-
Balancing rationality and social influence: Alpha-rational Nash equilibrium in games with herding
Authors:
Khushboo Agarwal,
Konstantin Avrachenkov,
Veeraruna Kavitha,
Raghupati Vyas
Abstract:
The classical game theory models rational players and proposes Nash equilibrium (NE) as the solution. However, real-world scenarios rarely feature rational players; instead, players make inconsistent and irrational decisions. Often, irrational players exhibit herding behaviour by simply following the majority.
In this paper, we consider the mean-field game with $α$-fraction of rational players a…
▽ More
The classical game theory models rational players and proposes Nash equilibrium (NE) as the solution. However, real-world scenarios rarely feature rational players; instead, players make inconsistent and irrational decisions. Often, irrational players exhibit herding behaviour by simply following the majority.
In this paper, we consider the mean-field game with $α$-fraction of rational players and the rest being herding-irrational players. For such a game, we introduce a novel concept of equilibrium named $α$-Rational NE (in short, $α$-RNE). The $α$-RNEs and their implications are extensively analyzed in the game with two actions. Due to herding-irrational players, new equilibria may arise, and some classical NEs may be deleted.
The rational players are not harmed but benefit from the presence of irrational players. Notably, we demonstrate through examples that rational players leverage upon the herding behaviour of irrational players and may attain higher utility (under $α$-RNE) than social optimal utility (in the classical setting).
Interestingly, the irrational players may also benefit by not being rational. We observe that irrational players do not lose compared to some classical NEs for participation and bandwidth sharing games. More importantly, in bandwidth sharing game, irrational players receive utility that approaches the social optimal utility. Such examples indicate that it may sometimes be `rational' to be irrational.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Poly-dispersity and deformation effects on pore throat size in granular beds
Authors:
Dhairya R. Vyas,
Song Gao,
Paul B. Umbanhowar,
Julio M. Ottino,
Richard M. Lueptow
Abstract:
Static granular packings play a central role in numerous industrial applications and natural settings. In these situations, fluid or fine particle flow through a bed of static particles is heavily influenced by the narrowest passage connecting the pores of the packing, commonly referred to as pore throats or constrictions. Existing studies predominantly assume monodisperse rigid particles, but thi…
▽ More
Static granular packings play a central role in numerous industrial applications and natural settings. In these situations, fluid or fine particle flow through a bed of static particles is heavily influenced by the narrowest passage connecting the pores of the packing, commonly referred to as pore throats or constrictions. Existing studies predominantly assume monodisperse rigid particles, but this is an oversimplification of the problem. In this work, we illustrate the connection between pore throat size, polydispersity, and particle deformation. Simple analytical expressions are provided to link these properties of the packing, followed by examples from Discrete Element Method (DEM) simulations of fine particle percolation demonstrating the impact of polydispersity and particle deformation. Our intent is to emphasize the substantial impact of polydispersity and particle deformation on constriction size, underscoring the importance of accounting for these effects in particle transport in granular packings.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP)
Authors:
Kumar Saurabh,
Deepak Gajjala,
Krishna Kaipa,
Ranjana Vyas,
O. P. Vyas,
Rahamatullah Khondoker
Abstract:
Industrial cyber-physical systems (ICPS) are gradually integrating information technology and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deploy secure Industrial Control and Production Systems (ICPS) in smart factories, cyber threats and risks must be addressed. To identify all possible threats, Threat Modeling is a promising solution.…
▽ More
Industrial cyber-physical systems (ICPS) are gradually integrating information technology and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deploy secure Industrial Control and Production Systems (ICPS) in smart factories, cyber threats and risks must be addressed. To identify all possible threats, Threat Modeling is a promising solution. Despite the existence of numerous methodological solutions for threat modeling in cyber-physical systems (CPS), current approaches are ad hoc and inefficient in providing clear insights to researchers and organizations involved in IIoT technologies. These approaches lack a comprehensive analysis of cyber threats and fail to facilitate effective path analysis across the ICPS lifecycle, incorporating smart manufacturing technologies and tools. To address these gaps, a novel quantitative threat modeling approach is proposed, aiming to identify probable attack vectors, assess the path of attacks, and evaluate the magnitude of each vector. This paper also explains the execution of the proposed approach with two case studies, namely the industrial manufacturing line, i.e., the Internet of Manufacturing (IoM), and the power and industry, i.e., the Internet of Production (IoP).
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
Wait-time Distributions for Photoelectric Detection of Light
Authors:
Luis Felipe Morales Bultron,
Reeta Vyas,
Surendra Singh
Abstract:
Wait-time distributions for the $n$th photo-detection at a detector illuminated by a stationary light beam are studied. Both unconditional measurements, initiated at an arbitrary instant, and conditional measurements, initiated upon a photo-detection, are considered. Simple analytic expressions are presented for several classical and quantum sources of light and are used to quantify and compare ph…
▽ More
Wait-time distributions for the $n$th photo-detection at a detector illuminated by a stationary light beam are studied. Both unconditional measurements, initiated at an arbitrary instant, and conditional measurements, initiated upon a photo-detection, are considered. Simple analytic expressions are presented for several classical and quantum sources of light and are used to quantify and compare photon sequences generated by them. These distributions can be measured in photon counting experiments and are useful in characterizing and generating photon sequences with prescribed statistics. Effects of non-unit detection efficiency are also discussed, and curves are presented to illustrate the behavior.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Artistic Arbitrary Style Transfer
Authors:
Weiting Li,
Rahul Vyas,
Ramya Sree Penta
Abstract:
Arbitrary Style Transfer is a technique used to produce a new image from two images: a content image, and a style image. The newly produced image is unseen and is generated from the algorithm itself. Balancing the structure and style components has been the major challenge that other state-of-the-art algorithms have tried to solve. Despite all the efforts, it's still a major challenge to apply the…
▽ More
Arbitrary Style Transfer is a technique used to produce a new image from two images: a content image, and a style image. The newly produced image is unseen and is generated from the algorithm itself. Balancing the structure and style components has been the major challenge that other state-of-the-art algorithms have tried to solve. Despite all the efforts, it's still a major challenge to apply the artistic style that was originally created on top of the structure of the content image while maintaining consistency. In this work, we solved these problems by using a Deep Learning approach using Convolutional Neural Networks. Our implementation will first extract foreground from the background using the pre-trained Detectron 2 model from the content image, and then apply the Arbitrary Style Transfer technique that is used in SANet. Once we have the two styled images, we will stitch the two chunks of images after the process of style transfer for the complete end piece.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Implications of New Quantum Spin Perspective In Quantum Gravity
Authors:
Rakshit P. Vyas,
Mihir J. Joshi
Abstract:
Consequences of new quantum spin perspective in quantum gravity are far-reaching. Results of this novel perspective in loop quantum gravity, i.e., the modification of the equation of geometrical operators such as the area and the volume operator are known. Using newly proposed formula from this perspective, the magnitude of fundamental constants such as the reduced Planck constant \(\hbar\), the g…
▽ More
Consequences of new quantum spin perspective in quantum gravity are far-reaching. Results of this novel perspective in loop quantum gravity, i.e., the modification of the equation of geometrical operators such as the area and the volume operator are known. Using newly proposed formula from this perspective, the magnitude of fundamental constants such as the reduced Planck constant \(\hbar\), the gravitational constant \(G\), the speed of light \(c\), the Boltzmann constant \(k_β\), the fine structure constant \(α\), can be validated. With the aid of this perspective, we find new formulas for the fundamental Planckian quantities and the derived Planckian quantities. We also propose novel formulas for the Planck star such as the size, the curvature, the surface area and the size of black hole (for the Planck star) without modifying its significance. The relation of the quantum spin with the Planck temperature \(T_{P}\) \((T_{p} \propto n^{2})\), the Planck mass \(m_{P}\) \((m_{P} \propto n^{2})\), the Planck length \(l_{P}\) \((l_{P} \propto n)\) are also proposed using this novel perspective
△ Less
Submitted 6 December, 2022; v1 submitted 31 July, 2022;
originally announced August 2022.
-
New Quantum Spin Perspective and Geometrical Operators of Quantum Geometry
Authors:
Rakshit P. Vyas,
Mihir J. Joshi
Abstract:
In this paper, we propose a new perspective of quantum spin (angular momentum) in which the Boltzmann constant \(k_β\), Planck temperature \(T_{P}\), Planck mass \(m_{P}\) and Planck area \(l_{P}^{2}\) are the integral part of the total angular momentum \(J\). With the aid of this new perspective, we modify the equation of the area and volume operator. In the quantum geometry, for \(SO(3)\) group,…
▽ More
In this paper, we propose a new perspective of quantum spin (angular momentum) in which the Boltzmann constant \(k_β\), Planck temperature \(T_{P}\), Planck mass \(m_{P}\) and Planck area \(l_{P}^{2}\) are the integral part of the total angular momentum \(J\). With the aid of this new perspective, we modify the equation of the area and volume operator. In the quantum geometry, for \(SO(3)\) group, the angular momentum operators \(J^{k}\) is the \(k\)th Lie group generator \(T^{k}\); hence, \(T^{k} \equiv J^{k}\). Therefore, new perspective of quantum spin can be directly applicable to quantum geometry. From data, the value of the area operator \(\hat{A}_{S}\) increases with \(n^{2}\) in discrete way that suggests discrete spectrum of the area operator similar to the actual formula of the area operator. This perspective provides an auto-correct or auto-balance mechanism within the equation of these geometrical operators. At the quantum gravity scale, it means that the mutual small change in \(T_{P}\), \(m_{P}\), and \(l_{P}^{2}\) occur in such a way that \(\hbar\), \(l_{P}\) and \(\hat{A}_{S}\) and \( \hat{V}_{S}\) remain invariant for a value of \(j_{i}\). The constancy of the reduced Planck constant \(\hbar\) in the geometrical operators can provide a way through which smooth transition of the Planck scale to the nuclear or the atomic scale can be understood.
△ Less
Submitted 6 September, 2022; v1 submitted 8 July, 2022;
originally announced July 2022.
-
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks
Authors:
Kumar Saurabh,
Saksham Sood,
P. Aditya Kumar,
Uphar Singh,
Ranjana Vyas,
O. P. Vyas,
Rahamatullah Khondoker
Abstract:
In the recent years, we have witnessed a huge growth in the number of Internet of Things (IoT) and edge devices being used in our everyday activities. This demands the security of these devices from cyber attacks to be improved to protect its users. For years, Machine Learning (ML) techniques have been used to develop Network Intrusion Detection Systems (NIDS) with the aim of increasing their reli…
▽ More
In the recent years, we have witnessed a huge growth in the number of Internet of Things (IoT) and edge devices being used in our everyday activities. This demands the security of these devices from cyber attacks to be improved to protect its users. For years, Machine Learning (ML) techniques have been used to develop Network Intrusion Detection Systems (NIDS) with the aim of increasing their reliability/robustness. Among the earlier ML techniques DT performed well. In the recent years, Deep Learning (DL) techniques have been used in an attempt to build more reliable systems. In this paper, a Deep Learning enabled Long Short Term Memory (LSTM) Autoencoder and a 13-feature Deep Neural Network (DNN) models were developed which performed a lot better in terms of accuracy on UNSW-NB15 and Bot-IoT datsets. Hence we proposed LBDMIDS, where we developed NIDS models based on variants of LSTMs namely, stacked LSTM and bidirectional LSTM and validated their performance on the UNSW\_NB15 and BoT\-IoT datasets. This paper concludes that these variants in LBDMIDS outperform classic ML techniques and perform similarly to the DNN models that have been suggested in the past.
△ Less
Submitted 23 June, 2022;
originally announced July 2022.
-
Agricultural Plantation Classification using Transfer Learning Approach based on CNN
Authors:
Uphar Singh,
Tushar Musale,
Ranjana Vyas,
O. P. Vyas
Abstract:
Hyper-spectral images are images captured from a satellite that gives spatial and spectral information of specific region.A Hyper-spectral image contains much more number of channels as compared to a RGB image, hence containing more information about entities within the image. It makes them well suited for the classification of objects in a snap. In the past years, the efficiency of hyper-spectral…
▽ More
Hyper-spectral images are images captured from a satellite that gives spatial and spectral information of specific region.A Hyper-spectral image contains much more number of channels as compared to a RGB image, hence containing more information about entities within the image. It makes them well suited for the classification of objects in a snap. In the past years, the efficiency of hyper-spectral image recognition has increased significantly with deep learning. The Convolution Neural Network(CNN) and Multi-Layer Perceptron(MLP) has demonstrated to be an excellent process of classifying images. However, they suffer from the issues of long training time and requirement of large amounts of the labeled data, to achieve the expected outcome. These issues become more complex while dealing with hyper-spectral images. To decrease the training time and reduce the dependence on large labeled data-set, we propose using the method of transfer learning.The features learned by CNN and MLP models are then used by the transfer learning model to solve a new classification problem on an unseen dataset. A detailed comparison of CNN and multiple MLP architectural models is performed, to determine an optimum architecture that suits best the objective. The results show that the scaling of layers not always leads to increase in accuracy but often leads to over-fitting, and also an increase in the training time.The training time is reduced to greater extent by applying the transfer learning approach rather than just approaching the problem by directly training a new model on large data-sets, without much affecting the accuracy.
△ Less
Submitted 19 June, 2022;
originally announced June 2022.
-
Terrain Classification using Transfer Learning on Hyperspectral Images: A Comparative study
Authors:
Uphar Singh,
Kumar Saurabh,
Neelaksh Trehan,
Ranjana Vyas,
O. P. Vyas
Abstract:
A Hyperspectral image contains much more number of channels as compared to a RGB image, hence containing more information about entities within the image. The convolutional neural network (CNN) and the Multi-Layer Perceptron (MLP) have been proven to be an effective method of image classification. However, they suffer from the issues of long training time and requirement of large amounts of the la…
▽ More
A Hyperspectral image contains much more number of channels as compared to a RGB image, hence containing more information about entities within the image. The convolutional neural network (CNN) and the Multi-Layer Perceptron (MLP) have been proven to be an effective method of image classification. However, they suffer from the issues of long training time and requirement of large amounts of the labeled data, to achieve the expected outcome. These issues become more complex while dealing with hyperspectral images. To decrease the training time and reduce the dependence on large labeled dataset, we propose using the method of transfer learning. The hyperspectral dataset is preprocessed to a lower dimension using PCA, then deep learning models are applied to it for the purpose of classification. The features learned by this model are then used by the transfer learning model to solve a new classification problem on an unseen dataset. A detailed comparison of CNN and multiple MLP architectural models is performed, to determine an optimum architecture that suits best the objective. The results show that the scaling of layers not always leads to increase in accuracy but often leads to overfitting, and also an increase in the training time.The training time is reduced to greater extent by applying the transfer learning approach rather than just approaching the problem by directly training a new model on large datasets, without much affecting the accuracy.
△ Less
Submitted 19 June, 2022;
originally announced June 2022.
-
The Barbero-Immirzi Parameter: An Enigmatic Parameter of Loop Quantum Gravity
Authors:
Rakshit P. Vyas,
Mihir J. Joshi
Abstract:
The Barbero-Immirzi parameter ($γ$) is introduced in loop quantum gravity (LQG) whose physical significance is still a biggest open question; because of its profound traits. In some cases, it is real-valued; while, it is complex-valued in other cases. This parameter emerges out in the process of denoting a Lorentz connection with non compact group $SO(3,1)$ in the form of a complex connection with…
▽ More
The Barbero-Immirzi parameter ($γ$) is introduced in loop quantum gravity (LQG) whose physical significance is still a biggest open question; because of its profound traits. In some cases, it is real-valued; while, it is complex-valued in other cases. This parameter emerges out in the process of denoting a Lorentz connection with non compact group $SO(3,1)$ in the form of a complex connection with values in a compact group of rotations, either $SO(3)$ or $SU(2)$. Initially, it was appeared in the Ashtekar variables. Fernando Barbero proposed its possibility to include within formalism. Its present value is fixed by counting of micro states in loop quantum gravity and matching with the semi classical black hole entropy computed by Stephen Hawking. This parameter is used to count the size of the quantum of area in Planck units. Until, the discovery of the spectrum of the area operator in LQG; its significance remains unknown. However, its complete physical significance is yet to be explored. In the present article, an introduction to the Barbero-Immirzi parameter in LQG, time line of this research area, various proposals regarding its physical significance are given.
△ Less
Submitted 18 August, 2022; v1 submitted 31 May, 2022;
originally announced June 2022.
-
Optimal Distributed Frequency and Voltage Control for Zonal Electricity Markets
Authors:
Lukas Kölsch,
Lena Zellmann,
Rishabh Vyas,
Martin Pfeifer,
Sören Hohmann
Abstract:
Zonal pricing is a well-suited mechanism to incentivize grid-supporting behavior of profit-maximizing producers and consumers operating on a large-scale power system. In zonal electricity markets, local system operators create individual price zones, which provide appropriate price signals depending on local grid conditions such as an excess or shortage of electrical energy in certain regions. In…
▽ More
Zonal pricing is a well-suited mechanism to incentivize grid-supporting behavior of profit-maximizing producers and consumers operating on a large-scale power system. In zonal electricity markets, local system operators create individual price zones, which provide appropriate price signals depending on local grid conditions such as an excess or shortage of electrical energy in certain regions. In this paper, a real-time zonal pricing controller for AC power networks is presented that ensures frequency and voltage stability as well as Pareto efficiency of the resulting closed-loop equilibria. Based on a dynamic network model that takes line losses and power exchange with adjacent price zones into account, distributed continuous-time control laws are derived which require only neighbor-to-neighbor communication. Application to a real-time congestion management strategy illustrates how spatially and temporally differentiated prices enable grid-supportive operation of the participants without interventions by a superordinate control authority. Effectiveness of different zonal pricing concepts compared to an isolated grid operation is demonstrated through simulations on the IEEE-57 bus system.
△ Less
Submitted 19 June, 2021; v1 submitted 15 February, 2021;
originally announced February 2021.
-
Transfer Learning for Oral Cancer Detection using Microscopic Images
Authors:
Rutwik Palaskar,
Renu Vyas,
Vilas Khedekar,
Sangeeta Palaskar,
Pranjal Sahu
Abstract:
Oral cancer has more than 83% survival rate if detected in its early stages, however, only 29% of cases are currently detected early. Deep learning techniques can detect patterns of oral cancer cells and can aid in its early detection. In this work, we present the first results of neural networks for oral cancer detection using microscopic images. We compare numerous state-of-the-art models via tr…
▽ More
Oral cancer has more than 83% survival rate if detected in its early stages, however, only 29% of cases are currently detected early. Deep learning techniques can detect patterns of oral cancer cells and can aid in its early detection. In this work, we present the first results of neural networks for oral cancer detection using microscopic images. We compare numerous state-of-the-art models via transfer learning approach and collect and release an augmented dataset of high-quality microscopic images of oral cancer. We present a comprehensive study of different models and report their performance on this type of data. Overall, we obtain a 10-15% absolute improvement with transfer learning methods compared to a simple Convolutional Neural Network baseline. Ablation studies show the added benefit of data augmentation techniques with finetuning for this task.
△ Less
Submitted 9 April, 2021; v1 submitted 23 November, 2020;
originally announced November 2020.
-
Leveraging Seen and Unseen Semantic Relationships for Generative Zero-Shot Learning
Authors:
Maunil R Vyas,
Hemanth Venkateswara,
Sethuraman Panchanathan
Abstract:
Zero-shot learning (ZSL) addresses the unseen class recognition problem by leveraging semantic information to transfer knowledge from seen classes to unseen classes. Generative models synthesize the unseen visual features and convert ZSL into a classical supervised learning problem. These generative models are trained using the seen classes and are expected to implicitly transfer the knowledge fro…
▽ More
Zero-shot learning (ZSL) addresses the unseen class recognition problem by leveraging semantic information to transfer knowledge from seen classes to unseen classes. Generative models synthesize the unseen visual features and convert ZSL into a classical supervised learning problem. These generative models are trained using the seen classes and are expected to implicitly transfer the knowledge from seen to unseen classes. However, their performance is stymied by overfitting, which leads to substandard performance on Generalized Zero-Shot learning (GZSL). To address this concern, we propose the novel LsrGAN, a generative model that Leverages the Semantic Relationship between seen and unseen categories and explicitly performs knowledge transfer by incorporating a novel Semantic Regularized Loss (SR-Loss). The SR-loss guides the LsrGAN to generate visual features that mirror the semantic relationships between seen and unseen classes. Experiments on seven benchmark datasets, including the challenging Wikipedia text-based CUB and NABirds splits, and Attribute-based AWA, CUB, and SUN, demonstrates the superiority of the LsrGAN compared to previous state-of-the-art approaches under both ZSL and GZSL. Code is available at https: // github. com/ Maunil/ LsrGAN
△ Less
Submitted 18 July, 2020;
originally announced July 2020.
-
A Collaborative Approach using Ridge-Valley Minutiae for More Accurate Contactless Fingerprint Identification
Authors:
Ritesh Vyas,
Ajay Kumar
Abstract:
Contactless fingerprint identification has emerged as an reliable and user friendly alternative for the personal identification in a range of e-business and law-enforcement applications. It is however quite known from the literature that the contactless fingerprint images deliver remarkably low matching accuracies as compared with those obtained from the contact-based fingerprint sensors. This pap…
▽ More
Contactless fingerprint identification has emerged as an reliable and user friendly alternative for the personal identification in a range of e-business and law-enforcement applications. It is however quite known from the literature that the contactless fingerprint images deliver remarkably low matching accuracies as compared with those obtained from the contact-based fingerprint sensors. This paper develops a new approach to significantly improve contactless fingerprint matching capabilities available today. We systematically analyze the extent of complimentary ridge-valley information and introduce new approaches to achieve significantly higher matching accuracy over state-of-art fingerprint matchers commonly employed today. We also investigate least explored options for the fingerprint color-space conversions, which can play a key-role for more accurate contactless fingerprint matching. This paper presents experimental results from different publicly available contactless fingerprint databases using NBIS, MCC and COTS matchers. Our consistently outperforming results validate the effectiveness of the proposed approach for more accurate contactless fingerprint identification.
△ Less
Submitted 19 September, 2019; v1 submitted 13 September, 2019;
originally announced September 2019.
-
Some homological aspects of idempotents in idempotented algebras
Authors:
Arnab Mitra,
Rishi Vyas
Abstract:
We study special idempotents (as described by Bushnell and Kutzko) and split idempotents in the context of module and derived categories for idempotented algebras. We then characterize these concepts for path algebras of quivers.
We study special idempotents (as described by Bushnell and Kutzko) and split idempotents in the context of module and derived categories for idempotented algebras. We then characterize these concepts for path algebras of quivers.
△ Less
Submitted 14 June, 2018; v1 submitted 4 April, 2018;
originally announced April 2018.
-
Weakly stable torsion classes
Authors:
Rishi Vyas
Abstract:
Weakly stable torsion classes were introduced by the author and Yekutieli to provide a torsion theoretic characterisation of the notion of weak proregularity from commutative algebra. In this paper we investigate weakly stable torsion classes, with a focus on aspects related to localisation and completion. We characterise when torsion classes arising from left denominator sets and idempotent ideal…
▽ More
Weakly stable torsion classes were introduced by the author and Yekutieli to provide a torsion theoretic characterisation of the notion of weak proregularity from commutative algebra. In this paper we investigate weakly stable torsion classes, with a focus on aspects related to localisation and completion. We characterise when torsion classes arising from left denominator sets and idempotent ideals are weakly stable. We show that every weakly stable torsion class $\operatorname{\mathsf{T}}$ can be associated with a dg ring $A_{\operatorname{\mathsf{T}}}$; in well behaved situations there is a homological epimorphism $A\to A_{\operatorname{\mathsf{T}}}$. We end by studying torsion and completion with respect to a single regular and normal element.
△ Less
Submitted 4 July, 2018; v1 submitted 26 February, 2018;
originally announced February 2018.
-
Facial Key Points Detection using Deep Convolutional Neural Network - NaimishNet
Authors:
Naimish Agarwal,
Artus Krohn-Grimberghe,
Ranjana Vyas
Abstract:
Facial Key Points (FKPs) Detection is an important and challenging problem in the fields of computer vision and machine learning. It involves predicting the co-ordinates of the FKPs, e.g. nose tip, center of eyes, etc, for a given face. In this paper, we propose a LeNet adapted Deep CNN model - NaimishNet, to operate on facial key points data and compare our model's performance against existing st…
▽ More
Facial Key Points (FKPs) Detection is an important and challenging problem in the fields of computer vision and machine learning. It involves predicting the co-ordinates of the FKPs, e.g. nose tip, center of eyes, etc, for a given face. In this paper, we propose a LeNet adapted Deep CNN model - NaimishNet, to operate on facial key points data and compare our model's performance against existing state of the art approaches.
△ Less
Submitted 3 October, 2017;
originally announced October 2017.
-
Elementary equivalence in Artin groups of finite type
Authors:
Arpan Kabiraj,
T. V. H. Prathamesh,
Rishi Vyas
Abstract:
Irreducible Artin groups of finite type can be parametrized via their associated Coxeter diagrams into six sporadic examples and four infinite families, each of which is further parametrized by the natural numbers. Within each of these four infinite families, we investigate the relationship between elementary equivalence and isomorphism. For three out of the four families, we show that two groups…
▽ More
Irreducible Artin groups of finite type can be parametrized via their associated Coxeter diagrams into six sporadic examples and four infinite families, each of which is further parametrized by the natural numbers. Within each of these four infinite families, we investigate the relationship between elementary equivalence and isomorphism. For three out of the four families, we show that two groups in the same family are equivalent if and only if they are isomorphic; a positive, but weaker, result is also attained for the fourth family. In particular, we show that two braid groups are elementarily equivalent if and only if they are isomorphic.
As a consequence of our work, we prove that there are infinitely many elementary equivalence classes of irreducible Artin groups of finite type. We also show that map** class groups of closed surfaces - a geometric analogue of braid groups - are elementarily equivalent if and only if they are isomorphic.
△ Less
Submitted 11 April, 2018; v1 submitted 26 July, 2017;
originally announced July 2017.
-
Weak Proregularity, Weak Stability, and the Noncommutative MGM Equivalence
Authors:
Rishi Vyas,
Amnon Yekutieli
Abstract:
Let A be a commutative ring, and let \a = \frak{a} be a finitely generated ideal in it. It is known that a necessary and sufficient condition for the derived \a-torsion and \a-adic completion functors to be nicely behaved is the weak proregularity of \a. In particular, the MGM Equivalence holds.
Because weak proregularity is defined in terms of elements of the ring (specifically, it involves lim…
▽ More
Let A be a commutative ring, and let \a = \frak{a} be a finitely generated ideal in it. It is known that a necessary and sufficient condition for the derived \a-torsion and \a-adic completion functors to be nicely behaved is the weak proregularity of \a. In particular, the MGM Equivalence holds.
Because weak proregularity is defined in terms of elements of the ring (specifically, it involves limits of Koszul complexes), it is not suitable for noncommutative ring theory.
In this paper we introduce a new condition on a torsion class T in a module category: weak stability. Our first main theorem is that in the commutative case, the ideal \a is weakly proregular if and only if the corresponding torsion class T_{\a} is weakly stable.
We then study weak stability of torsion classes in module categories over noncommutative rings. There are three main theorems in this context: - For a torsion class T that is weakly stable, quasi-compact and finite dimensional, the right derived torsion functor is isomorphic to a left derived tensor functor. - The Noncommutative MGM Equivalence, under the same assumptions on T. - A theorem about symmetric derived torsion for complexes of bimodules. This last theorem is a generalization of a result of Van den Bergh from 1997, and corrects an error in a paper of Yekutieli-Zhang from 2003.
△ Less
Submitted 27 July, 2018; v1 submitted 11 August, 2016;
originally announced August 2016.
-
Torsion, torsion length and finitely presented groups
Authors:
Maurice Chiodo,
Rishi Vyas
Abstract:
We show that a construction by Aanderaa and Cohen used in their proof of the Higman Embedding Theorem preserves torsion length. We give a new construction showing that every finitely presented group is the quotient of some $C'(1/6)$ finitely presented group by the subgroup generated by its torsion elements. We use these results to show there is a finitely presented group with infinite torsion leng…
▽ More
We show that a construction by Aanderaa and Cohen used in their proof of the Higman Embedding Theorem preserves torsion length. We give a new construction showing that every finitely presented group is the quotient of some $C'(1/6)$ finitely presented group by the subgroup generated by its torsion elements. We use these results to show there is a finitely presented group with infinite torsion length which is $C'(1/6)$, and thus word-hyperbolic and virtually torsion-free.
△ Less
Submitted 4 May, 2018; v1 submitted 13 April, 2016;
originally announced April 2016.
-
A note on torsion length
Authors:
Maurice Chiodo,
Rishi Vyas
Abstract:
We construct a 2-generator recursively presented group with infinite torsion length. We also explore the construction in the context of solvable and word-hyperbolic groups.
We construct a 2-generator recursively presented group with infinite torsion length. We also explore the construction in the context of solvable and word-hyperbolic groups.
△ Less
Submitted 19 September, 2016; v1 submitted 7 March, 2013;
originally announced March 2013.
-
A homological reformulation of the link condition
Authors:
Rishi Vyas
Abstract:
We prove an equivalent condition for the existence of a link between prime ideals in terms of the structure of a certain cohomology module. We use this formulation to answer an open question regarding the nature of module extensions over one sided noetherian rings. We apply the techniques developed in this paper to the local link structure of prime ideals of small homological height and examine wh…
▽ More
We prove an equivalent condition for the existence of a link between prime ideals in terms of the structure of a certain cohomology module. We use this formulation to answer an open question regarding the nature of module extensions over one sided noetherian rings. We apply the techniques developed in this paper to the local link structure of prime ideals of small homological height and examine when certain noetherian rings satisfy the density condition.
△ Less
Submitted 1 February, 2017; v1 submitted 25 February, 2013;
originally announced February 2013.
-
Ore localization and minimal injective resolutions
Authors:
Rishi Vyas
Abstract:
In this paper, we describe the structure of the localization of Ext^{i}_{R}(R/P,M), where P is a prime ideal and M is a module, at certain Ore sets X. We first study the situation for FBN rings, and then consider matters for a large class of Auslander-Gorenstein rings. We need to impose suitable homological regularity conditions to get results in the more general situation. The results obtained ar…
▽ More
In this paper, we describe the structure of the localization of Ext^{i}_{R}(R/P,M), where P is a prime ideal and M is a module, at certain Ore sets X. We first study the situation for FBN rings, and then consider matters for a large class of Auslander-Gorenstein rings. We need to impose suitable homological regularity conditions to get results in the more general situation. The results obtained are then used to study the shape of minimal injective resolutions of modules over noetherian rings.
△ Less
Submitted 1 February, 2017; v1 submitted 25 February, 2013;
originally announced February 2013.
-
A non-degenerate optical parametric oscillator as a high-flux source for quantum lithography
Authors:
Hugo Cable,
Reeta Vyas,
Surendra Singh,
Jonathan P. Dowling
Abstract:
We investigate the use of a non-degenerate parametric oscillator (NDPO) as a source for quantum lithography, for which the light can have high-flux and strong non-classical features. This builds on the proposal of Boto, et al. [A. N. Boto, et al., PRL (85), 2733 (2000)], for etching simple patterns on multi-photon absorbing materials with sub-Rayleigh resolution, using special two-mode entangled…
▽ More
We investigate the use of a non-degenerate parametric oscillator (NDPO) as a source for quantum lithography, for which the light can have high-flux and strong non-classical features. This builds on the proposal of Boto, et al. [A. N. Boto, et al., PRL (85), 2733 (2000)], for etching simple patterns on multi-photon absorbing materials with sub-Rayleigh resolution, using special two-mode entangled states of light. An NDPO has two outgoing modes differentiated by polarization or direction of propagation, but sharing the same optical frequency. We derive analytical expressions for the multi-photon absorption rates when the NDPO is operated below, near, and above its threshold. The resulting interference patterns are characterized by an effective wavelength half that for the illuminating modes. We compare our results with those for the case of a high-gain optical amplifier source, and discuss the relative merit of the NDPO.
△ Less
Submitted 25 March, 2009;
originally announced March 2009.