Skip to main content

Showing 1–27 of 27 results for author: Raja, V

.
  1. arXiv:2404.13828  [pdf, ps, other

    physics.optics nlin.PS

    Unique multistable states in periodic structures with saturable nonlinearity. II. Broken $\mathcal{PT}$-symmetric regime

    Authors: S. Vignesh Raja, A. Govindarajan, M. Lakshmanan

    Abstract: In this work, we observe that the $\mathcal{PT}$-symmetric fiber Bragg gratings (PTFBGs) with saturable nonlinearity (SNL) exhibit ramp-like, mixed, optical multistability (OM) in the broken regime. The interplay between nonlinearity and detuning parameter plays a central role in transforming the characteristics of the hysteresis curves and facilitates the realization of different OM curves. Also,… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

    Comments: 15 pages, 12 figures

  2. arXiv:2404.13724  [pdf, ps, other

    physics.optics nlin.PS

    Unique multistable states in periodic structures with saturable nonlinearity. I. Conventional case and unbroken $\mathcal{PT}$-symmetric regime

    Authors: S. Vignesh Raja, A. Govindarajan, M. Lakshmanan

    Abstract: In this work, we predict that periodic structures without gain and loss do not exhibit an S-shaped hysteresis curve in the presence of saturable nonlinearity (SNL). Instead, the input-output characteristics of the system admit ramp-like optical bistability (OB) and multistability (OM) curves that are unprecedented in the context of conventional periodic structures in the literature. An increase in… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

    Comments: 17 pages, 8 figures

  3. arXiv:2311.10383  [pdf

    q-bio.NC

    Affordance switching in self-organizing brain-body-environment systems

    Authors: Vicente Raja, Matthieu M. de Wit

    Abstract: In the ecological approach to perception and action, information that specifies affordances is available in the energy arrays surrounding organisms, and this information is detected by organisms in order to perceptually guide their actions. At the behavioral scale, organisms responding to affordances are understood as self-organizing and reorganizing softly-assembled synergies. Within the ecologic… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: To be published in: Mangalam, M., Hajnal, A., & Kelty-Stephen, D.G. (Eds.). (2024). The Modern Legacy of Gibson's Affordances for the Sciences of Organisms. Routledge, New York, NY

  4. End-to-end deep learning for directly estimating grape yield from ground-based imagery

    Authors: Alexander G. Olenskyj, Brent S. Sams, Zhenghao Fei, Vishal Singh, Pranav V. Raja, Gail M. Bornhorst, J. Mason Earles

    Abstract: Yield estimation is a powerful tool in vineyard management, as it allows growers to fine-tune practices to optimize yield and quality. However, yield estimation is currently performed using manual sampling, which is time-consuming and imprecise. This study demonstrates the application of proximal imaging combined with deep learning for yield estimation in vineyards. Continuous data collection usin… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Journal ref: Comput. Electron. Agric. 198 (2022)

  5. arXiv:2207.01820  [pdf, ps, other

    physics.optics nlin.PS

    Inhomogeneous nonlinearity meets $\mathcal{PT}$-symmetric Bragg structures: Route to ultra-low power steering and peculiar stable states

    Authors: S. Sudhakar, S. Vignesh Raja, A. Govindarajan, K. Batri, M. Lakshmanan

    Abstract: In the context of $\mathcal{PT}$-symmetric fiber Bragg gratings, tailoring the nonlinear profile along the propagation coordinate serves to be a new direction for realizing low-power all-optical switches. The scheme is fruitful only when the nonlinearity profile will be either linearly decreasing or increasing form. If the rate of variation of the nonlinearity profile is high, the critical intensi… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: Journal of the Optical Society of America B

  6. arXiv:2206.15129  [pdf, other

    cs.AI cs.HC cs.LG

    Personalized Detection of Cognitive Biases in Actions of Users from Their Logs: Anchoring and Recency Biases

    Authors: Atanu R Sinha, Navita Goyal, Sunny Dhamnani, Tanay Asija, Raja K Dubey, M V Kaarthik Raja, Georgios Theocharous

    Abstract: Cognitive biases are mental shortcuts humans use in dealing with information and the environment, and which result in biased actions and behaviors (or, actions), unbeknownst to themselves. Biases take many forms, with cognitive biases occupying a central role that inflicts fairness, accountability, transparency, ethics, law, medicine, and discrimination. Detection of biases is considered a necessa… ▽ More

    Submitted 1 July, 2022; v1 submitted 30 June, 2022; originally announced June 2022.

  7. arXiv:2206.04603  [pdf

    q-bio.NC

    In search for an alternative to the computer metaphor of the mind and brain

    Authors: Damian G. Kelty-Stephen, Paul E. Cisek, Benjamin De Bari, James Dixon, Luis H. Favela, Fred Hasselman, Fred Keijzer, Vicente Raja, Jeffrey B. Wagman, Brandon J. Thomas, Madhur Mangalam

    Abstract: The brain-as-computer metaphor has anchored the professed computational nature of the mind, wresting it down from the intangible logic of Platonic philosophy to a material basis for empirical science. However, as with many long-lasting metaphors in science, the computer metaphor has been explored and stretched long enough to reveal its boundaries. These boundaries highlight widening gaps in our un… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

    Comments: 157 pages, 19 figures

  8. arXiv:2201.00760  [pdf, ps, other

    physics.optics nlin.PS

    Low-power optical bistability in $\mathcal{PT}$-symmetric chirped Bragg gratings with four-wave mixing

    Authors: S. Sudhakar, S. Vignesh Raja, A. Govindarajan, K. Batri, M. Lakshmanan

    Abstract: The central theme of this article is the analysis of the usefulness of introducing four-wave mixing or modulation of Kerr nonlinearity in a nonuniform grating structure with gain and loss. To do so, we propose an inhomogeneous system in which the nonlinearity of the $\mathcal{PT}$-symmetric grating is modulated. It is proven that the proposed scheme can be fruitful only if the nonlinearity and its… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: To appear in JOSA B

  9. arXiv:2012.11934  [pdf, ps, other

    physics.optics nlin.PS physics.comp-ph

    $N$-channel comb filtering and lasing in $\mathcal{PT}$-symmetric superstructures

    Authors: S. Vignesh Raja, A. Govindarajan, A. Mahalingam, M. Lakshmanan

    Abstract: A comb spectrum generating device based on Bragg grating superstructures with gain and loss is suggested in this paper. It includes a comprehensive analysis of the device formulation, generation and manipulation of the comb spectrum with a number of degrees of freedom such as duty cycle, sampling period and gain-loss parameter. For applications such as RF traversal filters and tunable multi-wavele… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

    Comments: To appear in Phys. Rev. A

  10. arXiv:2007.04628  [pdf, other

    physics.optics nlin.PS physics.comp-ph

    Phase shifted $\mathcal{PT}$-symmetric periodic structures

    Authors: S. Vignesh Raja, A. Govindarajan, A. Mahalingam, M. Lakshmanan

    Abstract: We report the spectral features of a phase-shifted parity and time ($\mathcal{PT}$)-symmetric fiber Bragg grating (PPTFBG) and demonstrate its functionality as a demultiplexer in the unbroken $\mathcal{PT}$-symmetric regime. The length of the proposed system is of the order of millimeters and the lasing spectra in the broken $\mathcal{PT}$-symmetric regime can be easily tuned in terms of intensity… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: To appear in Phys. Rev. A

    Journal ref: Phys. Rev. A 102, 013515 (2020)

  11. Tailoring inhomogeneous $\mathcal{PT}$-symmetric fiber Bragg grating spectra

    Authors: S. Vignesh Raja, A. Govindarajan, A. Mahalingam, M. Lakshmanan

    Abstract: The unique spectral behavior exhibited by a class of non-uniform Bragg periodic structures, namely chirped and apodized fiber Bragg gratings (FBGs) influenced by parity and time reversal ($\mathcal{PT}$) symmetry, is presented. The interplay between the $\mathcal{PT}$-symmetry and nonuniformities brings exceptional functionalities in the broken $\mathcal{PT}$-symmetric phase such as wavelength sel… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Comments: Accepted for Publication in Phys. Rev. A

    Journal ref: Phys. Rev. A 101, 033814 (2020)

  12. arXiv:1910.03554  [pdf, other

    nlin.PS physics.optics

    Nonlinear nonuniform $\mathcal{PT}$-symmetric Bragg grating structures

    Authors: S. Vignesh Raja, A. Govindarajan, A. Mahalingam, M. Lakshmanan

    Abstract: We explore the consequences of incorporating parity and time reversal ($\mathcal{PT}$) symmetries on the dynamics of nonreciprocal light propagation exhibited by a class of nonuniform periodic structures known as chirped $\mathcal{PT}$-symmetric fiber Bragg gratings (FBGs). The interplay among various grating parameters such as chir**, detuning, nonlinearities, and gain/loss gives rise to unique… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Comments: Accepted for Publication in Phys. Rev. A

    Journal ref: Phys. Rev. A 100, 053806 (2019)

  13. arXiv:1908.10394  [pdf, other

    nlin.PS physics.optics

    Multifaceted dynamics and gap solitons in $\mathcal{PT}$-symmetric periodic structures

    Authors: S. Vignesh Raja, A. Govindarajan, A. Mahalingam, M. Lakshmanan

    Abstract: We report the role of $\mathcal{PT}$-symmetry in switching characteristics of a highly nonlinear fiber Bragg grating (FBG) with cubic-quintic-septic nonlinearities. We demonstrate that the device shows novel bi-(multi-) stable states in the broken regime as a direct consequence of the shift in the photonic band gap influenced by both $\mathcal{PT}$-symmetry and higher-order nonlinearities. We also… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted for publication in Phys. Rev. A

    Journal ref: Phys. Rev. A 100, 033838 (2019)

  14. Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks

    Authors: Vamseedhar Reddyvari Raja, Parimal Parag, Srinivas Shakkottai

    Abstract: The ability of a P2P network to scale its throughput up in proportion to the arrival rate of peers has recently been shown to be crucially dependent on the chunk sharing policy employed. Some policies can result in low frequencies of a particular chunk, known as the missing chunk syndrome, which can dramatically reduce throughput and lead to instability of the system. For instance, commonly used p… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    Report number: Volume 29, Issue 6, pp. 2548--2559, Dec. 2021

    Journal ref: IEEE/ACM Transactions on Networking, Volume 29, Issue 6, pp. 2548--2559, December 2021

  15. Computational Model to Generate Case-Inflected Forms of Masculine Nouns for Word Search in Sanskrit E-Text

    Authors: S V Kasmir Raja, V Rajitha, Lakshmanan Meenakshi

    Abstract: The problem of word search in Sanskrit is inseparable from complexities that include those caused by euphonic conjunctions and case-inflections. The case-inflectional forms of a noun normally number 24 owing to the fact that in Sanskrit there are eight cases and three numbers-singular, dual and plural. The traditional method of generating these inflectional forms is rather elaborate owing to the f… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Journal ref: Journal of Computer Science (ISSN Print: 1549-3636, ISSN Online: 1552-6607), December 2014, Volume 10, Issue 11, Pages 2269-2283

  16. arXiv:1410.2871  [pdf

    cs.CL

    An Ontology for Comprehensive Tutoring of Euphonic Conjunctions of Sanskrit Grammar

    Authors: S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan

    Abstract: Euphonic conjunctions (sandhis) form a very important aspect of Sanskrit morphology and phonology. The traditional and modern methods of studying about euphonic conjunctions in Sanskrit follow different methodologies. The former involves a rigorous study of the Paninian system embodied in Panini's Ashtadhyayi, while the latter usually involves the study of a few important sandhi rules with the use… ▽ More

    Submitted 3 February, 2015; v1 submitted 10 October, 2014; originally announced October 2014.

    Journal ref: European Journal of Scientific Research, ISSN 1450-216X / 1450-202X, Vol. 124, No. 4, September 2014, pp 460-467

  17. arXiv:1409.4364  [pdf

    cs.CL

    Computational Algorithms Based on the Paninian System to Process Euphonic Conjunctions for Word Searches

    Authors: S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan

    Abstract: Searching for words in Sanskrit E-text is a problem that is accompanied by complexities introduced by features of Sanskrit such as euphonic conjunctions or sandhis. A word could occur in an E-text in a transformed form owing to the operation of rules of sandhi. Simple word search would not yield these transformed forms of the word. Further, there is no search engine in the literature that can comp… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Journal ref: International Journal of Computer Science and Information Security, Vol. 12, No. 8, 2014, pp. 64-76

  18. arXiv:1409.4354  [pdf

    cs.CL

    A Binary Schema and Computational Algorithms to Process Vowel-based Euphonic Conjunctions for Word Searches

    Authors: S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan

    Abstract: Comprehensively searching for words in Sanskrit E-text is a non-trivial problem because words could change their forms in different contexts. One such context is sandhi or euphonic conjunctions, which cause a word to change owing to the presence of adjacent letters or words. The change wrought by these possible conjunctions can be so significant in Sanskrit that a simple search for the word in its… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Journal ref: International Journal of Applied Engineering Research, ISSN 0973-4562, Vol. 9, No. 20, 2014, pp 7127-7142

  19. arXiv:1404.7246  [pdf, ps, other

    cond-mat.quant-gas nlin.PS

    Stability of trapless Bose-Einstein condensates with two- and three-body interactions

    Authors: S Sabari, R Vasantha Jayakantha Raja, K Porsezian, P Muruganandam

    Abstract: We study the stabilization of a trapless Bose-Einstein condensate by analysing the mean-field Gross-Pitaevskii equation with attractive two- and three-body interactions through both analytical and numerical methods. Using the variational method we show that there is an enhancement of the condensate stability due to the inclusion of a three-body interaction in addition to the two-body interaction.… ▽ More

    Submitted 29 April, 2014; originally announced April 2014.

    Journal ref: J. Phys. B: At. Mol. Opt. Phys. 43 (2010) 125302

  20. arXiv:1309.1220  [pdf, other

    cs.GT cs.NI

    A Mean Field Game Approach to Scheduling in Cellular Systems

    Authors: Mayank Manjrekar, Vinod Ramaswamy, Vamseedhar Reddyvari Raja, Srinivas Shakkottai

    Abstract: We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experie… ▽ More

    Submitted 7 August, 2017; v1 submitted 4 September, 2013; originally announced September 2013.

  21. arXiv:1204.3052  [pdf

    cs.DC cs.MS math.NA

    Heterogeneous Highly Parallel Implementation of Matrix Exponentiation Using GPU

    Authors: Chittampally Vasanth Raja, Srinivas Balasubramanian, Prakash S Raghavendra

    Abstract: The vision of super computer at every desk can be realized by powerful and highly parallel CPUs or GPUs or APUs. Graphics processors once specialized for the graphics applications only, are now used for the highly computational intensive general purpose applications. Very expensive GFLOPs and TFLOP performance has become very cheap with the GPGPUs. Current work focuses mainly on the highly paralle… ▽ More

    Submitted 13 April, 2012; originally announced April 2012.

    Comments: 15 pages, 12 figures, International Journal of Distributed and Parallel systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]

    Journal ref: International Journal of Distributed and Parallel Systems, Vol 3, No. 2, March 2012 issue

  22. arXiv:1112.2265  [pdf

    cs.CR cs.NE

    A Novel Approach for Password Authentication Using Bidirectional Associative Memory

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, Prof. P. S. Avadhani

    Abstract: Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it wil… ▽ More

    Submitted 10 December, 2011; originally announced December 2011.

    Comments: 13 pages

    Journal ref: Advanced Computing: An International Journal ( ACIJ ), Vol.2, No.6, November 2011

  23. arXiv:1110.1502  [pdf

    cs.CR

    Hilbert Matrix Based Cryptosystem using a Session Key

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analyt… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, 2011, pp.711-715

  24. arXiv:1110.1498  [pdf

    cs.CR cs.NI

    A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involv… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: six pages; International Journal of Mathematics Trends and Technology- July to Aug Issue 2011

  25. arXiv:1110.1490  [pdf

    cs.CR cs.NE

    A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Computer Science and Information Technologies (IJCSIT), Volume 2 Issue 5 2011,2127-2131

  26. arXiv:1110.1488  [pdf

    cs.CR

    Handwritten Text Image Authentication using Back Propagation

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S. Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: 10 pages pdf file

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011

  27. arXiv:physics/0003028  [pdf, ps, other

    physics.ao-ph

    A New Hypothesis for Layers of High Reflectivity Seen in MST Radar Observations

    Authors: G. C. Asnani, M. K. Rama Varma Raja

    Abstract: Analysis of MST radar observations at Gadanki (near Tirupati, India), for a period of 14 months from 1995 September to 1996 November, shows that "Clear air Turbulence" is not the primary source of high MST radar reflectivity; this conventional idea needs to be modified. An alternative hypothesis based on the microphysics and microdynamics associated with aerosols and water substance in the atmos… ▽ More

    Submitted 14 March, 2000; originally announced March 2000.

    Comments: 5 pages, Revtex