-
Efficient Bias Mitigation Without Privileged Information
Authors:
Mateo Espinosa Zarlenga,
Swami Sankaranarayanan,
Jerone T. A. Andrews,
Zohreh Shams,
Mateja Jamnik,
Alice Xiang
Abstract:
Deep neural networks trained via empirical risk minimisation often exhibit significant performance disparities across groups, particularly when group and task labels are spuriously correlated (e.g., "grassy background" and "cows"). Existing bias mitigation methods that aim to address this issue often either rely on group labels for training or validation, or require an extensive hyperparameter sea…
▽ More
Deep neural networks trained via empirical risk minimisation often exhibit significant performance disparities across groups, particularly when group and task labels are spuriously correlated (e.g., "grassy background" and "cows"). Existing bias mitigation methods that aim to address this issue often either rely on group labels for training or validation, or require an extensive hyperparameter search. Such data and computational requirements hinder the practical deployment of these methods, especially when datasets are too large to be group-annotated, computational resources are limited, and models are trained through already complex pipelines. In this paper, we propose Targeted Augmentations for Bias Mitigation (TAB), a simple hyperparameter-free framework that leverages the entire training history of a helper model to identify spurious samples, and generate a group-balanced training set from which a robust model can be trained. We show that TAB improves worst-group performance without any group information or model selection, outperforming existing methods while maintaining overall accuracy.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
Position: Measure Dataset Diversity, Don't Just Claim It
Authors:
Dora Zhao,
Jerone T. A. Andrews,
Orestis Papakyriakopoulos,
Alice Xiang
Abstract:
Machine learning (ML) datasets, often perceived as neutral, inherently encapsulate abstract and disputed social constructs. Dataset curators frequently employ value-laden terms such as diversity, bias, and quality to characterize datasets. Despite their prevalence, these terms lack clear definitions and validation. Our research explores the implications of this issue by analyzing "diversity" acros…
▽ More
Machine learning (ML) datasets, often perceived as neutral, inherently encapsulate abstract and disputed social constructs. Dataset curators frequently employ value-laden terms such as diversity, bias, and quality to characterize datasets. Despite their prevalence, these terms lack clear definitions and validation. Our research explores the implications of this issue by analyzing "diversity" across 135 image and text datasets. Drawing from social sciences, we apply principles from measurement theory to identify considerations and offer recommendations for conceptualizing, operationalizing, and evaluating diversity in datasets. Our findings have broader implications for ML research, advocating for a more nuanced and precise approach to handling value-laden properties in dataset construction.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Resampled Datasets Are Not Enough: Mitigating Societal Bias Beyond Single Attributes
Authors:
Yusuke Hirota,
Jerone T. A. Andrews,
Dora Zhao,
Orestis Papakyriakopoulos,
Apostolos Modas,
Yuta Nakashima,
Alice Xiang
Abstract:
We tackle societal bias in image-text datasets by removing spurious correlations between protected groups and image attributes. Traditional methods only target labeled attributes, ignoring biases from unlabeled ones. Using text-guided inpainting models, our approach ensures protected group independence from all attributes and mitigates inpainting biases through data filtering. Evaluations on multi…
▽ More
We tackle societal bias in image-text datasets by removing spurious correlations between protected groups and image attributes. Traditional methods only target labeled attributes, ignoring biases from unlabeled ones. Using text-guided inpainting models, our approach ensures protected group independence from all attributes and mitigates inpainting biases through data filtering. Evaluations on multi-label image classification and image captioning tasks show our method effectively reduces bias without compromising performance across various models.
△ Less
Submitted 10 July, 2024; v1 submitted 4 July, 2024;
originally announced July 2024.
-
A Taxonomy of Challenges to Curating Fair Datasets
Authors:
Dora Zhao,
Morgan Klaus Scheuerman,
Pooja Chitre,
Jerone T. A. Andrews,
Georgia Panagiotidou,
Shawn Walker,
Kathleen H. Pine,
Alice Xiang
Abstract:
Despite extensive efforts to create fairer machine learning (ML) datasets, there remains a limited understanding of the practical aspects of dataset curation. Drawing from interviews with 30 ML dataset curators, we present a comprehensive taxonomy of the challenges and trade-offs encountered throughout the dataset curation lifecycle. Our findings underscore overarching issues within the broader fa…
▽ More
Despite extensive efforts to create fairer machine learning (ML) datasets, there remains a limited understanding of the practical aspects of dataset curation. Drawing from interviews with 30 ML dataset curators, we present a comprehensive taxonomy of the challenges and trade-offs encountered throughout the dataset curation lifecycle. Our findings underscore overarching issues within the broader fairness landscape that impact data curation. We conclude with recommendations aimed at fostering systemic changes to better facilitate fair dataset curation practices.
△ Less
Submitted 31 October, 2024; v1 submitted 10 June, 2024;
originally announced June 2024.
-
Quantum Entanglement in a Diluted Magnetic Semiconductor Quantum Dot
Authors:
Manish Kumar Mehta,
Joseph Thomas Andrews,
Pratima Sen
Abstract:
We investigated the entanglement in a diluted magnetic semiconductor quantum dot, crucial for quantum technologies. Despite their potential, these systems exhibit low extraction rates. We explore self-assembled InGaAs quantum dots, focusing on entanglement between them based on spin states. Our analysis involves defining wavefunctions, employing density matrix operators, and measuring entanglement…
▽ More
We investigated the entanglement in a diluted magnetic semiconductor quantum dot, crucial for quantum technologies. Despite their potential, these systems exhibit low extraction rates. We explore self-assembled InGaAs quantum dots, focusing on entanglement between them based on spin states. Our analysis involves defining wavefunctions, employing density matrix operators, and measuring entanglement entropy. Numerical assessments reveal few promising pairs among various quantum dot combinations that exhibit significant entanglement. Additionally, this work discusses theoretical developments and statistical evaluations of entanglement in diluted magnetic semiconductor quantum dots, providing insights into their potential for quantum applications.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
A View From Somewhere: Human-Centric Face Representations
Authors:
Jerone T. A. Andrews,
Przemyslaw Joniak,
Alice Xiang
Abstract:
Few datasets contain self-identified sensitive attributes, inferring attributes risks introducing additional biases, and collecting attributes can carry legal risks. Besides, categorical labels can fail to reflect the continuous nature of human phenotypic diversity, making it difficult to compare the similarity between same-labeled faces. To address these issues, we present A View From Somewhere (…
▽ More
Few datasets contain self-identified sensitive attributes, inferring attributes risks introducing additional biases, and collecting attributes can carry legal risks. Besides, categorical labels can fail to reflect the continuous nature of human phenotypic diversity, making it difficult to compare the similarity between same-labeled faces. To address these issues, we present A View From Somewhere (AVFS) -- a dataset of 638,180 human judgments of face similarity. We demonstrate the utility of AVFS for learning a continuous, low-dimensional embedding space aligned with human perception. Our embedding space, induced under a novel conditional framework, not only enables the accurate prediction of face similarity, but also provides a human-interpretable decomposition of the dimensions used in the human-decision making process, and the importance distinct annotators place on each dimension. We additionally show the practicality of the dimensions for collecting continuous attributes, performing classification, and comparing dataset attribute disparities.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Ethical Considerations for Responsible Data Curation
Authors:
Jerone T. A. Andrews,
Dora Zhao,
William Thong,
Apostolos Modas,
Orestis Papakyriakopoulos,
Alice Xiang
Abstract:
Human-centric computer vision (HCCV) data curation practices often neglect privacy and bias concerns, leading to dataset retractions and unfair models. HCCV datasets constructed through nonconsensual web scraping lack crucial metadata for comprehensive fairness and robustness evaluations. Current remedies are post hoc, lack persuasive justification for adoption, or fail to provide proper contextua…
▽ More
Human-centric computer vision (HCCV) data curation practices often neglect privacy and bias concerns, leading to dataset retractions and unfair models. HCCV datasets constructed through nonconsensual web scraping lack crucial metadata for comprehensive fairness and robustness evaluations. Current remedies are post hoc, lack persuasive justification for adoption, or fail to provide proper contextualization for appropriate application. Our research focuses on proactive, domain-specific recommendations, covering purpose, privacy and consent, and diversity, for curating HCCV evaluation datasets, addressing privacy and bias concerns. We adopt an ante hoc reflective perspective, drawing from current practices, guidelines, dataset withdrawals, and audits, to inform our considerations and recommendations.
△ Less
Submitted 10 December, 2023; v1 submitted 7 February, 2023;
originally announced February 2023.
-
Men Also Do Laundry: Multi-Attribute Bias Amplification
Authors:
Dora Zhao,
Jerone T. A. Andrews,
Alice Xiang
Abstract:
As computer vision systems become more widely deployed, there is increasing concern from both the research community and the public that these systems are not only reproducing but amplifying harmful social biases. The phenomenon of bias amplification, which is the focus of this work, refers to models amplifying inherent training set biases at test time. Existing metrics measure bias amplification…
▽ More
As computer vision systems become more widely deployed, there is increasing concern from both the research community and the public that these systems are not only reproducing but amplifying harmful social biases. The phenomenon of bias amplification, which is the focus of this work, refers to models amplifying inherent training set biases at test time. Existing metrics measure bias amplification with respect to single annotated attributes (e.g., $\texttt{computer}$). However, several visual datasets consist of images with multiple attribute annotations. We show models can learn to exploit correlations with respect to multiple attributes (e.g., {$\texttt{computer}$, $\texttt{keyboard}$}), which are not accounted for by current metrics. In addition, we show current metrics can give the erroneous impression that minimal or no bias amplification has occurred as they involve aggregating over positive and negative values. Further, these metrics lack a clear desired value, making them difficult to interpret. To address these shortcomings, we propose a new metric: Multi-Attribute Bias Amplification. We validate our proposed metric through an analysis of gender bias amplification on the COCO and imSitu datasets. Finally, we benchmark bias mitigation methods using our proposed metric, suggesting possible avenues for future bias mitigation
△ Less
Submitted 30 May, 2023; v1 submitted 21 October, 2022;
originally announced October 2022.
-
All Optical Integrated MOEMS Optical Coherence Tomography System
Authors:
Ashish Singh Bais,
Lokendra Singh Chouhan,
Joseph Thomas Andrews
Abstract:
Integrating all optical components of an optical coherence tomography (OCT) device into a single chip is a non-trivial and a challenging job. The design and development of such a lab-on-a chip will be possible only via Micro-Opto-Electro-Mechanical System (MOEMS) technology. The reproducible and integrated optical device fabrication would reduce cost and size many fold as compared to bulk or fiber…
▽ More
Integrating all optical components of an optical coherence tomography (OCT) device into a single chip is a non-trivial and a challenging job. The design and development of such a lab-on-a chip will be possible only via Micro-Opto-Electro-Mechanical System (MOEMS) technology. The reproducible and integrated optical device fabrication would reduce cost and size many fold as compared to bulk or fiber optic OCT system. A miniaturized OCT of size less than 5mm$^2$ area is designed, simulated and optimized. The successful fabrication of this device would help in point-of-contact devices as well as embedded biomedical sensor applications. Also, the design promises the possibility of fabrication of all optical components of OCT integrated into a single chip.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
I call BS: Fraud Detection in Crowdfunding Campaigns
Authors:
Beatrice Perez,
Sara R. Machado,
Jerone T. A. Andrews,
Nicolas Kourtellis
Abstract:
Donations to charity-based crowdfunding environments have been on the rise in the last few years. Unsurprisingly, deception and fraud in such platforms have also increased, but have not been thoroughly studied to understand what characteristics can expose such behavior and allow its automatic detection and blocking. Indeed, crowdfunding platforms are the only ones typically performing oversight fo…
▽ More
Donations to charity-based crowdfunding environments have been on the rise in the last few years. Unsurprisingly, deception and fraud in such platforms have also increased, but have not been thoroughly studied to understand what characteristics can expose such behavior and allow its automatic detection and blocking. Indeed, crowdfunding platforms are the only ones typically performing oversight for the campaigns launched in each service. However, they are not properly incentivized to combat fraud among users and the campaigns they launch: on the one hand, a platform's revenue is directly proportional to the number of transactions performed (since the platform charges a fixed amount per donation); on the other hand, if a platform is transparent with respect to how much fraud it has, it may discourage potential donors from participating.
In this paper, we take the first step in studying fraud in crowdfunding campaigns. We analyze data collected from different crowdfunding platforms, and annotate 700 campaigns as fraud or not. We compute various textual and image-based features and study their distributions and how they associate with campaign fraud. Using these attributes, we build machine learning classifiers, and show that it is possible to automatically classify such fraudulent behavior with up to 90.14% accuracy and 96.01% AUC, only using features available from the campaign's description at the moment of publication (i.e., with no user or money activity), making our method applicable for real-time operation on a user browser.
△ Less
Submitted 30 June, 2020;
originally announced June 2020.
-
Conditional Adversarial Camera Model Anonymization
Authors:
Jerone T. A. Andrews,
Yidan Zhang,
Lewis D. Griffin
Abstract:
The model of camera that was used to capture a particular photographic image (model attribution) is typically inferred from high-frequency model-specific artifacts present within the image. Model anonymization is the process of transforming these artifacts such that the apparent capture model is changed. We propose a conditional adversarial approach for learning such transformations. In contrast t…
▽ More
The model of camera that was used to capture a particular photographic image (model attribution) is typically inferred from high-frequency model-specific artifacts present within the image. Model anonymization is the process of transforming these artifacts such that the apparent capture model is changed. We propose a conditional adversarial approach for learning such transformations. In contrast to previous works, we cast model anonymization as the process of transforming both high and low spatial frequency information. We augment the objective with the loss from a pre-trained dual-stream model attribution classifier, which constrains the generative network to transform the full range of artifacts. Quantitative comparisons demonstrate the efficacy of our framework in a restrictive non-interactive black-box setting.
△ Less
Submitted 3 December, 2020; v1 submitted 18 February, 2020;
originally announced February 2020.
-
Study of Microwave Assisted CNOT Gate
Authors:
M K Mehta,
P Sen,
J T Andrews
Abstract:
Population evolution in a magnetic impurity doped semiconductor quantum dot has been studied by applying a sequence of pulses of chosen pulse area. By optical excitation mechanism, the population in (J_z=+3/2), heavy hole state of valence band is carried over to (J_z=-3/2), valance band state, via the (J=+1/2) conduction band states. The injected microwaves entangle conduction band states. This ar…
▽ More
Population evolution in a magnetic impurity doped semiconductor quantum dot has been studied by applying a sequence of pulses of chosen pulse area. By optical excitation mechanism, the population in (J_z=+3/2), heavy hole state of valence band is carried over to (J_z=-3/2), valance band state, via the (J=+1/2) conduction band states. The injected microwaves entangle conduction band states. This arrangement is successfully employed to ascertain quantum CNOT operation, and the calculation predicts maximum fidelity of 80\% for the CNOT operation.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
Multiple-Identity Image Attacks Against Face-based Identity Verification
Authors:
Jerone T. A. Andrews,
Thomas Tanay,
Lewis D. Griffin
Abstract:
Facial verification systems are vulnerable to poisoning attacks that make use of multiple-identity images (MIIs)---face images stored in a database that resemble multiple persons, such that novel images of any of the constituent persons are verified as matching the identity of the MII. Research on this mode of attack has focused on defence by detection, with no explanation as to why the vulnerabil…
▽ More
Facial verification systems are vulnerable to poisoning attacks that make use of multiple-identity images (MIIs)---face images stored in a database that resemble multiple persons, such that novel images of any of the constituent persons are verified as matching the identity of the MII. Research on this mode of attack has focused on defence by detection, with no explanation as to why the vulnerability exists. New quantitative results are presented that support an explanation in terms of the geometry of the representations spaces used by the verification systems. In the spherical geometry of those spaces, the angular distance distributions of matching and non-matching pairs of face representations are only modestly separated, approximately centred at 90 and 40-60 degrees, respectively. This is sufficient for open-set verification on normal data but provides an opportunity for MII attacks. Our analysis considers ideal MII algorithms, demonstrating that, if realisable, they would deliver faces roughly 45 degrees from their constituent faces, thus classed as matching them. We study the performance of three methods for MII generation---gallery search, image space morphing, and representation space inversion---and show that the latter two realise the ideal well enough to produce effective attacks, while the former could succeed but only with an implausibly large gallery to search. Gallery search and inversion MIIs depend on having access to a facial comparator, for optimisation, but our results show that these attacks can still be effective when attacking disparate comparators, thus securing a deployed comparator is an insufficient defence.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Authors:
Thomas Tanay,
Jerone T. A. Andrews,
Lewis D. Griffin
Abstract:
Designing models that are robust to small adversarial perturbations of their inputs has proven remarkably difficult. In this work we show that the reverse problem---making models more vulnerable---is surprisingly easy. After presenting some proofs of concept on MNIST, we introduce a generic tilting attack that injects vulnerabilities into the linear layers of pre-trained networks by increasing the…
▽ More
Designing models that are robust to small adversarial perturbations of their inputs has proven remarkably difficult. In this work we show that the reverse problem---making models more vulnerable---is surprisingly easy. After presenting some proofs of concept on MNIST, we introduce a generic tilting attack that injects vulnerabilities into the linear layers of pre-trained networks by increasing their sensitivity to components of low variance in the training data without affecting their performance on test data. We illustrate this attack on a multilayer perceptron trained on SVHN and use it to design a stand-alone adversarial module which we call a steganogram decoder. Finally, we show on CIFAR-10 that a poisoning attack with a poisoning rate as low as 0.1% can induce vulnerabilities to chosen imperceptible backdoor signals in state-of-the-art networks. Beyond their practical implications, these different results shed new light on the nature of the adversarial example phenomenon.
△ Less
Submitted 7 May, 2019; v1 submitted 19 June, 2018;
originally announced June 2018.
-
Polarization Sensitive Optical Coherence Tomography for Blood Glucose Monitoring in Human Subjects
Authors:
Jitendra Solanki,
OM Prakash Choudhury,
Pratima Sen,
Joseph Thomas Andrews
Abstract:
A device based on Polarization sensitive optical coherence tomography is developed to monitor blood glucose levels in human subjects. The device was initially tested with tissue phantom. The measurements with human subjects for various glucose concentration levels are found to be linearly dependent on the degree of circular polarization obtainable from the PS-OCT.
A device based on Polarization sensitive optical coherence tomography is developed to monitor blood glucose levels in human subjects. The device was initially tested with tissue phantom. The measurements with human subjects for various glucose concentration levels are found to be linearly dependent on the degree of circular polarization obtainable from the PS-OCT.
△ Less
Submitted 21 February, 2012;
originally announced February 2012.
-
Cyclic Correlation of Diffuse Reflected Signal with Glucose Concentration and scatterer size
Authors:
Jitendra Solanki,
Pratima Sen,
Joseph Thomas Andrews,
Kamal Kishore Thareja
Abstract:
The utility of optical coherence tomography signal intensity for measurement of glucose concentration has been analysed in tissue phantom and blood samples from human subjects. The diffusion equation based calculations as well as in-vivo OCT signal measurements confirms the cyclic correlation of signal intensity with glucose concentration and scatterer size.
The utility of optical coherence tomography signal intensity for measurement of glucose concentration has been analysed in tissue phantom and blood samples from human subjects. The diffusion equation based calculations as well as in-vivo OCT signal measurements confirms the cyclic correlation of signal intensity with glucose concentration and scatterer size.
△ Less
Submitted 23 January, 2012;
originally announced January 2012.
-
Effect of shell thickness on exciton and biexciton binding energy of a ZnSe/ZnS core/shell quantum dot
Authors:
Pratima Sen,
Saikat Chattopadhyay,
J. T. Andrews,
P. K. Sen
Abstract:
The exciton and biexciton binding energy have been studied for a ZnSe/ZnS core/shell quantum dot using WKB (Wentzel-Kramers-Brillouin) approximation. The exciton binding energy increases for small shell thickness and for large thickness, the binding energy again starts decreasing. A similar result is obtained for biexcitons where for thicker shells, the biexciton attains antibonding.
The exciton and biexciton binding energy have been studied for a ZnSe/ZnS core/shell quantum dot using WKB (Wentzel-Kramers-Brillouin) approximation. The exciton binding energy increases for small shell thickness and for large thickness, the binding energy again starts decreasing. A similar result is obtained for biexcitons where for thicker shells, the biexciton attains antibonding.
△ Less
Submitted 18 October, 2009;
originally announced October 2009.
-
Plasma diagnostics using digital holographic interferometry
Authors:
J T Andrews,
K Bose
Abstract:
The advances in Charge Coupled Devices in one hand and the high resolution measurements of holographic technique on the other hand, we have adopted the method of digital real-time holographic interferometry for the diagnostics of high density plasma. The measured values of plasma electron density agree with the measurements from other techniques.
The advances in Charge Coupled Devices in one hand and the high resolution measurements of holographic technique on the other hand, we have adopted the method of digital real-time holographic interferometry for the diagnostics of high density plasma. The measured values of plasma electron density agree with the measurements from other techniques.
△ Less
Submitted 24 November, 2008;
originally announced November 2008.
-
Non-Invasive Glucose Monitoring Techniques: A review and current trends
Authors:
Raju Poddar,
Joseph Thomas Andrews,
Pratyoosh Shukla,
Pratima Sen
Abstract:
Diabetes mellitus is a complex group of syndromes that have in common a disturbance in the body's use of glucose, resulting in an elevated blood sugar. Once detected, sugar diabetes can be controlled by an appropriate regimen that should include diet therapy, a weight reduction program for those persons who are overweight, a program of exercise and insulin injections or oral drugs to lower blood…
▽ More
Diabetes mellitus is a complex group of syndromes that have in common a disturbance in the body's use of glucose, resulting in an elevated blood sugar. Once detected, sugar diabetes can be controlled by an appropriate regimen that should include diet therapy, a weight reduction program for those persons who are overweight, a program of exercise and insulin injections or oral drugs to lower blood glucose. Blood glucose monitoring by the patient and the physician is an important aspect in the control of the devastating complications (heart disease, blindness, kidney failure or amputations) due to the disease. Intensive therapy and frequent glucose testing has numerous benefits. With ever improving advances in diagnostic technology, the race for the next generation of bloodless, painless, accurate glucose instruments has begun. In this paper, we reviewed various methods, techniques and approaches successfully demonstrated for measuring or monitoring blood glucose. Invasive, minimally invasive and noninvasive techniques available in literature are summarised.
△ Less
Submitted 31 October, 2008;
originally announced October 2008.
-
Forces on a nanoparticle in an optical trap
Authors:
Kaushik Choudhury,
Joseph Thomas Andrews,
Pranay Kumar Sen,
Pratima Sen
Abstract:
Forces on a nanoparticle in an optical trap are analysed. Brownian motion is found to be one of the major challenges to trap a nanoparticle. Accordingly, suitable spatial electric field distribution of laser beam is suggested to enhance the trapping force on a nanoparticle. Theoretical analysis is carried out to obtain conditions for stable optical trap by incorporating the temperature variation…
▽ More
Forces on a nanoparticle in an optical trap are analysed. Brownian motion is found to be one of the major challenges to trap a nanoparticle. Accordingly, suitable spatial electric field distribution of laser beam is suggested to enhance the trapping force on a nanoparticle. Theoretical analysis is carried out to obtain conditions for stable optical trap by incorporating the temperature variation at large laser intensities. Numerical analysis is made for single quantum dot of CdS in buffer solution irradiated by an Nd:YAG laser.
△ Less
Submitted 30 October, 2008;
originally announced October 2008.
-
Study of Correlation Between Glucose Concentration and Reduced Scattering Coefficients in Turbid media using Optical Coherence Tomography
Authors:
R Poddar,
S R Sharma,
P Sen,
J T Andrews
Abstract:
Noninvasive, non-contact and \textit{in vivo} monitoring of blood glucose is a long needed pathology tool for saving patients from recurring pain and hassle that can accompany conventional blood glucose testing methods. Optical coherence tomography known for its high axial resolution imaging modality is adopted in this article for monitoring glucose levels in tissue like media non-invasively. Ma…
▽ More
Noninvasive, non-contact and \textit{in vivo} monitoring of blood glucose is a long needed pathology tool for saving patients from recurring pain and hassle that can accompany conventional blood glucose testing methods. Optical coherence tomography known for its high axial resolution imaging modality is adopted in this article for monitoring glucose levels in tissue like media non-invasively. Making use of changes in reduced scattering coefficient due to the refractive-index mismatch between the extracellular fluid and the cellular membranes and armed with a theoretical model, we establish a correlation between the glucose concentration and reduced scattering coefficient. The scattering coefficients are extracted from the deconvoluted interference signal by using Monte-Carlo simulation with valid approximations. A program code using NI LabVIEW(^{TM}) is developed for automation of the experiment, data acquisition and analysis.
△ Less
Submitted 1 August, 2008;
originally announced August 2008.
-
Stimulated emission from the biexciton in a single quantum dot
Authors:
I. A. Akimov,
J. T. Andrews,
F. Henneberger
Abstract:
Using two optical pulses of different frequencies, we demonstrate entanglement and disentanglement of the electronic states in Stranski-Krastanov quantum dots. Resonant two-photon excitation of the biexciton creates an entangled Bell-like state. The second pulse, being resonant to the exciton-biexciton transition, stimulates the emission from the biexciton and fully disentangles the two-bit syst…
▽ More
Using two optical pulses of different frequencies, we demonstrate entanglement and disentanglement of the electronic states in Stranski-Krastanov quantum dots. Resonant two-photon excitation of the biexciton creates an entangled Bell-like state. The second pulse, being resonant to the exciton-biexciton transition, stimulates the emission from the biexciton and fully disentangles the two-bit system. By setting the polarization of the stimulation pulse, we control the recombination path of the biexciton and, by this, the state of the photons emitted in the decay cascade.
△ Less
Submitted 8 July, 2005;
originally announced July 2005.
-
Quantum optical phenomena in semiconductor quantum dots
Authors:
J. Thomas Andrews
Abstract:
Quantum optical phenomena are explored in artificial atoms well known as semiconductor quantum dots, in the presence of excitons and biexcitons. The analytical results are obtained using the conventional time-dependent perturbation technique. Numerical estimations are made for arealistic sample of CdS quantum dots in a high-Q cavity. Quantum optical phenomena such as quantum Rabi oscillations, p…
▽ More
Quantum optical phenomena are explored in artificial atoms well known as semiconductor quantum dots, in the presence of excitons and biexcitons. The analytical results are obtained using the conventional time-dependent perturbation technique. Numerical estimations are made for arealistic sample of CdS quantum dots in a high-Q cavity. Quantum optical phenomena such as quantum Rabi oscillations, photon statistics and collapse and revival of population inversion in exciton and biexciton states are observed. In the presence of biexcitons the collapse and revival phenomenon becomes faster due to the strong coupling of biexciton with cavity field.
△ Less
Submitted 22 November, 2002;
originally announced November 2002.