-
Generative AI at the Crossroads: Light Bulb, Dynamo, or Microscope?
Authors:
Martin Baily,
David Byrne,
Aidan Kane,
Paul Soto
Abstract:
With the advent of generative AI (genAI), the potential scope of artificial intelligence has increased dramatically, but the future effect of genAI on productivity remains uncertain with the effect of the technology on the innovation process a crucial open question. Some inventions, such as the light bulb, temporarily raise productivity growth as adoption spreads, but the effect fades when the mar…
▽ More
With the advent of generative AI (genAI), the potential scope of artificial intelligence has increased dramatically, but the future effect of genAI on productivity remains uncertain with the effect of the technology on the innovation process a crucial open question. Some inventions, such as the light bulb, temporarily raise productivity growth as adoption spreads, but the effect fades when the market is saturated; that is, the level of output per hour is permanently higher but the growth rate is not. In contrast, two types of technologies stand out as having longer-lived effects on productivity growth. First, there are technologies known as general-purpose technologies (GPTs). GPTs (1) are widely adopted, (2) spur abundant knock-on innovations (new goods and services, process efficiencies, and business reorganization), and (3) show continual improvement, refreshing this innovation cycle; the electric dynamo is an example. Second, there are inventions of methods of invention (IMIs). IMIs increase the efficiency of the research and development process via improvements to observation, analysis, communication, or organization; the compound microscope is an example. We show that GenAI has the characteristics of both a GPT and an IMI -- an encouraging sign. Even so, for genAI to boost productivity growth, its contribution will have to exceed the fading growth effects of the past IT innovations baked into the trend, including predecessor AI technologies.
△ Less
Submitted 16 June, 2025; v1 submitted 20 May, 2025;
originally announced May 2025.
-
Person Recognition at Altitude and Range: Fusion of Face, Body Shape and Gait
Authors:
Feng Liu,
Nicholas Chimitt,
Lanqing Guo,
Jitesh Jain,
Aditya Kane,
Minchul Kim,
Wes Robbins,
Yiyang Su,
Dingqiang Ye,
Xingguang Zhang,
Jie Zhu,
Siddharth Satyakam,
Christopher Perry,
Stanley H. Chan,
Arun Ross,
Humphrey Shi,
Zhangyang Wang,
Anil Jain,
Xiaoming Liu
Abstract:
We address the problem of whole-body person recognition in unconstrained environments. This problem arises in surveillance scenarios such as those in the IARPA Biometric Recognition and Identification at Altitude and Range (BRIAR) program, where biometric data is captured at long standoff distances, elevated viewing angles, and under adverse atmospheric conditions (e.g., turbulence and high wind v…
▽ More
We address the problem of whole-body person recognition in unconstrained environments. This problem arises in surveillance scenarios such as those in the IARPA Biometric Recognition and Identification at Altitude and Range (BRIAR) program, where biometric data is captured at long standoff distances, elevated viewing angles, and under adverse atmospheric conditions (e.g., turbulence and high wind velocity). To this end, we propose FarSight, a unified end-to-end system for person recognition that integrates complementary biometric cues across face, gait, and body shape modalities. FarSight incorporates novel algorithms across four core modules: multi-subject detection and tracking, recognition-aware video restoration, modality-specific biometric feature encoding, and quality-guided multi-modal fusion. These components are designed to work cohesively under degraded image conditions, large pose and scale variations, and cross-domain gaps. Extensive experiments on the BRIAR dataset, one of the most comprehensive benchmarks for long-range, multi-modal biometric recognition, demonstrate the effectiveness of FarSight. Compared to our preliminary system, this system achieves a 34.1% absolute gain in 1:1 verification accuracy ([email protected]% FAR), a 17.8% increase in closed-set identification (Rank-20), and a 34.3% reduction in open-set identification errors (FNIR@1% FPIR). Furthermore, FarSight was evaluated in the 2025 NIST RTE Face in Video Evaluation (FIVE), which conducts standardized face recognition testing on the BRIAR dataset. These results establish FarSight as a state-of-the-art solution for operational biometric recognition in challenging real-world conditions.
△ Less
Submitted 7 May, 2025;
originally announced May 2025.
-
Generalized Neighborhood Attention: Multi-dimensional Sparse Attention at the Speed of Light
Authors:
Ali Hassani,
Fengzhe Zhou,
Aditya Kane,
Jiannan Huang,
Chieh-Yun Chen,
Min Shi,
Steven Walton,
Markus Hoehnerbach,
Vijay Thakkar,
Michael Isaev,
Qinsheng Zhang,
Bing Xu,
Haicheng Wu,
Wen-mei Hwu,
Ming-Yu Liu,
Humphrey Shi
Abstract:
Many sparse attention mechanisms such as Neighborhood Attention have typically failed to consistently deliver speedup over the self attention baseline. This is largely due to the level of complexity in attention infrastructure, and the rapid evolution of AI hardware architecture. At the same time, many state-of-the-art foundational models, particularly in computer vision, are heavily bound by atte…
▽ More
Many sparse attention mechanisms such as Neighborhood Attention have typically failed to consistently deliver speedup over the self attention baseline. This is largely due to the level of complexity in attention infrastructure, and the rapid evolution of AI hardware architecture. At the same time, many state-of-the-art foundational models, particularly in computer vision, are heavily bound by attention, and need reliable sparsity to escape the O(n^2) complexity. In this paper, we study a class of promising sparse attention mechanisms that focus on locality, and aim to develop a better analytical model of their performance improvements. We first introduce Generalized Neighborhood Attention (GNA), which can describe sliding window, strided sliding window, and blocked attention. We then consider possible design choices in implementing these approaches, and create a simulator that can provide much more realistic speedup upper bounds for any given setting. Finally, we implement GNA on top of a state-of-the-art fused multi-headed attention (FMHA) kernel designed for the NVIDIA Blackwell architecture in CUTLASS. Our implementation can fully realize the maximum speedup theoretically possible in many perfectly block-sparse cases, and achieves an effective utilization of 1.3 petaFLOPs/second in FP16. In addition, we plug various GNA configurations into off-the-shelf generative models, such as Cosmos-7B, HunyuanVideo, and FLUX, and show that it can deliver 28% to 46% end-to-end speedup on B200 without any fine-tuning. We will open source our simulator and Blackwell kernels directly through the NATTEN project.
△ Less
Submitted 23 April, 2025;
originally announced April 2025.
-
SenTest: Evaluating Robustness of Sentence Encoders
Authors:
Tanmay Chavan,
Shantanu Patankar,
Aditya Kane,
Omkar Gokhale,
Geetanjali Kale,
Raviraj Joshi
Abstract:
Contrastive learning has proven to be an effective method for pre-training models using weakly labeled data in the vision domain. Sentence transformers are the NLP counterparts to this architecture, and have been growing in popularity due to their rich and effective sentence representations. Having effective sentence representations is paramount in multiple tasks, such as information retrieval, re…
▽ More
Contrastive learning has proven to be an effective method for pre-training models using weakly labeled data in the vision domain. Sentence transformers are the NLP counterparts to this architecture, and have been growing in popularity due to their rich and effective sentence representations. Having effective sentence representations is paramount in multiple tasks, such as information retrieval, retrieval augmented generation (RAG), and sentence comparison. Keeping in mind the deployability factor of transformers, evaluating the robustness of sentence transformers is of utmost importance. This work focuses on evaluating the robustness of the sentence encoders. We employ several adversarial attacks to evaluate its robustness. This system uses character-level attacks in the form of random character substitution, word-level attacks in the form of synonym replacement, and sentence-level attacks in the form of intra-sentence word order shuffling. The results of the experiments strongly undermine the robustness of sentence encoders. The models produce significantly different predictions as well as embeddings on perturbed datasets. The accuracy of the models can fall up to 15 percent on perturbed datasets as compared to unperturbed datasets. Furthermore, the experiments demonstrate that these embeddings does capture the semantic and syntactic structure (sentence order) of sentences. However, existing supervised classification strategies fail to leverage this information, and merely function as n-gram detectors.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Task Arithmetic with LoRA for Continual Learning
Authors:
Rajas Chitale,
Ankit Vaidya,
Aditya Kane,
Archana Ghotkar
Abstract:
Continual learning refers to the problem where the training data is available in sequential chunks, termed "tasks". The majority of progress in continual learning has been stunted by the problem of catastrophic forgetting, which is caused by sequential training of the model on streams of data. Moreover, it becomes computationally expensive to sequentially train large models multiple times. To miti…
▽ More
Continual learning refers to the problem where the training data is available in sequential chunks, termed "tasks". The majority of progress in continual learning has been stunted by the problem of catastrophic forgetting, which is caused by sequential training of the model on streams of data. Moreover, it becomes computationally expensive to sequentially train large models multiple times. To mitigate both of these problems at once, we propose a novel method to continually train transformer-based vision models using low-rank adaptation and task arithmetic. Our method completely bypasses the problem of catastrophic forgetting, as well as reducing the computational requirement for training models on each task. When aided with a small memory of 10 samples per class, our method achieves performance close to full-set finetuning. We present rigorous ablations to support the prowess of our method.
△ Less
Submitted 4 November, 2023;
originally announced November 2023.
-
My Boli: Code-mixed Marathi-English Corpora, Pretrained Language Models and Evaluation Benchmarks
Authors:
Tanmay Chavan,
Omkar Gokhale,
Aditya Kane,
Shantanu Patankar,
Raviraj Joshi
Abstract:
The research on code-mixed data is limited due to the unavailability of dedicated code-mixed datasets and pre-trained language models. In this work, we focus on the low-resource Indian language Marathi which lacks any prior work in code-mixing. We present L3Cube-MeCorpus, a large code-mixed Marathi-English (Mr-En) corpus with 10 million social media sentences for pretraining. We also release L3Cub…
▽ More
The research on code-mixed data is limited due to the unavailability of dedicated code-mixed datasets and pre-trained language models. In this work, we focus on the low-resource Indian language Marathi which lacks any prior work in code-mixing. We present L3Cube-MeCorpus, a large code-mixed Marathi-English (Mr-En) corpus with 10 million social media sentences for pretraining. We also release L3Cube-MeBERT and MeRoBERTa, code-mixed BERT-based transformer models pre-trained on MeCorpus. Furthermore, for benchmarking, we present three supervised datasets MeHate, MeSent, and MeLID for downstream tasks like code-mixed Mr-En hate speech detection, sentiment analysis, and language identification respectively. These evaluation datasets individually consist of manually annotated \url{~}12,000 Marathi-English code-mixed tweets. Ablations show that the models trained on this novel corpus significantly outperform the existing state-of-the-art BERT models. This is the first work that presents artifacts for code-mixed Marathi research. All datasets and models are publicly released at https://github.com/l3cube-pune/MarathiNLP .
△ Less
Submitted 20 July, 2023; v1 submitted 24 June, 2023;
originally announced June 2023.
-
Two-stage Pipeline for Multilingual Dialect Detection
Authors:
Ankit Vaidya,
Aditya Kane
Abstract:
Dialect Identification is a crucial task for localizing various Large Language Models. This paper outlines our approach to the VarDial 2023 shared task. Here we have to identify three or two dialects from three languages each which results in a 9-way classification for Track-1 and 6-way classification for Track-2 respectively. Our proposed approach consists of a two-stage system and outperforms ot…
▽ More
Dialect Identification is a crucial task for localizing various Large Language Models. This paper outlines our approach to the VarDial 2023 shared task. Here we have to identify three or two dialects from three languages each which results in a 9-way classification for Track-1 and 6-way classification for Track-2 respectively. Our proposed approach consists of a two-stage system and outperforms other participants' systems and previous works in this domain. We achieve a score of 58.54% for Track-1 and 85.61% for Track-2. Our codebase is available publicly (https://github.com/ankit-vaidya19/EACL_VarDial2023).
△ Less
Submitted 28 March, 2023; v1 submitted 6 March, 2023;
originally announced March 2023.
-
A Twitter BERT Approach for Offensive Language Detection in Marathi
Authors:
Tanmay Chavan,
Shantanu Patankar,
Aditya Kane,
Omkar Gokhale,
Raviraj Joshi
Abstract:
Automated offensive language detection is essential in combating the spread of hate speech, particularly in social media. This paper describes our work on Offensive Language Identification in low resource Indic language Marathi. The problem is formulated as a text classification task to identify a tweet as offensive or non-offensive. We evaluate different mono-lingual and multi-lingual BERT models…
▽ More
Automated offensive language detection is essential in combating the spread of hate speech, particularly in social media. This paper describes our work on Offensive Language Identification in low resource Indic language Marathi. The problem is formulated as a text classification task to identify a tweet as offensive or non-offensive. We evaluate different mono-lingual and multi-lingual BERT models on this classification task, focusing on BERT models pre-trained with social media datasets. We compare the performance of MuRIL, MahaTweetBERT, MahaTweetBERT-Hateful, and MahaBERT on the HASOC 2022 test set. We also explore external data augmentation from other existing Marathi hate speech corpus HASOC 2021 and L3Cube-MahaHate. The MahaTweetBERT, a BERT model, pre-trained on Marathi tweets when fine-tuned on the combined dataset (HASOC 2021 + HASOC 2022 + MahaHate), outperforms all models with an F1 score of 98.43 on the HASOC 2022 test set. With this, we also provide a new state-of-the-art result on HASOC 2022 / MOLD v2 test set.
△ Less
Submitted 20 December, 2022;
originally announced December 2022.
-
Large Language Models for Multi-label Propaganda Detection
Authors:
Tanmay Chavan,
Aditya Kane
Abstract:
The spread of propaganda through the internet has increased drastically over the past years. Lately, propaganda detection has started gaining importance because of the negative impact it has on society. In this work, we describe our approach for the WANLP 2022 shared task which handles the task of propaganda detection in a multi-label setting. The task demands the model to label the given text as…
▽ More
The spread of propaganda through the internet has increased drastically over the past years. Lately, propaganda detection has started gaining importance because of the negative impact it has on society. In this work, we describe our approach for the WANLP 2022 shared task which handles the task of propaganda detection in a multi-label setting. The task demands the model to label the given text as having one or more types of propaganda techniques. There are a total of 21 propaganda techniques to be detected. We show that an ensemble of five models performs the best on the task, scoring a micro-F1 score of 59.73%. We also conduct comprehensive ablations and propose various future directions for this work.
△ Less
Submitted 20 October, 2022; v1 submitted 15 October, 2022;
originally announced October 2022.
-
Temporal Word Meaning Disambiguation using TimeLMs
Authors:
Mihir Godbole,
Parth Dandavate,
Aditya Kane
Abstract:
Meaning of words constantly changes given the events in modern civilization. Large Language Models use word embeddings, which are often static and thus cannot cope with this semantic change. Thus,it is important to resolve ambiguity in word meanings. This paper is an effort in this direction, where we explore methods for word sense disambiguation for the EvoNLP shared task. We conduct rigorous abl…
▽ More
Meaning of words constantly changes given the events in modern civilization. Large Language Models use word embeddings, which are often static and thus cannot cope with this semantic change. Thus,it is important to resolve ambiguity in word meanings. This paper is an effort in this direction, where we explore methods for word sense disambiguation for the EvoNLP shared task. We conduct rigorous ablations for two solutions to this problem. We see that an approach using time-aware language models helps this task. Furthermore, we explore possible future directions to this problem.
△ Less
Submitted 17 November, 2022; v1 submitted 15 October, 2022;
originally announced October 2022.
-
Spread Love Not Hate: Undermining the Importance of Hateful Pre-training for Hate Speech Detection
Authors:
Omkar Gokhale,
Aditya Kane,
Shantanu Patankar,
Tanmay Chavan,
Raviraj Joshi
Abstract:
Pre-training large neural language models, such as BERT, has led to impressive gains on many natural language processing (NLP) tasks. Although this method has proven to be effective for many domains, it might not always provide desirable benefits. In this paper, we study the effects of hateful pre-training on low-resource hate speech classification tasks. While previous studies on the English lang…
▽ More
Pre-training large neural language models, such as BERT, has led to impressive gains on many natural language processing (NLP) tasks. Although this method has proven to be effective for many domains, it might not always provide desirable benefits. In this paper, we study the effects of hateful pre-training on low-resource hate speech classification tasks. While previous studies on the English language have emphasized its importance, we aim to augment their observations with some non-obvious insights. We evaluate different variations of tweet-based BERT models pre-trained on hateful, non-hateful, and mixed subsets of a 40M tweet dataset. This evaluation is carried out for the Indian languages Hindi and Marathi. This paper is empirical evidence that hateful pre-training is not the best pre-training option for hate speech detection. We show that pre-training on non-hateful text from the target domain provides similar or better results. Further, we introduce HindTweetBERT and MahaTweetBERT, the first publicly available BERT models pre-trained on Hindi and Marathi tweets, respectively. We show that they provide state-of-the-art performance on hate speech classification tasks. We also release hateful BERT for the two languages and a gold hate speech evaluation benchmark HateEval-Hi and HateEval-Mr consisting of manually labeled 2000 tweets each. The models and data are available at https://github.com/l3cube-pune/MarathiNLP .
△ Less
Submitted 11 December, 2022; v1 submitted 9 October, 2022;
originally announced October 2022.
-
Continual VQA for Disaster Response Systems
Authors:
Aditya Kane,
V Manushree,
Sahil Khose
Abstract:
Visual Question Answering (VQA) is a multi-modal task that involves answering questions from an input image, semantically understanding the contents of the image and answering it in natural language. Using VQA for disaster management is an important line of research due to the scope of problems that are answered by the VQA system. However, the main challenge is the delay caused by the generation o…
▽ More
Visual Question Answering (VQA) is a multi-modal task that involves answering questions from an input image, semantically understanding the contents of the image and answering it in natural language. Using VQA for disaster management is an important line of research due to the scope of problems that are answered by the VQA system. However, the main challenge is the delay caused by the generation of labels in the assessment of the affected areas. To tackle this, we deployed pre-trained CLIP model, which is trained on visual-image pairs. however, we empirically see that the model has poor zero-shot performance. Thus, we instead use pre-trained embeddings of text and image from this model for our supervised training and surpass previous state-of-the-art results on the FloodNet dataset. We expand this to a continual setting, which is a more real-life scenario. We tackle the problem of catastrophic forgetting using various experience replay methods. Our training runs are available at: https://wandb.ai/compyle/continual_vqa_final. Our code is available at https://github.com/AdityaKane2001/continual_vqa.
△ Less
Submitted 10 November, 2022; v1 submitted 21 September, 2022;
originally announced September 2022.
-
Efficient Gender Debiasing of Pre-trained Indic Language Models
Authors:
Neeraja Kirtane,
V Manushree,
Aditya Kane
Abstract:
The gender bias present in the data on which language models are pre-trained gets reflected in the systems that use these models. The model's intrinsic gender bias shows an outdated and unequal view of women in our culture and encourages discrimination. Therefore, in order to establish more equitable systems and increase fairness, it is crucial to identify and mitigate the bias existing in these m…
▽ More
The gender bias present in the data on which language models are pre-trained gets reflected in the systems that use these models. The model's intrinsic gender bias shows an outdated and unequal view of women in our culture and encourages discrimination. Therefore, in order to establish more equitable systems and increase fairness, it is crucial to identify and mitigate the bias existing in these models. While there is a significant amount of work in this area in English, there is a dearth of research being done in other gendered and low resources languages, particularly the Indian languages. English is a non-gendered language, where it has genderless nouns. The methodologies for bias detection in English cannot be directly deployed in other gendered languages, where the syntax and semantics vary. In our paper, we measure gender bias associated with occupations in Hindi language models. Our major contributions in this paper are the construction of a novel corpus to evaluate occupational gender bias in Hindi, quantify this existing bias in these systems using a well-defined metric, and mitigate it by efficiently fine-tuning our model. Our results reflect that the bias is reduced post-introduction of our proposed mitigation techniques. Our codebase is available publicly.
△ Less
Submitted 8 September, 2022;
originally announced September 2022.
-
An Efficient Modern Baseline for FloodNet VQA
Authors:
Aditya Kane,
Sahil Khose
Abstract:
Designing efficient and reliable VQA systems remains a challenging problem, more so in the case of disaster management and response systems. In this work, we revisit fundamental combination methods like concatenation, addition and element-wise multiplication with modern image and text feature abstraction models. We design a simple and efficient system which outperforms pre-existing methods on the…
▽ More
Designing efficient and reliable VQA systems remains a challenging problem, more so in the case of disaster management and response systems. In this work, we revisit fundamental combination methods like concatenation, addition and element-wise multiplication with modern image and text feature abstraction models. We design a simple and efficient system which outperforms pre-existing methods on the FloodNet dataset and achieves state-of-the-art performance. This simplified system requires significantly less training and inference time than modern VQA architectures. We also study the performance of various backbones and report their consolidated results. Code is available at https://github.com/sahilkhose/floodnet_vqa.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Predictive Maintenance using Machine Learning
Authors:
Archit P. Kane,
Ashutosh S. Kore,
Advait N. Khandale,
Sarish S. Nigade,
Pranjali P. Joshi
Abstract:
Predictive maintenance (PdM) is a concept, which is implemented to effectively manage maintenance plans of the assets by predicting their failures with data driven techniques. In these scenarios, data is collected over a certain period of time to monitor the state of equipment. The objective is to find some correlations and patterns that can help predict and ultimately prevent failures. Equipment…
▽ More
Predictive maintenance (PdM) is a concept, which is implemented to effectively manage maintenance plans of the assets by predicting their failures with data driven techniques. In these scenarios, data is collected over a certain period of time to monitor the state of equipment. The objective is to find some correlations and patterns that can help predict and ultimately prevent failures. Equipment in manufacturing industry are often utilized without a planned maintenance approach. Such practise frequently results in unexpected downtime, owing to certain unexpected failures. In scheduled maintenance, the condition of the manufacturing equipment is checked after fixed time interval and if any fault occurs, the component is replaced to avoid unexpected equipment stoppages. On the flip side, this leads to increase in time for which machine is non-functioning and cost of carrying out the maintenance. The emergence of Industry 4.0 and smart systems have led to increasing emphasis on predictive maintenance (PdM) strategies that can reduce the cost of downtime and increase the availability (utilization rate) of manufacturing equipment. PdM also has the potential to bring about new sustainable practices in manufacturing by fully utilizing the useful lives of components.
△ Less
Submitted 19 May, 2022;
originally announced May 2022.
-
Transformer based ensemble for emotion detection
Authors:
Aditya Kane,
Shantanu Patankar,
Sahil Khose,
Neeraja Kirtane
Abstract:
Detecting emotions in languages is important to accomplish a complete interaction between humans and machines. This paper describes our contribution to the WASSA 2022 shared task which handles this crucial task of emotion detection. We have to identify the following emotions: sadness, surprise, neutral, anger, fear, disgust, joy based on a given essay text. We are using an ensemble of ELECTRA and…
▽ More
Detecting emotions in languages is important to accomplish a complete interaction between humans and machines. This paper describes our contribution to the WASSA 2022 shared task which handles this crucial task of emotion detection. We have to identify the following emotions: sadness, surprise, neutral, anger, fear, disgust, joy based on a given essay text. We are using an ensemble of ELECTRA and BERT models to tackle this problem achieving an F1 score of $62.76\%$. Our codebase (https://bit.ly/WASSA_shared_task) and our WandB project (https://wandb.ai/acl_wassa_pictxmanipal/acl_wassa) is publicly available.
△ Less
Submitted 10 April, 2022; v1 submitted 22 March, 2022;
originally announced March 2022.
-
How to transform the Apple's application 'Find My' into a toolbox for whistleblowers
Authors:
Amadou Moctar Kane
Abstract:
The recent introduction of Find My app by Apple will open a large window of opportunities for whistleblowers. Based on a short range Bluetooth signals, an EC P-224 encryption, and an end-to-end encrypted manner using iCloud Keychain, Find My app is probably the first application broadcasting a large number of anonymous public key on this scale. Hence, this new Apple's application may introduce a r…
▽ More
The recent introduction of Find My app by Apple will open a large window of opportunities for whistleblowers. Based on a short range Bluetooth signals, an EC P-224 encryption, and an end-to-end encrypted manner using iCloud Keychain, Find My app is probably the first application broadcasting a large number of anonymous public key on this scale. Hence, this new Apple's application may introduce a revolution in secret communication, if we divert it from its primordial use and transform it into a powerful tool to put in the hands of whistleblowers. By using Find My app and an entity authentication protocol based on artificial intelligence, our goal is to make mass surveillance and kleptographic backdoors ineffective in the lifting of the whistleblower's anonymity. However, in some case, Find my app may also be a powerful tool in the hands of dictatorships governments in their fight against whistleblowers and political adversaries. Thus, the aim of this paper is to show with simple examples, how these two previous situation can happen.
△ Less
Submitted 31 March, 2020;
originally announced April 2020.
-
Ionic Tuning of Cobaltites at the Nanoscale
Authors:
Dustin A. Gilbert,
Alexander J. Grutter,
Peyton D. Murray,
Rajesh V. Chopdekar,
Alexander M. Kane,
Aleksey L. Ionin,
Michael S. Lee,
Steven R. Spurgeon,
Brian J. Kirby,
Brian B. Maranville,
Alpha T. N'Diaye,
Apurva Mehta,
Elke Arenholz,
Kai Liu,
Yayoi Takamura,
Julie A. Borchers
Abstract:
Control of materials through custom design of ionic distributions represents a powerful new approach to develop future technologies ranging from spintronic logic and memory devices to energy storage. Perovskites have shown particular promise for ionic devices due to their high ion mobility and sensitivity to chemical stoichiometry. In this work, we demonstrate a solid-state approach to control of…
▽ More
Control of materials through custom design of ionic distributions represents a powerful new approach to develop future technologies ranging from spintronic logic and memory devices to energy storage. Perovskites have shown particular promise for ionic devices due to their high ion mobility and sensitivity to chemical stoichiometry. In this work, we demonstrate a solid-state approach to control of ionic distributions in (La,Sr)CoO$_{3}$ thin films. Depositing a Gd capping layer on the perovskite film, oxygen is controllably extracted from the structure, up-to 0.5 O/u.c. throughout the entire 36 nm thickness. Commensurate with the oxygen extraction, the Co valence state and saturation magnetization show a smooth continuous variation. In contrast, magnetoresistance measurements show no-change in the magnetic anisotropy and a rapid increase in the resistivity over the same range of oxygen stoichiometry. These results suggest significant phase separation, with metallic ferromagnetic regions and oxygen-deficient, insulating, non-ferromagnetic regions, forming percolated networks. Indeed, X-ray diffraction identifies oxygen-vacancy ordering, including transformation to a brownmillerite crystal structure. The unexpected transformation to the brownmillerite phase at ambient temperature is further confirmed by high-resolution scanning transmission electron microscopy which shows significant structural - and correspondingly chemical - phase separation. This work demonstrates room-temperature ionic control of magnetism, electrical resistivity, and crystalline structure in a 36 nm thick film, presenting new opportunities for ionic devices that leverage multiple material functionalities.
△ Less
Submitted 23 September, 2018;
originally announced September 2018.
-
An eco-friendly Ecash with recycled banknotes
Authors:
Amadou Moctar Kane
Abstract:
By comparing cryptocurrencies with other existing payment methods, including banknotes and bank cards, it is clear that the use of Bitcoin and its competitors (Ethereum, \dots) is almost insignificant in world trade. We may also note that these cryptocurrencies have become tools of speculation, which is the antithesis of their primary purpose.
Based essentially on the security of electronic sign…
▽ More
By comparing cryptocurrencies with other existing payment methods, including banknotes and bank cards, it is clear that the use of Bitcoin and its competitors (Ethereum, \dots) is almost insignificant in world trade. We may also note that these cryptocurrencies have become tools of speculation, which is the antithesis of their primary purpose.
Based essentially on the security of electronic signatures, the Ecash introduced here will put the users back to the center of the game and exclude miners and their enormous waste of power energy. Thus, the purpose of this paper is to show that even a piece of paper can be recycled into a secure Ecash, while remaining environmentally friendly. Hence, we create here a cryptocurrency that would use a slight modification of the current banknotes to set up anonymous electronic transactions. By trading with banknotes, we mechanically transfer ownership of the paper money from one owner to another, hence, in this scheme, we introduce the notion of ownership transfer. It implies that at each transaction the elements allowing to authenticate the Ecash does not change, while the ownership certificate will change since the Ecash is transfer towards someone else.
△ Less
Submitted 14 June, 2018;
originally announced June 2018.
-
Making Physics Courses Accessible for Blind Students: strategies for course administration, class meetings and course materials
Authors:
Megan Holt,
Daniel Gillen,
Chelsea Cook,
Christa Hixson Miller,
Sacha D. Nandlall,
Kevin Setter,
Cary Supalo,
Paul Thorman,
Suzanne Amador Kane
Abstract:
The Americans with Disabilities Act (ADA) mandates that U.S. institutions of higher education provide "reasonable accommodations" to students with disabilities to ensure equal educational opportunities. However, despite the key role of physics as a gateway to Science, Technology, Engineering and Mathematics (STEM) studies, only limited resources exist for teaching physics to students who are blind…
▽ More
The Americans with Disabilities Act (ADA) mandates that U.S. institutions of higher education provide "reasonable accommodations" to students with disabilities to ensure equal educational opportunities. However, despite the key role of physics as a gateway to Science, Technology, Engineering and Mathematics (STEM) studies, only limited resources exist for teaching physics to students who are blind or visually impaired. Here we share lessons from our experience creating an accessible physics curriculum for a blind physics major. The authors include the student himself, a blind physics B.S. who graduated from a different institution, a PhD chemist and consultant on STEM accessibility who is himself blind, and several sighted educators and course assistants who worked regularly with the students. Throughout this effort, we learned that many of the principles of universal design described herein enhanced learning for all of our students.
△ Less
Submitted 17 July, 2018; v1 submitted 24 October, 2017;
originally announced October 2017.
-
Unsupervised domain adaptation in brain lesion segmentation with adversarial networks
Authors:
Konstantinos Kamnitsas,
Christian Baumgartner,
Christian Ledig,
Virginia F. J. Newcombe,
Joanna P. Simpson,
Andrew D. Kane,
David K. Menon,
Aditya Nori,
Antonio Criminisi,
Daniel Rueckert,
Ben Glocker
Abstract:
Significant advances have been made towards building accurate automatic segmentation systems for a variety of biomedical applications using machine learning. However, the performance of these systems often degrades when they are applied on new data that differ from the training data, for example, due to variations in imaging protocols. Manually annotating new data for each test domain is not a fea…
▽ More
Significant advances have been made towards building accurate automatic segmentation systems for a variety of biomedical applications using machine learning. However, the performance of these systems often degrades when they are applied on new data that differ from the training data, for example, due to variations in imaging protocols. Manually annotating new data for each test domain is not a feasible solution. In this work we investigate unsupervised domain adaptation using adversarial neural networks to train a segmentation method which is more invariant to differences in the input data, and which does not require any annotations on the test domain. Specifically, we learn domain-invariant features by learning to counter an adversarial network, which attempts to classify the domain of the input data by observing the activations of the segmentation network. Furthermore, we propose a multi-connected domain discriminator for improved adversarial training. Our system is evaluated using two MR databases of subjects with traumatic brain injuries, acquired using different scanners and imaging protocols. Using our unsupervised approach, we obtain segmentation accuracies which are close to the upper bound of supervised domain adaptation.
△ Less
Submitted 28 December, 2016;
originally announced December 2016.
-
How DNA Cryptography can help whistleblowers and refugees
Authors:
Amadou Moctar Kane
Abstract:
The recent progress in DNA sequencing will probably revolutionize the world of electronic. Hence, we went from DNA sequencing that only research centers could realize, to portable, tiny and inexpensive tools. So, it is likely that in a few years these DNA sequencers will be included in our smartphones.
The purpose of this paper is to support this revolution, by using the DNA cryptography, hash f…
▽ More
The recent progress in DNA sequencing will probably revolutionize the world of electronic. Hence, we went from DNA sequencing that only research centers could realize, to portable, tiny and inexpensive tools. So, it is likely that in a few years these DNA sequencers will be included in our smartphones.
The purpose of this paper is to support this revolution, by using the DNA cryptography, hash functions and social networks. The first application will introduce a mutual entity authentication protocol in order to help waifs, refugees, and victims of human trafficking to find their biological parents online.
The second application will also use the DNA cryptography and the social networks to protect whistleblowers' actions. For example, this method will allow whistleblowers to securely broadcast on social networks, their information with one grape.
△ Less
Submitted 11 April, 2016;
originally announced June 2016.
-
Efficient Multi-Scale 3D CNN with Fully Connected CRF for Accurate Brain Lesion Segmentation
Authors:
Konstantinos Kamnitsas,
Christian Ledig,
Virginia F. J. Newcombe,
Joanna P. Simpson,
Andrew D. Kane,
David K. Menon,
Daniel Rueckert,
Ben Glocker
Abstract:
We propose a dual pathway, 11-layers deep, three-dimensional Convolutional Neural Network for the challenging task of brain lesion segmentation. The devised architecture is the result of an in-depth analysis of the limitations of current networks proposed for similar applications. To overcome the computational burden of processing 3D medical scans, we have devised an efficient and effective dense…
▽ More
We propose a dual pathway, 11-layers deep, three-dimensional Convolutional Neural Network for the challenging task of brain lesion segmentation. The devised architecture is the result of an in-depth analysis of the limitations of current networks proposed for similar applications. To overcome the computational burden of processing 3D medical scans, we have devised an efficient and effective dense training scheme which joins the processing of adjacent image patches into one pass through the network while automatically adapting to the inherent class imbalance present in the data. Further, we analyze the development of deeper, thus more discriminative 3D CNNs. In order to incorporate both local and larger contextual information, we employ a dual pathway architecture that processes the input images at multiple scales simultaneously. For post-processing of the network's soft segmentation, we use a 3D fully connected Conditional Random Field which effectively removes false positives. Our pipeline is extensively evaluated on three challenging tasks of lesion segmentation in multi-channel MRI patient data with traumatic brain injuries, brain tumors, and ischemic stroke. We improve on the state-of-the-art for all three applications, with top ranking performance on the public benchmarks BRATS 2015 and ISLES 2015. Our method is computationally efficient, which allows its adoption in a variety of research and clinical settings. The source code of our implementation is made publicly available.
△ Less
Submitted 8 January, 2017; v1 submitted 18 March, 2016;
originally announced March 2016.
-
The Tangent Search Engine: Improved Similarity Metrics and Scalability for Math Formula Search
Authors:
Richard Zanibbi,
Kenny Davila,
Andrew Kane,
Frank Tompa
Abstract:
With the ever-increasing quantity and variety of data worldwide, the Web has become a rich repository of mathematical formulae. This necessitates the creation of robust and scalable systems for Mathematical Information Retrieval, where users search for mathematical information using individual formulae (query-by-expression) or a combination of keywords and formulae. Often, the pages that best sati…
▽ More
With the ever-increasing quantity and variety of data worldwide, the Web has become a rich repository of mathematical formulae. This necessitates the creation of robust and scalable systems for Mathematical Information Retrieval, where users search for mathematical information using individual formulae (query-by-expression) or a combination of keywords and formulae. Often, the pages that best satisfy users' information needs contain expressions that only approximately match the query formulae. For users trying to locate or re-find a specific expression, browse for similar formulae, or who are mathematical non-experts, the similarity of formulae depends more on the relative positions of symbols than on deep mathematical semantics.
We propose the Maximum Subtree Similarity (MSS) metric for query-by-expression that produces intuitive rankings of formulae based on their appearance, as represented by the types and relative positions of symbols. Because it is too expensive to apply the metric against all formulae in large collections, we first retrieve expressions using an inverted index over tuples that encode relationships between pairs of symbols, ranking hits using the Dice coefficient. The top-k formulae are then re-ranked using MSS. Our approach obtains state-of-the-art performance on the NTCIR-11 Wikipedia formula retrieval benchmark and is efficient in terms of both index space and overall retrieval time. Retrieval systems for other graphical forms, including chemical diagrams, flowcharts, figures, and tables, may also benefit from adopting our approach.
△ Less
Submitted 22 July, 2015;
originally announced July 2015.
-
Physical Removal of Metallic Carbon Nanotubes from Nanotube Network Devices Using a Thermal and Fluidic Process
Authors:
Alexandra C. Ford,
Michael Shaughnessy,
Bryan M. Wong,
Alexander A. Kane,
Oleksandr V. Kuznetsov,
Karen L. Krafcik,
W. E. Billups,
Robert H. Hauge,
François Léonard
Abstract:
Electronic and optoelectronic devices based on thin films of carbon nanotubes are currently limited by the presence of metallic nanotubes. Here we present a novel approach based on nanotube alkyl functionalization to physically remove the metallic nanotubes from such network devices. The process relies on preferential thermal desorption of the alkyls from the semiconducting nanotubes and the subse…
▽ More
Electronic and optoelectronic devices based on thin films of carbon nanotubes are currently limited by the presence of metallic nanotubes. Here we present a novel approach based on nanotube alkyl functionalization to physically remove the metallic nanotubes from such network devices. The process relies on preferential thermal desorption of the alkyls from the semiconducting nanotubes and the subsequent dissolution and selective removal of the metallic nanotubes in chloroform. The approach is versatile and is applied to devices post-fabrication.
△ Less
Submitted 1 February, 2013;
originally announced February 2013.
-
A biophysical model of prokaryotic diversity in geothermal hot springs
Authors:
Anna Klales,
James Duncan,
Elizabeth Janus Nett,
Suzanne Amador Kane
Abstract:
Recent field investigations of photosynthetic bacteria living in geothermal hot spring environments have revealed surprisingly complex ecosystems, with an unexpected level of genetic diversity. One case of particular interest involves the distribution along hot spring thermal gradients of genetically distinct bacterial strains that differ in their preferred temperatures for reproduction and phot…
▽ More
Recent field investigations of photosynthetic bacteria living in geothermal hot spring environments have revealed surprisingly complex ecosystems, with an unexpected level of genetic diversity. One case of particular interest involves the distribution along hot spring thermal gradients of genetically distinct bacterial strains that differ in their preferred temperatures for reproduction and photosynthesis. In such systems, a single variable, temperature, defines the relevant environmental variation. In spite of this, each region along the thermal gradient exhibits multiple strains of photosynthetic bacteria adapted to several distinct thermal optima, rather than the expected single thermal strain adapted to the local environmental temperature. Here we analyze microbiology data from several ecological studies to show that the thermal distribution field data exhibit several universal features independent of location and specific bacterial strain. These include the distribution of optimal temperatures of different thermal strains and the functional dependence of the net population density on temperature. Further, we present a simple population dynamics model of these systems that is highly constrained by biophysical data and by physical features of the environment. This model can explain in detail the observed diversity of different strains of the photosynthetic bacteria. It also reproduces the observed thermal population distributions, as well as certain features of population dynamics observed in laboratory studies of the same organisms.
△ Less
Submitted 7 August, 2008;
originally announced August 2008.