-
Nonlinear and nonreciprocal transport effects in untwinned thin films of ferromagnetic Weyl metal SrRuO$_3$
Authors:
Uddipta Kar,
Elisha Cho-Hao Lu,
Akhilesh Kr. Singh,
P. V. Sreenivasa Reddy,
Youngjoon Han,
Xinwei Li,
Cheng-Tung Cheng,
Song Yang,
Chun-Yen Lin,
I-Chun Cheng,
Chia-Hung Hsu,
D. Hsieh,
Wei-Cheng Lee,
Guang-Yu Guo,
Wei-Li Lee
Abstract:
The identification of distinct charge transport features, deriving from nontrivial bulk band and surface states, has been a challenging subject in the field of topological systems. In topological Dirac and Weyl semimetals, nontrivial conical bands with Fermi-arc surface states give rise to negative longitudinal magnetoresistance due to chiral anomaly effect and unusual thickness dependent quantum…
▽ More
The identification of distinct charge transport features, deriving from nontrivial bulk band and surface states, has been a challenging subject in the field of topological systems. In topological Dirac and Weyl semimetals, nontrivial conical bands with Fermi-arc surface states give rise to negative longitudinal magnetoresistance due to chiral anomaly effect and unusual thickness dependent quantum oscillation from Weyl-orbit effect, which were demonstrated recently in experiments. In this work, we report the experimental observations of large nonlinear and nonreciprocal transport effects for both longitudinal and transverse channels in an untwinned Weyl metal of SrRuO$_3$ thin film grown on a SrTiO$_{3}$ substrate. From rigorous measurements with bias current applied along various directions with respect to the crystalline principal axes, the magnitude of nonlinear Hall signals from the transverse channel exhibits a simple sin$α$ dependence at low temperatures, where $α$ is the angle between bias current direction and orthorhombic [001]$_{\rm o}$, reaching a maximum when current is along orthorhombic [1-10]$_{\rm o}$. On the contrary, the magnitude of nonlinear and nonreciprocal signals in the longitudinal channel attains a maximum for bias current along [001]$_{\rm o}$, and it vanishes for bias current along [1-10]$_{\rm o}$. The observed $α$-dependent nonlinear and nonreciprocal signals in longitudinal and transverse channels reveal a magnetic Weyl phase with an effective Berry curvature dipole along [1-10]$_{\rm o}$ from surface states, accompanied by 1D chiral edge modes along [001]$_{\rm o}$.
△ Less
Submitted 18 March, 2024; v1 submitted 10 July, 2023;
originally announced July 2023.
-
Integer Linear Programming Formulations for Triple and Quadruple Roman Domination Problems
Authors:
Sanath Kumar Vengaldas,
Adarsh Reddy Muthyala,
Bharath Chaitanya Konkati,
P. Venkata Subba Reddy
Abstract:
Roman domination is a well researched topic in graph theory. Recently two new variants of Roman domination, namely triple Roman domination and quadruple Roman domination problems have been introduced, to provide better defense strategies. However, triple Roman domination and quadruple Roman domination problems are NP-hard. In this paper, we have provided genetic algorithm for solving triple and qu…
▽ More
Roman domination is a well researched topic in graph theory. Recently two new variants of Roman domination, namely triple Roman domination and quadruple Roman domination problems have been introduced, to provide better defense strategies. However, triple Roman domination and quadruple Roman domination problems are NP-hard. In this paper, we have provided genetic algorithm for solving triple and quadruple Roman domination problems. Programming (ILP) formulations for triple Roman domination and quadruple Roman domination problems have been proposed. The proposed models are implemented using IBM CPLEX 22.1 optimization solvers and obtained results for random graphs generated using NetworkX Erdos-Renyi model.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Evidence for Unconventional Superconductivity and Nontrivial Topology in PdTe
Authors:
Ramakanta Chapai,
P. V. Sreenivasa Reddy,
Lingyi Xing,
David E. Graf,
Amar B. Karki,
Tay-Rong Chang,
Rongying **
Abstract:
PdTe is a superconductor with Tc ~4.25 K. Recently, evidence for bulk-nodal and surface-nodeless gap features has been reported in PdTe [Yang et al., Phys. Rev. Lett. 130, 046402 (2023)]. Here, we investigate the physical properties of PdTe in both the normal and superconducting states via specific heat and magnetic torque measurements and first-principles calculations. Below Tc, the electronic sp…
▽ More
PdTe is a superconductor with Tc ~4.25 K. Recently, evidence for bulk-nodal and surface-nodeless gap features has been reported in PdTe [Yang et al., Phys. Rev. Lett. 130, 046402 (2023)]. Here, we investigate the physical properties of PdTe in both the normal and superconducting states via specific heat and magnetic torque measurements and first-principles calculations. Below Tc, the electronic specific heat initially decreases in T3 behavior (1.5 K < T < Tc) then exponentially decays. Using the two-band model, the superconducting specific heat can be well described with two energy gaps: one is 0.372 meV and another 1.93 meV. The calculated bulk band structure consists of two electron bands (α and \b{eta}) and two hole bands (γ and η) at the Fermi level. Experimental detection of the de Haas-van Alphen (dHvA) oscillations allows us to identify four frequencies (Fα = 65 T, F\b{eta} = 658 T, Fγ = 1154 T, and Fη = 1867 T for H // a), consistent with theoretical predictions. Nontrivial α and \b{eta} bands are further identified via both calculations and the angle dependence of the dHvA oscillations. Our results suggest that PdTe is a candidate for unconventional superconductivity.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Observation of 2D Weyl Fermion States in Epitaxial Bismuthene
Authors:
Qiangsheng Lu,
P. V. Sreenivasa Reddy,
Hoyeon Jeon,
Alessandro R. Mazza,
Matthew Brahlek,
Weikang Wu,
Shengyuan A. Yang,
Jacob Cook,
Clayton Conner,
Xiaoqian Zhang,
Amarnath Chakraborty,
Yueh-Ting Yao,
Hung-Ju Tien,
Chun-Han Tseng,
Po-Yuan Yang,
Shang-Wei Lien,
Hsin Lin,
Tai-Chang Chiang,
Giovanni Vignale,
An-** Li,
Tay-Rong Chang,
Rob G. Moore,
Guang Bian
Abstract:
A two-dimensional (2D) Weyl semimetal featuring a spin-polarized linear band dispersion and a nodal Fermi surface is a new topological phase of matter. It is a solid-state realization of Weyl fermions in an intrinsic 2D system. The nontrivial topology of 2D Weyl cones guarantees the existence of a new form of topologically protected boundary states, Fermi string edge states. In this work, we repor…
▽ More
A two-dimensional (2D) Weyl semimetal featuring a spin-polarized linear band dispersion and a nodal Fermi surface is a new topological phase of matter. It is a solid-state realization of Weyl fermions in an intrinsic 2D system. The nontrivial topology of 2D Weyl cones guarantees the existence of a new form of topologically protected boundary states, Fermi string edge states. In this work, we report the realization of a 2D Weyl semimetal in monolayer-thick epitaxial bismuthene grown on SnS(Se) substrate. The intrinsic band gap of bismuthene is eliminated by the space-inversion-symmetry-breaking substrate perturbations, resulting in a gapless spin-polarized Weyl band dispersion. The linear dispersion and spin polarization of the Weyl fermion states are observed in our spin and angle-resolved photoemission measurements. In addition, the scanning tunneling microscopy/spectroscopy reveals a pronounced local density of states at the edge, suggesting the existence of Fermi string edge states. These results open the door for the experimental exploration of the exotic properties of Weyl fermion states in reduced dimensions.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Chaotic Variational Auto encoder-based Adversarial Machine Learning
Authors:
Pavan Venkata Sainadh Reddy,
Yelleti Vivek,
Gopi Pranay,
Vadlamani Ravi
Abstract:
Machine Learning (ML) has become the new contrivance in almost every field. This makes them a target of fraudsters by various adversary attacks, thereby hindering the performance of ML models. Evasion and Data-Poison-based attacks are well acclaimed, especially in finance, healthcare, etc. This motivated us to propose a novel computationally less expensive attack mechanism based on the adversarial…
▽ More
Machine Learning (ML) has become the new contrivance in almost every field. This makes them a target of fraudsters by various adversary attacks, thereby hindering the performance of ML models. Evasion and Data-Poison-based attacks are well acclaimed, especially in finance, healthcare, etc. This motivated us to propose a novel computationally less expensive attack mechanism based on the adversarial sample generation by Variational Auto Encoder (VAE). It is well known that Wavelet Neural Network (WNN) is considered computationally efficient in solving image and audio processing, speech recognition, and time-series forecasting. This paper proposed VAE-Deep-Wavelet Neural Network (VAE-Deep-WNN), where Encoder and Decoder employ WNN networks. Further, we proposed chaotic variants of both VAE with Multi-layer perceptron (MLP) and Deep-WNN and named them C-VAE-MLP and C-VAE-Deep-WNN, respectively. Here, we employed a Logistic map to generate random noise in the latent space. In this paper, we performed VAE-based adversary sample generation and applied it to various problems related to finance and cybersecurity domain-related problems such as loan default, credit card fraud, and churn modelling, etc., We performed both Evasion and Data-Poison attacks on Logistic Regression (LR) and Decision Tree (DT) models. The results indicated that VAE-Deep-WNN outperformed the rest in the majority of the datasets and models. However, its chaotic variant C-VAE-Deep-WNN performed almost similarly to VAE-Deep-WNN in the majority of the datasets.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Compliant Constant Output/ Input Force Mechanisms- Topology Optimization with Contact
Authors:
B V S Nagendra Reddy,
Vitthal Manohar Khatik,
Burkhard Corves,
Anupam Saxena
Abstract:
We synthesize monolithic topologies of constant output (CoFM) and input (CiFM) force mechanisms. During synthesis, we capture all possible aspects of member deformation including finite displacements, buckling, interaction between members, their interaction with external surfaces, and importantly, interaction of the mechanism with flexible workpieces to capture force transfer in true sense. Featur…
▽ More
We synthesize monolithic topologies of constant output (CoFM) and input (CiFM) force mechanisms. During synthesis, we capture all possible aspects of member deformation including finite displacements, buckling, interaction between members, their interaction with external surfaces, and importantly, interaction of the mechanism with flexible workpieces to capture force transfer in true sense. Features of constant force characteristics, e.g., magnitude(s) of the desired force(s), range of input displacement over which slope of the force displacement curve is near zero, and distance between workpiece and the mechanism are controlled individually via novel objectives proposed herein. Two of the constant output and constant input force mechanisms each, are synthesized using stochastic optimization ensuring ready manufacturability. We observe that presence of external surfaces may not be required for singlepiece mechanisms to attain constant force characteristics. However, interesting solutions are possible if mutual contact is permitted. We also note that desired force characteristics may not remain the same with alteration in the workpieces shape and (or) material properties. We finally fabricate and test the synthesized mechanisms and find that the desired constant force characteristics are by and large retained.
△ Less
Submitted 11 January, 2022; v1 submitted 5 January, 2022;
originally announced January 2022.
-
Observation of Unpinned Two-Dimensional Dirac States in Antimony Single Layers with Phosphorene Structure
Authors:
Qiangsheng Lu,
Matthew Snyder,
Kyle Y. Chen,
Xiaoqian Zhang,
Jacob Cook,
Duy Tung Nguyen,
P. V. Sreenivasa Reddy,
Tay-Rong Chang,
Pawel J. Kowalczyk,
Simon A. Brown,
Tai-Chang Chiang,
Shengyuan A. Yang,
Guang Bian
Abstract:
The discovery of graphene has stimulated enormous interest in two-dimensional (2D) electron gas with linear band structure. 2D Dirac materials possess many intriguing physical properties such as high carrier mobility and zero-energy Landau level thanks to the relativistic dispersion and chiral spin/pseudospin texture. 2D Dirac states discovered so far are exclusively pinned at high-symmetry points…
▽ More
The discovery of graphene has stimulated enormous interest in two-dimensional (2D) electron gas with linear band structure. 2D Dirac materials possess many intriguing physical properties such as high carrier mobility and zero-energy Landau level thanks to the relativistic dispersion and chiral spin/pseudospin texture. 2D Dirac states discovered so far are exclusively pinned at high-symmetry points of the Brillouin zone, for example, surface Dirac states at $\overlineΓ$ in topological insulators Bi$_2$Se(Te)$_3$ and Dirac cones at $K$ and $K'$ in graphene. In this work, we report the realization of 2D Dirac states at generic $k$-points in antimony atomic layers with phosphorene structure ($i.e.$ $α$-antimonene). The unpinned nature enables versatile ways to control the locations of the Dirac points in momentum space. In addition, dispersions around the unpinned Dirac points exhibit intrinsically anisotropic behaviors due to the reduced symmetry of generic momentum points. These properties make the $α$-antimonene films a promising platform for exploring interesting physics in unpinned 2D Dirac fermions that are distinct from the conventional Dirac states in graphene.
△ Less
Submitted 18 October, 2021; v1 submitted 10 October, 2021;
originally announced October 2021.
-
Observation of Symmetry-Protected Dirac States in Nonsymmorphic $α$-Antimonene
Authors:
Qiangsheng Lu,
Kyle Y. Chen,
Matthew Snyder,
Jacob Cook,
Duy Tung Nguyen,
P. V. Sreenivasa Reddy,
Tay-Rong Chang,
Shengyuan A. Yang,
Guang Bian
Abstract:
Two-dimensional (2D) Dirac states with linear band dispersion have attracted enormous interest since the discovery of graphene. However, to date, 2D Dirac semimetals are still very rare due to the fact that 2D Dirac states are generally fragile against perturbations such as spin-orbit couplings. Nonsymmorphic crystal symmetries can enforce the formation of Dirac nodes, providing a new route to est…
▽ More
Two-dimensional (2D) Dirac states with linear band dispersion have attracted enormous interest since the discovery of graphene. However, to date, 2D Dirac semimetals are still very rare due to the fact that 2D Dirac states are generally fragile against perturbations such as spin-orbit couplings. Nonsymmorphic crystal symmetries can enforce the formation of Dirac nodes, providing a new route to establishing symmetry-protected Dirac states in 2D materials. Here we report the symmetry-protected Dirac states in nonsymmorphic alpha-antimonene. The antimonene was synthesized by the method of molecular beam epitaxy. Two Dirac cones with large anisotropy were observed by angle-resolved photoemission spectroscopy. The Dirac state in alpha-antimonene is of spin-orbit type in contrast to the spinless Dirac states in graphene. The result extends the 'graphene' physics into a new family of 2D materials where spin-orbit coupling is present.
△ Less
Submitted 10 October, 2021; v1 submitted 14 January, 2021;
originally announced January 2021.
-
Topology synthesis of a 3-kink contact-aided compliant switch
Authors:
B V S Nagendra Reddy,
Anupam Saxena
Abstract:
A topology synthesis approach to design 2D Contact-aided Compliant Mechanisms (CCMs) to trace output paths with three or more kinks is presented. Synthesis process uses three different types of external, rigid contact surfaces: circular, elliptical and rectangular: which in combination, offer intricate local curvatures that CCMs can benefit from, to deliver desired, complex output characteristics.…
▽ More
A topology synthesis approach to design 2D Contact-aided Compliant Mechanisms (CCMs) to trace output paths with three or more kinks is presented. Synthesis process uses three different types of external, rigid contact surfaces: circular, elliptical and rectangular: which in combination, offer intricate local curvatures that CCMs can benefit from, to deliver desired, complex output characteristics. A network of line elements is employed to generate topologies. A set of circular subregions is laid over this network, and external contact surfaces are generated within each subregion. Both, discrete and continuous design variables are employed: the former set controls the CCM topology, appearance and type of external contact surfaces, whereas the latter set governs shapes and sizes of the CCM constituents, and sizes of contact surfaces. All contact types are permitted with contact modeling made significantly easier through identification of outer and inner loops. Line topologies are fleshed out via a user-defined number of quadrilateral elements along lateral and longitudinal directions. Candidate CCM designs are carefully preprocessed before analysis via a commercial software and evolution using a stochastic search. The process is exemplified via a contact-aided, 3-kink mechanical switch which is thoroughly analysed in presence of friction and wear.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Algorithmic Complexity of Isolate Secure Domination in Graphs
Authors:
Jakkepalli Pavan Kumar,
P. Venkata Subba Reddy
Abstract:
A dominating set $S$ is an Isolate Dominating Set (IDS) if the induced subgraph $G[S]$ has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set $S\subseteq V$ is an isolate secure dominating set (ISDS), if for each vertex $u \in V \setminus S$, there exists a neighboring vertex $v$ of $u$ in $S$…
▽ More
A dominating set $S$ is an Isolate Dominating Set (IDS) if the induced subgraph $G[S]$ has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set $S\subseteq V$ is an isolate secure dominating set (ISDS), if for each vertex $u \in V \setminus S$, there exists a neighboring vertex $v$ of $u$ in $S$ such that $(S \setminus \{v\}) \cup \{u\}$ is an IDS of $G$. The minimum cardinality of an ISDS of $G$ is called as an isolate secure domination number, and is denoted by $γ_{0s}(G)$. Given a graph $ G=(V,E)$ and a positive integer $ k,$ the ISDM problem is to check whether $ G $ has an isolate secure dominating set of size at most $ k.$ We prove that ISDM is NP-complete even when restricted to bipartite graphs and split graphs. We also show that ISDM can be solved in linear time for graphs of bounded tree-width.
△ Less
Submitted 12 February, 2020;
originally announced February 2020.
-
Algorithmic Aspects of 2-Secure Domination in Graphs
Authors:
J. Pavan Kumar,
P. Venkata Subba Reddy
Abstract:
Let $G(V,E)$ be a simple, undirected and connected graph. A dominating set $S \subseteq V(G)$ is called a $2$-\textit{secure dominating set} ($2$-SDS) in $G$, if for every pair of distinct vertices $u_1,u_2 \in V(G)$ there exists a pair of distinct vertices $v_1,v_2 \in S$ such that $v_1 \in N[u_1]$, $v_2 \in N[u_2]$ and $(S \setminus \{v_1,v_2\}) \cup \{u_1,u_2 \}$ is a dominating set in $G$. The…
▽ More
Let $G(V,E)$ be a simple, undirected and connected graph. A dominating set $S \subseteq V(G)$ is called a $2$-\textit{secure dominating set} ($2$-SDS) in $G$, if for every pair of distinct vertices $u_1,u_2 \in V(G)$ there exists a pair of distinct vertices $v_1,v_2 \in S$ such that $v_1 \in N[u_1]$, $v_2 \in N[u_2]$ and $(S \setminus \{v_1,v_2\}) \cup \{u_1,u_2 \}$ is a dominating set in $G$. The $2$\textit{-secure domination number} denoted by $γ_{2s}(G)$, equals the minimum cardinality of a $2$-SDS in $G$. Given a graph $ G$ and a positive integer $ k,$ the $ 2 $-Secure Domination ($ 2 $-SDM) problem is to check whether $ G $ has a $ 2 $-secure dominating set of size at most $ k.$ It is known that $ 2 $-SDM is NP-complete for bipartite graphs. In this paper, we prove that the $ 2 $-SDM problem is NP-complete for planar graphs and doubly chordal graphs, a subclass of chordal graphs. We strengthen the NP-complete result for bipartite graphs, by proving this problem is NP-complete for some subclasses of bipartite graphs namely, star convex bipartite, comb convex bipartite graphs. We prove that $ 2 $-SDM is linear time solvable for bounded tree-width graphs. We also show that the $ 2 $-SDM is W[2]-hard even for split graphs. The Minimum $ 2 $-Secure Dominating Set (M2SDS) problem is to find a $ 2 $-secure dominating set of minimum size in the input graph. We propose a $ Δ(G)+1 $ $ - $ approximation algorithm for M2SDS, where $ Δ(G) $ is the maximum degree of the input graph $ G $ and prove that M2SDS cannot be approximated within $ (1 - ε) \ln(| V | ) $ for any $ ε> 0 $ unless $ NP \subseteq DTIME(| V |^{ O(\log \log | V | )}) $. % even for bipartite graphs. A secure dominating set of a graph \textit{defends} one attack at any vertex of the graph. Finally, we show that the M2SDS is APX-complete for graphs with $Δ(G)=4.$
△ Less
Submitted 5 February, 2020;
originally announced February 2020.
-
Algorithmic Complexity of Secure Connected Domination in Graphs
Authors:
Jakkepalli Pavan Kumar,
P. Venkata Subba Reddy,
S. Arumugam
Abstract:
Let $G = (V,E)$ be a simple, undirected and connected graph. A connected (total) dominating set $S \subseteq V$ is a secure connected (total) dominating set of $G$, if for each $ u \in V \setminus S$, there exists $v \in S$ such that $uv \in E$ and $(S \setminus \lbrace v \rbrace) \cup \lbrace u \rbrace $ is a connected (total) dominating set of $G$. The minimum cardinality of a secure connected (…
▽ More
Let $G = (V,E)$ be a simple, undirected and connected graph. A connected (total) dominating set $S \subseteq V$ is a secure connected (total) dominating set of $G$, if for each $ u \in V \setminus S$, there exists $v \in S$ such that $uv \in E$ and $(S \setminus \lbrace v \rbrace) \cup \lbrace u \rbrace $ is a connected (total) dominating set of $G$. The minimum cardinality of a secure connected (total) dominating set of $G$ denoted by $ γ_{sc} (G) (γ_{st}(G))$, is called the secure connected (total) domination number of $G$. In this paper, we show that the decision problems corresponding to secure connected domination number and secure total domination number are NP-complete even when restricted to split graphs or bipartite graphs. The NP-complete reductions also show that these problems are w[2]-hard. We also prove that the secure connected domination problem is linear time solvable in block graphs and threshold graphs.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
Algorithmic Aspects of Some Variants of Domination in Graphs
Authors:
Jakkepalli Pavan Kumar,
P. Venkata Subba Reddy
Abstract:
A set $S \subseteq V$ is a dominating set in G if for every u \in V \ S, there exists $v \in S$ such that $(u,v) \in E$, i.e., $N[S] = V$. A dominating set $S$ is an Isolate Dominating Set} (IDS) if the induced subgraph $G[S]$ has at least one isolated vertex. It is known that Isolate Domination Decision problem (IDOM) is NP-complete for bipartite graphs. In this paper, we extend this by showing t…
▽ More
A set $S \subseteq V$ is a dominating set in G if for every u \in V \ S, there exists $v \in S$ such that $(u,v) \in E$, i.e., $N[S] = V$. A dominating set $S$ is an Isolate Dominating Set} (IDS) if the induced subgraph $G[S]$ has at least one isolated vertex. It is known that Isolate Domination Decision problem (IDOM) is NP-complete for bipartite graphs. In this paper, we extend this by showing that the IDOM is NP-complete for split graphs and perfect elimination bipartite graphs, a subclass of bipartite graphs. A set $S \subseteq V$ is an independent set if G[S] has no edge. A set S \subseteq V is a secure dominating set of $G$ if, for each vertex $u \in V \setminus S$, there exists a vertex $v \in S$ such that $ (u,v) \in E $ and $(S \ \{v\}) \cup \{u\}$ is a dominating set of $G$. In addition, we initiate the study of a new domination parameter called, independent secure domination. A set $S\subseteq V$ is an Independent Secure Dominating Set (InSDS) if $S$ is an independent set and a secure dominating set of $G$. The minimum size of an InSDS in $G$ is called the independent secure domination number of $G$ and is denoted by $γ_{is}(G)$. Given a graph $ G$ and a positive integer $ k,$ the InSDM problem is to check whether $ G $ has an independent secure dominating set of size at most $ k.$ We prove that InSDM is NP-complete for bipartite graphs and linear time solvable for bounded tree-width graphs and threshold graphs, a subclass of split graphs. The MInSDS problem is to find an independent secure dominating set of minimum size, in the input graph. Finally, we prove that the MInSDS problem is APX-hard for graphs with maximum degree $5.$
△ Less
Submitted 12 February, 2020; v1 submitted 30 January, 2020;
originally announced February 2020.
-
Algorithmic Aspects of Secure Connected Domination in Graphs
Authors:
Jakkepalli Pavan Kumar,
P. Venkata Subba Reddy
Abstract:
Let $G = (V,E)$ be a simple, undirected and connected graph. A connected dominating set $S \subseteq V$ is a secure connected dominating set of $G$, if for each $ u \in V\setminus S$, there exists $v\in S$ such that $(u,v) \in E$ and the set $(S \setminus \{ v \}) \cup \{ u \} $ is a connected dominating set of $G$. The minimum size of a secure connected dominating set of $G$ denoted by…
▽ More
Let $G = (V,E)$ be a simple, undirected and connected graph. A connected dominating set $S \subseteq V$ is a secure connected dominating set of $G$, if for each $ u \in V\setminus S$, there exists $v\in S$ such that $(u,v) \in E$ and the set $(S \setminus \{ v \}) \cup \{ u \} $ is a connected dominating set of $G$. The minimum size of a secure connected dominating set of $G$ denoted by $ γ_{sc} (G)$, is called the secure connected domination number of $G$. Given a graph $ G$ and a positive integer $ k,$ the Secure Connected Domination (SCDM) problem is to check whether $ G $ has a secure connected dominating set of size at most $ k.$ In this paper, we prove that the SCDM problem is NP-complete for doubly chordal graphs, a subclass of chordal graphs. We investigate the complexity of this problem for some subclasses of bipartite graphs namely, star convex bipartite, comb convex bipartite, chordal bipartite and chain graphs. The Minimum Secure Connected Dominating Set (MSCDS) problem is to find a secure connected dominating set of minimum size in the input graph. We propose a $ (Δ(G)+1) $ - approximation algorithm for MSCDS, where $ Δ(G) $ is the maximum degree of the input graph $ G $ and prove that MSCDS cannot be approximated within $ (1 -ε) ln(| V |)$ for any $ ε> 0 $ unless $ NP \subseteq DTIME(| V |^{O(log log | V |)})$ even for bipartite graphs. Finally, we show that the MSCDS is APX-complete for graphs with $Δ(G)=4$.
△ Less
Submitted 30 January, 2020;
originally announced January 2020.
-
Realization of an intrinsic, ferromagnetic topological state in MnBi8Te13
Authors:
Chaowei Hu,
Lei Ding,
Kyle N. Gordon,
Barun Ghosh,
Hung-Ju Tien,
Haoxiang Li,
A. Garrison Linn,
Shang-Wei Lian,
Cheng-Yi Huang,
Scott Mackey. P. V. Sreenivasa Reddy,
Bahadur Singh,
Amit Agarwal,
Arun Bansil,
Miao Song,
Dongsheng Li,
Su-Yang Xu,
Hsin Lin,
Huibo Cao,
Tay-Rong Chang,
Dan Dessau,
Ni Ni
Abstract:
The interplay between topology and magnetism is essential for realizing novel topological states including the axion insulator, the magnetic Weyl semimetal, etc. An intrinsically ferromagnetic topological material with only the topological bands at the charge neutrality energy has so far remained elusive. By rationally designing the natural heterostructure consisting of [MnBi2Te4] septuple layers…
▽ More
The interplay between topology and magnetism is essential for realizing novel topological states including the axion insulator, the magnetic Weyl semimetal, etc. An intrinsically ferromagnetic topological material with only the topological bands at the charge neutrality energy has so far remained elusive. By rationally designing the natural heterostructure consisting of [MnBi2Te4] septuple layers and [Bi2Te3] quintuple layers, we report MnBi8Te13 as the first intrinsic ferromagnetic topological material with clean low-energy band structure. Based on the thermodynamic, transport and neutron diffraction measurements, our data show that despite the adjacent [MnBi2Te4] being 44.1 Å apart, MnBi8Te13 manifests long-range ferromagnetism below 10.5 K with strong coupling between magnetism and charge carriers. Our first-principles calculations and angle-resolved photoemission spectroscopy measurements further demonstrate that MnBi8Te13 is an intrinsic ferromagnetic axion state. Therefore, MnBi8Te13 serves as an ideal system to investigate rich emergent phenomena, including the quantized anomalous Hall effect and quantized topological magnetoelectric effect.
△ Less
Submitted 8 December, 2021; v1 submitted 28 October, 2019;
originally announced October 2019.
-
A nucleation theory for yielding of nearly defect-free crystals: understanding rate dependent yield points
Authors:
Vikranth Sagar Reddy,
Parswa Nath,
Jürgen Horbach,
Peter Sollich,
Surajit Sengupta
Abstract:
Experiments and simulations show that when an initially defect free rigid crystal is subjected to deformation at a constant rate, irreversible plastic flow commences at the so-called {\em yield point}. The yield point is a weak function of the deformation rate, which is usually expressed as a power law with an extremely small non-universal exponent. We re-analyze a representative set of published…
▽ More
Experiments and simulations show that when an initially defect free rigid crystal is subjected to deformation at a constant rate, irreversible plastic flow commences at the so-called {\em yield point}. The yield point is a weak function of the deformation rate, which is usually expressed as a power law with an extremely small non-universal exponent. We re-analyze a representative set of published data on nanometer sized, mostly defect free, Cu, Ni and Au crystals in the light of a recently proposed theory of yielding based on nucleation of stable stress-free regions inside the metastable rigid solid. The single relation derived here, which is {\em not} a power law, explains data covering {\em fifteen} orders of magnitude in time scales.
△ Less
Submitted 23 December, 2019; v1 submitted 23 August, 2019;
originally announced August 2019.
-
Twitter Sentiment Analysis using Distributed Word and Sentence Representation
Authors:
Dwarampudi Mahidhar Reddy,
Dr. N V Subba Reddy,
Dr. N V Subba Reddy
Abstract:
An important part of the information gathering and data analysis is to find out what people think about, either a product or an entity. Twitter is an opinion rich social networking site. The posts or tweets from this data can be used for mining people's opinions. The recent surge of activity in this area can be attributed to the computational treatment of data, which made opinion extraction and se…
▽ More
An important part of the information gathering and data analysis is to find out what people think about, either a product or an entity. Twitter is an opinion rich social networking site. The posts or tweets from this data can be used for mining people's opinions. The recent surge of activity in this area can be attributed to the computational treatment of data, which made opinion extraction and sentiment analysis easier. This paper classifies tweets into positive and negative sentiments, but instead of using traditional methods or preprocessing text data here we use the distributed representations of words and sentences to classify the tweets. We use Long Short Term Memory (LSTM) Networks, Convolutional Neural Networks (CNNs) and Artificial Neural Networks. The first two are used on Distributed Representation of words while the latter is used on the distributed representation of sentences. This paper achieves accuracies as high as 81%. It also suggests the best and optimal ways for creating distributed representations of words for sentiment analysis, out of the available methods.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
Inducing half metallicity with alloying in Heusler Compound CoFeMnSb
Authors:
Upendra Kumar,
P. V. Sreenivasa Reddy,
Satadeep Bhattacharjee,
Seung-Cheol Lee
Abstract:
First principles studies were performed in order to find out the possibility of inducing half-metallicity in Heusler Compound CoFeMnSb, by means of alloying it with 3d-transition metal elements. Proper alloying element is selected through the calculations of formation energies. These calculations were tested with different concentrations of alloying elements at different atomic sites. Among the se…
▽ More
First principles studies were performed in order to find out the possibility of inducing half-metallicity in Heusler Compound CoFeMnSb, by means of alloying it with 3d-transition metal elements. Proper alloying element is selected through the calculations of formation energies. These calculations were tested with different concentrations of alloying elements at different atomic sites. Among the selected transition metal elements Sc and Ti are proposed to be excellent alloying elements particularly at Mn site. By using these alloying elements complete half metallic behaviour is obtained in CoFeMn0.25Sc0.75Sb, CoFeMn0.75Ti0.25Sb, CoFeMn0.625Ti0.375Sb, CoFeMn0.50Ti0.50Sb, CoFeMn0.25Ti0.75Sb and CoFeTiSb alloys. Shifting of Co-Fe d-states towards lower energy region leads to zero density of states at Fermi level for the spin minority channel. Alloying effects on the electronic structure and magnetization are discussed in details. Thermodynamical stability of these new alloys are major part of this study. The Curie temperatures of CoFeMn0.25Sc0.75Sb and CoFeMn0.75Ti0.25Sb were found to be 324.5 K and 682 K; respectively, showing good candidature for spintronics applications. For understanding the bonding nature of constituent atom of CoFeMnSb, crystal orbital Hamiltonian populations have been analysed.
△ Less
Submitted 28 March, 2019;
originally announced March 2019.
-
Effects of padding on LSTMs and CNNs
Authors:
Mahidhar Dwarampudi,
N V Subba Reddy
Abstract:
Long Short-Term Memory (LSTM) Networks and Convolutional Neural Networks (CNN) have become very common and are used in many fields as they were effective in solving many problems where the general neural networks were inefficient. They were applied to various problems mostly related to images and sequences. Since LSTMs and CNNs take inputs of the same length and dimension, input images and sequenc…
▽ More
Long Short-Term Memory (LSTM) Networks and Convolutional Neural Networks (CNN) have become very common and are used in many fields as they were effective in solving many problems where the general neural networks were inefficient. They were applied to various problems mostly related to images and sequences. Since LSTMs and CNNs take inputs of the same length and dimension, input images and sequences are padded to maximum length while testing and training. This padding can affect the way the networks function and can make a great deal when it comes to performance and accuracies. This paper studies this and suggests the best way to pad an input sequence. This paper uses a simple sentiment analysis task for this purpose. We use the same dataset on both the networks with various padding to show the difference. This paper also discusses some preprocessing techniques done on the data to ensure effective analysis of the data.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Particle motion and scattering in Finslerian Schwarzschild metric
Authors:
V. Sai sumith Reddy
Abstract:
Finsler geometry is just riemannian geometry without the quadratic restriction[1]. In this paper, we study the motion of massive(non-zero rest mass) and massless particles for schwarzschild metric in finsler spacetime in the case of two dimensional Randers-Finsler space with unit positive flag curvature instead of two dimensional riemann sphere. We provide qualitative study of potential energy of…
▽ More
Finsler geometry is just riemannian geometry without the quadratic restriction[1]. In this paper, we study the motion of massive(non-zero rest mass) and massless particles for schwarzschild metric in finsler spacetime in the case of two dimensional Randers-Finsler space with unit positive flag curvature instead of two dimensional riemann sphere. We provide qualitative study of potential energy of particles at various distances near schwarzschild black hole and the results are then compared with schwarzschild metric in riemannian geometry. We will also describe the scattering of particles near schwarzschild black hole in finsler spacetime by finding capture cross section of absorption by the black hole.
△ Less
Submitted 3 January, 2018;
originally announced January 2018.
-
Electronic topological transitions in Nb$_3$X (X = Al, Ga, In, Ge and Sn) under compression investigated by first principles calculations
Authors:
P. V. Sreenivasa Reddy,
V. Kanchana,
G. Vaitheeswaran,
P. Modak,
Ashok K. Verma
Abstract:
First principles electronic structure calculations of A-15 type Nb$_3$X (X = Al, Ga, In, Ge and Sn) compounds are performed at ambient and high pressures. Mechanical stability is confirmed in all the compounds both at ambient as well as under compression from the calculated elastic constants. We have observed four holes and two electron Fermi surfaces (FS) for all the compounds studied and FS nest…
▽ More
First principles electronic structure calculations of A-15 type Nb$_3$X (X = Al, Ga, In, Ge and Sn) compounds are performed at ambient and high pressures. Mechanical stability is confirmed in all the compounds both at ambient as well as under compression from the calculated elastic constants. We have observed four holes and two electron Fermi surfaces (FS) for all the compounds studied and FS nesting feature is observed at M and along X - $Γ$ in all the compounds. A continuous change in the FS topology is observed under pressure in all the compounds which is also reflected in the calculated elastic constants and density of states under pressure indicating the Electronic topological transitions (ETT). The ETT observed at around 21.5 GPa, 17.5 GPa in Nb$_3$Al and Nb$_3$Ga are in good agreement with the anomalies observed by the experiments.
△ Less
Submitted 7 March, 2016;
originally announced June 2016.
-
Predicted superconductivity of Ni2VAl and pressure dependence of superconductivity in Ni2NbX (X = Al, Ga and Sn) and Ni2VAl
Authors:
P V Sreenivasa Reddy,
V Kanchana,
G Vaitheeswaran,
David J Singh
Abstract:
A first-principles study of the electronic and superconducting properties of the Ni$_2$VAl Heusler compound is presented. The electron-phonon coupling constant of $λ_{ep}$ = 0.68 is obtained, which leads to a superconducting transition temperature of T$_c$ = $\sim$4 $K$ (assuming a Coulomb pseudopotential $μ^*$ = 0.13), which is a relatively high transition temperature for Ni based Heusler alloys.…
▽ More
A first-principles study of the electronic and superconducting properties of the Ni$_2$VAl Heusler compound is presented. The electron-phonon coupling constant of $λ_{ep}$ = 0.68 is obtained, which leads to a superconducting transition temperature of T$_c$ = $\sim$4 $K$ (assuming a Coulomb pseudopotential $μ^*$ = 0.13), which is a relatively high transition temperature for Ni based Heusler alloys. The electronic density of states reveals a significant hybridization between Ni-$eg$ and V-$t_{2g}$ states around the Fermi level. The Fermi surface, consisting of two electron pockets around the X-points of the Brillouin zone, exhibits nesting and leads to a Kohn anomaly of the phonon dispersion relation for the transverse acoustic mode TA2 along the (1,1,0) direction, which is furthermore found to soften with pressure. As a consequence, T$_c$ and $λ_{ep}$ vary non-monotonically under pressure. The calculations are compared to similar calculations performed for the Ni$_2$NbX (X = Al, Ga and Sn) Heusler alloys, which experimentally have been identified as superconductors. The experimental trend in T$_c$ is well reproduced, and reasonable quantitative agreement is obtained. The calculated T$_c$ of Ni$_2$VAl is larger than either calculated and observed T$_c$s of any of the Nb compounds. The Fermi surfaces of Ni$_2$NbAl and Ni$_2$NbGa consist of only a single electron pocket around the X point, however under compression second electron pocket similar to that of Ni2VAl emerges only in Ni2NbAl and the Tc increases non monotonically in all the compounds. Fermi surface nesting and associated Kohn anomalies are a common feature of all four compounds, albeit weakest in Ni$_2$VAl.
△ Less
Submitted 3 March, 2016;
originally announced March 2016.
-
Modulation of N- to C-terminal interactions enhances protein stability
Authors:
P. Mahanta,
A. Bhardwaj,
K. Kumar,
V. S. Reddy,
S. Ramakumar
Abstract:
Although, several factors have been attributed to thermostability, the stabilization strategies used by proteins are still enigmatic. Studies on recombinant xylanase which has the ubiquitous (\b{eta}/α)8 TIM (Triosephosphate isomerase) barrel fold showed that, just a single extreme N-terminus mutation (V1L) markedly enhanced the thermostability by 5 °C without loss of catalytic activity whereas an…
▽ More
Although, several factors have been attributed to thermostability, the stabilization strategies used by proteins are still enigmatic. Studies on recombinant xylanase which has the ubiquitous (\b{eta}/α)8 TIM (Triosephosphate isomerase) barrel fold showed that, just a single extreme N-terminus mutation (V1L) markedly enhanced the thermostability by 5 °C without loss of catalytic activity whereas another mutation, V1A at the same position decreased the stability by 2 °C. Based on computational analysis of their crystal structures including residue interaction network, we established a link between N- to C-terminal contacts and protein stability. We demonstrate that augmenting of N- to C-terminal non-covalent interactions is associated with the enhancement of protein stability. We propose that the strategy of mutations at the termini could be exploited with a view to modulate stability without compromising on enzymatic activity, or in general, protein function, in diverse folds where N- and C-termini are in close proximity. Finally, we discuss the implications of our results for the development of therapeutics involving proteins and for designing effective protein engineering strategies.
△ Less
Submitted 12 January, 2015;
originally announced January 2015.
-
Mining Frequent Itemsets (MFI) over Data Streams: Variable Window Size (VWS) by Context Variation Analysis (CVA) of the Streaming Transactions
Authors:
V. Sidda Reddy,
Dr. T. V. Rao,
Dr. A. Govardhan
Abstract:
The challenges with respect to mining frequent items over data streaming engaging variable window size and low memory space are addressed in this research paper. To check the varying point of context change in streaming transaction we have developed a window structure which will be in two levels and supports in fixing the window size instantly and controls the heterogeneities and assures homogenei…
▽ More
The challenges with respect to mining frequent items over data streaming engaging variable window size and low memory space are addressed in this research paper. To check the varying point of context change in streaming transaction we have developed a window structure which will be in two levels and supports in fixing the window size instantly and controls the heterogeneities and assures homogeneities among transactions added to the window. To minimize the memory utilization, computational cost and improve the process scalability, this design will allow fixing the coverage or support at window level. Here in this document, an incremental mining of frequent item-sets from the window and a context variation analysis approach are being introduced. The complete technology that we are presenting in this document is named as Mining Frequent Item-sets using Variable Window Size fixed by Context Variation Analysis (MFI-VWS-CVA). There are clear boundaries among frequent and infrequent item-sets in specific item-sets. In this design we have used window size change to represent the conceptual drift in an information stream. As it were, whenever there is a problem in setting window size effectively the item-set will be infrequent. The experiments that we have executed and documented proved that the algorithm that we have designed is much efficient than that of existing.
△ Less
Submitted 13 August, 2014;
originally announced August 2014.
-
Conditional and Unique Coloring of Graphs (revised resubmission)
Authors:
P. V. Subba Reddy,
K. V. Iyer
Abstract:
For integers $k>0$ and $0<r \leq Δ$ (where $r \leq k$), a conditional $(k,r)$-coloring of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex $v$ of degree $d(v)$ in $G$ is adjacent to vertices with at least $\min\{r, d(v)\}$ differently colored neighbors. The smallest integer $k$ for which a graph $G$ has a conditional $(k,r)$-coloring is called the $r$th order cond…
▽ More
For integers $k>0$ and $0<r \leq Δ$ (where $r \leq k$), a conditional $(k,r)$-coloring of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex $v$ of degree $d(v)$ in $G$ is adjacent to vertices with at least $\min\{r, d(v)\}$ differently colored neighbors. The smallest integer $k$ for which a graph $G$ has a conditional $(k,r)$-coloring is called the $r$th order conditional chromatic number, denoted by $χ_r(G)$. For different values of $r$ we first give results (exact values or bounds for $χ_r(G)$ depending on $r$) related to the conditional coloring of graphs. Then we obtain $χ_r(G)$ of certain parameterized graphs viz., windmill graph, line graph of windmill graph, middle graph of friendship graph, middle graph of a cycle, line graph of friendship graph, middle graph of complete $k$-partite graph, middle graph of a bipartite graph and gear graph. Finally we introduce \emph{unique conditional colorability} and give some related results.
△ Less
Submitted 30 January, 2012;
originally announced January 2012.
-
Conditional and Unique Coloring of Graphs
Authors:
P. Venkata Subba Reddy,
K. Viswanathan Iyer
Abstract:
For integers $k, r > 0$, a conditional $(k,r)$-coloring of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex $v$ of degree $d(v)$ in $G$ is adjacent to at least $\min\{r, d(v)\}$ differently colored vertices. Given $r$, the smallest integer $k$ for which $G$ has a conditional $(k,r)$-coloring is called the $r$th order conditional chromatic number $χ_r(G)$ of $G$. W…
▽ More
For integers $k, r > 0$, a conditional $(k,r)$-coloring of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex $v$ of degree $d(v)$ in $G$ is adjacent to at least $\min\{r, d(v)\}$ differently colored vertices. Given $r$, the smallest integer $k$ for which $G$ has a conditional $(k,r)$-coloring is called the $r$th order conditional chromatic number $χ_r(G)$ of $G$. We give results (exact values or bounds for $χ_r(G)$, depending on $r$) related to the conditional coloring of some graphs. We introduce \emph{unique conditional colorability} and give some related results. (Keywords. cartesian product of graphs; conditional chromatic number; gear graph; join of graphs.)
△ Less
Submitted 17 June, 2011;
originally announced June 2011.
-
Conditional coloring of some parameterized graphs
Authors:
P. Venkata Subba Reddy,
K. Viswanathan Iyer
Abstract:
For integers k>0 and r>0, a conditional (k,r)-coloring of a graph G is a proper k-coloring of the vertices of G such that every vertex v of degree d(v) in G is adjacent to vertices with at least min{r,d(v)} different colors. The smallest integer k for which a graph G has a conditional (k,r)-coloring is called the rth order conditional chromatic number, denoted by $χ_r(G)$. For different values of…
▽ More
For integers k>0 and r>0, a conditional (k,r)-coloring of a graph G is a proper k-coloring of the vertices of G such that every vertex v of degree d(v) in G is adjacent to vertices with at least min{r,d(v)} different colors. The smallest integer k for which a graph G has a conditional (k,r)-coloring is called the rth order conditional chromatic number, denoted by $χ_r(G)$. For different values of r we obtain $χ_r(G)$ of certain parameterized graphs viz., Windmill graph, line graph of Windmill graph, middle graph of Friendship graph, middle graph of a cycle, line graph of Friendship graph, middle graph of complete k-partite graph and middle graph of a bipartite graph.
△ Less
Submitted 10 December, 2010;
originally announced December 2010.
-
On conditional coloring of some graphs
Authors:
P. Venkata Subba Reddy,
K. Viswanathan Iyer
Abstract:
For integers r and k > 0(k>r),a conditional (k, r)-coloring of a graph G is a proper k-coloring of G such that every vertex v of G has at least min{r,d(v)} differently colored neighbors, where d(v) is the degree of v. In this note, for different values of r we obtain the conditional chromatic number of a grid $G(2,n) \cong P_2 \ \Box \ P_n$, $C_n^2$ and the strong product of $P_n$ and $P_m$ (n,m b…
▽ More
For integers r and k > 0(k>r),a conditional (k, r)-coloring of a graph G is a proper k-coloring of G such that every vertex v of G has at least min{r,d(v)} differently colored neighbors, where d(v) is the degree of v. In this note, for different values of r we obtain the conditional chromatic number of a grid $G(2,n) \cong P_2 \ \Box \ P_n$, $C_n^2$ and the strong product of $P_n$ and $P_m$ (n,m being positive integers). Also, for integers $n \geq 3$ and $t \geq 1$ the second order conditional chromatic number (also known as dynamic chromatic number) of the (t,n)-web graph is obtained.
△ Less
Submitted 23 November, 2010;
originally announced November 2010.
-
Algorithms for enumerating and counting D2CS of some graphs
Authors:
P. Venkata Subba Reddy,
K. Viswanathan Iyer
Abstract:
A D2CS of a graph G is a set $S \subseteq V(G)$ with $diam(G[S]) \leq 2$. We study the problem of counting and enumerating D2CS of a graph. First we give an explicit formula for the number of D2CS in a complete k-ary tree, Fibonacci tree, binary Fibonacci tree and the binomial tree. Next we give an algorithm for enumerating and counting D2CS of a graph. We then give a linear time algorithm for fin…
▽ More
A D2CS of a graph G is a set $S \subseteq V(G)$ with $diam(G[S]) \leq 2$. We study the problem of counting and enumerating D2CS of a graph. First we give an explicit formula for the number of D2CS in a complete k-ary tree, Fibonacci tree, binary Fibonacci tree and the binomial tree. Next we give an algorithm for enumerating and counting D2CS of a graph. We then give a linear time algorithm for finding all maximal D2CS in a strongly chordal graph.
△ Less
Submitted 19 November, 2010;
originally announced November 2010.
-
Fuzzy Modeling and Natural Language Processing for Panini's Sanskrit Grammar
Authors:
P. Venkata Subba Reddy
Abstract:
Indian languages have long history in World Natural languages. Panini was the first to define Grammar for Sanskrit language with about 4000 rules in fifth century. These rules contain uncertainty information. It is not possible to Computer processing of Sanskrit language with uncertain information. In this paper, fuzzy logic and fuzzy reasoning are proposed to deal to eliminate uncertain informati…
▽ More
Indian languages have long history in World Natural languages. Panini was the first to define Grammar for Sanskrit language with about 4000 rules in fifth century. These rules contain uncertainty information. It is not possible to Computer processing of Sanskrit language with uncertain information. In this paper, fuzzy logic and fuzzy reasoning are proposed to deal to eliminate uncertain information for reasoning with Sanskrit grammar. The Sanskrit language processing is also discussed in this paper.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.