-
Broken symmetry states and Quantum Hall Ferromagnetism in decoupled twisted bilayer graphene
Authors:
Vineet Pandey,
Prasenjit Ghosh,
Riju Pal,
Sourav Paul,
Abhijith M B,
Kenji Watanabe,
Takashi Taniguchi,
Atindra Nath Pal,
Vidya Kochat
Abstract:
Twisted bilayer graphene (TBLG) with large twist angle is a novel 2D bilayer system with strong interlayer Coulomb interactions, whilst suppressed interlayer carrier tunneling due to momentum mismatch between the Dirac cones of individual graphene layers. This interlayer decoherence disentangles the layer degree of freedom from spin-valley space. We demonstrate the role of charge screening effects…
▽ More
Twisted bilayer graphene (TBLG) with large twist angle is a novel 2D bilayer system with strong interlayer Coulomb interactions, whilst suppressed interlayer carrier tunneling due to momentum mismatch between the Dirac cones of individual graphene layers. This interlayer decoherence disentangles the layer degree of freedom from spin-valley space. We demonstrate the role of charge screening effects in electronically decoupled TBLG that determines the Landau level (LL) crossings and multicomponent Quantum Hall (QH) effect resulting from combinations of broken symmetry states with spin and valley flavors of constituent layers.The N = 0 LL at zero filling factor is characterized by a field-induced Kosterlitz-Thouless transition to an ordered ground state, consistent with predictions of intervalley coherent state of Kekulé order. Pronounced hysteresis and electron-hole asymmetry observed in the QH regime suggests pinning of low-energy topological excitations, i.e., skyrmions with spin and valley textures, at charged defects in graphene channel.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Flame spread over thin circular PMMA rods
Authors:
Manu B V,
Amit Kumar
Abstract:
In the present article, series of opposed flow, downward flame spread experiments are conducted using 80 mm long cast PMMA cylinders of 1 mm and 0.5 mm diameters at normal and micro gravity environments. All the experiments are conducted at 21 % of oxygen by volume in nitrogen at 1 atmospheric pressure with varying the opposed flow speed from 0 cm/s to 25 cm/s. Flame spread rate, flame shape, preh…
▽ More
In the present article, series of opposed flow, downward flame spread experiments are conducted using 80 mm long cast PMMA cylinders of 1 mm and 0.5 mm diameters at normal and micro gravity environments. All the experiments are conducted at 21 % of oxygen by volume in nitrogen at 1 atmospheric pressure with varying the opposed flow speed from 0 cm/s to 25 cm/s. Flame spread rate, flame shape, preheating, and pyrolysis parameters are observed and analysed by tracking the leading edge of the flame by digital image processing, measuring flame field temperatures, schileren imaging and microscopic observation of burnt solid cones. It is concluded from the study that, flame spreads faster in microgravity for all diameters and opposed flows considered in the study, because of longer preheating length which is confirmed by temperature measurement using 50 microns thermocouples in a flame field. The thinner the fuel faster the flame spread rate because of curvature effect and reduced thermal inertia. In normal gravity, the flame spread rate reduces very slightly with increasing opposed flow while in micro
△ Less
Submitted 4 February, 2025; v1 submitted 11 July, 2024;
originally announced July 2024.
-
An Extensive Survey of Digital Image Steganography: State of the Art
Authors:
Idakwo M. A.,
Muazu M. B.,
Adedokun A. E.,
Sadiq B. O
Abstract:
The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led towider adoption of cryptography and steganography. The cryptography approaches convert the information into an unreadable format however draws the attention of cryptanalyst owing to the uncommon random nature flow of the bytes when viewing the flowing structured bytes on a computer. Whi…
▽ More
The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led towider adoption of cryptography and steganography. The cryptography approaches convert the information into an unreadable format however draws the attention of cryptanalyst owing to the uncommon random nature flow of the bytes when viewing the flowing structured bytes on a computer. While steganography, in contrast, conceals the very existence of covert communication using digital media. Although any digital media (text, image, video, audio) can covey the sensitive information, the media with higher redundant bits are more favorable for embedding the sensitive information without distorting the media. Digital images are majorly used in conveying sensitive information compared to others owing to their higher rate of tolerating distortions, highly available, smaller sizes with high redundant bits. However, the need for maximizing the redundancy bits for the optimum embedding of secret information has been a paramount issue due to the imperceptibility prerequisite which deteriorates with an increase in payload thus, resulting in a tradeoff. This has limited steganography to only applications with lower payload requirements, thus limiting the adoption for wider deployment. This paper critically analyzes the current steganographic techniques, recent trends, and challenges.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Experimental System Design of an Active Fault-Tolerant Quadrotor
Authors:
Jennifer Yeom,
Roshan Balu T M B,
Guanrui Li,
Giuseppe Loianno
Abstract:
Quadrotors have gained popularity over the last decade, aiding humans in complex tasks such as search and rescue, mapping and exploration. Despite their mechanical simplicity and versatility compared to other types of aerial vehicles, they remain vulnerable to rotor failures. In this paper, we propose an algorithmic and mechanical approach to addressing the quadrotor fault-tolerant problem in case…
▽ More
Quadrotors have gained popularity over the last decade, aiding humans in complex tasks such as search and rescue, mapping and exploration. Despite their mechanical simplicity and versatility compared to other types of aerial vehicles, they remain vulnerable to rotor failures. In this paper, we propose an algorithmic and mechanical approach to addressing the quadrotor fault-tolerant problem in case of rotor failures. First, we present a fault-tolerant detection and control scheme that includes various attitude error metrics. The scheme transitions to a fault-tolerant control mode by surrendering the yaw control. Subsequently, to ensure compatibility with platform sensing constraints, we investigate the relationship between variations in robot rotational drag, achieved through a modular mechanical design appendage, resulting in yaw rates within sensor limits. This analysis offers a platform-agnostic framework for designing more reliable and robust quadrotors in the event of rotor failures. Extensive experimental results validate the proposed approach providing insights into successfully designing a cost-effective quadrotor capable of fault-tolerant control. The overall design enhances safety in scenarios of faulty rotors, without the need for additional sensors or computational resources.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Functional Benchmarks for Robust Evaluation of Reasoning Performance, and the Reasoning Gap
Authors:
Saurabh Srivastava,
Annarose M B,
Anto P V,
Shashank Menon,
Ajay Sukumar,
Adwaith Samod T,
Alan Philipose,
Stevin Prince,
Sooraj Thomas
Abstract:
We propose a framework for robust evaluation of reasoning capabilities of language models, using functional variants of benchmarks. Models that solve a reasoning test should exhibit no difference in performance over the static version of a problem compared to a snapshot of the functional variant. We have rewritten the relevant fragment of the MATH benchmark into its functional variant MATH(), with…
▽ More
We propose a framework for robust evaluation of reasoning capabilities of language models, using functional variants of benchmarks. Models that solve a reasoning test should exhibit no difference in performance over the static version of a problem compared to a snapshot of the functional variant. We have rewritten the relevant fragment of the MATH benchmark into its functional variant MATH(), with functionalization of other benchmarks to follow. When evaluating current state-of-the-art models over snapshots of MATH(), we find a reasoning gap -- the percentage difference between the static and functional accuracies. We find reasoning gaps from 58.35% to 80.31% among the state-of-the-art closed and open weights models that perform well on static benchmarks, with the caveat that the gaps are likely to be smaller with more sophisticated prompting strategies. Here we show that models which anecdotally have good reasoning performance over real-world tasks, have quantifiable lower gaps, motivating the open problem of building "gap 0" models. Code for evaluation and new evaluation datasets, three MATH() snapshots, are publicly available at https://github.com/consequentai/fneval/.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
Interoperable Workflows by Exchanging Grid-Based Data between Quantum-Chemical Program Packages
Authors:
Kevin Focke,
Matteo De Santis,
Mario Wolter,
Jessica A. Martinez B,
Valérie Vallet,
André Severo Pereira Gomes,
Małgorzata Olejniczak,
Christoph R. Jacob
Abstract:
Quantum-chemical subsystem and embedding methods require complex workflows that may involve multiple quantum-chemical program packages. Moreover, such workflows require the exchange of voluminous data that goes beyond simple quantities such as molecular structures and energies. Here, we describe our approach for addressing this interoperability challenge by exchanging electron densities and embedd…
▽ More
Quantum-chemical subsystem and embedding methods require complex workflows that may involve multiple quantum-chemical program packages. Moreover, such workflows require the exchange of voluminous data that goes beyond simple quantities such as molecular structures and energies. Here, we describe our approach for addressing this interoperability challenge by exchanging electron densities and embedding potentials as grid-based data. We describe the approach that we have implemented to this end in a dedicated code, PyEmbed, currently part of a Python scripting framework. We discuss how it has facilitated the development of quantum-chemical subsystem and embedding methods, and highlight several applications that have been enabled by PyEmbed, including WFT-in-DFT embedding schemes mixing non-relativistic and relativistic electronic structure methods, real-time time-dependent DFT-in-DFT approaches, the density-based many-body expansion, and workflows including real-space data analysis and visualization. Our approach demonstrates in particular the merits of exchanging (complex) grid-based data, and in general the potential of modular software development in quantum chemistry, which hinges upon libraries that facilitate interoperability.
△ Less
Submitted 29 March, 2024; v1 submitted 31 January, 2024;
originally announced January 2024.
-
Solvation effects on halides core spectra with Multilevel Real-Time quantum embedding
Authors:
Jessica A. Martinez B.,
Matteo De Santis,
Michele Pavanello,
Valérie Vallet,
André Severo Pereira Gomes
Abstract:
In this work we introduce a novel subsystem-based electronic structure embedding method that combines the projection-based block-orthogonalized Manby-Miller embedding (BOMME) with the density-based Frozen Density Embedding (FDE) methods. Our approach is effective for systems in which the building blocks interact at varying strengths while still maintaining a lower computational cost compared to a…
▽ More
In this work we introduce a novel subsystem-based electronic structure embedding method that combines the projection-based block-orthogonalized Manby-Miller embedding (BOMME) with the density-based Frozen Density Embedding (FDE) methods. Our approach is effective for systems in which the building blocks interact at varying strengths while still maintaining a lower computational cost compared to a quantum simulation of the entire system. To evaluate the performance of our method, we assess its ability to reproduce the X-ray absorption spectra (XAS) of chloride and fluoride anions in aqueous solutions (based on a 50-water droplet model) via real-time time-dependent density functional theory (rt-TDDFT) calculations. We employ an ensemble approach to compute XAS for the K- and L-edges, utilizing multiple snapshots of configuration space obtained from classical molecular dynamics simulations with a polarizable force field. Configurational averaging influences both the broadening of spectral features and their intensities, with contributions to the final intensities originating from different geometry configurations. We found that embedding models that are too approximate for halide-water specific interactions, as in the case of FDE, fail to reproduce the experimental spectrum for chloride. Meanwhile, BOMME tends to overestimate intensities, particularly for higher energy features because of finite-size effects. Combining FDE for the second solvation shell and retaining BOMME for the first solvation shell mitigates this effect, resulting in an overall improved agreement within the energy range of the experimental spectrum. Additionally, we compute the transition densities of the relevant transitions, confirming that these transitions occur within the halide systems. Thus, our real-time QM/QM/QM embedding method proves to be a promising approach for modeling XAS of solvated systems.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol
Authors:
SujayKumar Reddy M,
Chandra Mohan B
Abstract:
Quantum Key Distribution (QKD) is a technique that enables secure communication between two parties by sharing a secret key. One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984. In this protocol, Alice and Bob use a quantum channel to exchange qubits, allowing them to generate a shared key that is resistant to eavesdropping. This p…
▽ More
Quantum Key Distribution (QKD) is a technique that enables secure communication between two parties by sharing a secret key. One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984. In this protocol, Alice and Bob use a quantum channel to exchange qubits, allowing them to generate a shared key that is resistant to eavesdropping. This paper presents a comparative study of existing QKD schemes, including the BB84 protocol, and highlights the advancements made in the BB84 protocol over the years. The study aims to provide a comprehensive overview of the different QKD schemes and their strengths and weaknesses and demonstrate QKDs working principles through existing simulations and implementations. Through this study, we show that the BB84 protocol is a highly secure QKD scheme that has been extensively studied and implemented in various settings. Furthermore, we discuss the improvements made to the BB84 protocol to enhance its security and practicality, including the use of decoy states and advanced error correction techniques. Overall, this paper provides a comprehensive analysis of QKD schemes, focusing on the BB84 protocol in secure communication technologies.
△ Less
Submitted 9 December, 2023;
originally announced December 2023.
-
Thomson scattering diagnostics at the Globus M2 tokamak
Authors:
Zhiltsov N. S.,
Kurskiev G. S.,
Tolstyakov S. Yu.,
Solovey V. A.,
Koval A. N.,
Aleksandrov S. E.,
Bazhenov A. N.,
Chernakov P. V.,
Filippov S. V.,
Gusev V. K.,
Khromov N. A.,
Kiselev E. O.,
Kornev A. F.,
Krikunov S. V.,
Makarov A. M.,
Minaev V. B.,
Miroshnikov I. V.,
Mukhin E. E.,
Novokhatsky A. N.,
Patrov M. I.,
Petrov Yu. V.,
Sakharov N. V.,
Schegolev. P. B.,
Telnova A. Yu.,
Tkachenko E. E.
, et al. (3 additional authors not shown)
Abstract:
The paper is devoted to the Thomson scattering (TS) diagnostics recently developed for the Globus-M2 spherical tokamak and prototyping the ITER divertor TS diagnostics. The distinctive features of the system are the use of spectrometers, acquisition system and lasers that meet the base requirements for ITER TS diagnostics. The paper describes the diagnostic system that allows precise measurements…
▽ More
The paper is devoted to the Thomson scattering (TS) diagnostics recently developed for the Globus-M2 spherical tokamak and prototyping the ITER divertor TS diagnostics. The distinctive features of the system are the use of spectrometers, acquisition system and lasers that meet the base requirements for ITER TS diagnostics. The paper describes the diagnostic system that allows precise measurements of TS signals, as well as the results of the first measurements of electron temperature and density in both central region of the plasma column and scrape-off layer. The system provides measurements of electron temperature $T_{e}$ in the range of 5 eV to 5 keV and density $n_{e}$ in the range of $5{\cdot}10^{17}÷3.25{\cdot}10^{20} m^{-3}$. The use of two ITER-grade probing lasers of different wavelengths (Nd:YAG 1064.5 nm and Nd:YLF 1047.3 nm) allows reliable measurement of $T_{e}$ in multi-colour mode, i.e., assuming that spectral calibration is unknown.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
Probing interlayer interactions and commensurate-incommensurate transition in twisted bilayer graphene through Raman spectroscopy
Authors:
Vineet Pandey,
Subhendu Mishra,
Nikhilesh Maity,
Sourav Paul,
Abhijith M B,
Ajit Roy,
Nicholas R Glavin,
Kenji Watanabe,
Takashi Taniguchi,
Abhishek Kumar Singh,
Vidya Kochat
Abstract:
Twisted 2D layered materials have garnered a lot of attention recently as a class of 2D materials whose interlayer interactions and electronic properties are dictated by the relative rotation / twist angle between the adjacent layers. In this work, we explore a prototype of such a twisted 2D system, artificially stacked twisted bilayer graphene (TBLG), where we probe the changes in the interlayer…
▽ More
Twisted 2D layered materials have garnered a lot of attention recently as a class of 2D materials whose interlayer interactions and electronic properties are dictated by the relative rotation / twist angle between the adjacent layers. In this work, we explore a prototype of such a twisted 2D system, artificially stacked twisted bilayer graphene (TBLG), where we probe the changes in the interlayer interactions and electron-phonon scattering pathways as the twist angle is varied from 0° to 30°, using Raman spectroscopy. The long range Moiré potential of the superlattice gives rise to additional intravalley and intervalley scattering of the electrons in TBLG which have been investigated through their Raman signatures. The density functional theory (DFT) calculations of the electronic band structure of the TBLG superlattices was found to be in agreement with the resonant Raman excitations across the van Hove singularities in the valence and conduction bands predicted for TBLG due to hybridization of bands from the two layers. We also observe that the relative rotation between the graphene layers has a marked influence on the second order overtone and combination Raman modes signalling a commensurate-incommensurate transition in TBLG as the twist angle increases. This serves as a convenient and rapid characterization tool to determine the degree of commensurability in TBLG systems.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
Comparative Analysis of Imbalanced Malware Byteplot Image Classification using Transfer Learning
Authors:
Jayasudha M,
Ayesha Shaik,
Gaurav Pendharkar,
Soham Kumar,
Muhesh Kumar B,
Sudharshanan Balaji
Abstract:
Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared…
▽ More
Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared on the Malimg dataset, Blended dataset, and Malevis dataset to gain insights into the effect of class imbalance on model performance and convergence. It is observed that the more the class imbalance less the number of epochs required for convergence and a high variance across the performance of different models. Moreover, it is also observed that for malware detectors ResNet50, EfficientNetB0, and DenseNet169 can handle imbalanced and balanced data well. A maximum precision of 97% is obtained for the imbalanced dataset, a maximum precision of 95% is obtained on the intermediate imbalance dataset, and a maximum precision of 95% is obtained for the perfectly balanced dataset.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Efficient Concept Drift Handling for Batch Android Malware Detection Models
Authors:
Molina-Coronado B.,
Mori U.,
Mendiburu A.,
Miguel-Alonso J
Abstract:
The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on stati…
▽ More
The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on static models. In this work, we show how retraining techniques are able to maintain detector capabilities over time. Particularly, we analyze the effect of two aspects in the efficiency and performance of the detectors: 1) the frequency with which the models are retrained, and 2) the data used for retraining. In the first experiment, we compare periodic retraining with a more advanced concept drift detection method that triggers retraining only when necessary. In the second experiment, we analyze sampling methods to reduce the amount of data used to retrain models. Specifically, we compare fixed sized windows of recent data and state-of-the-art active learning methods that select those apps that help keep the training dataset small but diverse. Our experiments show that concept drift detection and sample selection mechanisms result in very efficient retraining strategies which can be successfully used to maintain the performance of the static Android malware state-of-the-art detectors in changing environments.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
AutoCharge: Autonomous Charging for Perpetual Quadrotor Missions
Authors:
Alessandro Saviolo,
Jeffrey Mao,
Roshan Balu T M B,
Vivek Radhakrishnan,
Giuseppe Loianno
Abstract:
Battery endurance represents a key challenge for long-term autonomy and long-range operations, especially in the case of aerial robots. In this paper, we propose AutoCharge, an autonomous charging solution for quadrotors that combines a portable ground station with a flexible, lightweight charging tether and is capable of universal, highly efficient, and robust charging. We design and manufacture…
▽ More
Battery endurance represents a key challenge for long-term autonomy and long-range operations, especially in the case of aerial robots. In this paper, we propose AutoCharge, an autonomous charging solution for quadrotors that combines a portable ground station with a flexible, lightweight charging tether and is capable of universal, highly efficient, and robust charging. We design and manufacture a pair of circular magnetic connectors to ensure a precise orientation-agnostic electrical connection between the ground station and the charging tether. Moreover, we supply the ground station with an electromagnet that largely increases the tolerance to localization and control errors during the docking maneuver, while still guaranteeing smooth un-docking once the charging process is completed. We demonstrate AutoCharge on a perpetual 10 hours quadrotor flight experiment and show that the docking and un-docking performance is solidly repeatable, enabling perpetual quadrotor flight missions.
△ Less
Submitted 8 June, 2023;
originally announced June 2023.
-
Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing
Authors:
Dhinakaran D,
Joe Prathap P. M,
Selvaraj D,
Arul Kumar D,
Murugeshwari B
Abstract:
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori…
▽ More
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algorithms that can obtain maximum privacy, data utility, and time savings while doing so. This paper proposes a unique double encryption and Transaction Splitter approach to alter the database to optimize the data utility and confidentiality tradeoff in the preparation phase. This paper presents a customized apriori approach for the mining process, which does not examine the entire database to estimate the support for each attribute. Existing distributed data solutions have a high encryption complexity and an insufficient specification of many participants' properties. Proposed solutions provide increased privacy protection against a variety of attack models. Furthermore, in terms of communication cycles and processing complexity, it is much simpler and quicker. Proposed work tests on top of a realworld transaction database demonstrate that the aim of the proposed method is realistic.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Autonomous Agriculture Robot for Smart Farming
Authors:
Vinay Ummadi,
Aravind Gundlapalle,
Althaf Shaik,
Shaik Mohammad Rafi B
Abstract:
This project aims to develop and demonstrate a ground robot with intelligence capable of conducting semi-autonomous farm operations for different low-heights vegetable crops referred as Agriculture Application Robot(AAR). AAR is a lightweight, solar-electric powered robot that uses intelligent perception for conducting detection and classification of plants and their characteristics. The system al…
▽ More
This project aims to develop and demonstrate a ground robot with intelligence capable of conducting semi-autonomous farm operations for different low-heights vegetable crops referred as Agriculture Application Robot(AAR). AAR is a lightweight, solar-electric powered robot that uses intelligent perception for conducting detection and classification of plants and their characteristics. The system also has a robotic arm for the autonomous weed cutting process. The robot can deliver fertilizer spraying, insecticide, herbicide, and other fluids to the targets such as crops, weeds, and other pests. Besides, it provides information for future research into higher-level tasks such as yield estimation, crop, and soil health monitoring. We present the design of robot and the associated experiments which show the promising results in real world environments.
△ Less
Submitted 7 September, 2023; v1 submitted 2 August, 2022;
originally announced August 2022.
-
A new approach to improve the performance of OFDM signal for 6G communication
Authors:
Usha S. M,
Mahesh H. B
Abstract:
The orthogonal frequency division multiplexing is a very efficient modulation technique that can achieve very high throughput by transmitting many carriers simultaneously and it is spectrally efficient because of the proximity of the subcarriers. OFDM is used in 5G communication for higher data transmission. 6th generation communication also demands OFDM, since it is more spectrally efficient and…
▽ More
The orthogonal frequency division multiplexing is a very efficient modulation technique that can achieve very high throughput by transmitting many carriers simultaneously and it is spectrally efficient because of the proximity of the subcarriers. OFDM is used in 5G communication for higher data transmission. 6th generation communication also demands OFDM, since it is more spectrally efficient and suitable for high data transmission. The drawback of the OFDM includes peak to average power ratio and sensitivity to carrier offsets and drifts. The usage of a non-linear power amplifier causes the signal spreading and leads to inter-modulation and signal constellation distortion. These two distortions have an impact on the signal-to-noise ratio and hence reduce the efficiency. The methods used to reduce PAPR are clipping and filtering, selective mapping, partial transmit sequence, tone reservation, and injection and non-linear commanding. The drawbacks of the above methods are computational complexity, spectrum inefficiency, increase in bit error rate and PAPR rate. In this work, three effective methods are discussed and compared to improve the performance parameters. These are adaptive peak window method based on harmonize clipping, harmonics kernel adaptive filter and Slepian-based flat-top window techniques are presented to reduce the BER, PAPR, and CCDF to improve the signal-to-noise of the system. This window technique averages out the noise spread out in the spectrum and thus reduces the signal loss by minimizing peak to average power ratio. The results are analyzed and compared with the existing conventional methods. Finally, the reductions in PAPR, BER and CCDF obtained are discussed in the results and comparison section. The proposed work has a higher signal-to-noise ratio than the conventional methods.
△ Less
Submitted 4 June, 2022;
originally announced June 2022.
-
Three new brown dwarfs and a massive hot Jupiter revealed by TESS around early-type stars
Authors:
Psaridi A.,
Bouchy F.,
Lendl M.,
Grieves N.,
Stassun K. G.,
Carmichael T.,
Gill S.,
Peña Rojas P. A.,
Gan T.,
Shporer A.,
Bieryla A.,
Christiansen J. L,
Crossfield I. J. M,
Galland F. Hooton M. J. Jenkins J. M,
Jenkins J. S,
Latham D. W,
Lund M. B,
Rodriguez J. E,
Ting E. B,
Udry S. Ulmer-Moll S. Wittenmyer R. A,
Yanzhe Zhang Y.,
Zhou G.,
Addison B.,
Cointepas M.,
Collins K. A.
, et al. (18 additional authors not shown)
Abstract:
The detection and characterization of exoplanets and brown dwarfs (BDs) around massive AF-type stars is essential to investigate and constrain the impact of stellar mass on planet properties. However, such targets are still poorly explored in radial velocity (RV) surveys because they only feature a small number of stellar lines and those are usually broadened and blended by stellar rotation as wel…
▽ More
The detection and characterization of exoplanets and brown dwarfs (BDs) around massive AF-type stars is essential to investigate and constrain the impact of stellar mass on planet properties. However, such targets are still poorly explored in radial velocity (RV) surveys because they only feature a small number of stellar lines and those are usually broadened and blended by stellar rotation as well as stellar jitter. As a result, the available information about the formation and evolution of planets and BDs around hot stars is limited. We aim to increase the sample and precisely measure the masses and eccentricities of giant planets and BDs transiting AF-type stars detected by the Transiting Exoplanet Survey Satellite (TESS). We followed bright (V < 12 mag) stars with $T_{\mathrm{eff}}$ > 6200 K that host giant companions (R > 7 $\mathrm{R_{\rm \oplus}}$) using ground-based photometric observations as well as high precision RV measurements from the CORALIE, CHIRON, TRES, FEROS, and MINERVA-Australis spectrographs. In the context, we present the discovery of three BD companions, TOI-629b, TOI-1982b, and TOI-2543b, and one massive planet, TOI-1107b. From the joint analysis we find the BDs have masses between 66 and 68 $\mathrm{M_{\rm Jup}}$, periods between 7.54 and 17.17 days, and radii between 0.95 and 1.11 $\mathrm{R_{\rm Jup}}$. The hot Jupiter TOI-1107b has an orbital period of 4.08 days, a radius of 1.30 $\mathrm{R_{\rm Jup}}$, and a mass of 3.35 $\mathrm{M_{\rm Jup}}$. As a by-product of this program, we identified four low-mass eclipsing components (TOI-288b, TOI-446b, TOI-478b, and TOI-764b). Both TOI-1107b and TOI-1982b present an anomalously inflated radius with respect to the age of these systems. TOI-629 is among the hottest stars with a known transiting brown dwarf. TOI-629b and TOI-1982b are among the most eccentric brown dwarfs.
△ Less
Submitted 22 May, 2022;
originally announced May 2022.
-
Secure and Safety Mobile Network System for Visually Impaired People
Authors:
Shyama Kumari Arunachalam,
Roopa V,
Meena H B,
Vijayalakshmi,
T Malavika
Abstract:
The proposed system aims to be a techno-friend of visually impaired people to assist them in orientation and mobility both indoor and outdoor. Moving through an unknown environment becomes a real challenge for most of them, although they rely on their other senses. An age old mechanism used for assistance for the blind people is a white cane commonly known as walking cane a simple and purely mecha…
▽ More
The proposed system aims to be a techno-friend of visually impaired people to assist them in orientation and mobility both indoor and outdoor. Moving through an unknown environment becomes a real challenge for most of them, although they rely on their other senses. An age old mechanism used for assistance for the blind people is a white cane commonly known as walking cane a simple and purely mechanical device to detect the ground, uneven surfaces, holes and steps using simple Tactile-force feedback.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Autonomous UAV for Building Monitoring, Detection and Localisation of Faults
Authors:
Suhas Thalanki,
T Vijay Prashant,
Harshith Kumar M B,
Shayak Bhadraray,
Aravind S,
Srikrishna BR,
Sameer Dhole
Abstract:
Collapsing of structural buildings has been sighted commonly and the presence of potential faults has proved to be damaging to the buildings, resulting in accidents. It is essential to continuously monitor any building for faults where human access is restricted. With UAVs (Unmanned Aerial Vehicles) emerging in the field of computer vision, monitoring any building and detecting such faults is seen…
▽ More
Collapsing of structural buildings has been sighted commonly and the presence of potential faults has proved to be damaging to the buildings, resulting in accidents. It is essential to continuously monitor any building for faults where human access is restricted. With UAVs (Unmanned Aerial Vehicles) emerging in the field of computer vision, monitoring any building and detecting such faults is seen as a possibility. This paper puts forth a novel approach where an automated UAV traverses around the target building, detects any potential faults in the building, and localizes the faults. With the dimensions of the building provided, a path around the building is generated. The images captured by the onboard camera of the UAV are passed through a neural network system to confirm the presence of faults. Once a fault is detected, the UAV maneuvers itself to the corresponding position where the crack is detected. The simulation is done with ROS(Robot Operating System) using the AirSim environment which initializes ROS Wrappers and provides an integrated interface of ROS and AirSim to work with, The UAV is simulated in the same.
△ Less
Submitted 13 November, 2021;
originally announced November 2021.
-
Current status of PAPYRUS : the pyramid based adaptive optics system at LAM/OHP
Authors:
Muslimov E.,
Levraud N.,
Chambouleyron V.,
Boudjema I.,
Lau A.,
Caillat A.,
Pedreros F.,
Otten G.,
El Hadi K.,
Joaquina K.,
Lopez M.,
El Morsy M.,
Beltramo Martin O.,
Fetick R.,
Ke Z.,
Sauvage J-F.,
Neichel B.,
Fusco T.,
Schmitt J.,
Le Van Suu A.,
Charton J.,
Schimpf A.,
Martin B.,
Dintrono F.,
Esposito S.
, et al. (1 additional authors not shown)
Abstract:
The Provence Adaptive optics Pyramid Run System (PAPYRUS) is a pyramid-based Adaptive Optics (AO) system that will be installed at the Coude focus of the 1.52m telescope (T152) at the Observatoire de Haute Provence (OHP). The project is being developed by PhD students and Postdocs across France with support from staff members consolidating the existing expertise and hardware into an R&D testbed. T…
▽ More
The Provence Adaptive optics Pyramid Run System (PAPYRUS) is a pyramid-based Adaptive Optics (AO) system that will be installed at the Coude focus of the 1.52m telescope (T152) at the Observatoire de Haute Provence (OHP). The project is being developed by PhD students and Postdocs across France with support from staff members consolidating the existing expertise and hardware into an R&D testbed. This testbed allows us to run various pyramid wavefront sensing (WFS) control algorithms on-sky and experiment on new concepts for wavefront control with additional benefit from the high number of available nights at this telescope. It will also function as a teaching tool for students during the planned AO summer school at OHP. To our knowledge, this is one of the first pedagogic pyramid-based AO systems on-sky. The key components of PAPYRUS are a 17x17 actuators Alpao deformable mirror with a Alpao RTC, a very low noise camera OCAM2k, and a 4-faces glass pyramid. PAPYRUS is designed in order to be a simple and modular system to explore wavefront control with a pyramid WFS on sky. We present an overview of PAPYRUS, a description of the opto-mechanical design and the current status of the project.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Causal Analysis of Carnatic Music: A Preliminary Study
Authors:
Abhsihek Nandekar,
Preeth Khona,
Rajani M. B.,
Anindya Sinha,
Nithin Nagaraj
Abstract:
The musicological analysis of Carnatic music is challenging, owing to its rich structure and complexity. Automated \textit{rāga} classification, pitch detection, tonal analysis, modelling and information retrieval of this form of southern Indian classical music have, however, made significant progress in recent times. A causal analysis to investigate the musicological structure of Carnatic composi…
▽ More
The musicological analysis of Carnatic music is challenging, owing to its rich structure and complexity. Automated \textit{rāga} classification, pitch detection, tonal analysis, modelling and information retrieval of this form of southern Indian classical music have, however, made significant progress in recent times. A causal analysis to investigate the musicological structure of Carnatic compositions and the identification of the relationships embedded in them have never been previously attempted. In this study, we propose a novel framework for causal discovery, using a compression-complexity measure. Owing to the limited number of compositions available, however, we generated surrogates to further facilitate the analysis of the prevailing causal relationships. Our analysis indicates that the context-free grammar, inferred from more complex compositions, such as the \textit{Mē\d{l}akarta} \textit{rāga}, are a \textit{structural cause} for the \textit{Janya} \textit{rāga}. We also analyse certain special cases of the \textit{Janya rāga} in order to understand their origins and structure better.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
CGEMs: A Metric Model for Automatic Code Generation using GPT-3
Authors:
Aishwarya Narasimhan,
Krishna Prasad Agara Venkatesha Rao,
Veena M B
Abstract:
Today, AI technology is showing its strengths in almost every industry and walks of life. From text generation, text summarization, chatbots, NLP is being used widely. One such paradigm is automatic code generation. An AI could be generating anything; hence the output space is unconstrained. A self-driving car is driven for 100 million miles to validate its safety, but tests cannot be written to m…
▽ More
Today, AI technology is showing its strengths in almost every industry and walks of life. From text generation, text summarization, chatbots, NLP is being used widely. One such paradigm is automatic code generation. An AI could be generating anything; hence the output space is unconstrained. A self-driving car is driven for 100 million miles to validate its safety, but tests cannot be written to monitor and cover an unconstrained space. One of the solutions to validate AI-generated content is to constrain the problem and convert it from abstract to realistic, and this can be accomplished by either validating the unconstrained algorithm using theoretical proofs or by using Monte-Carlo simulation methods. In this case, we use the latter approach to test/validate a statistically significant number of samples. This hypothesis of validating the AI-generated code is the main motive of this work and to know if AI-generated code is reliable, a metric model CGEMs is proposed. This is an extremely challenging task as programs can have different logic with different naming conventions, but the metrics must capture the structure and logic of the program. This is similar to the importance grammar carries in AI-based text generation, Q&A, translations, etc. The various metrics that are garnered in this work to support the evaluation of generated code are as follows: Compilation, NL description to logic conversion, number of edits needed, some of the commonly used static-code metrics and NLP metrics. These metrics are applied to 80 codes generated using OpenAI's GPT-3. Post which a Neural network is designed for binary classification (acceptable/not acceptable quality of the generated code). The inputs to this network are the values of the features obtained from the metrics. The model achieves a classification accuracy of 76.92% and an F1 score of 55.56%. XAI is augmented for model interpretability.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Effect of Precursors and Radiation on Soot Formation in Turbulent Diffusion Flame
Authors:
Manedhar Reddy B,
Ashoke De,
Rakesh Yadav
Abstract:
Soot formation in Delft flame III, a pilot stabilized turbulent diffusion flame burning natural gas/air, is investigated using ANSYS FLUENT by considering two different approaches for soot inception. In the first approach soot inception is based on the formation rate of acetylene, while the second approach considers the formation rate of two and three-ringed aromatics to describe the soot inceptio…
▽ More
Soot formation in Delft flame III, a pilot stabilized turbulent diffusion flame burning natural gas/air, is investigated using ANSYS FLUENT by considering two different approaches for soot inception. In the first approach soot inception is based on the formation rate of acetylene, while the second approach considers the formation rate of two and three-ringed aromatics to describe the soot inception [1]. Transport equations are solved for soot mass fraction and radical nuclei concentration to describe inception, coagulation, surface growth, and oxidation processes. The turbulent-chemistry interactions and soot precursors are described by the steady laminar flamelet model (SLFM). Two chemical mechanisms GRI 3.0 [2] and POLIMI [3] are used to represent the effect of species concentration on soot formation. The radiative properties of the medium are included based on the non-gray modeling approach by considering four factious gases; the weighted sum of gray gas (WSGGM) approach is used to model the absorption coefficient. The effect of soot on radiative transfer is modeled in terms of effective absorption coefficient of the medium. A beta probability density function (\b{eta}-PDF) in terms of normalized temperature is used to describe the effect of turbulence on soot formation. The results clearly elucidate the strong effect of radiation and species concentration on soot volume fraction predictions. Due to increase in radiative heat loss with soot, flame temperature decreases slightly. The inclusion of ethylene has less synergic effect than that of both benzene and ethylene. Both cases have less impact on the nucleation of soot. The increase in soot volume fraction with soot-turbulence interaction is in consistence with the DNS predictions.
△ Less
Submitted 22 February, 2021;
originally announced February 2021.
-
Neural Abstractive Text Summarizer for Telugu Language
Authors:
Mohan Bharath B,
Aravindh Gowtham B,
Akhil M
Abstract:
Abstractive Text Summarization is the process of constructing semantically relevant shorter sentences which captures the essence of the overall meaning of the source text. It is actually difficult and very time consuming for humans to summarize manually large documents of text. Much of work in abstractive text summarization is being done in English and almost no significant work has been reported…
▽ More
Abstractive Text Summarization is the process of constructing semantically relevant shorter sentences which captures the essence of the overall meaning of the source text. It is actually difficult and very time consuming for humans to summarize manually large documents of text. Much of work in abstractive text summarization is being done in English and almost no significant work has been reported in Telugu abstractive text summarization. So, we would like to propose an abstractive text summarization approach for Telugu language using Deep learning. In this paper we are proposing an abstractive text summarization Deep learning model for Telugu language. The proposed architecture is based on encoder-decoder sequential models with attention mechanism. We have applied this model on manually created dataset to generate a one sentence summary of the source text and have got good results measured qualitatively.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
AIM 2020 Challenge on Rendering Realistic Bokeh
Authors:
Andrey Ignatov,
Radu Timofte,
Ming Qian,
Congyu Qiao,
Jiamin Lin,
Zhenyu Guo,
Chenghua Li,
Cong Leng,
Jian Cheng,
Juewen Peng,
Xianrui Luo,
Ke Xian,
Zijin Wu,
Zhiguo Cao,
Densen Puthussery,
Jiji C V,
Hrishikesh P S,
Melvin Kuriakose,
Saikat Dutta,
Sourya Dipta Das,
Nisarg A. Shah,
Kuldeep Purohit,
Praveen Kandula,
Maitreya Suin,
A. N. Rajagopalan
, et al. (10 additional authors not shown)
Abstract:
This paper reviews the second AIM realistic bokeh effect rendering challenge and provides the description of the proposed solutions and results. The participating teams were solving a real-world bokeh simulation problem, where the goal was to learn a realistic shallow focus technique using a large-scale EBB! bokeh dataset consisting of 5K shallow / wide depth-of-field image pairs captured using th…
▽ More
This paper reviews the second AIM realistic bokeh effect rendering challenge and provides the description of the proposed solutions and results. The participating teams were solving a real-world bokeh simulation problem, where the goal was to learn a realistic shallow focus technique using a large-scale EBB! bokeh dataset consisting of 5K shallow / wide depth-of-field image pairs captured using the Canon 7D DSLR camera. The participants had to render bokeh effect based on only one single frame without any additional data from other cameras or sensors. The target metric used in this challenge combined the runtime and the perceptual quality of the solutions measured in the user study. To ensure the efficiency of the submitted models, we measured their runtime on standard desktop CPUs as well as were running the models on smartphone GPUs. The proposed solutions significantly improved the baseline results, defining the state-of-the-art for practical bokeh effect rendering problem.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
Least square channel estimation for image transmission with ofdm over fading channel
Authors:
Usha S. M,
Mahesh H. B
Abstract:
Wireless communication is the most effective communication to convey audio or video information among the population. It enables the masses to connect throughout the world. Wireless technologies improve the lifestyle of individuals in rural and poor communication areas. In this view, the quality of a reliable signal can be enhanced by minimizing carrier interference. In this paper bit error rate o…
▽ More
Wireless communication is the most effective communication to convey audio or video information among the population. It enables the masses to connect throughout the world. Wireless technologies improve the lifestyle of individuals in rural and poor communication areas. In this view, the quality of a reliable signal can be enhanced by minimizing carrier interference. In this paper bit error rate of an image, signal is transmitted over fading channel is analyzed using orthogonal frequency multiplexing and channel estimation technique. An Orthogonal Frequency Multiplexing (OFDM) provides prominent bandwidth effectiveness and improved immunity to the fading environments. In OFDM, the data is modulated using multiple numbers of subcarriers that are orthogonal to each other. A cyclic prefix is infixed between OFDM symbols to annihilate the inter symbol interference (ISI) and inter-carrier interference (ICI). The least square channel estimation method is used to minimize the effect of multipath fading. An image, signal is modulated using BPSK, QPSK, 16QAM and 64QAM digital modulation schemes with OFDM and channel estimation and transmitted over AWGN and fading channel. The objective of this work is to improve the signal to noise ratio by reducing interference.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.
-
Antibacterial and antifungal activity of various extracts of Bacopa monnieri
Authors:
Fazlul Mkk,
Deepthi Sp,
Mohammed Irfan,
Farzana Y,
Munira B,
Nazmulmhm
Abstract:
Bacopa monnieri was also known as Brahmi. Theses plant has been considered as medicinal plants in Ayurvedic systems for centuries. This present study was carried out to evaluate the antibacterial and antifungal properties of ethanolic, diethyl ether, ethyl acetate, and aqueous extracts of B. monnieri. Agar disc diffusion tests were carried out to determine the antimicrobial effects of ethanolic, d…
▽ More
Bacopa monnieri was also known as Brahmi. Theses plant has been considered as medicinal plants in Ayurvedic systems for centuries. This present study was carried out to evaluate the antibacterial and antifungal properties of ethanolic, diethyl ether, ethyl acetate, and aqueous extracts of B. monnieri. Agar disc diffusion tests were carried out to determine the antimicrobial effects of ethanolic, diethyl ether, ethyl acetate and aqueous extracts of B. monnieri against Gram-positive (Staphylococcus aureus ATCC 25923), Gram-negative (Escherichia coli ATCC 25922) bacterial strains and antifungal strains (Aspergillus flavus, and Candida albicans). Among the various extracts, diethyl ether extracts of B. monnieri has an antibacterial potency against Staphylococcus aureus (gram positive), and ethyl acetate extract showed effects on E. coli (gram negative) at higher concentrations of 300 microgam mL-1. The ethanolic extract has potent antifungal activity against the fungus (Aspergillus flavus, and Candida albicans) compared to diethyl ether and ethyl acetate-ether. Both extracts (diethyl ether and ethyl acetate) has a minimum antifungal effect while these extracts showed more inhibitory effects on tested bacteria. Inhibitory effects of the aqueous extract were not observed at all concentration (100 microgam mL-1, 200 microgam mL-1and 300 microgam mL-1) against the entire examined bacterial and fungal species. The finding of this study indicates the antibacterial and antifungal activity exhibited by the ethanolic, diethyl ether, and ethyl acetate extract of B. monnieri can be validated to the management of medicinal plant throughout the world.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
Finiteness of homoclinic classes on sectional hyperbolic sets
Authors:
A. M. López B,
A. E. Arbieto
Abstract:
We study small perturbations of a sectional hyperbolic set of a vector field on a compact manifold. Indeed, we obtain robustly finiteness of homoclinic classes on this scenary. Moreover, since attractor and repeller sets are particular cases of homoclinic classes, this result improve (A. M. López B, Finiteness and existence of attractors and repellers on sectional hyperbolic sets, Discrete and Con…
▽ More
We study small perturbations of a sectional hyperbolic set of a vector field on a compact manifold. Indeed, we obtain robustly finiteness of homoclinic classes on this scenary. Moreover, since attractor and repeller sets are particular cases of homoclinic classes, this result improve (A. M. López B, Finiteness and existence of attractors and repellers on sectional hyperbolic sets, Discrete and Continuous Dynamical Systems-A 37).
△ Less
Submitted 12 August, 2019;
originally announced August 2019.
-
Detection of Metallo-\b{eta}-Lactamases-Encoding Genes Among Clinical Isolates of Escherichia Coli in a Tertiary Care Hospital, Malaysia
Authors:
Fazlul MKK,
Deepthi S,
Farzana Y,
Najnin A,
Rashid Ma,
Munira B,
Srikumar C,
Nazmul
Abstract:
The multidrug resistant Escherichia coli strains causes multiple clinical infections and has become a rising problem globally. The metallo-\b{eta}-lactamases encoding genes are very severe in gram-negative bacteria especially E. coli. This study was aimed to evaluate the prevalence of MBLs among the clinical isolates of E. coli. A total of 65 E. coli isolates were collected from various clinical s…
▽ More
The multidrug resistant Escherichia coli strains causes multiple clinical infections and has become a rising problem globally. The metallo-\b{eta}-lactamases encoding genes are very severe in gram-negative bacteria especially E. coli. This study was aimed to evaluate the prevalence of MBLs among the clinical isolates of E. coli. A total of 65 E. coli isolates were collected from various clinical samples of Malaysian patients with bacterial infections. The conventional microbiological test was performed for isolation and identification of E. coli producing MBLs strains in this vicinity. Multidrug Resistance (MDR) of E. coli isolates were assessed using disk diffusion test. Phenotypic methods, as well as genotypic- PCR methods, were performed to detect the presence of metallo-\b{eta}-lactamase resistance genes (blaIMP, blaVIM) in imipenem resistant strains. Out of 65 E. coli isolates, 42 isolates (57.3%) were MDR. The isolates from urine (19) produced significantly more MDR (10) isolates than other sources. Additionally, 19 (29.2%) imipenem resistant E. coli isolates contained 10 MBLs gene, 7(36.8%) isolates contained blaIMP and 3(15.7%) isolates contained blaVIM genes. This study revealed the significant occurrence of MBL producing E. coli isolates in clinical specimens and its association with health risk factors indicating an alarming situation in Malaysia. It demands an appropriate concern to avoid failure of treatments and infection control management.
△ Less
Submitted 10 April, 2019;
originally announced April 2019.
-
6m Theorem for Prime numbers
Authors:
Gandarawatta R. W. M. P. I. S. B.,
Perera S. P. C.,
Rathnayake R. M. L. S.
Abstract:
We show that for any $P= 6^{m+1}.N -1 $ is a prime number for any $1 < N \le 13$ , $N \ne 8$ and $N \ne i^{m+1}Mod(6i+1) $ where $ i \in Z^+ $ and $ m \in $ $odd$ $Z^+ $ for $1 < N \le 13$ and $N \ne 8$ and also we further discussed that $P= 6^{m+1}.N -1 $ is a prime number for $ N >13 $ if and only if , $N \ne i^{m+1}Mod(6i+1) +(6i +1)a $ $ ; i,a \le Z^+ $
We show that for any $P= 6^{m+1}.N -1 $ is a prime number for any $1 < N \le 13$ , $N \ne 8$ and $N \ne i^{m+1}Mod(6i+1) $ where $ i \in Z^+ $ and $ m \in $ $odd$ $Z^+ $ for $1 < N \le 13$ and $N \ne 8$ and also we further discussed that $P= 6^{m+1}.N -1 $ is a prime number for $ N >13 $ if and only if , $N \ne i^{m+1}Mod(6i+1) +(6i +1)a $ $ ; i,a \le Z^+ $
△ Less
Submitted 19 September, 2018;
originally announced October 2018.
-
A machine learning approach to anomaly-based detection on Android platforms
Authors:
Joshua Abah,
Waziri O. V,
Abdullahi M. B,
Arthur U. M,
Adewale O. S
Abstract:
The emergence of mobile platforms with increased storage and computing capabilities and the pervasive use of these platforms for sensitive applications such as online banking, e-commerce and the storage of sensitive information on these mobile devices have led to increasing danger associated with malware targeted at these devices. Detecting such malware presents inimitable challenges as signature-…
▽ More
The emergence of mobile platforms with increased storage and computing capabilities and the pervasive use of these platforms for sensitive applications such as online banking, e-commerce and the storage of sensitive information on these mobile devices have led to increasing danger associated with malware targeted at these devices. Detecting such malware presents inimitable challenges as signature-based detection techniques available today are becoming inefficient in detecting new and unknown malware. In this research, a machine learning approach for the detection of malware on Android platforms is presented. The detection system monitors and extracts features from the applications while in execution and uses them to perform in-device detection using a trained K-Nearest Neighbour classifier. Results shows high performance in the detection rate of the classifier with accuracy of 93.75%, low error rate of 6.25% and low false positive rate with ability of detecting real Android malware.
△ Less
Submitted 13 December, 2015;
originally announced December 2015.
-
Homoclinic classes for sectional-hyperbolic sets
Authors:
A. Arbieto,
C. A. Morales,
A. M. Lopez B
Abstract:
We prove that every sectional-hyperbolic Lyapunov stable set contains a nontrivial homoclinic class.
We prove that every sectional-hyperbolic Lyapunov stable set contains a nontrivial homoclinic class.
△ Less
Submitted 18 August, 2014;
originally announced August 2014.
-
Cosmology and thermodynamics of FRW universe with bulk viscous stiff fluid
Authors:
Titus K Mathew,
Aswathy M B,
Manoj M
Abstract:
We consider a cosmological model dominated by stiff fluid with a constant bulk viscosity. We classify all the possible cases of the universe predicted by the model and analyzing the scale factor, density as well as the curvature scalar. We find that when the dimensionless constant bulk viscous parameter is in the range $0 < \barζ<6$ the model began with a Big Bang, and make a transition form the d…
▽ More
We consider a cosmological model dominated by stiff fluid with a constant bulk viscosity. We classify all the possible cases of the universe predicted by the model and analyzing the scale factor, density as well as the curvature scalar. We find that when the dimensionless constant bulk viscous parameter is in the range $0 < \barζ<6$ the model began with a Big Bang, and make a transition form the decelerating expansion epoch to an accelerating epoch, then tends to the de Sitter phase as $ t\to \infty$. The transition into the accelerating epoch would be in the recent past, when $4<\barζ<6.$ For $\barζ>6$ the model doesn't have a Big Bang and suffered an increase in the fluid density and scalar curvature as the universe expands, which are eventually saturates as the scale factor $a \to \infty$ in the future. We have analyzed the model with statefinder diagnostics and find that the model is different from $Λ$CDM model but approaches $Λ$CDM point as $a \to \infty.$ We have also analyzed the status of the generalized second law of thermodynamics with apparent horizon as the boundary of the universe and found that the law is generally satisfied when $0 \leq \barζ<6$ and for $\barζ>6$ the law is satisfied when the scale factor is larger than a minimum value.
△ Less
Submitted 9 June, 2014;
originally announced June 2014.
-
Magnetic measurements and kinetic energy of the superconducting condensate in SmBa_2Cu_3O_{7-δ}
Authors:
J. P. Peña,
D. Martínez B.,
C. A. Parra Vargas,
A. G. Cunha,
J. L. Pimentel Jr,
P. Pureur
Abstract:
We report in-field kinetic energy results in the temperature region closely below the transition temperature of two differently prepared polycrystalline samples of the superconducting cuprate SmBa$_{\text{2}}$Cu$_{\text{3}}$O$_{7-δ}$. The kinetic energy was determined from magnetization measurements performed above the irreversibility line defined by the splitting between the curves obtained accor…
▽ More
We report in-field kinetic energy results in the temperature region closely below the transition temperature of two differently prepared polycrystalline samples of the superconducting cuprate SmBa$_{\text{2}}$Cu$_{\text{3}}$O$_{7-δ}$. The kinetic energy was determined from magnetization measurements performed above the irreversibility line defined by the splitting between the curves obtained according the ZFC and FC prescriptions. The results are analyzed in the intermediate field regime where the London approximation can be used for describing the magnetization. From the analysis, estimations were carried out for the penetration depth and the upper critical field of the studied samples.The difference between the kinectic energy magnitudes for the two studied samples is ascribed to effects from granularity.
△ Less
Submitted 31 October, 2012;
originally announced October 2012.
-
Unit Disk Cover Problem
Authors:
Rashmisnata Acharyya,
Manjanna B.,
Gautam K. Das
Abstract:
Given a set ${\cal D}$ of unit disks in the Euclidean plane, we consider (i) the {\it discrete unit disk cover} (DUDC) problem and (ii) the {\it rectangular region cover} (RRC) problem. In the DUDC problem, for a given set ${\cal P}$ of points the objective is to select minimum cardinality subset ${\cal D}^* \subseteq {\cal D}$ such that each point in ${\cal P}$ is covered by at least one disk in…
▽ More
Given a set ${\cal D}$ of unit disks in the Euclidean plane, we consider (i) the {\it discrete unit disk cover} (DUDC) problem and (ii) the {\it rectangular region cover} (RRC) problem. In the DUDC problem, for a given set ${\cal P}$ of points the objective is to select minimum cardinality subset ${\cal D}^* \subseteq {\cal D}$ such that each point in ${\cal P}$ is covered by at least one disk in ${\cal D}^*$. On the other hand, in the RRC problem the objective is to select minimum cardinality subset ${\cal D}^{**} \subseteq {\cal D}$ such that each point of a given rectangular region ${\cal R}$ is covered by a disk in ${\cal D}^{**}$. For the DUDC problem, we propose an $(9+ε)$-factor ($0 < ε\leq 6$) approximation algorithm. The previous best known approximation factor was 15 \cite{FL12}. For the RRC problem, we propose (i) an $(9 + ε)$-factor ($0 < ε\leq 6$) approximation algorithm, (ii) an 2.25-factor approximation algorithm in reduce radius setup, improving previous 4-factor approximation result in the same setup \cite{FKKLS07}.
The solution of DUDC problem is based on a PTAS for the subproblem LSDUDC, where all the points in ${\cal P}$ are on one side of a line and covered by the disks centered on the other side of that line.
△ Less
Submitted 13 September, 2012;
originally announced September 2012.
-
Computing generalized inverses using LU factorization of matrix product
Authors:
Stanimirović,
P. S.,
Tasić,
M. B
Abstract:
An algorithm for computing {2, 3}, {2, 4}, {1, 2, 3}, {1, 2, 4} -inverses and the Moore-Penrose inverse of a given rational matrix A is established. Classes A(2, 3)s and A(2, 4)s are characterized in terms of matrix products (R*A)+R* and T*(AT*)+, where R and T are rational matrices with appropriate dimensions and corresponding rank. The proposed algorithm is based on these general representations…
▽ More
An algorithm for computing {2, 3}, {2, 4}, {1, 2, 3}, {1, 2, 4} -inverses and the Moore-Penrose inverse of a given rational matrix A is established. Classes A(2, 3)s and A(2, 4)s are characterized in terms of matrix products (R*A)+R* and T*(AT*)+, where R and T are rational matrices with appropriate dimensions and corresponding rank. The proposed algorithm is based on these general representations and the Cholesky factorization of symmetric positive matrices. The algorithm is implemented in programming languages MATHEMATICA and DELPHI, and illustrated via examples. Numerical results of the algorithm, corresponding to the Moore-Penrose inverse, are compared with corresponding results obtained by several known methods for computing the Moore-Penrose inverse.
△ Less
Submitted 9 April, 2011;
originally announced April 2011.
-
Symbolic computation of weighted Moore-Penrose inverse using partitioning method
Authors:
Tasić,
M. B.,
Stanimirović,
P. S.,
Petković,
M. D
Abstract:
We propose a method and algorithm for computing the weighted Moore-Penrose inverse of one-variable rational matrices. Continuing this idea, we develop an algorithm for computing the weighted Moore-Penrose inverse of one-variable polynomial matrix. These methods and algorithms are generalizations of the method for computing the weighted Moore-Penrose inverse for constant matrices, originated in Wan…
▽ More
We propose a method and algorithm for computing the weighted Moore-Penrose inverse of one-variable rational matrices. Continuing this idea, we develop an algorithm for computing the weighted Moore-Penrose inverse of one-variable polynomial matrix. These methods and algorithms are generalizations of the method for computing the weighted Moore-Penrose inverse for constant matrices, originated in Wang and Chen [G.R. Wang, Y.L. Chen, A recursive algorithm for computing the weighted Moore-Penrose inverse AMN, J. Comput. Math. 4 (1986) 74-85], and the partitioning method for computing the Moore-Penrose inverse of rational and polynomial matrices introduced in Stanimirovic and Tasic [P.S. Stanimirovic, M.B. Tasic, Partitioning method for rational and polynomial matrices, Appl. Math. Comput. 155 (2004) 137-163]. Algorithms are implemented in the symbolic computational package MATHEMATICA.
△ Less
Submitted 9 April, 2011;
originally announced April 2011.
-
Effective partitioning method for computing weighted Moore-Penrose inverse
Authors:
Petković,
M. D.,
Stanimirović,
P. S.,
Tasić,
M. B
Abstract:
We introduce a method and an algorithm for computing the weighted Moore-Penrose inverse of multiple-variable polynomial matrix and the related algorithm which is appropriated for sparse polynomial matrices. These methods and algorithms are generalizations of algorithms developed in [M.B. Tasic, P.S. Stanimirovic, M.D. Petkovic, Symbolic computation of weighted Moore-Penrose inverse using partition…
▽ More
We introduce a method and an algorithm for computing the weighted Moore-Penrose inverse of multiple-variable polynomial matrix and the related algorithm which is appropriated for sparse polynomial matrices. These methods and algorithms are generalizations of algorithms developed in [M.B. Tasic, P.S. Stanimirovic, M.D. Petkovic, Symbolic computation of weighted Moore-Penrose inverse using partitioning method, Appl. Math. Comput. 189 (2007) 615-640] to multiple-variable rational and polynomial matrices and improvements of these algorithms on sparse matrices. Also, these methods are generalizations of the partitioning method for computing the Moore-Penrose inverse of rational and polynomial matrices introduced in [P.S. Stanimirovic, M.B. Tasic, Partitioning method for rational and polynomial matrices, Appl. Math. Comput. 155 (2004) 137-163; M.D. Petkovic, P.S. Stanimirovic, Symbolic computation of the Moore-Penrose inverse using partitioning method, Internat. J. Comput. Math. 82 (2005) 355-367] to the case of weighted Moore-Penrose inverse. Algorithms are implemented in the symbolic computational package MATHEMATICA.
△ Less
Submitted 9 April, 2011;
originally announced April 2011.
-
Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers
Authors:
Faisal A. A. El-Orany,
Azeddine Messikh,
Gharib S. Mahmoud,
Wahiddin M. R. B
Abstract:
In this paper, we study the quantum properties of the three-mode squeezed operator. This operator is constructed from the optical parametric oscillator based on the three concurrent $χ^{(2)}$ nonlinearities. We give a complete treatment for this operator including the symmetric and asymmetric nonlinearities cases. The action of the operator on the number and coherent states are studied in the fr…
▽ More
In this paper, we study the quantum properties of the three-mode squeezed operator. This operator is constructed from the optical parametric oscillator based on the three concurrent $χ^{(2)}$ nonlinearities. We give a complete treatment for this operator including the symmetric and asymmetric nonlinearities cases. The action of the operator on the number and coherent states are studied in the framework of squeezing, second-order correlation function, Cauchy-Schwartz inequality and single-mode quasiprobability function. The nonclassical effects are remarkable in all these quantities. We show that the nonclassical effects generated by the asymmetric case--for certain values of the system parameters--are greater than those of the symmetric one. This reflects the important role for the asymmetry in the system. Moreover, the system can generate different types of the Schrödinger-cat states.
△ Less
Submitted 9 October, 2009;
originally announced October 2009.
-
Linear atomic quantum coupler
Authors:
Faisal A. A. El-Orany,
Wahiddin M. R. B
Abstract:
In this paper, we develop the notion of the linear atomic quantum coupler. This device consists of two modes propagating into two waveguides, each of them includes a localized and/or a trapped atom. These waveguides are placed close enough to allow exchanging energy between them via evanescent waves. Each mode interacts with the atom in the same waveguide in the standard way, i.e. as the Jaynes-…
▽ More
In this paper, we develop the notion of the linear atomic quantum coupler. This device consists of two modes propagating into two waveguides, each of them includes a localized and/or a trapped atom. These waveguides are placed close enough to allow exchanging energy between them via evanescent waves. Each mode interacts with the atom in the same waveguide in the standard way, i.e. as the Jaynes-Cummings model (JCM), and with the atom-mode in the second waveguide via evanescent wave. We present the Hamiltonian for the system and deduce the exact form for the wavefunction. We investigate the atomic inversions and the second-order correlation function. In contrast to the conventional linear coupler, the atomic quantum coupler is able to generate nonclassical effects. The atomic inversions can exhibit long revival-collapse phenomenon as well as subsidiary revivals based on the competition among the switching mechanisms in the system. Finally, under certain conditions, the system can yield the results of the two-mode JCM.
△ Less
Submitted 9 October, 2009;
originally announced October 2009.
-
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
Authors:
Faisal A. A. El-Orany,
Wahiddin M. R. B.,
Mustafa Afanddi Mat Nor,
Norziana Jamil,
Iskandar Bahari
Abstract:
In this paper, we develop a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generaliz…
▽ More
In this paper, we develop a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to $N$ users to provide $N$ keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.
△ Less
Submitted 31 July, 2009; v1 submitted 28 July, 2009;
originally announced July 2009.
-
Single-atom entropy squeezing for two two-level atoms interacting with a single-mode radiation field
Authors:
Faisal A. A. El-Orany,
Wahiddin M R B,
Obada A-S F
Abstract:
In this paper we consider a system of two two-level atoms interacting with a single-mode quantized electromagnetic field in a lossless resonant cavity via $l$-photon-transition mechanism. The field and the atoms are initially prepared in the coherent state and the excited atomic states, respectively. For this system we investigate the entropy squeezing, the atomic variances, the von Neumann entr…
▽ More
In this paper we consider a system of two two-level atoms interacting with a single-mode quantized electromagnetic field in a lossless resonant cavity via $l$-photon-transition mechanism. The field and the atoms are initially prepared in the coherent state and the excited atomic states, respectively. For this system we investigate the entropy squeezing, the atomic variances, the von Neumann entropy and the atomic inversions for the single-atom case. We show that the more the number of the parties in the system the less the amounts of the nonclassical effects exhibited in the entropy squeezing.
The entropy squeezing can give information on the corresponding von Neumann entropy. Also the nonclassical effects obtained form the asymmetric atoms are greater than those obtained form the symmetric atoms. Finally, the entropy squeezing gives better information than the atomic variances only for the asymmetric atoms.
△ Less
Submitted 22 November, 2007; v1 submitted 8 March, 2007;
originally announced March 2007.
-
The extended star formation history of the star cluster NGC 2154 in the Large Magellanic Cloud
Authors:
Gustavo Baume,
Giovanni Carraro,
Edgardo Costa,
Rene' A. Mendez B.,
Leo Girardi
Abstract:
The color-magnitude diagram (CMD) of the intermediate-age Large Magellanic Cloud (LMC) star cluster NGC 2154 and its adjacent field, has been analyzed using Padova stellar models to determine the cluster's fundamental parameters and its Star Formation History (SFH). Deep $BR$ CCD photometry, together with synthetic CMDs and Integrated Luminosity Functions (ILFs), has allowed us to infer that the…
▽ More
The color-magnitude diagram (CMD) of the intermediate-age Large Magellanic Cloud (LMC) star cluster NGC 2154 and its adjacent field, has been analyzed using Padova stellar models to determine the cluster's fundamental parameters and its Star Formation History (SFH). Deep $BR$ CCD photometry, together with synthetic CMDs and Integrated Luminosity Functions (ILFs), has allowed us to infer that the cluster experienced an extended star formation period of about 1.2 Gyrs, which began approximately 2.3 Gyr and ended 1.1 Gyr ago. The physical reality of such a prolonged period of star formation is however questionable, and could be the result of inadequacies in the stellar evolutionary tracks themselves. A substantial fraction of binaries (70%) seems to exist in NGC 2154.
△ Less
Submitted 7 December, 2006;
originally announced December 2006.
-
The role of behavior modifiers in representation development
Authors:
Carlos R. de la Mora B.,
Carlos Gershenson,
Angelica Garcia-Vega
Abstract:
We address the problem of the development of representations and their relationship to the environment. We study a software agent which develops in a network a representation of its simple environment which captures and integrates the relationships between agent and environment through a closure mechanism. The inclusion of a variable behavior modifier allows better representation development. Th…
▽ More
We address the problem of the development of representations and their relationship to the environment. We study a software agent which develops in a network a representation of its simple environment which captures and integrates the relationships between agent and environment through a closure mechanism. The inclusion of a variable behavior modifier allows better representation development. This can be confirmed with an internal description of the closure mechanism, and with an external description of the properties of the representation network.
△ Less
Submitted 5 March, 2004;
originally announced March 2004.