-
A quantum annealing approach to the minimum distance problem of quantum codes
Authors:
Refat Ismail,
Ashish Kakkar,
Anatoly Dymarsky
Abstract:
Quantum error-correcting codes (QECCs) is at the heart of fault-tolerant quantum computing. As the size of quantum platforms is expected to grow, one of the open questions is to design new optimal codes of ever-increasing size. A related challenge is to ``certify'' the quality of a given code by evaluating its minimum distance, a quantity characterizing code's capacity to preserve quantum informat…
▽ More
Quantum error-correcting codes (QECCs) is at the heart of fault-tolerant quantum computing. As the size of quantum platforms is expected to grow, one of the open questions is to design new optimal codes of ever-increasing size. A related challenge is to ``certify'' the quality of a given code by evaluating its minimum distance, a quantity characterizing code's capacity to preserve quantum information. This problem is known to be NP-hard. Here we propose to harness the power of contemporary quantum platforms to address this question, and in this way help design quantum platforms of the future. Namely, we introduce an approach to compute the minimum distance of quantum stabilizer codes by reformulating the problem as a Quadratic Unconstrained Binary Optimization (QUBO) problem and leveraging established QUBO algorithms and heuristics as well as quantum annealing (QA) to address the latter. The reformulation as a QUBO introduces only a logarithmic multiplicative overhead in the required number of variables. We demonstrate practical viability of our method by comparing the performance of purely classical algorithms with the D-Wave Advantage 4.1 quantum annealer as well as hybrid quantum-classical algorithm Qbsolv. We found that the hybrid approach demonstrates competitive performance, on par with the best available classical algorithms to solve QUBO. In a practical sense, the QUBO-based approach is currently lagging behind the best deterministic minimal distance algorithms, however this advantage may disappear as the size of the platforms grows.
△ Less
Submitted 3 July, 2024; v1 submitted 26 April, 2024;
originally announced April 2024.
-
Discovering Command and Control Channels Using Reinforcement Learning
Authors:
Cheng Wang,
Akshay Kakkar,
Christopher Redino,
Abdul Rahman,
A**syam S,
Ryan Clark,
Daniel Radke,
Tyler Cody,
Lanxiao Huang,
Edward Bowen
Abstract:
Command and control (C2) paths for issuing commands to malware are sometimes the only indicators of its existence within networks. Identifying potential C2 channels is often a manually driven process that involves a deep understanding of cyber tradecraft. Efforts to improve discovery of these channels through using a reinforcement learning (RL) based approach that learns to automatically carry out…
▽ More
Command and control (C2) paths for issuing commands to malware are sometimes the only indicators of its existence within networks. Identifying potential C2 channels is often a manually driven process that involves a deep understanding of cyber tradecraft. Efforts to improve discovery of these channels through using a reinforcement learning (RL) based approach that learns to automatically carry out C2 attack campaigns on large networks, where multiple defense layers are in place serves to drive efficiency for network operators. In this paper, we model C2 traffic flow as a three-stage process and formulate it as a Markov decision process (MDP) with the objective to maximize the number of valuable hosts whose data is exfiltrated. The approach also specifically models payload and defense mechanisms such as firewalls which is a novel contribution. The attack paths learned by the RL agent can in turn help the blue team identify high-priority vulnerabilities and develop improved defense strategies. The method is evaluated on a large network with more than a thousand hosts and the results demonstrate that the agent can effectively learn attack paths while avoiding firewalls.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Partition functions for $U(1)$ vectors and phases of scalar QED in AdS
Authors:
Astha Kakkar,
Swarnendu Sarkar
Abstract:
We extend the computation of one-loop partition function in AdS$_{d+1}$ using the method in [arXiv:2201.09043] and [arXiv:2303.02711] for scalars and fermions to the case of $U(1)$ vectors. This method utilizes the eigenfunctions of the AdS Laplacian for vectors. For finite temperature, the partition function is obtained by generalizing the eigenfunctions so that they are invariant under the quoti…
▽ More
We extend the computation of one-loop partition function in AdS$_{d+1}$ using the method in [arXiv:2201.09043] and [arXiv:2303.02711] for scalars and fermions to the case of $U(1)$ vectors. This method utilizes the eigenfunctions of the AdS Laplacian for vectors. For finite temperature, the partition function is obtained by generalizing the eigenfunctions so that they are invariant under the quotient group action, which defines the thermal AdS spaces. The results obtained match with those available in the literature. As an application of these results, we then analyze phases of scalar QED theories at one-loop in $d=2,3$. We do this first as functions of AdS radius at zero temperature showing that the results reduce to those in flat space in the large AdS radius limit. Thereafter the phases are studied as a function of the scalar mass and temperature. We also derive effective potentials and study phases of the scalar QED theories with $N$ scalars.
△ Less
Submitted 22 June, 2024; v1 submitted 10 November, 2023;
originally announced November 2023.
-
Enhancing Exfiltration Path Analysis Using Reinforcement Learning
Authors:
Riddam Rishu,
Akshay Kakkar,
Cheng Wang,
Abdul Rahman,
Christopher Redino,
Dhruv Nandakumar,
Tyler Cody,
Ryan Clark,
Daniel Radke,
Edward Bowen
Abstract:
Building on previous work using reinforcement learning (RL) focused on identification of exfiltration paths, this work expands the methodology to include protocol and payload considerations. The former approach to exfiltration path discovery, where reward and state are associated specifically with the determination of optimal paths, are presented with these additional realistic characteristics to…
▽ More
Building on previous work using reinforcement learning (RL) focused on identification of exfiltration paths, this work expands the methodology to include protocol and payload considerations. The former approach to exfiltration path discovery, where reward and state are associated specifically with the determination of optimal paths, are presented with these additional realistic characteristics to account for nuances in adversarial behavior. The paths generated are enhanced by including communication payload and protocol into the Markov decision process (MDP) in order to more realistically emulate attributes of network based exfiltration events. The proposed method will help emulate complex adversarial considerations such as the size of a payload being exported over time or the protocol on which it occurs, as is the case where threat actors steal data over long periods of time using system native ports or protocols to avoid detection. As such, practitioners will be able to improve identification of expected adversary behavior under various payload and protocol assumptions more comprehensively.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
GenSelfDiff-HIS: Generative Self-Supervision Using Diffusion for Histopathological Image Segmentation
Authors:
Vishnuvardhan Purma,
Suhas Srinath,
Seshan Srirangarajan,
Aanchal Kakkar,
Prathosh A. P
Abstract:
Histopathological image segmentation is a laborious and time-intensive task, often requiring analysis from experienced pathologists for accurate examinations. To reduce this burden, supervised machine-learning approaches have been adopted using large-scale annotated datasets for histopathological image analysis. However, in several scenarios, the availability of large-scale annotated data is a bot…
▽ More
Histopathological image segmentation is a laborious and time-intensive task, often requiring analysis from experienced pathologists for accurate examinations. To reduce this burden, supervised machine-learning approaches have been adopted using large-scale annotated datasets for histopathological image analysis. However, in several scenarios, the availability of large-scale annotated data is a bottleneck while training such models. Self-supervised learning (SSL) is an alternative paradigm that provides some respite by constructing models utilizing only the unannotated data which is often abundant. The basic idea of SSL is to train a network to perform one or many pseudo or pretext tasks on unannotated data and use it subsequently as the basis for a variety of downstream tasks. It is seen that the success of SSL depends critically on the considered pretext task. While there have been many efforts in designing pretext tasks for classification problems, there haven't been many attempts on SSL for histopathological segmentation. Motivated by this, we propose an SSL approach for segmenting histopathological images via generative diffusion models in this paper. Our method is based on the observation that diffusion models effectively solve an image-to-image translation task akin to a segmentation task. Hence, we propose generative diffusion as the pretext task for histopathological image segmentation. We also propose a multi-loss function-based fine-tuning for the downstream task. We validate our method using several metrics on two publically available datasets along with a newly proposed head and neck (HN) cancer dataset containing hematoxylin and eosin (H\&E) stained images along with annotations. Codes will be made public at https://github.com/PurmaVishnuVardhanReddy/GenSelfDiff-HIS.git.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Phases of theories with fermions in AdS
Authors:
Astha Kakkar,
Swarnendu Sarkar
Abstract:
We study the phases of Yukawa theories at weak coupling and the Gross-Neveu models in AdS spaces at zero and finite temperature. Following the method used in \cite{Kakkar:2022hub}, we first compute the one-loop partition functions, using the generalized eigenfunctions of the Laplacian on Euclidean AdS in the PoincarĂ© coordinates. These functions satisfy desired periodicities under thermal identifi…
▽ More
We study the phases of Yukawa theories at weak coupling and the Gross-Neveu models in AdS spaces at zero and finite temperature. Following the method used in \cite{Kakkar:2022hub}, we first compute the one-loop partition functions, using the generalized eigenfunctions of the Laplacian on Euclidean AdS in the Poincaré coordinates. These functions satisfy desired periodicities under thermal identification. The method replicates results for partition functions known in the literature. We then study the phases of these field theories with fermions as regions in the corresponding parameter spaces at zero temperature. The phases and the corresponding phase boundaries are further identified as a function of the mass-squared of the scalar field and temperature for the Yukawa theories. While for the Gross-Neveu models, the changes in the phases as a function of the fermionic mass and the coupling constant at finite temperature are discussed. The Gross-Neveu-Yukawa model is studied for AdS$_4$. We also note certain deviations from phases of these theories in flat space.
△ Less
Submitted 5 March, 2023;
originally announced March 2023.
-
Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Authors:
Lanxiao Huang,
Tyler Cody,
Christopher Redino,
Abdul Rahman,
Akshay Kakkar,
Deepak Kushwaha,
Cheng Wang,
Ryan Clark,
Daniel Radke,
Peter Beling,
Edward Bowen
Abstract:
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on develo** RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while…
▽ More
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on develo** RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale factor.
△ Less
Submitted 6 November, 2022;
originally announced November 2022.
-
Lateral Movement Detection Using User Behavioral Analysis
Authors:
Deepak Kushwaha,
Dhruv Nandakumar,
Akshay Kakkar,
Sanvi Gupta,
Kevin Choi,
Christopher Redino,
Abdul Rahman,
Sabthagiri Saravanan Chandramohan,
Edward Bowen,
Matthew Weeks,
Aaron Shaha,
Joe Nehila
Abstract:
Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated det…
▽ More
Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated detection mechanisms to proactively detect such threats in near real-time at enterprise scale. In this paper, the authors propose a novel, lightweight method for Lateral Movement detection using user behavioral analysis and machine learning. Specifically, this paper introduces a novel methodology for cyber domain-specific feature engineering that identifies Lateral Movement behavior on a per-user basis. Furthermore, the engineered features have also been used to develop two supervised machine learning models for Lateral Movement identification that have demonstrably outperformed models previously seen in literature while maintaining robust performance on datasets with high class imbalance. The models and methodology introduced in this paper have also been designed in collaboration with security operators to be relevant and interpretable in order to maximize impact and minimize time to value as a cyber threat detection toolkit. The underlying goal of the paper is to provide a computationally efficient, domain-specific approach to near real-time Lateral Movement detection that is interpretable and robust to enterprise-scale data volumes and class imbalance.
△ Less
Submitted 29 August, 2022;
originally announced August 2022.
-
Spectrum of quantum KdV hierarchy in the semiclassical limit
Authors:
Anatoly Dymarsky,
Ashish Kakkar,
Kirill Pavlenko,
Sotaro Sugishita
Abstract:
We employ semiclassical quantization to calculate spectrum of quantum KdV charges in the limit of large central charge $c$. Classically, KdV charges $Q_{2n-1}$ generate completely integrable dynamics on the co-adjoint orbit of the Virasoro algebra. They can be expressed in terms of action variables $I_k$, e.g.~as a power series expansion. Quantum-mechanically this series becomes the expansion in…
▽ More
We employ semiclassical quantization to calculate spectrum of quantum KdV charges in the limit of large central charge $c$. Classically, KdV charges $Q_{2n-1}$ generate completely integrable dynamics on the co-adjoint orbit of the Virasoro algebra. They can be expressed in terms of action variables $I_k$, e.g.~as a power series expansion. Quantum-mechanically this series becomes the expansion in $1/c$, while action variables become integer-valued quantum numbers $n_i$. Crucially, classical expression, which is homogeneous in $I_k$, acquires quantum corrections that include terms of subleading powers in $n_k$. At first two non-trivial orders in $1/c$ expansion these ``quantum'' terms can be fixed from the analytic form of $Q_{2n-1}$ acting on the primary states. In this way we find explicit expression for the spectrum of $Q_{2n-1}$ up to first three orders in $1/c$ expansion. We apply this result to study thermal expectation values of $Q_{2n-1}$ and free energy of the KdV Generalized Gibbs Ensemble.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
Narain CFTs and Quantum Codes at Higher Genus
Authors:
Johan Henriksson,
Ashish Kakkar,
Brian McPeak
Abstract:
Code CFTs are 2d conformal field theories defined by error-correcting codes. Recently, Dymarsky and Shapere generalized the construction of code CFTs to include quantum error-correcting codes. In this paper, we explore this connection at higher genus. We prove that the higher-genus partition functions take the form of polynomials of higher-weight theta functions, and that the higher-genus modular…
▽ More
Code CFTs are 2d conformal field theories defined by error-correcting codes. Recently, Dymarsky and Shapere generalized the construction of code CFTs to include quantum error-correcting codes. In this paper, we explore this connection at higher genus. We prove that the higher-genus partition functions take the form of polynomials of higher-weight theta functions, and that the higher-genus modular group acts as simple linear transformations on these polynomials. We explain how to solve the modular constraints explicitly, which we do for genus 2. The result is that modular invariance at genus 1 and genus 2 is much more constraining than genus 1 alone. This allows us to drastically reduce the space of possible code CFTs. We also consider a number of examples of "isospectral theories" -- CFTs with the same genus 1 partition function -- and we find that they have different genus 2 partition functions. Finally, we make connection to some 2d CFTs known from the modular bootstrap. The $n = 4$ theory conjectured to have the largest possible gap, the $SO(8)$ WZW model, is a code CFT, allowing us to give an expression for its genus 2 partition function. We also find some other known CFTs which are not code theories but whose partition functions satisfy the same simple polynomial ansatz as the code theories. This leads us to speculate about the usefulness of the code polynomial form beyond the study of code CFTs.
△ Less
Submitted 29 April, 2022;
originally announced May 2022.
-
Characterizing Error Mitigation by Symmetry Verification in QAOA
Authors:
Ashish Kakkar,
Jeffrey Larson,
Alexey Galda,
Ruslan Shaydulin
Abstract:
Hardware errors are a major obstacle to demonstrating quantum advantage with the quantum approximate optimization algorithm (QAOA). Recently, symmetry verification has been proposed and empirically demonstrated to boost the quantum state fidelity, the expected solution quality, and the success probability of QAOA on a superconducting quantum processor. Symmetry verification uses parity checks that…
▽ More
Hardware errors are a major obstacle to demonstrating quantum advantage with the quantum approximate optimization algorithm (QAOA). Recently, symmetry verification has been proposed and empirically demonstrated to boost the quantum state fidelity, the expected solution quality, and the success probability of QAOA on a superconducting quantum processor. Symmetry verification uses parity checks that leverage the symmetries of the objective function to be optimized. We develop a theoretical framework for analyzing this approach under local noise and derive explicit formulas for fidelity improvements on problems with global $\mathbb{Z}_2$ symmetry. We numerically investigate the symmetry verification on the MaxCut problem and identify the error regimes in which this approach improves the QAOA objective. We observe that these regimes correspond to the error rates present in near-term hardware. We further demonstrate the efficacy of symmetry verification on an IonQ trapped ion quantum processor where an improvement in the QAOA objective of up to 19.2\% is observed.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Authors:
Tyler Cody,
Abdul Rahman,
Christopher Redino,
Lanxiao Huang,
Ryan Clark,
Akshay Kakkar,
Deepak Kushwaha,
Paul Park,
Peter Beling,
Edward Bowen
Abstract:
Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts w…
▽ More
Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts within their proximity. This work inverts the previous CJ approach based on the assumption that data has been stolen and now must be quietly exfiltrated from the network. RL is utilized to support the development of a reward function based on the identification of those paths where adversaries desire reduced detection. Results demonstrate promising performance for a sizable network environment.
△ Less
Submitted 25 April, 2022; v1 submitted 28 January, 2022;
originally announced January 2022.
-
On partition functions and phases of scalars in AdS
Authors:
Astha Kakkar,
Swarnendu Sarkar
Abstract:
We study the phases of scalar field theories in thermal $AdS_{d+1}$ spaces for $d=1,2,3$. The analysis is done for theories with global $O(N)$ symmetry for the finite as well as large $N$. The symmetry-preserving and symmetry-breaking phases are identified as a function of the mass-squared of the scalar field and temperature. On the way we also describe a method for computing one-loop partition fu…
▽ More
We study the phases of scalar field theories in thermal $AdS_{d+1}$ spaces for $d=1,2,3$. The analysis is done for theories with global $O(N)$ symmetry for the finite as well as large $N$. The symmetry-preserving and symmetry-breaking phases are identified as a function of the mass-squared of the scalar field and temperature. On the way we also describe a method for computing one-loop partition function for scalar field on thermal $AdS_{d+1}$ for arbitrary $d$ that reproduces results known in the literature. The derivation is based on the method of images and uses the eigenfunctions of the Laplacian on Euclidean $AdS$.
△ Less
Submitted 16 February, 2023; v1 submitted 22 January, 2022;
originally announced January 2022.
-
Classical Codes and Chiral CFTs at Higher Genus
Authors:
Johan Henriksson,
Ashish Kakkar,
Brian McPeak
Abstract:
Higher genus modular invariance of two-dimensional conformal field theories (CFTs) is a largely unexplored area. In this paper, we derive explicit expressions for the higher genus partition functions of a specific class of CFTs: code CFTs, which are constructed using classical error-correcting codes. In this setting, the $\mathrm{Sp}(2g,\mathbb Z)$ modular transformations of genus $g$ Riemann surf…
▽ More
Higher genus modular invariance of two-dimensional conformal field theories (CFTs) is a largely unexplored area. In this paper, we derive explicit expressions for the higher genus partition functions of a specific class of CFTs: code CFTs, which are constructed using classical error-correcting codes. In this setting, the $\mathrm{Sp}(2g,\mathbb Z)$ modular transformations of genus $g$ Riemann surfaces can be recast as a simple set of linear maps acting on $2^g$ polynomial variables, which comprise an object called the code enumerator polynomial. The CFT partition function is directly related to the enumerator polynomial, meaning that solutions of the linear constraints from modular invariance immediately give a set of seemingly consistent partition functions at a given genus. We then find that higher genus constraints, plus consistency under degeneration limits of the Riemann surface, greatly reduces the number of possible code CFTs. This work provides a step towards a full understanding of the constraints from higher genus modular invariance on 2d CFTs.
△ Less
Submitted 29 April, 2022; v1 submitted 9 December, 2021;
originally announced December 2021.
-
Information Geometry and Holographic Correlators
Authors:
Hardik Bohra,
Ashish Kakkar,
Allic Sivaramakrishnan
Abstract:
We explore perturbative corrections to quantum information geometry. In particular, we study a Bures information metric naturally associated with the correlation functions of a conformal field theory. We compute the metric of holographic four-point functions and include corrections generated by tree Witten diagrams in the bulk. In this setting, we translate properties of correlators into the langu…
▽ More
We explore perturbative corrections to quantum information geometry. In particular, we study a Bures information metric naturally associated with the correlation functions of a conformal field theory. We compute the metric of holographic four-point functions and include corrections generated by tree Witten diagrams in the bulk. In this setting, we translate properties of correlators into the language of information geometry. Cross terms in the information metric encode non-identity operators in the OPE. We find that the information metric is asymptotically AdS. Finally, we discuss an information metric for transition amplitudes.
△ Less
Submitted 30 November, 2021; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Isoperimetry in Surfaces of Revolution with Density
Authors:
Eliot Bongiovanni,
Alejandro Diaz,
Arjun Kakkar,
Nat Sothanaphan
Abstract:
The isoperimetric problem with a density or weighting seeks to enclose prescribed weighted volume with minimum weighted perimeter. According to Chambers' recent proof of the log-convex density conjecture, for many densities on $\mathbb{R}^n$ the answer is a sphere about the origin. We seek to generalize his results to some other spaces of revolution or to two different densities for volume and per…
▽ More
The isoperimetric problem with a density or weighting seeks to enclose prescribed weighted volume with minimum weighted perimeter. According to Chambers' recent proof of the log-convex density conjecture, for many densities on $\mathbb{R}^n$ the answer is a sphere about the origin. We seek to generalize his results to some other spaces of revolution or to two different densities for volume and perimeter. We provide general results on existence and boundedness and a new approach to proving circles about the origin isoperimetric.
△ Less
Submitted 30 June, 2018; v1 submitted 18 September, 2017;
originally announced September 2017.
-
The Least-Area Tetrahedral Tile of Space
Authors:
Eliot Bongiovanni,
Alejandro Diaz,
Arjun Kakkar,
Nat Sothanaphan
Abstract:
We determine the least-area unit-volume tetrahedral tile of Euclidean space, without the constraint of Gallagher et al. that the tiling uses only orientation-preserving images of the tile. The winner remains Sommerville's type 4v.
We determine the least-area unit-volume tetrahedral tile of Euclidean space, without the constraint of Gallagher et al. that the tiling uses only orientation-preserving images of the tile. The winner remains Sommerville's type 4v.
△ Less
Submitted 5 June, 2019; v1 submitted 13 September, 2017;
originally announced September 2017.
-
Double Bubbles on the Real Line with Log-Convex Density
Authors:
Eliot Bongiovanni,
Leonardo Di Giosia,
Alejandro Diaz,
Jahangir Habib,
Arjun Kakkar,
Lea Kenigsberg,
Dylanger Pittman,
Nat Sothanaphan,
Weitao Zhu
Abstract:
The classic double bubble theorem says that the least-perimeter way to enclose and separate two prescribed volumes in $\mathbb{R}^N$ is the standard double bubble. We seek the optimal double bubble in $\mathbb{R}^N$ with density, which we assume to be strictly log-convex. For $N=1$ we show that the solution is sometimes two contiguous intervals and sometimes three contiguous intervals. In higher d…
▽ More
The classic double bubble theorem says that the least-perimeter way to enclose and separate two prescribed volumes in $\mathbb{R}^N$ is the standard double bubble. We seek the optimal double bubble in $\mathbb{R}^N$ with density, which we assume to be strictly log-convex. For $N=1$ we show that the solution is sometimes two contiguous intervals and sometimes three contiguous intervals. In higher dimensions, we think that the solution is sometimes a standard double bubble and sometimes concentric spheres (e.g. for one volume small and the other large).
△ Less
Submitted 7 December, 2018; v1 submitted 10 August, 2017;
originally announced August 2017.
-
Flat Holography: Aspects of the dual field theory
Authors:
Arjun Bagchi,
Rudranil Basu,
Ashish Kakkar,
Aditya Mehra
Abstract:
Assuming the existence of a field theory in D dimensions dual to (D+1)-dimensional flat space, governed by the asymptotic symmetries of flat space, we make some preliminary remarks about the properties of this field theory. We review briefly some successes of the 3d bulk - 2d boundary case and then focus on the 4d bulk - 3d boundary example, where the symmetry in question is the infinite dimension…
▽ More
Assuming the existence of a field theory in D dimensions dual to (D+1)-dimensional flat space, governed by the asymptotic symmetries of flat space, we make some preliminary remarks about the properties of this field theory. We review briefly some successes of the 3d bulk - 2d boundary case and then focus on the 4d bulk - 3d boundary example, where the symmetry in question is the infinite dimensional BMS4 algebra. We look at the constraints imposed by this symmetry on a 3d field theory by constructing highest weight representations of this algebra. We construct two and three point functions of BMS primary fields and surprisingly find that symmetries constrain these correlators to be identical to those of a 2d relativistic conformal field theory. We then go one dimension higher and construct prototypical examples of 4d field theories which are putative duals of 5d Minkowski spacetimes. These field theories are ultra-relativistic limits of electrodynamics and Yang-Mills theories which exhibit invariance under the conformal Carroll group in D=4. We explore the different sectors within these Carrollian gauge theories and investigate the symmetries of the equations of motion to find that an infinite ultra-relativistic conformal structure arises in each case.
△ Less
Submitted 20 September, 2016;
originally announced September 2016.
-
Galilean Yang-Mills Theory
Authors:
Arjun Bagchi,
Rudranil Basu,
Ashish Kakkar,
Aditya Mehra
Abstract:
We investigate the symmetry structure of the non-relativistic limit of Yang-Mills theories. Generalising previous results in the Galilean limit of electrodynamics, we discover that for Yang-Mills theories there are a variety of limits inside the Galilean regime. We first explicitly work with the $SU(2)$ theory and then generalise to $SU(N)$ for all $N$, systematising our notation and analysis. We…
▽ More
We investigate the symmetry structure of the non-relativistic limit of Yang-Mills theories. Generalising previous results in the Galilean limit of electrodynamics, we discover that for Yang-Mills theories there are a variety of limits inside the Galilean regime. We first explicitly work with the $SU(2)$ theory and then generalise to $SU(N)$ for all $N$, systematising our notation and analysis. We discover that the whole family of limits lead to different sectors of Galilean Yang-Mills theories and the equations of motion in each sector exhibit hitherto undiscovered infinite dimensional symmetries, viz. infinite Galilean Conformal symmetries in $D=4$. These provide the first examples of interacting Galilean Conformal Field Theories (GCFTs) in $D>2$.
△ Less
Submitted 28 December, 2015;
originally announced December 2015.