-
HTN-Based Tutors: A New Intelligent Tutoring Framework Based on Hierarchical Task Networks
Authors:
Momin N. Siddiqui,
Adit Gupta,
Jennifer M. Reddig,
Christopher J. MacLellan
Abstract:
Intelligent tutors have shown success in delivering a personalized and adaptive learning experience. However, there exist challenges regarding the granularity of knowledge in existing frameworks and the resulting instructions they can provide. To address these issues, we propose HTN-based tutors, a new intelligent tutoring framework that represents expert models using Hierarchical Task Networks (H…
▽ More
Intelligent tutors have shown success in delivering a personalized and adaptive learning experience. However, there exist challenges regarding the granularity of knowledge in existing frameworks and the resulting instructions they can provide. To address these issues, we propose HTN-based tutors, a new intelligent tutoring framework that represents expert models using Hierarchical Task Networks (HTNs). Like other tutoring frameworks, it allows flexible encoding of different problem-solving strategies while providing the additional benefit of a hierarchical knowledge organization. We leverage the latter to create tutors that can adapt the granularity of their scaffolding. This organization also aligns well with the compositional nature of skills.
△ Less
Submitted 23 May, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
DVANet: Disentangling View and Action Features for Multi-View Action Recognition
Authors:
Nyle Siddiqui,
Praveen Tirupattur,
Mubarak Shah
Abstract:
In this work, we present a novel approach to multi-view action recognition where we guide learned action representations to be separated from view-relevant information in a video. When trying to classify action instances captured from multiple viewpoints, there is a higher degree of difficulty due to the difference in background, occlusion, and visibility of the captured action from different came…
▽ More
In this work, we present a novel approach to multi-view action recognition where we guide learned action representations to be separated from view-relevant information in a video. When trying to classify action instances captured from multiple viewpoints, there is a higher degree of difficulty due to the difference in background, occlusion, and visibility of the captured action from different camera angles. To tackle the various problems introduced in multi-view action recognition, we propose a novel configuration of learnable transformer decoder queries, in conjunction with two supervised contrastive losses, to enforce the learning of action features that are robust to shifts in viewpoints. Our disentangled feature learning occurs in two stages: the transformer decoder uses separate queries to separately learn action and view information, which are then further disentangled using our two contrastive losses. We show that our model and method of training significantly outperforms all other uni-modal models on four multi-view action recognition datasets: NTU RGB+D, NTU RGB+D 120, PKU-MMD, and N-UCLA. Compared to previous RGB works, we see maximal improvements of 1.5\%, 4.8\%, 2.2\%, and 4.8\% on each dataset, respectively.
△ Less
Submitted 9 December, 2023;
originally announced December 2023.
-
Sharp inequalities and solitons for statistical submersions
Authors:
Mohd. Danish Siddiqi,
Aliya Naaz Siddiqui,
Bang-Yen Chen
Abstract:
In this research article, initially, we prove some sharp inequalities on statistical submersions involving Ricci and scalar curvatures of the statistical manifolds. In addition, we establish the geometrical bearing on statistical submersions in terms of Ricci-Bourguignon soliton. Moreover, we characterize the fibers of a statistical submersion as Ricci-Bourguignon solitons with conformal vector fi…
▽ More
In this research article, initially, we prove some sharp inequalities on statistical submersions involving Ricci and scalar curvatures of the statistical manifolds. In addition, we establish the geometrical bearing on statistical submersions in terms of Ricci-Bourguignon soliton. Moreover, we characterize the fibers of a statistical submersion as Ricci-Bourguignon solitons with conformal vector field. Finally, in the particular case when the vertical potential vector field of the Ricci-Bourguignon soliton is of gradient type, we derive a Poisson equation for a statistical submersion.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset
Authors:
Zachary Deridder,
Nyle Siddiqui,
Thomas Reither,
Rushit Dave,
Brendan Pelto,
Naeem Seliya,
Mounika Vanamala
Abstract:
As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi factor authentication may only initially validate a user, which does not help if an impostor can bypass this initial validation. The field of touch dynamics emerges…
▽ More
As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi factor authentication may only initially validate a user, which does not help if an impostor can bypass this initial validation. The field of touch dynamics emerges as a clear way to non intrusively collect data about a user and their behaviors in order to develop and make imperative security related decisions in real time. In this paper we present a novel dataset consisting of tracking 25 users playing two mobile games Snake.io and Minecraft each for 10 minutes, along with their relevant gesture data. From this data, we ran machine learning binary classifiers namely Random Forest and K Nearest Neighbor to attempt to authenticate whether a sample of a particular users actions were genuine. Our strongest model returned an average accuracy of roughly 93% for both games, showing touch dynamics can differentiate users effectively and is a feasible consideration for authentication schemes. Our dataset can be observed at https://github.com/zderidder/MC-Snake-Results
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
Mitigating Presentation Attack using DCGAN and Deep CNN
Authors:
Nyle Siddiqui,
Rushit Dave
Abstract:
Biometric based authentication is currently playing an essential role over conventional authentication system; however, the risk of presentation attacks subsequently rising. Our research aims at identifying the areas where presentation attack can be prevented even though adequate biometric image samples of users are limited. Our work focusses on generating photorealistic synthetic images from the…
▽ More
Biometric based authentication is currently playing an essential role over conventional authentication system; however, the risk of presentation attacks subsequently rising. Our research aims at identifying the areas where presentation attack can be prevented even though adequate biometric image samples of users are limited. Our work focusses on generating photorealistic synthetic images from the real image sets by implementing Deep Convolution Generative Adversarial Net (DCGAN). We have implemented the temporal and spatial augmentation during the fake image generation. Our work detects the presentation attacks on facial and iris images using our deep CNN, inspired by VGGNet [1]. We applied the deep neural net techniques on three different biometric image datasets, namely MICHE I [2], VISOB [3], and UBIPr [4]. The datasets, used in this research, contain images that are captured both in controlled and uncontrolled environment along with different resolutions and sizes. We obtained the best test accuracy of 97% on UBI-Pr [4] Iris datasets. For MICHE-I [2] and VISOB [3] datasets, we achieved the test accuracies of 95% and 96% respectively.
△ Less
Submitted 22 June, 2022;
originally announced July 2022.
-
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Authors:
Nyle Siddiqui,
Rushit Dave,
Naeem Seliya,
Mounika Vanamala
Abstract:
Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still monitored in order to continuously verify that the user is not an imposter who had access to the user credentials. Mouse dynamics is the behavior of a use…
▽ More
Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still monitored in order to continuously verify that the user is not an imposter who had access to the user credentials. Mouse dynamics is the behavior of a users mouse movements and is a biometric that has shown great promise for continuous authentication schemes. This article builds upon our previous published work by evaluating our dataset of 40 users using three machine learning and deep learning algorithms. Two evaluation scenarios are considered: binary classifiers are used for user authentication, with the top performer being a 1-dimensional convolutional neural network with a peak average test accuracy of 85.73% across the top 10 users. Multi class classification is also examined using an artificial neural network which reaches an astounding peak accuracy of 92.48% the highest accuracy we have seen for any classifier on this dataset.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Authors:
Nyle Siddiqui,
Rushit Dave,
Tyler Bauer,
Thomas Reither,
Dylan Black,
Mitchell Hanson
Abstract:
Facial emotion recognition is a vast and complex problem space within the domain of computer vision and thus requires a universally accepted baseline method with which to evaluate proposed models. While test datasets have served this purpose in the academic sphere real world application and testing of such models lacks any real comparison. Therefore we propose a framework in which models developed…
▽ More
Facial emotion recognition is a vast and complex problem space within the domain of computer vision and thus requires a universally accepted baseline method with which to evaluate proposed models. While test datasets have served this purpose in the academic sphere real world application and testing of such models lacks any real comparison. Therefore we propose a framework in which models developed for FER can be compared and contrasted against one another in a constant standardized fashion. A lightweight convolutional neural network is trained on the AffectNet dataset a large variable dataset for facial emotion recognition and a web application is developed and deployed with our proposed framework as a proof of concept. The CNN is embedded into our application and is capable of instant real time facial emotion recognition. When tested on the AffectNet test set this model achieves high accuracy for emotion classification of eight different emotions. Using our framework the validity of this model and others can be properly tested by evaluating a model efficacy not only based on its accuracy on a sample test dataset, but also on in the wild experiments. Additionally, our application is built with the ability to save and store any image captured or uploaded to it for emotion recognition, allowing for the curation of more quality and diverse facial emotion recognition datasets.
△ Less
Submitted 29 January, 2022;
originally announced January 2022.
-
The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT
Authors:
Rushit Dave,
Naeem Seliya,
Nyle Siddiqui
Abstract:
Recent advancements in technology now allow for the generation of massive quantities of data. There is a growing need to transmit this data faster and more securely such that it cannot be accessed by malicious individuals. Edge computing has emerged in previous research as a method capable of improving data transmission times and security before the data ends up in the cloud. Edge computing has an…
▽ More
Recent advancements in technology now allow for the generation of massive quantities of data. There is a growing need to transmit this data faster and more securely such that it cannot be accessed by malicious individuals. Edge computing has emerged in previous research as a method capable of improving data transmission times and security before the data ends up in the cloud. Edge computing has an impressive transmission speed based on fifth generation (5G) communication which transmits data with low latency and high bandwidth. While edge computing is sufficient to extract important features from the raw data to prevent large amounts of data requiring excessive bandwidth to be transmitted, cloud computing is used for the computational processes required for develo** algorithms and modeling the data. Edge computing also improves the quality of the user experience by saving time and integrating quality of life (QoL) features. QoL features are important for the healthcare sector by hel** to provide real-time feedback of data produced by healthcare devices back to patients for a faster recovery. Edge computing has better energy efficiency, can reduce the electricity cost, and in turn help people reduce their living expenses. This paper will take a detailed look into edge computing applications around Internet of Things (IoT) devices, smart city infrastructure, and benefits to healthcare.
△ Less
Submitted 22 November, 2021;
originally announced December 2021.
-
Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Authors:
Nyle Siddiqui,
Rushit Dave,
Naeem Seliya
Abstract:
Mouse dynamics has grown in popularity as a novel irreproducible behavioral biometric. Datasets which contain general unrestricted mouse movements from users are sparse in the current literature. The Balabit mouse dynamics dataset produced in 2016 was made for a data science competition and despite some of its shortcomings, is considered to be the first publicly available mouse dynamics dataset. C…
▽ More
Mouse dynamics has grown in popularity as a novel irreproducible behavioral biometric. Datasets which contain general unrestricted mouse movements from users are sparse in the current literature. The Balabit mouse dynamics dataset produced in 2016 was made for a data science competition and despite some of its shortcomings, is considered to be the first publicly available mouse dynamics dataset. Collecting mouse movements in a dull administrative manner as Balabit does may unintentionally homogenize data and is also not representative of realworld application scenarios. This paper presents a novel mouse dynamics dataset that has been collected while 10 users play the video game Minecraft on a desktop computer. Binary Random Forest (RF) classifiers are created for each user to detect differences between a specific users movements and an imposters movements. Two evaluation scenarios are proposed to evaluate the performance of these classifiers; one scenario outperformed previous works in all evaluation metrics, reaching average accuracy rates of 92%, while the other scenario successfully reported reduced instances of false authentications of imposters.
△ Less
Submitted 14 October, 2021;
originally announced October 2021.
-
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Authors:
Sam Strecker,
Rushit Dave,
Nyle Siddiqui,
Naeem Seliya
Abstract:
Modern scientific advancements often contribute to the introduction and refinement of never-before-seen technologies. This can be quite the task for humans to maintain and monitor and as a result, our society has become reliant on machine learning to assist in this task. With new technology comes new methods and thus new ways to circumvent existing cyber security measures. This study examines the…
▽ More
Modern scientific advancements often contribute to the introduction and refinement of never-before-seen technologies. This can be quite the task for humans to maintain and monitor and as a result, our society has become reliant on machine learning to assist in this task. With new technology comes new methods and thus new ways to circumvent existing cyber security measures. This study examines the effectiveness of three distinct Internet of Things cyber security algorithms currently used in industry today for malware and intrusion detection: Random Forest (RF), Support-Vector Machine (SVM), and K-Nearest Neighbor (KNN). Each algorithm was trained and tested on the Aposemat IoT-23 dataset which was published in January 2020 with the earliest of captures from 2018 and latest from 2019. The RF, SVM, and KNN reached peak accuracies of 92.96%, 86.23%, and 91.48%, respectively, in intrusion detection and 92.27%, 83.52%, and 89.80% in malware detection. It was found all three algorithms are capable of being effectively utilized for the current landscape of IoT cyber security in 2021.
△ Less
Submitted 14 October, 2021;
originally announced October 2021.
-
On CR-statistical submanifolds of holomorphic statistical manifolds
Authors:
Aliya Naaz Siddiqui,
Falleh R. Al-Solamy,
Mohammad Hasan Shahid,
Ion Mihai
Abstract:
In the present paper, we investigate some properties of the distributions involved in the definition of a CR-statistical submanifold. The characterization of a CR-product in holomorphic statistical manifolds is given. By using an optimization technique, we establish a relationship between the Ricci curvature and the squared norm of the mean curvature of any submanifold in the same ambient space. T…
▽ More
In the present paper, we investigate some properties of the distributions involved in the definition of a CR-statistical submanifold. The characterization of a CR-product in holomorphic statistical manifolds is given. By using an optimization technique, we establish a relationship between the Ricci curvature and the squared norm of the mean curvature of any submanifold in the same ambient space. The equality case is also discussed here. This paper finishes with some related examples.
△ Less
Submitted 25 September, 2020;
originally announced September 2020.
-
EMIXER: End-to-end Multimodal X-ray Generation via Self-supervision
Authors:
Siddharth Biswal,
Peiye Zhuang,
Ayis Pyrros,
Nasir Siddiqui,
Sanmi Koyejo,
Jimeng Sun
Abstract:
Deep generative models have enabled the automated synthesis of high-quality data for diverse applications. However, the most effective generative models are specialized to data from a single domain (e.g., images or text). Real-world applications such as healthcare require multi-modal data from multiple domains (e.g., both images and corresponding text), which are difficult to acquire due to limite…
▽ More
Deep generative models have enabled the automated synthesis of high-quality data for diverse applications. However, the most effective generative models are specialized to data from a single domain (e.g., images or text). Real-world applications such as healthcare require multi-modal data from multiple domains (e.g., both images and corresponding text), which are difficult to acquire due to limited availability and privacy concerns and are much harder to synthesize. To tackle this joint synthesis challenge, we propose an End-to-end MultImodal X-ray genERative model (EMIXER) for jointly synthesizing x-ray images and corresponding free-text reports, all conditional on diagnosis labels. EMIXER is an conditional generative adversarial model by 1) generating an image based on a label, 2) encoding the image to a hidden embedding, 3) producing the corresponding text via a hierarchical decoder from the image embedding, and 4) a joint discriminator for assessing both the image and the corresponding text. EMIXER also enables self-supervision to leverage vast amount of unlabeled data. Extensive experiments with real X-ray reports data illustrate how data augmentation using synthesized multimodal samples can improve the performance of a variety of supervised tasks including COVID-19 X-ray classification with very limited samples. The quality of generated images and reports are also confirmed by radiologists. We quantitatively show that EMIXER generated synthetic datasets can augment X-ray image classification, report generation models to achieve 5.94% and 6.9% improvement on models trained only on real data samples. Taken together, our results highlight the promise of state of generative models to advance clinical machine learning.
△ Less
Submitted 15 January, 2021; v1 submitted 10 July, 2020;
originally announced July 2020.
-
Male Under-performance in Undergraduate Engineering Mathematical Courses: Causes and Solution Strategy
Authors:
Luai Al Labadi,
Hishyar Khalil,
Nida Siddiqui
Abstract:
There has been an increasing trend of females performing better than males academically across the mathematical engineering courses. To confirm this assumption, final marks of two independent samples of students from Calculus courses across all fields within Engineering at a local university of UAE are considered. A two-sample t-test indicates a significant difference in the performance between th…
▽ More
There has been an increasing trend of females performing better than males academically across the mathematical engineering courses. To confirm this assumption, final marks of two independent samples of students from Calculus courses across all fields within Engineering at a local university of UAE are considered. A two-sample t-test indicates a significant difference in the performance between the two genders. Accordingly, a survey was designed to identify factors that may yield to this scenario. Analysis of the survey found that the time spend studying outside the classroom is a statistically significant factor contributing to the disparity between the gender performances. Based on these results, we propose immediate short-term solutions that can be applied by instructors to address this issue. This study advocates the need of continuous research at micro level to identify gender-based student performance variance. Such researches can assist in immediate intervention thereby leading to the bridging of such a gap.
△ Less
Submitted 15 July, 2023; v1 submitted 1 July, 2019;
originally announced July 2019.
-
Solitonic aspects of submanifolds in Kenmotsu statistical manifolds
Authors:
Mohd. Danish Siddiqi,
Aliya Naaz Siddiqui
Abstract:
The differential geometry of Kenmotsu manifold is a valuable part of contact geometry with nice applications in other fields such as theoretical physics. In fact, its statistical counterpart, that is, Kenmotsu statistical manifold also has same importance as that of Kenmotsu manifold. Theoretical physicists have also been looking into the equation of Ricci soliton and Yamabe soliton in relation wi…
▽ More
The differential geometry of Kenmotsu manifold is a valuable part of contact geometry with nice applications in other fields such as theoretical physics. In fact, its statistical counterpart, that is, Kenmotsu statistical manifold also has same importance as that of Kenmotsu manifold. Theoretical physicists have also been looking into the equation of Ricci soliton and Yamabe soliton in relation with Einstein manifolds, quasi-Einstein manifolds and string theory. In this research article, first we examine the statistical solitons and Yamabe soliton on Kenmotsu statistical manifolds with some related examples. Then we investigate some statistical curvature properties of Kenmotsu statistical manifolds. Also, we study the statistical solitons on submanifolds of Kenmotsu statistical manifold with concircular vector field. Furthermore, we discuss the behavior of almost quasi-Yamabe soliton on submanifolds of Kenmotsu statistical manifolds endowed with concircular vector field and concurrent vector filed. Finally, we furnish an example of $5$-dimensional Kenmotsu statistical manifolds admitting a statistical soliton and almost quasi-Yamabe soliton as well in the support of this study.
△ Less
Submitted 1 September, 2023; v1 submitted 30 May, 2019;
originally announced May 2019.
-
Max-Sliced Wasserstein Distance and its use for GANs
Authors:
Ishan Deshpande,
Yuan-Ting Hu,
Ruoyu Sun,
Ayis Pyrros,
Nasir Siddiqui,
Sanmi Koyejo,
Zhizhen Zhao,
David Forsyth,
Alexander Schwing
Abstract:
Generative adversarial nets (GANs) and variational auto-encoders have significantly improved our distribution modeling capabilities, showing promise for dataset augmentation, image-to-image translation and feature learning. However, to model high-dimensional distributions, sequential training and stacked architectures are common, increasing the number of tunable hyper-parameters as well as the tra…
▽ More
Generative adversarial nets (GANs) and variational auto-encoders have significantly improved our distribution modeling capabilities, showing promise for dataset augmentation, image-to-image translation and feature learning. However, to model high-dimensional distributions, sequential training and stacked architectures are common, increasing the number of tunable hyper-parameters as well as the training time. Nonetheless, the sample complexity of the distance metrics remains one of the factors affecting GAN training. We first show that the recently proposed sliced Wasserstein distance has compelling sample complexity properties when compared to the Wasserstein distance. To further improve the sliced Wasserstein distance we then analyze its `projection complexity' and develop the max-sliced Wasserstein distance which enjoys compelling sample complexity while reducing projection complexity, albeit necessitating a max estimation. We finally illustrate that the proposed distance trains GANs on high-dimensional images up to a resolution of 256x256 easily.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
Extremities for statistical submanifolds in Kenmotsu statistical manifolds
Authors:
Aliya Naaz Siddiqui,
Young ** Suh,
Oğuzhan Bahadır
Abstract:
Kenmotsu geometry is a valuable part of contact geometry with nice applications in other fields such as theoretical physics. In this article, we study the statistical counterpart of a Kenmotsu manifold, that is, Kenmotsu statistical manifold with some related examples. We investigate some statistical curvature properties of Kenmotsu statistical manifolds. We prove that a Kenmotsu statistical manif…
▽ More
Kenmotsu geometry is a valuable part of contact geometry with nice applications in other fields such as theoretical physics. In this article, we study the statistical counterpart of a Kenmotsu manifold, that is, Kenmotsu statistical manifold with some related examples. We investigate some statistical curvature properties of Kenmotsu statistical manifolds. We prove that a Kenmotsu statistical manifold is not a Ricci-flat statistical manifold with an example. Finally, we prove a very well-known Chen-Ricci inequality for statistical submanifolds in Kenmotsu statistical manifolds of constant $φ-$sectional curvature by adopting optimization techniques on submanifolds. This article ends with some concluding remarks.
△ Less
Submitted 11 September, 2020; v1 submitted 7 February, 2019;
originally announced February 2019.
-
Geometry of statistical submanifolds of statistical warped product manifolds by optimization techniques
Authors:
Aliya Naaz Siddiqui,
Fatemah Mofarreh,
Ali Hussain Alkhaldi,
Akram Ali
Abstract:
This paper deals with the applications of an optimization method on submanifolds, that is, geometric inequalities can be considered as optimization problems. In this regard, we obtain optimal Casorati inequalities and Chen-Ricci inequality for a statistical submanifold in a statistical warped product manifold of type $\mathbb{R} \times_{\mathfrak{f}} \overline{M}$ (almost Kenmotsu statistical mani…
▽ More
This paper deals with the applications of an optimization method on submanifolds, that is, geometric inequalities can be considered as optimization problems. In this regard, we obtain optimal Casorati inequalities and Chen-Ricci inequality for a statistical submanifold in a statistical warped product manifold of type $\mathbb{R} \times_{\mathfrak{f}} \overline{M}$ (almost Kenmotsu statistical manifold), where $\mathbb{R}$ and $\overline{M}$ are trivial statistical manifold and almost Kaehler statistical manifold, respectively.
△ Less
Submitted 25 August, 2023; v1 submitted 17 January, 2019;
originally announced January 2019.
-
Generalized inequalities of warped product submanifolds of nearly Kenmotsu $f$-manifolds
Authors:
Yavuz Selim Balkan,
Aliya Naaz Siddiqui,
Akram Ali
Abstract:
In the present paper, we discuss the non-trivial warped product pseudo slant submanifolds of type $M_{\bot }\times _{f}M_{θ}$ and $M_θ\times _{f}M_{\bot }$ of nearly Kenmotsu $f$-manifold $\overline{M}$. Firstly, we get some basic properties of these type warped product submanifolds. Then, we establish the general sharp inequalities for squared norm of second fundamental form for mixed totally geo…
▽ More
In the present paper, we discuss the non-trivial warped product pseudo slant submanifolds of type $M_{\bot }\times _{f}M_{θ}$ and $M_θ\times _{f}M_{\bot }$ of nearly Kenmotsu $f$-manifold $\overline{M}$. Firstly, we get some basic properties of these type warped product submanifolds. Then, we establish the general sharp inequalities for squared norm of second fundamental form for mixed totally geodesic warped product pseudo slant submanifolds of both cases, in terms of the war** function and the slant angle. Also the equality cases are verified. We show that some previous results are trivial from our results.
△ Less
Submitted 16 January, 2019;
originally announced January 2019.
-
Simons' type formula for slant submanifolds of complex space form
Authors:
Aliya Naaz Siddiqui,
Mohammad Jamali,
Mohammad Hasan Shahid
Abstract:
In this paper, we study a slant submanifold of a complex space form. We also obtain an integral formula of Simons' type for a Kaehlerian slant submanifold in a complex space form and apply it to prove our main result.
In this paper, we study a slant submanifold of a complex space form. We also obtain an integral formula of Simons' type for a Kaehlerian slant submanifold in a complex space form and apply it to prove our main result.
△ Less
Submitted 8 June, 2020; v1 submitted 1 February, 2017;
originally announced February 2017.