-
SN 2022oqm -- a Ca-rich explosion of a compact progenitor embedded in C/O circumstellar material
Authors:
I. Irani,
** Chen,
Jonathan Morag,
S. Schulze,
A. Gal-Yam,
Nora L. Strotjohann,
Ofer Yaron,
E. A. Zimmerman,
Amir Sharon,
Daniel A. Perley,
J. Sollerman,
Aaron Tohuvavohu,
Kaustav K. Das,
Mansi M. Kasliwal,
Rachel Bruch,
Thomas G. Brink,
WeiKang Zheng,
Kishore C. Patra,
Sergiy S. Vasylyev,
Alexei V. Filippenko,
Yi Yang,
Matthew J. Graham,
Joshua S. Bloom,
Paolo Mazzali,
Josiah Purdum
, et al. (5 additional authors not shown)
Abstract:
We present the discovery and analysis of SN\,2022oqm, a Type Ic supernova (SN) detected $<1$\,day after explosion. The SN rises to a blue and short-lived (2\,days) initial peak. Early-time spectral observations of SN\,2022oqm show a hot (40,000\,K) continuum with high-ionization C and O absorption features at velocities of 4000\,km\,s$^{-1}$, while its photospheric radius expands at 20,000\,\kms,…
▽ More
We present the discovery and analysis of SN\,2022oqm, a Type Ic supernova (SN) detected $<1$\,day after explosion. The SN rises to a blue and short-lived (2\,days) initial peak. Early-time spectral observations of SN\,2022oqm show a hot (40,000\,K) continuum with high-ionization C and O absorption features at velocities of 4000\,km\,s$^{-1}$, while its photospheric radius expands at 20,000\,\kms, indicating a pre-existing distribution of expanding C/O material. After $\sim2.5$\,days, both the spectrum and light curves evolve into those of a typical SN Ic, with line velocities of $\sim10,000$\,km\,s$^{-1}$, in agreement with the photospheric radius evolution. The optical light curves reach a second peak at $t\approx15$\,days. By $t=60$\,days, the spectrum of \oqm\ becomes nearly nebular, displaying strong \ion{Ca}{2} and [\ion{Ca}{2}] emission with no detectable [\ion{O}{1}], marking this event as Ca-rich. The early behavior can be explained by $10^{-3}$\,\msun\ of optically thin circumstellar material (CSM) surrounding either (1) a massive compact progenitor such as a Wolf-Rayet star, (2) a massive stripped progenitor with an extended envelope, or (3) a binary system with a white dwarf. We propose that the early-time light curve is powered by both interaction of the ejecta with the optically thin CSM and shock cooling (in the massive-star scenario). The observations can be explained by CSM that is optically thick to X-ray photons, is optically thick in the lines as seen in the spectra, and is optically thin to visible-light continuum photons that come either from downscattered X-rays or from the shock-heated ejecta. Calculations show that this scenario is self-consistent.
△ Less
Submitted 21 September, 2023; v1 submitted 5 October, 2022;
originally announced October 2022.
-
EraseNet: A Recurrent Residual Network for Supervised Document Cleaning
Authors:
Yashowardhan Shinde,
Kishore Kulkarni,
Sachin Kuberkar
Abstract:
Document denoising is considered one of the most challenging tasks in computer vision. There exist millions of documents that are still to be digitized, but problems like document degradation due to natural and man-made factors make this task very difficult. This paper introduces a supervised approach for cleaning dirty documents using a new fully convolutional auto-encoder architecture. This pape…
▽ More
Document denoising is considered one of the most challenging tasks in computer vision. There exist millions of documents that are still to be digitized, but problems like document degradation due to natural and man-made factors make this task very difficult. This paper introduces a supervised approach for cleaning dirty documents using a new fully convolutional auto-encoder architecture. This paper focuses on restoring documents with discrepancies like deformities caused due to aging of a document, creases left on the pages that were xeroxed, random black patches, lightly visible text, etc., and also improving the quality of the image for better optical character recognition system (OCR) performance. Removing noise from scanned documents is a very important step before the documents as this noise can severely affect the performance of an OCR system. The experiments in this paper have shown promising results as the model is able to learn a variety of ordinary as well as unusual noises and rectify them efficiently.
△ Less
Submitted 4 July, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Magnetic helicity fluxes from triple correlators
Authors:
Kishore Gopalakrishnan,
Kandaswamy Subramanian
Abstract:
Fluxes of the magnetic helicity density play an important role in large-scale turbulent dynamos, allowing the growth of large-scale magnetic fields while overcoming catastrophic quenching. We show here, analytically, how several important types of magnetic helicity fluxes can arise from terms involving triple correlators of fluctuating fields in the helicity density evolution equation. For this, w…
▽ More
Fluxes of the magnetic helicity density play an important role in large-scale turbulent dynamos, allowing the growth of large-scale magnetic fields while overcoming catastrophic quenching. We show here, analytically, how several important types of magnetic helicity fluxes can arise from terms involving triple correlators of fluctuating fields in the helicity density evolution equation. For this, we assume incompressibility and weak inhomogeneity, and use a quasinormal closure approximation: fourth-order correlators are replaced by products of second-order ones, and the effect of the fourth-order cumulants on the evolution of the third moments is modelled by a strong dam** term. First, we show how a diffusive helicity flux, till now only measured in simulations, arises from the triple correlation term. This is accompanied by what we refer to as a `random advective flux', which predominantly transports magnetic helicity along the gradients of the random fields. We also find that a new helicity flux contribution, in some aspects similar to that first proposed by Vishniac, can arise from the triple correlator. This contribution depends on the gradients of the random magnetic and kinetic energies along the large-scale vorticity, and thus arises in any rotating, stratified system, even if the turbulence is predominantly nonhelical. It can source a large-scale dynamo by itself while spatially transporting magnetic helicity within the system.
△ Less
Submitted 2 December, 2022; v1 submitted 29 September, 2022;
originally announced September 2022.
-
Document Image Binarization in JPEG Compressed Domain using Dual Discriminator Generative Adversarial Networks
Authors:
Bulla Rajesh,
Manav Kamlesh Agrawal,
Milan Bhuva,
Kisalaya Kishore,
Mohammed Javed
Abstract:
Image binarization techniques are being popularly used in enhancement of noisy and/or degraded images catering different Document Image Anlaysis (DIA) applications like word spotting, document retrieval, and OCR. Most of the existing techniques focus on feeding pixel images into the Convolution Neural Networks to accomplish document binarization, which may not produce effective results when workin…
▽ More
Image binarization techniques are being popularly used in enhancement of noisy and/or degraded images catering different Document Image Anlaysis (DIA) applications like word spotting, document retrieval, and OCR. Most of the existing techniques focus on feeding pixel images into the Convolution Neural Networks to accomplish document binarization, which may not produce effective results when working with compressed images that need to be processed without full decompression. Therefore in this research paper, the idea of document image binarization directly using JPEG compressed stream of document images is proposed by employing Dual Discriminator Generative Adversarial Networks (DD-GANs). Here the two discriminator networks - Global and Local work on different image ratios and use focal loss as generator loss. The proposed model has been thoroughly tested with different versions of DIBCO dataset having challenges like holes, erased or smudged ink, dust, and misplaced fibres. The model proved to be highly robust, efficient both in terms of time and space complexities, and also resulted in state-of-the-art performance in JPEG compressed domain.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Manifold Rewiring for Unlabeled Imaging
Authors:
Valentin Debarnot,
Vinith Kishore,
Cheng Shi,
Ivan Dokmanić
Abstract:
Geometric data analysis relies on graphs that are either given as input or inferred from data. These graphs are often treated as "correct" when solving downstream tasks such as graph signal denoising. But real-world graphs are known to contain missing and spurious links. Similarly, graphs inferred from noisy data will be perturbed. We thus define and study the problem of graph denoising, as oppose…
▽ More
Geometric data analysis relies on graphs that are either given as input or inferred from data. These graphs are often treated as "correct" when solving downstream tasks such as graph signal denoising. But real-world graphs are known to contain missing and spurious links. Similarly, graphs inferred from noisy data will be perturbed. We thus define and study the problem of graph denoising, as opposed to graph signal denoising, and propose an approach based on link-prediction graph neural networks. We focus in particular on neighborhood graphs over point clouds sampled from low-dimensional manifolds, such as those arising in imaging inverse problems and exploratory data analysis. We illustrate our graph denoising framework on regular synthetic graphs and then apply it to single-particle cryo-EM where the measurements are corrupted by very high levels of noise. Due to this degradation, the initial graph is contaminated by noise, leading to missing or spurious edges. We show that our proposed graph denoising algorithm improves the state-of-the-art performance of multi-frequency vector diffusion maps.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Spectropolarimetry of the Thermonuclear Supernova 2021rhu: High Calcium Polarization 79 Days After Peak Luminosity
Authors:
Yi Yang,
Huirong Yan,
Lifan Wang,
J. Craig Wheeler,
Dietrich Baade,
Howard Isaacson,
Aleksandar Cikota,
Justyn R. Maund,
Peter Hoeflich,
Ferdinando Patat,
Steven Giacalone,
Malena Rice,
Dakotah B. Tyler,
Divya Mishra,
Chris Ashall,
Thomas G. Brink,
Alexei V. Filippenko,
Llíus Galbany,
Kishore C. Patra,
Melissa Shahbandeh,
Sergiy S. Vasylyev,
Jozsef Vinkó
Abstract:
We report spectropolarimetric observations of the Type Ia supernova (SN) 2021rhu at four epochs: $-$7, +0, +36, and +79 days relative to its $B$-band maximum luminosity. A wavelength-dependent continuum polarization peaking at $3890 \pm 93$ Angstroms and reaching a level of $p_{\rm max}=1.78% \pm 0.02$% was found. The peak of the polarization curve is bluer than is typical in the Milky Way, indica…
▽ More
We report spectropolarimetric observations of the Type Ia supernova (SN) 2021rhu at four epochs: $-$7, +0, +36, and +79 days relative to its $B$-band maximum luminosity. A wavelength-dependent continuum polarization peaking at $3890 \pm 93$ Angstroms and reaching a level of $p_{\rm max}=1.78% \pm 0.02$% was found. The peak of the polarization curve is bluer than is typical in the Milky Way, indicating a larger proportion of small dust grains along the sightline to the SN. After removing the interstellar polarization, we found a pronounced increase of the polarization in the CaII near-infrared triplet, from $\sim$0.3% at day $-$7 to $\sim$2.5% at day +79. No temporal evolution in high-resolution flux spectra across the NaID and CaIIH&K features was seen from days +39 to +74, indicating that the late-time increase in polarization is intrinsic to the SN as opposed to being caused by scattering of SN photons in circumstellar or interstellar matter. We suggest that an explanation for the late-time rise of the CaII near-infrared triplet polarization may be the alignment of calcium atoms in a weak magnetic field through optical excitation/pum** by anisotropic radiation from the SN.
△ Less
Submitted 26 August, 2022;
originally announced August 2022.
-
Analysing Factors Affecting the Adoption of Ride-Hailing Services (RHS) in India? A Step-Wise LCCA-MCDM Modeling Approach
Authors:
Eeshan Bhaduri,
Shagufta Pal,
Arkopal Kishore Goswami
Abstract:
The study examines heterogeneity in travel behaviour among ride-hailing services (RHS) users by including attitudes, in order to reinforce conventional user-segmentation approaches. Simultaneously, prioritization of ride-hailing specific attributes was carried out to assess how RHS will operate in a sustainable way.
The study examines heterogeneity in travel behaviour among ride-hailing services (RHS) users by including attitudes, in order to reinforce conventional user-segmentation approaches. Simultaneously, prioritization of ride-hailing specific attributes was carried out to assess how RHS will operate in a sustainable way.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
Spontaneous fractional Josephson current from parafermions
Authors:
Kishore Iyer,
Amulya Ratnakar,
Aabir Mukhopadyaya,
Sumathi Rao,
Sourin Das
Abstract:
We study a parafermion Josephson junction (JJ) comprising a pair of counter-propagating edge modes of two quantum Hall (QH) systems, proximitized by an s-wave superconductor. We show that the difference between the lengths (which can be controlled by external gates) of the two counter-propagating chiral edges at the Josephson junction, can act as a source of spontaneous phase bias. For the Laughli…
▽ More
We study a parafermion Josephson junction (JJ) comprising a pair of counter-propagating edge modes of two quantum Hall (QH) systems, proximitized by an s-wave superconductor. We show that the difference between the lengths (which can be controlled by external gates) of the two counter-propagating chiral edges at the Josephson junction, can act as a source of spontaneous phase bias. For the Laughlin filling fractions, $ν= 1/m,~ m \in 2\mathbb{Z}+1$, this leads to an electrical control of either Majorana $(m=1)$ or parafermion $(m\neq 1)$ zero modes.
△ Less
Submitted 27 August, 2022; v1 submitted 10 August, 2022;
originally announced August 2022.
-
An exact upper bound for the sum of powers of element orders in non-cyclic finite groups
Authors:
Hiranya Kishore Dey,
Archita Mondal
Abstract:
For a finite group $G$, let $ψ(G)$ denote the sum of element orders of $G$. This function was introduced by Amiri, Amiri, and Isaacs in 2009 and they proved that for any finite group $G$ of order $n$, $ψ(G)$ is maximum if and only if $G \simeq \mathbb{Z}_n$ where $\mathbb{Z}_n$ denotes the cyclic group of order $n$. Furthermore, Herzog, Longobardi, and Maj in 2018 proved that if $G$ is non-cyclic,…
▽ More
For a finite group $G$, let $ψ(G)$ denote the sum of element orders of $G$. This function was introduced by Amiri, Amiri, and Isaacs in 2009 and they proved that for any finite group $G$ of order $n$, $ψ(G)$ is maximum if and only if $G \simeq \mathbb{Z}_n$ where $\mathbb{Z}_n$ denotes the cyclic group of order $n$. Furthermore, Herzog, Longobardi, and Maj in 2018 proved that if $G$ is non-cyclic, $ψ(G) \leq \frac{7}{11} ψ(\mathbb{Z}_n)$. Amiri and Amiri in 2014 introduced the function $ψ_k(G)$ which is defined as the sum of the $k$-th powers of element orders of $G$ and they showed that for every positive integer $k$, $ψ_k(G)$ is also maximum if and only if $G$ is cyclic.
In this paper, we have been able to prove that if $G$ is a non-cyclic group of order $n$, then $ψ_k(G) \leq \frac{1+3.2^k}{1+2.4^k+2^k} ψ_k(\mathbb{Z}_n)$. Setting $k=1$ in our result, we immediately get the result of Herzog et al. as a simple corollary. Besides, a recursive formula for $ψ_k(G)$ is also obtained for finite abelian $p$-groups $G$, using which one can explicitly find out the exact value of $ψ_k(G)$ for finite abelian groups $G$.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Robust Acoustic Domain Identification with its Application to Speaker Diarization
Authors:
A Kishore Kumar,
Shefali Waldekar,
Md Sahidullah,
Goutam Saha
Abstract:
With the rise in multimedia content over the years, more variety is observed in the recording environments of audio. An audio processing system might benefit when it has a module to identify the acoustic domain at its front-end. In this paper, we demonstrate the idea of \emph{acoustic domain identification} (ADI) for \emph{speaker diarization}. For this, we first present a detailed study of the va…
▽ More
With the rise in multimedia content over the years, more variety is observed in the recording environments of audio. An audio processing system might benefit when it has a module to identify the acoustic domain at its front-end. In this paper, we demonstrate the idea of \emph{acoustic domain identification} (ADI) for \emph{speaker diarization}. For this, we first present a detailed study of the various domains of the third DIHARD challenge highlighting the factors that differentiated them from each other. Our main contribution is to develop a simple and efficient solution for ADI. In the present work, we explore speaker embeddings for this task. Next, we integrate the ADI module with the speaker diarization framework of the DIHARD III challenge. The performance substantially improved over that of the baseline when the thresholds for agglomerative hierarchical clustering were optimized according to the respective domains. We achieved a relative improvement of more than $5\%$ and $8\%$ in DER for core and full conditions, respectively, on Track 1 of the DIHARD III evaluation set.
△ Less
Submitted 8 August, 2022; v1 submitted 5 August, 2022;
originally announced August 2022.
-
On Difference of Enhanced Power Graph and Power Graph of a Finite Group
Authors:
Sucharita Biswas,
Peter J. Cameron,
Angsuman Das,
Hiranya Kishore Dey
Abstract:
The difference graph $D(G)$ of a finite group $G$ is the difference of enhanced power graph of $G$ and power graph of $G$, with all isolated vertices are removed. In this paper we study the connectedness and perfectness of $D(G)$ with respect to various properties of the underlying group $G$. We also find several connection between the difference graph of $G$ and the Gruenberg-Kegel graph of $G$.
The difference graph $D(G)$ of a finite group $G$ is the difference of enhanced power graph of $G$ and power graph of $G$, with all isolated vertices are removed. In this paper we study the connectedness and perfectness of $D(G)$ with respect to various properties of the underlying group $G$. We also find several connection between the difference graph of $G$ and the Gruenberg-Kegel graph of $G$.
△ Less
Submitted 17 October, 2022; v1 submitted 24 June, 2022;
originally announced June 2022.
-
Spectropolarimetry of the tidal disruption event AT 2019qiz: a quasispherical reprocessing layer
Authors:
Kishore C. Patra,
Wenbin Lu,
Thomas G. Brink,
Yi Yang,
Alexei V. Filippenko,
Sergiy S. Vasylyev
Abstract:
We present optical spectropolarimetry of the tidal disruption event (TDE) AT 2019qiz on days $+0$ and $+29$ relative to maximum brightness. Continuum polarization, which informs the shape of the electron-scattering surface, was found to be consistent with 0 per cent at peak brightness. On day $+29$, the continuum polarization rose to $\sim 1$ per cent, making this the first reported spectropolarim…
▽ More
We present optical spectropolarimetry of the tidal disruption event (TDE) AT 2019qiz on days $+0$ and $+29$ relative to maximum brightness. Continuum polarization, which informs the shape of the electron-scattering surface, was found to be consistent with 0 per cent at peak brightness. On day $+29$, the continuum polarization rose to $\sim 1$ per cent, making this the first reported spectropolarimetric evolution of a TDE. These findings are incompatible with a naked eccentric disc that lacks significant mass outflow. Instead, the spectropolarimetry paints a picture wherein, at maximum brightness, high-frequency emission from the accretion disc is reprocessed into the optical band by a nearly spherical, optically thick, electron-scattering photosphere located far away from the black hole. We estimate the radius of the scattering photosphere to be $\sim 100\rm\, au$ at maximum brightness -- significantly larger than the tidal radius ($\sim 1\rm\, au$) and the thermalisation radius ($\sim 30\rm\, au$) where the optical continuum is formed. A month later, as the fallback rate drops and the scattering photosphere recedes, the continuum polarization increases, revealing a moderately aspherical interior. We also see evidence for smaller-scale density variations in the scattering photosphere, inferred from the scatter of the data in the Stokes $q-u$ plane. On day $+29$, the H$α$ emission-line peak is depolarized to $\sim 0.3$ per cent (compared to $\sim 1$ per cent continuum polarization), and displays a gradual rise toward the line's redder wavelengths. This observation indicates the H$α$ line formed near the electron-scattering radius.
△ Less
Submitted 17 June, 2022;
originally announced June 2022.
-
Shell model for stratified convection: implications for the solar convective conundrum
Authors:
Kishore Gopalakrishnan,
Nishant K. Singh
Abstract:
We extend the notion of a shell model to stratified systems, and propose one that represents stratified, nonmagnetic, nonrotating convection at low Mach number. Motivated by profiles of background stratification that support convection in stars such as the Sun, we study numerical solutions corresponding to a highly unstable layer above a mildly unstable layer. We find that at low Prandtl number, c…
▽ More
We extend the notion of a shell model to stratified systems, and propose one that represents stratified, nonmagnetic, nonrotating convection at low Mach number. Motivated by profiles of background stratification that support convection in stars such as the Sun, we study numerical solutions corresponding to a highly unstable layer above a mildly unstable layer. We find that at low Prandtl number, convective amplitudes decrease with depth in the lower layer. This suggests that the suppression of convection in the deeper layers of the Sun's convection zone (the convective conundrum) can be addressed without necessarily appealing to rotation or magnetic fields.
△ Less
Submitted 10 June, 2022;
originally announced June 2022.
-
Damage Identification in Fiber Metal Laminates using Bayesian Analysis with Model Order Reduction
Authors:
Nanda Kishore Bellam Muralidhar,
Carmen Gräßle,
Natalie Rauter,
Andrey Mikhaylenko,
Rolf Lammering,
Dirk A. Lorenz
Abstract:
Fiber metal laminates (FML) are composite structures consisting of metals and fiber reinforced plastics (FRP) which have experienced an increasing interest as the choice of materials in aerospace and automobile industries. Due to a sophisticated built up of the material, not only the design and production of such structures is challenging but also its damage detection. This research work focuses o…
▽ More
Fiber metal laminates (FML) are composite structures consisting of metals and fiber reinforced plastics (FRP) which have experienced an increasing interest as the choice of materials in aerospace and automobile industries. Due to a sophisticated built up of the material, not only the design and production of such structures is challenging but also its damage detection. This research work focuses on damage identification in FML with guided ultrasonic waves (GUW) through an inverse approach based on the Bayesian paradigm. As the Bayesian inference approach involves multiple queries of the underlying system, a parameterized reduced-order model (ROM) is used to closely approximate the solution with considerably less computational cost. The signals measured by the embedded sensors and the ROM forecasts are employed for the localization and characterization of damage in FML. In this paper, a Markov Chain Monte-Carlo (MCMC) based Metropolis-Hastings (MH) algorithm and an Ensemble Kalman filtering (EnKF) technique are deployed to identify the damage. Numerical tests illustrate the approaches and the results are compared in regard to accuracy and efficiency. It is found that both methods are successful in multivariate characterization of the damage with a high accuracy and were also able to quantify their associated uncertainties. The EnKF distinguishes itself with the MCMC-MH algorithm in the matter of computational efficiency. In this application of identifying the damage, the EnKF is approximately thrice faster than the MCMC-MH.
△ Less
Submitted 21 April, 2023; v1 submitted 9 June, 2022;
originally announced June 2022.
-
Anonymous voting scheme using quantum assisted blockchain
Authors:
Sandeep Mishra,
Kishore Thapliyal,
S Krish Rewanth,
Abhishek Parakh,
Anirban Pathak
Abstract:
Voting forms the most important tool for arriving at a decision in any institution. The changing needs of the civilization currently demands a practical yet secure electronic voting system, but any flaw related to the applied voting technology can lead to tampering of the results with the malicious outcomes. Currently, blockchain technology due to its transparent structure forms an emerging area o…
▽ More
Voting forms the most important tool for arriving at a decision in any institution. The changing needs of the civilization currently demands a practical yet secure electronic voting system, but any flaw related to the applied voting technology can lead to tampering of the results with the malicious outcomes. Currently, blockchain technology due to its transparent structure forms an emerging area of investigation for the development of voting systems with a far greater security. However, various apprehensions are yet to be conclusively resolved before using blockchain in high stakes elections. Other than this, the blockchain based voting systems are vulnerable to possible attacks by upcoming noisy intermediate scale quantum (NISQ) computer. To circumvent, most of these limitations, in this work, we propose an anonymous voting scheme based on quantum assisted blockchain by enhancing the advantages offered by blockchain with the quantum resources such as quantum random number generators and quantum key distribution. The purposed scheme is shown to satisfy the requirements of a good voting scheme. Further, the voting scheme is auditable and can be implemented using the currently available technology.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Payday loans -- blessing or growth suppressor? Machine Learning Analysis
Authors:
Rohith Mahadevan,
Sam Richard,
Kishore Harshan Kumar,
Jeevitha Murugan,
Santhosh Kannan,
Saaisri,
Tarun,
Raja CSP Raman
Abstract:
The upsurge of real estate involves a variety of factors that have got influenced by many domains. Indeed, the unrecognized sector that would affect the economy for which regulatory proposals are being drafted to keep this in control is the payday loans. This research paper revolves around the impact of payday loans in the real estate market. The research paper draws a first-hand experience of obt…
▽ More
The upsurge of real estate involves a variety of factors that have got influenced by many domains. Indeed, the unrecognized sector that would affect the economy for which regulatory proposals are being drafted to keep this in control is the payday loans. This research paper revolves around the impact of payday loans in the real estate market. The research paper draws a first-hand experience of obtaining the index for the concentration of real estate in an area of reference by virtue of payday loans in Toronto, Ontario in particular, which sets out an ideology to create, evaluate and demonstrate the scenario through research analysis. The purpose of this indexing via payday loans is the basic - debt: income ratio which states that when the income of the person bound to pay the interest of payday loans increases, his debt goes down marginally which hence infers that the person invests in fixed assets like real estate which hikes up its growth.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Chemical bonding in large systems using projected population analysis from real-space density functional theory calculations
Authors:
Kartick Ramakrishnan,
Sai Krishna Kishore Nori,
Seung-Cheol Lee,
Gour P Das,
Satadeep Bhattacharjee,
Phani Motamarri
Abstract:
We present an efficient and scalable computational approach for conducting projected population analysis from real-space finite-element (FE) based Kohn-Sham density functional theory calculations (DFT-FE). This work provides an important direction towards extracting chemical bonding information from large-scale DFT calculations on materials systems involving thousands of atoms while accommodating…
▽ More
We present an efficient and scalable computational approach for conducting projected population analysis from real-space finite-element (FE) based Kohn-Sham density functional theory calculations (DFT-FE). This work provides an important direction towards extracting chemical bonding information from large-scale DFT calculations on materials systems involving thousands of atoms while accommodating periodic, semi-periodic or fully non-periodic boundary conditions. Towards this, we derive the relevant mathematical expressions and develop efficient numerical implementation procedures that are scalable on multi-node CPU architectures to compute the projected overlap and Hamilton populations. The population analysis is accomplished by projecting either the self-consistently converged FE discretized Kohn-Sham orbitals, or the FE discretized Hamiltonian onto a subspace spanned by a localized atom-centred basis set. The proposed methods are implemented in a unified framework within DFT-FE code where the ground-state DFT calculations and the population analysis are performed on the same FE grid. We further benchmark the accuracy and performance of this approach on representative material systems involving periodic and non-periodic DFT calculations with LOBSTER, a widely used projected population analysis code. Finally, we discuss a case study demonstrating the advantages of our scalable approach to extract the quantitative chemical bonding information of hydrogen chemisorbed in large silicon nanoparticles alloyed with carbon, a candidate material for hydrogen storage.
△ Less
Submitted 23 June, 2023; v1 submitted 29 May, 2022;
originally announced May 2022.
-
Matrix Waring Problem -- II
Authors:
Krishna Kishore,
Anupam Singh
Abstract:
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$ such that for all $q > C_k$ and for all $n \geq 1$ every matrix in $M_n(\mathbb F_q)$ is a sum of two $k$th powers.
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$ such that for all $q > C_k$ and for all $n \geq 1$ every matrix in $M_n(\mathbb F_q)$ is a sum of two $k$th powers.
△ Less
Submitted 5 May, 2023; v1 submitted 10 May, 2022;
originally announced May 2022.
-
Approximate Sensitivity Conditioning and Singular Perturbation Analysis for Power Converters
Authors:
Kaushik Gajula,
Lalit Kishore Marepalli,
Luis Herrera
Abstract:
A sensitivity conditioning control strategy is analyzed in this paper and it is applied to power electronic converters. The term is used to improve closed loop systems, such as power converters with cascaded inner and outer loop controllers. The impact of the sensitivity term is analyzed using singular perturbation theory. In addition, the implementation of the control term is addressed for practi…
▽ More
A sensitivity conditioning control strategy is analyzed in this paper and it is applied to power electronic converters. The term is used to improve closed loop systems, such as power converters with cascaded inner and outer loop controllers. The impact of the sensitivity term is analyzed using singular perturbation theory. In addition, the implementation of the control term is addressed for practical systems, where the number of inputs is generally not sufficient for exact sensitivity conditioning. Simulation results are presented for a buck converter with output capacitor voltage regulation and a Permanent Magnet Synchronous Machine (PMSM), used as a generator with an active rectifier. Finally, experimental results are presented for the buck converter, demonstrating the advantages and feasibility in implementing the approximate sensitivity conditioning term for closed loop power converters.
△ Less
Submitted 5 October, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
$\cos2φ_t$ azimuthal asymmetry in back-to-back $J/ψ$-jet production in $e~p\rightarrow e~J/ψ~Jet~ X$ at the EIC
Authors:
Raj Kishore,
Asmita Mukherjee,
Amol Pawar,
Mariyah Siddiqah
Abstract:
In this article, we investigate the $\cos2φ_t$ azimuthal asymmetry in $e ~p\rightarrow e ~J/ψ~Jet~ X$, where the $J/ψ$-jet pair is almost back-to-back in the transverse plane, within the framework of the generalized parton model(GPM). We use non-relativistic QCD(NRQCD) to calculate the $J/ψ$ production amplitude and incorporate both color singlet(CS) and color octet(CO) contributions to the asymme…
▽ More
In this article, we investigate the $\cos2φ_t$ azimuthal asymmetry in $e ~p\rightarrow e ~J/ψ~Jet~ X$, where the $J/ψ$-jet pair is almost back-to-back in the transverse plane, within the framework of the generalized parton model(GPM). We use non-relativistic QCD(NRQCD) to calculate the $J/ψ$ production amplitude and incorporate both color singlet(CS) and color octet(CO) contributions to the asymmetry. We estimate the asymmetry using different parameterizations of the gluon TMDs in the kinematics that can be accessed at the future electron-ion collider (EIC) and also investigate the impact of transverse momentum dependent (TMD) evolution on the asymmetry. We present the contributions coming from different states to the asymmetry in NRQCD.
△ Less
Submitted 21 July, 2022; v1 submitted 25 March, 2022;
originally announced March 2022.
-
Least-squares formulations for Stokes equations with non-standard boundary conditions -- A unified approach
Authors:
Subhashree Mohapatra,
N. Kishore Kumar,
Shivangi Joshi
Abstract:
In this paper, we propose a unified non-conforming least-squares spectral element approach for solving Stokes equations with various non-standard boundary conditions. Existing least-squares formulations mostly deal with Dirichlet boundary conditions are formulated using ADN theory-based regularity estimates. However, changing boundary conditions lead to a search for parameters satisfying supplemen…
▽ More
In this paper, we propose a unified non-conforming least-squares spectral element approach for solving Stokes equations with various non-standard boundary conditions. Existing least-squares formulations mostly deal with Dirichlet boundary conditions are formulated using ADN theory-based regularity estimates. However, changing boundary conditions lead to a search for parameters satisfying supplementing and complimenting conditions [4] which is not easy always. Here we have avoided ADN theory-based regularity estimates and proposed a unified approach for dealing with various boundary conditions. Stability estimates and error estimates have been discussed. Numerical results displaying exponential accuracy have been presented for both two and three-dimensional cases with various boundary conditions.
△ Less
Submitted 5 September, 2022; v1 submitted 21 March, 2022;
originally announced March 2022.
-
Early-Time Ultraviolet Spectroscopy and Optical Follow-up Observations of the Type IIP Supernova 2021yja
Authors:
Sergiy S. Vasylyev,
Alexei V. Filippenko,
Christian Vogl,
Thomas G. Brink,
Peter J. Brown,
Thomas de Jaeger,
Thomas Matheson,
Avishay Gal-Yam,
Paolo A. Mazzali,
Maryam Modjaz,
Kishore C. Patra,
Micalyn Rowe,
Nathan Smith,
Schuyler D. Van Dyk,
Marc Williamson,
Yi Yang,
WeiKang Zheng,
Asia deGraw,
Ori D. Fox,
Elinor L. Gates,
Connor Jennings,
R. Michael Rich
Abstract:
We present three epochs of early-time ultraviolet (UV) and optical HST/STIS spectroscopy of the young, nearby Type IIP supernova (SN) 2021yja. We complement the HST data with two earlier epochs of Swift UVOT spectroscopy. The HST and Swift UVOT spectra are consistent with those of other well-studied Type IIP supernovae (SNe). The UV spectra exhibit rapid cooling at early times, while less dramatic…
▽ More
We present three epochs of early-time ultraviolet (UV) and optical HST/STIS spectroscopy of the young, nearby Type IIP supernova (SN) 2021yja. We complement the HST data with two earlier epochs of Swift UVOT spectroscopy. The HST and Swift UVOT spectra are consistent with those of other well-studied Type IIP supernovae (SNe). The UV spectra exhibit rapid cooling at early times, while less dramatic changes are seen in the optical. We also present Lick/KAIT optical photometry up to the late-time-tail phase, showing a very long plateau and shallow decline compared with other SNe IIP. Our modeling of the UV spectrum with the TARDIS radiative-transfer code produces a good fit for a high-velocity explosion, a low total extinction $E(B-V) = 0.07$ mag, and a subsolar metallicity. We do not find a significant contribution to the UV flux from an additional heating source, such as interaction with the circumstellar medium, consistent with the observed flat plateau. Furthermore, the velocity width of the Mg II $λ$2798 line is comparable to that of the hydrogen Balmer lines, suggesting that the UV emission is confined to a region close to the photosphere.
△ Less
Submitted 25 July, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
Dynamics of single-mode nonclassicalities and quantum correlations in the Jaynes-Cummings model
Authors:
Sriram Akella,
Kishore Thapliyal,
H S Mani,
Anirban Pathak
Abstract:
Dynamics of atom-field correlations and single-mode nonclassicalities present in the resonant Jaynes-Cummings model are investigated using negativity and entanglement potential for a set of initial states. The study has revealed the interplay between three different types of nonclassicality present in the model and established that the nonclassicality is continuously exchanged between the field an…
▽ More
Dynamics of atom-field correlations and single-mode nonclassicalities present in the resonant Jaynes-Cummings model are investigated using negativity and entanglement potential for a set of initial states. The study has revealed the interplay between three different types of nonclassicality present in the model and established that the nonclassicality is continuously exchanged between the field and atom through the atom-field correlations. Further, it is observed that the entanglement potential does not capture all the single-mode nonclassicality and there exists some residual nonclassicality in the reduced single-mode states at the output of the beam splitter which is not captured by the entanglement in which single-mode nonclassicality is quantitatively mapped in Asboth's criterion. Additional layers of beam splitters are added to deplete all the nonclassicality and to reveal that almost all the residual nonclassicality is captured with three layers of beam splitters. Further, the reduced states of the atom and field have zero (non-zero) quantum coherence in the Fock basis when the atom-field correlations are maximum if the field (or atom) has zero (non-zero) quantum coherence initially.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Self-Supervised Class-Cognizant Few-Shot Classification
Authors:
Ojas Kishore Shirekar,
Hadi Jamali-Rad
Abstract:
Unsupervised learning is argued to be the dark matter of human intelligence. To build in this direction, this paper focuses on unsupervised learning from an abundance of unlabeled data followed by few-shot fine-tuning on a downstream classification task. To this aim, we extend a recent study on adopting contrastive learning for self-supervised pre-training by incorporating class-level cognizance t…
▽ More
Unsupervised learning is argued to be the dark matter of human intelligence. To build in this direction, this paper focuses on unsupervised learning from an abundance of unlabeled data followed by few-shot fine-tuning on a downstream classification task. To this aim, we extend a recent study on adopting contrastive learning for self-supervised pre-training by incorporating class-level cognizance through iterative clustering and re-ranking and by expanding the contrastive optimization loss to account for it. To our knowledge, our experimentation both in standard and cross-domain scenarios demonstrate that we set a new state-of-the-art (SoTA) in (5-way, 1 and 5-shot) settings of standard mini-ImageNet benchmark as well as the (5-way, 5 and 20-shot) settings of cross-domain CDFSL benchmark. Our code and experimentation can be found in our GitHub repository: https://github.com/ojss/c3lr.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Towards a Better Understanding of Online Influence: Differences in Twitter CommunicationBetween Companies and Influencers
Authors:
Diana C. Hernandez-Bocanegra,
Angela Borchert,
Felix Brünker,
Gautam Kishore Shahi,
Björn Ross
Abstract:
In the last decade, Social Media platforms such as Twitter have gained importance in the various marketing strategies of companies. This work aims to examine the presence of influential content on a textual level, by investigating characteristics of tweets in the context of social impact theory, and its dimension immediacy. To this end, we analysed influential Twitter communication data during Bla…
▽ More
In the last decade, Social Media platforms such as Twitter have gained importance in the various marketing strategies of companies. This work aims to examine the presence of influential content on a textual level, by investigating characteristics of tweets in the context of social impact theory, and its dimension immediacy. To this end, we analysed influential Twitter communication data during Black Friday 2018 with methods from social media analytics such as sentiment analysis and degree centrality. Results show significant differences in communication style between companies and influencers. Companies published longer textual content and created more tweets with a positive sentiment and more first-person pronouns than influencers. These findings shall serve as a basis for a future experimental study to examine the impact of text presence on consumer cognition and the willingness to purchase.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Overview of the HASOC Subtrack at FIRE 2021: Hate Speech and Offensive Content Identification in English and Indo-Aryan Languages
Authors:
Thomas Mandl,
Sandip Modha,
Gautam Kishore Shahi,
Hiren Madhu,
Shrey Satapara,
Prasenjit Majumder,
Johannes Schaefer,
Tharindu Ranasinghe,
Marcos Zampieri,
Durgesh Nandini,
Amit Kumar Jaiswal
Abstract:
The widespread of offensive content online such as hate speech poses a growing societal problem. AI tools are necessary for supporting the moderation process at online platforms. For the evaluation of these identification tools, continuous experimentation with data sets in different languages are necessary. The HASOC track (Hate Speech and Offensive Content Identification) is dedicated to develop…
▽ More
The widespread of offensive content online such as hate speech poses a growing societal problem. AI tools are necessary for supporting the moderation process at online platforms. For the evaluation of these identification tools, continuous experimentation with data sets in different languages are necessary. The HASOC track (Hate Speech and Offensive Content Identification) is dedicated to develop benchmark data for this purpose. This paper presents the HASOC subtrack for English, Hindi, and Marathi. The data set was assembled from Twitter. This subtrack has two sub-tasks. Task A is a binary classification problem (Hate and Not Offensive) offered for all three languages. Task B is a fine-grained classification problem for three classes (HATE) Hate speech, OFFENSIVE and PROFANITY offered for English and Hindi. Overall, 652 runs were submitted by 65 teams. The performance of the best classification algorithms for task A are F1 measures 0.91, 0.78 and 0.83 for Marathi, Hindi and English, respectively. This overview presents the tasks and the data development as well as the detailed results. The systems submitted to the competition applied a variety of technologies. The best performing algorithms were mainly variants of transformer architectures.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
Stochastic Bounded Confidence Opinion Dynamics: How Far Apart Do Opinions Drift?
Authors:
Sushmitha Shree S,
Kishore G V,
Avhishek Chatterjee,
Krishna Jagannathan
Abstract:
In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, is especially important. Linear graph-based dynamics and bounded confidence dynamics are the two most popular models for opinion dynamics in social networks. Recently, stochastic bounded confidence opinion dynamics were proposed as a general framework that incorporates…
▽ More
In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, is especially important. Linear graph-based dynamics and bounded confidence dynamics are the two most popular models for opinion dynamics in social networks. Recently, stochastic bounded confidence opinion dynamics were proposed as a general framework that incorporates both these dynamics as special cases and also captures the inherent stochasticity and noise (errors) in real-life social exchanges. Although these dynamics are quite general and realistic, their analysis is particularly challenging compared to other opinion dynamics models. This is because these dynamics are nonlinear and stochastic, and belong to the class of Markov processes that have asymptotically zero drift and unbounded jumps. The asymptotic behavior of these dynamics was characterized in prior works. However, they do not shed light on their finite-time behavior, which is often of interest in practice. We take a stride in this direction by analyzing the finite time behavior of a two-agent system, which is fundamental to the understanding of multi-agent dynamics. In particular, we show that the opinion difference between the two agents is well concentrated around zero under the conditions that lead to asymptotic stability of the dynamics.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Passive Indoor Localization with WiFi Fingerprints
Authors:
Minh Tu Hoang,
Brosnan Yuen,
Kai Ren,
Ahmed Elmoogy,
Xiaodai Dong,
Tao Lu,
Robert Westendorp,
Kishore Reddy Tarimala
Abstract:
This paper proposes passive WiFi indoor localization. Instead of using WiFi signals received by mobile devices as fingerprints, we use signals received by routers to locate the mobile carrier. Consequently, software installation on the mobile device is not required. To resolve the data insufficiency problem, flow control signals such as request to send (RTS) and clear to send (CTS) are utilized. I…
▽ More
This paper proposes passive WiFi indoor localization. Instead of using WiFi signals received by mobile devices as fingerprints, we use signals received by routers to locate the mobile carrier. Consequently, software installation on the mobile device is not required. To resolve the data insufficiency problem, flow control signals such as request to send (RTS) and clear to send (CTS) are utilized. In our model, received signal strength indicator (RSSI) and channel state information (CSI) are used as fingerprints for several algorithms, including deterministic, probabilistic and neural networks localization algorithms. We further investigated localization algorithms performance through extensive on-site experiments with various models of phones at hundreds of testing locations. We demonstrate that our passive scheme achieves an average localization error of 0.8 m when the phone is actively transmitting data frames and 1.5 m when it is not transmitting data frames.
△ Less
Submitted 28 November, 2021;
originally announced November 2021.
-
Matrix Waring Problem
Authors:
Krishna Kishore
Abstract:
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$, such that for all $q > C_k$, and for $n = 1, 2$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of two $k$th powers and for all $n \geq 3$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of at most three $k$th powers.
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$, such that for all $q > C_k$, and for $n = 1, 2$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of two $k$th powers and for all $n \geq 3$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of at most three $k$th powers.
△ Less
Submitted 23 November, 2021;
originally announced November 2021.
-
The Young matroid: A multiset extension of the Catalan matroid to arbitrary Young diagrams
Authors:
Hiranya Kishore Dey,
Brahadeesh Sankarnarayanan,
S. Venkitesh
Abstract:
Introduced by Ardila (J. Combin. Theory Ser. A, 2003), the Catalan matroid is obtained by defining the bases of the matroid using Dyck paths from $(0,0)$ to $(n,n)$. Further research has gone into the topic, with variants like lattice path matroids (introduced by Bonin, de Mier, and Noy (J. Combin. Theory Ser. A, 2003)) and shifted matroids (introduced independently by Klivans (2003), and Ardila)…
▽ More
Introduced by Ardila (J. Combin. Theory Ser. A, 2003), the Catalan matroid is obtained by defining the bases of the matroid using Dyck paths from $(0,0)$ to $(n,n)$. Further research has gone into the topic, with variants like lattice path matroids (introduced by Bonin, de Mier, and Noy (J. Combin. Theory Ser. A, 2003)) and shifted matroids (introduced independently by Klivans (2003), and Ardila) being studied intensively. In this short note, we introduce the Young matroid, an extension of the Catalan matroid, where the bases are defined using the standard Young tableaux of a fixed shape. This extension necessarily involves the consideration of independent multisets and multiset bases.
△ Less
Submitted 26 September, 2022; v1 submitted 22 November, 2021;
originally announced November 2021.
-
Spectropolarimetry of the Type Ia SN 2019ein rules out significant global asphericity of the ejecta
Authors:
Kishore C. Patra,
Yi Yang,
Thomas G. Brink,
Peter Höflich,
Lifan Wang,
Alexei V. Filippenko,
Daniel Kasen,
Dietrich Baade,
Ryan J. Foley,
Justyn R. Maund,
WeiKang Zheng,
Tiara Hung,
Aleksandar Cikota,
J. Craig Wheeler,
Mattia Bulla
Abstract:
Detailed spectropolarimetric studies may hold the key to probing the explosion mechanisms and the progenitor scenarios of Type Ia supernovae (SNe Ia). We present multi-epoch spectropolarimetry and imaging polarimetry of SN 2019ein, an SN Ia showing high expansion velocities at early phases. The spectropolarimetry sequence spans from $\sim -11$ to $+$10 days relative to peak brightness in the $B$-b…
▽ More
Detailed spectropolarimetric studies may hold the key to probing the explosion mechanisms and the progenitor scenarios of Type Ia supernovae (SNe Ia). We present multi-epoch spectropolarimetry and imaging polarimetry of SN 2019ein, an SN Ia showing high expansion velocities at early phases. The spectropolarimetry sequence spans from $\sim -11$ to $+$10 days relative to peak brightness in the $B$-band. We find that the level of the continuum polarization of SN 2019ein, after subtracting estimated interstellar polarization, is in the range $0.0-0.3\%$, typical for SNe Ia. The polarization position angle remains roughly constant before and after the SN light-curve peak, implying that the inner regions share the same axisymmetry as the outer layers. We observe high polarization ($\sim 1\%$) across both the Si II $\lambda6355$ and Ca II near-infrared triplet features. These two lines also display complex polarization modulations. The spectropolarimetric properties of SN 2019ein rule out a significant departure from spherical symmetry of the ejecta for up to a month after the explosion. These observations disfavour merger-induced and double-detonation models for SN 2019ein. The imaging polarimetry shows weak evidence for a modest increase in polarization after $\sim 20$ days since the $B$-band maximum. If this rise is real and is observed in other SNe Ia at similar phases, we may have seen, for the first time, an aspherical interior similar to what has been previously observed for SNe IIP. Future polarization observations of SNe Ia extending to post-peak epochs will help to examine the inner structure of the explosion.
△ Less
Submitted 26 October, 2021; v1 submitted 15 October, 2021;
originally announced October 2021.
-
Hide and seek with quantum resources: New and modified protocols for quantum steganography
Authors:
Rohan Joshi,
Akhil Gupta,
Kishore Thapliyal,
R Srikanth,
Anirban Pathak
Abstract:
Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that the eavesdropper is unaware of its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, it has been shown that such protocols are vulnerable to a certain steganalysis attack that can detect the presence of th…
▽ More
Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that the eavesdropper is unaware of its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, it has been shown that such protocols are vulnerable to a certain steganalysis attack that can detect the presence of the hidden message and suppress the entire communication. In this work, we elaborate on the vulnerabilities of the original protocol which make it insecure against this detection attack. Further, we propose a novel steganography protocol using discrete modulation continuous variable QKD that eliminates the threat of this detection-based attack. Deriving from the properties of our protocol, we also propose modifications in the original protocol to dispose of its vulnerabilities and make it insusceptible to steganalysis.
△ Less
Submitted 12 October, 2021;
originally announced October 2021.
-
Bound state in the continuum in slab waveguide enables low-threshold quantum-dot lasing
Authors:
Mengfei Wu,
Lu Ding,
Randy P. Sabatini,
Laxmi Kishore Sagar,
Golam Bappi,
Ramon Paniagua-Dominguez,
Edward H. Sargent,
Arseniy I. Kuznetsov
Abstract:
Colloidal quantum dots (CQDs) are a promising gain material for solution-processed, wavelength-tunable lasers, with potential application in displays, communications, and biomedical devices. In this work, we combine a CQD film with an array of titanium dioxide (TiO2) nanoantennas to achieve lasing via bound states in the continuum (BICs), which are symmetry-protected cavity modes with giant qualit…
▽ More
Colloidal quantum dots (CQDs) are a promising gain material for solution-processed, wavelength-tunable lasers, with potential application in displays, communications, and biomedical devices. In this work, we combine a CQD film with an array of titanium dioxide (TiO2) nanoantennas to achieve lasing via bound states in the continuum (BICs), which are symmetry-protected cavity modes with giant quality factors. Here, the BICs arise from slab waveguide modes in the planar film, coupled to the periodic nanoantenna array. We engineer the thickness of the CQD film and size of the nanoantennas to achieve a BIC with good spatial and spectral overlap with the CQDs, based on a 2nd-order TE-polarized waveguide mode. We obtain room-temperature lasing with a low threshold of approximately 11 kW/cm2 (peak intensity) under 5 ns-pulsed optical excitation. This work sheds light on the optical modes in solution-processed, distributed-feedback lasers, and highlights BICs as effective, versatile, surface-emitting lasing modes.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Overview of the CLEF--2021 CheckThat! Lab on Detecting Check-Worthy Claims, Previously Fact-Checked Claims, and Fake News
Authors:
Preslav Nakov,
Giovanni Da San Martino,
Tamer Elsayed,
Alberto Barrón-Cedeño,
Rubén Míguez,
Shaden Shaar,
Firoj Alam,
Fatima Haouari,
Maram Hasanain,
Watheq Mansour,
Bayan Hamdan,
Zien Sheikh Ali,
Nikolay Babulkov,
Alex Nikolov,
Gautam Kishore Shahi,
Julia Maria Struß,
Thomas Mandl,
Mucahid Kutlu,
Yavuz Selim Kartal
Abstract:
We describe the fourth edition of the CheckThat! Lab, part of the 2021 Conference and Labs of the Evaluation Forum (CLEF). The lab evaluates technology supporting tasks related to factuality, and covers Arabic, Bulgarian, English, Spanish, and Turkish. Task 1 asks to predict which posts in a Twitter stream are worth fact-checking, focusing on COVID-19 and politics (in all five languages). Task 2 a…
▽ More
We describe the fourth edition of the CheckThat! Lab, part of the 2021 Conference and Labs of the Evaluation Forum (CLEF). The lab evaluates technology supporting tasks related to factuality, and covers Arabic, Bulgarian, English, Spanish, and Turkish. Task 1 asks to predict which posts in a Twitter stream are worth fact-checking, focusing on COVID-19 and politics (in all five languages). Task 2 asks to determine whether a claim in a tweet can be verified using a set of previously fact-checked claims (in Arabic and English). Task 3 asks to predict the veracity of a news article and its topical domain (in English). The evaluation is based on mean average precision or precision at rank k for the ranking tasks, and macro-F1 for the classification tasks. This was the most popular CLEF-2021 lab in terms of team registrations: 132 teams. Nearly one-third of them participated: 15, 5, and 25 teams submitted official runs for tasks 1, 2, and 3, respectively.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Enhancement of non-Gaussianity and nonclassicality of photon added displaced Fock state: A quantitative approach
Authors:
Priya Malpani,
Kishore Thapliyal,
J. Banerji,
Anirban Pathak
Abstract:
Non-Gaussian and nonclassical states and processes are already found to be important resources for performing various tasks related to quantum gravity and quantum information processing. The effect of non-Gaussianity inducing operators on the nonclassicality of quantum states has also been studied rigorously. Considering these facts, a quantitative analysis of the nonclassical and non-Gaussian fea…
▽ More
Non-Gaussian and nonclassical states and processes are already found to be important resources for performing various tasks related to quantum gravity and quantum information processing. The effect of non-Gaussianity inducing operators on the nonclassicality of quantum states has also been studied rigorously. Considering these facts, a quantitative analysis of the nonclassical and non-Gaussian features is performed here for photon added displaced Fock state, as a test case, using a set of measures like entanglement potential, Wigner Yanese skew information, Wigner logarithmic negativity and relative entropy of non-Gaussianity. It is observed that photon addition (Fock parameter) significantly increases the amount of nonclassicalty and non-Gaussianity for small (large) values of the displacement parameter, which decreases both the quantum features monotonically. In this respect, the role of Fock parameter is found to be more prominent and stronger compared to photon addition. Finally, the dynamics of Wigner function under the effect of photon loss channel is used to show that only highly efficient detectors are able to detect Wigner negativity.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
Quantum anonymous veto: A set of new protocols
Authors:
Sandeep Mishra,
Kishore Thapliyal,
Abhishek Parakh,
Anirban Pathak
Abstract:
We propose a set of protocols for quantum anonymous veto (QAV) broadly categorized under the probabilistic, iterative, and deterministic schemes. The schemes are based upon different types of quantum resources. Specifically, they may be viewed as single photon-based, bipartite and multipartite entangled states-based, orthogonal state-based and conjugate coding-based. The set of the proposed scheme…
▽ More
We propose a set of protocols for quantum anonymous veto (QAV) broadly categorized under the probabilistic, iterative, and deterministic schemes. The schemes are based upon different types of quantum resources. Specifically, they may be viewed as single photon-based, bipartite and multipartite entangled states-based, orthogonal state-based and conjugate coding-based. The set of the proposed schemes is analyzed for all the requirements of a valid QAV scheme (e.g., privacy, verifiability, robustness, binding, eligibility and correctness). The proposed schemes are observed to be more efficient in comparison to the existing QAV schemes and robust up to the moderate decoherence rate. In addition, a trade-off between correctness and robustness of the probabilistic QAV schemes is observed. Further, the multipartite dense coding based determinsitic QAV scheme is most efficient scheme among the set of schemes proposed here. A bipartite entanglement based iterative scheme employing dense coding is yet another efficient and practical scheme. The intrinsic connections between dining cryptographer-net with anonymous veto-net is also explored in the process of designing new protocols.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
Who shapes crisis communication on Twitter? An analysis of influential German-language accounts during the COVID-19 pandemic
Authors:
Gautam Kishore Shahi,
Sünje Clausen,
Stefan Stieglitz
Abstract:
Twitter is becoming an increasingly important platform for disseminating information during crisis situations, such as the COVID-19 pandemic. Effective crisis communication on Twitter can shape the public perception of the crisis, influence adherence to preventative measures, and thus affect public health. Influential accounts are particularly important as they reach large audiences quickly. This…
▽ More
Twitter is becoming an increasingly important platform for disseminating information during crisis situations, such as the COVID-19 pandemic. Effective crisis communication on Twitter can shape the public perception of the crisis, influence adherence to preventative measures, and thus affect public health. Influential accounts are particularly important as they reach large audiences quickly. This study identifies influential German-language accounts from almost 3 million German tweets collected between January and May 2020 by constructing a retweet network and calculating PageRank centrality values. We capture the volatility of crisis communication by structuring the analysis into seven stages based on key events during the pandemic and profile influential accounts into roles. Our analysis shows that news and journalist accounts were influential throughout all phases, while government accounts were particularly important shortly before and after the lockdown was instantiated. We discuss implications for crisis communication during health crises and for analyzing long-term crisis data.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
Lizard: A Large-Scale Dataset for Colonic Nuclear Instance Segmentation and Classification
Authors:
Simon Graham,
Mostafa Jahanifar,
Ayesha Azam,
Mohammed Nimir,
Yee-Wah Tsang,
Katherine Dodd,
Emily Hero,
Harvir Sahota,
Atisha Tank,
Ksenija Benes,
Noorul Wahab,
Fayyaz Minhas,
Shan E Ahmed Raza,
Hesham El Daly,
Kishore Gopalakrishnan,
David Snead,
Nasir Rajpoot
Abstract:
The development of deep segmentation models for computational pathology (CPath) can help foster the investigation of interpretable morphological biomarkers. Yet, there is a major bottleneck in the success of such approaches because supervised deep learning models require an abundance of accurately labelled data. This issue is exacerbated in the field of CPath because the generation of detailed ann…
▽ More
The development of deep segmentation models for computational pathology (CPath) can help foster the investigation of interpretable morphological biomarkers. Yet, there is a major bottleneck in the success of such approaches because supervised deep learning models require an abundance of accurately labelled data. This issue is exacerbated in the field of CPath because the generation of detailed annotations usually demands the input of a pathologist to be able to distinguish between different tissue constructs and nuclei. Manually labelling nuclei may not be a feasible approach for collecting large-scale annotated datasets, especially when a single image region can contain thousands of different cells. However, solely relying on automatic generation of annotations will limit the accuracy and reliability of ground truth. Therefore, to help overcome the above challenges, we propose a multi-stage annotation pipeline to enable the collection of large-scale datasets for histology image analysis, with pathologist-in-the-loop refinement steps. Using this pipeline, we generate the largest known nuclear instance segmentation and classification dataset, containing nearly half a million labelled nuclei in H&E stained colon tissue. We have released the dataset and encourage the research community to utilise it to drive forward the development of downstream cell-based models in CPath.
△ Less
Submitted 29 November, 2021; v1 submitted 25 August, 2021;
originally announced August 2021.
-
Quantum and semi-quantum sealed-bid auction: Vulnerabilities and advantages
Authors:
Pramod Asagodu,
Kishore Thapliyal,
Anirban Pathak
Abstract:
A family of existing protocols for quantum sealed-bid auction is critically analyzed, and it is shown that they are vulnerable under several attacks (e.g., the participant's and non-participant's attacks as well as the collusion attack of participants) and some of the claims made in these works are not correct. We obtained the bounds on the success probability of an eavesdropper in accessing the s…
▽ More
A family of existing protocols for quantum sealed-bid auction is critically analyzed, and it is shown that they are vulnerable under several attacks (e.g., the participant's and non-participant's attacks as well as the collusion attack of participants) and some of the claims made in these works are not correct. We obtained the bounds on the success probability of an eavesdropper in accessing the sealed-bids. Further, realizing the role of secure sealed-bid auction in the reduction of corruption, a new protocol for sealed-bid auction is proposed which is semi-quantum in nature, where the bidders do not have quantum resources but they can perform classical operations on the quantum states. The security of the proposed protocol is established against a set of attacks, and thus it is established that the proposed protocol is free from the vulnerabilities reported here in the context of the existing protocols.
△ Less
Submitted 13 August, 2021;
originally announced August 2021.
-
Overview of the HASOC track at FIRE 2020: Hate Speech and Offensive Content Identification in Indo-European Languages
Authors:
Thomas Mandla,
Sandip Modha,
Gautam Kishore Shahi,
Amit Kumar Jaiswal,
Durgesh Nandini,
Daksh Patel,
Prasenjit Majumder,
Johannes Schäfer
Abstract:
With the growth of social media, the spread of hate speech is also increasing rapidly. Social media are widely used in many countries. Also Hate Speech is spreading in these countries. This brings a need for multilingual Hate Speech detection algorithms. Much research in this area is dedicated to English at the moment. The HASOC track intends to provide a platform to develop and optimize Hate Spee…
▽ More
With the growth of social media, the spread of hate speech is also increasing rapidly. Social media are widely used in many countries. Also Hate Speech is spreading in these countries. This brings a need for multilingual Hate Speech detection algorithms. Much research in this area is dedicated to English at the moment. The HASOC track intends to provide a platform to develop and optimize Hate Speech detection algorithms for Hindi, German and English. The dataset is collected from a Twitter archive and pre-classified by a machine learning system. HASOC has two sub-task for all three languages: task A is a binary classification problem (Hate and Not Offensive) while task B is a fine-grained classification problem for three classes (HATE) Hate speech, OFFENSIVE and PROFANITY. Overall, 252 runs were submitted by 40 teams. The performance of the best classification algorithms for task A are F1 measures of 0.51, 0.53 and 0.52 for English, Hindi, and German, respectively. For task B, the best classification algorithms achieved F1 measures of 0.26, 0.33 and 0.29 for English, Hindi, and German, respectively. This article presents the tasks and the data development as well as the results. The best performing algorithms were mainly variants of the transformer architecture BERT. However, also other systems were applied with good success
△ Less
Submitted 12 August, 2021;
originally announced August 2021.
-
On connectivity, domination number and spectral radius of the proper enhanced power graphs of finite nilpotent groups
Authors:
Sudip Bera,
Hiranya Kishore Dey
Abstract:
For a group $G,$ the enhanced power graph of $G$ is a graph with vertex set $G$ in which two distinct elements $x, y$ are adjacent if and only if there exists an element $w$ in $G$ such that both $x$ and $y$ are powers of $w.$ The proper enhanced power graph is the induced subgraph of the enhanced power graph on the set $G \setminus S,$ where $S$ is the set of dominating vertices of the enhanced p…
▽ More
For a group $G,$ the enhanced power graph of $G$ is a graph with vertex set $G$ in which two distinct elements $x, y$ are adjacent if and only if there exists an element $w$ in $G$ such that both $x$ and $y$ are powers of $w.$ The proper enhanced power graph is the induced subgraph of the enhanced power graph on the set $G \setminus S,$ where $S$ is the set of dominating vertices of the enhanced power graph. In this paper, we first characterize the dominating vertices of enhanced power graph of any finite nilpotent group. Thereafter, we classify all nilpotent groups $G$ such that the proper enhanced power graphs are connected and find out their diameter. We also explicitly find out the domination number of proper enhanced power graphs of finite nilpotent groups. Finally, we determine the multiplicity of the Laplacian spectral radius of the enhanced power graphs of nilpotent groups.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Effect of stepwise adjustment of Dam** factor upon PageRank
Authors:
Subhajit Sahu,
Kishore Kothapalli,
Dip Sankar Banerjee
Abstract:
The effect of adjusting dam** factor α, from a small initial value α0 to the final desired αf value, upon then iterations needed for PageRank computation is observed. Adjustment of the dam** factor is done in one or more steps. Results show no improvement in performance over a fixed dam** factor based PageRank.
The effect of adjusting dam** factor α, from a small initial value α0 to the final desired αf value, upon then iterations needed for PageRank computation is observed. Adjustment of the dam** factor is done in one or more steps. Results show no improvement in performance over a fixed dam** factor based PageRank.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
Adjusting PageRank parameters and Comparing results
Authors:
Subhajit Sahu,
Kishore Kothapalli,
Dip Sankar Banerjee
Abstract:
The effect of adjusting dam** factor α and tolerance τ on iterations needed for PageRank computation is studied here. Relative performance of PageRank computation with L1, L2, and L{\infty} norms used as convergence check, are also compared with six possible mean ratios. It is observed that increasing the dam** factor α linearly increases the iterations needed almost exponentially. On the othe…
▽ More
The effect of adjusting dam** factor α and tolerance τ on iterations needed for PageRank computation is studied here. Relative performance of PageRank computation with L1, L2, and L{\infty} norms used as convergence check, are also compared with six possible mean ratios. It is observed that increasing the dam** factor α linearly increases the iterations needed almost exponentially. On the other hand, decreasing the tolerance τ exponentially decreases the iterations needed almost exponentially. On average, PageRank with L{\infty} norm as convergence check is the fastest, quickly followed by L2 norm, and then L1 norm. For large graphs, above certain tolerance τ values, convergence can occur in a single iteration. On the contrary, below certain tolerance τ values, sensitivity issues can begin to appear, causing computation to halt at maximum iteration limit without convergence. The six mean ratios for relative performance comparison are based on arithmetic, geometric, and harmonic mean, as well as the order of ratio calculation. Among them GM-RATIO, geometric mean followed by ratio calculation, is found to be most stable, followed by AM-RATIO.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
HIPPODROME: Data Race Repair using Static Analysis Summaries
Authors:
Andreea Costea,
Abhishek Tiwari,
Sigmund Chianasta,
Kishore R,
Abhik Roychoudhury,
Ilya Sergey
Abstract:
Implementing bug-free concurrent programs is a challenging task in modern software development. State-of-the-art static analyses find hundreds of concurrency bugs in production code, scaling to large codebases. Yet, fixing these bugs in constantly changing codebases represents a daunting effort for programmers, particularly because a fix in the concurrent code can introduce other bugs in a subtle…
▽ More
Implementing bug-free concurrent programs is a challenging task in modern software development. State-of-the-art static analyses find hundreds of concurrency bugs in production code, scaling to large codebases. Yet, fixing these bugs in constantly changing codebases represents a daunting effort for programmers, particularly because a fix in the concurrent code can introduce other bugs in a subtle way.
In this work, we show how to harness compositional static analysis for concurrency bug detection, to enable a new Automated Program Repair (APR) technique for data races in large concurrent Java codebases. The key innovation of our work is an algorithm that translates procedure summaries inferred by the analysis tool for the purpose of bug reporting, into small local patches that fix concurrency bugs (without introducing new ones). This synergy makes it possible to extend the virtues of compositional static concurrency analysis to APR, making our approach effective (it can detect and fix many more bugs than existing tools for data race repair), scalable (it takes seconds to analyse and suggest fixes for sizeable codebases), and usable (generally, it does not require annotations from the users and can perform continuous automated repair). Our study conducted on popular open-source projects has confirmed that our tool automatically produces concurrency fixes similar to those proposed by the developers in the past.
△ Less
Submitted 6 August, 2021; v1 submitted 5 August, 2021;
originally announced August 2021.
-
Opinion Prediction with User Fingerprinting
Authors:
Kishore Tumarada,
Yifan Zhang,
Fan Yang,
Eduard Dragut,
Omprakash Gnawali,
Arjun Mukherjee
Abstract:
Opinion prediction is an emerging research area with diverse real-world applications, such as market research and situational awareness. We identify two lines of approaches to the problem of opinion prediction. One uses topic-based sentiment analysis with time-series modeling, while the other uses static embedding of text. The latter approaches seek user-specific solutions by generating user finge…
▽ More
Opinion prediction is an emerging research area with diverse real-world applications, such as market research and situational awareness. We identify two lines of approaches to the problem of opinion prediction. One uses topic-based sentiment analysis with time-series modeling, while the other uses static embedding of text. The latter approaches seek user-specific solutions by generating user fingerprints. Such approaches are useful in predicting user's reactions to unseen content. In this work, we propose a novel dynamic fingerprinting method that leverages contextual embedding of user's comments conditioned on relevant user's reading history. We integrate BERT variants with a recurrent neural network to generate predictions. The results show up to 13\% improvement in micro F1-score compared to previous approaches. Experimental results show novel insights that were previously unknown such as better predictions for an increase in dynamic history length, the impact of the nature of the article on performance, thereby laying the foundation for further research.
△ Less
Submitted 10 September, 2021; v1 submitted 31 July, 2021;
originally announced August 2021.
-
A new method to extract the valence transversity distributions
Authors:
Mauro Anselmino,
Raj Kishore,
Asmita Mukherjee
Abstract:
A new method is suggested for the extraction of $u$-quark and $d$-quark transversity distributions, using single spin asymmetry (SSA) data in semi-inclusive deep inelastic scattering (SIDIS) processes, where they couple to the Collins or the di-hadron fragmentation functions. We discuss a recent suggestion to extract the transversity distribution using the concept of difference asymmetries and the…
▽ More
A new method is suggested for the extraction of $u$-quark and $d$-quark transversity distributions, using single spin asymmetry (SSA) data in semi-inclusive deep inelastic scattering (SIDIS) processes, where they couple to the Collins or the di-hadron fragmentation functions. We discuss a recent suggestion to extract the transversity distribution using the concept of difference asymmetries and their ratios, which avoids the requirement of Collins function. We suggest new measurements, involving ratios of polarized cross-sections, that would directly probe the ratio $h_1^{d_v}/h_1^{u_v}$. We also show some numerical estimates.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
$cos(2φ_h)$ asymmetry in $J/ψ$ production in unpolarized $ep$ collision in NRQCD
Authors:
Raj Kishore,
Asmita Mukherjee,
Mariyah Siddiqah
Abstract:
We present a recent calculation of the transverse momentum dependent gluon distributions inside unpolarised protons and show how the ratio of the linearly polarized and the unpolarized gluon distribution in the proton can be probed by looking at $Cos(2φ_h)$ asymmetry in $J/ψ$ production in unpolarized $ep$ collision. We use NRQCD for estimating $J/ψ$ production and include contributions both from…
▽ More
We present a recent calculation of the transverse momentum dependent gluon distributions inside unpolarised protons and show how the ratio of the linearly polarized and the unpolarized gluon distribution in the proton can be probed by looking at $Cos(2φ_h)$ asymmetry in $J/ψ$ production in unpolarized $ep$ collision. We use NRQCD for estimating $J/ψ$ production and include contributions both from color singlet and color octet states.
△ Less
Submitted 5 July, 2021;
originally announced July 2021.
-
Semantic annotation for computational pathology: Multidisciplinary experience and best practice recommendations
Authors:
Noorul Wahab,
Islam M Miligy,
Katherine Dodd,
Harvir Sahota,
Michael Toss,
Wenqi Lu,
Mostafa Jahanifar,
Mohsin Bilal,
Simon Graham,
Young Park,
Giorgos Hadjigeorghiou,
Abhir Bhalerao,
Ayat Lashen,
Asmaa Ibrahim,
Ayaka Katayama,
Henry O Ebili,
Matthew Parkin,
Tom Sorell,
Shan E Ahmed Raza,
Emily Hero,
Hesham Eldaly,
Yee Wah Tsang,
Kishore Gopalakrishnan,
David Snead,
Emad Rakha
, et al. (2 additional authors not shown)
Abstract:
Recent advances in whole slide imaging (WSI) technology have led to the development of a myriad of computer vision and artificial intelligence (AI) based diagnostic, prognostic, and predictive algorithms. Computational Pathology (CPath) offers an integrated solution to utilize information embedded in pathology WSIs beyond what we obtain through visual assessment. For automated analysis of WSIs and…
▽ More
Recent advances in whole slide imaging (WSI) technology have led to the development of a myriad of computer vision and artificial intelligence (AI) based diagnostic, prognostic, and predictive algorithms. Computational Pathology (CPath) offers an integrated solution to utilize information embedded in pathology WSIs beyond what we obtain through visual assessment. For automated analysis of WSIs and validation of machine learning (ML) models, annotations at the slide, tissue and cellular levels are required. The annotation of important visual constructs in pathology images is an important component of CPath projects. Improper annotations can result in algorithms which are hard to interpret and can potentially produce inaccurate and inconsistent results. Despite the crucial role of annotations in CPath projects, there are no well-defined guidelines or best practices on how annotations should be carried out. In this paper, we address this shortcoming by presenting the experience and best practices acquired during the execution of a large-scale annotation exercise involving a multidisciplinary team of pathologists, ML experts and researchers as part of the Pathology image data Lake for Analytics, Knowledge and Education (PathLAKE) consortium. We present a real-world case study along with examples of different types of annotations, diagnostic algorithm, annotation data dictionary and annotation constructs. The analyses reported in this work highlight best practice recommendations that can be used as annotation guidelines over the lifecycle of a CPath project.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
The Gravity Collective: A Search for the Electromagnetic Counterpart to the Neutron Star-Black Hole Merger GW190814
Authors:
Charles D. Kilpatrick,
David A. Coulter,
Iair Arcavi,
Thomas G. Brink,
Georgios Dimitriadis,
Alexei V. Filippenko,
Ryan J. Foley,
D. Andrew Howell,
David O. Jones,
Martin Makler,
Anthony L. Piro,
César Rojas-Bravo,
David J. Sand,
Jonathan J. Swift,
Douglas Tucker,
WeiKang Zheng,
Sahar S. Allam,
James T. Annis,
Juanita Antilen,
Tristan G. Bachmann,
Joshua S. Bloom,
Clecio R. Bom,
K. Azalee Bostroem,
Dillon Brout,
Jamison Burke
, et al. (57 additional authors not shown)
Abstract:
We present optical follow-up imaging obtained with the Katzman Automatic Imaging Telescope, Las Cumbres Observatory Global Telescope Network, Nickel Telescope, Swope Telescope, and Thacher Telescope of the LIGO/Virgo gravitational wave (GW) signal from the neutron star-black hole (NSBH) merger GW190814. We searched the GW190814 localization region (19 deg$^{2}$ for the 90th percentile best localiz…
▽ More
We present optical follow-up imaging obtained with the Katzman Automatic Imaging Telescope, Las Cumbres Observatory Global Telescope Network, Nickel Telescope, Swope Telescope, and Thacher Telescope of the LIGO/Virgo gravitational wave (GW) signal from the neutron star-black hole (NSBH) merger GW190814. We searched the GW190814 localization region (19 deg$^{2}$ for the 90th percentile best localization), covering a total of 51 deg$^{2}$ and 94.6% of the two-dimensional localization region. Analyzing the properties of 189 transients that we consider as candidate counterparts to the NSBH merger, including their localizations, discovery times from merger, optical spectra, likely host-galaxy redshifts, and photometric evolution, we conclude that none of these objects are likely to be associated with GW190814. Based on this finding, we consider the likely optical properties of an electromagnetic counterpart to GW190814, including possible kilonovae and short gamma-ray burst afterglows. Using the joint limits from our follow-up imaging, we conclude that a counterpart with an $r$-band decline rate of 0.68 mag day$^{-1}$, similar to the kilonova AT 2017gfo, could peak at an absolute magnitude of at most $-17.8$ mag (50% confidence). Our data are not constraining for ''red'' kilonovae and rule out ''blue'' kilonovae with $M>0.5 M_{\odot}$ (30% confidence). We strongly rule out all known types of short gamma-ray burst afterglows with viewing angles $<$17$^{\circ}$ assuming an initial jet opening angle of $\sim$$5.2^{\circ}$ and explosion energies and circumburst densities similar to afterglows explored in the literature. Finally, we explore the possibility that GW190814 merged in the disk of an active galactic nucleus, of which we find four in the localization region, but we do not find any candidate counterparts among these sources.
△ Less
Submitted 12 June, 2021;
originally announced June 2021.
-
Tiplines to Combat Misinformation on Encrypted Platforms: A Case Study of the 2019 Indian Election on WhatsApp
Authors:
Ashkan Kazemi,
Kiran Garimella,
Gautam Kishore Shahi,
Devin Gaffney,
Scott A. Hale
Abstract:
There is currently no easy way to fact-check content on WhatsApp and other end-to-end encrypted platforms at scale. In this paper, we analyze the usefulness of a crowd-sourced "tipline" through which users can submit content ("tips") that they want fact-checked. We compare the tips sent to a WhatsApp tipline run during the 2019 Indian national elections with the messages circulating in large, publ…
▽ More
There is currently no easy way to fact-check content on WhatsApp and other end-to-end encrypted platforms at scale. In this paper, we analyze the usefulness of a crowd-sourced "tipline" through which users can submit content ("tips") that they want fact-checked. We compare the tips sent to a WhatsApp tipline run during the 2019 Indian national elections with the messages circulating in large, public groups on WhatsApp and other social media platforms during the same period. We find that tiplines are a very useful lens into WhatsApp conversations: a significant fraction of messages and images sent to the tipline match with the content being shared on public WhatsApp groups and other social media. Our analysis also shows that tiplines cover the most popular content well, and a majority of such content is often shared to the tipline before appearing in large, public WhatsApp groups. Overall, our findings suggest tiplines can be an effective source for discovering content to fact-check.
△ Less
Submitted 23 July, 2021; v1 submitted 8 June, 2021;
originally announced June 2021.