-
A Novel Survey for Young Substellar Objects with the W-band filter III: Searching for very low mass brown dwarfs in Serpens South and Serpens Core
Authors:
Sophie Dubber,
Beth Biller,
Katelyn Allers,
Jessy Jose,
Loïc Albert,
Blake Pantoja,
Clémence Fontanive,
Michael Liu,
Zhoujian Zhang,
Wen-** Chen,
Bhavana Lalchand,
Belinda Damian,
Tanvi Sharma
Abstract:
We present CFHT photometry and IRTF spectroscopy of low-mass candidate members of Serpens South and Serpens Core ($\sim$430 pc, $\sim$0.5 Myr), identified using a novel combination of photometric filters, known as the W-band method. We report SC182952+011618, SS182959-020335 and SS183032-021028 as young, low-mass Serpens candidate members, with spectral types in the range M7-M8, M5-L0 and M5-M6.5…
▽ More
We present CFHT photometry and IRTF spectroscopy of low-mass candidate members of Serpens South and Serpens Core ($\sim$430 pc, $\sim$0.5 Myr), identified using a novel combination of photometric filters, known as the W-band method. We report SC182952+011618, SS182959-020335 and SS183032-021028 as young, low-mass Serpens candidate members, with spectral types in the range M7-M8, M5-L0 and M5-M6.5 respectively. Best-fit effective temperatures and luminosities imply masses of $<$ 0.12M$_{\odot}$ for all three candidate cluster members. We also present Hubble Space Telescope imaging data (F127M, F139M and F850LP) for six targets in Serpens South. We report the discovery of the binary system SS183044-020918AB. The binary components are separated by $\approx$45 AU, with spectral types of M7-M8 and M8-M9, and masses of 0.08-0.1 and 0.05-0.07M$_{\odot}$. We discuss the effects of high dust attenuation on the reliability of our analysis, as well as the presence of reddened background stars in our photometric sample.
△ Less
Submitted 11 May, 2021;
originally announced May 2021.
-
HDR-Fuzz: Detecting Buffer Overruns using AddressSanitizer Instrumentation and Fuzzing
Authors:
Raveendra Kumar Medicherla,
Malathy Nagalakshmi,
Tanya Sharma,
Raghavan Komondoor
Abstract:
Buffer-overruns are a prevalent vulnerability in software libraries and applications. Fuzz testing is one of the effective techniques to detect vulnerabilities in general. Greybox fuzzers such as AFL automatically generate a sequence of test inputs for a given program using a fitness-guided search process. A recently proposed approach in the literature introduced a buffer-overrun specific fitness…
▽ More
Buffer-overruns are a prevalent vulnerability in software libraries and applications. Fuzz testing is one of the effective techniques to detect vulnerabilities in general. Greybox fuzzers such as AFL automatically generate a sequence of test inputs for a given program using a fitness-guided search process. A recently proposed approach in the literature introduced a buffer-overrun specific fitness metric called "headroom", which tracks how close each generated test input comes to exposing the vulnerabilities. That approach showed good initial promise, but is somewhat imprecise and expensive due to its reliance on conservative points-to analysis. Inspired by the approach above, in this paper we propose a new ground-up approach for detecting buffer-overrun vulnerabilities. This approach uses an extended version of ASAN (Address Sanitizer) that runs in parallel with the fuzzer, and reports back to the fuzzer test inputs that happen to come closer to exposing buffer-overrun vulnerabilities. The ASAN-style instrumentation is precise as it has no dependence on points-to analysis. We describe in this paper our approach, as well as an implementation and evaluation of the approach.
△ Less
Submitted 21 April, 2021;
originally announced April 2021.
-
Do We Need Improved Code Quality Metrics?
Authors:
Tushar Sharma,
Diomidis Spinellis
Abstract:
The software development community has been using code quality metrics for the last five decades. Despite their wide adoption, code quality metrics have attracted a fair share of criticism. In this paper, first, we carry out a qualitative exploration by surveying software developers to gauge their opinions about current practices and potential gaps with the present set of metrics. We identify defi…
▽ More
The software development community has been using code quality metrics for the last five decades. Despite their wide adoption, code quality metrics have attracted a fair share of criticism. In this paper, first, we carry out a qualitative exploration by surveying software developers to gauge their opinions about current practices and potential gaps with the present set of metrics. We identify deficiencies including lack of soundness, i.e., the ability of a metric to capture a notion accurately as promised by the metric, lack of support for assessing software architecture quality, and insufficient support for assessing software testing and infrastructure. In the second part of the paper, we focus on one specific code quality metric-LCOM as a case study to explore opportunities towards improved metrics. We evaluate existing LCOM algorithms qualitatively and quantitatively to observe how closely they represent the concept of cohesion. In this pursuit, we first create eight diverse cases that any LCOM algorithm must cover and obtain their cohesion levels by a set of experienced developers and consider them as a ground truth. We show that the present set of LCOM algorithms do poorly w.r.t. these cases. To bridge the identified gap, we propose a new approach to compute LCOM and evaluate the new approach with the ground truth. We also show, using a quantitative analysis using more than 90 thousand types belonging to 261 high-quality Java repositories, the present set of methods paint a very inaccurate and misleading picture of class cohesion. We conclude that the current code quality metrics in use suffer from various deficiencies, presenting ample opportunities for the research community to address the gaps.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Filtering Noise in Time and Frequency Domain for Ultrafast Pump-Probe Performed Using Low Repetition Rate Lasers
Authors:
Durga Prasad Khatua,
Sabina Gurung,
Asha Singh,
Salahuddin Khan,
Tarun Kumar Sharma,
J. Jayabalan
Abstract:
Optical pump-probe spectroscopy is a powerful tool to directly probe the carrier dynamics in materials down to sub-femtosecond resolution. To perform such measurement, while kee** the pump induced perturbation to the sample as small as possible, it is essential to have a detection scheme with high signal to noise ratio. Achieving such high signal to noise ratio is easy with phase sensitive detec…
▽ More
Optical pump-probe spectroscopy is a powerful tool to directly probe the carrier dynamics in materials down to sub-femtosecond resolution. To perform such measurement, while kee** the pump induced perturbation to the sample as small as possible, it is essential to have a detection scheme with high signal to noise ratio. Achieving such high signal to noise ratio is easy with phase sensitive detection based on lock-in-amplifier when a high repetition rate laser is used as the optical pulse source. However such a lock-in-amplifier based method does not work well when a low repetition rate laser is used for the measurement. In this article, a sensitive detection scheme which combines the advantages of boxcar which rejects noise in time domain and lock-in-amplifier which isolates signal in frequency domain for performing pump-probe measurements using low-repetition rate laser system is proposed and experimentally demonstrated. A theoretical model to explain the process of signal detection and a method to reduce the pulse to pulse energy fluctuation in probe pulses is presented. By performing pump-probe measurements at various detection conditions the optimum condition required for obtaining transient absorption signal with low noise is presented. The reported technique is not limited to pump-probe measurements and can be easily modified to suite for other sensitive measurements at low-repetition rates.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Improved Adaptive Type-2 Fuzzy Filter with Exclusively Two Fuzzy Membership Function for Filtering Salt and Pepper Noise
Authors:
Vikas Singh,
Pooja Agrawal,
Teena Sharma,
Nishchal K. Verma
Abstract:
Image denoising is one of the preliminary steps in image processing methods in which the presence of noise can deteriorate the image quality. To overcome this limitation, in this paper a improved two-stage fuzzy filter is proposed for filtering salt and pepper noise from the images. In the first-stage, the pixels in the image are categorized as good or noisy based on adaptive thresholding using ty…
▽ More
Image denoising is one of the preliminary steps in image processing methods in which the presence of noise can deteriorate the image quality. To overcome this limitation, in this paper a improved two-stage fuzzy filter is proposed for filtering salt and pepper noise from the images. In the first-stage, the pixels in the image are categorized as good or noisy based on adaptive thresholding using type-2 fuzzy logic with exclusively two different membership functions in the filter window. In the second-stage, the noisy pixels are denoised using modified ordinary fuzzy logic in the respective filter window. The proposed filter is validated on standard images with various noise levels. The proposed filter removes the noise and preserves useful image characteristics, i.e., edges and corners at higher noise level. The performance of the proposed filter is compared with the various state-of-the-art methods in terms of peak signal-to-noise ratio and computation time. To show the effectiveness of filter statistical tests, i.e., Friedman test and Bonferroni-Dunn (BD) test are also carried out which clearly ascertain that the proposed filter outperforms in comparison of various filtering approaches.
△ Less
Submitted 10 August, 2020;
originally announced August 2020.
-
Computer and Network Security
Authors:
Jaydip Sen,
Sidra Mehtab,
Michael Ekonde Sone,
Veeramreddy Jyothsna,
Koneti Munivara Prasad,
Rajeev Singh,
Teek Parval Sharma,
Anton Noskov,
Ignacio Velasquez,
Angelica Caro,
Alfonco Rodriguez,
Tamer S. A. Fatayer,
Altaf O. Mulani,
Pradeep B. Mane,
Roshan Chitrakar,
Roshan Bhusal,
Prajwol Maharjan
Abstract:
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightwei…
▽ More
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduate and doctoral students who are working in the field of cryptography, network security and security and privacy issues in the Internet of Things (IoT), and machine learning application in security. It will also be useful for faculty members of graduate schools and universities.
△ Less
Submitted 31 July, 2020;
originally announced July 2020.
-
BIDEAL: A Toolbox for Bicluster Analysis -- Generation, Visualization and Validation
Authors:
Nishchal K. Verma,
T. Sharma,
S. Dixit,
P. Agrawal,
S. Sengupta,
V. Singh
Abstract:
This paper introduces a novel toolbox named BIDEAL for the generation of biclusters, their analysis, visualization, and validation. The objective is to facilitate researchers to use forefront biclustering algorithms embedded on a single platform. A single toolbox comprising various biclustering algorithms play a vital role to extract meaningful patterns from the data for detecting diseases, biomar…
▽ More
This paper introduces a novel toolbox named BIDEAL for the generation of biclusters, their analysis, visualization, and validation. The objective is to facilitate researchers to use forefront biclustering algorithms embedded on a single platform. A single toolbox comprising various biclustering algorithms play a vital role to extract meaningful patterns from the data for detecting diseases, biomarkers, gene-drug association, etc. BIDEAL consists of seventeen biclustering algorithms, three biclusters visualization techniques, and six validation indices. The toolbox can analyze several types of data, including biological data through a graphical user interface. It also facilitates data preprocessing techniques i.e., binarization, discretization, normalization, elimination of null and missing values. The effectiveness of the developed toolbox has been presented through testing and validations on Saccharomyces cerevisiae cell cycle, Leukemia cancer, Mammary tissue profile, and Ligand screen in B-cells datasets. The biclusters of these datasets have been generated using BIDEAL and evaluated in terms of coherency, differential co-expression ranking, and similarity measure. The visualization of generated biclusters has also been provided through a heat map and gene plot.
△ Less
Submitted 26 July, 2020;
originally announced July 2020.
-
Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones? -- A Case Study
Authors:
Tanusree Sharma,
Masooda Bashir
Abstract:
With smartphone technologies enhanced way of interacting with the world around us, it has also been paving the way for easier access to our private and personal information. This has been amplified by the existence of numerous embedded sensors utilized by millions of apps to users. While mobile apps have positively transformed many aspects of our lives with new functionalities, many of these appli…
▽ More
With smartphone technologies enhanced way of interacting with the world around us, it has also been paving the way for easier access to our private and personal information. This has been amplified by the existence of numerous embedded sensors utilized by millions of apps to users. While mobile apps have positively transformed many aspects of our lives with new functionalities, many of these applications are taking advantage of vast amounts of data, privacy apps, a form of Privacy Enhancing Technology can be an effective privacy management tool for smartphones. To protect against vulnerabilities related to the collection, storage, and sharing of sensitive data, developers are building numerous privacy apps. However, there has been a lack of discretion in this particular area which calls for a proper assessment to understand the far-reaching utilization of these apps among users. During this process we have conducted an evaluation of the most popular privacy apps from our total collection of five hundred and twelve to demonstrate their functionality specific data protections they are claiming to offer, both technologically and conventionally, measuring up to standards. Taking their offered security functionalities as a scale, we conducted forensic experiments to indicate where they are failing to be consistent in maintaining protection. For legitimate validation of security gaps in assessed privacy apps, we have also utilized NIST and OWASP guidelines. We believe this study will be efficacious for continuous improvement and can be considered as a foundation towards a common standard for privacy and security measures for an app's development stage.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Classification of Cuisines from Sequentially Structured Recipes
Authors:
Tript Sharma,
Utkarsh Upadhyay,
Ganesh Bagler
Abstract:
Cultures across the world are distinguished by the idiosyncratic patterns in their cuisines. These cuisines are characterized in terms of their substructures such as ingredients, cooking processes and utensils. A complex fusion of these substructures intrinsic to a region defines the identity of a cuisine. Accurate classification of cuisines based on their culinary features is an outstanding probl…
▽ More
Cultures across the world are distinguished by the idiosyncratic patterns in their cuisines. These cuisines are characterized in terms of their substructures such as ingredients, cooking processes and utensils. A complex fusion of these substructures intrinsic to a region defines the identity of a cuisine. Accurate classification of cuisines based on their culinary features is an outstanding problem and has hitherto been attempted to solve by accounting for ingredients of a recipe as features. Previous studies have attempted cuisine classification by using unstructured recipes without accounting for details of cooking techniques. In reality, the cooking processes/techniques and their order are highly significant for the recipe's structure and hence for its classification. In this article, we have implemented a range of classification techniques by accounting for this information on the RecipeDB dataset containing sequential data on recipes. The state-of-the-art RoBERTa model presented the highest accuracy of 73.30% among a range of classification models from Logistic Regression and Naive Bayes to LSTMs and Transformers.
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
Hierarchical Clustering of World Cuisines
Authors:
Tript Sharma,
Utkarsh Upadhyay,
Jushaan Kalra,
Sakshi Arora,
Saad Ahmad,
Bhavay Aggarwal,
Ganesh Bagler
Abstract:
Cultures across the world have evolved to have unique patterns despite shared ingredients and cooking techniques. Using data obtained from RecipeDB, an online resource for recipes, we extract patterns in 26 world cuisines and further probe for their inter-relatedness. By application of frequent itemset mining and ingredient authenticity we characterize the quintessential patterns in the cuisines a…
▽ More
Cultures across the world have evolved to have unique patterns despite shared ingredients and cooking techniques. Using data obtained from RecipeDB, an online resource for recipes, we extract patterns in 26 world cuisines and further probe for their inter-relatedness. By application of frequent itemset mining and ingredient authenticity we characterize the quintessential patterns in the cuisines and build a hierarchical tree of the world cuisines. This tree provides interesting insights into the evolution of cuisines and their geographical as well as historical relatedness.
△ Less
Submitted 25 April, 2020;
originally announced April 2020.
-
Inverse Design of Potential Singlet Fission Molecules using a Transfer Learning Based Approach
Authors:
Akshay Subramanian,
Utkarsh Saha,
Tejasvini Sharma,
Naveen K. Tailor,
Soumitra Satapathi
Abstract:
Singlet fission has emerged as one of the most exciting phenomena known to improve the efficiencies of different types of solar cells and has found uses in diverse optoelectronic applications. The range of available singlet fission molecules is, however, limited as to undergo singlet fission, molecules have to satisfy certain energy conditions. Recent advances in material search using inverse desi…
▽ More
Singlet fission has emerged as one of the most exciting phenomena known to improve the efficiencies of different types of solar cells and has found uses in diverse optoelectronic applications. The range of available singlet fission molecules is, however, limited as to undergo singlet fission, molecules have to satisfy certain energy conditions. Recent advances in material search using inverse design has enabled the prediction of materials for a wide range of applications and has emerged as one of the most efficient methods in the discovery of suitable materials. It is particularly helpful in manipulating large datasets, uncovering hidden information from the molecular dataset and generating new structures. However, we seldom encounter large datasets in structure prediction problems in material science. In our work, we put forward inverse design of possible singlet fission molecules using a transfer learning based approach where we make use of a much larger ChEMBL dataset of structurally similar molecules to transfer the learned characteristics to the singlet fission dataset.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Constraining Conformal Theories in Large Dimensions
Authors:
Abhijit Gadde,
Trakshu Sharma
Abstract:
In this paper, we analyze the constraints imposed by unitarity and crossing symmetry on conformal theories in large dimensions. In particular, we show that in a unitary conformal theory in large dimension $D$, the four-point function of identical scalar operators $φ$ with scaling dimension $Δ_φ$ such that $Δ_φ/D<3/4$, is necessarily that of the generalized free field theory. This result follows on…
▽ More
In this paper, we analyze the constraints imposed by unitarity and crossing symmetry on conformal theories in large dimensions. In particular, we show that in a unitary conformal theory in large dimension $D$, the four-point function of identical scalar operators $φ$ with scaling dimension $Δ_φ$ such that $Δ_φ/D<3/4$, is necessarily that of the generalized free field theory. This result follows only from crossing symmetry and unitarity. In particular, we do not impose the existence of a conserved spin two operator (stress tensor). We also present an argument to extend the applicability of this result to a larger range of conformal dimensions, namely to $Δ_φ/D<1$. This extension requires some reasonable assumptions about the spectrum of light operators. Together, these results suggest that if there is a non-trivial conformal theory in large dimensions, not necessarily having a stress tensor, then its relevant operators must be exponentially weakly coupled with the rest.
△ Less
Submitted 24 February, 2020;
originally announced February 2020.
-
Audio-Visual Decision Fusion for WFST-based and seq2seq Models
Authors:
Rohith Aralikatti,
Sharad Roy,
Abhinav Thanda,
Dilip Kumar Margam,
Pujitha Appan Kandala,
Tanay Sharma,
Shankar M Venkatesan
Abstract:
Under noisy conditions, speech recognition systems suffer from high Word Error Rates (WER). In such cases, information from the visual modality comprising the speaker lip movements can help improve the performance. In this work, we propose novel methods to fuse information from audio and visual modalities at inference time. This enables us to train the acoustic and visual models independently. Fir…
▽ More
Under noisy conditions, speech recognition systems suffer from high Word Error Rates (WER). In such cases, information from the visual modality comprising the speaker lip movements can help improve the performance. In this work, we propose novel methods to fuse information from audio and visual modalities at inference time. This enables us to train the acoustic and visual models independently. First, we train separate RNN-HMM based acoustic and visual models. A common WFST generated by taking a special union of the HMM components is used for decoding using a modified Viterbi algorithm. Second, we train separate seq2seq acoustic and visual models. The decoding step is performed simultaneously for both modalities using shallow fusion while maintaining a common hypothesis beam. We also present results for a novel seq2seq fusion without the weighing parameter. We present results at varying SNR and show that our methods give significant improvements over acoustic-only WER.
△ Less
Submitted 29 January, 2020;
originally announced January 2020.
-
Correlation functions in ${\cal N}=2$ Supersymmetric vector matter Chern-Simons theory
Authors:
Karthik Inbasekar,
Sachin Jain,
Vinay Malvimat,
Abhishek Mehta,
Pranjal Nayak,
Tarun Sharma
Abstract:
We compute the two, three point function of the opearators in the spin zero multiplet of ${\cal N}=2$ Supersymmetric vector matter Chern-Simons theory at large $N$ and at all orders of 't Hooft coupling by solving the Schwinger-Dyson equation. Schwinger-Dyson method to compute four point function becomes extremely complicated and hence we use bootstrap method to solve for four point function of sc…
▽ More
We compute the two, three point function of the opearators in the spin zero multiplet of ${\cal N}=2$ Supersymmetric vector matter Chern-Simons theory at large $N$ and at all orders of 't Hooft coupling by solving the Schwinger-Dyson equation. Schwinger-Dyson method to compute four point function becomes extremely complicated and hence we use bootstrap method to solve for four point function of scaler operator $J_0^{f}=\barψψ$ and $J_0^{b}=\barφφ$. Interestingly, due to the fact that $\langle J_0^{f}J_0^{f}J_0^{b} \rangle$ is a contact term, the four point function of $ J_0^{f}$ operator looks like that of free theory up to overall coupling constant dependent factors and up to some bulk AdS contact terms. On the other hand the $J_0^{b}$ four-point function receives an additional contribution compared to the free theory expression due to the $J_0^{f}$ exchange. Interestingly, double discontinuity of this single trace operator $J_0^{f}$ vanishes and hence it only contributes to AdS-contact term.
△ Less
Submitted 26 July, 2019;
originally announced July 2019.
-
LipReading with 3D-2D-CNN BLSTM-HMM and word-CTC models
Authors:
Dilip Kumar Margam,
Rohith Aralikatti,
Tanay Sharma,
Abhinav Thanda,
Pujitha A K,
Sharad Roy,
Shankar M Venkatesan
Abstract:
In recent years, deep learning based machine lipreading has gained prominence. To this end, several architectures such as LipNet, LCANet and others have been proposed which perform extremely well compared to traditional lipreading DNN-HMM hybrid systems trained on DCT features. In this work, we propose a simpler architecture of 3D-2D-CNN-BLSTM network with a bottleneck layer. We also present analy…
▽ More
In recent years, deep learning based machine lipreading has gained prominence. To this end, several architectures such as LipNet, LCANet and others have been proposed which perform extremely well compared to traditional lipreading DNN-HMM hybrid systems trained on DCT features. In this work, we propose a simpler architecture of 3D-2D-CNN-BLSTM network with a bottleneck layer. We also present analysis of two different approaches for lipreading on this architecture. In the first approach, 3D-2D-CNN-BLSTM network is trained with CTC loss on characters (ch-CTC). Then BLSTM-HMM model is trained on bottleneck lip features (extracted from 3D-2D-CNN-BLSTM ch-CTC network) in a traditional ASR training pipeline. In the second approach, same 3D-2D-CNN-BLSTM network is trained with CTC loss on word labels (w-CTC). The first approach shows that bottleneck features perform better compared to DCT features. Using the second approach on Grid corpus' seen speaker test set, we report $1.3\%$ WER - a $55\%$ improvement relative to LCANet. On unseen speaker test set we report $8.6\%$ WER which is $24.5\%$ improvement relative to LipNet. We also verify the method on a second dataset of $81$ speakers which we collected. Finally, we also discuss the effect of feature duplication on BLSTM-HMM model performance.
△ Less
Submitted 25 June, 2019;
originally announced June 2019.
-
Data Consortia
Authors:
Eric Bax,
John Donald,
Melissa Gerber,
Lisa Giaffo,
Tanisha Sharma,
Nikki Thompson,
Kimberly Williams
Abstract:
Today, web-based companies use user data to provide and enhance services to users, both individually and collectively. Some also analyze user data for other purposes, for example to select advertisements or price offers for users. Some even use or allow the data to be used to evaluate investments in financial markets. Users' concerns about how their data is or may be used has prompted legislative…
▽ More
Today, web-based companies use user data to provide and enhance services to users, both individually and collectively. Some also analyze user data for other purposes, for example to select advertisements or price offers for users. Some even use or allow the data to be used to evaluate investments in financial markets. Users' concerns about how their data is or may be used has prompted legislative action in the European Union and congressional questioning in the United States. But data can also benefit society, for example giving early warnings for disease outbreaks, allowing in-depth study of relationships between genetics and disease, and elucidating local and macroeconomic trends in a timely manner. So, instead of just a focus on privacy, in the future, users may insist that their data be used on their behalf. We explore potential frameworks for groups of consenting, informed users to pool their data for their own benefit and that of society, discussing directions, challenges, and evolution for such efforts.
△ Less
Submitted 27 June, 2019;
originally announced June 2019.
-
On the Feasibility of Transfer-learning Code Smells using Deep Learning
Authors:
Tushar Sharma,
Vasiliki Efstathiou,
Panos Louridas,
Diomidis Spinellis
Abstract:
Context: A substantial amount of work has been done to detect smells in source code using metrics-based and heuristics-based methods. Machine learning methods have been recently applied to detect source code smells; however, the current practices are considered far from mature. Objective: First, explore the feasibility of applying deep learning models to detect smells without extensive feature eng…
▽ More
Context: A substantial amount of work has been done to detect smells in source code using metrics-based and heuristics-based methods. Machine learning methods have been recently applied to detect source code smells; however, the current practices are considered far from mature. Objective: First, explore the feasibility of applying deep learning models to detect smells without extensive feature engineering, just by feeding the source code in tokenized form. Second, investigate the possibility of applying transfer-learning in the context of deep learning models for smell detection. Method: We use existing metric-based state-of-the-art methods for detecting three implementation smells and one design smell in C# code. Using these results as the annotated gold standard, we train smell detection models on three different deep learning architectures. These architectures use Convolution Neural Networks (CNNs) of one or two dimensions, or Recurrent Neural Networks (RNNs) as their principal hidden layers. For the first objective of our study, we perform training and evaluation on C# samples, whereas for the second objective, we train the models from C# code and evaluate the models over Java code samples. We perform the experiments with various combinations of hyper-parameters for each model. Results: We find it feasible to detect smells using deep learning methods. Our comparative experiments find that there is no clearly superior method between CNN-1D and CNN-2D. We also observe that performance of the deep learning models is smell-specific. Our transfer-learning experiments show that transfer-learning is definitely feasible for implementation smells with performance comparable to that of direct-learning. This work opens up a new paradigm to detect code smells by transfer-learning especially for the programming languages where the comprehensive code smell detection tools are not available.
△ Less
Submitted 16 September, 2019; v1 submitted 5 April, 2019;
originally announced April 2019.
-
Scrutiny of stagnation region flow in a nanofluid suspended permeable medium due to inconsistent heat source/sink
Authors:
Rakesh Kumar,
Ravinder Kumar,
Tanya Sharma
Abstract:
In present analysis, nanofluid transport near to a stagnation region over a bidirectionally deforming surface is scrutinized. The region is embedded with Darcy-Forchheimer medium which supports permeability. The porous matrix is suspended with nanofluid, and surface is under the influence of inconsistent heat source/sink. Using similarity functions, framed governing equations are switched to a col…
▽ More
In present analysis, nanofluid transport near to a stagnation region over a bidirectionally deforming surface is scrutinized. The region is embedded with Darcy-Forchheimer medium which supports permeability. The porous matrix is suspended with nanofluid, and surface is under the influence of inconsistent heat source/sink. Using similarity functions, framed governing equations are switched to a collection of ordinary differential equations. Output is procured via optimal homotopy asymptotic method (OHAM). Basic notion of OHAM for a vector differential set-up is presented along with required convergence theorems. At different flow stagnation strengths, nanofluid behavior is investigated with respect to variations in porosity parameter, Forchheimer number, Brownian motion, stretching ratio, thermophoretic force, heat source/sink and Schimdt number. Stagnation flow strength invert the pattern of boundary layer profiles of primary velocity. Heat transfer has straightforward relation with Forchheimer number when stagnation forces dominate stretching forces
△ Less
Submitted 5 June, 2020; v1 submitted 2 April, 2019;
originally announced April 2019.
-
Choose Your Neuron: Incorporating Domain Knowledge through Neuron-Importance
Authors:
Ramprasaath R. Selvaraju,
Prithvijit Chattopadhyay,
Mohamed Elhoseiny,
Tilak Sharma,
Dhruv Batra,
Devi Parikh,
Stefan Lee
Abstract:
Individual neurons in convolutional neural networks supervised for image-level classification tasks have been shown to implicitly learn semantically meaningful concepts ranging from simple textures and shapes to whole or partial objects - forming a "dictionary" of concepts acquired through the learning process. In this work we introduce a simple, efficient zero-shot learning approach based on this…
▽ More
Individual neurons in convolutional neural networks supervised for image-level classification tasks have been shown to implicitly learn semantically meaningful concepts ranging from simple textures and shapes to whole or partial objects - forming a "dictionary" of concepts acquired through the learning process. In this work we introduce a simple, efficient zero-shot learning approach based on this observation. Our approach, which we call Neuron Importance-AwareWeight Transfer (NIWT), learns to map domain knowledge about novel "unseen" classes onto this dictionary of learned concepts and then optimizes for network parameters that can effectively combine these concepts - essentially learning classifiers by discovering and composing learned semantic concepts in deep networks. Our approach shows improvements over previous approaches on the CUBirds and AWA2 generalized zero-shot learning benchmarks. We demonstrate our approach on a diverse set of semantic inputs as external domain knowledge including attributes and natural language captions. Moreover by learning inverse map**s, NIWT can provide visual and textual explanations for the predictions made by the newly learned classifiers and provide neuron names. Our code is available at https://github.com/ramprs/neuron-importance-zsl.
△ Less
Submitted 8 August, 2018;
originally announced August 2018.
-
Global SNR Estimation of Speech Signals using Entropy and Uncertainty Estimates from Dropout Networks
Authors:
Rohith Aralikatti,
Dilip Margam,
Tanay Sharma,
Thanda Abhinav,
Shankar M Venkatesan
Abstract:
This paper demonstrates two novel methods to estimate the global SNR of speech signals. In both methods, Deep Neural Network-Hidden Markov Model (DNN-HMM) acoustic model used in speech recognition systems is leveraged for the additional task of SNR estimation. In the first method, the entropy of the DNN-HMM output is computed. Recent work on bayesian deep learning has shown that a DNN-HMM trained…
▽ More
This paper demonstrates two novel methods to estimate the global SNR of speech signals. In both methods, Deep Neural Network-Hidden Markov Model (DNN-HMM) acoustic model used in speech recognition systems is leveraged for the additional task of SNR estimation. In the first method, the entropy of the DNN-HMM output is computed. Recent work on bayesian deep learning has shown that a DNN-HMM trained with dropout can be used to estimate model uncertainty by approximating it as a deep Gaussian process. In the second method, this approximation is used to obtain model uncertainty estimates. Noise specific regressors are used to predict the SNR from the entropy and model uncertainty. The DNN-HMM is trained on GRID corpus and tested on different noise profiles from the DEMAND noise database at SNR levels ranging from -10 dB to 30 dB.
△ Less
Submitted 12 April, 2018;
originally announced April 2018.
-
Dual Superconformal Symmetry of ${\cal N}=2$ Chern-Simons theory with Fundamental Matter at Large $N$
Authors:
Karthik Inbasekar,
Sachin Jain,
Sucheta Majumdar,
Pranjal Nayak,
Turmoli Neogi,
Tarun Sharma,
Ritam Sinha,
V Umesh
Abstract:
Dual conformal symmetry and Yangian symmetry are symmetries of amplitudes that have aided the study of scattering amplitudes in highly supersymmetric theories like ${\cal N}=4$ SYM and ABJM. However, in general such symmetries are absent from the theories with lesser or no supersymmetry. In this paper, we show that the tree level $2\to 2$ scattering amplitude in the 3d ${\cal N}=2$ Chern-Simons th…
▽ More
Dual conformal symmetry and Yangian symmetry are symmetries of amplitudes that have aided the study of scattering amplitudes in highly supersymmetric theories like ${\cal N}=4$ SYM and ABJM. However, in general such symmetries are absent from the theories with lesser or no supersymmetry. In this paper, we show that the tree level $2\to 2$ scattering amplitude in the 3d ${\cal N}=2$ Chern-Simons theory coupled to a fundamental chiral multiplet is dual superconformal invariant. In the 't Hooft large $N$ limit, the $2\to 2$ scattering amplitude in this theory has been shown to be tree-level exact in non-anyonic channels, while having only an overall multiplicative coupling dependent renormalisation in the anyonic channel. Therefore, the dual superconformal symmetry that we demonstrate in this paper is all loop exact. This is unlike the previously studied highly supersymmetric theories where dual superconformal symmetry is anomalous at loop levels.
Furthermore, we reverse the argument to study the extent to which dual superconformal invariance fixes the scattering amplitude in an ${\cal N}=2$ supersymmetric theory. We demonstrate that requiring the dual superconformal invariance completely fixes the momentum dependence of the $2\to2$ amplitude, while the coupling constant dependence remain unfixed. Further, we use a combination of parity invariance, unitarity and self-duality of the amplitude to constrain the coupling dependence of scattering amplitude.
△ Less
Submitted 17 June, 2019; v1 submitted 7 November, 2017;
originally announced November 2017.
-
Fabrication of plasmonic surface relief gratings for the application of band-pass filter in UV-Visible spectral range
Authors:
Sudheer,
S. Porwal,
S. Bhartiya,
C. Mukherjee,
P. Tiwari,
T. K. Sharma,
V. N. Rai,
A. K. Srivastava
Abstract:
The measured experimental results of optical diffraction of 10, 5 and 3.4 micrometer period plasmonic surface relief grating are presented for the application of band-pass filter in visible spectral range. Conventional scanning electron microscopic (SEM) is used to fabricate the grating structures on the silver halide based film (substrate) by exposing the electron beam in raster scan fashion. Mor…
▽ More
The measured experimental results of optical diffraction of 10, 5 and 3.4 micrometer period plasmonic surface relief grating are presented for the application of band-pass filter in visible spectral range. Conventional scanning electron microscopic (SEM) is used to fabricate the grating structures on the silver halide based film (substrate) by exposing the electron beam in raster scan fashion. Morphological characterization of the gratings is performed by atomic force microscopy (AFM) shows that the period, height and profile depends on the line per frame, beam spot, single line dwell time, beam current, and accelerating voltage of the electron beam. Optical transmission spectra of 10 micrometer period grating shows a well-defined localized surface plasmon resonance (LSPR) dip at ~366 nm wavelength corresponding to gelatin embedded silver nanoparticles of the grating structure. As the period of the grating reduces LSPR dip becomes prominent. The maximum first order diffraction efficiency (DE) and bandwidth for 10 micrometer period grating are observed as 4% and 400 nm in 350 nm to 800 nm wavelength range respectively. The DE and bandwidth are reduced up to 0.03% and 100 nm for 3.4 micrometer period grating. The profile of DE is significantly flat within the diffraction bandwidth for each of the gratings. An assessment of the particular role of LSPR absorption and varied grating period in the development of the profile of first order DE v/s wavelength are studied. Fabrication of such nano-scale structures in a large area using conventional SEM and silver halide based films may provide the simple and efficient technique for various optical devices applications.
△ Less
Submitted 4 July, 2017;
originally announced August 2017.
-
Note on gauge and gravitational anomalies of discrete $Z_N$ symmetries
Authors:
Pritibhajan Byakti,
Diptimoy Ghosh,
Tarun Sharma
Abstract:
In this note, we discuss the consistency conditions which a discrete $Z_N$ symmetry should satisfy in order that it is not violated by gauge and gravitational instantons. As examples, we enlist all the $Z_N$ ${\cal R}$-symmetries as well as non-${\cal R}$ $Z_N$ symmetries (N=2,3,4) in the minimally supersymmetric standard model (MSSM) that are free from gauge and gravitational anomalies. We show t…
▽ More
In this note, we discuss the consistency conditions which a discrete $Z_N$ symmetry should satisfy in order that it is not violated by gauge and gravitational instantons. As examples, we enlist all the $Z_N$ ${\cal R}$-symmetries as well as non-${\cal R}$ $Z_N$ symmetries (N=2,3,4) in the minimally supersymmetric standard model (MSSM) that are free from gauge and gravitational anomalies. We show that there exists non-anomalous discrete symmetries that forbid Baryon number violation up to dimension 6 level (in superspace). We also observe that there exists no non-anomalous $Z_3$ ${\cal R}$-symmetry in the MSSM. Furthermore, we point out that in a theory with one Majorana spin 3/2 gravitino, a large class of $Z_4$ ${\cal R}$-symmetries are violated in the presence of Eguchi-Hanson (EH) gravitational instanton. This is also in general true for higher $Z_N$ ${\cal R}$-symmetries. We also notice that in 4 dimensional ${\cal N}=1$ supergravity, the global $U(1)$ ${\cal R}$-symmetry is always violated by the EH instanton irrespective of the matter content of the theory.
△ Less
Submitted 26 December, 2017; v1 submitted 12 July, 2017;
originally announced July 2017.
-
What are the visual features underlying human versus machine vision?
Authors:
Drew Linsley,
Sven Eberhardt,
Tarun Sharma,
Pankaj Gupta,
Thomas Serre
Abstract:
Although Deep Convolutional Networks (DCNs) are approaching the accuracy of human observers at object recognition, it is unknown whether they leverage similar visual representations to achieve this performance. To address this, we introduce Clicktionary, a web-based game for identifying visual features used by human observers during object recognition. Importance maps derived from the game are con…
▽ More
Although Deep Convolutional Networks (DCNs) are approaching the accuracy of human observers at object recognition, it is unknown whether they leverage similar visual representations to achieve this performance. To address this, we introduce Clicktionary, a web-based game for identifying visual features used by human observers during object recognition. Importance maps derived from the game are consistent across participants and uncorrelated with image saliency measures. These results suggest that Clicktionary identifies image regions that are meaningful and diagnostic for object recognition but different than those driving eye movements. Surprisingly, Clicktionary importance maps are only weakly correlated with relevance maps derived from DCNs trained for object recognition. Our study demonstrates that the narrowing gap between the object recognition accuracy of human observers and DCNs obscures distinct visual strategies used by each to achieve this performance.
△ Less
Submitted 7 November, 2017; v1 submitted 10 January, 2017;
originally announced January 2017.
-
Multiple K Means++ Clustering of Satellite Image Using Hadoop MapReduce and Spark
Authors:
Tapan Sharma,
Dr. Vinod Shokeen,
Dr. Sunil Mathur
Abstract:
Clustering of image is one of the important steps of mining satellite images. In our experiment we have simultaneously run multiple K-means algorithms with different initial centroids and values of k in the same iteration of MapReduce jobs. For initialization of initial centroids we have implemented Scalable K-Means++ MapReduce (MR) job [1]. We have also run a validation algorithm of Simplified Si…
▽ More
Clustering of image is one of the important steps of mining satellite images. In our experiment we have simultaneously run multiple K-means algorithms with different initial centroids and values of k in the same iteration of MapReduce jobs. For initialization of initial centroids we have implemented Scalable K-Means++ MapReduce (MR) job [1]. We have also run a validation algorithm of Simplified Silhouette Index [2] for multiple clustering outputs, again in the same iteration of MR jobs. This paper explored the behavior of above mentioned clustering algorithms when run on big data platforms like MapReduce and Spark jobs. Spark has been chosen as it is popular for fast processing particularly where iterations are involved.
△ Less
Submitted 5 May, 2016;
originally announced May 2016.
-
Balanced Ranking Mechanisms
Authors:
Debasis Mishra,
Tridib Sharma
Abstract:
In the private values single object auction model, we construct a satisfactory mechanism - a symmetric, dominant strategy incentive compatible, and budget-balanced mechanism. Our mechanism allocates the object to the highest valued agent with more than 99% probability provided there are at least 14 agents. It is also ex-post individually rational. We show that our mechanism is optimal in a restric…
▽ More
In the private values single object auction model, we construct a satisfactory mechanism - a symmetric, dominant strategy incentive compatible, and budget-balanced mechanism. Our mechanism allocates the object to the highest valued agent with more than 99% probability provided there are at least 14 agents. It is also ex-post individually rational. We show that our mechanism is optimal in a restricted class of satisfactory ranking mechanisms. Since achieving efficiency through a dominant strategy incentive compatible and budget-balanced mechanism is impossible in this model, our results illustrate the limits of this impossibility.
△ Less
Submitted 28 April, 2016;
originally announced April 2016.
-
The 750 GeV diphoton resonance as an sgoldstino: a reappraisal
Authors:
Debjyoti Bardhan,
Pritibhajan Byakti,
Diptimoy Ghosh,
Tarun Sharma
Abstract:
Among the various explanations of the possible 750 GeV diphoton resonance, the possibility of it being an sgoldstino is an attractive one, as it is related to the spontaneous breaking of global supersymmetry. We discuss this possibility in this paper and point out the various theoretical issues associated with it. In particular, we indicate the difficulties of this explanation in realistic models…
▽ More
Among the various explanations of the possible 750 GeV diphoton resonance, the possibility of it being an sgoldstino is an attractive one, as it is related to the spontaneous breaking of global supersymmetry. We discuss this possibility in this paper and point out the various theoretical issues associated with it. In particular, we indicate the difficulties of this explanation in realistic models of gauge mediated supersymmetry breaking.
△ Less
Submitted 11 June, 2016; v1 submitted 16 March, 2016;
originally announced March 2016.
-
Private Data Transfer over a Broadcast Channel
Authors:
Manoj Mishra,
Tanmay Sharma,
Bikash K. Dey,
Vinod M. Prabhakaran
Abstract:
We study the following private data transfer problem: Alice has a database of files. Bob and Cathy want to access a file each from this database (which may or may not be the same file), but each of them wants to ensure that their choices of file do not get revealed even if Alice colludes with the other user. Alice, on the other hand, wants to make sure that each of Bob and Cathy does not learn any…
▽ More
We study the following private data transfer problem: Alice has a database of files. Bob and Cathy want to access a file each from this database (which may or may not be the same file), but each of them wants to ensure that their choices of file do not get revealed even if Alice colludes with the other user. Alice, on the other hand, wants to make sure that each of Bob and Cathy does not learn any more information from the database than the files they demand (the identities of which will be unknown to her). Moreover, they should not learn any information about the other files even if they collude.
It turns out that it is impossible to accomplish this if Alice, Bob, and Cathy have access only to private randomness and noiseless communication links. We consider this problem when a binary erasure broadcast channel with independent erasures is available from Alice to Bob and Cathy in addition to a noiseless public discussion channel. We study the file-length-per-broadcast-channel-use rate in the honest-but-curious model. We focus on the case when the database consists of two files, and obtain the optimal rate. We then extend to the case of larger databases, and give upper and lower bounds on the optimal rate.
△ Less
Submitted 16 April, 2015; v1 submitted 5 April, 2015;
originally announced April 2015.
-
On monopole operators in supersymmetric Chern-Simons-matter theories
Authors:
Ofer Aharony,
Prithvi Narayan,
Tarun Sharma
Abstract:
We discuss monopole operators in $U(N_c)$ Chern-Simons-matter theories in three space-time dimensions. We mention an apparent problem in the matching of such operators in dualities between non-supersymmetric theories, and suggest a possible resolution. A similar apparent problem exists in the map** of chiral monopole operators in theories with ${\cal N}=2$ supersymmetry. We show that in many the…
▽ More
We discuss monopole operators in $U(N_c)$ Chern-Simons-matter theories in three space-time dimensions. We mention an apparent problem in the matching of such operators in dualities between non-supersymmetric theories, and suggest a possible resolution. A similar apparent problem exists in the map** of chiral monopole operators in theories with ${\cal N}=2$ supersymmetry. We show that in many theories the lowest naive chiral monopole operator is actually not chiral, and we find the lowest monopole operator that is actually chiral in these theories. It turns out that there are several different forms of this operator, depending on the number of colors, the number of flavours, and the Chern-Simons level. Since we use the supersymmetric index to find the lowest chiral monopoles, our results for these monopoles are guaranteed to be invariant under the dualities in supersymmetric theories. The theories we discuss are believed to be dual in the 't~Hooft large $N_c$ limit to classical high-spin gravity theories. We argue that these theories (supersymmetric or not) should not have classical solutions charged under the $U(1)$ gauge field in the high-spin multiplet.
△ Less
Submitted 8 March, 2015; v1 submitted 3 February, 2015;
originally announced February 2015.
-
Development of high power quantum well lasers at RRCAT
Authors:
T. K. Sharma,
Tapas Ganguli,
V. K. Dixit,
S. D. Singh,
S. Pal,
S. Porwal,
Ravi Kumar,
Alexander Khakha,
R. Jangir,
V. Kheraj,
P. Rawat,
A. K. Nath
Abstract:
We at RRCAT have recently developed high power laser diodes in the wavelength range of 740 to 1000 nm. A typical semiconductor laser structure is consisted of about 10 epilayers with different composition, thickness and do** values. For example, a laser diode operating at 0.8 micron has either GaAs or GaAsP quantum well as an active layer. The quantum well is sandwiched between AlGaAs wider band…
▽ More
We at RRCAT have recently developed high power laser diodes in the wavelength range of 740 to 1000 nm. A typical semiconductor laser structure is consisted of about 10 epilayers with different composition, thickness and do** values. For example, a laser diode operating at 0.8 micron has either GaAs or GaAsP quantum well as an active layer. The quantum well is sandwiched between AlGaAs wider bandgap waveguide and cladding layers. The complete laser structure is grown by metal organic vapour phase epitaxy technique and devices are fabricated through standard procedure using photolithography. We recently achieved about 5.3 Watt peak power at 853 nm. These laser diodes were tested under pulsed operation at room temperature for 500 nanosecond pulse duration with a duty cycle of 1:1000. Laser diode arrays consisting of 6-10 elements were also developed and tested for operation in pulsed mode at room temperature.
△ Less
Submitted 4 December, 2014;
originally announced December 2014.
-
Analysis of Email Fraud detection using WEKA Tool
Authors:
Tarushi Sharma,
AmanPreet Kaur
Abstract:
Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperienced users can connect data and make responsive associations. Therefore we must to implement the privacy of persons while working on practical data mining
Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperienced users can connect data and make responsive associations. Therefore we must to implement the privacy of persons while working on practical data mining
△ Less
Submitted 5 May, 2014;
originally announced May 2014.
-
Effect of Strain disorder on the magnetic glassy state in La5/8-yPryCa3/8MnO3 (y = 0.45) thin films
Authors:
Dileep K. Mishra,
V. G. Sathe,
R. Rawat,
V. Ganesan,
Ravi Kumar,
T. K. Sharma
Abstract:
Present study reveals that the free energy landscape of the La5/8-yPryCa3/8MnO3 (LPCMO) system could be modified by elastic strain interaction in the epitaxial thin films. Epitaxial LPCMO thin films of various thicknesses are grown on LaAlO3 substrate by pulsed laser deposition. With increasing thickness, by virtue of island growth morphology, strain disorder is invoked in thin films during strain…
▽ More
Present study reveals that the free energy landscape of the La5/8-yPryCa3/8MnO3 (LPCMO) system could be modified by elastic strain interaction in the epitaxial thin films. Epitaxial LPCMO thin films of various thicknesses are grown on LaAlO3 substrate by pulsed laser deposition. With increasing thickness, by virtue of island growth morphology, strain disorder is invoked in thin films during strain relaxation process. The length-scale of phase separation is found to be highly correlated with strain disorder. Magneto-transport measurements demonstrate that coherent strain stabilizes charge ordered insulating phase while strain disorder stabilizes metallic phase. Resistivity under cooling and heating in unequal field (CHUF) protocol exhibits lower value of freezing temperature for strain disordered films compared to bulk system. Raman spectroscopy reveals that the charge ordered insulating and ferromagnetic metallic phases are structurally dissimilar and possess monoclinic and rhombohedral like symmetries respectively. Interfaces between two phases strongly influence low temperature glassy metastable state resulting in different phase separation states in the LPCMO thin films.
△ Less
Submitted 24 September, 2013;
originally announced September 2013.
-
Superspace formulation and correlation functions of 3d superconformal field theories
Authors:
Amin A. Nizami,
Tarun Sharma,
V. Umesh
Abstract:
We study $3d$ SCFTs in the superspace formalism and discuss superfields and on-shell higher spin current multiplets in free $3d$ SCFTs with $\mathcal{N}= 1,2,3,4$ and $6$ superconformal symmetry. For $\mathcal{N}=1$ 3d SCFTs we determine the superconformal invariants in superspace needed for constructing 3-point functions of higher spin operators, find the non-linear relations between the invarian…
▽ More
We study $3d$ SCFTs in the superspace formalism and discuss superfields and on-shell higher spin current multiplets in free $3d$ SCFTs with $\mathcal{N}= 1,2,3,4$ and $6$ superconformal symmetry. For $\mathcal{N}=1$ 3d SCFTs we determine the superconformal invariants in superspace needed for constructing 3-point functions of higher spin operators, find the non-linear relations between the invariants and consequently write down all the independent invariant structures, both parity even and odd, for various 3-point functions of higher spin operators.
△ Less
Submitted 8 July, 2014; v1 submitted 22 August, 2013;
originally announced August 2013.
-
Modification in structural, dielectric and magnetic properties of La and Nd co-substituted epitaxial BiFeO3 thin films
Authors:
Anju Ahlawat,
S. Satapathy,
V. G. Sathe,
R. J. Choudhary,
M. K. Singh,
Ravi Kumar,
T. K. Sharma,
P. K. Gupta
Abstract:
The influence of La and Nd co-substitution on the structural and magnetic properties of BiFeO3 (BFO) thin films was examined. Epitaxial thin films of pure and, La and Nd co-doped BFO on the SrRuO3 buffered single crystal SrTiO3 (001) substrate were deposited using pulsed laser deposition. The structural change in co doped La and Nd BFO thin films which was caused by the changes of force constant i…
▽ More
The influence of La and Nd co-substitution on the structural and magnetic properties of BiFeO3 (BFO) thin films was examined. Epitaxial thin films of pure and, La and Nd co-doped BFO on the SrRuO3 buffered single crystal SrTiO3 (001) substrate were deposited using pulsed laser deposition. The structural change in co doped La and Nd BFO thin films which was caused by the changes of force constant in the crystal lattice induced by ionic radii mismatch was investigated. Raman spectroscopy studies manifest the structural change in doped BFO films from rhombohedral to monoclinic distorted phase which is induced by the co substitution of La and Nd. Room temperature magnetic hysteresis curves indicated that saturation magnetization is enhanced in the doped film with saturation magnetization of ~20 emu/cm3. The dielectric and magnetic properties are effectively improved in BLNFO films compared to pure BFO thin films.
△ Less
Submitted 18 June, 2013;
originally announced June 2013.
-
Adaptive Energy Aware Data Aggregation Tree for Wireless Sensor Networks
Authors:
Deepali Virmani,
Tanu Sharma,
Ritu Sharma
Abstract:
To meet the demands of wireless sensor networks (WSNs) where data are usually aggregated at a single source prior to transmitting to any distant user, there is a need to establish a tree structure inside to aggregate data. In this paper, an adaptive energy aware data aggregation tree (AEDT) is proposed. The proposed tree uses the maximum energy available node as the data aggregator node. The tree…
▽ More
To meet the demands of wireless sensor networks (WSNs) where data are usually aggregated at a single source prior to transmitting to any distant user, there is a need to establish a tree structure inside to aggregate data. In this paper, an adaptive energy aware data aggregation tree (AEDT) is proposed. The proposed tree uses the maximum energy available node as the data aggregator node. The tree incorporates sleep and awake technology where the communicating node and the parent node are only in awake state rest all the nodes go to sleep state saving the network energy and enhancing the network lifetime. When the traffic load crosses the threshold value, then the packets are accepted adaptively according to the communication capacity of the parent node. The proposed tree maintains a memory table which stores the value of each selected path. Path selection is based on shortest path algorithm where the node with highest available energy is always selected as forwarding node. By simulation results, we show that our proposed tree enhances network lifetime minimizes energy consumption and achieves good delivery ratio with reduced delay.
△ Less
Submitted 5 February, 2013;
originally announced February 2013.
-
Phases of large $N$ vector Chern-Simons theories on $S^2 \times S^1$
Authors:
Sachin Jain,
Shiraz Minwalla,
Tarun Sharma,
Tomohisa Takimi,
Spenta R. Wadia,
Shuichi Yokoyama
Abstract:
We study the thermal partition function of level $k$ U(N) Chern-Simons theories on $S^2$ interacting with matter in the fundamental representation. We work in the 't Hooft limit, $N,k\to\infty$, with $λ= N/k$ and $\frac{T^2 V_{2}}{N}$ held fixed where $T$ is the temperature and $V_{2}$ the volume of the sphere. An effective action proposed in arXiv:1211.4843 relates the partition function to the e…
▽ More
We study the thermal partition function of level $k$ U(N) Chern-Simons theories on $S^2$ interacting with matter in the fundamental representation. We work in the 't Hooft limit, $N,k\to\infty$, with $λ= N/k$ and $\frac{T^2 V_{2}}{N}$ held fixed where $T$ is the temperature and $V_{2}$ the volume of the sphere. An effective action proposed in arXiv:1211.4843 relates the partition function to the expectation value of a `potential' function of the $S^1$ holonomy in pure Chern-Simons theory; in several examples we compute the holonomy potential as a function of $λ$. We use level rank duality of pure Chern-Simons theory to demonstrate the equality of thermal partition functions of previously conjectured dual pairs of theories as a function of the temperature. We reduce the partition function to a matrix integral over holonomies. The summation over flux sectors quantizes the eigenvalues of this matrix in units of ${2π\over k}$ and the eigenvalue density of the holonomy matrix is bounded from above by $\frac{1}{2 πλ}$. The corresponding matrix integrals generically undergo two phase transitions as a function of temperature. For several Chern-Simons matter theories we are able to exactly solve the relevant matrix models in the low temperature phase, and determine the phase transition temperature as a function of $λ$. At low temperatures our partition function smoothly matches onto the $N$ and $λ$ independent free energy of a gas of non renormalized multi trace operators. We also find an exact solution to a simple toy matrix model; the large $N$ Gross-Witten-Wadia matrix integral subject to an upper bound on eigenvalue density.
△ Less
Submitted 25 July, 2013; v1 submitted 25 January, 2013;
originally announced January 2013.
-
Adaptive Bee Colony in an Artificial Bee Colony for Solving Engineering Design Problems
Authors:
Tarun Kumar Sharma,
Millie Pant,
V. P. Singh
Abstract:
A wide range of engineering design problems have been solved by the algorithms that simulates collective intelligence in swarms of birds or insects. The Artificial Bee Colony or ABC is one of the recent additions to the class of swarm intelligence based algorithms that mimics the foraging behavior of honey bees. ABC consists of three groups of bees namely employed, onlooker and scout bees. In ABC,…
▽ More
A wide range of engineering design problems have been solved by the algorithms that simulates collective intelligence in swarms of birds or insects. The Artificial Bee Colony or ABC is one of the recent additions to the class of swarm intelligence based algorithms that mimics the foraging behavior of honey bees. ABC consists of three groups of bees namely employed, onlooker and scout bees. In ABC, the food locations represent the potential candidate solution. In the present study an attempt is made to generate the population of food sources (Colony Size) adaptively and the variant is named as A-ABC. A-ABC is further enhanced to improve convergence speed and exploitation capability, by employing the concept of elitism, which guides the bees towards the best food source. This enhanced variant is called E-ABC. The proposed algorithms are validated on a set of standard benchmark problems with varying dimensions taken from literature and on five engineering design problems. The numerical results are compared with the basic ABC and three recent variant of ABC. Numerically and statistically simulated results illustrate that the proposed method is very efficient and competitive.
△ Less
Submitted 22 October, 2012;
originally announced November 2012.
-
Improved Local Search in Artificial Bee Colony using Golden Section Search
Authors:
Tarun Kumar Sharma,
Millie Pant,
V. P. Singh
Abstract:
Artificial bee colony (ABC), an optimization algorithm is a recent addition to the family of population based search algorithm. ABC has taken its inspiration from the collective intelligent foraging behavior of honey bees. In this study we have incorporated golden section search mechanism in the structure of basic ABC to improve the global convergence and prevent to stick on a local solution. The…
▽ More
Artificial bee colony (ABC), an optimization algorithm is a recent addition to the family of population based search algorithm. ABC has taken its inspiration from the collective intelligent foraging behavior of honey bees. In this study we have incorporated golden section search mechanism in the structure of basic ABC to improve the global convergence and prevent to stick on a local solution. The proposed variant is termed as ILS-ABC. Comparative numerical results with the state-of-art algorithms show the performance of the proposal when applied to the set of unconstrained engineering design problems. The simulated results show that the proposed variant can be successfully applied to solve real life problems.
△ Less
Submitted 23 October, 2012;
originally announced October 2012.
-
Origin of Periodic Modulations in the Transient Reflectivity Signal at Cryogenic Temperatures
Authors:
Salahuddin Khan,
Rama Chari,
J. Jayabalan,
Suparna Pal,
T. K. Sharma,
A. K. Sagar,
M. S. Ansari,
P. K. Kush
Abstract:
Periodic modulations that appear in the low-temperature transient reflectivity signal of a GaAsP/AlGaAs single quantum well is studied. Similar anomalous oscillations are also observed in layered manganite [K. Kouyama et.al. J. Phys. Soc. Jpn. 76:123702(1-3), 2007]. We show that such periodic modulations are caused by changes in the linear reflectivity of the sample during transient reflectivity m…
▽ More
Periodic modulations that appear in the low-temperature transient reflectivity signal of a GaAsP/AlGaAs single quantum well is studied. Similar anomalous oscillations are also observed in layered manganite [K. Kouyama et.al. J. Phys. Soc. Jpn. 76:123702(1-3), 2007]. We show that such periodic modulations are caused by changes in the linear reflectivity of the sample during transient reflectivity measurements. Studied carried out on reflectivity of different materials under identical conditions shows that these modulations on the true transient reflectivity signal are caused by condensation of residual gases on the surface of quantum well. Methods to obtain reliable transient reflectivity data are also described.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.
-
ABJ Triality: from Higher Spin Fields to Strings
Authors:
Chi-Ming Chang,
Shiraz Minwalla,
Tarun Sharma,
Xi Yin
Abstract:
We demonstrate that a supersymmetric and parity violating version of Vasiliev's higher spin gauge theory in AdS$_4$ admits boundary conditions that preserve ${\cal N}=0,1,2,3,4$ or 6 supersymmetries. In particular, we argue that the Vasiliev theory with U(M) Chan-Paton and ${\cal N}=6$ boundary condition is holographically dual to the 2+1 dimensional $U(N)_k\times U(M)_{-k}$ ABJ theory in the limi…
▽ More
We demonstrate that a supersymmetric and parity violating version of Vasiliev's higher spin gauge theory in AdS$_4$ admits boundary conditions that preserve ${\cal N}=0,1,2,3,4$ or 6 supersymmetries. In particular, we argue that the Vasiliev theory with U(M) Chan-Paton and ${\cal N}=6$ boundary condition is holographically dual to the 2+1 dimensional $U(N)_k\times U(M)_{-k}$ ABJ theory in the limit of large $N,k$ and finite $M$. In this system all bulk higher spin fields transform in the adjoint of the U(M) gauge group, whose bulk t'Hooft coupling is $\frac{M}{N}$. Analysis of boundary conditions in Vasiliev theory allows us to determine exact relations between the parity breaking phase of Vasiliev theory and the coefficients of two and three point functions in Chern-Simons vector models at large $N$. Our picture suggests that the supersymmetric Vasiliev theory can be obtained as a limit of type IIA string theory in AdS$_4\times \mathbb{CP}^3$, and that the non-Abelian Vasiliev theory at strong bulk 't Hooft coupling smoothly turn into a string field theory. The fundamental string is a singlet bound state of Vasiliev's higher spin particles held together by U(M) gauge interactions. This is illustrated by the thermal partition function of free ABJ theory on a two sphere at large $M$ and $N$ even in the analytically tractable free limit. In this system the traces or strings of the low temperature phase break up into their Vasiliev particulate constituents at a U(M) deconfinement phase transition of order unity. At a higher temperature of order $T=\sqrt{\frac{N}{M}}$ Vasiliev's higher spin fields themselves break up into more elementary constituents at a U(N) deconfinement temperature, in a process described in the bulk as black hole nucleation.
△ Less
Submitted 13 October, 2012; v1 submitted 18 July, 2012;
originally announced July 2012.
-
Constraints on Anomalous Fluid in Arbitrary Dimensions
Authors:
Nabamita Banerjee,
Suvankar Dutta,
Sachin Jain,
R. Loganayagam,
Tarun Sharma
Abstract:
Using the techniques developed in arxiv: 1203.3544 we compute the universal part of the equilibrium partition function characteristic of a theory with multiple abelian U(1) anomalies in arbitrary even spacetime dimensions. This contribution is closely linked to the universal anomaly induced transport coefficients in hydrodynamics which have been studied before using entropy techniques. Equilibrium…
▽ More
Using the techniques developed in arxiv: 1203.3544 we compute the universal part of the equilibrium partition function characteristic of a theory with multiple abelian U(1) anomalies in arbitrary even spacetime dimensions. This contribution is closely linked to the universal anomaly induced transport coefficients in hydrodynamics which have been studied before using entropy techniques. Equilibrium partition function provides an alternate and a microscopically more transparent way to derive the constraints on these transport coefficients. We re-derive this way all the known results on these transport coefficients including their polynomial structure which has recently been conjectured to be linked to the anomaly polynomial of the theory. Further we link the local description of anomaly induced transport in terms of a Gibbs current to the more global description in terms of the partition function .
△ Less
Submitted 27 June, 2012;
originally announced June 2012.
-
Constraints on Superfluid Hydrodynamics from Equilibrium Partition Functions
Authors:
Sayantani Bhattacharyya,
Sachin Jain,
Shiraz Minwalla,
Tarun Sharma
Abstract:
Following up on recent work in the context of ordinary fluids, we study the equilibrium partition function of a 3+1 dimensional superfluid on an arbitrary stationary background spacetime, and with arbitrary stationary background gauge fields, in the long wavelength expansion. We argue that this partition function is generated by a 3 dimensional Euclidean effective action for the massless Goldstone…
▽ More
Following up on recent work in the context of ordinary fluids, we study the equilibrium partition function of a 3+1 dimensional superfluid on an arbitrary stationary background spacetime, and with arbitrary stationary background gauge fields, in the long wavelength expansion. We argue that this partition function is generated by a 3 dimensional Euclidean effective action for the massless Goldstone field. We parameterize the general form of this action at first order in the derivative expansion. We demonstrate that the constitutive relations of relativistic superfluid hydrodynamics are significantly constrained by the requirement of consistency with such an effective action. At first order in the derivative expansion we demonstrate that the resultant constraints on constitutive relations coincide precisely with the equalities between hydrodynamical transport coefficients recently derived from the second law of thermodynamics.
△ Less
Submitted 26 June, 2012;
originally announced June 2012.
-
Anomalous charged fluids in 1+1d from equilibrium partition function
Authors:
Sachin Jain,
Tarun Sharma
Abstract:
In this note we explore the constraints imposed by the existence of equilibrium partition on parity violating charged fluids in 1+1 dimensions at zero derivative order. We write the equilibrium partition function consistent with 1+1 dimensional CPT invariance and which reproduces the correct anomaly in the charge current. The constraints on constitutive relations obtained in this way matches preci…
▽ More
In this note we explore the constraints imposed by the existence of equilibrium partition on parity violating charged fluids in 1+1 dimensions at zero derivative order. We write the equilibrium partition function consistent with 1+1 dimensional CPT invariance and which reproduces the correct anomaly in the charge current. The constraints on constitutive relations obtained in this way matches precisely with those obtained using the second law of thermodynamics.
△ Less
Submitted 23 March, 2012;
originally announced March 2012.
-
Constraints on Fluid Dynamics from Equilibrium Partition Functions
Authors:
Nabamita Banerjee,
Jyotirmoy Bhattacharya,
Sayantani Bhattacharyya,
Sachin Jain,
Shiraz Minwalla,
Tarun Sharma
Abstract:
We study the thermal partition function of quantum field theories on arbitrary stationary background spacetime, and with arbitrary stationary background gauge fields, in the long wavelength expansion. We demonstrate that the equations of relativistic hydrodynamics are significantly constrained by the requirement of consistency with any partition function. In examples at low orders in the derivativ…
▽ More
We study the thermal partition function of quantum field theories on arbitrary stationary background spacetime, and with arbitrary stationary background gauge fields, in the long wavelength expansion. We demonstrate that the equations of relativistic hydrodynamics are significantly constrained by the requirement of consistency with any partition function. In examples at low orders in the derivative expansion we demonstrate that these constraints coincide precisely with the equalities between hydrodynamical transport coefficients that follow from the local form of the second law of thermodynamics. In particular we recover the results of Son and Surowka on the chiral magnetic and chiral vorticity flows, starting from a local partition function that manifestly reproduces the field theory anomaly, without making any reference to an entropy current. We conjecture that the relations between transport coefficients that follow from the second law of thermodynamics agree to all orders in the derivative expansion with the constraints described in this paper.
△ Less
Submitted 6 July, 2012; v1 submitted 15 March, 2012;
originally announced March 2012.
-
Supersymmetric States in Large N Chern-Simons-Matter Theories
Authors:
Shiraz Minwalla,
Prithvi Narayan,
Tarun Sharma,
V. Umesh,
Xi Yin
Abstract:
In this paper we study the spectrum of BPS operators/states in N=2 superconformal U(N) Chern-Simons-matter theories with adjoint chiral matter fields, with and without superpotential. The superconformal indices and conjectures on the full supersymmetric spectrum of the theories in the large N limit with up to two adjoint matter fields are presented. Our results suggest that some of these theories…
▽ More
In this paper we study the spectrum of BPS operators/states in N=2 superconformal U(N) Chern-Simons-matter theories with adjoint chiral matter fields, with and without superpotential. The superconformal indices and conjectures on the full supersymmetric spectrum of the theories in the large N limit with up to two adjoint matter fields are presented. Our results suggest that some of these theories may have supergravity duals at strong coupling, while some others may be dual to higher spin theories of gravity at strong coupling. For the N=2 theory with no superpotential, we study the renormalization of R-charge at finite 't Hooft coupling using "Z-minimization". A particularly intriguing result is found in the case of one adjoint matter.
△ Less
Submitted 12 April, 2011; v1 submitted 4 April, 2011;
originally announced April 2011.
-
Strain-driven light polarization switching in deep ultraviolet nitride emitters
Authors:
T. K. Sharma,
Doron Naveh,
E. Towe
Abstract:
Residual strain plays a critical role in determining the crystalline quality of nitride epitaxial layers and in modifying their band structure; this often leads to several interesting physical phenomena. It is found, for example, that compressive strain in AlxGa1-xN layers grown on AlyGa1-yN (x<y) templates results in an anti-crossing of the valence bands at considerably much higher Al composition…
▽ More
Residual strain plays a critical role in determining the crystalline quality of nitride epitaxial layers and in modifying their band structure; this often leads to several interesting physical phenomena. It is found, for example, that compressive strain in AlxGa1-xN layers grown on AlyGa1-yN (x<y) templates results in an anti-crossing of the valence bands at considerably much higher Al composition than expected. This happens even in the presence of large and negative crystal field splitting energy for AlxGa1-xN layers. A judicious magnitude of the compressive strain can support vertical light emission (out of the c-plane) from AlxGa1-xN quantum wells up to x\approx 0.80, which is desirable for the development of deep ultraviolet light-emitting diodes designed to operate below 250nm with transverse electric polarization characteristics.
△ Less
Submitted 9 January, 2011;
originally announced January 2011.
-
Observation of Type I/II Transition in GaAs/InGaP Heterostructure by C-V Profiling
Authors:
Shouvik Datta,
M. R. Gokhle,
A. P. Shah,
T. K. Sharma,
B. M. Arora
Abstract:
It is known in the literature that InGaP alloy synthesized within a certain range of growth temperature (520 - 720 degree Centrigrade) shows Cu-Pt crystal ordering. This ordering reduces the band gap energy . It was predicted that the ordering induced modification of energy levels of InGaP lowers its conduction band edge, which could change a type I band alignment at a GaAs/InGaP heterojunction…
▽ More
It is known in the literature that InGaP alloy synthesized within a certain range of growth temperature (520 - 720 degree Centrigrade) shows Cu-Pt crystal ordering. This ordering reduces the band gap energy . It was predicted that the ordering induced modification of energy levels of InGaP lowers its conduction band edge, which could change a type I band alignment at a GaAs/InGaP heterojunction to type II . Here we report the first observation of this ordering related type I/II transition for a GaAs/InGaP heterojunction by C-V profiling experiments done at room temperature .
△ Less
Submitted 6 March, 1999;
originally announced March 1999.