-
Elucidating the role of electron transfer in the photoluminescence of $\mathrm{MoS_{2}}$ quantum dots synthesized by fs-pulse ablation
Authors:
Anubhab Sahoo,
Tejendra Dixit,
K. V. Anil Kumar,
K. Lakshmi Ganapathi,
Pramoda K. Nayak,
M. S. Ramachandra Rao,
Sivarama Krishnan
Abstract:
Herein, $\mathrm{MoS_{2}}$ quantum dot (QDs) with controlled optical, structural, and electronic properties are synthesized using the femtosecond pulsed laser ablation in liquid (fs-PLAL) technique by varying pulse-width, ablation power, and ablation time to harness the potential for next-generation optoelectronics and quantum technology. Furthermore, this work elucidates key aspects of the mechan…
▽ More
Herein, $\mathrm{MoS_{2}}$ quantum dot (QDs) with controlled optical, structural, and electronic properties are synthesized using the femtosecond pulsed laser ablation in liquid (fs-PLAL) technique by varying pulse-width, ablation power, and ablation time to harness the potential for next-generation optoelectronics and quantum technology. Furthermore, this work elucidates key aspects of the mechanisms underlying the near-UV and blue emission, the accompanying large Stokes-shift, and the consequent change in sample color with laser exposure parameters pertaining to $\mathrm{MoS_{2}}$ QDs. Through spectroscopic analysis, including UV-visible absorption, photoluminescence, and Raman spectroscopy, we successfully unravelled the mechanisms for the change in optoelectronic properties of $\mathrm{MoS_{2}}$ QDs with laser parameters. We realize that the occurrence of a secondary phase, specifically $\mathrm{MoO_{3-x}}$, is responsible for the significant Stokes-shift and blue emission observed in this QDs system. The primary factor influencing these activities is the electron transfer observed between these two phases, as validated by excitation dependent photoluminescence, XPS and Raman spectroscopies.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Shape-dependent motility of polar inclusions in active baths
Authors:
Pritha Dolai,
Aditya Singh Rajput,
K. Vijay Kumar
Abstract:
Collections of persistently moving active particles are an example of a nonequilibrium heat bath. One way to study the nature of nonequilibrium fluctuations in such systems is to follow the dynamics of an embedded probe particle. With this aim, we study the dynamics of an anisotropic inclusion embedded in a bath of active particles. By studying various statistical correlation functions of the dyna…
▽ More
Collections of persistently moving active particles are an example of a nonequilibrium heat bath. One way to study the nature of nonequilibrium fluctuations in such systems is to follow the dynamics of an embedded probe particle. With this aim, we study the dynamics of an anisotropic inclusion embedded in a bath of active particles. By studying various statistical correlation functions of the dynamics, we show that the emergent motility of this inclusion depends on its shape as well as the properties of the active bath. We demonstrate that both the decorrelation time of the net force on the inclusion and the dwell time of bath particles in a geometrical trap on the inclusion have a non-monotonic dependence on its shape. We also find that the motility of the inclusion is optimal when the volume fraction of the active bath is close to the value for the onset of motility induced phase separation.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Harnessing confinement and driving to tune active particle dynamics
Authors:
Aniruddh Murali,
Pritha Dolai,
Ashwini Krishna,
K. Vijay Kumar,
Shashi Thutupalli
Abstract:
A distinguishing feature of active particles is the nature of the non-equilibrium noise driving their dynamics. Control of these noise properties is, therefore, of both fundamental and applied interest. We demonstrate emergent tuning of the active noise of a granular self-propelled particle by confining it to a quasi one-dimensional channel. We find that this particle, moving like an active Browni…
▽ More
A distinguishing feature of active particles is the nature of the non-equilibrium noise driving their dynamics. Control of these noise properties is, therefore, of both fundamental and applied interest. We demonstrate emergent tuning of the active noise of a granular self-propelled particle by confining it to a quasi one-dimensional channel. We find that this particle, moving like an active Brownian particle (ABP) in two-dimensions, displays run-and-tumble (RTP) characteristics in confinement. We show that the dynamics of the relative orientation co-ordinate of the particle maps to that of a Brownian particle in a periodic potential subject to a constant force, in analogy to the dynamics of a molecular motor. This map** captures the essential statistical characteristics of the one-dimensional RTP motion. Specifically, our theoretical analysis is in agreement with the empirical distributions of the relative orientation co-ordinate and the run-times (tumble-rates) of the particle. Finally, we explicitly control these emergent run-and-tumble like noise parameters by external driving. Altogether, our work illustrates geometry-induced tuning of the active dynamics of self-propelled units thus suggesting an independent route to harness their internal dynamics.
△ Less
Submitted 3 January, 2021;
originally announced January 2021.
-
Joint Disentangling and Adaptation for Cross-Domain Person Re-Identification
Authors:
Yang Zou,
Xiaodong Yang,
Zhiding Yu,
B. V. K. Vijaya Kumar,
Jan Kautz
Abstract:
Although a significant progress has been witnessed in supervised person re-identification (re-id), it remains challenging to generalize re-id models to new domains due to the huge domain gaps. Recently, there has been a growing interest in using unsupervised domain adaptation to address this scalability issue. Existing methods typically conduct adaptation on the representation space that contains…
▽ More
Although a significant progress has been witnessed in supervised person re-identification (re-id), it remains challenging to generalize re-id models to new domains due to the huge domain gaps. Recently, there has been a growing interest in using unsupervised domain adaptation to address this scalability issue. Existing methods typically conduct adaptation on the representation space that contains both id-related and id-unrelated factors, thus inevitably undermining the adaptation efficacy of id-related features. In this paper, we seek to improve adaptation by purifying the representation space to be adapted. To this end, we propose a joint learning framework that disentangles id-related/unrelated features and enforces adaptation to work on the id-related feature space exclusively. Our model involves a disentangling module that encodes cross-domain images into a shared appearance space and two separate structure spaces, and an adaptation module that performs adversarial alignment and self-training on the shared appearance space. The two modules are co-designed to be mutually beneficial. Extensive experiments demonstrate that the proposed joint learning framework outperforms the state-of-the-art methods by clear margins.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
Towards Occlusion-Aware Multifocal Displays
Authors:
Jen-Hao Rick Chang,
Anat Levin,
B. V. K. Vijaya Kumar,
Aswin C. Sankaranarayanan
Abstract:
The human visual system uses numerous cues for depth perception, including disparity, accommodation, motion parallax and occlusion. It is incumbent upon virtual-reality displays to satisfy these cues to provide an immersive user experience. Multifocal displays, one of the classic approaches to satisfy the accommodation cue, place virtual content at multiple focal planes, each at a di erent depth.…
▽ More
The human visual system uses numerous cues for depth perception, including disparity, accommodation, motion parallax and occlusion. It is incumbent upon virtual-reality displays to satisfy these cues to provide an immersive user experience. Multifocal displays, one of the classic approaches to satisfy the accommodation cue, place virtual content at multiple focal planes, each at a di erent depth. However, the content on focal planes close to the eye do not occlude those farther away; this deteriorates the occlusion cue as well as reduces contrast at depth discontinuities due to leakage of the defocus blur. This paper enables occlusion-aware multifocal displays using a novel ConeTilt operator that provides an additional degree of freedom -- tilting the light cone emitted at each pixel of the display panel. We show that, for scenes with relatively simple occlusion con gurations, tilting the light cones provides the same e ect as physical occlusion. We demonstrate that ConeTilt can be easily implemented by a phase-only spatial light modulator. Using a lab prototype, we show results that demonstrate the presence of occlusion cues and the increased contrast of the display at depth edges.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Universal scaling in active single-file dynamics
Authors:
Pritha Dolai,
Arghya Das,
Anupam Kundu,
Chandan Dasgupta,
Abhishek Dhar,
K. Vijay Kumar
Abstract:
We study the single-file dynamics of three classes of active particles: run-and-tumble particles, active Brownian particles and active Ornstein-Uhlenbeck particles. At high activity values, the particles, interacting via purely repulsive and short-ranged forces, aggregate into several motile and dynamical clusters of comparable size, and do not display bulk phase-segregation. In this dynamical ste…
▽ More
We study the single-file dynamics of three classes of active particles: run-and-tumble particles, active Brownian particles and active Ornstein-Uhlenbeck particles. At high activity values, the particles, interacting via purely repulsive and short-ranged forces, aggregate into several motile and dynamical clusters of comparable size, and do not display bulk phase-segregation. In this dynamical steady-state, we find that the cluster size distribution of these aggregates is a scaled function of the density and activity parameters across the three models of active particles with the same scaling function. The velocity distribution of these motile clusters is non-Gaussian. We show that the effective dynamics of these clusters can explain the observed emergent scaling of the mean-squared displacement of tagged particles for all the three models with identical scaling exponents and functions. Concomitant with the clustering seen at high activities, we observe that the static density correlation function displays rich structures, including multiple peaks that are reminiscent of particle clustering induced by effective attractive interactions, while the dynamical variant shows non-diffusive scaling. Our study reveals a universal scaling behavior in the single-file dynamics of interacting active particles.
△ Less
Submitted 7 July, 2020; v1 submitted 2 April, 2020;
originally announced April 2020.
-
Predictive Analysis for Detection of Human Neck Postures using a robust integration of kinetics and kinematics
Authors:
Korupalli V Rajesh Kumar,
Susan Elias
Abstract:
Human neck postures and movements need to be monitored, measured, quantified and analyzed, as a preventive measure in healthcare applications. Improper neck postures are an increasing source of neck musculoskeletal disorders, requiring therapy and rehabilitation. The motivation for the research presented in this paper was the need to develop a notification mechanism for improper neck usage. Kinema…
▽ More
Human neck postures and movements need to be monitored, measured, quantified and analyzed, as a preventive measure in healthcare applications. Improper neck postures are an increasing source of neck musculoskeletal disorders, requiring therapy and rehabilitation. The motivation for the research presented in this paper was the need to develop a notification mechanism for improper neck usage. Kinematic data captured by sensors have limitations in accurately classifying the neck postures. Hence, we propose an integrated use of kinematic and kinetic data to efficiently classify neck postures. Using machine learning algorithms we obtained 100% accuracy in the predictive analysis of this data. The research analysis and discussions show that the kinetic data of the Hyoid muscles can accurately detect the neck posture given the corresponding kinematic data captured by the neck-band. The proposed robust platform for the integration of kinematic and kinetic data has enabled the design of a smart neck-band for the prevention of neck musculoskeletal disorders.
△ Less
Submitted 12 March, 2020;
originally announced March 2020.
-
Dodecanacci superconductor-metamaterial photonic quasicrystal
Authors:
Chittaranjan Nayak,
Alireza Aghajamali,
Mehdi Solaimani,
Jayanta K. Rakshit,
Damodar Panigrahy,
Kanaparthi V. P. Kumar,
Bandaru Ramakrishna
Abstract:
Using the transfer matrix method, the present paper attempt to determine the properties of the photonic spectra of the Dodecanacci superconductor-metamaterial one-dimensional quasiperiodic multilayer. The numerical calculation is supported by using the transfer matrix method. At first, we analyze the transmission for Dodecanacci quasicrystal for different generations. After that, we analyze the ef…
▽ More
Using the transfer matrix method, the present paper attempt to determine the properties of the photonic spectra of the Dodecanacci superconductor-metamaterial one-dimensional quasiperiodic multilayer. The numerical calculation is supported by using the transfer matrix method. At first, we analyze the transmission for Dodecanacci quasicrystal for different generations. After that, we analyze the effect of the thickness of the building blocks and the operating temperature. We observed that a vast number of forbidden bandgaps and transmission pecks are developed in its transmission spectra up to a certain generation number of Dodecanacci quasiperiodic sequence. If the generation number increases further, then the bandgaps become wider. According to the obtained results, depending on its generation, this structure can be used as an optical reflector or narrowband filter.
△ Less
Submitted 26 February, 2020;
originally announced March 2020.
-
Deep Classification Network for Monocular Depth Estimation
Authors:
Azeez Oluwafemi,
Yang Zou,
B. V. K. Vijaya Kumar
Abstract:
Monocular Depth Estimation is usually treated as a supervised and regression problem when it actually is very similar to semantic segmentation task since they both are fundamentally pixel-level classification tasks. We applied depth increments that increases with depth in discretizing depth values and then applied Deeplab v2 and the result was higher accuracy. We were able to achieve a state-of-th…
▽ More
Monocular Depth Estimation is usually treated as a supervised and regression problem when it actually is very similar to semantic segmentation task since they both are fundamentally pixel-level classification tasks. We applied depth increments that increases with depth in discretizing depth values and then applied Deeplab v2 and the result was higher accuracy. We were able to achieve a state-of-the-art result on the KITTI dataset and outperformed existing architecture by an 8% margin.
△ Less
Submitted 23 October, 2019;
originally announced October 2019.
-
Minimal model of cellular symmetry breaking
Authors:
Alexander Mietke,
V. Jemseena,
K. Vijay Kumar,
Ivo F. Sbalzarini,
Frank Jülicher
Abstract:
The cell cortex, a thin film of active material assembled below the cell membrane, plays a key role in cellular symmetry breaking processes such as cell polarity establishment and cell division. Here, we present a minimal model of the self-organization of the cell cortex that is based on a hydrodynamic theory of curved active surfaces. Active stresses on this surface are regulated by a diffusing m…
▽ More
The cell cortex, a thin film of active material assembled below the cell membrane, plays a key role in cellular symmetry breaking processes such as cell polarity establishment and cell division. Here, we present a minimal model of the self-organization of the cell cortex that is based on a hydrodynamic theory of curved active surfaces. Active stresses on this surface are regulated by a diffusing molecular species. We show that coupling of the active surface to a passive bulk fluid enables spontaneous polarization and the formation of a contractile ring on the surface via mechano-chemical instabilities. We discuss the role of external fields in guiding such pattern formation. Our work reveals that key features of cellular symmetry breaking and cell division can emerge in a minimal model via general dynamic instabilities.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
Confidence Regularized Self-Training
Authors:
Yang Zou,
Zhiding Yu,
Xiaofeng Liu,
B. V. K. Vijaya Kumar,
**song Wang
Abstract:
Recent advances in domain adaptation show that deep self-training presents a powerful means for unsupervised domain adaptation. These methods often involve an iterative process of predicting on target domain and then taking the confident predictions as pseudo-labels for retraining. However, since pseudo-labels can be noisy, self-training can put overconfident label belief on wrong classes, leading…
▽ More
Recent advances in domain adaptation show that deep self-training presents a powerful means for unsupervised domain adaptation. These methods often involve an iterative process of predicting on target domain and then taking the confident predictions as pseudo-labels for retraining. However, since pseudo-labels can be noisy, self-training can put overconfident label belief on wrong classes, leading to deviated solutions with propagated errors. To address the problem, we propose a confidence regularized self-training (CRST) framework, formulated as regularized self-training. Our method treats pseudo-labels as continuous latent variables jointly optimized via alternating optimization. We propose two types of confidence regularization: label regularization (LR) and model regularization (MR). CRST-LR generates soft pseudo-labels while CRST-MR encourages the smoothness on network output. Extensive experiments on image classification and semantic segmentation show that CRSTs outperform their non-regularized counterpart with state-of-the-art performance. The code and models of this work are available at https://github.com/yzou2/CRST.
△ Less
Submitted 15 July, 2020; v1 submitted 26 August, 2019;
originally announced August 2019.
-
Attention Control with Metric Learning Alignment for Image Set-based Recognition
Authors:
Xiaofeng Liu,
Zhenhua Guo,
Jane You,
B. V. K Vijaya Kumar
Abstract:
This paper considers the problem of image set-based face verification and identification. Unlike traditional single sample (an image or a video) setting, this situation assumes the availability of a set of heterogeneous collection of orderless images and videos. The samples can be taken at different check points, different identity documents $etc$. The importance of each image is usually considere…
▽ More
This paper considers the problem of image set-based face verification and identification. Unlike traditional single sample (an image or a video) setting, this situation assumes the availability of a set of heterogeneous collection of orderless images and videos. The samples can be taken at different check points, different identity documents $etc$. The importance of each image is usually considered either equal or based on a quality assessment of that image independent of other images and/or videos in that image set. How to model the relationship of orderless images within a set remains a challenge. We address this problem by formulating it as a Markov Decision Process (MDP) in a latent space. Specifically, we first propose a dependency-aware attention control (DAC) network, which uses actor-critic reinforcement learning for attention decision of each image to exploit the correlations among the unordered images. An off-policy experience replay is introduced to speed up the learning process. Moreover, the DAC is combined with a temporal model for videos using divide and conquer strategies. We also introduce a pose-guided representation (PGR) scheme that can further boost the performance at extreme poses. We propose a parameter-free PGR without the need for training as well as a novel metric learning-based PGR for pose alignment without the need for pose detection in testing stage. Extensive evaluations on IJB-A/B/C, YTF, Celebrity-1000 datasets demonstrate that our method outperforms many state-of-art approaches on the set-based as well as video-based face recognition databases.
△ Less
Submitted 5 August, 2019;
originally announced August 2019.
-
Dependency-aware Attention Control for Unconstrained Face Recognition with Image Sets
Authors:
Xiaofeng Liu,
B. V. K Vijaya Kumar,
Chao Yang,
Qingming Tang,
Jane You
Abstract:
This paper targets the problem of image set-based face verification and identification. Unlike traditional single media (an image or video) setting, we encounter a set of heterogeneous contents containing orderless images and videos. The importance of each image is usually considered either equal or based on their independent quality assessment. How to model the relationship of orderless images wi…
▽ More
This paper targets the problem of image set-based face verification and identification. Unlike traditional single media (an image or video) setting, we encounter a set of heterogeneous contents containing orderless images and videos. The importance of each image is usually considered either equal or based on their independent quality assessment. How to model the relationship of orderless images within a set remains a challenge. We address this problem by formulating it as a Markov Decision Process (MDP) in the latent space. Specifically, we first present a dependency-aware attention control (DAC) network, which resorts to actor-critic reinforcement learning for sequential attention decision of each image embedding to fully exploit the rich correlation cues among the unordered images. Moreover, we introduce its sample-efficient variant with off-policy experience replay to speed up the learning process. The pose-guided representation scheme can further boost the performance at the extremes of the pose variation.
△ Less
Submitted 5 July, 2019;
originally announced July 2019.
-
Steady State of an Active Brownian Particle in Two-Dimensional Harmonic Trap
Authors:
Kanaya Malakar,
Arghya Das,
Anupam Kundu,
K. Vijay Kumar,
Abhishek Dhar
Abstract:
We find an exact series solution for the steady-state probability distribution of a harmonically trapped active Brownian particle in two dimensions, in the presence of translational diffusion. This series solution allows us to efficiently explore the behavior of the system in different parameter regimes. Identifying "active" and "passive" regimes, we predict a surprising re-entrant active-to-passi…
▽ More
We find an exact series solution for the steady-state probability distribution of a harmonically trapped active Brownian particle in two dimensions, in the presence of translational diffusion. This series solution allows us to efficiently explore the behavior of the system in different parameter regimes. Identifying "active" and "passive" regimes, we predict a surprising re-entrant active-to-passive transition with increasing trap stiffness. Our numerical simulations validate this finding. We discuss various interesting limiting cases wherein closed form expressions for the distributions can be obtained.
△ Less
Submitted 3 February, 2020; v1 submitted 11 February, 2019;
originally announced February 2019.
-
Massive Scattering Amplitudes in Six Dimensions
Authors:
Rishabh Jha,
Chethan Krishnan,
K. V. Pavan Kumar
Abstract:
We show that a natural spinor-helicity formalism that can describe massive scattering amplitudes exists in $D=6$ dimensions. This is arranged by having helicity spinors carry an index in the Dirac spinor {\bf 4} of the massive little group, $SO(5) \sim Sp(4)$. In the high energy limit, two separate kinds of massless helicity spinors emerge as required for consistency with arXiv:0902.0981, with ind…
▽ More
We show that a natural spinor-helicity formalism that can describe massive scattering amplitudes exists in $D=6$ dimensions. This is arranged by having helicity spinors carry an index in the Dirac spinor {\bf 4} of the massive little group, $SO(5) \sim Sp(4)$. In the high energy limit, two separate kinds of massless helicity spinors emerge as required for consistency with arXiv:0902.0981, with indices in the two $SU(2)$'s of the massless little group $SO(4)$. The tensors of ${\bf 4}$ lead to particles with arbitrary spin, and using these and demanding consistent factorization, we can fix $3-$ and $4-$point tree amplitudes of arbitrary masses and spins: we provide examples. We discuss the high energy limit of scattering amplitudes and the Higgs mechanism in this language, and make some preliminary observations about massive BCFW recursion.
△ Less
Submitted 28 March, 2019; v1 submitted 28 October, 2018;
originally announced October 2018.
-
Domain Adaptation for Semantic Segmentation via Class-Balanced Self-Training
Authors:
Yang Zou,
Zhiding Yu,
B. V. K. Vijaya Kumar,
**song Wang
Abstract:
Recent deep networks achieved state of the art performance on a variety of semantic segmentation tasks. Despite such progress, these models often face challenges in real world `wild tasks' where large difference between labeled training/source data and unseen test/target data exists. In particular, such difference is often referred to as `domain gap', and could cause significantly decreased perfor…
▽ More
Recent deep networks achieved state of the art performance on a variety of semantic segmentation tasks. Despite such progress, these models often face challenges in real world `wild tasks' where large difference between labeled training/source data and unseen test/target data exists. In particular, such difference is often referred to as `domain gap', and could cause significantly decreased performance which cannot be easily remedied by further increasing the representation power. Unsupervised domain adaptation (UDA) seeks to overcome such problem without target domain labels. In this paper, we propose a novel UDA framework based on an iterative self-training procedure, where the problem is formulated as latent variable loss minimization, and can be solved by alternatively generating pseudo labels on target data and re-training the model with these labels. On top of self-training, we also propose a novel class-balanced self-training framework to avoid the gradual dominance of large classes on pseudo-label generation, and introduce spatial priors to refine generated labels. Comprehensive experiments show that the proposed methods achieve state of the art semantic segmentation performance under multiple major UDA settings.
△ Less
Submitted 25 October, 2018; v1 submitted 18 October, 2018;
originally announced October 2018.
-
Simultaneous Edge Alignment and Learning
Authors:
Zhiding Yu,
Weiyang Liu,
Yang Zou,
Chen Feng,
Srikumar Ramalingam,
B. V. K. Vijaya Kumar,
Jan Kautz
Abstract:
Edge detection is among the most fundamental vision problems for its role in perceptual grou** and its wide applications. Recent advances in representation learning have led to considerable improvements in this area. Many state of the art edge detection models are learned with fully convolutional networks (FCNs). However, FCN-based edge learning tends to be vulnerable to misaligned labels due to…
▽ More
Edge detection is among the most fundamental vision problems for its role in perceptual grou** and its wide applications. Recent advances in representation learning have led to considerable improvements in this area. Many state of the art edge detection models are learned with fully convolutional networks (FCNs). However, FCN-based edge learning tends to be vulnerable to misaligned labels due to the delicate structure of edges. While such problem was considered in evaluation benchmarks, similar issue has not been explicitly addressed in general edge learning. In this paper, we show that label misalignment can cause considerably degraded edge learning quality, and address this issue by proposing a simultaneous edge alignment and learning framework. To this end, we formulate a probabilistic model where edge alignment is treated as latent variable optimization, and is learned end-to-end during network training. Experiments show several applications of this work, including improved edge detection with state of the art performance, and automatic refinement of noisy annotations.
△ Less
Submitted 26 October, 2018; v1 submitted 6 August, 2018;
originally announced August 2018.
-
Towards Multifocal Displays with Dense Focal Stacks
Authors:
Jen-Hao Rick Chang,
B. V. K. Vijaya Kumar,
Aswin C. Sankaranarayanan
Abstract:
We present a virtual reality display that is capable of generating a dense collection of depth/focal planes. This is achieved by driving a focus-tunable lens to sweep a range of focal lengths at a high frequency and, subsequently, tracking the focal length precisely at microsecond time resolutions using an optical module. Precise tracking of the focal length, coupled with a high-speed display, ena…
▽ More
We present a virtual reality display that is capable of generating a dense collection of depth/focal planes. This is achieved by driving a focus-tunable lens to sweep a range of focal lengths at a high frequency and, subsequently, tracking the focal length precisely at microsecond time resolutions using an optical module. Precise tracking of the focal length, coupled with a high-speed display, enables our lab prototype to generate 1600 focal planes per second. This enables a novel first-of-its-kind virtual reality multifocal display that is capable of resolving the vergence-accommodation conflict endemic to today's displays.
△ Less
Submitted 22 September, 2018; v1 submitted 27 May, 2018;
originally announced May 2018.
-
Complete Solution of a Gauged Tensor Model
Authors:
Chethan Krishnan,
K. V. Pavan Kumar
Abstract:
Building on a strategy introduced in arXiv:1706.05364, we present exact analytic expressions for all the singlet eigenstates and eigenvalues of the simplest non-linear ($n=2, d=3$) gauged Gurau-Witten tensor model. This solves the theory completely. The ground state eigenvalue is $-2\sqrt{14}$ in suitable conventions. This matches the result obtained for the ground state energy in the ungauged mod…
▽ More
Building on a strategy introduced in arXiv:1706.05364, we present exact analytic expressions for all the singlet eigenstates and eigenvalues of the simplest non-linear ($n=2, d=3$) gauged Gurau-Witten tensor model. This solves the theory completely. The ground state eigenvalue is $-2\sqrt{14}$ in suitable conventions. This matches the result obtained for the ground state energy in the ungauged model, via brute force diagonalization on a computer. We find that the leftover degeneracies in the gauged theory, are only partially accounted for by its known discrete symmetries, indicating the existence of previously unidentified "hidden" global symmetries in the system. We discuss the spectral form factor, the beginnings of chaos, and the distinction between theories with $SO(n)$ and $O(n)$ gaugings. Our results provide the complete analytic solution of a non-linear gauge theory in 0+1 dimensions, albeit for a specific value of $N$. A summary of the main results in this paper were presented in the companion letter arXiv:1802.02502.
△ Less
Submitted 26 February, 2019; v1 submitted 26 April, 2018;
originally announced April 2018.
-
Redundancy allocation in finite-length nested codes for nonvolatile memories
Authors:
Yongjune Kim,
B. V. K. Vijaya Kumar
Abstract:
In this paper, we investigate the optimum way to allocate redundancy of finite-length nested codes for modern nonvolatile memories suffering from both permanent defects and transient errors (erasures or random errors). A nested coding approach such as partitioned codes can handle both permanent defects and transient errors by using two parts of redundancy: 1) redundancy to deal with permanent defe…
▽ More
In this paper, we investigate the optimum way to allocate redundancy of finite-length nested codes for modern nonvolatile memories suffering from both permanent defects and transient errors (erasures or random errors). A nested coding approach such as partitioned codes can handle both permanent defects and transient errors by using two parts of redundancy: 1) redundancy to deal with permanent defects and 2) redundancy for transient errors. We consider two different channel models of the binary defect and erasure channel (BDEC) and the binary defect and symmetric channel (BDSC). The transient errors of the BDEC are erasures and the BDSC's transient errors are modeled by the binary symmetric channel, respectively. Asymptotically, the probability of recovery failure can converge to zero if the capacity region conditions of nested codes are satisfied. However, the probability of recovery failure of finite-length nested codes can be significantly variable for different redundancy allocations even though they all satisfy the capacity region conditions. Hence, we formulate the redundancy allocation problem of finite-length nested codes to minimize the recovery failure probability. We derive the upper bounds on the probability of recovery failure and use them to estimate the optimal redundancy allocation. Numerical results show that our estimated redundancy allocation matches well the optimal redundancy allocation.
△ Less
Submitted 28 February, 2018;
originally announced March 2018.
-
Exact Solution of a Strongly Coupled Gauge Theory in 0+1 Dimensions
Authors:
Chethan Krishnan,
K. V. Pavan Kumar
Abstract:
Gauged tensor models are a class of strongly coupled quantum mechanical theories. We present the exact analytic solution of a specific example of such a theory: namely the smallest colored tensor model due to Gurau and Witten that exhibits non-linearities. We find explicit analytic expressions for the eigenvalues and eigenstates, and the former agree precisely with previous numerical results on (a…
▽ More
Gauged tensor models are a class of strongly coupled quantum mechanical theories. We present the exact analytic solution of a specific example of such a theory: namely the smallest colored tensor model due to Gurau and Witten that exhibits non-linearities. We find explicit analytic expressions for the eigenvalues and eigenstates, and the former agree precisely with previous numerical results on (a subset of) eigenvalues of the ungauged theory. The physics of the spectrum, despite the smallness of $N$, exhibits rudimentary signatures of chaos. This Letter is a summary of our main results: the gory details will appear in a companion paper.
△ Less
Submitted 26 February, 2019; v1 submitted 7 February, 2018;
originally announced February 2018.
-
(Anti-)Symmetrizing Wave Functions
Authors:
Chethan Krishnan,
K. V. Pavan Kumar,
P. N. Bala Subramanian
Abstract:
The construction of fully (anti-)symmetric states with many particles, when the single particle state carries multiple quantum numbers, is a problem that seems to have not been systematically addressed in the literature. A quintessential example is the construction of ground state baryon wave functions where the color singlet condition reduces the problem to just two (flavor and spin) quantum numb…
▽ More
The construction of fully (anti-)symmetric states with many particles, when the single particle state carries multiple quantum numbers, is a problem that seems to have not been systematically addressed in the literature. A quintessential example is the construction of ground state baryon wave functions where the color singlet condition reduces the problem to just two (flavor and spin) quantum numbers. In this paper, we address the general problem by noting that it can be re-interpreted as an eigenvalue equation, and provide a formalism that applies to generic number of particles and generic number of quantum numbers. As an immediate result, we find a complete solution to the two quantum number case, from which the baryon wave function problem with arbitrary number of flavors follows. As a more elaborate illustration that reveals complications not visible in the two quantum number case, we present the complete class of states possible for a system of five fermionic particles with three quantum numbers each. Our formalism makes systematic use of properties of the symmetric group and Young tableaux. Even though our motivations to consider this question have their roots in SYK-like tensor models and holography, the problem and its solution should have broader applications.
△ Less
Submitted 19 February, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Steady state, relaxation and first-passage properties of a run-and-tumble particle in one-dimension
Authors:
Kanaya Malakar,
V. Jemseena,
Anupam Kundu,
K. Vijay Kumar,
Sanjib Sabhapandit,
Satya N. Majumdar,
S. Redner,
Abhishek Dhar
Abstract:
We investigate the motion of a run-and-tumble particle (RTP) in one dimension. We find the exact probability distribution of the particle with and without diffusion on the infinite line, as well as in a finite interval. In the infinite domain, this probability distribution approaches a Gaussian form in the long-time limit, as in the case of a regular Brownian particle. At intermediate times, this…
▽ More
We investigate the motion of a run-and-tumble particle (RTP) in one dimension. We find the exact probability distribution of the particle with and without diffusion on the infinite line, as well as in a finite interval. In the infinite domain, this probability distribution approaches a Gaussian form in the long-time limit, as in the case of a regular Brownian particle. At intermediate times, this distribution exhibits unexpected multi-modal forms. In a finite domain, the probability distribution reaches a steady state form with peaks at the boundaries, in contrast to a Brownian particle. We also study the relaxation to the steady state analytically. Finally we compute the survival probability of the RTP in a semi-infinite domain. In the finite interval, we compute the exit probability and the associated exit times. We provide numerical verifications of our analytical results.
△ Less
Submitted 19 May, 2018; v1 submitted 22 November, 2017;
originally announced November 2017.
-
Contrasting SYK-like Models
Authors:
Chethan Krishnan,
K. V. Pavan Kumar,
Dario Rosa
Abstract:
We contrast some aspects of various SYK-like models with large-$N$ melonic behavior. First, we note that ungauged tensor models can exhibit symmetry breaking, even though these are 0+1 dimensional theories. Related to this, we show that when gauged, some of them admit no singlets, and are anomalous. The uncolored Majorana tensor model with even $N$ is a simple case where gauge singlets can exist i…
▽ More
We contrast some aspects of various SYK-like models with large-$N$ melonic behavior. First, we note that ungauged tensor models can exhibit symmetry breaking, even though these are 0+1 dimensional theories. Related to this, we show that when gauged, some of them admit no singlets, and are anomalous. The uncolored Majorana tensor model with even $N$ is a simple case where gauge singlets can exist in the spectrum. We outline a strategy for solving for the singlet spectrum, taking advantage of the results in arXiv:1706.05364, and reproduce the singlet states expected in $N=2$. In the second part of the paper, we contrast the random matrix aspects of some ungauged tensor models, the original SYK model, and a model due to Gross and Rosenhaus. The latter, even though disorder averaged, shows parallels with the Gurau-Witten model. In particular, the two models fall into identical Andreev ensembles as a function of $N$. In an appendix, we contrast the (expected) spectra of AdS$_2$ quantum gravity, SYK and SYK-like tensor models, and the zeros of the Riemann Zeta function.
△ Less
Submitted 28 December, 2017; v1 submitted 19 September, 2017;
originally announced September 2017.
-
Towards a Finite-$N$ Hologram
Authors:
Chethan Krishnan,
K. V. Pavan Kumar
Abstract:
We suggest that holographic tensor models related to SYK are viable candidates for exactly (ie., non-perturbatively in $N$) solvable holographic theories. The reason is that in these theories, the Hilbert space is a spinor representation, and the Hamiltonian (at least in some classes) can be arranged to commute with the Clifford level. This makes the theory solvable level by level. We demonstrate…
▽ More
We suggest that holographic tensor models related to SYK are viable candidates for exactly (ie., non-perturbatively in $N$) solvable holographic theories. The reason is that in these theories, the Hilbert space is a spinor representation, and the Hamiltonian (at least in some classes) can be arranged to commute with the Clifford level. This makes the theory solvable level by level. We demonstrate this for the specific case of the uncolored $O(n)^3$ tensor model with arbitrary even $n$, and reduce the question of determining the spectrum and eigenstates to an algebraic equation relating Young tableaux. Solving this reduced problem is conceptually trivial and amounts to matching the representations on either side, as we demonstrate explicitly at low levels. At high levels, representations become bigger, but should still be tractable. None of our arguments require any supersymmetry.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
One Network to Solve Them All --- Solving Linear Inverse Problems using Deep Projection Models
Authors:
J. H. Rick Chang,
Chun-Liang Li,
Barnabas Poczos,
B. V. K. Vijaya Kumar,
Aswin C. Sankaranarayanan
Abstract:
While deep learning methods have achieved state-of-the-art performance in many challenging inverse problems like image inpainting and super-resolution, they invariably involve problem-specific training of the networks. Under this approach, different problems require different networks. In scenarios where we need to solve a wide variety of problems, e.g., on a mobile camera, it is inefficient and c…
▽ More
While deep learning methods have achieved state-of-the-art performance in many challenging inverse problems like image inpainting and super-resolution, they invariably involve problem-specific training of the networks. Under this approach, different problems require different networks. In scenarios where we need to solve a wide variety of problems, e.g., on a mobile camera, it is inefficient and costly to use these specially-trained networks. On the other hand, traditional methods using signal priors can be used in all linear inverse problems but often have worse performance on challenging tasks. In this work, we provide a middle ground between the two kinds of methods --- we propose a general framework to train a single deep neural network that solves arbitrary linear inverse problems. The proposed network acts as a proximal operator for an optimization algorithm and projects non-image signals onto the set of natural images defined by the decision boundary of a classifier. In our experiments, the proposed framework demonstrates superior performance over traditional methods using a wavelet sparsity prior and achieves comparable performance of specially-trained networks on tasks including compressive sensing and pixel-wise inpainting.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
Random Matrices and Holographic Tensor Models
Authors:
Chethan Krishnan,
K. V. Pavan Kumar,
Sambuddha Sanyal
Abstract:
We further explore the connection between holographic $O(n)$ tensor models and random matrices. First, we consider the simplest non-trivial uncolored tensor model and show that the results for the density of states, level spacing and spectral form factor are qualitatively identical to the colored case studied in arXiv:1612.06330. We also explain an overall 16-fold degeneracy by identifying various…
▽ More
We further explore the connection between holographic $O(n)$ tensor models and random matrices. First, we consider the simplest non-trivial uncolored tensor model and show that the results for the density of states, level spacing and spectral form factor are qualitatively identical to the colored case studied in arXiv:1612.06330. We also explain an overall 16-fold degeneracy by identifying various symmetries, some of which were unavailable in SYK and the colored models. Secondly, and perhaps more interestingly, we systematically identify the Spectral Mirror Symmetry and the Time-Reversal Symmetry of both the colored and uncolored models for all values of $n$, and use them to identify the Andreev ensembles that control their random matrix behavior. We find that the ensembles that arise exhibit a refined version of Bott periodicity in $n$.
△ Less
Submitted 14 June, 2017; v1 submitted 23 March, 2017;
originally announced March 2017.
-
An Alternate Path Integral for Quantum Gravity
Authors:
Chethan Krishnan,
K. V. Pavan Kumar,
Avinash Raju
Abstract:
We define a (semi-classical) path integral for gravity with Neumann boundary conditions in $D$ dimensions, and show how to relate this new partition function to the usual picture of Euclidean quantum gravity. We also write down the action in ADM Hamiltonian formulation and use it to reproduce the entropy of black holes and cosmological horizons. A comparison between the (background-subtracted) cov…
▽ More
We define a (semi-classical) path integral for gravity with Neumann boundary conditions in $D$ dimensions, and show how to relate this new partition function to the usual picture of Euclidean quantum gravity. We also write down the action in ADM Hamiltonian formulation and use it to reproduce the entropy of black holes and cosmological horizons. A comparison between the (background-subtracted) covariant and Hamiltonian ways of semi-classically evaluating this path integral in flat space reproduces the generalized Smarr formula and the first law. This "Neumann ensemble" perspective on gravitational thermodynamics is parallel to the canonical (Dirichlet) ensemble of Gibbons-Hawking and the microcanonical approach of Brown-York.
△ Less
Submitted 28 February, 2017; v1 submitted 15 September, 2016;
originally announced September 2016.
-
Duality between erasures and defects
Authors:
Yongjune Kim,
B. V. K. Vijaya Kumar
Abstract:
We investigate the duality of the binary erasure channel (BEC) and the binary defect channel (BDC). This duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. In addition, the relations between BEC, BDC, binary erasure quantization (BEQ), and write-once memory (WOM) are described. From t…
▽ More
We investigate the duality of the binary erasure channel (BEC) and the binary defect channel (BDC). This duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. In addition, the relations between BEC, BDC, binary erasure quantization (BEQ), and write-once memory (WOM) are described. From these relations we claim that the capacity of the BDC can be achieved by Reed-Muller (RM) codes under maximum a posterior (MAP) decoding. Also, polar codes with a successive cancellation encoder achieve the capacity of the BDC.
Inspired by the duality between the BEC and the BDC, we introduce locally rewritable codes (LWC) for resistive memories, which are the counterparts of locally repairable codes (LRC) for distributed storage systems. The proposed LWC can improve endurance limit and power efficiency of resistive memories.
△ Less
Submitted 10 February, 2016;
originally announced February 2016.
-
Locally rewritable codes for resistive memories
Authors:
Yongjune Kim,
Abhishek A. Sharma,
Robert Mateescu,
Seung-Hwan Song,
Zvonimir Z. Bandic,
James A. Bain,
B. V. K. Vijaya Kumar
Abstract:
We propose locally rewritable codes (LWC) for resistive memories inspired by locally repairable codes (LRC) for distributed storage systems. Small values of repair locality of LRC enable fast repair of a single failed node since the lost data in the failed node can be recovered by accessing only a small fraction of other nodes. By using rewriting locality, LWC can improve endurance limit and power…
▽ More
We propose locally rewritable codes (LWC) for resistive memories inspired by locally repairable codes (LRC) for distributed storage systems. Small values of repair locality of LRC enable fast repair of a single failed node since the lost data in the failed node can be recovered by accessing only a small fraction of other nodes. By using rewriting locality, LWC can improve endurance limit and power consumption which are major challenges for resistive memories. We point out the duality between LRC and LWC, which indicates that existing construction methods of LRC can be applied to construct LWC.
△ Less
Submitted 3 February, 2016;
originally announced February 2016.
-
Structured Hough Voting for Vision-based Highway Border Detection
Authors:
Zhiding Yu,
Wende Zhang,
B. V. K. Vijaya Kumar,
Dan Levi
Abstract:
We propose a vision-based highway border detection algorithm using structured Hough voting. Our approach takes advantage of the geometric relationship between highway road borders and highway lane markings. It uses a strategy where a number of trained road border and lane marking detectors are triggered, followed by Hough voting to generate corresponding detection of the border and lane marking. S…
▽ More
We propose a vision-based highway border detection algorithm using structured Hough voting. Our approach takes advantage of the geometric relationship between highway road borders and highway lane markings. It uses a strategy where a number of trained road border and lane marking detectors are triggered, followed by Hough voting to generate corresponding detection of the border and lane marking. Since the initially triggered detectors usually result in large number of positives, conventional frame-wise Hough voting is not able to always generate robust border and lane marking results. Therefore, we formulate this problem as a joint detection-and-tracking problem under the structured Hough voting model, where tracking refers to exploiting inter-frame structural information to stabilize the detection results. Both qualitative and quantitative evaluations show the superiority of the proposed structured Hough voting model over a number of baseline methods.
△ Less
Submitted 17 November, 2014;
originally announced November 2014.
-
Zero-Aliasing Correlation Filters for Object Recognition
Authors:
Joseph A. Fernandez,
Vishnu Naresh Boddeti,
Andres Rodriguez,
B. V. K. Vijaya Kumar
Abstract:
Correlation filters (CFs) are a class of classifiers that are attractive for object localization and tracking applications. Traditionally, CFs have been designed in the frequency domain using the discrete Fourier transform (DFT), where correlation is efficiently implemented. However, existing CF designs do not account for the fact that the multiplication of two DFTs in the frequency domain corresp…
▽ More
Correlation filters (CFs) are a class of classifiers that are attractive for object localization and tracking applications. Traditionally, CFs have been designed in the frequency domain using the discrete Fourier transform (DFT), where correlation is efficiently implemented. However, existing CF designs do not account for the fact that the multiplication of two DFTs in the frequency domain corresponds to a circular correlation in the time/spatial domain. Because this was previously unaccounted for, prior CF designs are not truly optimal, as their optimization criteria do not accurately quantify their optimization intention. In this paper, we introduce new zero-aliasing constraints that completely eliminate this aliasing problem by ensuring that the optimization criterion for a given CF corresponds to a linear correlation rather than a circular correlation. This means that previous CF designs can be significantly improved by this reformulation. We demonstrate the benefits of this new CF design approach with several important CFs. We present experimental results on diverse data sets and present solutions to the computational challenges associated with computing these CFs. Code for the CFs described in this paper and their respective zero-aliasing versions is available at http://vishnu.boddeti.net/projects/correlation-filters.html
△ Less
Submitted 19 November, 2014; v1 submitted 9 November, 2014;
originally announced November 2014.
-
Coding scheme for 3D vertical flash memory
Authors:
Yongjune Kim,
Robert Mateescu,
Seung-Hwan Song,
Zvonimir Bandic,
B. V. K. Vijaya Kumar
Abstract:
Recently introduced 3D vertical flash memory is expected to be a disruptive technology since it overcomes scaling challenges of conventional 2D planar flash memory by stacking up cells in the vertical direction. However, 3D vertical flash memory suffers from a new problem known as fast detrap**, which is a rapid charge loss problem. In this paper, we propose a scheme to compensate the effect of…
▽ More
Recently introduced 3D vertical flash memory is expected to be a disruptive technology since it overcomes scaling challenges of conventional 2D planar flash memory by stacking up cells in the vertical direction. However, 3D vertical flash memory suffers from a new problem known as fast detrap**, which is a rapid charge loss problem. In this paper, we propose a scheme to compensate the effect of fast detrap** by intentional inter-cell interference (ICI). In order to properly control the intentional ICI, our scheme relies on a coding technique that incorporates the side information of fast detrap** during the encoding stage. This technique is closely connected to the well-known problem of coding in a memory with defective cells. Numerical results show that the proposed scheme can effectively address the problem of fast detrap**.
△ Less
Submitted 10 February, 2015; v1 submitted 30 October, 2014;
originally announced October 2014.
-
Writing on dirty flash memory
Authors:
Yongjune Kim,
B. V. K. Vijaya Kumar
Abstract:
The most important challenge in the scaling down of flash memory is its increased inter-cell interference (ICI). If side information about ICI is known to the encoder, the flash memory channel can be viewed as similar to Costa's "writing on dirty paper (dirty paper coding)." We first explain why flash memories are dirty due to ICI. We then show that "dirty flash memory" can be changed into "memory…
▽ More
The most important challenge in the scaling down of flash memory is its increased inter-cell interference (ICI). If side information about ICI is known to the encoder, the flash memory channel can be viewed as similar to Costa's "writing on dirty paper (dirty paper coding)." We first explain why flash memories are dirty due to ICI. We then show that "dirty flash memory" can be changed into "memory with defective cells" model by using only one pre-read operation. The asymmetry between write and erase operations in flash memory plays an important role in this change. Based on the "memory with defective cells" model, we show that additive encoding can significantly improve the probability of decoding failure by using the side information.
△ Less
Submitted 7 October, 2014;
originally announced October 2014.
-
Secure Routing Path Using Trust Values for Wireless Sensor Networks
Authors:
S. Rajaram,
A. Babu Karuppiah,
K. Vinoth Kumar
Abstract:
Traditional cryptography-based security mechanisms such as authentication and authorization are not effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node ca…
▽ More
Traditional cryptography-based security mechanisms such as authentication and authorization are not effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node can wreak considerable damage and adversely affect the quality and reliability of data. Therefore, analysing the trust level of a node is important. In this paper we focused about indirect trust mechanism, in which each node monitors the forwarding behavior of its neighbors in order to detect any node that behaves selfishly and does not forward the packets it receives. For this, we used a link state routing protocol based indirect trusts which forms the shortest route and finds the best trustworthy route among them by comparing the values of all the calculated route trusts as for each route present in the network. And finally, we compare our work with similar routing protocols and show its advantages over them.
△ Less
Submitted 8 July, 2014;
originally announced July 2014.
-
Maximum Margin Vector Correlation Filter
Authors:
Vishnu Naresh Boddeti,
B. V. K. Vijaya Kumar
Abstract:
Correlation Filters (CFs) are a class of classifiers which are designed for accurate pattern localization. Traditionally CFs have been used with scalar features only, which limits their ability to be used with vector feature representations like Gabor filter banks, SIFT, HOG, etc. In this paper we present a new CF named Maximum Margin Vector Correlation Filter (MMVCF) which extends the traditional…
▽ More
Correlation Filters (CFs) are a class of classifiers which are designed for accurate pattern localization. Traditionally CFs have been used with scalar features only, which limits their ability to be used with vector feature representations like Gabor filter banks, SIFT, HOG, etc. In this paper we present a new CF named Maximum Margin Vector Correlation Filter (MMVCF) which extends the traditional CF designs to vector features. MMVCF further combines the generalization capability of large margin based classifiers like Support Vector Machines (SVMs) and the localization properties of CFs for better robustness to outliers. We demonstrate the efficacy of MMVCF for object detection and landmark localization on a variety of databases and demonstrate that MMVCF consistently shows improved pattern localization capability in comparison to SVMs.
△ Less
Submitted 24 April, 2014;
originally announced April 2014.
-
On the Duality of Erasures and Defects
Authors:
Yongjune Kim,
B V K Vijaya Kumar
Abstract:
In this paper, the duality of erasures and defects will be investigated by comparing the binary erasure channel (BEC) and the binary defect channel (BDC). The duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. Also, the binary defect and erasure channel (BDEC) will be introduced by co…
▽ More
In this paper, the duality of erasures and defects will be investigated by comparing the binary erasure channel (BEC) and the binary defect channel (BDC). The duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. Also, the binary defect and erasure channel (BDEC) will be introduced by combining the properties of the BEC and the BDC. It will be shown that the capacity of the BDEC can be achieved by the coding scheme that combines the encoding for the defects and the decoding for the erasures. This coding scheme for the BDEC has two separate redundancy parts for correcting erasures and masking defects. Thus, we will investigate the problem of redundancy allocation between these two parts.
△ Less
Submitted 7 March, 2014;
originally announced March 2014.
-
Redundancy Allocation of Partitioned Linear Block Codes
Authors:
Yongjune Kim,
B. V. K. Vijaya Kumar
Abstract:
Most memories suffer from both permanent defects and intermittent random errors. The partitioned linear block codes (PLBC) were proposed by Heegard to efficiently mask stuck-at defects and correct random errors. The PLBC have two separate redundancy parts for defects and random errors. In this paper, we investigate the allocation of redundancy between these two parts. The optimal redundancy alloca…
▽ More
Most memories suffer from both permanent defects and intermittent random errors. The partitioned linear block codes (PLBC) were proposed by Heegard to efficiently mask stuck-at defects and correct random errors. The PLBC have two separate redundancy parts for defects and random errors. In this paper, we investigate the allocation of redundancy between these two parts. The optimal redundancy allocation will be investigated using simulations and the simulation results show that the PLBC can significantly reduce the probability of decoding failure in memory with defects. In addition, we will derive the upper bound on the probability of decoding failure of PLBC and estimate the optimal redundancy allocation using this upper bound. The estimated redundancy allocation matches the optimal redundancy allocation well.
△ Less
Submitted 14 May, 2013;
originally announced May 2013.
-
Coding for Memory with Stuck-at Defects
Authors:
Yongjune Kim,
B. V. K. Vijaya Kumar
Abstract:
In this paper, we propose an encoding scheme for partitioned linear block codes (PLBC) which mask the stuck-at defects in memories. In addition, we derive an upper bound and the estimate of the probability that masking fails. Numerical results show that PLBC can efficiently mask the defects with the proposed encoding scheme. Also, we show that our upper bound is very tight by using numerical resul…
▽ More
In this paper, we propose an encoding scheme for partitioned linear block codes (PLBC) which mask the stuck-at defects in memories. In addition, we derive an upper bound and the estimate of the probability that masking fails. Numerical results show that PLBC can efficiently mask the defects with the proposed encoding scheme. Also, we show that our upper bound is very tight by using numerical results.
△ Less
Submitted 17 April, 2013;
originally announced April 2013.
-
Modulation Coding for Flash Memories
Authors:
Yongjune Kim,
Kyoung Lae Cho,
Hongrak Son,
Jaehong Kim,
Jun ** Kong,
Jae** Lee,
B. V. K. Vijaya Kumar
Abstract:
The aggressive scaling down of flash memories has threatened data reliability since the scaling down of cell sizes gives rise to more serious degradation mechanisms such as cell-to-cell interference and lateral charge spreading. The effect of these mechanisms has pattern dependency and some data patterns are more vulnerable than other ones. In this paper, we will categorize data patterns taking in…
▽ More
The aggressive scaling down of flash memories has threatened data reliability since the scaling down of cell sizes gives rise to more serious degradation mechanisms such as cell-to-cell interference and lateral charge spreading. The effect of these mechanisms has pattern dependency and some data patterns are more vulnerable than other ones. In this paper, we will categorize data patterns taking into account degradation mechanisms and pattern dependency. In addition, we propose several modulation coding schemes to improve the data reliability by transforming original vulnerable data patterns into more robust ones.
△ Less
Submitted 17 April, 2013;
originally announced April 2013.
-
A note on the possibility of classical orbital diamagnetism for an unbounded system --the Bohr-van Leeuwen Theorem
Authors:
K. Vijay Kumar,
N. Kumar
Abstract:
Recently [EPL, 86, (2009) 17001], we had simulated the classical Langevin dynamics of a charged particle on the surface of a sphere in the presence of an externally applied magnetic field, and found a finite value for the orbital diamagnetic moment in the long-time limit. This result is surprising in that it seems to violate the classic Bohr-van Leeuwen Theorem on the absence of classical diamagn…
▽ More
Recently [EPL, 86, (2009) 17001], we had simulated the classical Langevin dynamics of a charged particle on the surface of a sphere in the presence of an externally applied magnetic field, and found a finite value for the orbital diamagnetic moment in the long-time limit. This result is surprising in that it seems to violate the classic Bohr-van Leeuwen Theorem on the absence of classical diamagnetism. It was indeed questioned by some workers [EPL, 89, (2010) 37001] who verified that the Fokker-Planck (FP) equation derived from our Langevin equation, was satisfied by the classical canonical density in the steady state, obtained by setting d/dt=0 in the FP equation. Inasmuch as the canonical density does not contain the magnetic field, they concluded that the diamagnetic moment must be zero. The purpose of this note is to show that this argument and the conclusion are invalid -- instead of setting d/dt=0 one must first obtain the fundamental time-dependent solution for the FP equation, and then calculate the expectation value of the diamagnetic moment, and finally consider its long-time limit (i.e., $t \to \infty$). This would indeed correspond to our numerical simulation of the dynamics. That this is indeed so is shown by considering the simpler analytically solvable problem, namely that for an unbounded plane for which the above procedure can be carried out exactly. We then find that the limiting value for the expectation of the diamagnetic moment is indeed non-zero, and yet the steady-state FP equation obtained by setting d/dt=0 is satisfied by the canonical density. Admittedly, the exact analytical solution for the sphere is not available. But, the exact solution obtained for the case of the unbounded 2D-plane illustrates our point all right. We also present some further new results for other finite but unbounded surfaces such the ellipsoids of revolution.
△ Less
Submitted 13 April, 2010; v1 submitted 12 April, 2010;
originally announced April 2010.
-
Exact solution of a Brownian inchworm model for self-propulsion
Authors:
A. Baule,
K. Vijay Kumar,
Sriram Ramaswamy
Abstract:
We present the exact solution of a Brownian inchworm model of a self-propelled elastic dimer which has recently been proposed in [K. V. Kumar \textit{et al}, Phys. Rev. E \textbf{77}, 020102(R) (2008)] as a unifying model for the propulsion mechanisms of DNA helicase, polar rods on a vibrated surface, crawling keratocytes, and Myosin VI.
We present the exact solution of a Brownian inchworm model of a self-propelled elastic dimer which has recently been proposed in [K. V. Kumar \textit{et al}, Phys. Rev. E \textbf{77}, 020102(R) (2008)] as a unifying model for the propulsion mechanisms of DNA helicase, polar rods on a vibrated surface, crawling keratocytes, and Myosin VI.
△ Less
Submitted 9 March, 2009;
originally announced March 2009.
-
Classical Langevin dynamics of a charged particle moving on a sphere and diamagnetism: A surprise
Authors:
N. Kumar,
K. Vijay Kumar
Abstract:
It is generally known that the orbital diamagnetism of a classical system of charged particles in thermal equilibrium is identically zero -- the Bohr-van Leeuwen theorem. Physically, this null result derives from the exact cancellation of the orbital diamagnetic moment associated with the complete cyclotron orbits of the charged particles by the paramagnetic moment subtended by the incomplete or…
▽ More
It is generally known that the orbital diamagnetism of a classical system of charged particles in thermal equilibrium is identically zero -- the Bohr-van Leeuwen theorem. Physically, this null result derives from the exact cancellation of the orbital diamagnetic moment associated with the complete cyclotron orbits of the charged particles by the paramagnetic moment subtended by the incomplete orbits skip** the boundary in the opposite sense. Motivated by this crucial, but subtle role of the boundary, we have simulated here the case of a finite but \emph{unbounded} system, namely that of a charged particle moving on the surface of a sphere in the presence of an externally applied uniform magnetic field. Following a real space-time approach based on the classical Langevin equation, we have computed the orbital magnetic moment which now indeed turns out to be non-zero, and has the diamagnetic sign. To the best of our knowledge, this is the first report of the possibility of finite classical diamagnetism in principle, and it is due to the avoided cancellation.
△ Less
Submitted 13 March, 2009; v1 submitted 19 November, 2008;
originally announced November 2008.
-
Active elastic dimers: self-propulsion and current reversal on a featureless track
Authors:
K. Vijay Kumar,
Sriram Ramaswamy,
Madan Rao
Abstract:
We present a Brownian inchworm model of a self-propelled elastic dimer in the absence of an external potential. Nonequilibrium noise together with a stretch-dependent dam** form the propulsion mechanism. Our model connects three key nonequilibrium features -- position-velocity correlations, a nonzero mean internal force, and a drift velocity. Our analytical results, including striking current…
▽ More
We present a Brownian inchworm model of a self-propelled elastic dimer in the absence of an external potential. Nonequilibrium noise together with a stretch-dependent dam** form the propulsion mechanism. Our model connects three key nonequilibrium features -- position-velocity correlations, a nonzero mean internal force, and a drift velocity. Our analytical results, including striking current reversals, compare very well with numerical simulations. The model unifies the propulsion mechanisms of DNA helicases, polar rods on a vibrated surface, crawling keratocytes and Myosin VI. We suggest experimental realizations and tests of the model.
△ Less
Submitted 24 August, 2007; v1 submitted 14 August, 2007;
originally announced August 2007.