Skip to main content

Showing 1–50 of 188 results for author: Saha, B

.
  1. arXiv:2406.03226  [pdf

    physics.optics cond-mat.mtrl-sci

    Electron Confinement-Induced Plasmonic Breakdown in Metals

    Authors: Prasanna Das, Sourav Rudra, Dheemahi Rao, Souvik Banerjee, Ashalatha Indiradevi Kamalasanan Pillai, Magnus Garbrecht, Alexandra Boltasseva, Igor V. Bondarev, Vladimir M. Shalaev, Bivas Saha

    Abstract: Plasmon resonance in metals represents the collective oscillation of the free electron gas density and enables enhanced light-matter interactions in nanoscale dimensions. Traditionally, the classical Drude model describes the plasmonic excitation, wherein the plasma frequency exhibits no spatial dispersion. Here, we show conclusive experimental evidence of the breakdown of the plasmon resonance an… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:2405.15009  [pdf, ps, other

    math.OA quant-ph

    Spectral radii for subsets of Hilbert $C^*$-modules and spectral properties of positive maps

    Authors: B. V. Rajarama Bhat, Biswarup Saha, Prajakta Sahasrabuddhe

    Abstract: The notions of joint and outer spectral radii are extended to the setting of Hilbert $C^*$-bimodules. A Rota-Strang type characterisation is proved for the joint spectral radius. In this general setting, an approximation result for the joint spectral radius in terms of the outer spectral radius has been established. This work leads to a new proof of the Wielandt-Friedland's formula for the spect… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 35 pages

    MSC Class: 46L08; 47A10; 46L57

  3. arXiv:2405.12150  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    Bangladeshi Native Vehicle Detection in Wild

    Authors: Bipin Saha, Md. Johirul Islam, Shaikh Khaled Mostaque, Aditya Bhowmik, Tapodhir Karmakar Taton, Md. Nakib Hayat Chowdhury, Mamun Bin Ibne Reaz

    Abstract: The success of autonomous navigation relies on robust and precise vehicle recognition, hindered by the scarcity of region-specific vehicle detection datasets, impeding the development of context-aware systems. To advance terrestrial object detection research, this paper proposes a native vehicle detection dataset for the most commonly appeared vehicle classes in Bangladesh. 17 distinct vehicle cla… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 13 pages, 8 figures

  4. arXiv:2404.13593  [pdf, other

    cond-mat.str-el

    Structural modulation driven Curie temperature enhancement in Cr-doped SrRuO3

    Authors: Pooja, Bikash Saha, Nitesh Choudhary, Pradip K. Maji, A. K. Bera, S. M. Yusuf, Chanchal Sow

    Abstract: Strongly correlated system with competing ground states are often poised close to the quantum critical point. External perturbations such as pressure, strain, electric field, and chemical do** can stabilise its ground state with exotic physical properties. Cr-do** is the lone exception which enhances the Curie-temperature in one of such correlated system SrRuO$_3$. To find the origin of $T_C$… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  5. arXiv:2403.03267  [pdf, other

    cs.CR

    TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports

    Authors: Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla

    Abstract: Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured… ▽ More

    Submitted 21 March, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Under Review

  6. arXiv:2402.07443  [pdf, other

    cs.LG cs.CC cs.DS cs.IT

    The I/O Complexity of Attention, or How Optimal is Flash Attention?

    Authors: Barna Saha, Christopher Ye

    Abstract: Self-attention is at the heart of the popular Transformer architecture, yet suffers from quadratic time and memory complexity. The breakthrough FlashAttention algorithm revealed I/O complexity as the true bottleneck in scaling Transformers. Given two levels of memory hierarchy, a fast cache (e.g. GPU on-chip SRAM) and a slow memory (e.g. GPU high-bandwidth memory), the I/O complexity measures the… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: 24 pages, 3 figures

  7. arXiv:2311.18483  [pdf, ps, other

    math.DG

    Complexity in Bolza surface

    Authors: Bhola Nath Saha, Bidyut Sanki

    Abstract: A surface in the Teichmüller space, where the systole function attains its maximum, is called a maximal surface. For genus two there exists a unique maximal surface which is called the Bolza surface. In this article, we study the complexity of the set of systolic geodesics on the Bolza surface. We show that any non-systolic geodesic intersects the systolic geodesics in $2n$ points, where… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: 11 pages, 11 figures

    MSC Class: 57M15; 05C10

  8. arXiv:2311.13422  [pdf

    cs.CR cs.CY cs.IR

    A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data

    Authors: Md Jobair Hossain Faruk, Bilash Saha, Jim Basney

    Abstract: Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authentic… ▽ More

    Submitted 28 August, 2023; originally announced November 2023.

    Comments: ACM Practice & Experience in Advanced Research Computing (PEARC) 2023

  9. arXiv:2311.11864  [pdf

    cs.CR

    Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network

    Authors: Prokash Barman, Banani Saha

    Abstract: Potential capacity of processors is enhancing rapidly which leads to the increase of computational ability of the adversary. As a result, the required key size for conventional encryption techniques is growing everyday for complex unbreakable security communication systems. The Public Key Cryptography (PKC) techniques which use larger keys cannot be fitted in tiny resource constrained Wireless of… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  10. arXiv:2311.11393  [pdf

    cs.CR

    DNA Encoded Elliptic Curve Cryptography System for IoT Security

    Authors: Prokash Barmana, Banani Saha

    Abstract: In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them. There may be some security vulnerability arise within the IoT environment. Till date, IoT has not been widely accepted due to its security flaws. Hence to keep the IoT environment most robust, w… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

  11. arXiv:2311.11392  [pdf

    cs.CR

    An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication

    Authors: Prokash Barman, Banani Saha

    Abstract: Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required. Reduced operation in multiplication will increase the functional speed of ECC arithmetic. These goals can be ach… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

  12. arXiv:2309.13225  [pdf, other

    cs.DS

    Faster Approximate All Pairs Shortest Paths

    Authors: Barna Saha, Christopher Ye

    Abstract: The all pairs shortest path problem (APSP) is one of the foundational problems in computer science. For weighted dense graphs on $n$ vertices, no truly sub-cubic algorithms exist to compute APSP exactly even for undirected graphs. This is popularly known as the APSP conjecture and has played a prominent role in develo** the field of fine-grained complexity. The seminal result of Seidel uses fast… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: 81 pages

  13. arXiv:2309.11646  [pdf, other

    cs.LG

    An Evaluation of Machine Learning Approaches for Early Diagnosis of Autism Spectrum Disorder

    Authors: Rownak Ara Rasul, Promy Saha, Diponkor Bala, S M Rakib Ul Karim, Md. Ibrahim Abdullah, Bishwajit Saha

    Abstract: Autistic Spectrum Disorder (ASD) is a neurological disease characterized by difficulties with social interaction, communication, and repetitive activities. While its primary origin lies in genetics, early detection is crucial, and leveraging machine learning offers a promising avenue for a faster and more cost-effective diagnosis. This study employs diverse machine learning methods to identify cru… ▽ More

    Submitted 28 December, 2023; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: 20 pages, 12 figures, 8 tables

  14. arXiv:2307.16771  [pdf, other

    cs.DS

    On the Complexity of Algorithms with Predictions for Dynamic Graph Problems

    Authors: Monika Henzinger, Barna Saha, Martin P. Seybold, Christopher Ye

    Abstract: {\em Algorithms with predictions} incorporate machine learning predictions into algorithm design. A plethora of recent works incorporated predictions to improve on worst-case optimal bounds for online problems. In this paper, we initiate the study of complexity of dynamic data structures with predictions, including dynamic graph algorithms. Unlike in online algorithms, the main goal in dynamic dat… ▽ More

    Submitted 10 September, 2023; v1 submitted 31 July, 2023; originally announced July 2023.

    Comments: Abstract shortened to meet arXiv requirements

  15. arXiv:2307.10970  [pdf, other

    gr-qc

    Maxwell-Dirac system in cosmology

    Authors: Bijan Saha

    Abstract: Within the scope of a Bianchi type-I (BI) cosmological model we study the interacting system of spinor and electromagnetic fields and its role in the evolution of the Universe. In some earlier studies it was found that in case of a pure spinor field the presence of nontrivial non-diagonal components of EMT leads to some severe restrictions both on the spacetime geometry and/or spinor field itself,… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 9 pages, 2 figures

  16. arXiv:2307.07175  [pdf, ps, other

    cs.DS

    Approximating Edit Distance in the Fully Dynamic Model

    Authors: Tomasz Kociumaka, Anish Mukherjee, Barna Saha

    Abstract: The edit distance is a fundamental measure of sequence similarity, defined as the minimum number of character insertions, deletions, and substitutions needed to transform one string into the other. Given two strings of length at most $n$, simple dynamic programming computes their edit distance exactly in $O(n^2)$ time, which is also the best possible (up to subpolynomial factors) assuming the Stro… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Comments: Accepted to FOCS 2022

  17. arXiv:2306.11884  [pdf, other

    cs.CR cs.CY cs.DB cs.DC

    Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures

    Authors: Bilash Saha, Md Mehedi Hasan, Nafisa Anjum, Sharaban Tahora, Aiasha Siddika, Hossain Shahriar

    Abstract: Blockchain technology transformed the digital sphere by providing a transparent, secure, and decentralized platform for data security across a range of industries, including cryptocurrencies and supply chain management. Blockchain's integrity and dependability have been jeopardized by the rising number of security threats, which have attracted cybercriminals as a target. By summarizing suggested f… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: Submitted to BSTIA 2023 (Book - Blockchain and Smart-Contract Technologies for Innovative Applications)

  18. arXiv:2306.06452  [pdf, other

    cs.CY cs.AI

    BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care

    Authors: Bilash Saha, Md Saiful Islam, Abm Kamrul Riad, Sharaban Tahora, Hossain Shahriar, Sweta Sneha

    Abstract: Falls among the elderly are a major health concern, frequently resulting in serious injuries and a reduced quality of life. In this paper, we propose "BlockTheFall," a wearable device-based fall detection framework which detects falls in real time by using sensor data from wearable devices. To accurately identify patterns and detect falls, the collected sensor data is analyzed using machine learni… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: Accepted to publish in The 1st IEEE International Workshop on Digital and Public Health

  19. arXiv:2306.06448  [pdf, other

    cs.CY cs.CR

    HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps

    Authors: Bilash Saha, Sharaban Tahora, Abdul Barek, Hossain Shahriar

    Abstract: The proliferation of mobile health technology, or mHealth apps, has necessitated the paramount importance of safeguarding personal health records. These digital platforms afford individuals the ability to effortlessly monitor and manage their health-related issues, as well as store, share, and access their medical records and treatment information. As the utilization of mHealth apps becomes increa… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: Accepted to publish in The 17th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

  20. arXiv:2306.04071  [pdf, other

    cs.CY cs.CR cs.DB

    Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly

    Authors: Sharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad

    Abstract: The higher education management systems first identified and realized the trap of pitting innovation against privacy while first addressing COVID-19 social isolation challenges in 2020. In the age of data sprawl, we observe the situation has been exacerbating since then. Integrating blockchain technology has the potential to address the recent and emerging challenges in the higher education manage… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  21. arXiv:2306.03209  [pdf, other

    cs.LG

    End-to-end Differentiable Clustering with Associative Memories

    Authors: Bishwajit Saha, Dmitry Krotov, Mohammed J. Zaki, Parikshit Ram

    Abstract: Clustering is a widely used unsupervised learning technique involving an intensive discrete optimization problem. Associative Memory models or AMs are differentiable neural networks defining a recursive dynamical system, which have been integrated with various deep learning architectures. We uncover a novel connection between the AM dynamics and the inherent discrete assignment necessary in cluste… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: Accepted to ICML 2023

  22. arXiv:2305.03986  [pdf, ps, other

    math.CV

    First Derivative of Automorphic Function of Triangle Groups

    Authors: Md. Shafiul Alam, Bijan Krishna Saha, Chinmayee Podder

    Abstract: For a triangle group $G$, the $G$-automorphic function is the inverse of Schwarz triangle function. In this paper, we compute the first derivative of the $G$-automorphic function for the triangle group $G$ in terms of the Gaussian hypergeometric function.

    Submitted 15 January, 2024; v1 submitted 6 May, 2023; originally announced May 2023.

    MSC Class: 11F03; 33C05

  23. arXiv:2304.01349  [pdf, other

    q-bio.NC cs.AI cs.HC eess.SP

    Optimized EEG based mood detection with signal processing and deep neural networks for brain-computer interface

    Authors: Subhrangshu Adhikary, Kushal Jain, Biswajit Saha, Deepraj Chowdhury

    Abstract: Electroencephalogram (EEG) is a very promising and widely implemented procedure to study brain signals and activities by amplifying and measuring the post-synaptical potential arising from electrical impulses produced by neurons and detected by specialized electrodes attached to specific points in the scalp. It can be studied for detecting brain abnormalities, headaches, and other conditions. Howe… ▽ More

    Submitted 30 March, 2023; originally announced April 2023.

    Journal ref: Biomedical Physics & Engineering Express, Year 2023, Volume 9, Number 3

  24. Two-dimensional short-range spin-spin correlations in the layered spin-3/2 maple leaf lattice antiferromagnet Na2Mn3O7 with crystal stacking disorder

    Authors: B. Saha, A. K. Bera, S. M. Yusuf, A. Hoser

    Abstract: We report the nature of magnetic structure, microscopic spin-spin correlations and their dependence on the underlying crystal structure of the geometrically frustrated layered spin-3/2 maple-leaf-lattice (MLL) antiferromagnet Na2Mn3O7 by a comprehensive neutron diffraction study. Crystal structural studies by x-ray and neutron diffractions reveal that the MLL layers (constituted by Mn3O72- units)… ▽ More

    Submitted 18 February, 2023; originally announced February 2023.

    Comments: 26 pages, 10 figures, 1 table

    Journal ref: Physical Review B 107, 064419 (2023)

  25. arXiv:2302.04229  [pdf, ps, other

    cs.DS

    Weighted Edit Distance Computation: Strings, Trees and Dyck

    Authors: Debarati Das, Jacob Gilbert, MohammadTaghi Hajiaghayi, Tomasz Kociumaka, Barna Saha

    Abstract: Given two strings of length $n$ over alphabet $Σ$, and an upper bound $k$ on their edit distance, the algorithm of Myers (Algorithmica'86) and Landau and Vishkin (JCSS'88) computes the unweighted string edit distance in $\mathcal{O}(n+k^2)$ time. Till date, it remains the fastest algorithm for exact edit distance computation, and it is optimal under the Strong Exponential Hypothesis (STOC'15). Ove… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

  26. arXiv:2301.05840  [pdf, ps, other

    math.GT

    Filling with separating curves

    Authors: Bhola Nath Saha, Bidyut Sanki

    Abstract: A pair $(α, β)$ of simple closed curves on a closed and orientable surface $S_g$ of genus $g$ is called a filling pair if the complement is a disjoint union of topological disks. If $α$ is separating, then we call it as separating filling pair. In this article, we find a necessary and sufficient condition for the existence of a separating filling pair on $S_g$ with exactly two complementary disks.… ▽ More

    Submitted 13 January, 2024; v1 submitted 14 January, 2023; originally announced January 2023.

    Comments: 30 Pages, 16 Figures, Final version, To appear in 'Journal of Topology and Analysis`

    MSC Class: 57M15; 05C10

  27. arXiv:2211.14750  [pdf, other

    cs.CV

    Conditioning Covert Geo-Location (CGL) Detection on Semantic Class Information

    Authors: Binoy Saha, Sukhendu Das

    Abstract: The primary goal of artificial intelligence is to mimic humans. Therefore, to advance toward this goal, the AI community attempts to imitate qualities/skills possessed by humans and imbibes them into machines with the help of datasets/tasks. Earlier, many tasks which require knowledge about the objects present in an image are satisfactorily solved by vision models. Recently, with the aim to incorp… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

  28. arXiv:2211.12496  [pdf, other

    cs.DS

    An Algorithmic Bridge Between Hamming and Levenshtein Distances

    Authors: Elazar Goldenberg, Tomasz Kociumaka, Robert Krauthgamer, Barna Saha

    Abstract: The edit distance between strings classically assigns unit cost to every character insertion, deletion, and substitution, whereas the Hamming distance only allows substitutions. In many real-life scenarios, insertions and deletions (abbreviated indels) appear frequently but significantly less so than substitutions. To model this, we consider substitutions being cheaper than indels, with cost… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: The full version of a paper accepted to ITCS 2023; abstract shortened to meet arXiv requirements

    ACM Class: F.2.2

  29. Robust Quantum Circuit for Clique Problem with Intermediate Qudits

    Authors: Arpita Sanyal, Amit Saha, Banani Saha, Amlan Chakrabarti

    Abstract: Clique problem has a wide range of applications due to its pattern matching ability. There are various formulation of clique problem like $k$-clique problem, maximum clique problem, etc. The $k$-Clique problem, determines whether an arbitrary network has a clique or not whereas maximum clique problem finds the largest clique in a graph. It is already exhibited in the literature that the $k$-clique… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 19 pages, 22 figures

    Journal ref: Nano Communication Networks Volume 37 (2023)

  30. arXiv:2209.07524  [pdf, ps, other

    cs.DS

    $\tilde{O}(n+\mathrm{poly}(k))$-time Algorithm for Bounded Tree Edit Distance

    Authors: Debarati Das, Jacob Gilbert, MohammadTaghi Hajiaghayi, Tomasz Kociumaka, Barna Saha, Hamed Saleh

    Abstract: Computing the edit distance of two strings is one of the most basic problems in computer science and combinatorial optimization. Tree edit distance is a natural generalization of edit distance in which the task is to compute a measure of dissimilarity between two (unweighted) rooted trees with node labels. Perhaps the most notable recent application of tree edit distance is in NoSQL big databases,… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Full version of a paper accepted to FOCS 2022

  31. arXiv:2208.08683  [pdf

    physics.app-ph

    Numerical modeling of CuSbSe2-based dual-heterojunction thin film solar cell with CGS back surface layer

    Authors: Bipin Saha, Bipanko Kumar Mondal, Shaikh Khaled Mostaque, Mainul Hossain, Jaker Hossain

    Abstract: Ternary chalcostibite copper antimony selenide (CuSbSe2) is a promising absorber material for next generation thin film solar cells due to the non-toxic nature, earth-abundance, low-cost fabrication technique, optimum bandgap and high optical absorption coefficient of CuSbSe2. Conventional single heterojunction CuSbSe2 solar cells suffer from high recombination rate at the interfaces and the prese… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: 21 pages, 7 figures, 2 tables

  32. arXiv:2207.03555  [pdf

    cs.HC cs.CR cs.DC

    Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework

    Authors: Jiyoun Randolph, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib, Bilash Saha

    Abstract: In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcom… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Report number: IEEE COMPSAC 2022 -- Computers, Software & Applications

  33. arXiv:2206.11303  [pdf, other

    cs.SI cs.DM cs.IT cs.LG

    Community Recovery in the Geometric Block Model

    Authors: Sainyam Galhotra, Arya Mazumdar, Soumyabrata Pal, Barna Saha

    Abstract: To capture the inherent geometric features of many community detection problems, we propose to use a new random graph model of communities that we call a Geometric Block Model. The geometric block model builds on the random geometric graphs (Gilbert, 1961), one of the basic models of random graphs for spatial networks, in the same way that the well-studied stochastic block model builds on the Erdő… ▽ More

    Submitted 17 November, 2023; v1 submitted 22 June, 2022; originally announced June 2022.

    Comments: 53 pages, 18 figures. Accepted at the Journal of Machine Learning Research (JMLR). Shorter versions accepted in AAAI 2018 (see arXiv:1709.05510) and RANDOM 2019 (see arXiv:1804.05013). arXiv admin note: text overlap with arXiv:1804.05013

    Journal ref: Journal of Machine Learning Research (JMLR) 2023

  34. Time-dependent Spinor field in a static cylindrically-symmetric space-time

    Authors: Bijan Saha

    Abstract: Within the scope of a static cylindrically symmetric space-time we study the behavior of a nonlinear spinor field that depends on time and radial coordinates. It is found that the presence of nontrivial non-diagonal components of the energy-momentum tensor (EMT) imposes some restriction on both the metric functions and the spinor field. While for the time independent spinor field there occur three… ▽ More

    Submitted 20 September, 2022; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: 9 pages, 8 figures

    Journal ref: Eur. Phys. J. Plus (2022) 137:1063

  35. arXiv:2204.02799  [pdf

    cs.ET physics.app-ph

    Scandium Nitride as a Gateway III-Nitride Semiconductor for Optoelectronic Artificial Synaptic Devices

    Authors: Dheemahi Rao, Bivas Saha

    Abstract: Traditional computation based on von Neumann architecture is limited by the time and energy consumption due to data transfer between the storage and the processing units. The von Neumann architecture is also inefficient in solving unstructured, probabilistic, and real-time problems. To address these challenges, a new brain-inspired neuromorphic computational architecture is required. Due to absenc… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

    Comments: 14 pages, 5 figures. It is currently under review

    Journal ref: Adv. Electron. Mater. 2022, 2200975

  36. A preparative mass spectrometer to deposit intact large native protein complexes

    Authors: Paul Fremdling, Tim K. Esser, Bodhisattwa Saha, Alexander Makarov, Kyle Fort, Maria Reinhardt-Szyba, Joseph Gault, Stephan Rauschenbach

    Abstract: Electrospray ion-beam deposition (ES-IBD) is a versatile tool to study structure and reactivity of molecules from small metal clusters to large protein assemblies. It brings molecules gently into the gas phase where they can be accurately manipulated and purified, followed by controlled deposition onto various substrates. In combination with imaging techniques, direct structural information of wel… ▽ More

    Submitted 21 March, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

  37. arXiv:2202.02567  [pdf, other

    cs.CV cs.LG cs.RO

    Catch Me if You Can: A Novel Task for Detection of Covert Geo-Locations (CGL)

    Authors: Binoy Saha, Sukhendu Das

    Abstract: Most visual scene understanding tasks in the field of computer vision involve identification of the objects present in the scene. Image regions like hideouts, turns, & other obscured regions of the scene also contain crucial information, for specific surveillance tasks. Task proposed in this paper involves the design of an intelligent visual aid for identification of such locations in an image, wh… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

    Comments: This is an updated version of our accepted paper in: fourth workshop on Computer Vision Applications (WCVA), 12th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 20-21), IIT Jodhpur, India, December 2021. [work sponsored under IMPRINT grant]

  38. Secondary Phase Limited Metal-Insulator Phase Transition in Chromium Nitride Thin Films

    Authors: Bidesh Biswas, Sourjyadeep Chakraborty, Anjana Joseph, Shashidhara Acharya, Ashalatha Indiradevi Kamalasanan Pillai, Chandrabhas Narayana, Vijay Bhatia, Magnus Garbrecht, Bivas Saha

    Abstract: Chromium nitride (CrN) is a well-known hard coating material that has found applications in abrasion and wear-resistant cutting tools, bearings, and tribology applications due to its high hardness, high-temperature stability, and corrosion-resistant properties. In recent years, CrN has also attracted significant interest due to its high thermoelectric power factor, and for its unique and intriguin… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Journal ref: Acta Mater. 227 (2022) 117737

  39. arXiv:2112.05866  [pdf, other

    cs.DS

    Improved Approximation Algorithms for Dyck Edit Distance and RNA Folding

    Authors: Debarati Das, Tomasz Kociumaka, Barna Saha

    Abstract: The Dyck language, which consists of well-balanced sequences of parentheses, is one of the most fundamental context-free languages. The Dyck edit distance quantifies the number of edits (character insertions, deletions, and substitutions) required to make a given parenthesis sequence well-balanced. RNA Folding involves a similar problem, where a closing parenthesis can match an opening parenthesis… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  40. arXiv:2112.05836  [pdf, other

    cs.DS

    How Compression and Approximation Affect Efficiency in String Distance Measures

    Authors: Arun Ganesh, Tomasz Kociumaka, Andrea Lincoln, Barna Saha

    Abstract: Real-world data often comes in compressed form. Analyzing compressed data directly (without decompressing it) can save space and time by orders of magnitude. In this work, we focus on fundamental sequence comparison problems and try to quantify the gain in time complexity when the underlying data is highly compressible. We consider grammar compression, which unifies many practically relevant compr… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: accepted to SODA 2022

  41. arXiv:2111.12706  [pdf, ps, other

    cs.DS

    Gap Edit Distance via Non-Adaptive Queries: Simple and Optimal

    Authors: Elazar Goldenberg, Tomasz Kociumaka, Robert Krauthgamer, Barna Saha

    Abstract: We study the problem of approximating edit distance in sublinear time. This is formalized as the $(k,k^c)$-Gap Edit Distance problem, where the input is a pair of strings $X,Y$ and parameters $k,c>1$, and the goal is to return YES if $ED(X,Y)\leq k$, NO if $ED(X,Y)> k^c$, and an arbitrary answer when $k < ED(X,Y) \le k^c$. Recent years have witnessed significant interest in designing sublinear-tim… ▽ More

    Submitted 2 October, 2022; v1 submitted 24 November, 2021; originally announced November 2021.

    Comments: Accepted to FOCS 2022

  42. arXiv:2110.12402  [pdf, other

    cs.DS

    Approximating LCS and Alignment Distance over Multiple Sequences

    Authors: Debarati Das, Barna Saha

    Abstract: We study the problem of aligning multiple sequences with the goal of finding an alignment that either maximizes the number of aligned symbols (the longest common subsequence (LCS)), or minimizes the number of unaligned symbols (the alignment distance (AD)). Multiple sequence alignment is a well-studied problem in bioinformatics and is used to identify regions of similarity among DNA, RNA, or prote… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

    ACM Class: F.2.0

  43. arXiv:2110.04008  [pdf, ps, other

    cond-mat.mtrl-sci

    Synthesis and study of ScN thin films

    Authors: Susmita Chowdhury, Rachana Gupta, Parasmani Rajput, Akhil Tayal, Dheemahi Rao, Reddy Sekhar, Shashi Prakash, Ramaseshan Rajagopalan, S. N. Jha, Bivas Saha, Mukul Gupta

    Abstract: To contemplate an alternative approach for the minimization of diffusion at high temperature depositions, present findings impart viability of room-temperature deposited reactively sputtered ScN thin film samples. The adopted room temperature route endows precise control over the $R_{N_2}$ flow for a methodical structural phase evolution from Sc$\to$ScN and probe the correlated physical aspects of… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: 13 pages, 6 figures

  44. arXiv:2108.09115  [pdf, ps, other

    cs.DS cs.CC

    Does Preprocessing help in Fast Sequence Comparisons?

    Authors: Elazar Goldenberg, Aviad Rubinstein, Barna Saha

    Abstract: We study edit distance computation with preprocessing: the preprocessing algorithm acts on each string separately, and then the query algorithm takes as input the two preprocessed strings. This model is inspired by scenarios where we would like to compute edit distance between many pairs in the same pool of strings. Our results include: Permutation-LCS: If the LCS between two permutations has… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

    ACM Class: F.2.2

  45. arXiv:2108.07534  [pdf, ps, other

    q-bio.PE

    Recognizing and prevention of probable regime shift in density regulated and Allee type stochastic harvesting model with application to herring conservation

    Authors: Anurag Sau, Sabyasachi Bhattacharya, Bapi Saha

    Abstract: An ecological system with multiple stable equilibria is prone to undergo catastrophic change or regime shift from one steady-state to another. It should be noted that, if one of the steady states is an extinction state, the catastrophic change may lead to extinction. A suitable manual measure may control the prevention of catastrophic changes of different species from one equilibrium to another. W… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  46. arXiv:2106.12167  [pdf

    cond-mat.mtrl-sci

    Mechanism of Na-ionic conduction in the high efficient layered battery material Na2Mn3O7

    Authors: Bikash Saha, A. K. Bera, S. M. Yusuf

    Abstract: The ionic conduction properties of the technologically important two-dimensional (2D) layered battery material Na2Mn3O7, with exceptional small-voltage hysteresis between charge and discharge curves, have been investigated as a function of temperature and frequency by an impedance spectroscopy. The detailed analyses of the impedance data in the form of dc-conductivity, ac-conductivity, electrical… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    Comments: 33 pages, 14 figures

    Journal ref: ACS: Applied Energy Materials (2021)

  47. arXiv:2105.05782  [pdf, other

    cs.DS cs.DB stat.ML

    How to Design Robust Algorithms using Noisy Comparison Oracle

    Authors: Raghavendra Addanki, Sainyam Galhotra, Barna Saha

    Abstract: Metric based comparison operations such as finding maximum, nearest and farthest neighbor are fundamental to studying various clustering techniques such as $k$-center clustering and agglomerative hierarchical clustering. These techniques crucially rely on accurate estimation of pairwise distance between records. However, computing exact features of the records, and their pairwise distances is ofte… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: PVLDB 2021

  48. Removal of instabilities of the higher derivative theories in the light of antilinearity

    Authors: Biswajit Paul, Himangshu Dhar, Biswajit Saha

    Abstract: Theories with higher derivatives involve linear instabilities in the Hamiltonian commonly known as Ostrogradski ghosts and can be viewed as a very serious problem during quantization. To cure {this} , we have considered the properties of antilinearty that can be found inherently in the non-Hermitian Hamiltonians. Owing to the existence of antilinearity, we can construct an operator, called the… ▽ More

    Submitted 7 September, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: 12 pages, Latex, updated version

    Journal ref: Eur. Phys. J. C (2021) 81: 770

  49. arXiv:2012.03072  [pdf, ps, other

    q-bio.PE

    Chemical contamination mediated regime shifts in planktonic systems

    Authors: Swarnendu Banerjee, Bapi Saha, Max Rietkerk, Mara Baudena, Joydev Chattopadhyay

    Abstract: Abrupt transitions leading to algal blooms are quite well known in aquatic ecosystems and have important implications for the environment. These ecosystem shifts have been largely attributed to nutrient dynamics and food web interactions. Contamination with heavy metals such as copper can modulate such ecological interactions which in turn may impact ecosystem functioning. Motivated by this, we ex… ▽ More

    Submitted 5 December, 2020; originally announced December 2020.

    Comments: 23 pages, 10 figures

  50. arXiv:2010.15170  [pdf, ps, other

    math.NT

    Semi-abelian analogues of Schanuel Conjecture and applications

    Authors: Cristiana Bertolin, Patrice Philippon, Biswajyoti Saha, Ekata Saha

    Abstract: In this article we study Semi-abelian analogues of Schanuel conjecture. As showed by the first author, Schanuel Conjecture is equivalent to the Generalized Period Conjecture applied to 1-motives without abelian part. Extending her methods, the second, the third and the fourth authors have introduced the Abelian analogue of Schanuel Conjecture as the Generalized Period Conjecture applied to 1-motiv… ▽ More

    Submitted 15 November, 2022; v1 submitted 28 October, 2020; originally announced October 2020.

    Journal ref: J. Algebra 596 (2022), pp. 250--288