-
Continuous variable dense coding under realistic non-ideal scenarios
Authors:
Mrinmoy Samanta,
Ayan Patra,
Rivu Gupta,
Aditi Sen De
Abstract:
We analyze the continuous variable (CV) dense coding protocol between a single sender and a single receiver when affected by noise in the shared and encoded states as well as when the decoding is imperfect. We derive a general formalism for the dense coding capacity (DCC) of generic two-mode Gaussian states. When the constituent modes are affected by quantum-limited amplifiers, pure-loss channels,…
▽ More
We analyze the continuous variable (CV) dense coding protocol between a single sender and a single receiver when affected by noise in the shared and encoded states as well as when the decoding is imperfect. We derive a general formalism for the dense coding capacity (DCC) of generic two-mode Gaussian states. When the constituent modes are affected by quantum-limited amplifiers, pure-loss channels, and environmental interactions together with an inefficient decoding mechanism comprising imperfect double-homodyne detection, we investigate the pattern of DCC of the two-mode squeezed vacuum state (TMSV) by varying the strength of the noise. We further establish that the negative conditional entropy is responsible for providing quantum advantage in CV dense coding and identify a class of pure states capable of furnishing the maximal dense coding capacity equal to that of the TMSV under equal energy. We also demonstrate that, while the TMSV state provides the maximum quantum advantage in the DC protocol, there exists a class of states that is more resilient against noise than the TMSV state in the context of the DCC.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Magnetic critical phenomena and low temperature re-entrant spin-glass features of Al$_2$MnFe Heusler alloy
Authors:
Abhinav Kumar Khorwal,
Sujoy Saha,
Mukesh Verma,
Lalita Saini,
Suvigya Kaushik,
Yugandhar Bitla,
Alexey V. Lukoyanov,
Ajit K. Patra
Abstract:
A detailed investigation of the structural and magnetic properties, including magnetocaloric effect, re-entrant spin-glass behavior at low temperature, and critical behavior in polycrystalline Al$_2$MnFe Heusler alloy is reported. The prepared alloy crystallizes in a cubic CsCl-type crystal structure with Pm-3m space group. The temperature-dependent magnetization data reveals a second-order parama…
▽ More
A detailed investigation of the structural and magnetic properties, including magnetocaloric effect, re-entrant spin-glass behavior at low temperature, and critical behavior in polycrystalline Al$_2$MnFe Heusler alloy is reported. The prepared alloy crystallizes in a cubic CsCl-type crystal structure with Pm-3m space group. The temperature-dependent magnetization data reveals a second-order paramagnetic to ferromagnetic phase transition ($\sim$ 122.9 K), which is further supported by the analysis of the magnetocaloric effect. The isothermal magnetization loops show a soft ferromagnetic behavior of the studied alloy and also reveal an itinerant character of the underlying exchange interactions. In order to understand the nature of magnetic interactions, the critical exponents for spontaneous magnetization, initial magnetic susceptibility, and critical MH isotherm are determined using Modified Arrott plots, Kouvel-Fisher plots, and critical isotherm analysis. The derived critical exponents $β$ = 0.363(2), $γ$ = 1.384(3), and $δ$ = 4.81(3) confirm the critical behavior similar to that of a 3D-Heisenberg-type ferromagnet with short-range exchange interactions that are found to decay with distance as J(r) $\approx$ r$^{-4.936}$. Moreover, the detailed analysis of the AC susceptibility data suggests that the frequency-dependent shifting of the peak temperatures is well explained using standard dynamic scaling laws such as the critical slowing down model and Vogel-Fulcher law, and confirms the signature of re-entrant spin-glass features in Al$_2$MnFe Heusler alloy. Furthermore, maximum magnetic entropy change of $\sim$ 1.92 J/kg-K and relative cooling power of $\sim$ 496 J/kg at 50 kOe applied magnetic field are determined from magnetocaloric studies that are comparable to those of other Mn-Fe-Al systems.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Generalized regenerating codes and node repair on graphs
Authors:
Adway Patra,
Alexander Barg
Abstract:
We consider regenerating codes in distributed storage systems where connections between the nodes are constrained by a graph. In this problem, the failed node downloads the information stored at a subset of vertices of the graph for the purpose of recovering the lost data. Compared to the standard setting, regenerating codes on graphs address two additional features. The repair information is move…
▽ More
We consider regenerating codes in distributed storage systems where connections between the nodes are constrained by a graph. In this problem, the failed node downloads the information stored at a subset of vertices of the graph for the purpose of recovering the lost data. Compared to the standard setting, regenerating codes on graphs address two additional features. The repair information is moved across the network, and the cost of node repair is determined by the graphical distance from the helper nodes to the failed node. Accordingly, the helpers far away from the failed node may be expected to contribute less data for repair than the nodes in the neighborhood of that node. We analyze regenerating codes with nonuniform download for repair on graphs. Moreover, in the process of repair, the information moved from the helpers to the failed node may be combined through intermediate processing, reducing the repair bandwidth. We derive lower bounds for communication complexity of node repair on graphs, including repair schemes with nonuniform download and intermediate processing, and construct codes that attain these bounds.
Additionally, some of the nodes may act as adversaries, introducing errors into the data moved in the network. For repair on graphs in the presence of adversarial nodes, we construct codes that support node repair and error correction in systematic nodes.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
Retrieving and Refining: A Hybrid Framework with Large Language Models for Rare Disease Identification
Authors:
**ge Wu,
Hang Dong,
Zexi Li,
Arijit Patra,
Honghan Wu
Abstract:
The infrequency and heterogeneity of clinical presentations in rare diseases often lead to underdiagnosis and their exclusion from structured datasets. This necessitates the utilization of unstructured text data for comprehensive analysis. However, the manual identification from clinical reports is an arduous and intrinsically subjective task. This study proposes a novel hybrid approach that syner…
▽ More
The infrequency and heterogeneity of clinical presentations in rare diseases often lead to underdiagnosis and their exclusion from structured datasets. This necessitates the utilization of unstructured text data for comprehensive analysis. However, the manual identification from clinical reports is an arduous and intrinsically subjective task. This study proposes a novel hybrid approach that synergistically combines a traditional dictionary-based natural language processing (NLP) tool with the powerful capabilities of large language models (LLMs) to enhance the identification of rare diseases from unstructured clinical notes. We comprehensively evaluate various prompting strategies on six large language models (LLMs) of varying sizes and domains (general and medical). This evaluation encompasses zero-shot, few-shot, and retrieval-augmented generation (RAG) techniques to enhance the LLMs' ability to reason about and understand contextual information in patient reports. The results demonstrate effectiveness in rare disease identification, highlighting the potential for identifying underdiagnosed patients from clinical notes.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Explainable Light-Weight Deep Learning Pipeline for Improved Drought Stress Identification
Authors:
Aswini Kumar Patra,
Lingaraj Sahoo
Abstract:
Early identification of drought stress in crops is vital for implementing effective mitigation measures and reducing yield loss. Non-invasive imaging techniques hold immense potential by capturing subtle physiological changes in plants under water deficit. Sensor based imaging data serves as a rich source of information for machine learning and deep learning algorithms, facilitating further analys…
▽ More
Early identification of drought stress in crops is vital for implementing effective mitigation measures and reducing yield loss. Non-invasive imaging techniques hold immense potential by capturing subtle physiological changes in plants under water deficit. Sensor based imaging data serves as a rich source of information for machine learning and deep learning algorithms, facilitating further analysis aimed at identifying drought stress. While these approaches yield favorable results, real-time field applications requires algorithms specifically designed for the complexities of natural agricultural conditions. Our work proposes a novel deep learning framework for classifying drought stress in potato crops captured by UAVs in natural settings. The novelty lies in the synergistic combination of a pre-trained network with carefully designed custom layers. This architecture leverages feature extraction capabilities of the pre-trained network while the custom layers enable targeted dimensionality reduction and enhanced regularization, ultimately leading to improved performance. A key innovation of our work involves the integration of Gradient-Class Activation Map** (Grad-CAM), an explainability technique. Grad-CAM sheds light on the internal workings of the deep learning model, typically referred to as a black box. By visualizing the focus areas of the model within the images, Grad-CAM fosters interpretability and builds trust in the decision-making process of the model. Our proposed framework achieves superior performance, particularly with the DenseNet121 pre-trained network, reaching a precision of 97% to identify the stressed class with an overall accuracy of 91%. Comparative analysis of existing state-of-the-art object detection algorithms reveals the superiority of our approach in significantly higher precision and accuracy.
△ Less
Submitted 3 May, 2024; v1 submitted 15 April, 2024;
originally announced April 2024.
-
A rare simultaneous detection of a mid-latitude plasma depleted structure in O($^1$D) 630.0 nm and O($^1$S) 557.7 nm all-sky airglow images on a geomagnetically quiet night
Authors:
D. Patgiri,
R. Rathi,
V. Yadav,
D. Chakrabarty,
M. V. Sunil Krishna,
S. Kannaujiya,
P. Pavan Chaitanya,
A. K. Patra,
Jann-Yenq Liu,
S. Sarkhel
Abstract:
In general, nighttime thermospheric 557.7 nm emission over mid-latitudes is predominantly masked by significantly larger mesospheric component, and hence, F-region plasma structures are rarely observed in this emission. This paper reports the first rare simultaneous detection of F-region plasma depleted structure in O($^1$D) 630.0 nm and O($^1$S) 557.7 nm airglow images from Hanle, India, a mid-la…
▽ More
In general, nighttime thermospheric 557.7 nm emission over mid-latitudes is predominantly masked by significantly larger mesospheric component, and hence, F-region plasma structures are rarely observed in this emission. This paper reports the first rare simultaneous detection of F-region plasma depleted structure in O($^1$D) 630.0 nm and O($^1$S) 557.7 nm airglow images from Hanle, India, a mid-latitude station (32.7°N, 78.9°E; Mlat. ~24.1°N) on a geomagnetically quiet night (Ap=3) of 26 June 2021. This indicates significant enhancement of thermospheric 557.7 nm emission. Interestingly, thermospheric 557.7 nm emission was not significant on the following geomagnetically quiet night as MSTID bands were only observed in 630.0 nm images. We show that enhanced dissociative recombination caused by descent of F-layer peak over the observation region coupled with the significant increase of the electron density at thermospheric 557.7 nm emission altitude enabled the detection of the plasma depleted structure on 26 June 2021.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Microstructural and Mechanistic Insights into the Tension-Compression Asymmetry of Rapidly Solidified Fe-Cr Alloys: A Phase Field and Strain Gradient Plasticity Study
Authors:
Namit Pai,
Indradev Samajdar,
Anirban Patra
Abstract:
Rapid solidification in Additively Manufactured (AM) metallic materials results in the development of significant microscale internal stresses, which are attributed to the printing induced dislocation substructures. The resulting backstress due to the Geometrically Necessary Dislocations (GNDs) is responsible for the observed Tension-Compression (TC) asymmetry. We propose a combined Phase Field (P…
▽ More
Rapid solidification in Additively Manufactured (AM) metallic materials results in the development of significant microscale internal stresses, which are attributed to the printing induced dislocation substructures. The resulting backstress due to the Geometrically Necessary Dislocations (GNDs) is responsible for the observed Tension-Compression (TC) asymmetry. We propose a combined Phase Field (PF)-Strain Gradient $J_2$ Plasticity (SGP) framework to investigate the TC asymmetry in such microstructures. The proposed PF model is an extension of Kobayashi's dendritic growth framework, modified to account for the orientation-based anisotropy and multi-grain interaction effects. The SGP model has consideration for anisotropic temperature-dependent elasticity, dislocation strengthening, solid solution strengthening, along with GND-induced directional backstress. This model is employed to predict the solute segregation, dislocation substructure and backstress development during solidification and the post-solidification anisotropic mechanical properties in terms of the TC asymmetry of rapidly solidified Fe-Cr alloys. It is observed that higher thermal gradients (and hence, cooling rates) lead to higher magnitudes of solute segregation, GND density, and backstress. This also correlates with a corresponding increase in the predicted TC asymmetry. The results presented in this study point to the microstructural factors, such as dislocation substructure and solute segregation, and mechanistic factors, such as backstress, which may contribute to the development of TC asymmetry in rapidly solidified microstructures.
△ Less
Submitted 17 May, 2024; v1 submitted 17 March, 2024;
originally announced March 2024.
-
Spin-Phonon interaction in quasi 2D- Cr$_2Te_3$
Authors:
Gurupada Ghorai,
Kalyan Ghosh,
Abhilash Patra,
Prasanjit Samal,
Kartik Senapati,
Pratap K. Sahoo
Abstract:
Spin-phonon interaction plays an important role in 2D magnetic materials and motivates the development of next-generation spin- and charge-dependent microelectronic devices. Understanding the spin-phonon interaction by tuning the growth parameter of single crystal Cr$_2Te_3$, a robust quasi-2D room temperature magnetic material, is crucial for spintronic devices. The synthesis of single crystal 2D…
▽ More
Spin-phonon interaction plays an important role in 2D magnetic materials and motivates the development of next-generation spin- and charge-dependent microelectronic devices. Understanding the spin-phonon interaction by tuning the growth parameter of single crystal Cr$_2Te_3$, a robust quasi-2D room temperature magnetic material, is crucial for spintronic devices. The synthesis of single crystal 2D Cr$_2Te_3$ flakes on a Si substrate from co-deposited thin film by plasma annealing techniques is a significant achievement. The temperature dependence and polarization-resolved Raman spectroscopy with support of density functional theory classified lattice symmetry operations were used to identify the phonon modes to investigate the spin/electron-phonon interactions in Cr$_2Te_3$. The mean-field theory model in single crystal Cr$_2Te_3$ is employed to quantify the spin-phonon interaction and correlate with in-plane and out-of-plane magnetic behavior. The observation of a positive correlation between phonon mode frequency and spin-phonon interaction strength in single crystal Cr$_2Te_3$ can be a potential candidate for spintronic applications.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Ultralight vector dark matter search using data from the KAGRA O3GK run
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
A. G. Abac,
R. Abbott,
H. Abe,
I. Abouelfettouh,
F. Acernese,
K. Ackley,
C. Adamcewicz,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
I. Aguilar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi
, et al. (1778 additional authors not shown)
Abstract:
Among the various candidates for dark matter (DM), ultralight vector DM can be probed by laser interferometric gravitational wave detectors through the measurement of oscillating length changes in the arm cavities. In this context, KAGRA has a unique feature due to differing compositions of its mirrors, enhancing the signal of vector DM in the length change in the auxiliary channels. Here we prese…
▽ More
Among the various candidates for dark matter (DM), ultralight vector DM can be probed by laser interferometric gravitational wave detectors through the measurement of oscillating length changes in the arm cavities. In this context, KAGRA has a unique feature due to differing compositions of its mirrors, enhancing the signal of vector DM in the length change in the auxiliary channels. Here we present the result of a search for $U(1)_{B-L}$ gauge boson DM using the KAGRA data from auxiliary length channels during the first joint observation run together with GEO600. By applying our search pipeline, which takes into account the stochastic nature of ultralight DM, upper bounds on the coupling strength between the $U(1)_{B-L}$ gauge boson and ordinary matter are obtained for a range of DM masses. While our constraints are less stringent than those derived from previous experiments, this study demonstrates the applicability of our method to the lower-mass vector DM search, which is made difficult in this measurement by the short observation time compared to the auto-correlation time scale of DM.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Learning to Defer to a Population: A Meta-Learning Approach
Authors:
Dharmesh Tailor,
Aditya Patra,
Rajeev Verma,
Putra Manggala,
Eric Nalisnick
Abstract:
The learning to defer (L2D) framework allows autonomous systems to be safe and robust by allocating difficult decisions to a human expert. All existing work on L2D assumes that each expert is well-identified, and if any expert were to change, the system should be re-trained. In this work, we alleviate this constraint, formulating an L2D system that can cope with never-before-seen experts at test-t…
▽ More
The learning to defer (L2D) framework allows autonomous systems to be safe and robust by allocating difficult decisions to a human expert. All existing work on L2D assumes that each expert is well-identified, and if any expert were to change, the system should be re-trained. In this work, we alleviate this constraint, formulating an L2D system that can cope with never-before-seen experts at test-time. We accomplish this by using meta-learning, considering both optimization- and model-based variants. Given a small context set to characterize the currently available expert, our framework can quickly adapt its deferral policy. For the model-based approach, we employ an attention mechanism that is able to look for points in the context set that are similar to a given test point, leading to an even more precise assessment of the expert's abilities. In the experiments, we validate our methods on image recognition, traffic sign detection, and skin lesion diagnosis benchmarks.
△ Less
Submitted 13 May, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
Tensor Completion with BMD Factor Nuclear Norm Minimization
Authors:
Fan Tian,
Mirjeta Pasha,
Misha E. Kilmer,
Eric Miller,
Abani Patra
Abstract:
This paper is concerned with the problem of recovering third-order tensor data from limited samples. A recently proposed tensor decomposition (BMD) method has been shown to efficiently compress third-order spatiotemporal data. Using the BMD, we formulate a slicewise nuclear norm penalized algorithm to recover a third-order tensor from limited observed samples. We develop an efficient alternating d…
▽ More
This paper is concerned with the problem of recovering third-order tensor data from limited samples. A recently proposed tensor decomposition (BMD) method has been shown to efficiently compress third-order spatiotemporal data. Using the BMD, we formulate a slicewise nuclear norm penalized algorithm to recover a third-order tensor from limited observed samples. We develop an efficient alternating direction method of multipliers (ADMM) scheme to solve the resulting minimization problem. Experimental results on real data show our method to give reconstruction comparable to those of HaLRTC (Liu et al., IEEE Trans Ptrn Anal Mchn Int, 2012), a well-known tensor completion method, in about the same number of iterations. However, our method has the advantage of smaller subproblems and higher parallelizability per iteration.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Shock waves, black hole interiors and holographic RG flows
Authors:
Elena Cáceres,
Ayan K. Patra,
Juan F. Pedraza
Abstract:
We study holographic renormalization group (RG) flows perturbed by a shock wave in dimensions $d\geq 2$. The flows are obtained by deforming a holographic conformal field theory with a relevant operator, altering the interior geometry from AdS-Schwarzschild to a more general Kasner universe near the spacelike singularity. We introduce null matter in the form of a shock wave into this geometry and…
▽ More
We study holographic renormalization group (RG) flows perturbed by a shock wave in dimensions $d\geq 2$. The flows are obtained by deforming a holographic conformal field theory with a relevant operator, altering the interior geometry from AdS-Schwarzschild to a more general Kasner universe near the spacelike singularity. We introduce null matter in the form of a shock wave into this geometry and scrutinize its impact on the near-horizon and interior dynamics of the black hole. Using out-of-time-order correlators, we find that the scrambling time increases as we increase the strength of the deformation, whereas the butterfly velocity displays a non-monotonic behavior. We examine other observables that are more sensitive to the black hole interior, such as the thermal $a$-function and the entanglement velocity. Notably, the $a$-function experiences a discontinuous jump across the shock wave, signaling an instantaneous loss of degrees of freedom due to the infalling matter. This jump is interpreted as a `cosmological time skip' which arises from an infinitely boosted length contraction. The entanglement velocity exhibits similar dependence to the butterfly velocity as we vary the strength of the deformation. Lastly, we extend our analyses to a model where the interior geometry undergoes an infinite sequence of bouncing Kasner epochs.
△ Less
Submitted 8 July, 2024; v1 submitted 21 November, 2023;
originally announced November 2023.
-
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
Authors:
Yongqin Wang,
Pratik Sarkar,
Nishat Koti,
Arpita Patra,
Murali Annavaram
Abstract:
Secure Multiparty Computation (MPC) protocols enable secure evaluation of a circuit by several parties, even in the presence of an adversary who maliciously corrupts all but one of the parties. These MPC protocols are constructed using the well-known secret-sharing-based paradigm (SPDZ and SPDZ2k), where the protocols ensure security against a malicious adversary by computing Message Authenticatio…
▽ More
Secure Multiparty Computation (MPC) protocols enable secure evaluation of a circuit by several parties, even in the presence of an adversary who maliciously corrupts all but one of the parties. These MPC protocols are constructed using the well-known secret-sharing-based paradigm (SPDZ and SPDZ2k), where the protocols ensure security against a malicious adversary by computing Message Authentication Code (MAC) tags on the input shares and then evaluating the circuit with these input shares and tags. However, this tag computation adds a significant runtime overhead, particularly for machine learning (ML) applications with numerous linear computation layers such as convolutions and fully connected layers.
To alleviate the tag computation overhead, we introduce CompactTag, a lightweight algorithm for generating MAC tags specifically tailored for linear layers in ML. Linear layer operations in ML, including convolutions, can be transformed into Toeplitz matrix multiplications. For the multiplication of two matrices with dimensions T1 x T2 and T2 x T3 respectively, SPDZ2k required O(T1 x T2 x T3) local multiplications for the tag computation. In contrast, CompactTag only requires O(T1 x T2 + T1 x T3 + T2 x T3) local multiplications, resulting in a substantial performance boost for various ML models.
We empirically compared our protocol to the SPDZ2k protocol for various ML circuits, including ResNet Training-Inference, Transformer Training-Inference, and VGG16 Training-Inference. SPDZ2k dedicated around 30% of its online runtime for tag computation. CompactTag speeds up this tag computation bottleneck by up to 23x, resulting in up to 1.47x total online phase runtime speedups for various ML workloads.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Dimensional advantage in secure information trading via the noisy dense coding protocol
Authors:
Ayan Patra,
Rivu Gupta,
Tamoghna Das,
Aditi Sen De
Abstract:
The quantum dense coding (DC) protocol, which has no security feature, deals with the transmission of classical information encoded in a quantum state by using shared entanglement between a single sender and a single receiver. Its appropriate variant has been established as a quantum key distribution (QKD) scheme for shared two-qubit maximally entangled states, with the security proof utilizing th…
▽ More
The quantum dense coding (DC) protocol, which has no security feature, deals with the transmission of classical information encoded in a quantum state by using shared entanglement between a single sender and a single receiver. Its appropriate variant has been established as a quantum key distribution (QKD) scheme for shared two-qubit maximally entangled states, with the security proof utilizing the uncertainty relation of complementary observables and the Shor-Preskill entanglement purification scheme. We present the DC-based QKD protocol for higher dimensional systems and report the lower bounds on secret key rate, when the shared state is a two-qudit maximally entangled state, and mixtures of maximally entangled states with different ranks. The analysis also includes the impact of noisy channels on the secure key rates, before and after encoding. In both the noiseless and the noisy scenarios, we demonstrate that the key rate as well as the robustness of the protocol against noise increases with the dimension. Further, we prove that the set of useless states in the DC-based QKD protocol is convex and compact.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
Inferring to C or not to C: Evolutionary games with Bayesian inferential strategies
Authors:
Arunava Patra,
Supratim Sengupta,
Ayan Paul,
Sagar Chakraborty
Abstract:
Strategies for sustaining cooperation and preventing exploitation by selfish agents in repeated games have mostly been restricted to Markovian strategies where the response of an agent depends on the actions in the previous round. Such strategies are characterized by lack of learning. However, learning from accumulated evidence over time and using the evidence to dynamically update our response is…
▽ More
Strategies for sustaining cooperation and preventing exploitation by selfish agents in repeated games have mostly been restricted to Markovian strategies where the response of an agent depends on the actions in the previous round. Such strategies are characterized by lack of learning. However, learning from accumulated evidence over time and using the evidence to dynamically update our response is a key feature of living organisms. Bayesian inference provides a framework for such evidence-based learning mechanisms. It is therefore imperative to understand how strategies based on Bayesian learning fare in repeated games with Markovian strategies. Here, we consider a scenario where the Bayesian player uses the accumulated evidence of the opponent's actions over several rounds to continuously update her belief about the reactive opponent's strategy. The Bayesian player can then act on her inferred belief in different ways. By studying repeated Prisoner's dilemma games with such Bayesian inferential strategies, both in infinite and finite populations, we identify the conditions under which such strategies can be evolutionarily stable. We find that a Bayesian strategy that is less altruistic than the inferred belief about the opponent's strategy can outperform a larger set of reactive strategies, whereas one that is more generous than the inferred belief is more successful when the benefit-to-cost ratio of mutual cooperation is high. Our analysis reveals how learning the opponent's strategy through Bayesian inference, as opposed to utility maximization, can be beneficial in the long run, in preventing exploitation and eventual invasion by reactive strategies.
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
Histopathological Image Classification and Vulnerability Analysis using Federated Learning
Authors:
Sankalp Vyas,
Amar Nath Patra,
Raj Mani Shukla
Abstract:
Healthcare is one of the foremost applications of machine learning (ML). Traditionally, ML models are trained by central servers, which aggregate data from various distributed devices to forecast the results for newly generated data. This is a major concern as models can access sensitive user information, which raises privacy concerns. A federated learning (FL) approach can help address this issue…
▽ More
Healthcare is one of the foremost applications of machine learning (ML). Traditionally, ML models are trained by central servers, which aggregate data from various distributed devices to forecast the results for newly generated data. This is a major concern as models can access sensitive user information, which raises privacy concerns. A federated learning (FL) approach can help address this issue: A global model sends its copy to all clients who train these copies, and the clients send the updates (weights) back to it. Over time, the global model improves and becomes more accurate. Data privacy is protected during training, as it is conducted locally on the clients' devices.
However, the global model is susceptible to data poisoning. We develop a privacy-preserving FL technique for a skin cancer dataset and show that the model is prone to data poisoning attacks. Ten clients train the model, but one of them intentionally introduces flipped labels as an attack. This reduces the accuracy of the global model. As the percentage of label flip** increases, there is a noticeable decrease in accuracy. We use a stochastic gradient descent optimization algorithm to find the most optimal accuracy for the model. Although FL can protect user privacy for healthcare diagnostics, it is also vulnerable to data poisoning, which must be addressed.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Information theoretic resource-breaking channels
Authors:
Abhishek Muhuri,
Ayan Patra,
Rivu Gupta,
Aditi Sen De
Abstract:
We present a framework of channels that break the resource associated with a given quantum information processing task, in which entanglement is not adequate. In particular, we illustrate our proposed notion, referred to as process resource-breaking channels, by examining two important communication protocols, quantum dense coding, and teleportation. We prove that the sets of dense coding (DBT) an…
▽ More
We present a framework of channels that break the resource associated with a given quantum information processing task, in which entanglement is not adequate. In particular, we illustrate our proposed notion, referred to as process resource-breaking channels, by examining two important communication protocols, quantum dense coding, and teleportation. We prove that the sets of dense coding (DBT) and teleportation resource-breaking channels (TBT) are convex and compact, and identify a specific class of classical-quantum channels as the extreme points of those sets. We provide sufficient conditions for a channel to be in TBT or DBT, when they are group-covariant along with having the ability to transform a maximally entangled state into a useless one. We also establish sufficient requirements on unital qubit channels to break the dense codeability of any resource shared by one or more senders and a single receiver. Regarding teleportation, we prove that the set TBT in the qubit regime is equivalent to that of qubit entanglement-breaking channels provided pre-processing is allowed. Furthermore, we construct witness operators capable of identifying non-TBT(non-DBT) maps.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Entangled universes in dS wedge holography
Authors:
Sergio E. Aguilar-Gutierrez,
Ayan K. Patra,
Juan F. Pedraza
Abstract:
We develop a new setting in the framework of braneworld holography to describe a pair of coupled and entangled uniformly accelerated universes. The model consists of two branes embedded into AdS space cap** off the UV and IR regions, giving rise to a notion of dS wedge holography. Specializing in a three-dimensional bulk, we show that dS JT gravity can emerge as an effective braneworld theory, p…
▽ More
We develop a new setting in the framework of braneworld holography to describe a pair of coupled and entangled uniformly accelerated universes. The model consists of two branes embedded into AdS space cap** off the UV and IR regions, giving rise to a notion of dS wedge holography. Specializing in a three-dimensional bulk, we show that dS JT gravity can emerge as an effective braneworld theory, provided that fluctuations transverse to the brane are included. We study the holographic entanglement entropy between the branes as well as the holographic complexity within the `complexity=anything' proposal. We reproduce a Page curve with respect to an observer collecting radiation on the UV brane, as long as we take the limit where gravity decouples in that universe, thus acting as a non-gravitating bath. The Page curve emerges due to momentum-space (UV/IR) entanglement and can be understood as analogous to the `confinement-deconfinement' transition in theories with a mass gap. Moreover, the analysis of complexity shows that the hyperfast growth phenomenon is displayed within a set of proposals, while late-time linear growth can be recovered for a different set. Our framework thus provides new test grounds for understanding quantum information concepts in dS space and dS holography.
△ Less
Submitted 4 November, 2023; v1 submitted 10 August, 2023;
originally announced August 2023.
-
Search for Eccentric Black Hole Coalescences during the Third Observing Run of LIGO and Virgo
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
A. G. Abac,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
C. Adamcewicz,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
I. Aguilar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi
, et al. (1750 additional authors not shown)
Abstract:
Despite the growing number of confident binary black hole coalescences observed through gravitational waves so far, the astrophysical origin of these binaries remains uncertain. Orbital eccentricity is one of the clearest tracers of binary formation channels. Identifying binary eccentricity, however, remains challenging due to the limited availability of gravitational waveforms that include effect…
▽ More
Despite the growing number of confident binary black hole coalescences observed through gravitational waves so far, the astrophysical origin of these binaries remains uncertain. Orbital eccentricity is one of the clearest tracers of binary formation channels. Identifying binary eccentricity, however, remains challenging due to the limited availability of gravitational waveforms that include effects of eccentricity. Here, we present observational results for a waveform-independent search sensitive to eccentric black hole coalescences, covering the third observing run (O3) of the LIGO and Virgo detectors. We identified no new high-significance candidates beyond those that were already identified with searches focusing on quasi-circular binaries. We determine the sensitivity of our search to high-mass (total mass $M>70$ $M_\odot$) binaries covering eccentricities up to 0.3 at 15 Hz orbital frequency, and use this to compare model predictions to search results. Assuming all detections are indeed quasi-circular, for our fiducial population model, we place an upper limit for the merger rate density of high-mass binaries with eccentricities $0 < e \leq 0.3$ at $0.33$ Gpc$^{-3}$ yr$^{-1}$ at 90\% confidence level.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Dynamical chaos in the integrable Toda chain induced by time discretization
Authors:
Carlo Danieli,
Emil A. Yuzbashyan,
Boris L. Altshuler,
Aniket Patra,
Sergej Flach
Abstract:
We use the Toda chain model to demonstrate that numerical simulation of integrable Hamiltonian dynamics using time discretization destroys integrability and induces dynamical chaos. Specifically, we integrate this model with various symplectic integrators parametrized by the time step $τ$ and measure the Lyapunov time $T_Λ$ (inverse of the largest Lyapunov exponent $Λ$). A key observation is that…
▽ More
We use the Toda chain model to demonstrate that numerical simulation of integrable Hamiltonian dynamics using time discretization destroys integrability and induces dynamical chaos. Specifically, we integrate this model with various symplectic integrators parametrized by the time step $τ$ and measure the Lyapunov time $T_Λ$ (inverse of the largest Lyapunov exponent $Λ$). A key observation is that $T_Λ$ is finite whenever $τ$ is finite but diverges when $τ\rightarrow 0$. We compare the Toda chain results with the nonitegrable Fermi-Pasta-Ulam-Tsingou chain dynamics. In addition, we observe a breakdown of the simulations at times $T_B \gg T_Λ$ due to certain positions and momenta becoming extremely large (``Not a Number''). This phenomenon originates from the periodic driving introduced by symplectic integrators and we also identify the concrete mechanism of the breakdown in the case of the Toda chain.
△ Less
Submitted 23 January, 2024; v1 submitted 1 August, 2023;
originally announced August 2023.
-
Perfect transfer of arbitrary continuous variable states across optical waveguide lattices
Authors:
Tonipe Anuradha,
Ayan Patra,
Rivu Gupta,
Aditi Sen De
Abstract:
We demonstrate that perfect state transfer can be achieved in an optical waveguide lattice governed by a Hamiltonian with modulated nearest-neighbor couplings. In particular, we report the condition that the evolution Hamiltonian should satisfy in order to achieve perfect transfer of any continuous variable input state. The states that can be transmitted need not have any specific properties - the…
▽ More
We demonstrate that perfect state transfer can be achieved in an optical waveguide lattice governed by a Hamiltonian with modulated nearest-neighbor couplings. In particular, we report the condition that the evolution Hamiltonian should satisfy in order to achieve perfect transfer of any continuous variable input state. The states that can be transmitted need not have any specific properties - they may be pure or mixed, Gaussian or non-Gaussian in character, and comprise an arbitrary number of modes. We illustrate that the proposed protocol is scalable to two- and three-dimensional waveguide geometries. With the help of local phase gates on all the modes, our results can also be applied to realize a SWAP gate between mirror-symmetric modes about the centre of the waveguide setup.
△ Less
Submitted 22 June, 2023;
originally announced June 2023.
-
Tensor BM-Decomposition for Compression and Analysis of Spatio-Temporal Third-order Data
Authors:
Fan Tian,
Misha E. Kilmer,
Eric Miller,
Abani Patra
Abstract:
Given tensors $\boldsymbol{\mathscr{A}}, \boldsymbol{\mathscr{B}}, \boldsymbol{\mathscr{C}}$ of size $m \times 1 \times n$, $m \times p \times 1$, and $1\times p \times n$, respectively, their Bhattacharya-Mesner (BM) product will result in a third order tensor of dimension $m \times p \times n$ and BM-rank of 1 (Mesner and Bhattacharya, 1990). Thus, if a third-order tensor can be written as a sum…
▽ More
Given tensors $\boldsymbol{\mathscr{A}}, \boldsymbol{\mathscr{B}}, \boldsymbol{\mathscr{C}}$ of size $m \times 1 \times n$, $m \times p \times 1$, and $1\times p \times n$, respectively, their Bhattacharya-Mesner (BM) product will result in a third order tensor of dimension $m \times p \times n$ and BM-rank of 1 (Mesner and Bhattacharya, 1990). Thus, if a third-order tensor can be written as a sum of a small number of such BM-rank 1 terms, this BM-decomposition (BMD) offers an implicitly compressed representation of the tensor. Therefore, in this paper, we give a generative model which illustrates that spatio-temporal video data can be expected to have low BM-rank. Then, we discuss non-uniqueness properties of the BMD and give an improved bound on the BM-rank of a third-order tensor. We present and study properties of an iterative algorithm for computing an approximate BMD, including convergence behavior and appropriate choices for starting guesses that allow for the decomposition of our spatial-temporal data into stationary and non-stationary components. Several numerical experiments show the impressive ability of our BMD algorithm to extract important temporal information from video data while simultaneously compressing the data. In particular, we compare our approach with dynamic mode decomposition (DMD): first, we show how the matrix-based DMD can be reinterpreted in tensor BMP form, then we explain why the low BM-rank decomposition can produce results with superior compression properties while simultaneously providing better separation of stationary and non-stationary features in the data. We conclude with a comparison of our low BM-rank decomposition to two other tensor decompositions, CP and the t-SVDM.
△ Less
Submitted 17 June, 2023; v1 submitted 15 June, 2023;
originally announced June 2023.
-
New upper bounds for the $q$-numerical radius of Hilbert space operators
Authors:
Arnab Patra,
Falguni Roy
Abstract:
This article introduces several new upper bounds for the $q$-numerical radius of bounded linear operators on complex Hilbert spaces. Our results refine some of the existing upper bounds in this field. The $q$-numerical radius inequalities of products and commutators of operators follow as special cases. Finally, some new inequalities for the $q$-numerical radius of $2 \times 2$ operator matrices a…
▽ More
This article introduces several new upper bounds for the $q$-numerical radius of bounded linear operators on complex Hilbert spaces. Our results refine some of the existing upper bounds in this field. The $q$-numerical radius inequalities of products and commutators of operators follow as special cases. Finally, some new inequalities for the $q$-numerical radius of $2 \times 2$ operator matrices are established.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
Unraveling Cold Start Enigmas in Predictive Analytics for OTT Media: Synergistic Meta-Insights and Multimodal Ensemble Mastery
Authors:
K. Ganguly,
A. Patra
Abstract:
The cold start problem is a common challenge in various domains, including media use cases such as predicting viewership for newly launched shows on Over-The-Top (OTT) platforms. In this study, we propose a generic approach to tackle cold start problems by leveraging metadata and employing multi-model ensemble techniques. Our methodology includes feature engineering, model selection, and an ensemb…
▽ More
The cold start problem is a common challenge in various domains, including media use cases such as predicting viewership for newly launched shows on Over-The-Top (OTT) platforms. In this study, we propose a generic approach to tackle cold start problems by leveraging metadata and employing multi-model ensemble techniques. Our methodology includes feature engineering, model selection, and an ensemble approach based on a weighted average of predictions. The performance of our proposed method is evaluated using various performance metrics. Our results indicate that the multi-model ensemble approach significantly improves prediction accuracy compared to individual models.
△ Less
Submitted 14 May, 2023;
originally announced May 2023.
-
Spectral properties of the Rhaly operator on weighted null sequence spaces and associated operator ideals
Authors:
Arnab Patra,
Jyoti Rani,
Sanjay Kumar Mahto
Abstract:
In this article, a comprehensive study is made on the continuity, compactness, and spectrum of the lower triangular terraced matrix, introduced by H. C. Rhaly, Jr. [Houston J. Math. 15(1): 137-146, 1989], acting on the weighted null sequence spaces with bounded, strictly positive weights. Several spectral subdivisions such as point spectrum, residual spectrum, and continuous spectrum are also disc…
▽ More
In this article, a comprehensive study is made on the continuity, compactness, and spectrum of the lower triangular terraced matrix, introduced by H. C. Rhaly, Jr. [Houston J. Math. 15(1): 137-146, 1989], acting on the weighted null sequence spaces with bounded, strictly positive weights. Several spectral subdivisions such as point spectrum, residual spectrum, and continuous spectrum are also discussed. In addition, a new class of operator ideal $χ_{c_0(r)}^{(s)}$ associated to the Rhaly operator on weighted $c_0$ space is defined using the concept of $s$-number and it is proved that under certain condition, $χ_{c_0(r)}^{(s)}$ forms a quasi-Banach closed operator ideal.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Holographic complexity of Jackiw-Teitelboim gravity from Karch-Randall braneworld
Authors:
Aranya Bhattacharya,
Arpan Bhattacharyya,
Ayan K. Patra
Abstract:
Recently, it has been argued in [1] that Jackiw-Teitelboim (JT) gravity can be naturally realized in the Karch-Randall braneworld in $(2+1)$ dimensions. Using the `complexity=volume' proposal, we studied this model and computed the holographic complexity of the JT gravity from the bulk perspective. We find that the complexity grows linearly with boundary time at late times, and the leading order c…
▽ More
Recently, it has been argued in [1] that Jackiw-Teitelboim (JT) gravity can be naturally realized in the Karch-Randall braneworld in $(2+1)$ dimensions. Using the `complexity=volume' proposal, we studied this model and computed the holographic complexity of the JT gravity from the bulk perspective. We find that the complexity grows linearly with boundary time at late times, and the leading order contribution is proportional to the $\varphi_0$, similar to the answer found in [2]. However, in addition, we find subleading corrections to the complexity solely arising from the fluctuations of these Karch-Randall branes.
△ Less
Submitted 6 July, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
CoVE: Towards Confidential Computing on RISC-V Platforms
Authors:
Ravi Sahita,
Atish Patra,
Vedvyas Shanbhogue,
Samuel Ortiz,
Andrew Bresticker,
Dylan Reid,
Atul Khare,
Rajnesh Kanwal
Abstract:
Multi-tenant computing platforms are typically comprised of several software and hardware components including platform firmware, host operating system kernel, virtualization monitor, and the actual tenant payloads that run on them (typically in a virtual machine, container, or application). This model is well established in large scale commercial deployment, but the downside is that all platform…
▽ More
Multi-tenant computing platforms are typically comprised of several software and hardware components including platform firmware, host operating system kernel, virtualization monitor, and the actual tenant payloads that run on them (typically in a virtual machine, container, or application). This model is well established in large scale commercial deployment, but the downside is that all platform components and operators are in the Trusted Computing Base (TCB) of the tenant. This aspect is ill-suited for privacy-oriented workloads that aim to minimize the TCB footprint. Confidential computing presents a good step**-stone towards providing a quantifiable TCB for computing. Confidential computing [1] requires the use of a HW-attested Trusted Execution Environments for data-in-use protection. The RISC-V architecture presents a strong foundation for meeting the requirements for Confidential Computing and other security paradigms in a clean slate manner. This paper describes a reference architecture and discusses ISA, non-ISA and system-on-chip (SoC) requirements for confidential computing on RISC-V Platforms. It discusses proposed ISA and non-ISA Extension for Confidential Virtual Machine for RISC-V platforms, referred to as CoVE.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Production of genuine multimode entanglement in circular waveguides with long-range interactions
Authors:
T Anuradha,
Ayan Patra,
Rivu Gupta,
Amit Rai,
Aditi Sen De
Abstract:
Starting with a product initial state, squeezed (squeezed coherent) state in one of the modes, and vacuum in the rest, we report that a circular waveguide comprising modes coupled with varying coupling strength is capable of producing genuine multimode entanglement (GME), quantified via the generalized geometric measure (GGM). We demonstrate that for a fixed coupling and squeezing strength, the GM…
▽ More
Starting with a product initial state, squeezed (squeezed coherent) state in one of the modes, and vacuum in the rest, we report that a circular waveguide comprising modes coupled with varying coupling strength is capable of producing genuine multimode entanglement (GME), quantified via the generalized geometric measure (GGM). We demonstrate that for a fixed coupling and squeezing strength, the GME content of the resulting state increases as the range of couplings between the waveguides increases, although the GGM collapses and revives with the variation of coupling strength and time. The advantage of long-range coupling can be emphasized by measuring the area under the GGM curve, which clearly illustrates the growing trends of GME with the increasing range of couplings. Moreover, long-range couplings help in generating a higher GGM for a fixed coupling strength. We analytically determine the exact expression of GGM for systems involving an arbitrary number of modes, when all the modes interact with each other equally. The entire analysis is performed in the phase-space formalism. We manifest the constructive effect of disorder in the coupling parameter, which promises a steady production of GME, independent of the coupling strength.
△ Less
Submitted 24 March, 2024; v1 submitted 27 March, 2023;
originally announced March 2023.
-
$ρ$-CP: Open Source Dislocation Density Based Crystal Plasticity Framework for Simulating Temperature- and Strain Rate-Dependent Deformation
Authors:
Anirban Patra,
Suketa Chaudhary,
Namit Pai,
Tarakram Ramgopal,
Sarthak Khandelwal,
Adwitiya Rao,
David L. McDowell
Abstract:
This work presents an open source, dislocation density based crystal plasticity modeling framework, $ρ$-CP. A Kocks-type thermally activated flow is used for accounting for the temperature and strain rate effects on the crystallographic shearing rate. Slip system-level mobile and immobile dislocation densities, as well slip system-level backstress, are used as internal state variables for represen…
▽ More
This work presents an open source, dislocation density based crystal plasticity modeling framework, $ρ$-CP. A Kocks-type thermally activated flow is used for accounting for the temperature and strain rate effects on the crystallographic shearing rate. Slip system-level mobile and immobile dislocation densities, as well slip system-level backstress, are used as internal state variables for representing the substructure evolution during plastic deformation. A fully implicit numerical integration scheme is presented for the time integration of the finite deformation plasticity model. The framework is implemented and integrated with the open source finite element solver, Multiphysics Object-Oriented Simulation Environment (MOOSE). Example applications of the model are demonstrated for predicting the anisotropic mechanical response of single and polycrystalline hcp magnesium, strain rate effects and cyclic deformation of polycrystalline fcc OFHC copper, and temperature and strain rate effects on the thermo-mechanical deformation of polycrystalline bcc tantanlum. Simulations of realistic Voronoi-tessellated microstructures as well as Electron Back Scatter Diffraction (EBSD) microstructures are demonstrated to highlight the model's ability to predict large deformation and misorientation development during plastic deformation.
△ Less
Submitted 30 March, 2023; v1 submitted 4 March, 2023;
originally announced March 2023.
-
Large Deviations for Accelerating Neural Networks Training
Authors:
Sreelekha Guggilam,
Varun Chandola,
Abani Patra
Abstract:
Artificial neural networks (ANNs) require tremendous amount of data to train on. However, in classification models, most data features are often similar which can lead to increase in training time without significant improvement in the performance. Thus, we hypothesize that there could be a more efficient way to train an ANN using a better representative sample. For this, we propose the LAD Improv…
▽ More
Artificial neural networks (ANNs) require tremendous amount of data to train on. However, in classification models, most data features are often similar which can lead to increase in training time without significant improvement in the performance. Thus, we hypothesize that there could be a more efficient way to train an ANN using a better representative sample. For this, we propose the LAD Improved Iterative Training (LIIT), a novel training approach for ANN using large deviations principle to generate and iteratively update training samples in a fast and efficient setting. This is exploratory work with extensive opportunities for future work. The thesis presents this ongoing research work with the following contributions from this study: (1) We propose a novel ANN training method, LIIT, based on the large deviations theory where additional dimensionality reduction is not needed to study high dimensional data. (2) The LIIT approach uses a Modified Training Sample (MTS) that is generated and iteratively updated using a LAD anomaly score based sampling strategy. (3) The MTS sample is designed to be well representative of the training data by including most anomalous of the observations in each class. This ensures distinct patterns and features are learnt with smaller samples. (4) We study the classification performance of the LIIT trained ANNs with traditional batch trained counterparts.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Open data from the third observing run of LIGO, Virgo, KAGRA and GEO
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
A. Al-Jodah,
C. Alléné,
A. Allocca
, et al. (1719 additional authors not shown)
Abstract:
The global network of gravitational-wave observatories now includes five detectors, namely LIGO Hanford, LIGO Livingston, Virgo, KAGRA, and GEO 600. These detectors collected data during their third observing run, O3, composed of three phases: O3a starting in April of 2019 and lasting six months, O3b starting in November of 2019 and lasting five months, and O3GK starting in April of 2020 and lasti…
▽ More
The global network of gravitational-wave observatories now includes five detectors, namely LIGO Hanford, LIGO Livingston, Virgo, KAGRA, and GEO 600. These detectors collected data during their third observing run, O3, composed of three phases: O3a starting in April of 2019 and lasting six months, O3b starting in November of 2019 and lasting five months, and O3GK starting in April of 2020 and lasting 2 weeks. In this paper we describe these data and various other science products that can be freely accessed through the Gravitational Wave Open Science Center at https://gwosc.org. The main dataset, consisting of the gravitational-wave strain time series that contains the astrophysical signals, is released together with supporting data useful for their analysis and documentation, tutorials, as well as analysis software packages.
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
Spectral Properties of Jacobi-like Band Matrices on the Sequence Space $\ell_p$
Authors:
Arnab Patra,
Jyoti Rani
Abstract:
In this paper, the spectral properties of a class of Jacobi-like operators defined over the sequence space $\ell_{p}, (1<p<\infty)$ which has a representation of an infinite band matrix where the entries of each non-zero band form a sequence with two limit points are investigated. The idea of compact perturbation is used to study the spectrum. Several spectral subdivisions are obtained. In additio…
▽ More
In this paper, the spectral properties of a class of Jacobi-like operators defined over the sequence space $\ell_{p}, (1<p<\infty)$ which has a representation of an infinite band matrix where the entries of each non-zero band form a sequence with two limit points are investigated. The idea of compact perturbation is used to study the spectrum. Several spectral subdivisions are obtained. In addition, a few sufficient conditions on the absence of point spectrum over the essential spectrum are also discussed.
△ Less
Submitted 23 January, 2023;
originally announced January 2023.
-
Momentum-Resolved Sum-Frequency Vibrational Spectroscopy of Bonded Interface Layer at Charged Water Interfaces
Authors:
Yao Hsiao,
Ting-Han Chou,
Animesh Patra,
Yu-Chieh Wen
Abstract:
Interface-specific hydrogen- (H-)bonding network of water next to a substrate (including air) directly controls the energy transfer and chemical reaction pathway at many charged aqueous interfaces. Yet, experimental characterization of such bonded water layer structure is still a challenge due to the presence of the ion diffuse layer. We now develop a sum-frequency (SF) spectroscopic scheme with v…
▽ More
Interface-specific hydrogen- (H-)bonding network of water next to a substrate (including air) directly controls the energy transfer and chemical reaction pathway at many charged aqueous interfaces. Yet, experimental characterization of such bonded water layer structure is still a challenge due to the presence of the ion diffuse layer. We now develop a sum-frequency (SF) spectroscopic scheme with varying photon momentums as an all-optic solution for retrieving the vibrational spectra of the bonded water layer and the diffuse layer, and hence microscopic structural and charging information about an interface. Application of the method to a charged surfactant-water interface reveals a hidden weakly-donor-H-bonded water species, suggesting an asymmetric hydration-shell structure of fully solvated surfactant headgroups. In another application to a zwitterionic phosphatidylcholine (PC) lipid monolayer-water interface, we find a highly polarized bonded water layer structure associating to the PC headgroup, while the diffuse layer contribution is experimentally proven to be negligible. Our all-optic method offers not only an in situ microscopic probe of the electrochemical and biological interfaces, but also a new opportunity for promoting these researches toward high spatial and temporal resolutions.
△ Less
Submitted 29 December, 2022;
originally announced December 2022.
-
Resource Theory of Non-absolute Separability
Authors:
Ayan Patra,
Arghya Maity,
Aditi Sen De
Abstract:
We develop a resource theory for non-absolutely separable states (non-AS) in which absolutely separable states (AS) that cannot be entangled by any global unitaries are recognised as free states and any convex mixture of global unitary operations can be performed without incurring any costs. We employ two approaches to quantify non-absolute separability (NAS) -- one based on distance measures and…
▽ More
We develop a resource theory for non-absolutely separable states (non-AS) in which absolutely separable states (AS) that cannot be entangled by any global unitaries are recognised as free states and any convex mixture of global unitary operations can be performed without incurring any costs. We employ two approaches to quantify non-absolute separability (NAS) -- one based on distance measures and the other one through the use of a witness operator. We prove that both the NAS measures obey all the conditions which should be followed by a ``good'' NAS measure. We demonstrate that NAS content is equal and maximal in all pure states for a fixed dimension. We then establish a connection between the distance-based NAS measure and the entanglement quantifier. We illustrate our results with a class of non-AS states, namely Werner states.
△ Less
Submitted 4 October, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
An Ensemble-Based Deep Framework for Estimating Thermo-Chemical State Variables from Flamelet Generated Manifolds
Authors:
Amol Salunkhe,
Georgios Georgalis,
Abani Patra,
Varun Chandola
Abstract:
Complete computation of turbulent combustion flow involves two separate steps: map** reaction kinetics to low-dimensional manifolds and looking-up this approximate manifold during CFD run-time to estimate the thermo-chemical state variables. In our previous work, we showed that using a deep architecture to learn the two steps jointly, instead of separately, is 73% more accurate at estimating the…
▽ More
Complete computation of turbulent combustion flow involves two separate steps: map** reaction kinetics to low-dimensional manifolds and looking-up this approximate manifold during CFD run-time to estimate the thermo-chemical state variables. In our previous work, we showed that using a deep architecture to learn the two steps jointly, instead of separately, is 73% more accurate at estimating the source energy, a key state variable, compared to benchmarks and can be integrated within a DNS turbulent combustion framework. In their natural form, such deep architectures do not allow for uncertainty quantification of the quantities of interest: the source energy and key species source terms. In this paper, we expand on such architectures, specifically ChemTab, by introducing deep ensembles to approximate the posterior distribution of the quantities of interest. We investigate two strategies of creating these ensemble models: one that keeps the flamelet origin information (Flamelets strategy) and one that ignores the origin and considers all the data independently (Points strategy). To train these models we used flamelet data generated by the GRI--Mech 3.0 methane mechanism, which consists of 53 chemical species and 325 reactions. Our results demonstrate that the Flamelets strategy is superior in terms of the absolute prediction error for the quantities of interest, but is reliant on the types of flamelets used to train the ensemble. The Points strategy is best at capturing the variability of the quantities of interest, independent of the flamelet types. We conclude that, overall, ChemTab Deep Ensembles allows for a more accurate representation of the source energy and key species source terms, compared to the model without these modifications.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
Node repair on connected graphs, Part II
Authors:
Adway Patra,
Alexander Barg
Abstract:
We continue our study of regenerating codes in distributed storage systems where connections between the nodes are constrained by a graph. In this problem, the failed node downloads the information stored at a subset of vertices of the graph for the purpose of recovering the lost data. This information is moved across the network, and the cost of node repair is determined by the graphical distance…
▽ More
We continue our study of regenerating codes in distributed storage systems where connections between the nodes are constrained by a graph. In this problem, the failed node downloads the information stored at a subset of vertices of the graph for the purpose of recovering the lost data. This information is moved across the network, and the cost of node repair is determined by the graphical distance from the helper nodes to the failed node. This problem was formulated in our recent work (IEEE IT Transactions, May 2022) where we showed that processing of the information at the intermediate nodes can yield savings in repair bandwidth over the direct forwarding of the data.
While the previous paper was limited to the MSR case, here we extend our study to the case of general regenerating codes. We derive a lower bound on the repair bandwidth and formulate repair procedures with intermediate processing for several families of regenerating codes, with an emphasis on the recent constructions from multilinear algebra. We also consider the task of data retrieval for codes on graphs, deriving a lower bound on the communication bandwidth and showing that it can be attained at the MBR point of the storage-bandwidth tradeoff curve.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Multimode advantage in continuous variable quantum battery
Authors:
Tanoy Kanti Konar,
Ayan Patra,
Rivu Gupta,
Srijon Ghosh,
Aditi Sen De
Abstract:
We provide an architecture for a multimode quantum battery (QB) based on the framework of continuous variable (CV) systems. We examine the performance of the battery by using a generic class of multimode initial states whose parameters can be tuned to produce separable as well as entangled states and that can be charged locally as well as globally by Gaussian unitary operations. Analytical calcula…
▽ More
We provide an architecture for a multimode quantum battery (QB) based on the framework of continuous variable (CV) systems. We examine the performance of the battery by using a generic class of multimode initial states whose parameters can be tuned to produce separable as well as entangled states and that can be charged locally as well as globally by Gaussian unitary operations. Analytical calculations show that a separable state is equally advantageous as an entangled one for two- and three-mode batteries when taking the figures of merit as the second moments of the change in energy. In order to produce a stable quantum battery consisting of an arbitrary number of modes, we derive compact analytical forms of the energy fluctuations and prove that for a multimode separable Gaussian initial state, fluctuations decrease as the number of modes increases, thereby obtaining a scaling analysis. Moreover, we demonstrate that local displacement as a charger is better to minimize the fluctuations in energy than that involving the squeezing unitary operation.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Combined Data and Deep Learning Model Uncertainties: An Application to the Measurement of Solid Fuel Regression Rate
Authors:
Georgios Georgalis,
Kolos Retfalvi,
Paul E. DesJardin,
Abani Patra
Abstract:
In complex physical process characterization, such as the measurement of the regression rate for solid hybrid rocket fuels, where both the observation data and the model used have uncertainties originating from multiple sources, combining these in a systematic way for quantities of interest(QoI) remains a challenge. In this paper, we present a forward propagation uncertainty quantification (UQ) pr…
▽ More
In complex physical process characterization, such as the measurement of the regression rate for solid hybrid rocket fuels, where both the observation data and the model used have uncertainties originating from multiple sources, combining these in a systematic way for quantities of interest(QoI) remains a challenge. In this paper, we present a forward propagation uncertainty quantification (UQ) process to produce a probabilistic distribution for the observed regression rate $\dot{r}$. We characterized two input data uncertainty sources from the experiment (the distortion from the camera $U_c$ and the non-zero angle fuel placement $U_γ$), the prediction and model form uncertainty from the deep neural network ($U_m$), as well as the variability from the manually segmented images used for training it ($U_s$). We conducted seven case studies on combinations of these uncertainty sources with the model form uncertainty. The main contribution of this paper is the investigation and inclusion of the experimental image data uncertainties involved, and how to include them in a workflow when the QoI is the result of multiple sequential processes.
△ Less
Submitted 18 March, 2023; v1 submitted 25 October, 2022;
originally announced October 2022.
-
MPClan: Protocol Suite for Privacy-Conscious Computations
Authors:
Nishat Koti,
Shravani Patil,
Arpita Patra,
Ajith Suresh
Abstract:
The growing volumes of data being collected and its analysis to provide better services are creating worries about digital privacy. To address privacy concerns and give practical solutions, the literature has relied on secure multiparty computation. However, recent research has mostly focused on the small-party honest-majority setting of up to four parties, noting efficiency concerns. In this work…
▽ More
The growing volumes of data being collected and its analysis to provide better services are creating worries about digital privacy. To address privacy concerns and give practical solutions, the literature has relied on secure multiparty computation. However, recent research has mostly focused on the small-party honest-majority setting of up to four parties, noting efficiency concerns. In this work, we extend the strategies to support a larger number of participants in an honest-majority setting with efficiency at the center stage.
Cast in the preprocessing paradigm, our semi-honest protocol improves the online complexity of the decade-old state-of-the-art protocol of Damgård and Nielson (CRYPTO'07). In addition to having an improved online communication cost, we can shut down almost half of the parties in the online phase, thereby saving up to 50% in the system's operational costs. Our maliciously secure protocol also enjoys similar benefits and requires only half of the parties, except for one-time verification, towards the end.
To showcase the practicality of the designed protocols, we benchmark popular applications such as deep neural networks, graph neural networks, genome sequence matching, and biometric matching using prototype implementations. Our improved protocols aid in bringing up to 60-80% savings in monetary cost over prior work.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Privadome: Protecting Citizen Privacy from Delivery Drones
Authors:
Gokulnath Pillai,
Eikansh Gupta,
Ajith Suresh,
Vinod Ganapathy,
Arpita Patra
Abstract:
As e-commerce companies begin to consider using delivery drones for customer fulfillment, there are growing concerns around citizen privacy. Drones are equipped with cameras, and the video feed from these cameras is often required as part of routine navigation, be it for semi autonomous or fully-autonomous drones. Footage of ground-based citizens may be captured in this video feed, thereby leading…
▽ More
As e-commerce companies begin to consider using delivery drones for customer fulfillment, there are growing concerns around citizen privacy. Drones are equipped with cameras, and the video feed from these cameras is often required as part of routine navigation, be it for semi autonomous or fully-autonomous drones. Footage of ground-based citizens may be captured in this video feed, thereby leading to privacy concerns.
This paper presents Privadome, a system that implements the vision of a virtual privacy dome centered around the citizen. Privadome is designed to be integrated with city-scale regulatory authorities that oversee delivery drone operations and realizes this vision through two components, PD-MPC and PD-ROS. PD-MPC allows citizens equipped with a mobile device to identify drones that have captured their footage. It uses secure two-party computation to achieve this goal without compromising the privacy of the citizen's location.
PD-ROS allows the citizen to communicate with such drones and obtain an audit trail showing how the drone uses their footage and determine if privacy-preserving steps are taken to sanitize the footage. An experimental evaluation of Privadome using our prototype implementations of PD-MPC and PD-ROS shows that the system scales to near-term city-scale delivery drone deployments (hundreds of drones). We show that with PD-MPC the mobile data usage on the citizen's mobile device is comparable to that of routine activities on the device, such as streaming videos. We also show that the workflow of PD-ROS consumes a modest amount of additional CPU resources and power on our experimental platform.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
Modeling directional hardening and intrinsic size effects using a dislocation density-based strain gradient plasticity framework
Authors:
Anirban Patra,
Namit Pai,
Parhitosh Sharma
Abstract:
This work proposes a dislocation density-based strain gradient $J_2$ plasticity framework that models the strength contribution due to Geometrically Necessary Dislocations (GNDs) using a lower order, Taylor hardening backstress model. An anisotropy factor is introduced to phenomenologically represent the differential hardening between grains in this $J_2$ plasticity framework. An implicit numerica…
▽ More
This work proposes a dislocation density-based strain gradient $J_2$ plasticity framework that models the strength contribution due to Geometrically Necessary Dislocations (GNDs) using a lower order, Taylor hardening backstress model. An anisotropy factor is introduced to phenomenologically represent the differential hardening between grains in this $J_2$ plasticity framework. An implicit numerical algorithm is implemented for the time integration of the finite deformation plasticity model. The framework is first used to predict directional hardening due to the GND-induced backstress during cyclic loading. Deformation contours are studied to understand the substructure attributes contributing to directional hardening. The framework is then used to predict the intrinsic, grain size-dependent strengthening of polygrain ensembles. Model predictions of simulations with different grain sizes are shown to agree with the Hall-Petch effect and also with Ashby's model of hardening due to GNDs in polygrain ensembles.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
Quantum Dense Coding Network using Multimode Squeezed States of Light
Authors:
Ayan Patra,
Rivu Gupta,
Saptarshi Roy,
Tamoghna Das,
Aditi Sen De
Abstract:
We present a framework of a multimode dense coding network with multiple senders and a single receiver using continuous variable systems. The protocol is scalable to arbitrary numbers of modes with the encoding being displacements while the decoding involves homodyne measurements of the modes after they are combined in a pairwise manner by a sequence of beam splitters, thereby exhibiting its poten…
▽ More
We present a framework of a multimode dense coding network with multiple senders and a single receiver using continuous variable systems. The protocol is scalable to arbitrary numbers of modes with the encoding being displacements while the decoding involves homodyne measurements of the modes after they are combined in a pairwise manner by a sequence of beam splitters, thereby exhibiting its potentiality to implement in laboratories with currently available resources. We compute the closed form expression of the dense coding capacity for the cases of two and three senders that involve sharing of three- and four-mode states respectively. The dense coding capacity is calculated with the constraint of fixed average energy transmission when the modes of the sender are transferred to the receiver after the encoding operation. In both the cases, we demonstrate the quantum advantage of the protocol using paradigmatic classes of three- and four-mode states. The quantum advantage increases with the increase in the amount of energy that is allowed to be transmitted from the senders to the receiver.
△ Less
Submitted 28 November, 2022; v1 submitted 29 April, 2022;
originally announced April 2022.
-
Significance of Fidelity Deviation in Continuous Variable Teleportation
Authors:
Ayan Patra,
Rivu Gupta,
Saptarshi Roy,
Aditi Sen De
Abstract:
Performance of quantum teleportation is typically measured by the average fidelity, an overlap between the input and output states. Along with the first moment, we introduce the second moment of fidelity in CV teleportation, i.e., the fidelity deviation as the figures of merit to assess the protocol's efficiency. We show that CV states, both Gaussian and non Gaussian, can be better characterized b…
▽ More
Performance of quantum teleportation is typically measured by the average fidelity, an overlap between the input and output states. Along with the first moment, we introduce the second moment of fidelity in CV teleportation, i.e., the fidelity deviation as the figures of merit to assess the protocol's efficiency. We show that CV states, both Gaussian and non Gaussian, can be better characterized by considering both average fidelity and fidelity deviation, which is not possible with only average fidelity. Moreover, we shed light on the performance of the teleportation protocol in two different input scenarios - one is when input states are sampled from constrained uniform distribution while the other one is Gaussian suppression of the input states which again lead to a different classification of CV states according to their performance. The entire analysis is carried out in noiseless and noisy scenarios with noise being incorporated in the measurement and the shared channels. We also report that one type of noise can make the protocol robust against the other one which leads to a `constructive effect' and identify the noise models which are responsible for decreasing average fidelity and increment in fidelity deviation.
△ Less
Submitted 15 September, 2022; v1 submitted 13 March, 2022;
originally announced March 2022.
-
Trans-IR Flows to Black Hole Singularities
Authors:
Elena Caceres,
Arnab Kundu,
Ayan K. Patra,
Sanjit Shashi
Abstract:
We study analytic continuations of holographic renormalization group (RG) flows beyond their infrared (IR) fixed points. Such "trans-IR" flows are a natural framework for describing physics inside of black holes. First, we construct a monotonic holographic $a$-function which counts degrees of freedom along a trans-IR flow. Using this function, we argue that the degrees of freedom "thin out" and va…
▽ More
We study analytic continuations of holographic renormalization group (RG) flows beyond their infrared (IR) fixed points. Such "trans-IR" flows are a natural framework for describing physics inside of black holes. First, we construct a monotonic holographic $a$-function which counts degrees of freedom along a trans-IR flow. Using this function, we argue that the degrees of freedom "thin out" and vanish when flowing to a trans-IR endpoint, represented by a Kasner singularity. We then recast well-studied quantum information probes in the language of trans-IR flows, finding that entanglement and complexity from volume generally fail to fully probe the trans-IR while 2-point correlations and complexity from action generally do so in a complementary manner.
△ Less
Submitted 4 August, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Authors:
Anirudh Chandramouli,
Ashish Choudhury,
Arpita Patra
Abstract:
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly-secure VSS…
▽ More
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly-secure VSS schemes in three different communication settings, namely synchronous, asynchronous and hybrid setting and provide full details of the existing schemes in these settings. The aim of this survey is to provide a clear knowledge and foundation to researchers who are interested in knowing and extending the state-of-the-art perfectly-secure VSS schemes.
△ Less
Submitted 4 February, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Bath deformations, islands and holographic complexity
Authors:
Aranya Bhattacharya,
Arpan Bhattacharyya,
Pratik Nandy,
Ayan K. Patra
Abstract:
Considering a doubly holographic model, we study the evolution of holographic subregion complexity corresponding to deformations of bath state by a relevant scalar operator, which corresponds to a renormalization group flow from the AdS-Schwarzschild to the Kasner universe in the bulk. The subregion complexity shows a discontinuous jump at Page time at a fixed perturbation, where the discontinuity…
▽ More
Considering a doubly holographic model, we study the evolution of holographic subregion complexity corresponding to deformations of bath state by a relevant scalar operator, which corresponds to a renormalization group flow from the AdS-Schwarzschild to the Kasner universe in the bulk. The subregion complexity shows a discontinuous jump at Page time at a fixed perturbation, where the discontinuity depends solely on the system's parameters. We show that the amount of discontinuity decreases with the perturbation as well as with the scaling dimension of the relevant scalar operator.
△ Less
Submitted 15 December, 2021; v1 submitted 13 December, 2021;
originally announced December 2021.
-
Coherence measure of ensembles with nonlocality without entanglement
Authors:
Ayan Patra,
Shiladitya Mal,
Aditi Sen De
Abstract:
Irreversibility between preparation and discrimination processes is manifested in the indistinguishability of orthogonal product states via local operations and classical communication (LOCC). Characterizing quantum properties for sets of states according to their local distinguishing property is one of the avenues to explain the surprising results obtained in the LOCC indistinguishability domain.…
▽ More
Irreversibility between preparation and discrimination processes is manifested in the indistinguishability of orthogonal product states via local operations and classical communication (LOCC). Characterizing quantum properties for sets of states according to their local distinguishing property is one of the avenues to explain the surprising results obtained in the LOCC indistinguishability domain. We introduce a measure based on l1 norm and relative entropy of coherence whose lower values capture more quantumness in ensembles. In particular, it reaches the maximum for two-way distinguishable product ensembles with minimum rounds. Moreover, to establish the hierarchy between different product ensembles, we report that the trends of success probabilities for orthogonal product ensembles with one-way LOCC via minimum error discrimination scheme are also connected with the coherence-based measures.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Anomaly Detection for High-Dimensional Data Using Large Deviations Principle
Authors:
Sreelekha Guggilam,
Varun Chandola,
Abani Patra
Abstract:
Most current anomaly detection methods suffer from the curse of dimensionality when dealing with high-dimensional data. We propose an anomaly detection algorithm that can scale to high-dimensional data using concepts from the theory of large deviations. The proposed Large Deviations Anomaly Detection (LAD) algorithm is shown to outperform state of art anomaly detection methods on a variety of larg…
▽ More
Most current anomaly detection methods suffer from the curse of dimensionality when dealing with high-dimensional data. We propose an anomaly detection algorithm that can scale to high-dimensional data using concepts from the theory of large deviations. The proposed Large Deviations Anomaly Detection (LAD) algorithm is shown to outperform state of art anomaly detection methods on a variety of large and high-dimensional benchmark data sets. Exploiting the ability of the algorithm to scale to high-dimensional data, we propose an online anomaly detection method to identify anomalies in a collection of multivariate time series. We demonstrate the applicability of the online algorithm in identifying counties in the United States with anomalous trends in terms of COVID-19 related cases and deaths. Several of the identified anomalous counties correlate with counties with documented poor response to the COVID pandemic.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Partial islands and subregion complexity in geometric secret-sharing model
Authors:
Aranya Bhattacharya,
Arpan Bhattacharyya,
Pratik Nandy,
Ayan K. Patra
Abstract:
We compute the holographic subregion complexity of a radiation subsystem in a geometric secret-sharing model of Hawking radiation in the "complexity = volume" proposal. The model is constructed using multiboundary wormhole geometries in AdS$_{3}$. The entanglement curve for secret-sharing captures a crossover between two minimal curves in the geometry apart from the usual eternal Page curve presen…
▽ More
We compute the holographic subregion complexity of a radiation subsystem in a geometric secret-sharing model of Hawking radiation in the "complexity = volume" proposal. The model is constructed using multiboundary wormhole geometries in AdS$_{3}$. The entanglement curve for secret-sharing captures a crossover between two minimal curves in the geometry apart from the usual eternal Page curve present for the complete radiation entanglement. We compute the complexity dual to the secret-sharing minimal surfaces and study their "time" evolution. When we have access to a small part of the radiation, the complexity shows a jump at the secret-sharing time larger than the Page time. Moreover, the minimal surfaces do not have access to the entire island region for this particular case. They can only access it partially. We describe this inaccessibility in the context of "classical" Markov recovery.
△ Less
Submitted 5 December, 2021; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Towards Fully Automated Segmentation of Rat Cardiac MRI by Leveraging Deep Learning Frameworks
Authors:
Daniel Fernandez-Llaneza,
Andrea Gondova,
Harris Vince,
Arijit Patra,
Magdalena Zurek,
Peter Konings,
Patrik Kagelid,
Leif Hultin
Abstract:
Automated segmentation of human cardiac magnetic resonance datasets has been steadily improving during recent years. However, these methods are not directly applicable in preclinical context due to limited datasets and lower image resolution. Successful application of deep architectures for rat cardiac segmentation, although of critical importance for preclinical evaluation of cardiac function, ha…
▽ More
Automated segmentation of human cardiac magnetic resonance datasets has been steadily improving during recent years. However, these methods are not directly applicable in preclinical context due to limited datasets and lower image resolution. Successful application of deep architectures for rat cardiac segmentation, although of critical importance for preclinical evaluation of cardiac function, has to our knowledge not yet been reported. We developed segmentation models that expand on the standard U-Net architecture and evaluated separate models for systole and diastole phases, 2MSA, and one model for all timepoints, 1MSA. Furthermore, we calibrated model outputs using a Gaussian Process (GP)-based prior to improve phase selection. Resulting models approach human performance in terms of left ventricular segmentation quality and ejection fraction (EF) estimation in both 1MSA and 2MSA settings (Sørensen-Dice score 0.91 +/- 0.072 and 0.93 +/- 0.032, respectively). 2MSA achieved a mean absolute difference between estimated and reference EF of 3.5 +/- 2.5 %, while 1MSA resulted in 4.1 +/- 3.0 %. Applying Gaussian Processes to 1MSA allows to automate the selection of systole and diastole phases. Combined with a novel cardiac phase selection strategy, our work presents an important first step towards a fully automated segmentation pipeline in the context of rat cardiac analysis.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.