-
FFT and Linear Convolution Implementation with Bit Slicing Multiplier: A Novel Approach
Authors:
Aravind Kumar N,
Hari Krishna S,
Anita Angeline A
Abstract:
This paper presents a comprehensive exploration of Fast Fourier Transform (FFT) and linear convolution implementations, integrating both conventional methods and novel approaches leveraging the Bit Slicing Multiplier (BSM) technique. The Bit Slicing Multiplier utilizes Look-Up Tables (LUTs) to execute bitwise operations in parallel, offering efficient arithmetic operations ideally suited for digit…
▽ More
This paper presents a comprehensive exploration of Fast Fourier Transform (FFT) and linear convolution implementations, integrating both conventional methods and novel approaches leveraging the Bit Slicing Multiplier (BSM) technique. The Bit Slicing Multiplier utilizes Look-Up Tables (LUTs) to execute bitwise operations in parallel, offering efficient arithmetic operations ideally suited for digital signal processing tasks. We extensively investigate the integration of BSM into FFT and linear convolution algorithms, emphasizing its advantages in terms of speed and resource utilization. Additionally, we introduce our own innovative ideas for FFT and convolution algorithms, contributing to the broader discourse on efficient signal processing techniques. Experimental validation of our implementations is conducted using Vivado, a leading FPGA synthesis and implementation tool. Comparative analysis demonstrates the superior performance of our BSM-enhanced approaches, showcasing their potential for real-time signal processing applications. This study not only advances the understanding of FFT and convolution implementations but also highlights the effectiveness of novel techniques like BSM in enhancing computational efficiency in FPGA-based systems.
△ Less
Submitted 25 April, 2024;
originally announced July 2024.
-
Left-Right model with radiative double seesaw mechanism
Authors:
Paulo Areyuna C.,
A. E. Cárcamo Hernández,
Vishnudath K. N.,
Sergey Kovalenko,
Roman Pasechnik,
Iván Schmidt
Abstract:
We propose an extended Left-Right symmetric model with an additional global symmetry $U(1)_X$, which after spontaneous symmetry breaking collapses to a residual subgroup $\mathbb{Z}_2$, ensuring that the light active neutrino masses are generated via a double seesaw mechanism at two loop level, with the Dirac submatrix arising at one loop. It also guarantees one loop level masses for the SM charge…
▽ More
We propose an extended Left-Right symmetric model with an additional global symmetry $U(1)_X$, which after spontaneous symmetry breaking collapses to a residual subgroup $\mathbb{Z}_2$, ensuring that the light active neutrino masses are generated via a double seesaw mechanism at two loop level, with the Dirac submatrix arising at one loop. It also guarantees one loop level masses for the SM charged fermions lighter than the top quark and protects Dark Matter (DM) candidates of the model. To the best of our knowledge our model has the first implementation of the radiative double seesaw mechanism with the Dirac submatrix generated at one loop level. We show that the model can successfully accommodate the observed pattern of SM fermion masses as well as mixings and is compatible with the constraints arising from the muon $g-2$ anomaly, neutrinoless double beta decay and DM.
△ Less
Submitted 2 June, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Scrutinizing Data from Sky: An Examination of Its Veracity in Area Based Traffic Contexts
Authors:
Yawar Ali,
Krishnan K N,
Debashis Ray Sarkar,
K. Ramachandra Rao,
Niladri Chatterjee,
Ashish Bhaskar
Abstract:
Traffic data collection has been an overwhelming task for researchers as well as authorities over the years. With the advancement in technology and introduction of various tools for processing and extracting traffic data the task has been made significantly convenient. Data from Sky (DFS) is one such tool, based on image processing and artificial intelligence (AI), that provides output for macrosc…
▽ More
Traffic data collection has been an overwhelming task for researchers as well as authorities over the years. With the advancement in technology and introduction of various tools for processing and extracting traffic data the task has been made significantly convenient. Data from Sky (DFS) is one such tool, based on image processing and artificial intelligence (AI), that provides output for macroscopic as well as microscopic variables of the traffic streams. The company claims to provide 98 to 100 percent accuracy on the data exported using DFS tool. The tool is widely used in developed countries where the traffic is homogenous and has lane-based movements. In this study, authors have checked the veracity of DFS tool in heterogenous and area-based traffic movement that is prevailing in most develo** countries. The validation is done using various methods using Classified Volume Count (CVC), Space Mean Speeds (SMS) of individual vehicle classes and microscopic trajectory of probe vehicle to verify DFS claim. The error for CVCs for each vehicle class present in the traffic stream is estimated. Mean Absolute Percentage Error (MAPE) values are calculated for average speeds of each vehicle class between manually and DFS extracted space mean speeds (SMSs), and the microscopic trajectories are validated using a GPS based tracker put on probe vehicles. The results are fairly accurate in the case of data taken from a bird eye view with least errors. The other configurations of data collection have some significant errors, that are majorly caused by the varied traffic composition, the view of camera angle, and the direction of traffic.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Phenomenology of 3-3-1 models with radiative inverse seesaw mechanism
Authors:
V. H. Binh,
Cesar Bonilla,
A. E. Cárcamo Hernández,
D. T. Huong,
Vishnudath K. N.,
H. N. Long,
P. N. Thu,
Iván Schmidt
Abstract:
We propose two models based on the $SU(3)_C \times SU(3)_L \times U(1)_X$ gauge symmetry, each incorporating distinct inverse seesaw mechanisms for generating neutrino masses at the radiative level. Therefore, neutrino masses are suppressed by the radiative nature of the mass generation mechanism, which occurs after the spontaneous breaking of the global lepton number symmetry. Both scenarios disc…
▽ More
We propose two models based on the $SU(3)_C \times SU(3)_L \times U(1)_X$ gauge symmetry, each incorporating distinct inverse seesaw mechanisms for generating neutrino masses at the radiative level. Therefore, neutrino masses are suppressed by the radiative nature of the mass generation mechanism, which occurs after the spontaneous breaking of the global lepton number symmetry. Both scenarios discussed here are characterized by the presence of vector-like charged leptons, which are involved in generating the masses of the Standard Model charged leptons. These additional vector-like fermions contribute to the anomalous magnetic moments of the electron and the muon. We perform a detailed analysis of the scalar sectors, show that these models can successfully accommodate the observed baryon asymmetry through resonant leptogenesis, and compute charged lepton flavor-violating decays, such as $μ\rightarrow e γ$. We discuss the constraints of the model arising from these processes and those associated the non-unitarity of the lepton mixing matrix.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
A common framework for fermion mass hierarchy, leptogenesis and dark matter
Authors:
Carolina Arbeláez,
A. E. Cárcamo Hernández,
Claudio Dib,
Patricio Escalona Contreras,
Vishnudath K. N.,
Alfonso Zerwekh
Abstract:
In this work, we explore an extension of the Standard Model designed to elucidate the fermion mass hierarchy, account for the dark matter relic abundance, and explain the observed matter-antimatter asymmetry in the universe. Beyond the Standard Model particle content, our model introduces additional scalars and fermions. Notably, the light active neutrinos and the first two generations of charged…
▽ More
In this work, we explore an extension of the Standard Model designed to elucidate the fermion mass hierarchy, account for the dark matter relic abundance, and explain the observed matter-antimatter asymmetry in the universe. Beyond the Standard Model particle content, our model introduces additional scalars and fermions. Notably, the light active neutrinos and the first two generations of charged fermions acquire masses at the one-loop level. The model accommodates successful low-scale leptogenesis, permitting the mass of the decaying heavy right-handed neutrino to be as low as 10 TeV. We conduct a detailed analysis of the dark matter phenomenology and explore various interesting phenomenological implications. These include charged lepton flavor violation, muon and electron anomalous magnetic moments, constraints arising from electroweak precision observables, and implications for collider experiments.
△ Less
Submitted 15 April, 2024; v1 submitted 9 April, 2024;
originally announced April 2024.
-
Neural category
Authors:
Neha Gupta,
Suhith K N
Abstract:
A neural code on $ n $ neurons is a collection of subsets of the set $ [n]=\{1,2,\dots,n\} $. Curto et al. \cite{curto2013neural} associated a ring $\mathcal{R}_{\mathcal{C}}$ (neural ring) to a neural code $\mathcal{C}$. A special class of ring homomorphisms between two neural rings, called neural ring homomorphism, was introduced by Curto and Youngs \cite{curto2020neural}. The main work in this…
▽ More
A neural code on $ n $ neurons is a collection of subsets of the set $ [n]=\{1,2,\dots,n\} $. Curto et al. \cite{curto2013neural} associated a ring $\mathcal{R}_{\mathcal{C}}$ (neural ring) to a neural code $\mathcal{C}$. A special class of ring homomorphisms between two neural rings, called neural ring homomorphism, was introduced by Curto and Youngs \cite{curto2020neural}. The main work in this paper comprises constructing two categories. First is the $\mathfrak{C}$ category, a subcategory of SETS consisting of neural codes and code maps. Second is the neural category $\mathfrak{N}$, a subcategory of \textit{Rngs} consisting of neural rings and neural ring homomorphisms. Then, the rest of the paper characterizes the properties of these two categories like initial and final objects, products, coproducts, limits, etc. Also, we show that these two categories are in dual equivalence.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Properties of graphs of neural codes
Authors:
Suhith K N,
Neha Gupta
Abstract:
A neural code on $ n $ neurons is a collection of subsets of the set $ [n]=\{1,2,\dots,n\} $. In this paper, we study some properties of graphs of neural codes. In particular, we study codeword containment graph (CCG) given by Chan et al. (SIAM J. on Dis. Math., 37(1):114-145,2017) and general relationship graph (GRG) given by Gross et al. (Adv. in App. Math., 95:65-95, 2018). We provide a suffici…
▽ More
A neural code on $ n $ neurons is a collection of subsets of the set $ [n]=\{1,2,\dots,n\} $. In this paper, we study some properties of graphs of neural codes. In particular, we study codeword containment graph (CCG) given by Chan et al. (SIAM J. on Dis. Math., 37(1):114-145,2017) and general relationship graph (GRG) given by Gross et al. (Adv. in App. Math., 95:65-95, 2018). We provide a sufficient condition for CCG to be connected. We also show that the connectedness and completeness of CCG are preserved under surjective morphisms between neural codes defined by A. Jeffs (SIAM J. on App. Alg. and Geo., 4(1):99-122,2020). Further, we show that if CCG of any neural code $\mathcal{C}$ is complete with $|\mathcal{C}|=m$, then $\mathcal{C} \cong \{\emptyset,1,12,\dots,123\cdots m\}$ as neural codes. We also prove that a code whose CCG is complete is open convex. Later, we show that if a code $\mathcal{C}$ with $|\mathcal{C}|>3$ has its CCG to be connected 2-regular then $|\mathcal{C}| $ is even. The GRG was defined only for degree two neural codes using the canonical forms of its neural ideal. We first define GRG for any neural code. Then, we show the behaviour of GRGs under the various elementary code maps. At last, we compare these two graphs for certain classes of codes and see their properties.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
SOFIM: Stochastic Optimization Using Regularized Fisher Information Matrix
Authors:
Mrinmay Sen,
A. K. Qin,
Gayathri C,
Raghu Kishore N,
Yen-Wei Chen,
Balasubramanian Raman
Abstract:
This paper introduces a new stochastic optimization method based on the regularized Fisher information matrix (FIM), named SOFIM, which can efficiently utilize the FIM to approximate the Hessian matrix for finding Newton's gradient update in large-scale stochastic optimization of machine learning models. It can be viewed as a variant of natural gradient descent, where the challenge of storing and…
▽ More
This paper introduces a new stochastic optimization method based on the regularized Fisher information matrix (FIM), named SOFIM, which can efficiently utilize the FIM to approximate the Hessian matrix for finding Newton's gradient update in large-scale stochastic optimization of machine learning models. It can be viewed as a variant of natural gradient descent, where the challenge of storing and calculating the full FIM is addressed through making use of the regularized FIM and directly finding the gradient update direction via Sherman-Morrison matrix inversion. Additionally, like the popular Adam method, SOFIM uses the first moment of the gradient to address the issue of non-stationary objectives across mini-batches due to heterogeneous data. The utilization of the regularized FIM and Sherman-Morrison matrix inversion leads to the improved convergence rate with the same space and time complexities as stochastic gradient descent (SGD) with momentum. The extensive experiments on training deep learning models using several benchmark image classification datasets demonstrate that the proposed SOFIM outperforms SGD with momentum and several state-of-the-art Newton optimization methods in term of the convergence speed for achieving the pre-specified objectives of training and test losses as well as test accuracy.
△ Less
Submitted 1 May, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
Novel Instabilities in Counter-Streaming Nonabelian Fluids
Authors:
Subramanya Bhat K N,
Amita Das,
V Ravishankar,
Bhooshan Paradkar
Abstract:
The dynamics of strongly interacting particles are governed by Yang-Mills (Y-M) theory, which is a natural generalization of Maxwell Electrodynamics (ED). Its quantized version is known as quantum chromodynamics (QCD) and has been very well studied. Classical Y-M theory is proving to be equally interesting because of the central role it plays in describing the physics of quark-gluon plasma (QGP)-w…
▽ More
The dynamics of strongly interacting particles are governed by Yang-Mills (Y-M) theory, which is a natural generalization of Maxwell Electrodynamics (ED). Its quantized version is known as quantum chromodynamics (QCD) and has been very well studied. Classical Y-M theory is proving to be equally interesting because of the central role it plays in describing the physics of quark-gluon plasma (QGP)-which was prevalent in the early universe and is also produced in relativistic heavy ion collision experiments. This calls for a systematic study of classical Y-M theories. A good insight into classical Y-M dynamics would be best obtained by comparing and contrasting the Y-M results with their ED counterparts. In this article, a beginning has been made by considering streaming instabilities in Y-M fluids. We find that in addition to analogues of ED instabilities, novel nonabelian modes arise, reflecting the inherent nonabelian nature of the interaction. The new modes exhibit propagation/ growth, with growth rates that can be larger than what we find in ED. Interestingly, we also find a mode that propagates without getting affected by the medium.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Thomson scattering diagnostics at the Globus M2 tokamak
Authors:
Zhiltsov N. S.,
Kurskiev G. S.,
Tolstyakov S. Yu.,
Solovey V. A.,
Koval A. N.,
Aleksandrov S. E.,
Bazhenov A. N.,
Chernakov P. V.,
Filippov S. V.,
Gusev V. K.,
Khromov N. A.,
Kiselev E. O.,
Kornev A. F.,
Krikunov S. V.,
Makarov A. M.,
Minaev V. B.,
Miroshnikov I. V.,
Mukhin E. E.,
Novokhatsky A. N.,
Patrov M. I.,
Petrov Yu. V.,
Sakharov N. V.,
Schegolev. P. B.,
Telnova A. Yu.,
Tkachenko E. E.
, et al. (3 additional authors not shown)
Abstract:
The paper is devoted to the Thomson scattering (TS) diagnostics recently developed for the Globus-M2 spherical tokamak and prototy** the ITER divertor TS diagnostics. The distinctive features of the system are the use of spectrometers, acquisition system and lasers that meet the base requirements for ITER TS diagnostics. The paper describes the diagnostic system that allows precise measurements…
▽ More
The paper is devoted to the Thomson scattering (TS) diagnostics recently developed for the Globus-M2 spherical tokamak and prototy** the ITER divertor TS diagnostics. The distinctive features of the system are the use of spectrometers, acquisition system and lasers that meet the base requirements for ITER TS diagnostics. The paper describes the diagnostic system that allows precise measurements of TS signals, as well as the results of the first measurements of electron temperature and density in both central region of the plasma column and scrape-off layer. The system provides measurements of electron temperature $T_{e}$ in the range of 5 eV to 5 keV and density $n_{e}$ in the range of $5{\cdot}10^{17}÷3.25{\cdot}10^{20} m^{-3}$. The use of two ITER-grade probing lasers of different wavelengths (Nd:YAG 1064.5 nm and Nd:YLF 1047.3 nm) allows reliable measurement of $T_{e}$ in multi-colour mode, i.e., assuming that spectral calibration is unknown.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
A Comprehensive Review of Leap Motion Controller-based Hand Gesture Datasets
Authors:
Bharatesh Chakravarthi,
Prabhu Prasad B M,
Pavan Kumar B N
Abstract:
This paper comprehensively reviews hand gesture datasets based on Ultraleap's leap motion controller, a popular device for capturing and tracking hand gestures in real-time. The aim is to offer researchers and practitioners a valuable resource for develo** and evaluating gesture recognition algorithms. The review compares various datasets found in the literature, considering factors such as targ…
▽ More
This paper comprehensively reviews hand gesture datasets based on Ultraleap's leap motion controller, a popular device for capturing and tracking hand gestures in real-time. The aim is to offer researchers and practitioners a valuable resource for develo** and evaluating gesture recognition algorithms. The review compares various datasets found in the literature, considering factors such as target domain, dataset size, gesture diversity, subject numbers, and data modality. The strengths and limitations of each dataset are discussed, along with the applications and research areas in which they have been utilized. An experimental evaluation of the leap motion controller 2 device is conducted to assess its capabilities in generating gesture data for various applications, specifically focusing on touchless interactive systems and virtual reality. This review serves as a roadmap for researchers, aiding them in selecting appropriate datasets for their specific gesture recognition tasks and advancing the field of hand gesture recognition using leap motion controller technology.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Neural ring homomorphism preserves mandatory sets required for open convexity
Authors:
Neha Gupta,
Suhith K N
Abstract:
It has been studied by Curto et al. (SIAM J. on App. Alg. and Geom., 1(1) : 222 $\unicode{x2013}$ 238, 2017) that a neural code that has an open convex realization does not have any local obstruction relative to the neural code. Further, a neural code $ \mathcal{C} $ has no local obstructions if and only if it contains the set of mandatory codewords, $ \mathcal{C}_{\min}(Δ),$ which depends only on…
▽ More
It has been studied by Curto et al. (SIAM J. on App. Alg. and Geom., 1(1) : 222 $\unicode{x2013}$ 238, 2017) that a neural code that has an open convex realization does not have any local obstruction relative to the neural code. Further, a neural code $ \mathcal{C} $ has no local obstructions if and only if it contains the set of mandatory codewords, $ \mathcal{C}_{\min}(Δ),$ which depends only on the simplicial complex $Δ=Δ(\mathcal{C})$. Thus if $\mathcal{C} \not \supseteq \mathcal{C}_{\min}(Δ)$, then $\mathcal{C}$ cannot be open convex. However, the problem of constructing $ \mathcal{C}_{\min}(Δ) $ for any given code $ \mathcal{C} $ is undecidable. There is yet another way to capture the local obstructions via the homological mandatory set, $ \mathcal{M}_H(Δ). $ The significance of $ \mathcal{M}_H(Δ) $ for a given code $ \mathcal{C} $ is that $ \mathcal{M}_H(Δ) \subseteq \mathcal{C}_{\min}(Δ)$ and so $ \mathcal{C} $ will have local obstructions if $ \mathcal{C}\not\supseteq\mathcal{M}_H(Δ). $ In this paper we study the affect on the sets $\mathcal{C}_{\min}(Δ) $ and $\mathcal{M}_H(Δ)$ under the action of various surjective elementary code maps. Further, we study the relationship between Stanley-Reisner rings of the simplicial complexes associated with neural codes of the elementary code maps. Moreover, using this relationship, we give an alternative proof to show that $ \mathcal{M}_H(Δ) $ is preserved under the elementary code maps.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Low-ionization iron-rich Broad Absorption-Line Quasar SDSS J1652+2650: Physical conditions in the ejected gas from excited FeII and metastable HeI
Authors:
Balashev S. A.,
Ledoux C.,
Noterdaeme P.,
Boissé P.,
Krogager J. K.,
López S.,
Telikova K. N
Abstract:
We present high-resolution VLT/UVES spectroscopy and a detailed analysis of the unique Broad Absorption-Line system towards the quasar SDSS J165252.67+265001.96. This system exhibits low-ionization metal absorption lines from the ground states and excited energy levels of Fe II and Mn II, and the meta-stable 2^3S excited state of He I. The extended kinematics of the absorber encompasses three main…
▽ More
We present high-resolution VLT/UVES spectroscopy and a detailed analysis of the unique Broad Absorption-Line system towards the quasar SDSS J165252.67+265001.96. This system exhibits low-ionization metal absorption lines from the ground states and excited energy levels of Fe II and Mn II, and the meta-stable 2^3S excited state of He I. The extended kinematics of the absorber encompasses three main clumps with velocity offsets of -5680, -4550, and -1770 km s$^{-1}$ from the quasar emission redshift, $z=0.3509\pm0.0003$, derived from [O II] emission. Each clump shows moderate partial covering of the background continuum source, $C_f \approx [0.53; 0.24; 0.81]$. We discuss the excitation mechanisms at play in the gas, which we use to constrain the distance of the clouds from the Active Galactic Nucleus (AGN) as well as the density, temperature, and typical sizes of the clouds. The number density is found to be $n_{\rm H} \sim 10^4\rm cm^{-3}$ and the temperature $T_e \sim 10^4\rm\,K$, with longitudinal cloudlet sizes of $\gtrsim0.01$ pc. Cloudy photo-ionization modelling of He I$^{*}$, which is also produced at the interface between the neutral and ionized phases, assuming the number densities derived from Fe II, constrains the ionization parameter to be $\log U \sim -3$. This corresponds to distances of a few 100 pc from the AGN. We discuss these results in the more general context of associated absorption-line systems and propose a connection between FeLoBALs and the recently-identified molecular-rich intrinsic absorbers. Studies of significant samples of FeLoBALs, even though rare per se, will soon be possible thanks to large dedicated surveys paired with high-resolution spectroscopic follow-ups.
△ Less
Submitted 26 July, 2023; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Linear seesaw mechanism from dark sector
Authors:
A. E. Cárcamo Hernández,
Vishnudath K. N.,
José W. F. Valle
Abstract:
We propose a minimal model where a dark sector seeds neutrino mass generation radiatively within the linear seesaw mechanism. Neutrino masses are calculable, since tree-level contributions are forbidden by symmetry. They arise from spontaneous lepton number violation by a small Higgs triplet vacuum expectation value. Lepton flavour violating processes e.g. $μ\to eγ$ can be sizeable, despite the ti…
▽ More
We propose a minimal model where a dark sector seeds neutrino mass generation radiatively within the linear seesaw mechanism. Neutrino masses are calculable, since tree-level contributions are forbidden by symmetry. They arise from spontaneous lepton number violation by a small Higgs triplet vacuum expectation value. Lepton flavour violating processes e.g. $μ\to eγ$ can be sizeable, despite the tiny neutrino masses. We comment also on dark-matter and collider implications.
△ Less
Submitted 10 September, 2023; v1 submitted 3 May, 2023;
originally announced May 2023.
-
Gravitational waves from a scotogenic two-loop neutrino mass model
Authors:
Cesar Bonilla,
A. E. Cárcamo Hernández,
João Gonçalves,
Vishnudath K. N.,
António P. Morais,
Roman Pasechnik
Abstract:
We propose a framework to account for neutrino masses at the two-loop level. This mechanism introduces new scalars and Majorana fermions to the Standard Model. It is assumed the existence of a global $\mathrm{U(1)\times \mathcal{Z}_2}$ symmetry which after partial breaking provides the stability of the dark matter candidates of the theory. The rich structure of the potential allows for the possibi…
▽ More
We propose a framework to account for neutrino masses at the two-loop level. This mechanism introduces new scalars and Majorana fermions to the Standard Model. It is assumed the existence of a global $\mathrm{U(1)\times \mathcal{Z}_2}$ symmetry which after partial breaking provides the stability of the dark matter candidates of the theory. The rich structure of the potential allows for the possibility of first-order phase transitions (FOPTs) in the early Universe which can lead to the generation of primordial gravitational waves as one of the potentially observable signatures of this model. Taking into account relevant constraints from lepton flavour violation, neutrino physics as well as the trilinear Higgs couplings at next-to-leading order accuracy, we have found a wide range of possible FOPTs which are strong enough to be probed at the proposed gravitational-wave interferometer experiments such as LISA.
△ Less
Submitted 7 May, 2024; v1 submitted 3 May, 2023;
originally announced May 2023.
-
Parameterizing Path Partitions
Authors:
Henning Fernau,
Florent Foucaud,
Kevin Mann,
Utkarsh Padariya,
Rajath Rao K. N
Abstract:
We study the algorithmic complexity of partitioning the vertex set of a given (di)graph into a small number of paths. The Path Partition problem (PP) has been studied extensively, as it includes Hamiltonian Path as a special case. The natural variants where the paths are required to be either \emph{induced} (Induced Path Partition, IPP) or \emph{shortest} (Shortest Path Partition, SPP), have recei…
▽ More
We study the algorithmic complexity of partitioning the vertex set of a given (di)graph into a small number of paths. The Path Partition problem (PP) has been studied extensively, as it includes Hamiltonian Path as a special case. The natural variants where the paths are required to be either \emph{induced} (Induced Path Partition, IPP) or \emph{shortest} (Shortest Path Partition, SPP), have received much less attention. Both problems are known to be NP-complete on undirected graphs; we strengthen this by showing that they remain so even on planar bipartite directed acyclic graphs (DAGs), and that SPP remains \NP-hard on undirected bipartite graphs. When parameterized by the natural parameter ``number of paths'', both SPP and IPP are shown to be W{1}-hard on DAGs. We also show that SPP is in \XP both for DAGs and undirected graphs for the same parameter, as well as for other special subclasses of directed graphs (IPP is known to be NP-hard on undirected graphs, even for two paths). On the positive side, we show that for undirected graphs, both problems are in FPT, parameterized by neighborhood diversity. We also give an explicit algorithm for the vertex cover parameterization of PP. When considering the dual parameterization (graph order minus number of paths), all three variants, IPP, SPP and PP, are shown to be in FPT for undirected graphs. We also lift the mentioned neighborhood diversity and dual parameterization results to directed graphs; here, we need to define a proper novel notion of directed neighborhood diversity. As we also show, most of our results also transfer to the case of covering by edge-disjoint paths, and purely covering.
△ Less
Submitted 2 September, 2023; v1 submitted 22 December, 2022;
originally announced December 2022.
-
A novel four-field mixed variational approach to Kirchhoff rods implemented with finite element exterior calculus
Authors:
Jamun Kumar N,
Bensingh Dhas,
Arun R Srinivasa,
J N Reddy,
Debasish Roy
Abstract:
A four-field mixed variational principle is proposed for large deformation analysis of Kirchhoff rods with a $C^0$ mixed FE approximations. The core idea behind the approach is to introduce a one-parameter family of points (the centerline) and a separate one-parameter family of orthonormal frames (the Cartan moving frame) that are specified independently. The curvature and torsion of the curve are…
▽ More
A four-field mixed variational principle is proposed for large deformation analysis of Kirchhoff rods with a $C^0$ mixed FE approximations. The core idea behind the approach is to introduce a one-parameter family of points (the centerline) and a separate one-parameter family of orthonormal frames (the Cartan moving frame) that are specified independently. The curvature and torsion of the curve are related to the relative rotation of neighboring frames. The relationship between the frame and the centerline is then enforced at the solution step using a Lagrange multiplier (which plays the role of section force). Well known frames like the Frenet-Serret are defined only using the centerline, which demands higher-order smoothness for the centerline approximation. Decoupling the frame from the position vector of the base curve leads to a description of torsion and curvature that is independent of the position information, thus allowing for simpler interpolations. This approach is then cast in the language of exterior calculus. In this framework, the strain energy may be interpreted as a differential form leading to the natural force-displacement (velocity) pairing. The four-field mixed variational principle we propose has frame, differential forms, and position vector as input arguments. While the position vector is interpolated linearly, the frames are interpolated as piecewise geodesics on the rotation group. Similarly, consistent interpolation schemes are also adopted to obtain finite dimensional approximations for other differential forms aswell. Using these discrete approximations, a discrete mixed variational principle is laid out which is then numerically extremized. The discrete approximation is then applied to benchmark problems, our numerical studies reveal an impressive performance of the proposed method without numerical instabilities or locking.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
Leptogenesis and eV scale sterile neutrino
Authors:
Srubabati Goswami,
Vishnudath K. N.,
Ananya Mukherjee,
Nimmala Narendra
Abstract:
We consider the minimal extended seesaw model which can accommodate an eV scale sterile neutrino. The scenario also includes three heavy right handed neutrinos in addition to the light sterile neutrino. In this model, the active-sterile mixing act as non-unitary parameters. If the values of these mixing angles are of $\mathcal{O}(0.1)$, the model introduces deviation of the PMNS matrix from unitar…
▽ More
We consider the minimal extended seesaw model which can accommodate an eV scale sterile neutrino. The scenario also includes three heavy right handed neutrinos in addition to the light sterile neutrino. In this model, the active-sterile mixing act as non-unitary parameters. If the values of these mixing angles are of $\mathcal{O}(0.1)$, the model introduces deviation of the PMNS matrix from unitarity to this order. We find that the oscillation data from various experiments imposes an upper bound on the lightest heavy neutrino mass scale as $\sim 10^{11}$ GeV in the context of this model. We study {\it vanilla} leptogenesis in this scheme, where the decay of the heavy right handed neutrinos in the early universe can give rise to the observed baryon asymmetry. Here, even though the eV scale sterile neutrino does not participate directly in leptogenesis, its effect is manifested through the non-unitary effects. We find that the parameter space that can give rise to successful leptogenesis is constrained by the bounds on the active-sterile mixing as obtained from the global analysis.
△ Less
Submitted 7 May, 2022; v1 submitted 29 November, 2021;
originally announced November 2021.
-
MODC: Resilience for disaggregated memory architectures using task-based programming
Authors:
Kimberly Keeton,
Sharad Singhal,
Haris Volos,
Yupu Zhang,
Ramesh Chandra Chaurasiya,
Clarete Riana Crasta,
Sherin T George,
Nagaraju K N,
Mashood Abdulla K,
Kavitha Natarajan,
Porno Shome,
Sanish Suresh
Abstract:
Disaggregated memory architectures provide benefits to applications beyond traditional scale out environments, such as independent scaling of compute and memory resources. They also provide an independent failure model, where computations or the compute nodes they run on may fail independently of the disaggregated memory; thus, data that's resident in the disaggregated memory is unaffected by the…
▽ More
Disaggregated memory architectures provide benefits to applications beyond traditional scale out environments, such as independent scaling of compute and memory resources. They also provide an independent failure model, where computations or the compute nodes they run on may fail independently of the disaggregated memory; thus, data that's resident in the disaggregated memory is unaffected by the compute failure. Blind application of traditional techniques for resilience (e.g., checkpoints or data replication) does not take advantage of these architectures. To demonstrate the potential benefit of these architectures for resilience, we develop Memory-Oriented Distributed Computing (MODC), a framework for programming disaggregated architectures that borrows and adapts ideas from task-based programming models, concurrent programming techniques, and lock-free data structures. This framework includes a task-based application programming model and a runtime system that provides scheduling, coordination, and fault tolerance mechanisms. We present highlights of our MODC prototype and experimental results demonstrating that MODC-style resilience outperforms a checkpoint-based approach in the face of failures.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Multilingual Speech Recognition for Low-Resource Indian Languages using Multi-Task conformer
Authors:
Krishna D N
Abstract:
Transformers have recently become very popular for sequence-to-sequence applications such as machine translation and speech recognition. In this work, we propose a multi-task learning-based transformer model for low-resource multilingual speech recognition for Indian languages. Our proposed model consists of a conformer [1] encoder and two parallel transformer decoders. We use a phoneme decoder (P…
▽ More
Transformers have recently become very popular for sequence-to-sequence applications such as machine translation and speech recognition. In this work, we propose a multi-task learning-based transformer model for low-resource multilingual speech recognition for Indian languages. Our proposed model consists of a conformer [1] encoder and two parallel transformer decoders. We use a phoneme decoder (PHN-DEC) for the phoneme recognition task and a grapheme decoder (GRP-DEC) to predict grapheme sequence. We consider the phoneme recognition task as an auxiliary task for our multi-task learning framework. We jointly optimize the network for both phoneme and grapheme recognition tasks using Joint CTC-Attention [2] training. We use a conditional decoding scheme to inject the language information into the model before predicting the grapheme sequence. Our experiments show that our proposed approach can obtain significant improvement over previous approaches [4]. We also show that our conformer-based dual-decoder approach outperforms both the transformer-based dual-decoder approach and single decoder approach. Finally, We compare monolingual ASR models with our proposed multilingual ASR approach.
△ Less
Submitted 10 September, 2021; v1 submitted 22 August, 2021;
originally announced September 2021.
-
A Dual-Decoder Conformer for Multilingual Speech Recognition
Authors:
Krishna D N
Abstract:
Transformer-based models have recently become very popular for sequence-to-sequence applications such as machine translation and speech recognition. This work proposes a dual-decoder transformer model for low-resource multilingual speech recognition for Indian languages. Our proposed model consists of a Conformer [1] encoder, two parallel transformer decoders, and a language classifier. We use a p…
▽ More
Transformer-based models have recently become very popular for sequence-to-sequence applications such as machine translation and speech recognition. This work proposes a dual-decoder transformer model for low-resource multilingual speech recognition for Indian languages. Our proposed model consists of a Conformer [1] encoder, two parallel transformer decoders, and a language classifier. We use a phoneme decoder (PHN-DEC) for the phoneme recognition task and a grapheme decoder (GRP-DEC) to predict grapheme sequence along with language information. We consider phoneme recognition and language identification as auxiliary tasks in the multi-task learning framework. We jointly optimize the network for phoneme recognition, grapheme recognition, and language identification tasks with Joint CTC-Attention [2] training. Our experiments show that we can obtain a significant reduction in WER over the baseline approaches. We also show that our dual-decoder approach obtains significant improvement over the single decoder approach.
△ Less
Submitted 22 August, 2021;
originally announced September 2021.
-
A mixed variational principle in nonlinear elasticity using Cartan's moving frame and implementation with finite element exterior calculus
Authors:
Bensingh Dhas,
Jamun Kumar N,
Debasish Roy,
J N Reddy
Abstract:
This article offers a new perspective for the mechanics of solids using moving Cartan's frame, specifically discussing a mixed variational principle in non-linear elasticity. We treat quantities defined on the co-tangent bundles of reference and deformed configurations as additional unknowns. Such a treatment invites compatibility of the fields with base-space (configurations of the body), so that…
▽ More
This article offers a new perspective for the mechanics of solids using moving Cartan's frame, specifically discussing a mixed variational principle in non-linear elasticity. We treat quantities defined on the co-tangent bundles of reference and deformed configurations as additional unknowns. Such a treatment invites compatibility of the fields with base-space (configurations of the body), so that the configuration can be realised as a subset of the Euclidean space. We first rewrite the metric and connection using differential forms, which are further utilised to write the deformation gradient and Cauchy-Green deformation tensor in terms of frame and co-frame fields. The geometric understanding of stress as a co-vector valued 2-form fits squarely within our overall program. We show that, for a hyperelastic solid, an equation similar to the Doyle-Erciksen formula may be written for the co-vector part of stress. Using these, we write a mixed energy functional in terms of differential forms, whose extremum leads to the compatibility of deformation, constitutive rules and equations of equilibrium. Finite element exterior calculus is then utilised to construct a finite dimensional approximation for the differential forms appearing in the variational principle. These approximations are then used to construct a discrete functional which is then numerically extremised. This discertization leads to a mixed method as it uses independent approximations for differential forms related to stress and deformation gradient. The mixed variational principle is then specialized for 2D case, whose discrete approximation is applied to problems in nonlinear elasticity. An important feature of our FE technique is the lack of additional stabilization. From the numerical study, it is found that the present discretization also does not suffer form locking and related convergence issues.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Using Large Pre-Trained Models with Cross-Modal Attention for Multi-Modal Emotion Recognition
Authors:
Krishna D N
Abstract:
Recently, self-supervised pre-training has shown significant improvements in many areas of machine learning, including speech and NLP. We propose using large self-supervised pre-trained models for both audio and text modality with cross-modality attention for multimodal emotion recognition. We use Wav2Vec2.0 [1] as an audio encoder base for robust speech features extraction and the BERT model [2]…
▽ More
Recently, self-supervised pre-training has shown significant improvements in many areas of machine learning, including speech and NLP. We propose using large self-supervised pre-trained models for both audio and text modality with cross-modality attention for multimodal emotion recognition. We use Wav2Vec2.0 [1] as an audio encoder base for robust speech features extraction and the BERT model [2] as a text encoder base for better contextual representation of text. These high capacity models trained on large amounts of unlabeled data contain rich feature representations and improve the downstream task's performance. We use the cross-modal attention [3] mechanism to learn alignment between audio and text representations from self-supervised models. Cross-modal attention also helps in extracting interactive information between audio and text features. We obtain utterance-level feature representation from frame-level features using statistics pooling for both audio and text modality and combine them using the early fusion technique. Our experiments show that the proposed approach obtains a 1.88% absolute improvement in accuracy compared to the previous state-of-the-art method [3] on the IEMOCAP dataset [35]. We also conduct unimodal experiments for both audio and text modalities and compare them with previous best methods.
△ Less
Submitted 22 August, 2021;
originally announced August 2021.
-
Neural Codes and Neural ring endomorphisms
Authors:
Neha Gupta,
Suhith K N
Abstract:
We investigate combinatorial, topological and algebraic properties of certain classes of neural codes. We look into a conjecture that states if the minimal \textit{open convex} embedding dimension of a neural code is two then its minimal \textit{convex} embedding dimension is also two. We prove the conjecture for two interesting classes of examples and provide a counterexample for the converse of…
▽ More
We investigate combinatorial, topological and algebraic properties of certain classes of neural codes. We look into a conjecture that states if the minimal \textit{open convex} embedding dimension of a neural code is two then its minimal \textit{convex} embedding dimension is also two. We prove the conjecture for two interesting classes of examples and provide a counterexample for the converse of the conjecture. We introduce a new class of neural codes, \textit{Doublet maximal}. We show that a Doublet maximal code is open convex if and only if it is max-intersection complete. We prove that surjective neural ring homomorphisms preserve max-intersection complete property. We introduce another class of neural codes, \textit{Circulant codes}. We give the count of neural ring endomorphisms for several sub-classes of this class.
△ Less
Submitted 20 September, 2023; v1 submitted 11 June, 2021;
originally announced June 2021.
-
Freeze-in production of sterile neutrino dark matter in a gauged U$(1)^\prime$ model with inverse seesaw
Authors:
Arindam Das,
Srubabati Goswami,
Vishnudath K. N.,
Tanmay Kumar Poddar
Abstract:
We consider a general, anomaly free U$(1)^\prime$ extension of the Standard Model (SM) where the neutrino mass is generated at the tree level via the inverse seesaw mechanism. The model contains three right handed neutrinos, three additional singlet fermions, one extra complex scalar and a neutral gauge boson $(Z^\prime)$. Instead of resorting to a specific $U(1)$ extension, we consider a class of…
▽ More
We consider a general, anomaly free U$(1)^\prime$ extension of the Standard Model (SM) where the neutrino mass is generated at the tree level via the inverse seesaw mechanism. The model contains three right handed neutrinos, three additional singlet fermions, one extra complex scalar and a neutral gauge boson $(Z^\prime)$. Instead of resorting to a specific $U(1)$ extension, we consider a class of models by taking the $U(1)^\prime$ charges of the scalars to be free parameters. Here, we assign one pair of the pseudo-Dirac degenerate sterile neutrinos as Dark Matter (DM) candidates which are produced by the freeze-in mechanism. Considering different mass regimes of the DM, $Z^\prime$ and reheating temperature, we obtain constraints on the $U(1)^\prime$ charges giving the correct relic abundance. We have also obtained constraints on $Z^\prime$ mass and coupling from consideration of relic density as well as high energy collider experiments like ATLAS in case of heavy $Z^\prime$ or in intensity and lifetime frontier experiments like DUNE, FASERs, and ILC beam dump which are looking for light $Z^\prime$. Additionally, in this model, the decay of pseudo-Dirac DM into active neutrinos can explain the 511 keV line observed by the INTEGRAL satellite.
△ Less
Submitted 1 July, 2024; v1 submitted 28 April, 2021;
originally announced April 2021.
-
End-to-End Language Identification using Multi-Head Self-Attention and 1D Convolutional Neural Networks
Authors:
Krishna D N,
Ankita Patil
Abstract:
In this work, we propose a new approach for language identification using multi-head self-attention combined with raw waveform based 1D convolutional neural networks for Indian languages. Our approach uses an encoder, multi-head selfattention, and a statistics pooling layer. The encoder learns features directly from raw waveforms using 1D convolution kernels and an LSTM layer. The LSTM layer captu…
▽ More
In this work, we propose a new approach for language identification using multi-head self-attention combined with raw waveform based 1D convolutional neural networks for Indian languages. Our approach uses an encoder, multi-head selfattention, and a statistics pooling layer. The encoder learns features directly from raw waveforms using 1D convolution kernels and an LSTM layer. The LSTM layer captures temporal information between the features extracted by the 1D convolutional layer. The multi-head self-attention layer takes outputs of the LSTM layer and applies self-attention mechanisms on these features with M different heads. This process helps the model give more weightage to the more useful features and less weightage to the less relevant features. Finally, the frame-level features are combined using a statistics pooling layer to extract the utterance-level feature vector label prediction. We conduct all our experiments on the 373 hrs of audio data for eight different Indian languages. Our experiments show that our approach outperforms the baseline model by an absolute 3.69% improvement in F1-score and achieves the best F1-score of 95.90%. Our approach also shows that using raw waveform models gets a 1.7% improvement in performance compared to the models built using handcrafted features.
△ Less
Submitted 30 January, 2021;
originally announced February 2021.
-
Low Energy Constraints From Absolute Neutrino Mass Observables and Lepton Flavor Violation in Left-Right Symmetric Model
Authors:
Srubabati Goswami,
Vishnudath K N
Abstract:
We have studied the correlations among the three absolute neutrino mass observables - the effective Majorana mass ($m_{ee}$) which can be obtained from neutrinoless double beta decay, the electron neutrino mass ($m_β$) which is measured in single beta decay experiments and the sum of the light neutrino masses ($Σ$) which is constrained from cosmological observations, in the context of minimal left…
▽ More
We have studied the correlations among the three absolute neutrino mass observables - the effective Majorana mass ($m_{ee}$) which can be obtained from neutrinoless double beta decay, the electron neutrino mass ($m_β$) which is measured in single beta decay experiments and the sum of the light neutrino masses ($Σ$) which is constrained from cosmological observations, in the context of minimal left-right symmetric model. Two phenomenologically interesting cases of type-I seesaw dominance as well as type-II seesaw dominance have been considered. We have taken into account the independent constraints coming from lepton flavor violation, single $β$ decay, cosmology and neutrinoless double beta decay and have determined the combined allowed parameter space that can be probed in the future experiments. We have also analyzed the correlations and tensions between the different mass variables. In addition, the constraints on the masses of the heavy particles coming from lepton flavor violation and the bounds on three absolute neutrino mass observables are also determined. We show that these constraints can rule out some of the parameter space which are not probed by the collider experiments.
△ Less
Submitted 24 March, 2021; v1 submitted 12 November, 2020;
originally announced November 2020.
-
Multi-Modal Transformers Utterance-Level Code-Switching Detection
Authors:
Krishna D N
Abstract:
An utterance that contains speech from multiple languages is known as a code-switched sentence. In this work, we propose a novel technique to predict whether given audio is mono-lingual or code-switched. We propose a multi-modal learning approach by utilising the phoneme information along with audio features for code-switch detection. Our model consists of a Phoneme Network that processes phoneme…
▽ More
An utterance that contains speech from multiple languages is known as a code-switched sentence. In this work, we propose a novel technique to predict whether given audio is mono-lingual or code-switched. We propose a multi-modal learning approach by utilising the phoneme information along with audio features for code-switch detection. Our model consists of a Phoneme Network that processes phoneme sequence and Audio Network(AN), which processes the mfcc features. We fuse representation learned from both the Networks to predict if the utterance is code-switched or not. The Audio Network and Phonetic Network consist of initial convolution, Bi-LSTM, and transformer encoder layers. The transformer encoder layer helps in selecting important and relevant features for better classification by using self-attention. We show that utilising the phoneme sequence of the utterance along with the mfcc features improves the performance of code-switch detection significantly. We train and evaluate our model on Microsoft code-switching challenge datasets for Telugu, Tamil, and Gujarati languages. Our experiments show that the multi-modal learning approach significantly improved accuracy over the uni-modal approaches for Telugu-English, Gujarati-English, and Tamil-English datasets. We also study the system performance using different neural layers and show that the transformers help obtain better performance.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
Prediction of Reduced Glass Transition Temperature using Machine Learning
Authors:
Akash Ravi,
Prakash P,
Kailashnath N
Abstract:
The advent of computational material sciences has paved the way for data-driven approaches for modeling and fabrication of materials. The prediction of properties like the glass-forming ability (GFA) by using the variation in alloy composition remains to be a challenging problem in the field of material sciences. It also results in significant financial concerns for the manufacturing industry. Des…
▽ More
The advent of computational material sciences has paved the way for data-driven approaches for modeling and fabrication of materials. The prediction of properties like the glass-forming ability (GFA) by using the variation in alloy composition remains to be a challenging problem in the field of material sciences. It also results in significant financial concerns for the manufacturing industry. Despite the existence of various empirical guides for the prediction of GFA, a comprehensive prediction model is still highly desirable. This work focuses on studying some of the popular machine learning algorithms for the prediction of the reduced glass transition temperature (Trg) of material compositions. From the experimentation, we conclude that the ensemble model performs better for predicting Trg. This result can prove instrumental in the branch of material sciences by hel** us to develop materials having remarkable properties.
△ Less
Submitted 23 April, 2020;
originally announced May 2020.
-
Development of Automatic Speech Recognition for Kazakh Language using Transfer Learning
Authors:
Amirgaliyev E. N.,
Kuanyshbay D. N.,
Baimuratov O
Abstract:
Development of Automatic Speech Recognition system for Kazakh language is very challenging due to a lack of data.Existing data of kazakh speech with its corresponding transcriptions are heavily accessed and not enough to gain a worth mentioning results.For this reason, speech recognition of Kazakh language has not been explored well.There are only few works that investigate this area with traditio…
▽ More
Development of Automatic Speech Recognition system for Kazakh language is very challenging due to a lack of data.Existing data of kazakh speech with its corresponding transcriptions are heavily accessed and not enough to gain a worth mentioning results.For this reason, speech recognition of Kazakh language has not been explored well.There are only few works that investigate this area with traditional methods Hidden Markov Model, Gaussian Mixture Model, but they are suffering from poor outcome and lack of enough data.In our work we suggest a new method that takes pre-trained model of Russian language and applies its knowledge as a starting point to our neural network structure, which means that we are transferring the weights of pre-trained model to our neural network.The main reason we chose Russian model is that pronunciation of kazakh and russian languages are quite similar because they share 78 percent letters and there are quite large corpus of russian speech dataset. We have collected a dataset of Kazakh speech with transcriptions in the base of Suleyman Demirel University with 50 native speakers each having around 400 sentences.Data have been chosen from famous Kazakh books.
We have considered 4 different scenarios in our experiment. First, we trained our neural network without using a pre-trained Russian model with 2 LSTM layers and 2 BiLSTM .Second, we have trained the same 2 LSTM layered and 2 BiLSTM layered using a pre-trained model. As a result, we have improved our models training cost and Label Error Rate by using external Russian speech recognition model up to 24 percent and 32 percent respectively.Pre-trained Russian language model has trained on 100 hours of data with the same neural network architecture.
△ Less
Submitted 8 March, 2020;
originally announced March 2020.
-
Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations
Authors:
Ipsita Koley,
Saurav Kumar Ghosh,
Soumyajit Dey,
Debdeep Mukhopadhyay,
Amogh Kashyap K N,
Sachin Kumar Singh,
Lavanya Lokesh,
Jithin Nalu Purakkal,
Nishant Sinha
Abstract:
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not…
▽ More
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not hold for the actual control software implementation. In this article, we propose a formal approach towards synthesizing attack detectors with varying thresholds which can prevent performance degrading stealthy attacks while minimizing false alarms.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
Identification of Indian Languages using Ghost-VLAD pooling
Authors:
Krishna D N,
Ankita Patil,
M. S. P Raj,
Sai Prasad H S,
Prabhu Aashish Garapati
Abstract:
In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The genera…
▽ More
In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The generated feature vector is shown to have very good language discriminative features and helps in getting state of the art results for language identification task. We conduct our experiments on 635Hrs of audio data for 7 Indian languages. Our method outperforms the previous state of the art x-vector [11] method by an absolute improvement of 1.88% in F1-score and achieves 98.43% F1-score on the held-out test data. We compare our system with various pooling approaches and show that GhostVLAD is the best pooling approach for this task. We also provide visualization of the utterance level embeddings generated using Ghost-VLAD pooling and show that this method creates embeddings which has very good language discriminative features.
△ Less
Submitted 5 February, 2020;
originally announced February 2020.
-
Implications of the Dark LMA solution and Fourth Sterile Neutrino for Neutrino-less Double Beta Decay
Authors:
K. N. Deepthi,
Srubabati Goswami,
Vishnudath K. N.,
Tanmay Kumar Poddar
Abstract:
We analyze the effect of the Dark-large mixing angle (DLMA) solution on the effective Majorana mass ($m_{ββ}$) governing neutrino-less double beta decay ($0νββ$) in the presence of a sterile neutrino. We consider the 3+1 picture, comprising of one additional sterile neutrino. We have checked that the MSW resonance in the sun can take place in the DLMA parameter space in this scenario. Next we inve…
▽ More
We analyze the effect of the Dark-large mixing angle (DLMA) solution on the effective Majorana mass ($m_{ββ}$) governing neutrino-less double beta decay ($0νββ$) in the presence of a sterile neutrino. We consider the 3+1 picture, comprising of one additional sterile neutrino. We have checked that the MSW resonance in the sun can take place in the DLMA parameter space in this scenario. Next we investigate how the values of the solar mixing angle $θ_{12}$ corresponding to the DLMA region alter the predictions of $m_{ββ}$ including a sterile neutrino in the analysis. We also compare our results with three generation cases for both standard large mixing angle (LMA) and DLMA. Additionally, we evaluate the discovery sensitivity of the future ${}^{136}Xe$ experiments in this context.
△ Less
Submitted 8 July, 2020; v1 submitted 20 September, 2019;
originally announced September 2019.
-
Improved measurements of the absolute branching fractions of the inclusive decays $D^{+(0)}\toφX$
Authors:
M. Ablikim,
M. N. Achasov,
P. Adlarson,
S. Ahmed,
M. Albrecht,
M. Alekseev,
A. Amoroso,
F. F. An,
Q. An,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
K. Begzsure n,
J. V. Bennett,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
J Biernat,
J. Bloms,
I. Boyko,
R. A. Briere,
H. Cai
, et al. (462 additional authors not shown)
Abstract:
By analyzing 2.93 fb$^{-1}$ of $e^+e^-$ annihilation data taken at the center-of-mass energy $\sqrt s=$ 3.773 GeV with the BESIII detector, we determine the branching fractions of the inclusive decays $D^+\toφX$ and $D^0\toφX$ to be $(1.135\pm0.034\pm0.031)\%$ and $(1.091\pm0.027\pm0.035)\%$, respectively, where $X$ denotes any possible particle combination. The first uncertainties are statistical…
▽ More
By analyzing 2.93 fb$^{-1}$ of $e^+e^-$ annihilation data taken at the center-of-mass energy $\sqrt s=$ 3.773 GeV with the BESIII detector, we determine the branching fractions of the inclusive decays $D^+\toφX$ and $D^0\toφX$ to be $(1.135\pm0.034\pm0.031)\%$ and $(1.091\pm0.027\pm0.035)\%$, respectively, where $X$ denotes any possible particle combination. The first uncertainties are statistical and the second systematic. We also determine the branching fractions of the decays $D\toφX$ and their charge conjugate modes $\bar{D}\toφ\bar{X}$ separately for the first time, and no significant CP asymmetry is observed.
△ Less
Submitted 17 October, 2019; v1 submitted 14 August, 2019;
originally announced August 2019.
-
Constraining a general U(1)$^\prime$ inverse seesaw model from vacuum stability, dark matter and collider
Authors:
Arindam Das,
Srubabati Goswami,
Vishnudath K. N.,
Takaaki Nomura
Abstract:
We consider a class of gauged $U(1)$ extensions of the Standard Model (SM), where the light neutrino masses are generated by an inverse seesaw mechanism. In addition to the three right handed neutrinos, we add three singlet fermions and demand an extra $Z_2$ symmetry under which, the third generations of both of the neutral fermions are odd, which in turn gives us a stable dark matter candidate. W…
▽ More
We consider a class of gauged $U(1)$ extensions of the Standard Model (SM), where the light neutrino masses are generated by an inverse seesaw mechanism. In addition to the three right handed neutrinos, we add three singlet fermions and demand an extra $Z_2$ symmetry under which, the third generations of both of the neutral fermions are odd, which in turn gives us a stable dark matter candidate. We express the $U(1)$ charges of all the fermions in terms of the U(1) charges of the standard model Higgs and the new complex scalar. We study the bounds on the parameters of the model from vacuum stability, perturbative unitarity, dark matter relic density and direct detection constraints. We also obtain the collider constraints on the $Z'$ mass and the $U(1)'$ gauge coupling. Finally we compare all the bounds on the $Z'$ mass versus the $U(1)'$ gauge coupling plane.
△ Less
Submitted 18 May, 2019; v1 submitted 1 May, 2019;
originally announced May 2019.
-
A Wide Orbit Exoplanet OGLE-2012-BLG-0838Lb
Authors:
Poleski R.,
Suzuki D.,
Udalski A.,
Xie X.,
Yee J. C.,
Koshimoto N.,
Gaudi B. S.,
Gould A.,
Skowron J.,
Szymanski M. K.,
Soszynski I.,
Pietrukowicz P.,
Kozlowski S.,
Wyrzykowski L.,
Ulaczyk K.,
Abe F.,
Barry R. K.,
Bennett D. P.,
Bhattacharya A.,
Bond I. A.,
Donachie M.,
Fujii H.,
Fukui A.,
Itow Y.,
Hirao Y.
, et al. (26 additional authors not shown)
Abstract:
We present the discovery of a planet on a very wide orbit in the microlensing event OGLE-2012-BLG-0838. The signal of the planet is well separated from the main peak of the event and the planet-star projected separation is found to be twice larger than the Einstein ring radius, which roughly corresponds to a projected separation of ~4 AU. Similar planets around low-mass stars are very hard to find…
▽ More
We present the discovery of a planet on a very wide orbit in the microlensing event OGLE-2012-BLG-0838. The signal of the planet is well separated from the main peak of the event and the planet-star projected separation is found to be twice larger than the Einstein ring radius, which roughly corresponds to a projected separation of ~4 AU. Similar planets around low-mass stars are very hard to find using any technique other than microlensing. We discuss microlensing model fitting in detail and discuss the prospects for measuring the mass and distance of lens system directly.
△ Less
Submitted 17 November, 2021; v1 submitted 16 January, 2019;
originally announced January 2019.
-
A New Sensitivity Goal for Neutrino-less Double Beta Decay Experiments
Authors:
Vishnudath K. N.,
Sandhya Choubey,
Srubabati Goswami
Abstract:
We study the implications of the Dark-LMA solution to the solar neutrino problem for neutrino-less double beta decay ($0νββ$ ). We show that while the predictions for the effective mass governing $0νββ$ remains unchanged for the inverted mass scheme, that for normal ordering becomes higher for the Dark-LMA parameter space and moves into the "desert region" between the two. This sets a new goal for…
▽ More
We study the implications of the Dark-LMA solution to the solar neutrino problem for neutrino-less double beta decay ($0νββ$ ). We show that while the predictions for the effective mass governing $0νββ$ remains unchanged for the inverted mass scheme, that for normal ordering becomes higher for the Dark-LMA parameter space and moves into the "desert region" between the two. This sets a new goal for sensitvity reach for the next generation experiments if no signal is found for the inverted ordering by the future search programmes.
△ Less
Submitted 16 December, 2019; v1 submitted 14 January, 2019;
originally announced January 2019.
-
Mn2V0.5Co0.5Z (Z= Ga, Al) Heusler alloys: Fully compensated ferrimagnets with high Tc and compensation temperature
Authors:
P V Midhunlal,
J Arout Chelvane,
D Prabhu,
Raghavan Gopalan,
Harish Kumar N
Abstract:
High TC fully compensated ferrimagnets are potential candidates for spin transfer torque based spintronic devices. We report the structural and magnetic properties of high TC fully compensated ferrimagnets Mn2V0.5Co0.5Z where Z is Ga, Al, in the melt spun ribbon and arc melted bulk form. While the parent alloys Mn2YZ where Y is V, Co and Z is Ga, Al exhibits a magnetic moment value around 2 muB pe…
▽ More
High TC fully compensated ferrimagnets are potential candidates for spin transfer torque based spintronic devices. We report the structural and magnetic properties of high TC fully compensated ferrimagnets Mn2V0.5Co0.5Z where Z is Ga, Al, in the melt spun ribbon and arc melted bulk form. While the parent alloys Mn2YZ where Y is V, Co and Z is Ga, Al exhibits a magnetic moment value around 2 muB per f.u, the Mn2V0.5Co0.5Ga alloy exhibits room temperature nearly fully compensated moment value of 0.09 and 0.13 muB per f.u. in the bulk and ribbon form respectively. For Mn2V0.5Co0.5Al this turned out to be 0.04 and 0.08 muB per f.u. In Contrast to the bulk sample's Neel P type ferrimagnetic behaviour, ribbon samples exhibit Neel N type ferrimagnetic characteristic with a high compensation temperature of 420 K for Ga alloy and 275 K for Al alloy. The observed TC values are more than 640 K for all samples. The differences in the magnetic properties of arc melted and melt spun alloys indicates that even a slight variation in stoichiometry and sample preparation method can influence the physical properties of a compensated system.
△ Less
Submitted 3 December, 2018;
originally announced December 2018.
-
Constraining minimal Type-III Seesaw Model from naturalness, Lepton Flavor Violation and Electroweak Vacuum stability
Authors:
Srubabati Goswami,
Vishnudath K. N.,
Najimuddin Khan
Abstract:
We study the minimal type-III seesaw model in which we extend the SM by adding two $SU(2)_L$ triplet fermions with zero hypercharge to explain the origin of the non-zero neutrino masses. We show that the naturalness conditions and the limits from lepton flavor violating decays provide very stringent bounds on the model parameters along with the constraints from the stability/metastability of the e…
▽ More
We study the minimal type-III seesaw model in which we extend the SM by adding two $SU(2)_L$ triplet fermions with zero hypercharge to explain the origin of the non-zero neutrino masses. We show that the naturalness conditions and the limits from lepton flavor violating decays provide very stringent bounds on the model parameters along with the constraints from the stability/metastability of the electroweak vacuum. We perform a detailed analysis of the model parameter space including all the constraints for both normal as well as inverted hierarchies of the light neutrino masses. We find that most of the region that are allowed by lepton flavor violating decays and naturalness fall in the stable/metastable region depending on the values of the standard model parameters.
△ Less
Submitted 16 April, 2019; v1 submitted 27 October, 2018;
originally announced October 2018.
-
WeSeer: Visual Analysis for Better Information Cascade Prediction of WeChat Articles
Authors:
Quan Li,
Ziming Wu,
Lingling Yi,
Kristanto Sean N,
Huamin Qu,
Xiaojuan Ma
Abstract:
Social media, such as Facebook and WeChat, empowers millions of users to create, consume, and disseminate online information on an unprecedented scale. The abundant information on social media intensifies the competition of WeChat Public Official Articles (i.e., posts) for gaining user attention due to the zero-sum nature of attention. Therefore, only a small portion of information tends to become…
▽ More
Social media, such as Facebook and WeChat, empowers millions of users to create, consume, and disseminate online information on an unprecedented scale. The abundant information on social media intensifies the competition of WeChat Public Official Articles (i.e., posts) for gaining user attention due to the zero-sum nature of attention. Therefore, only a small portion of information tends to become extremely popular while the rest remains unnoticed or quickly disappears. Such a typical `long-tail' phenomenon is very common in social media. Thus, recent years have witnessed a growing interest in predicting the future trend in the popularity of social media posts and understanding the factors that influence the popularity of the posts. Nevertheless, existing predictive models either rely on cumbersome feature engineering or sophisticated parameter tuning, which are difficult to understand and improve. In this paper, we study and enhance a point process-based model by incorporating visual reasoning to support communication between the users and the predictive model for a better prediction result. The proposed system supports users to uncover the working mechanism behind the model and improve the prediction accuracy accordingly based on the insights gained. We use realistic WeChat articles to demonstrate the effectiveness of the system and verify the improved model on a large scale of WeChat articles. We also elicit and summarize the feedback from WeChat domain experts.
△ Less
Submitted 27 August, 2018;
originally announced August 2018.
-
Conditions where RPA becomes exact in the high-density limit
Authors:
Klaus Morawetz,
Vinod Ashokan,
Renu Bala,
Kare Narain Pathak
Abstract:
It is shown that in $d$-dimensional systems, the vertex corrections beyond the random phase approximation (RPA) or GW approximation scales with the power $d-β-α$ of the Fermi momentum if the relation between Fermi energy and Fermi momentum is $ε_{\rm f}\sim p_{\rm f}^β$ and the interacting potential possesses a momentum-power-law of $\sim p^{-α}$. The condition $d-β-α<0$ specifies systems where RP…
▽ More
It is shown that in $d$-dimensional systems, the vertex corrections beyond the random phase approximation (RPA) or GW approximation scales with the power $d-β-α$ of the Fermi momentum if the relation between Fermi energy and Fermi momentum is $ε_{\rm f}\sim p_{\rm f}^β$ and the interacting potential possesses a momentum-power-law of $\sim p^{-α}$. The condition $d-β-α<0$ specifies systems where RPA is exact in the high-density limit. The one-dimensional structure factor is found to be the interaction-free one in the high-density limit for contact interaction. A cancellation of RPA and vertex corrections render this result valid up to second-order in contact interaction. For finite-range potentials of cylindrical wires a large-scale cancellation appears and found to be independent of the width parameter of the wire. The proposed high-density expansion agrees with the Quantum Monte Carlo simulations.
△ Less
Submitted 28 February, 2018;
originally announced February 2018.
-
Search for Giant Pulses of radio pulsars at frequency 111 MHz with LPA radio telescope
Authors:
Kazantsev A. N.,
Potapov V. A
Abstract:
We have used the unique low frequency sensitivity of the Large Phased Array radio telescope of Pushchino Radio Astronomy Observatory to collect dataset of the single pulse observations of second period pulsars of the Northern hemisphere. During observational sessions of 2011 - 2017 yrs. We have collected data on 71 pulsars at 111 MHz frequency using digital pulsar receiver. We have discovered Gian…
▽ More
We have used the unique low frequency sensitivity of the Large Phased Array radio telescope of Pushchino Radio Astronomy Observatory to collect dataset of the single pulse observations of second period pulsars of the Northern hemisphere. During observational sessions of 2011 - 2017 yrs. We have collected data on 71 pulsars at 111 MHz frequency using digital pulsar receiver. We have discovered Giant Radio Pulses (GRP) from pulsars B0301+09 and B1237+25, and confirmed early reported generation of anomalously strong (probable giant) pulses from B1133+16 on statistically significant dataset. Data for these pulsars and from B0950+08, B1112+50, early reported as pulsars generating GRPs were analyzed to evaluate their behavior on long time intervals. It was found that statistical criterion (power-law spectrum of GRPs distribution on energy and peak flux density) seems not to be strict for pulsars with the low magnetic field on light cylinder. Moreover, spectra of some of these pulsars demonstrate unstable behavior with the time and have complex multicomponent shape. In the dataset of B0950+08 we have detected strongest GRP from pulsars with the low magnetic field on light cylinder ever reported having the peak flux density as strong as 16.8 kJy.
△ Less
Submitted 16 February, 2018;
originally announced February 2018.
-
Near total magnetic moment compensation without reduction in T_C of Mn_2 V_0.5 Co_0.5 Z (Z=Ga,Al) Heusler compounds
Authors:
Midhunlal P V,
Arout Chelvane J,
Arjun Krishnan U M,
Harish Kumar N
Abstract:
Mn_2V_1-xCo_xZ (Z=Ga,Al and x=0, 0.25, 0.5, 0.75, 1) Heusler compounds have been synthesized to investigate the effect of Co substitution at the V site on the magnetic moment and Curie temperatures of half-metallic ferrimagnets Mn_2VGa and Mn_2VAl. The Co substituted compounds show a non linear decrease in lattice parameter without altering the crystal structure of the parent compounds. The end me…
▽ More
Mn_2V_1-xCo_xZ (Z=Ga,Al and x=0, 0.25, 0.5, 0.75, 1) Heusler compounds have been synthesized to investigate the effect of Co substitution at the V site on the magnetic moment and Curie temperatures of half-metallic ferrimagnets Mn_2VGa and Mn_2VAl. The Co substituted compounds show a non linear decrease in lattice parameter without altering the crystal structure of the parent compounds. The end members Mn_2VGa and Mn_2CoGa have the saturation magnetization of 1.80 μ_B/f.u and 2.05 μ_B/f.u respectively whereas for the Mn_2V_0.5Co_0.5Ga compound, a near total magnetic moment compensation (0.10 μ_B/f.u) was observed due to the ferrimagnetic coupling of Mn with parallelly aligned V and Co. The Co substituted Mn_2VAl has also shown the similar trend with compensated magnetic moment value of 0.06 μ_B/f.u for x=0.5. The Curie temperatures of the compounds including the x=0.5 composition are well above the room temperature (more than 700 K) which is in sharp contrast to the earlier reported values of 171 K for the (MnCo)VGa and 105 K for the (MnCo)VAl compounds (substitution at the Mn site). The magnetic moment compensation without significant reduction in T_C indicates that the V site substitution of Co does not weaken the magnetic interaction in Mn_2VZ (Z=Ga, Al) compounds which is in contrary to the earlier experimental reports on Mn site substitution.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Dependence of structure factor and correlation energy on the width of electron wires
Authors:
Vinod Ashokan,
Renu Bala,
Klaus Morawetz,
K. N. Pathak
Abstract:
The structure factor and correlation energy of a quantum wire of thickness $b\ll a_B$ are studied in random phase approximation and for the less investigated region $r_s<1$. Using the single-loop approximation, analytical expressions of the structure factor have been obtained. The exact expressions for the exchange energy are also derived for a cylindrical and harmonic wire. The correlation energy…
▽ More
The structure factor and correlation energy of a quantum wire of thickness $b\ll a_B$ are studied in random phase approximation and for the less investigated region $r_s<1$. Using the single-loop approximation, analytical expressions of the structure factor have been obtained. The exact expressions for the exchange energy are also derived for a cylindrical and harmonic wire. The correlation energy $ε_c$ is found to be represented by $ε_c (b,r_s)= \frac{α(r_s)}{b} + β(r_s)\; ln(b) + η(r_s)$, for small $b$ and high densities. For a pragmatic width of the wire, the correlation energy is in agreement with the quantum Monte Carlo simulation data.
△ Less
Submitted 5 September, 2017; v1 submitted 22 August, 2017;
originally announced August 2017.
-
Electroweak vacuum stability in presence of singlet scalar dark matter in TeV scale seesaw models
Authors:
Ila Garg,
Srubabati Goswami,
Vishnudath K. N.,
Najimuddin Khan
Abstract:
We consider singlet extensions of the standard model, both in the fermion and the scalar sector, to account for the generation of neutrino mass at the TeV scale and the existence of dark matter respectively. For the neutrino sector we consider models with extra singlet fermions which can generate neutrino mass via the so called inverse or linear seesaw mechanism whereas a singlet scalar is introdu…
▽ More
We consider singlet extensions of the standard model, both in the fermion and the scalar sector, to account for the generation of neutrino mass at the TeV scale and the existence of dark matter respectively. For the neutrino sector we consider models with extra singlet fermions which can generate neutrino mass via the so called inverse or linear seesaw mechanism whereas a singlet scalar is introduced as the candidate for dark matter. We show that although these two sectors are disconnected at low energy, the coupling constants of both the sectors get correlated at high energy scale by the constraints coming from the perturbativity and stability/metastability of the electroweak vacuum. The singlet fermions try to destabilize the electroweak vacuum while the singlet scalar aids the stability. As an upshot, the electroweak vacuum may attain absolute stability even upto the Planck scale for suitable values of the parameters. We delineate the parameter space for the singlet fermion and the scalar couplings for which the electroweak vacuum remains stable/metastable and at the same time giving the correct relic density and neutrino masses and mixing angles as observed.
△ Less
Submitted 27 June, 2017;
originally announced June 2017.
-
A Survey On Video Forgery Detection
Authors:
Sowmya K. N.,
H. R. Chennamma
Abstract:
The Digital Forgeries though not visibly identifiable to human perception it may alter or meddle with underlying natural statistics of digital content. Tampering involves fiddling with video content in order to cause damage or make unauthorized alteration/modification. Tampering detection in video is cumbersome compared to image when considering the properties of the video. Tampering impacts need…
▽ More
The Digital Forgeries though not visibly identifiable to human perception it may alter or meddle with underlying natural statistics of digital content. Tampering involves fiddling with video content in order to cause damage or make unauthorized alteration/modification. Tampering detection in video is cumbersome compared to image when considering the properties of the video. Tampering impacts need to be studied and the applied technique/method is used to establish the factual information for legal course in judiciary. In this paper we give an overview of the prior literature and challenges involved in video forgery detection where passive approach is found.
△ Less
Submitted 3 March, 2015;
originally announced March 2015.
-
VirtuMob : Remote Desktop Virtualization Solution for Smarphones
Authors:
M H Soorajprasad,
Balapradeep K N,
Antony P J
Abstract:
Mobility is an important attribute in todays computing world. Mobile devices,smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android based Smartphone. Virtual Network Computing based architecture is used to deve…
▽ More
Mobility is an important attribute in todays computing world. Mobile devices,smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android based Smartphone. Virtual Network Computing based architecture is used to develop the proposed system. Through a VirtuMob viewer provided on the users Smartphone, the user will be able to access and manipulate the desktops of remote computers. Several functionality such as viewing the desktop, mouse operations, keyboard operations, manipulation of documents can be performed from the Smartphone. VirtuMob server should be running on the remote system and it must be attached to a network. VirtuMob Accelerator is used to process the RFB frames of the desktop, perform Encoding of the frames and then relay the frames to the viewer over the internet. Several Encoding techniques are studied and analysed to determine which is best suited for the proposed system.
△ Less
Submitted 2 June, 2014;
originally announced June 2014.
-
Region and Location Based Indexing and Retrieval of MR-T2 Brain Tumor Images
Authors:
Krishna A N,
B G Prasad
Abstract:
In this paper, region based and location based retrieval systems have been implemented for retrieval of MR-T2 axial 2-D brain images. This is done by extracting and characterizing the tumor portion of 2-D brain slices by use of a suitable threshold computed over the entire image. Indexing and retrieval is then performed by computing texture features based on gray-tone spatial-dependence matrix of…
▽ More
In this paper, region based and location based retrieval systems have been implemented for retrieval of MR-T2 axial 2-D brain images. This is done by extracting and characterizing the tumor portion of 2-D brain slices by use of a suitable threshold computed over the entire image. Indexing and retrieval is then performed by computing texture features based on gray-tone spatial-dependence matrix of segmented regions. A Hash structure is used to index all images. A combined index is adopted to point to all similar images in terms of the texture features. At query time, only those images that are in the same hash bucket as those of the queried image are compared for similarity, thus reducing the search space and time.
△ Less
Submitted 7 December, 2013;
originally announced December 2013.
-
The NIFFTE project
Authors:
Ruz J.,
Asner D. M.,
Baker R. G.,
Bundgaard J.,
Burgett E.,
Cunningham M.,
Deaven J.,
Duke D. L.,
Greife U.,
Grimes S.,
Heffner M.,
Hill T.,
Isenhower D.,
Klay J. L.,
Kleinrath V.,
Kornilov N.,
Laptev A. B.,
Loveland W.,
Masseyf T. N.,
Meharchand R.,
Qu H.,
Sangiorgio S.,
Seilhan B.,
Snyder L.,
Stave S.
, et al. (8 additional authors not shown)
Abstract:
The Neutron Induced Fission Fragment Tracking Experiment (NIFFTE) is a double-sided Time Projection Chamber (TPC) with micromegas readout designed to measure the energy-dependent neutron-induced fission cross sections of the major and minor actinides with unprecedented accuracy. The NIFFTE project addresses the challenge of minimizing major sources of systematic uncertainties from previous fission…
▽ More
The Neutron Induced Fission Fragment Tracking Experiment (NIFFTE) is a double-sided Time Projection Chamber (TPC) with micromegas readout designed to measure the energy-dependent neutron-induced fission cross sections of the major and minor actinides with unprecedented accuracy. The NIFFTE project addresses the challenge of minimizing major sources of systematic uncertainties from previous fission chamber measurements such as: target and beam non-uniformities, misidentification of alpha and light charged particles as fission fragments, and uncertainties inherent to the reference standards used. In-beam tests of the NIFFTE TPC at the Los Alamos Neutron Science Center (LANSCE) started in 2010 and have continued in 2011, 2012 and 2013. An overview of the NIFFTE TPC status and performance at LANSCE will be presented.
△ Less
Submitted 6 November, 2013; v1 submitted 30 September, 2013;
originally announced September 2013.
-
A Robust Client Verification in cloud enabled m-Commerce using Gaining Protocol
Authors:
Chitra Kiran N.,
G. Narendra Kumar
Abstract:
The proposed system highlights a novel approach of exclusive verification process using gain protocol for ensuring security among both the parties (client-service provider) in m-commerce application with cloud enabled service. The proposed system is based on the potential to verify the clients with trusted hand held device depending on the set of frequent events and actions to be carried out. The…
▽ More
The proposed system highlights a novel approach of exclusive verification process using gain protocol for ensuring security among both the parties (client-service provider) in m-commerce application with cloud enabled service. The proposed system is based on the potential to verify the clients with trusted hand held device depending on the set of frequent events and actions to be carried out. The framework of the proposed work is design after collecting a real time data sets from an android enabled hand set, which when subjected to gain protocol, will result in detection of malicious behavior of illegal clients in the network. The real time experiment is performed with applicable datasets gather, which show the best result for identifying threats from last 2 months data collected.
△ Less
Submitted 20 January, 2012;
originally announced January 2012.