-
Chromatic number of randomly augmented graphs
Authors:
Jan Geest,
Anand Srivastav
Abstract:
An extension of the Erdős-Renyi random graph model $G_{n,p}$ is the model of perturbed graphs introduced by Bohman, Frieze and Martin (Bohman, Frieze, Martin 2003). This is a special case of the model of randomly augmented graphs studied in this paper. An augmented graph denoted by $pert_{H,p}$ is the union of a deterministic host graph and a random graph $G_{n,p}$. Among the first problems in per…
▽ More
An extension of the Erdős-Renyi random graph model $G_{n,p}$ is the model of perturbed graphs introduced by Bohman, Frieze and Martin (Bohman, Frieze, Martin 2003). This is a special case of the model of randomly augmented graphs studied in this paper. An augmented graph denoted by $pert_{H,p}$ is the union of a deterministic host graph and a random graph $G_{n,p}$. Among the first problems in perturbed graphs has been the question how many random edges are needed to ensure Hamiltonicity of the graph. This question was answered in the paper by Bohman, Frieze and Martin. The host graph is often chosen to be a dense graph. In recent years several papers on combinatorial problems in perturbed graphs were published, e.g. on the emergence of powers of Hamiltonian cycles (Dudek, Reiher, Ruciński, Schacht 2020), some positional games played on perturbed graphs (Clemens, Hamann, Mogge, Parczyk, 2020) and the behavior of multiple invariants e.g. fixed clique size (Bohman, Frieze, Krivelevich, Martin, 2004). In this paper we study the chromatic number of randomly augmented graphs. We concentrate on a host graph $H$ with chromatic number $o(n)$, augmented by a $G_{n,p}$ with $n^{-\frac{1}{3} + δ}\leq p(n) \leq 1-δ$ for some $δ\in (0,1)$. Our main result is an upper bound for the chromatic number: we show that asymptotically almost surely $χ(pert_{H,p}) \leq (1+o(1)) \cdot \frac{n \log(b)}{2 (\log(n) - \log(χ(H))}$ where $b = (1-p)^{-1}$. This result collapses to the famous theorem of Bollobás (1988), when $H$ is the empty host graph, thus our result can be regarded as a generalization of the latter. Our proof is not constructive. Further, we give a constructive coloring algorithm, when the chromatic number of the host graph is at most $\frac{n}{\log(n)^α},$ $α>\frac{1}{2}.$
△ Less
Submitted 11 July, 2024; v1 submitted 20 June, 2024;
originally announced June 2024.
-
Asymptotically Optimal Threshold Bias for the $(a : b)$ Maker-Breaker Minimum Degree, Connectivity and Hamiltonicity Games
Authors:
Adnane Fouadi,
Mourad El Ouali,
Anand Srivastav
Abstract:
We study the $(a:b)$ Maker-Breaker subgraph game played on the edges of the complete graph $K_n$ on $n$ vertices, $n,a,b \in \mathbb{N}$ where the goal of Maker is to build a copy of a specific fixed subgraph $H$. In our work this is a spanning graph with minimum degree $k=k(n)$, a connected spanning subgraph or a Hamiltonian subgraph. In the $(a:b)$ game in each round Maker chooses $a$ unclaimed…
▽ More
We study the $(a:b)$ Maker-Breaker subgraph game played on the edges of the complete graph $K_n$ on $n$ vertices, $n,a,b \in \mathbb{N}$ where the goal of Maker is to build a copy of a specific fixed subgraph $H$. In our work this is a spanning graph with minimum degree $k=k(n)$, a connected spanning subgraph or a Hamiltonian subgraph. In the $(a:b)$ game in each round Maker chooses $a$ unclaimed edges of $K_n$ and Breaker chooses $b$ unclaimed edges. Maker wins, if he succeeds to build a copy of the subgraph under consideration, otherwise Breaker wins. For the $k$-minimum-degree, we present a winning strategy for Maker leading to a bound that generalizes a bound of Gebauer and Szab{ó} for the $(1:b)$ case. Moreover, we give an explicit strategy for Breaker for $b >(1+o(1)) \frac{an}{a+\ln(n)}$ in case of $a=o\left(\sqrt{\frac{n}{\ln(n)}}\right)$ and $k=o(\ln(n))$. Note that this bound is the same as the Maker bound presented by Hefetz et al. (2012) for the $(a:b)$ connectivity game, which implies that the asymptotic optimal bias for this game is $\frac{an}{a+\ln(n)}$. This resolves the open problem stated by these authors. We also study the $(a:b)$ Hamiltonicity game in which Maker's goal is to create a Hamiltonian subgraph. For the $(1:b)$ variant Krivelevich proved that $\left(1+o(1) \right)\frac{n}{\ln n}$ is the exact threshold bias. Controlling Breaker's vertex degree in the $(a:b)$ Maker-Breaker minimum degree game enables us to the asymptotic optimal generalized threshold bias for the $(a:b)$-game, both for $a=o\left(\sqrt{\frac{n}{\ln n}} \right)$ and $a=Ω\left(\sqrt{\frac{n}{\ln n}} \right)$.
△ Less
Submitted 16 June, 2024;
originally announced June 2024.
-
Effect of measurements on quantum speed limit
Authors:
Abhay Srivastav,
Vivek Pandey,
Arun K Pati
Abstract:
Given the initial and final states of a quantum system, the speed of transportation of state vector in the projective Hilbert space governs the quantum speed limit. Here, we ask the question what happens to the quantum speed limit under continuous measurement process. We model the continuous measurement process by a non-Hermitian Hamiltonian which keeps the evolution of the system Schr{ö}dinger-li…
▽ More
Given the initial and final states of a quantum system, the speed of transportation of state vector in the projective Hilbert space governs the quantum speed limit. Here, we ask the question what happens to the quantum speed limit under continuous measurement process. We model the continuous measurement process by a non-Hermitian Hamiltonian which keeps the evolution of the system Schr{ö}dinger-like even under the process of measurement. Using this specific measurement model, we prove that under continuous measurement, the speed of transportation of a quantum system tends to zero. Interestingly, we also find that for small time scale, there is an enhancement of quantum speed even if the measurement strength is finite. Our findings can have applications in quantum computing and quantum control where dynamics is governed by both unitary and measurement processes.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Family of Exact and Inexact Quantum Speed Limits for Completely Positive and Trace-Preserving Dynamics
Authors:
Abhay Srivastav,
Vivek Pandey,
Brij Mohan,
Arun Kumar Pati
Abstract:
Traditional quantum speed limits formulated in density matrix space perform poorly for dynamics beyond unitary, as they are generally unattainable and fail to characterize the fastest possible dynamics. To address this, we derive two distinct quantum speed limits in Liouville space for Completely Positive and Trace-Preserving (CPTP) dynamics that outperform previous bounds. The first bound saturat…
▽ More
Traditional quantum speed limits formulated in density matrix space perform poorly for dynamics beyond unitary, as they are generally unattainable and fail to characterize the fastest possible dynamics. To address this, we derive two distinct quantum speed limits in Liouville space for Completely Positive and Trace-Preserving (CPTP) dynamics that outperform previous bounds. The first bound saturates for time-optimal CPTP dynamics, while the second bound is exact for all states and all CPTP dynamics. Our bounds have a clear physical and geometric interpretation arising from the uncertainty of superoperators and the geometry of quantum evolution in Liouville space. They can be regarded as the generalization of the Mandelstam-Tamm bound, providing uncertainty relations between time, energy, and dissipation for open quantum dynamics. Additionally, our bounds are significantly simpler to estimate and experimentally more feasible as they require to compute or measure the overlap of density matrices and the variance of the Liouvillian. We have also obtained the form of the Liouvillian, which generates the time-optimal (fastest) CPTP dynamics for given initial and final states. We give two important applications of our bounds. First, we show that the speed of evolution in Liouville space bounds the growth of the spectral form factor and Krylov complexity of states, which are crucial for studying information scrambling and quantum chaos. Second, using our bounds, we explain the Mpemba effect in non-equilibrium open quantum dynamics.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
A Constructive Winning Maker Strategy in the Maker-Breaker $C_4$-Game
Authors:
Matthias Sowa,
Anand Srivastav
Abstract:
Maker-Breaker subgraph games are among the most famous combinatorial games. For given $n,q \in \mathbb{N}$ and a subgraph $C$ of the complete graph $K_n$, the two players, called Maker and Breaker, alternately claim edges of $K_n$. In each round of the game Maker claims one edge and Breaker is allowed to claim up to $q$ edges. If Maker is able to claim all edges of a copy of $C$, he wins the game.…
▽ More
Maker-Breaker subgraph games are among the most famous combinatorial games. For given $n,q \in \mathbb{N}$ and a subgraph $C$ of the complete graph $K_n$, the two players, called Maker and Breaker, alternately claim edges of $K_n$. In each round of the game Maker claims one edge and Breaker is allowed to claim up to $q$ edges. If Maker is able to claim all edges of a copy of $C$, he wins the game. Otherwise Breaker wins. In this work we introduce the first constructive strategy for Maker for the $C_4$-Maker-Breaker game and show that he can win the game if $q < 0.16 n^{2/3}$. According to the theorem of Bednarska and Luczak (2000) $n^{2/3}$ is asymptotically optimal for this game, but the constant given there for a random Maker strategy is magnitudes apart from our constant 0.16.
△ Less
Submitted 26 June, 2024; v1 submitted 7 May, 2024;
originally announced May 2024.
-
Limitation of independent and identical distribution to capture the hierarchy of nonlocality
Authors:
Abhay Srivastav,
Saronath Halder
Abstract:
Importance of considering independent and identically distributed (iid) scenario is well-established in quantum theory. From entanglement detection to entangled state transformation, this scenario is useful in many tasks. Nevertheless, here we focus on the limitation of iid scenario. For this purpose, we consider the notion of nonlocality associated with local state discrimination problems (LSDPs)…
▽ More
Importance of considering independent and identically distributed (iid) scenario is well-established in quantum theory. From entanglement detection to entangled state transformation, this scenario is useful in many tasks. Nevertheless, here we focus on the limitation of iid scenario. For this purpose, we consider the notion of nonlocality associated with local state discrimination problems (LSDPs). Here, the term `nonlocality' denotes the difference between the local and the global abilities of discriminating quantum states. It is natural to consider LSDPs to study the aforesaid limitation because iid copies of quantum states are considered as resource in these problems. However, we first explore entanglement as resource in LSDPs where the states are pure. Then, we generalize our findings considering mixed states. In present LSDPs, our findings make the teleportation-based protocols sub-optimal. In fact, our results shed light on Schmidt rank as resource in LSDPs. Interestingly, we find instances where the states cannot be locally discriminated even if finite number of iid copies of the states are available. But local discrimination of these states can be done consuming quite less resource when we consider entanglement-assisted LSDPs. This allows us to compare the degrees of nonlocality associated with similar LSDPs within the same Hilbert space. Thus, we report a hierarchy of nonlocality which cannot be captured through iid scenario but it can be observed when entanglement is used as resource in certain LSDPs. Moreover, the difference in nonlocality may increase with increasing dimension. Finally, we show an application of our theory in secure locking of information and its resource-efficient extraction.
△ Less
Submitted 24 December, 2023;
originally announced December 2023.
-
Correlator webs of massive multiparton amplitudes at four loops: A study of boomerang webs
Authors:
Neelima Agarwal,
Sourav Pal,
Aditya Srivastav,
Anurag Tripathi
Abstract:
Logarithm of the soft function can be organized into sets of Feynman diagrams known as Cwebs. We introduced a new formalism in~\cite{Agarwal:2022wyk}, that allows to determine several of the building blocks of Cweb mixing matrices without explicit computations. In~\cite{Agarwal:2022xec} we used this formalism to obtain the diagonal blocks of four general classes of Cwebs to all orders in perturbat…
▽ More
Logarithm of the soft function can be organized into sets of Feynman diagrams known as Cwebs. We introduced a new formalism in~\cite{Agarwal:2022wyk}, that allows to determine several of the building blocks of Cweb mixing matrices without explicit computations. In~\cite{Agarwal:2022xec} we used this formalism to obtain the diagonal blocks of four general classes of Cwebs to all orders in perturbation theory which also covered all the four loop Boomerang Cwebs connecting four Wilson lines. In this work we present complete mixing matrices and exponentiated colour factors for Boomerang Cwebs at four loops that connect three and four Wilson lines. Also, we present a more efficient version of the algorithm of generating Cwebs that was presented in~\cite{Agarwal:2020nyc}. This new algorithm has been used to generate the Cwebs in the present work.
△ Less
Submitted 29 May, 2024; v1 submitted 29 July, 2023;
originally announced July 2023.
-
Radars for Autonomous Driving: A Review of Deep Learning Methods and Challenges
Authors:
Arvind Srivastav,
Soumyajit Mandal
Abstract:
Radar is a key component of the suite of perception sensors used for safe and reliable navigation of autonomous vehicles. Its unique capabilities include high-resolution velocity imaging, detection of agents in occlusion and over long ranges, and robust performance in adverse weather conditions. However, the usage of radar data presents some challenges: it is characterized by low resolution, spars…
▽ More
Radar is a key component of the suite of perception sensors used for safe and reliable navigation of autonomous vehicles. Its unique capabilities include high-resolution velocity imaging, detection of agents in occlusion and over long ranges, and robust performance in adverse weather conditions. However, the usage of radar data presents some challenges: it is characterized by low resolution, sparsity, clutter, high uncertainty, and lack of good datasets. These challenges have limited radar deep learning research. As a result, current radar models are often influenced by lidar and vision models, which are focused on optical features that are relatively weak in radar data, thus resulting in under-utilization of radar's capabilities and diminishing its contribution to autonomous perception. This review seeks to encourage further deep learning research on autonomous radar data by 1) identifying key research themes, and 2) offering a comprehensive overview of current opportunities and challenges in the field. Topics covered include early and late fusion, occupancy flow estimation, uncertainty modeling, and multipath detection. The paper also discusses radar fundamentals and data representation, presents a curated list of recent radar datasets, and reviews state-of-the-art lidar and vision models relevant for radar research. For a summary of the paper and more results, visit the website: autonomous-radars.github.io.
△ Less
Submitted 27 September, 2023; v1 submitted 15 June, 2023;
originally announced June 2023.
-
Multiparton Cwebs at five loops
Authors:
Shubham Mishra,
Sourav Pal,
Aditya Srivastav,
Anurag Tripathi
Abstract:
Scattering amplitudes involving multiple partons are plagued with infrared singularities. The soft singularities of the amplitude are captured by the soft function which is defined as the vacuum expectation value of Wilson line correlators. Renormalization properties of soft function allows us to write it as an exponential of the finite soft anomalous dimension. An efficient way to study the soft…
▽ More
Scattering amplitudes involving multiple partons are plagued with infrared singularities. The soft singularities of the amplitude are captured by the soft function which is defined as the vacuum expectation value of Wilson line correlators. Renormalization properties of soft function allows us to write it as an exponential of the finite soft anomalous dimension. An efficient way to study the soft function is through a set of Feynman diagrams known as Cwebs (webs). We present the mixing matrices and exponentiated colour factors (ECFs) for the Cwebs at five loops that connect six Wilson lines, except those that are related by relabeling of Wilson lines. Further, we express these ECFs in terms of 29 basis colour factors. We also find that this basis can be categorized into two colour structures. Our results are the first key ingredients for the calculation of the soft anomalous dimension at five loops.
△ Less
Submitted 1 July, 2024; v1 submitted 27 May, 2023;
originally announced May 2023.
-
Vortices in a rotating holographic superfluid with Lifshitz scaling
Authors:
Ankur Srivastav,
Sunandan Gangopadhyay
Abstract:
We have extended our previous work [1] on rotating holographic superfluids to include Lifshitz scaling. Presence of this scaling breaks relativistic invariance of the boundary superfluid system and indicates the existence of a Lifshitz fixed point [2]. We have analytically shown that we still get same vortex solutions as discovered earlier in [1]. We have recovered previous results for the case of…
▽ More
We have extended our previous work [1] on rotating holographic superfluids to include Lifshitz scaling. Presence of this scaling breaks relativistic invariance of the boundary superfluid system and indicates the existence of a Lifshitz fixed point [2]. We have analytically shown that we still get same vortex solutions as discovered earlier in [1]. We have recovered previous results for the case of z = 1, which restores the relativistic invariance in the holographic superfluid system. However, for z $\neq$ 1 this study indicate surprising results regarding dissipation in such a holographic superfluid. We found that higher winding number vortices increase with higher values of imaginary chemical potential for values of z in the open interval (1, 2). This result is remarkable because it asserts that dissipation in the rotating holographic superfluid increases in the presence of Lifshitz scaling.
△ Less
Submitted 13 April, 2023; v1 submitted 2 February, 2023;
originally announced February 2023.
-
Deciphering Colour Building Blocks of Massive Multiparton Amplitudes at 4-loops and beyond
Authors:
Neelima Agarwal,
Sourav Pal,
Aditya Srivastav,
Anurag Tripathi
Abstract:
The soft function in non-abelian gauge theories exponentiate, and their logarithms can be organised in terms of the collections of Feynman diagrams called Cwebs. The colour factors that appear in the logarithm are controlled by the web mixing matrices. Direct construction of the diagonal blocks of Cwebs using the new concepts of Normal ordering, basis Cweb and Fused-Web was recently carried out in…
▽ More
The soft function in non-abelian gauge theories exponentiate, and their logarithms can be organised in terms of the collections of Feynman diagrams called Cwebs. The colour factors that appear in the logarithm are controlled by the web mixing matrices. Direct construction of the diagonal blocks of Cwebs using the new concepts of Normal ordering, basis Cweb and Fused-Web was recently carried out in~\cite{Agarwal:2022wyk}. In this article we establish correspondence between the boomerang webs introduced in ~\cite{Gardi:2021gzz} and non-boomerang Cwebs. We use this correspondence together with Uniqueness theorem and Fused web formalism introduced in ~\cite{Agarwal:2022wyk} to obtain the diagonal blocks of four general classes of Cwebs to all orders in perturbation theory which also cover all the four loop Boomerang Cwebs connecting four Wilson lines. We also fully construct the mixing matrix of a special Cweb to all orders in perturbation theory.
△ Less
Submitted 2 March, 2023; v1 submitted 13 December, 2022;
originally announced December 2022.
-
Quantum Speed Limit From Tighter Uncertainty Relation
Authors:
Shrobona Bagchi,
Abhay Srivastav,
Arun Kumar Pati
Abstract:
The quantum speed limit provides a fundamental bound on how fast a quantum system can evolve between the initial and the final states under any physical operation. The celebrated Mandelstam-Tamm (MT) bound has been widely studied for various quantum systems undergoing unitary time evolution. Here, we prove a new quantum speed limit using the tighter uncertainty relations for pure quantum systems u…
▽ More
The quantum speed limit provides a fundamental bound on how fast a quantum system can evolve between the initial and the final states under any physical operation. The celebrated Mandelstam-Tamm (MT) bound has been widely studied for various quantum systems undergoing unitary time evolution. Here, we prove a new quantum speed limit using the tighter uncertainty relations for pure quantum systems undergoing arbitrary unitary evolution. We also derive a tighter uncertainty relation for mixed quantum states and then derive a new quantum speed limit for mixed quantum states from it such that it reduces to that of the pure quantum states derived from tighter uncertainty relations. We show that the MT bound is a special case of the tighter quantum speed limit derived here. We also show that this bound can be improved when optimized over many different sets of basis vectors. We illustrate the tighter speed limit for pure states with examples using random Hamiltonians and show that the new quantum speed limit outperforms the MT bound.
△ Less
Submitted 30 January, 2023; v1 submitted 26 November, 2022;
originally announced November 2022.
-
No-Masking Theorem for Observables and No-Bit Commitment
Authors:
Swapnil Bhowmick,
Abhay Srivastav,
Arun Kumar Pati
Abstract:
The no-masking theorem for quantum information proves that it is impossible to encode an input state into a larger bipartite entangled state such that full information is stored in the correlation, but the individual subsystems have no information about the input state. Here, we ask the question: Is it possible to mask an observable such that the information about the observable is available in th…
▽ More
The no-masking theorem for quantum information proves that it is impossible to encode an input state into a larger bipartite entangled state such that full information is stored in the correlation, but the individual subsystems have no information about the input state. Here, we ask the question: Is it possible to mask an observable such that the information about the observable is available in the joint system, but individual subsystems reveal nothing about the imprints of observable? This generalises the notion of no-masking theorem to quantum observables. We prove that for qubit systems, an arbitrary observable cannot be masked. Subsequently, we generalise the no-masking theorem for observables in higher dimensions. We also prove a no-hiding theorem for observables which goes beyond the conservation laws under symmetry operations. Furthermore, we prove that the famous unconditional no bit-commitment result follows from the no-masking theorem for observbles. Our results can have important applications in quantum information and quantum communication where we encode information not in states but in observables.
△ Less
Submitted 25 September, 2022;
originally announced September 2022.
-
Born-Infeld corrections to holographic transport coefficients with spatially modulated chemical potential
Authors:
Ankur Srivastav,
Sunandan Gangopadhyay,
Ashis Saha
Abstract:
In this work, we have analytically computed the holographic transport coefficients for (2 + 1)- dimensional strongly coupled field theories, placed in a spatially modulated chemical potential along the x-direction, in the presence of Born-Infeld electrodynamics. We have obtained these coefficients in terms of the black hole horizon data only. We have observed that the Born-Infeld parameter affects…
▽ More
In this work, we have analytically computed the holographic transport coefficients for (2 + 1)- dimensional strongly coupled field theories, placed in a spatially modulated chemical potential along the x-direction, in the presence of Born-Infeld electrodynamics. We have obtained these coefficients in terms of the black hole horizon data only. We have observed that the Born-Infeld parameter affects these coefficients in a non-trivial way. We have, then, used these results to further study a holographic model for ultra-clean graphene near Dirac point. This is a two current model with an inhomogeneous holographic lattice.
△ Less
Submitted 15 May, 2023; v1 submitted 2 August, 2022;
originally announced August 2022.
-
Generalised quantum speed limit for arbitrary time-continuous evolution
Authors:
Dimpi Thakuria,
Abhay Srivastav,
Brij Mohan,
Asmita Kumari,
Arun Kumar Pati
Abstract:
The quantum speed limit describes how quickly a quantum system can evolve in time from an initial state to a final state under a given dynamics. Here, we derive a generalised quantum speed limit (GQSL) for arbitrary time-continuous evolution using the geometrical approach of quantum mechanics. The GQSL is applicable for quantum systems undergoing unitary, non-unitary, completely positive, non-comp…
▽ More
The quantum speed limit describes how quickly a quantum system can evolve in time from an initial state to a final state under a given dynamics. Here, we derive a generalised quantum speed limit (GQSL) for arbitrary time-continuous evolution using the geometrical approach of quantum mechanics. The GQSL is applicable for quantum systems undergoing unitary, non-unitary, completely positive, non-completely positive and relativistic quantum dynamics. This reduces to the well known standard quantum speed limit (QSL), i.e., the Mandelstam-Tamm bound when the quantum system undergoes unitary time evolution. Using our formalism, we then obtain a quantum speed limit for non-Hermitian quantum systems. To illustrate our findings, we have estimated the quantum speed limit for a time-independent non-Hermitian system as well as for a time-dependent non-Hermitian system namely the Bethe-Lamb Hamiltonian for general two-level system.
△ Less
Submitted 23 December, 2023; v1 submitted 8 July, 2022;
originally announced July 2022.
-
Information Bleaching, No-Hiding Theorem and Indefinite Causal Order
Authors:
Abhay Srivastav,
Arun Kumar Pati
Abstract:
The information bleaching refers to any physical process that removes quantum information from the initial state of the physical system. The no-hiding theorem proves that if information is lost from the initial system, then it cannot remain in the bipartite quantum correlation and must be found in the remainder of the Hilbert space. We show that when hiding map acts on the input state in the prese…
▽ More
The information bleaching refers to any physical process that removes quantum information from the initial state of the physical system. The no-hiding theorem proves that if information is lost from the initial system, then it cannot remain in the bipartite quantum correlation and must be found in the remainder of the Hilbert space. We show that when hiding map acts on the input state in the presence of indefinite causal order, then it is possible to hide quantum information in the correlation. One may ask, does it then violate the no-hiding theorem? We analyse this question and argue that in the extended Hilbert space, it will still respect the no-hiding theorem. We also discuss how to mask quantum information using superposition of two hiding maps. Our results can have interesting implications in preserving the fidelity of information, preservation of quantum coherence and work extraction in the presence of two hiding maps with indefinite causal order. Furthermore, we apply the hiding maps in the presence of indefinite causal order on half of an entangled pair and show that entanglement cannot be preserved. Finally, we discuss that even though quantum entanglement is destroyed, the entanglement fidelity under indefinite causal order is non-zero and can approach close to one.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Building blocks of Cwebs in multiparton scattering amplitudes
Authors:
Neelima Agarwal,
Sourav Pal,
Aditya Srivastav,
Anurag Tripathi
Abstract:
The correlators of Wilson-line operators in non-abelian gauge theories are known to exponentiate, and their logarithms can be organised in terms of the collections of Feynman diagrams called Cwebs. The colour factors that appear in the logarithm correspond to completely connected diagrams and are determined by the web mixing matrices. In this article we introduce several new concepts: (a) Normal o…
▽ More
The correlators of Wilson-line operators in non-abelian gauge theories are known to exponentiate, and their logarithms can be organised in terms of the collections of Feynman diagrams called Cwebs. The colour factors that appear in the logarithm correspond to completely connected diagrams and are determined by the web mixing matrices. In this article we introduce several new concepts: (a) Normal ordering of the diagrams of a Cweb, (b) Fused-Webs (c) Basis and Family of Cwebs. We use these ideas together with a Uniqueness theorem that we prove to arrive at an understanding of the diagonal blocks, and several null matrices that appear in the mixing matrices. We demonstrate using our formalism that, once the basis Cwebs present upto order $α_{s}^{n}$ are determined, the number of exponentiated colour factors for several classes of Cwebs starting at order $α_{s}^{n+1}$ can be predicted. We further provide complete results for the mixing matrices, to all orders in perturbation theory, for two special classes of Cwebs using our framework.
△ Less
Submitted 8 June, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
Hemivariational Inequalities on Graphs
Authors:
Nouhayla Ait Oussaid,
Khalid Akhlil,
Sultana Ben Aadi,
Mourad El Ouali,
Anand Srivastav
Abstract:
In this paper, a new class of hemivariational inequalities is introduced. It concerns Laplace operator on locally finite graphs together with multivalued nonmonotone nonlinearities expressed in terms of Clarke's subdifferential. First of all, we state and prove some results on the subdifferentiability of nonconvex functionals defined on graphs. Thereafter, an elliptic hemivariational inequality on…
▽ More
In this paper, a new class of hemivariational inequalities is introduced. It concerns Laplace operator on locally finite graphs together with multivalued nonmonotone nonlinearities expressed in terms of Clarke's subdifferential. First of all, we state and prove some results on the subdifferentiability of nonconvex functionals defined on graphs. Thereafter, an elliptic hemivariational inequality on locally finite graphs is considered and the existence and uniqueness of its weak solutions are proved by means of the well-known surjectivity result for pseudomonotone map**s. In the end of this paper, we tackle the problem of hemivariational inequalities of parabolic type on locally finite graphs and we prove the existence of its weak solutions.
△ Less
Submitted 9 June, 2021;
originally announced June 2021.
-
Novel vortices and the role of complex chemical potential in a rotating holographic superfluid
Authors:
Ankur Srivastav,
Sunandan Gangopadhyay
Abstract:
In this work, we have analytically devised novel vortex solutions in a rotating holographic superfluid. To achieve this result, we have considered a static disc at the AdS boundary and let the superfluid rotate relative to it. This idea has been numerically exploited in [1] where formation of vortices in such a setting was reported. We have found that these vortex solutions are eigenfunctions of a…
▽ More
In this work, we have analytically devised novel vortex solutions in a rotating holographic superfluid. To achieve this result, we have considered a static disc at the AdS boundary and let the superfluid rotate relative to it. This idea has been numerically exploited in [1] where formation of vortices in such a setting was reported. We have found that these vortex solutions are eigenfunctions of angular momentum. We have also shown that vortices with higher winding numbers are associated with higher quantized rotation of the superfluid. We have, then, analysed the equation of motion along bulk AdS direction using Stürm-Liouville eigenvalue approach. A surprising outcome of our study is that the chemical potential must be purely imaginary. We have then observed that the winding number of the vortices decreases with the increase in the imaginary chemical potential. We conclude from this that imaginary chemical potential leads to less dissipation in such holographic superfluids.
△ Less
Submitted 1 February, 2022; v1 submitted 31 May, 2021;
originally announced May 2021.
-
Repeated randomized algorithm for the Multicovering Problem
Authors:
Abbass Gorgi,
Mourad El Ouali,
Anand Srivastav,
Mohamed Hachimi
Abstract:
Let $\mathcal{H}=(V,\mathcal{E})$ be a hypergraph with maximum edge size $\ell$ and maximum degree $Δ$. For given numbers $b_v\in \mathbb{N}_{\geq 2}$, $v\in V$, a set multicover in $\mathcal{H}$ is a set of edges $C \subseteq \mathcal{E}$ such that every vertex $v$ in $V$ belongs to at least $b_v$ edges in $C$. Set multicover is the problem of finding a minimum-cardinality set multicover. Peleg,…
▽ More
Let $\mathcal{H}=(V,\mathcal{E})$ be a hypergraph with maximum edge size $\ell$ and maximum degree $Δ$. For given numbers $b_v\in \mathbb{N}_{\geq 2}$, $v\in V$, a set multicover in $\mathcal{H}$ is a set of edges $C \subseteq \mathcal{E}$ such that every vertex $v$ in $V$ belongs to at least $b_v$ edges in $C$. Set multicover is the problem of finding a minimum-cardinality set multicover. Peleg, Schechtman and Wool conjectured that unless $\cal{P} =\cal{NP}$, for any fixed $Δ$ and $b:=\min_{v\in V}b_{v}$, no polynomial-time approximation algorithm for the Set multicover problem has an approximation ratio less than $δ:=Δ-b+1$. Hence, it's a challenge to know whether the problem of set multicover is not approximable within a ratio of $βδ$ with a constant $β<1$.
This paper proposes a repeated randomized algorithm for the Set multicover problem combined with an initial deterministic threshold step. Boosting success by repeated trials, our algorithm yields an approximation ratio of $ \max\left\{ \frac{15}{16}δ, \left(1- \frac{(b-1)\exp\left(\frac{ 3δ+1}{8}\right)}{72 \ell} \right)δ\right\}$. The crucial fact is not only that our result improves over the approximation ratio presented by Srivastav et al (Algorithmica 2016) for any $δ\geq 13$, but it's more general since we set no restriction on the parameter $\ell$.
Furthermore, we prove that it is NP-hard to approximate the Set multicover problem on $Δ$-regular hypergraphs within a factor of $(δ-1-ε)$.
Moreover we show that the integrality gap for the Set multicover problem is at least $\frac{\ln_{2}(n+1)}{2b}$, which for constant $b$ is $Ω(\ln n )$.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
Microstructure evolution and densification during spark plasma sintering of nanocrystalline W-5wt.%Ta alloy
Authors:
Ajeet K. Srivastav,
Suresh Bandi,
Abhishek Kumar,
B. S. Murty
Abstract:
The present work reports the effect of Ta on densification and microstructure evolution during non-isothermal and spark plasma sintering of nanocrystalline W. Nanocrystalline W-5wt.%Ta alloy powder was synthesized using mechanical alloying. The nanocrystalline powder was characterized thoroughly using X-ray diffraction line profile analysis. Furthermore, the shrinkage behavior of nanocrystalline p…
▽ More
The present work reports the effect of Ta on densification and microstructure evolution during non-isothermal and spark plasma sintering of nanocrystalline W. Nanocrystalline W-5wt.%Ta alloy powder was synthesized using mechanical alloying. The nanocrystalline powder was characterized thoroughly using X-ray diffraction line profile analysis. Furthermore, the shrinkage behavior of nanocrystalline powder was investigated during non-isothermal sintering using dilatometry. Subsequently, the alloy powder was consolidated using spark plasma sintering up to 1600 °C. The role of Ta on stabilizing the microstructure during spark plasma sintering of nanocrystalline W was investigated in detail using electron backscatter diffraction. The average grain size of spark plasma sintered W-5wt.%Ta alloy was observed as 1.73 micron.
△ Less
Submitted 25 July, 2020;
originally announced July 2020.
-
A generalized expression for filling congruent circles in a circle
Authors:
Ajeet K. Srivastav
Abstract:
The paper reports a generalized expression for filling the congruent circles (of radius r) in a circle (of radius R). First, a generalized expression for the biggest circle (r) inscribed in the nth part of the bigger circle (R) was developed. Further, it was extended as n such circles (r) touching each other and the bigger circle (R). To fill the bigger circle (R), the exercise was further repeate…
▽ More
The paper reports a generalized expression for filling the congruent circles (of radius r) in a circle (of radius R). First, a generalized expression for the biggest circle (r) inscribed in the nth part of the bigger circle (R) was developed. Further, it was extended as n such circles (r) touching each other and the bigger circle (R). To fill the bigger circle (R), the exercise was further repeated by considering the bigger circle radius as R-2r, R-4r and so on. In the process, a generalized expression was deduced for the total no. of such circles (r) which could be inscribed in this way of filling the bigger circle (R). The approach does not claim the closest packing always though it could be helpful for practical purposes.
△ Less
Submitted 6 June, 2020;
originally announced June 2020.
-
Localized pore evolution assisted densification during spark plasma sintering of nanocrystalline W-5wt.%Mo alloy
Authors:
Ajeet K. Srivastav,
Niraj Chawake,
Devinder Yadav,
N. S. Karthiselva,
B. S. Murty
Abstract:
The present work reports the role of different atomic mobility induced localized pore evolution on densification during spark plasma sintering of nanocrystalline W-Mo alloy powder. The shrinkage (or expansion) behavior of cold compacted milled powders was studied using dilatometry during non-isothermal sintering up to 1600 °C. Subsequently, the milled powders were densified to ~95% relative densit…
▽ More
The present work reports the role of different atomic mobility induced localized pore evolution on densification during spark plasma sintering of nanocrystalline W-Mo alloy powder. The shrinkage (or expansion) behavior of cold compacted milled powders was studied using dilatometry during non-isothermal sintering up to 1600 °C. Subsequently, the milled powders were densified to ~95% relative density using spark plasma sintering up to 1600 °C. The enhanced localized Joule heating due to dynamically evolved porous structure could be attributed for the densification during spark plasma sintering.
△ Less
Submitted 3 June, 2020;
originally announced June 2020.
-
Approximation algorithm for the Multicovering Problem
Authors:
Abbass Gorgi,
Mourad El Ouali,
Anand Srivastav,
Mohamed Hachimi
Abstract:
Let $\mathcal{H}=(V,\mathcal{E})$ be a hypergraph with maximum edge size $\ell$ and maximum degree $Δ$. For given numbers $b_v\in \mathbb{N}_{\geq 2}$, $v\in V$, a set multicover in $\mathcal{H}$ is a set of edges $C \subseteq \mathcal{E}$ such that every vertex $v$ in $V$ belongs to at least $b_v$ edges in $C$. Set Multicover is the problem of finding a minimum-cardinality set multicover. Peleg,…
▽ More
Let $\mathcal{H}=(V,\mathcal{E})$ be a hypergraph with maximum edge size $\ell$ and maximum degree $Δ$. For given numbers $b_v\in \mathbb{N}_{\geq 2}$, $v\in V$, a set multicover in $\mathcal{H}$ is a set of edges $C \subseteq \mathcal{E}$ such that every vertex $v$ in $V$ belongs to at least $b_v$ edges in $C$. Set Multicover is the problem of finding a minimum-cardinality set multicover. Peleg, Schechtman and Wool conjectured that for any fixed $Δ$ and $b:=\min_{v\in V}b_{v}$, the problem of \sbmultcov is not approximable within a ratio less than $δ:=Δ-b+1$, unless $\mathcal{P} =\mathcal{NP}$. Hence it's a challenge to explore for which classes of hypergraph the conjecture doesn't hold.
We present a polynomial time algorithm for the Set Multicover problem which combines a deterministic threshold algorithm with conditioned randomized rounding steps. Our algorithm yields an approximation ratio of $ \max\left\{ \frac{148}{149}δ, \left(1- \frac{ (b-1)e^{\fracδ{4}}}{94\ell} \right)δ\right\}$. Our result not only improves over the approximation ratio presented by Srivastav et al (Algorithmica 2016) but it's more general since we set no restriction on the parameter $\ell$. Moreover we present a further polynomial time algorithm with an approximation ratio of $\frac{5}{6}δ$ for hypergraphs with $\ell\leq (1+ε)\bar{\ell}$ for any fixed $ε\in [0,\frac{1}{2}]$, where $\bar{\ell}$ is the average edge size. The analysis of this algorithm relies on matching/covering duality due to Ray-Chaudhuri (1960), which we convert into an approximative form. The second performance disprove the conjecture of peleg et al for a large subclass of hypergraphs.
△ Less
Submitted 15 March, 2020;
originally announced March 2020.
-
$p$-wave holographic superconductors with massive vector condensate in Born-Infeld electrodynamics
Authors:
Ankur Srivastav,
Debabrata Ghorai,
Sunandan Gangopadhyay
Abstract:
In this paper, we have studied the effect of Born-Infeld electrodynamics in holographic $p$-wave superconductors with massive vector condensation. We have analysed this model in the probe limit using a variational method known as the Stürm-Liouville eigenvalue approach. For this $p$-wave holographic superconductor model, we have calculated the critical temperature $T_{c}$ as well as the value of t…
▽ More
In this paper, we have studied the effect of Born-Infeld electrodynamics in holographic $p$-wave superconductors with massive vector condensation. We have analysed this model in the probe limit using a variational method known as the Stürm-Liouville eigenvalue approach. For this $p$-wave holographic superconductor model, we have calculated the critical temperature $T_{c}$ as well as the value of the condensation operator for two different choices of $m^{2}$. We have also pointed out the similarities and dissimilarities between this model for $m^{2} = 0$ and $p$-wave holographic superconductor model constructed out of Einstein-Yang-Mills theory. We have then computed the conductivity of these holographic superconductor models using a self-consistent approach and have shown that the DC conductivity diverges.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Online Non-Monotone DR-submodular Maximization
Authors:
Nguyen Kim Thang,
Abhinav Srivastav
Abstract:
In this paper, we study fundamental problems of maximizing DR-submodular continuous functions that have real-world applications in the domain of machine learning, economics, operations research and communication systems. It captures a subclass of non-convex optimization that provides both theoretical and practical guarantees. Here, we focus on minimizing regret for online arriving non-monotone DR-…
▽ More
In this paper, we study fundamental problems of maximizing DR-submodular continuous functions that have real-world applications in the domain of machine learning, economics, operations research and communication systems. It captures a subclass of non-convex optimization that provides both theoretical and practical guarantees. Here, we focus on minimizing regret for online arriving non-monotone DR-submodular functions over different types of convex sets: hypercube, down-closed and general convex sets.
First, we present an online algorithm that achieves a $1/e$-approximation ratio with the regret of $O(T^{2/3})$ for maximizing DR-submodular functions over any down-closed convex set. Note that, the approximation ratio of $1/e$ matches the best-known guarantee for the offline version of the problem. Moreover, when the convex set is the hypercube, we propose a tight 1/2-approximation algorithm with regret bound of $O(\sqrt{T})$. Next, we give an online algorithm that achieves an approximation guarantee (depending on the search space) for the problem of maximizing non-monotone continuous DR-submodular functions over a \emph{general} convex set (not necessarily down-closed). To best of our knowledge, no prior algorithm with approximation guarantee was known for non-monotone DR-submodular maximization in the online setting. Finally we run experiments to verify the performance of our algorithms on problems arising in machine learning domain with the real-world datasets.
△ Less
Submitted 23 June, 2020; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Non-monotone DR-submodular Maximization: Approximation and Regret Guarantees
Authors:
Christoph Dürr,
Nguyen Kim Thang,
Abhinav Srivastav,
Léo Tible
Abstract:
Diminishing-returns (DR) submodular optimization is an important field with many real-world applications in machine learning, economics and communication systems. It captures a subclass of non-convex optimization that provides both practical and theoretical guarantees. In this paper, we study the fundamental problem of maximizing non-monotone DR-submodular functions over down-closed and general co…
▽ More
Diminishing-returns (DR) submodular optimization is an important field with many real-world applications in machine learning, economics and communication systems. It captures a subclass of non-convex optimization that provides both practical and theoretical guarantees. In this paper, we study the fundamental problem of maximizing non-monotone DR-submodular functions over down-closed and general convex sets in both offline and online settings. First, we show that for offline maximizing non-monotone DR-submodular functions over a general convex set, the Frank-Wolfe algorithm achieves an approximation guarantee which depends on the convex set. Next, we show that the Stochastic Gradient Ascent algorithm achieves a 1/4-approximation ratio with the regret of $O(1/\sqrt{T})$ for the problem of maximizing non-monotone DR-submodular functions over down-closed convex sets. These are the first approximation guarantees in the corresponding settings. Finally we benchmark these algorithms on problems arising in machine learning domain with the real-world datasets.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Analytic investigation of rotating holographic superconductors
Authors:
Ankur Srivastav,
Sunandan Gangopadhyay
Abstract:
In this paper we have investigated, in the probe limit, $s$-wave holographic superconductors in rotating $AdS_{3+1}$ spacetime using the matching method as well as the St{ü}rm-Liouville eigenvalue approach. We have calculated the critical temperature using the matching technique in such a setting and our results are in agreement with previously reported results obtained using the St{ü}rm-Liouville…
▽ More
In this paper we have investigated, in the probe limit, $s$-wave holographic superconductors in rotating $AdS_{3+1}$ spacetime using the matching method as well as the St{ü}rm-Liouville eigenvalue approach. We have calculated the critical temperature using the matching technique in such a setting and our results are in agreement with previously reported results obtained using the St{ü}rm-Liouville approach. We have then obtained the condensation operators using both analytical methods. The results obtained by both these techniques share the same features as found numerically. We observe that the rotation parameter of the black hole affects the critical temperature and the condensation operator in a non-trivial way.
△ Less
Submitted 26 March, 2019; v1 submitted 5 February, 2019;
originally announced February 2019.
-
A new Bound for the Maker-Breaker Triangle Game
Authors:
Christian Glazik,
Anand Srivastav
Abstract:
The triangle game introduced by Chvátal and Erdős (1978) is one of the most famous combinatorial games. For $n,q\in\mathbb{N}$, the $(n,q)$-triangle game is played by two players, called Maker and Breaker, on the complete graph $K_n$. Alternately Maker claims one edge and thereafter Breaker claims $q$ edges of the graph. Maker wins the game if he can claim all three edges of a triangle, otherwise…
▽ More
The triangle game introduced by Chvátal and Erdős (1978) is one of the most famous combinatorial games. For $n,q\in\mathbb{N}$, the $(n,q)$-triangle game is played by two players, called Maker and Breaker, on the complete graph $K_n$. Alternately Maker claims one edge and thereafter Breaker claims $q$ edges of the graph. Maker wins the game if he can claim all three edges of a triangle, otherwise Breaker wins. Chvátal and Erdős (1978) proved that for $q<\sqrt{2n+2}-5/2\approx 1.414\sqrt{n}$ Maker has a winning strategy, and for $q\geq 2\sqrt{n}$ Breaker has a winning strategy. Since then, the problem of finding the exact leading constant for the threshold bias of the triangle game has been one of the famous open problems in combinatorial game theory. In fact, the constant is not known for any graph with a cycle and we do not even know if such a constant exists. Balogh and Samotij (2011) slightly improved the Chvátal-Erdős constant for Breaker's winning strategy from $2$ to $1.935$ with a randomized approach. Since then no progress was made. In this work, we present a new deterministic strategy for Breaker's win whenever $n$ is sufficiently large and $q\geq\sqrt{(8/3+o(1))n}\approx 1.633\sqrt{n}$, significantly reducing the gap towards the lower bound. In previous strategies Breaker chooses his edges such that one node is part of the last edge chosen by Maker, whereas the remaining node is chosen more or less arbitrarily. In contrast, we introduce a suitable potential function on the set of nodes. This allows Breaker to pick edges that connect the most `dangerous' nodes. The total potential of the game may still increase, even for several turns, but finally Breaker's strategy prevents the total potential of the game from exceeding a critical level and leads to Breaker's win.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
Online Non-Preemptive Scheduling to Minimize Weighted Flow-time on Unrelated Machines
Authors:
Giorgio Lucarelli,
Benjamin Moseley,
Nguyen Kim Thang,
Abhinav Srivastav,
Denis Trystram
Abstract:
In this paper, we consider the online problem of scheduling independent jobs \emph{non-preemptively} so as to minimize the weighted flow-time on a set of unrelated machines. There has been a considerable amount of work on this problem in the preemptive setting where several competitive algorithms are known in the classical competitive model. %Using the speed augmentation model, Anand et al. showed…
▽ More
In this paper, we consider the online problem of scheduling independent jobs \emph{non-preemptively} so as to minimize the weighted flow-time on a set of unrelated machines. There has been a considerable amount of work on this problem in the preemptive setting where several competitive algorithms are known in the classical competitive model. %Using the speed augmentation model, Anand et al. showed that the greedy algorithm is $O\left(\frac{1}ε\right)$-competitive in the preemptive setting. In the non-preemptive setting, Lucarelli et al. showed that there exists a strong lower bound for minimizing weighted flow-time even on a single machine. However, the problem in the non-preemptive setting admits a strong lower bound. Recently, Lucarelli et al. presented an algorithm that achieves a $O\left(\frac{1}{ε^2}\right)$-competitive ratio when the algorithm is allowed to reject $ε$-fraction of total weight of jobs and $ε$-speed augmentation. They further showed that speed augmentation alone is insufficient to derive any competitive algorithm. An intriguing open question is whether there exists a scalable competitive algorithm that rejects a small fraction of total weights.
In this paper, we affirmatively answer this question. Specifically, we show that there exists a $O\left(\frac{1}{ε^3}\right)$-competitive algorithm for minimizing weighted flow-time on a set of unrelated machine that rejects at most $O(ε)$-fraction of total weight of jobs. The design and analysis of the algorithm is based on the primal-dual technique. Our result asserts that alternative models beyond speed augmentation should be explored when designing online schedulers in the non-preemptive setting in an effort to find provably good algorithms.
△ Less
Submitted 23 April, 2018;
originally announced April 2018.
-
Online Non-preemptive Scheduling on Unrelated Machines with Rejections
Authors:
Giorgio Lucarelli,
Benjamin Moseley,
Nguyen Kim Thang,
Abhinav Srivastav,
Denis Trystram
Abstract:
When a computer system schedules jobs there is typically a significant cost associated with preempting a job during execution. This cost can be from the expensive task of saving the memory's state and loading data into and out of memory. It is desirable to schedule jobs non-preemptively to avoid the costs of preemption. There is a need for non-preemptive system schedulers on desktops, servers and…
▽ More
When a computer system schedules jobs there is typically a significant cost associated with preempting a job during execution. This cost can be from the expensive task of saving the memory's state and loading data into and out of memory. It is desirable to schedule jobs non-preemptively to avoid the costs of preemption. There is a need for non-preemptive system schedulers on desktops, servers and data centers. Despite this need, there is a gap between theory and practice. Indeed, few non-preemptive \emph{online} schedulers are known to have strong foundational guarantees. This gap is likely due to strong lower bounds on any online algorithm for popular objectives. Indeed, typical worst case analysis approaches, and even resource augmented approaches such as speed augmentation, result in all algorithms having poor performance guarantees. This paper considers on-line non-preemptive scheduling problems in the worst-case rejection model where the algorithm is allowed to reject a small fraction of jobs. By rejecting only a few jobs, this paper shows that the strong lower bounds can be circumvented. This approach can be used to discover algorithmic scheduling policies with desirable worst-case guarantees. Specifically, the paper presents algorithms for the following two objectives: minimizing the total flow-time and minimizing the total weighted flow-time plus energy under the speed-scaling mechanism. The algorithms have a small constant competitive ratio while rejecting only a constant fraction of jobs. Beyond specific results, the paper asserts that alternative models beyond speed augmentation should be explored to aid in the discovery of good schedulers in the face of the requirement of being online and non-preemptive.
△ Less
Submitted 28 February, 2018;
originally announced February 2018.
-
Finding Euler Tours in One Pass in the W-Streaming Model with O(n log(n)) RAM
Authors:
Christian Glazik,
Jan Schiemann,
Anand Srivastav
Abstract:
We study the problem of finding an Euler tour in an undirected graph G in the W-Streaming model with O(n polylog(n)) RAM, where n resp. m is the number of nodes resp. edges of G. Our main result is the first one pass W-Streaming algorithm computing an Euler tour of G in the form of an edge successor function with only O(n log(n)) RAM which is optimal for this setting (e.g., Sun and Woodruff (2015)…
▽ More
We study the problem of finding an Euler tour in an undirected graph G in the W-Streaming model with O(n polylog(n)) RAM, where n resp. m is the number of nodes resp. edges of G. Our main result is the first one pass W-Streaming algorithm computing an Euler tour of G in the form of an edge successor function with only O(n log(n)) RAM which is optimal for this setting (e.g., Sun and Woodruff (2015)). The previously best-known result in this model is implicitly given by Demetrescu et al. (2010) with the parallel algorithm of Atallah and Vishkin (1984) using O(m/n) passes under the same RAM limitation. For graphs with ω(n) edges this is non-constant. Our overall approach is to partition the edges into edge-disjoint cycles and to merge the cycles until a single Euler tour is achieved. Note that in the W-Streaming model such a merging is far from being obvious as the limited RAM allows the processing of only a constant number of cycles at once. This enforces us to merge cycles that partially are no longer present in RAM. Furthermore, the successor of an edge cannot be changed after the edge has left RAM. So, we steadily have to output edges and their designated successors, not knowing the appearance of edges and cycles yet to come. We solve this problem with a special edge swap** technique, for which two certain edges per node are sufficient to merge tours without having all of their edges in RAM. Mathematically, this is controlled by structural results on the space of certain equivalence classes corresponding to cycles and the characterization of associated successor functions. For example, we give conditions under which the swap** of edge successors leads to a merging of equivalence classes.
△ Less
Submitted 11 October, 2017;
originally announced October 2017.
-
Symbolic Analysis-based Reduced Order Markov Modeling of Time Series Data
Authors:
Devesh K Jha,
Nurali Virani,
Jan Reimann,
Abhishek Srivastav,
Asok Ray
Abstract:
This paper presents a technique for reduced-order Markov modeling for compact representation of time-series data. In this work, symbolic dynamics-based tools have been used to infer an approximate generative Markov model. The time-series data are first symbolized by partitioning the continuous measurement space of the signal and then, the discrete sequential data are modeled using symbolic dynamic…
▽ More
This paper presents a technique for reduced-order Markov modeling for compact representation of time-series data. In this work, symbolic dynamics-based tools have been used to infer an approximate generative Markov model. The time-series data are first symbolized by partitioning the continuous measurement space of the signal and then, the discrete sequential data are modeled using symbolic dynamics. In the proposed approach, the size of temporal memory of the symbol sequence is estimated from spectral properties of the resulting stochastic matrix corresponding to a first-order Markov model of the symbol sequence. Then, hierarchical clustering is used to represent the states of the corresponding full-state Markov model to construct a reduced-order or size Markov model with a non-deterministic algebraic structure. Subsequently, the parameters of the reduced-order Markov model are identified from the original model by making use of a Bayesian inference rule. The final model is selected using information-theoretic criteria. The proposed concept is elucidated and validated on two different data sets as examples. The first example analyzes a set of pressure data from a swirl-stabilized combustor, where controlled protocols are used to induce flame instabilities. Variations in the complexity of the derived Markov model represent how the system operating condition changes from a stable to an unstable combustion regime. In the second example, the data set is taken from NASA's data repository for prognostics of bearings on rotating shafts. We show that, even with a very small state-space, the reduced-order models are able to achieve comparable performance and that the proposed approach provides flexibility in the selection of a final model for representation and learning.
△ Less
Submitted 26 September, 2017;
originally announced September 2017.
-
A textual transform of multivariate time-series for prognostics
Authors:
Abhay Harpale,
Abhishek Srivastav
Abstract:
Prognostics or early detection of incipient faults is an important industrial challenge for condition-based and preventive maintenance. Physics-based approaches to modeling fault progression are infeasible due to multiple interacting components, uncontrolled environmental factors and observability constraints. Moreover, such approaches to prognostics do not generalize to new domains. Consequently,…
▽ More
Prognostics or early detection of incipient faults is an important industrial challenge for condition-based and preventive maintenance. Physics-based approaches to modeling fault progression are infeasible due to multiple interacting components, uncontrolled environmental factors and observability constraints. Moreover, such approaches to prognostics do not generalize to new domains. Consequently, domain-agnostic data-driven machine learning approaches to prognostics are desirable. Damage progression is a path-dependent process and explicitly modeling the temporal patterns is critical for accurate estimation of both the current damage state and its progression leading to total failure. In this paper, we present a novel data-driven approach to prognostics that employs a novel textual representation of multivariate temporal sensor observations for predicting the future health state of the monitored equipment early in its life. This representation enables us to utilize well-understood concepts from text-mining for modeling, prediction and understanding distress patterns in a domain agnostic way. The approach has been deployed and successfully tested on large scale multivariate time-series data from commercial aircraft engines. We report experiments on well-known publicly available benchmark datasets and simulation datasets. The proposed approach is shown to be superior in terms of prediction accuracy, lead time to prediction and interpretability.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
On the Query Complexity of Black-Peg AB-Mastermind
Authors:
Mourad El Ouali,
Christian Glazik,
Volkmar Sauerland,
Anand Srivastav
Abstract:
Mastermind game is a two players zero sum game of imperfect information. The first player, called codemaker, chooses a secret code and the second player, called codebreaker, tries to break the secret code by making as few guesses as possible, exploiting information that is given by the codemaker after each guess. In this paper, we consider the so called Black-Peg variant of Mastermind, where the o…
▽ More
Mastermind game is a two players zero sum game of imperfect information. The first player, called codemaker, chooses a secret code and the second player, called codebreaker, tries to break the secret code by making as few guesses as possible, exploiting information that is given by the codemaker after each guess. In this paper, we consider the so called Black-Peg variant of Mastermind, where the only information concerning a guess is the number of positions in which the guess coincides with the secret code. More precisely, we deal with a special version of the Black-Peg game with n holes and k<=n colors where no repetition of colors is allowed. We present upper and lower bounds on the number of guesses necessary to break the secret code. We first come back to the upper bound results introduced by El Ouali and Sauerland (2013). For the case k=n the secret code can be algorithmically identified within less than (n-3)*ld(n)+5n/2 queries. That result improves the result of Ker-I Ko and Shia-Chung Teng (1985) by almost a factor of 2. For the case k>n we prove an upper bound for the problem of (n-1)*ld(n)+k+1. Furthermore we prove a new lower bound for (a generalization of) the case k=n that improves the recent result of Berger et al. (2016) from n-log(log(n)) to n. We also give a lower bound of k queries for the case k>n.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
Swap Equilibria under Link and Vertex Destruction
Authors:
Lasse Kliemann,
Elmira Shirazi Sheykhdarabadi,
Anand Srivastav
Abstract:
We initiate the study of the \emph{destruction model} (\aka \emph{adversary model}) introduced by Kliemann (2010), using the stability concept of \emph{swap equilibrium} introduced by Alon et. al (2010). The destruction model is a network formation game incorporating the robustness of a network under a more or less targeted attack. In addition to bringing in the swap equilibrium (SE) concept, we e…
▽ More
We initiate the study of the \emph{destruction model} (\aka \emph{adversary model}) introduced by Kliemann (2010), using the stability concept of \emph{swap equilibrium} introduced by Alon et. al (2010). The destruction model is a network formation game incorporating the robustness of a network under a more or less targeted attack. In addition to bringing in the swap equilibrium (SE) concept, we extend the model from an attack on the edges of the network to an attack on its vertices. Vertex destruction can generally cause more harm and tends to be more difficult to analyze.
We prove structural results and linear upper bounds or super-linear lower bounds on the social cost of SE under different attack scenarios. The most complex case is when the vertex to be destroyed is chosen uniformly at random from the set of those vertices where each causes a maximum number of player pairs to be separated (called a max-sep vertex). We prove a lower bound on the social cost of $Ω(n^{3/2})$ for this case and initiate an understanding of the structural properties of SE in this scenario. Namely, we prove that there is no SE that is a tree and has only one max-sep vertex. We conjecture that this result can be generalized, in particular we conjecture that there is no SE that is a tree. On the other hand, we prove that if the vertex to be destroyed is chosen uniformly at random from the set of \emph{all} vertices, then each SE is a tree (unless it is two-connected). Our conjecture would imply that moving from the uniform probability measure to a measure concentrated on the max-sep vertices, means moving from no SE having a cycle (unless two-connected) to each SE having a cycle. This would ask for a more detailed study of this transition in future work.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
An Improved Filtering Algorithm for Big Read Datasets
Authors:
Axel Wedemeyer,
Lasse Kliemann,
Anand Srivastav,
Christian Schielke,
Thorsten B. Reusch,
Philip Rosenstiel
Abstract:
For single-cell or metagenomic sequencing projects, it is necessary to sequence with a very high mean coverage in order to make sure that all parts of the sample DNA get covered by the reads produced. This leads to huge datasets with lots of redundant data. A filtering of this data prior to assembly is advisable. Titus Brown et al. (2012) presented the algorithm Diginorm for this purpose, which fi…
▽ More
For single-cell or metagenomic sequencing projects, it is necessary to sequence with a very high mean coverage in order to make sure that all parts of the sample DNA get covered by the reads produced. This leads to huge datasets with lots of redundant data. A filtering of this data prior to assembly is advisable. Titus Brown et al. (2012) presented the algorithm Diginorm for this purpose, which filters reads based on the abundance of their $k$-mers. We present Bignorm, a faster and quality-conscious read filtering algorithm. An important new feature is the use of phred quality scores together with a detailed analysis of the $k$-mer counts to decide which reads to keep. With recommended parameters, in terms of median we remove 97.15% of the reads while kee** the mean phred score of the filtered dataset high. Using the SDAdes assembler, we produce assemblies of high quality from these filtered datasets in a fraction of the time needed for an assembly from the datasets filtered with Diginorm. We conclude that read filtering is a practical method for reducing read data and for speeding up the assembly process. Our Bignorm algorithm allows assemblies of competitive quality in comparison to Diginorm, while being much faster. Bignorm is available for download at https://git.informatik.uni-kiel.de/axw/Bignorm.git
△ Less
Submitted 11 October, 2016;
originally announced October 2016.
-
Finding Euler Tours in the StrSort Model
Authors:
Lasse Kliemann,
Jan Schiemann,
Anand Srivastav
Abstract:
We present a first algorithm for finding Euler tours in undirected graphs in the StrSort model. This model is a relaxation of the semi streaming model. The graph is given as a stream of its edges and can only be read sequentially, but while doing a pass over the stream we are allowed to write out another stream which will be the input for the next pass. In addition, items in the stream are sorted…
▽ More
We present a first algorithm for finding Euler tours in undirected graphs in the StrSort model. This model is a relaxation of the semi streaming model. The graph is given as a stream of its edges and can only be read sequentially, but while doing a pass over the stream we are allowed to write out another stream which will be the input for the next pass. In addition, items in the stream are sorted between passes. This model was introduced by Aggarwal et al. in 2004. Here we apply this model to the problem of finding an Euler tour in a graph (or to decide that the graph does not admit an Euler tour). The algorithm works in two steps. In the first step, a single pass is conducted while a linear (in the number of vertices $n$) amount of RAM is required. In the second step, $\mathcal O(\log(n))$ passes are conducted while only $\mathcal O(\log(n))$ RAM is required.
We use an alteration of the algorithm of Atallah and Vishkin from 1984 for finding Euler tours in parallel. It finds a partition of edge-disjoint circuits and arranges them in a tree expressing their connectivity. Then the circuits are merged according to this tree. In order to minimize the needed amount of RAM, we evade the need to store the entire tree and use techniques suggested by Aggarwal et al. to exchange information concerning the merging of circuits.
△ Less
Submitted 11 October, 2016;
originally announced October 2016.
-
Price of Anarchy for Graph Coloring Games with Concave Payoff
Authors:
Lasse Kliemann,
Elmira Shirazi Sheykhdarabadi,
Anand Srivastav
Abstract:
We study the price of anarchy in a class of graph coloring games (a subclass of polymatrix common-payoff games). In those games, players are vertices of an undirected, simple graph, and the strategy space of each player is the set of colors from $1$ to $k$. A tight bound on the price of anarchy of $\frac{k}{k-1}$ is known (Hoefer 2007, Kun et al. 2013), for the case that each player's payoff is th…
▽ More
We study the price of anarchy in a class of graph coloring games (a subclass of polymatrix common-payoff games). In those games, players are vertices of an undirected, simple graph, and the strategy space of each player is the set of colors from $1$ to $k$. A tight bound on the price of anarchy of $\frac{k}{k-1}$ is known (Hoefer 2007, Kun et al. 2013), for the case that each player's payoff is the number of her neighbors with different color than herself. The study of more complex payoff functions was left as an open problem.
We compute payoff for a player by determining the distance of her color to the color of each of her neighbors, applying a non-negative, real-valued, concave function $f$ to each of those distances, and then summing up the resulting values. This includes the payoff functions suggested by Kun et al. (2013) for future work as special cases.
Denote $f^*$ the maximum value that $f$ attains on the possible distances $0,\dots,k-1$. We prove an upper bound of $2$ on the price of anarchy for concave functions $f$ that are non-decreasing or which assume $f^*$ at a distance on or below $\lfloor\frac{k}{2}\rfloor$. Matching lower bounds are given for the monotone case and for the case that $f^*$ is assumed in $\frac{k}{2}$ for even $k$. For general concave functions, we prove an upper bound of $3$. We use a simple but powerful technique: we obtain an upper bound of $λ\geq 1$ on the price of anarchy if we manage to give a splitting $λ_1 + \dots + λ_k = λ$ such that $\sum_{s=1}^k λ_s \cdot f(|s-p|) \geq f^*$ for all $p \in \{1,\dots,k\}$. The discovery of working splittings can be supported by computer experiments. We show how, once we have an idea what kind of splittings work, this technique helps in giving simple proofs, which mainly work by case distinctions, algebraic manipulations, and real calculus.
△ Less
Submitted 2 October, 2015; v1 submitted 29 July, 2015;
originally announced July 2015.
-
Total stretch minimization on single and identical parallel machines
Authors:
Abhinav Srivastav,
Denis Trystram
Abstract:
We consider the classical problem of scheduling $n$ jobs with release dates on both single and identical parallel machines. We measure the quality of service provided to each job by its stretch, which is defined as the ratio of its response time to processing time. Our objective is to schedule these jobs non-preemptively so as to minimize sum stretch. So far, there have been very few results for s…
▽ More
We consider the classical problem of scheduling $n$ jobs with release dates on both single and identical parallel machines. We measure the quality of service provided to each job by its stretch, which is defined as the ratio of its response time to processing time. Our objective is to schedule these jobs non-preemptively so as to minimize sum stretch. So far, there have been very few results for sum stretch minimization especially for the non-preemptive case. For the preemptive version, the Shortest remaining processing time (SRPT) algorithm is known to give $2$-competitive for sum stretch on single machine while its is $13$-competitive on identical parallel machines. Leonardi and Kellerer provided the strong lower bound for the more general problem of \textit{sum (weighted) flow time} in single machine and identical parallel machines, respectively . Therefore, we study this problem with some additional assumptions and present two new competitive ratio for existing algorithms. We show that the Shortest processing time (SPT) algorithm is $Δ- \frac{1}Δ+1$-competitive for non-preemptive sum stretch minimization on single machine and it is $Δ- \frac{1}Δ+ \frac{3}{2} -\frac{1}{2m}$ on $m$ identical parallel machines, where $Δ$ is the upper bound on the ratio between the maximum and the minimum processing time of the jobs.
△ Less
Submitted 26 June, 2014; v1 submitted 25 April, 2014;
originally announced April 2014.
-
Pairwise hydrodynamic interactions and diffusion in a vesicle suspension
Authors:
Pierre-Yves Gires,
Aparna Srivastav,
Chaouqi Misbah,
Thomas Podgorski,
Gwennou Coupier
Abstract:
The hydrodynamic interaction of two deformable vesicles in shear flow induces a net displacement, in most cases an increase of their distance in the transverse direction. The statistical average of these interactions leads to shear-induced diffusion in the suspension, both at the level of individual particles which experience a random walk made of successive interactions, and at the level of suspe…
▽ More
The hydrodynamic interaction of two deformable vesicles in shear flow induces a net displacement, in most cases an increase of their distance in the transverse direction. The statistical average of these interactions leads to shear-induced diffusion in the suspension, both at the level of individual particles which experience a random walk made of successive interactions, and at the level of suspension where a non-linear down-gradient diffusion takes place, an important ingredient in the structuring of suspension flows. We make an experimental and computational study of the interaction of a pair of lipid vesicles in shear flow by varying physical parameters, and investigate the decay of the net lateral displacement with the distance between the streamlines on which the vesicles are initially located. This decay and its dependency upon vesicle properties can be accounted for by a simple model based on the well established law for the lateral drift of a vesicle in the vicinity of a wall. In the semi-dilute regime, a determination of self-diffusion coefficients is presented.
△ Less
Submitted 23 January, 2014;
originally announced January 2014.
-
Lift and down-gradient shear-induced diffusion in Red Blood Cell suspensions
Authors:
Xavier Grandchamp,
Gwennou Coupier,
Aparna Srivastav,
Christophe Minetti,
Thomas Podgorski
Abstract:
The distribution of Red Blood Cells in a confined channel flow is inhomogeneous and shows a marked depletion near the walls due to a competition between migration away from the walls and shear-induced diffusion resulting from interactions between particles. We investigated the lift of RBCs in a shear flow near a wall and measured a significant lift velocity despite the tumbling motion of cells. We…
▽ More
The distribution of Red Blood Cells in a confined channel flow is inhomogeneous and shows a marked depletion near the walls due to a competition between migration away from the walls and shear-induced diffusion resulting from interactions between particles. We investigated the lift of RBCs in a shear flow near a wall and measured a significant lift velocity despite the tumbling motion of cells. We also provide values for the collective and anisotropic shear-induced diffusion of a cloud of RBCs, both in the direction of shear and in the direction of vorticity. A generic down-gradient subdiffusion characterized by an exponent 1/3 is highlighted.
△ Less
Submitted 24 February, 2013;
originally announced February 2013.
-
Efficiency of size-dependent particle separation by pinched flow fractionation
Authors:
Aparna Srivastav,
Thomas Podgorski,
Gwennou Coupier
Abstract:
Pinched flow fractionation is shown to be an efficient and selective way to quickly separate particles by size in a very polydisperse semi-concentrated suspension. In an effort to optimize the method, we discuss the quantitative influence of the pinching intensity in the balance between the requirements of selectivity and minimal dilution.
Pinched flow fractionation is shown to be an efficient and selective way to quickly separate particles by size in a very polydisperse semi-concentrated suspension. In an effort to optimize the method, we discuss the quantitative influence of the pinching intensity in the balance between the requirements of selectivity and minimal dilution.
△ Less
Submitted 14 April, 2012;
originally announced April 2012.