-
Electron Confinement-Induced Plasmonic Breakdown in Metals
Authors:
Prasanna Das,
Sourav Rudra,
Dheemahi Rao,
Souvik Banerjee,
Ashalatha Indiradevi Kamalasanan Pillai,
Magnus Garbrecht,
Alexandra Boltasseva,
Igor V. Bondarev,
Vladimir M. Shalaev,
Bivas Saha
Abstract:
Plasmon resonance in metals represents the collective oscillation of the free electron gas density and enables enhanced light-matter interactions in nanoscale dimensions. Traditionally, the classical Drude model describes the plasmonic excitation, wherein the plasma frequency exhibits no spatial dispersion. Here, we show conclusive experimental evidence of the breakdown of the plasmon resonance an…
▽ More
Plasmon resonance in metals represents the collective oscillation of the free electron gas density and enables enhanced light-matter interactions in nanoscale dimensions. Traditionally, the classical Drude model describes the plasmonic excitation, wherein the plasma frequency exhibits no spatial dispersion. Here, we show conclusive experimental evidence of the breakdown of the plasmon resonance and a consequent photonic metal-insulator transition in an ultrathin archetypal refractory plasmonic material, hafnium nitride (HfN). Epitaxial HfN thick films exhibit a low-loss and high-quality Drude-like plasmon resonance in the visible spectral range. However, as the film thickness is reduced to nanoscale dimensions, the Coulomb interaction among electrons increases due to the electron confinement, leading to the spatial dispersion of the plasma frequency. Importantly, with the further decrease in thickness, electrons lose their ability to shield the incident electric field, turning the medium into a dielectric. The breakdown of the plasmon resonance in epitaxial ultrathin metals could be useful for fundamental physics studies in transdimensional regimes and novel photonic device applications.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Spectral radii for subsets of Hilbert $C^*$-modules and spectral properties of positive maps
Authors:
B. V. Rajarama Bhat,
Biswarup Saha,
Prajakta Sahasrabuddhe
Abstract:
The notions of joint and outer spectral radii are extended to the setting of Hilbert $C^*$-bimodules. A Rota-Strang type characterisation is proved for the joint spectral radius. In this general setting, an approximation result for the joint spectral radius in terms of the outer spectral radius has been established.
This work leads to a new proof of the Wielandt-Friedland's formula for the spect…
▽ More
The notions of joint and outer spectral radii are extended to the setting of Hilbert $C^*$-bimodules. A Rota-Strang type characterisation is proved for the joint spectral radius. In this general setting, an approximation result for the joint spectral radius in terms of the outer spectral radius has been established.
This work leads to a new proof of the Wielandt-Friedland's formula for the spectral radius of positive maps. Following an idea of J. E. Pascoe, a positive map called the maximal part has been associated to any positive map with non-zero spectral radius, on finite dimensional $C^*$-algebras. This provides a constructive treatment of the Perron-Frobenius theorem. It is seen that the maximal part of a completely positive map has a very simple structure and it is irreducible if and only if the original map is irreducible.
It is observed that algebras generated by tuples of matrices can be determined and their dimensions can be computed by realizing them as linear span of Choi-Kraus coefficients of some easily computable completely positive maps.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Bangladeshi Native Vehicle Detection in Wild
Authors:
Bipin Saha,
Md. Johirul Islam,
Shaikh Khaled Mostaque,
Aditya Bhowmik,
Tapodhir Karmakar Taton,
Md. Nakib Hayat Chowdhury,
Mamun Bin Ibne Reaz
Abstract:
The success of autonomous navigation relies on robust and precise vehicle recognition, hindered by the scarcity of region-specific vehicle detection datasets, impeding the development of context-aware systems. To advance terrestrial object detection research, this paper proposes a native vehicle detection dataset for the most commonly appeared vehicle classes in Bangladesh. 17 distinct vehicle cla…
▽ More
The success of autonomous navigation relies on robust and precise vehicle recognition, hindered by the scarcity of region-specific vehicle detection datasets, impeding the development of context-aware systems. To advance terrestrial object detection research, this paper proposes a native vehicle detection dataset for the most commonly appeared vehicle classes in Bangladesh. 17 distinct vehicle classes have been taken into account, with fully annotated 81542 instances of 17326 images. Each image width is set to at least 1280px. The dataset's average vehicle bounding box-to-image ratio is 4.7036. This Bangladesh Native Vehicle Dataset (BNVD) has accounted for several geographical, illumination, variety of vehicle sizes, and orientations to be more robust on surprised scenarios. In the context of examining the BNVD dataset, this work provides a thorough assessment with four successive You Only Look Once (YOLO) models, namely YOLO v5, v6, v7, and v8. These dataset's effectiveness is methodically evaluated and contrasted with other vehicle datasets already in use. The BNVD dataset exhibits mean average precision(mAP) at 50% intersection over union (IoU) is 0.848 corresponding precision and recall values of 0.841 and 0.774. The research findings indicate a mAP of 0.643 at an IoU range of 0.5 to 0.95. The experiments show that the BNVD dataset serves as a reliable representation of vehicle distribution and presents considerable complexities.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Structural modulation driven Curie temperature enhancement in Cr-doped SrRuO3
Authors:
Pooja,
Bikash Saha,
Nitesh Choudhary,
Pradip K. Maji,
A. K. Bera,
S. M. Yusuf,
Chanchal Sow
Abstract:
Strongly correlated system with competing ground states are often poised close to the quantum critical point. External perturbations such as pressure, strain, electric field, and chemical do** can stabilise its ground state with exotic physical properties. Cr-do** is the lone exception which enhances the Curie-temperature in one of such correlated system SrRuO$_3$. To find the origin of $T_C$…
▽ More
Strongly correlated system with competing ground states are often poised close to the quantum critical point. External perturbations such as pressure, strain, electric field, and chemical do** can stabilise its ground state with exotic physical properties. Cr-do** is the lone exception which enhances the Curie-temperature in one of such correlated system SrRuO$_3$. To find the origin of $T_C$ enhancement, we investigate temperature-dependent structure, spectroscopic, magnetic and magnetotransport properties in SrRu$_{1-x}$Cr$_x$O$_3$. Cr-do** squeezes the unit cell volume which effectively enhances the stretching octahedral distortion by nearly five times than pure SrRuO$_3$. The Curie temperature increment by $\sim$ 22 K for x = 0.15 is found to be intertwined with the structural-modulation. Temperature-dependent Neutron diffraction analysis indicate that the unit cell volume minima coincide exactly with the enhanced ferromagnetic ordering ($\sim$ 190 K). Further analysis reveals that the effect of Cr-do** not only freezes the octahedral tilt below 100 K but also suppresses the complex magnetism responsible for exchange bias and topological hall effect in SrRuO$_3$. The spectroscopic measurements find a reduction of itinerancy of d-electrons with Cr-do**. The magnetotransport measurements portray an evolution from itinerant to localised ferromagnetism.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Authors:
Nanda Rani,
Bikash Saha,
Vikas Maurya,
Sandeep Kumar Shukla
Abstract:
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured…
▽ More
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured format. This research introduces a methodology named TTPXHunter for the automated extraction of threat intelligence in terms of Tactics, Techniques, and Procedures (TTPs) from finished cyber threat reports. It leverages cyber domain-specific state-of-the-art natural language processing (NLP) to augment sentences for minority class TTPs and refine pinpointing the TTPs in threat analysis reports significantly. The knowledge of threat intelligence in terms of TTPs is essential for comprehensively understanding cyber threats and enhancing detection and mitigation strategies. We create two datasets: an augmented sentence-TTP dataset of 39,296 samples and a 149 real-world cyber threat intelligence report-to-TTP dataset. Further, we evaluate TTPXHunter on the augmented sentence dataset and the cyber threat reports. The TTPXHunter achieves the highest performance of 92.42% f1-score on the augmented dataset, and it also outperforms existing state-of-the-art solutions in TTP extraction by achieving an f1-score of 97.09% when evaluated over the report dataset. TTPXHunter significantly improves cybersecurity threat intelligence by offering quick, actionable insights into attacker behaviors. This advancement automates threat intelligence analysis, providing a crucial tool for cybersecurity professionals fighting cyber threats.
△ Less
Submitted 21 March, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
The I/O Complexity of Attention, or How Optimal is Flash Attention?
Authors:
Barna Saha,
Christopher Ye
Abstract:
Self-attention is at the heart of the popular Transformer architecture, yet suffers from quadratic time and memory complexity. The breakthrough FlashAttention algorithm revealed I/O complexity as the true bottleneck in scaling Transformers. Given two levels of memory hierarchy, a fast cache (e.g. GPU on-chip SRAM) and a slow memory (e.g. GPU high-bandwidth memory), the I/O complexity measures the…
▽ More
Self-attention is at the heart of the popular Transformer architecture, yet suffers from quadratic time and memory complexity. The breakthrough FlashAttention algorithm revealed I/O complexity as the true bottleneck in scaling Transformers. Given two levels of memory hierarchy, a fast cache (e.g. GPU on-chip SRAM) and a slow memory (e.g. GPU high-bandwidth memory), the I/O complexity measures the number of accesses to memory. FlashAttention computes attention using $\frac{N^2d^2}{M}$ I/O operations where $N$ is the dimension of the attention matrix, $d$ the head-dimension and $M$ the cache size. However, is this I/O complexity optimal? The known lower bound only rules out an I/O complexity of $o(Nd)$ when $M=Θ(Nd)$, since the output that needs to be written to slow memory is $Ω(Nd)$. This leads to the main question of our work: Is FlashAttention I/O optimal for all values of $M$?
We resolve the above question in its full generality by showing an I/O complexity lower bound that matches the upper bound provided by FlashAttention for any values of $M \geq d^2$ within any constant factors. Further, we give a better algorithm with lower I/O complexity for $M < d^2$, and show that it is optimal as well. Moreover, our lower bounds do not rely on using combinatorial matrix multiplication for computing the attention matrix. We show even if one uses fast matrix multiplication, the above I/O complexity bounds cannot be improved. We do so by introducing a new communication complexity protocol for matrix compression, and connecting communication complexity to I/O complexity. To the best of our knowledge, this is the first work to establish a connection between communication complexity and I/O complexity, and we believe this connection could be of independent interest and will find many more applications in proving I/O complexity lower bounds in the future.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Complexity in Bolza surface
Authors:
Bhola Nath Saha,
Bidyut Sanki
Abstract:
A surface in the Teichmüller space, where the systole function attains its maximum, is called a maximal surface. For genus two there exists a unique maximal surface which is called the Bolza surface. In this article, we study the complexity of the set of systolic geodesics on the Bolza surface. We show that any non-systolic geodesic intersects the systolic geodesics in $2n$ points, where…
▽ More
A surface in the Teichmüller space, where the systole function attains its maximum, is called a maximal surface. For genus two there exists a unique maximal surface which is called the Bolza surface. In this article, we study the complexity of the set of systolic geodesics on the Bolza surface. We show that any non-systolic geodesic intersects the systolic geodesics in $2n$ points, where $n\geq 5$. Furthermore, we show that there are $12$ second systolic geodesics on the Bolza surface and they form a triangulation of the surface.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data
Authors:
Md Jobair Hossain Faruk,
Bilash Saha,
Jim Basney
Abstract:
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authentic…
▽ More
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authenticating and securing access to scientific data: SciTokens, Verifiable Credentials, and Smart Contracts. The aim of this study is to investigate the strengths and weaknesses of each approach from trust, revocation, privacy, and security perspectives. We examine the technical features and privacy and security mechanisms of each technology and provide a comparative synthesis with the proposed model. Through our analysis, we demonstrate that each technology offers unique advantages and limitations, and the integration of these technologies can lead to more secure and efficient solutions for authentication and access to scientific data.
△ Less
Submitted 28 August, 2023;
originally announced November 2023.
-
Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network
Authors:
Prokash Barman,
Banani Saha
Abstract:
Potential capacity of processors is enhancing rapidly which leads to the increase of computational ability of the adversary. As a result, the required key size for conventional encryption techniques is growing everyday for complex unbreakable security communication systems. The Public Key Cryptography (PKC) techniques which use larger keys cannot be fitted in tiny resource constrained Wireless of…
▽ More
Potential capacity of processors is enhancing rapidly which leads to the increase of computational ability of the adversary. As a result, the required key size for conventional encryption techniques is growing everyday for complex unbreakable security communication systems. The Public Key Cryptography (PKC) techniques which use larger keys cannot be fitted in tiny resource constrained Wireless of Things (WoT) devices. Some Symmetric Key Cryptosystems (SKC) use smaller keys, which can be fitted in the tiny devices. But in large networks where the number of nodes is in the order of 103, the memory constraint does not allow the system to do so. The existing secure data communication in insecure medium uses various conventional encryption methods like Public Key Cryptography (PKC) and Symmetric Key Cryptosystems (SKC). Generally, modern encryption methods need huge processing power, memory and time. Also in some cases, Key Pre-distribution System (KPS) is used among different communicating devices. With the growing need for larger key size in the conventional secure communication system, the existing resources in the communicating devices suffer from resource starvation. Hence, the need of a novel mechanism for secure communication is inevitable. But the existing secure communication mechanisms like PKC, SKC or KPS do not ensure elimination of resource starvation issue in tiny devices during communication. In these existing conventional mechanisms, the plain text is generally converted into cipher text with greater size than the plain text at the device level, which leads to resource starvation. At the time of transmission, the cipher text at the device end requires more bandwidth than the plain text which puts bandwidth overhead on the broadcast channel (BC).
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
DNA Encoded Elliptic Curve Cryptography System for IoT Security
Authors:
Prokash Barmana,
Banani Saha
Abstract:
In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them. There may be some security vulnerability arise within the IoT environment. Till date, IoT has not been widely accepted due to its security flaws. Hence to keep the IoT environment most robust, w…
▽ More
In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them. There may be some security vulnerability arise within the IoT environment. Till date, IoT has not been widely accepted due to its security flaws. Hence to keep the IoT environment most robust, we propose a stable security framework of IoT with Elliptic Curve Cryptography (ECC) using DNA Encoding. The ECC is most lightweight cryptography technique among other well known public key cryptography techniques. To increase encryption complexity, DNA encoding mechanism of DNA computing with ECC is preceded.
△ Less
Submitted 19 November, 2023;
originally announced November 2023.
-
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
Authors:
Prokash Barman,
Banani Saha
Abstract:
Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required. Reduced operation in multiplication will increase the functional speed of ECC arithmetic. These goals can be ach…
▽ More
Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required. Reduced operation in multiplication will increase the functional speed of ECC arithmetic. These goals can be achieved using ancient multiplication algorithm namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16 Vedic mathematics Sutras (algorithms). Nikhilam Sutra is efficient for multiplying two large decimal numbers. The Sutra reduces multiplication of two large numbers into two smaller numbers multiplication. The functional speed of Elliptic Curve Cryptography can be increased using Nikhilam method for scalar multiplication.
△ Less
Submitted 19 November, 2023;
originally announced November 2023.
-
Faster Approximate All Pairs Shortest Paths
Authors:
Barna Saha,
Christopher Ye
Abstract:
The all pairs shortest path problem (APSP) is one of the foundational problems in computer science. For weighted dense graphs on $n$ vertices, no truly sub-cubic algorithms exist to compute APSP exactly even for undirected graphs. This is popularly known as the APSP conjecture and has played a prominent role in develo** the field of fine-grained complexity. The seminal result of Seidel uses fast…
▽ More
The all pairs shortest path problem (APSP) is one of the foundational problems in computer science. For weighted dense graphs on $n$ vertices, no truly sub-cubic algorithms exist to compute APSP exactly even for undirected graphs. This is popularly known as the APSP conjecture and has played a prominent role in develo** the field of fine-grained complexity. The seminal result of Seidel uses fast matrix multiplication (FMM) to compute APSP on unweighted undirected graphs exactly in $\tilde{O}(n^ω)$ time, where $ω=2.372$. Even for unweighted undirected graphs, it is not possible to obtain a $(2-ε)$-approximation of APSP in $o(n^ω)$ time.
In this paper, we provide a multitude of new results for multiplicative and additive approximations of APSP in undirected graphs for both unweighted and weighted cases. We provide new algorithms for multiplicative 2-approximation of unweighted graphs: a deterministic one that runs in $\tilde{O}(n^{2.072})$ time and a randomized one that runs in $\tilde{O}(n^{2.032})$ on expectation improving upon the best known bound of $\tilde{O}(n^{2.25})$ by Roditty (STOC, 2023). For $2$-approximating paths of length $\geq k$, $k \geq 4$, we provide the first improvement after Dor, Halperin, Zwick (2000) for dense graphs even just using combinatorial methods, and then improve it further using FMM. We next consider additive approximations, and provide improved bounds for all additive $β$-approximations, $β\geq 4$. For weighted graphs, we show that by allowing small additive errors along with an $(1+ε)$-multiplicative approximation, it is possible to improve upon Zwick's $\tilde{O}(n^ω)$ algorithm. Our results point out the crucial role that FMM can play even on approximating APSP on unweighted undirected graphs, and reveal new bottlenecks towards achieving a quadratic running time to approximate APSP.
△ Less
Submitted 22 September, 2023;
originally announced September 2023.
-
An Evaluation of Machine Learning Approaches for Early Diagnosis of Autism Spectrum Disorder
Authors:
Rownak Ara Rasul,
Promy Saha,
Diponkor Bala,
S M Rakib Ul Karim,
Md. Ibrahim Abdullah,
Bishwajit Saha
Abstract:
Autistic Spectrum Disorder (ASD) is a neurological disease characterized by difficulties with social interaction, communication, and repetitive activities. While its primary origin lies in genetics, early detection is crucial, and leveraging machine learning offers a promising avenue for a faster and more cost-effective diagnosis. This study employs diverse machine learning methods to identify cru…
▽ More
Autistic Spectrum Disorder (ASD) is a neurological disease characterized by difficulties with social interaction, communication, and repetitive activities. While its primary origin lies in genetics, early detection is crucial, and leveraging machine learning offers a promising avenue for a faster and more cost-effective diagnosis. This study employs diverse machine learning methods to identify crucial ASD traits, aiming to enhance and automate the diagnostic process. We study eight state-of-the-art classification models to determine their effectiveness in ASD detection. We evaluate the models using accuracy, precision, recall, specificity, F1-score, area under the curve (AUC), kappa, and log loss metrics to find the best classifier for these binary datasets. Among all the classification models, for the children dataset, the SVM and LR models achieve the highest accuracy of 100% and for the adult dataset, the LR model produces the highest accuracy of 97.14%. Our proposed ANN model provides the highest accuracy of 94.24% for the new combined dataset when hyperparameters are precisely tuned for each model. As almost all classification models achieve high accuracy which utilize true labels, we become interested in delving into five popular clustering algorithms to understand model behavior in scenarios without true labels. We calculate Normalized Mutual Information (NMI), Adjusted Rand Index (ARI), and Silhouette Coefficient (SC) metrics to select the best clustering models. Our evaluation finds that spectral clustering outperforms all other benchmarking clustering models in terms of NMI and ARI metrics while demonstrating comparability to the optimal SC achieved by k-means. The implemented code is available at GitHub.
△ Less
Submitted 28 December, 2023; v1 submitted 20 September, 2023;
originally announced September 2023.
-
On the Complexity of Algorithms with Predictions for Dynamic Graph Problems
Authors:
Monika Henzinger,
Barna Saha,
Martin P. Seybold,
Christopher Ye
Abstract:
{\em Algorithms with predictions} incorporate machine learning predictions into algorithm design. A plethora of recent works incorporated predictions to improve on worst-case optimal bounds for online problems. In this paper, we initiate the study of complexity of dynamic data structures with predictions, including dynamic graph algorithms. Unlike in online algorithms, the main goal in dynamic dat…
▽ More
{\em Algorithms with predictions} incorporate machine learning predictions into algorithm design. A plethora of recent works incorporated predictions to improve on worst-case optimal bounds for online problems. In this paper, we initiate the study of complexity of dynamic data structures with predictions, including dynamic graph algorithms. Unlike in online algorithms, the main goal in dynamic data structures is to maintain the solution {\em efficiently} with every update.
Motivated by work in online algorithms, we investigate three natural models of predictions: (1) $\varepsilon$-accurate predictions where each predicted request matches the true request with probability at least $\varepsilon$, (2) list-accurate predictions where a true request comes from a list of possible requests, and (3) bounded delay predictions where the true requests are some (unknown) permutations of the predicted requests. For $\varepsilon$-accurate predictions, we show that lower bounds from the non-prediction setting of a problem carry over, up to a $1-\varepsilon$ factor. Then we give general reductions among the prediction models for a problem, showing that lower bounds for bounded delay imply lower bounds for list-accurate predictions, which imply lower bounds for $\varepsilon$-accurate predictions.
Further, we identify two broad problem classes based on lower bounds due to the Online Matrix Vector (OMv) conjecture. Specifically, we show that dynamic problems that are {\em locally correctable} have strong conditional lower bounds for list-accurate predictions that are equivalent to the non-prediction setting, unless list-accurate predictions are perfect. Moreover, dynamic problems that are {\em locally reducible} have a smooth transition in the running time. We categorize problems accordingly and give upper bounds that show that our lower bounds are almost tight, including problems in dynamic graphs.
△ Less
Submitted 10 September, 2023; v1 submitted 31 July, 2023;
originally announced July 2023.
-
Maxwell-Dirac system in cosmology
Authors:
Bijan Saha
Abstract:
Within the scope of a Bianchi type-I (BI) cosmological model we study the interacting system of spinor and electromagnetic fields and its role in the evolution of the Universe. In some earlier studies it was found that in case of a pure spinor field the presence of nontrivial non-diagonal components of EMT leads to some severe restrictions both on the spacetime geometry and/or spinor field itself,…
▽ More
Within the scope of a Bianchi type-I (BI) cosmological model we study the interacting system of spinor and electromagnetic fields and its role in the evolution of the Universe. In some earlier studies it was found that in case of a pure spinor field the presence of nontrivial non-diagonal components of EMT leads to some severe restrictions both on the spacetime geometry and/or spinor field itself, whereas in case of electromagnetic field with induced nonlinearity such components impose severe restrictions on metric functions and the components of the vector potential. It is shown that in case of interacting spinor and electromagnetic fields restrictions are not as severe as in other cases and in this case a nonlinear and massive spinor field with different components of vector potential can survive in a general Bianchi type-I spacetime.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
Approximating Edit Distance in the Fully Dynamic Model
Authors:
Tomasz Kociumaka,
Anish Mukherjee,
Barna Saha
Abstract:
The edit distance is a fundamental measure of sequence similarity, defined as the minimum number of character insertions, deletions, and substitutions needed to transform one string into the other. Given two strings of length at most $n$, simple dynamic programming computes their edit distance exactly in $O(n^2)$ time, which is also the best possible (up to subpolynomial factors) assuming the Stro…
▽ More
The edit distance is a fundamental measure of sequence similarity, defined as the minimum number of character insertions, deletions, and substitutions needed to transform one string into the other. Given two strings of length at most $n$, simple dynamic programming computes their edit distance exactly in $O(n^2)$ time, which is also the best possible (up to subpolynomial factors) assuming the Strong Exponential Time Hypothesis (SETH). The last few decades have seen tremendous progress in edit distance approximation, where the runtime has been brought down to subquadratic, near-linear, and even sublinear at the cost of approximation.
In this paper, we study the dynamic edit distance problem, where the strings change dynamically as the characters are substituted, inserted, or deleted over time. Each change may happen at any location of either of the two strings. The goal is to maintain the (exact or approximate) edit distance of such dynamic strings while minimizing the update time. The exact edit distance can be maintained in $\tilde{O}(n)$ time per update (Charalampopoulos, Kociumaka, Mozes; 2020), which is again tight assuming SETH. Unfortunately, even with the unprecedented progress in edit distance approximation in the static setting, strikingly little is known regarding dynamic edit distance approximation. Utilizing the off-the-shelf tools, it is possible to achieve an $O(n^{c})$-approximation in $n^{0.5-c+o(1)}$ update time for any constant $c\in [0,\frac16]$. Improving upon this trade-off remains open.
The contribution of this work is a dynamic $n^{o(1)}$-approximation algorithm with amortized expected update time of $n^{o(1)}$. In other words, we bring the approximation-ratio and update-time product down to $n^{o(1)}$. Our solution utilizes an elegant framework of precision sampling tree for edit distance approximation (Andoni, Krauthgamer, Onak; 2010).
△ Less
Submitted 14 July, 2023;
originally announced July 2023.
-
Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures
Authors:
Bilash Saha,
Md Mehedi Hasan,
Nafisa Anjum,
Sharaban Tahora,
Aiasha Siddika,
Hossain Shahriar
Abstract:
Blockchain technology transformed the digital sphere by providing a transparent, secure, and decentralized platform for data security across a range of industries, including cryptocurrencies and supply chain management. Blockchain's integrity and dependability have been jeopardized by the rising number of security threats, which have attracted cybercriminals as a target. By summarizing suggested f…
▽ More
Blockchain technology transformed the digital sphere by providing a transparent, secure, and decentralized platform for data security across a range of industries, including cryptocurrencies and supply chain management. Blockchain's integrity and dependability have been jeopardized by the rising number of security threats, which have attracted cybercriminals as a target. By summarizing suggested fixes, this research aims to offer a thorough analysis of mitigating blockchain attacks. The objectives of the paper include identifying weak blockchain attacks, evaluating various solutions, and determining how effective and effective they are at preventing these attacks. The study also highlights how crucial it is to take into account the particular needs of every blockchain application. This study provides beneficial perspectives and insights for blockchain researchers and practitioners, making it essential reading for those interested in current and future trends in blockchain security research.
△ Less
Submitted 20 June, 2023;
originally announced June 2023.
-
BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care
Authors:
Bilash Saha,
Md Saiful Islam,
Abm Kamrul Riad,
Sharaban Tahora,
Hossain Shahriar,
Sweta Sneha
Abstract:
Falls among the elderly are a major health concern, frequently resulting in serious injuries and a reduced quality of life. In this paper, we propose "BlockTheFall," a wearable device-based fall detection framework which detects falls in real time by using sensor data from wearable devices. To accurately identify patterns and detect falls, the collected sensor data is analyzed using machine learni…
▽ More
Falls among the elderly are a major health concern, frequently resulting in serious injuries and a reduced quality of life. In this paper, we propose "BlockTheFall," a wearable device-based fall detection framework which detects falls in real time by using sensor data from wearable devices. To accurately identify patterns and detect falls, the collected sensor data is analyzed using machine learning algorithms. To ensure data integrity and security, the framework stores and verifies fall event data using blockchain technology. The proposed framework aims to provide an efficient and dependable solution for fall detection with improved emergency response, and elderly individuals' overall well-being. Further experiments and evaluations are being carried out to validate the effectiveness and feasibility of the proposed framework, which has shown promising results in distinguishing genuine falls from simulated falls. By providing timely and accurate fall detection and response, this framework has the potential to substantially boost the quality of elderly care.
△ Less
Submitted 10 June, 2023;
originally announced June 2023.
-
HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps
Authors:
Bilash Saha,
Sharaban Tahora,
Abdul Barek,
Hossain Shahriar
Abstract:
The proliferation of mobile health technology, or mHealth apps, has necessitated the paramount importance of safeguarding personal health records. These digital platforms afford individuals the ability to effortlessly monitor and manage their health-related issues, as well as store, share, and access their medical records and treatment information. As the utilization of mHealth apps becomes increa…
▽ More
The proliferation of mobile health technology, or mHealth apps, has necessitated the paramount importance of safeguarding personal health records. These digital platforms afford individuals the ability to effortlessly monitor and manage their health-related issues, as well as store, share, and access their medical records and treatment information. As the utilization of mHealth apps becomes increasingly widespread, it is imperative to ensure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the regulations set forth by the Health Insurance Portability and Accountability Act (HIPAA). However, it is unfortunate to note that many mobile app developers, including those of mHealth apps, are not fully cognizant of the HIPAA security and privacy guidelines. This presents a unique opportunity for research to develop an analytical framework that can aid developers in maintaining a secure and HIPAA-compliant source code, while also raising awareness among consumers about the privacy and security of sensitive health information. The plan is to develop a framework which will serve as the foundation for develo** an integrated development environment (IDE) plugin for mHealth app developers and a web-based interface for mHealth app consumers. This will help developers identify and address HIPAA compliance issues during the development process and provide consumers with a tool to evaluate the privacy and security of mHealth apps before downloading and using them. The goal is to encourage the development of secure and compliant mHealth apps that safeguard personal health information.
△ Less
Submitted 10 June, 2023;
originally announced June 2023.
-
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly
Authors:
Sharaban Tahora,
Bilash Saha,
Nazmus Sakib,
Hossain Shahriar,
Hisham Haddad
Abstract:
The higher education management systems first identified and realized the trap of pitting innovation against privacy while first addressing COVID-19 social isolation challenges in 2020. In the age of data sprawl, we observe the situation has been exacerbating since then. Integrating blockchain technology has the potential to address the recent and emerging challenges in the higher education manage…
▽ More
The higher education management systems first identified and realized the trap of pitting innovation against privacy while first addressing COVID-19 social isolation challenges in 2020. In the age of data sprawl, we observe the situation has been exacerbating since then. Integrating blockchain technology has the potential to address the recent and emerging challenges in the higher education management system. This paper unravels the Good (scopes and benefits), Bad (limitations), and Ugly (challenges and trade-offs) of blockchain technology integration in the higher education management paradigm in the existing landscape. Our study adopts both qualitative and quantitative approaches to explore the experiences of educators, researchers, students, and other stakeholders and fully understand the blockchain's potential and contextual challenges. Our findings will envision an efficient, secure, and transparent higher education management system and help shape the debate (and trade-offs) pertaining to the recent shift in relevant business and management climate and regulatory sentiment.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
End-to-end Differentiable Clustering with Associative Memories
Authors:
Bishwajit Saha,
Dmitry Krotov,
Mohammed J. Zaki,
Parikshit Ram
Abstract:
Clustering is a widely used unsupervised learning technique involving an intensive discrete optimization problem. Associative Memory models or AMs are differentiable neural networks defining a recursive dynamical system, which have been integrated with various deep learning architectures. We uncover a novel connection between the AM dynamics and the inherent discrete assignment necessary in cluste…
▽ More
Clustering is a widely used unsupervised learning technique involving an intensive discrete optimization problem. Associative Memory models or AMs are differentiable neural networks defining a recursive dynamical system, which have been integrated with various deep learning architectures. We uncover a novel connection between the AM dynamics and the inherent discrete assignment necessary in clustering to propose a novel unconstrained continuous relaxation of the discrete clustering problem, enabling end-to-end differentiable clustering with AM, dubbed ClAM. Leveraging the pattern completion ability of AMs, we further develop a novel self-supervised clustering loss. Our evaluations on varied datasets demonstrate that ClAM benefits from the self-supervision, and significantly improves upon both the traditional Lloyd's k-means algorithm, and more recent continuous clustering relaxations (by upto 60% in terms of the Silhouette Coefficient).
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
First Derivative of Automorphic Function of Triangle Groups
Authors:
Md. Shafiul Alam,
Bijan Krishna Saha,
Chinmayee Podder
Abstract:
For a triangle group $G$, the $G$-automorphic function is the inverse of Schwarz triangle function. In this paper, we compute the first derivative of the $G$-automorphic function for the triangle group $G$ in terms of the Gaussian hypergeometric function.
For a triangle group $G$, the $G$-automorphic function is the inverse of Schwarz triangle function. In this paper, we compute the first derivative of the $G$-automorphic function for the triangle group $G$ in terms of the Gaussian hypergeometric function.
△ Less
Submitted 15 January, 2024; v1 submitted 6 May, 2023;
originally announced May 2023.
-
Optimized EEG based mood detection with signal processing and deep neural networks for brain-computer interface
Authors:
Subhrangshu Adhikary,
Kushal Jain,
Biswajit Saha,
Deepraj Chowdhury
Abstract:
Electroencephalogram (EEG) is a very promising and widely implemented procedure to study brain signals and activities by amplifying and measuring the post-synaptical potential arising from electrical impulses produced by neurons and detected by specialized electrodes attached to specific points in the scalp. It can be studied for detecting brain abnormalities, headaches, and other conditions. Howe…
▽ More
Electroencephalogram (EEG) is a very promising and widely implemented procedure to study brain signals and activities by amplifying and measuring the post-synaptical potential arising from electrical impulses produced by neurons and detected by specialized electrodes attached to specific points in the scalp. It can be studied for detecting brain abnormalities, headaches, and other conditions. However, there are limited studies performed to establish a smart decision-making model to identify EEG's relation with the mood of the subject. In this experiment, EEG signals of 28 healthy human subjects have been observed with consent and attempts have been made to study and recognise moods. Savitzky-Golay band-pass filtering and Independent Component Analysis have been used for data filtration.Different neural network algorithms have been implemented to analyze and classify the EEG data based on the mood of the subject. The model is further optimised by the usage of Blackman window-based Fourier Transformation and extracting the most significant frequencies for each electrode. Using these techniques, up to 96.01% detection accuracy has been obtained.
△ Less
Submitted 30 March, 2023;
originally announced April 2023.
-
Two-dimensional short-range spin-spin correlations in the layered spin-3/2 maple leaf lattice antiferromagnet Na2Mn3O7 with crystal stacking disorder
Authors:
B. Saha,
A. K. Bera,
S. M. Yusuf,
A. Hoser
Abstract:
We report the nature of magnetic structure, microscopic spin-spin correlations and their dependence on the underlying crystal structure of the geometrically frustrated layered spin-3/2 maple-leaf-lattice (MLL) antiferromagnet Na2Mn3O7 by a comprehensive neutron diffraction study. Crystal structural studies by x-ray and neutron diffractions reveal that the MLL layers (constituted by Mn3O72- units)…
▽ More
We report the nature of magnetic structure, microscopic spin-spin correlations and their dependence on the underlying crystal structure of the geometrically frustrated layered spin-3/2 maple-leaf-lattice (MLL) antiferromagnet Na2Mn3O7 by a comprehensive neutron diffraction study. Crystal structural studies by x-ray and neutron diffractions reveal that the MLL layers (constituted by Mn3O72- units) are well separated by non-magnetic Na layers. The studies also conclude the presence of stacking faults (in-plane sliding of magnetic MLL layers) as well as a distortion in the MLL of Mn4+. Temperature dependent magnetic susceptibility, heat capacity, and neutron diffraction data yield a short-range antiferromagnetic (AFM) ordering below ~ 100 K without a long-range magnetic ordering down to 1.5 K. The analysis of the diffuse magnetic neutron scattering patterns by reverse Monte Carlo method reveals 2D spin-spin correlations within the MLL layers. Additionally, we establish a relation between the correlation length of the short-range magnetic ordering with the stacking faults through a varying synthesis condition. The present study, therefore, explores a microscopic picture of the crystal- and spin-structures, as well as their correlation, hence, provides an experimental insight of the magnetic ordering in a MLL AFM. Further, we have outlined the formation of several 2D frustrated lattice geometry having triangular plaquettes, including the MLL, by crystal engineering of the triangular lattice and their role on the stabilization of multiple novel chiral spin states which opens up a door for study of novel chiral spin states.
△ Less
Submitted 18 February, 2023;
originally announced February 2023.
-
Weighted Edit Distance Computation: Strings, Trees and Dyck
Authors:
Debarati Das,
Jacob Gilbert,
MohammadTaghi Hajiaghayi,
Tomasz Kociumaka,
Barna Saha
Abstract:
Given two strings of length $n$ over alphabet $Σ$, and an upper bound $k$ on their edit distance, the algorithm of Myers (Algorithmica'86) and Landau and Vishkin (JCSS'88) computes the unweighted string edit distance in $\mathcal{O}(n+k^2)$ time. Till date, it remains the fastest algorithm for exact edit distance computation, and it is optimal under the Strong Exponential Hypothesis (STOC'15). Ove…
▽ More
Given two strings of length $n$ over alphabet $Σ$, and an upper bound $k$ on their edit distance, the algorithm of Myers (Algorithmica'86) and Landau and Vishkin (JCSS'88) computes the unweighted string edit distance in $\mathcal{O}(n+k^2)$ time. Till date, it remains the fastest algorithm for exact edit distance computation, and it is optimal under the Strong Exponential Hypothesis (STOC'15). Over the years, this result has inspired many developments, including fast approximation algorithms for string edit distance as well as similar $\tilde{\mathcal{O}}(n+$poly$(k))$-time algorithms for generalizations to tree and Dyck edit distances. Surprisingly, all these results hold only for unweighted instances.
While unweighted edit distance is theoretically fundamental, almost all real-world applications require weighted edit distance, where different weights are assigned to different edit operations and may vary with the characters being edited. Given a weight function $w: Σ\cup \{\varepsilon \}\times Σ\cup \{\varepsilon \} \rightarrow \mathbb{R}_{\ge 0}$ (such that $w(a,a)=0$ and $w(a,b)\ge 1$ for all $a,b\in Σ\cup \{\varepsilon\}$ with $a\ne b$), the goal is to find an alignment that minimizes the total weight of edits. Except for the vanilla $\mathcal{O}(n^2)$-time dynamic-programming algorithm and its almost trivial $\mathcal{O}(nk)$-time implementation, none of the aforementioned developments on the unweighted edit distance apply to the weighted variant. In this paper, we propose the first $\mathcal{O}(n+$poly$(k))$-time algorithm that computes weighted string edit distance exactly, thus bridging a fundamental gap between our understanding of unweighted and weighted edit distance. We then generalize this result to weighted tree and Dyck edit distances, which lead to a deterministic algorithm that improves upon the previous work for unweighted tree edit distance.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
Filling with separating curves
Authors:
Bhola Nath Saha,
Bidyut Sanki
Abstract:
A pair $(α, β)$ of simple closed curves on a closed and orientable surface $S_g$ of genus $g$ is called a filling pair if the complement is a disjoint union of topological disks. If $α$ is separating, then we call it as separating filling pair. In this article, we find a necessary and sufficient condition for the existence of a separating filling pair on $S_g$ with exactly two complementary disks.…
▽ More
A pair $(α, β)$ of simple closed curves on a closed and orientable surface $S_g$ of genus $g$ is called a filling pair if the complement is a disjoint union of topological disks. If $α$ is separating, then we call it as separating filling pair. In this article, we find a necessary and sufficient condition for the existence of a separating filling pair on $S_g$ with exactly two complementary disks. We study the combinatorics of the action of the map** class group $\M$ on the set of such filling pairs. Furthermore, we construct a Morse function $\mathcal{F}_g$ on the moduli space $\mathcal{M}_g$ which, for a given hyperbolic surface $X$, outputs the length of shortest such filling pair with respect to the metric in $X$. We show that the cardinality of the set of global minima of the function $\mathcal{F}_g$ is the same as the number of $\M$-orbits of such filling pairs.
△ Less
Submitted 13 January, 2024; v1 submitted 14 January, 2023;
originally announced January 2023.
-
Conditioning Covert Geo-Location (CGL) Detection on Semantic Class Information
Authors:
Binoy Saha,
Sukhendu Das
Abstract:
The primary goal of artificial intelligence is to mimic humans. Therefore, to advance toward this goal, the AI community attempts to imitate qualities/skills possessed by humans and imbibes them into machines with the help of datasets/tasks. Earlier, many tasks which require knowledge about the objects present in an image are satisfactorily solved by vision models. Recently, with the aim to incorp…
▽ More
The primary goal of artificial intelligence is to mimic humans. Therefore, to advance toward this goal, the AI community attempts to imitate qualities/skills possessed by humans and imbibes them into machines with the help of datasets/tasks. Earlier, many tasks which require knowledge about the objects present in an image are satisfactorily solved by vision models. Recently, with the aim to incorporate knowledge about non-object image regions (hideouts, turns, and other obscured regions), a task for identification of potential hideouts termed Covert Geo-Location (CGL) detection was proposed by Saha et al. It involves identification of image regions which have the potential to either cause an imminent threat or appear as target zones to be accessed for further investigation to identify any occluded objects. Only certain occluding items belonging to certain semantic classes can give rise to CGLs. This fact was overlooked by Saha et al. and no attempts were made to utilize semantic class information, which is crucial for CGL detection. In this paper, we propose a multitask-learning-based approach to achieve 2 goals - i) extraction of features having semantic class information; ii) robust training of the common encoder, exploiting large standard annotated datasets as training set for the auxiliary task (semantic segmentation). To explicitly incorporate class information in the features extracted by the encoder, we have further employed attention mechanism in a novel manner. We have also proposed a better evaluation metric for CGL detection that gives more weightage to recognition rather than precise localization. Experimental evaluations performed on the CGL dataset, demonstrate a significant increase in performance of about 3% to 14% mIoU and 3% to 16% DaR on split 1, and 1% mIoU and 1% to 2% DaR on split 2 over SOTA, serving as a testimony to the superiority of our approach.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
An Algorithmic Bridge Between Hamming and Levenshtein Distances
Authors:
Elazar Goldenberg,
Tomasz Kociumaka,
Robert Krauthgamer,
Barna Saha
Abstract:
The edit distance between strings classically assigns unit cost to every character insertion, deletion, and substitution, whereas the Hamming distance only allows substitutions. In many real-life scenarios, insertions and deletions (abbreviated indels) appear frequently but significantly less so than substitutions. To model this, we consider substitutions being cheaper than indels, with cost…
▽ More
The edit distance between strings classically assigns unit cost to every character insertion, deletion, and substitution, whereas the Hamming distance only allows substitutions. In many real-life scenarios, insertions and deletions (abbreviated indels) appear frequently but significantly less so than substitutions. To model this, we consider substitutions being cheaper than indels, with cost $1/a$ for a parameter $a\ge 1$. This basic variant, denoted $ED_a$, bridges classical edit distance ($a=1$) with Hamming distance ($a\to\infty$), leading to interesting algorithmic challenges: Does the time complexity of computing $ED_a$ interpolate between that of Hamming distance (linear time) and edit distance (quadratic time)? What about approximating $ED_a$?
We first present a simple deterministic exact algorithm for $ED_a$ and further prove that it is near-optimal assuming the Orthogonal Vectors Conjecture. Our main result is a randomized algorithm computing a $(1+ε)$-approximation of $ED_a(X,Y)$, given strings $X,Y$ of total length $n$ and a bound $k\ge ED_a(X,Y)$. For simplicity, let us focus on $k\ge 1$ and a constant $ε> 0$; then, our algorithm takes $\tilde{O}(n/a + ak^3)$ time. Unless $a=\tilde{O}(1)$ and for small enough $k$, this running time is sublinear in $n$. We also consider a very natural version that asks to find a $(k_I, k_S)$-alignment -- an alignment with at most $k_I$ indels and $k_S$ substitutions. In this setting, we give an exact algorithm and, more importantly, an $\tilde{O}(nk_I/k_S + k_S\cdot k_I^3)$-time $(1,1+ε)$-bicriteria approximation algorithm. The latter solution is based on the techniques we develop for $ED_a$ for $a=Θ(k_S / k_I)$. These bounds are in stark contrast to unit-cost edit distance, where state-of-the-art algorithms are far from achieving $(1+ε)$-approximation in sublinear time, even for a favorable choice of $k$.
△ Less
Submitted 22 November, 2022;
originally announced November 2022.
-
Robust Quantum Circuit for Clique Problem with Intermediate Qudits
Authors:
Arpita Sanyal,
Amit Saha,
Banani Saha,
Amlan Chakrabarti
Abstract:
Clique problem has a wide range of applications due to its pattern matching ability. There are various formulation of clique problem like $k$-clique problem, maximum clique problem, etc. The $k$-Clique problem, determines whether an arbitrary network has a clique or not whereas maximum clique problem finds the largest clique in a graph. It is already exhibited in the literature that the $k$-clique…
▽ More
Clique problem has a wide range of applications due to its pattern matching ability. There are various formulation of clique problem like $k$-clique problem, maximum clique problem, etc. The $k$-Clique problem, determines whether an arbitrary network has a clique or not whereas maximum clique problem finds the largest clique in a graph. It is already exhibited in the literature that the $k$-clique or maximum clique problem (NP-problem) can be solved in an asymptotically faster manner by using quantum algorithms as compared to the conventional computing. Quantum computing with higher dimensions is gaining popularity due to its large storage capacity and computation power. In this article, we have shown an improved quantum circuit implementation for the $k$-clique problem and maximum clique problem (MCP) with the help of higher-dimensional intermediate temporary qudits for the first time to the best of our knowledge. The cost of state-of-the-art quantum circuit for $k$-clique problem is colossal due to a huge number of $n$-qubit Toffoli gates. We have exhibited an improved cost and depth over the circuit by applying a generalized $n$-qubit Toffoli gate decomposition with intermediate ququarts (4-dimensional qudits).
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
$\tilde{O}(n+\mathrm{poly}(k))$-time Algorithm for Bounded Tree Edit Distance
Authors:
Debarati Das,
Jacob Gilbert,
MohammadTaghi Hajiaghayi,
Tomasz Kociumaka,
Barna Saha,
Hamed Saleh
Abstract:
Computing the edit distance of two strings is one of the most basic problems in computer science and combinatorial optimization. Tree edit distance is a natural generalization of edit distance in which the task is to compute a measure of dissimilarity between two (unweighted) rooted trees with node labels. Perhaps the most notable recent application of tree edit distance is in NoSQL big databases,…
▽ More
Computing the edit distance of two strings is one of the most basic problems in computer science and combinatorial optimization. Tree edit distance is a natural generalization of edit distance in which the task is to compute a measure of dissimilarity between two (unweighted) rooted trees with node labels. Perhaps the most notable recent application of tree edit distance is in NoSQL big databases, such as MongoDB, where each row of the database is a JSON document represented as a labeled rooted tree, and finding dissimilarity between two rows is a basic operation. Until recently, the fastest algorithm for tree edit distance ran in cubic time (Demaine, Mozes, Rossman, Weimann; TALG'10); however, Mao (FOCS'21) broke the cubic barrier for the tree edit distance problem using fast matrix multiplication.
Given a parameter $k$ as an upper bound on the distance, an $O(n+k^2)$-time algorithm for edit distance has been known since the 1980s due to the works of Myers (Algorithmica'86) and Landau and Vishkin (JCSS'88). The existence of an $\tilde{O}(n+\mathrm{poly}(k))$-time algorithm for tree edit distance has been posed as an open question, e.g., by Akmal and ** (ICALP'21), who gave a state-of-the-art $\tilde{O}(nk^2)$-time algorithm. In this paper, we answer this question positively.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Numerical modeling of CuSbSe2-based dual-heterojunction thin film solar cell with CGS back surface layer
Authors:
Bipin Saha,
Bipanko Kumar Mondal,
Shaikh Khaled Mostaque,
Mainul Hossain,
Jaker Hossain
Abstract:
Ternary chalcostibite copper antimony selenide (CuSbSe2) is a promising absorber material for next generation thin film solar cells due to the non-toxic nature, earth-abundance, low-cost fabrication technique, optimum bandgap and high optical absorption coefficient of CuSbSe2. Conventional single heterojunction CuSbSe2 solar cells suffer from high recombination rate at the interfaces and the prese…
▽ More
Ternary chalcostibite copper antimony selenide (CuSbSe2) is a promising absorber material for next generation thin film solar cells due to the non-toxic nature, earth-abundance, low-cost fabrication technique, optimum bandgap and high optical absorption coefficient of CuSbSe2. Conventional single heterojunction CuSbSe2 solar cells suffer from high recombination rate at the interfaces and the presence of a Schottky barrier at the back contact, which limit their power conversion efficiencies (PCEs). In this study, we propose a dual-heterojunction n-ZnSe/p-CuSbSe2/p+-CGS solar cell, having copper gallium selenide (CGS) as the back surface field (BSF) layer. The BSF layer absorbs longer wavelength photons through a tail-states-assisted (TSA) two-step upconversion process, leading to enhanced conversion efficiency. Numerical simulations were carried out using SCAPS-1D to investigate the performance of the proposed solar cell with respect to absorber layer thickness, do** concentrations and defect densities. The simulation results exhibit PCE as high as 43.77% for the dual-heterojunction solar cell as compared to 27.74% for the single heterojunction n-ZnSe/p-CuSbSe2 counterpart. The dual-heterojunction structure has, therefore, the potential to approach the Shockley-Queisser (SQ) detailed balance limit and can lead to extremely high PCEs in emerging thin film solar cells.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework
Authors:
Jiyoun Randolph,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Liang Zhao,
Nazmus Sakib,
Bilash Saha
Abstract:
In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcom…
▽ More
In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcome in reaching its full potential. We analyzed the current teleradiology workflow to identify inefficiencies. Image unavailability and delayed critical result communication stemmed from lack of system integration between teleradiology practice and healthcare institutions are among the most substantial factors causing prolonged turnaround time. In this paper, we propose a blockchain-based medical image sharing and automated critical-results notification platform to address the current limitation. We believe the proposed platform will enhance efficiency in workflow by eliminating the need for intermediaries and will benefit patients by eliminating the need for storing medical images in hard copies. While considerable progress was achieved, further research on governance and HIPAA compliance is required to optimize the adoption of the new application. Towards an idea to a working paradigm, we will implement the prototype during the next phase of our study.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Community Recovery in the Geometric Block Model
Authors:
Sainyam Galhotra,
Arya Mazumdar,
Soumyabrata Pal,
Barna Saha
Abstract:
To capture the inherent geometric features of many community detection problems, we propose to use a new random graph model of communities that we call a Geometric Block Model. The geometric block model builds on the random geometric graphs (Gilbert, 1961), one of the basic models of random graphs for spatial networks, in the same way that the well-studied stochastic block model builds on the Erdő…
▽ More
To capture the inherent geometric features of many community detection problems, we propose to use a new random graph model of communities that we call a Geometric Block Model. The geometric block model builds on the random geometric graphs (Gilbert, 1961), one of the basic models of random graphs for spatial networks, in the same way that the well-studied stochastic block model builds on the Erdős-R\'{en}yi random graphs. It is also a natural extension of random community models inspired by the recent theoretical and practical advancements in community detection. To analyze the geometric block model, we first provide new connectivity results for random annulus graphs which are generalizations of random geometric graphs. The connectivity properties of geometric graphs have been studied since their introduction, and analyzing them has been more difficult than their Erdős-R\'{en}yi counterparts due to correlated edge formation.
We then use the connectivity results of random annulus graphs to provide necessary and sufficient conditions for efficient recovery of communities for the geometric block model. We show that a simple triangle-counting algorithm to detect communities in the geometric block model is near-optimal. For this we consider the following two regimes of graph density.
In the regime where the average degree of the graph grows logarithmically with the number of vertices, we show that our algorithm performs extremely well, both theoretically and practically. In contrast, the triangle-counting algorithm is far from being optimum for the stochastic block model in the logarithmic degree regime. We simulate our results on both real and synthetic datasets to show superior performance of both the new model as well as our algorithm.
△ Less
Submitted 17 November, 2023; v1 submitted 22 June, 2022;
originally announced June 2022.
-
Time-dependent Spinor field in a static cylindrically-symmetric space-time
Authors:
Bijan Saha
Abstract:
Within the scope of a static cylindrically symmetric space-time we study the behavior of a nonlinear spinor field that depends on time and radial coordinates. It is found that the presence of nontrivial non-diagonal components of the energy-momentum tensor (EMT) imposes some restriction on both the metric functions and the spinor field. While for the time independent spinor field there occur three…
▽ More
Within the scope of a static cylindrically symmetric space-time we study the behavior of a nonlinear spinor field that depends on time and radial coordinates. It is found that the presence of nontrivial non-diagonal components of the energy-momentum tensor (EMT) imposes some restriction on both the metric functions and the spinor field. While for the time independent spinor field there occur three way restrictions resembling the Bianchi type-I Universe, in this case things become more complicated.
△ Less
Submitted 20 September, 2022; v1 submitted 5 May, 2022;
originally announced May 2022.
-
Scandium Nitride as a Gateway III-Nitride Semiconductor for Optoelectronic Artificial Synaptic Devices
Authors:
Dheemahi Rao,
Bivas Saha
Abstract:
Traditional computation based on von Neumann architecture is limited by the time and energy consumption due to data transfer between the storage and the processing units. The von Neumann architecture is also inefficient in solving unstructured, probabilistic, and real-time problems. To address these challenges, a new brain-inspired neuromorphic computational architecture is required. Due to absenc…
▽ More
Traditional computation based on von Neumann architecture is limited by the time and energy consumption due to data transfer between the storage and the processing units. The von Neumann architecture is also inefficient in solving unstructured, probabilistic, and real-time problems. To address these challenges, a new brain-inspired neuromorphic computational architecture is required. Due to absence of resistance-capacitance (RC) delay, high bandwidth and low power consumption, optoelectronic artificial synaptic devices are highly attractive. Yet stable, scalable, and complementary-metal-oxide-semiconductor (CMOS)-compatible synapses have not been demonstrated. In this work, persistence in the photoconductivity of undoped and magnesium-doped scandium nitride (ScN) is equated to the inhibitory and excitatory synaptic plasticity of the biological synapses responsible for memory and learning. Primary functionalities of a biological synapse like short-term memory (STM), long-term memory (LTM), the transition from STM-to-LTM, learning and forgetting, frequency-selective optical filtering, frequency-dependent potentiation and depression, Hebbian learning, and logic gate operations are demonstrated.
△ Less
Submitted 6 April, 2022;
originally announced April 2022.
-
A preparative mass spectrometer to deposit intact large native protein complexes
Authors:
Paul Fremdling,
Tim K. Esser,
Bodhisattwa Saha,
Alexander Makarov,
Kyle Fort,
Maria Reinhardt-Szyba,
Joseph Gault,
Stephan Rauschenbach
Abstract:
Electrospray ion-beam deposition (ES-IBD) is a versatile tool to study structure and reactivity of molecules from small metal clusters to large protein assemblies. It brings molecules gently into the gas phase where they can be accurately manipulated and purified, followed by controlled deposition onto various substrates. In combination with imaging techniques, direct structural information of wel…
▽ More
Electrospray ion-beam deposition (ES-IBD) is a versatile tool to study structure and reactivity of molecules from small metal clusters to large protein assemblies. It brings molecules gently into the gas phase where they can be accurately manipulated and purified, followed by controlled deposition onto various substrates. In combination with imaging techniques, direct structural information of well-defined molecules can be obtained, which is essential to test and interpret results from indirect mass spectrometry techniques. To date, ion-beam deposition experiments are limited to a small number of custom instruments worldwide, and there are no commercial alternatives. Here we present a module that adds ion-beam deposition capabilities to a popular commercial MS platform (Thermo Scientific$^{\mathrm{TM}}$ Q Exactive$^{\mathrm{TM}}$ UHMR). This combination significantly reduces the overhead associated with custom instruments, while benefiting from established high performance and reliability. We present current performance characteristics including beam intensity, landing-energy control, and deposition spot size for a broad range of molecules. In combination with atomic force microscopy (AFM) and transmission electron microscopy (TEM), we distinguish near-native from unfolded proteins and show retention of native shape of protein assemblies after dehydration and deposition. Further, we use an enzymatic assay to quantify activity of an non-covalent protein complex after deposition an a dry surface. Together, these results indicate a great potential of ES-IBD for applications in structural biology, but also outline the challenges that need to be solved for it to reach its full potential.
△ Less
Submitted 21 March, 2022; v1 submitted 9 March, 2022;
originally announced March 2022.
-
Catch Me if You Can: A Novel Task for Detection of Covert Geo-Locations (CGL)
Authors:
Binoy Saha,
Sukhendu Das
Abstract:
Most visual scene understanding tasks in the field of computer vision involve identification of the objects present in the scene. Image regions like hideouts, turns, & other obscured regions of the scene also contain crucial information, for specific surveillance tasks. Task proposed in this paper involves the design of an intelligent visual aid for identification of such locations in an image, wh…
▽ More
Most visual scene understanding tasks in the field of computer vision involve identification of the objects present in the scene. Image regions like hideouts, turns, & other obscured regions of the scene also contain crucial information, for specific surveillance tasks. Task proposed in this paper involves the design of an intelligent visual aid for identification of such locations in an image, which has either the potential to create an imminent threat from an adversary or appear as the target zones needing further investigation. Covert places (CGL) for hiding behind an occluding object are concealed 3D locations, not detectable from the viewpoint (camera). Hence this involves delineating specific image regions around the projections of outer boundary of the occluding objects, as places to be accessed around the potential hideouts. CGL detection finds applications in military counter-insurgency operations, surveillance with path planning for an exploratory robot. Given an RGB image, the goal is to identify all CGLs in the 2D scene. Identification of such regions would require knowledge about the 3D boundaries of obscuring items (pillars, furniture), their spatial location with respect to the neighboring regions of the scene. We propose this as a novel task, termed Covert Geo-Location (CGL) Detection. Classification of any region of an image as a CGL (as boundary sub-segments of an occluding object that conceals the hideout) requires examining the 3D relation between boundaries of occluding objects and their neighborhoods & surroundings. Our method successfully extracts relevant depth features from a single RGB image and quantitatively yields significant improvement over existing object detection and segmentation models adapted and trained for CGL detection. We also introduce a novel hand-annotated CGL detection dataset containing 1.5K real-world images for experimentation.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
Secondary Phase Limited Metal-Insulator Phase Transition in Chromium Nitride Thin Films
Authors:
Bidesh Biswas,
Sourjyadeep Chakraborty,
Anjana Joseph,
Shashidhara Acharya,
Ashalatha Indiradevi Kamalasanan Pillai,
Chandrabhas Narayana,
Vijay Bhatia,
Magnus Garbrecht,
Bivas Saha
Abstract:
Chromium nitride (CrN) is a well-known hard coating material that has found applications in abrasion and wear-resistant cutting tools, bearings, and tribology applications due to its high hardness, high-temperature stability, and corrosion-resistant properties. In recent years, CrN has also attracted significant interest due to its high thermoelectric power factor, and for its unique and intriguin…
▽ More
Chromium nitride (CrN) is a well-known hard coating material that has found applications in abrasion and wear-resistant cutting tools, bearings, and tribology applications due to its high hardness, high-temperature stability, and corrosion-resistant properties. In recent years, CrN has also attracted significant interest due to its high thermoelectric power factor, and for its unique and intriguing metal-insulator phase transition. While CrN bulk single-crystals exhibit the characteristic metal-insulator transition accompanied with structural (orthorhombic-to-rocksalt) and magnetic (antiferromagnetic-to-paramagnetic) transition at ~260-280K, observation of such phase transition in thin-film CrN has been scarce and highly debated. In this work, the formation of the secondary metallic Cr2N phase during the growth is demonstrated to inhibit the observation of metal-insulator phase transition in CrN thin films. When the Cr-flux during deposition is reduced below a critical limit, epitaxial and stoichiometric CrN thin film is obtained that reproducibly exhibits the phase transition. Annealing of the mixed-phase film inside reducing NH3 environment converts the Cr2N into CrN, and a discontinuity in the electrical resistivity at ~ 277 K appears which supports the underlying hypothesis. A clear demonstration of the origin behind the controversy of the metal-insulator transition in CrN thin films marks significant progress and would enable its nanoscale device realization.
△ Less
Submitted 19 January, 2022;
originally announced January 2022.
-
Improved Approximation Algorithms for Dyck Edit Distance and RNA Folding
Authors:
Debarati Das,
Tomasz Kociumaka,
Barna Saha
Abstract:
The Dyck language, which consists of well-balanced sequences of parentheses, is one of the most fundamental context-free languages. The Dyck edit distance quantifies the number of edits (character insertions, deletions, and substitutions) required to make a given parenthesis sequence well-balanced. RNA Folding involves a similar problem, where a closing parenthesis can match an opening parenthesis…
▽ More
The Dyck language, which consists of well-balanced sequences of parentheses, is one of the most fundamental context-free languages. The Dyck edit distance quantifies the number of edits (character insertions, deletions, and substitutions) required to make a given parenthesis sequence well-balanced. RNA Folding involves a similar problem, where a closing parenthesis can match an opening parenthesis of the same type irrespective of their ordering. For example, in RNA Folding, both $\tt{()}$ and $\tt{)(}$ are valid matches, whereas the Dyck language only allows $\tt{()}$ as a match. Using fast matrix multiplication, it is possible to compute their exact solutions of both problems in time $O(n^{2.824})$. Whereas combinatorial algorithms would be more desirable, the two problems are known to be at least as hard as Boolean matrix multiplication. In terms of fast approximation algorithms that are combinatorial in nature, both problems admit an $εn$-additive approximation in $\tilde{O}(\frac{n^2}ε)$ time. Further, there is a $O(\log n)$-factor approximation algorithm for Dyck edit distance in near-linear time.
In this paper, we design a constant-factor approximation algorithm for Dyck edit distance that runs in $O(n^{1.971})$ time. Moreover, we develop a $(1+ε)$-factor approximation algorithm running in $\tilde{O}(\frac{n^2}ε)$ time, which improves upon the earlier additive approximation. Finally, we design a $(3+ε)$-approximation that takes $\tilde{O}(\frac{nd}ε)$ time, where $d\ge 1$ is an upper bound on the sought distance. As for RNA folding, for any $s\ge1$, we design a factor-$s$ approximation algorithm that runs in $O(n+(\frac{n}{s})^3)$ time. To the best of our knowledge, this is the first nontrivial approximation algorithm for RNA Folding that can go below the $n^2$ barrier. All our algorithms are combinatorial.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
How Compression and Approximation Affect Efficiency in String Distance Measures
Authors:
Arun Ganesh,
Tomasz Kociumaka,
Andrea Lincoln,
Barna Saha
Abstract:
Real-world data often comes in compressed form. Analyzing compressed data directly (without decompressing it) can save space and time by orders of magnitude. In this work, we focus on fundamental sequence comparison problems and try to quantify the gain in time complexity when the underlying data is highly compressible. We consider grammar compression, which unifies many practically relevant compr…
▽ More
Real-world data often comes in compressed form. Analyzing compressed data directly (without decompressing it) can save space and time by orders of magnitude. In this work, we focus on fundamental sequence comparison problems and try to quantify the gain in time complexity when the underlying data is highly compressible. We consider grammar compression, which unifies many practically relevant compression schemes. For two strings of total length $N$ and total compressed size $n$, it is known that the edit distance and a longest common subsequence (LCS) can be computed exactly in time $\tilde{O}(nN)$, as opposed to $O(N^2)$ for the uncompressed setting. Many applications need to align multiple sequences simultaneously, and the fastest known exact algorithms for median edit distance and LCS of $k$ strings run in $O(N^k)$ time. This naturally raises the question of whether compression can help to reduce the running time significantly for $k \geq 3$, perhaps to $O(N^{k/2}n^{k/2})$ or $O(Nn^{k-1})$. Unfortunately, we show lower bounds that rule out any improvement beyond $Ω(N^{k-1}n)$ time for any of these problems assuming the Strong Exponential Time Hypothesis.
At the same time, we show that approximation and compression together can be surprisingly effective. We develop an $\tilde{O}(N^{k/2}n^{k/2})$-time FPTAS for the median edit distance of $k$ sequences. In comparison, no $O(N^{k-Ω(1)})$-time PTAS is known for the median edit distance problem in the uncompressed setting. For two strings, we get an $\tilde{O}(N^{2/3}n^{4/3})$-time FPTAS for both edit distance and LCS. In contrast, for uncompressed strings, there is not even a subquadratic algorithm for LCS that has less than a polynomial gap in the approximation factor. Building on the insight from our approximation algorithms, we also obtain results for many distance measures including the edit, Hamming, and shift distances.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
Gap Edit Distance via Non-Adaptive Queries: Simple and Optimal
Authors:
Elazar Goldenberg,
Tomasz Kociumaka,
Robert Krauthgamer,
Barna Saha
Abstract:
We study the problem of approximating edit distance in sublinear time. This is formalized as the $(k,k^c)$-Gap Edit Distance problem, where the input is a pair of strings $X,Y$ and parameters $k,c>1$, and the goal is to return YES if $ED(X,Y)\leq k$, NO if $ED(X,Y)> k^c$, and an arbitrary answer when $k < ED(X,Y) \le k^c$. Recent years have witnessed significant interest in designing sublinear-tim…
▽ More
We study the problem of approximating edit distance in sublinear time. This is formalized as the $(k,k^c)$-Gap Edit Distance problem, where the input is a pair of strings $X,Y$ and parameters $k,c>1$, and the goal is to return YES if $ED(X,Y)\leq k$, NO if $ED(X,Y)> k^c$, and an arbitrary answer when $k < ED(X,Y) \le k^c$. Recent years have witnessed significant interest in designing sublinear-time algorithms for Gap Edit Distance.
In this work, we resolve the non-adaptive query complexity of Gap Edit Distance for the entire range of parameters, improving over a sequence of previous results. Specifically, we design a non-adaptive algorithm with query complexity $\tilde{O}(n/k^{c-0.5})$, and we further prove that this bound is optimal up to polylogarithmic factors.
Our algorithm also achieves optimal time complexity $\tilde{O}(n/k^{c-0.5})$ whenever $c\geq 1.5$. For $1<c<1.5$, the running time of our algorithm is $\tilde{O}(n/k^{2c-1})$. In the restricted case of $k^c=Ω(n)$, this matches a known result [Batu, Ergün, Kilian, Magen, Raskhodnikova, Rubinfeld, and Sami; STOC 2003], and in all other (nontrivial) cases, our running time is strictly better than all previous algorithms, including the adaptive ones. However, an independent work of Bringmann, Cassis, Fischer, and Nakos [STOC 2022] provides an adaptive algorithm that bypasses the non-adaptive lower bound, but only for small enough $k$ and $c$.
△ Less
Submitted 2 October, 2022; v1 submitted 24 November, 2021;
originally announced November 2021.
-
Approximating LCS and Alignment Distance over Multiple Sequences
Authors:
Debarati Das,
Barna Saha
Abstract:
We study the problem of aligning multiple sequences with the goal of finding an alignment that either maximizes the number of aligned symbols (the longest common subsequence (LCS)), or minimizes the number of unaligned symbols (the alignment distance (AD)). Multiple sequence alignment is a well-studied problem in bioinformatics and is used to identify regions of similarity among DNA, RNA, or prote…
▽ More
We study the problem of aligning multiple sequences with the goal of finding an alignment that either maximizes the number of aligned symbols (the longest common subsequence (LCS)), or minimizes the number of unaligned symbols (the alignment distance (AD)). Multiple sequence alignment is a well-studied problem in bioinformatics and is used to identify regions of similarity among DNA, RNA, or protein sequences to detect functional, structural, or evolutionary relationships among them. It is known that exact computation of LCS or AD of $m$ sequences each of length $n$ requires $Θ(n^m)$ time unless the Strong Exponential Time Hypothesis is false. In this paper, we provide several results to approximate LCS and AD of multiple sequences.
If the LCS of $m$ sequences each of length $n$ is $λn$ for some $λ\in [0,1]$, then in $\tilde{O}_m(n^{\lfloor\frac{m}{2}\rfloor+1})$ time, we can return a common subsequence of length at least $\frac{λ^2 n}{2+ε}$ for any arbitrary constant $ε>0$.
It is possible to approximate the AD within a factor of two in time $\tilde{O}_m(n^{\lceil\frac{m}{2}\rceil})$. However, going below-2 approximation requires breaking the triangle inequality barrier which is a major challenge in this area. No such algorithm with a running time of $O(n^{αm})$ for any $α< 1$ is known. If the AD is $θn$, then we design an algorithm that approximates the AD within an approximation factor of $\left(2-\frac{3θ}{16}+ε\right)$ in $\tilde{O}_m(n^{\lfloor\frac{m}{2}\rfloor+2})$ time. Thus, if $θ$ is a constant, we get a below-two approximation in $\tilde{O}_m(n^{\lfloor\frac{m}{2}\rfloor+2})$ time. Moreover, we show if just one out of $m$ sequences is $(p,B)$-pseudorandom then, we get a below-2 approximation in $\tilde{O}_m(nB^{m-1}+n^{\lfloor \frac{m}{2}\rfloor+3})$ time irrespective of $θ$.
△ Less
Submitted 24 October, 2021;
originally announced October 2021.
-
Synthesis and study of ScN thin films
Authors:
Susmita Chowdhury,
Rachana Gupta,
Parasmani Rajput,
Akhil Tayal,
Dheemahi Rao,
Reddy Sekhar,
Shashi Prakash,
Ramaseshan Rajagopalan,
S. N. Jha,
Bivas Saha,
Mukul Gupta
Abstract:
To contemplate an alternative approach for the minimization of diffusion at high temperature depositions, present findings impart viability of room-temperature deposited reactively sputtered ScN thin film samples. The adopted room temperature route endows precise control over the $R_{N_2}$ flow for a methodical structural phase evolution from Sc$\to$ScN and probe the correlated physical aspects of…
▽ More
To contemplate an alternative approach for the minimization of diffusion at high temperature depositions, present findings impart viability of room-temperature deposited reactively sputtered ScN thin film samples. The adopted room temperature route endows precise control over the $R_{N_2}$ flow for a methodical structural phase evolution from Sc$\to$ScN and probe the correlated physical aspects of the highly textured ScN samples. In the nitrided regime i.e. at $R_{N_2}$ = 2.5-100% flow, incorporation of unintentional oxygen defects were evidenced from surface sensitive soft x-ray absorption spectroscopy study, though less compared to their metal ($R_{N_2} = 0\%$) and interstitial ($R_{N_2} = 1.6\%$) counterparts, due to higher Gibb's free energy for Sc-O-N formation with no trace of ligand field splitting around the O K-edge spectra. To eradicate the sceptism of appearance of N K-edge (401.6 eV) and Sc L-edge (402.2 eV) absorption spectra adjacent to each other, the nascent Sc K-edge study has been adopted for the first time to validate complementary insight on the metrical parameters of the Sc-N system taken into consideration. Optical bandgaps of the polycrystalline ScN thin film samples were found to vary between 2.25-2.62 eV as obtained from the UV-Vis spectroscopy, whereas, the nano-indentation hardness and modulus of the as-deposited samples lie between 15-34GPa and 152-476GPa, respectively following a linearly increasing trend of resistance to plastic deformations. Besides, contrary to other early 3d transition metal nitrides (TiN, VN, CrN), a comprehensive comparison of noticeably large homogeneity range in Sc-N has been outlined to apprehend the minuscule lattice expansion over the large $R_{N_2}$ realm.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Does Preprocessing help in Fast Sequence Comparisons?
Authors:
Elazar Goldenberg,
Aviad Rubinstein,
Barna Saha
Abstract:
We study edit distance computation with preprocessing: the preprocessing algorithm acts on each string separately, and then the query algorithm takes as input the two preprocessed strings. This model is inspired by scenarios where we would like to compute edit distance between many pairs in the same pool of strings.
Our results include:
Permutation-LCS: If the LCS between two permutations has…
▽ More
We study edit distance computation with preprocessing: the preprocessing algorithm acts on each string separately, and then the query algorithm takes as input the two preprocessed strings. This model is inspired by scenarios where we would like to compute edit distance between many pairs in the same pool of strings.
Our results include:
Permutation-LCS: If the LCS between two permutations has length $n-k$, we can compute it \textit{ exactly} with $O(n \log(n))$ preprocessing and $O(k \log(n))$ query time.
Small edit distance: For general strings, if their edit distance is at most $k$, we can compute it \textit{ exactly} with $O(n\log(n))$ preprocessing and $O(k^2 \log(n))$ query time.
Approximate edit distance: For the most general input, we can approximate the edit distance to within factor $(7+o(1))$ with preprocessing time $\tilde{O}(n^2)$ and query time $\tilde{O}(n^{1.5+o(1)})$.
All of these results significantly improve over the state of the art in edit distance computation without preprocessing. Interestingly, by combining ideas from our algorithms with preprocessing, we provide new improved results for approximating edit distance without preprocessing in subquadratic time.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Recognizing and prevention of probable regime shift in density regulated and Allee type stochastic harvesting model with application to herring conservation
Authors:
Anurag Sau,
Sabyasachi Bhattacharya,
Bapi Saha
Abstract:
An ecological system with multiple stable equilibria is prone to undergo catastrophic change or regime shift from one steady-state to another. It should be noted that, if one of the steady states is an extinction state, the catastrophic change may lead to extinction. A suitable manual measure may control the prevention of catastrophic changes of different species from one equilibrium to another. W…
▽ More
An ecological system with multiple stable equilibria is prone to undergo catastrophic change or regime shift from one steady-state to another. It should be noted that, if one of the steady states is an extinction state, the catastrophic change may lead to extinction. A suitable manual measure may control the prevention of catastrophic changes of different species from one equilibrium to another. We consider two stochastic models with linear and nonlinear harvesting terms. We inspect either density regulation or Allee type density regulated models [Saha et al., Ecological Modelling, 2013], which have substantial applications in the herring fish population's viability study. Both the deterministic models we consider here contain bi-stability under certain restrictions, and in that case, one of the stable states is the extinction state. We assume that the dynamical system under consideration is closed, i.e., immigration and emigration are absent. The demographic noise is introduced in the system by substituting an ordinary differential equation with a stochastic differential equation model, where the birth and death rates of the deterministic process are used to obtain the instantaneous mean and variance in the stochastic differential equation. Our study reveals that, the catastrophic changes can be avoided manually by a suitable choice of handling time that will eventually help to prevent the sudden extinction of the harvested population. The entire study is illustrated through the herring population size data obtained from the Global Population Dynamics Database (GPDD) and simulation experiment.
△ Less
Submitted 17 August, 2021;
originally announced August 2021.
-
Mechanism of Na-ionic conduction in the high efficient layered battery material Na2Mn3O7
Authors:
Bikash Saha,
A. K. Bera,
S. M. Yusuf
Abstract:
The ionic conduction properties of the technologically important two-dimensional (2D) layered battery material Na2Mn3O7, with exceptional small-voltage hysteresis between charge and discharge curves, have been investigated as a function of temperature and frequency by an impedance spectroscopy. The detailed analyses of the impedance data in the form of dc-conductivity, ac-conductivity, electrical…
▽ More
The ionic conduction properties of the technologically important two-dimensional (2D) layered battery material Na2Mn3O7, with exceptional small-voltage hysteresis between charge and discharge curves, have been investigated as a function of temperature and frequency by an impedance spectroscopy. The detailed analyses of the impedance data in the form of dc-conductivity, ac-conductivity, electrical modulus, dielectric constant and complex polarizability reveal a long-range Na-ionic conductivity with negligible contribution from a local dipole relaxation. A significant enhancement (~10^4 times) of the Na-ion conductivity has been found with the increasing temperature from 353 K to 713 K. The temperature dependent conductivity reveals thermally activated conduction process with activation energies of 0.161 and 0.377 eV over the two temperature regions of 383-518 K and 518-713 K, respectively. AC conductivity study reveals a long-range hop** process for the conduction of charge carriers with a sharp increase of the hop** range at 518 K. The scaling study of the ac-conductivity reveals that the frequency-activated conductivity (above 10^4 Hz at 353 K) is mainly controlled by the critical frequency that increases with the increasing temperature. The Na-ion conduction in Na2Mn3O7 occurs predominantly by a correlated barrier hop** process. Besides, a correlation between ionic conduction and crystal structure has been established by x-ray and neutron diffraction study. We have further shown that the conductivity of Na2Mn3O7 can be enhanced by reduction of the stacking faults in the crystal structure. Our study facilitates the understanding of the microscopic ionic conduction mechanism in the highly efficient 2D battery material Na2Mn3O7 having high energy storage capacity and high structural stability, paving way for the discovery of materials for battery applications.
△ Less
Submitted 23 June, 2021;
originally announced June 2021.
-
How to Design Robust Algorithms using Noisy Comparison Oracle
Authors:
Raghavendra Addanki,
Sainyam Galhotra,
Barna Saha
Abstract:
Metric based comparison operations such as finding maximum, nearest and farthest neighbor are fundamental to studying various clustering techniques such as $k$-center clustering and agglomerative hierarchical clustering. These techniques crucially rely on accurate estimation of pairwise distance between records. However, computing exact features of the records, and their pairwise distances is ofte…
▽ More
Metric based comparison operations such as finding maximum, nearest and farthest neighbor are fundamental to studying various clustering techniques such as $k$-center clustering and agglomerative hierarchical clustering. These techniques crucially rely on accurate estimation of pairwise distance between records. However, computing exact features of the records, and their pairwise distances is often challenging, and sometimes not possible. We circumvent this challenge by leveraging weak supervision in the form of a comparison oracle that compares the relative distance between the queried points such as `Is point u closer to v or w closer to x?'.
However, it is possible that some queries are easier to answer than others using a comparison oracle. We capture this by introducing two different noise models called adversarial and probabilistic noise. In this paper, we study various problems that include finding maximum, nearest/farthest neighbor search under these noise models. Building upon the techniques we develop for these comparison operations, we give robust algorithms for k-center clustering and agglomerative hierarchical clustering. We prove that our algorithms achieve good approximation guarantees with a high probability and analyze their query complexity. We evaluate the effectiveness and efficiency of our techniques empirically on various real-world datasets.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
Removal of instabilities of the higher derivative theories in the light of antilinearity
Authors:
Biswajit Paul,
Himangshu Dhar,
Biswajit Saha
Abstract:
Theories with higher derivatives involve linear instabilities in the Hamiltonian commonly known as Ostrogradski ghosts and can be viewed as a very serious problem during quantization. To cure {this} , we have considered the properties of antilinearty that can be found inherently in the non-Hermitian Hamiltonians. Owing to the existence of antilinearity, we can construct an operator, called the…
▽ More
Theories with higher derivatives involve linear instabilities in the Hamiltonian commonly known as Ostrogradski ghosts and can be viewed as a very serious problem during quantization. To cure {this} , we have considered the properties of antilinearty that can be found inherently in the non-Hermitian Hamiltonians. Owing to the existence of antilinearity, we can construct an operator, called the $V$-operator, which acts as an intertwining operator between the Hamiltonian and its hermitian conjugate. We have used this $V$-operator to remove the linear momenta term from the higher derivative Hamiltonian by making it non-Hermitian in the first place via an isospectral similarity transformation. The final form of the Hamiltonian is free from the Ostrogradski ghosts under some restriction on the mass term.
△ Less
Submitted 7 September, 2021; v1 submitted 5 April, 2021;
originally announced April 2021.
-
Chemical contamination mediated regime shifts in planktonic systems
Authors:
Swarnendu Banerjee,
Bapi Saha,
Max Rietkerk,
Mara Baudena,
Joydev Chattopadhyay
Abstract:
Abrupt transitions leading to algal blooms are quite well known in aquatic ecosystems and have important implications for the environment. These ecosystem shifts have been largely attributed to nutrient dynamics and food web interactions. Contamination with heavy metals such as copper can modulate such ecological interactions which in turn may impact ecosystem functioning. Motivated by this, we ex…
▽ More
Abrupt transitions leading to algal blooms are quite well known in aquatic ecosystems and have important implications for the environment. These ecosystem shifts have been largely attributed to nutrient dynamics and food web interactions. Contamination with heavy metals such as copper can modulate such ecological interactions which in turn may impact ecosystem functioning. Motivated by this, we explored the effect of copper enrichment on such regime shifts in planktonic systems. We integrated copper contamination to a minimal phytoplankton-zooplankton model which is known to demonstrate abrupt transitions between ecosystem states. Our results suggest that both the toxic and deficient concentration of copper in water bodies can lead to regime shift to an algal dominated alternative stable state. Further, interaction with fish density can also lead to collapse of population cycles thus leading to algal domination in the intermediate copper ranges. Environmental stochasticity may result in state transition much prior to the tip** point and there is a significant loss in the bimodality on increasing intensity and redness of noise. Finally, the impending state shifts due to contamination cannot be predicted by the generic early warning indicators unless the transition is close enough. Overall the study provides fresh impetus to explore regime shifts in ecosystems under the influence of anthropogenic changes like chemical contamination.
△ Less
Submitted 5 December, 2020;
originally announced December 2020.
-
Semi-abelian analogues of Schanuel Conjecture and applications
Authors:
Cristiana Bertolin,
Patrice Philippon,
Biswajyoti Saha,
Ekata Saha
Abstract:
In this article we study Semi-abelian analogues of Schanuel conjecture. As showed by the first author, Schanuel Conjecture is equivalent to the Generalized Period Conjecture applied to 1-motives without abelian part. Extending her methods, the second, the third and the fourth authors have introduced the Abelian analogue of Schanuel Conjecture as the Generalized Period Conjecture applied to 1-motiv…
▽ More
In this article we study Semi-abelian analogues of Schanuel conjecture. As showed by the first author, Schanuel Conjecture is equivalent to the Generalized Period Conjecture applied to 1-motives without abelian part. Extending her methods, the second, the third and the fourth authors have introduced the Abelian analogue of Schanuel Conjecture as the Generalized Period Conjecture applied to 1-motives without toric part. As a first result of this paper, we define the Semi-abelian analogue of Schanuel Conjecture as the Generalized Period Conjecture applied to 1-motives. C. Cheng et al. proved that Schanuel conjecture implies the algebraic independence of the values of the iterated exponential and the values of the iterated logarithm, answering a question of M. Waldschmidt. The second, the third and the fourth authors have investigated a similar question in the setup of abelian varieties: the Weak Abelian Schanuel conjecture implies the algebraic independence of the values of the iterated abelian exponential and the values of an iterated generalized abelian logarithm. The main result of this paper is that a Relative Semi-abelian conjecture implies the algebraic independence of the values of the iterated semi-abelian exponential and the values of an iterated generalized semi-abelian logarithm.
△ Less
Submitted 15 November, 2022; v1 submitted 28 October, 2020;
originally announced October 2020.