-
The ASTRI Mini-Array of Cherenkov Telescopes at the Observatorio del Teide
Authors:
Scuderi S.,
Giuliani A.,
Pareschi G.,
Tosti G.,
Catalano O.,
Amato E.,
Antonelli L. A.,
Becerra Gonzáles J.,
Bellassai G.,
Bigongiari,
C.,
Biondo B.,
Böttcher M.,
Bonanno G.,
Bonnoli G.,
Bruno P.,
Bulgarelli A.,
Canestrari R.,
Capalbi M.,
Caraveo P.,
Cardillo M.,
Conforti V.,
Contino G.,
Corpora M.,
Costa A.
, et al. (73 additional authors not shown)
Abstract:
The ASTRI Mini-Array (MA) is an INAF project to build and operate a facility to study astronomical sources emitting at very high-energy in the TeV spectral band. The ASTRI MA consists of a group of nine innovative Imaging Atmospheric Cherenkov telescopes. The telescopes will be installed at the Teide Astronomical Observatory of the Instituto de Astrofisica de Canarias (IAC) in Tenerife (Canary Isl…
▽ More
The ASTRI Mini-Array (MA) is an INAF project to build and operate a facility to study astronomical sources emitting at very high-energy in the TeV spectral band. The ASTRI MA consists of a group of nine innovative Imaging Atmospheric Cherenkov telescopes. The telescopes will be installed at the Teide Astronomical Observatory of the Instituto de Astrofisica de Canarias (IAC) in Tenerife (Canary Islands, Spain) on the basis of a host agreement with INAF. Thanks to its expected overall performance, better than those of current Cherenkov telescopes' arrays for energies above \sim 5 TeV and up to 100 TeV and beyond, the ASTRI MA will represent an important instrument to perform deep observations of the Galactic and extra-Galactic sky at these energies.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Design of conformal antenna for aircraft application
Authors:
Laxminarayen N V,
Lokeshwaran G,
Murugan K S,
Jothilakshmi P
Abstract:
The most challenging thing in the real world is communicating with aircraft, even though several communication technologies have been adopted for tracking and monitoring the aircraft there is no cent per cent efficiency, for the implementation of a conformal antenna for transmission and reception of the signal is preferred. In radio communication and avionics, a conformal antenna or conformal arra…
▽ More
The most challenging thing in the real world is communicating with aircraft, even though several communication technologies have been adopted for tracking and monitoring the aircraft there is no cent per cent efficiency, for the implementation of a conformal antenna for transmission and reception of the signal is preferred. In radio communication and avionics, a conformal antenna or conformal array is a flat radio antenna which is designed to conform to or follow some prescribed shape, for example, a curved conformal antenna is designed and is mounted on or embedded in a curved surface. The conformal antenna is a collection of a large number of smaller antennas (PAA) each one is connected to a phase shifter. The phased array antenna will have high directivity in the desired application. Conformal arrays are typically limited to high frequencies in the UHF or microwave range, where the wavelength of the waves is small enough that small antennas can be used. The main objective of this project is to embed this conformal antenna on the surface of the aircraft with increased gain. To implement the above-mentioned problem we are using CST microwave software. Conventional methods now used in aircraft are done by using the conformal antenna to save space and even military applications to be anonymous. The antenna stands to be an interface between the transmitter and the receiver. By working on the software and hardware features of antennas we can develop an antenna with better gain. By adopting better gain, the antenna will be more efficient. Thus by implementing this conformal antenna on the aircraft surface with an increased gain high degree of accuracy, clarity and effective communication link can be achieved.
△ Less
Submitted 26 July, 2022; v1 submitted 15 July, 2022;
originally announced July 2022.
-
Current status of PAPYRUS : the pyramid based adaptive optics system at LAM/OHP
Authors:
Muslimov E.,
Levraud N.,
Chambouleyron V.,
Boudjema I.,
Lau A.,
Caillat A.,
Pedreros F.,
Otten G.,
El Hadi K.,
Joaquina K.,
Lopez M.,
El Morsy M.,
Beltramo Martin O.,
Fetick R.,
Ke Z.,
Sauvage J-F.,
Neichel B.,
Fusco T.,
Schmitt J.,
Le Van Suu A.,
Charton J.,
Schimpf A.,
Martin B.,
Dintrono F.,
Esposito S.
, et al. (1 additional authors not shown)
Abstract:
The Provence Adaptive optics Pyramid Run System (PAPYRUS) is a pyramid-based Adaptive Optics (AO) system that will be installed at the Coude focus of the 1.52m telescope (T152) at the Observatoire de Haute Provence (OHP). The project is being developed by PhD students and Postdocs across France with support from staff members consolidating the existing expertise and hardware into an R&D testbed. T…
▽ More
The Provence Adaptive optics Pyramid Run System (PAPYRUS) is a pyramid-based Adaptive Optics (AO) system that will be installed at the Coude focus of the 1.52m telescope (T152) at the Observatoire de Haute Provence (OHP). The project is being developed by PhD students and Postdocs across France with support from staff members consolidating the existing expertise and hardware into an R&D testbed. This testbed allows us to run various pyramid wavefront sensing (WFS) control algorithms on-sky and experiment on new concepts for wavefront control with additional benefit from the high number of available nights at this telescope. It will also function as a teaching tool for students during the planned AO summer school at OHP. To our knowledge, this is one of the first pedagogic pyramid-based AO systems on-sky. The key components of PAPYRUS are a 17x17 actuators Alpao deformable mirror with a Alpao RTC, a very low noise camera OCAM2k, and a 4-faces glass pyramid. PAPYRUS is designed in order to be a simple and modular system to explore wavefront control with a pyramid WFS on sky. We present an overview of PAPYRUS, a description of the opto-mechanical design and the current status of the project.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Outlier Aware Network Embedding for Attributed Networks
Authors:
Sambaran Bandyopadhyay,
Lokesh N,
M. N. Murty
Abstract:
Attributed network embedding has received much interest from the research community as most of the networks come with some content in each node, which is also known as node attributes. Existing attributed network approaches work well when the network is consistent in structure and attributes, and nodes behave as expected. But real world networks often have anomalous nodes. Typically these outliers…
▽ More
Attributed network embedding has received much interest from the research community as most of the networks come with some content in each node, which is also known as node attributes. Existing attributed network approaches work well when the network is consistent in structure and attributes, and nodes behave as expected. But real world networks often have anomalous nodes. Typically these outliers, being relatively unexplainable, affect the embeddings of other nodes in the network. Thus all the downstream network mining tasks fail miserably in the presence of such outliers. Hence an integrated approach to detect anomalies and reduce their overall effect on the network embedding is required.
Towards this end, we propose an unsupervised outlier aware network embedding algorithm (ONE) for attributed networks, which minimizes the effect of the outlier nodes, and hence generates robust network embeddings. We align and jointly optimize the loss functions coming from structure and attributes of the network. To the best of our knowledge, this is the first generic network embedding approach which incorporates the effect of outliers for an attributed network without any supervision. We experimented on publicly available real networks and manually planted different types of outliers to check the performance of the proposed algorithm. Results demonstrate the superiority of our approach to detect the network outliers compared to the state-of-the-art approaches. We also consider different downstream machine learning applications on networks to show the efficiency of ONE as a generic network embedding technique. The source code is made available at https://github.com/sambaranban/ONE.
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Algebraic structures defined on $m$-Dyck paths
Authors:
Daniel López N.,
Louis-François Préville-Ratelle,
María Ronco
Abstract:
We introduce natural binary set-theoretical products on the set of all $m$-Dyck paths, which led us to define a non-symmetric algebraic operad $\Dy^m$, described on the vector space spanned by $m$-Dyck paths. Our construction is closely related to the $m$-Tamari lattice, so the products defining $\Dy^m$ are given by intervals in this lattice. For $m=1$, we recover the notion of dendriform algebra…
▽ More
We introduce natural binary set-theoretical products on the set of all $m$-Dyck paths, which led us to define a non-symmetric algebraic operad $\Dy^m$, described on the vector space spanned by $m$-Dyck paths. Our construction is closely related to the $m$-Tamari lattice, so the products defining $\Dy^m$ are given by intervals in this lattice. For $m=1$, we recover the notion of dendriform algebra introduced by J.-L. Loday in \cite{Lod}, and there exists a natural operad morphism from the operad ${\mbox {\it Ass}}$ of associative algebras into the operad $\Dy^m$, consequently $\Dy ^m$ is a Hopf operad. We give a description of the coproduct in terms of $m$-Dyck paths in the last section. As an additional result, for any composition of $m+1\geq 2$ with $r+1$ parts, we get a functor from the category of $\Dy ^m$ algebras into the category of $\Dy ^r$ algebras.
△ Less
Submitted 3 October, 2015; v1 submitted 5 August, 2015;
originally announced August 2015.
-
Usages of Composition Search Tree in Web Service Composition
Authors:
Lakshmi H N,
Hrushikesha Mohanty
Abstract:
The increasing availability of web services within an organization and on the Web demands for efficient search and composition mechanisms to find services satisfying user requirements. Often consumers may be unaware of exact service names that is fixed by service providers. Rather consumers being well aware of their requirements would like to search a service based on their commitments (inputs) an…
▽ More
The increasing availability of web services within an organization and on the Web demands for efficient search and composition mechanisms to find services satisfying user requirements. Often consumers may be unaware of exact service names that is fixed by service providers. Rather consumers being well aware of their requirements would like to search a service based on their commitments (inputs) and expectations (outputs). Based on this concept we have explored the feasibility of I/O based web service search and composition in our previous work. The classical definition of service composition, i.e., one-to-one and onto map** between input and output sets of composing services, is extended to give rise to three types of service match: Exact, Super and Partial match. Based on matches of all three types, different kinds of compositions are defined: Exact, Super and Collaborative Composition. Process of composition, being a match between inputs and outputs of services, is hastened by making use of information on service dependency that is made available in repository as an one time preprocessed information obtained from services populating the registry. Adopting three schemes for matching for a desired service outputs, the possibility of having different kinds of compositions is demonstrated in form of a Composition Search Tree. As an extension to our previous work, in this paper, we propose the utility of Composition Search Tree for finding compositions of interest like leanest and the shortest depth compositions.
△ Less
Submitted 6 April, 2015;
originally announced April 2015.
-
Classified Ads Harvesting Agent and Notification System
Authors:
Razvi Doomun,
Lollmahamod N.,
Auleear Nadeem,
Mozafar Aukin
Abstract:
The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In t…
▽ More
The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In this paper, we develop a real-time automatic harvesting agent for adverts posted on Servihoo web portal and an SMS-based notification system. It uses the URL of the web portal and the object model, i.e., the fields of interests and a set of rules written using the HTML parsing functions to extract latest adverts information. The extraction engine executes the extraction rules and stores the information in a database to be processed for automatic notification. This intelligent system helps to tremendously save time. It also enables users or potential product buyers to react more quickly to changes and newly posted sales adverts, paving the way to real-time best buy deals.
△ Less
Submitted 13 March, 2010;
originally announced March 2010.
-
A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining
Authors:
Mohammad Ali Kadampur,
Somayajulu D. V. L. N
Abstract:
Data mining deals with automatic extraction of previously unknown patterns from large amounts of data. Organizations all over the world handle large amounts of data and are dependent on mining gigantic data sets for expansion of their enterprises. These data sets typically contain sensitive individual information, which consequently get exposed to the other parties. Though we cannot deny the ben…
▽ More
Data mining deals with automatic extraction of previously unknown patterns from large amounts of data. Organizations all over the world handle large amounts of data and are dependent on mining gigantic data sets for expansion of their enterprises. These data sets typically contain sensitive individual information, which consequently get exposed to the other parties. Though we cannot deny the benefits of knowledge discovery that comes through data mining, we should also ensure that data privacy is maintained in the event of data mining. Privacy preserving data mining is a specialized activity in which the data privacy is ensured during data mining. Data privacy is as important as the extracted knowledge and efforts that guarantee data privacy during data mining are encouraged. In this paper we propose a strategy that protects the data privacy during decision tree analysis of data mining process. We propose to add specific noise to the numeric attributes after exploring the decision tree of the original data. The obfuscated data then is presented to the second party for decision tree analysis. The decision tree obtained on the original data and the obfuscated data are similar but by using our method the data proper is not revealed to the second party during the mining process and hence the privacy will be preserved.
△ Less
Submitted 20 January, 2010;
originally announced January 2010.