-
Quantum nonlinear optics with counter-propagating photons
Authors:
Bankim Chandra Das,
Ashley Harkavi,
Aditya Prakash,
Ariel Nakav,
Lee Drori,
Ofer Firstenberg
Abstract:
Realizing strong interactions between individual photons is a cornerstone for advancing photonic quantum computing and quantum nonlinear optics. Here, we experimentally demonstrate strong interactions between counter-propagating photons mediated by Rydberg polaritons, achieving a record-long anti-correlation range exceeding $1~μs$. This extended range enables the use of photon pulses that are long…
▽ More
Realizing strong interactions between individual photons is a cornerstone for advancing photonic quantum computing and quantum nonlinear optics. Here, we experimentally demonstrate strong interactions between counter-propagating photons mediated by Rydberg polaritons, achieving a record-long anti-correlation range exceeding $1~μs$. This extended range enables the use of photon pulses that are long enough to fit within the polariton bandwidth, yet short enough to remain within the interaction range. Under these conditions, we observe complete photon blockade of entire pulses, tunable by the pulse timing, thus demonstrating the potential for controlled, deterministic operations. Extending to the three-photon regime, we observe enhanced interactions when a photon encounters two counter-propagating photons. Our results, supported by analytical theory and rigorous numerical simulations, establish counter-propagating Rydberg polaritons as a powerful platform for engineering interactions in quantum light fields.
△ Less
Submitted 1 June, 2025;
originally announced June 2025.
-
System Prompt Extraction Attacks and Defenses in Large Language Models
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
The system prompt in Large Language Models (LLMs) plays a pivotal role in guiding model behavior and response generation. Often containing private configuration details, user roles, and operational instructions, the system prompt has become an emerging attack target. Recent studies have shown that LLM system prompts are highly susceptible to extraction attacks through meticulously designed queries…
▽ More
The system prompt in Large Language Models (LLMs) plays a pivotal role in guiding model behavior and response generation. Often containing private configuration details, user roles, and operational instructions, the system prompt has become an emerging attack target. Recent studies have shown that LLM system prompts are highly susceptible to extraction attacks through meticulously designed queries, raising significant privacy and security concerns. Despite the growing threat, there is a lack of systematic studies of system prompt extraction attacks and defenses. In this paper, we present a comprehensive framework, SPE-LLM, to systematically evaluate System Prompt Extraction attacks and defenses in LLMs. First, we design a set of novel adversarial queries that effectively extract system prompts in state-of-the-art (SOTA) LLMs, demonstrating the severe risks of LLM system prompt extraction attacks. Second, we propose three defense techniques to mitigate system prompt extraction attacks in LLMs, providing practical solutions for secure LLM deployments. Third, we introduce a set of rigorous evaluation metrics to accurately quantify the severity of system prompt extraction attacks in LLMs and conduct comprehensive experiments across multiple benchmark datasets, which validates the efficacy of our proposed SPE-LLM framework.
△ Less
Submitted 27 May, 2025;
originally announced May 2025.
-
Advancing Tabular Stroke Modelling Through a Novel Hybrid Architecture and Feature-Selection Synergy
Authors:
Yousuf Islam,
Md. Jalal Uddin Chowdhury,
Sumon Chandra Das
Abstract:
Brain stroke remains one of the principal causes of death and disability worldwide, yet most tabular-data prediction models still hover below the 95% accuracy threshold, limiting real-world utility. Addressing this gap, the present work develops and validates a completely data-driven and interpretable machine-learning framework designed to predict strokes using ten routinely gathered demographic,…
▽ More
Brain stroke remains one of the principal causes of death and disability worldwide, yet most tabular-data prediction models still hover below the 95% accuracy threshold, limiting real-world utility. Addressing this gap, the present work develops and validates a completely data-driven and interpretable machine-learning framework designed to predict strokes using ten routinely gathered demographic, lifestyle, and clinical variables sourced from a public cohort of 4,981 records. We employ a detailed exploratory data analysis (EDA) to understand the dataset's structure and distribution, followed by rigorous data preprocessing, including handling missing values, outlier removal, and class imbalance correction using Synthetic Minority Over-sampling Technique (SMOTE). To streamline feature selection, point-biserial correlation and random-forest Gini importance were utilized, and ten varied algorithms-encompassing tree ensembles, boosting, kernel methods, and a multilayer neural network-were optimized using stratified five-fold cross-validation. Their predictions based on probabilities helped us build the proposed model, which included Random Forest, XGBoost, LightGBM, and a support-vector classifier, with logistic regression acting as a meta-learner. The proposed model achieved an accuracy rate of 97.2% and an F1-score of 97.15%, indicating a significant enhancement compared to the leading individual model, LightGBM, which had an accuracy of 91.4%. Our study's findings indicate that rigorous preprocessing, coupled with a diverse hybrid model, can convert low-cost tabular data into a nearly clinical-grade stroke-risk assessment tool.
△ Less
Submitted 18 May, 2025;
originally announced May 2025.
-
Efficient direct loading of the green MOT of Yb with low green laser power
Authors:
Thilagaraj Ravi,
Rajnandan Choudhury Das,
Heramb Vivek Bhusane,
Samrat Roy,
Kanhaiya Pandey
Abstract:
We report the direct loading of Yb atoms in the magneto-optical trap (MOT) using the intercombination narrow optical transition 6s$^2$ $^1$S$_0$ $\rightarrow$ 6s6p $^3$P$_1$ at 556 nm (green), known as green MOT with limited power of green laser, 10 mW. Direct loading of the green MOT is achieved by superimposing the green laser beam, inside a hollow core of the laser beam driving the broad 6s…
▽ More
We report the direct loading of Yb atoms in the magneto-optical trap (MOT) using the intercombination narrow optical transition 6s$^2$ $^1$S$_0$ $\rightarrow$ 6s6p $^3$P$_1$ at 556 nm (green), known as green MOT with limited power of green laser, 10 mW. Direct loading of the green MOT is achieved by superimposing the green laser beam, inside a hollow core of the laser beam driving the broad 6s$^2$ $^1$S$_0$ $\rightarrow$ 6s6p $^1$P$_1$, transition (blue) at 399 nm. We load up to 3$\times10^8$ in $1$ s. We characterize the green MOT loading with various experimental parameters such as magnetic field gradient, power of the green laser and blue MOT laser, and detuning of the green laser. We have also loaded the green MOT using center-shifted dual MOT configuration. In this configuration, the overlap region of the three counter-propagating blue laser beams is shifted towards Zeeman slower, where the magnetic field is non-zero. The atoms are first pre-cooled and partially trapped in blue MOT. These atoms enter the green MOT region and are trapped. In this method, we do not lose power (unlike in core-shell MOT) of the blue MOT laser because of masking the central portion. However, we load only 10$^7$ atoms, which has one order of magnitude fewer atoms than in the core-shell MOT.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
Neutron Decay Anomaly and Its Effects on Neutron Star Properties
Authors:
H. C. Das,
G. F. Burgio
Abstract:
We investigate the effects of dark matter (DM) on neutron star (NS) properties using the neutron decay anomaly model within the relativistic mean-field (RMF) framework. Three nucleonic models (HCD0-HCD2) are developed, satisfying astrophysical constraints such as the maximum NS mass ($\geq 2 M_\odot$), the NICER mass-radius limits, and the tidal deformability constraint from the GW170817 event. Th…
▽ More
We investigate the effects of dark matter (DM) on neutron star (NS) properties using the neutron decay anomaly model within the relativistic mean-field (RMF) framework. Three nucleonic models (HCD0-HCD2) are developed, satisfying astrophysical constraints such as the maximum NS mass ($\geq 2 M_\odot$), the NICER mass-radius limits, and the tidal deformability constraint from the GW170817 event. The equation of states of the NS admixed with DM (DMANS) are calculated by incorporating the self-interactions between them. The macroscopic properties, such as mass, radius, and tidal deformability of the NSs, are obtained for HCD models along with five others by varying self-interaction strength. By combining NS observations with scattering cross-section constraints from galaxy clusters, we explore model-dependent trends in the DM self-interaction parameter space. While the quantitative bounds may vary with hadronic model choice, our analysis offers insights into the interplay between DM interactions and NS observables within the RMF framework.
△ Less
Submitted 14 May, 2025;
originally announced May 2025.
-
Privacy Challenges In Image Processing Applications
Authors:
Maneesha,
Bharat Gupta,
Rishabh Sethi,
Charvi Adita Das
Abstract:
As image processing systems proliferate, privacy concerns intensify given the sensitive personal information contained in images. This paper examines privacy challenges in image processing and surveys emerging privacy-preserving techniques including differential privacy, secure multiparty computation, homomorphic encryption, and anonymization. Key applications with heightened privacy risks include…
▽ More
As image processing systems proliferate, privacy concerns intensify given the sensitive personal information contained in images. This paper examines privacy challenges in image processing and surveys emerging privacy-preserving techniques including differential privacy, secure multiparty computation, homomorphic encryption, and anonymization. Key applications with heightened privacy risks include healthcare, where medical images contain patient health data, and surveillance systems that can enable unwarranted tracking. Differential privacy offers rigorous privacy guarantees by injecting controlled noise, while MPC facilitates collaborative analytics without exposing raw data inputs. Homomorphic encryption enables computations on encrypted data and anonymization directly removes identifying elements. However, balancing privacy protections and utility remains an open challenge. Promising future directions identified include quantum-resilient cryptography, federated learning, dedicated hardware, and conceptual innovations like privacy by design. Ultimately, a holistic effort combining technological innovations, ethical considerations, and policy frameworks is necessary to uphold the fundamental right to privacy as image processing capabilities continue advancing rapidly.
△ Less
Submitted 7 May, 2025;
originally announced May 2025.
-
Quantum CNOT Gate with Actively Synchronized Photon Pairs
Authors:
Haim Nakav,
Tanim Firdoshi,
Omri Davidson,
Bankim Chandra Das,
Ofer Firstenberg
Abstract:
Controlling the synchronization of photons from probabilistic quantum sources plays a pivotal role in advancing efficient quantum information processing. We report the realization of a probabilistic entangling gate operating on actively synchronized photon pairs, using a quantum memory based on warm atomic vapor. We achieve a truth-table fidelity exceeding 85% and demonstrate Bell-inequality viola…
▽ More
Controlling the synchronization of photons from probabilistic quantum sources plays a pivotal role in advancing efficient quantum information processing. We report the realization of a probabilistic entangling gate operating on actively synchronized photon pairs, using a quantum memory based on warm atomic vapor. We achieve a truth-table fidelity exceeding 85% and demonstrate Bell-inequality violation for all four Bell states. The reduction in visibility of the Hong-Ou-Mandel (HOM) interference introduced by the storage process is identified as a primary factor limiting the gate fidelity. We derive an exact quantitative relation between HOM visibility and gate fidelity for pure single photons, which applies to all photonic gates relying on interference, regardless of the physical platform.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
Machine Learning-Based Detection and Analysis of Suspicious Activities in Bitcoin Wallet Transactions in the USA
Authors:
Md Zahidul Islam,
Md Shahidul Islam,
Biswajit Chandra das,
Syed Ali Reza,
Proshanta Kumar Bhowmik,
Kanchon Kumar Bishnu,
Md Shafiqur Rahman,
Redoyan Chowdhury,
Laxmi Pant
Abstract:
The dramatic adoption of Bitcoin and other cryptocurrencies in the USA has revolutionized the financial landscape and provided unprecedented investment and transaction efficiency opportunities. The prime objective of this research project is to develop machine learning algorithms capable of effectively identifying and tracking suspicious activity in Bitcoin wallet transactions. With high-tech anal…
▽ More
The dramatic adoption of Bitcoin and other cryptocurrencies in the USA has revolutionized the financial landscape and provided unprecedented investment and transaction efficiency opportunities. The prime objective of this research project is to develop machine learning algorithms capable of effectively identifying and tracking suspicious activity in Bitcoin wallet transactions. With high-tech analysis, the study aims to create a model with a feature for identifying trends and outliers that can expose illicit activity. The current study specifically focuses on Bitcoin transaction information in America, with a strong emphasis placed on the importance of knowing about the immediate environment in and through which such transactions pass through. The dataset is composed of in-depth Bitcoin wallet transactional information, including important factors such as transaction values, timestamps, network flows, and addresses for wallets. All entries in the dataset expose information about financial transactions between wallets, including received and sent transactions, and such information is significant for analysis and trends that can represent suspicious activity. This study deployed three accredited algorithms, most notably, Logistic Regression, Random Forest, and Support Vector Machines. In retrospect, Random Forest emerged as the best model with the highest F1 Score, showcasing its ability to handle non-linear relationships in the data. Insights revealed significant patterns in wallet activity, such as the correlation between unredeemed transactions and final balances. The application of machine algorithms in tracking cryptocurrencies is a tool for creating transparent and secure U.S. markets.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
EIT in V+ inverted $Ξ$ system using Rydberg state in thermal Rb atoms
Authors:
Thilagaraj Ravi,
Heramb Vivek Bhusane,
Rajnandan Choudhury Das,
Samir Khan,
Kanhaiya Pandey
Abstract:
Rydberg excitation using blue and IR transition is an advantageous path for quantum computation in alkali elements. Aiming to stabilize the IR laser for quantum computation, we study electromagnetically induced transparency (EIT) spectrum using Rydberg state in V+inverted $Ξ$ system (${5S_{1/2}}$ $\rightarrow$ ${5P_{3/2}}$ and ${5S_{1/2}}$ $\rightarrow$ ${6P_{1/2}}$ $\rightarrow$ ${r=69D_{3/2}}$)…
▽ More
Rydberg excitation using blue and IR transition is an advantageous path for quantum computation in alkali elements. Aiming to stabilize the IR laser for quantum computation, we study electromagnetically induced transparency (EIT) spectrum using Rydberg state in V+inverted $Ξ$ system (${5S_{1/2}}$ $\rightarrow$ ${5P_{3/2}}$ and ${5S_{1/2}}$ $\rightarrow$ ${6P_{1/2}}$ $\rightarrow$ ${r=69D_{3/2}}$) in Rb vapour cell at room temperature. The probe laser absorption at 780 nm is monitored in the presence of the two control lasers at 421 nm and 1003 nm. In comparison to the previously studied inverted $Ξ$ system, this system has a good signal-to-noise ratio even at room temperature with similar linewidth (around $10$~MHz). We also observe Autler-Towns splitting of the EIT due to the high power of probe and blue control lasers. For completeness and comparison, we also study the EIT in an inverted $Ξ$ system using $5S_{1/2}\rightarrow6P_{1/2}\rightarrow 69D_{3/2}$ transitions.
△ Less
Submitted 25 March, 2025; v1 submitted 24 March, 2025;
originally announced March 2025.
-
RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment
Authors:
Md Morshed Alam,
Lokesh Chandra Das,
Sandip Roy,
Sachin Shetty,
Weichao Wang
Abstract:
Internet of Things (IoT) platforms with trigger-action capability allow event conditions to trigger actions in IoT devices autonomously by creating a chain of interactions. Adversaries exploit this chain of interactions to maliciously inject fake event conditions into IoT hubs, triggering unauthorized actions on target IoT devices to implement remote injection attacks. Existing defense mechanisms…
▽ More
Internet of Things (IoT) platforms with trigger-action capability allow event conditions to trigger actions in IoT devices autonomously by creating a chain of interactions. Adversaries exploit this chain of interactions to maliciously inject fake event conditions into IoT hubs, triggering unauthorized actions on target IoT devices to implement remote injection attacks. Existing defense mechanisms focus mainly on the verification of event transactions using physical event fingerprints to enforce the security policies to block unsafe event transactions. These approaches are designed to provide offline defense against injection attacks. The state-of-the-art online defense mechanisms offer real-time defense, but extensive reliability on the inference of attack impacts on the IoT network limits the generalization capability of these approaches. In this paper, we propose a platform-independent multi-agent online defense system, namely RESTRAIN, to counter remote injection attacks at runtime. RESTRAIN allows the defense agent to profile attack actions at runtime and leverages reinforcement learning to optimize a defense policy that complies with the security requirements of the IoT network. The experimental results show that the defense agent effectively takes real-time defense actions against complex and dynamic remote injection attacks and maximizes the security gain with minimal computational overhead.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
Accurate and Efficient Two-Stage Gun Detection in Video
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Object detection in videos plays a crucial role in advancing applications such as public safety and anomaly detection. Existing methods have explored different techniques, including CNN, deep learning, and Transformers, for object detection and video classification. However, detecting tiny objects, e.g., guns, in videos remains challenging due to their small scale and varying appearances in comple…
▽ More
Object detection in videos plays a crucial role in advancing applications such as public safety and anomaly detection. Existing methods have explored different techniques, including CNN, deep learning, and Transformers, for object detection and video classification. However, detecting tiny objects, e.g., guns, in videos remains challenging due to their small scale and varying appearances in complex scenes. Moreover, existing video analysis models for classification or detection often perform poorly in real-world gun detection scenarios due to limited labeled video datasets for training. Thus, developing efficient methods for effectively capturing tiny object features and designing models capable of accurate gun detection in real-world videos is imperative. To address these challenges, we make three original contributions in this paper. First, we conduct an empirical study of several existing video classification and object detection methods to identify guns in videos. Our extensive analysis shows that these methods may not accurately detect guns in videos. Second, we propose a novel two-stage gun detection method. In stage 1, we train an image-augmented model to effectively classify ``Gun'' videos. To make the detection more precise and efficient, stage 2 employs an object detection model to locate the exact region of the gun within video frames for videos classified as ``Gun'' by stage 1. Third, our experimental results demonstrate that the proposed domain-specific method achieves significant performance improvements and enhances efficiency compared with existing techniques. We also discuss challenges and future research directions in gun detection tasks in computer vision.
△ Less
Submitted 8 March, 2025;
originally announced March 2025.
-
The Role, Trends, and Applications of Machine Learning in Undersea Communication: A Bangladesh Perspective
Authors:
Yousuf Islam,
Sumon Chandra Das,
Md. Jalal Uddin Chowdhury
Abstract:
The rapid evolution of machine learning (ML) has brought about groundbreaking developments in numerous industries, not the least of which is in the area of undersea communication. This domain is critical for applications like ocean exploration, environmental monitoring, resource management, and national security. Bangladesh, a maritime nation with abundant resources in the Bay of Bengal, can harne…
▽ More
The rapid evolution of machine learning (ML) has brought about groundbreaking developments in numerous industries, not the least of which is in the area of undersea communication. This domain is critical for applications like ocean exploration, environmental monitoring, resource management, and national security. Bangladesh, a maritime nation with abundant resources in the Bay of Bengal, can harness the immense potential of ML to tackle the unprecedented challenges associated with underwater communication. Beyond that, environmental conditions are unique to the region: in addition to signal attenuation, multipath propagation, noise interference, and limited bandwidth. In this study, we address the necessity to bring ML into communication via undersea; it investigates the latest technologies under the domain of ML in that respect, such as deep learning and reinforcement learning, especially concentrating on Bangladesh scenarios in the sense of implementation. This paper offers a contextualized regional perspective by incorporating region-specific needs, case studies, and recent research to propose a roadmap for deploying ML-driven solutions to improve safety at sea, promote sustainable resource use, and enhance disaster response systems. This research ultimately highlights the promise of ML-powered solutions for transforming undersea communication, leading to more efficient and cost-effective technologies that subsequently contribute to both economic growth and environmental sustainability.
△ Less
Submitted 1 March, 2025;
originally announced March 2025.
-
Multiband dispersion and warped vortices of strongly-interacting photons
Authors:
Bankim Chandra Das,
Dmytro Kiselov,
Lee Drori,
Ariel Nakav,
Alexander Poddubny,
Ofer Firstenberg
Abstract:
We study quantum correlations between interacting photons realized through co-propagating Rydberg polaritons. We show that the evolution of the $n$-photon wavefunction is governed by a multiband dispersion featuring one massive mode and $n-1$ degenerate modes, such as two Dirac cones for $n=3$. The band structure exhibits an $n$-fold rotational symmetry, including an $n$-fold warped light cone, in…
▽ More
We study quantum correlations between interacting photons realized through co-propagating Rydberg polaritons. We show that the evolution of the $n$-photon wavefunction is governed by a multiband dispersion featuring one massive mode and $n-1$ degenerate modes, such as two Dirac cones for $n=3$. The band structure exhibits an $n$-fold rotational symmetry, including an $n$-fold warped light cone, in contrast to the single-band, parabolic approximation often assumed for interacting polaritons. For three photons, the dispersion breaks the symmetry between a photon pair propagating ahead versus behind a single photon. We confirm these findings experimentally by measuring the three-photon phase and intensity correlation functions, revealing trigonal warping of the quantum vortex-ring generated by the three-photon interactions. Our analytical results are supported by rigorous numerical modeling that fully accounts for the photon propagation before, inside, and after the finite atomic medium. These findings advance the understanding of multi-photon interactions and the development of future multi-photon control tools.
△ Less
Submitted 17 February, 2025;
originally announced February 2025.
-
A Survey on IBR Penetrated Power System Stability Analysis Using Frequency Scanning
Authors:
Shuvangkar Chandra Das,
Lokesh Saravana,
Le Minh Vu,
Manh Bui,
Tuyen Vu,
Jianhua Zhang,
Thomas Ortmeyer
Abstract:
The rapid rise in inverter-based renewable resources has heightened concerns over subsynchronous resonance and oscillations, thereby challenging grid stability. This paper reviews approaches to identify and mitigate these issues, focusing on frequency scanning methods for stability assessment. It categorizes white-, black-, and gray-box modeling techniques, compares positive-sequence, dq-frame, an…
▽ More
The rapid rise in inverter-based renewable resources has heightened concerns over subsynchronous resonance and oscillations, thereby challenging grid stability. This paper reviews approaches to identify and mitigate these issues, focusing on frequency scanning methods for stability assessment. It categorizes white-, black-, and gray-box modeling techniques, compares positive-sequence, dq-frame, and alpha-beta domain scanning, and examines perturbation shapes like step, ramp, and chirp. A comparative study highlights their strengths, limitations, and suitability for specific scenarios. By summarizing past events and surveying available tools, this work guides operators and researchers toward more effective, reliable stability analysis methods in grids with high renewable penetration.
△ Less
Submitted 14 January, 2025;
originally announced January 2025.
-
Physical and chemical characterization of Saccharum spontaneum flower fibre: potential applications in thermal insulation and microbial fuel cells
Authors:
M. M. Rahman,
A. K. Das,
S. Tabassum,
S. C. Das,
M. A. Uddin
Abstract:
Saccharum spontaneum is a grass-type plant abundantly found in the Indian subcontinent, known for its beautiful, lustrous white flowers. Fibres were extracted from the flower and analyzed for their physical, mechanical, and chemical properties. The chemical composition of the fibre is 90.9% holocellulose, with a moisture content of 10.97%, and an average fibre length of 25 mm. FTIR spectra confirm…
▽ More
Saccharum spontaneum is a grass-type plant abundantly found in the Indian subcontinent, known for its beautiful, lustrous white flowers. Fibres were extracted from the flower and analyzed for their physical, mechanical, and chemical properties. The chemical composition of the fibre is 90.9% holocellulose, with a moisture content of 10.97%, and an average fibre length of 25 mm. FTIR spectra confirmed the presence of functional groups similar to those found in other natural cellulosic fibres. Additionally, the fibre exhibits a tensile strength of approximately 63 cN/tex, which is significantly higher than that of cotton and jute fibres. However, its crystallinity is relatively high at about 75%, resulting in a low elongation at break of 1.9%. FESEM analysis revealed a hollow structure in the fibre, indicating its potential suitability for applications requiring high thermal insulation, excellent moisture management, vapor permeability, and microbial fuel cell development.
△ Less
Submitted 9 January, 2025;
originally announced January 2025.
-
Effects of asymmetric dark matter on a magnetized neutron star: A two-fluid approach
Authors:
Pinku Routaray,
Vishal Parmar,
H. C. Das,
Bharat Kumar,
G. F. Burgio,
H. -J. Schulze
Abstract:
We study the interaction between dark matter (DM) and highly magnetized neutron stars (NSs), focusing on how DM particle mass, mass fraction, and magnetic field (MF) strength affect NS structure and stability. We consider self-interacting, nonannihilating, asymmetric fermionic DM that couples to NSs only through gravitational interaction. Using the Quantum Monte Carlo Relativistic Mean Field (QMC-…
▽ More
We study the interaction between dark matter (DM) and highly magnetized neutron stars (NSs), focusing on how DM particle mass, mass fraction, and magnetic field (MF) strength affect NS structure and stability. We consider self-interacting, nonannihilating, asymmetric fermionic DM that couples to NSs only through gravitational interaction. Using the Quantum Monte Carlo Relativistic Mean Field (QMC-RMF4) model with density-dependent magnetic fields, we investigate the magnetized equation of state and examine the accumulation of DM under various conditions. Our results show that as the DM fraction increases, the maximum gravitational mass of the NS decreases, especially for heavier DM particles, while lighter DM particles can induce a transition from a dark core to a halo structure, increasing the maximum mass. Strong MFs soften the equation of state and reduce the dark mass a NS core can retain before transitioning to a halo. By comparing our results with observations from Neutro Star Interior Composition Explorer and GW170817, we identify the possible range of DM parameters for these objects. We find that the magnetic field slightly changes these limits, mainly affecting the maximum NS mass and tidal deformability. These findings provide key insights into how DM and MF jointly shape the mass-radius relation and the stability of DM-admixed magnetized NSs.
△ Less
Submitted 3 June, 2025; v1 submitted 30 December, 2024;
originally announced December 2024.
-
Ultralight axion or axion-like particle dark matter and 21-cm absorption signals in new physics
Authors:
C. R. Das
Abstract:
A hypothetical particle known as the axion holds the potential to resolve both the cosmic dark matter riddle and particle physics' long-standing, strong CP dilemma. An unusually strong 21-cm absorption feature associated with the initial star formation era, i.e., the dark ages, may be due to ultralight axion dark matter ($\sim 10^{-22}$ eV) at this time. The radio wave observation's 21-cm absorpti…
▽ More
A hypothetical particle known as the axion holds the potential to resolve both the cosmic dark matter riddle and particle physics' long-standing, strong CP dilemma. An unusually strong 21-cm absorption feature associated with the initial star formation era, i.e., the dark ages, may be due to ultralight axion dark matter ($\sim 10^{-22}$ eV) at this time. The radio wave observation's 21-cm absorption signal can be explained as either anomalous baryon cooling or anomalous cosmic microwave background photon heating. Shortly after the axions or axion-like particles (ALPs) thermalize among themselves and form a Bose-Einstein condensate, the cold dark matter ALPs make thermal contact with baryons, cooling them. ALPs are thought to be the source of some new evidence for dark matter, as the baryon temperature at cosmic dawn was lower than predicted based on presumptions. The detection of baryon acoustic oscillations is found to be consistent with baryon cooling by dark matter ALPs. Simultaneously, under the influence of the primordial black hole and/or intergalactic magnetic fields, the dark radiation composed of ALPs can resonantly transform into photons, significantly heating up the radiation in the frequency range relevant to the 21-cm tests. When examining the 21-cm cosmology at redshifts $z$ between 200 and 20, we see that, when taking into account both heating and cooling options at the same time, heating eliminated the theoretical excess number of neutrino species, $ΔN_{eff}$, from the cooling effect.
△ Less
Submitted 9 December, 2024;
originally announced December 2024.
-
Deep Reinforcement Learning for Optimizing Inverter Control: Fixed and Adaptive Gain Tuning Strategies for Power System Stability
Authors:
Shuvangkar Chandra Das,
Tuyen Vu,
Deepak Ramasubramanian,
Evangelos Farantatos,
Jianhua Zhang,
Thomas Ortmeyer
Abstract:
This paper presents novel methods for tuning inverter controller gains using deep reinforcement learning (DRL). A Simulink-developed inverter model is converted into a dynamic link library (DLL) and integrated with a Python-based RL environment, leveraging the multi-core deployment and accelerated computing to significantly reduce RL training time. A neural network-based mechanism is developed to…
▽ More
This paper presents novel methods for tuning inverter controller gains using deep reinforcement learning (DRL). A Simulink-developed inverter model is converted into a dynamic link library (DLL) and integrated with a Python-based RL environment, leveraging the multi-core deployment and accelerated computing to significantly reduce RL training time. A neural network-based mechanism is developed to transform the cascaded PI controller into an actor network, allowing optimized gain tuning by an RL agent to mitigate scenarios such as subsynchronous oscillations (SSO) and initial transients. Two distinct tuning approaches are demonstrated: a fixed gain strategy, where controller gains are represented as RL policy (actor network) weights, and an adaptive gain strategy, where gains are dynamically generated as RL policy (actor network) outputs. A comparative analysis of these methods is provided, showcasing their effectiveness in stabilizing the transient performance of grid-forming and grid-following converters and deployment challenges in hardware. Experimental results are presented, demonstrating the enhanced robustness and practical applicability of the RL-tuned controller gains in real-world systems.
△ Less
Submitted 3 November, 2024;
originally announced November 2024.
-
Pushing the Performance Envelope of DNN-based Recommendation Systems Inference on GPUs
Authors:
Rishabh Jain,
Vivek M. Bhasi,
Adwait Jog,
Anand Sivasubramaniam,
Mahmut T. Kandemir,
Chita R. Das
Abstract:
Personalized recommendation is a ubiquitous application on the internet, with many industries and hyperscalers extensively leveraging Deep Learning Recommendation Models (DLRMs) for their personalization needs (like ad serving or movie suggestions). With growing model and dataset sizes pushing computation and memory requirements, GPUs are being increasingly preferred for executing DLRM inference.…
▽ More
Personalized recommendation is a ubiquitous application on the internet, with many industries and hyperscalers extensively leveraging Deep Learning Recommendation Models (DLRMs) for their personalization needs (like ad serving or movie suggestions). With growing model and dataset sizes pushing computation and memory requirements, GPUs are being increasingly preferred for executing DLRM inference. However, serving newer DLRMs, while meeting acceptable latencies, continues to remain challenging, making traditional deployments increasingly more GPU-hungry, resulting in higher inference serving costs. In this paper, we show that the embedding stage continues to be the primary bottleneck in the GPU inference pipeline, leading up to a 3.2x embedding-only performance slowdown.
To thoroughly grasp the problem, we conduct a detailed microarchitecture characterization and highlight the presence of low occupancy in the standard embedding kernels. By leveraging direct compiler optimizations, we achieve optimal occupancy, pushing the performance by up to 53%. Yet, long memory latency stalls continue to exist. To tackle this challenge, we propose specialized plug-and-play-based software prefetching and L2 pinning techniques, which help in hiding and decreasing the latencies. Further, we propose combining them, as they complement each other. Experimental evaluations using A100 GPUs with large models and datasets show that our proposed techniques improve performance by up to 103% for the embedding stage, and up to 77% for the overall DLRM inference pipeline.
△ Less
Submitted 29 October, 2024;
originally announced October 2024.
-
Astrophysical constraints on neutron star $f$-modes with a nonparametric equation of state representation
Authors:
Sailesh Ranjan Mohanty,
Utkarsh Mali,
H. C. Das,
Bharat Kumar,
Philippe Landry
Abstract:
We constrain the fundamental-mode ($f$-mode) oscillation frequencies of nonrotating neutron stars using a phenomenological Gaussian process model for the unknown dense-matter equation of state conditioned on a suite of gravitational-wave, radio and X-ray observations. We infer the quadrupolar $f$-mode frequency preferred by the astronomical data as a function of neutron star mass, with error estim…
▽ More
We constrain the fundamental-mode ($f$-mode) oscillation frequencies of nonrotating neutron stars using a phenomenological Gaussian process model for the unknown dense-matter equation of state conditioned on a suite of gravitational-wave, radio and X-ray observations. We infer the quadrupolar $f$-mode frequency preferred by the astronomical data as a function of neutron star mass, with error estimates that quantify the impact of equation of state uncertainty, and compare it to the contact frequency for inspiralling neutron-star binaries, finding that resonance with the orbital frequency can be achieved for the coalescences with the most unequal mass ratio. For an optimally configured binary neutron star merger, we estimate the gravitational waveform's tidal phasing due to $f$-mode dynamical tides as $7^{+2}_{-3}$ rad at merger. We assess prospects for distinguishing $f$-mode dynamical tides with current and future-generation gravitational-wave observatories.
△ Less
Submitted 22 October, 2024;
originally announced October 2024.
-
The nuclear symmetry energy and the neutron skin thickness in nuclei
Authors:
G. F. Burgio,
H. C. Das,
I. Vidana
Abstract:
We investigate possible correlations between the stiffness of the symmetry energy at saturation density, the so-called $L$ parameter, and the neutron skin thickness of ${^{48}}$Ca and ${^{208}}$Pb, for which the recent measurements from the CREX and PREX I+II experiments at the Thomas Jefferson Laboratory became available. We choose an ensemble of nucleonic equations of state (EoS) derived within…
▽ More
We investigate possible correlations between the stiffness of the symmetry energy at saturation density, the so-called $L$ parameter, and the neutron skin thickness of ${^{48}}$Ca and ${^{208}}$Pb, for which the recent measurements from the CREX and PREX I+II experiments at the Thomas Jefferson Laboratory became available. We choose an ensemble of nucleonic equations of state (EoS) derived within microscopic (BHF, Variational, AFDMC) and phenomenological (Skyrme, RMF, DD-RMF) approaches. They are all compatible with the laboratory nuclear collisions data and with current observations of neutron stars (NS) mass and the tidal polarizability of a 1.4 $M_{\odot}$ NS, as deduced from the GW170817 event. We find some degree of correlation between the $L$ parameter and the neutron skin thickness whereas a much weaker correlation does exist with the tidal polarizability and the symmetry energy at saturation density. However, some EoS which are able to explain the CREX experimental data, are not compatible with the PREX I+II data, and viceversa. We confirm the results previously obtained with a different set of EoS models, and find a possible tension between the experimental data and the current understanding of the nuclear EoS.
△ Less
Submitted 21 October, 2024;
originally announced October 2024.
-
A Bioinformatic Approach Validated Utilizing Machine Learning Algorithms to Identify Relevant Biomarkers and Crucial Pathways in Gallbladder Cancer
Authors:
Rabea Khatun,
Wahia Tasnim,
Maksuda Akter,
Md Manowarul Islam,
Md. Ashraf Uddin,
Md. Zulfiker Mahmud,
Saurav Chandra Das
Abstract:
Gallbladder cancer (GBC) is the most frequent cause of disease among biliary tract neoplasms. Identifying the molecular mechanisms and biomarkers linked to GBC progression has been a significant challenge in scientific research. Few recent studies have explored the roles of biomarkers in GBC. Our study aimed to identify biomarkers in GBC using machine learning (ML) and bioinformatics techniques. W…
▽ More
Gallbladder cancer (GBC) is the most frequent cause of disease among biliary tract neoplasms. Identifying the molecular mechanisms and biomarkers linked to GBC progression has been a significant challenge in scientific research. Few recent studies have explored the roles of biomarkers in GBC. Our study aimed to identify biomarkers in GBC using machine learning (ML) and bioinformatics techniques. We compared GBC tumor samples with normal samples to identify differentially expressed genes (DEGs) from two microarray datasets (GSE100363, GSE139682) obtained from the NCBI GEO database. A total of 146 DEGs were found, with 39 up-regulated and 107 down-regulated genes. Functional enrichment analysis of these DEGs was performed using Gene Ontology (GO) terms and REACTOME pathways through DAVID. The protein-protein interaction network was constructed using the STRING database. To identify hub genes, we applied three ranking algorithms: Degree, MNC, and Closeness Centrality. The intersection of hub genes from these algorithms yielded 11 hub genes. Simultaneously, two feature selection methods (Pearson correlation and recursive feature elimination) were used to identify significant gene subsets. We then developed ML models using SVM and RF on the GSE100363 dataset, with validation on GSE139682, to determine the gene subset that best distinguishes GBC samples. The hub genes outperformed the other gene subsets. Finally, NTRK2, COL14A1, SCN4B, ATP1A2, SLC17A7, SLIT3, COL7A1, CLDN4, CLEC3B, ADCYAP1R1, and MFAP4 were identified as crucial genes, with SLIT3, COL7A1, and CLDN4 being strongly linked to GBC development and prediction.
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
Salient Store: Enabling Smart Storage for Continuous Learning Edge Servers
Authors:
Cyan Subhra Mishra,
Deeksha Chaudhary,
Jack Sampson,
Mahmut Taylan Knademir,
Chita Das
Abstract:
As continuous learning based video analytics continue to evolve, the role of efficient edge servers in efficiently managing vast and dynamic datasets is becoming increasingly crucial. Unlike their compute architecture, storage and archival system for these edge servers has often been under-emphasized. This is unfortunate as they contribute significantly to the data management and data movement, es…
▽ More
As continuous learning based video analytics continue to evolve, the role of efficient edge servers in efficiently managing vast and dynamic datasets is becoming increasingly crucial. Unlike their compute architecture, storage and archival system for these edge servers has often been under-emphasized. This is unfortunate as they contribute significantly to the data management and data movement, especially in a emerging complute landscape where date storage and data protection has become one of the key concerns. To mitigate this, we propose Salient Store that specifically focuses on the integration of Computational Storage Devices (CSDs) into edge servers to enhance data processing and management, particularly in continuous learning scenarios, prevalent in fields such as autonomous driving and urban mobility. Our research, gos beyond the compute domain, and identifies the gaps in current storage system designs. We proposes a framework that aligns more closely with the growing data demands. We present a detailed analysis of data movement challenges within the archival workflows and demonstrate how the strategic integration of CSDs can significantly optimize data compression, encryption, as well as other data management tasks, to improve overall system performance. By leveraging the parallel processing capabilities of FPGAs and the high internal bandwidth of SSDs, Salient Store reduces the communication latency and data volume by ~6.2x and ~6.1x, respectively. This paper provides a comprehensive overview of the potential of CSDs to revolutionize storage, making them not just data repositories but active participants in the computational process.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
In-depth Analysis of Privacy Threats in Federated Learning for Medical Data
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Federated learning is emerging as a promising machine learning technique in the medical field for analyzing medical images, as it is considered an effective method to safeguard sensitive patient data and comply with privacy regulations. However, recent studies have revealed that the default settings of federated learning may inadvertently expose private training data to privacy attacks. Thus, the…
▽ More
Federated learning is emerging as a promising machine learning technique in the medical field for analyzing medical images, as it is considered an effective method to safeguard sensitive patient data and comply with privacy regulations. However, recent studies have revealed that the default settings of federated learning may inadvertently expose private training data to privacy attacks. Thus, the intensity of such privacy risks and potential mitigation strategies in the medical domain remain unclear. In this paper, we make three original contributions to privacy risk analysis and mitigation in federated learning for medical data. First, we propose a holistic framework, MedPFL, for analyzing privacy risks in processing medical data in the federated learning environment and developing effective mitigation strategies for protecting privacy. Second, through our empirical analysis, we demonstrate the severe privacy risks in federated learning to process medical images, where adversaries can accurately reconstruct private medical images by performing privacy attacks. Third, we illustrate that the prevalent defense mechanism of adding random noises may not always be effective in protecting medical images against privacy attacks in federated learning, which poses unique and pressing challenges related to protecting the privacy of medical data. Furthermore, the paper discusses several unique research questions related to the privacy protection of medical data in the federated learning environment. We conduct extensive experiments on several benchmark medical image datasets to analyze and mitigate the privacy risks associated with federated learning for medical data.
△ Less
Submitted 27 September, 2024;
originally announced September 2024.
-
Synergistic and Efficient Edge-Host Communication for Energy Harvesting Wireless Sensor Networks
Authors:
Cyan Subhra Mishra,
Jack Sampson,
Mahmut Taylan Kandmeir,
Vijaykrishnan Narayanan,
Chita R Das
Abstract:
There is an increasing demand for intelligent processing on ultra-low-power internet of things (IoT) device. Recent works have shown substantial efficiency boosts by executing inferences directly on the IoT device (node) rather than transmitting data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges in an energy-harvesting wireless…
▽ More
There is an increasing demand for intelligent processing on ultra-low-power internet of things (IoT) device. Recent works have shown substantial efficiency boosts by executing inferences directly on the IoT device (node) rather than transmitting data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges in an energy-harvesting wireless sensor network (EH-WSN). Moreover, these tasks often require responses from multiple physically distributed EH sensor nodes, which impose crucial system optimization challenges in addition to per-node constraints. To address these challenges, we propose Seeker, a hardware-software co-design approach for increasing on-sensor computation, reducing communication volume, and maximizing inference completion, without violating the quality of service, in EH-WSNs coordinated by a mobile device. Seeker uses a store-and-execute approach to complete a subset of inferences on the EH sensor node, reducing communication with the mobile host. Further, for those inferences unfinished because of the harvested energy constraints, it leverages task-aware coreset construction to efficiently communicate compact features to the host device. We evaluate Seeker for human activity recognition, as well as predictive maintenance and show ~8.9x reduction in communication data volume with 86.8% accuracy, surpassing the 81.2% accuracy of the state-of-the-art.
△ Less
Submitted 26 August, 2024;
originally announced August 2024.
-
Revisiting DNN Training for Intermittently-Powered Energy-Harvesting Micro-Computers
Authors:
Cyan Subhra Mishra,
Deeksha Chaudhary,
Jack Sampson,
Mahmut Taylan Knademir,
Chita Das
Abstract:
The deployment of Deep Neural Networks in energy-constrained environments, such as Energy Harvesting Wireless Sensor Networks, presents unique challenges, primarily due to the intermittent nature of power availability. To address these challenges, this study introduces and evaluates a novel training methodology tailored for DNNs operating within such contexts. In particular, we propose a dynamic d…
▽ More
The deployment of Deep Neural Networks in energy-constrained environments, such as Energy Harvesting Wireless Sensor Networks, presents unique challenges, primarily due to the intermittent nature of power availability. To address these challenges, this study introduces and evaluates a novel training methodology tailored for DNNs operating within such contexts. In particular, we propose a dynamic dropout technique that adapts to both the architecture of the device and the variability in energy availability inherent in energy harvesting scenarios. Our proposed approach leverages a device model that incorporates specific parameters of the network architecture and the energy harvesting profile to optimize dropout rates dynamically during the training phase. By modulating the network's training process based on predicted energy availability, our method not only conserves energy but also ensures sustained learning and inference capabilities under power constraints. Our preliminary results demonstrate that this strategy provides 6 to 22 percent accuracy improvements compared to the state of the art with less than 5 percent additional compute. This paper details the development of the device model, describes the integration of energy profiles with intermittency aware dropout and quantization algorithms, and presents a comprehensive evaluation of the proposed approach using real-world energy harvesting data.
△ Less
Submitted 26 January, 2025; v1 submitted 24 August, 2024;
originally announced August 2024.
-
Bounds on the Inverse symmetric division deg index and the relation with other topological indices of graphs
Authors:
Kinkar Chandra Das,
B. R. Rakshith,
Wojciech Macek
Abstract:
Let $G=(V,E)$ be a simple graph. The concept of Inverse symmetric division deg index $(ISDD)$ was introduced in the chemical graph theory very recently. In spite of this, a few papers have already appeared with this index in the literature. Ghorbani et al. proposed Inverse symmetric division deg index and is defined as…
▽ More
Let $G=(V,E)$ be a simple graph. The concept of Inverse symmetric division deg index $(ISDD)$ was introduced in the chemical graph theory very recently. In spite of this, a few papers have already appeared with this index in the literature. Ghorbani et al. proposed Inverse symmetric division deg index and is defined as $$ISDD(G)=\sum\limits_{v_iv_j\in E(G)}\,\displaystyle{\frac{d_id_j}{d^2_i+d^2_j}},$$ where $d_i$ is the degree of the vertex $v_i$ in $G$. In this paper, we obtain some lower and upper bounds on the inverse symmetric division deg index $(ISDD)$ of graphs in terms of various graph parameters, with identifying extremal graphs. Moreover, we present two relations between the Inverse symmetric division deg index and the various topological indices of graphs. Finally, we give concluding remarks with future work.
△ Less
Submitted 9 August, 2024;
originally announced August 2024.
-
A systematic Investigation of Thermoelectric Properties of Monolayers of ZrX2N4(X = Si, Ge)
Authors:
Chayan Das,
Dibyajyoti Saikia,
Satyajit Sahu
Abstract:
In the past decade, it has been demonstrated that monolayers of metal dichalcogenides are well-suited for thermoelectric applications. ZrX2N4 (X = Si, Ge) is a reasonable choice for thermoelectric applications when considering a favorable value of the figure of merit in two-dimensional (2D) layered materials. In this study, we examined the thermoelectric characteristics of the two-dimensional mono…
▽ More
In the past decade, it has been demonstrated that monolayers of metal dichalcogenides are well-suited for thermoelectric applications. ZrX2N4 (X = Si, Ge) is a reasonable choice for thermoelectric applications when considering a favorable value of the figure of merit in two-dimensional (2D) layered materials. In this study, we examined the thermoelectric characteristics of the two-dimensional monolayer of ZrX2N4 (where X can be either Si or Ge) using a combination of Density Functional Theory (DFT) and the Boltzmann Transport Equation (BTE). A thermoelectric figure of merit (ZT) of 0.90 was achieved at a temperature of 900 K for p-type ZrGe2N4, while a ZT of 0.83 was reported for n-type ZrGe2N4 at the same temperature. In addition, the ZrGe2N4 material exhibited a thermoelectric figure of merit (ZT) of around 0.7 at room temperature for the p-type. Conversely, the ZrSi2N4 exhibited a relatively lower thermoelectric figure of merit (ZT) at ambient temperature. At higher temperatures, the ZT value experiences a substantial increase, reaching 0.89 and 0.82 for p-type and n-type materials, respectively, at 900 K. Through our analysis of the electronic band structure, we have determined that ZrSi2N4 and ZrGe2N4 exhibit indirect bandgaps (BG) of 2.74 eV and 2.66 eV, respectively, as per the Heyd-Scuseria-Ernzerhof (HSE) approximation.
△ Less
Submitted 6 August, 2024;
originally announced August 2024.
-
Study of Breather Structures in the Framework of Gardner Equation in Electron-Positron-Ion Plasmas
Authors:
Snehalata Nasipuri,
Swarniv Chandra,
Uday Narayan Ghosh,
Chinmay Das,
Prasanta Chatterjee
Abstract:
In different nonlinear mediums, the wave trains carry energy and expose many amazing features. To describe a nonlinear phenomenon, a soliton is one that preserves its shape and amplitude even after the collision. Breather is one kind of soliton structure, which is a localized wave that periodically oscillates in amplitude. This article uses the reductive perturbation technique (RPT) to get the GE…
▽ More
In different nonlinear mediums, the wave trains carry energy and expose many amazing features. To describe a nonlinear phenomenon, a soliton is one that preserves its shape and amplitude even after the collision. Breather is one kind of soliton structure, which is a localized wave that periodically oscillates in amplitude. This article uses the reductive perturbation technique (RPT) to get the GE from a plasma system with four parts: cold positrons that can move, hot positrons and hot electrons that are spread out in a kappa pattern, and positive ions that can't move. Then, using the Hirota bilinear method (HBM), it is possible to obtain the multi-soliton and breather structures of GE. Breathers are fluctuating regional wave packets and significantly participate in hydrodynamics as well as optics; besides, their interaction can alter the dynamical characteristics of the wave fields. We also incorporate a detailed numerical simulation study based on a newly designed code by two of the co-authors. It is found that in our plasma system, soliton solutions, especially breather solutions, exist. Although superthermal (kappa-distributed) electrons and positrons play an important role in soliton structures, This type of analysis can also apply to the propagation of finite-amplitude waves in natural phenomena like the atmosphere, ocean, optic fibres, signal processing, etc. It should also be useful to study different electrostatic disturbances in space and laboratory plasmas, where immobile positive ions, superthermal electrons, superthermal hot positrons, and mobile cold positrons are the major plasma species.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Unifying adjacency, Laplacian, and signless Laplacian theories
Authors:
Aniruddha Samanta,
Deepshikha,
Kinkar Chandra Das
Abstract:
Let $G$ be a simple graph with associated diagonal matrix of vertex degrees $D(G)$, adjacency matrix $A(G)$, Laplacian matrix $L(G)$ and signless Laplacian matrix $Q(G)$. Recently, Nikiforov proposed the family of matrices $A_α(G)$ defined for any real $α\in [0,1]$ as $A_α(G):=α\,D(G)+(1-α)\,A(G)$, and also mentioned that the matrices $A_α(G)$ can underpin a unified theory of $A(G)$ and $Q(G)$. In…
▽ More
Let $G$ be a simple graph with associated diagonal matrix of vertex degrees $D(G)$, adjacency matrix $A(G)$, Laplacian matrix $L(G)$ and signless Laplacian matrix $Q(G)$. Recently, Nikiforov proposed the family of matrices $A_α(G)$ defined for any real $α\in [0,1]$ as $A_α(G):=α\,D(G)+(1-α)\,A(G)$, and also mentioned that the matrices $A_α(G)$ can underpin a unified theory of $A(G)$ and $Q(G)$. Inspired from the above definition, we introduce the $B_α$-matrix of $G$, $B_α(G):=αA(G)+(1-α)L(G)$ for $α\in [0,1]$. Note that $ L(G)=B_0(G), D(G)=2B_{\frac{1}{2}}(G), Q(G)=3B_{\frac{2}{3}}(G), A(G)=B_1(G)$. In this article, we study several spectral properties of $ B_α$-matrices to unify the theories of adjacency, Laplacian, and signless Laplacian matrices of graphs. In particular, we prove that each eigenvalue of $ B_α(G) $ is continuous on $ α$. Using this, we characterize positive semidefinite $ B_α$-matrices in terms of $α$. As a consequence, we provide an upper bound of the independence number of $ G $. Besides, we establish some bounds for the largest and the smallest eigenvalues of $B_α(G)$. As a result, we obtain a bound for the chromatic number of $G$ and deduce several known results. In addition, we present a Sachs-type result for the characteristic polynomial of a $ B_α$-matrix.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Modal Analysis of Cellular Dynamics in the Morphospace in Epithelial-Mesenchymal Transition
Authors:
Akash Chandra Das,
Debanga Raj Neog,
Biplab Bose
Abstract:
During epithelial-mesenchymal transition (EMT), epithelial cells change their morphology, disperse, and gain mesenchymal-like characteristics. Usually, cells are categorized into discrete cell types or states based on gene expression and other cellular features. Subsequently, EMT is investigated as a dynamical process where cells jump from one discrete state to another. In the current work, we mov…
▽ More
During epithelial-mesenchymal transition (EMT), epithelial cells change their morphology, disperse, and gain mesenchymal-like characteristics. Usually, cells are categorized into discrete cell types or states based on gene expression and other cellular features. Subsequently, EMT is investigated as a dynamical process where cells jump from one discrete state to another. In the current work, we moved away from this idea of discrete state transition and investigated EMT dynamics in a continuous phenotypic space. We used morphology to define the phenotype of a cell. We used the data from quantitative image analysis of MDA-MB-468 cells undergoing EGF-induced EMT. We defined the morphological state space or 'morphospace' using the morphological features extracted through image analysis. During EMT, as the morphology changed, the distribution of cells in the morphospace also changed. However, this morphospace had a very high dimension. We reduced it to a 2-dimensional "reduced morphospace" and investigated the temporal change in the spatial distribution of cells in this reduced space. We used proper orthogonal decomposition to find dominant dynamical features of this spatio-temporal data. The modal analysis detected key features of EMT in this experimental system - reversible transition, distinct paths of phenotypic transition during induction and reversal of EMT, and enhanced diversity of cells during reversal of EMT. We also provide some intuitive physical meaning of the spatial modes and connect them to the key molecular event during EMT.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
On Energy of Graphs with Self-Loops
Authors:
B. R. Rakshith,
Kinkar Chandra Das,
B. J. Manjunatha
Abstract:
Let G be a simple graph on n vertices with vertex set V(G). The energy of G, denoted by, $\mathcal{E}(G)$ is the sum of all absolute values of the eigenvalues of the adjacency matrix $A(G)$. It is the first eigenvalue-based topological molecular index and is related to the molecular orbital energy levels of $π$-electrons in conjugated hydrocarbons. Recently, the concept of energy of a graph is ext…
▽ More
Let G be a simple graph on n vertices with vertex set V(G). The energy of G, denoted by, $\mathcal{E}(G)$ is the sum of all absolute values of the eigenvalues of the adjacency matrix $A(G)$. It is the first eigenvalue-based topological molecular index and is related to the molecular orbital energy levels of $π$-electrons in conjugated hydrocarbons. Recently, the concept of energy of a graph is extended to a self-loop graph. Let $S$ be a subset of $V(G)$. The graph $G_S$ is obtained from the graph $G$ by attaching a self-loop at each of the vertices of $G$ which are in the set $S$. The energy of the self-loop graph $G_S$, denoted by $\mathcal{E}(G_S)$, is the sum of all absolute eigenvalues of the matrix $A(G_S)$. Two non-isomorphic self-loop graphs are equienergetic if their energies are equal. Akbari et al. (2023)conjectured that there exist a subset $S$ of $V(G)$ such that $\mathcal(G_S) > \mathcal{E}(G)$. In this paper, we confirm this conjecture. Also, we construct pairs of equienergetic self-loop graphs of order 24n for all n \ge 1.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
A Comparison of Electronic, Dielectric, and Thermoelectric Properties of Monolayer of HfX2N4(X = Si, Ge) through First-Principles Calculations
Authors:
Chayan Das,
Abhishek,
Dibyajyoti Saikia,
Appala Naidu Gandi,
Satyajit Sahu
Abstract:
The newly emerged two-dimensional (2D) materials family of MSi2N4, where M is a transition metal atom (i.e., Mo, W, etc.), has the potential to be named after the conventional and very popular transition metal di-chalcogenides (TMDC), which got their reputation for having bandgap tunability and high mobility. The HfSi2N4 and HfGe2N4 2D materials are members of the MSi2N4 family and possess very go…
▽ More
The newly emerged two-dimensional (2D) materials family of MSi2N4, where M is a transition metal atom (i.e., Mo, W, etc.), has the potential to be named after the conventional and very popular transition metal di-chalcogenides (TMDC), which got their reputation for having bandgap tunability and high mobility. The HfSi2N4 and HfGe2N4 2D materials are members of the MSi2N4 family and possess very good figure of merit (ZT) and have high mobility, proving their suitability for thermoelectric applications. The HfSi2N4 and HfGe2N4 showed considerable ZT of 0.90 and 0.89, respectively, for p-type and 0.83 and 0.79 for n-type, at 900 K along with high mobility according to the solutions obtained after solving the Boltzmann Transport Equation (BTE). The HfGe2N4 also showed a ZT of 0.84 at 600 K and 0.68 at 300 K, which is also excellent for low-temperature operation. The bandgaps (BG) obtained for HfSi2N4 and HfGe2N4 according to the Heyd-Scuseria-Ernzerhof (HSE) approximation were 2.89 eV and 2.75 eV. The first absorption peak showed in the blue region of the visible spectrum; from this, their usefulness in visible range photodetectors can also be inferred.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Role of local anisotropy in hybrid stars
Authors:
Luiz L. Lopes,
H. C. Das
Abstract:
Using the Bower-Liang model, we discuss how pressure anisotropies affect the microscopic and macroscopic properties of hybrid stars. We find that anisotropies affect the maximum mass, central density, and radius of the canonical stars. Anisotropies also affect the minimum neutron star mass that presents quarks in their core, as well as the total amount of quarks for the maximally massive stars. We…
▽ More
Using the Bower-Liang model, we discuss how pressure anisotropies affect the microscopic and macroscopic properties of hybrid stars. We find that anisotropies affect the maximum mass, central density, and radius of the canonical stars. Anisotropies also affect the minimum neutron star mass that presents quarks in their core, as well as the total amount of quarks for the maximally massive stars. We also confront our results with standard constraints, such as the radius and the tidal parameter of the canonical star, as well as the mass and radius of the PSR J0740+6620 pulsar. We observe that moderate values for anisotropies could fulfill these constraints simultaneously. On the other hand, within more extreme degrees of anisotropies, more speculative constraints such as black widow pulsars PSR J0952-0607 and the mass-gap object in the GW190814 event can be explained as hybrid stars. We also investigate the role of anisotropies in the neutron stars' moment of inertia.
△ Less
Submitted 15 October, 2024; v1 submitted 29 April, 2024;
originally announced May 2024.
-
Dark matter effects on the properties of neutron stars: compactness and tidal deformability
Authors:
Hong-Ming Liu,
Jin-Biao Wei,
Zeng-Hua Li,
G. F. Burgio,
H. C. Das,
H. -J. Schulze
Abstract:
We systematically study the observable properties of dark-matter admixed neutron stars, employing a realistic nuclear EOS in combination with self-interacting fermionic dark matter respecting constraints on the self-interaction cross section. Deviations from universal relations valid for nucleonic neutron stars are analyzed over the whole parameter space of the model and unequivocal signals for th…
▽ More
We systematically study the observable properties of dark-matter admixed neutron stars, employing a realistic nuclear EOS in combination with self-interacting fermionic dark matter respecting constraints on the self-interaction cross section. Deviations from universal relations valid for nucleonic neutron stars are analyzed over the whole parameter space of the model and unequivocal signals for the presence of dark matter in neutron stars are identified.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Bangladesh Agricultural Knowledge Graph: Enabling Semantic Integration and Data-driven Analysis--Full Version
Authors:
Rudra Pratap Deb Nath,
Tithi Rani Das,
Tonmoy Chandro Das,
S. M. Shafkat Raihan
Abstract:
In Bangladesh, agriculture is a crucial driver for addressing Sustainable Development Goal 1 (No Poverty) and 2 (Zero Hunger), playing a fundamental role in the economy and people's livelihoods. To enhance the sustainability and resilience of the agriculture industry through data-driven insights, the Bangladesh Bureau of Statistics and other organizations consistently collect and publish agricultu…
▽ More
In Bangladesh, agriculture is a crucial driver for addressing Sustainable Development Goal 1 (No Poverty) and 2 (Zero Hunger), playing a fundamental role in the economy and people's livelihoods. To enhance the sustainability and resilience of the agriculture industry through data-driven insights, the Bangladesh Bureau of Statistics and other organizations consistently collect and publish agricultural data on the Web. Nevertheless, the current datasets encounter various challenges: 1) they are presented in an unsustainable, static, read-only, and aggregated format, 2) they do not conform to the Findability, Accessibility, Interoperability, and Reusability (FAIR) principles, and 3) they do not facilitate interactive analysis and integration with other data sources. In this paper, we present a thorough solution, delineating a systematic procedure for developing BDAKG: a knowledge graph that semantically and analytically integrates agriculture data in Bangladesh. BDAKG incorporates multidimensional semantics, is linked with external knowledge graphs, is compatible with OLAP, and adheres to the FAIR principles. Our experimental evaluation centers on evaluating the integration process and assessing the quality of the resultant knowledge graph in terms of completeness, timeliness, FAIRness, OLAP compatibility and data-driven analysis. Our federated data analysis recommend a strategic approach focused on decreasing CO$_2$ emissions, fostering economic growth, and promoting sustainable forestry.
△ Less
Submitted 19 March, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Neutron star cooling and mass distributions
Authors:
H. C. Das,
Jin-Biao Wei,
G. F. Burgio,
H. -J. Schulze
Abstract:
We study the cooling of isolated neutron stars, employing different nuclear equations of state with or without active direct Urca process, and investigate the interplay with the nuclear pairing gaps. We find that a consistent description of all current cooling data requires fast direct Urca cooling and reasonable proton 1S0 gaps, but no neutron 3P2 pairing. We then deduce the neutron star mass dis…
▽ More
We study the cooling of isolated neutron stars, employing different nuclear equations of state with or without active direct Urca process, and investigate the interplay with the nuclear pairing gaps. We find that a consistent description of all current cooling data requires fast direct Urca cooling and reasonable proton 1S0 gaps, but no neutron 3P2 pairing. We then deduce the neutron star mass distributions compatible with the cooling analysis and compare with current theoretical models. Reduced 1S0 gaps and unimodal mass distributions are preferred by the analysis. The importance of statistical and systematic errors is also investigated.
△ Less
Submitted 11 June, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Common neighborhood energies and their relations with Zagreb index
Authors:
Firdous Ee Jannat,
Rajat Kanti Nath,
Kinkar Chandra Das
Abstract:
In this paper we establish connections between common neighborhood Laplacian and common neighborhood signless Laplacian energies and the first Zagreb index of a graph $\mathcal{G}$. We introduce the concepts of CNL-hyperenergetic and CNSL-hyperenergetic graphs and showed that $\mathcal{G}$ is neither CNL-hyperenergetic nor CNSL-hyperenergetic if $\mathcal{G}$ is a complete bipartite graph. We obta…
▽ More
In this paper we establish connections between common neighborhood Laplacian and common neighborhood signless Laplacian energies and the first Zagreb index of a graph $\mathcal{G}$. We introduce the concepts of CNL-hyperenergetic and CNSL-hyperenergetic graphs and showed that $\mathcal{G}$ is neither CNL-hyperenergetic nor CNSL-hyperenergetic if $\mathcal{G}$ is a complete bipartite graph. We obtain certain relations between various energies of a graph. Finally, we conclude the paper with several bounds for common neighborhood Laplacian and signless Laplacian energies of a graph.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
Role of spontaneously generated coherence (SGC) in laser cooling of atoms
Authors:
Rajnandan Choudhury Das,
Samir Khan,
Thilagaraj R,
Kanhaiya Pandey
Abstract:
The well-known sub-Doppler polarization gradient cooling in type-I transition ($F_e=F_g+1$) is caused by red-detuned lasers. On the other hand, in type-II transition ($F_e\le F_g$), sub-Doppler cooling takes place through blue-detuned lasers. This opposite behavior for the two types of transitions is due to SGC. In the absence of SGC, both types of transitions show blue-detuned cooling. In this wo…
▽ More
The well-known sub-Doppler polarization gradient cooling in type-I transition ($F_e=F_g+1$) is caused by red-detuned lasers. On the other hand, in type-II transition ($F_e\le F_g$), sub-Doppler cooling takes place through blue-detuned lasers. This opposite behavior for the two types of transitions is due to SGC. In the absence of SGC, both types of transitions show blue-detuned cooling. In this work, we experimentally and theoretically demonstrate blue-detuned cooling for both types of transitions in $^{\textrm{87}}$Rb. For completeness, we compare the temperatures in various configurations.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
Security and Privacy Challenges of Large Language Models: A Survey
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Large Language Models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLM is becoming a very popular tool in computerized language processing tasks, with the capability to analyze complicated linguistic patterns and provide relevant and appropriate responses depe…
▽ More
Large Language Models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLM is becoming a very popular tool in computerized language processing tasks, with the capability to analyze complicated linguistic patterns and provide relevant and appropriate responses depending on the context. While offering significant advantages, these models are also vulnerable to security and privacy attacks, such as jailbreaking attacks, data poisoning attacks, and Personally Identifiable Information (PII) leakage attacks. This survey provides a thorough review of the security and privacy challenges of LLMs for both training data and users, along with the application-based risks in various domains, such as transportation, education, and healthcare. We assess the extent of LLM vulnerabilities, investigate emerging security and privacy attacks for LLMs, and review the potential defense mechanisms. Additionally, the survey outlines existing research gaps in this domain and highlights future research directions.
△ Less
Submitted 14 November, 2024; v1 submitted 29 January, 2024;
originally announced February 2024.
-
GPU Cluster Scheduling for Network-Sensitive Deep Learning
Authors:
Aakash Sharma,
Vivek M. Bhasi,
Sonali Singh,
George Kesidis,
Mahmut T. Kandemir,
Chita R. Das
Abstract:
We propose a novel GPU-cluster scheduler for distributed DL (DDL) workloads that enables proximity based consolidation of GPU resources based on the DDL jobs' sensitivities to the anticipated communication-network delays. Our scheduler consists of three major components: (i) a classical delay scheduling algorithm to facilitate job placement and consolidation; (ii) a network-sensitive job preemptio…
▽ More
We propose a novel GPU-cluster scheduler for distributed DL (DDL) workloads that enables proximity based consolidation of GPU resources based on the DDL jobs' sensitivities to the anticipated communication-network delays. Our scheduler consists of three major components: (i) a classical delay scheduling algorithm to facilitate job placement and consolidation; (ii) a network-sensitive job preemption strategy; and (iii) an "auto-tuner" mechanism to optimize delay timers for effective delay scheduling. Additionally, to enable a cost-effective methodology for large-scale experiments, we develop a data-driven DDL cluster simulation platform. Employing the simulation platform we compare against several state-of-the-art alternatives on real-world workload traces to demonstrate the benefits of our design. Our scheduler can provide improvement of up to 69% in end-to-end Makespan for training all jobs compared to the prevailing consolidation-based scheduling methods, while reducing the average job completion time by up to 83% and minimizing the communication overheads by up to 98% under congested networking conditions.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Direct spectroscopy of Rubidium using a narrow-line transition at 420 nm
Authors:
Rajnandan Choudhury Das,
Samir Khan,
Thilagaraj R,
Kanhaiya Pandey
Abstract:
The 5S$\to$6P transition in Rubidium (Rb) at 420 nm offers the advantage of a narrower linewidth and diverse applications in quantum technologies. However, the direct spectroscopy at this transition is challenging due to its weak transition strength. In this paper, we have discussed the saturated absorption spectroscopy (SAS) of Rb using the narrow-line transition at 420 nm. We have studied the ef…
▽ More
The 5S$\to$6P transition in Rubidium (Rb) at 420 nm offers the advantage of a narrower linewidth and diverse applications in quantum technologies. However, the direct spectroscopy at this transition is challenging due to its weak transition strength. In this paper, we have discussed the saturated absorption spectroscopy (SAS) of Rb using the narrow-line transition at 420 nm. We have studied the effect of the temperature of the Rb cell, pump power and the beam size on the SAS dip heights and their linewidths. Additionally, our study offers a comprehensive examination, encompassing all eight error signals of Rb for the 5S$\to$6P transition at 420 nm and 421 nm. These findings contribute valuable insights to the field of laser frequency stabilization of Rb at blue transition and can be useful in quantum technologies based on this transition.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Continuous loading of magneto-optical trap of Rb at narrow transition
Authors:
Rajnandan Choudhury Das,
Samir Khan,
Thilagaraj R,
Kanhaiya Pandey
Abstract:
We report continuous loading of $^{\textrm{87}}$Rb atoms in a magneto-optical trap (MOT) at narrow linewidth, 420 nm 5S$_{1/2}$, F$=2\rightarrow$ 6P$_{3/2}$, F$=3$ blue transition (blue MOT). Continuous loading of the blue MOT is achieved by superimposing the blue laser beam, inside a hollow core of infrared laser beam driving the broad 5S$_{1/2}$, F$=2\rightarrow$ 5P$_{3/2}$, F$=3$ transition at…
▽ More
We report continuous loading of $^{\textrm{87}}$Rb atoms in a magneto-optical trap (MOT) at narrow linewidth, 420 nm 5S$_{1/2}$, F$=2\rightarrow$ 6P$_{3/2}$, F$=3$ blue transition (blue MOT). Continuous loading of the blue MOT is achieved by superimposing the blue laser beam, inside a hollow core of infrared laser beam driving the broad 5S$_{1/2}$, F$=2\rightarrow$ 5P$_{3/2}$, F$=3$ transition at 780 nm. We typically load $\sim10^{8}$ atoms in the blue MOT in 2.5 seconds. We characterize the continuous loading of blue MOT with various parameters such as magnetic field gradient, detuning, power and diameter of blue MOT beam and diameter of the hollow core (spot) inside the IR MOT beam. We observe that the blue laser beam should overfill the spot of the IR laser beam. This is because the blue laser cools the atoms to a lower temperature even in the presence of the broad IR laser i.e. in the overlapped region and hence helps in loading. We also present the theoretical framework for cooling atoms in the presence of simultaneously two transitions to support the experimental result. This method of continuous loading of the blue MOT can be useful to produce a continuous atomic beam of cold Rb atoms.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Dark Matter Influence on Quarkyonic Stars: A Relativistic Mean Field Analysis
Authors:
D. Dey,
Jeet Amrit Pattnaik,
H. C. Das,
A. Kumar,
R. N. Panda,
S. K. Patra
Abstract:
The formulation of quarkyonic matter consists of treating both quarks and nucleons as quasi-particles, where a cross-over transition occurs between the two phases. This work is based upon some of the early ideas of quark matter. It can satisfy the different observational constraints on the neutron star (NS), such as its maximum mass and the canonical radius. In addition, we put an extra component…
▽ More
The formulation of quarkyonic matter consists of treating both quarks and nucleons as quasi-particles, where a cross-over transition occurs between the two phases. This work is based upon some of the early ideas of quark matter. It can satisfy the different observational constraints on the neutron star (NS), such as its maximum mass and the canonical radius. In addition, we put an extra component inside the NS known as Dark Matter (DM) because it is trapped due to its immense gravitational potential. In this work, we explore the impact of fermionic DM on the structure of the NS. The equation of state (EOS) is derived for the NS with the quarkyonic matter by assuming that nucleons and quarks are in equilibrium, followed by the relativistic mean-field (RMF) formalism. The recently modeled two parameterizations, such as G3 and IOPB-I, are taken to calculate the various macroscopic properties of the NS. The three unknown parameters such as the transition density ($n_t$), the QCD confinement scale ($Λ_{\rm sc}$), and the DM Fermi momentum ($k_f^{\rm DM}$) are varied to obtain the NS properties. The quarkyonic matter stiffens the EOS while DM softens it. The mutual combination provides us with good theoretical predictions for the magnitude of macroscopic properties consistent with the different observational results. Also, one can estimate the parameters of the DM admixed quarkyonic star with different statistical analyses, which can be further used to explore the other properties of the quarkyonic star.
△ Less
Submitted 28 May, 2024; v1 submitted 4 January, 2024;
originally announced January 2024.
-
Development Of Impedance and Capacitance based Sensors for the Estimation of Adulterant Ingredients in Different Bio-Consumables
Authors:
Chirantan Das
Abstract:
Electrical Impedance Spectroscopy (EIS) technique is found to be an excellent candidate for bio-sensing and food quality monitoring applications due to its rapid, robust, cost-effective and point-of-care approach. The present research work investigates the implementation of EIS technique supported by several optical spectroscopic techniques such as Ultraviolet-Visible (UV-Vis) and Fourier Transfor…
▽ More
Electrical Impedance Spectroscopy (EIS) technique is found to be an excellent candidate for bio-sensing and food quality monitoring applications due to its rapid, robust, cost-effective and point-of-care approach. The present research work investigates the implementation of EIS technique supported by several optical spectroscopic techniques such as Ultraviolet-Visible (UV-Vis) and Fourier Transform Mid Infrared (FT-MIR) to detect and quantify several toxic adulterants in foods and bio-consumables. A comprehensive understanding on the background theory related to the study has been developed to analyze the overall polarization of the system and the effect of frequency on complex permittivity of such system have been observed. In the current work, the technique is applied to adulterated saccharides, honey and turmeric samples through a prototype sensing device. All the corresponding measurements have been performed by dipping a custom-made parallel plate conductivity cell with unity cell constant inside the solution under test. EIS study exhibited a steady variation of electrical parameters such as impedance, capacitance, conductance and current values with increasing adulterant percentage in the solution. Variation in such properties due to adulteration provides a systematic sensor plot through which one can determine their percentage of adulteration in unknown adulterated samples. Co-efficient of sensitivity has been extracted from the EIS data for adulteration study in terms of one of the measured parameters. The results of UV-Vis and FT-MIR studies have been used for comparative analyses which corroborate with the EIS results, wherever applicable.
△ Less
Submitted 3 January, 2024;
originally announced January 2024.
-
Spherically symmetric anisotropic strange stars
Authors:
Luiz L. Lopes,
H. C. Das
Abstract:
In this work, we made an extensive study about the possible presence of anisotropies in strange stars. To accomplish this task, we use three different configurations for the strange matter: the unpaired matter, a two-flavor super-conducting (2SC) strange matter, and a fully three-flavor super-conducting strange matter (CFL). For each configuration, we calculate the relevant quantities for the stra…
▽ More
In this work, we made an extensive study about the possible presence of anisotropies in strange stars. To accomplish this task, we use three different configurations for the strange matter: the unpaired matter, a two-flavor super-conducting (2SC) strange matter, and a fully three-flavor super-conducting strange matter (CFL). For each configuration, we calculate the relevant quantities for the strange stars, such as the mass-radius relation, the dimensionless tidal parameter, the moment of inertia, and the surface curvature for different degrees of anisotropies. Whenever possible, we compare our results with constraints found in the literature, especially focusing on the existence of very massive pulsars (PSR J0952-0607), as well as very light compact objects (HESS J1731-347).
△ Less
Submitted 20 February, 2024; v1 submitted 30 November, 2023;
originally announced December 2023.
-
Privacy Risks Analysis and Mitigation in Federated Learning for Medical Images
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Federated learning (FL) is gaining increasing popularity in the medical domain for analyzing medical images, which is considered an effective technique to safeguard sensitive patient data and comply with privacy regulations. However, several recent studies have revealed that the default settings of FL may leak private training data under privacy attacks. Thus, it is still unclear whether and to wh…
▽ More
Federated learning (FL) is gaining increasing popularity in the medical domain for analyzing medical images, which is considered an effective technique to safeguard sensitive patient data and comply with privacy regulations. However, several recent studies have revealed that the default settings of FL may leak private training data under privacy attacks. Thus, it is still unclear whether and to what extent such privacy risks of FL exist in the medical domain, and if so, "how to mitigate such risks?". In this paper, first, we propose a holistic framework for Medical data Privacy risk analysis and mitigation in Federated Learning (MedPFL) to analyze privacy risks and develop effective mitigation strategies in FL for protecting private medical data. Second, we demonstrate the substantial privacy risks of using FL to process medical images, where adversaries can easily perform privacy attacks to reconstruct private medical images accurately. Third, we show that the defense approach of adding random noises may not always work effectively to protect medical images against privacy attacks in FL, which poses unique and pressing challenges associated with medical data for privacy protection.
△ Less
Submitted 31 January, 2024; v1 submitted 11 November, 2023;
originally announced November 2023.
-
Optimal Strategies for Round-Trip Pairs Trading Under Geometric Brownian Motions
Authors:
Emily Crawford Das,
Jingzhi Tie,
Qing Zhang
Abstract:
This paper is concerned with an optimal strategy for simultaneously trading a pair of stocks. The idea of pairs trading is to monitor their price movements and compare their relative strength over time. A pairs trade is triggered by the divergence of their prices and consists of a pair of positions to short the strong stock and to long the weak one. Such a strategy bets on the reversal of their pr…
▽ More
This paper is concerned with an optimal strategy for simultaneously trading a pair of stocks. The idea of pairs trading is to monitor their price movements and compare their relative strength over time. A pairs trade is triggered by the divergence of their prices and consists of a pair of positions to short the strong stock and to long the weak one. Such a strategy bets on the reversal of their price strengths. A round-trip trading strategy refers to opening and closing such a pair of security positions. Typical pairs-trading models usually assume a difference of the stock prices satisfies a mean-reversion equation. However, we consider the optimal pairs-trading problem by allowing the stock prices to follow general geometric Brownian motions. The objective is to trade the pairs over time to maximize an overall return with a fixed commission cost for each transaction. Initially, we allow the initial pairs position to be either long or flat. We then consider the problem when the initial pairs position may be long, flat, or short. In each case, the optimal policy is characterized by threshold curves obtained by solving the associated HJB equations.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Validation of a Zero-Shot Learning Natural Language Processing Tool for Data Abstraction from Unstructured Healthcare Data
Authors:
Basil Kaufmann,
Dallin Busby,
Chandan Krushna Das,
Neeraja Tillu,
Mani Menon,
Ashutosh K. Tewari,
Michael A. Gorin
Abstract:
Objectives: To describe the development and validation of a zero-shot learning natural language processing (NLP) tool for abstracting data from unstructured text contained within PDF documents, such as those found within electronic health records. Materials and Methods: A data abstraction tool based on the GPT-3.5 model from OpenAI was developed and compared to three physician human abstractors in…
▽ More
Objectives: To describe the development and validation of a zero-shot learning natural language processing (NLP) tool for abstracting data from unstructured text contained within PDF documents, such as those found within electronic health records. Materials and Methods: A data abstraction tool based on the GPT-3.5 model from OpenAI was developed and compared to three physician human abstractors in terms of time to task completion and accuracy for abstracting data on 14 unique variables from a set of 199 de-identified radical prostatectomy pathology reports. The reports were processed by the software tool in vectorized and scanned formats to establish the impact of optical character recognition on data abstraction. The tool was assessed for superiority for data abstraction speed and non-inferiority for accuracy. Results: The human abstractors required a mean of 101s per report for data abstraction, with times varying from 15 to 284 s. In comparison, the software tool required a mean of 12.8 s to process the vectorized reports and a mean of 15.8 to process the scanned reports (P < 0.001). The overall accuracies of the three human abstractors were 94.7%, 97.8%, and 96.4% for the combined set of 2786 datapoints. The software tool had an overall accuracy of 94.2% for the vectorized reports, proving to be non-inferior to the human abstractors at a margin of -10% ($α$=0.025). The tool had a slightly lower accuracy of 88.7% using the scanned reports, proving to be non-inferiority to 2 out of 3 human abstractors. Conclusion: The developed zero-shot learning NLP tool affords researchers comparable levels of accuracy to that of human abstractors, with significant time savings benefits. Because of the lack of need for task-specific model training, the developed tool is highly generalizable and can be used for a wide variety of data abstraction tasks, even outside the field of medicine.
△ Less
Submitted 23 July, 2023;
originally announced August 2023.
-
Establishing Magnetic Coupling in Spin-crossover-2D Hybrid Nanostructures via Interfacial Charge-transfer Interaction
Authors:
Shatabda Bhattacharya,
Shubhadip Moulick,
Chinmoy Das,
Shiladitya Karmakar,
Hirokazu Tada,
Tanusri Saha-Dasgupta,
Pradip Chakraborty,
Atindra Nath Pal
Abstract:
Despite a clear demonstration of bistability in spin-crossover (SCO) materials, the absence of long-range magnetic order and poor electrical conductivity limit their prospect in spintronic and nanoelectronic applications. Intending to create hybrid devices made of spin-crossover (SCO)-2D architecture, here, we report an easily processable Fe-based SCO nanostructures grown on 2D reduced graphene ox…
▽ More
Despite a clear demonstration of bistability in spin-crossover (SCO) materials, the absence of long-range magnetic order and poor electrical conductivity limit their prospect in spintronic and nanoelectronic applications. Intending to create hybrid devices made of spin-crossover (SCO)-2D architecture, here, we report an easily processable Fe-based SCO nanostructures grown on 2D reduced graphene oxide (rGO). The heterostructure shows enhanced cooperativity due to formation of interfacial charge transfer induced inter-molecular interaction. The spin transition temperature is controlled by tuning the coverage area of SCO nanostructured networks over the 2D surfaces, thus manipulating hysteresis (aka memory) of the heterostructure. The enhanced magnetic coupling of the heterostructure leads to the spontaneous magnetization states with a large coercive field of $\sim$ 3000 Oe. Additionally, the low conductivity of the pristine SCO nanostructures is addressed by encapsulating them on suitable 2D rGO template, enabling detection of magnetic bistable spin states during high-spin/low-spin conductance change. This adds spin functionality in conductance switching for realizing hybrid 2D spintronic devices. Ab-inito calculations, on the experimentally proposed nanostructures, corroborate the enhanced magnetic interaction in the proposed architecture facilitated by interfacial charge transfer and provide insights on the microscopic mechanism.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.