and current signals. Optical and scanning electron microscope observations were performed after tests, revealing some patterns or morphological changes on the fabric surface. Despite these changes, the investigated conductive textiles withstand the several lightning impulse currents applied. Results suggest that some conductive fabrics could be used in personal mobile shelters, to protect human beings against the earth potential rise caused by a close lightning discharge.
△ Less
Submitted 2 May, 2023; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Betti numbers of the Frobenius powers of the maximal ideal over a general hypersurface
Authors:
Claudia Miller,
Hamidreza Rahmati,
Rebecca R. G
Abstract:
The main goal of this paper is to prove, in positive characteristic $p$, stability behavior for the graded Betti numbers in the periodic tails of the minimal resolutions of Frobenius powers of the homogeneous maximal ideals for very general choices of hypersurface in three variables whose degree has the opposite parity to that of $p$. We also find some of the structure of the matrix factorization…
▽ More
The main goal of this paper is to prove, in positive characteristic $p$, stability behavior for the graded Betti numbers in the periodic tails of the minimal resolutions of Frobenius powers of the homogeneous maximal ideals for very general choices of hypersurface in three variables whose degree has the opposite parity to that of $p$. We also find some of the structure of the matrix factorization giving the resolution. We achieve this by develo** a method for obtaining the degrees of the generators of the defining ideal of an $\mathfrak{c}$-compressed Gorenstein Artinian graded algebra from its socle degree, where $\mathfrak{c}$ is a Frobenius power of the homogeneous maximal ideal. As an application, we also obtain the Hilbert-Kunz function of the hypersurface ring, as well as the Castelnuovo-Mumford regularity of the quotients by Frobenius powers of the homogeneous maximal ideal.
△ Less
Submitted 21 March, 2023; v1 submitted 16 October, 2019;
originally announced October 2019.
-
Characteristic-free test ideals
Authors:
Felipe Pérez,
Rebecca R. G.
Abstract:
Tight closure test ideals have been central to the classification of singularities in rings of characteristic $p>0$, and via reduction to characteristic $p$, in equal characteristic zero as well. A summary of their properties and applications can be found in "A survey of test ideals" by Karl Schwede and Kevin Tucker. In this paper, we extend the notion of a test ideal to arbitrary closure operatio…
▽ More
Tight closure test ideals have been central to the classification of singularities in rings of characteristic $p>0$, and via reduction to characteristic $p$, in equal characteristic zero as well. A summary of their properties and applications can be found in "A survey of test ideals" by Karl Schwede and Kevin Tucker. In this paper, we extend the notion of a test ideal to arbitrary closure operations, particularly those coming from big Cohen-Macaulay modules and algebras, and prove that it shares key properties of tight closure test ideals. Our main results show how these test ideals can be used to give a characteristic-free classification of singularities, including a few specific results on the mixed characteristic case. We also compute examples of these test ideals.
△ Less
Submitted 2 February, 2021; v1 submitted 3 July, 2019;
originally announced July 2019.
-
Lipi Gnani - A Versatile OCR for Documents in any Language Printed in Kannada Script
Authors:
Shiva Kumar H R,
Ramakrishnan A G
Abstract:
A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas…
▽ More
A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas written in Kannada script. The coverage of the OCR is nearly complete in the sense that it recognizes all the punctuation marks, special symbols, Indo-Arabic and Kannada numerals and also the interspersed English words. Several minor and major original contributions have been done in develo** this OCR at the different processing stages such as binarization, line and character segmentation, recognition and Unicode map**. This has created a Kannada OCR that performs as good as, and in some cases, better than the Google's Tesseract OCR, as shown by the results. To the knowledge of the authors, this is the maiden report of a complete Kannada OCR, handling all the issues involved. Currently, there is no dictionary based postprocessing, and the obtained results are due solely to the recognition process. Four benchmark test databases containing scanned pages from books in Kannada, Sanskrit, Konkani and Tulu languages, but all of them printed in Kannada script, have been created. The word level recognition accuracy of Lipi Gnani is 4% higher on the Kannada dataset than that of Google's Tesseract OCR, 8% higher on the datasets of Tulu and Sanskrit, and 25% higher on the Konkani dataset.
△ Less
Submitted 2 January, 2019;
originally announced January 2019.
-
VECTORS: Video communication through opportunistic relays and scalable video coding
Authors:
Abhishek Thakur,
Arnav Dhamija,
Tejeshwar Reddy G
Abstract:
Crowd-sourced video distribution is frequently of interest in the local vicinity. In this paper, we propose a novel design to transfer such content over opportunistic networks with adaptive quality encoding to achieve reasonable delay bounds. The video segments are transmitted between source and destination in a delay tolerant manner using the Nearby Connections Android library. This implementatio…
▽ More
Crowd-sourced video distribution is frequently of interest in the local vicinity. In this paper, we propose a novel design to transfer such content over opportunistic networks with adaptive quality encoding to achieve reasonable delay bounds. The video segments are transmitted between source and destination in a delay tolerant manner using the Nearby Connections Android library. This implementation can be applied to multiple domains, including farm monitoring, wildlife, and environmental tracking, disaster response scenarios, etc. In this work, we present the design of an opportunistic contact based system, and we discuss basic results for the trial runs within our institute.
△ Less
Submitted 27 November, 2018;
originally announced November 2018.
-
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Authors:
Deepa K,
Radhamani G,
Vinod P,
Mohammad Shojafar,
Neeraj Kumar,
Mauro Conti
Abstract:
Ever increasing number of Android malware, has always been a concern for cybersecurity professionals. Even though plenty of anti-malware solutions exist, a rational and pragmatic approach for the same is rare and has to be inspected further. In this paper, we propose a novel two-set feature selection approach based on Rough Set and Statistical Test named as RSST to extract relevant system calls. T…
▽ More
Ever increasing number of Android malware, has always been a concern for cybersecurity professionals. Even though plenty of anti-malware solutions exist, a rational and pragmatic approach for the same is rare and has to be inspected further. In this paper, we propose a novel two-set feature selection approach based on Rough Set and Statistical Test named as RSST to extract relevant system calls. To address the problem of higher dimensional attribute set, we derived suboptimal system call space by applying the proposed feature selection method to maximize the separability between malware and benign samples. Comprehensive experiments conducted on a dataset consisting of 3500 samples with 30 RSST derived essential system calls resulted in an accuracy of 99.9%, Area Under Curve (AUC) of 1.0, with 1% False Positive Rate (FPR). However, other feature selectors (Information Gain, CFsSubsetEval, ChiSquare, FreqSel and Symmetric Uncertainty) used in the domain of malware analysis resulted in the accuracy of 95.5% with 8.5% FPR. Besides, empirical analysis of RSST derived system calls outperform other attributes such as permissions, opcodes, API, methods, call graphs, Droidbox attributes and network traces.
△ Less
Submitted 17 September, 2018;
originally announced September 2018.
-
Raga Identification using Repetitive Note Patterns from prescriptive notations of Carnatic Music
Authors:
Ranjani H. G.,
T. V. Sreenivas
Abstract:
Carnatic music, a form of Indian Art Music, has relied on an oral tradition for transferring knowledge across several generations. Over the last two hundred years, the use of prescriptive notations has been adopted for learning, sight-playing and sight-singing. Prescriptive notations offer generic guidelines for a raga rendition and do not include information about the ornamentations or the gamaka…
▽ More
Carnatic music, a form of Indian Art Music, has relied on an oral tradition for transferring knowledge across several generations. Over the last two hundred years, the use of prescriptive notations has been adopted for learning, sight-playing and sight-singing. Prescriptive notations offer generic guidelines for a raga rendition and do not include information about the ornamentations or the gamakas, which are considered to be critical for characterizing a raga. In this paper, we show that prescriptive notations contain raga attributes and can reliably identify a raga of Carnatic music from its octave-folded prescriptive notations. We restrict the notations to 7 notes and suppress the finer note position information. A dictionary based approach captures the statistics of repetitive note patterns within a raga notation. The proposed stochastic models of repetitive note patterns (or SMRNP in short) obtained from raga notations of known compositions, outperforms the state of the art melody based raga identification technique on an equivalent melodic data corresponding to the same compositions. This in turn shows that for Carnatic music, the note transitions and movements have a greater role in defining the raga structure than the exact note positions.
△ Less
Submitted 30 November, 2017;
originally announced November 2017.
-
Big Cohen-Macaulay and seed algebras in equal characteristic zero via ultraproducts
Authors:
Geoffrey D. Dietz,
Rebecca R. G
Abstract:
Let $R$ be a commutative, local, Noetherian ring. In a past article, the first author developed a theory of $R$-algebras, termed seeds, that can be mapped to balanced big Cohen-Macaulay $R$-algebras. In prime characteristic $p$, seeds can be characterized based on the existence of certain colon-killers, integral extensions of seeds are seeds, tensor products of seeds are seeds, and the seed proper…
▽ More
Let $R$ be a commutative, local, Noetherian ring. In a past article, the first author developed a theory of $R$-algebras, termed seeds, that can be mapped to balanced big Cohen-Macaulay $R$-algebras. In prime characteristic $p$, seeds can be characterized based on the existence of certain colon-killers, integral extensions of seeds are seeds, tensor products of seeds are seeds, and the seed property is stable under base change between complete, local domains. As a result, there exist directed systems of big Cohen-Macaulay algebras over complete, local domains. In this work, we will show that these properties can be extended to analogous results in equal characteristic zero. The primary tool for the extension will be the notion of ultraproducts for commutative rings as developed by Schoutens and Aschenbrenner.
△ Less
Submitted 5 March, 2017; v1 submitted 29 August, 2016;
originally announced August 2016.
-
$F$-singularities under generic linkage
Authors:
Linquan Ma,
Janet Page,
Rebecca R. G.,
William Taylor,
Wenliang Zhang
Abstract:
Let $R=k[x_1,\dots,x_n]$ be a polynomial ring over a prefect field of positive characteristic. Let $I$ be an unmixed ideal in $R$ and let $J$ be a generic link of $I$ in $S=R[u_{ij}]_{c \times r}$. We describe the parameter test submodule of $S/J$ in terms of the test ideal of the pair $(R, I)$ when a reduction of $I$ is a complete intersection or almost complete intersection. As an application, w…
▽ More
Let $R=k[x_1,\dots,x_n]$ be a polynomial ring over a prefect field of positive characteristic. Let $I$ be an unmixed ideal in $R$ and let $J$ be a generic link of $I$ in $S=R[u_{ij}]_{c \times r}$. We describe the parameter test submodule of $S/J$ in terms of the test ideal of the pair $(R, I)$ when a reduction of $I$ is a complete intersection or almost complete intersection. As an application, we deduce a criterion for when $S/J$ has $F$-rational singularities in these cases. We also compare the $F$-pure threshold of $(R, I)$ and $(S, J)$.
△ Less
Submitted 18 March, 2018; v1 submitted 13 July, 2016;
originally announced July 2016.