-
Dissipative tidal effects to next-to-leading order and constraints on the dissipative tidal deformability using gravitational wave data
Authors:
Abhishek Hegade K. R.,
Justin L. Ripley,
Nicolás Yunes
Abstract:
Dissipative tidal interactions can be used to probe the out-of-equilibrium physics of neutron stars using gravitational wave observations. In this paper, we present the first post-Newtonian (PN) corrections to the orbital dynamics of a binary system containing objects whose tidal interactions have a dissipative contribution. We derive the 1PN-accurate equations of motion in the center-of-mass fram…
▽ More
Dissipative tidal interactions can be used to probe the out-of-equilibrium physics of neutron stars using gravitational wave observations. In this paper, we present the first post-Newtonian (PN) corrections to the orbital dynamics of a binary system containing objects whose tidal interactions have a dissipative contribution. We derive the 1PN-accurate equations of motion in the center-of-mass frame and a generalized energy-balance law that is valid for dissipative tidal interactions. We show how mass and energy loss due to the absorption of orbital energy change the orbital dynamics and derive the next-to-leading order correction to the gravitational wave phase of a binary system in a quasi-circular orbit containing initially non-spinning components. We then use this waveform model to constrain, for the first time, the individual dissipative tidal deformabilities of each of the binary components that generated the GW170817 event using real data. We find that the GW170817 data requires $Ξ_{1} \lesssim 1121$ and $Ξ_{2} \lesssim 1692$ at 90\% confidence, where $Ξ_{1,2}$ are the individual tidal deformabilities of the primary and secondary binary components that produced the GW170817 event.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Dynamical tidal response of non-rotating relativistic stars
Authors:
Abhishek Hegade K. R.,
Justin L. Ripley,
Nicolás Yunes
Abstract:
Accurately modeling the tidal response of neutron stars is crucial to connecting gravitational wave observations of binaries to ultra-dense nuclear physics. Most current models of the tidal response of relativistic stars either assume a static response model, or use phenomenological models inspired by Newtonian gravity. In this work, we present a general formalism for computing the linear dynamica…
▽ More
Accurately modeling the tidal response of neutron stars is crucial to connecting gravitational wave observations of binaries to ultra-dense nuclear physics. Most current models of the tidal response of relativistic stars either assume a static response model, or use phenomenological models inspired by Newtonian gravity. In this work, we present a general formalism for computing the linear dynamical tidal response function of relativistic, spherically symmetric stars. Our formalism incorporates stratification due to thermal and chemical imbalances, allowing one to study the effects of g modes on the tidal response function. We also describe how to incorporate sources of dissipation due to shear and bulk viscosity. To showcase the utility of our approach, we present several applications for polytropic stars in general relativity. We show how our formalism can capture the dynamical tidal resonance due to the f and g modes of inviscid stars and explore the sensitivity of the dynamical tidal response to the compactness of the star. We also compute the dissipative tidal deformability due to bulk and shear viscous dissipation assuming a simple viscous profile for the bulk and shear viscosity.
△ Less
Submitted 21 May, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
First constraint on the dissipative tidal deformability of neutron stars
Authors:
Justin L. Ripley,
Abhishek Hegade K. R.,
Rohit S. Chandramouli,
and Nicolas Yunes
Abstract:
The gravitational waves (GWs) emitted by neutron star binaries probe the physics of matter at supra nuclear densities. During the late inspiral, tidal deformations raised on each star by the gravitational field of its companion depend crucially on the star's internal properties. The misalignment of a star's tidal bulge with its companion's gravitational field encodes the strength of internal dissi…
▽ More
The gravitational waves (GWs) emitted by neutron star binaries probe the physics of matter at supra nuclear densities. During the late inspiral, tidal deformations raised on each star by the gravitational field of its companion depend crucially on the star's internal properties. The misalignment of a star's tidal bulge with its companion's gravitational field encodes the strength of internal dissipative processes, which imprint onto the phase of the gravitational waves emitted. We here analyze GW data from the GW170817 (binary neutron star) event detected by LIGO and Virgo and find the first constraint on the dissipative tidal deformability of a neutron star. From this constraint, \emph{assuming} a temperature profile for each star in the binary, we obtain an order of magnitude bound on the averaged bulk ($ζ$) and shear ($η$) viscosity of each star during the inspiral.: $ζ\lesssim 10^{31} \mathrm{g}\;\mathrm{cm}^{-1}\mathrm{s}^{-1}$ and $η\lesssim 10^{28} \mathrm{g}\;\mathrm{cm}^{-1}\mathrm{s}^{-1} $. We forecast that these bounds could be improved by two orders of magnitude with third-generation detectors, like Cosmic Explorer, using inspiral data. These constraints already inform nuclear physics models and motivate further theoretical work to better understand the interplay between viscosity and temperature in the late inspiral of neutron stars.
△ Less
Submitted 13 June, 2024; v1 submitted 18 December, 2023;
originally announced December 2023.
-
SN 2022jli: a type Ic supernova with periodic modulation of its light curve and an unusually long rise
Authors:
Moore T.,
Smartt S. J.,
Nicholl M.,
Srivastav S.,
Stevance H. F.,
Jess D. B.,
Grant S. D. T.,
Fulton M. D.,
Rhodes L.,
Sim S. A.,
Hirai R.,
Podsiadlowski P.,
Anderson J. P.,
Ashall C.,
Bate W.,
Fender R.,
Gutierrez C. P.,
Howell D. A.,
Huber M. E.,
Inserra C.,
Leloudas G.,
Monard L. A. G.,
Muller-Bravo T. E.,
Shappee B. J.,
Smith K. W.
, et al. (20 additional authors not shown)
Abstract:
We present multi-wavelength photometry and spectroscopy of SN 2022jli, an unprecedented Type Ic supernova discovered in the galaxy NGC 157 at a distance of $\approx$ 23 Mpc. The multi-band light curves reveal many remarkable characteristics. Peaking at a magnitude of $g=15.11\pm0.02$, the high-cadence photometry reveals 12.5$\pm0.2\ $day periodic undulations superimposed on the 200 day supernova d…
▽ More
We present multi-wavelength photometry and spectroscopy of SN 2022jli, an unprecedented Type Ic supernova discovered in the galaxy NGC 157 at a distance of $\approx$ 23 Mpc. The multi-band light curves reveal many remarkable characteristics. Peaking at a magnitude of $g=15.11\pm0.02$, the high-cadence photometry reveals 12.5$\pm0.2\ $day periodic undulations superimposed on the 200 day supernova decline. This periodicity is observed in the light curves from nine separate filter and instrument configurations with peak-to-peak amplitudes of $\simeq$ 0.1 mag. This is the first time that repeated periodic oscillations, over many cycles, have been detected in a supernova light curve. SN 2022jli also displays an extreme early excess which fades over $\approx$ 25 days followed by a rise to a peak luminosity of $L_{\rm opt} = 10^{42.1}$ erg s$^{-1}$. Although the exact explosion epoch is not constrained by data, the time from explosion to maximum light is $\gtrsim$ 59 days. The luminosity can be explained by a large ejecta mass ($M_{\rm ej}\approx12\pm6$M$_{\odot}$) powered by $^{56}$Ni but we find difficulty in quantitatively modelling the early excess with circumstellar interaction and cooling. Collision between the supernova ejecta and a binary companion is a possible source of this emission. We discuss the origin of the periodic variability in the light curve, including interaction of the SN ejecta with nested shells of circumstellar matter and neutron stars colliding with binary companions.
△ Less
Submitted 22 September, 2023;
originally announced September 2023.
-
A Modular Spatial Clustering Algorithm with Noise Specification
Authors:
Akhil K,
Srikanth H R
Abstract:
Clustering techniques have been the key drivers of data mining, machine learning and pattern recognition for decades. One of the most popular clustering algorithms is DBSCAN due to its high accuracy and noise tolerance. Many superior algorithms such as DBSCAN have input parameters that are hard to estimate. Therefore, finding those parameters is a time consuming process. In this paper, we propose…
▽ More
Clustering techniques have been the key drivers of data mining, machine learning and pattern recognition for decades. One of the most popular clustering algorithms is DBSCAN due to its high accuracy and noise tolerance. Many superior algorithms such as DBSCAN have input parameters that are hard to estimate. Therefore, finding those parameters is a time consuming process. In this paper, we propose a novel clustering algorithm Bacteria-Farm, which balances the performance and ease of finding the optimal parameters for clustering. Bacteria- Farm algorithm is inspired by the growth of bacteria in closed experimental farms - their ability to consume food and grow - which closely represents the ideal cluster growth desired in clustering algorithms. In addition, the algorithm features a modular design to allow the creation of versions of the algorithm for specific tasks / distributions of data. In contrast with other clustering algorithms, our algorithm also has a provision to specify the amount of noise to be excluded during clustering.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Probing internal dissipative processes of neutron stars with gravitational waves during the inspiral of neutron star binaries
Authors:
Justin L. Ripley,
Abhishek Hegade K. R.,
Nicolas Yunes
Abstract:
We study the impact of out-of-equilibrium, dissipative effects on the dynamics of inspiraling neutron stars. We find that modeling dissipative processes (such as those from the stars internal effective fluid viscosity) requires that one introduce a new tidal deformability parameter--the dissipative tidal deformability--which modifies the phase of gravitational waves emitted during the inspiral pha…
▽ More
We study the impact of out-of-equilibrium, dissipative effects on the dynamics of inspiraling neutron stars. We find that modeling dissipative processes (such as those from the stars internal effective fluid viscosity) requires that one introduce a new tidal deformability parameter--the dissipative tidal deformability--which modifies the phase of gravitational waves emitted during the inspiral phase of a neutron star binary. We show that the dissipative tidal deformability corrects the gravitational-wave phase at 4 post-Newtonian order for quasi-circular binaries. This correction receives a large finite-size enhancement by the stellar compactness, analogous to the case of the tidal deformability. Moreover, the correction is not degenerate with the time of coalescence, which also enters at 4PN order, because it contains a logarithmic frequency-dependent contribution. Using a simple Fisher analysis, we show that physically allowed values for the dissipative tidal deformability may be constrained by measurements of the phase of emitted gravitational waves to roughly the same extent as the (electric-type, quadrupolar) tidal deformability. Finally, we show that there are no out-of-equilibrium, dissipative corrections to the tidal deformability itself. We conclude that there are at least two relevant tidal deformability parameters that can be constrained with gravitational-wave phase measurements during the late inspiral of a neutron star binary: one which characterizes the adiabatic tidal response of the star, and another which characterizes the leading-order out-of-equilibrium, dissipative tidal response. These findings open a window to probe dissipative processes in the interior of neutron stars with gravitational waves.
△ Less
Submitted 22 November, 2023; v1 submitted 27 June, 2023;
originally announced June 2023.
-
The non-relativistic limit of first-order relativistic viscous fluids
Authors:
Abhishek Hegade K R,
Justin L. Ripley,
Nicolás Yunes
Abstract:
Out-of-equilibrium effects may play an important role in the dynamics of neutron star mergers and in heavy-ion collisions. Bemfica, Disconzi, Noronha and Kovtun (BDNK) recently derived a causal, locally well-posed, and modally stable relativistic fluid model that incorporates the effects of viscosity and heat diffusion. We study the non-relativistic limit of this fluid model and show that causalit…
▽ More
Out-of-equilibrium effects may play an important role in the dynamics of neutron star mergers and in heavy-ion collisions. Bemfica, Disconzi, Noronha and Kovtun (BDNK) recently derived a causal, locally well-posed, and modally stable relativistic fluid model that incorporates the effects of viscosity and heat diffusion. We study the non-relativistic limit of this fluid model and show that causality for relativistic motion restricts the transport coefficients in the non-relativistic limit. This restriction provides an upper bound on the ratio of the shear viscosity to the entropy density for fluids that can be described as relativistic within the BDNK model and can be exactly modeled using the Navier-Stokes equation in the non-relativistic limit. Furthermore, we show that the Fourier law of heat conduction must be modified by higher gradient corrections for such fluids. We also show that the non-relativistic limit of the BDNK equations of motion are never hyperbolic, in contrast to the non-relativistic limit of extended variable models, whose non-relativistic equations of motion can be hyperbolic or not depending on the scaling of the transport coefficients present in the auxiliary equations for viscous degrees of freedom.
△ Less
Submitted 27 June, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
On Aspects of Spontaneous Symmetry Breaking in Rindler and Anti-de Sitter spacetimes for the $O(N)$ Linear Sigma Model
Authors:
Pallab Basu,
Haridev S R,
Prasant Samantray
Abstract:
We investigate aspects of spontaneous breakdown of symmetry for $O(N)$ symmetric linear sigma model in the background of Rindler and Anti-de Sitter spacetimes respectively. In the large $N$ limit, by computing the one-loop effective action, we report that in three dimensional Rindler space, there is a phase transition from the disordered phase to an ordered phase past a certain critical Rindler ac…
▽ More
We investigate aspects of spontaneous breakdown of symmetry for $O(N)$ symmetric linear sigma model in the background of Rindler and Anti-de Sitter spacetimes respectively. In the large $N$ limit, by computing the one-loop effective action, we report that in three dimensional Rindler space, there is a phase transition from the disordered phase to an ordered phase past a certain critical Rindler acceleration parameter `$a$'. Connections with finite temperature field theory results are established, thereby further reinforcing the idea that Rindler space can indeed be a proxy for Minkowski spacetime with finite temperature. We extend our calculations to Anti-de Sitter space in various dimensions and observe that symmetry is broken in three dimensions, but not in four dimensions. We discuss the implications of our results.
△ Less
Submitted 14 March, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
On the Observer Dependence of the Quantum Effective Potential
Authors:
Pallab Basu,
Haridev S R,
Prasant Samantray
Abstract:
In this short paper, we investigate the consequences of observer dependence of the quantum effective potential for an interacting field theory. Specializing to $d+2$ dimensional Euclidean Rindler space, we develop the formalism to calculate the effective potential. While the free energy diverges due to the presence of the Rindler horizon, the effective potential, which is a local function of space…
▽ More
In this short paper, we investigate the consequences of observer dependence of the quantum effective potential for an interacting field theory. Specializing to $d+2$ dimensional Euclidean Rindler space, we develop the formalism to calculate the effective potential. While the free energy diverges due to the presence of the Rindler horizon, the effective potential, which is a local function of space, is finite after the necessary renormalization procedure. We apply the results of our formalism to understand the restoration of spontaneously broken $\mathbb{Z}_2$ symmetry in three and four dimensions.
△ Less
Submitted 23 June, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
How Do Axisymmetric Black Holes Grow Monopole and Dipole Hair?
Authors:
Abhishek Hegade K R,
Elias R. Most,
Jorge Noronha,
Helvi Witek,
Nicolás Yunes
Abstract:
We study the dynamical formation of scalar monopole and dipole hair in scalar Gauss-Bonnet theory and dynamical Chern-Simons theory. We prove that the spherically-symmetric mode of the dipole hair is completely determined by the product of the mass of the spacetime and the value of the monopole hair. We then show that the dynamics of the $\ell=1$ mode of the dipole hair is intimately tied to the a…
▽ More
We study the dynamical formation of scalar monopole and dipole hair in scalar Gauss-Bonnet theory and dynamical Chern-Simons theory. We prove that the spherically-symmetric mode of the dipole hair is completely determined by the product of the mass of the spacetime and the value of the monopole hair. We then show that the dynamics of the $\ell=1$ mode of the dipole hair is intimately tied to the appearance of the event horizon during axisymmetric collapse, which results in the radiation of certain modes that could have been divergent in the future of the collapse. We confirm these analytical predictions by simulating the gravitational collapse of a rapidly rotating neutron star in the decoupling limit, both in scalar Gauss-Bonnet and dynamical Chern-Simons theory. Our results, combined with those of Ref.~\cite{R:2022cwe}, provide a clear physical picture of the dynamics of scalar monopole and dipole radiation in axisymmetric and spherical gravitational collapse in these theories.
△ Less
Submitted 27 June, 2023; v1 submitted 5 December, 2022;
originally announced December 2022.
-
Where and why does Einstein-Scalar-Gauss-Bonnet theory break down?
Authors:
Abhishek Hegade K R,
Justin L. Ripley,
Nicolás Yunes
Abstract:
We present a systematic exploration of the loss of predictivity in Einstein-scalar-Gauss-Bonnet (ESGB) gravity. We first formulate a gauge covariant method of characterizing the breakdown of the hyperbolicity of the equations of motion in the theory. With this formalism, we show that strong geodesic focusing leads to the breakdown of hyperbolicity, and the latter is unrelated to the violation of t…
▽ More
We present a systematic exploration of the loss of predictivity in Einstein-scalar-Gauss-Bonnet (ESGB) gravity. We first formulate a gauge covariant method of characterizing the breakdown of the hyperbolicity of the equations of motion in the theory. With this formalism, we show that strong geodesic focusing leads to the breakdown of hyperbolicity, and the latter is unrelated to the violation of the null convergence condition. We then numerically study the hyperbolicity of the equations during gravitational collapse for two specific ESGB gravity theories: "shift symmetric Gauss-Bonnet gravity" and a version of the theory that admits "spontaneously scalarized" black holes. We devise a "phase space" model to describe the end states for a given class of initial data. Using our phase space picture, we demonstrate that the two theories we consider remain predictive (hyperbolic) for a range of GB couplings. The range of couplings, however, is small, and thus, the presence of "spontaneously scalarized" solutions requires fine-tuning of initial data. Our results, therefore, cast doubt as to whether scalarized black hole solutions can be realistically realized in Nature even if ESGB gravity happened to be the correct gravitational description.
△ Less
Submitted 1 May, 2023; v1 submitted 15 November, 2022;
originally announced November 2022.
-
On The Diameter of Pancake Graphs
Authors:
Harigovind V R,
Pramod P Nair
Abstract:
The Pancake graph($P_n$) represents the group of all permutations on n elements, namely $S_n$, with respect to the generating set containing all prefix reversals. The diameter of a graph is the maximum of all distances on the graph, where the distance between two vertices is the shortest path between them. In the case of the $P_n$, it is the maximum of the shortest generating sequence of each perm…
▽ More
The Pancake graph($P_n$) represents the group of all permutations on n elements, namely $S_n$, with respect to the generating set containing all prefix reversals. The diameter of a graph is the maximum of all distances on the graph, where the distance between two vertices is the shortest path between them. In the case of the $P_n$, it is the maximum of the shortest generating sequence of each permutation in $S_n$. Here we propose a method to realise better upper bounds to the diameter of $P_n$ that has its focus on Graph Theoretical concepts rather than Algebra.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
How Do Spherical Black Holes Grow Monopole Hair?
Authors:
Abhishek Hegade K. R.,
Elias R. Most,
Jorge Noronha,
Helvi Witek,
Nicolas Yunes
Abstract:
Black holes in certain modified gravity theories that contain a scalar field coupled to curvature invariants are known to possess (monopole) scalar hair while non-black-hole spacetimes (like neutron stars) do not. Therefore, as a neutron star collapses to a black hole, scalar hair must grow until it settles to the stationary black hole solution with (monopole) hair. In this paper, we study this pr…
▽ More
Black holes in certain modified gravity theories that contain a scalar field coupled to curvature invariants are known to possess (monopole) scalar hair while non-black-hole spacetimes (like neutron stars) do not. Therefore, as a neutron star collapses to a black hole, scalar hair must grow until it settles to the stationary black hole solution with (monopole) hair. In this paper, we study this process in detail and show that the growth of scalar hair is tied to the appearance and growth of the event horizon (before an apparent horizon forms), which forces scalar modes that would otherwise (in the future) become divergent to be radiated away. We prove this result rigorously in general first for a large class of modified theories, and then we exemplify the results by studying the temporal evolution of the scalar field in scalar Gauss-Bonnet gravity in two backgrounds: (i) a collapsing Oppenheimer-Snyder background, and (ii) a collapsing neutron star background. In case (i), we find an exact scalar field solution analytically, while in case (ii) we solve for the temporal evolution of the scalar field numerically, with both cases supporting the conclusion presented above. Our results suggest that the emission of a burst of scalar field radiation is a necessary condition for black hole formation in a large class of modified theories of gravity.
△ Less
Submitted 4 April, 2022; v1 submitted 13 January, 2022;
originally announced January 2022.
-
Cosmology with Love: Measuring the Hubble constant using neutron star universal relations
Authors:
Deep Chatterjee,
Abhishek Hegade K. R.,
Gilbert Holder,
Daniel E. Holz,
Scott Perkins,
Kent Yagi,
Nicolás Yunes
Abstract:
Gravitational-wave cosmology began in 2017 with the observation of the gravitational waves emitted in the merger of two neutron stars, and the coincident observation of the electromagnetic emission that followed. Although only a $30\%$ measurement of the Hubble constant was achieved, future observations may yield more precise measurements either through other coincident events or through cross cor…
▽ More
Gravitational-wave cosmology began in 2017 with the observation of the gravitational waves emitted in the merger of two neutron stars, and the coincident observation of the electromagnetic emission that followed. Although only a $30\%$ measurement of the Hubble constant was achieved, future observations may yield more precise measurements either through other coincident events or through cross correlation of gravitational-wave events with galaxy catalogs. Here, we implement a new way to measure the Hubble constant without an electromagnetic counterpart and through the use of the binary Love relations. These relations govern the tidal deformabilities of neutron stars in an equation-of-state insensitive way. Importantly, the Love relations depend on the component masses of the binary in the source frame. Since the gravitational-wave phase and amplitude depend on the chirp mass in the observer (and hence redshifted) frame, one can in principle combine the binary Love relations with the gravitational-wave data to directly measure the redshift, and thereby infer the value of the Hubble constant. We implement this approach in both real and synthetic data through a Bayesian parameter estimation study in a range of observing scenarios. We find that for the LIGO/Virgo/KAGRA design sensitivity era, this method results in a similar measurement accuracy of the Hubble constant to those of current-day, dark-siren measurements. For third generation detectors, this accuracy improves to $\lesssim 10\%$ when combining measurements from binary neutron star events in the LIGO Voyager era, and to $\lesssim 2\%$ in the Cosmic Explorer era.
△ Less
Submitted 15 October, 2021; v1 submitted 11 June, 2021;
originally announced June 2021.
-
Cryptanalysis of ITRU
Authors:
Hashim H. R.,
Molnár A.,
Tengely Sz
Abstract:
ITRU cryptosystem is a public key cryptosystem and one of the known variants of NTRU cryptosystem. Instead of working in a truncated polynomial ring, ITRU cryptosystem is based on the ring of integers. The authors claimed that ITRU has better features comparing to the classical NTRU, such as having a simple parameter selection algorithm, invertibility, and successful message decryption, and better…
▽ More
ITRU cryptosystem is a public key cryptosystem and one of the known variants of NTRU cryptosystem. Instead of working in a truncated polynomial ring, ITRU cryptosystem is based on the ring of integers. The authors claimed that ITRU has better features comparing to the classical NTRU, such as having a simple parameter selection algorithm, invertibility, and successful message decryption, and better security. In this paper, we present an attack technique against the ITRU cryptosystem, and it is mainly based on a simple frequency analysis on the letters of ciphertexts.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Noise-Induced Schooling of Fish
Authors:
Jitesh Jhawar,
Richard G. Morris,
U. R. Amith-Kumar,
M. Danny Raj,
Harikrishnan R.,
Vishwesha Guttal
Abstract:
We report on the dynamics of collective alignment in groups of the cichlid fish, Etroplus suratensis. Focusing on small-to-intermediate sized groups ($10<N<100$), we demonstrate that schooling (highly polarised and coherent motion) is noise-induced, arising from the intrinsic stochasticity associated with finite numbers of interacting fish. The fewer the fish, the greater the (multiplicative) nois…
▽ More
We report on the dynamics of collective alignment in groups of the cichlid fish, Etroplus suratensis. Focusing on small-to-intermediate sized groups ($10<N<100$), we demonstrate that schooling (highly polarised and coherent motion) is noise-induced, arising from the intrinsic stochasticity associated with finite numbers of interacting fish. The fewer the fish, the greater the (multiplicative) noise and therefore the likelihood of alignment. Such empirical evidence is rare, and tightly constrains the possible underlying interactions between fish: computer simulations indicate that E. suratensis align with each other one at a time, which is at odds with the canonical mechanism of collective alignment, local direction-averaging. More broadly, our results confirm that, rather than simply obscuring otherwise deterministic dynamics, noise is fundamental to the characterisation of emergent collective behaviours, suggesting a need to re-appraise aspects of both collective motion and behavioural inference.
△ Less
Submitted 28 March, 2019;
originally announced March 2019.
-
A review of the variational methods for solving DC circuits
Authors:
Sree Harsha N R
Abstract:
Direct current (DC) circuits are usually taught in upper-level physics curricula, and Kirchhoff's laws are stated and used to solve the steady-state currents. However, students are not often introduced to alternative techniques, such as variational principles, for solving circuits. Many authors have tried to derive the steady-state distribution of currents in circuits from variational principles,…
▽ More
Direct current (DC) circuits are usually taught in upper-level physics curricula, and Kirchhoff's laws are stated and used to solve the steady-state currents. However, students are not often introduced to alternative techniques, such as variational principles, for solving circuits. Many authors have tried to derive the steady-state distribution of currents in circuits from variational principles, and the initial attempts were carried out by great physicists, such as Kirchhoff, Maxwell and Feynman. In this article, we shall review such variational principles in physics and illustrate how they can be used to solve DC circuits. We will also explore how they are related, in a fundamental way, to the entropy production principles of irreversible thermodynamics. We believe that the introduction of variational alternatives for solving circuits can be a good opportunity for the instructor to present the techniques of the calculus of variations and irreversible thermodynamics to students.
△ Less
Submitted 17 March, 2019;
originally announced March 2019.
-
RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Authors:
Mohammed Harun Babu R,
Vinayakumar R,
Soman KP
Abstract:
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Cl…
▽ More
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Classification. The best performing neural network architecture is chosen by conducting different chain of experiments for different network parameters and structures. The network is run up to 1000 epochs with learning rate set in the range of 0.01 to 0.5.Obviously, RNN performed very well when compared to classical machine learning algorithms. This is mainly possible because RNNs implicitly extracts the underlying features and also identifies the characteristics of the data. This helps to achieve better accuracy.
△ Less
Submitted 5 January, 2019;
originally announced January 2019.
-
Lipi Gnani - A Versatile OCR for Documents in any Language Printed in Kannada Script
Authors:
Shiva Kumar H R,
Ramakrishnan A G
Abstract:
A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas…
▽ More
A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas written in Kannada script. The coverage of the OCR is nearly complete in the sense that it recognizes all the punctuation marks, special symbols, Indo-Arabic and Kannada numerals and also the interspersed English words. Several minor and major original contributions have been done in develo** this OCR at the different processing stages such as binarization, line and character segmentation, recognition and Unicode map**. This has created a Kannada OCR that performs as good as, and in some cases, better than the Google's Tesseract OCR, as shown by the results. To the knowledge of the authors, this is the maiden report of a complete Kannada OCR, handling all the issues involved. Currently, there is no dictionary based postprocessing, and the obtained results are due solely to the recognition process. Four benchmark test databases containing scanned pages from books in Kannada, Sanskrit, Konkani and Tulu languages, but all of them printed in Kannada script, have been created. The word level recognition accuracy of Lipi Gnani is 4% higher on the Kannada dataset than that of Google's Tesseract OCR, 8% higher on the datasets of Tulu and Sanskrit, and 25% higher on the Konkani dataset.
△ Less
Submitted 2 January, 2019;
originally announced January 2019.
-
A short review on Applications of Deep learning for Cyber security
Authors:
Mohammed Harun Babu R,
Vinayakumar R,
Soman KP
Abstract:
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works…
▽ More
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works related to deep learning based solutions for various cyber security use cases. Keywords: Deep learning, intrusion detection, malware detection, Android malware detection, spam & phishing detection, traffic analysis, binary analysis.
△ Less
Submitted 29 January, 2019; v1 submitted 15 December, 2018;
originally announced December 2018.
-
Spin reorientation and disordered rare earth magnetism in Ho$_2$FeCoO$_6$
Authors:
Haripriya G. R.,
Harikrishnan S. Nair,
Pradheesh R.,
S. Rayaprol,
V. Siruguri,
Durgesh Singh,
Venkatesh R.,
Ganesan V.,
Sethupathi K.,
Sankaranarayanan V
Abstract:
We report the experimental observation of spin reorientation in the double perovskite Ho$_2$FeCoO$_6$. The magnetic phase transitions in this compound are characterized and studied through magnetization and specific heat, and the magnetic structures are elucidated by neutron powder diffraction. Two magnetic phase transitions are observed in this compound - one at $T_\mathrm{N1} \approx$ 250~K, fro…
▽ More
We report the experimental observation of spin reorientation in the double perovskite Ho$_2$FeCoO$_6$. The magnetic phase transitions in this compound are characterized and studied through magnetization and specific heat, and the magnetic structures are elucidated by neutron powder diffraction. Two magnetic phase transitions are observed in this compound - one at $T_\mathrm{N1} \approx$ 250~K, from paramagnetic to antiferromagnetic, and the other at $T_\mathrm{N2} \approx$ 45~K, from a phase with mixed magnetic structures to a single phase through a spin reorientation process. The magnetic structure in the temperature range 200~K - 45~K is a mixed phase of the irreducible representations $Γ_1$ and $Γ_3$, both of which are antiferromagnetic. The phase with mixed magnetic structures that exists in Ho$_2$FeCoO$_6$ gives rise to a large thermal hysteresis in magnetization that extends from 200~K down to the spin reorientation temperature. At $T_\mathrm{N2}$, the magnetic structure transforms to $Γ_1$. Though long-range magnetic order is established in the transition metal lattice, it is seen that only short-range magnetic order prevails in Ho$^{3+}$ - lattice. Our results should motivate further detailed studies on single crystals in order to explore spin reorientation process, spin switching and the possibility of anisotropic magnetic interactions giving rise to electric polarization in Ho$_2$FeCoO$_6$.
△ Less
Submitted 30 November, 2017;
originally announced December 2017.
-
Animation and Chirplet-Based Development of a PIR Sensor Array for Intruder Classification in an Outdoor Environment
Authors:
Raviteja Upadrashta,
Tarun Choubisa,
A. Praneeth,
Tony G.,
Aswath V. S.,
P. Vijay Kumar,
Sripad Kowshik,
Hari Prasad Gokul R,
T. V. Prabhakar
Abstract:
This paper presents the development of a passive infra-red sensor tower platform along with a classification algorithm to distinguish between human intrusion, animal intrusion and clutter arising from wind-blown vegetative movement in an outdoor environment. The research was aimed at exploring the potential use of wireless sensor networks as an early-warning system to help mitigate human-wildlife…
▽ More
This paper presents the development of a passive infra-red sensor tower platform along with a classification algorithm to distinguish between human intrusion, animal intrusion and clutter arising from wind-blown vegetative movement in an outdoor environment. The research was aimed at exploring the potential use of wireless sensor networks as an early-warning system to help mitigate human-wildlife conflicts occurring at the edge of a forest. There are three important features to the development. Firstly, the sensor platform employs multiple sensors arranged in the form of a two-dimensional array to give it a key spatial-resolution capability that aids in classification. Secondly, given the challenges of collecting data involving animal intrusion, an Animation-based Simulation tool for Passive Infra-Red sEnsor (ASPIRE) was developed that simulates signals corresponding to human and animal intrusion and some limited models of vegetative clutter. This speeded up the process of algorithm development by allowing us to test different hypotheses in a time-efficient manner. Finally, a chirplet-based model for intruder signal was developed that significantly helped boost classification accuracy despite drawing data from a smaller number of sensors. An SVM-based classifier was used which made use of chirplet, energy and signal cross-correlation-based features. The average accuracy obtained for intruder detection and classification on real-world and simulated data sets was in excess of 97%.
△ Less
Submitted 13 April, 2016;
originally announced April 2016.
-
Trouble with the Drude theory of metallic conduction: Incompatibility with special relativity
Authors:
Sree Harsha N R,
Anupama Prakash,
Sreedevi A,
Kothari D P
Abstract:
In this paper, we show that the classical Drude model of electrical conductivity, one of the fundamental models in the theory of electrical conductivity, is inconsistent with the special relativity. Due to this incorrect model, a current carrying closed circuit is thought not to produce second order electric field according to Maxwell's theory of electromagnetism. But, Edwards et al. detected a sm…
▽ More
In this paper, we show that the classical Drude model of electrical conductivity, one of the fundamental models in the theory of electrical conductivity, is inconsistent with the special relativity. Due to this incorrect model, a current carrying closed circuit is thought not to produce second order electric field according to Maxwell's theory of electromagnetism. But, Edwards et al. detected a small second order electric field radially pointing toward a current carrying conductor in a superconducting Nb-Ti coil. Assis et al. claim to show that Maxwell's theory does not predict any second order forces and hence we should take Weber's electrodynamics seriously. But, we show that not only a magnetic field, but also a second order electric field is produced in the vicinity of a current carrying conductor, which is consistent with Maxwell's theory. This electric field points radially toward the current carrying conductor as detected in Edwards' experiments. We also show that the positive field, detected by Sansbury in a U-shaped copper conductor carrying a constant current, should be created as a consequence of our theory. We then estimate the order of the strength of this electric field and show that it is in agreement with the experimental values.
△ Less
Submitted 8 February, 2016;
originally announced February 2016.
-
Marine Buoy Location Finding and Tracking System for Linux Supporting Mobiles
Authors:
Harikrishnan. R,
Shajna S. Hammed,
P. Malini
Abstract:
Marine buoy is an important part of underwater acoustic communication system. It is of great significance to track and locate it. It is widely used in ocean environment three - dimensional monitoring, underwater multimedia communication, underwater mobile carrier navigation and positioning, marine resources detection, remote control of submarine topography map** and offshore oil industry, data a…
▽ More
Marine buoy is an important part of underwater acoustic communication system. It is of great significance to track and locate it. It is widely used in ocean environment three - dimensional monitoring, underwater multimedia communication, underwater mobile carrier navigation and positioning, marine resources detection, remote control of submarine topography map** and offshore oil industry, data acquisition, etc. This paper describes the application of the monitoring service of GPRS / GPS module at Marine buoy. It can achieve real - time location of underwater acoustic communication devices and route tracking to avoid the loss of the device, as well as assist to retrieve the lost device.
△ Less
Submitted 27 March, 2014;
originally announced March 2014.
-
Modeling European Options
Authors:
Aishwarya B U,
Mohammed Saaqib A,
Rajashree H R,
Vigasini B
Abstract:
Option contracts can be valued by using the Black-Scholes equation, a partial differential equation with initial conditions. An exact solution for European style options is known. The computation time and the error need to be minimized simultaneously. In this paper, the authors have solved the Black-Scholes equation by employing a reasonably accurate implicit method. Options with known analytic so…
▽ More
Option contracts can be valued by using the Black-Scholes equation, a partial differential equation with initial conditions. An exact solution for European style options is known. The computation time and the error need to be minimized simultaneously. In this paper, the authors have solved the Black-Scholes equation by employing a reasonably accurate implicit method. Options with known analytic solutions have been evaluated. Furthermore, an overall second order accurate space and time discretization has been accomplished in this paper.
△ Less
Submitted 11 February, 2014;
originally announced February 2014.
-
Scaling in the Inter-Event Time of Random and Seasonal Systems
Authors:
Cesar A. Hidalgo R
Abstract:
Interevent times have been studied across various disciplines in search for correlations. In this paper we show analytical and numerical evidence that at the population level a power-law can be obtained by assuming poissonian agents with different characteristic times, and at the individual level by assuming poissonian agents that change the rates at which they perform an event in a random or de…
▽ More
Interevent times have been studied across various disciplines in search for correlations. In this paper we show analytical and numerical evidence that at the population level a power-law can be obtained by assuming poissonian agents with different characteristic times, and at the individual level by assuming poissonian agents that change the rates at which they perform an event in a random or deterministic fashion. The range in which we expect to see this behavior and the possible deviations from it are studied by considering the shape of the rate distribution.
△ Less
Submitted 26 January, 2006; v1 submitted 13 December, 2005;
originally announced December 2005.
-
The effect of social interactions in the primary life cycle of motion pictures
Authors:
Cesar A. Hidalgo R.,
Alejandra Castro,
Carlos Rodriguez-Sickert
Abstract:
We model the consumption life cycle of theater attendance for single movies by taking into account the size of the targeted group and the effect of social interactions. We provide an analytical solution of such model, which we contrast with empirical data from the film industry obtaining good agreement with the diverse types of behaviors empirically found. The model grants a quantitative measure…
▽ More
We model the consumption life cycle of theater attendance for single movies by taking into account the size of the targeted group and the effect of social interactions. We provide an analytical solution of such model, which we contrast with empirical data from the film industry obtaining good agreement with the diverse types of behaviors empirically found. The model grants a quantitative measure of the valorization of this cul- tural good based on the relative values of the coupling between agents who have watched the movie and those who have not. This represents a measurement of the observed quality of the good that is extracted solely from its dynamics, independently of critics reviews.
△ Less
Submitted 31 January, 2006; v1 submitted 4 January, 2005;
originally announced January 2005.
-
About the Dirac Equation with a $δ$ potential
Authors:
R. Benguria,
H. Castillo,
M. Loewe
Abstract:
An elementary treatment of the Dirac Equation in the presence of a three-dimensional spherically symmetric $δ(r-r_0)$-potential is presented. We show how to handle the matching conditions in the configuration space, and discuss the occurrence of supercritical effects.
An elementary treatment of the Dirac Equation in the presence of a three-dimensional spherically symmetric $δ(r-r_0)$-potential is presented. We show how to handle the matching conditions in the configuration space, and discuss the occurrence of supercritical effects.
△ Less
Submitted 19 May, 2000; v1 submitted 13 March, 2000;
originally announced March 2000.