-
Spectrometry of Captured Highly Charged Ions Produced Following Antiproton Annihilations
Authors:
F. P. Gustafsson,
M. Volponi,
J. Zielinski,
A. Asare,
I. Hwang,
S. Alfaro Campos,
M. Auzins,
D. Bhanushali,
A. Bhartia,
M. Berghold,
R. S. Brusa,
K. Calik,
A. Camper,
R. Caravita,
F. Castelli,
G. Cerchiari,
S. Chandran,
A. Chehaimi,
S. Choudapurkar,
R. Ciuryło,
P. Conte,
G. Consolati,
M. Doser,
R. Ferguson,
M. Germann
, et al. (39 additional authors not shown)
Abstract:
We report the first capture and time-of-flight spectrometry of highly charged ions produced following antiproton annihilations in a Penning-Malmberg trap. At the AEgIS experiment, we employed a multi-step nested-trap technique to isolate ions from antiproton annihilations with ultra-low-density helium and argon gas. The capture and identification of highly-charged argon ions in charge-states up to…
▽ More
We report the first capture and time-of-flight spectrometry of highly charged ions produced following antiproton annihilations in a Penning-Malmberg trap. At the AEgIS experiment, we employed a multi-step nested-trap technique to isolate ions from antiproton annihilations with ultra-low-density helium and argon gas. The capture and identification of highly-charged argon ions in charge-states up to $Ar^{5+}$ demonstrates a new method for in-trap synthesis. This work establishes a clear path towards the direct capture and mass spectrometry of cold nuclear annihilation fragments, which will enable a complementary tool for exploring the neutron to proton density ratio at the extreme nuclear periphery.
△ Less
Submitted 9 October, 2025;
originally announced October 2025.
-
Local Routing on a Convex Polytope in R^3
Authors:
Sreehari Chandran,
R. Inkulu
Abstract:
Given a convex polytope $P$ defined with $n$ vertices in $\mathbb{R}^3$, this paper presents an algorithm to preprocess $P$ to compute routing tables at every vertex of $P$ so that a data packet can be routed on $P$ from any vertex of $P$ to any other vertex of $P$. At every vertex $v$ of $P$ along the routing path, until the packet reaches its destination, the next hop is determined using the rou…
▽ More
Given a convex polytope $P$ defined with $n$ vertices in $\mathbb{R}^3$, this paper presents an algorithm to preprocess $P$ to compute routing tables at every vertex of $P$ so that a data packet can be routed on $P$ from any vertex of $P$ to any other vertex of $P$. At every vertex $v$ of $P$ along the routing path, until the packet reaches its destination, the next hop is determined using the routing tables at $v$ and the information stored in the packet header. In $O(n+\min(n^3, \frac{1}{ε^7}))$ time, the preprocessing algorithm computes a routing table at every vertex of $P$ of amortized size $O(\min(n, \frac{1}{ε^{3/2}}))$ bits. If the optimal shortest distance between $s$ and $t$ on $P$ is $d(s, t)$, then the routing path produced by this algorithm has length at most $\frac{8+ε}{\sin{θ_m}}(D+d(s,t))$. Here, $ε\in (0, 1)$ is an input parameter, $D$ is the maximum length of the diagonal of any cell when $\partial P$ is partitioned into $\frac{1}{ε^3}$ geodesic cells of equal size, and $θ_m$ is half the minimum angle between any two neighbouring edges of $P$ on $\partial P$.
△ Less
Submitted 3 October, 2025;
originally announced October 2025.
-
Extending the optical absorption in a lumped element meander structure to far-infrared wavelengths
Authors:
Shekhar Chandra Pandey,
Shilpam Sharma,
Anudeep Singh,
Utkarsh Pandey,
S. S. Prabhu,
Bhaskar Biswas,
Sona Chandran,
M. K. Chattopadhyay
Abstract:
Superconducting radiation detectors typically exhibit detection and single photon sensitivity limited to the mid infrared wavelength range. Extending their detection capabilities into the far infrared range (>10 um) requires careful selection of substrate materials and detector geometries. The overall detection efficiency is linked to absorption and coupling efficiencies. In this study, the resona…
▽ More
Superconducting radiation detectors typically exhibit detection and single photon sensitivity limited to the mid infrared wavelength range. Extending their detection capabilities into the far infrared range (>10 um) requires careful selection of substrate materials and detector geometries. The overall detection efficiency is linked to absorption and coupling efficiencies. In this study, the resonator geometry and absorption efficiency were estimated using electromagnetic simulations in CST Microwave Studio for a lumped-element meander structure. Simulations were performed for the 12 to 50 um wavelength range, corresponding to the Infrared Free Electron Laser (IR FEL) at RRCAT, Indore. Absorption in the meander inductor was influenced by the substrate material, thickness, and impedance matching between the detector and incident photon medium. The results indicate that SiO2 and diamond substrates are suitable for developing lumped-element kinetic inductance detectors (LEKID) in this range. Optimized meander geometries on diamond substrates demonstrated absorption efficiencies of up to 95% for narrow bandwidths and over 50% for wide bandwidths. A 30-pixel LEKID structure was fabricated using electron beam lithography on a 500 um SiO2 coated Si substrate, with a 20 nm thick Ti40V60 alloy resonator. Experimental absorption efficiency was determined through transmission and reflection measurements. Results show that in the 14 to 26 um IR-FEL range, the LEKID achieved up to 75% absorption efficiency. These studies demonstrate that the LEKID structure is ideal for detecting far infrared wavelengths above 10 um, with high absorption efficiency.
△ Less
Submitted 28 September, 2025; v1 submitted 26 September, 2025;
originally announced September 2025.
-
Evaluating pretrained speech embedding systems for dysarthria detection across heterogenous datasets
Authors:
Lovisa Wihlborg,
Jemima Goodall,
David Wheatley,
Jacob J. Webber,
Johnny Tam,
Christine Weaver,
Suvankar Pal,
Siddharthan Chandran,
Sohan Seth,
Oliver Watts,
Cassia Valentini-Botinhao
Abstract:
We present a comprehensive evaluation of pretrained speech embedding systems for the detection of dysarthric speech using existing accessible data. Dysarthric speech datasets are often small and can suffer from recording biases as well as data imbalance. To address these we selected a range of datasets covering related conditions and adopt the use of several cross-validations runs to estimate the…
▽ More
We present a comprehensive evaluation of pretrained speech embedding systems for the detection of dysarthric speech using existing accessible data. Dysarthric speech datasets are often small and can suffer from recording biases as well as data imbalance. To address these we selected a range of datasets covering related conditions and adopt the use of several cross-validations runs to estimate the chance level. To certify that results are above chance, we compare the distribution of scores across these runs against the distribution of scores of a carefully crafted null hypothesis. In this manner, we evaluate 17 publicly available speech embedding systems across 6 different datasets, reporting the cross-validation performance on each. We also report cross-dataset results derived when training with one particular dataset and testing with another. We observed that within-dataset results vary considerably depending on the dataset, regardless of the embedding used, raising questions about which datasets should be used for benchmarking. We found that cross-dataset accuracy is, as expected, lower than within-dataset, highlighting challenges in the generalization of the systems. These findings have important implications for the clinical validity of systems trained and tested on the same dataset.
△ Less
Submitted 24 September, 2025;
originally announced September 2025.
-
Comparator Loss: An Ordinal Contrastive Loss to Derive a Severity Score for Speech-based Health Monitoring
Authors:
Jacob J Webber,
Oliver Watts,
Lovisa Wihlborg,
David Wheatley,
Johnny Tam,
Christine Weaver,
Suvankar Pal,
Siddharthan Chandran,
Cassia Valentini-Botinhao
Abstract:
Monitoring the progression of neurodegenerative disease has important applications in the planning of treatment and the evaluation of future medications. Whereas much of the state-of-the-art in health monitoring from speech has been focused on classifying patients versus healthy controls, or predicting real-world health metrics, we propose here a novel measure of disease progression: the severity…
▽ More
Monitoring the progression of neurodegenerative disease has important applications in the planning of treatment and the evaluation of future medications. Whereas much of the state-of-the-art in health monitoring from speech has been focused on classifying patients versus healthy controls, or predicting real-world health metrics, we propose here a novel measure of disease progression: the severity score. This score is derived from a model trained to minimize what we call the comparator loss. The comparator loss ensures scores follow an ordering relation, which can be based on diagnosis, clinically annotated scores, or simply the chronological order of the recordings. In addition to giving a more detailed picture than a simple discrete classification, the proposed comparator loss-based system has the potential to incorporate information from disparate health metrics, which is critical for making full use of small health-related datasets. We evaluated our proposed models based on their ability to affirmatively track the progression of patients with motor neuron disease (MND), the correlation of their output with clinical annotations such as ALSFRS-R, as well as their ability to distinguish between subjects with MND and healthy controls.
△ Less
Submitted 22 September, 2025;
originally announced September 2025.
-
Psychologically Enhanced AI Agents
Authors:
Maciej Besta,
Shriram Chandran,
Robert Gerstenberger,
Mathis Lindner,
Marcin Chrapek,
Sebastian Hermann Martschat,
Taraneh Ghandi,
Patrick Iff,
Hubert Niewiadomski,
Piotr Nyczyk,
Jürgen Müller,
Torsten Hoefler
Abstract:
We introduce MBTI-in-Thoughts, a framework for enhancing the effectiveness of Large Language Model (LLM) agents through psychologically grounded personality conditioning. Drawing on the Myers-Briggs Type Indicator (MBTI), our method primes agents with distinct personality archetypes via prompt engineering, enabling control over behavior along two foundational axes of human psychology, cognition an…
▽ More
We introduce MBTI-in-Thoughts, a framework for enhancing the effectiveness of Large Language Model (LLM) agents through psychologically grounded personality conditioning. Drawing on the Myers-Briggs Type Indicator (MBTI), our method primes agents with distinct personality archetypes via prompt engineering, enabling control over behavior along two foundational axes of human psychology, cognition and affect. We show that such personality priming yields consistent, interpretable behavioral biases across diverse tasks: emotionally expressive agents excel in narrative generation, while analytically primed agents adopt more stable strategies in game-theoretic settings. Our framework supports experimenting with structured multi-agent communication protocols and reveals that self-reflection prior to interaction improves cooperation and reasoning quality. To ensure trait persistence, we integrate the official 16Personalities test for automated verification. While our focus is on MBTI, we show that our approach generalizes seamlessly to other psychological frameworks such as Big Five, HEXACO, or Enneagram. By bridging psychological theory and LLM behavior design, we establish a foundation for psychologically enhanced AI agents without any fine-tuning.
△ Less
Submitted 4 September, 2025;
originally announced September 2025.
-
Localization: A Framework to Generalize Extremal Problems
Authors:
Rajat Adak,
L. Sunil Chandran
Abstract:
Extremal graph theory studies the maximum or minimum number of subgraphs isomorphic to a prescribed graph under given constraints. \textit{Localization} has recently emerged as a framework that refines such problems by assigning extremal quantities locally (to vertices or edges) and then aggregating them. This perspective not only recovers classical results but also leads to sharper bounds.
A cl…
▽ More
Extremal graph theory studies the maximum or minimum number of subgraphs isomorphic to a prescribed graph under given constraints. \textit{Localization} has recently emerged as a framework that refines such problems by assigning extremal quantities locally (to vertices or edges) and then aggregating them. This perspective not only recovers classical results but also leads to sharper bounds.
A classical result states that a connected planar graph with a finite girth $g$ satisfies \begin{equation*}
m \leq \frac{g}{g-2}(n-2) \end{equation*} Wood~\cite{wood} derived upper bounds on the number of $K_t$-cliques in graphs of bounded maximum degree, expressed in terms of both the number of vertices and the number of edges: \begin{align*}
ex(n,K_t,K_{1,d+1}) \leq \frac{n}{d+1}\binom{d+1}{t} \\ mex(m,K_t,K_{1,d+1}) \leq \frac{m}{\binom{d+1}{2}}\binom{d+1}{t} \end{align*} More recently, Chakraborty and Chen~\cite{CHAKRABORTI2024103955} established a similar upper bound for graphs with bounded path length: \begin{equation*}
mex(m,K_t,P_{r+1}) \leq \frac{m}{\binom{r}{2}}\binom{r}{t} \end{equation*}
In this paper, we employ the localization framework to improve these bounds and provide structural characterizations of the extremal graphs attaining them.
△ Less
Submitted 14 September, 2025; v1 submitted 28 August, 2025;
originally announced August 2025.
-
Vertex-Based Localization of Generalized Turán Problems
Authors:
Rajat Adak,
L. Sunil Chandran
Abstract:
Let $\mathcal{F}$ be a family of graphs. A graph is called $\mathcal{F}$-free if it does not contain any member of $\mathcal{F}$. Generalized Turán problems aim to maximize the number of copies of a graph $H$ in an $n$-vertex $\mathcal{F}$-free graph. This maximum is denoted by $ex(n, H, \mathcal{F})$. When $H \cong K_2$, it is simply denoted by $ex(n,F)$. Erdős and Gallai established the bounds…
▽ More
Let $\mathcal{F}$ be a family of graphs. A graph is called $\mathcal{F}$-free if it does not contain any member of $\mathcal{F}$. Generalized Turán problems aim to maximize the number of copies of a graph $H$ in an $n$-vertex $\mathcal{F}$-free graph. This maximum is denoted by $ex(n, H, \mathcal{F})$. When $H \cong K_2$, it is simply denoted by $ex(n,F)$. Erdős and Gallai established the bounds $ex(n, P_{k+1}) \leq \frac{n(k-1)}{2}$ and $ex(n, C_{\geq k+1}) \leq \frac{k(n-1)}{2}$. This was later extended by Luo \cite{luo2018maximum}, who showed that $ex(n, K_s, P_{k+1}) \leq \frac{n}{k} \binom{k}{s}$ and $ex(n, K_s, C_{\geq k+1}) \leq \frac{n-1}{k-1} \binom{k}{s}$. Let $N(G,K_s)$ denote the number of copies of $K_s$ in $G$. In this paper, we use the vertex-based localization framework, introduced in \cite{adak2025vertex}, to generalize Luo's bounds. In a graph $G$, for each $v \in V(G)$, define $p(v)$ to be the length of the longest path that contains $v$. We show that \[N(G,K_s) \leq \sum_{v \in V(G)} \frac{1}{p(v)+1}{p(v)+1\choose s} = \frac{1}{s}\sum_{v \in V(G)}{p(v) \choose s-1}\] We strengthen the cycle bound from \cite{luo2018maximum} as follows: In graph $G$, for each $v \in V(G)$, let $c(v)$ be the length of the longest cycle that contains $v$, or $2$ if $v$ is not part of any cycle. We prove that \[N(G,K_s) \leq \left(\sum_{v\in V(G)}\frac{1}{c(v)-1}{c(v) \choose s}\right) - \frac{1}{c(u)-1}{c(u) \choose s}\] where $c(u)$ denotes the circumference of $G$. Furthermore, we characterize the class of extremal graphs that attain equality for these bounds. We provide full proofs for the cases $s = 1$ and $s \geq 3$, while the case $s = 2$ follows from the result in \cite{adak2025vertex}. We also conclude with a generalization of a result by Balister-Bollobás-Riordan-Schelp \cite{BALISTER2003366}.
△ Less
Submitted 24 September, 2025; v1 submitted 28 August, 2025;
originally announced August 2025.
-
Higher-Order Graph Databases
Authors:
Maciej Besta,
Shriram Chandran,
Jakub Cudak,
Patrick Iff,
Marcin Copik,
Robert Gerstenberger,
Tomasz Szydlo,
Jürgen Müller,
Torsten Hoefler
Abstract:
Recent advances in graph databases (GDBs) have been driving interest in large-scale analytics, yet current systems fail to support higher-order (HO) interactions beyond first-order (one-hop) relations, which are crucial for tasks such as subgraph counting, polyadic modeling, and HO graph learning. We address this by introducing a new class of systems, higher-order graph databases (HO-GDBs) that us…
▽ More
Recent advances in graph databases (GDBs) have been driving interest in large-scale analytics, yet current systems fail to support higher-order (HO) interactions beyond first-order (one-hop) relations, which are crucial for tasks such as subgraph counting, polyadic modeling, and HO graph learning. We address this by introducing a new class of systems, higher-order graph databases (HO-GDBs) that use lifting and lowering paradigms to seamlessly extend traditional GDBs with HO. We provide a theoretical analysis of OLTP and OLAP queries, ensuring correctness, scalability, and ACID compliance. We implement a lightweight, modular, and parallelizable HO-GDB prototype that offers native support for hypergraphs, node-tuples, subgraphs, and other HO structures under a unified API. The prototype scales to large HO OLTP & OLAP workloads and shows how HO improves analytical tasks, for example enhancing accuracy of graph neural networks within a GDB by 44%. Our work ensures low latency and high query throughput, and generalizes both ACID-compliant and eventually consistent systems.
△ Less
Submitted 24 June, 2025;
originally announced June 2025.
-
CNFs and DNFs with Exactly $k$ Solutions
Authors:
L. Sunil Chandran,
Rishikesh Gajjala,
Kuldeep S. Meel
Abstract:
Model counting is a fundamental problem that consists of determining the number of satisfying assignments for a given Boolean formula. The weighted variant, which computes the weighted sum of satisfying assignments, has extensive applications in probabilistic reasoning, network reliability, statistical physics, and formal verification. A common approach for solving weighted model counting is to re…
▽ More
Model counting is a fundamental problem that consists of determining the number of satisfying assignments for a given Boolean formula. The weighted variant, which computes the weighted sum of satisfying assignments, has extensive applications in probabilistic reasoning, network reliability, statistical physics, and formal verification. A common approach for solving weighted model counting is to reduce it to unweighted model counting, which raises an important question: {\em What is the minimum number of terms (or clauses) required to construct a DNF (or CNF) formula with exactly $k$ satisfying assignments?}
In this paper, we establish both upper and lower bounds on this question. We prove that for any natural number $k$, one can construct a monotone DNF formula with exactly $k$ satisfying assignments using at most $O(\sqrt{\log k}\log\log k)$ terms. This construction represents the first $o(\log k)$ upper bound for this problem. We complement this result by showing that there exist infinitely many values of $k$ for which any DNF or CNF representation requires at least $Ω(\log\log k)$ terms or clauses. These results have significant implications for the efficiency of model counting algorithms based on formula transformations.
△ Less
Submitted 8 June, 2025;
originally announced June 2025.
-
Expansion-contraction duality breaking in a Planck-scale sensitive cosmological quantum simulator
Authors:
S. Mahesh Chandran,
Uwe R. Fischer
Abstract:
We propose the experimental simulation of cosmological perturbations governed by a Planck-scale induced Lorentz violating dispersion, aimed at distinguishing between early-universe models with similar power spectra. Employing a novel variant of the scaling approach for the evolution of a Bose-Einstein condensate with both contact and dipolar interactions, we show that scale invariance, and in turn…
▽ More
We propose the experimental simulation of cosmological perturbations governed by a Planck-scale induced Lorentz violating dispersion, aimed at distinguishing between early-universe models with similar power spectra. Employing a novel variant of the scaling approach for the evolution of a Bose-Einstein condensate with both contact and dipolar interactions, we show that scale invariance, and in turn, the duality of the power spectrum is broken at large momenta for an inflating gas, and at small momenta for a contracting gas. We thereby furnish a Planck-scale sensitive approach to analogue quantum cosmology that can readily be implemented in the quantum gas laboratory.
△ Less
Submitted 10 June, 2025; v1 submitted 3 June, 2025;
originally announced June 2025.
-
Boxicity of Zero Divisor Graphs
Authors:
L. Sunil Chandran,
Suraj Kumar Sahoo
Abstract:
A $d$-dimensional box is the cartesian product $R_i\times\cdots\times R_d$ where each $R_i$ is a closed interval on the real line. The boxicity of a graph, denoted as $box(G)$, is the minimum integer $d\geq 0$ such that $G$ is the intersection graph of a collection of $d$-dimensional boxes. The study of graph classes associated with algebraic structures is a fascinating area where graph theory and…
▽ More
A $d$-dimensional box is the cartesian product $R_i\times\cdots\times R_d$ where each $R_i$ is a closed interval on the real line. The boxicity of a graph, denoted as $box(G)$, is the minimum integer $d\geq 0$ such that $G$ is the intersection graph of a collection of $d$-dimensional boxes. The study of graph classes associated with algebraic structures is a fascinating area where graph theory and algebra meet. A well-known class of graphs associated with rings is the class of zero divisor graphs introduced by Beck in 1988. Since then, this graph class has been studied extensively by several researchers. Denote by $Z(R)$ the set of zero divisors of a ring $R$. The zero divisor graph $Γ(R)$ for a ring $R$ is defined as the graph with the vertex set $V(Γ(R))=Z(R)$ and $E(Γ(R))=\{\{a_i,a_j\}:a_ia_j\in Z(R)\text{ and }a_ia_j=0 \}$. Let $N=Π_{i=1}^ap_i^{n_i}$ be the prime factorization of $N$. In Discrete Applied Mathematics 365 (2025), pp. 260-269, it was shown that $box(Γ(\mathbb{Z}_N))\leqΠ_{i=1}^a(n_i+1)-Π_{i=1}^a(\lfloor n_i/2\rfloor+1)-1$. In this paper we exactly determine the boxicity of $Γ(\mathbb{Z}_N)$: We show that when $N\equiv 2\pmod 4$ and $N$ is not divisible by $p^3$ for any prime divisor $p$, we have $box(Γ(\mathbb{Z}_N))=a-1$. Otherwise $box(Γ(\mathbb{Z}_N))=a$. Suppose $R$ is a non-zero commutative ring with identity that is also a reduced ring and let $k$ be the size of the set of minimal prime ideals of $R$. In the same paper, it was showed that $box(Γ(R))\leq 2^k-2$. We improve this result by showing $\lfloor k/2\rfloor\leq box(Γ(R))\leq k$ with the same assumption on $R$. In this paper we also show that $a-1\leq\dim_{TH}(Γ(\mathbb{Z}_N))\leq a$ and $\lfloor k/2\rfloor\leq\dim_{TH}(Γ(R))\leq k$, where $\dim_{TH}$ is another dimensional parameter associated with graphs known as the threshold dimension.
△ Less
Submitted 18 May, 2025;
originally announced May 2025.
-
Vertex-Based Localization of Turán's Theorem
Authors:
Rajat Adak,
L. Sunil Chandran
Abstract:
Let $G$ be a simple graph with $n$ vertices and $m$ edges. According to Turán's theorem, if $G$ is $K_{r+1}$-free, then $m \leq |E(T(n, r))|,$ where $T(n, r)$ denotes the Turán graph on $n$ vertices with a maximum clique of order $r$. A limitation of this statement is that it does not give an expression in terms of $n$ and $r$. A widely used version of Turán's theorem states that for an $n$-vertex…
▽ More
Let $G$ be a simple graph with $n$ vertices and $m$ edges. According to Turán's theorem, if $G$ is $K_{r+1}$-free, then $m \leq |E(T(n, r))|,$ where $T(n, r)$ denotes the Turán graph on $n$ vertices with a maximum clique of order $r$. A limitation of this statement is that it does not give an expression in terms of $n$ and $r$. A widely used version of Turán's theorem states that for an $n$-vertex $K_{r+1}$-free graph, $m \leq \left\lfloor \frac{n^2(r-1)}{2r} \right\rfloor.$ Though this bound is often more convenient, it is not the same as the original statement. In particular, the class of extremal graphs for this bound, say $\mathcal{S}$, is a proper subset of the set of Turán graphs. In this paper, we generalize this result as follows: For each $v \in V(G)$, let $c(v)$ be the order of the largest clique that contains $v$. We show that \[ m \leq \left\lfloor\frac{n}{2}\sum_{v\in V(G)}\frac{c(v)-1}{c(v)}\right\rfloor\] Furthermore, we characterize the class of extremal graphs that attain equality in this bound. Interestingly, this class contains two extra non-Turán graphs other than the graphs in $\mathcal{S}$.
△ Less
Submitted 13 May, 2025; v1 submitted 3 April, 2025;
originally announced April 2025.
-
Vertex-Based Localization of Erdős-Gallai Theorems for Paths and Cycles
Authors:
Rajat Adak,
L. Sunil Chandran
Abstract:
For a simple graph $G$, let $n$ and $m$ denote the number of vertices and edges in $G$, respectively. The Erdős-Gallai theorem for paths states that in a simple $P_k$-free graph, $m \leq \frac{n(k-1)}{2}$, where $P_k$ denotes a path with length $k$ (that is, with $k$ edges). In this paper, we generalize this result as follows: For each $v \in V(G)$, let $p(v)$ be the length of the longest path tha…
▽ More
For a simple graph $G$, let $n$ and $m$ denote the number of vertices and edges in $G$, respectively. The Erdős-Gallai theorem for paths states that in a simple $P_k$-free graph, $m \leq \frac{n(k-1)}{2}$, where $P_k$ denotes a path with length $k$ (that is, with $k$ edges). In this paper, we generalize this result as follows: For each $v \in V(G)$, let $p(v)$ be the length of the longest path that contains $v$. We show that \[m \leq \sum_{v \in V(G)} \frac{p(v)}{2}\] The Erdős-Gallai theorem for cycles states that in a simple graph $G$ with circumference (that is, the length of the longest cycle) at most $k$, we have $m \leq \frac{k(n-1)}{2}$. We strengthen this result as follows: For each $v \in V(G)$, let $c(v)$ be the length of the longest cycle that contains $v$, or $2$ if $v$ is not part of any cycle. We prove that \[m \leq \left( \sum_{v \in V(G)} \frac{c(v)}{2} \right) - \frac{c(u)}{2}\] where $c(u)$ denotes the circumference of $G$. \newline Furthermore, we characterize the class of extremal graphs that attain equality in these bounds.
△ Less
Submitted 7 May, 2025; v1 submitted 2 April, 2025;
originally announced April 2025.
-
Sherkala-Chat: Building a State-of-the-Art LLM for Kazakh in a Moderately Resourced Setting
Authors:
Fajri Koto,
Rituraj Joshi,
Nurdaulet Mukhituly,
Yuxia Wang,
Zhuohan Xie,
Rahul Pal,
Daniil Orel,
Parvez Mullah,
Diana Turmakhan,
Maiya Goloburda,
Mohammed Kamran,
Samujjwal Ghosh,
Bokang Jia,
Jonibek Mansurov,
Mukhammed Togmanov,
Debopriyo Banerjee,
Nurkhan Laiyk,
Akhmed Sakip,
Xudong Han,
Ekaterina Kochmar,
Alham Fikri Aji,
Aaryamonvikram Singh,
Alok Anil Jadhav,
Satheesh Katipomu,
Samta Kamboj
, et al. (9 additional authors not shown)
Abstract:
Llama-3.1-Sherkala-8B-Chat, or Sherkala-Chat (8B) for short, is a state-of-the-art instruction-tuned open generative large language model (LLM) designed for Kazakh. Sherkala-Chat (8B) aims to enhance the inclusivity of LLM advancements for Kazakh speakers. Adapted from the LLaMA-3.1-8B model, Sherkala-Chat (8B) is trained on 45.3B tokens across Kazakh, English, Russian, and Turkish. With 8 billion…
▽ More
Llama-3.1-Sherkala-8B-Chat, or Sherkala-Chat (8B) for short, is a state-of-the-art instruction-tuned open generative large language model (LLM) designed for Kazakh. Sherkala-Chat (8B) aims to enhance the inclusivity of LLM advancements for Kazakh speakers. Adapted from the LLaMA-3.1-8B model, Sherkala-Chat (8B) is trained on 45.3B tokens across Kazakh, English, Russian, and Turkish. With 8 billion parameters, it demonstrates strong knowledge and reasoning abilities in Kazakh, significantly outper-forming existing open Kazakh and multilingual models of similar scale while achieving competitive performance in English. To ensure effective and responsible alignment, we leverage translated instruction datasets, a Kazakhstan-specific instruction dataset that is automatically constructed and manually verified, and Kazakh-specific safety data. We release Sherkala-Chat (8B) as an open-weight model, along with a detailed description of its training, alignment, and evaluation, to support research and real-world applications for Kazakh speakers.
△ Less
Submitted 8 October, 2025; v1 submitted 3 March, 2025;
originally announced March 2025.
-
Boxicity and Cubicity of Divisor Graphs and Power Graphs
Authors:
L. Sunil Chandran,
Jinia Ghosh
Abstract:
The \textit{boxicity} (\textit{cubicity}) of an undirected graph $Γ$ is the smallest non-negative integer $k$ such that $Γ$ can be represented as the intersection graph of axis-parallel rectangular boxes (unit cubes) in $\mathbb{R}^k$. An undirected graph is classified as a \textit{comparability graph} if it is isomorphic to the comparability graph of some partial order. This paper studies boxicit…
▽ More
The \textit{boxicity} (\textit{cubicity}) of an undirected graph $Γ$ is the smallest non-negative integer $k$ such that $Γ$ can be represented as the intersection graph of axis-parallel rectangular boxes (unit cubes) in $\mathbb{R}^k$. An undirected graph is classified as a \textit{comparability graph} if it is isomorphic to the comparability graph of some partial order. This paper studies boxicity and cubicity for subclasses of comparability graphs.
We initiate the study of boxicity and cubicity of a special class of algebraically defined comparability graphs, namely the \textit{power graphs}. The power graph of a group is an undirected graph whose vertex set is the group itself, with two elements being adjacent if one is a power of the other. We analyse the case when the underlying groups of power graphs are cyclic. Another important family of comparability graphs is \textit{divisor graphs}, which arises from a number-theoretically defined poset, namely the \textit{divisibility poset}. We consider a subclass of divisor graphs, denoted by $D(n)$, where the vertex set is the set of positive divisors of a natural number $n$.
We first show that to study the boxicity (cubicity) of the power graph of the cyclic group of order $n$, it is sufficient to study the boxicity (cubicity) of $D(n)$. We derive estimates, tight up to a factor of $2$, for the boxicity and cubicity of $D(n)$. The exact estimates hold good for power graphs of cyclic groups.
△ Less
Submitted 27 January, 2025;
originally announced January 2025.
-
Two Results on LPT: A Near-Linear Time Algorithm and Parcel Delivery using Drones
Authors:
L. Sunil Chandran,
Rishikesh Gajjala,
Shravan Mehra,
Saladi Rahul
Abstract:
The focus of this paper is to increase our understanding of the Longest Processing Time First (LPT) heuristic. LPT is a classical heuristic for the fundamental problem of uniform machine scheduling. For different machine speeds, LPT was first considered by Gonzalez et al (SIAM J. Computing, 1977). Since then, extensive work has been done to improve the approximation factor of the LPT heuristic. Ho…
▽ More
The focus of this paper is to increase our understanding of the Longest Processing Time First (LPT) heuristic. LPT is a classical heuristic for the fundamental problem of uniform machine scheduling. For different machine speeds, LPT was first considered by Gonzalez et al (SIAM J. Computing, 1977). Since then, extensive work has been done to improve the approximation factor of the LPT heuristic. However, all known implementations of the LPT heuristic take $O(mn)$ time, where $m$ is the number of machines and $n$ is the number of jobs. In this work, we come up with the first near-linear time implementation for LPT. Specifically, the running time is $O((n+m)(\log^2{m}+\log{n}))$. Somewhat surprisingly, the result is obtained by mapping the problem to dynamic maintenance of lower envelope of lines, which has been well studied in the computational geometry community.
Our second contribution is to analyze the performance of LPT for the Drones Warehouse Problem (DWP), which is a natural generalization of the uniform machine scheduling problem motivated by drone-based parcel delivery from a warehouse. In this problem, a warehouse has multiple drones and wants to deliver parcels to several customers. Each drone picks a parcel from the warehouse, delivers it, and returns to the warehouse (where it can also get charged). The speeds and battery lives of the drones could be different, and due to the limited battery life, each drone has a bounded range in which it can deliver parcels. The goal is to assign parcels to the drones so that the time taken to deliver all the parcels is minimized. We prove that the natural approach of solving this problem via the LPT heuristic has an approximation factor of $φ$, where $φ\approx 1.62$ is the golden ratio.
△ Less
Submitted 30 September, 2024; v1 submitted 23 July, 2024;
originally announced July 2024.
-
Horizon entanglement area law from regular black hole thermodynamics
Authors:
Alessio Belfiglio,
S. Mahesh Chandran,
Orlando Luongo,
Stefano Mancini
Abstract:
We investigate the thermodynamics of regular black hole configurations via quantum analogs of entropy and energy -- namely, the entanglement entropy and entanglement energy -- near the event horizon of Bardeen and Hayward black holes. Following standard approaches, we introduce a quantum scalar field propagating in such black hole spacetimes and discretize the field degrees of freedom on a lattice…
▽ More
We investigate the thermodynamics of regular black hole configurations via quantum analogs of entropy and energy -- namely, the entanglement entropy and entanglement energy -- near the event horizon of Bardeen and Hayward black holes. Following standard approaches, we introduce a quantum scalar field propagating in such black hole spacetimes and discretize the field degrees of freedom on a lattice of spherical shells. We observe that, at leading order, the entanglement entropy associated with the scalar field is proportional to Bekestein-Hawking entropy, while the corresponding entanglement energy scales proportionally to Komar energy. We then compute the heat capacity in both scenarios, discussing the black hole stability conditions and the possible appearance of second-order phase transitions. Finally, we extend our analysis to the black hole core, showing that in this sector entanglement energy serves as a valuable tool towards discriminating between singular and regular solutions.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Krenn-Gu conjecture for sparse graphs
Authors:
L. Sunil Chandran,
Rishikesh Gajjala,
Abraham M. Illickan
Abstract:
Greenberger-Horne-Zeilinger (GHZ) states are quantum states involving at least three entangled particles. They are of fundamental interest in quantum information theory, and the construction of such states of high dimension has various applications in quantum communication and cryptography. They are of fundamental interest in quantum information theory, and the construction of such states of high…
▽ More
Greenberger-Horne-Zeilinger (GHZ) states are quantum states involving at least three entangled particles. They are of fundamental interest in quantum information theory, and the construction of such states of high dimension has various applications in quantum communication and cryptography. They are of fundamental interest in quantum information theory, and the construction of such states of high dimension has various applications in quantum communication and cryptography. Krenn, Gu and Zeilinger discovered a correspondence between a large class of quantum optical experiments which produce GHZ states and edge-weighted edge-coloured multi-graphs with some special properties called the \emph{GHZ graphs}. On such GHZ graphs, a graph parameter called \emph{dimension} can be defined, which is the same as the dimension of the GHZ state produced by the corresponding experiment. Krenn and Gu conjectured that the dimension of any GHZ graph with more than $4$ vertices is at most $2$. An affirmative resolution of the Krenn-Gu conjecture has implications for quantum resource theory. On the other hand, the construction of a GHZ graph on a large number of vertices with a high dimension would lead to breakthrough results.
In this paper, we study the existence of GHZ graphs from the perspective of the Krenn-Gu conjecture and show that the conjecture is true for graphs of vertex connectivity at most 2 and for cubic graphs. We also show that the minimal counterexample to the conjecture should be $4$-connected. Such information could be of great help in the search for GHZ graphs using existing tools like PyTheus. While the impact of the work is in quantum physics, the techniques in this paper are purely combinatorial, and no background in quantum physics is required to understand them.
△ Less
Submitted 28 June, 2024;
originally announced July 2024.
-
Distinguishing bounce and inflation via quantum signatures from cosmic microwave background
Authors:
S. Mahesh Chandran,
S. Shankaranarayanan
Abstract:
Cosmological inflation is a popular paradigm for understanding Cosmic Microwave Background Radiation (CMBR); however, it faces many conceptual challenges. An alternative mechanism to inflation for generating an almost scale-invariant spectrum of perturbations is a \emph{bouncing cosmology} with an initial matter-dominated contraction phase, during which the modes corresponding to currently observe…
▽ More
Cosmological inflation is a popular paradigm for understanding Cosmic Microwave Background Radiation (CMBR); however, it faces many conceptual challenges. An alternative mechanism to inflation for generating an almost scale-invariant spectrum of perturbations is a \emph{bouncing cosmology} with an initial matter-dominated contraction phase, during which the modes corresponding to currently observed scales exited the Hubble radius. Bouncing cosmology avoids the initial singularity but has fine-tuning problems. Taking an \emph{agnostic view} of the two early-universe paradigms, we propose a quantum measure -- Dynamical Fidelity Susceptibility (DFS) of CMBR -- that distinguishes the two scenarios. Taking two simple models with the same power-spectrum, we explicitly show that DFS behaves differently for the two scenarios. We discuss the possibility of using DFS as a distinguisher in the upcoming space missions.
△ Less
Submitted 23 July, 2024; v1 submitted 14 May, 2024;
originally announced May 2024.
-
PathFinder: Attention-Driven Dynamic Non-Line-of-Sight Tracking with a Mobile Robot
Authors:
Shenbagaraj Kannapiran,
Sreenithy Chandran,
Suren Jayasuriya,
Spring Berman
Abstract:
The study of non-line-of-sight (NLOS) imaging is growing due to its many potential applications, including rescue operations and pedestrian detection by self-driving cars. However, implementing NLOS imaging on a moving camera remains an open area of research. Existing NLOS imaging methods rely on time-resolved detectors and laser configurations that require precise optical alignment, making it dif…
▽ More
The study of non-line-of-sight (NLOS) imaging is growing due to its many potential applications, including rescue operations and pedestrian detection by self-driving cars. However, implementing NLOS imaging on a moving camera remains an open area of research. Existing NLOS imaging methods rely on time-resolved detectors and laser configurations that require precise optical alignment, making it difficult to deploy them in dynamic environments. This work proposes a data-driven approach to NLOS imaging, PathFinder, that can be used with a standard RGB camera mounted on a small, power-constrained mobile robot, such as an aerial drone. Our experimental pipeline is designed to accurately estimate the 2D trajectory of a person who moves in a Manhattan-world environment while remaining hidden from the camera's field-of-view. We introduce a novel approach to process a sequence of dynamic successive frames in a line-of-sight (LOS) video using an attention-based neural network that performs inference in real-time. The method also includes a preprocessing selection metric that analyzes images from a moving camera which contain multiple vertical planar surfaces, such as walls and building facades, and extracts planes that return maximum NLOS information. We validate the approach on in-the-wild scenes using a drone for video capture, thus demonstrating low-cost NLOS imaging in dynamic capture environments.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
Graph Burning: Bounds and Hardness
Authors:
Dhanyamol Antony,
L. Sunil Chandran,
Anita Das,
Shirish Gosavi,
Dalu Jacob,
Shashanka Kulamarva
Abstract:
Let $G=(V,E)$ be an undirected graph. The graph burning is defined as follows: at time $t=0$, all vertices in $G$ are unburned. For each time $t\geq 1$, an unburned vertex is chosen to burn, and at each subsequent time, the fire spreads from each burned vertex to all its neighbors. Once a vertex is burned, it remains burned for all future steps. The process continues until all vertices in $V$ are…
▽ More
Let $G=(V,E)$ be an undirected graph. The graph burning is defined as follows: at time $t=0$, all vertices in $G$ are unburned. For each time $t\geq 1$, an unburned vertex is chosen to burn, and at each subsequent time, the fire spreads from each burned vertex to all its neighbors. Once a vertex is burned, it remains burned for all future steps. The process continues until all vertices in $V$ are burned. The burning number of a graph $G$, denoted $b(G)$, is the smallest integer $k$ such that there exists a sequence of vertices $(v_1,v_2,\ldots, v_k)\subseteq V$, where $v_i$ is burned at time $i$, and all vertices in $V$ are burned within time step $k$. The Burning Number problem asks whether the burning number of an input graph $G$ is at most $k$ or not. In this paper, we study the Burning Number problem both from an algorithmic and a structural point of view. The Burning Number problem is known to be NP-complete for interval graphs. Here, we prove that this problem is NP-complete even when restricted to connected proper interval graphs. The well-known burning number conjecture asserts that all the vertices of a graph of order $n$ can be burned in $\lceil \sqrt{n}~\rceil$ steps. In line with this conjecture, the upper and lower bounds of $b(G)$ are well-studied for various graph classes. Here, we provide an improved upper bound for the burning number of connected $P_k$-free graphs and show that the bound is tight up to an additive constant $1$. Finally, we study two variants of the problem, namely edge burning (only edges are burned) and total burning (both vertices and edges are burned). In particular, we establish their relationship with the burning number problem and evaluate the algorithmic complexity of these variants.
△ Less
Submitted 18 October, 2025; v1 submitted 29 February, 2024;
originally announced February 2024.
-
$χ$-binding functions for squares of bipartite graphs and its subclasses
Authors:
Dibyayan Chakraborty,
L. Sunil Chandran,
Dalu Jacob,
Raji R. Pillai
Abstract:
A class of graphs $\mathcal{G}$ is $χ$-bounded if there exists a function $f$ such that $χ(G) \leq f(ω(G))$ for each graph $G \in \mathcal{G}$, where $χ(G)$ and $ω(G)$ are the chromatic and clique number of $G$, respectively. The square of a graph $G$, denoted as $G^2$, is the graph with the same vertex set as $G$ in which two vertices are adjacent when they are at a distance at most two in $G$. I…
▽ More
A class of graphs $\mathcal{G}$ is $χ$-bounded if there exists a function $f$ such that $χ(G) \leq f(ω(G))$ for each graph $G \in \mathcal{G}$, where $χ(G)$ and $ω(G)$ are the chromatic and clique number of $G$, respectively. The square of a graph $G$, denoted as $G^2$, is the graph with the same vertex set as $G$ in which two vertices are adjacent when they are at a distance at most two in $G$. In this paper, we study the $χ$-boundedness of squares of bipartite graphs and its subclasses. Note that the class of squares of graphs, in general, admit a quadratic $χ$-binding function. Moreover there exist bipartite graphs $B$ for which $χ\left(B^2\right)$ is $Ω\left(\frac{\left(ω\left(B^2\right)\right)^2 }{\log ω\left(B^2\right)}\right)$. We first ask the following question: "What sub-classes of bipartite graphs have a linear $χ$-binding function?" We focus on the class of convex bipartite graphs and prove the following result: for any convex bipartite graph $G$, $χ\left(G^2\right) \leq \frac{3 ω\left(G^2\right)}{2}$. Our proof also yields a polynomial-time $3/2$-approximation algorithm for coloring squares of convex bipartite graphs. We then introduce a notion called "partite testable properties" for the squares of bipartite graphs. We say that a graph property $P$ is partite testable for the squares of bipartite graphs if for a bipartite graph $G=(A,B,E)$, whenever the induced subgraphs $G^2[A]$ and $G^2[B]$ satisfies the property $P$ then $G^2$ also satisfies the property $P$. Here, we discuss whether some of the well-known graph properties like perfectness, chordality, (anti-hole)-freeness, etc. are partite testable or not. As a consequence, we prove that the squares of biconvex bipartite graphs are perfect.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Enhanced Activity Reduces the Duration of Intermittent Lévy Walks in Bacterial Turbulence
Authors:
G. Dhananjay,
M. Hemlata,
Saravanan Matheshwaran,
Sivasurender Chandran
Abstract:
Dense bacterial suspensions display collective motion exhibiting coherent flow structures reminiscent of turbulent flows. In contrast to inertial turbulence, understanding the microscopic dynamics of bacterial fluid elements undergoing collective motion is in its incipient stages. Here, we report experiments revealing correlations between the microscopic dynamics and the emergence of collective mo…
▽ More
Dense bacterial suspensions display collective motion exhibiting coherent flow structures reminiscent of turbulent flows. In contrast to inertial turbulence, understanding the microscopic dynamics of bacterial fluid elements undergoing collective motion is in its incipient stages. Here, we report experiments revealing correlations between the microscopic dynamics and the emergence of collective motion in bacterial suspensions. Our detailed analysis of the passive tracers and the velocity field of the bacterial suspensions allowed us to systematically correlate the Lagrangian and the Eulerian perspectives. Bacteria within the collective dynamics revealed initial ballistic dynamics followed by intermittent Lévy walk before the eventual decay to random Gaussian fluctuations. Intriguingly, the persistence length and time of the fluid motion decrease with an increase in the activity, which, in turn, reduces the duration of Lévy walk. Our results reveal transitions in microscopic dynamics underlying the bacterial turbulence and their control via the intrinsic time scales set by the effective activity of the flow.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Real-space quantum-to-classical transition of time dependent background fluctuations
Authors:
S. Mahesh Chandran,
Karthik Rajeev,
S. Shankaranarayanan
Abstract:
Understanding the emergence of classical behavior from a quantum theory is vital to establishing the quantum origin for the temperature fluctuations observed in the Cosmic Microwave Background (CMB). We show that a real-space approach can comprehensively address the quantum-to-classical transition problem in the leading order of curvature perturbations. To this end, we test spatial bipartitions of…
▽ More
Understanding the emergence of classical behavior from a quantum theory is vital to establishing the quantum origin for the temperature fluctuations observed in the Cosmic Microwave Background (CMB). We show that a real-space approach can comprehensively address the quantum-to-classical transition problem in the leading order of curvature perturbations. To this end, we test spatial bipartitions of quadratic systems for the interplay between three different signatures of classical behavior: i) decoherence, ii) peaking of the Wigner function about classical trajectories, and iii) relative suppression of non-commutativity in observables. We extract these signatures from the covariance matrix of a multi-mode Gaussian state and address them primarily in terms of entanglement entropy and log-classicality. Through a phase-space stability analysis of spatial sub-regions via their reduced Wigner function, we ascertain that the underlying cause for the dominance of classicality signatures is the occurrence of gapped inverted mode instabilities. While the choice of conjugate variables enhances some of these signatures, decoherence studied via entanglement entropy is the stronger and more reliable condition for classicality to emerge. We demonstrate the absence of decoherence, which preempts a quantum-to-classical transition of scalar fluctuations in an expanding background in $(1+1)$-dimensions using two examples: i) a Tanh-like expansion and ii) a de-Sitter expansion. We provide connection between log classicality and particle number by studying the evolution of each normal mode at late times. We then extend the analysis to leading order fluctuations in $(3+1)-$dimensions to show that a quantum-to-classical transition occurs in the de-Sitter expansion and discuss the relevance of our analysis in distinguishing cosmological models.
△ Less
Submitted 11 December, 2023; v1 submitted 25 July, 2023;
originally announced July 2023.
-
Cloud Render Farm Services Discovery Using NLP And Ontology Based Knowledge Graph
Authors:
Ruby Annette,
Aisha Banu,
Sharon Priya,
Subash Chandran
Abstract:
Cloud render farm services are the animation domain specific cloud services Platform-as-a-Service (PaaS) type of cloud services that provides a complete platform to render the animation files. However, identifying the render farm services that is cost effective and also matches the functional requirements that changes for almost every project like the animation software, plug-ins required etc., is…
▽ More
Cloud render farm services are the animation domain specific cloud services Platform-as-a-Service (PaaS) type of cloud services that provides a complete platform to render the animation files. However, identifying the render farm services that is cost effective and also matches the functional requirements that changes for almost every project like the animation software, plug-ins required etc., is a challenge. This research work proposes an ontology-based service discovery engine named RenderSelect for the cloud render farm services. The cloud render farm ontology semantically defines the relationship among the cloud render farm services. The knowledge-based reasoning algorithms namely, the Concept similarity reasoning, Equivalent reasoning and the Numerical similarity reasoning have been applied to determine the similarity among the cloud services. The service discovery engine was evaluated for finding the services under three different scenarios namely a) with help of the ontology, b) without the help of the ontology and c) using a common search engine on the internet. The results show that the proposed service discovery engine which is specifically designed for the cloud render farm services using the ontology performs significantly better than the other two.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
Total Domination, Separated Clusters, CD-Coloring: Algorithms and Hardness
Authors:
Dhanyamol Antony,
L. Sunil Chandran,
Ankit Gayen,
Shirish Gosavi,
Dalu Jacob
Abstract:
Domination and coloring are two classic problems in graph theory. The major focus of this paper is the CD-COLORING problem which combines the flavours of domination and colouring. Let $G$ be an undirected graph. A proper vertex coloring of $G$ is a $cd-coloring$ if each color class has a dominating vertex in $G$. The minimum integer $k$ for which there exists a $cd-coloring$ of $G$ using $k$ color…
▽ More
Domination and coloring are two classic problems in graph theory. The major focus of this paper is the CD-COLORING problem which combines the flavours of domination and colouring. Let $G$ be an undirected graph. A proper vertex coloring of $G$ is a $cd-coloring$ if each color class has a dominating vertex in $G$. The minimum integer $k$ for which there exists a $cd-coloring$ of $G$ using $k$ colors is called the cd-chromatic number, $χ_{cd}(G)$. A set $S\subseteq V(G)$ is a total dominating set if any vertex in $G$ has a neighbor in $S$. The total domination number, $γ_t(G)$ of $G$ is the minimum integer $k$ such that $G$ has a total dominating set of size $k$. A set $S\subseteq V(G)$ is a $separated-cluster$ if no two vertices in $S$ lie at a distance 2 in $G$. The separated-cluster number, $ω_s(G)$, of $G$ is the maximum integer $k$ such that $G$ has a separated-cluster of size $k$.
In this paper, first we explore the connection between CD-COLORING and TOTAL DOMINATION. We prove that CD-COLORING and TOTAL DOMINATION are NP-Complete on triangle-free $d$-regular graphs for each fixed integer $d\geq 3$. We also study the relationship between the parameters $χ_{cd}(G)$ and $ω_s(G)$. Analogous to the well-known notion of `perfectness', here we introduce the notion of `cd-perfectness'. We prove a sufficient condition for a graph $G$ to be cd-perfect (i.e. $χ_{cd}(H)= ω_s(H)$, for any induced subgraph $H$ of $G$) which is also necessary for certain graph classes (like triangle-free graphs). Here, we propose a generalized framework via which we obtain several exciting consequences in the algorithmic complexities of special graph classes. In addition, we settle an open problem by showing that the SEPARATED-CLUSTER is polynomially solvable for interval graphs.
△ Less
Submitted 30 September, 2024; v1 submitted 22 July, 2023;
originally announced July 2023.
-
A Framework for Securing Health Information Using Blockchain in Cloud Hosted Cyber Physical Systems
Authors:
Aisha Banu,
Sharon Priya S,
Poojitha K,
Kiruthiga R,
Ruby Annette,
Subash Chandran
Abstract:
Electronic Health Records (EHRs) have undergone numerous technical improvements in recent years, including the incorporation of mobile devices with the cloud computing technologies to facilitate medical data exchanges between patients and the healthcare professionals. This cutting-edge architecture enables cyber physical systems housed in the cloud to provide healthcare services with minimal opera…
▽ More
Electronic Health Records (EHRs) have undergone numerous technical improvements in recent years, including the incorporation of mobile devices with the cloud computing technologies to facilitate medical data exchanges between patients and the healthcare professionals. This cutting-edge architecture enables cyber physical systems housed in the cloud to provide healthcare services with minimal operational costs, high flexibility, security, and EHR accessibility. If patient health information is stored in the hospital database, there will always be a risk of intrusion, i.e., unauthorized file access and information modification by attackers. To address this concern, we propose a decentralized EHR system based on Blockchain technology. To facilitate secure EHR exchange across various patients and medical providers, we develop a reliable access control method based on smart contracts. We incorporate Cryptocurrency, specifically Ethereum, in the suggested system to protect sensitive health information from potential attackers. In our suggested approach, both physicians and patients are required to be authenticated. Patients can register, and a block with a unique hash value will be generated. Once the patient discusses the disease with the physician, the physician can check the patient's condition and offer drugs. For experimental findings, we employ the public Block chain Ganache and solidity remix-based smart contracts to protect privacy. Ethers are used as the crypto currencies.
△ Less
Submitted 25 June, 2023;
originally announced June 2023.
-
Taxonomy of AISecOps Threat Modeling for Cloud Based Medical Chatbots
Authors:
Ruby Annette J,
Aisha Banu,
Sharon Priya S,
Subash Chandran
Abstract:
Artificial Intelligence (AI) is playing a vital role in all aspects of technology including cyber security. Application of Conversational AI like the chatbots are also becoming very popular in the medical field to provide timely and immediate medical assistance to patients in need. As medical chatbots deal with a lot of sensitive information, the security of these chatbots is crucial. To secure th…
▽ More
Artificial Intelligence (AI) is playing a vital role in all aspects of technology including cyber security. Application of Conversational AI like the chatbots are also becoming very popular in the medical field to provide timely and immediate medical assistance to patients in need. As medical chatbots deal with a lot of sensitive information, the security of these chatbots is crucial. To secure the confidentiality, integrity, and availability of cloud-hosted assets like these, medical chatbots can be monitored using AISecOps (Artificial Intelligence for Secure IT Operations). AISecOPs is an emerging field that integrates three different but interrelated domains like the IT operation, AI, and security as one domain, where the expertise from all these three domains are used cohesively to secure the cyber assets. It considers cloud operations and security in a holistic framework to collect the metrics required to assess the security threats and train the AI models to take immediate actions. This work is focused on applying the STRIDE threat modeling framework to model the possible threats involved in each component of the chatbot to enable the automatic threat detection using the AISecOps techniques. This threat modeling framework is tailored to the medical chatbots that involves sensitive data sharing but could also be applied for chatbots used in other sectors like the financial services, public sector, and government sectors that are concerned with security and compliance.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Dynamic Ineffectuality-based Clustered Architectures
Authors:
Rajshekar Kalayappan,
Sandeep Chandran
Abstract:
The direction of conditional branches is predicted correctly in modern processors with great accuracy. We find several instructions in the dynamic instruction stream that contribute only towards computing the condition of these instructions. Hence, when the predicted direction of conditional branches is indeed correct, these instructions become Ineffectual - the functional state of the program wou…
▽ More
The direction of conditional branches is predicted correctly in modern processors with great accuracy. We find several instructions in the dynamic instruction stream that contribute only towards computing the condition of these instructions. Hence, when the predicted direction of conditional branches is indeed correct, these instructions become Ineffectual - the functional state of the program would not be different had these instructions been dropped. However, the execution of ineffectual instructions cannot be avoided altogether because it is possible that the prediction of the branch direction is wrong. In this work, we determine all sources of ineffectuality in an instruction stream such as conditional branches, predicated instructions, indirect jumps and dynamically dead instructions. Then, we propose a technique to steer the ineffectual instructions away from the primary execution cluster so that effectual instructions can execute uncontended. We find that such ineffectuality-based clustering of instructions naturally simplifies the design and avoids several caveats of a clustered architecture. Finally, we propose a technique to detect instances when instructions were incorrectly marked as ineffectual, say due to a branch misprediction, and recover the pipeline. The empirical evaluation of the proposed changes on the SPEC CPU2017 and GAPBS benchmarks show performance uplifts of up to 4.9% and 10.3% on average respectively.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
Graph-theoretic insights on the constructability of complex entangled states
Authors:
L. Sunil Chandran,
Rishikesh Gajjala
Abstract:
The most efficient automated way to construct a large class of quantum photonic experiments is via abstract representation of graphs with certain properties. While new directions were explored using Artificial intelligence and SAT solvers to find such graphs, it becomes computationally infeasible to do so as the size of the graph increases. So, we take an analytical approach and introduce the tech…
▽ More
The most efficient automated way to construct a large class of quantum photonic experiments is via abstract representation of graphs with certain properties. While new directions were explored using Artificial intelligence and SAT solvers to find such graphs, it becomes computationally infeasible to do so as the size of the graph increases. So, we take an analytical approach and introduce the technique of local sparsification on experiment graphs, using which we answer a crucial open question in experimental quantum optics, namely whether certain complex entangled quantum states can be constructed. This provides us with more insights into quantum resource theory, the limitation of specific quantum photonic systems and initiates the use of graph-theoretic techniques for designing quantum physics experiments.
△ Less
Submitted 1 July, 2024; v1 submitted 13 April, 2023;
originally announced April 2023.
-
s-Club Cluster Vertex Deletion on Interval and Well-Partitioned Chordal Graphs
Authors:
Dibyayan Chakraborty,
L. Sunil Chandran,
Sajith Padinhatteeri,
Raji. R. Pillai
Abstract:
In this paper, we study the computational complexity of \textsc{$s$-Club Cluster Vertex Deletion}. Given a graph, \textsc{$s$-Club Cluster Vertex Deletion ($s$-CVD)} aims to delete the minimum number of vertices from the graph so that each connected component of the resulting graph has a diameter at most $s$. When $s=1$, the corresponding problem is popularly known as \sloppy \textsc{Cluster Verte…
▽ More
In this paper, we study the computational complexity of \textsc{$s$-Club Cluster Vertex Deletion}. Given a graph, \textsc{$s$-Club Cluster Vertex Deletion ($s$-CVD)} aims to delete the minimum number of vertices from the graph so that each connected component of the resulting graph has a diameter at most $s$. When $s=1$, the corresponding problem is popularly known as \sloppy \textsc{Cluster Vertex Deletion (CVD)}. We provide a faster algorithm for \textsc{$s$-CVD} on \emph{interval graphs}. For each $s\geq 1$, we give an $O(n(n+m))$-time algorithm for \textsc{$s$-CVD} on interval graphs with $n$ vertices and $m$ edges. In the case of $s=1$, our algorithm is a slight improvement over the $O(n^3)$-time algorithm of Cao \etal (Theor. Comput. Sci., 2018) and for $s \geq 2$, it significantly improves the state-of-the-art running time $\left(O\left(n^4\right)\right)$.
We also give a polynomial-time algorithm to solve \textsc{CVD} on \emph{well-partitioned chordal graphs}, a graph class introduced by Ahn \etal (\textsc{WG 2020}) as a tool for narrowing down complexity gaps for problems that are hard on chordal graphs, and easy on split graphs. Our algorithm relies on a characterisation of the optimal solution and on solving polynomially many instances of the \textsc{Weighted Bipartite Vertex Cover}. This generalises a result of Cao \etal (Theor. Comput. Sci., 2018) on split graphs.
We also show that for any even integer $s\geq 2$, \textsc{$s$-CVD} is NP-hard on well-partitioned chordal graphs.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
List recoloring of planar graphs
Authors:
L. Sunil Chandran,
Uttam K. Gupta,
Dinabandhu Pradhan
Abstract:
A list assignment $L$ of a graph $G$ is a function that assigns to every vertex $v$ of $G$ a set $L(v)$ of colors. A proper coloring $α$ of $G$ is called an $L$-coloring of $G$ if $α(v)\in L(v)$ for every $v\in V(G)$. For a list assignment $L$ of $G$, the $L$-recoloring graph $\mathcal{G}(G,L)$ of $G$ is a graph whose vertices correspond to the $L$-colorings of $G$ and two vertices of…
▽ More
A list assignment $L$ of a graph $G$ is a function that assigns to every vertex $v$ of $G$ a set $L(v)$ of colors. A proper coloring $α$ of $G$ is called an $L$-coloring of $G$ if $α(v)\in L(v)$ for every $v\in V(G)$. For a list assignment $L$ of $G$, the $L$-recoloring graph $\mathcal{G}(G,L)$ of $G$ is a graph whose vertices correspond to the $L$-colorings of $G$ and two vertices of $\mathcal{G}(G,L)$ are adjacent if their corresponding $L$-colorings differ at exactly one vertex of $G$. A $d$-face in a plane graph is a face of length $d$. Dvořák and Feghali conjectured for a planar graph $G$ and a list assignment $L$ of $G$, that: (i) If $|L(v)|\geq 10$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is $O(|V(G)|)$. (ii) If $G$ is triangle-free and $|L(v)|\geq 7$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is $O(|V(G)|)$. In a recent paper, Cranston (European J. Combin. (2022)) has proved (ii). In this paper, we prove the following results. Let $G$ be a plane graph and $L$ be a list assignment of $G$.
$\bullet$ If for every $3$-face of $G$, there are at most two $3$-faces adjacent to it and $|L(v)|\geq 10$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $190|V(G)|$.
$\bullet$ If for every $3$-face of $G$, there is at most one $3$-face adjacent to it and $|L(v)|\geq 9$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $13|V(G)|$.
$\bullet$ If the faces adjacent to any $3$-face have length at least $6$ and $|L(v)|\geq 7$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $242|V(G)|$. This result strengthens the Cranston's result on (ii).
△ Less
Submitted 29 November, 2022; v1 submitted 13 September, 2022;
originally announced September 2022.
-
The Effect of Duschinskii Rotations on Spin-Dependent Electron Transfer Dynamics
Authors:
Suraj S. Chandran,
Yanze Wu,
Joseph E. Subotnik
Abstract:
We investigate spin-dependent electron transfer in the presence of a Duschinskii rotation. In particular, we propagate dynamics for a two-level model system for which spin-orbit coupling introduces an interstate coupling of the form $e^{iWx}$, which is both position(x)-dependent and complex-valued. We demonstrate that two-level systems coupled to Brownian oscillators with Duschinskii rotations (an…
▽ More
We investigate spin-dependent electron transfer in the presence of a Duschinskii rotation. In particular, we propagate dynamics for a two-level model system for which spin-orbit coupling introduces an interstate coupling of the form $e^{iWx}$, which is both position(x)-dependent and complex-valued. We demonstrate that two-level systems coupled to Brownian oscillators with Duschinskii rotations (and thus entangled normal modes) can produce marked increases in transient spin polarization relative to two-level systems coupled to simple shifted harmonic oscillators. These conclusions should have significant relevance for modeling the effect of nuclear motion on chiral induced spin selectivity.
△ Less
Submitted 29 August, 2022;
originally announced August 2022.
-
Dynamical scaling symmetry and asymptotic quantum correlations for time-dependent scalar fields
Authors:
S. Mahesh Chandran,
S. Shankaranarayanan
Abstract:
In time-independent quantum systems, entanglement entropy possesses an inherent scaling symmetry that the energy of the system does not have. The symmetry also assures that entropy divergence can be associated with the zero modes. We generalize this symmetry to time-dependent systems all the way from a coupled harmonic oscillator with a time-dependent frequency, to quantum scalar fields with time-…
▽ More
In time-independent quantum systems, entanglement entropy possesses an inherent scaling symmetry that the energy of the system does not have. The symmetry also assures that entropy divergence can be associated with the zero modes. We generalize this symmetry to time-dependent systems all the way from a coupled harmonic oscillator with a time-dependent frequency, to quantum scalar fields with time-dependent mass. We show that such systems have dynamical scaling symmetry that leaves the evolution of various measures of quantum correlations invariant -- entanglement entropy, GS fidelity, Loschmidt echo, and circuit complexity. Using this symmetry, we show that several quantum correlations are related at late-times when the system develops instabilities. We then quantify such instabilities in terms of scrambling time and Lyapunov exponents. The delayed onset of exponential decay of the Loschmidt echo is found to be determined by the largest inverted mode in the system. On the other hand, a zero-mode retains information about the system for a considerably longer time, finally resulting in a power-law decay of the Loschmidt echo. We extend the analysis to time-dependent massive scalar fields in $(1 + 1)-$dimensions and discuss the implications of zero-modes and inverted modes occurring in the system at late-times. We explicitly show the entropy scaling oscillates between the \emph{area-law} and \emph{volume-law} for a scalar field with stable modes or zero-modes. We then provide a qualitative discussion of the above effects for scalar fields in cosmological and black-hole space-times.
△ Less
Submitted 16 December, 2022; v1 submitted 26 May, 2022;
originally announced May 2022.
-
Reversible Dewetting of Thin Lubricating Films Underneath Aqueous Drops Using External Electric Field
Authors:
Bidisha Bhatt,
Shivam Gupta,
Vasudevan Sumathi,
Sivasurender Chandran,
Krishnacharya Khare
Abstract:
The stability of thin liquid films on a surface depends on the excess free energy of the system involving various short-range and long-range interactions. In an unstable condition, thin liquid films may dewet into multiple small-sized droplets via spinodal, homogeneous, or heterogeneous nucleation process. However, if the total excess free energy of the system can be manipulated using an external…
▽ More
The stability of thin liquid films on a surface depends on the excess free energy of the system involving various short-range and long-range interactions. In an unstable condition, thin liquid films may dewet into multiple small-sized droplets via spinodal, homogeneous, or heterogeneous nucleation process. However, if the total excess free energy of the system can be manipulated using an external stimulus, one can control the stability of thin liquid films on demand. Here, we study the reversible dewetting process of thin lubricating films underneath aqueous drops on slippery surfaces using an external electric field. Upon applying voltage, stable thin lubricating films dewet in a manner identical to the spinodal dewetting of nanometer-thick liquid films. Upon removing the applied voltage, the dewetted droplets spread, coalesce with neighboring ones, and form a uniform film again, however the time taken during rewetting is very different compared to dewetting. The characteristic features of both the dewetting and rewetting processes are present over multiple cycles. Due to the random nature of the spinodal dewetting process, the final dewetting pattern does not show any correlation over multiple dewetting cycles.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
Electron Transfer and Spin-Orbit Coupling: How Strong are Berry Force Effects In and Out of Equilibrium in the Presence of Nuclear Friction?
Authors:
Suraj Chandran,
Yanze Wu,
Hung-Hsuan Teh,
David H. Waldeck,
Joseph E. Subotnik
Abstract:
We investigate a spin-boson inspired model of electron transfer, where the diabatic coupling is given by a position-dependent phase, exp(iWx). We consider both equilibrium and nonequilibrium initial conditions. We show that, for this model, all equilibrium results are completely invariant to the sign of W(to infinite order). However, the nonequilibrium results do depend on the sign of W, suggestin…
▽ More
We investigate a spin-boson inspired model of electron transfer, where the diabatic coupling is given by a position-dependent phase, exp(iWx). We consider both equilibrium and nonequilibrium initial conditions. We show that, for this model, all equilibrium results are completely invariant to the sign of W(to infinite order). However, the nonequilibrium results do depend on the sign of W, suggesting that photo-induced electron transfer dynamics are meaningfully affected by Berry forces even in the presence of nuclear friction; furthermore, whenever there is spin-orbit coupling, electronic spin polarization can emerge (at least for some time).
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Edge-coloured graphs with only monochromatic perfect matchings and their connection to quantum physics
Authors:
L. Sunil Chandran,
Rishikesh Gajjala
Abstract:
Krenn, Gu and Zeilinger initiated the study of PMValid edge-colourings because of its connection to a problem from quantum physics. A graph is defined to have a PMValid $k$-edge-colouring if it admits a $k$-edge-colouring (i.e. an edge colouring with $k$-colours) with the property that all perfect matchings are monochromatic and each of the $k$ colour classes contain at least one perfect matching.…
▽ More
Krenn, Gu and Zeilinger initiated the study of PMValid edge-colourings because of its connection to a problem from quantum physics. A graph is defined to have a PMValid $k$-edge-colouring if it admits a $k$-edge-colouring (i.e. an edge colouring with $k$-colours) with the property that all perfect matchings are monochromatic and each of the $k$ colour classes contain at least one perfect matching.
The matching index of a graph $G$, $μ(G)$ is defined as the maximum value of $k$ for which $G$ admits a PMValid $k$-edge-colouring. It is easy to see that $μ(G)\geq 1$ if and only if $G$ has a perfect matching (due to the trivial $1$-edge-colouring which is PMValid). Bogdanov observed that for all graphs non-isomorphic to $K_4$, $μ(G)\leq 2$ and $μ(K_4)=3$. However, the characterisation of graphs for which $μ(G)=1$ and $μ(G)=2$ is not known. In this work, we answer this question. Using this characterisation, we also give a fast algorithm to compute $μ(G)$ of a graph $G$. In view of our work, the structure of PMValid $k$-edge-colourable graphs is now fully understood for all $k$. Our characterisation, also has an implication to the aforementioned quantum physics problem. In particular, it settles a conjecture of Krenn and Gu for a sub-class of graphs.
△ Less
Submitted 20 November, 2023; v1 submitted 11 February, 2022;
originally announced February 2022.
-
Towards Scalable, Energy-Efficient and Ultra-Fast Optical SRAM
Authors:
Ramesh Kudalippalliyalil,
Sujith Chandran,
Ajey P. Jacob,
Akhilesh Jaiswal
Abstract:
Optical static random access memory (O-SRAM) is one of the key components required for achieving the goal of ultra-fast, general-purpose optical computing. We propose and design a novel O-SRAM using fabrication-friendly photonics device components such as cross-coupled micro-ring resonators and photodiodes. Based on the chosen photonic components, the memory operates at a speed of 20 Gb/s and requ…
▽ More
Optical static random access memory (O-SRAM) is one of the key components required for achieving the goal of ultra-fast, general-purpose optical computing. We propose and design a novel O-SRAM using fabrication-friendly photonics device components such as cross-coupled micro-ring resonators and photodiodes. Based on the chosen photonic components, the memory operates at a speed of 20 Gb/s and requires ultra-low static (switching) energy of ~ 16.7 aJ/bit (~ 1.04 pJ/bit) to store a single bit. The footprint of the bit cell is ~ 2400 μm^2. The proposed O-SRAM can be configured in a 2D memory array by replicating the bit-cells along rows and columns for creating ultra-large scale on-chip optical memory sub-system. Such manufacturing-friendly, large-scale optical-SRAM could form the underlying memory backbone for photonics integrated circuits with wide applications in novel computing and networking.
△ Less
Submitted 24 November, 2021;
originally announced November 2021.
-
Variants of the Gyàrfàs-Sumner Conjecture: Oriented Trees and Rainbow Paths
Authors:
Manu Basavaraju,
L. Sunil Chandran,
Mathew C. Francis,
Karthik Murali
Abstract:
Given a finite family $\mathcal{F}$ of graphs, we say that a graph $G$ is "$\mathcal{F}$-free" if $G$ does not contain any graph in $\mathcal{F}$ as a subgraph. A vertex-colored graph $H$ is called "rainbow" if no two vertices of $H$ have the same color. Given an integer $s$ and a finite family of graphs $\mathcal{F}$, let $\ell(s,\mathcal{F})$ denote the smallest integer such that any properly ve…
▽ More
Given a finite family $\mathcal{F}$ of graphs, we say that a graph $G$ is "$\mathcal{F}$-free" if $G$ does not contain any graph in $\mathcal{F}$ as a subgraph. A vertex-colored graph $H$ is called "rainbow" if no two vertices of $H$ have the same color. Given an integer $s$ and a finite family of graphs $\mathcal{F}$, let $\ell(s,\mathcal{F})$ denote the smallest integer such that any properly vertex-colored $\mathcal{F}$-free graph $G$ having $χ(G)\geq\ell(s,\mathcal{F})$ contains an induced rainbow path on $s$ vertices. Scott and Seymour showed that $\ell(s,K)$ exists for every complete graph $K$. A conjecture of N. R. Aravind states that $\ell(s,C_3)=s$. The upper bound on $\ell(s,C_3)$ that can be obtained using the methods of Scott and Seymour setting $K=C_3$ are, however, super-exponential. Gyárfás and Sárközy showed that $\ell(s,\{C_3,C_4\})=\mathcal{O}\big((2s)^{2s}\big)$. For $r\geq 2$, we show that $\ell(s,K_{2,r})\leq (r-1)(s-1)(s-2)/2+s$ and therefore, $\ell(s,C_4)\leq\frac{s^2-s+2}{2}$. This significantly improves Gyárfás and Sárközy's bound and also covers a bigger class of graphs. We adapt our proof to achieve much stronger upper bounds for graphs of higher girth: we prove that $\ell(s,\{C_3,C_4,\ldots,C_{g-1}\})\leq s^{1+\frac{4}{g-4}}$, where $g\geq 5$. Moreover, in each case, our results imply the existence of at least $s!/2$ distinct induced rainbow paths on $s$ vertices. Along the way, we obtain some results on related problems on oriented graphs. For $r\geq 2$, let $\mathcal{B}_r$ denote the orientations of $K_{2,r}$ in which one vertex has out-degree or in-degree $r$. We show that every $\mathcal{B}_r$-free oriented graph $G$ having $χ(G)\geq (r-1)(s-1)(s-2)+2s+1$ and every bikernel-perfect oriented graph $G$ with girth $g\geq 5$ having $χ(G)\geq 2s^{1+\frac{4}{g-4}}$ contains every $s$ vertex oriented tree as an induced subgraph.
△ Less
Submitted 16 June, 2024; v1 submitted 25 November, 2021;
originally announced November 2021.
-
Can viewer proximity be a behavioural marker for Autism Spectrum Disorder?
Authors:
Rahul Bishain,
Bhismadev Chakrabarti,
Jayashree Dasgupta,
Indu Dubey,
Sharat Chandran
Abstract:
Screening for any of the Autism Spectrum Disorders is a complicated process often involving a hybrid of behavioural observations and questionnaire based tests. Typically carried out in a controlled setting, this process requires trained clinicians or psychiatrists for such assessments. Riding on the wave of technical advancement in mobile platforms, several attempts have been made at incorporating…
▽ More
Screening for any of the Autism Spectrum Disorders is a complicated process often involving a hybrid of behavioural observations and questionnaire based tests. Typically carried out in a controlled setting, this process requires trained clinicians or psychiatrists for such assessments. Riding on the wave of technical advancement in mobile platforms, several attempts have been made at incorporating such assessments on mobile and tablet devices. In this paper we analyse videos generated using one such screening test. This paper reports the first use of the efficacy of using the observer's distance from the display screen while administering a sensory sensitivity test as a behavioural marker for autism for children aged 2-7 years The potential for using a test such as this in casual home settings is promising.
△ Less
Submitted 6 December, 2021; v1 submitted 7 November, 2021;
originally announced November 2021.
-
Weakening Total Coloring Conjecture: Weak TCC and Hadwiger's Conjecture on Total Graphs
Authors:
Manu Basavaraju,
L. Sunil Chandran,
Mathew C. Francis,
Ankur Naskar
Abstract:
Hadwiger's conjecture is one of the most important and long-standing conjectures in graph theory. Reed and Seymour showed in 2004 that Hadwiger's conjecture is true for line graphs. We investigate this conjecture on the closely related class of total graphs. The total graph of $G$, denoted by $T(G)$, is defined on the vertex set $V(G)\sqcup E(G)$ with $c_1,c_2\in V(G)\sqcup E(G)$ adjacent whenever…
▽ More
Hadwiger's conjecture is one of the most important and long-standing conjectures in graph theory. Reed and Seymour showed in 2004 that Hadwiger's conjecture is true for line graphs. We investigate this conjecture on the closely related class of total graphs. The total graph of $G$, denoted by $T(G)$, is defined on the vertex set $V(G)\sqcup E(G)$ with $c_1,c_2\in V(G)\sqcup E(G)$ adjacent whenever $c_1$ and $c_2$ are adjacent to or incident on each other in $G$. We first show that there exists a constant $C$ such that, if the connectivity of $G$ is at least $C$, then Hadwiger's conjecture is true for $T(G)$. The total chromatic number $χ"(G)$ of a graph $G$ is defined to be equal to the chromatic number of its total graph. That is, $χ"(G)=χ(T(G))$. Another well-known conjecture in graph theory, the total coloring conjecture or TCC, states that for every graph $G$, $χ"(G)\leqΔ(G)+2$, where $Δ(G)$ is the maximum degree of $G$. We show that if a weaker version of the total coloring conjecture (weak TCC) namely, $χ"(G)\leqΔ(G)+3$, is true for a class of graphs $\mathcal{F}$ that is closed under the operation of taking subgraphs, then Hadwiger's conjecture is true for the class of total graphs of graphs in $\mathcal{F}$. This motivated us to look for classes of graphs that satisfy weak TCC. It may be noted that a complete proof of TCC for even 4-colorable graphs (in fact even for planar graphs) has remained elusive even after decades of effort; but weak TCC can be proved easily for 4-colorable graphs. We noticed that in spite of the interest in studying $χ"(G)$ in terms of $χ(G)$ right from the initial days, weak TCC is not proven to be true for $k$-colorable graphs even for $k=5$. In the second half of the paper, we make a contribution to the literature on total coloring by proving that $χ"(G)\leqΔ(G)+3$ for every 5-colorable graph $G$.
△ Less
Submitted 25 January, 2022; v1 submitted 21 July, 2021;
originally announced July 2021.
-
Log to log-log crossover of entanglement in $(1+1)-$ dimensional massive scalar field
Authors:
Parul Jain,
S. Mahesh Chandran,
S. Shankaranarayanan
Abstract:
We study three different measures of quantum correlations -- entanglement spectrum, entanglement entropy, and logarithmic negativity -- for (1+1)-dimensional massive scalar field in flat spacetime. The entanglement spectrum for the discretized scalar field in the ground state indicates a cross-over in the zero-mode regime, which is further substantiated by an analytical treatment of both entanglem…
▽ More
We study three different measures of quantum correlations -- entanglement spectrum, entanglement entropy, and logarithmic negativity -- for (1+1)-dimensional massive scalar field in flat spacetime. The entanglement spectrum for the discretized scalar field in the ground state indicates a cross-over in the zero-mode regime, which is further substantiated by an analytical treatment of both entanglement entropy and logarithmic negativity. The exact nature of this cross-over depends on the boundary conditions used -- the leading order term switches from a $\log$ to $\log-\log$ behavior for the Periodic and Neumann boundary conditions. In contrast, for Dirichlet, it is the parameters within the leading $\log-\log$ term that are switched. We show that this cross-over manifests as a change in the behavior of the leading order divergent term for entanglement entropy and logarithmic negativity close to the zero-mode limit. We thus show that the two regimes have fundamentally different information content. Furthermore, an analysis of the ground state fidelity shows us that the region between critical point $Λ=0$ and the crossover point is dominated by zero-mode effects, featuring an explicit dependence on the IR cutoff of the system. For the reduced state of a single oscillator, we show that this cross-over occurs in the region $Nam_f\sim \mathscr{O}(1)$.
△ Less
Submitted 19 May, 2021; v1 submitted 2 March, 2021;
originally announced March 2021.
-
On monophonic position sets in graphs
Authors:
Elias John Thomas,
S. V. Ullas Chandran,
James Tuite,
Gabriele Di Stefano
Abstract:
The general position problem in graph theory asks for the largest set $S$ of vertices of a graph $G$ such that no shortest path of $G$ contains more than two vertices of $S$. In this paper we consider a variant of the general position problem called the \emph{monophonic position problem}, obtained by replacing `shortest path' by `induced path'. We prove some basic properties and bounds for the mon…
▽ More
The general position problem in graph theory asks for the largest set $S$ of vertices of a graph $G$ such that no shortest path of $G$ contains more than two vertices of $S$. In this paper we consider a variant of the general position problem called the \emph{monophonic position problem}, obtained by replacing `shortest path' by `induced path'. We prove some basic properties and bounds for the monophonic position number of a graph and determine the monophonic position number of some graph families, including unicyclic graphs, complements of bipartite graphs and split graphs. We show that the monophonic position number of triangle-free graphs is bounded above by the independence number. We present realisation results for the general position number, monophonic position number and monophonic hull number. Finally we discuss the complexity of the monophonic position problem.
△ Less
Submitted 14 December, 2022; v1 submitted 18 December, 2020;
originally announced December 2020.
-
One-to-one correspondence between entanglement mechanics and black hole thermodynamics
Authors:
S. Mahesh Chandran,
S. Shankaranarayanan
Abstract:
We establish a one-to-one mapping between entanglement entropy, energy, and temperature (quantum entanglement mechanics) with black hole entropy, Komar energy, and Hawking temperature, respectively. We show this explicitly for 4-D spherically symmetric asymptotically flat and non-flat space-times with single and multiple horizons. We exploit an inherent scaling symmetry of entanglement entropy and…
▽ More
We establish a one-to-one mapping between entanglement entropy, energy, and temperature (quantum entanglement mechanics) with black hole entropy, Komar energy, and Hawking temperature, respectively. We show this explicitly for 4-D spherically symmetric asymptotically flat and non-flat space-times with single and multiple horizons. We exploit an inherent scaling symmetry of entanglement entropy and identify scaling transformations that generate an infinite number of systems with the same entanglement entropy, distinguished only by their respective energies and temperatures. We show that this scaling symmetry is present in most well-known systems starting from the two-coupled harmonic oscillator to quantum scalar fields in spherically symmetric space-time. The scaling symmetry allows us to identify the cause of divergence of entanglement entropy to the generation of (near) zero-modes in the systems. We systematically isolate the zero-mode contributions using suitable boundary conditions. We show that the entanglement entropy and energy of quantum scalar field scale differently in space-times with horizons and flat space-time. The relation $E=2TS$, in analogy with the horizon's thermodynamic structure, is also found to be universally satisfied in the entanglement picture. We then show that there exists a one-to-one correspondence leading to the Smarr-formula of black hole thermodynamics for asymptotically flat and non-flat space-times.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Upper Bounding Rainbow Connection Number by Forest Number
Authors:
L. Sunil Chandran,
Davis Issac,
Juho Lauri,
Erik Jan van Leeuwen
Abstract:
A path in an edge-colored graph is rainbow if no two edges of it are colored the same, and the graph is rainbow-connected if there is a rainbow path between each pair of its vertices. The minimum number of colors needed to rainbow-connect a graph $G$ is the rainbow connection number of $G$, denoted by $\text{rc}(G)$.
A simple way to rainbow-connect a graph $G$ is to color the edges of a spanning…
▽ More
A path in an edge-colored graph is rainbow if no two edges of it are colored the same, and the graph is rainbow-connected if there is a rainbow path between each pair of its vertices. The minimum number of colors needed to rainbow-connect a graph $G$ is the rainbow connection number of $G$, denoted by $\text{rc}(G)$.
A simple way to rainbow-connect a graph $G$ is to color the edges of a spanning tree with distinct colors and then re-use any of these colors to color the remaining edges of $G$. This proves that $\text{rc}(G) \le |V(G)|-1$. We ask whether there is a stronger connection between tree-like structures and rainbow coloring than that is implied by the above trivial argument. For instance, is it possible to find an upper bound of $t(G) -1$ for $\text{rc}(G)$, where $t(G)$ is the number of vertices in the largest induced tree of $G$? The answer turns out to be negative, as there are counter-examples that show that even $c\cdot t(G)$ is not an upper bound for $\text{rc}(G))$ for any given constant $c$.
In this work we show that if we consider the forest number $f(G)$, the number of vertices in a maximum induced forest of $G$, instead of $t(G)$, then surprisingly we do get an upper bound. More specifically, we prove that $\text{rc}(G) \leq f(G) + 2$. Our result indicates a stronger connection between rainbow connection and tree-like structures than that was suggested by the simple spanning tree based upper bound.
△ Less
Submitted 11 June, 2020;
originally announced June 2020.
-
Low radiation tomographic reconstruction with and without template information
Authors:
Preeti Gopal,
Sharat Chandran,
Imants Svalbe,
Ajit Rajwade
Abstract:
Low-dose tomography is highly preferred in medical procedures for its reduced radiation risk when compared to standard-dose Computed Tomography (CT). However, the lower the intensity of X-rays, the higher the acquisition noise and hence the reconstructions suffer from artefacts. A large body of work has focussed on improving the algorithms to minimize these artefacts. In this work, we propose two…
▽ More
Low-dose tomography is highly preferred in medical procedures for its reduced radiation risk when compared to standard-dose Computed Tomography (CT). However, the lower the intensity of X-rays, the higher the acquisition noise and hence the reconstructions suffer from artefacts. A large body of work has focussed on improving the algorithms to minimize these artefacts. In this work, we propose two new techniques, rescaled non-linear least squares and Poisson-Gaussian convolution, that reconstruct the underlying image making use of an accurate or near-accurate statistical model of the noise in the projections. We also propose a reconstruction method when prior knowledge of the underlying object is available in the form of templates. This is applicable to longitudinal studies wherein the same object is scanned multiple times to observe the changes that evolve in it over time. Our results on 3D data show that prior information can be used to compensate for the low-dose artefacts, and we demonstrate that it is possible to simultaneously prevent the prior from adversely biasing the reconstructions of new changes in the test object, via a method called ``re-irradiation''. Additionally, we also present two techniques for automated tuning of the regularization parameters for tomographic inversion.
△ Less
Submitted 23 December, 2019;
originally announced December 2019.
-
Combinatorial lower bounds for 3-query LDCs
Authors:
Arnab Bhattacharyya,
L. Sunil Chandran,
Suprovat Ghoshal
Abstract:
A code is called a $q$-query locally decodable code (LDC) if there is a randomized decoding algorithm that, given an index $i$ and a received word $w$ close to an encoding of a message $x$, outputs $x_i$ by querying only at most $q$ coordinates of $w$. Understanding the tradeoffs between the dimension, length and query complexity of LDCs is a fascinating and unresolved research challenge. In parti…
▽ More
A code is called a $q$-query locally decodable code (LDC) if there is a randomized decoding algorithm that, given an index $i$ and a received word $w$ close to an encoding of a message $x$, outputs $x_i$ by querying only at most $q$ coordinates of $w$. Understanding the tradeoffs between the dimension, length and query complexity of LDCs is a fascinating and unresolved research challenge. In particular, for $3$-query binary LDCs of dimension $k$ and length $n$, the best known bounds are: $2^{k^{o(1)}} \geq n \geq \tildeΩ(k^2)$.
In this work, we take a second look at binary $3$-query LDCs. We investigate a class of 3-uniform hypergraphs that are equivalent to strong binary 3-query LDCs. We prove an upper bound on the number of edges in these hypergraphs, reproducing the known lower bound of $\tildeΩ(k^2)$ for the length of strong $3$-query LDCs. In contrast to previous work, our techniques are purely combinatorial and do not rely on a direct reduction to $2$-query LDCs, opening up a potentially different approach to analyzing 3-query LDCs.
△ Less
Submitted 24 November, 2019;
originally announced November 2019.
-
Improved Approximation for Maximum Edge Colouring Problem
Authors:
L Sunil Chandran,
Abhiruk Lahiri,
Nitin Singh
Abstract:
The anti-Ramsey number, $ar(G, H)$ is the minimum integer $k$ such that in any edge colouring of $G$ with $k$ colours there is a rainbow subgraph isomorphic to $H$, i.e., a copy of $H$ with each of its edges assigned a different colour. The notion was introduced by Erd{ö}s and Simonovits in 1973. Since then the parameter has been studied extensively in combinatorics, also the particular case when…
▽ More
The anti-Ramsey number, $ar(G, H)$ is the minimum integer $k$ such that in any edge colouring of $G$ with $k$ colours there is a rainbow subgraph isomorphic to $H$, i.e., a copy of $H$ with each of its edges assigned a different colour. The notion was introduced by Erd{ö}s and Simonovits in 1973. Since then the parameter has been studied extensively in combinatorics, also the particular case when $H$ is a star graph. Recently this case received the attention of researchers from the algorithm community because of its applications in interface modelling of wireless networks. To the algorithm community, the problem is known as maximum edge $q$-colouring problem.
In this paper, we study the maximum edge $2$-colouring problem from the approximation algorithm point of view. The case $q=2$ is particularly interesting due to its application in real-life problems. Algorithmically, this problem is known to be NP-hard for $q\ge 2$. For the case of $q=2$, it is also known that no polynomial-time algorithm can approximate to a factor less than $3/2$ assuming the unique games conjecture. Feng et al. showed a $2$-approximation algorithm for this problem. Later Adamaszek and Popa presented a $5/3$-approximation algorithm with the additional assumption that the input graph has a perfect matching. Note that the obvious but the only known algorithm issues different colours to the edges of a maximum matching (say $M$) and different colours to the connected components of $G \setminus M$. In this article, we give a new analysis of the aforementioned algorithm leading to an improved approximation bound for triangle-free graphs with perfect matching. We also show a new lower bound when the input graph is triangle-free. The contribution of the paper is a completely new, deeper and closer analysis of how the optimum achieves a higher number of colours than the matching based algorithm, mentioned above.
△ Less
Submitted 25 October, 2019;
originally announced October 2019.
-
Tomographic reconstruction to detect evolving structures
Authors:
Preeti Gopal,
Sharat Chandran,
Imants Svalbe,
Ajit Rajwade
Abstract:
The need for tomographic reconstruction from sparse measurements arises when the measurement process is potentially harmful, needs to be rapid, or is uneconomical. In such cases, information from previous longitudinal scans of the same object helps to reconstruct the current object while requiring significantly fewer updating measurements. Our work is based on longitudinal data acquisition scenari…
▽ More
The need for tomographic reconstruction from sparse measurements arises when the measurement process is potentially harmful, needs to be rapid, or is uneconomical. In such cases, information from previous longitudinal scans of the same object helps to reconstruct the current object while requiring significantly fewer updating measurements. Our work is based on longitudinal data acquisition scenarios where we wish to study new changes that evolve within an object over time, such as in repeated scanning for disease monitoring, or in tomography-guided surgical procedures. While this is easily feasible when measurements are acquired from a large number of projection views, it is challenging when the number of views is limited. If the goal is to track the changes while simultaneously reducing sub-sampling artefacts, we propose (1) acquiring measurements from a small number of views and using a global unweighted prior-based reconstruction. If the goal is to observe details of new changes, we propose (2) acquiring measurements from a moderate number of views and using a more involved reconstruction routine. We show that in the latter case, a weighted technique is necessary in order to prevent the prior from adversely affecting the reconstruction of new structures that are absent in any of the earlier scans. The reconstruction of new regions is safeguarded from the bias of the prior by computing regional weights that moderate the local influence of the priors. We are thus able to effectively reconstruct both the old and the new structures in the test. In addition to testing on simulated data, we have validated the efficacy of our method on real tomographic data. The results demonstrate the use of both unweighted and weighted priors in different scenarios.
△ Less
Submitted 11 September, 2019;
originally announced September 2019.