-
Unique multistable states in periodic structures with saturable nonlinearity. II. Broken $\mathcal{PT}$-symmetric regime
Authors:
S. Vignesh Raja,
A. Govindarajan,
M. Lakshmanan
Abstract:
In this work, we observe that the $\mathcal{PT}$-symmetric fiber Bragg gratings (PTFBGs) with saturable nonlinearity (SNL) exhibit ramp-like, mixed, optical multistability (OM) in the broken regime. The interplay between nonlinearity and detuning parameter plays a central role in transforming the characteristics of the hysteresis curves and facilitates the realization of different OM curves. Also,…
▽ More
In this work, we observe that the $\mathcal{PT}$-symmetric fiber Bragg gratings (PTFBGs) with saturable nonlinearity (SNL) exhibit ramp-like, mixed, optical multistability (OM) in the broken regime. The interplay between nonlinearity and detuning parameter plays a central role in transforming the characteristics of the hysteresis curves and facilitates the realization of different OM curves. Also, it plays a crucial role in reducing the switch-up and down intensities of various stable branches of an OM curve. In a mixed OM curve, either the ramp-like hysteresis curves or S-like hysteresis curves can appear predominantly depending on the magnitude of the detuning parameter. An increase in the device length or nonlinearity increases the number of stable states for fixed values of input intensity. Under a reversal in the direction of light incidence, the ramp-like OM and mixed OM curves assume an unusual vortex-like envelope at lower intensities. Numerical simulations reveal that the switch-up and down intensities of different stable branches of a ramp-like OM and mixed OM curves drift towards the higher and lower intensity sides, respectively (opposite direction). The drift is severe to the extent that an intermediate hysteresis curve features switch-down action at near-zero switching intensities. Also, the input intensities required to realize ramp-like, and mixed OM curves reduce dramatically under a reversal in the direction of light incidence.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
Unique multistable states in periodic structures with saturable nonlinearity. I. Conventional case and unbroken $\mathcal{PT}$-symmetric regime
Authors:
S. Vignesh Raja,
A. Govindarajan,
M. Lakshmanan
Abstract:
In this work, we predict that periodic structures without gain and loss do not exhibit an S-shaped hysteresis curve in the presence of saturable nonlinearity (SNL). Instead, the input-output characteristics of the system admit ramp-like optical bistability (OB) and multistability (OM) curves that are unprecedented in the context of conventional periodic structures in the literature. An increase in…
▽ More
In this work, we predict that periodic structures without gain and loss do not exhibit an S-shaped hysteresis curve in the presence of saturable nonlinearity (SNL). Instead, the input-output characteristics of the system admit ramp-like optical bistability (OB) and multistability (OM) curves that are unprecedented in the context of conventional periodic structures in the literature. An increase in the nonlinearity (NL) or the gain-loss parameter increases the switch-up and down intensities of different stable branches in a ramp-like OM curve. Revival of the typical S-shaped hysteresis curve requires the device to work under the combined influence of frequency detuning and $\mathcal{PT}$-symmetry. An increase in the detuning, NL and gain-loss parameters reduces the switching intensities of the S-shaped OB (OM) curves. During the process, mixed OM curves that feature a fusion between ramp-like and S-shaped OM curves emanate at low values of the detuning parameter in the input-output characteristics. The detuning parameter values for which ramp-like, S-shaped, and mixed OM appear varies with the NL coefficient. For a given range of input intensities, the number of stable states admitted by the system increases with the device length or NL. When the laser light enters the device from the opposite end of the grating, nonreciprocal switching occurs at ultra-low intensities via an interplay between NL, detuning, and gain-loss parameters.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
Affordance switching in self-organizing brain-body-environment systems
Authors:
Vicente Raja,
Matthieu M. de Wit
Abstract:
In the ecological approach to perception and action, information that specifies affordances is available in the energy arrays surrounding organisms, and this information is detected by organisms in order to perceptually guide their actions. At the behavioral scale, organisms responding to affordances are understood as self-organizing and reorganizing softly-assembled synergies. Within the ecologic…
▽ More
In the ecological approach to perception and action, information that specifies affordances is available in the energy arrays surrounding organisms, and this information is detected by organisms in order to perceptually guide their actions. At the behavioral scale, organisms responding to affordances are understood as self-organizing and reorganizing softly-assembled synergies. Within the ecological community, little effort has so far been devoted to studying this process at the neural scale, though interest in the topic is growing under the header of ecological neuroscience. From this perspective, switches between affordances may be conceptualized as transitions within brain-body-environment systems as a whole rather than under the control of a privileged (neural) scale. We discuss extant empirical research at the behavioral scale in support of this view as well as ongoing and planned work at the neural scale that attempts to further flesh out this view by characterizing the neural dynamics that are associated with these transitions while participants dynamically respond to affordances.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
End-to-end deep learning for directly estimating grape yield from ground-based imagery
Authors:
Alexander G. Olenskyj,
Brent S. Sams,
Zhenghao Fei,
Vishal Singh,
Pranav V. Raja,
Gail M. Bornhorst,
J. Mason Earles
Abstract:
Yield estimation is a powerful tool in vineyard management, as it allows growers to fine-tune practices to optimize yield and quality. However, yield estimation is currently performed using manual sampling, which is time-consuming and imprecise. This study demonstrates the application of proximal imaging combined with deep learning for yield estimation in vineyards. Continuous data collection usin…
▽ More
Yield estimation is a powerful tool in vineyard management, as it allows growers to fine-tune practices to optimize yield and quality. However, yield estimation is currently performed using manual sampling, which is time-consuming and imprecise. This study demonstrates the application of proximal imaging combined with deep learning for yield estimation in vineyards. Continuous data collection using a vehicle-mounted sensing kit combined with collection of ground truth yield data at harvest using a commercial yield monitor allowed for the generation of a large dataset of 23,581 yield points and 107,933 images. Moreover, this study was conducted in a mechanically managed commercial vineyard, representing a challenging environment for image analysis but a common set of conditions in the California Central Valley. Three model architectures were tested: object detection, CNN regression, and transformer models. The object detection model was trained on hand-labeled images to localize grape bunches, and either bunch count or pixel area was summed to correlate with grape yield. Conversely, regression models were trained end-to-end to predict grape yield from image data without the need for hand labeling. Results demonstrated that both a transformer as well as the object detection model with pixel area processing performed comparably, with a mean absolute percent error of 18% and 18.5%, respectively on a representative holdout dataset. Saliency map** was used to demonstrate the attention of the CNN model was localized near the predicted location of grape bunches, as well as on the top of the grapevine canopy. Overall, the study showed the applicability of proximal imaging and deep learning for prediction of grapevine yield on a large scale. Additionally, the end-to-end modeling approach was able to perform comparably to the object detection approach while eliminating the need for hand-labeling.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
Inhomogeneous nonlinearity meets $\mathcal{PT}$-symmetric Bragg structures: Route to ultra-low power steering and peculiar stable states
Authors:
S. Sudhakar,
S. Vignesh Raja,
A. Govindarajan,
K. Batri,
M. Lakshmanan
Abstract:
In the context of $\mathcal{PT}$-symmetric fiber Bragg gratings, tailoring the nonlinear profile along the propagation coordinate serves to be a new direction for realizing low-power all-optical switches. The scheme is fruitful only when the nonlinearity profile will be either linearly decreasing or increasing form. If the rate of variation of the nonlinearity profile is high, the critical intensi…
▽ More
In the context of $\mathcal{PT}$-symmetric fiber Bragg gratings, tailoring the nonlinear profile along the propagation coordinate serves to be a new direction for realizing low-power all-optical switches. The scheme is fruitful only when the nonlinearity profile will be either linearly decreasing or increasing form. If the rate of variation of the nonlinearity profile is high, the critical intensities fall below the input power of value 0.01 in the unbroken regime provided that the light launching direction is right. Nowadays, every new theoretical inception into the PTFBG has started making sense of switching in the broken $\mathcal{PT}$-symmetric regime which was once believed to be the instability regime. When the inhomogeneous nonlinearity acts together with the broken $\mathcal{PT}$-symmetry and right light incidence, it leads to two peculiar settings. First, the switch-up intensities are ultra-low. Second, the switch-down action takes place at zero critical intensities. Such OB curves are unprecedented in the context of conventional gratings and found only in plasmonic devices and anti-directional couplers. Even though the nonlinearity is inhomogeneous, the ramp-like first stable states persist in the broken $\mathcal{PT}$-symmetric regime giving an additional indication that the broken PTFBG is closely associated with the plasmonic structures. In the existing PTFBG systems, the switching intensities are relatively higher in the broken regime. However, the proposed system records the lowest switching intensities in the broken regime. The reported intensities ($< 0.005$) are also the lowest ever-switching intensities recorded in the perspective of PTFBGs to date.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Personalized Detection of Cognitive Biases in Actions of Users from Their Logs: Anchoring and Recency Biases
Authors:
Atanu R Sinha,
Navita Goyal,
Sunny Dhamnani,
Tanay Asija,
Raja K Dubey,
M V Kaarthik Raja,
Georgios Theocharous
Abstract:
Cognitive biases are mental shortcuts humans use in dealing with information and the environment, and which result in biased actions and behaviors (or, actions), unbeknownst to themselves. Biases take many forms, with cognitive biases occupying a central role that inflicts fairness, accountability, transparency, ethics, law, medicine, and discrimination. Detection of biases is considered a necessa…
▽ More
Cognitive biases are mental shortcuts humans use in dealing with information and the environment, and which result in biased actions and behaviors (or, actions), unbeknownst to themselves. Biases take many forms, with cognitive biases occupying a central role that inflicts fairness, accountability, transparency, ethics, law, medicine, and discrimination. Detection of biases is considered a necessary step toward their mitigation. Herein, we focus on two cognitive biases - anchoring and recency. The recognition of cognitive bias in computer science is largely in the domain of information retrieval, and bias is identified at an aggregate level with the help of annotated data. Proposing a different direction for bias detection, we offer a principled approach along with Machine Learning to detect these two cognitive biases from Web logs of users' actions. Our individual user level detection makes it truly personalized, and does not rely on annotated data. Instead, we start with two basic principles established in cognitive psychology, use modified training of an attention network, and interpret attention weights in a novel way according to those principles, to infer and distinguish between these two biases. The personalized approach allows detection for specific users who are susceptible to these biases when performing their tasks, and can help build awareness among them so as to undertake bias mitigation.
△ Less
Submitted 1 July, 2022; v1 submitted 30 June, 2022;
originally announced June 2022.
-
In search for an alternative to the computer metaphor of the mind and brain
Authors:
Damian G. Kelty-Stephen,
Paul E. Cisek,
Benjamin De Bari,
James Dixon,
Luis H. Favela,
Fred Hasselman,
Fred Keijzer,
Vicente Raja,
Jeffrey B. Wagman,
Brandon J. Thomas,
Madhur Mangalam
Abstract:
The brain-as-computer metaphor has anchored the professed computational nature of the mind, wresting it down from the intangible logic of Platonic philosophy to a material basis for empirical science. However, as with many long-lasting metaphors in science, the computer metaphor has been explored and stretched long enough to reveal its boundaries. These boundaries highlight widening gaps in our un…
▽ More
The brain-as-computer metaphor has anchored the professed computational nature of the mind, wresting it down from the intangible logic of Platonic philosophy to a material basis for empirical science. However, as with many long-lasting metaphors in science, the computer metaphor has been explored and stretched long enough to reveal its boundaries. These boundaries highlight widening gaps in our understanding of the brain's role in an organism's goal-directed, intelligent behaviors and thoughts. In search of a more appropriate metaphor that reflects the potentially noncomputable functions of mind and brain, eight author groups answer the following questions: (1) What do we understand by the computer metaphor of the brain and cognition? (2) What are some of the limitations of this computer metaphor? (3) What metaphor should replace the computational metaphor? (4) What findings support alternative metaphors? Despite agreeing about feeling the strain of the strictures of computer metaphors, the authors suggest an exciting diversity of possible metaphoric options for future research into the mind and brain.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
Low-power optical bistability in $\mathcal{PT}$-symmetric chirped Bragg gratings with four-wave mixing
Authors:
S. Sudhakar,
S. Vignesh Raja,
A. Govindarajan,
K. Batri,
M. Lakshmanan
Abstract:
The central theme of this article is the analysis of the usefulness of introducing four-wave mixing or modulation of Kerr nonlinearity in a nonuniform grating structure with gain and loss. To do so, we propose an inhomogeneous system in which the nonlinearity of the $\mathcal{PT}$-symmetric grating is modulated. It is proven that the proposed scheme can be fruitful only if the nonlinearity and its…
▽ More
The central theme of this article is the analysis of the usefulness of introducing four-wave mixing or modulation of Kerr nonlinearity in a nonuniform grating structure with gain and loss. To do so, we propose an inhomogeneous system in which the nonlinearity of the $\mathcal{PT}$-symmetric grating is modulated. It is proven that the proposed scheme can be fruitful only if the nonlinearity and its associated modulation terms are assumed to be self-defocusing ones. In order to cut down the intensity required for the steering, the sign of chir** is taken to be negative and the wavelength of operating light is considered to be higher than the Bragg wavelength. Alongside these settings, launching the light from the rear end of the device dramatically reduces the critical intensity to a value of 0.015 (approximately) which must be the lowest switching intensity ever reported in the context of nonlinear $\mathcal{PT}$-symmetric gratings. The ramp-like stable states in the broken $\mathcal{PT}$-symmetric regime prevail even in the company of modulation in the nonlinearity index for both of the light incident directions.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
$N$-channel comb filtering and lasing in $\mathcal{PT}$-symmetric superstructures
Authors:
S. Vignesh Raja,
A. Govindarajan,
A. Mahalingam,
M. Lakshmanan
Abstract:
A comb spectrum generating device based on Bragg grating superstructures with gain and loss is suggested in this paper. It includes a comprehensive analysis of the device formulation, generation and manipulation of the comb spectrum with a number of degrees of freedom such as duty cycle, sampling period and gain-loss parameter. For applications such as RF traversal filters and tunable multi-wavele…
▽ More
A comb spectrum generating device based on Bragg grating superstructures with gain and loss is suggested in this paper. It includes a comprehensive analysis of the device formulation, generation and manipulation of the comb spectrum with a number of degrees of freedom such as duty cycle, sampling period and gain-loss parameter. For applications such as RF traversal filters and tunable multi-wavelength laser sources, the reflected intensities of the comb resulting from the superstructures should have uniform intensities, and this is guaranteed by optimizing the physical length of the device, gain and loss in the unbroken $\mathcal{PT}$-symmetric regime. Alternatively, it can be accomplished by reducing the duty cycle ratio of the superstructure to extremely small values in the broken $\mathcal{PT}$-symmetric regime. Such a customization will degrade the reflectivity of the conventional grating superstructures, while it gives rise to narrow spectral lines with high reflectivity in the proposed system. Remarkably, combs with an inverted envelope are generated for larger values of gain and loss.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Phase shifted $\mathcal{PT}$-symmetric periodic structures
Authors:
S. Vignesh Raja,
A. Govindarajan,
A. Mahalingam,
M. Lakshmanan
Abstract:
We report the spectral features of a phase-shifted parity and time ($\mathcal{PT}$)-symmetric fiber Bragg grating (PPTFBG) and demonstrate its functionality as a demultiplexer in the unbroken $\mathcal{PT}$-symmetric regime. The length of the proposed system is of the order of millimeters and the lasing spectra in the broken $\mathcal{PT}$-symmetric regime can be easily tuned in terms of intensity…
▽ More
We report the spectral features of a phase-shifted parity and time ($\mathcal{PT}$)-symmetric fiber Bragg grating (PPTFBG) and demonstrate its functionality as a demultiplexer in the unbroken $\mathcal{PT}$-symmetric regime. The length of the proposed system is of the order of millimeters and the lasing spectra in the broken $\mathcal{PT}$-symmetric regime can be easily tuned in terms of intensity, bandwidth and wavelength by varying the magnitude of the phase shift in the middle of the structure. Surprisingly, the multi-modal lasing spectra are suppressed by virtue of judiciously selected phase and the gain-loss value. Also, it is possible to obtain sidelobe-less spectra in the broken $\mathcal{PT}$-symmetric regime, without a need for an apodization profile, which is a traditional way to tame the unwanted sidelobes. The system is found to show narrow band single-mode lasing behavior for a wide range of phase shift values for given values of gain and loss. Moreover, we report the intensity tunable reflection and transmission characteristics in the unbroken regime via variation in gain and loss. At the exceptional point, the system shows unidirectional wave transport phenomenon independent of the presence of phase shift in the middle of the grating. For the right light incidence direction, the system exhibits zero reflection wavelengths within the stopband at the exceptional point. We also investigate the role of multiple phase shifts placed at fixed locations along the length of the FBG and the variations in the spectra when the phase shift and gain-loss values are tuned. In the broken $\mathcal{PT}$-symmetric regime, the presence of multiple phase shifts aids in controlling the number of reflectivity peaks besides controlling their magnitude.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Tailoring inhomogeneous $\mathcal{PT}$-symmetric fiber Bragg grating spectra
Authors:
S. Vignesh Raja,
A. Govindarajan,
A. Mahalingam,
M. Lakshmanan
Abstract:
The unique spectral behavior exhibited by a class of non-uniform Bragg periodic structures, namely chirped and apodized fiber Bragg gratings (FBGs) influenced by parity and time reversal ($\mathcal{PT}$) symmetry, is presented. The interplay between the $\mathcal{PT}$-symmetry and nonuniformities brings exceptional functionalities in the broken $\mathcal{PT}$-symmetric phase such as wavelength sel…
▽ More
The unique spectral behavior exhibited by a class of non-uniform Bragg periodic structures, namely chirped and apodized fiber Bragg gratings (FBGs) influenced by parity and time reversal ($\mathcal{PT}$) symmetry, is presented. The interplay between the $\mathcal{PT}$-symmetry and nonuniformities brings exceptional functionalities in the broken $\mathcal{PT}$-symmetric phase such as wavelength selective amplification and single-mode lasing for a wide range of variations in gain-loss. We observe that the device is no more passive and it undergoes a series of transitions from asymmetric reflection to unidirectional invisibility and multi-mode amplification as a consequence of variation in the imaginary part of the strength of modulation in different apodization profiles, namely Gaussian and raised cosine, at the given value of chir**. The chir** affords bandwidth control as well as control over the magnitude of the reflected (transmitted) light. Likewise, apodization offers additional functionality in the form of suppression of uncontrolled lasing behavior in the broken $\mathcal{PT}$-symmetric regime besides moderating the reflected signals outside the band edges of the spectra.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
Nonlinear nonuniform $\mathcal{PT}$-symmetric Bragg grating structures
Authors:
S. Vignesh Raja,
A. Govindarajan,
A. Mahalingam,
M. Lakshmanan
Abstract:
We explore the consequences of incorporating parity and time reversal ($\mathcal{PT}$) symmetries on the dynamics of nonreciprocal light propagation exhibited by a class of nonuniform periodic structures known as chirped $\mathcal{PT}$-symmetric fiber Bragg gratings (FBGs). The interplay among various grating parameters such as chir**, detuning, nonlinearities, and gain/loss gives rise to unique…
▽ More
We explore the consequences of incorporating parity and time reversal ($\mathcal{PT}$) symmetries on the dynamics of nonreciprocal light propagation exhibited by a class of nonuniform periodic structures known as chirped $\mathcal{PT}$-symmetric fiber Bragg gratings (FBGs). The interplay among various grating parameters such as chir**, detuning, nonlinearities, and gain/loss gives rise to unique bi- and multi-stable states in the unbroken as well as broken $\mathcal{PT}$-symmetric regimes. The role of chir** on the steering dynamics of the hysteresis curve is influenced by the type of nonlinearities and the nature of detuning parameter. Also, incident directions of the input light robustly impact the steering dynamics of bistable and multistable states both in the unbroken and broken $\mathcal{PT}$-symmetric regimes. When the light launching direction is reversed, critical stable states are found to occur at very low intensities which opens up a new avenue for an additional way of controlling light with light. We also analyze the phenomenon of unidirectional wave transport and the reflective bi- and multi-stable characteristics at the so-called $\mathcal{PT}$-symmetry breaking point.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
Multifaceted dynamics and gap solitons in $\mathcal{PT}$-symmetric periodic structures
Authors:
S. Vignesh Raja,
A. Govindarajan,
A. Mahalingam,
M. Lakshmanan
Abstract:
We report the role of $\mathcal{PT}$-symmetry in switching characteristics of a highly nonlinear fiber Bragg grating (FBG) with cubic-quintic-septic nonlinearities. We demonstrate that the device shows novel bi-(multi-) stable states in the broken regime as a direct consequence of the shift in the photonic band gap influenced by both $\mathcal{PT}$-symmetry and higher-order nonlinearities. We also…
▽ More
We report the role of $\mathcal{PT}$-symmetry in switching characteristics of a highly nonlinear fiber Bragg grating (FBG) with cubic-quintic-septic nonlinearities. We demonstrate that the device shows novel bi-(multi-) stable states in the broken regime as a direct consequence of the shift in the photonic band gap influenced by both $\mathcal{PT}$-symmetry and higher-order nonlinearities. We also numerically depict that such FBGs provide a productive test bed where the broken $\mathcal{PT}$-symmetric regime can be exploited to set up all-optical applications such as binary switches, multi-level signal processing and optical computing. Unlike optical bistability (OB) in the traditional and unbroken $\mathcal{PT}$-symmetric FBG, it exhibits many peculiar features such as flat-top stable states and ramp like input-output characteristics before the onset of OB phenomenon in the broken regime. The gain/loss parameter plays a dual role in controlling the switching intensities between the stable states which is facilitated by reversing the direction of light incidence. We also find that the gain/loss parameter tailors the formation of gap solitons pertaining to transmission resonances which clearly indicates that it can be employed to set up optical storage devices. Moreover, the interplay between gain/loss and higher order nonlinearities brings notable changes in the nonlinear reflection spectra of the system under constant pump powers. The influence of each control parameters on the switching operation is also presented in a nutshell to validate that FBG offers more degrees of freedom in controlling light with light.
△ Less
Submitted 27 August, 2019;
originally announced August 2019.
-
Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks
Authors:
Vamseedhar Reddyvari Raja,
Parimal Parag,
Srinivas Shakkottai
Abstract:
The ability of a P2P network to scale its throughput up in proportion to the arrival rate of peers has recently been shown to be crucially dependent on the chunk sharing policy employed. Some policies can result in low frequencies of a particular chunk, known as the missing chunk syndrome, which can dramatically reduce throughput and lead to instability of the system. For instance, commonly used p…
▽ More
The ability of a P2P network to scale its throughput up in proportion to the arrival rate of peers has recently been shown to be crucially dependent on the chunk sharing policy employed. Some policies can result in low frequencies of a particular chunk, known as the missing chunk syndrome, which can dramatically reduce throughput and lead to instability of the system. For instance, commonly used policies that nominally "boost" the sharing of infrequent chunks such as the well known rarest-first algorithm have been shown to be unstable. Recent efforts have largely focused on the careful design of boosting policies to mitigate this issue. We take a complementary viewpoint, and instead consider a policy that simply prevents the sharing of the most frequent chunk(s). Following terminology from statistics wherein the most frequent value in a data set is called the mode, we refer to this policy as mode-suppression. We also consider a more general version that suppresses the mode only if the mode frequency is larger than the lowest frequency by a fixed threshold. We prove the stability of mode-suppression using Lyapunov techniques, and use a Kingman bound argument to show that the total download time does not increase with peer arrival rate. We then design versions of mode-suppression that sample a small number of peers at each time, and construct noisy mode estimates by aggregating these samples over time. We show numerically that the variants of mode-suppression yield near-optimal download times, and outperform all other recently proposed chunk sharing algorithms.
△ Less
Submitted 8 April, 2019;
originally announced April 2019.
-
Computational Model to Generate Case-Inflected Forms of Masculine Nouns for Word Search in Sanskrit E-Text
Authors:
S V Kasmir Raja,
V Rajitha,
Lakshmanan Meenakshi
Abstract:
The problem of word search in Sanskrit is inseparable from complexities that include those caused by euphonic conjunctions and case-inflections. The case-inflectional forms of a noun normally number 24 owing to the fact that in Sanskrit there are eight cases and three numbers-singular, dual and plural. The traditional method of generating these inflectional forms is rather elaborate owing to the f…
▽ More
The problem of word search in Sanskrit is inseparable from complexities that include those caused by euphonic conjunctions and case-inflections. The case-inflectional forms of a noun normally number 24 owing to the fact that in Sanskrit there are eight cases and three numbers-singular, dual and plural. The traditional method of generating these inflectional forms is rather elaborate owing to the fact that there are differences in the forms generated between even very similar words and there are subtle nuances involved. Further, it would be a cumbersome exercise to generate and search for 24 forms of a word during a word search in a large text, using the currently available case-inflectional form generators. This study presents a new approach to generating case-inflectional forms that is simpler to compute. Further, an optimized model that is sufficient for generating only those word forms that are required in a word search and is more than 80% efficient compared to the complete case-inflectional forms generator, is presented in this study for the first time.
△ Less
Submitted 17 December, 2014;
originally announced December 2014.
-
An Ontology for Comprehensive Tutoring of Euphonic Conjunctions of Sanskrit Grammar
Authors:
S. V. Kasmir Raja,
V. Rajitha,
Meenakshi Lakshmanan
Abstract:
Euphonic conjunctions (sandhis) form a very important aspect of Sanskrit morphology and phonology. The traditional and modern methods of studying about euphonic conjunctions in Sanskrit follow different methodologies. The former involves a rigorous study of the Paninian system embodied in Panini's Ashtadhyayi, while the latter usually involves the study of a few important sandhi rules with the use…
▽ More
Euphonic conjunctions (sandhis) form a very important aspect of Sanskrit morphology and phonology. The traditional and modern methods of studying about euphonic conjunctions in Sanskrit follow different methodologies. The former involves a rigorous study of the Paninian system embodied in Panini's Ashtadhyayi, while the latter usually involves the study of a few important sandhi rules with the use of examples. The former is not suitable for beginners, and the latter, not sufficient to gain a comprehensive understanding of the operation of sandhi rules. This is so since there are not only numerous sandhi rules and exceptions, but also complex precedence rules involved. The need for a new ontology for sandhi-tutoring was hence felt. This work presents a comprehensive ontology designed to enable a student-user to learn in stages all about euphonic conjunctions and the relevant aphorisms of Sanskrit grammar and to test and evaluate the progress of the student-user. The ontology forms the basis of a multimedia sandhi tutor that was given to different categories of users including Sanskrit scholars for extensive and rigorous testing.
△ Less
Submitted 3 February, 2015; v1 submitted 10 October, 2014;
originally announced October 2014.
-
Computational Algorithms Based on the Paninian System to Process Euphonic Conjunctions for Word Searches
Authors:
S. V. Kasmir Raja,
V. Rajitha,
Meenakshi Lakshmanan
Abstract:
Searching for words in Sanskrit E-text is a problem that is accompanied by complexities introduced by features of Sanskrit such as euphonic conjunctions or sandhis. A word could occur in an E-text in a transformed form owing to the operation of rules of sandhi. Simple word search would not yield these transformed forms of the word. Further, there is no search engine in the literature that can comp…
▽ More
Searching for words in Sanskrit E-text is a problem that is accompanied by complexities introduced by features of Sanskrit such as euphonic conjunctions or sandhis. A word could occur in an E-text in a transformed form owing to the operation of rules of sandhi. Simple word search would not yield these transformed forms of the word. Further, there is no search engine in the literature that can comprehensively search for words in Sanskrit E-texts taking euphonic conjunctions into account. This work presents an optimal binary representational schema for letters of the Sanskrit alphabet along with algorithms to efficiently process the sandhi rules of Sanskrit grammar. The work further presents an algorithm that uses the sandhi processing algorithm to perform a comprehensive word search on E-text.
△ Less
Submitted 15 September, 2014;
originally announced September 2014.
-
A Binary Schema and Computational Algorithms to Process Vowel-based Euphonic Conjunctions for Word Searches
Authors:
S. V. Kasmir Raja,
V. Rajitha,
Meenakshi Lakshmanan
Abstract:
Comprehensively searching for words in Sanskrit E-text is a non-trivial problem because words could change their forms in different contexts. One such context is sandhi or euphonic conjunctions, which cause a word to change owing to the presence of adjacent letters or words. The change wrought by these possible conjunctions can be so significant in Sanskrit that a simple search for the word in its…
▽ More
Comprehensively searching for words in Sanskrit E-text is a non-trivial problem because words could change their forms in different contexts. One such context is sandhi or euphonic conjunctions, which cause a word to change owing to the presence of adjacent letters or words. The change wrought by these possible conjunctions can be so significant in Sanskrit that a simple search for the word in its given form alone can significantly reduce the success level of the search. This work presents a representational schema that represents letters in a binary format and reduces Paninian rules of euphonic conjunctions to simple bit set-unset operations. The work presents an efficient algorithm to process vowel-based sandhis using this schema. It further presents another algorithm that uses the sandhi processor to generate the possible transformed word forms of a given word to use in a comprehensive word search.
△ Less
Submitted 15 September, 2014;
originally announced September 2014.
-
Stability of trapless Bose-Einstein condensates with two- and three-body interactions
Authors:
S Sabari,
R Vasantha Jayakantha Raja,
K Porsezian,
P Muruganandam
Abstract:
We study the stabilization of a trapless Bose-Einstein condensate by analysing the mean-field Gross-Pitaevskii equation with attractive two- and three-body interactions through both analytical and numerical methods. Using the variational method we show that there is an enhancement of the condensate stability due to the inclusion of a three-body interaction in addition to the two-body interaction.…
▽ More
We study the stabilization of a trapless Bose-Einstein condensate by analysing the mean-field Gross-Pitaevskii equation with attractive two- and three-body interactions through both analytical and numerical methods. Using the variational method we show that there is an enhancement of the condensate stability due to the inclusion of a three-body interaction in addition to the two-body interaction. We also study the stability of the condensates in the presence of the time-varying three-body interaction. Finally we confirm the stabilization of a trapless condensate from numerical simulation.
△ Less
Submitted 29 April, 2014;
originally announced April 2014.
-
A Mean Field Game Approach to Scheduling in Cellular Systems
Authors:
Mayank Manjrekar,
Vinod Ramaswamy,
Vamseedhar Reddyvari Raja,
Srinivas Shakkottai
Abstract:
We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experie…
▽ More
We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE.
△ Less
Submitted 7 August, 2017; v1 submitted 4 September, 2013;
originally announced September 2013.
-
Heterogeneous Highly Parallel Implementation of Matrix Exponentiation Using GPU
Authors:
Chittampally Vasanth Raja,
Srinivas Balasubramanian,
Prakash S Raghavendra
Abstract:
The vision of super computer at every desk can be realized by powerful and highly parallel CPUs or GPUs or APUs. Graphics processors once specialized for the graphics applications only, are now used for the highly computational intensive general purpose applications. Very expensive GFLOPs and TFLOP performance has become very cheap with the GPGPUs. Current work focuses mainly on the highly paralle…
▽ More
The vision of super computer at every desk can be realized by powerful and highly parallel CPUs or GPUs or APUs. Graphics processors once specialized for the graphics applications only, are now used for the highly computational intensive general purpose applications. Very expensive GFLOPs and TFLOP performance has become very cheap with the GPGPUs. Current work focuses mainly on the highly parallel implementation of Matrix Exponentiation. Matrix Exponentiation is widely used in many areas of scientific community ranging from highly critical flight, CAD simulations to financial, statistical applications. Proposed solution for Matrix Exponentiation uses OpenCL for exploiting the hyper parallelism offered by the many core GPGPUs. It employs many general GPU optimizations and architectural specific optimizations. This experimentation covers the optimizations targeted specific to the Scientific Graphics cards (Tesla-C2050). Heterogeneous Highly Parallel Matrix Exponentiation method has been tested for matrices of different sizes and with different powers. The devised Kernel has shown 1000X speedup and 44 fold speedup with the naive GPU Kernel.
△ Less
Submitted 13 April, 2012;
originally announced April 2012.
-
A Novel Approach for Password Authentication Using Bidirectional Associative Memory
Authors:
A. S. N. Chakravarthy,
Penmetsa V. Krishna Raja,
Prof. P. S. Avadhani
Abstract:
Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it wil…
▽ More
Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it will be converted into binary form and the binary values will be normalized. Associative memories have been used recently for password authentication in order to overcome drawbacks of the traditional password authentication methods. In this paper we proposed a method using Bidirectional Associative Memory algorithm for both alphanumeric (Text) and graphical password. By doing so the amount of security what we provide for the user can be enhanced. This paper along with test results show that converting user password in to Probabilistic values and giving them as input for BAM improves the security of the system
△ Less
Submitted 10 December, 2011;
originally announced December 2011.
-
Hilbert Matrix Based Cryptosystem using a Session Key
Authors:
Penmetsa V. Krishna Raja,
A. S. N. Chakravarthy,
P. S. Avadhani
Abstract:
Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analyt…
▽ More
Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. The objectives of the proposed work are to propose a new cryptographic method based on the special matrix called the Hilbert matrix for authentication and confidentiality and to propose a model for confidentiality and authentication using shared key cryptosystems with the concept of digital envelo** using a session key. In the present work various algorithms are presented for encryption and authentication based on Hilbert matrix using a session key.
△ Less
Submitted 7 October, 2011;
originally announced October 2011.
-
A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode
Authors:
Penmetsa V. Krishna Raja,
A. S. N. Chakravarthy,
P. S. Avadhani
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involv…
▽ More
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. The objectives of the proposed work are to propose a new cryptographic method based on the special matrix called the Hilbert matrix for authentication and confidentiality and to propose a model for confidentiality and authentication using a combination of symmetric and public cryptosystems. Further, it is extended to shared key cryptosystems with the concept of digital envelo** using a session key. In the present work an algorithm for shared key encryption is developed using Hilbert matrix cryptosystem. In this the block chaining modes of operation have been used to tackle the issues of confusion and diffusion.
△ Less
Submitted 7 October, 2011;
originally announced October 2011.
-
A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model
Authors:
A. S. N. Chakravarthy,
Penmetsa V. Krishna Raja,
P. S Avadhani
Abstract:
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a…
▽ More
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle attacks), and is often wrapped up with authenticating identity. Password authentication using Brain-State -In-A Box is presented in this paper. Here in this paper we discuss Brain-State -In-A Box Scheme for Textual and graphical passwords which will be converted in to probabilistic values Password. We observe how to get password authentication Probabilistic values for Text and Graphical image. This study proposes the use of a Brain-State -In-A Box technique for password authentication. In comparison to existing layered neural network techniques, the proposed method provides better accuracy and quicker response time to registration and password changes.
△ Less
Submitted 7 October, 2011;
originally announced October 2011.
-
Handwritten Text Image Authentication using Back Propagation
Authors:
A. S. N. Chakravarthy,
Penmetsa V. Krishna Raja,
P. S. Avadhani
Abstract:
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a…
▽ More
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle attacks), and is often wrapped up with authenticating identity. Literary can involve imitating the style of a famous author. If an original manuscript, typewritten text, or recording is available, then the medium itself (or its packaging - anything from a box to e-mail headers) can help prove or disprove the authenticity of the document. The use of digital images of handwritten historical documents has become more popular in recent years. Volunteers around the world now read thousands of these images as part of their indexing process. Handwritten text images of old documents are sometimes difficult to read or noisy due to the preservation of the document and quality of the image [1]. Handwritten text offers challenges that are rarely encountered in machine-printed text. In addition, most problems faced in reading machine- printed text (e.g., character recognition, word segmentation, letter segmentation, etc.) are more severe, in handwritten text. In this paper we Here in this paper we proposed a method for authenticating hand written text images using back propagation algorithm..
△ Less
Submitted 7 October, 2011;
originally announced October 2011.
-
A New Hypothesis for Layers of High Reflectivity Seen in MST Radar Observations
Authors:
G. C. Asnani,
M. K. Rama Varma Raja
Abstract:
Analysis of MST radar observations at Gadanki (near Tirupati, India), for a period of 14 months from 1995 September to 1996 November, shows that "Clear air Turbulence" is not the primary source of high MST radar reflectivity; this conventional idea needs to be modified. An alternative hypothesis based on the microphysics and microdynamics associated with aerosols and water substance in the atmos…
▽ More
Analysis of MST radar observations at Gadanki (near Tirupati, India), for a period of 14 months from 1995 September to 1996 November, shows that "Clear air Turbulence" is not the primary source of high MST radar reflectivity; this conventional idea needs to be modified. An alternative hypothesis based on the microphysics and microdynamics associated with aerosols and water substance in the atmosphere, is presented here.
△ Less
Submitted 14 March, 2000;
originally announced March 2000.