-
Search for lepton-flavor-violating tau-lepton decays to $\ellγ$ at Belle
Authors:
K. Uno,
K. Hayasaka,
K. Inami,
I. Adachi,
H. Aihara,
D. M. Asner,
H. Atmacan,
T. Aushev,
R. Ayad,
V. Babu,
J. Bennett,
F. Bernlochner,
M. Bessner,
V. Bhardwaj,
J. Biswal,
A. Bobrov,
G. Bonvicini,
A. Bozek,
M. Brav,
M. Campajola,
D. v,
M. -C. Chang,
H. E. Cho,
K. Cho,
S. -J. Cho
, et al. (156 additional authors not shown)
Abstract:
Charged lepton flavor violation is forbidden in the Standard Model but possible in several new physics scenarios. In many of these models, the radiative decays $τ^{\pm}\rightarrow\ell^{\pm}γ$ ($\ell=e,μ$) are predicted to have a sizeable probability, making them particularly interesting channels to search at various experiments. An updated search via $τ^{\pm}\rightarrow\ell^{\pm}γ$ using full data…
▽ More
Charged lepton flavor violation is forbidden in the Standard Model but possible in several new physics scenarios. In many of these models, the radiative decays $τ^{\pm}\rightarrow\ell^{\pm}γ$ ($\ell=e,μ$) are predicted to have a sizeable probability, making them particularly interesting channels to search at various experiments. An updated search via $τ^{\pm}\rightarrow\ell^{\pm}γ$ using full data of the Belle experiment, corresponding to an integrated luminosity of 988 fb$^{-1}$, is reported for charged lepton flavor violation. No significant excess over background predictions from the Standard Model is observed, and the upper limits on the branching fractions, $\mathcal{B}(τ^{\pm}\rightarrow μ^{\pm}γ)$ $\leq$ $4.2\times10^{-8}$ and $\mathcal{B}(τ^{\pm}\rightarrow e^{\pm}γ)$ $\leq$ $5.6\times10^{-8}$, are set at 90\% confidence level.
△ Less
Submitted 5 September, 2021; v1 submitted 24 March, 2021;
originally announced March 2021.
-
Shifted Monic Ultraspherical Approximation for solving some of Fractional Orders Differential Equations
Authors:
M. Abdelhakem,
Doha M. R.,
A. F. Saadallah,
M. El-Kady
Abstract:
The purpose of this paper is to show and explain a new formula that indicates with finality the derivatives of Shifted Monic Ultraspherical polynomials (SMUPs) of any degree and for any fractional-order using the shifted Monic Ultraspherical polynomials themselves. We also create a direct method solution for the linear or nonlinear multi-order fractional differential equations (FDEs) with constant…
▽ More
The purpose of this paper is to show and explain a new formula that indicates with finality the derivatives of Shifted Monic Ultraspherical polynomials (SMUPs) of any degree and for any fractional-order using the shifted Monic Ultraspherical polynomials themselves. We also create a direct method solution for the linear or nonlinear multi-order fractional differential equations (FDEs) with constant coefficients involving a spectral Galerkin method. The spatial approximation with its fractional order derivatives (described in the Caputo sense) are built using shifted Monic Ultraspherical polynomials.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
PhotoApp: Photorealistic Appearance Editing of Head Portraits
Authors:
Mallikarjun B R,
Ayush Tewari,
Abdallah Dib,
Tim Weyrich,
Bernd Bickel,
Hans-Peter Seidel,
Hanspeter Pfister,
Wojciech Matusik,
Louis Chevallier,
Mohamed Elgharib,
Christian Theobalt
Abstract:
Photorealistic editing of portraits is a challenging task as humans are very sensitive to inconsistencies in faces. We present an approach for high-quality intuitive editing of the camera viewpoint and scene illumination in a portrait image. This requires our method to capture and control the full reflectance field of the person in the image. Most editing approaches rely on supervised learning usi…
▽ More
Photorealistic editing of portraits is a challenging task as humans are very sensitive to inconsistencies in faces. We present an approach for high-quality intuitive editing of the camera viewpoint and scene illumination in a portrait image. This requires our method to capture and control the full reflectance field of the person in the image. Most editing approaches rely on supervised learning using training data captured with setups such as light and camera stages. Such datasets are expensive to acquire, not readily available and do not capture all the rich variations of in-the-wild portrait images. In addition, most supervised approaches only focus on relighting, and do not allow camera viewpoint editing. Thus, they only capture and control a subset of the reflectance field. Recently, portrait editing has been demonstrated by operating in the generative model space of StyleGAN. While such approaches do not require direct supervision, there is a significant loss of quality when compared to the supervised approaches. In this paper, we present a method which learns from limited supervised training data. The training images only include people in a fixed neutral expression with eyes closed, without much hair or background variations. Each person is captured under 150 one-light-at-a-time conditions and under 8 camera poses. Instead of training directly in the image space, we design a supervised problem which learns transformations in the latent space of StyleGAN. This combines the best of supervised learning and generative adversarial modeling. We show that the StyleGAN prior allows for generalisation to different expressions, hairstyles and backgrounds. This produces high-quality photorealistic results for in-the-wild images and significantly outperforms existing methods. Our approach can edit the illumination and pose simultaneously, and runs at interactive rates.
△ Less
Submitted 13 May, 2021; v1 submitted 13 March, 2021;
originally announced March 2021.
-
Design and implementation of Energy Efficient Lightweight Encryption (EELWE) algorithm for medical applications
Authors:
Radhika Rani Chintala,
Narasinga Rao M R,
Somu Venkateswarlu
Abstract:
Proportional to the growth in the usage of Human Sensor Networks (HSN), the volume of the data exchange between Sensor devices is increasing at a rapid pace. In this paper, we have proposed an Energy Efficient Lightweight Encryption (EELWE) algorithm for providing the confidentiality of data at the sensor level, particularly suitable for resource-constrained environments. Results obtained have pro…
▽ More
Proportional to the growth in the usage of Human Sensor Networks (HSN), the volume of the data exchange between Sensor devices is increasing at a rapid pace. In this paper, we have proposed an Energy Efficient Lightweight Encryption (EELWE) algorithm for providing the confidentiality of data at the sensor level, particularly suitable for resource-constrained environments. Results obtained have proved that an EELWE consumes less energy relative to present lightweight ciphers and it supports multiple block sizes of 32-bit, 48-bit, and 64-bit.
△ Less
Submitted 8 March, 2021;
originally announced March 2021.
-
Design and Development of Robots End Effector Test Rig
Authors:
Josephine Selvarani Ruth D,
Saniya Zeba,
Vibha M R,
Rokesh Laishram,
Gauthama Anand
Abstract:
A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for grasping an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism…
▽ More
A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for grasping an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism of the system. Hence, it improves the ergonomics and accuracy of an operation with enhanced repeatability.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
PeopleXploit -- A hybrid tool to collect public data
Authors:
Arjun Anand V,
Buvanasri A K,
Meenakshi R,
Karthika S,
Ashok Kumar Mohan
Abstract:
This paper introduces the concept of Open Source Intelligence (OSINT) as an important application in intelligent profiling of individuals. With a variety of tools available, significant data shall be obtained on an individual as a consequence of analyzing his/her internet presence but all of this comes at the cost of low relevance. To increase the relevance score in profiling, PeopleXploit is bein…
▽ More
This paper introduces the concept of Open Source Intelligence (OSINT) as an important application in intelligent profiling of individuals. With a variety of tools available, significant data shall be obtained on an individual as a consequence of analyzing his/her internet presence but all of this comes at the cost of low relevance. To increase the relevance score in profiling, PeopleXploit is being introduced. PeopleXploit is a hybrid tool which helps in collecting the publicly available information that is reliable and relevant to the given input. This tool is used to track and trace the given target with their digital footprints like Name, Email, Phone Number, User IDs etc. and the tool will scan & search other associated data from public available records from the internet and create a summary report against the target. PeopleXploit profiles a person using authorship analysis and finds the best matching guess. Also, the type of analysis performed (professional/matrimonial/criminal entity) varies with the requirement of the user.
△ Less
Submitted 28 October, 2020;
originally announced October 2020.
-
Learning Complete 3D Morphable Face Models from Images and Videos
Authors:
Mallikarjun B R,
Ayush Tewari,
Hans-Peter Seidel,
Mohamed Elgharib,
Christian Theobalt
Abstract:
Most 3D face reconstruction methods rely on 3D morphable models, which disentangle the space of facial deformations into identity geometry, expressions and skin reflectance. These models are typically learned from a limited number of 3D scans and thus do not generalize well across different identities and expressions. We present the first approach to learn complete 3D models of face identity geome…
▽ More
Most 3D face reconstruction methods rely on 3D morphable models, which disentangle the space of facial deformations into identity geometry, expressions and skin reflectance. These models are typically learned from a limited number of 3D scans and thus do not generalize well across different identities and expressions. We present the first approach to learn complete 3D models of face identity geometry, albedo and expression just from images and videos. The virtually endless collection of such data, in combination with our self-supervised learning-based approach allows for learning face models that generalize beyond the span of existing approaches. Our network design and loss functions ensure a disentangled parameterization of not only identity and albedo, but also, for the first time, an expression basis. Our method also allows for in-the-wild monocular reconstruction at test time. We show that our learned models better generalize and lead to higher quality image-based reconstructions than existing approaches.
△ Less
Submitted 4 October, 2020;
originally announced October 2020.
-
PIE: Portrait Image Embedding for Semantic Control
Authors:
Ayush Tewari,
Mohamed Elgharib,
Mallikarjun B R.,
Florian Bernard,
Hans-Peter Seidel,
Patrick Pérez,
Michael Zollhöfer,
Christian Theobalt
Abstract:
Editing of portrait images is a very popular and important research topic with a large variety of applications. For ease of use, control should be provided via a semantically meaningful parameterization that is akin to computer animation controls. The vast majority of existing techniques do not provide such intuitive and fine-grained control, or only enable coarse editing of a single isolated cont…
▽ More
Editing of portrait images is a very popular and important research topic with a large variety of applications. For ease of use, control should be provided via a semantically meaningful parameterization that is akin to computer animation controls. The vast majority of existing techniques do not provide such intuitive and fine-grained control, or only enable coarse editing of a single isolated control parameter. Very recently, high-quality semantically controlled editing has been demonstrated, however only on synthetically created StyleGAN images. We present the first approach for embedding real portrait images in the latent space of StyleGAN, which allows for intuitive editing of the head pose, facial expression, and scene illumination in the image. Semantic editing in parameter space is achieved based on StyleRig, a pretrained neural network that maps the control space of a 3D morphable face model to the latent space of the GAN. We design a novel hierarchical non-linear optimization problem to obtain the embedding. An identity preservation energy term allows spatially coherent edits while maintaining facial integrity. Our approach runs at interactive frame rates and thus allows the user to explore the space of possible edits. We evaluate our approach on a wide set of portrait photos, compare it to the current state of the art, and validate the effectiveness of its components in an ablation study.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
Monocular Reconstruction of Neural Face Reflectance Fields
Authors:
Mallikarjun B R.,
Ayush Tewari,
Tae-Hyun Oh,
Tim Weyrich,
Bernd Bickel,
Hans-Peter Seidel,
Hanspeter Pfister,
Wojciech Matusik,
Mohamed Elgharib,
Christian Theobalt
Abstract:
The reflectance field of a face describes the reflectance properties responsible for complex lighting effects including diffuse, specular, inter-reflection and self shadowing. Most existing methods for estimating the face reflectance from a monocular image assume faces to be diffuse with very few approaches adding a specular component. This still leaves out important perceptual aspects of reflecta…
▽ More
The reflectance field of a face describes the reflectance properties responsible for complex lighting effects including diffuse, specular, inter-reflection and self shadowing. Most existing methods for estimating the face reflectance from a monocular image assume faces to be diffuse with very few approaches adding a specular component. This still leaves out important perceptual aspects of reflectance as higher-order global illumination effects and self-shadowing are not modeled. We present a new neural representation for face reflectance where we can estimate all components of the reflectance responsible for the final appearance from a single monocular image. Instead of modeling each component of the reflectance separately using parametric models, our neural representation allows us to generate a basis set of faces in a geometric deformation-invariant space, parameterized by the input light direction, viewpoint and face geometry. We learn to reconstruct this reflectance field of a face just from a monocular image, which can be used to render the face from any viewpoint in any light condition. Our method is trained on a light-stage training dataset, which captures 300 people illuminated with 150 light conditions from 8 viewpoints. We show that our method outperforms existing monocular reflectance reconstruction methods, in terms of photorealism due to better capturing of physical premitives, such as sub-surface scattering, specularities, self-shadows and other higher-order effects.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
End-to-End Code Switching Language Models for Automatic Speech Recognition
Authors:
Ahan M. R.,
Shreyas Sunil Kulkarni
Abstract:
In this paper, we particularly work on the code-switched text, one of the most common occurrences in the bilingual communities across the world. Due to the discrepancies in the extraction of code-switched text from an Automated Speech Recognition(ASR) module, and thereby extracting the monolingual text from the code-switched text, we propose an approach for extracting monolingual text using Deep B…
▽ More
In this paper, we particularly work on the code-switched text, one of the most common occurrences in the bilingual communities across the world. Due to the discrepancies in the extraction of code-switched text from an Automated Speech Recognition(ASR) module, and thereby extracting the monolingual text from the code-switched text, we propose an approach for extracting monolingual text using Deep Bi-directional Language Models(LM) such as BERT and other Machine Translation models, and also explore different ways of extracting code-switched text from the ASR model. We also explain the robustness of the model by comparing the results of Perplexity and other different metrics like WER, to the standard bi-lingual text output without any external information.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Crowd Control in Plazas Constrained to Social Distancing
Authors:
Álvaro González García,
James L. Martín R.,
Alessio Caciagli
Abstract:
We present a simple and versatile method for calculating the maximum capacity of public spaces constrained to social distancing, following the recommended measures of the WHO due to the COVID-19 pandemic outbreak. This method assumes a minimum required distance of two meters between persons and is tested in four actual plazas. Additionally, we estimate public space capacity in case of public event…
▽ More
We present a simple and versatile method for calculating the maximum capacity of public spaces constrained to social distancing, following the recommended measures of the WHO due to the COVID-19 pandemic outbreak. This method assumes a minimum required distance of two meters between persons and is tested in four actual plazas. Additionally, we estimate public space capacity in case of public events, such as markets or concerts. We believe our method will directly provide guidelines for crowd control in the so-called "new normality", serving as a first step for future and more accurate developments.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Joint User Grouping, Scheduling, and Precoding for Multicast Energy Efficiency in Multigroup Multicast Systems
Authors:
Ashok Bandi,
Bhavani Shankar Mysore R,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
This paper studies the joint design of user grouping, scheduling (or admission control) and precoding to optimize energy efficiency (EE) for multigroup multicast scenarios in single-cell multiuser MISO downlink channels. Noticing that the existing definition of EE fails to account for group sizes, a new metric called multicast energy efficiency (MEE) is proposed. In this context, the joint design…
▽ More
This paper studies the joint design of user grouping, scheduling (or admission control) and precoding to optimize energy efficiency (EE) for multigroup multicast scenarios in single-cell multiuser MISO downlink channels. Noticing that the existing definition of EE fails to account for group sizes, a new metric called multicast energy efficiency (MEE) is proposed. In this context, the joint design is considered for the maximization of MEE, EE, and scheduled users. Firstly, with the help of binary variables (associated with grouping and scheduling) the joint design problem is formulated as a mixed-Boolean fractional programming problem such that it facilitates the joint update of grouping, scheduling and precoding variables. Further, several novel optimization formulations are proposed to reveal the hidden difference of convex/ concave structure in the objective and associated constraints. Thereafter, we propose a convex-concave procedure framework based iterative algorithm for each optimization criteria where grouping, scheduling, and precoding variables are updated jointly in each iteration. Finally, we compare the performance of the three design criteria concerning three performance metrics namely MEE, EE, and scheduled users through Monte-Carlo simulations. These simulations establish the need for MEE and the improvement from the system optimization.
△ Less
Submitted 14 May, 2020;
originally announced May 2020.
-
Search for lepton-flavor violating decays $D^{0}\rightarrow X^{0}e^{\pm}μ^{\mp}$
Authors:
BaBar Collaboration,
J. P. Lees,
V. Poireau,
V. Tisserand,
E. Grauges,
A. Palano,
G. Eigen,
D. N. Brown,
Yu. G. Kolomensky,
M. Fritsch,
H. Koch,
T. Schroeder,
R. Cheaib,
C. Hearty,
T. S. Mattison,
J. A. McKenna,
R. Y. So,
V. E. Blinov,
A. R. Buzykaev,
V. P. Druzhinin,
V. B. Golubev,
E. A. Kozyrev,
E. A. Kravchenko,
A. P. Onuchin,
S. I. Serednyakov
, et al. (217 additional authors not shown)
Abstract:
We present a search for seven lepton-flavor-violating neutral charm decays of the type $D^{0}\rightarrow X^{0} e^{\pm} μ^{\mp}$, where $X^{0}$ represents a $π^{0}$, $K^{0}_{\rm S}$, $\bar{K^{*0}}$, $ρ^{0}$, $φ$, $ω$, or $η$ meson. The analysis is based on $468$ fb$^{-1}$ of $e^+e^-$ annihilation data collected at or close to the $Υ(4S)$ resonance with the BaBar detector at the SLAC National Accele…
▽ More
We present a search for seven lepton-flavor-violating neutral charm decays of the type $D^{0}\rightarrow X^{0} e^{\pm} μ^{\mp}$, where $X^{0}$ represents a $π^{0}$, $K^{0}_{\rm S}$, $\bar{K^{*0}}$, $ρ^{0}$, $φ$, $ω$, or $η$ meson. The analysis is based on $468$ fb$^{-1}$ of $e^+e^-$ annihilation data collected at or close to the $Υ(4S)$ resonance with the BaBar detector at the SLAC National Accelerator Laboratory. No significant signals are observed, and we establish 90\% confidence level upper limits on the branching fractions in the range $(5.0 - 22.5)\times 10^{-7}$. The limits are between one and two orders of magnitude more stringent than previous measurements.
△ Less
Submitted 5 May, 2020; v1 submitted 20 April, 2020;
originally announced April 2020.
-
Team Mountaineers Space Robotic Challenge Phase-2 Qualification Round Preparation Report
Authors:
Cagri Kilic,
Christopher A. Tatsch,
Bernardo Martinez R. Jr,
Jared J. Beard,
Derek W. Ross,
Jason N. Gross
Abstract:
Team Mountaineers launched efforts on the NASA Space Robotics Challenge Phase-2 (SRC2). The challenge will be held on the lunar terrain with virtual robotic platforms to establish an in-situ resource utilization process. In this report, we provide an overview of a simulation environment, a virtual mobile robot, and a software architecture that was created by Team Mountaineers in order to prepare f…
▽ More
Team Mountaineers launched efforts on the NASA Space Robotics Challenge Phase-2 (SRC2). The challenge will be held on the lunar terrain with virtual robotic platforms to establish an in-situ resource utilization process. In this report, we provide an overview of a simulation environment, a virtual mobile robot, and a software architecture that was created by Team Mountaineers in order to prepare for the competition's qualification round before the competition environment was released.
△ Less
Submitted 22 March, 2020;
originally announced March 2020.
-
Study of the variable broadband emission of Markarian 501 during the most extreme Swift X-ray activity
Authors:
MAGIC Collaboration,
V. A. Acciari,
S. Ansoldi,
L. A. Antonelli,
A. Babić,
B. Banerjee,
U. Barres de Almeida,
J. A. Barrio,
J. Becerra González,
W. Bednarek,
E. Bernardini,
A. Berti,
J. Besenrieder,
W. Bhattacharyya,
C. Bigongiari,
O. Blanch,
G. Bonnoli,
G. Busetto,
R. Carosi,
G. Ceribella,
S. Cikota,
S. M. Colak,
P. Colin,
E. Colombo,
J. L. Contreras
, et al. (163 additional authors not shown)
Abstract:
Mrk501 is a very high-energy (VHE) gamma-ray blazar located at z=0.034. During a period of two weeks in July 2014, the highest X-ray activity of Mrk501 was observed in ~14 years of operation of the Neil Gehrels Swift Gamma-ray Burst Observatory. We characterize the broadband variability of Mrk501 from radio to VHE gamma rays, and evaluate whether it can be interpreted within theoretical scenarios…
▽ More
Mrk501 is a very high-energy (VHE) gamma-ray blazar located at z=0.034. During a period of two weeks in July 2014, the highest X-ray activity of Mrk501 was observed in ~14 years of operation of the Neil Gehrels Swift Gamma-ray Burst Observatory. We characterize the broadband variability of Mrk501 from radio to VHE gamma rays, and evaluate whether it can be interpreted within theoretical scenarios widely used to explain the broadband emission from blazars. The temporal evolution of the most prominent and variable segments of the SED is described with a one-zone synchrotron self-Compton model with variations in the break energy of the electron energy distribution (EED), and with some adjustments in the magnetic field strength and spectral shape of the EED. A narrow feature at ~3 TeV was observed in the VHE spectrum measured on 2014 July 19 (MJD 56857.98), which is the day with the highest X-ray flux ($>0.3$ keV) measured during the entire Swift mission. This feature is inconsistent with the classical analytic functions to describe the measured VHE spectra (power law, log-parabola, and log-parabola with exponential cutoff) at more than 3$σ$. A fit with a log-parabola plus a narrow component is preferred over the fit with a single log-parabola at more than 4$σ$, and a dedicated Monte Carlo simulation estimated the significance of this extra component to be larger than 3$σ$. Under the assumption that this VHE spectral feature is real, we show that it can be reproduced with three distinct theoretical scenarios: a) a pileup in the EED due to stochastic acceleration; b) a structured jet with two-SSC emitting regions, with one region dominated by an extremely narrow EED; and c) an emission from an IC pair cascade.
△ Less
Submitted 16 March, 2021; v1 submitted 21 January, 2020;
originally announced January 2020.
-
On Computing the Hamiltonian Index of Graphs
Authors:
Geevarghese Philip,
Rani M. R.,
Subashini R
Abstract:
The $r$-th iterated line graph $L^{r}(G)$ of a graph $G$ is defined by: (i) $L^{0}(G) = G$ and (ii) $L^{r}(G) = L(L^{(r- 1)}(G))$ for $r > 0$, where $L(G)$ denotes the line graph of $G$. The Hamiltonian Index $h(G)$ of $G$ is the smallest $r$ such that $L^{r}(G)$ has a Hamiltonian cycle. Checking if $h(G) = k$ is NP-hard for any fixed integer $k \geq 0$ even for subcubic graphs $G$. We study the p…
▽ More
The $r$-th iterated line graph $L^{r}(G)$ of a graph $G$ is defined by: (i) $L^{0}(G) = G$ and (ii) $L^{r}(G) = L(L^{(r- 1)}(G))$ for $r > 0$, where $L(G)$ denotes the line graph of $G$. The Hamiltonian Index $h(G)$ of $G$ is the smallest $r$ such that $L^{r}(G)$ has a Hamiltonian cycle. Checking if $h(G) = k$ is NP-hard for any fixed integer $k \geq 0$ even for subcubic graphs $G$. We study the parameterized complexity of this problem with the parameter treewidth, $tw(G)$, and show that we can find $h(G)$ in time $O*((1 + 2^{(ω+ 3)})^{tw(G)})$ where $ω$ is the matrix multiplication exponent and the $O*$ notation hides polynomial factors in input size.
The NP-hard Eulerian Steiner Subgraph problem takes as input a graph $G$ and a specified subset $K$ of terminal vertices of $G$ and asks if $G$ has an Eulerian (that is: connected, and with all vertices of even degree.) subgraph $H$ containing all the terminals. A second result (and a key ingredient of our algorithm for finding $h(G)$) in this work is an algorithm which solves Eulerian Steiner Subgraph in $O*((1 + 2^{(ω+ 3)})^{tw(G)})$ time.
△ Less
Submitted 4 December, 2019;
originally announced December 2019.
-
Bonding in light-induced vortices: benzene in a high-frequency circular polarized laser
Authors:
Prashant Raj,
Mishu Paul,
Mythreyi R.,
Balanarayan Pananghat
Abstract:
The electronic structure of benzene in the presence of a high-intensity high-frequency circularly polarized laser supports a middle-of-the-ring electron localization. Here, the laser polarization coincides with the ring plane of benzene. The high-frequency oscillating electric field creates circular currents centered at each atom with a circle radius equal to the maximum field amplitude of the las…
▽ More
The electronic structure of benzene in the presence of a high-intensity high-frequency circularly polarized laser supports a middle-of-the-ring electron localization. Here, the laser polarization coincides with the ring plane of benzene. The high-frequency oscillating electric field creates circular currents centered at each atom with a circle radius equal to the maximum field amplitude of the laser. All six carbons have six such rings. For a maximum field amplitude of 1.42 Å, which is the carbon-carbon bond distance, all six dynamic current circles intersect to create a deep vortex in the middle, which supports a bound state of a pair of electrons. Such states for benzene can be realized in experiments using a circularly polarized XUV-laser in a range of intensities 10^16-10^17 W/cm^2 and frequencies 16 eV to 22 eV. Electronic dynamics calculations predict a minimal ionization of benzene when the rise-time of the laser pulse is sudden, indicating a possible experimental realization of these states characterized by a large cut-off in the harmonic generation spectra. This stable electronic structure of the light-dressed benzene is doubly-aromatic due to an extra aromaticity from a D6h symmetric circular distortion of theσ-framework while the π-electrons, with low density in the ring-plane,are least affected.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
The Implementation of Quantum Computing Operations with Phase Modulated Microwave Pulses and High-Spin Ions at Zero Magnetic Fields
Authors:
Arifullin M. R.,
Berdinskiy V. L
Abstract:
New physical implementations of quantum computing elementary operations by pulse manipulations with electron spins of paramagnetic ions having two electrons and spin S=1 in a zero magnetic field are proposed. New type of microwave pulses with variable phases and different polarizations are able to induce different transitions between ion spin states, and those transitions are described by quantum…
▽ More
New physical implementations of quantum computing elementary operations by pulse manipulations with electron spins of paramagnetic ions having two electrons and spin S=1 in a zero magnetic field are proposed. New type of microwave pulses with variable phases and different polarizations are able to induce different transitions between ion spin states, and those transitions are described by quantum computing operators. To describe the effects of such pulses, a new way to present exponential operators as polynomials of Pauli matrices is proposed.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
Multi-critical Behavior in Topological Phase Transitions
Authors:
S. Rufo,
Nei Lopes,
Mucio A. Continentino,
Griffith M. A. R
Abstract:
Topological phase transitions can be described by the theory of critical phenomena and identified by critical exponents that define their universality classes. This is a consequence of the existence of a diverging length at the transition that has been identified as the penetration depth of the surface modes in the non-trivial topological phase. In this paper, we characterize different universalit…
▽ More
Topological phase transitions can be described by the theory of critical phenomena and identified by critical exponents that define their universality classes. This is a consequence of the existence of a diverging length at the transition that has been identified as the penetration depth of the surface modes in the non-trivial topological phase. In this paper, we characterize different universality classes of topological transitions by determining their correlation length exponents directly from numerical calculations of the penetration length of the edge modes as a function of the distance to the topological transition. We consider generalizations of the topological non-trivial Su-Schrieefer-Heeger (SSH) model, for the case of next nearest neighbors hopping and in the presence of a synthetic potential. The latter allows the system to transit between two universality classes with different correlation length and dynamic critical exponents. It presents a multi-critical point in its phase diagram since the behavior of the Berry connection depends on the path it is approached. We compare our results with those obtained from a scaling approach to the Berry connection.
△ Less
Submitted 4 December, 2019; v1 submitted 29 July, 2019;
originally announced July 2019.
-
Cohn-Leavitt path algebras of bi-separated graphs
Authors:
Mohan. R,
B. N. Suhas
Abstract:
The purpose of this paper is to provide a common framework for studying various generalizations of Leavitt algebras and Leavitt path algebras. This paper consists of two parts. In part I we define Cohn-Leavitt path algebras of a new class of graphs with an additional structure called bi-separated graphs, which generalize the constructions of Leavitt path algebras of various types of graphs. We def…
▽ More
The purpose of this paper is to provide a common framework for studying various generalizations of Leavitt algebras and Leavitt path algebras. This paper consists of two parts. In part I we define Cohn-Leavitt path algebras of a new class of graphs with an additional structure called bi-separated graphs, which generalize the constructions of Leavitt path algebras of various types of graphs. We define and study the category \textbf{BSG} of bi-separated graphs with appropriate morphisms so that the functor which associates a bi-separated graph to its Cohn-Leavitt path algebra is continuous. We also characterize a full subcategory of \textbf{BSG} whose objects are direct limits of finite complete subobjects. We compute normal forms of these algebras and apply them to study some algebraic theoretic properties in terms of bi-separated graph-theoretic properties.
In part II we specialize our attention to Cohn-Leavitt path algebras of a special class of bi-separated graphs called B-hypergraphs. We investigate their non-stable K-theory and show that the lattice of order-ideals of V-monoids of these algebras is determined by bi-separated graph-theoretic data. Using this information we study representations of Leavitt path algebras of regular hypergraphs and also find a matrix criterion for Leavitt path algebras of finite hypergraphs to have IBN property.
△ Less
Submitted 31 December, 2019; v1 submitted 29 June, 2019;
originally announced July 2019.
-
Toward Millimeter Wave Joint Radar-Communications: A Signal Processing Perspective
Authors:
Kumar Vijay Mishra,
Bhavani Shankar M. R.,
Visa Koivunen,
Björn Ottersten,
Sergiy A. Vorobyov
Abstract:
Synergistic design of communications and radar systems with common spectral and hardware resources is heralding a new era of efficiently utilizing a limited radio-frequency spectrum. Such a joint radar-communications (JRC) model has advantages of low-cost, compact size, less power consumption, spectrum sharing, improved performance, and safety due to enhanced information sharing. Today, millimeter…
▽ More
Synergistic design of communications and radar systems with common spectral and hardware resources is heralding a new era of efficiently utilizing a limited radio-frequency spectrum. Such a joint radar-communications (JRC) model has advantages of low-cost, compact size, less power consumption, spectrum sharing, improved performance, and safety due to enhanced information sharing. Today, millimeter-wave (mm-wave) communications have emerged as the preferred technology for short distance wireless links because they provide transmission bandwidth that is several gigahertz wide. This band is also promising for short-range radar applications, which benefit from the high-range resolution arising from large transmit signal bandwidths. Signal processing techniques are critical in implementation of mmWave JRC systems. Major challenges are joint waveform design and performance criteria that would optimally trade-off between communications and radar functionalities. Novel multiple-input-multiple-output (MIMO) signal processing techniques are required because mmWave JRC systems employ large antenna arrays. There are opportunities to exploit recent advances in cognition, compressed sensing, and machine learning to reduce required resources and dynamically allocate them with low overheads. This article provides a signal processing perspective of mmWave JRC systems with an emphasis on waveform design.
△ Less
Submitted 18 May, 2019; v1 submitted 2 May, 2019;
originally announced May 2019.
-
Bosonic Dirac Materials on a honeycomb antiferromagnetic Ising model
Authors:
Griffith M. A. R.,
S. Rufo,
Minos A. Neto
Abstract:
Motivated by the recent proposal of Bosonic Dirac materials (BDM), we revisited the Ising model on a honeycomb lattice in the presence of the longitudinal and transverse fields. We apply linear spin-wave theory to obtain the magnon dispersion and its degenerated points. These special degenerated points emerge on the excitation spectrum as a function of the external fields and can be identified as…
▽ More
Motivated by the recent proposal of Bosonic Dirac materials (BDM), we revisited the Ising model on a honeycomb lattice in the presence of the longitudinal and transverse fields. We apply linear spin-wave theory to obtain the magnon dispersion and its degenerated points. These special degenerated points emerge on the excitation spectrum as a function of the external fields and can be identified as Bosonic Dirac Points (BDP). Since that, in the vicinity of these points the Magnons becomes massless with a linear energy spectrum as well as insensible in relation to weak impurity, exactly as it occurs with a Fermionic Dirac point. We also have calculated the quantum and thermal fluctuations over the ground state of the system using Effective Field Theory. Our results point out that this simple model can host Bosonic Dirac points and therefore is a suitable prototype to build a Bosonic Dirac material only controlled by external field.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
A Joint Solution for Scheduling and Precoding in Multiuser MISO Downlink Channels
Authors:
Ashok Bandi,
Bhavani Shankar Mysore R,
Symeon Chatzinotas,
Björn Ottersten
Abstract:
The long-term average performance of the MISO downlink channel, with a large number of users compared to transmit antennas of the BS, depends on the interference management which necessitates the joint design problem of scheduling and precoding. Unlike the previous works which do not offer a truly joint design, this paper focuses on formulating a problem amenable for the joint update of scheduling…
▽ More
The long-term average performance of the MISO downlink channel, with a large number of users compared to transmit antennas of the BS, depends on the interference management which necessitates the joint design problem of scheduling and precoding. Unlike the previous works which do not offer a truly joint design, this paper focuses on formulating a problem amenable for the joint update of scheduling and precoding. Novel optimization formulations are investigated to reveal the hidden difference of convex/ concave structure for three classical criteria (weighted sum rate, max-min SINR, and power minimization) and associated constraints are considered. Thereafter, we propose a convex-concave procedure framework based iterative algorithm where scheduling and precoding variables are updated jointly in each iteration. Finally, we show the superiority in performance of joint solution over the state-of-the-art designs through Monte-Carlo simulations.
△ Less
Submitted 13 February, 2019; v1 submitted 12 February, 2019;
originally announced February 2019.
-
Adaptive Artificial Intelligent Q&A Platform
Authors:
M. R,
Akram,
C. P,
Singhabahu,
M. S. M Saad,
P,
Deleepa,
Anupiya,
Nugaliyadde,
Yashas,
Mallawarachchi
Abstract:
The paper presents an approach to build a question and answer system that is capable of processing the information in a large dataset and allows the user to gain knowledge from this dataset by asking questions in natural language form. Key content of this research covers four dimensions which are; Corpus Preprocessing, Question Preprocessing, Deep Neural Network for Answer Extraction and Answer Ge…
▽ More
The paper presents an approach to build a question and answer system that is capable of processing the information in a large dataset and allows the user to gain knowledge from this dataset by asking questions in natural language form. Key content of this research covers four dimensions which are; Corpus Preprocessing, Question Preprocessing, Deep Neural Network for Answer Extraction and Answer Generation. The system is capable of understanding the question, responds to the user's query in natural language form as well. The goal is to make the user feel as if they were interacting with a person than a machine.
△ Less
Submitted 19 January, 2019;
originally announced February 2019.
-
A Wide Orbit Exoplanet OGLE-2012-BLG-0838Lb
Authors:
Poleski R.,
Suzuki D.,
Udalski A.,
Xie X.,
Yee J. C.,
Koshimoto N.,
Gaudi B. S.,
Gould A.,
Skowron J.,
Szymanski M. K.,
Soszynski I.,
Pietrukowicz P.,
Kozlowski S.,
Wyrzykowski L.,
Ulaczyk K.,
Abe F.,
Barry R. K.,
Bennett D. P.,
Bhattacharya A.,
Bond I. A.,
Donachie M.,
Fujii H.,
Fukui A.,
Itow Y.,
Hirao Y.
, et al. (26 additional authors not shown)
Abstract:
We present the discovery of a planet on a very wide orbit in the microlensing event OGLE-2012-BLG-0838. The signal of the planet is well separated from the main peak of the event and the planet-star projected separation is found to be twice larger than the Einstein ring radius, which roughly corresponds to a projected separation of ~4 AU. Similar planets around low-mass stars are very hard to find…
▽ More
We present the discovery of a planet on a very wide orbit in the microlensing event OGLE-2012-BLG-0838. The signal of the planet is well separated from the main peak of the event and the planet-star projected separation is found to be twice larger than the Einstein ring radius, which roughly corresponds to a projected separation of ~4 AU. Similar planets around low-mass stars are very hard to find using any technique other than microlensing. We discuss microlensing model fitting in detail and discuss the prospects for measuring the mass and distance of lens system directly.
△ Less
Submitted 17 November, 2021; v1 submitted 16 January, 2019;
originally announced January 2019.
-
RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Authors:
Mohammed Harun Babu R,
Vinayakumar R,
Soman KP
Abstract:
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Cl…
▽ More
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Classification. The best performing neural network architecture is chosen by conducting different chain of experiments for different network parameters and structures. The network is run up to 1000 epochs with learning rate set in the range of 0.01 to 0.5.Obviously, RNN performed very well when compared to classical machine learning algorithms. This is mainly possible because RNNs implicitly extracts the underlying features and also identifies the characteristics of the data. This helps to achieve better accuracy.
△ Less
Submitted 5 January, 2019;
originally announced January 2019.
-
Machine Learning on Difference Image Analysis: A comparison of methods for transient detection
Authors:
B. Sánchez,
M. J. Domínguez R.,
M. Lares,
M. Beroiz,
J. B. Cabral,
S. Gurovich,
C. Quiñones,
R. Artola,
C. Colazo,
M. Schneiter,
C. Girardini,
M. Tornatore,
J. L. Nilo Castellón,
D. García Lambas,
M. C. Díaz
Abstract:
We present a comparison of several Difference Image Analysis (DIA) techniques, in combination with Machine Learning (ML) algorithms, applied to the identification of optical transients associated with gravitational wave events. Each technique is assessed based on the scoring metrics of Precision, Recall, and their harmonic mean F1, measured on the DIA results as standalone techniques, and also in…
▽ More
We present a comparison of several Difference Image Analysis (DIA) techniques, in combination with Machine Learning (ML) algorithms, applied to the identification of optical transients associated with gravitational wave events. Each technique is assessed based on the scoring metrics of Precision, Recall, and their harmonic mean F1, measured on the DIA results as standalone techniques, and also in the results after the application of ML algorithms, on transient source injections over simulated and real data. This simulations cover a wide range of instrumental configurations, as well as a variety of scenarios of observation conditions, by exploring a multi dimensional set of relevant parameters, allowing us to extract general conclusions related to the identification of transient astrophysical events. The newest subtraction techniques, and particularly the methodology published in Zackay et al. (2016) are implemented in an Open Source Python package, named properimage, suitable for many other astronomical image analyses. This together with the ML libraries we describe, provides an effective transient detection software pipeline. Here we study the effects of the different ML techniques, and the relative feature importances for classification of transient candidates, and propose an optimal combined strategy. This constitutes the basic elements of pipelines that could be applied in searches of electromagnetic counterparts to GW sources.
△ Less
Submitted 8 August, 2019; v1 submitted 26 December, 2018;
originally announced December 2018.
-
A short review on Applications of Deep learning for Cyber security
Authors:
Mohammed Harun Babu R,
Vinayakumar R,
Soman KP
Abstract:
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works…
▽ More
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works related to deep learning based solutions for various cyber security use cases. Keywords: Deep learning, intrusion detection, malware detection, Android malware detection, spam & phishing detection, traffic analysis, binary analysis.
△ Less
Submitted 29 January, 2019; v1 submitted 15 December, 2018;
originally announced December 2018.
-
Multi-layer Pruning Framework for Compressing Single Shot MultiBox Detector
Authors:
Pravendra Singh,
Manikandan R,
Neeraj Matiyali,
Vinay P. Namboodiri
Abstract:
We propose a framework for compressing state-of-the-art Single Shot MultiBox Detector (SSD). The framework addresses compression in the following stages: Sparsity Induction, Filter Selection, and Filter Pruning. In the Sparsity Induction stage, the object detector model is sparsified via an improved global threshold. In Filter Selection & Pruning stage, we select and remove filters using sparsity…
▽ More
We propose a framework for compressing state-of-the-art Single Shot MultiBox Detector (SSD). The framework addresses compression in the following stages: Sparsity Induction, Filter Selection, and Filter Pruning. In the Sparsity Induction stage, the object detector model is sparsified via an improved global threshold. In Filter Selection & Pruning stage, we select and remove filters using sparsity statistics of filter weights in two consecutive convolutional layers. This results in the model with the size smaller than most existing compact architectures. We evaluate the performance of our framework with multiple datasets and compare over multiple methods. Experimental results show that our method achieves state-of-the-art compression of 6.7X and 4.9X on PASCAL VOC dataset on models SSD300 and SSD512 respectively. We further show that the method produces maximum compression of 26X with SSD512 on German Traffic Sign Detection Benchmark (GTSDB). Additionally, we also empirically show our method's adaptability for classification based architecture VGG16 on datasets CIFAR and German Traffic Sign Recognition Benchmark (GTSRB) achieving a compression rate of 125X and 200X with the reduction in flops by 90.50% and 96.6% respectively with no loss of accuracy. In addition to this, our method does not require any special libraries or hardware support for the resulting compressed models.
△ Less
Submitted 20 November, 2018;
originally announced November 2018.
-
Leavitt path algebras of weighted Cayley graphs $C_n(S,w)$
Authors:
Mohan. R
Abstract:
For a postive integer $n$ and a subset $S$ of $\mathbb{Z}_n$, let $\left\langle S\right\rangle =\mathbb{Z}_n$, and $w:S\rightarrow\mathbb{N}$ be a function. The weighted Cayley graph of the cyclic group $\mathbb{Z}_n$ with respect to $S$ and $w$ is denoted by $C_n(S,w)$. We give an explicit description of the Grothendieck group of the Leavitt path algebras of $C_n(S,w)$. We also give description o…
▽ More
For a postive integer $n$ and a subset $S$ of $\mathbb{Z}_n$, let $\left\langle S\right\rangle =\mathbb{Z}_n$, and $w:S\rightarrow\mathbb{N}$ be a function. The weighted Cayley graph of the cyclic group $\mathbb{Z}_n$ with respect to $S$ and $w$ is denoted by $C_n(S,w)$. We give an explicit description of the Grothendieck group of the Leavitt path algebras of $C_n(S,w)$. We also give description of Leavitt path algebras of $C_n(S,w)$ in some special cases.
△ Less
Submitted 31 December, 2019; v1 submitted 22 October, 2018;
originally announced October 2018.
-
Building a Word Segmenter for Sanskrit Overnight
Authors:
Vikas Reddy,
Amrith Krishna,
Vishnu Dutt Sharma,
Prateek Gupta,
Vineeth M R,
Pawan Goyal
Abstract:
There is an abundance of digitised texts available in Sanskrit. However, the word segmentation task in such texts are challenging due to the issue of 'Sandhi'. In Sandhi, words in a sentence often fuse together to form a single chunk of text, where the word delimiter vanishes and sounds at the word boundaries undergo transformations, which is also reflected in the written text. Here, we propose an…
▽ More
There is an abundance of digitised texts available in Sanskrit. However, the word segmentation task in such texts are challenging due to the issue of 'Sandhi'. In Sandhi, words in a sentence often fuse together to form a single chunk of text, where the word delimiter vanishes and sounds at the word boundaries undergo transformations, which is also reflected in the written text. Here, we propose an approach that uses a deep sequence to sequence (seq2seq) model that takes only the sandhied string as the input and predicts the unsandhied string. The state of the art models are linguistically involved and have external dependencies for the lexical and morphological analysis of the input. Our model can be trained "overnight" and be used for production. In spite of the knowledge lean approach, our system preforms better than the current state of the art by gaining a percentage increase of 16.79 % than the current state of the art.
△ Less
Submitted 16 February, 2018;
originally announced February 2018.
-
Half-lives of neutron-rich $^{128-130}$Cd
Authors:
Dunlop,
R.,
Bildstein,
V.,
Dillmann,
I.,
Jungclaus,
A.,
Svensson,
C. E.,
Andreoiu,
C.,
Ball,
G. C.,
Bernier,
N.,
Bidaman,
H.,
Boubel,
P.,
Burbadge,
C.,
Caballero-Folch,
R.,
Dunlop
, et al. (61 additional authors not shown)
Abstract:
The $β$-decay half-lives of $^{128\text{--}130}$Cd have been measured with the newly commissioned GRIFFIN $γ$-ray spectrometer at the TRIUMF-ISAC facility. The time structures of the most intense $γ$-rays emitted following the $β$-decay were used to determine the half-lives of $^{128}$Cd and $^{130}$Cd to be $T_{1/2}= 246.2(21)$ ms and $T_{1/2}= 126(4)$ ms, respectively. The half-lives of the 3/2…
▽ More
The $β$-decay half-lives of $^{128\text{--}130}$Cd have been measured with the newly commissioned GRIFFIN $γ$-ray spectrometer at the TRIUMF-ISAC facility. The time structures of the most intense $γ$-rays emitted following the $β$-decay were used to determine the half-lives of $^{128}$Cd and $^{130}$Cd to be $T_{1/2}= 246.2(21)$ ms and $T_{1/2}= 126(4)$ ms, respectively. The half-lives of the 3/2$^+$ and 11/2$^-$ states of $^{129}$Cd were measured to be $T_{1/2}(3/2^+)= 157(8)$ ms and $T_{1/2}(11/2^-)= 147(3)$ ms. The half-lives of the Cd isotopes around the $N=82$ shell closure are an important ingredient in astrophysical simulations to derive the magnitude of the second $r$-process abundance peak in the $A\sim130$ region. Our new results are compared with recent literature values and theoretical calculations.
△ Less
Submitted 15 November, 2017;
originally announced November 2017.
-
An asymptotic theory for the high-Reynolds-number flow past a shear-free circular cylinder
Authors:
Anuj Kumar,
Nidhil Mohamed A. R,
Pritam Giri,
Ratnesh K. Shukla
Abstract:
We present an asymptotic theory for analytical characterization of the high-Reynolds-number incompressible flow of a Newtonian fluid past a shear-free circular cylinder. The viscosity-induced modifications to this flow are localized and except in the neighborhood of the rear stagnation point, behave like a linear perturbation of the inviscid flow. Our theory gives a highly accurate description of…
▽ More
We present an asymptotic theory for analytical characterization of the high-Reynolds-number incompressible flow of a Newtonian fluid past a shear-free circular cylinder. The viscosity-induced modifications to this flow are localized and except in the neighborhood of the rear stagnation point, behave like a linear perturbation of the inviscid flow. Our theory gives a highly accurate description of these modifications by including the contribution from the most significant viscous term in a correctional perturbation expansion about an inviscid base state. We derive the boundary layer equation for the flow and deduce a similarity transformation that leads to a set of infinite, shear-free-condition-incompatible, self-similar solutions. By suitably combining members from this set, we construct an all-boundary-condition-compatible solution to the boundary layer equation. We derive the governing equation for vorticity transport through the narrow wake region and determine its closed-form solution. The near and far field forms of our wake solution are desirably consistent with the boundary layer solution and the well-known, self-similar planar wake solution, respectively. We analyze the flow in the rear stagnation region by formulating an elliptic partial integro-differential equation for the distortion streamfunction that specifically accounts for the fully nonlinear and inviscid dynamics of the viscous correctional terms. The drag force and its atypical logarithmic dependence on Reynolds number, deduced from our matched asymptotic analysis, are in remarkable agreement with the high-resolution simulation results. The logarithmic dependence gives rise to a critical Reynolds number below which the viscous correction term, counterintuitively, reduces the net dissipation in the flow field.
△ Less
Submitted 17 November, 2020; v1 submitted 12 November, 2017;
originally announced November 2017.
-
Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet
Authors:
Gunawan,
Imam Muslim R
Abstract:
Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along with the development of the Internet network infrastructure remotely control began to change using the internet. In this study using notebooks and servers Raspberry Pi to find o…
▽ More
Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along with the development of the Internet network infrastructure remotely control began to change using the internet. In this study using notebooks and servers Raspberry Pi to find out the quality control of each device server used. In this study we investigate the possibility of improving the quality of web-based remote control to implement Raspberry Pi as a web server and how much improvement the quality of web-based remote control obtained in this research.
△ Less
Submitted 1 October, 2017;
originally announced October 2017.
-
A Hot Companion to a Blue Straggler in NGC188 as Revealed by the Ultra-violet Imaging Telescope (UVIT) on ASTROSAT
Authors:
Subramaniam Annapurni,
Sindhu N.,
Tandon S. N.,
Rao N. Kameswara,
Postma J.,
Cot'e Patrick,
Hutchings J.,
Ghosh S. K.,
George K.,
Girish V.,
Mohan R.,
Murthy J.,
Sankarasubramanian K.,
Stalin C. S.,
Sutaria F.,
Mondal C.,
Sahu S.
Abstract:
We present early results from the Ultra-Violet Imaging Telescope (UVIT) onboard the ASTROSAT observatory. We report the discovery of a hot companion associated with one of the blue straggler stars (BSSs) in the old open cluster, NGC188. Using fluxes measured in four filters in UVIT's Far-UV (FUV) channel, and two filters in the near-UV (NUV) channel, we have constructed the spectral energy distrib…
▽ More
We present early results from the Ultra-Violet Imaging Telescope (UVIT) onboard the ASTROSAT observatory. We report the discovery of a hot companion associated with one of the blue straggler stars (BSSs) in the old open cluster, NGC188. Using fluxes measured in four filters in UVIT's Far-UV (FUV) channel, and two filters in the near-UV (NUV) channel, we have constructed the spectral energy distribution (SED) of the star WOCS-5885, after combining with flux measurements from GALEX, UIT, UVOT, SPITZER, WISE and several ground-based facilities. The resulting SED spans a wavelength range of 0.15~$μ$m to 7.8~$μ$m. This object is found to be one of the brightest FUV sources in the cluster. An analysis of the SED reveals the presence of two components. The cooler component is found to have a temperature of 6,000$\pm$150~K, confirming that it is a BSS. Assuming it to be a main-sequence star, we estimate its mass to be $\sim$ 1.1 - 1.2M$_\odot$. The hotter component, with an estimated temperature of 17,000$\pm$500~K, has a radius of $\sim$ 0.6R$_\odot$ and L $\sim$ 30L$_\odot$. Bigger and more luminous than a white dwarf, yet cooler than a sub-dwarf, we speculate that it is a post-AGB/HB star that has recently transferred its mass to the BSS, which is known to be a rapid rotator. This binary system, which is the first BSS with a post-AGB/HB companion identified in an open cluster, is an ideal laboratory to study the process of BSS formation via mass transfer.
△ Less
Submitted 8 December, 2016;
originally announced December 2016.
-
The MeSsI (Merging Systems Identification) Algorithm & Catalogue
Authors:
Martín de los Rios,
Mariano J. Domínguez R.,
Dante Paz,
Manuel Merchán
Abstract:
Merging galaxy systems provides observational evidence of the existence of dark matter and constraints on its properties. Therefore, statistical uniform samples of merging systems would be a powerful tool for several studies. In this work we presents a new methodology for merging systems identification and the results of its application to galaxy redshift surveys. We use as starting point a mock c…
▽ More
Merging galaxy systems provides observational evidence of the existence of dark matter and constraints on its properties. Therefore, statistical uniform samples of merging systems would be a powerful tool for several studies. In this work we presents a new methodology for merging systems identification and the results of its application to galaxy redshift surveys. We use as starting point a mock catalogue of galaxy systems, identified using traditional FoF algorithms, which experienced a major merger as indicated by its merger tree. Applying machine learning techniques in this training sample, and using several features computed from the observable properties of galaxy members, it is possible to select galaxy groups with a high probability of have been experienced a major merger. Next we apply clustering techniques on galaxy members in order to reconstruct the properties of the haloes involved in such merger. This methodology provides a highly reliable sample of merging systems with low contamination and precise recovered properties. We apply our techniques in samples of galaxy systems obtained from SDSS-DR7, WINGS and HeCS. Our results recover previously known merging systems and provide several new candidates. We present its measured properties and discuss future analysis on current and forthcoming samples.
△ Less
Submitted 31 December, 2015; v1 submitted 8 September, 2015;
originally announced September 2015.
-
Unscented Auxiliary Particle Filter Implementation of the Cardinalized Probability Hypothesis Density Filter
Authors:
Meysam R. Danaee
Abstract:
The probability hypothesis density (PHD) filter alleviates the computational expense of the optimal Bayesian multi-target filtering by approximating the intensity function of the random finite set (RFS) of targets in time. However, as a powerful decluttering algorithm, it suffers from lack of the precise estimation of the expected number of targets. The cardinalized PHD (CPHD) recursion, as a gene…
▽ More
The probability hypothesis density (PHD) filter alleviates the computational expense of the optimal Bayesian multi-target filtering by approximating the intensity function of the random finite set (RFS) of targets in time. However, as a powerful decluttering algorithm, it suffers from lack of the precise estimation of the expected number of targets. The cardinalized PHD (CPHD) recursion, as a generalization of the PHD recursion, is to remedy this flaw, which jointly propagates the intensity function and the posterior cardinality distribution. While there are a few new approaches to enhance the Sequential Monte Carlo (SMC) implementation of the PHD filter, current SMC implementation for the CPHD filter suffers from poor performance in terms of accuracy of estimate. In this paper, based on the unscented transform (UT), we propose an auxiliary implementation of the CPHD filter for highly nonlinear systems. To that end, we approximate the elementary symmetric functions both with the predicted and with the update estimate of the linear functional. We subsequently demonstrate via numerical simulations that our algorithms significantly out performs both the SMC-CPHD filter and the auxiliary particle implementation of the PHD filter in difficult situations with high clutter. We also compare our proposed algorithm with its counterparts in terms of other metrics, such as run times and sensitivity to new target appearance.
△ Less
Submitted 8 June, 2015;
originally announced June 2015.
-
ASTROMLSKIT: A New Statistical Machine Learning Toolkit: A Platform for Data Analytics in Astronomy
Authors:
Snehanshu Saha,
Surbhi Agrawal,
Manikandan. R,
Kakoli Bora,
Swati Routh,
Anand Narasimhamurthy
Abstract:
Astroinformatics is a new impact area in the world of astronomy, occasionally called the final frontier, where several astrophysicists, statisticians and computer scientists work together to tackle various data intensive astronomical problems. Exponential growth in the data volume and increased complexity of the data augments difficult questions to the existing challenges. Classical problems in As…
▽ More
Astroinformatics is a new impact area in the world of astronomy, occasionally called the final frontier, where several astrophysicists, statisticians and computer scientists work together to tackle various data intensive astronomical problems. Exponential growth in the data volume and increased complexity of the data augments difficult questions to the existing challenges. Classical problems in Astronomy are compounded by accumulation of astronomical volume of complex data, rendering the task of classification and interpretation incredibly laborious. The presence of noise in the data makes analysis and interpretation even more arduous. Machine learning algorithms and data analytic techniques provide the right platform for the challenges posed by these problems. A diverse range of open problem like star-galaxy separation, detection and classification of exoplanets, classification of supernovae is discussed. The focus of the paper is the applicability and efficacy of various machine learning algorithms like K Nearest Neighbor (KNN), random forest (RF), decision tree (DT), Support Vector Machine (SVM), Naïve Bayes and Linear Discriminant Analysis (LDA) in analysis and inference of the decision theoretic problems in Astronomy. The machine learning algorithms, integrated into ASTROMLSKIT, a toolkit developed in the course of the work, have been used to analyze HabCat data and supernovae data. Accuracy has been found to be appreciably good.
△ Less
Submitted 29 April, 2015;
originally announced April 2015.
-
A Digital-Receiver for the Murchison Widefield Array
Authors:
Thiagaraj Prabu,
K. S. Srivani,
D. Anish Roshi,
P. A. Kamini,
S. Madhavi,
David Emrich,
Brian Crosse,
Andrew J. Williams,
Mark Waterson,
Avinash A. Deshpande,
N. Udaya Shankar,
Ravi Subrahmanyan,
Frank H. Briggs,
Robert F. Goeke,
Steven J. Tingay,
Melanie Johnston-Hollitt,
Gopalakrishna M R,
Edward H. Morgan,
Joseph Pathikulangara,
John D. Bunton,
Grant Hampson,
Christopher Williams,
Stephen M. Ord,
Randall B. Wayth,
Deepak Kumar
, et al. (33 additional authors not shown)
Abstract:
An FPGA-based digital-receiver has been developed for a low-frequency imaging radio interferometer, the Murchison Widefield Array (MWA). The MWA, located at the Murchison Radio-astronomy Observatory (MRO) in Western Australia, consists of 128 dual-polarized aperture-array elements (tiles) operating between 80 and 300\,MHz, with a total processed bandwidth of 30.72 MHz for each polarization. Radio-…
▽ More
An FPGA-based digital-receiver has been developed for a low-frequency imaging radio interferometer, the Murchison Widefield Array (MWA). The MWA, located at the Murchison Radio-astronomy Observatory (MRO) in Western Australia, consists of 128 dual-polarized aperture-array elements (tiles) operating between 80 and 300\,MHz, with a total processed bandwidth of 30.72 MHz for each polarization. Radio-frequency signals from the tiles are amplified and band limited using analog signal conditioning units; sampled and channelized by digital-receivers. The signals from eight tiles are processed by a single digital-receiver, thus requiring 16 digital-receivers for the MWA. The main function of the digital-receivers is to digitize the broad-band signals from each tile, channelize them to form the sky-band, and transport it through optical fibers to a centrally located correlator for further processing. The digital-receiver firmware also implements functions to measure the signal power, perform power equalization across the band, detect interference-like events, and invoke diagnostic modes. The digital-receiver is controlled by high-level programs running on a single-board-computer. This paper presents the digital-receiver design, implementation, current status, and plans for future enhancements.
△ Less
Submitted 13 February, 2015;
originally announced February 2015.
-
Interference Mitigating Satellite Broadcast Receiver using Reduced Complexity List-Based Detection in Correlated Noise
Authors:
Zohair Abu-Shaban,
Hani Mehrpouyan,
Bhavani Shankar M. R.,
Bjorn Ottersten
Abstract:
The recent commercial trends towards using smaller dish antennas for satellite receivers, and the growing density of broadcasting satellites, necessitate the application of robust adjacent satellite interference (ASI) cancellation schemes. This orbital density growth along with the wider beamwidth of a smaller dish have imposed an overloaded scenario at the satellite receiver, where the number of…
▽ More
The recent commercial trends towards using smaller dish antennas for satellite receivers, and the growing density of broadcasting satellites, necessitate the application of robust adjacent satellite interference (ASI) cancellation schemes. This orbital density growth along with the wider beamwidth of a smaller dish have imposed an overloaded scenario at the satellite receiver, where the number of transmitting satellites exceeds the number of receiving elements at the dish antenna. To ensure successful operation in this practical scenario, we propose a satellite receiver that enhances signal detection from the desired satellite by mitigating the interference from neighboring satellites. Towards this objective, we propose a reduced complexity list-based group-wise search detection (RC-LGSD) receiver under the assumption of spatially correlated additive noise. To further enhance detection performance, the proposed satellite receiver utilizes a newly designed whitening filter to remove the spatial correlation amongst the noise parameters, while also applying a preprocessor that maximizes the signal-to-interference-plus-noise ratio (SINR). Extensive simulations under practical scenarios show that the proposed receiver enhances the performance of satellite broadcast systems in the presence of ASI compared to existing methods.
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
Enhanced List-Based Group-Wise Overloaded Receiver with Application to Satellite Reception
Authors:
Zohair Abu-Shaban,
Bhavani Shankar M. R,
Hani Mehrpouyan,
Bjorn Ottersten
Abstract:
The market trends towards the use of smaller dish antennas for TV satellite receivers, as well as the growing density of broadcasting satellites in orbit require the application of robust adjacent satellite interference (ASI) cancellation algorithms at the receivers. The wider beamwidth of a small size dish and the growing number of satellites in orbit impose an overloaded scenario, i.e., a scenar…
▽ More
The market trends towards the use of smaller dish antennas for TV satellite receivers, as well as the growing density of broadcasting satellites in orbit require the application of robust adjacent satellite interference (ASI) cancellation algorithms at the receivers. The wider beamwidth of a small size dish and the growing number of satellites in orbit impose an overloaded scenario, i.e., a scenario where the number of transmitting satellites exceeds the number of receiving antennas. For such a scenario, we present a two stage receiver to enhance signal detection from the satellite of interest, i.e., the satellite that the dish is pointing to, while reducing interference from neighboring satellites. Towards this objective, we propose an enhanced List-based Group-wise Search Detection (LGSD) receiver architecture that takes into account the spatially correlated additive noise and uses the signal-to-interference-plus noise ratio (SINR) maximization criterion to improve detection performance. Simulations show that the proposed receiver structure enhances the performance of satellite systems in the presence of ASI when compared to existing methods.
△ Less
Submitted 17 April, 2014;
originally announced April 2014.
-
A Survey on Mobile Data Gathering in Wireless Sensor Networks - Bounded Relay
Authors:
Ms. Rubia. R,
Mr. SivanArulSelvan
Abstract:
Most of the wireless sensor networks consist of static sensors, which can be deployed in a wide environment for monitoring applications. While transmitting the data from source to static sink, the amount of energy consumption of the sensor node is high. It results in reduced lifetime of the network.Some of the WSN architectures have been proposed based on Mobile Elements. There is large number of…
▽ More
Most of the wireless sensor networks consist of static sensors, which can be deployed in a wide environment for monitoring applications. While transmitting the data from source to static sink, the amount of energy consumption of the sensor node is high. It results in reduced lifetime of the network.Some of the WSN architectures have been proposed based on Mobile Elements. There is large number of approaches to resolve the above problem. It is found those two approaches, namely Single Hop Data Gathering problem (SHDGP) and mobile Data Gathering, which is used to increase the lifetime of the network. Single Hop Data Gathering Problem is used to achieve the uniform energy consumption. The mobile Data Gathering algorithm is used to find the minimal set of points in the sensor network, which serves as data gathering points for mobile network. Even after so many decades of research, there are some unresolved problems like non uniform energy consumption, increased latency, which needs to be resolved.
△ Less
Submitted 6 February, 2014;
originally announced February 2014.
-
A Survey on Delay-Aware Network Structure for Wireless Sensor Networks with Consecutive Data Collection Processes
Authors:
Ms. Aruna. G. R,
Mr. SivanArulSelvan
Abstract:
A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,etc. In sensing applications, data packets are flowing from sensor nodes to base station. In data collection processes, bottom up approach is used. In bottom up approach, all nodes send their sensed data packets to base station d…
▽ More
A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,etc. In sensing applications, data packets are flowing from sensor nodes to base station. In data collection processes, bottom up approach is used. In bottom up approach, all nodes send their sensed data packets to base station directly. In this approach will lead to increased delay, which will lead to higher energy consumption. To reduce the energy consumption of sensor nodes,Clustering Algorithm and Low-Energy Adaptive Clustering Hierarchy (LEACH) are being used. Efficient gathering in Wireless Sensor information systems, Power Efficient Gathering in Sensor Information System (PEGASIS) is being used. There are lot of research issues in Wireless Sensor Networks such as delay, lifetime of network, energy dissipation which needs to be resolved.
△ Less
Submitted 6 February, 2014;
originally announced February 2014.
-
The NIFFTE project
Authors:
Ruz J.,
Asner D. M.,
Baker R. G.,
Bundgaard J.,
Burgett E.,
Cunningham M.,
Deaven J.,
Duke D. L.,
Greife U.,
Grimes S.,
Heffner M.,
Hill T.,
Isenhower D.,
Klay J. L.,
Kleinrath V.,
Kornilov N.,
Laptev A. B.,
Loveland W.,
Masseyf T. N.,
Meharchand R.,
Qu H.,
Sangiorgio S.,
Seilhan B.,
Snyder L.,
Stave S.
, et al. (8 additional authors not shown)
Abstract:
The Neutron Induced Fission Fragment Tracking Experiment (NIFFTE) is a double-sided Time Projection Chamber (TPC) with micromegas readout designed to measure the energy-dependent neutron-induced fission cross sections of the major and minor actinides with unprecedented accuracy. The NIFFTE project addresses the challenge of minimizing major sources of systematic uncertainties from previous fission…
▽ More
The Neutron Induced Fission Fragment Tracking Experiment (NIFFTE) is a double-sided Time Projection Chamber (TPC) with micromegas readout designed to measure the energy-dependent neutron-induced fission cross sections of the major and minor actinides with unprecedented accuracy. The NIFFTE project addresses the challenge of minimizing major sources of systematic uncertainties from previous fission chamber measurements such as: target and beam non-uniformities, misidentification of alpha and light charged particles as fission fragments, and uncertainties inherent to the reference standards used. In-beam tests of the NIFFTE TPC at the Los Alamos Neutron Science Center (LANSCE) started in 2010 and have continued in 2011, 2012 and 2013. An overview of the NIFFTE TPC status and performance at LANSCE will be presented.
△ Less
Submitted 6 November, 2013; v1 submitted 30 September, 2013;
originally announced September 2013.
-
A New Approach in Understanding Growth and Decay of the Sunspots
Authors:
K. M. Hiremath,
Lovely,
M. R
Abstract:
From the previous study (Hiremath 2009b; Hiremath 2010), on the genesis of solar cycle and activity phenomena, it is understood that sunspots are formed at different depths by superposition of Alfven wave perturbations of a strong toroidal field structure in the convective envelope and after attaining a critical strength, due to buoyancy, raise toward the surface along the rotational isocontours t…
▽ More
From the previous study (Hiremath 2009b; Hiremath 2010), on the genesis of solar cycle and activity phenomena, it is understood that sunspots are formed at different depths by superposition of Alfven wave perturbations of a strong toroidal field structure in the convective envelope and after attaining a critical strength, due to buoyancy, raise toward the surface along the rotational isocontours that have positive (0.7-0.935 $R_{\odot}$) and negative (0.935-1.0 $R_{\odot}$) rotational gradients. Owing to physical conditions in these two rotational gradients, from the equation of magnetic induction, sunspot's area growth and decay problem is solved separately. It is found that rate of growth of sunspot's area during its evolution at different depths is function of steady and fluctuating parts of Lorentzian force of the ambient medium, fluctuations in meridional flow velocity, radial variation of rotational gradient and $cot(\vartheta)$ (where $\vartheta$ is co-latitude). While rate of decay of sunspot's area at different depths during its evolution mainly depends upon magnetic diffusivity, rotational gradient and $sin^{2}(\vartheta)$. Gist of this study is that growth and decay of area of the sunspot mainly depends upon whether sunspot is originated in the region of either positive or negative rotational gradient. For different latitudes and life spans of the sunspots on the surface during their evolutionary history, both the analytically derived theoretical area growth and decay curves match reasonably well with the observed area growth and decay curves.
△ Less
Submitted 28 December, 2010;
originally announced December 2010.
-
A Digital Guitar Tuner
Authors:
Mary Lourde R.,
Anjali Kuppayil Saji
Abstract:
The objective of this paper is to understand the critical parameters that need to be addressed while designing a guitar tuner. The focus of the design lies in developing a suitable algorithm to accurately detect the fundamental frequency of a plucked guitar string from its frequency spectrum. A userfriendly graphical interface is developed using Matlab to allow any user to easily tune his guitar…
▽ More
The objective of this paper is to understand the critical parameters that need to be addressed while designing a guitar tuner. The focus of the design lies in developing a suitable algorithm to accurately detect the fundamental frequency of a plucked guitar string from its frequency spectrum. A userfriendly graphical interface is developed using Matlab to allow any user to easily tune his guitar using the developed program.
△ Less
Submitted 4 December, 2009;
originally announced December 2009.
-
Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe
Authors:
Vipin M,
Mohamed Imran K R
Abstract:
In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared.…
▽ More
In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared. This proposed measurement scheme uses HTTP GET method for each connections. The normalized responses to identified sites like gateways of ISPs, google.com etc are used for calculating current link stability. The novelty of the approach is that historic values are used to calculate overall link stability. In this discussion, we also document a method to use the calculated values as a dynamic threshold metric. This is used in routing decisions and for load-balancing each of the connections in an aggregated bandwidth pipe. This scheme is a very popular practice in aggregated internet connections.
△ Less
Submitted 28 July, 2009;
originally announced July 2009.
-
About the Dirac Equation with a $δ$ potential
Authors:
R. Benguria,
H. Castillo,
M. Loewe
Abstract:
An elementary treatment of the Dirac Equation in the presence of a three-dimensional spherically symmetric $δ(r-r_0)$-potential is presented. We show how to handle the matching conditions in the configuration space, and discuss the occurrence of supercritical effects.
An elementary treatment of the Dirac Equation in the presence of a three-dimensional spherically symmetric $δ(r-r_0)$-potential is presented. We show how to handle the matching conditions in the configuration space, and discuss the occurrence of supercritical effects.
△ Less
Submitted 19 May, 2000; v1 submitted 13 March, 2000;
originally announced March 2000.
-
Discovery of a Very Low-Mass Binary with HST/NICMOS
Authors:
E. L. Martin,
G. Basri,
W. Brandner,
J. Bouvier,
Zapatero Osorio M. R.,
R. Rebolo,
J. Stauffer,
F. Allard,
I. Baraffe,
S. T. Hodgkin
Abstract:
Hubble Space Telescope NICMOS observations are presented of six brown dwarf candidates in the Pleiades open cluster. One of them, namely CFHT-Pl-18, is clearly resolved as a binary with an angular separation of 0".33. The very low density of contaminating background stars in our images and the photometry of the components support that this system is a physical binary rather than a chance project…
▽ More
Hubble Space Telescope NICMOS observations are presented of six brown dwarf candidates in the Pleiades open cluster. One of them, namely CFHT-Pl-18, is clearly resolved as a binary with an angular separation of 0".33. The very low density of contaminating background stars in our images and the photometry of the components support that this system is a physical binary rather than a chance projection. All the available photometric and spectroscopic data indicate that the CFHT-Pl-18 system is likely a member of the Pleiades cluster, but a final confirmation will have to wait until lithium can be detected. Assuming cluster membership, we compare our NICMOS photometry with evolutionary models, and find that the inclusion of the effects of dust grains is necessary for fitting the data. We estimate that the masses of the components are about 0.045 Msol and 0.035 Msol. The binary system has a projected separation of 42 AU (for a distance of 125 pc) that is common among stellar binaries.
△ Less
Submitted 23 October, 1998;
originally announced October 1998.