-
Reconfigurable Spin-Wave Properties in Two-Dimensional Magnonic Crystals Formed of Diamond and Triangular Shaped Nanomagnets
Authors:
Swapnil Barman,
Rajib Kumar Mitra
Abstract:
Two-dimensional ferromagnetic nanodot structures exhibit intriguing magnetization dynamics and hold promise for future magnonic devices. In this study, we present a comparative experimental investigation into the reconfigurable magnetization dynamics of non-ellipsoidal diamond and triangular-shaped nanodot structures, employing broadband ferromagnetic resonance spectroscopy. Our findings reveal su…
▽ More
Two-dimensional ferromagnetic nanodot structures exhibit intriguing magnetization dynamics and hold promise for future magnonic devices. In this study, we present a comparative experimental investigation into the reconfigurable magnetization dynamics of non-ellipsoidal diamond and triangular-shaped nanodot structures, employing broadband ferromagnetic resonance spectroscopy. Our findings reveal substantial variations in the spin wave (SW) spectra of these structures under different bias field strengths (H) and angles (φ). Notably, the diamond nanodot structure exhibits a variation from nearly symmetric W-shaped dispersion to a skewed dispersion and subsequent transition to a discontinuous dispersion with subtle variation in bias field angle. On the other hand, in the triangular nanodot array a SW mode anti-crossing appears at φ = 15° which is starkly modified with the increase in φ to 30°. By analyzing the static magnetic configurations, we unveil the nature of the SW spectra in these two shapes. We reinforce our observations with simulated spatial power and phase maps. This study underscores the critical impact of dot shape and inversion symmetry on SW dynamical response, highlighting the significance of selecting appropriate structures and bias field strength and orientation for required functionalities. The remarkable tunability demonstrated by the magnonic crystals underscores their potential suitability for future magnonic devices.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
How Deep is your Guess? A Fresh Perspective on Deep Learning for Medical Time-Series Imputation
Authors:
Linglong Qian,
Tao Wang,
Jun Wang,
Hugh Logan Ellis,
Robin Mitra,
Richard Dobson,
Zina Ibrahim
Abstract:
We introduce a novel classification framework for time-series imputation using deep learning, with a particular focus on clinical data. By identifying conceptual gaps in the literature and existing reviews, we devise a taxonomy grounded on the inductive bias of neural imputation frameworks, resulting in a classification of existing deep imputation strategies based on their suitability for specific…
▽ More
We introduce a novel classification framework for time-series imputation using deep learning, with a particular focus on clinical data. By identifying conceptual gaps in the literature and existing reviews, we devise a taxonomy grounded on the inductive bias of neural imputation frameworks, resulting in a classification of existing deep imputation strategies based on their suitability for specific imputation scenarios and data-specific properties. Our review further examines the existing methodologies employed to benchmark deep imputation models, evaluating their effectiveness in capturing the missingness scenarios found in clinical data and emphasising the importance of reconciling mathematical abstraction with clinical insights. Our classification aims to serve as a guide for researchers to facilitate the selection of appropriate deep learning imputation techniques tailored to their specific clinical data. Our novel perspective also highlights the significance of bridging the gap between computational methodologies and medical insights to achieve clinically sound imputation models.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Obtaining $(ε,δ)$-differential privacy guarantees when using a Poisson mechanism to synthesize contingency tables
Authors:
James Jackson,
Robin Mitra,
Brian Francis,
Iain Dove
Abstract:
We show that differential privacy type guarantees can be obtained when using a Poisson synthesis mechanism to protect counts in contingency tables. Specifically, we show how to obtain $(ε, δ)$-probabilistic differential privacy guarantees via the Poisson distribution's cumulative distribution function. We demonstrate this empirically with the synthesis of an administrative-type confidential databa…
▽ More
We show that differential privacy type guarantees can be obtained when using a Poisson synthesis mechanism to protect counts in contingency tables. Specifically, we show how to obtain $(ε, δ)$-probabilistic differential privacy guarantees via the Poisson distribution's cumulative distribution function. We demonstrate this empirically with the synthesis of an administrative-type confidential database.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
Helicity oscillations in Rayleigh-Bénard convection of liquid metal in a cell with aspect ratio 0.5
Authors:
R. Mitra,
F. Stefani,
V. Galindo,
S. Eckert,
M. Sieger,
T. Vogt,
T. Wondrak
Abstract:
In this paper, we present numerical and experimental results on helicity oscillations in a liquid-metal Rayleigh-Bénard (RB) convection cell, with an aspect ratio of 0.5. We find that helicity oscillations occur during transitions of flow states that are characterised by significant changes in the Reynolds number. Moreover, we also observe helicity oscillations at flow conditions where the tempora…
▽ More
In this paper, we present numerical and experimental results on helicity oscillations in a liquid-metal Rayleigh-Bénard (RB) convection cell, with an aspect ratio of 0.5. We find that helicity oscillations occur during transitions of flow states that are characterised by significant changes in the Reynolds number. Moreover, we also observe helicity oscillations at flow conditions where the temporal gradient of the change in the Reynolds number is significantly smaller than that of the helicity. Notably, the helicity oscillations observed during the transient double-roll state exhibit characteristics remarkably similar to those associated with the Tayler Instability.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
Online Concurrent Multi-Robot Coverage Path Planning
Authors:
Ratijit Mitra,
Indranil Saha
Abstract:
Recently, centralized receding horizon online multi-robot coverage path planning algorithms have shown remarkable scalability in thoroughly exploring large, complex, unknown workspaces with many robots. In a horizon, the path planning and the path execution interleave, meaning when the path planning occurs for robots with no paths, the robots with outstanding paths do not execute, and subsequently…
▽ More
Recently, centralized receding horizon online multi-robot coverage path planning algorithms have shown remarkable scalability in thoroughly exploring large, complex, unknown workspaces with many robots. In a horizon, the path planning and the path execution interleave, meaning when the path planning occurs for robots with no paths, the robots with outstanding paths do not execute, and subsequently, when the robots with new or outstanding paths execute to reach respective goals, path planning does not occur for those robots yet to get new paths, leading to wastage of both the robotic and the computation resources. As a remedy, we propose a centralized algorithm that is not horizon-based. It plans paths at any time for a subset of robots with no paths, i.e., who have reached their previously assigned goals, while the rest execute their outstanding paths, thereby enabling concurrent planning and execution. We formally prove that the proposed algorithm ensures complete coverage of an unknown workspace and analyze its time complexity. To demonstrate scalability, we evaluate our algorithm to cover eight large $2$D grid benchmark workspaces with up to 512 aerial and ground robots, respectively. A comparison with a state-of-the-art horizon-based algorithm shows its superiority in completing the coverage with up to 1.6x speedup. For validation, we perform ROS + Gazebo simulations in six 2D grid benchmark workspaces with 10 quadcopters and TurtleBots, respectively. We also successfully conducted one outdoor experiment with three quadcopters and one indoor with two TurtleBots.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Burning a binary tree and its generalization
Authors:
Sandip Das,
Sk Samim Islam,
Ritam M Mitra,
Sanchita Paul
Abstract:
Graph burning is a graph process that models the spread of social contagion. Initially, all the vertices of a graph $G$ are unburnt. At each step, an unburnt vertex is put on fire and the fire from burnt vertices of the previous step spreads to their adjacent unburnt vertices. This process continues till all the vertices are burnt. The burning number $b(G)$ of the graph $G$ is the minimum number o…
▽ More
Graph burning is a graph process that models the spread of social contagion. Initially, all the vertices of a graph $G$ are unburnt. At each step, an unburnt vertex is put on fire and the fire from burnt vertices of the previous step spreads to their adjacent unburnt vertices. This process continues till all the vertices are burnt. The burning number $b(G)$ of the graph $G$ is the minimum number of steps required to burn all the vertices in the graph. The burning number conjecture by Bonato et al. states that for a connected graph $G$ of order $n$, its burning number $b(G) \leq \lceil \sqrt{n} \rceil$. It is easy to observe that in order to burn a graph it is enough to burn its spanning tree. Hence it suffices to prove that for any tree $T$ of order $n$, its burning number $b(T) \leq \lceil \sqrt{n} \rceil$ where $T$ is the spanning tree of $G$. It was proved in 2018 that $b(T) \leq \lceil \sqrt{n + n_2 + 1/4} +1/2 \rceil$ for a tree $T$ where $n_2$ is the number of degree $2$ vertices in $T$. In this paper, we provide an algorithm to burn a tree and we improve the existing bound using this algorithm. We prove that $b(T)\leq \lceil \sqrt{n + n_2 + 8}\rceil -1$ which is an improved bound for $n\geq 50$. We also provide an algorithm to burn some subclasses of the binary tree and prove the burning number conjecture for the same.
△ Less
Submitted 14 November, 2023; v1 submitted 5 August, 2023;
originally announced August 2023.
-
Fast Bayesian High-Dimensional Gaussian Graphical Model Estimation
Authors:
Sagnik Bhadury,
Riten Mitra,
Jeremy T. Gaskins
Abstract:
Graphical models describe associations between variables through the notion of conditional independence. Gaussian graphical models are a widely used class of such models where the relationships are formalized by non-null entries of the precision matrix. However, in high dimensional cases, standard covariance estimates are typically unstable. Moreover, it is natural to expect only a few significant…
▽ More
Graphical models describe associations between variables through the notion of conditional independence. Gaussian graphical models are a widely used class of such models where the relationships are formalized by non-null entries of the precision matrix. However, in high dimensional cases, standard covariance estimates are typically unstable. Moreover, it is natural to expect only a few significant associations to be present in many realistic applications. This necessitates the injection of sparsity techniques into the estimation. Classical frequentist methods use penalization for this purpose; in contrast, fully Bayesian methods are computationally slow, typically requiring iterative sampling over a quadratic number of parameters in a space constrained by positive definiteness. We propose a Bayesian graph estimation method based on an ensemble of Bayesian neighborhood regressions. An attractive feature of our methods is the ability for easy parallelization across separate graphical neighborhoods, invoking computational efficiency greater than most existing methods. Our strategy induces sparsity with a Horseshoe shrinkage prior and includes a novel variable selection step based on the marginal likelihood from the predictors ranks. Our method appropriately combines the estimated regression coefficients to produce a graph estimate and a matrix of partial correlation estimates for inference. Performance of various methods are assessed using measures like FDR and TPR. Competitive performance across a variety of cases is demonstrated through extensive simulations. Lastly, we apply these methods to investigate the dependence structure across genetic expressions for women with triple negative breast cancer.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
A Complete Characterisation of Structured Missingness
Authors:
James Jackson,
Robin Mitra,
Niels Hagenbuch,
Sarah McGough,
Chris Harbron
Abstract:
Our capacity to process large complex data sources is ever-increasing, providing us with new, important applied research questions to address, such as how to handle missing values in large-scale databases. Mitra et al. (2023) noted the phenomenon of Structured Missingness (SM), which is where missingness has an underlying structure. Existing taxonomies for defining missingness mechanisms typically…
▽ More
Our capacity to process large complex data sources is ever-increasing, providing us with new, important applied research questions to address, such as how to handle missing values in large-scale databases. Mitra et al. (2023) noted the phenomenon of Structured Missingness (SM), which is where missingness has an underlying structure. Existing taxonomies for defining missingness mechanisms typically assume that variables' missingness indicator vectors $M_1$, $M_2$, ..., $M_p$ are independent after conditioning on the relevant portion of the data matrix $\mathbf{X}$. As this is often unsuitable for characterising SM in multivariate settings, we introduce a taxonomy for SM, where each ${M}_j$ can depend on $\mathbf{M}_{-j}$ (i.e., all missingness indicator vectors except ${M}_j$), in addition to $\mathbf{X}$. We embed this new framework within the well-established decomposition of mechanisms into MCAR, MAR, and MNAR (Rubin, 1976), allowing us to recast mechanisms into a broader setting, where we can consider the combined effect of $\mathbf{X}$ and $\mathbf{M}_{-j}$ on ${M}_j$. We also demonstrate, via simulations, the impact of SM on inference and prediction, and consider contextual instances of SM arising in a de-identified nationwide (US-based) clinico-genomic database (CGDB). We hope to stimulate interest in SM, and encourage timely research into this phenomenon.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Learning from data with structured missingness
Authors:
Robin Mitra,
Sarah F. McGough,
Tapabrata Chakraborti,
Chris Holmes,
Ryan Cop**,
Niels Hagenbuch,
Stefanie Biedermann,
Jack Noonan,
Brieuc Lehmann,
Aditi Shenvi,
Xuan Vinh Doan,
David Leslie,
Ginestra Bianconi,
Ruben Sanchez-Garcia,
Alisha Davies,
Maxine Mackintosh,
Eleni-Rosalina Andrinopoulou,
Anahid Basiri,
Chris Harbron,
Ben D. MacArthur
Abstract:
Missing data are an unavoidable complication in many machine learning tasks. When data are `missing at random' there exist a range of tools and techniques to deal with the issue. However, as machine learning studies become more ambitious, and seek to learn from ever-larger volumes of heterogeneous data, an increasingly encountered problem arises in which missing values exhibit an association or st…
▽ More
Missing data are an unavoidable complication in many machine learning tasks. When data are `missing at random' there exist a range of tools and techniques to deal with the issue. However, as machine learning studies become more ambitious, and seek to learn from ever-larger volumes of heterogeneous data, an increasingly encountered problem arises in which missing values exhibit an association or structure, either explicitly or implicitly. Such `structured missingness' raises a range of challenges that have not yet been systematically addressed, and presents a fundamental hindrance to machine learning at scale. Here, we outline the current literature and propose a set of grand challenges in learning from data with structured missingness.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Online On-Demand Multi-Robot Coverage Path Planning
Authors:
Ratijit Mitra,
Indranil Saha
Abstract:
We present an online centralized path planning algorithm to cover a large, complex, unknown workspace with multiple homogeneous mobile robots. Our algorithm is horizon-based, synchronous, and on-demand. The recently proposed horizon-based synchronous algorithms compute all the robots' paths in each horizon, significantly increasing the computation burden in large workspaces with many robots. As a…
▽ More
We present an online centralized path planning algorithm to cover a large, complex, unknown workspace with multiple homogeneous mobile robots. Our algorithm is horizon-based, synchronous, and on-demand. The recently proposed horizon-based synchronous algorithms compute all the robots' paths in each horizon, significantly increasing the computation burden in large workspaces with many robots. As a remedy, we propose an algorithm that computes the paths for a subset of robots that have traversed previously computed paths entirely (thus on-demand) and reuses the remaining paths for the other robots. We formally prove that the algorithm guarantees complete coverage of the unknown workspace. Experimental results on several standard benchmark workspaces show that our algorithm scales to hundreds of robots in large complex workspaces and consistently beats a state-of-the-art online centralized multi-robot coverage path planning algorithm in terms of the time needed to achieve complete coverage. For its validation, we perform ROS+Gazebo simulations in five 2D grid benchmark workspaces with 10 Quadcopters and 10 TurtleBots, respectively. Also, to demonstrate its practical feasibility, we conduct one indoor experiment with two real TurtleBot2 robots and one outdoor experiment with three real Quadcopters.
△ Less
Submitted 7 March, 2024; v1 submitted 28 February, 2023;
originally announced March 2023.
-
A Framework for Auditable Synthetic Data Generation
Authors:
Florimond Houssiau,
Samuel N. Cohen,
Lukasz Szpruch,
Owen Daniel,
Michaela G. Lawrence,
Robin Mitra,
Henry Wilde,
Callum Mole
Abstract:
Synthetic data has gained significant momentum thanks to sophisticated machine learning tools that enable the synthesis of high-dimensional datasets. However, many generation techniques do not give the data controller control over what statistical patterns are captured, leading to concerns over privacy protection. While synthetic records are not linked to a particular real-world individual, they c…
▽ More
Synthetic data has gained significant momentum thanks to sophisticated machine learning tools that enable the synthesis of high-dimensional datasets. However, many generation techniques do not give the data controller control over what statistical patterns are captured, leading to concerns over privacy protection. While synthetic records are not linked to a particular real-world individual, they can reveal information about users indirectly which may be unacceptable for data owners. There is thus a need to empirically verify the privacy of synthetic data -- a particularly challenging task in high-dimensional data. In this paper we present a general framework for synthetic data generation that gives data controllers full control over which statistical properties the synthetic data ought to preserve, what exact information loss is acceptable, and how to quantify it. The benefits of the approach are that (1) one can generate synthetic data that results in high utility for a given task, while (2) empirically validating that only statistics considered safe by the data curator are used to generate the data. We thus show the potential for synthetic data to be an effective means of releasing confidential data safely, while retaining useful information for analysts.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
An integrated approach to test for missing not at random
Authors:
Jack Noonan,
Adetola Adedamola Adediran,
Robin Mitra,
Stefanie Biedermann
Abstract:
Missing data can lead to inefficiencies and biases in analyses, in particular when data are missing not at random (MNAR). It is thus vital to understand and correctly identify the missing data mechanism. Recovering missing values through a follow up sample allows researchers to conduct hypothesis tests for MNAR, which are not possible when using only the original incomplete data. Investigating how…
▽ More
Missing data can lead to inefficiencies and biases in analyses, in particular when data are missing not at random (MNAR). It is thus vital to understand and correctly identify the missing data mechanism. Recovering missing values through a follow up sample allows researchers to conduct hypothesis tests for MNAR, which are not possible when using only the original incomplete data. Investigating how properties of these tests are affected by the follow up sample design is little explored in the literature. Our results provide comprehensive insight into the properties of one such test, based on the commonly used selection model framework. We determine conditions for recovery samples that allow the test to be applied appropriately and effectively, i.e. with known Type I error rates and optimized with respect to power. We thus provide an integrated framework for testing for the presence of MNAR and designing follow up samples in an efficient cost-effective way. The performance of our methodology is evaluated through simulation studies as well as on a real data sample.
△ Less
Submitted 7 December, 2022; v1 submitted 15 August, 2022;
originally announced August 2022.
-
Facilitating Conversational Interaction in Natural Language Interfaces for Visualization
Authors:
Rishab Mitra,
Arpit Narechania,
Alex Endert,
John Stasko
Abstract:
Natural language (NL) toolkits enable visualization developers, who may not have a background in natural language processing (NLP), to create natural language interfaces (NLIs) for end-users to flexibly specify and interact with visualizations. However, these toolkits currently only support one-off utterances, with minimal capability to facilitate a multi-turn dialog between the user and the syste…
▽ More
Natural language (NL) toolkits enable visualization developers, who may not have a background in natural language processing (NLP), to create natural language interfaces (NLIs) for end-users to flexibly specify and interact with visualizations. However, these toolkits currently only support one-off utterances, with minimal capability to facilitate a multi-turn dialog between the user and the system. Develo** NLIs with such conversational interaction capabilities remains a challenging task, requiring implementations of low-level NLP techniques to process a new query as an intent to follow-up on an older query. We extend an existing Python-based toolkit, NL4DV, that processes an NL query about a tabular dataset and returns an analytic specification containing data attributes, analytic tasks, and relevant visualizations, modeled as a JSON object. Specifically, NL4DV now enables developers to facilitate multiple simultaneous conversations about a dataset and resolve associated ambiguities, augmenting new conversational information into the output JSON object. We demonstrate these capabilities through three examples: (1) an NLI to learn aspects of the Vega-Lite grammar, (2) a mind map** application to create free-flowing conversations, and (3) a chatbot to answer questions and resolve ambiguities.
△ Less
Submitted 12 August, 2022; v1 submitted 30 June, 2022;
originally announced July 2022.
-
Scalable fabrication of edge contacts to 2D materials
Authors:
Naveen Shetty,
Hans He,
Richa Mitra,
Johanna Huhtasaari,
Konstantina Iordanau,
Julia Wiktor,
Sergey Kubatkin,
Saroj Dash,
Rositsa Yakimova,
Lunjie Zeng,
Eva Olsson,
Samuel Lara-Avila
Abstract:
We present a fabrication method for reliably and reproducibly forming electrical contacts to 2D materials, based on the tri-layer resist system. We demonstrate the applicability of this method for epitaxial graphene on silicon carbide (epigraphene) and the transition metal dichalcogenides (TMDCs) molybdenum disulfide ($MoS_2$). For epigraphene, the specific contact resistances are of the order of…
▽ More
We present a fabrication method for reliably and reproducibly forming electrical contacts to 2D materials, based on the tri-layer resist system. We demonstrate the applicability of this method for epitaxial graphene on silicon carbide (epigraphene) and the transition metal dichalcogenides (TMDCs) molybdenum disulfide ($MoS_2$). For epigraphene, the specific contact resistances are of the order of $ρ_c$ ~ $50$ $Ωμm$, and follow the Landauer quantum limit, $ρ_c \propto n^{-1/2}$, with $n$ being the carrier density of graphene. For $MoS_2$ flakes, our edge contacts enable field effect transistors (FET) with ON/OFF ratio of $> 10^6$ at room temperature ( $> 10^9$ at cryogenic temperatures). The fabrication route here demonstrated allows for contact metallization using thermal evaporation and also by sputtering, giving an additional flexibility when designing electrical interfaces, which is key in practical devices and when exploring the electrical properties of emerging materials.
△ Less
Submitted 6 March, 2023; v1 submitted 8 June, 2022;
originally announced June 2022.
-
Infinite-dimensional optimization and Bayesian nonparametric learning of stochastic differential equations
Authors:
Arnab Ganguly,
Riten Mitra,
**pu Zhou
Abstract:
The paper has two major themes. The first part of the paper establishes certain general results for infinite-dimensional optimization problems on Hilbert spaces. These results cover the classical representer theorem and many of its variants as special cases and offer a wider scope of applications. The second part of the paper then develops a systematic approach for learning the drift function of a…
▽ More
The paper has two major themes. The first part of the paper establishes certain general results for infinite-dimensional optimization problems on Hilbert spaces. These results cover the classical representer theorem and many of its variants as special cases and offer a wider scope of applications. The second part of the paper then develops a systematic approach for learning the drift function of a stochastic differential equation by integrating the results of the first part with Bayesian hierarchical framework. Importantly, our Baysian approach incorporates low-cost sparse learning through proper use of shrinkage priors while allowing proper quantification of uncertainty through posterior distributions. Several examples at the end illustrate the accuracy of our learning scheme.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
On integrating the number of synthetic data sets $m$ into the 'a priori' synthesis approach
Authors:
James Edward Jackson,
Robin Mitra,
Brian Joseph Francis,
Iain Dove
Abstract:
Until recently, multiple synthetic data sets were always released to analysts, to allow valid inferences to be obtained. However, under certain conditions - including when saturated count models are used to synthesize categorical data - single imputation ($m=1$) is sufficient. Nevertheless, increasing $m$ causes utility to improve, but at the expense of higher risk, an example of the risk-utility…
▽ More
Until recently, multiple synthetic data sets were always released to analysts, to allow valid inferences to be obtained. However, under certain conditions - including when saturated count models are used to synthesize categorical data - single imputation ($m=1$) is sufficient. Nevertheless, increasing $m$ causes utility to improve, but at the expense of higher risk, an example of the risk-utility trade-off. The question, therefore, is: which value of $m$ is optimal with respect to the risk-utility trade-off? Moreover, the paper considers two ways of analysing categorical data sets: as they have a contingency table representation, multiple categorical data sets can be averaged before being analysed, as opposed to the usual way of averaging post-analysis. This paper also introduces a pair of metrics, $τ_3(k,d)$ and $τ_4(k,d)$, that are suited for assessing disclosure risk in multiple categorical synthetic data sets. Finally, the synthesis methods are demonstrated empirically.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Electric Dipole Moments and Static Dipole Polarizabilities of Alkali--Alkaline-Earth Molecules: Non-relativistic versus relativistic coupled-cluster theory analyses
Authors:
R. Mitra,
V. S. Prasannaa,
B. K. Sahoo
Abstract:
We analyze the electric dipole moments (PDMs) and static electric dipole polarizabilities of the alkali--alkaline-earth (Alk-AlkE) dimers by employing finite-field coupled-cluster methods, both in the frameworks of non-relativistic and four-component spinfree relativistic theory. In order to carry out comparative analyses rigorously, we consider those Alk-AlkE molecules made out of the lightest to…
▽ More
We analyze the electric dipole moments (PDMs) and static electric dipole polarizabilities of the alkali--alkaline-earth (Alk-AlkE) dimers by employing finite-field coupled-cluster methods, both in the frameworks of non-relativistic and four-component spinfree relativistic theory. In order to carry out comparative analyses rigorously, we consider those Alk-AlkE molecules made out of the lightest to the medium-heavy constituent atoms (Alk: Li to Rb and AlkE: Be through Sr). We present behaviour of electron correlation effects as well as relativistic effects with the size of the molecules. Uncertainties to the above quantities of the investigated Alk-AlkE molecules are inferred by analyzing our results from different form of Hamiltonian, basis set, and perturbative parameter in a few representative molecules. We have also provided empirical relations by connecting average polarizabilities of the Alk-AlkE molecules with their PDMs, and atomic numbers and polarizabilities of the corresponding Alk and AlKE atoms, which can be used to roughly estimate the average polarizabilities of other heavier Alk-AlkE molecules. We finally give our recommended results, and compare them with the literature values.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Bayesian modelling and computation utilising cycles in multiple network data
Authors:
Anastasia Mantziou,
Robin Mitra,
Simon Lunagomez
Abstract:
Modelling multiple network data is crucial for addressing a wide range of applied research questions. However, there are many challenges, both theoretical and computational, to address. Network cycles are often of particular interest in many applications, such as ecological studies, and an unexplored area has been how to incorporate networks' cycles within the inferential framework in an explicit…
▽ More
Modelling multiple network data is crucial for addressing a wide range of applied research questions. However, there are many challenges, both theoretical and computational, to address. Network cycles are often of particular interest in many applications, such as ecological studies, and an unexplored area has been how to incorporate networks' cycles within the inferential framework in an explicit way. The recently developed Spherical Network Family of models (SNF) offers a flexible formulation for modelling multiple network data that permits any type of metric. This has opened up the possibility to formulate network models that focus on network properties hitherto not possible or practical to consider. In this article we propose a novel network distance metric that measures similarities between networks with respect to their cycles, and incorporate this within the SNF model to allow inferences that explicitly capture information on cycles. These network motifs are of particular interest in ecological studies. We further propose a novel computational framework to allow posterior inferences from the intractable SNF model for moderate sized networks. Lastly, we apply the resulting methodology to a set of ecological network data studying aggressive interactions between species of fish. We show our model is able to make cogent inferences concerning the cycle behaviour amongst the species, and beyond those possible from a model that does not consider this network motif.
△ Less
Submitted 15 November, 2021;
originally announced November 2021.
-
High Responsivity Gate Tunable UV-Visible Broadband Phototransistor Based on Graphene-WS2 Mixed Dimensional (2D-0D) Heterostructure
Authors:
Shubhrasish Mukherjee,
Didhiti Bhattacharya,
Sumanti Patra,
Sanjukta Paul,
Rajib Kumar Mitra,
Priya Mahadevan,
Atindra Nath Pal,
Samit Kumar Ray
Abstract:
Recent progress in the synthesis of highly stable, eco-friendly, cost-effective transition metal-dichalcogenides (TMDC) quantum dots (QDs) with their broadband absorption spectrum and wavelength selectivity features have led to their increasing use in broadband photodetectors. With the solution based processing, we demonstrate a super large (~ 0.75 mm^2), UV-Vis broadband (365-633 nm), phototransi…
▽ More
Recent progress in the synthesis of highly stable, eco-friendly, cost-effective transition metal-dichalcogenides (TMDC) quantum dots (QDs) with their broadband absorption spectrum and wavelength selectivity features have led to their increasing use in broadband photodetectors. With the solution based processing, we demonstrate a super large (~ 0.75 mm^2), UV-Vis broadband (365-633 nm), phototransistor made of WS_2 QDs decorated CVD graphene as active channel with extraordinary stability and durability in ambient condition (without any degradation of photocurrent till 4 months after fabrication). Here, colloidal 0D WS_2-QDs are used as the photo absorbing material and graphene acts as the conducting channel. A high photoresponsivity (3.1 x 10^2 A/W), higher detectivity (2.2 x 10^12 Jones) and low noise equivalent power (4 x 10^{-14} W/Hz^0.5) are obtained at a low bias voltage (V_{ds} = 1V) at an illumination of 365 nm with an optical power as low as 0.8 μW/cm^2, which can further be tuned by modulating the gate bias. While comparing the photocurrent between two different morphologies of WS_2 (QDs and 2D nanosheets), a significant enhancement of photocurrent is observed in case of QDs based device. Ab initio density functional theory based calculations further support our observation, revealing the role of quantum confinement for the enhanced photo response. Our work reveals a strategy towards making a scalable, cost-effective, highly performing hybrid two-dimensional (2D/0D) photo detector with graphene-WS_2 QDs, paving the way towards the next generation optoelectronic applications.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Towards CP Violation Studies on Superheavy Molecules: Theoretical and Experimental Perspective
Authors:
R. Mitra,
V. S. Prasannaa,
R. F. Garcia Ruiz,
T. K. Sato,
M. Abe,
Y. Sakemi,
B. P. Das,
B. K. Sahoo
Abstract:
Molecules containing superheavy atoms can be artificially created to serve as sensitive probes for study of symmetry-violating phenomena. Here, we provide a detailed theoretical study for diatomic molecules containing the superheavy lawrencium nuclei. The sensitivity to time-reversal violating properties was studied for different neutral and ionic molecules. The effective electric fields in these…
▽ More
Molecules containing superheavy atoms can be artificially created to serve as sensitive probes for study of symmetry-violating phenomena. Here, we provide a detailed theoretical study for diatomic molecules containing the superheavy lawrencium nuclei. The sensitivity to time-reversal violating properties was studied for different neutral and ionic molecules. The effective electric fields in these systems were found to be about 3-4 times larger than other known molecules on which electron electric dipole moment experiments are being performed. Similarly, these superheavy molecules exhibit an enhancement of more than 5 times for parity- and time-reversal-violating scalar-pseudoscalar nucleus-electron interactions. We also briefly comment on some experimental aspects by discussing the production of these systems.
△ Less
Submitted 26 August, 2021;
originally announced August 2021.
-
Using saturated count models for user-friendly synthesis of categorical data
Authors:
James Edward Jackson,
Robin Mitra,
Brian Joseph Francis,
Iain Dove
Abstract:
Over the past three decades, synthetic data methods for statistical disclosure control have continually evolved, but mainly within the domain of survey data sets. There are certain characteristics of administrative databases, such as their size, which present challenges from a synthesis perspective and require special attention. This paper, through the fitting of saturated count models, presents a…
▽ More
Over the past three decades, synthetic data methods for statistical disclosure control have continually evolved, but mainly within the domain of survey data sets. There are certain characteristics of administrative databases, such as their size, which present challenges from a synthesis perspective and require special attention. This paper, through the fitting of saturated count models, presents a synthesis method that is suitable for administrative databases that is tuned by two parameters. The method allows large categorical data sets to be synthesized quickly and allows risk and utility metrics to be satisfied a priori, that is, prior to synthetic data generation. The paper explores how the flexibility afforded by two-parameter count models (the negative binomial and Poisson-inverse Gaussian) can be utilised to protect respondents' - especially uniques' - privacy in synthetic data. Finally, an empirical example is carried out through the synthesis of a database which can be viewed as a good substitute to the English School Census.
△ Less
Submitted 12 May, 2022; v1 submitted 16 July, 2021;
originally announced July 2021.
-
Bayesian model-based clustering for populations of network data
Authors:
Anastasia Mantziou,
Simon Lunagomez,
Robin Mitra
Abstract:
There is increasing appetite for analysing populations of network data due to the fast-growing body of applications demanding such methods. While methods exist to provide readily interpretable summaries of heterogeneous network populations, these are often descriptive or ad hoc, lacking any formal justification. In contrast, principled analysis methods often provide results difficult to relate bac…
▽ More
There is increasing appetite for analysing populations of network data due to the fast-growing body of applications demanding such methods. While methods exist to provide readily interpretable summaries of heterogeneous network populations, these are often descriptive or ad hoc, lacking any formal justification. In contrast, principled analysis methods often provide results difficult to relate back to the applied problem of interest. Motivated by two complementary applied examples, we develop a Bayesian framework to appropriately model complex heterogeneous network populations, whilst also allowing analysts to gain insights from the data, and make inferences most relevant to their needs. The first application involves a study in Computer Science measuring human movements across a University. The second analyses data from Neuroscience investigating relationships between different regions of the brain. While both applications entail analysis of a heterogeneous population of networks, network sizes vary considerably. We focus on the problem of clustering the elements of a network population, where each cluster is characterised by a network representative. We take advantage of the Bayesian machinery to simultaneously infer the cluster membership, the representatives, and the community structure of the representatives, thus allowing intuitive inferences to be made. The implementation of our method on the human movement study reveals interesting movement patterns of individuals in clusters, readily characterised by their network representative. For the brain networks application, our model reveals a cluster of individuals with different network properties of particular interest in Neuroscience. The performance of our method is additionally validated in extensive simulation studies.
△ Less
Submitted 20 June, 2023; v1 submitted 7 July, 2021;
originally announced July 2021.
-
Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network
Authors:
Praneet Singh,
Jishnu Jaykumar,
Akhil Pankaj,
Reshmi Mitra
Abstract:
Edge nodes are crucial for detection against multitudes of cyber attacks on Internet-of-Things endpoints and is set to become part of a multi-billion industry. The resource constraints in this novel network infrastructure tier constricts the deployment of existing Network Intrusion Detection System with Deep Learning models (DLM). We address this issue by develo** a novel light, fast and accurat…
▽ More
Edge nodes are crucial for detection against multitudes of cyber attacks on Internet-of-Things endpoints and is set to become part of a multi-billion industry. The resource constraints in this novel network infrastructure tier constricts the deployment of existing Network Intrusion Detection System with Deep Learning models (DLM). We address this issue by develo** a novel light, fast and accurate 'Edge-Detect' model, which detects Distributed Denial of Service attack on edge nodes using DLM techniques. Our model can work within resource restrictions i.e. low power, memory and processing capabilities, to produce accurate results at a meaningful pace. It is built by creating layers of Long Short-Term Memory or Gated Recurrent Unit based cells, which are known for their excellent representation of sequential data. We designed a practical data science pipeline with Recurring Neural Network to learn from the network packet behavior in order to identify whether it is normal or attack-oriented. The model evaluation is from deployment on actual edge node represented by Raspberry Pi using current cybersecurity dataset (UNSW2015). Our results demonstrate that in comparison to conventional DLM techniques, our model maintains a high testing accuracy of 99% even with lower resource utilization in terms of cpu and memory. In addition, it is nearly 3 times smaller in size than the state-of-art model and yet requires a much lower testing time.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Black-box Adversarial Attacks in Autonomous Vehicle Technology
Authors:
K Naveen Kumar,
C Vishnu,
Reshmi Mitra,
C Krishna Mohan
Abstract:
Despite the high quality performance of the deep neural network in real-world applications, they are susceptible to minor perturbations of adversarial attacks. This is mostly undetectable to human vision. The impact of such attacks has become extremely detrimental in autonomous vehicles with real-time "safety" concerns. The black-box adversarial attacks cause drastic misclassification in critical…
▽ More
Despite the high quality performance of the deep neural network in real-world applications, they are susceptible to minor perturbations of adversarial attacks. This is mostly undetectable to human vision. The impact of such attacks has become extremely detrimental in autonomous vehicles with real-time "safety" concerns. The black-box adversarial attacks cause drastic misclassification in critical scene elements such as road signs and traffic lights leading the autonomous vehicle to crash into other vehicles or pedestrians. In this paper, we propose a novel query-based attack method called Modified Simple black-box attack (M-SimBA) to overcome the use of a white-box source in transfer based attack method. Also, the issue of late convergence in a Simple black-box attack (SimBA) is addressed by minimizing the loss of the most confused class which is the incorrect class predicted by the model with the highest probability, instead of trying to maximize the loss of the correct class. We evaluate the performance of the proposed approach to the German Traffic Sign Recognition Benchmark (GTSRB) dataset. We show that the proposed model outperforms the existing models like Transfer-based projected gradient descent (T-PGD), SimBA in terms of convergence time, flattening the distribution of confused class probability, and producing adversarial samples with least confidence on the true class.
△ Less
Submitted 15 January, 2021;
originally announced January 2021.
-
Random Fourier Feature Based Deep Learning for Wireless Communications
Authors:
Rangeet Mitra,
Georges Kaddoum
Abstract:
Deep-learning (DL) has emerged as a powerful machine-learning technique for several classic problems encountered in generic wireless communications. Specifically, random Fourier Features (RFF) based deep-learning has emerged as an attractive solution for several machine-learning problems; yet there is a lacuna of rigorous results to justify the viability of RFF based DL-algorithms in general. To a…
▽ More
Deep-learning (DL) has emerged as a powerful machine-learning technique for several classic problems encountered in generic wireless communications. Specifically, random Fourier Features (RFF) based deep-learning has emerged as an attractive solution for several machine-learning problems; yet there is a lacuna of rigorous results to justify the viability of RFF based DL-algorithms in general. To address this gap, we attempt to analytically quantify the viability of RFF based DL. Precisely, in this paper, analytical proofs are presented demonstrating that RFF based DL architectures have lower approximation-error and probability of misclassification as compared to classical DL architectures. In addition, a new distribution-dependent RFF is proposed to facilitate DL architectures with low training-complexity. Through computer simulations, the practical application of the presented analytical results and the proposed distribution-dependent RFF, are depicted for various machine-learning problems encountered in next-generation communication systems such as: a) line of sight (LOS)/non-line of sight (NLOS) classification, and b) message-passing based detection of low-density parity check codes (LDPC) codes over nonlinear visible light communication (VLC) channels. Especially in the low training-data regime, the presented simulations show that significant performance gains are achieved when utilizing RFF maps of observations. Lastly, in all the presented simulations, it is observed that the proposed distribution-dependent RFFs significantly outperform RFFs, which make them useful for potential machine-learning/DL based applications in the context of next-generation communication systems.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Detecting Bias in the Presence of Spatial Autocorrelation
Authors:
Subhabrata Majumdar,
Cheryl Flynn,
Ritwik Mitra
Abstract:
In spite of considerable practical importance, current algorithmic fairness literature lacks technical methods to account for underlying geographic dependency while evaluating or mitigating bias issues for spatial data. We initiate the study of bias in spatial applications in this paper, taking the first step towards formalizing this line of quantitative methods. Bias in spatial data applications…
▽ More
In spite of considerable practical importance, current algorithmic fairness literature lacks technical methods to account for underlying geographic dependency while evaluating or mitigating bias issues for spatial data. We initiate the study of bias in spatial applications in this paper, taking the first step towards formalizing this line of quantitative methods. Bias in spatial data applications often gets confounded by underlying spatial autocorrelation. We propose hypothesis testing methodology to detect the presence and strength of this effect, then account for it by using a spatial filtering-based approach -- in order to enable application of existing bias detection metrics. We evaluate our proposed methodology through numerical experiments on real and synthetic datasets, demonstrating that in the presence of several types of confounding effects due to the underlying spatial structure our testing methods perform well in maintaining low type-II errors and nominal type-I errors.
△ Less
Submitted 28 January, 2022; v1 submitted 5 January, 2021;
originally announced January 2021.
-
Anomalous thermopower oscillations in graphene-InAs nanowire vertical heterostructures
Authors:
Richa Mitra,
Manas Ranjan Sahu,
Aditya Sood,
Takashi Taniguchi,
Kenji Watanabe,
Hadas Shtrikman,
Subroto Mukerjee,
A. K. Sood,
Anindya Das
Abstract:
Thermoelectric measurements have the potential to uncover the density of states of low-dimensional materials. Here, we present the anomalous thermoelectric behaviour of mono-layer graphene-nanowire (NW) heterostructures, showing large oscillations as a function of do** concentration. Our devices consist of InAs NW and graphene vertical heterostructures, which are electrically isolated by thin (…
▽ More
Thermoelectric measurements have the potential to uncover the density of states of low-dimensional materials. Here, we present the anomalous thermoelectric behaviour of mono-layer graphene-nanowire (NW) heterostructures, showing large oscillations as a function of do** concentration. Our devices consist of InAs NW and graphene vertical heterostructures, which are electrically isolated by thin ($\sim$ 10nm) hexagonal boron nitride (hBN) layers. In contrast to conventional thermoelectric measurements, where a heater is placed on one side of a sample, we use the InAs NW (diameter $\sim 50$ nm) as a local heater placed in the middle of the graphene channel. We measure the thermoelectric voltage induced in graphene due to Joule heating in the NW as a function of temperature (1.5K - 50K) and carrier concentration. The thermoelectric voltage in bilayer graphene (BLG)- NW heterostructures shows sign change around the Dirac point, as predicted by Mott's formula. In contrast, the thermoelectric voltage measured across monolayer graphene (MLG)-NW heterostructures shows anomalous large-amplitude oscillations around the Dirac point, not seen in the Mott response derived from the electrical conductivity measured on the same device. The anomalous oscillations are a signature of the modified density of states in MLG by the electrostatic potential of the NW, which is much weaker in the NW-BLG devices. Thermal calculations of the heterostructure stack show that the temperature gradient is dominant in the graphene region underneath the NW, and thus sensitive to the modified density of states resulting in anomalous oscillations in the thermoelectric voltage. Furthermore, with the application of a magnetic field, we detect modifications in the density of states due to the formation of Landau levels in both MLG and BLG.
△ Less
Submitted 22 December, 2020; v1 submitted 18 September, 2020;
originally announced September 2020.
-
Examining Machine Learning for 5G and Beyond through an Adversarial Lens
Authors:
Muhammad Usama,
Rupendra Nath Mitra,
Inaam Ilahi,
Junaid Qadir,
Mahesh K. Marina
Abstract:
Spurred by the recent advances in deep learning to harness rich information hidden in large volumes of data and to tackle problems that are hard to model/solve (e.g., resource allocation problems), there is currently tremendous excitement in the mobile networks domain around the transformative potential of data-driven AI/ML based network automation, control and analytics for 5G and beyond. In this…
▽ More
Spurred by the recent advances in deep learning to harness rich information hidden in large volumes of data and to tackle problems that are hard to model/solve (e.g., resource allocation problems), there is currently tremendous excitement in the mobile networks domain around the transformative potential of data-driven AI/ML based network automation, control and analytics for 5G and beyond. In this article, we present a cautionary perspective on the use of AI/ML in the 5G context by highlighting the adversarial dimension spanning multiple types of ML (supervised/unsupervised/RL) and support this through three case studies. We also discuss approaches to mitigate this adversarial ML risk, offer guidelines for evaluating the robustness of ML models, and call attention to issues surrounding ML oriented research in 5G more generally.
△ Less
Submitted 5 September, 2020;
originally announced September 2020.
-
SOAR: Simultaneous Or of And Rules for Classification of Positive & Negative Classes
Authors:
Elena Khusainova,
Emily Dodwell,
Ritwik Mitra
Abstract:
Algorithmic decision making has proliferated and now impacts our daily lives in both mundane and consequential ways. Machine learning practitioners make use of a myriad of algorithms for predictive models in applications as diverse as movie recommendations, medical diagnoses, and parole recommendations without delving into the reasons driving specific predictive decisions. Machine learning algorit…
▽ More
Algorithmic decision making has proliferated and now impacts our daily lives in both mundane and consequential ways. Machine learning practitioners make use of a myriad of algorithms for predictive models in applications as diverse as movie recommendations, medical diagnoses, and parole recommendations without delving into the reasons driving specific predictive decisions. Machine learning algorithms in such applications are often chosen for their superior performance, however popular choices such as random forest and deep neural networks fail to provide an interpretable understanding of the predictive model. In recent years, rule-based algorithms have been used to address this issue. Wang et al. (2017) presented an or-of-and (disjunctive normal form) based classification technique that allows for classification rule mining of a single class in a binary classification; this method is also shown to perform comparably to other modern algorithms. In this work, we extend this idea to provide classification rules for both classes simultaneously. That is, we provide a distinct set of rules for both positive and negative classes. In describing this approach, we also present a novel and complete taxonomy of classifications that clearly capture and quantify the inherent ambiguity in noisy binary classifications in the real world. We show that this approach leads to a more granular formulation of the likelihood model and a simulated-annealing based optimization achieves classification performance competitive with comparable techniques. We apply our method to synthetic as well as real world data sets to compare with other related methods that demonstrate the utility of our proposal.
△ Less
Submitted 14 February, 2023; v1 submitted 25 August, 2020;
originally announced August 2020.
-
Towards Integrating Fairness Transparently in Industrial Applications
Authors:
Emily Dodwell,
Cheryl Flynn,
Balachander Krishnamurthy,
Subhabrata Majumdar,
Ritwik Mitra
Abstract:
Numerous Machine Learning (ML) bias-related failures in recent years have led to scrutiny of how companies incorporate aspects of transparency and accountability in their ML lifecycles. Companies have a responsibility to monitor ML processes for bias and mitigate any bias detected, ensure business product integrity, preserve customer loyalty, and protect brand image. Challenges specific to industr…
▽ More
Numerous Machine Learning (ML) bias-related failures in recent years have led to scrutiny of how companies incorporate aspects of transparency and accountability in their ML lifecycles. Companies have a responsibility to monitor ML processes for bias and mitigate any bias detected, ensure business product integrity, preserve customer loyalty, and protect brand image. Challenges specific to industry ML projects can be broadly categorized into principled documentation, human oversight, and need for mechanisms that enable information reuse and improve cost efficiency. We highlight specific roadblocks and propose conceptual solutions on a per-category basis for ML practitioners and organizational subject matter experts. Our systematic approach tackles these challenges by integrating mechanized and human-in-the-loop components in bias detection, mitigation, and documentation of projects at various stages of the ML lifecycle. To motivate the implementation of our system -- SIFT (System to Integrate Fairness Transparently) -- we present its structural primitives with an example real-world use case on how it can be used to identify potential biases and determine appropriate mitigation strategies in a participatory manner.
△ Less
Submitted 13 February, 2021; v1 submitted 10 June, 2020;
originally announced June 2020.
-
6G White Paper on Machine Learning in Wireless Communication Networks
Authors:
Samad Ali,
Walid Saad,
Nandana Rajatheva,
Kapseok Chang,
Daniel Steinbach,
Benjamin Sliwa,
Christian Wietfeld,
Kai Mei,
Hamid Shiri,
Hans-Jürgen Zepernick,
Thi My Chinh Chu,
Ijaz Ahmad,
Jyrki Huusko,
Jaakko Suutala,
Shubhangi Bhadauria,
Vimal Bhatia,
Rangeet Mitra,
Saidhiraj Amuru,
Robert Abbas,
Baohua Shao,
Michele Capobianco,
Guanghui Yu,
Maelick Claes,
Teemu Karvonen,
Mingzhe Chen
, et al. (2 additional authors not shown)
Abstract:
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of novel technologies such as self-driving vehicles and v…
▽ More
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless connectivity for humans and machines. Recent advances in ML research has led enable a wide range of novel technologies such as self-driving vehicles and voice assistants. Such innovation is possible as a result of the availability of advanced ML models, large datasets, and high computational power. On the other hand, the ever-increasing demand for connectivity will require a lot of innovation in 6G wireless networks, and ML tools will play a major role in solving problems in the wireless domain. In this paper, we provide an overview of the vision of how ML will impact the wireless communication systems. We first give an overview of the ML methods that have the highest potential to be used in wireless networks. Then, we discuss the problems that can be solved by using ML in various layers of the network such as the physical layer, medium access layer, and application layer. Zero-touch optimization of wireless networks using ML is another interesting aspect that is discussed in this paper. Finally, at the end of each section, important research questions that the section aims to answer are presented.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Anomalous Coulomb Drag between InAs Nanowire and Graphene Heterostructures
Authors:
Richa Mitra,
Manas Ranjan Sahu,
Kenji Watanabe,
Takashi Taniguchi,
Hadas Shtrikman,
A. K Sood,
Anindya Das
Abstract:
Correlated charge inhomogeneity breaks the electron-hole symmetry in two-dimensional (2D) bilayer heterostructures which is responsible for non-zero drag appearing at the charge neutrality point. Here we report Coulomb drag in novel drag systems consisting of a two-dimensional graphene and a one dimensional (1D) InAs nanowire (NW) heterostructure exhibiting distinct results from 2D-2D heterostruct…
▽ More
Correlated charge inhomogeneity breaks the electron-hole symmetry in two-dimensional (2D) bilayer heterostructures which is responsible for non-zero drag appearing at the charge neutrality point. Here we report Coulomb drag in novel drag systems consisting of a two-dimensional graphene and a one dimensional (1D) InAs nanowire (NW) heterostructure exhibiting distinct results from 2D-2D heterostructures. For monolayer graphene (MLG)-NW heterostructures, we observe an unconventional drag resistance peak near the Dirac point due to the correlated inter-layer charge puddles. The drag signal decreases monotonically with temperature ($\sim T^{-2}$) and with the carrier density of NW ($\sim n_{N}^{-4}$), but increases rapidly with magnetic field ($\sim B^{2}$). These anomalous responses, together with the mismatched thermal conductivities of graphene and NWs, establish the energy drag as the responsible mechanism of Coulomb drag in MLG-NW devices. In contrast, for bilayer graphene (BLG)-NW devices the drag resistance reverses sign across the Dirac point and the magnitude of the drag signal decreases with the carrier density of the NW ($\sim n_{N}^{-1.5}$), consistent with the momentum drag but remains almost constant with magnetic field and temperature. This deviation from the expected $T^2$ arises due to the shift of the drag maximum on graphene carrier density. We also show that the Onsager reciprocity relation is observed for the BLG-NW devices but not for the MLG-NW devices. These Coulomb drag measurements in dimensionally mismatched (2D-1D) systems, hitherto not reported, will pave the future realization of correlated condensate states in novel systems.
△ Less
Submitted 23 February, 2020;
originally announced February 2020.
-
Non-orthogonal Multiple Access as an Enabler for Massive Connectivity for 5G and Beyond Networks
Authors:
Vimal Bhatia,
Pragya Swami,
Sanjeev Sharma,
Rangeet Mitra
Abstract:
Two of the most challenging goals to be achieved in the fifth generation (5G) and beyond communication are massive connectivity and higher capacity. The use of traditional orthogonal multiple access techniques limits the number of users that can be served using the available resources due to orthogonality constraint. Moreover, the available resources may not be utilized effectively by the alloted…
▽ More
Two of the most challenging goals to be achieved in the fifth generation (5G) and beyond communication are massive connectivity and higher capacity. The use of traditional orthogonal multiple access techniques limits the number of users that can be served using the available resources due to orthogonality constraint. Moreover, the available resources may not be utilized effectively by the alloted users thereby resulting in inefficiency and user unfairness. This imposes a severe drawback in cases where the number of users to be served are high, like in the 5G networks. Hence, introducing non-orthogonality to the multiple access scheme is advocated as a supreme methodology to serve multiple users simultaneously, thereby enhancing the connectivity. In scenarios with massive number of users, non-orthogonal multiple access scheme increases the number of active connections by superimposing the signal of multi-users on a same resource block, thereby also utilizing the available resources efficiently.
△ Less
Submitted 15 December, 2019;
originally announced December 2019.
-
Non-Orthogonal Multiple Access for Visible Light Communications with Ambient Light and User Mobility
Authors:
Rangeet Mitra,
Paschalis. C. Sofotasios,
Vimal Bhatia,
Sami Muhaidat
Abstract:
The ever-increasing demand for high data-rate applications and the proliferation of connected devices pose several theoretical and technological challenges for the fifth generation (5G) networks and beyond. Among others, this includes the spectrum scarcity and massive connectivity of devices, particularly in the context of the Internet of Things (IoT) ecosystem. In this respect, visible light comm…
▽ More
The ever-increasing demand for high data-rate applications and the proliferation of connected devices pose several theoretical and technological challenges for the fifth generation (5G) networks and beyond. Among others, this includes the spectrum scarcity and massive connectivity of devices, particularly in the context of the Internet of Things (IoT) ecosystem. In this respect, visible light communication (VLC) has recently emerged as a potential solution for these challenges, particularly in scenarios relating to indoor communications. Additionally, non-orthogonal multiple access (NOMA) for VLC has been envisioned to address some of the key challenges in the next generation wireless networks. However, in realistic environments, it has been shown that VLC systems suffer from additive optical interference due to ambient light, and user-mobility which cause detrimental outages and overall degraded data rates. Motivated by this, in this work, we first derive the statistics of the incurred additive interference, and then analyze the rate of the considered NOMA-VLC channel. An analytical expression is subsequently derived for the rate of NOMA-VLC systems with ambient light and user-mobility, followed by the formulation of a power-allocation technique for the underlying scenario, which has been shown to outperform classical gain-ratio power allocation in terms of achievable rate. The obtained analytical results are corroborated with computer simulations for various realistic VLC scenarios of interest, which lead to useful insights of theoretical and practical interest. For example, it is shown that, in a NOMA-enabled VLC system, the maximum rate at which information can be transmitted over a static VLC communication channel with ambient light asymptotically converges to the Shannon Hartley capacity formula.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments
Authors:
Samaikya Valluripally,
Aniket Gulhane,
Reshmi Mitra,
Khaza Anuarul Hoque,
Prasad Calyam
Abstract:
Social Virtual Reality Learning Environment (VRLE) is a novel edge computing platform for collaboration amongst distributed users. Given that VRLEs are used for critical applications (e.g., special education, public safety training), it is important to ensure security and privacy issues. In this paper, we present a novel framework to obtain quantitative assessments of threats and vulnerabilities f…
▽ More
Social Virtual Reality Learning Environment (VRLE) is a novel edge computing platform for collaboration amongst distributed users. Given that VRLEs are used for critical applications (e.g., special education, public safety training), it is important to ensure security and privacy issues. In this paper, we present a novel framework to obtain quantitative assessments of threats and vulnerabilities for VRLEs. Based on the use cases from an actual social VRLE viz., vSocial, we first model the security and privacy using the attack trees. Subsequently, these attack trees are converted into stochastic timed automata representations that allow for rigorous statistical model checking. Such an analysis helps us adopt pertinent design principles such as hardening, diversity and principle of least privilege to enhance the resilience of social VRLEs. Through experiments in a vSocial case study, we demonstrate the effectiveness of our attack tree modeling with a reduction of 26% in probability of loss of integrity (security) and 80% in privacy leakage (privacy) in before and after scenarios pertaining to the adoption of the design principles.
△ Less
Submitted 8 November, 2019;
originally announced November 2019.
-
A Comparative Analysis of Non-relativistic and Relativistic Calculations of Electric Dipole Moments and Polarizabilities of Heteronuclear Alkali Dimers
Authors:
R. Mitra,
V. S. Prasannaa,
B. K. Sahoo
Abstract:
We analyze the molecular electric dipole moments (PDMs) and static electric dipole polarizabilities of heteronuclear alkali dimers in their ground states by employing coupled-cluster theory, both in the non-relativistic and four-component relativistic frameworks. The roles of electron correlations as well as relativistic effects are demonstrated by studying them at different levels of theory, foll…
▽ More
We analyze the molecular electric dipole moments (PDMs) and static electric dipole polarizabilities of heteronuclear alkali dimers in their ground states by employing coupled-cluster theory, both in the non-relativistic and four-component relativistic frameworks. The roles of electron correlations as well as relativistic effects are demonstrated by studying them at different levels of theory, followed by a comprehensive treatment of error estimates. We compare our obtained values with the previous non-relativistic calculations, some of which include lower-order relativistic corrections, as well as with the experimental values, wherever available. We find that the PDMs are very sensitive to relativistic effects, as compared to polarizabilities; this aspect can explain the long-standing question on the difference between experimental values and theoretical results for LiNa. We show that consideration of relativistic values of PDMs improves significantly the isotropic Van der Waals $C_6$ coefficients of the investigated alkali dimers over the previously reported non-relativistic calculations. The dependence of dipole polarizabilities on molecular volume is also illustrated.
△ Less
Submitted 17 October, 2019;
originally announced October 2019.
-
Multi-Person 3D Human Pose Estimation from Monocular Images
Authors:
Rishabh Dabral,
Nitesh B Gundavarapu,
Rahul Mitra,
Abhishek Sharma,
Ganesh Ramakrishnan,
Arjun Jain
Abstract:
Multi-person 3D human pose estimation from a single image is a challenging problem, especially for in-the-wild settings due to the lack of 3D annotated data. We propose HG-RCNN, a Mask-RCNN based network that also leverages the benefits of the Hourglass architecture for multi-person 3D Human Pose Estimation. A two-staged approach is presented that first estimates the 2D keypoints in every Region o…
▽ More
Multi-person 3D human pose estimation from a single image is a challenging problem, especially for in-the-wild settings due to the lack of 3D annotated data. We propose HG-RCNN, a Mask-RCNN based network that also leverages the benefits of the Hourglass architecture for multi-person 3D Human Pose Estimation. A two-staged approach is presented that first estimates the 2D keypoints in every Region of Interest (RoI) and then lifts the estimated keypoints to 3D. Finally, the estimated 3D poses are placed in camera-coordinates using weak-perspective projection assumption and joint optimization of focal length and root translations. The result is a simple and modular network for multi-person 3D human pose estimation that does not require any multi-person 3D pose dataset. Despite its simple formulation, HG-RCNN achieves the state-of-the-art results on MuPoTS-3D while also approximating the 3D pose in the camera-coordinate system.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
ProtoGAN: Towards Few Shot Learning for Action Recognition
Authors:
Sai Kumar Dwivedi,
Vikram Gupta,
Rahul Mitra,
Shuaib Ahmed,
Arjun Jain
Abstract:
Few-shot learning (FSL) for action recognition is a challenging task of recognizing novel action categories which are represented by few instances in the training data. In a more generalized FSL setting (G-FSL), both seen as well as novel action categories need to be recognized. Conventional classifiers suffer due to inadequate data in FSL setting and inherent bias towards seen action categories i…
▽ More
Few-shot learning (FSL) for action recognition is a challenging task of recognizing novel action categories which are represented by few instances in the training data. In a more generalized FSL setting (G-FSL), both seen as well as novel action categories need to be recognized. Conventional classifiers suffer due to inadequate data in FSL setting and inherent bias towards seen action categories in G-FSL setting. In this paper, we address this problem by proposing a novel ProtoGAN framework which synthesizes additional examples for novel categories by conditioning a conditional generative adversarial network with class prototype vectors. These class prototype vectors are learnt using a Class Prototype Transfer Network (CPTN) from examples of seen categories. Our synthesized examples for a novel class are semantically similar to real examples belonging to that class and is used to train a model exhibiting better generalization towards novel classes. We support our claim by performing extensive experiments on three datasets: UCF101, HMDB51 and Olympic-Sports. To the best of our knowledge, we are the first to report the results for G-FSL and provide a strong benchmark for future research. We also outperform the state-of-the-art method in FSL for all the aforementioned datasets.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Mercury Hydroxide as a Promising Triatomic Molecule to Probe P,T-odd Interactions
Authors:
R. Mitra,
V. S. Prasannaa,
B. K. Sahoo,
X. Tong,
M. Abe,
B. P. Das
Abstract:
In the quest to find a favourable triatomic molecule for detecting electric dipole moment of an electron (eEDM), we identify mercury hydroxide (HgOH) as an extremely attractive candidate from both experimental and theoretical viewpoints. Our calculations show that there is a four-fold enhancement in the effective electric field of HgOH compared to the recently proposed ytterbium hydroxide (YbOH) […
▽ More
In the quest to find a favourable triatomic molecule for detecting electric dipole moment of an electron (eEDM), we identify mercury hydroxide (HgOH) as an extremely attractive candidate from both experimental and theoretical viewpoints. Our calculations show that there is a four-fold enhancement in the effective electric field of HgOH compared to the recently proposed ytterbium hydroxide (YbOH) [Phys. Rev. Lett. 119, 133002 (2017)] for eEDM measurement. Thus, in the (010) bending state associated with the electronic ground state, it could provide better sensitivity than YbOH from a theoretical point of view. We have also investigated the potential energy curve and permanent electric dipole moment of HgOH, which lends support for its experimental feasibility. Moreover, we propose that it is possible to laser cool the HgOH molecule by adopting the same technique as that in the diatomic polar molecule, HgF, as shown in [Phys. Rev. A 99, 032502 (2019)].
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Multiview-Consistent Semi-Supervised Learning for 3D Human Pose Estimation
Authors:
Rahul Mitra,
Nitesh B. Gundavarapu,
Abhishek Sharma,
Arjun Jain
Abstract:
The best performing methods for 3D human pose estimation from monocular images require large amounts of in-the-wild 2D and controlled 3D pose annotated datasets which are costly and require sophisticated systems to acquire. To reduce this annotation dependency, we propose Multiview-Consistent Semi Supervised Learning (MCSS) framework that utilizes similarity in pose information from unannotated, u…
▽ More
The best performing methods for 3D human pose estimation from monocular images require large amounts of in-the-wild 2D and controlled 3D pose annotated datasets which are costly and require sophisticated systems to acquire. To reduce this annotation dependency, we propose Multiview-Consistent Semi Supervised Learning (MCSS) framework that utilizes similarity in pose information from unannotated, uncalibrated but synchronized multi-view videos of human motions as additional weak supervision signal to guide 3D human pose regression. Our framework applies hard-negative mining based on temporal relations in multi-view videos to arrive at a multi-view consistent pose embedding. When jointly trained with limited 3D pose annotations, our approach improves the baseline by 25% and state-of-the-art by 8.7%, whilst using substantially smaller networks. Lastly, but importantly, we demonstrate the advantages of the learned embedding and establish view-invariant pose retrieval benchmarks on two popular, publicly available multi-view human pose datasets, Human 3.6M and MPI-INF-3DHP, to facilitate future research.
△ Less
Submitted 25 February, 2020; v1 submitted 14 August, 2019;
originally announced August 2019.
-
Analysis of Electric Dipole Moment of $^{225}$Ra Atom using the Relativistic Normal Coupled-cluster Theory
Authors:
V. S. Prasannaa,
R. Mitra,
B. K. Sahoo
Abstract:
In view of the large differences in the previous calculations of enhancement factors to the parity and time-reversal violating (P,T-odd) electric dipole moment (EDM) of $^{225}$Ra due to nuclear Schiff moment (NSM) and tensor-pseudotensor (T-PT) electron-nucleus (e-N) interactions between the relativistic coupled-cluster (RCC) theory and other many-body methods, we employ the relativistic normal c…
▽ More
In view of the large differences in the previous calculations of enhancement factors to the parity and time-reversal violating (P,T-odd) electric dipole moment (EDM) of $^{225}$Ra due to nuclear Schiff moment (NSM) and tensor-pseudotensor (T-PT) electron-nucleus (e-N) interactions between the relativistic coupled-cluster (RCC) theory and other many-body methods, we employ the relativistic normal coupled-cluster (RNCC) theory to explain the discrepancies. The normalization of the wave function in the RNCC theory becomes unity by construction. This feature removes the ambiguity associated with the uncertainties in calculations that could arise due to mismatch in cancellation of the normalization factor of the wave function in a truncated RCC method. Moreover, all the terms in the expression for EDM using the RNCC method naturally terminate, in contrast to the RCC approach. By taking an average of the results from two variants each of both the RCC and RNCC methods, we recommend enhancement factors to the EDM of 225Ra due to NSM as $-$6.29(1) $\times 10^{-17} |e| $cm $( |e| fm^3)$ and due to T-PT e-N coupling constant as $-$12.66(14) $\times {10^{-20} \langle σ_N \rangle | e | }$cm, for the nuclear Pauli spinor, $σ_N$. This is corroborated by analyzing the dipole polarizability ($α_d$) value of $^{225}$Ra, which is obtained as 244(13) $ea_0^3$. We also compare our results for all three properties with previous calculations that employ different many-body methods. Our $α_d$ value agrees very well with the results that are obtained by carrying out rigorous analyses using other variants of RCC methods.
△ Less
Submitted 10 August, 2019;
originally announced August 2019.
-
A Bayesian Approach for Analyzing Data on the Stiefel Manifold
Authors:
Subhadip Pal,
Subhajit Sengupta,
Riten Mitra,
Arunava Banerjee
Abstract:
Directional data emerges in a wide array of applications, ranging from atmospheric sciences to medical imaging. Modeling such data, however, poses unique challenges by virtue of their being constrained to non-Euclidean spaces like manifolds. Here, we present a unified Bayesian framework for inference on the Stiefel manifold using the Matrix Langevin distribution. Specifically, we propose a novel f…
▽ More
Directional data emerges in a wide array of applications, ranging from atmospheric sciences to medical imaging. Modeling such data, however, poses unique challenges by virtue of their being constrained to non-Euclidean spaces like manifolds. Here, we present a unified Bayesian framework for inference on the Stiefel manifold using the Matrix Langevin distribution. Specifically, we propose a novel family of conjugate priors and establish a number of theoretical properties relevant to statistical inference. %Importantly, these include the propriety of these priors and concentration characterization. Conjugacy enables the translation of these properties to their corresponding posteriors, which we exploit to develop the posterior inference scheme. For the implementation of the posterior computation, including the posterior sampling, we adopt a novel computational procedure for evaluating the hypergeometric function of matrix arguments that appears as normalization constants in the relevant densities.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Conflict as an Inverse of Attention in Sequence Relationship
Authors:
Rajarshee Mitra
Abstract:
Attention is a very efficient way to model the relationship between two sequences by comparing how similar two intermediate representations are. Initially demonstrated in NMT, it is a standard in all NLU tasks today when efficient interaction between sequences is considered. However, we show that attention, by virtue of its composition, works best only when it is given that there is a match somewh…
▽ More
Attention is a very efficient way to model the relationship between two sequences by comparing how similar two intermediate representations are. Initially demonstrated in NMT, it is a standard in all NLU tasks today when efficient interaction between sequences is considered. However, we show that attention, by virtue of its composition, works best only when it is given that there is a match somewhere between two sequences. It does not very well adapt to cases when there is no similarity between two sequences or if the relationship is contrastive. We propose an Conflict model which is very similar to how attention works but which emphasizes mostly on how well two sequences repel each other and finally empirically show how this method in conjunction with attention can boost the overall performance.
△ Less
Submitted 21 June, 2019; v1 submitted 20 June, 2019;
originally announced June 2019.
-
Bayesian Variable Selection for Multi-Outcome Models Through Shared Shrinkage
Authors:
Debamita Kundu,
Riten Mitra,
Jeremy T. Gaskins
Abstract:
Variable selection over a potentially large set of covariates in a linear model is quite popular. In the Bayesian context, common prior choices can lead to a posterior expectation of the regression coefficients that is a sparse (or nearly sparse) vector with a few non-zero components, those covariates that are most important. This article extends the global-local shrinkage idea to a scenario where…
▽ More
Variable selection over a potentially large set of covariates in a linear model is quite popular. In the Bayesian context, common prior choices can lead to a posterior expectation of the regression coefficients that is a sparse (or nearly sparse) vector with a few non-zero components, those covariates that are most important. This article extends the global-local shrinkage idea to a scenario where one wishes to model multiple response variables simultaneously. Here, we have developed a variable selection method for a K-outcome model (multivariate regression) that identifies the most important covariates across all outcomes. The prior for all regression coefficients is a mean zero normal with coefficient-specific variance term that consists of a predictor-specific factor (shared local shrinkage parameter) and a model-specific factor (global shrinkage term) that differs in each model. The performance of our modeling approach is evaluated through simulation studies and a data example.
△ Less
Submitted 25 April, 2019;
originally announced April 2019.
-
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Authors:
Aniket Gulhane,
Akhil Vyas,
Reshmi Mitra,
Roland Oruche,
Gabriela Hoefer,
Samaikya Valluripally,
Prasad Calyam,
Khaza Anuarul Hoque
Abstract:
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safe…
▽ More
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.
△ Less
Submitted 29 November, 2018;
originally announced November 2018.
-
An Improved Learning Framework for Covariant Local Feature Detection
Authors:
Nehal Doiphode,
Rahul Mitra,
Shuaib Ahmed,
Arjun Jain
Abstract:
Learning feature detection has been largely an unexplored area when compared to handcrafted feature detection. Recent learning formulations use the covariant constraint in their loss function to learn covariant detectors. However, just learning from covariant constraint can lead to detection of unstable features. To impart further, stability detectors are trained to extract pre-determined features…
▽ More
Learning feature detection has been largely an unexplored area when compared to handcrafted feature detection. Recent learning formulations use the covariant constraint in their loss function to learn covariant detectors. However, just learning from covariant constraint can lead to detection of unstable features. To impart further, stability detectors are trained to extract pre-determined features obtained by hand-crafted detectors. However, in the process they lose the ability to detect novel features. In an attempt to overcome the above limitations, we propose an improved scheme by incorporating covariant constraints in form of triplets with addition to an affine covariant constraint. We show that using these additional constraints one can learn to detect novel and stable features without using pre-determined features for training. Extensive experiments show our model achieves state-of-the-art performance in repeatability score on the well known datasets such as Vgg-Affine, EF, and Webcam.
△ Less
Submitted 1 November, 2018;
originally announced November 2018.
-
A General Framework For Frequentist Model Averaging
Authors:
Priyam Mitra,
Heng Lian,
Ritwik Mitra,
Hua Liang,
Min-ge Xie
Abstract:
Model selection strategies have been routinely employed to determine a model for data analysis in statistics, and further study and inference then often proceed as though the selected model were the true model that were known a priori. This practice does not account for the uncertainty introduced by the selection process and the fact that the selected model can possibly be a wrong one. Model avera…
▽ More
Model selection strategies have been routinely employed to determine a model for data analysis in statistics, and further study and inference then often proceed as though the selected model were the true model that were known a priori. This practice does not account for the uncertainty introduced by the selection process and the fact that the selected model can possibly be a wrong one. Model averaging approaches try to remedy this issue by combining estimators for a set of candidate models. Specifically, instead of deciding which model is the 'right' one, a model averaging approach suggests to fit a set of candidate models and average over the estimators using certain data adaptive weights. In this paper we establish a general frequentist model averaging framework that does not set any restrictions on the set of candidate models. It greatly broadens the scope of the existing methodologies under the frequentist model averaging development. Assuming the data is from an unknown model, we derive the model averaging estimator and study its limiting distributions and related predictions while taking possible modeling biases into account. We propose a set of optimal weights to combine the individual estimators so that the expected mean squared error of the average estimator is minimized. Simulation studies are conducted to compare the performance of the estimator with that of the existing methods. The results show the benefits of the proposed approach over traditional model selection approaches as well as existing model averaging methods.
△ Less
Submitted 9 February, 2018;
originally announced February 2018.
-
A Large Dataset for Improving Patch Matching
Authors:
Rahul Mitra,
Nehal Doiphode,
Utkarsh Gautam,
Sanath Narayan,
Shuaib Ahmed,
Sharat Chandran,
Arjun Jain
Abstract:
We propose a new dataset for learning local image descriptors which can be used for significantly improved patch matching. Our proposed dataset consists of an order of magnitude more number of scenes, images, and positive and negative correspondences compared to the currently available Multi-View Stereo (MVS) dataset from Brown et al. The new dataset also has better coverage of the overall viewpoi…
▽ More
We propose a new dataset for learning local image descriptors which can be used for significantly improved patch matching. Our proposed dataset consists of an order of magnitude more number of scenes, images, and positive and negative correspondences compared to the currently available Multi-View Stereo (MVS) dataset from Brown et al. The new dataset also has better coverage of the overall viewpoint, scale, and lighting changes in comparison to the MVS dataset. Our dataset also provides supplementary information like RGB patches with scale and rotations values, and intrinsic and extrinsic camera parameters which as shown later can be used to customize training data as per application. We train an existing state-of-the-art model on our dataset and evaluate on publicly available benchmarks such as HPatches dataset and Strecha et al.\cite{strecha} to quantify the image descriptor performance. Experimental evaluations show that the descriptors trained using our proposed dataset outperform the current state-of-the-art descriptors trained on MVS by 8%, 4% and 10% on matching, verification and retrieval tasks respectively on the HPatches dataset. Similarly on the Strecha dataset, we see an improvement of 3-5% for the matching task in non-planar scenes.
△ Less
Submitted 17 April, 2018; v1 submitted 4 January, 2018;
originally announced January 2018.
-
A Generative Approach to Question Answering
Authors:
Rajarshee Mitra
Abstract:
Question Answering has come a long way from answer sentence selection, relational QA to reading and comprehension. We shift our attention to generative question answering (gQA) by which we facilitate machine to read passages and answer questions by learning to generate the answers. We frame the problem as a generative task where the encoder being a network that models the relationship between ques…
▽ More
Question Answering has come a long way from answer sentence selection, relational QA to reading and comprehension. We shift our attention to generative question answering (gQA) by which we facilitate machine to read passages and answer questions by learning to generate the answers. We frame the problem as a generative task where the encoder being a network that models the relationship between question and passage and encoding them to a vector thus facilitating the decoder to directly form an abstraction of the answer. Not being able to retain facts and making repetitions are common mistakes that affect the overall legibility of answers. To counter these issues, we employ copying mechanism and maintenance of coverage vector in our model respectively. Our results on MS-MARCO demonstrate it's superiority over baselines and we also show qualitative examples where we improved in terms of correctness and readability
△ Less
Submitted 7 July, 2018; v1 submitted 16 November, 2017;
originally announced November 2017.
-
A Bayesian Mixture Model for Clustering on the Stiefel Manifold
Authors:
Subhajit Sengupta,
Subhadip Pal,
Riten Mitra,
Ying Guo,
Arunava Banerjee,
Yuan Ji
Abstract:
Analysis of a Bayesian mixture model for the Matrix Langevin distribution on the Stiefel manifold is presented. The model exploits a particular parametrization of the Matrix Langevin distribution, various aspects of which are elaborated on. A general, and novel, family of conjugate priors, and an efficient Markov chain Monte Carlo (MCMC) sampling scheme for the corresponding posteriors is then dev…
▽ More
Analysis of a Bayesian mixture model for the Matrix Langevin distribution on the Stiefel manifold is presented. The model exploits a particular parametrization of the Matrix Langevin distribution, various aspects of which are elaborated on. A general, and novel, family of conjugate priors, and an efficient Markov chain Monte Carlo (MCMC) sampling scheme for the corresponding posteriors is then developed for the mixture model. Theoretical properties of the prior and posterior distributions, including posterior consistency, are explored in detail. Extensive simulation experiments are presented to validate the efficacy of the framework. Real-world examples, including a large scale neuroimaging dataset, are analyzed to demonstrate the computational tractability of the approach.
△ Less
Submitted 23 August, 2017;
originally announced August 2017.