-
PERISTOLE: PackagE that geneRates tIme delay plotS caused by graviTatiOnaL lEnsing
Authors:
T. S. Sachin Venkatesh,
Gaurav Pundir
Abstract:
We present PERISTOLE to study the various time delays associated with the pulsar rotation and other general relativistic aspects of binary pulsars. It is made available as an open-source python package which takes some parameters of the double pulsar system as input and outputs the rotational and latitudinal lensing delays along with the geometric and Shapiro delays that arise due to gravitational…
▽ More
We present PERISTOLE to study the various time delays associated with the pulsar rotation and other general relativistic aspects of binary pulsars. It is made available as an open-source python package which takes some parameters of the double pulsar system as input and outputs the rotational and latitudinal lensing delays along with the geometric and Shapiro delays that arise due to gravitational lensing. This package was intended to provide a way to quickly analyse, evaluate and study the differences between variations of the same systems and also to quantify the consequences that different parameters have over the system. Through this research note, we briefly describe the motivation behind PERISTOLE and showcase its capabilities using the only double pulsar system ever found, J0737-3039.
△ Less
Submitted 29 November, 2022;
originally announced November 2022.
-
Coupling and recoupling of binaries in chaotic three body systems
Authors:
T. S. Sachin Venkatesh
Abstract:
Three body systems where one of the bodies is ejected without esca** the binary system have previously been studied in various restricted forms. However, none of these studies dwells on the problem in a general setting. Thus, to study this phenomenon qualitatively, we try to expand this problem's scope to unequal mass systems and generalize them by considering various configurations of fixed ini…
▽ More
Three body systems where one of the bodies is ejected without esca** the binary system have previously been studied in various restricted forms. However, none of these studies dwells on the problem in a general setting. Thus, to study this phenomenon qualitatively, we try to expand this problem's scope to unequal mass systems and generalize them by considering various configurations of fixed initial points with precisely calculated initial velocities, some zero velocity models, and some optimized models. We will see the use of terminology similar to the previous studies done in this domain, but incorporate different analytical and evaluation methods.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
A comparative study of various Deep Learning techniques for spatio-temporal Super-Resolution reconstruction of Forced Isotropic Turbulent flows
Authors:
T. S. Sachin Venkatesh,
Rajat Srivastava,
Pratyush Bhatt,
Prince Tyagi,
Raj Kumar Singh
Abstract:
Super-resolution is an innovative technique that upscales the resolution of an image or a video and thus enables us to reconstruct high-fidelity images from low-resolution data. This study performs super-resolution analysis on turbulent flow fields spatially and temporally using various state-of-the-art machine learning techniques like ESPCN, ESRGAN and TecoGAN to reconstruct high-resolution flow…
▽ More
Super-resolution is an innovative technique that upscales the resolution of an image or a video and thus enables us to reconstruct high-fidelity images from low-resolution data. This study performs super-resolution analysis on turbulent flow fields spatially and temporally using various state-of-the-art machine learning techniques like ESPCN, ESRGAN and TecoGAN to reconstruct high-resolution flow fields from low-resolution flow field data, especially kee** in mind the need for low resource consumption and rapid results production/verification. The dataset used for this study is extracted from the 'isotropic 1024 coarse' dataset which is a part of Johns Hopkins Turbulence Databases (JHTDB). We have utilized pre-trained models and fine tuned them to our needs, so as to minimize the computational resources and the time required for the implementation of the super-resolution models. The advantages presented by this method far exceed the expectations and the outcomes of regular single structure models. The results obtained through these models are then compared using MSE, PSNR, SAM, VIF and SCC metrics in order to evaluate the upscaled results, find the balance between computational power and output quality, and then identify the most accurate and efficient model for spatial and temporal super-resolution of turbulent flow fields.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
Investigating the relation between chaos and the three body problem
Authors:
T. S. Sachin Venkatesh,
Vishak Vikranth
Abstract:
We review the properties of fractals, the Mandelbrot set and how deterministic chaos ties to the picture. A detailed study on three body systems, one of the major applications of chaos theory was undertaken. Systems belonging to different families produced till date were studied and their properties were analysed. We then segregated them into three classes according to their properties. We suggest…
▽ More
We review the properties of fractals, the Mandelbrot set and how deterministic chaos ties to the picture. A detailed study on three body systems, one of the major applications of chaos theory was undertaken. Systems belonging to different families produced till date were studied and their properties were analysed. We then segregated them into three classes according to their properties. We suggest that such reviews be carried out in regular intervals of time as there are an infinite number of solutions for three body systems and some of them may prove to be useful in various domains apart from hierarchical systems.
△ Less
Submitted 15 September, 2020; v1 submitted 28 August, 2020;
originally announced August 2020.
-
Modeling Information Propagation in General V2V-enabled Transportation Networks
Authors:
Jungyeol Kim,
Saswati Sarkar,
Santosh S. Venkatesh,
Megan Smirti Ryerson,
David Starobinski
Abstract:
V2V technologies bridge two infrastructures: the communications infrastructure and the transportation infrastructure. These infrastructures are interconnected and interdependent. On the one hand, the communications network enables V2V interactions, while, on the other hand, the density of vehicles on the roadway enabled with V2V and the level of congestion on the roadway determine the speed and qu…
▽ More
V2V technologies bridge two infrastructures: the communications infrastructure and the transportation infrastructure. These infrastructures are interconnected and interdependent. On the one hand, the communications network enables V2V interactions, while, on the other hand, the density of vehicles on the roadway enabled with V2V and the level of congestion on the roadway determine the speed and quality of communications between vehicles and infrastructure. The V2V technology is expected to contribute significantly to the growth of shared mobility, in turn, receives a significant boost from the deployment of a large number of connected vehicles in shared mobility services, provided challenges towards the deployment can be overcome. Vehicle mobility patterns and communication conditions are not only heterogeneous, but they also evolve constantly, leading to dynamic coupling between the communication and the transportation infrastructure. We consider the communication of messages amongst the vehicles in a transportation network, and estimate how quickly messages spread under different conditions of traffic density (traffic congestion, the presence of an accident, and time of day such as morning and evening rush hour) and communication conditions. We developed a continuous-time Markov chain to describe the information propagation process through enabled vehicles. Our models converge to a solution of a set of clustered epidemiological differential equations which lend itself to fast computation. We then demonstrate the applicability of this model in various scenarios: both real-world scenarios and hypothesized scenarios of outages and system perturbations. We find that our models match actual trajectory data with very little error, demonstrating the applicability of our models to study the spread of information through a network of connected vehicles.
△ Less
Submitted 2 January, 2019;
originally announced January 2019.
-
Spread, then Target, and Advertise in Waves: Optimal Budget Allocation Across Advertising Channels
Authors:
Soheil Eshghi,
Victor M. Preciado,
Saswati Sarkar,
Santosh S. Venkatesh,
Qing Zhao,
Raissa D'Souza,
Ananthram Swami
Abstract:
We analyze optimal strategies for the allocation of a finite budget that can be invested in different advertising channels over time with the objective of influencing social opinions in a network of individuals. In our analysis, we consider both exogenous influence mechanisms, such as advertising campaigns, as well as endogenous mechanisms of social influence, such as word-of-mouth and peer-pressu…
▽ More
We analyze optimal strategies for the allocation of a finite budget that can be invested in different advertising channels over time with the objective of influencing social opinions in a network of individuals. In our analysis, we consider both exogenous influence mechanisms, such as advertising campaigns, as well as endogenous mechanisms of social influence, such as word-of-mouth and peer-pressure, which are modeled using diffusion dynamics.
We show that for a broad family of objective functions, the optimal influence strategy at every time uses all channels at either their maximum rate or not at all, i.e., a bang-bang strategy. Furthermore, we prove that the number of switches between these extremes is bounded above by a term that is typically much smaller than the number of agents. This means that the optimal influence strategy is to exert maximum effort in waves for every channel, and then cease effort and let the effects propagate. We also show that, at the beginning of the campaign, the total cost-adjusted reach of an exogenous advertising channel determines its relative value. In contrast, as we approach our investment horizon (e.g., election day), the optimal strategy is to invest in channels able to target individuals instead of broad-reaching channels. We demonstrate that the optimal influence strategies are easily computable in several practical cases, and explicitly characterize the optimal controls for the case of linear objective functions in closed form. Finally, we see that, in the canonical example of designing an election campaign, identifying late-deciders is a critical component in the optimal design.
△ Less
Submitted 23 July, 2018; v1 submitted 11 February, 2017;
originally announced February 2017.
-
Visibility-Aware Optimal Contagion of Malware Epidemics
Authors:
Soheil Eshghi,
Saswati Sarkar,
Santosh S. Venkatesh
Abstract:
Recent innovations in the design of computer viruses have led to new trade-offs for the attacker. Multiple variants of a malware may spread at different rates and have different levels of visibility to the network. In this work we examine the optimal strategies for the attacker so as to trade off the extent of spread of the malware against the need for stealth. We show that in the mean-field deter…
▽ More
Recent innovations in the design of computer viruses have led to new trade-offs for the attacker. Multiple variants of a malware may spread at different rates and have different levels of visibility to the network. In this work we examine the optimal strategies for the attacker so as to trade off the extent of spread of the malware against the need for stealth. We show that in the mean-field deterministic regime, this spread-stealth trade-off is optimized by computationally simple single-threshold policies. Specifically, we show that only one variant of the malware is spread by the attacker at each time, as there exists a time up to which the attacker prioritizes maximizing the spread of the malware, and after which she prioritizes stealth.
△ Less
Submitted 30 October, 2016; v1 submitted 13 July, 2015;
originally announced July 2015.
-
Optimal Energy-Aware Epidemic Routing in DTNs
Authors:
Soheil Eshghi,
MHR. Khouzani,
Saswati Sarkar,
Ness B. Shroff,
Santosh S. Venkatesh
Abstract:
In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy leve…
▽ More
In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and a measure of Quality of Service as a dynamic energy-dependent optimal control problem. We prove that in the mean-field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We then characterize the nature of this dependence. Our simulations reveal that the optimal dynamic policy significantly outperforms heuristics.
△ Less
Submitted 2 June, 2015; v1 submitted 6 March, 2014;
originally announced March 2014.
-
Optimal Patching in Clustered Malware Epidemics
Authors:
Soheil Eshghi,
MHR. Khouzani,
Saswati Sarkar,
Santosh S. Venkatesh
Abstract:
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc. can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies th…
▽ More
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc. can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin's Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies. Through numerical simulations, the behavior of optimal patching policies is investigated in sample topologies and their advantages are demonstrated.
△ Less
Submitted 6 March, 2014;
originally announced March 2014.