-
Effect of Strain on the Band Gap of Monolayer MoS$_2$
Authors:
Raj K. Sah,
Hong Tang,
Chandra Shahi,
Adrienn Ruzsinszky,
John P. Perdew
Abstract:
Monolayer $\mathrm{MoS_2}$ under strain has many interesting properties and possible applications in technology. A recent experimental study examined the effect of strain on the bandgap of monolayer $\mathrm{MoS_2}$ on a mildly curved graphite surface, reporting that under biaxial strain with a Poisson's ratio of 0.44, the bandgap decreases at a rate of 400 meV/% strain. In this work, we performed…
▽ More
Monolayer $\mathrm{MoS_2}$ under strain has many interesting properties and possible applications in technology. A recent experimental study examined the effect of strain on the bandgap of monolayer $\mathrm{MoS_2}$ on a mildly curved graphite surface, reporting that under biaxial strain with a Poisson's ratio of 0.44, the bandgap decreases at a rate of 400 meV/% strain. In this work, we performed density functional theory (DFT) calculations for a free-standing $\mathrm{MoS_2}$ monolayer, using the generalized gradient approximation (GGA) PBE, the hybrid functional HSE06, and many-body perturbation theory with the GW approximation using PBE wavefunctions (G0W0@PBE). We found that under biaxial strain with the experimental Poisson's ratio, the bandgap decreases at rates of 63 meV/% strain (PBE), 73 meV/% strain (HSE06), and 43 meV/% strain (G0W0@PBE), which are significantly smaller than the experimental rate. We also found that PBE predicts a similarly smaller rate (90 meV/% strain) for a different Poisson's ratio of 0.25. Spin-orbit correction (SOC) has little effect on the gap or its strain dependence. Additionally, we observed a semiconductor-to-metal transition under an equal tensile biaxial strain of 10% and a transition from a direct to an indirect bandgap, consistent with previous theoretical work.
△ Less
Submitted 11 June, 2024; v1 submitted 10 June, 2024;
originally announced June 2024.
-
Adaptive Koopman Embedding for Robust Control of Complex Nonlinear Dynamical Systems
Authors:
Rajpal Singh,
Chandan Kumar Sah,
Jishnu Keshavan
Abstract:
The discovery of linear embedding is the key to the synthesis of linear control techniques for nonlinear systems. In recent years, while Koopman operator theory has become a prominent approach for learning these linear embeddings through data-driven methods, these algorithms often exhibit limitations in generalizability beyond the distribution captured by training data and are not robust to change…
▽ More
The discovery of linear embedding is the key to the synthesis of linear control techniques for nonlinear systems. In recent years, while Koopman operator theory has become a prominent approach for learning these linear embeddings through data-driven methods, these algorithms often exhibit limitations in generalizability beyond the distribution captured by training data and are not robust to changes in the nominal system dynamics induced by intrinsic or environmental factors. To overcome these limitations, this study presents an adaptive Koopman architecture capable of responding to the changes in system dynamics online. The proposed framework initially employs an autoencoder-based neural network that utilizes input-output information from the nominal system to learn the corresponding Koopman embedding offline. Subsequently, we augment this nominal Koopman architecture with a feed-forward neural network that learns to modify the nominal dynamics in response to any deviation between the predicted and observed lifted states, leading to improved generalization and robustness to a wide range of uncertainties and disturbances compared to contemporary methods. Extensive tracking control simulations, which are undertaken by integrating the proposed scheme within a Model Predictive Control framework, are used to highlight its robustness against measurement noise, disturbances, and parametric variations in system dynamics.
△ Less
Submitted 20 May, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
Depth-resolved profile of the interfacial ferromagnetism in $CaMnO_{3}/CaRuO_{3}$ superlattices
Authors:
J. R. Paudel,
A. Mansouri Tehrani,
M. Terilli,
M. Kareev,
J. Grassi,
R. K. Sah,
L. Wu,
V. N. Strocov,
C. Klewe,
P. Shafer,
J. Chakhalian,
N. A. Spaldin,
A. X. Gray
Abstract:
Emergent magnetic phenomena at interfaces represent a frontier in materials science, pivotal for advancing technologies in spintronics and magnetic storage. In this letter, we utilize a suite of advanced X-ray spectroscopic and scattering techniques to investigate emergent interfacial ferromagnetism in oxide superlattices comprised of antiferromagnetic CaMnO3 and paramagnetic CaRuO3. Our findings…
▽ More
Emergent magnetic phenomena at interfaces represent a frontier in materials science, pivotal for advancing technologies in spintronics and magnetic storage. In this letter, we utilize a suite of advanced X-ray spectroscopic and scattering techniques to investigate emergent interfacial ferromagnetism in oxide superlattices comprised of antiferromagnetic CaMnO3 and paramagnetic CaRuO3. Our findings challenge prior theoretical models by demonstrating that the ferromagnetism extends beyond the interfacial layer into multiple unit cells of CaMnO3 and exhibits an asymmetric profile. Complementary density functional calculations reveal that the interfacial ferromagnetism is driven by the double exchange mechanism, facilitated by charge transfer from Ru to Mn ions. Additionally, defect chemistry, particularly the presence of oxygen vacancies, likely plays a crucial role in modifying the magnetic moments at the interface, leading to the observed asymmetry between the top and bottom CaMnO3 interfacial magnetic layers. Our findings underscore the potential of manipulating interfacial ferromagnetism through point defect engineering.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Contextual Spelling Correction with Language Model for Low-resource Setting
Authors:
Nishant Luitel,
Nirajan Bekoju,
Anand Kumar Sah,
Subarna Shakya
Abstract:
The task of Spell Correction(SC) in low-resource languages presents a significant challenge due to the availability of only a limited corpus of data and no annotated spelling correction datasets. To tackle these challenges a small-scale word-based transformer LM is trained to provide the SC model with contextual understanding. Further, the probabilistic error rules are extracted from the corpus in…
▽ More
The task of Spell Correction(SC) in low-resource languages presents a significant challenge due to the availability of only a limited corpus of data and no annotated spelling correction datasets. To tackle these challenges a small-scale word-based transformer LM is trained to provide the SC model with contextual understanding. Further, the probabilistic error rules are extracted from the corpus in an unsupervised way to model the tendency of error happening(error model). Then the combination of LM and error model is used to develop the SC model through the well-known noisy channel framework. The effectiveness of this approach is demonstrated through experiments on the Nepali language where there is access to just an unprocessed corpus of textual data.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Can Perplexity Predict Fine-Tuning Performance? An Investigation of Tokenization Effects on Sequential Language Models for Nepali
Authors:
Nishant Luitel,
Nirajan Bekoju,
Anand Kumar Sah,
Subarna Shakya
Abstract:
Recent language models use subwording mechanisms to handle Out-of-Vocabulary(OOV) words seen during test time and, their generation capacity is generally measured using perplexity, an intrinsic metric. It is known that increasing the subword granularity results in a decrease of perplexity value. However, the study of how subwording affects the understanding capacity of language models has been ver…
▽ More
Recent language models use subwording mechanisms to handle Out-of-Vocabulary(OOV) words seen during test time and, their generation capacity is generally measured using perplexity, an intrinsic metric. It is known that increasing the subword granularity results in a decrease of perplexity value. However, the study of how subwording affects the understanding capacity of language models has been very few and only limited to a handful of languages. To reduce this gap we used 6 different tokenization schemes to pretrain relatively small language models in Nepali and used the representations learned to finetune on several downstream tasks. Although byte-level BPE algorithm has been used in recent models like GPT, RoBERTa we show that on average they are sub-optimal in comparison to algorithms such as SentencePiece in finetuning performances for Nepali. Additionally, similar recent studies have focused on the Bert-based language model. We, however, pretrain and finetune sequential transformer-based language models.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Meta-GGAs vs. Hybrid Functionals for Point Defects: The Best of Both Worlds Applied to Layered MnO$_2$, NiO$_2$ and KCoO$_2$
Authors:
Raj K. Sah,
Michael J. Zdilla,
Eric Borguet,
John P. Perdew
Abstract:
Defects in a material can significantly tune properties and enhance utility. Hybrid functionals like HSE06 are often used to describe solids with such defects. However, geometry optimization (including accounting for effects such as Jahn-Teller distortion) using hybrid functionals is challenging for the large supercells needed for defect study. The proposed r$^2$SCAN+rVV10+U+$\mathrm{U_d}$ method,…
▽ More
Defects in a material can significantly tune properties and enhance utility. Hybrid functionals like HSE06 are often used to describe solids with such defects. However, geometry optimization (including accounting for effects such as Jahn-Teller distortion) using hybrid functionals is challenging for the large supercells needed for defect study. The proposed r$^2$SCAN+rVV10+U+$\mathrm{U_d}$ method, which is computationally much cheaper and faster than hybrid functionals, can successfully describe defects in materials with the proper choice of U (for the d orbitals of the host atom) and $\mathrm{U_d}$ (for those of the defect atom), as shown here for small polaron defects in layered transition-metal oxides. We use a literature value of U or $\mathrm{U_d}$ appropriate to a given transition-metal ion and its oxidation state. The layered materials birnessite ($\mathrm{K_nMnO_2}, n=0.03 $) and $\mathrm{K_nNiO_2},n=0.03$, with one K atom intercalated between layers in a supercell, are found to have one localized occupied $\mathrm{e_g}$ polaronic state on the transition metal ion reduced by the insertion of the K atom, when the geometry is calculated as above using published U values. The expected Jahn-Teller distortion is not observed when U=$\mathrm{U_d}$=0. Layered cobalt oxide with additional potassium ions intercalated ($\mathrm{K_nCoO_2},n=1.03$) is different, due to a dramatic difference in electronic configuration of the defected Co(II) ion: A single extra K atom in the supercell leads to four localized electrons in the band gap, using standard U values, and even for U=$\mathrm{U_d}$=0.
△ Less
Submitted 11 June, 2024; v1 submitted 22 April, 2024;
originally announced April 2024.
-
Minimum-Cost Sensor Channel Selection For Wearable Computing
Authors:
Ramesh Kumar Sah,
Hassan Ghasemzadeh
Abstract:
Sensor systems are constrained by design and finding top sensor channel(s) for a given computational task is an important but hard problem. We define an optimization framework and mathematically formulate the minimum-cost channel selection problem. We then propose two novel algorithms of varying scope and complexity to solve the optimization problem. Branch and bound channel selection finds a glob…
▽ More
Sensor systems are constrained by design and finding top sensor channel(s) for a given computational task is an important but hard problem. We define an optimization framework and mathematically formulate the minimum-cost channel selection problem. We then propose two novel algorithms of varying scope and complexity to solve the optimization problem. Branch and bound channel selection finds a globally optimal channel subset and the greedy channel selection finds the best intermediate subset based on the value of a score function. Proposed channel selection algorithms are conditioned with performance as well as the cost of the channel subset. We evaluate both algorithms on two publicly available time series datasets of human activity recognition and mental task detection. Branch and bound channel selection achieved a cost saving of up to 94.8% and the greedy search reduced the cost by 89.6% while maintaining performance thresholds.
△ Less
Submitted 10 January, 2024;
originally announced February 2024.
-
Unveiling Bias in Fairness Evaluations of Large Language Models: A Critical Literature Review of Music and Movie Recommendation Systems
Authors:
Chandan Kumar Sah,
Dr. Lian Xiaoli,
Muhammad Mirajul Islam
Abstract:
The rise of generative artificial intelligence, particularly Large Language Models (LLMs), has intensified the imperative to scrutinize fairness alongside accuracy. Recent studies have begun to investigate fairness evaluations for LLMs within domains such as recommendations. Given that personalization is an intrinsic aspect of recommendation systems, its incorporation into fairness assessments is…
▽ More
The rise of generative artificial intelligence, particularly Large Language Models (LLMs), has intensified the imperative to scrutinize fairness alongside accuracy. Recent studies have begun to investigate fairness evaluations for LLMs within domains such as recommendations. Given that personalization is an intrinsic aspect of recommendation systems, its incorporation into fairness assessments is paramount. Yet, the degree to which current fairness evaluation frameworks account for personalization remains unclear. Our comprehensive literature review aims to fill this gap by examining how existing frameworks handle fairness evaluations of LLMs, with a focus on the integration of personalization factors. Despite an exhaustive collection and analysis of relevant works, we discovered that most evaluations overlook personalization, a critical facet of recommendation systems, thereby inadvertently perpetuating unfair practices. Our findings shed light on this oversight and underscore the urgent need for more nuanced fairness evaluations that acknowledge personalization. Such improvements are vital for fostering equitable development within the AI community.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Cross-modal Contrastive Learning with Asymmetric Co-attention Network for Video Moment Retrieval
Authors:
Love Panta,
Prashant Shrestha,
Brabeem Sapkota,
Amrita Bhattarai,
Suresh Manandhar,
Anand Kumar Sah
Abstract:
Video moment retrieval is a challenging task requiring fine-grained interactions between video and text modalities. Recent work in image-text pretraining has demonstrated that most existing pretrained models suffer from information asymmetry due to the difference in length between visual and textual sequences. We question whether the same problem also exists in the video-text domain with an auxili…
▽ More
Video moment retrieval is a challenging task requiring fine-grained interactions between video and text modalities. Recent work in image-text pretraining has demonstrated that most existing pretrained models suffer from information asymmetry due to the difference in length between visual and textual sequences. We question whether the same problem also exists in the video-text domain with an auxiliary need to preserve both spatial and temporal information. Thus, we evaluate a recently proposed solution involving the addition of an asymmetric co-attention network for video grounding tasks. Additionally, we incorporate momentum contrastive loss for robust, discriminative representation learning in both modalities. We note that the integration of these supplementary modules yields better performance compared to state-of-the-art models on the TACoS dataset and comparable results on ActivityNet Captions, all while utilizing significantly fewer parameters with respect to baseline.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Patterns, spin-spin correlations and competing instabilities in driven quasi-two-dimensional spin-1 Bose-Einstein condensates
Authors:
Sandra M Jose,
Komal Sah,
Rejish Nath
Abstract:
We analyze the formation of transient patterns and spin-spin correlations in quasi-two-dimensional spin-1 homogeneous Bose-Einstein condensates subjected to parametric driving of $s$-wave scattering lengths. The dynamics for an initial ferromagnetic phase is identical to that of a scalar condensate. In contrast, intriguing dynamics emerges for an initial polar state. For instance, we show that com…
▽ More
We analyze the formation of transient patterns and spin-spin correlations in quasi-two-dimensional spin-1 homogeneous Bose-Einstein condensates subjected to parametric driving of $s$-wave scattering lengths. The dynamics for an initial ferromagnetic phase is identical to that of a scalar condensate. In contrast, intriguing dynamics emerges for an initial polar state. For instance, we show that competition exists between density patterns and spin-mixing dynamics. Dominant spin-mixing dynamics lead to a gas of polar core vortices and anti-vortices of different spin textures. The density modes of the Bogoliubov spectrum govern the wavenumber selection of Faraday patterns. The spin modes determine the vortex density and the spatial dependence of spin-spin correlation functions. When the density patterns outgrow the spin-mixing dynamics, the spin-spin correlations decay exponentially with a correlation length of the order a spin healing length; otherwise, they exhibit a Bessel function dependence. Strikingly, competing instabilities within density and spin modes emerge when both scattering lengths are modulated at different frequencies and appropriate modulation amplitudes. The competing instability leads to a superposition of density patterns or correlation functions of two distinct wavelengths. Our studies reveal that fine control over the driven dynamics can be attained by tuning interaction strengths, quadratic Zeeman field, driving frequencies, and amplitudes.
△ Less
Submitted 1 August, 2023; v1 submitted 21 May, 2023;
originally announced May 2023.
-
Direct experimental evidence of tunable charge transfer at the $LaNiO_{3}/CaMnO_{3}$ ferromagnetic interface
Authors:
J. R. Paudel,
M. Terilli,
T. -C. Wu,
J. D. Grassi,
A. M. Derrico,
R. K. Sah,
M. Kareev,
C. Klewe,
P. Shafer,
A. Gloskovskii,
C. Schlueter,
V. N. Strocov,
J. Chakhalian,
A. X. Gray
Abstract:
Interfacial charge transfer in oxide heterostructures gives rise to a rich variety of electronic and magnetic phenomena. Designing heterostructures where one of the thin-film components exhibits a metal-insulator transition opens a promising avenue for controlling such phenomena both statically and dynamically. In this letter, we utilize a combination of depth-resolved soft X-ray standing-wave and…
▽ More
Interfacial charge transfer in oxide heterostructures gives rise to a rich variety of electronic and magnetic phenomena. Designing heterostructures where one of the thin-film components exhibits a metal-insulator transition opens a promising avenue for controlling such phenomena both statically and dynamically. In this letter, we utilize a combination of depth-resolved soft X-ray standing-wave and hard X-ray photoelectron spectroscopies in conjunction with polarization-dependent X-ray absorption spectroscopy to investigate the effects of the metal-insulator transition in $LaNiO_{3}$ on the electronic and magnetic states at the $LaNiO_{3}/CaMnO_{3}$ interface. We report on a direct observation of the reduced effective valence state of the interfacial Mn cations in the metallic superlattice with an above-critical $LaNiO_{3}$ thickness (6 u.c.) due to the leakage of itinerant Ni 3d $e_{g}$ electrons into the interfacial $CaMnO_{3}$ layer. Conversely, in an insulating superlattice with a below-critical $LaNiO_{3}$ thickness of 2 u.c., a homogeneous effective valence state of Mn is observed throughout the $CaMnO_{3}$ layers due to the blockage of charge transfer across the interface. The ability to switch and tune interfacial charge transfer enables precise control of the emergent ferromagnetic state at the $LaNiO_{3}/CaMnO_{3}$ interface and, thus, has far-reaching consequences on the future strategies for the design of next-generation spintronic devices.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
Ultra-thin Epitaxial MgB2 on SiC: Substrate Surface Polarity Dependent Properties
Authors:
Weibing Yang,
Leila Kasaei,
Hussein Hijazi,
Sylvie Rangan,
Yao-wen Yeh,
Raj K. Sah,
Jay R. Paudel,
Ke Chen,
Alexander X. Gray,
Philip Batson,
Leonard C. Feldman,
Xiaoxing Xi
Abstract:
High quality, ultrathin, superconducting films are required for advanced devices such as hot-electron bolometers, superconducting nanowire single photon detectors, and quantum applications. Using Hybrid Physical-Chemical Vapor Deposition (HPCVD), we show that MgB2 films as thin as 4 nm can be fabricated on the carbon terminated 6H-SiC (0001) surface with a superconducting transition temperature ab…
▽ More
High quality, ultrathin, superconducting films are required for advanced devices such as hot-electron bolometers, superconducting nanowire single photon detectors, and quantum applications. Using Hybrid Physical-Chemical Vapor Deposition (HPCVD), we show that MgB2 films as thin as 4 nm can be fabricated on the carbon terminated 6H-SiC (0001) surface with a superconducting transition temperature above 33K and a rms roughness of 0.7 nm. Remarkably, the film quality is a function of the SiC surface termination, with the C-terminated surface preferred to the Si-terminated surface. To understand the MgB2 thin film/ SiC substrate interactions giving rise to this difference, we characterized the interfacial structures using Rutherford backscattering spectroscopy/channeling, electron energy loss spectroscopy, and x-ray photoemission spectroscopy. The MgB2/SiC interface structure is complex and different for the two terminations. Both terminations incorporate substantial unintentional oxide layers influencing MgB2 growth and morphology, but with different extent, intermixing and interface chemistry. In this paper, we report measurements of transport, resistivity, and critical superconducting temperature of MgB2/SiC that are different for the two terminations, and link interfacial structure variations to observed differences. The result shows that the C face of SiC is a preferred substrate for the deposition of ultrathin superconducting MgB2 films.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Understanding density driven errors for reaction barrier heights
Authors:
Aaron D. Kaplan,
Chandra Shahi,
Pradeep Bhetwal,
Raj K. Sah,
John P. Perdew
Abstract:
Delocalization errors, such as charge-transfer and some self-interaction errors, plague computationally-efficient and otherwise-accurate density functional approximations (DFAs). Evaluating a semi-local DFA non-self-consistently on the Hartree-Fock (HF) density is often recommended as a computationally cheap remedy for delocalization errors. For sophisticated meta-GGAs like SCAN, this approach can…
▽ More
Delocalization errors, such as charge-transfer and some self-interaction errors, plague computationally-efficient and otherwise-accurate density functional approximations (DFAs). Evaluating a semi-local DFA non-self-consistently on the Hartree-Fock (HF) density is often recommended as a computationally cheap remedy for delocalization errors. For sophisticated meta-GGAs like SCAN, this approach can achieve remarkable accuracy. When this HF-DFT (or DFA@HF) significantly improves over the DFA, it is often presumed that the HF density is more accurate than the self-consistent DFA density. By applying the metrics of density-corrected density functional theory (DFT), we show that HF-DFT works for barrier heights by making a localizing charge transfer error or density over-correction, thereby producing a somewhat-reliable cancellation of density- and functional-driven errors for the energy. A quantitative analysis of the charge transfer errors in a few transition states confirms this trend. We do not have the exact functional and exact densities that are needed to evaluate the exact density- and functional-driven errors for the large BH76 database of barrier heights. Instead, we have identified and used three non-local proxy functionals (the SCAN 50% global hybrid, the range-separated hybrid LC-$ω$PBE, and SCAN-FLOSIC) and their self-consistent densities. These functionals yield reasonably accurate self-consistent barrier heights, and their self-consistent total energies are nearly piecewise linear in fractional electron number - two important points of similarity to the exact functional. We argue that density-driven errors of the energy in a self-consistent density functional calculation are second-order in the density error, and that large density-driven errors arise primarily from incorrect electron transfers over length scales larger than the diameter of an atom.
△ Less
Submitted 15 December, 2022; v1 submitted 27 July, 2022;
originally announced July 2022.
-
ADARP: A Multi Modal Dataset for Stress and Alcohol Relapse Quantification in Real Life Setting
Authors:
Ramesh Kumar Sah,
Michael McDonell,
Patricia Pendry,
Sara Parent,
Hassan Ghasemzadeh,
Michael J Cleveland
Abstract:
Stress detection and classification from wearable sensor data is an emerging area of research with significant implications for individuals' physical and mental health. In this work, we introduce a new dataset, ADARP, which contains physiological data and self-report outcomes collected in real-world ambulatory settings involving individuals diagnosed with alcohol use disorders. We describe the use…
▽ More
Stress detection and classification from wearable sensor data is an emerging area of research with significant implications for individuals' physical and mental health. In this work, we introduce a new dataset, ADARP, which contains physiological data and self-report outcomes collected in real-world ambulatory settings involving individuals diagnosed with alcohol use disorders. We describe the user study, present details of the dataset, establish the significant correlation between physiological data and self-reported outcomes, demonstrate stress classification, and make our dataset public to facilitate research.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
On Weyl-Heisenberg Frames
Authors:
Satyapriya,
Raj Kumar,
Ashok K. Sah,
Sheetal
Abstract:
In this paper we have generalized and studied the $K$-Weyl-Heisenberg frames, where $K$ is a bounded linear operator on $L^2(\mathbb{R}^d)$. We have obtained necessary and sufficient conditions for acertain system to be a $K$-Weyl-Heisenberg frame. We have also given the invariance property of these $K$-Weyl-Heisenberg frames.
In this paper we have generalized and studied the $K$-Weyl-Heisenberg frames, where $K$ is a bounded linear operator on $L^2(\mathbb{R}^d)$. We have obtained necessary and sufficient conditions for acertain system to be a $K$-Weyl-Heisenberg frame. We have also given the invariance property of these $K$-Weyl-Heisenberg frames.
△ Less
Submitted 14 November, 2021;
originally announced November 2021.
-
Stress Classification and Personalization: Getting the most out of the least
Authors:
Ramesh Kumar Sah,
Hassan Ghasemzadeh
Abstract:
Stress detection and monitoring is an active area of research with important implications for the personal, professional, and social health of an individual. Current approaches for affective state classification use traditional machine learning algorithms with features computed from multiple sensor modalities. These methods are data-intensive and rely on hand-crafted features which impede the prac…
▽ More
Stress detection and monitoring is an active area of research with important implications for the personal, professional, and social health of an individual. Current approaches for affective state classification use traditional machine learning algorithms with features computed from multiple sensor modalities. These methods are data-intensive and rely on hand-crafted features which impede the practical applicability of these sensor systems in daily lives. To overcome these shortcomings, we propose a novel Convolutional Neural Network (CNN) based stress detection and classification framework without any feature computation using data from only one sensor modality. Our method is competitive and outperforms current state-of-the-art techniques and achieves a classification accuracy of $92.85\%$ and an $f1$ score of $0.89$. Through our leave-one-subject-out analysis, we also show the importance of personalizing stress models.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Tuning band alignment at a semiconductor-crystalline oxide heterojunction via electrostatic modulation of the interfacial dipole
Authors:
M. Chrysler,
J. Gabel,
T. -L. Lee,
A. N. Penn,
B. E. Matthews,
D. M. Kepaptsoglou,
Q. M. Ramasse,
J. R. Paudel,
R. K. Sah,
J. D. Grassi,
Z. Zhu,
A. X. Gray,
J. M. LeBeau,
S. R. Spurgeon,
S. A. Chambers,
P. V. Sushko,
J. H. Ngai
Abstract:
We demonstrate that the interfacial dipole associated with bonding across the SrTiO3/Si heterojunction can be tuned through space charge, thereby enabling the band alignment to be altered via do**. Oxygen impurities in Si act as donors that create space charge by transferring electrons across the interface into SrTiO3. The space charge induces an electric field that modifies the interfacial dipo…
▽ More
We demonstrate that the interfacial dipole associated with bonding across the SrTiO3/Si heterojunction can be tuned through space charge, thereby enabling the band alignment to be altered via do**. Oxygen impurities in Si act as donors that create space charge by transferring electrons across the interface into SrTiO3. The space charge induces an electric field that modifies the interfacial dipole, thereby tuning the band alignment from type-II to type-III. The transferred charge, resulting in built-in electric fields, and change in band alignment are manifested in electrical transport and hard x-ray photoelectron spectroscopy measurements. Ab initio models reveal the interplay between polarization and band offsets. We find that band offsets can be tuned by modulating the density of space charge across the interface. Functionalizing the interface dipole to enable electrostatic altering of band alignment opens new pathways to realize novel behavior in semiconducting heterojunctions.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
On Retro Frame Associated With Measurable Space
Authors:
Raj Kumar,
Ashok K. Sah,
Satyapriya,
Sheetal
Abstract:
Frames are redundant system which are useful in the reconstruction of certain classes of spaces. Duffin and Schaeffer introduced frames for Hilbert spaces, while addressing some deep problems in non harmonic Fourier series. The dual of a frame (Hilbert) always exists and can be obtained in a natural way. In this paper we introduce the notion of $Ω_0$-type duality of retro $(Ω,μ)$-frames are given.…
▽ More
Frames are redundant system which are useful in the reconstruction of certain classes of spaces. Duffin and Schaeffer introduced frames for Hilbert spaces, while addressing some deep problems in non harmonic Fourier series. The dual of a frame (Hilbert) always exists and can be obtained in a natural way. In this paper we introduce the notion of $Ω_0$-type duality of retro $(Ω,μ)$-frames are given. Necessary and sufficient conditions for the existence of the dual of retro $(Ω,μ)$-frames are obtained. A special class of retro $(Ω,μ)$-frames which always admit a dual frame is discussed.
△ Less
Submitted 14 November, 2021; v1 submitted 17 May, 2021;
originally announced May 2021.
-
EDGF: Empirical dataset generation framework for wireless network networks
Authors:
Dinesh Kumar Sah,
Praveen Kumar Donta,
Tarachand Amgoth
Abstract:
In wireless sensor networks (WSNs), simulation practices, system models, algorithms, and protocols have been published worldwide based on the assumption of randomness. The applied statistics used for randomness in WSNs are broad in nature, e.g., random deployment, activity tracking, packet generation, etc. Even though with adequate formal and informal information provided and pledge by authors, va…
▽ More
In wireless sensor networks (WSNs), simulation practices, system models, algorithms, and protocols have been published worldwide based on the assumption of randomness. The applied statistics used for randomness in WSNs are broad in nature, e.g., random deployment, activity tracking, packet generation, etc. Even though with adequate formal and informal information provided and pledge by authors, validation of the proposal became a challenging issue. The minuscule information alteration in implementation and validation can reflect the enormous effect on eventual results. In this proposal, we show how the results are affected by the generalized assumption made on randomness. In sensor node deployment, ambiguity arises due to node error-value ($ε$), and it's upper bound in the relative position is estimated to understand the delicacy of diminutives changes. Moreover, the effect of uniformity in the traffic and contribution of scheduling position of nodes also generalized. We propose an algorithm to generate the unified dataset for the general and some specific applications system models in WSNs. The results produced by our algorithm reflects the pseudo-randomness and can efficiently regenerate through seed value for validation.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
Strain-induced anion ordering in perovskite oxyfluoride films
Authors:
Jiayi Wang,
Yong** Shin,
Jay R. Paudel,
Joseph D. Grassi,
Raj K. Sah,
Weibing Yang,
Evguenia Karapetrova,
Abdulhadi Zaidan,
Vladimir N. Strocov,
Christoph Klewe,
Padraic Shafer,
Alexander X. Gray,
James M. Rondinelli,
Steven J. May
Abstract:
Anionic ordering is a promising route to engineer physical properties in functional heteroanionic materials. A central challenge in the study of anion-ordered compounds lies in develo** robust synthetic strategies to control anion occupation and in understanding the resultant implications for electronic structure. Here, we show that epitaxial strain induces preferential occupation of F and O on…
▽ More
Anionic ordering is a promising route to engineer physical properties in functional heteroanionic materials. A central challenge in the study of anion-ordered compounds lies in develo** robust synthetic strategies to control anion occupation and in understanding the resultant implications for electronic structure. Here, we show that epitaxial strain induces preferential occupation of F and O on the anion sites in perovskite oxyfluoride SrMnO2.5-dFg films grown on different substrates. Under compressive strain, F tends to take the apical-like sites, which was revealed by F and O K-edge linearly polarized x-ray absorption spectroscopy and density functional theory calculations, resulting in an enhanced c-axis expansion. Under tensile strain, F tends to take the equatorial-like sites, enabling the longer Mn-F bonds to lie within the plane. The anion ordered oxyfluoride films exhibit a significant orbital polarization of the 3d electrons, distinct F-site dependence to their valence band density of states, and an enhanced resistivity when F occupies the apical-like anion site compared to the equatorial-like site. By demonstrating a general strategy for inducing anion-site order in oxyfluoride perovskites, this work lays the foundation for future materials design and synthesis efforts that leverage this greater degree of atomic control to realize new polar or quasi-two-dimensional materials.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs
Authors:
Sheikh Ariful Islam,
Love Kumar Sah,
Srinivas Katkoori
Abstract:
Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with varia…
▽ More
Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with variable switching probability less than a threshold are primarily chosen as a good candidate for Trojan triggering, there is no systematic fine-grained approach for earlier detection of rare nets from word-level measures of input signals. In this paper, we propose a high-level technique to estimate the nets with the rare activity of arithmetic modules from word-level information. Specifically, for a given module, we use the knowledge of internal construction of the architecture to detect "low activity" and "local regions" without resorting to expensive RTL and other low-level simulations. The presented heuristic method abstracts away from the low-level details of design and describes the rare activity of bits (modules) in a word (architecture) as a function of signal statistics. The resulting quick estimates of nets in rare regions allows a designer to develop a compact test generation algorithm without the knowledge of the bit-level activity. We determine the effect of different positions of the breakpoint in the input signal to calculate the accuracy of the approach. We conduct a set of experiments on six adder architectures and four multiplier architectures. The average error to calculate the rare nets between RTL simulation and estimated values are below 2% in all architectures.
△ Less
Submitted 29 March, 2020;
originally announced March 2020.
-
Adversarial Transferability in Wearable Sensor Systems
Authors:
Ramesh Kumar Sah,
Hassan Ghasemzadeh
Abstract:
Machine learning is used for inference and decision making in wearable sensor systems. However, recent studies have found that machine learning algorithms are easily fooled by the addition of adversarial perturbations to their inputs. What is more interesting is that adversarial examples generated for one machine learning system is also effective against other systems. This property of adversarial…
▽ More
Machine learning is used for inference and decision making in wearable sensor systems. However, recent studies have found that machine learning algorithms are easily fooled by the addition of adversarial perturbations to their inputs. What is more interesting is that adversarial examples generated for one machine learning system is also effective against other systems. This property of adversarial examples is called transferability. In this work, we take the first stride in studying adversarial transferability in wearable sensor systems from the following perspectives: 1) transferability between machine learning systems, 2) transferability across subjects, 3) transferability across sensor body locations, and 4) transferability across datasets. We found strong untargeted transferability in most cases. Targeted attacks were less successful with success scores from $0\%$ to $80\%$. The transferability of adversarial examples depends on many factors such as the inclusion of data from all subjects, sensor body position, number of samples in the dataset, type of learning algorithm, and the distribution of source and target system dataset. The transferability of adversarial examples decreases sharply when the data distribution of the source and target system becomes more distinct. We also provide guidelines for the community for designing robust sensor systems.
△ Less
Submitted 15 July, 2021; v1 submitted 17 March, 2020;
originally announced March 2020.
-
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Authors:
Sheikh Ariful Islam,
Love Kumar Sah,
Srinivas Katkoori
Abstract:
Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it…
▽ More
Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it be useful to lock out the design in a non-destructive manner after several incorrect attempts. In this paper, we address this question with a robust design lockout technique. Specifically, we perform comparisons on obfuscation logic output that reflects the condition (correct or incorrect) of the applied key without changing the system behaviour. The proposed approach, when combined with key obfuscation (logic locking) technique, increases the difficulty of reverse engineering key obfuscated RTL module. We provide security evaluation of DLockout against three common side channel attacks followed by a quantitative assessment of the resilience. We conducted a set of experiments on four datapath intensive IPs and one crypto core for three different key lengths (32-, 64-, and 128-bit) under typical design corner. On average, DLockout incurs negligible area, power, and delay overheads.
△ Less
Submitted 4 January, 2020;
originally announced January 2020.
-
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack
Authors:
Love Kumar Sah,
Sheikh Ariful Islam,
Srinivas Katkoori
Abstract:
We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT). Dedicated memory space is used to automatically record base and bound information of variables extracted during runtime. We instrument frame pointer and function(s) related registers to decode variable memory space in stack and heap. We have modified Simplescalar/PISA simulator to extract variables sp…
▽ More
We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT). Dedicated memory space is used to automatically record base and bound information of variables extracted during runtime. We instrument frame pointer and function(s) related registers to decode variable memory space in stack and heap. We have modified Simplescalar/PISA simulator to extract variables space of six (6) benchmark suites from MiBench. We have tested 290 small C programs (MIT corpus suite) having 22 different buffer overflow vulnerabilities in stack and heap. Experimental results show that our approach can detect buffer overflow attack with zero instruction overhead with the memory space requirement up to 13Kb to maintain VRT for a program with 324 variables.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Iterative Matrix Inversion Based Low Complexity Detection in Large/Massive MIMO Systems
Authors:
Vipul Gupta,
Abhay Kumar Sah,
A. K. Chaturvedi
Abstract:
Linear detectors such as zero forcing (ZF) or minimum mean square error (MMSE) are imperative for large/massive MIMO systems for both the downlink and uplink scenarios. However these linear detectors require matrix inversion which is computationally expensive for such huge systems. In this paper, we assert that calculating an exact inverse is not necessary to find the ZF/MMSE solution and an appro…
▽ More
Linear detectors such as zero forcing (ZF) or minimum mean square error (MMSE) are imperative for large/massive MIMO systems for both the downlink and uplink scenarios. However these linear detectors require matrix inversion which is computationally expensive for such huge systems. In this paper, we assert that calculating an exact inverse is not necessary to find the ZF/MMSE solution and an approximate inverse would yield a similar performance. This is possible if the quantized solution calculated using the approximate inverse is same as the one calculated using the exact inverse. We quantify the amount of approximation that can be tolerated for this to happen. Motivated by this, we propose to use the existing iterative methods for obtaining low complexity approximate inverses. We show that, after a sufficient number of iterations, the inverse using iterative methods can provide a similar error performance. In addition, we also show that the advantage of using an approximate inverse is not limited to linear detectors but can be extended to non linear detectors such as sphere decoders (SD). An approximate inverse can be used for any SD that requires matrix inversion. We prove that application of approximate inverse leads to a smaller radius, which in turn reduces the search space leading to reduction in complexity. Numerical results corroborate our claim that using approximate matrix inversion reduces decoding complexity in large/massive MIMO systems with no loss in error performance.
△ Less
Submitted 19 December, 2015; v1 submitted 8 September, 2015;
originally announced September 2015.