-
Charged scalar boson in Melvin universe
Authors:
L. G. Barbosa,
L. C. N. Santos,
J. V. Zamperlini,
F. M da Silva,
C. C. Barros Jr
Abstract:
This work investigates the dynamics of a charged scalar boson in the Melvin universe by solving the Klein-Gordon equation with minimal coupling in both inertial and non-inertial frames. Non-inertial effects are introduced through a rotating reference frame, resulting in a modified spacetime geometry and the appearance of a critical radius that limits the radial domain of the field. Analytical solu…
▽ More
This work investigates the dynamics of a charged scalar boson in the Melvin universe by solving the Klein-Gordon equation with minimal coupling in both inertial and non-inertial frames. Non-inertial effects are introduced through a rotating reference frame, resulting in a modified spacetime geometry and the appearance of a critical radius that limits the radial domain of the field. Analytical solutions are obtained under appropriate approximations, and the corresponding energy spectra are derived. The results indicate that both the magnetic field and non-inertial effects modify the energy levels, with additional contributions depending on the coupling between the rotation parameter and the quantum numbers. A numerical analysis is also presented, illustrating the behavior of the solutions for two characteristic magnetic field scales: one that may be considered extreme, of the order of the ones proposed to be produced in heavy-ion collisions and another near the Planck scale.
△ Less
Submitted 8 June, 2025;
originally announced June 2025.
-
Unlikely intersections of codimension one foliations
Authors:
Gabriel Santos Barbosa,
Jorge Vitório Pereira
Abstract:
We study families of singular holomorphic foliations on complex projective manifolds whose total intersection defines a foliation of unexpectedly low codimension.
We study families of singular holomorphic foliations on complex projective manifolds whose total intersection defines a foliation of unexpectedly low codimension.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
Performance of Large Language Models in Supporting Medical Diagnosis and Treatment
Authors:
Diogo Sousa,
Guilherme Barbosa,
Catarina Rocha,
Dulce Oliveira
Abstract:
The integration of Large Language Models (LLMs) into healthcare holds significant potential to enhance diagnostic accuracy and support medical treatment planning. These AI-driven systems can analyze vast datasets, assisting clinicians in identifying diseases, recommending treatments, and predicting patient outcomes. This study evaluates the performance of a range of contemporary LLMs, including bo…
▽ More
The integration of Large Language Models (LLMs) into healthcare holds significant potential to enhance diagnostic accuracy and support medical treatment planning. These AI-driven systems can analyze vast datasets, assisting clinicians in identifying diseases, recommending treatments, and predicting patient outcomes. This study evaluates the performance of a range of contemporary LLMs, including both open-source and closed-source models, on the 2024 Portuguese National Exam for medical specialty access (PNA), a standardized medical knowledge assessment. Our results highlight considerable variation in accuracy and cost-effectiveness, with several models demonstrating performance exceeding human benchmarks for medical students on this specific task. We identify leading models based on a combined score of accuracy and cost, discuss the implications of reasoning methodologies like Chain-of-Thought, and underscore the potential for LLMs to function as valuable complementary tools aiding medical professionals in complex clinical decision-making.
△ Less
Submitted 14 April, 2025;
originally announced April 2025.
-
Cornell and Coulomb potentials in the double defect spacetime
Authors:
L. G. Barbosa,
L. C. N. Santos,
J. V. Zamperlini,
F. M da Silva
Abstract:
We analyze the quantum dynamics of a scalar field in a spacetime incorporating dual topological defects, specifically a cosmic string and a global monopole. Utilizing a generalized metric that encapsulates the combined geometric effects of both defects, we solve the Klein--Gordon equation through separation of variables and examine the role of external potentials, with a focus on the generalized C…
▽ More
We analyze the quantum dynamics of a scalar field in a spacetime incorporating dual topological defects, specifically a cosmic string and a global monopole. Utilizing a generalized metric that encapsulates the combined geometric effects of both defects, we solve the Klein--Gordon equation through separation of variables and examine the role of external potentials, with a focus on the generalized Cornell potential. A comparative analysis against the pure Coulomb potential is conducted to elucidate the modifications induced by the additional linear term. The presence of topological defects deforms the radial components of the wave equation, leading to energy spectrum shifts in bound states and alterations in scattering phase shifts. The results obtained provide a deeper theoretical foundation for understanding the behavior of spin-0 particles in nontrivial spacetime geometries, particularly in the presence of distinct potential interactions.
△ Less
Submitted 9 April, 2025;
originally announced April 2025.
-
Bound and Scattering States in a Spacetime with Dual Topological Defects: Cosmic String and Global Monopole
Authors:
L. G. Barbosa,
L. C. N. Santos,
J. V. Zamperlini,
F. M. da Silva
Abstract:
This paper explores the relativistic quantum motion of scalar bosons in the presence of mixed topological defects: cosmic strings and global monopoles. The Klein-Gordon equation with generalized Coulomb potentials is analyzed in this background. The effects of these topological defects on the equations of motion, phase shifts, and the S-matrix are examined in detail. Bound state solutions are deri…
▽ More
This paper explores the relativistic quantum motion of scalar bosons in the presence of mixed topological defects: cosmic strings and global monopoles. The Klein-Gordon equation with generalized Coulomb potentials is analyzed in this background. The effects of these topological defects on the equations of motion, phase shifts, and the S-matrix are examined in detail. Bound state solutions are derived from the poles of the S-matrix. We provide analytical expressions for the energy spectrum of bound states, with particular attention to how the parameters of scalar and vector potentials affect the behavior of the system. Furthermore, we explore particular cases involving pure scalar, vector, and mixed scalar-vector potentials, showing how these scenarios impose particular conditions on the existence of bound states. Our results indicate that the solutions obtained associated with scattering and bound states depend significantly on the parameters of the topological defects.
△ Less
Submitted 9 April, 2025;
originally announced April 2025.
-
Kiselev black strings: the charged rotating solutions
Authors:
Leonardo G. Barbosa,
Victor Hugo M. Ramos,
Luis Cesar N. dos Santos,
Celso C. Barros Jr
Abstract:
We investigate the properties of a charged rotating black string immersed in a Kiselev anisotropic fluid in anti-de Sitter (AdS) spacetime. The Einstein-Maxwell equations with an anisotropic stress-energy tensor and cosmological constant are analyzed and solved exactly. In this work, we calculate the Kretschmann scalar, obtaining a consistent result that agrees with the existing literature in the…
▽ More
We investigate the properties of a charged rotating black string immersed in a Kiselev anisotropic fluid in anti-de Sitter (AdS) spacetime. The Einstein-Maxwell equations with an anisotropic stress-energy tensor and cosmological constant are analyzed and solved exactly. In this work, we calculate the Kretschmann scalar, obtaining a consistent result that agrees with the existing literature in the absence of charge and fluid. The rotating solution is obtained by applying a coordinate transformation on time and angular coordinates. The event horizon associated with specific values of the equation of state parameter $w_q$ is studied. The results show an important influence of the fluid parameters $N_{q}$ and $w_{q}$, the charge parameter $Q$, and the rotation parameter $a$ on the size of the black string horizon. In addition, we determine the conditions for the existence of closed timelike curves (CTCs) and compute the conserved charges, such as mass, angular momentum, and electric charge of the black string. Utilizing the Klein-Gordon equation, we employ the quantum particle tunneling approach to obtain the probability of charged scalar particles tunneling across the event horizon. We obtain the correspondent Hawking temperature as a consequence. Furthermore, we examine the thermodynamic properties, including entropy and heat capacity, to assess the effects of the quintessence field and charge on the black string. The results include particular cases such as the Lemos black string, providing a broader view of black string configurations in AdS spacetime.
△ Less
Submitted 28 April, 2025; v1 submitted 3 March, 2025;
originally announced March 2025.
-
Black Strings and String Clouds Embedded in Anisotropic Quintessence: Solutions for Scalar Particles and Implications
Authors:
Maria de Lourdes Deglmann,
Leonardo G. Barbosa,
Celso de Camargo Barros Jr
Abstract:
We analyze the spacetime metric associated with a black string surrounded by a cloud of strings and an anisotropic fluid of quintessence in cylindrically symmetric AdS spacetime. We solve Einstein's equation to obtain the explicit form of the metric, investigate typical values for its parameters, and determine their role in the event horizon formation. Within our findings, we show that the intensi…
▽ More
We analyze the spacetime metric associated with a black string surrounded by a cloud of strings and an anisotropic fluid of quintessence in cylindrically symmetric AdS spacetime. We solve Einstein's equation to obtain the explicit form of the metric, investigate typical values for its parameters, and determine their role in the event horizon formation. Within our findings, we show that the intensity of the cloud of strings regulates the size of the event horizon and, when the cloud is absent, the horizon increases drastically for larger values of the quintessence's state parameter $α_{Q}$. Additionally, the metric shows that, unless $α_{Q}$ is close to its lower bound, the contribution from the quintessence fluid is only significant at large distances from the black string. Finally, to explore the quantum implications of this dark energy candidate, we use the confluent Heun function to solve the Klein-Gordon equation for a spin-0 particle near the event horizon. Our results indicate that the presence of quintessence alters the particle's radial wave function. This modification, in principle, could give rise to an observable that we termed as \enquote{dark phase}.
△ Less
Submitted 7 February, 2025;
originally announced February 2025.
-
Nonextensive entropic behavior observed in Quasar 3C 273
Authors:
C. V. da Silva,
S. G. A. Barbosa,
F. V. Alencar Filho,
J. P. Bravo,
D. B. de Freitas
Abstract:
We investigate the flux intensities spanning from radio waves to X-rays across 39 light curves of Quasar 3C 273, utilizing publicly available data collected by the Integral Science Data Centre (ISDC) database. Our results suggest that Quasar 3C 273 exhibits nonextensive behavior. Furthermore, we calculate the $q$ entropic indices for these light curves using the $q$-Gaussian distribution with a pr…
▽ More
We investigate the flux intensities spanning from radio waves to X-rays across 39 light curves of Quasar 3C 273, utilizing publicly available data collected by the Integral Science Data Centre (ISDC) database. Our results suggest that Quasar 3C 273 exhibits nonextensive behavior. Furthermore, we calculate the $q$ entropic indices for these light curves using the $q$-Gaussian distribution with a predominant observation of cases where $q>1$. Based on this index, we estimate the non-extensive entropy ($S_{q}$) and explore its correlation with the energy (in eV). In this context, we identify two jump-like increases in entropy, particularly evident in the infrared (IR) and X-ray wavebands. The peak in the far-IR band, around 0.34 eV, results from synchrotron flares evolving from higher to lower energies and thermal radiation emitted by hot dust near the sublimation radius. However, the second entropic peak in the hard X-ray range lacks statistical robustness due to limited data or large measurement uncertainties.
△ Less
Submitted 6 February, 2025;
originally announced February 2025.
-
Reply to Structural Vulnerability in Y00 Protocols
Authors:
Geraldo A. Barbosa
Abstract:
The paper arXiv:2412.07300v1 [quant-ph] 10 Dec 2024, entitled "Structural Vulnerability in Y00 Protocols", by Kentaro Imafuku analyzes "Secure Communication Using Mesoscopic Coherent States", Phys. Rev. Lett., 90:227901, Jun 2003, by Geraldo A. Barbosa, Eric Corndorf, Prem Kumar, and Horace P. Yuen. Imafuku states that in his analyzes a structural vulnerability was revealed that enables the leakag…
▽ More
The paper arXiv:2412.07300v1 [quant-ph] 10 Dec 2024, entitled "Structural Vulnerability in Y00 Protocols", by Kentaro Imafuku analyzes "Secure Communication Using Mesoscopic Coherent States", Phys. Rev. Lett., 90:227901, Jun 2003, by Geraldo A. Barbosa, Eric Corndorf, Prem Kumar, and Horace P. Yuen. Imafuku states that in his analyzes a structural vulnerability was revealed that enables the leakage of secret information from the measurement results in the Y00 protocol. Furthermore, it is also stated that an even simpler model, but based on the same original principles, can be more efficient than the original Y00 protocol. This reply shows that: 1) the alleged vulnerability is due to a misinterpretation of one result by Imafuku and 2) that the simple model proposed by him is more vulnerable than the original Y00.
△ Less
Submitted 6 January, 2025;
originally announced January 2025.
-
Star-planet interaction and its impact on the stellar rotation
Authors:
Thiago M. Santiago,
Sarah G. A. Barbosa,
Francisco J. Cavalcante,
Daniel B. de Freitas
Abstract:
The stellar rotation has an essential role in modifying the structure of the star and, therefore, the way these different interplays arise. On the other hand, changes in orbits impact the star's rotation and its evolution. The evolution of the star's rotation accounts for the angular momentum exchange with the planet and follows the effects of the internal transport of angular momentum and metalli…
▽ More
The stellar rotation has an essential role in modifying the structure of the star and, therefore, the way these different interplays arise. On the other hand, changes in orbits impact the star's rotation and its evolution. The evolution of the star's rotation accounts for the angular momentum exchange with the planet and follows the effects of the internal transport of angular momentum and metallicity. Several models in the literature have aimed to find a theoretical way to study these interactions between the planet's orbital evolution and the star's rotation. Our work is a promising attempt to investigate these interactions from a model based on a new statistical approach. To this end, we propose a ``tidal interaction index'' that carries all the parameters of the star-planet system that can affect the transport of angular momentum and, consequently, the evolution of stellar rotation. This index is similar to the ``magnetic braking index'' whose most successful value equals 3, which expresses the seminal Skumunich law. Our model is computed for masses of the host star less than the Kraft limit for three orbital-rotation period regimes and the semi-major axis less than 1 AU. We consider planets with masses between 0.4M$_{\oplus}$ and 20M$_{\rm J}$ with orbital periods between 0.3 and 225 days. We show that the tidal index $q$ segregated by stellar mass without wind magnetic braking during the main-sequence phase is strongly anti-correlated with planetary mass. Finally, we conclude that in cases where planets retain less than 84\% of the total angular momentum within the system, the magnetic braking mechanism proves to be more effective than tidal interactions, irrespective of whether the planets' angular momentum surpasses that of the host star.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Multi-Objective Optimization of Consumer Group Autoscaling in Message Broker Systems
Authors:
Diogo Landau,
Nishant Saurabh,
Xavier Andrade,
Jorge G Barbosa
Abstract:
Message brokers often mediate communication between data producers and consumers by adding variable-sized messages to ordered distributed queues. Our goal is to determine the number of consumers and consumer-partition assignments needed to ensure that the rate of data consumption keeps up with the rate of data production. We model the problem as a variable item size bin packing problem. As the rat…
▽ More
Message brokers often mediate communication between data producers and consumers by adding variable-sized messages to ordered distributed queues. Our goal is to determine the number of consumers and consumer-partition assignments needed to ensure that the rate of data consumption keeps up with the rate of data production. We model the problem as a variable item size bin packing problem. As the rate of production varies, new consumer-partition assignments are computed, which may require rebalancing a partition from one consumer to another. While rebalancing a queue, the data being produced into the queue is not read leading to additional latency costs. As such, we focus on the multi-objective optimization cost of minimizing both the number of consumers and queue migrations. We present a variety of algorithms and compare them to established bin packing heuristics for this application. Comparing our proposed consumer group assignment strategy with Kafka's, a commonly employed strategy, our strategy presents a 90th percentile latency of 4.52s compared to Kafka's 217s with both using the same amount of consumers. Kafka's assignment strategy only improved the consumer group's performance with regards to latency with configurations that used at least 60% more resources than our approach.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Self-calibrated convolution towards glioma segmentation
Authors:
Felipe C. R. Salvagnini,
Gerson O. Barbosa,
Alexandre X. Falcao,
Cid A. N. Santos
Abstract:
Accurate brain tumor segmentation in the early stages of the disease is crucial for the treatment's effectiveness, avoiding exhaustive visual inspection of a qualified specialist on 3D MR brain images of multiple protocols (e.g., T1, T2, T2-FLAIR, T1-Gd). Several networks exist for Glioma segmentation, being nnU-Net one of the best. In this work, we evaluate self-calibrated convolutions in differe…
▽ More
Accurate brain tumor segmentation in the early stages of the disease is crucial for the treatment's effectiveness, avoiding exhaustive visual inspection of a qualified specialist on 3D MR brain images of multiple protocols (e.g., T1, T2, T2-FLAIR, T1-Gd). Several networks exist for Glioma segmentation, being nnU-Net one of the best. In this work, we evaluate self-calibrated convolutions in different parts of the nnU-Net network to demonstrate that self-calibrated modules in skip connections can significantly improve the enhanced-tumor and tumor-core segmentation accuracy while preserving the wholetumor segmentation accuracy.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Klein-Gordon oscillator subject to a Coulomb-type potential in Bonnor-Melvin universe with a cosmological constant
Authors:
L. G. Barbosa,
C. C. Barros Jr
Abstract:
In this work we study spin-0 particles described by the Klein-Gordon oscillator formalism in a spacetime which structure is determined by a homogeneous magnetic field and a cosmological constant. For this purpose we take into account a framework based on the Bonnor-Melvin solution with the inclusion of the cosmological constant. We write and solve the Klein-Gordon equation, and then find the energ…
▽ More
In this work we study spin-0 particles described by the Klein-Gordon oscillator formalism in a spacetime which structure is determined by a homogeneous magnetic field and a cosmological constant. For this purpose we take into account a framework based on the Bonnor-Melvin solution with the inclusion of the cosmological constant. We write and solve the Klein-Gordon equation, and then find the energy spectrum by considering the effect of vector and scalar potentials.
△ Less
Submitted 17 December, 2024; v1 submitted 18 November, 2023;
originally announced November 2023.
-
Scalar bosons in Bonnor-Melvin-$Λ$ universe: Exact solution, Landau levels and Coulomb-like potential
Authors:
L. G. Barbosa,
C. C. Barros Jr
Abstract:
In this work, we study spin-0 particles in a spacetime whose structure is determined by a homogeneous magnetic field and a cosmological constant. For this purpose, we take into account a framework based on the Bonnor-Melvin solution with the inclusion of the cosmological constant. We write the Klein-Gordon equation, solve it, and determine the Landau levels. The effects of scalar and vector potent…
▽ More
In this work, we study spin-0 particles in a spacetime whose structure is determined by a homogeneous magnetic field and a cosmological constant. For this purpose, we take into account a framework based on the Bonnor-Melvin solution with the inclusion of the cosmological constant. We write the Klein-Gordon equation, solve it, and determine the Landau levels. The effects of scalar and vector potentials are considered, and we investigate the influence of the parameters of the theory on the results, which present observable effects. The implications of the physics of a stellar model based on this framework are also discussed.
△ Less
Submitted 22 January, 2025; v1 submitted 7 October, 2023;
originally announced October 2023.
-
On the stability around Chariklo and the confinement of its rings
Authors:
S. M. Giuliatti Winter,
G. Madeira,
T. Ribeiro,
O. C. Winter,
G. O. Barbosa,
G. Borderes-Motta
Abstract:
Chariklo has two narrow and dense rings, C1R and C2R, located at 391 km and 405 km, respectively. In the light of new stellar occultation data, we study the stability around Chariklo. We also analyse three confinement mechanisms, to prevent the spreading of the rings, based on shepherd satellites in resonance with the edges of the rings. This study is made through a set of numerical simulations an…
▽ More
Chariklo has two narrow and dense rings, C1R and C2R, located at 391 km and 405 km, respectively. In the light of new stellar occultation data, we study the stability around Chariklo. We also analyse three confinement mechanisms, to prevent the spreading of the rings, based on shepherd satellites in resonance with the edges of the rings. This study is made through a set of numerical simulations and the Poincaré surface of section technique. From the numerical simulation results we verify that, from the current parameters referring to the shape of Chariklo, the inner edge of the stable region is much closer to Chariklo than the rings. The Poincaré surface of sections allow us to identify the first kind periodic and quasi-periodic orbits, and also the resonant islands corresponding to the 1:2, 2:5, and 1:3 resonances. We construct a map of a versus e space which gives the location and width of the stable region and the 1:2, 2:5, and 1:3 resonances. We found that the first kind periodic orbits family can be responsible for a stable region whose location and size meet that of C1R, for specific values of the ring particles' eccentricities. However, C2R is located in an unstable region if the width of the ring is assumed to be about 120 m. After analysing different systems we propose that the best confinement mechanism is composed of three satellites, two of them shepherding the inner edge of C1R and the outer edge of C2R, while the third satellite would be trapped in the 1:3 resonance.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Spectral Analysis of Marine Debris in Simulated and Observed Sentinel-2/MSI Images using Unsupervised Classification
Authors:
Bianca Matos de Barros,
Douglas Galimberti Barbosa,
Cristiano Lima Hackmann
Abstract:
Marine litter poses significant threats to marine and coastal environments, with its impacts ever-growing. Remote sensing provides an advantageous supplement to traditional mitigation techniques, such as local cleaning operations and trawl net surveys, due to its capabilities for extensive coverage and frequent observation. In this study, we used Radiative Transfer Model (RTM) simulated data and d…
▽ More
Marine litter poses significant threats to marine and coastal environments, with its impacts ever-growing. Remote sensing provides an advantageous supplement to traditional mitigation techniques, such as local cleaning operations and trawl net surveys, due to its capabilities for extensive coverage and frequent observation. In this study, we used Radiative Transfer Model (RTM) simulated data and data from the Multispectral Instrument (MSI) of the Sentinel-2 mission in combination with machine learning algorithms. Our aim was to study the spectral behavior of marine plastic pollution and evaluate the applicability of RTMs within this research area. The results from the exploratory analysis and unsupervised classification using the KMeans algorithm indicate that the spectral behavior of pollutants is influenced by factors such as the type of polymer and pixel coverage percentage. The findings also reveal spectral characteristics and trends of association and differentiation among elements. The applied methodology is strongly dependent on the data, and if reapplied in new, more diverse, and detailed datasets, it can potentially generate even better results. These insights can guide future research in remote sensing applications for detecting marine plastic pollution.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Human-AI Co-Creation Approach to Find Forever Chemicals Replacements
Authors:
Juliana Jansen Ferreira,
Vinícius Segura,
Joana G. R. Souza,
Gabriel D. J. Barbosa,
João Gallas,
Renato Cerqueira,
Dmitry Zubarev
Abstract:
Generative models are a powerful tool in AI for material discovery. We are designing a software framework that supports a human-AI co-creation process to accelerate finding replacements for the ``forever chemicals''-- chemicals that enable our modern lives, but are harmful to the environment and the human health. Our approach combines AI capabilities with the domain-specific tacit knowledge of sub…
▽ More
Generative models are a powerful tool in AI for material discovery. We are designing a software framework that supports a human-AI co-creation process to accelerate finding replacements for the ``forever chemicals''-- chemicals that enable our modern lives, but are harmful to the environment and the human health. Our approach combines AI capabilities with the domain-specific tacit knowledge of subject matter experts to accelerate the material discovery. Our co-creation process starts with the interaction between the subject matter experts and a generative model that can generate new molecule designs. In this position paper, we discuss our hypothesis that these subject matter experts can benefit from a more iterative interaction with the generative model, asking for smaller samples and ``guiding'' the exploration of the discovery space with their knowledge.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
A Python library for nonlinear system identification using Multi-Gene Genetic Programming algorithm
Authors:
Henrique Carvalho de Castro,
Bruno Henrique Groenner Barbosa
Abstract:
Models can be built directly from input and output data trough a process known as system identification. The Nonlinear AutoRegressive with eXogenous inputs (NARMAX) models are among the most used mathematical representations in the area and has many successful applications on data-driven modeling in different fields. Such models become extremely large when they have high degree of non-linearity an…
▽ More
Models can be built directly from input and output data trough a process known as system identification. The Nonlinear AutoRegressive with eXogenous inputs (NARMAX) models are among the most used mathematical representations in the area and has many successful applications on data-driven modeling in different fields. Such models become extremely large when they have high degree of non-linearity and long-term dependencies. Hence, a structure selection process must be performed to make them parsimonious. In the present paper, it is introduced a toolbox in Python that performs the structure selection process using the evolutionary algorithm named Multi-Gene Genetic Programming (MGGP). The toolbox encapsulates basic tools for parameter estimation, simulation and validation, and it allows the users to customize their evaluation function including prior knowledge and constraints in the individual structure (gray-box identification).
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Multifractal charactarization as a function of timescale in the light curves with planetary signal observed by the kepler mission
Authors:
F. J. S. Lima Filho,
V. M. B. Ferreira,
P. C. F. da Silva Filho,
F. O. da Silva Gomes,
B. W. de Freitas Alves,
S. G. A. Barbosa,
T. de Melo Santiago,
D. B. de Freitas
Abstract:
Astrophysical data, in the domains of time, involve a wide range of stellar variability phenomena, among them the magnetic activity of the order of a few hours until the signature of an extra-solar planet which can cover a scale of time of a few days until tens of years. Numerous instruments are being developed to detect Earth-sized exoplanets. Exoplanets with this dimension challenge scientific i…
▽ More
Astrophysical data, in the domains of time, involve a wide range of stellar variability phenomena, among them the magnetic activity of the order of a few hours until the signature of an extra-solar planet which can cover a scale of time of a few days until tens of years. Numerous instruments are being developed to detect Earth-sized exoplanets. Exoplanets with this dimension challenge scientific instrumentation and the field of research in the data processing. In this context, our study offers a powerful framework to explain dynamical properties as a function of timescale in light curves with the planetary signal. For that, we selected the stellar target Kepler-30 to test our methods and procedures. In this sense, we investigate the multifractal behavior of the Kepler-30 system composed of a sun-like star with a rotation period of ~16 days and three planets with masses between 2 Earth and 2.5 Jupiter masses. Furthermore, this system has an orbital period varying from 29 to 143 days and orbits almost coplanar. This system is highly interesting because starspots dynamics are strongly affected by the passing of a planet in front of the star. We used about 1600 days of high-precision photometry collected by the Kepler mission to investigate the quasi-periodic variation caused by the rotation of the star and the effect of spot evolution as a function of timescale. We applied indexes extract from multifractal analysis to model the flux rotational modulation induced by active regions. Our results that stellar flux variations in Kepler-30 star caused by rotational modulation can be replicated in detail with just four recent-known multifractal indexes. These indexes will greatly simplify spot modelling of current TESS and future PLATO data.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
Faster and more accurate geometrical-optics optical force calculation using neural networks
Authors:
David Bronte Ciriza,
Alessandro Magazzù,
Agnese Callegari,
Gunther Barbosa,
Antonio A. R. Neves,
Maria A. Iatì,
Giovanni Volpe,
Onofrio M. Maragò
Abstract:
Optical forces are often calculated by discretizing the trapping light beam into a set of rays and using geometrical optics to compute the exchange of momentum. However, the number of rays sets a trade-off between calculation speed and accuracy. Here, we show that using neural networks permits one to overcome this limitation, obtaining not only faster but also more accurate simulations. We demonst…
▽ More
Optical forces are often calculated by discretizing the trapping light beam into a set of rays and using geometrical optics to compute the exchange of momentum. However, the number of rays sets a trade-off between calculation speed and accuracy. Here, we show that using neural networks permits one to overcome this limitation, obtaining not only faster but also more accurate simulations. We demonstrate this using an optically trapped spherical particle for which we obtain an analytical solution to use as ground truth. Then, we take advantage of the acceleration provided by neural networks to study the dynamics of an ellipsoidal particle in a double trap, which would be computationally impossible otherwise.
△ Less
Submitted 5 September, 2022;
originally announced September 2022.
-
Kafka Consumer Group Autoscaler
Authors:
Diogo Landau,
Xavier Andrade,
Jorge G. Barbosa
Abstract:
Message brokers enable asynchronous communication between data producers and consumers in distributed environments by assigning messages to ordered queues. Message broker systems often provide with mechanisms to parallelize tasks between consumers to increase the rate at which data is consumed. The consumption rate must exceed the production rate or queues would grow indefinitely. Still, consumers…
▽ More
Message brokers enable asynchronous communication between data producers and consumers in distributed environments by assigning messages to ordered queues. Message broker systems often provide with mechanisms to parallelize tasks between consumers to increase the rate at which data is consumed. The consumption rate must exceed the production rate or queues would grow indefinitely. Still, consumers are costly and their number should be minimized. We model the problem of determining the required number of consumers, and the partition-consumer assignments, as a variable item size bin packing variant. Data cannot be read when a queue is being migrated to another consumer. Hence, we propose the R-score metric to account for these rebalancing costs. Then, we introduce an assortment of R-score based algorithms, and compare their performance to established heuristics for the Bin Packing Problem for this application. We instantiate our method within an existing system, demonstrating its effectiveness. Our approach guarantees adequate consumption rates something the previous system was unable to at lower operational costs.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
A framework for robotic arm pose estimation and movement prediction based on deep and extreme learning models
Authors:
Iago Richard Rodrigues,
Marrone Dantas,
Assis Oliveira Filho,
Gibson Barbosa,
Daniel Bezerra,
Ricardo Souza,
Maria Valéria Marquezini,
Patricia Takako Endo,
Judith Kelner,
Djamel H. Sadok
Abstract:
Human-robot collaboration has gained a notable prominence in Industry 4.0, as the use of collaborative robots increases efficiency and productivity in the automation process. However, it is necessary to consider the use of mechanisms that increase security in these environments, as the literature reports that risk situations may exist in the context of human-robot collaboration. One of the strateg…
▽ More
Human-robot collaboration has gained a notable prominence in Industry 4.0, as the use of collaborative robots increases efficiency and productivity in the automation process. However, it is necessary to consider the use of mechanisms that increase security in these environments, as the literature reports that risk situations may exist in the context of human-robot collaboration. One of the strategies that can be adopted is the visual recognition of the collaboration environment using machine learning techniques, which can automatically identify what is happening in the scene and what may happen in the future. In this work, we are proposing a new framework that is capable of detecting robotic arm keypoints commonly used in Industry 4.0. In addition to detecting, the proposed framework is able to predict the future movement of these robotic arms, thus providing relevant information that can be considered in the recognition of the human-robot collaboration scenario. The proposed framework is based on deep and extreme learning machine techniques. Results show that the proposed framework is capable of detecting and predicting with low error, contributing to the mitigation of risks in human-robot collaboration.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
FCN-Pose: A Pruned and Quantized CNN for Robot Pose Estimation for Constrained Devices
Authors:
Marrone Silvério Melo Dantas,
Iago Richard Rodrigues,
Assis Tiago Oliveira Filho,
Gibson Barbosa,
Daniel Bezerra,
Djamel F. H. Sadok,
Judith Kelner,
Maria Marquezini,
Ricardo Silva
Abstract:
IoT devices suffer from resource limitations, such as processor, RAM, and disc storage. These limitations become more evident when handling demanding applications, such as deep learning, well-known for their heavy computational requirements. A case in point is robot pose estimation, an application that predicts the critical points of the desired image object. One way to mitigate processing and sto…
▽ More
IoT devices suffer from resource limitations, such as processor, RAM, and disc storage. These limitations become more evident when handling demanding applications, such as deep learning, well-known for their heavy computational requirements. A case in point is robot pose estimation, an application that predicts the critical points of the desired image object. One way to mitigate processing and storage problems is compressing that deep learning application. This paper proposes a new CNN for the pose estimation while applying the compression techniques of pruning and quantization to reduce his demands and improve the response time. While the pruning process reduces the total number of parameters required for inference, quantization decreases the precision of the floating-point. We run the approach using a pose estimation task for a robotic arm and compare the results in a high-end device and a constrained device. As metrics, we consider the number of Floating-point Operations Per Second(FLOPS), the total of mathematical computations, the calculation of parameters, the inference time, and the number of video frames processed per second. In addition, we undertake a qualitative evaluation where we compare the output image predicted for each pruned network with the corresponding original one. We reduce the originally proposed network to a 70% pruning rate, implying an 88.86% reduction in parameters, 94.45% reduction in FLOPS, and for the disc storage, we reduced the requirement in 70% while increasing error by a mere $1\%$. With regard input image processing, this metric increases from 11.71 FPS to 41.9 FPS for the Desktop case. When using the constrained device, image processing augmented from 2.86 FPS to 10.04 FPS. The higher processing rate of image frames achieved by the proposed approach allows a much shorter response time.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
From Examples to Rules: Neural Guided Rule Synthesis for Information Extraction
Authors:
Robert Vacareanu,
Marco A. Valenzuela-Escarcega,
George C. G. Barbosa,
Rebecca Sharp,
Mihai Surdeanu
Abstract:
While deep learning approaches to information extraction have had many successes, they can be difficult to augment or maintain as needs shift. Rule-based methods, on the other hand, can be more easily modified. However, crafting rules requires expertise in linguistics and the domain of interest, making it infeasible for most users. Here we attempt to combine the advantages of these two directions…
▽ More
While deep learning approaches to information extraction have had many successes, they can be difficult to augment or maintain as needs shift. Rule-based methods, on the other hand, can be more easily modified. However, crafting rules requires expertise in linguistics and the domain of interest, making it infeasible for most users. Here we attempt to combine the advantages of these two directions while mitigating their drawbacks. We adapt recent advances from the adjacent field of program synthesis to information extraction, synthesizing rules from provided examples. We use a transformer-based architecture to guide an enumerative search, and show that this reduces the number of steps that need to be explored before a rule is found. Further, we show that without training the synthesis algorithm on the specific domain, our synthesized rules achieve state-of-the-art performance on the 1-shot scenario of a task that focuses on few-shot learning for relation classification, and competitive performance in the 5-shot scenario.
△ Less
Submitted 16 January, 2022;
originally announced February 2022.
-
Formation of Earth-sized planets within the Kepler-1647 System Habitable Zone
Authors:
G. O. Barbosa,
O. C. Winter,
A. Amarante,
E. E. N. Macau
Abstract:
The Kepler-1647 is a binary system with two Sun-type stars (approximately 1.22 and 0.97 Solar mass). It has the most massive circumbinary planet (1.52 Jupiter mass) with the longest orbital period (1,107.6 days) detected by the Kepler probe and is located within the habitable zone (HZ) of the system. In this work, we investigated the ability to form and house an Earth-sized planet within its HZ. F…
▽ More
The Kepler-1647 is a binary system with two Sun-type stars (approximately 1.22 and 0.97 Solar mass). It has the most massive circumbinary planet (1.52 Jupiter mass) with the longest orbital period (1,107.6 days) detected by the Kepler probe and is located within the habitable zone (HZ) of the system. In this work, we investigated the ability to form and house an Earth-sized planet within its HZ. First, we computed the limits of its HZ and performed numerical stability tests within that region. We found that HZ has three sub-regions that show stability, one internal, one co-orbital, and external to the host planet Kepler-1647b. Within the limits of these three regions, we performed numerical simulations of planetary formation. In the regions inner and outer to the planet, we used two different density profiles to explore different conditions of formation. In the co-orbital region, we used eight different values of total disc mass. We showed that many resonances are located within regions causing much of the disc material to be ejected before a planet is formed. Thus, the system might have two asteroid belts with Kirkwood gaps, similar to the Solar Systemś main belt of asteroids. The co-orbital region proved to be extremely sensitive, not allowing the planet formation, but showing that this binary system has the capacity to have Trojan bodies. Finally, we looked for regions of stability for an Earth-sized moon. We found that there is stability for a moon with this mass up to 0.4 Hillś radius from the host planet.
△ Less
Submitted 23 April, 2021;
originally announced April 2021.
-
Effect of social isolation in dengue cases in the state of Sao Paulo, Brazil: an analysis during the COVID-19 pandemic
Authors:
Gleice Margarete de Souza Conceição,
Gerson Laurindo Barbosa,
Camila Lorenz,
Ana Carolina Dias Bocewicz,
Lidia Maria Reis Santana,
Cristiano Corrêa de Azevedo Marques,
Francisco Chiaravalloti-Neto
Abstract:
Background: Studies have shown that human mobility is an important factor in dengue epidemiology. Changes in mobility resulting from COVID-19 pandemic set up a real-life situation to test this hypothesis. Our objective was to evaluate the effect of reduced mobility due to this pandemic in the occurrence of dengue in the state of São Paulo, Brazil. Method: It is an ecological study of time series,…
▽ More
Background: Studies have shown that human mobility is an important factor in dengue epidemiology. Changes in mobility resulting from COVID-19 pandemic set up a real-life situation to test this hypothesis. Our objective was to evaluate the effect of reduced mobility due to this pandemic in the occurrence of dengue in the state of São Paulo, Brazil. Method: It is an ecological study of time series, developed between January and August 2020. We use the number of confirmed dengue cases and residential mobility, on a daily basis, from secondary information sources. Mobility was represented by the daily percentage variation of residential population isolation, obtained from the Google database. We modeled the relationship between dengue occurrence and social distancing by negative binomial regression, adjusted for seasonality. We represent the social distancing dichotomously (isolation versus no isolation) and consider lag for isolation from the dates of occurrence of dengue. Results: The risk of dengue decreased around 9.1% (95% CI: 14.2 to 3.7) in the presence of isolation, considering a delay of 20 days between the degree of isolation and the dengue first symptoms. Conclusions: We have shown that mobility can play an important role in the epidemiology of dengue and should be considered in surveillance and control activities
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
Soft Constrained Autonomous Vehicle Navigation using Gaussian Processes and Instance Segmentation
Authors:
Bruno H. Groenner Barbosa,
Neel P. Bhatt,
Amir Khajepour,
Ehsan Hashemi
Abstract:
This paper presents a generic feature-based navigation framework for autonomous vehicles using a soft constrained Particle Filter. Selected map features, such as road and landmark locations, and vehicle states are used for designing soft constraints. After obtaining features of mapped landmarks in instance-based segmented images acquired from a monocular camera, vehicle-to-landmark distances are p…
▽ More
This paper presents a generic feature-based navigation framework for autonomous vehicles using a soft constrained Particle Filter. Selected map features, such as road and landmark locations, and vehicle states are used for designing soft constraints. After obtaining features of mapped landmarks in instance-based segmented images acquired from a monocular camera, vehicle-to-landmark distances are predicted using Gaussian Process Regression (GPR) models in a mixture of experts approach. Both mean and variance outputs of GPR models are used for implementing adaptive constraints. Experimental results confirm that the use of image segmentation features improves the vehicle-to-landmark distance prediction notably, and that the proposed soft constrained approach reliably localizes the vehicle even with reduced number of landmarks and noisy observations.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
Robust path-following control design of heavy vehicles based on multiobjective evolutionary optimization
Authors:
Gustavo Alves Prudencio de Morais,
Lucas Barbosa Marcos,
Filipe Marques Barbosa,
Bruno Henrique Groenner Barbosa,
Marco Henrique Terra,
Valdir Grassi Jr
Abstract:
The ability to deal with systems parametric uncertainties is an essential issue for heavy self-driving vehicles in unconfined environments. In this sense, robust controllers prove to be efficient for autonomous navigation. However, uncertainty matrices for this class of systems are usually defined by algebraic methods which demand prior knowledge of the system dynamics. In this case, the control s…
▽ More
The ability to deal with systems parametric uncertainties is an essential issue for heavy self-driving vehicles in unconfined environments. In this sense, robust controllers prove to be efficient for autonomous navigation. However, uncertainty matrices for this class of systems are usually defined by algebraic methods which demand prior knowledge of the system dynamics. In this case, the control system designer depends on the quality of the uncertain model to obtain an optimal control performance. This work proposes a robust recursive controller designed via multiobjective optimization to overcome these shortcomings. Furthermore, a local search approach for multiobjective optimization problems is presented. The proposed method applies to any multiobjective evolutionary algorithm already established in the literature. The results presented show that this combination of model-based controller and machine learning improves the effectiveness of the system in terms of robustness, stability and smoothness.
△ Less
Submitted 12 January, 2022; v1 submitted 14 October, 2020;
originally announced October 2020.
-
Lateral Force Prediction using Gaussian Process Regression for Intelligent Tire Systems
Authors:
Bruno Henrique Groenner Barbosa,
Nan Xu,
Hassan Askari,
Amir Khajepour
Abstract:
Understanding the dynamic behavior of tires and their interactions with road plays an important role in designing integrated vehicle control strategies. Accordingly, having access to reliable information about the tire-road interactions through tire embedded sensors is very demanding for developing enhanced vehicle control systems. Thus, the main objectives of the present research work are i. to a…
▽ More
Understanding the dynamic behavior of tires and their interactions with road plays an important role in designing integrated vehicle control strategies. Accordingly, having access to reliable information about the tire-road interactions through tire embedded sensors is very demanding for developing enhanced vehicle control systems. Thus, the main objectives of the present research work are i. to analyze data from an experimental accelerometer-based intelligent tire acquired over a wide range of maneuvers, with different vertical loads, velocities, and high slip angles; and ii. to develop a lateral force predictor based on a machine learning tool, more specifically the Gaussian Process Regression (GPR) technique. It is delineated that the proposed intelligent tire system can provide reliable information about the tire-road interactions even in the case of high slip angles. Besides, the lateral forces model based on GPR can predict forces with acceptable accuracy and provide level of uncertainties that can be very useful for designing vehicle control strategies.
△ Less
Submitted 25 September, 2020;
originally announced September 2020.
-
Including steady-state information in nonlinear models: an application to the development of soft-sensors
Authors:
Leandro Freitas,
Bruno H. G. Barbosa,
Luis A. Aguirre
Abstract:
When the dynamical data of a system only convey dynamic information over a limited operating range, the identification of models with good performance over a wider operating range is very unlikely. Nevertheless, models with such characteristic are desirable to implement modern control systems. To overcome such a shortcoming, this paper describes a methodology to train models from dynamical data an…
▽ More
When the dynamical data of a system only convey dynamic information over a limited operating range, the identification of models with good performance over a wider operating range is very unlikely. Nevertheless, models with such characteristic are desirable to implement modern control systems. To overcome such a shortcoming, this paper describes a methodology to train models from dynamical data and steady-state information, which is assumed available. The novelty is that the procedure can be applied to models with rather complex structures such as multilayer perceptron neural networks in a bi-objective fashion without the need to compute fixed points neither analytically nor numerically. As a consequence, the required computing time is greatly reduced. The capabilities of the proposed method are explored in numerical examples and the development of soft-sensors for downhole pressure estimation for a real deep-water offshore oil well. The results indicate that the procedure yields suitable soft-sensors with good dynamical and static performance and, in the case of models that are nonlinear in the parameters, the gain in computation time is about three orders of magnitude considering existing approaches.
△ Less
Submitted 3 September, 2020;
originally announced September 2020.
-
Earth-size planet formation in the habitable zone of circumbinary stars
Authors:
G. O. Barbosa,
O. C. Winter,
A. Amarante,
A. Izidoro,
R. C. Domingos,
E. E. N. Macau
Abstract:
In this work is investigated the possibility of close-binary star systems having Earth-size planets within their habitable zones. First, we selected all known close-binary systems with confirmed planets (totaling 22 systems) to calculate the boundaries of their respective habitable zones (HZ). However, only eight systems had all the data necessary for the computation of the HZ. Then, we numericall…
▽ More
In this work is investigated the possibility of close-binary star systems having Earth-size planets within their habitable zones. First, we selected all known close-binary systems with confirmed planets (totaling 22 systems) to calculate the boundaries of their respective habitable zones (HZ). However, only eight systems had all the data necessary for the computation of the HZ. Then, we numerically explored the stability within the habitable zones for each one of the eight systems using test particles. From the results, we selected five systems that have stable regions inside the habitable zones (HZ), namely Kepler-34, 35, 38, 413 and 453. For these five cases of systems with stable regions in the HZ, we perform a series of numerical simulations for planet formation considering disks composed of planetary embryos and planetesimals, with two distinct density profiles, in addition to the stars and host planets of each system. We found that in the case of Kepler-34 and 453 systems no Earth-size planet is formed within the habitable zones. Although planets with Earth-like masses were formed in the Kepler-453, but they were outside the HZ. In contrast, for Kepler-35 and 38 systems, the results showed that potentially habitable planets are formed in all simulations. In the case of the Kepler-413 system, in just one simulation a terrestrial planet was formed within the habitable zone.
△ Less
Submitted 25 March, 2020;
originally announced March 2020.
-
Semantics-aware Virtual Machine Image Management in IaaS Clouds
Authors:
Nishant Saurabh,
Julian Remmers,
Dragi Kimovski,
Radu Prodan,
Jorge G. Barbosa
Abstract:
Infrastructure-as-a-service (IaaS) Clouds concurrently accommodate diverse sets of user requests, requiring an efficient strategy for storing and retrieving virtual machine images (VMIs) at a large scale. The VMI storage management require dealing with multiple VMIs, typically in the magnitude of gigabytes, which entails VMI sprawl issues hindering the elastic resource management and provisioning.…
▽ More
Infrastructure-as-a-service (IaaS) Clouds concurrently accommodate diverse sets of user requests, requiring an efficient strategy for storing and retrieving virtual machine images (VMIs) at a large scale. The VMI storage management require dealing with multiple VMIs, typically in the magnitude of gigabytes, which entails VMI sprawl issues hindering the elastic resource management and provisioning. Nevertheless, existing techniques to facilitate VMI management overlook VMI semantics (i.e at the level of base image and software packages) with either restricted possibility to identify and extract reusable functionalities or with higher VMI publish and retrieval overheads. In this paper, we design, implement and evaluate Expelliarmus, a novel VMI management system that helps to minimize storage, publish and retrieval overheads. To achieve this goal, Expelliarmus incorporates three complementary features. First, it makes use of VMIs modelled as semantic graphs to expedite the similarity computation between multiple VMIs. Second, Expelliarmus provides a semantic aware VMI decomposition and base image selection to extract and store non-redundant base image and software packages. Third, Expelliarmus can also assemble VMIs based on the required software packages upon user request. We evaluate Expelliarmus through a representative set of synthetic Cloud VMIs on the real test-bed. Experimental results show that our semantic-centric approach is able to optimize repository size by 2.2-16 times compared to state-of-the-art systems (e.g. IBM's Mirage and Hemera) with significant VMI publish and slight retrieval performance improvement.
△ Less
Submitted 29 July, 2019; v1 submitted 21 June, 2019;
originally announced June 2019.
-
A wireless secure key distribution system with no couriers: a One-Time-Pad Revival
Authors:
Geraldo A Barbosa
Abstract:
Among the problems to guarantee secrecy for in-transit information, the difficulties involved in renewing cryptographic keys in a secure way using couriers, the perfect secrecy encryption method known as One-Time-Pad (OTP) became almost obsolete. Pure quantum key distribution (QKD) ideally offers security for key distribution and could revive OTP. However, special networks that may need optical fi…
▽ More
Among the problems to guarantee secrecy for in-transit information, the difficulties involved in renewing cryptographic keys in a secure way using couriers, the perfect secrecy encryption method known as One-Time-Pad (OTP) became almost obsolete. Pure quantum key distribution (QKD) ideally offers security for key distribution and could revive OTP. However, special networks that may need optical fibers, satellite, relay stations, expensive detection equipment compared with telecom technology and the slow protocol offer powerful obstacles for widespread use of QKD. Classical encryption methods flood the secure communication landscape. Many of them rely its security on historical difficulties such as factoring of large numbers -- their alleged security sometimes are presented as the difficulty to brake encryption by brute force. The possibility for a mathematical breakthrough that could make factoring trivial are poorly discussed. This work proposes a solution to bring perfect secrecy to in-transit communication and without the above problems. It shows the key distribution scheme (nicknamed KeyBITS Platform) based on classical signals carrying information but that carry with them recordings of quantum noise. Legitimate users start with a shared information of the coding bases used that gives them an information advantage that allows easy signal recovery. The recorded noise protects the legitimate users and block the attacker's access. This shared information is refreshed at the end of each batch of keys sent providing the secret shared information for the next round. With encryption keys distilled from securely transmitted signals at each round OTP can be revived and at fast speeds.
△ Less
Submitted 31 May, 2020; v1 submitted 16 January, 2019;
originally announced January 2019.
-
Conic Constrained Particle Quantization within the DB, FJBW and BRST Approaches
Authors:
Gabriel D. Barbosa,
Ronaldo Thibes
Abstract:
We consider a second degree algebraic curve describing a general conic constraint imposed on the motion of a massive spinless particle. The problem is trivial at classical level but becomes involved and interesting in its quantum counterpart with subtleties in its symplectic structure and symmetries. The model is used here to investigate quantization issues related to the Hamiltonian constraint st…
▽ More
We consider a second degree algebraic curve describing a general conic constraint imposed on the motion of a massive spinless particle. The problem is trivial at classical level but becomes involved and interesting in its quantum counterpart with subtleties in its symplectic structure and symmetries. The model is used here to investigate quantization issues related to the Hamiltonian constraint structure, Dirac brackets, gauge symmetry and BRST transformations. We pursue the complete constraint analysis in phase space and perform the Faddeev-Jackiw symplectic quantization following the Barcelos-Wotzasek iteration program to unravel the fine tuned and more relevant aspects of the constraint structure. A comparison with the longer usual Dirac-Bergmann algorithm, still more well established in the literature, is also presented. While in the standard DB approach there are four second class constraints, in the FJBW they reduce to two. By using the symplectic potential obtained in the last step of the FJBW iteration process we construct a gauge invariant model exhibiting explicitly its BRST symmetry. Our results reproduce and neatly generalize the known BRST symmetry of the rigid rotor showing that it constitutes a particular case of a broader class of theories.
△ Less
Submitted 11 June, 2017;
originally announced June 2017.
-
Quantum key distribution by phase flipping of coherent states of light
Authors:
G. A. Barbosa,
J. van de Graaf,
P. Mateus,
N. Paunković
Abstract:
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of…
▽ More
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of light, such that a complex phase of each pulse is rotated by the corresponding phase rotation. The encoding of $i$-th bit of the key $r=r_1 \dots r_\ell$ is done by further performing phase rotation $r_i π$ (with $r_i = 0,1$) on the $i$-th coherent state pulse. In order to protect the protocol against the man-in-the-middle attack, we introduce a verification procedure, and analyse the protocol's security using the Holevo bound. We also analyse the possibility of beam splitting-like and of collective attacks, showing the impossibility of the former and, in the case of our protocol, the inadequacy of the latter. While we cannot prove full perfect security against the most general attacks allowed by the laws of quantum mechanics, our protocol achieves faster quantum key distribution, over larger distances and with lower costs, than the single-photon counterparts, maintaining at least practical security against the current and the near future technologies.
△ Less
Submitted 3 May, 2017; v1 submitted 22 September, 2016;
originally announced September 2016.
-
A State-of-the-art Integrated Transportation Simulation Platform
Authors:
Tiago Azevedo,
Rosaldo J. F. Rossetti,
Jorge G. Barbosa
Abstract:
Nowadays, universities and companies have a huge need for simulation and modelling methodologies. In the particular case of traffic and transportation, making physical modifications to the real traffic networks could be highly expensive, dependent on political decisions and could be highly disruptive to the environment. However, while studying a specific domain or problem, analysing a problem thro…
▽ More
Nowadays, universities and companies have a huge need for simulation and modelling methodologies. In the particular case of traffic and transportation, making physical modifications to the real traffic networks could be highly expensive, dependent on political decisions and could be highly disruptive to the environment. However, while studying a specific domain or problem, analysing a problem through simulation may not be trivial and may need several simulation tools, hence raising interoperability issues. To overcome these problems, we propose an agent-directed transportation simulation platform, through the cloud, by means of services. We intend to use the IEEE standard HLA (High Level Architecture) for simulators interoperability and agents for controlling and coordination. Our motivations are to allow multiresolution analysis of complex domains, to allow experts to collaborate on the analysis of a common problem and to allow co-simulation and synergy of different application domains. This paper will start by presenting some preliminary background concepts to help better understand the scope of this work. After that, the results of a literature review is shown. Finally, the general architecture of a transportation simulation platform is proposed.
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
Densifying the sparse cloud SimSaaS: The need of a synergy among agent-directed simulation, SimSaaS and HLA
Authors:
Tiago Azevedo,
Rosaldo J. F. Rossetti,
Jorge G. Barbosa
Abstract:
Modelling & Simulation (M&S) is broadly used in real scenarios where making physical modifications could be highly expensive. With the so-called Simulation Software-as-a-Service (SimSaaS), researchers could take advantage of the huge amount of resource that cloud computing provides. Even so, studying and analysing a problem through simulation may need several simulation tools, hence raising intero…
▽ More
Modelling & Simulation (M&S) is broadly used in real scenarios where making physical modifications could be highly expensive. With the so-called Simulation Software-as-a-Service (SimSaaS), researchers could take advantage of the huge amount of resource that cloud computing provides. Even so, studying and analysing a problem through simulation may need several simulation tools, hence raising interoperability issues. Having this in mind, IEEE developed a standard for interoperability among simulators named High Level Architecture (HLA). Moreover, the multi-agent system approach has become recognised as a convenient approach for modelling and simulating complex systems. Despite all the recent works and acceptance of these technologies, there is still a great lack of work regarding synergies among them. This paper shows by means of a literature review this lack of work or, in other words, the sparse Cloud SimSaaS. The literature review and the resulting taxonomy are the main contributions of this paper, as they provide a research agenda illustrating future research opportunities and trends.
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
A wireless physically secure key distribution system
Authors:
Geraldo A. Barbosa
Abstract:
A secure key distribution protocol protected by light's noise was introduced in 2003 [Phys. Rev. A 68, 052307 (2003)]. That protocol utilized the shot noise of light present in the optical channel (eg., an optical fiber) to restrict information leaks to an adversary. An initial shared information between the legitimate users allowed them to extract more information from the channel than the one ob…
▽ More
A secure key distribution protocol protected by light's noise was introduced in 2003 [Phys. Rev. A 68, 052307 (2003)]. That protocol utilized the shot noise of light present in the optical channel (eg., an optical fiber) to restrict information leaks to an adversary. An initial shared information between the legitimate users allowed them to extract more information from the channel than the one obtained by the adversary. That original paper recognized the need for a privacy amplification step but no specific protocol was presented. More recently that original idea was improved with a specific privacy amplification protocol [arXiv:1406.1543v2 [cs.CR] 8 Jul 2015] while keeping the use of an optical communication channel. This work merges main ideas of the protection given by the light's noise in a protocol applied to wireless channels. The use of a wireless channels together with recorded physical noise was introduced from 2005 to 2007 (see eg, arXiv:quant-ph/0510011 v2 16 Nov 2005 and arXiv:0705.2243v2 [quant-ph] 17 May 2007). This work improves those embrionary ideas of wireless channels secured by recorded optical noise. The need for specific optical channels is eliminated with the wireless variation and opens up the possibility to apply the technique to mobile devices. This work introduces this new scheme and calculates the associated security level.
△ Less
Submitted 25 July, 2016; v1 submitted 1 January, 2016;
originally announced January 2016.
-
Untappable key distribution system: a one-time-pad booster
Authors:
Geraldo A. Barbosa,
Jeroen van de Graaf
Abstract:
One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. Thi…
▽ More
One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information.
The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.
△ Less
Submitted 8 July, 2015; v1 submitted 5 June, 2014;
originally announced June 2014.
-
Artificial Intelligence MArkup Language: A Brief Tutorial
Authors:
Maria das Graças Bruno Marietto,
Rafael Varago de Aguiar,
Gislene de Oliveira Barbosa,
Wagner Tanaka Botelho,
Edson Pimentel,
Robson dos Santos França,
Vera Lúcia da Silva
Abstract:
The purpose of this paper is to serve as a reference guide for the development of chatterbots implemented with the AIML language. In order to achieve this, the main concepts in Pattern Recognition area are described because the AIML uses such theoretical framework in their syntactic and semantic structures. After that, AIML language is described and each AIML command/tag is followed by an applicat…
▽ More
The purpose of this paper is to serve as a reference guide for the development of chatterbots implemented with the AIML language. In order to achieve this, the main concepts in Pattern Recognition area are described because the AIML uses such theoretical framework in their syntactic and semantic structures. After that, AIML language is described and each AIML command/tag is followed by an application example. Also, the usage of AIML embedded tags for the handling of sequence dialogue limitations between humans and machines is shown. Finally, computer systems that assist in the design of chatterbots with the AIML language are classified and described.
△ Less
Submitted 11 July, 2013;
originally announced July 2013.
-
Can humans see beyond intensity images?
Authors:
Geraldo A. Barbosa
Abstract:
The human's visual system detect intensity images. Quite interesting, detector systems have shown the existence of different kind of images. Among them, images obtained by two detectors (detector array or spatially scanning detector) capturing signals within short window times may reveal a "hidden" image not contained in either isolated detector: Information on this image depend on the two detecto…
▽ More
The human's visual system detect intensity images. Quite interesting, detector systems have shown the existence of different kind of images. Among them, images obtained by two detectors (detector array or spatially scanning detector) capturing signals within short window times may reveal a "hidden" image not contained in either isolated detector: Information on this image depend on the two detectors simultaneously. In general, they are called "high-order" images because they may depend on more than two electric fields. Intensity images depend on the square of magnitude of the light's electric field. Can the human visual sensory system perceive high-order images as well? This paper proposes a way to test this idea. A positive answer could give new insights on the "visual-conscience" machinery, opening a new sensory channel for humans. Applications could be devised, e.g., head position sensing, privacy in communications at visual ranges and many others.
△ Less
Submitted 24 February, 2012;
originally announced February 2012.
-
Properties of magnetic nanodots with perpendicular anisotropy
Authors:
E. R. P. Novais,
P. Landeros,
A. G. S. Barbosa,
M. D. Martins,
F. Garcia,
A. P. Guimarães
Abstract:
Nanodots with magnetic vortices have many potential applications, such as magnetic memories (VRAMs) and spin transfer nano-oscillators (STNOs). Adding a perpendicular anisotropy term to the magnetic energy of the nanodot it becomes possible to tune the vortex core properties. This can be obtained, e.g., in Co nanodots by varying the thickness of the Co layer in a Co/Pt stack. Here we discuss the s…
▽ More
Nanodots with magnetic vortices have many potential applications, such as magnetic memories (VRAMs) and spin transfer nano-oscillators (STNOs). Adding a perpendicular anisotropy term to the magnetic energy of the nanodot it becomes possible to tune the vortex core properties. This can be obtained, e.g., in Co nanodots by varying the thickness of the Co layer in a Co/Pt stack. Here we discuss the spin configuration of circular and elliptical nanodots for different perpendicular anisotropies; we show for nanodisks that micromagnetic simulations and analytical results agree. Increasing the perpendicular anisotropy, the vortex core radii increase, the phase diagrams are modified and new configurations appear; the knowledge of these phase diagrams is relevant for the choice of optimum nanodot dimensions for applications. MFM measurements on Co/Pt multilayers confirm the trend of the vortex core diameters with varying Co layer thicknesses.
△ Less
Submitted 9 May, 2011;
originally announced May 2011.
-
A note on the Lindeberg condition for convergence to stable laws in Mallows distance
Authors:
Euro G. Barbosa,
Chang C. Y. Dorea
Abstract:
We correct a condition in a result of Johnson and Samworth (Bernoulli 11 (2005) 829--845) concerning convergence to stable laws in Mallows distance. We also give an improved version of this result, setting it in the more familiar context of a Lindeberg-like condition.
We correct a condition in a result of Johnson and Samworth (Bernoulli 11 (2005) 829--845) concerning convergence to stable laws in Mallows distance. We also give an improved version of this result, setting it in the more familiar context of a Lindeberg-like condition.
△ Less
Submitted 7 September, 2009;
originally announced September 2009.
-
Transverse coincidence-structures in spontaneous parametric down-conversion with orbital angular momentum: Theory
Authors:
Geraldo A. Barbosa
Abstract:
Coincidence-structures in the transverse plane of Type-II spontaneous parametric down-conversion carrying orbital angular momentum are obtained. Azimuthal symmetry breaking around the pump beam direction reveals itself on these quantum images. Analytical expressions for the amplitude probability of the down conversion process are shown including the nonlinear polarizability components.
Coincidence-structures in the transverse plane of Type-II spontaneous parametric down-conversion carrying orbital angular momentum are obtained. Azimuthal symmetry breaking around the pump beam direction reveals itself on these quantum images. Analytical expressions for the amplitude probability of the down conversion process are shown including the nonlinear polarizability components.
△ Less
Submitted 6 June, 2007;
originally announced June 2007.
-
Secure sharing of random bits over the Internet
Authors:
Geraldo A. Barbosa
Abstract:
Although one-time pad encrypted files can be sent through Internet channels, the need for renewing shared secret keys have made this method unpractical. This work presents a scheme to turn practical the fast sharing of random keys over arbitrary Internet channels. Starting with a shared secret key sequence of length K_0 the users end up with a secure new sequence K >> K_0. Using these sequences…
▽ More
Although one-time pad encrypted files can be sent through Internet channels, the need for renewing shared secret keys have made this method unpractical. This work presents a scheme to turn practical the fast sharing of random keys over arbitrary Internet channels. Starting with a shared secret key sequence of length K_0 the users end up with a secure new sequence K >> K_0. Using these sequences for posteriori message encryption the legitimate users have absolute security control without the need for third parties. Additionally, the security level does not depend on the unproven difficulty of factoring numbers in primes. In the proposed scheme a fast optical random source generates random bits and noise for key renewals. The transmitted signals are recorded signals that carries both the random binary signals to be exchanged and physical noise that cannot be eliminated by the attacker. These signals allow amplification over the Internet network without degrading security. The proposed system is also secure against a-posteriori known-plaintext attack on the key. Information-theoretic analysis is presented and bounds for secure operation are quantitatively determined.
△ Less
Submitted 17 May, 2007; v1 submitted 15 May, 2007;
originally announced May 2007.
-
One-time pad booster for Internet
Authors:
Geraldo A. Barbosa
Abstract:
One-time pad encrypted files can be sent through Internet channels using current Internet protocols. However, the need for renewing shared secret keys make this method unpractical. This work shows how users can use a fast physical random generator based on fluctuations of a light field and the Internet channel to directly boost key renewals. The transmitted signals are deterministic but carries…
▽ More
One-time pad encrypted files can be sent through Internet channels using current Internet protocols. However, the need for renewing shared secret keys make this method unpractical. This work shows how users can use a fast physical random generator based on fluctuations of a light field and the Internet channel to directly boost key renewals. The transmitted signals are deterministic but carries imprinted noise that cannot be eliminated by the attacker. Thus, a one-time pad for Internet can be made practical. Security is achieved without third parties and not relying on the difficulty of factoring numbers in primes. An informational fragility to be avoided is discussed. Information-theoretic analysis is presented and bounds for secure operation are determined.
△ Less
Submitted 11 April, 2007;
originally announced April 2007.
-
Is orbital angular momentum always conserved in spontaneous parametric down-conversion?
Authors:
Sheng Feng,
Chao-Hsiang Chen,
Geraldo A. Barbosa,
Prem Kumar
Abstract:
In the non-linear optical process of type-II spontaneous parametric down-conversion, we present on an experiment showing that the two-photon detection amplitude of the down-converted beams does not generally reproduce the transverse profile of the pump beam that carries non-zero orbital angular momentum. We explain this observation by that orbital angular momentum is not conserved in the type-II…
▽ More
In the non-linear optical process of type-II spontaneous parametric down-conversion, we present on an experiment showing that the two-photon detection amplitude of the down-converted beams does not generally reproduce the transverse profile of the pump beam that carries non-zero orbital angular momentum. We explain this observation by that orbital angular momentum is not conserved in the type-II non-linear process due to the broken rotational symmetry of the Hamiltonian.
△ Less
Submitted 20 April, 2007; v1 submitted 22 March, 2007;
originally announced March 2007.
-
The conservation of orbital angular momentum and the two-photon detection amplitude in spontaneous parametric down-conversion
Authors:
Sheng Feng,
Chao-Hsiang Chen,
Geraldo A. Barbosa,
Prem Kumar
Abstract:
We study the two-photon detection amplitude of the down-converted beams in spontaneous parametric down-conversion when the physical variable of orbital angular momentum is involved, taking into account both conservation and non-conservation of angular momentum. Agreeing with experimental observations, our theoretical calculation shows that spatial structure of the two-photon detection amplitude…
▽ More
We study the two-photon detection amplitude of the down-converted beams in spontaneous parametric down-conversion when the physical variable of orbital angular momentum is involved, taking into account both conservation and non-conservation of angular momentum. Agreeing with experimental observations, our theoretical calculation shows that spatial structure of the two-photon detection amplitude of the down-converted beams carries important information about conservation or non-conservation of orbital angular momentum in spontaneous parametric down-conversion.
△ Less
Submitted 21 March, 2007; v1 submitted 20 March, 2007;
originally announced March 2007.
-
Fundamentals for immediate implementation of a quantum secured Internet
Authors:
Geraldo A. Barbosa
Abstract:
This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypte…
▽ More
This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypted by noise at the source- are subsequently utilized for one-time-pad data encryption. The physical generated protection is not susceptible to advances in computation or mathematics. In particular, it does not depend on the difficulty of factoring numbers in primes. Also, there is no use of Linear Feed Back Shift Registers. The attacker has free access to the communication channels and may acquire arbitrary number of copies of the transmitted signal without lowering the security level. No intrusion detection method is needed.
△ Less
Submitted 16 August, 2006; v1 submitted 14 July, 2006;
originally announced July 2006.
-
Noise Secured Internet
Authors:
Geraldo A. Barbosa
Abstract:
This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the…
▽ More
This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.
△ Less
Submitted 28 February, 2006; v1 submitted 2 October, 2005;
originally announced October 2005.