-
Buildings for Synthesis with Clifford+R
Authors:
Mark Deaconu,
Nihar Gargava,
Amolak Ratan Kalra,
Michele Mosca,
Jon Yard
Abstract:
We study the problem of exact synthesis for the Clifford+R gate set and give the explicit structure of the underlying Bruhat-Tits building for this group. In this process, we also give an alternative proof of the arithmetic nature of the Clifford+R gate set.
We study the problem of exact synthesis for the Clifford+R gate set and give the explicit structure of the underlying Bruhat-Tits building for this group. In this process, we also give an alternative proof of the arithmetic nature of the Clifford+R gate set.
△ Less
Submitted 13 October, 2025;
originally announced October 2025.
-
Word2Spike: Poisson Rate Coding for Associative Memories and Neuromorphic Algorithms
Authors:
Archit Kalra,
Midhun Sadanand
Abstract:
Spiking neural networks offer a promising path toward energy-efficient, brain-like associative memory. This paper introduces Word2Spike, a novel rate coding mechanism that combines continuous word embeddings and neuromorphic architectures. We develop a one-to-one mapping that converts multi-dimensional word vectors into spike-based attractor states using Poisson processes. Using BitNet b1.58 quant…
▽ More
Spiking neural networks offer a promising path toward energy-efficient, brain-like associative memory. This paper introduces Word2Spike, a novel rate coding mechanism that combines continuous word embeddings and neuromorphic architectures. We develop a one-to-one mapping that converts multi-dimensional word vectors into spike-based attractor states using Poisson processes. Using BitNet b1.58 quantization, we maintain 97% semantic similarity of continuous embeddings on SimLex-999 while achieving 100% reconstruction accuracy on 10,000 words from OpenAI's text-embedding-3-large. We preserve analogy performance (100% of original embedding performance) even under intentionally introduced noise, indicating a resilient mechanism for semantic encoding in neuromorphic systems. Next steps include integrating the mapping with spiking transformers and liquid state machines (resembling Hopfield Networks) for further evaluation.
△ Less
Submitted 8 September, 2025;
originally announced September 2025.
-
Hate in the Time of Algorithms: Evidence on Online Behavior from a Large-Scale Experiment
Authors:
Aarushi Kalra
Abstract:
Social media algorithms are thought to amplify variation in user beliefs, thus contributing to radicalization. However, quantitative evidence on how algorithms and user preferences jointly shape harmful online engagement is limited. I conduct an individually randomized experiment with 8 million users of an Indian TikTok-like platform, replacing algorithmic ranking with random content delivery. Exp…
▽ More
Social media algorithms are thought to amplify variation in user beliefs, thus contributing to radicalization. However, quantitative evidence on how algorithms and user preferences jointly shape harmful online engagement is limited. I conduct an individually randomized experiment with 8 million users of an Indian TikTok-like platform, replacing algorithmic ranking with random content delivery. Exposure to "toxic" posts decreases by 27%, mainly due to reduced platform usage by users with higher interest in such content. Strikingly, these users increase engagement with toxic posts they find. Survey evidence indicates shifts to other platforms. Model-based counterfactuals highlight the limitations of blanket algorithmic regulation.
△ Less
Submitted 8 March, 2025;
originally announced March 2025.
-
Stabilizer Ranks, Barnes Wall Lattices and Magic Monotones
Authors:
Amolak Ratan Kalra,
Pulkit Sinha
Abstract:
In 2024, Kliuchnikov and Schönnenbeck showed a connection between the Barnes Wall lattices, stabilizer states and Clifford operations. In this work, we study their results and relate them to the problem of lower bounding stabilizer ranks. We show the first quantitative lower bound on stabilizer fidelity as a function of stabilizer ranks, which reproduces the linear-by-log lower bound for…
▽ More
In 2024, Kliuchnikov and Schönnenbeck showed a connection between the Barnes Wall lattices, stabilizer states and Clifford operations. In this work, we study their results and relate them to the problem of lower bounding stabilizer ranks. We show the first quantitative lower bound on stabilizer fidelity as a function of stabilizer ranks, which reproduces the linear-by-log lower bound for $χ_δ({|{H}\rangle^{ \otimes n}})$, i.e, on the approximate stabilizer rank of $|H\rangle^{\otimes n}$. In fact, we show that the lower bound holds even when the fidelity between the approximation and ${|H\rangle}^{\otimes n}$ is exponentially small, which is currently the best lower bound in this regime.
Next, we define a new magic monotone for pure states, the Barnes Wall norm, and its corresponding approximate variant. We upper bound these monotones by the $CS$-count of state preparation, and also by the stabilizer ranks. In particular, the upper bound given by the $CS$-count is tight, in the sense that we exhibit states that achieve the bound.
Apart from these results, we give a Fidelity Amplification algorithm, which provides a trade-off between approximation error and the stabilizer rank. As a corollary, it gives us a way to compose approximate stabilizer decompositions into approximate decompositions of their tensor products.
Finally, we provide an alternate, elementary proof of the existence and density of product states with maximal stabilizer ranks, which was first proven by Lovitz and Steffan (2022), where they used results from algebraic geometry.
△ Less
Submitted 6 March, 2025;
originally announced March 2025.
-
TabulaTime: A Novel Multimodal Deep Learning Framework for Advancing Acute Coronary Syndrome Prediction through Environmental and Clinical Data Integration
Authors:
Xin Zhang,
Liangxiu Han,
Stephen White,
Saad Hassan,
Philip A Kalra,
James Ritchie,
Carl Diver,
Jennie Shorley
Abstract:
Acute Coronary Syndromes (ACS), including ST-segment elevation myocardial infarctions (STEMI) and non-ST-segment elevation myocardial infarctions (NSTEMI), remain a leading cause of mortality worldwide. Traditional cardiovascular risk scores rely primarily on clinical data, often overlooking environmental influences like air pollution that significantly impact heart health. Moreover, integrating c…
▽ More
Acute Coronary Syndromes (ACS), including ST-segment elevation myocardial infarctions (STEMI) and non-ST-segment elevation myocardial infarctions (NSTEMI), remain a leading cause of mortality worldwide. Traditional cardiovascular risk scores rely primarily on clinical data, often overlooking environmental influences like air pollution that significantly impact heart health. Moreover, integrating complex time-series environmental data with clinical records is challenging.
We introduce TabulaTime, a multimodal deep learning framework that enhances ACS risk prediction by combining clinical risk factors with air pollution data. TabulaTime features three key innovations: First, it integrates time-series air pollution data with clinical tabular data to improve prediction accuracy. Second, its PatchRWKV module automatically extracts complex temporal patterns, overcoming limitations of traditional feature engineering while maintaining linear computational complexity. Third, attention mechanisms enhance interpretability by revealing interactions between clinical and environmental factors.
Experimental results show that TabulaTime improves prediction accuracy by over 20% compared to conventional models such as CatBoost, Random Forest, and LightGBM, with air pollution data alone contributing over a 10% improvement. Feature importance analysis identifies critical predictors including previous angina, systolic blood pressure, PM10, and NO2. Overall, TabulaTime bridges clinical and environmental insights, supporting personalized prevention strategies and informing public health policies to mitigate ACS risk.
△ Less
Submitted 26 April, 2025; v1 submitted 24 February, 2025;
originally announced February 2025.
-
How Vulnerable Is My Learned Policy? Universal Adversarial Perturbation Attacks On Modern Behavior Cloning Policies
Authors:
Akansha Kalra,
Basavasagar Patil,
Guanhong Tao,
Daniel S. Brown
Abstract:
Learning from Demonstration (LfD) algorithms have shown promising results in robotic manipulation tasks, but their vulnerability to offline universal perturbation attacks remains underexplored. This paper presents a comprehensive study of adversarial attacks on both classic and recently proposed algorithms, including Behavior Cloning (BC), LSTM-GMM, Implicit Behavior Cloning (IBC), Diffusion Polic…
▽ More
Learning from Demonstration (LfD) algorithms have shown promising results in robotic manipulation tasks, but their vulnerability to offline universal perturbation attacks remains underexplored. This paper presents a comprehensive study of adversarial attacks on both classic and recently proposed algorithms, including Behavior Cloning (BC), LSTM-GMM, Implicit Behavior Cloning (IBC), Diffusion Policy (DP), and Vector-Quantizied Behavior Transformer (VQ-BET). We study the vulnerability of these methods to universal adversarial perturbations. Our experiments on several simulated robotic manipulation tasks reveal that most of the current methods are highly vulnerable to adversarial perturbations. We also show that these attacks are often transferable across algorithms, architectures, and tasks, raising concerning security vulnerabilities to black-box attacks. To the best of our knowledge, we are the first to present a systematic study of the vulnerabilities of different LfD algorithms to both white-box and black-box attacks. Our findings highlight the vulnerabilities of modern BC algorithms, paving the way for future work in addressing such limitations.
△ Less
Submitted 13 October, 2025; v1 submitted 5 February, 2025;
originally announced February 2025.
-
Invariant Theory and Magic State Distillation
Authors:
Amolak Ratan Kalra,
Shiroman Prakash
Abstract:
We show that the performance of a linear self-orthogonal $GF(4)$ code for magic state distillation of Bravyi and Kitaev's $|T\rangle$-state is characterized by its simple weight enumerator. We compute weight enumerators of all such codes with fewer than 20 qubits and find none whose threshold exceeds that of the 5-qubit code. Using constraints on weight enumerators from invariant theory and linear…
▽ More
We show that the performance of a linear self-orthogonal $GF(4)$ code for magic state distillation of Bravyi and Kitaev's $|T\rangle$-state is characterized by its simple weight enumerator. We compute weight enumerators of all such codes with fewer than 20 qubits and find none whose threshold exceeds that of the 5-qubit code. Using constraints on weight enumerators from invariant theory and linear programming, we establish bounds on the exponent characterizing noise suppression of a $|T\rangle$-state distillation protocol. We also obtain new non-negativity constraints on such weight enumerators by demanding consistency of the associated magic state distillation routine. These constraints yield new bounds on the distances of classical Hermitian self-dual and maximal self-orthogonal linear $GF(4)$ codes, notably proving the nonexistence of such codes with parameters $[12m, 6m, 4m+2]_{GF(4)}$.
△ Less
Submitted 22 January, 2025; v1 submitted 17 January, 2025;
originally announced January 2025.
-
EndoDINO: A Foundation Model for GI Endoscopy
Authors:
Patrick Dermyer,
Angad Kalra,
Matt Schwartz
Abstract:
In this work, we present EndoDINO, a foundation model for GI endoscopy tasks that achieves strong generalizability by pre-training on a well-curated image dataset sampled from the largest known GI endoscopy video dataset in the literature. Specifically, we pre-trained ViT models with 1B, 307M, and 86M parameters using datasets ranging from 100K to 10M curated images. Using EndoDINO as a frozen fea…
▽ More
In this work, we present EndoDINO, a foundation model for GI endoscopy tasks that achieves strong generalizability by pre-training on a well-curated image dataset sampled from the largest known GI endoscopy video dataset in the literature. Specifically, we pre-trained ViT models with 1B, 307M, and 86M parameters using datasets ranging from 100K to 10M curated images. Using EndoDINO as a frozen feature encoder, we achieved state-of-the-art performance in anatomical landmark classification, polyp segmentation, and Mayo endoscopic scoring (MES) for ulcerative colitis with only simple decoder heads.
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Collision Avoidance Metric for 3D Camera Evaluation
Authors:
Vage Taamazyan,
Alberto Dall'olio,
Agastya Kalra
Abstract:
3D cameras have emerged as a critical source of information for applications in robotics and autonomous driving. These cameras provide robots with the ability to capture and utilize point clouds, enabling them to navigate their surroundings and avoid collisions with other objects. However, current standard camera evaluation metrics often fail to consider the specific application context. These met…
▽ More
3D cameras have emerged as a critical source of information for applications in robotics and autonomous driving. These cameras provide robots with the ability to capture and utilize point clouds, enabling them to navigate their surroundings and avoid collisions with other objects. However, current standard camera evaluation metrics often fail to consider the specific application context. These metrics typically focus on measures like Chamfer distance (CD) or Earth Mover's Distance (EMD), which may not directly translate to performance in real-world scenarios. To address this limitation, we propose a novel metric for point cloud evaluation, specifically designed to assess the suitability of 3D cameras for the critical task of collision avoidance. This metric incorporates application-specific considerations and provides a more accurate measure of a camera's effectiveness in ensuring safe robot navigation. The source code is available at https://github.com/intrinsic-ai/collision-avoidance-metric.
△ Less
Submitted 8 July, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
Multi-qutrit exact synthesis
Authors:
Amolak Ratan Kalra,
Manimugdha Saikia,
Dinesh Valluri,
Sam Winnick,
Jon Yard
Abstract:
We present an exact synthesis algorithm for qutrit unitaries in $\mathcal{U}_{3^n}(\mathbb{Z}[1/3,e^{2πi/3}])$ over the Clifford$+T$ gate set with at most one ancilla. This extends the already known result of qutrit metaplectic gates being a subset of Clifford$+T$ gate set with one ancilla. As an intermediary step, we construct an algorithm to convert 3-level unitaries into multiply-controlled gat…
▽ More
We present an exact synthesis algorithm for qutrit unitaries in $\mathcal{U}_{3^n}(\mathbb{Z}[1/3,e^{2πi/3}])$ over the Clifford$+T$ gate set with at most one ancilla. This extends the already known result of qutrit metaplectic gates being a subset of Clifford$+T$ gate set with one ancilla. As an intermediary step, we construct an algorithm to convert 3-level unitaries into multiply-controlled gates, analogous to Gray codes converting 2-level unitaries into multiply-controlled gates. Finally, using catalytic embeddings, we present an algorithm to exactly synthesize unitaries $\mathcal{U}_{3^n}(\mathbb{Z}[1/3,e^{2πi/9}])$ over the Clifford$+T$ gate set with at most 2 ancillas. This, in particular, gives an exact synthesis algorithm of single-qutrit Clifford$+\mathcal{D}$ over the multi-qutrit Clifford$+T$ gate set with at most two ancillas.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Graph Expansion in Pruned Recurrent Neural Network Layers Preserve Performance
Authors:
Suryam Arnav Kalra,
Arindam Biswas,
Pabitra Mitra,
Biswajit Basu
Abstract:
Expansion property of a graph refers to its strong connectivity as well as sparseness. It has been reported that deep neural networks can be pruned to a high degree of sparsity while maintaining their performance. Such pruning is essential for performing real time sequence learning tasks using recurrent neural networks in resource constrained platforms. We prune recurrent networks such as RNNs and…
▽ More
Expansion property of a graph refers to its strong connectivity as well as sparseness. It has been reported that deep neural networks can be pruned to a high degree of sparsity while maintaining their performance. Such pruning is essential for performing real time sequence learning tasks using recurrent neural networks in resource constrained platforms. We prune recurrent networks such as RNNs and LSTMs, maintaining a large spectral gap of the underlying graphs and ensuring their layerwise expansion properties. We also study the time unfolded recurrent network graphs in terms of the properties of their bipartite layers. Experimental results for the benchmark sequence MNIST, CIFAR-10, and Google speech command data show that expander graph properties are key to preserving classification accuracy of RNN and LSTM.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Exploring Gender Disparities in Bumble's Match Recommendations
Authors:
Ritvik Aryan Kalra,
Pratham Gupta,
Ben Varghese,
Nimmi Rangaswamy
Abstract:
We study bias and discrimination in the context of Bumble, an online dating platform in India. Drawing on research in AI fairness and inclusion studies we analyze algorithmic bias and their propensity to reproduce bias. We conducted an experiment to identify and address the presence of bias in the matching algorithms Bumble pushes to its users in the form of profiles for potential dates in the rea…
▽ More
We study bias and discrimination in the context of Bumble, an online dating platform in India. Drawing on research in AI fairness and inclusion studies we analyze algorithmic bias and their propensity to reproduce bias. We conducted an experiment to identify and address the presence of bias in the matching algorithms Bumble pushes to its users in the form of profiles for potential dates in the real world. Dating apps like Bumble utilize algorithms that learn from user data to make recommendations. Even if the algorithm does not have intentions or consciousness, it is a system created and maintained by humans. We attribute moral agency of such systems to be compositely derived from algorithmic mediations, the design and utilization of these platforms. Developers, designers, and operators of dating platforms thus have a moral obligation to mitigate biases in the algorithms to create inclusive platforms that affirm diverse social identities.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Synthesis and Arithmetic of Single Qutrit Circuits
Authors:
Amolak Ratan Kalra,
Michele Mosca,
Dinesh Valluri
Abstract:
In this paper we study single qutrit circuits consisting of words over the Clifford$+D$ cyclotomic gate set, where $D=\text{diag}(\pmξ^{a},\pmξ^{b},\pmξ^{c})$, $ξ$ is a primitive $9$-th root of unity and $a,b,c$ are integers. We characterize classes of qutrit unit vectors $z$ with entries in $\mathbb{Z}[ξ, \frac{1}χ]$ based on the possibility of reducing their smallest denominator exponent (sde) w…
▽ More
In this paper we study single qutrit circuits consisting of words over the Clifford$+D$ cyclotomic gate set, where $D=\text{diag}(\pmξ^{a},\pmξ^{b},\pmξ^{c})$, $ξ$ is a primitive $9$-th root of unity and $a,b,c$ are integers. We characterize classes of qutrit unit vectors $z$ with entries in $\mathbb{Z}[ξ, \frac{1}χ]$ based on the possibility of reducing their smallest denominator exponent (sde) with respect to $χ:= 1 - ξ,$ by acting an appropriate gate in Clifford$+D$. We do this by studying the notion of `derivatives mod $3$' of an arbitrary element of $\mathbb{Z}[ξ]$ and using it to study the smallest denominator exponent of $HDz$ where $H$ is the qutrit Hadamard gate and $D$. In addition, we reduce the problem of finding all unit vectors of a given sde to that of finding integral solutions of a positive definite quadratic form along with some additional constraints. As a consequence we prove that the Clifford$+D$ gates naturally arise as gates with sde $0$ and $3$ in the group $U(3,\mathbb{Z}[ξ, \frac{1}χ])$ of $3 \times 3$ unitaries with entries in $\mathbb{Z}[ξ, \frac{1}χ]$. We illustrate the general applicability of these methods to obtain an exact synthesis algorithm for Clifford$+R$ and recover the previous exact synthesis algorithm in \cite{kmm}. The framework developed to formulate qutrit gate synthesis for Clifford$+D$ extends to qudits of arbitrary prime power.
△ Less
Submitted 18 February, 2025; v1 submitted 14 November, 2023;
originally announced November 2023.
-
Can Differentiable Decision Trees Enable Interpretable Reward Learning from Human Feedback?
Authors:
Akansha Kalra,
Daniel S. Brown
Abstract:
Reinforcement Learning from Human Feedback (RLHF) has emerged as a popular paradigm for capturing human intent to alleviate the challenges of hand-crafting the reward values. Despite the increasing interest in RLHF, most works learn black box reward functions that while expressive are difficult to interpret and often require running the whole costly process of RL before we can even decipher if the…
▽ More
Reinforcement Learning from Human Feedback (RLHF) has emerged as a popular paradigm for capturing human intent to alleviate the challenges of hand-crafting the reward values. Despite the increasing interest in RLHF, most works learn black box reward functions that while expressive are difficult to interpret and often require running the whole costly process of RL before we can even decipher if these frameworks are actually aligned with human preferences. We propose and evaluate a novel approach for learning expressive and interpretable reward functions from preferences using Differentiable Decision Trees (DDTs). Our experiments across several domains, including CartPole, Visual Gridworld environments and Atari games, provide evidence that the tree structure of our learned reward function is useful in determining the extent to which the reward function is aligned with human preferences. We also provide experimental evidence that not only shows that reward DDTs can often achieve competitive RL performance when compared with larger capacity deep neural network reward functions but also demonstrates the diagnostic utility of our framework in checking alignment of learned reward functions. We also observe that the choice between soft and hard (argmax) output of reward DDT reveals a tension between wanting highly shaped rewards to ensure good RL performance, while also wanting simpler, more interpretable rewards. Videos and code, are available at: https://sites.google.com/view/ddt-rlhf
△ Less
Submitted 10 October, 2024; v1 submitted 22 June, 2023;
originally announced June 2023.
-
Normalizing Resistor Networks
Authors:
Robin Cockett,
Amolak Ratan Kalra,
Priyaa Varshinee Srinivasan
Abstract:
Star to mesh transformations are well-known in electrical engineering, and are reminiscent of local complementation for graph states in qudit stabilizer quantum mechanics. This paper describes a rewriting system for resistor circuits over any positive division rig using general star to mesh transformations. We show how these transformations can be organized into a confluent and terminating rewriti…
▽ More
Star to mesh transformations are well-known in electrical engineering, and are reminiscent of local complementation for graph states in qudit stabilizer quantum mechanics. This paper describes a rewriting system for resistor circuits over any positive division rig using general star to mesh transformations. We show how these transformations can be organized into a confluent and terminating rewriting system on the category of resistor circuits. Furthermore, based on the recently established connections between quantum and electrical circuits, this paper pushes forward the quest for approachable normal forms for stabilizer quantum circuits.
△ Less
Submitted 14 December, 2023; v1 submitted 19 March, 2023;
originally announced March 2023.
-
Electronic Energy Migration in Microtubules
Authors:
Aarat P. Kalra,
Alfy Benny,
Sophie M. Travis,
Eric A. Zizzi,
Austin Morales-Sanchez,
Daniel G. Oblinsky,
Travis J. A. Craddock,
Stuart R. Hameroff,
M. Bruce MacIver,
Jack A. Tuszynski,
Sabine Petry,
Roger Penrose,
Gregory D. Scholes
Abstract:
The repeating arrangement of tubulin dimers confers great mechanical strength to microtubules, which are used as scaffolds for intracellular macromolecular transport in cells and exploited in biohybrid devices. The crystalline order in a microtubule, with lattice constants short enough to allow energy transfer between amino acid chromophores, is similar to synthetic structures designed for light h…
▽ More
The repeating arrangement of tubulin dimers confers great mechanical strength to microtubules, which are used as scaffolds for intracellular macromolecular transport in cells and exploited in biohybrid devices. The crystalline order in a microtubule, with lattice constants short enough to allow energy transfer between amino acid chromophores, is similar to synthetic structures designed for light harvesting. After photoexcitation, can these amino acid chromophores transfer excitation energy along the microtubule like a natural or artificial light-harvesting system? Here, we use tryptophan autofluorescence lifetimes to probe inter-tryptophan energy hopping in tubulin and microtubules. By studying how quencher concentration alters tryptophan autofluorescence lifetimes, we demonstrate that electronic energy can diffuse over 6.6 nm in microtubules. We discover that while diffusion lengths are influenced by tubulin polymerization state (free tubulin versus tubulin in the microtubule lattice), they are not significantly altered by the average number of protofilaments (13 versus 14). We also demonstrate that the presence of the anesthetics etomidate and isoflurane reduce exciton diffusion. Energy transport as explained by conventional Förster theory (accommodating for interactions between tryptophan and tyrosine residues) does not sufficiently explain our observations. Our studies indicate that microtubules are, unexpectedly, effective light harvesters.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Estimating the potential of ionizing radiation-induced radiolysis for microbial metabolism on terrestrial planets and satellites with rarefied atmospheres
Authors:
Dimitra Atri,
Margaret Kamenetskiy,
Michael May,
Archit Kalra,
Aida Castelblanco,
Antony Quiñones-Camacho
Abstract:
Ionizing radiation is known to have a destructive effect on biology by causing damage to the DNA, cells, and production of Reactive Oxygen Species (ROS), among other things. While direct exposure to high radiation dose is indeed not favorable for biological activity, ionizing radiation can, and in some cases is known to produce a number of biologically useful products. One such mechanism is the pr…
▽ More
Ionizing radiation is known to have a destructive effect on biology by causing damage to the DNA, cells, and production of Reactive Oxygen Species (ROS), among other things. While direct exposure to high radiation dose is indeed not favorable for biological activity, ionizing radiation can, and in some cases is known to produce a number of biologically useful products. One such mechanism is the production of biologically useful products via charged particle-induced radiolysis. Some of the byproducts are impossible to produce with lower-energy radiation (such as sunlight), opening up new avenues for life to utilize them. The main objective of the manuscript is to explore the concept of a Radiolytic Habitable Zone (RHZ), where the chemistry of GCR-induced radiolysis can be potentially utilized for metabolic activity. We first calculate the energy deposition and the electron production rate using the GEANT4 numerical model, then estimate the current production and possible chemical pathways which could be useful for supporting biological activity on Mars, Europa and Enceladus. The concept of RHZ provides a novel framework for understanding the potential for life in high-radiation environments. By combining energy deposition calculations with the energy requirements of microbial cells, we have defined the RHZ for Mars, Europa, and Enceladus. These zones represent the regions where radiolysis-driven energy production is sufficient to sustain microbial metabolism. We find that bacterial cell density is highest in Enceladus, followed by Mars and Europa. We discuss the implications of these mechanisms for the habitability of such objects in the Solar system and beyond.
△ Less
Submitted 27 July, 2025; v1 submitted 29 July, 2022;
originally announced July 2022.
-
Categories of Kirchhoff relations
Authors:
Robin Cockett,
Amolak Ratan Kalra,
Shiroman Prakash
Abstract:
It is known that the category of affine Lagrangian relations, AffLagRel_F, over a field, F, of integers modulo a prime p (with p > 2) is isomorphic to the category of stabilizer quantum circuits for p-dits. Furthermore, it is known that electrical circuits (generalized for the field F) occur as a natural subcategory of AffLagRel_F. The purpose of this paper is to provide a characterization of the…
▽ More
It is known that the category of affine Lagrangian relations, AffLagRel_F, over a field, F, of integers modulo a prime p (with p > 2) is isomorphic to the category of stabilizer quantum circuits for p-dits. Furthermore, it is known that electrical circuits (generalized for the field F) occur as a natural subcategory of AffLagRel_F. The purpose of this paper is to provide a characterization of the relations in this subcategory -- and in important subcategories thereof -- in terms of parity-check and generator matrices as used in error detection.
In particular, we introduce the subcategory consisting of Kirchhoff relations to be (affinely) those Lagrangian relations that conserve total momentum or equivalently satisfy Kirchhoff's current law. Maps in this subcategory can be generated by electrical components (generalized for the field F): namely resistors, current dividers, and current and voltage sources. The "source" electrical components deliver the affine nature of the maps while current dividers add an interesting quasi-stochastic aspect.
We characterize these Kirchhoff relations in terms of parity-check matrices and in addition, characterizes two important subcategories: the deterministic Kirchhoff relations and the lossless relations. The category of deterministic Kirchhoff relations as electrical circuits are generated by resistors circuits. Lossless relations, which are deterministic Kirchhoff, provide exactly the basic hyper-categorical structure of these settings.
△ Less
Submitted 7 July, 2022; v1 submitted 11 May, 2022;
originally announced May 2022.
-
RAPTOR: Rapid Aerial Pickup and Transport of Objects by Robots
Authors:
Aurel Appius,
Erik Bauer,
Marc Blöchlinger,
Aashi Kalra,
Robin Oberson,
Arman Raayatsanati,
Pascal Strauch,
Sarath Suresh,
Marco von Salis,
Robert K. Katzschmann
Abstract:
Rapid aerial grasping through robots can lead to many applications that utilize fast and dynamic picking and placing of objects. Rigid grippers traditionally used in aerial manipulators require high precision and specific object geometries for successful grasping. We propose RAPTOR, a quadcopter platform combined with a custom Fin Ray gripper to enable more flexible grasping of objects with differ…
▽ More
Rapid aerial grasping through robots can lead to many applications that utilize fast and dynamic picking and placing of objects. Rigid grippers traditionally used in aerial manipulators require high precision and specific object geometries for successful grasping. We propose RAPTOR, a quadcopter platform combined with a custom Fin Ray gripper to enable more flexible grasping of objects with different geometries, leveraging the properties of soft materials to increase the contact surface between the gripper and the objects. To reduce the communication latency, we present a new lightweight middleware solution based on Fast DDS (Data Distribution Service) as an alternative to ROS (Robot Operating System). We show that RAPTOR achieves an average of 83% grasping efficacy in a real-world setting for four different object geometries while moving at an average velocity of 1 m/s during grasping. In a high-velocity setting, RAPTOR supports up to four times the payload compared to previous works. Our results highlight the potential of aerial drones in automated warehouses and other manipulation applications where speed, swiftness, and robustness are essential while operating in hard-to-reach places.
△ Less
Submitted 5 August, 2022; v1 submitted 6 March, 2022;
originally announced March 2022.
-
StRegA: Unsupervised Anomaly Detection in Brain MRIs using a Compact Context-encoding Variational Autoencoder
Authors:
Soumick Chatterjee,
Alessandro Sciarra,
Max Dünnwald,
Pavan Tummala,
Shubham Kumar Agrawal,
Aishwarya Jauhari,
Aman Kalra,
Steffen Oeltze-Jafra,
Oliver Speck,
Andreas Nürnberger
Abstract:
Expert interpretation of anatomical images of the human brain is the central part of neuro-radiology. Several machine learning-based techniques have been proposed to assist in the analysis process. However, the ML models typically need to be trained to perform a specific task, e.g., brain tumour segmentation or classification. Not only do the corresponding training data require laborious manual an…
▽ More
Expert interpretation of anatomical images of the human brain is the central part of neuro-radiology. Several machine learning-based techniques have been proposed to assist in the analysis process. However, the ML models typically need to be trained to perform a specific task, e.g., brain tumour segmentation or classification. Not only do the corresponding training data require laborious manual annotations, but a wide variety of abnormalities can be present in a human brain MRI - even more than one simultaneously, which renders representation of all possible anomalies very challenging. Hence, a possible solution is an unsupervised anomaly detection (UAD) system that can learn a data distribution from an unlabelled dataset of healthy subjects and then be applied to detect out of distribution samples. Such a technique can then be used to detect anomalies - lesions or abnormalities, for example, brain tumours, without explicitly training the model for that specific pathology. Several Variational Autoencoder (VAE) based techniques have been proposed in the past for this task. Even though they perform very well on controlled artificially simulated anomalies, many of them perform poorly while detecting anomalies in clinical data. This research proposes a compact version of the "context-encoding" VAE (ceVAE) model, combined with pre and post-processing steps, creating a UAD pipeline (StRegA), which is more robust on clinical data, and shows its applicability in detecting anomalies such as tumours in brain MRIs. The proposed pipeline achieved a Dice score of 0.642$\pm$0.101 while detecting tumours in T2w images of the BraTS dataset and 0.859$\pm$0.112 while detecting artificially induced anomalies, while the best performing baseline achieved 0.522$\pm$0.135 and 0.783$\pm$0.111, respectively.
△ Less
Submitted 4 September, 2022; v1 submitted 31 January, 2022;
originally announced January 2022.
-
Final Report for SAG 22: A Target Star Archive for Exoplanet Science
Authors:
Natalie R. Hinkel,
Joshua Pepper,
Christopher C. Stark,
Jennifer A. Burt,
David R. Ciardi,
Kevin K. Hardegree-Ullman,
Jacob Lustig-Yaeger,
Ravi Kopparapu,
Lokesh Mishra,
Karan Molaverdikhani,
Ilaria Pascucci,
Tyler Richey-Yowell,
E. J. Safron,
David J. Wilson,
Galen Bergsten,
Tabetha S. Boyajian,
J. A. Caballero,
K. Cunha,
Alyssa Columbus,
Shawn D. Domagal-Goldman,
Chuanfei Dong,
R. M. Elowitz,
Devanshu Jha,
Archit Kalra,
David W. Latham
, et al. (11 additional authors not shown)
Abstract:
Present and upcoming NASA missions will be intensively observing a selected, partially overlapping set of stars for exoplanet studies. Key physical and chemical information about these stars and their systems is needed for planning observations and interpreting the results. A target star archive of such data would benefit a wide cross-section of the exoplanet community by enhancing the chances of…
▽ More
Present and upcoming NASA missions will be intensively observing a selected, partially overlapping set of stars for exoplanet studies. Key physical and chemical information about these stars and their systems is needed for planning observations and interpreting the results. A target star archive of such data would benefit a wide cross-section of the exoplanet community by enhancing the chances of mission success and improving the efficiency of mission observatories. It would also provide a common, accessible resource for scientific analysis based on standardized assumptions, while revealing gaps or deficiencies in existing knowledge of stellar properties necessary for exoplanetary system characterization.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Sexism Identification in Tweets and Gabs using Deep Neural Networks
Authors:
Amikul Kalra,
Arkaitz Zubiaga
Abstract:
Through anonymisation and accessibility, social media platforms have facilitated the proliferation of hate speech, prompting increased research in developing automatic methods to identify these texts. This paper explores the classification of sexism in text using a variety of deep neural network model architectures such as Long-Short-Term Memory (LSTMs) and Convolutional Neural Networks (CNNs). Th…
▽ More
Through anonymisation and accessibility, social media platforms have facilitated the proliferation of hate speech, prompting increased research in developing automatic methods to identify these texts. This paper explores the classification of sexism in text using a variety of deep neural network model architectures such as Long-Short-Term Memory (LSTMs) and Convolutional Neural Networks (CNNs). These networks are used in conjunction with transfer learning in the form of Bidirectional Encoder Representations from Transformers (BERT) and DistilBERT models, along with data augmentation, to perform binary and multiclass sexism classification on the dataset of tweets and gabs from the sEXism Identification in Social neTworks (EXIST) task in IberLEF 2021. The models are seen to perform comparatively to those from the competition, with the best performances seen using BERT and a multi-filter CNN model. Data augmentation further improves these results for the multi-class classification task. This paper also explores the errors made by the models and discusses the difficulty in automatically classifying sexism due to the subjectivity of the labels and the complexity of natural language used in social media.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Towards Rotation Invariance in Object Detection
Authors:
Agastya Kalra,
Guy Stoppi,
Bradley Brown,
Rishav Agarwal,
Achuta Kadambi
Abstract:
Rotation augmentations generally improve a model's invariance/equivariance to rotation - except in object detection. In object detection the shape is not known, therefore rotation creates a label ambiguity. We show that the de-facto method for bounding box label rotation, the Largest Box Method, creates very large labels, leading to poor performance and in many cases worse performance than using n…
▽ More
Rotation augmentations generally improve a model's invariance/equivariance to rotation - except in object detection. In object detection the shape is not known, therefore rotation creates a label ambiguity. We show that the de-facto method for bounding box label rotation, the Largest Box Method, creates very large labels, leading to poor performance and in many cases worse performance than using no rotation at all. We propose a new method of rotation augmentation that can be implemented in a few lines of code. First, we create a differentiable approximation of label accuracy and show that axis-aligning the bounding box around an ellipse is optimal. We then introduce Rotation Uncertainty (RU) Loss, allowing the model to adapt to the uncertainty of the labels. On five different datasets (including COCO, PascalVOC, and Transparent Object Bin Picking), this approach improves the rotational invariance of both one-stage and two-stage architectures when measured with AP, AP50, and AP75. The code is available at https://github.com/akasha-imaging/ICCV2021.
△ Less
Submitted 30 September, 2021; v1 submitted 28 September, 2021;
originally announced September 2021.
-
A Normal Form for Single-Qudit Clifford+$T$ Operators
Authors:
Akalank Jain,
Amolak Ratan Kalra,
Shiroman Prakash
Abstract:
We propose a normal form for single-qudit gates composed of Clifford and $T$-gates for qudits of odd prime dimension $p\geq 5$. We prove that any single-qudit Clifford+$T$ operator can be re-expressed in this normal form in polynomial time. We also provide strong numerical evidence that this normal form is unique. Assuming uniqueness, we are able to use this normal form to provide an algorithm for…
▽ More
We propose a normal form for single-qudit gates composed of Clifford and $T$-gates for qudits of odd prime dimension $p\geq 5$. We prove that any single-qudit Clifford+$T$ operator can be re-expressed in this normal form in polynomial time. We also provide strong numerical evidence that this normal form is unique. Assuming uniqueness, we are able to use this normal form to provide an algorithm for exact synthesis of any single-qudit Clifford+$T$ operator with minimal $T$-count.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
To be Tough or Soft: Measuring the Impact of Counter-Ad-blocking Strategies on User Engagement
Authors:
Shuai Zhao,
Achir Kalra,
Cristian Borcea,
Yi Chen
Abstract:
The fast growing ad-blocker usage results in large revenue decrease for ad-supported online websites. Facing this problem, many online publishers choose either to cooperate with ad-blocker software companies to show acceptable ads or to build a wall that requires users to whitelist the site for content access. However, there is lack of studies on the impact of these two counter-ad-blocking strateg…
▽ More
The fast growing ad-blocker usage results in large revenue decrease for ad-supported online websites. Facing this problem, many online publishers choose either to cooperate with ad-blocker software companies to show acceptable ads or to build a wall that requires users to whitelist the site for content access. However, there is lack of studies on the impact of these two counter-ad-blocking strategies on user behaviors. To address this issue, we conduct a randomized field experiment on the website of Forbes Media, a major US media publisher. The ad-blocker users are divided into a treatment group, which receives the wall strategy, and a control group, which receives the acceptable ads strategy. We utilize the difference-in-differences method to estimate the causal effects. Our study shows that the wall strategy has an overall negative impact on user engagements. However, it has no statistically significant effect on high-engaged users as they would view the pages no matter what strategy is used. It has a big impact on low-engaged users, who have no loyalty to the site. Our study also shows that revisiting behavior decreases over time, but the ratio of session whitelisting increases over time as the remaining users have relatively high loyalty and high engagement. The paper concludes with discussions of managerial insights for publishers when determining counter-ad-blocking strategies.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.
-
MatrixNets: A New Scale and Aspect Ratio Aware Architecture for Object Detection
Authors:
Abdullah Rashwan,
Rishav Agarwal,
Agastya Kalra,
Pascal Poupart
Abstract:
We present MatrixNets (xNets), a new deep architecture for object detection. xNets map objects with similar sizes and aspect ratios into many specialized layers, allowing xNets to provide a scale and aspect ratio aware architecture. We leverage xNets to enhance single-stage object detection frameworks. First, we apply xNets on anchor-based object detection, for which we predict object centers and…
▽ More
We present MatrixNets (xNets), a new deep architecture for object detection. xNets map objects with similar sizes and aspect ratios into many specialized layers, allowing xNets to provide a scale and aspect ratio aware architecture. We leverage xNets to enhance single-stage object detection frameworks. First, we apply xNets on anchor-based object detection, for which we predict object centers and regress the top-left and bottom-right corners. Second, we use MatrixNets for corner-based object detection by predicting top-left and bottom-right corners. Each corner predicts the center location of the object. We also enhance corner-based detection by replacing the embedding layer with center regression. Our final architecture achieves mAP of 47.8 on MS COCO, which is higher than its CornerNet counterpart by +5.6 mAP while also closing the gap between single-stage and two-stage detectors. The code is available at https://github.com/arashwan/matrixnet.
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
Matrix Nets: A New Deep Architecture for Object Detection
Authors:
Abdullah Rashwan,
Agastya Kalra,
Pascal Poupart
Abstract:
We present Matrix Nets (xNets), a new deep architecture for object detection. xNets map objects with different sizes and aspect ratios into layers where the sizes and the aspect ratios of the objects within their layers are nearly uniform. Hence, xNets provide a scale and aspect ratio aware architecture. We leverage xNets to enhance key-points based object detection. Our architecture achieves mAP…
▽ More
We present Matrix Nets (xNets), a new deep architecture for object detection. xNets map objects with different sizes and aspect ratios into layers where the sizes and the aspect ratios of the objects within their layers are nearly uniform. Hence, xNets provide a scale and aspect ratio aware architecture. We leverage xNets to enhance key-points based object detection. Our architecture achieves mAP of 47.8 on MS COCO, which is higher than any other single-shot detector while using half the number of parameters and training 3x faster than the next best architecture.
△ Less
Submitted 14 August, 2019; v1 submitted 13 August, 2019;
originally announced August 2019.
-
On the capacitive properties of individual microtubules and their meshworks
Authors:
Aarat Kalra,
Sahil Patel,
Asadullah Bhuiyan,
Jordane Preto,
Kyle Scheuer,
Usman Mohammed,
John Lewis,
Vahid Rezania,
Karthik Shankar,
Jack A. Tuszynski
Abstract:
Microtubules are hollow cylindrical polymers composed of the highly negatively-charged (~23e), high dipole moment (1750 D) protein a,b-tubulin. While the roles of microtubules in chromosomal segregation, macromolecular transport and cell migration are relatively well-understood, studies on the electrical properties of microtubules have only recently gained strong interest. Here, we show that while…
▽ More
Microtubules are hollow cylindrical polymers composed of the highly negatively-charged (~23e), high dipole moment (1750 D) protein a,b-tubulin. While the roles of microtubules in chromosomal segregation, macromolecular transport and cell migration are relatively well-understood, studies on the electrical properties of microtubules have only recently gained strong interest. Here, we show that while microtubules at physiological concentrations increase solution capacitance, free tubulin has no appreciable effect. For a particular microtubule concentration, we were able to quantify these effects by determining the capacitance and resistance of a single 20 um-long microtubule to be 1.86 x 10^(-12) F and 1.07 x 10^12 Ohms respectively. Further, we observed a decrease in electrical resistance of solution, with charge transport peaking between 20-60 Hz in the presence of microtubules, consistent with recent findings that microtubules exhibit electric oscillations at such low frequencies. Our results show that in addition to macromolecular transport, microtubules also act as charge-storage devices through counterionic condensation across a broad frequency spectrum. We conclude with a hypothesis of an electrically-tunable cytoskeleton where the dielectric properties of tubulin are polymerization-state dependent.
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Photofeeler-D3: A Neural Network with Voter Modeling for Dating Photo Impression Prediction
Authors:
Agastya Kalra,
Ben Peterson
Abstract:
In just a few years, online dating has become the dominant way that young people meet to date, making the deceptively error-prone task of picking good dating profile photos vital to a generation's ability to form romantic connections. Until now, artificial intelligence approaches to Dating Photo Impression Prediction (DPIP) have been very inaccurate, unadaptable to real-world application, and have…
▽ More
In just a few years, online dating has become the dominant way that young people meet to date, making the deceptively error-prone task of picking good dating profile photos vital to a generation's ability to form romantic connections. Until now, artificial intelligence approaches to Dating Photo Impression Prediction (DPIP) have been very inaccurate, unadaptable to real-world application, and have only taken into account a subject's physical attractiveness. To that effect, we propose Photofeeler-D3 - the first convolutional neural network as accurate as 10 human votes for how smart, trustworthy, and attractive the subject appears in highly variable dating photos. Our "attractive" output is also applicable to Facial Beauty Prediction (FBP), making Photofeeler-D3 state-of-the-art for both DPIP and FBP. We achieve this by leveraging Photofeeler's Dating Dataset (PDD) with over 1 million images and tens of millions of votes, our novel technique of voter modeling, and cutting-edge computer vision techniques.
△ Less
Submitted 10 May, 2019; v1 submitted 15 April, 2019;
originally announced April 2019.
-
Demonstration of the No-Hiding Theorem on the 5 Qubit IBM Quantum Computer in a Category Theoretic Framework
Authors:
Amolak Ratan Kalra,
Navya Gupta,
Bikash K. Behera,
Shiroman Prakash,
Prasanta. K. Panigrahi
Abstract:
Quantum no-Hiding theorem, first proposed by Braunstein and Pati [Phys. Rev. Lett. 98, 080502 (2007)], was verified experimentally by Samal et al. [Phys. Rev. Lett. 186, 080401 (2011)] using NMR quantum processor. Till then, this fundamental test has not been explored in any of the experimental architecture. Here, we demonstrate the above no-hiding theorem using the IBM 5Q quantum processor. Categ…
▽ More
Quantum no-Hiding theorem, first proposed by Braunstein and Pati [Phys. Rev. Lett. 98, 080502 (2007)], was verified experimentally by Samal et al. [Phys. Rev. Lett. 186, 080401 (2011)] using NMR quantum processor. Till then, this fundamental test has not been explored in any of the experimental architecture. Here, we demonstrate the above no-hiding theorem using the IBM 5Q quantum processor. Categorical algebra developed by Coecke and Duncan [New J. Phys. 13, 043016 (2011)] has been used for better visualization of the no-hiding theorem by analyzing the quantum circuit using the ZX calculus. The experimental results confirm the recovery of missing information by the application of local unitary operations on the ancillary qubits.
△ Less
Submitted 2 April, 2019; v1 submitted 29 July, 2017;
originally announced July 2017.
-
Online Structure Learning for Sum-Product Networks with Gaussian Leaves
Authors:
Wilson Hsu,
Agastya Kalra,
Pascal Poupart
Abstract:
Sum-product networks have recently emerged as an attractive representation due to their dual view as a special type of deep neural network with clear semantics and a special type of probabilistic graphical model for which inference is always tractable. Those properties follow from some conditions (i.e., completeness and decomposability) that must be respected by the structure of the network. As a…
▽ More
Sum-product networks have recently emerged as an attractive representation due to their dual view as a special type of deep neural network with clear semantics and a special type of probabilistic graphical model for which inference is always tractable. Those properties follow from some conditions (i.e., completeness and decomposability) that must be respected by the structure of the network. As a result, it is not easy to specify a valid sum-product network by hand and therefore structure learning techniques are typically used in practice. This paper describes the first online structure learning technique for continuous SPNs with Gaussian leaves. We also introduce an accompanying new parameter learning technique.
△ Less
Submitted 18 January, 2017;
originally announced January 2017.
-
A Scalable and Robust Framework for Intelligent Real-time Video Surveillance
Authors:
Shreenath Dutt,
Ankita Kalra
Abstract:
In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only write important content to the disk. Our topology is extensible, capable of adding novel algorithms as per the use case without affecting the existing ones, since all the processing is…
▽ More
In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only write important content to the disk. Our topology is extensible, capable of adding novel algorithms as per the use case without affecting the existing ones, since all the processing is independent of each other. This framework is also highly scalable and fault tolerant, which makes it a best option for organisations that need to monitor a large network of surveillance cameras.
△ Less
Submitted 29 October, 2016;
originally announced October 2016.
-
A Novel Modified Apriori Approach for Web Document Clustering
Authors:
Rajendra Kumar Roul,
Saransh Varshneya,
Ashu Kalra,
Sanjay Kumar Sahay
Abstract:
The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori ap…
▽ More
The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori approach by cutting down the repeated database scans and improving association analysis of traditional apriori algorithm to cluster the web documents. Further we improve those clusters by applying Fuzzy C-Means (FCM), K-Means and Vector Space Model (VSM) techniques separately. For experimental purpose, we use Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and run both traditional apriori and our modified apriori approach on it. Experimental results show that our approach outperforms the traditional apriori algorithm in terms of database scan and improvement on association of analysis. We found out that FCM is better than K-Means and VSM in terms of F-measure of clusters of different sizes.
△ Less
Submitted 29 March, 2015;
originally announced March 2015.