-
On H-Conformal Semi-invariant Submersion
Authors:
Punam Gupta,
Kirti Gupta
Abstract:
We explore h-conformal semi-invariant submersions and almost h-conformal semi-invariant submersions originating from quaternionic Kähler manifolds to Riemannian manifolds. Our investigation focuses on the geometric characteristics of these submersions, including the integrability of distributions and the geometry of foliations. Additionally, we establish the necessary and sufficient conditions for…
▽ More
We explore h-conformal semi-invariant submersions and almost h-conformal semi-invariant submersions originating from quaternionic Kähler manifolds to Riemannian manifolds. Our investigation focuses on the geometric characteristics of these submersions, including the integrability of distributions and the geometry of foliations. Additionally, we establish the necessary and sufficient conditions for such submersions to be totally geodesic. We also examine the equivalent conditions for the total manifold of the submersion to be twisted product manifold. Finally, we present a series of examples illustrating quaternionic Kähler manifolds and h-conformal semi-invariant submersions from quaternionic Kähler manifolds to Riemannian manifolds.
△ Less
Submitted 17 June, 2025;
originally announced June 2025.
-
A Quasi-Newton Method to Solve Uncertain Multiobjective Optimization Problems with Uncertainty Set of Finite Cardinality
Authors:
K. Gupta,
D. Ghosh,
C. Tammer,
X. Zhao,
J. C. Yao
Abstract:
In this article, we derive an iterative scheme through a quasi-Newton technique to capture robust weakly efficient points of uncertain multiobjective optimization problems under the upper set less relation. It is assumed that the set of uncertainty scenarios of the problems being analyzed is of finite cardinality. We also assume that corresponding to each given uncertain scenario from the uncertai…
▽ More
In this article, we derive an iterative scheme through a quasi-Newton technique to capture robust weakly efficient points of uncertain multiobjective optimization problems under the upper set less relation. It is assumed that the set of uncertainty scenarios of the problems being analyzed is of finite cardinality. We also assume that corresponding to each given uncertain scenario from the uncertainty set, the objective function of the problem is twice continuously differentiable. In the proposed iterative scheme, at any iterate, by applying the \emph{partition set} concept from set-valued optimization, we formulate an iterate-wise class of vector optimization problems to determine a descent direction. To evaluate this descent direction at the current iterate, we employ one iteration of the quasi-Newton scheme for vector optimization on the formulated class of vector optimization problems. As this class of vector optimization problems differs iterate-wise, the proposed quasi-Newton scheme is not a straight extension of the quasi-Newton method for vector optimization problems. Under commonly used assumptions, any limit point of a sequence generated by the proposed quasi-Newton technique is found to be a robust weakly efficient point of the problem. We analyze the well-definedness and global convergence of the proposed iterative scheme based on a regularity assumption on stationary points. Under the uniform continuity of the Hessian approximation function, we demonstrate a local superlinear convergence of the method. Finally, numerical examples are presented to demonstrate the effectiveness of the proposed method.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
Subdifferential of $\mathcal{B(H, H}^d)$ norm, and some approximation problems
Authors:
Priyanka Grover,
Krishna Kumar Gupta,
Susmita Seal
Abstract:
We present an expression for the right hand derivative and the subdifferential of the $\mathcal{B(H, H}^d)$ norm. For tuples of operators $\boldsymbol A, \boldsymbol X\in$ $\mathcal{B(H, H}^d)$, we give a characterization for $\boldsymbol 0$ to be a best approximation to the subspace $\mathbb C^d \boldsymbol X$. We give an upper bound for the quantity…
▽ More
We present an expression for the right hand derivative and the subdifferential of the $\mathcal{B(H, H}^d)$ norm. For tuples of operators $\boldsymbol A, \boldsymbol X\in$ $\mathcal{B(H, H}^d)$, we give a characterization for $\boldsymbol 0$ to be a best approximation to the subspace $\mathbb C^d \boldsymbol X$. We give an upper bound for the quantity $\mathrm{dist}(\boldsymbol A, \mathbb{C}^d \mathbf{I})^2-\sup\limits_{\|φ\|=1}$ $\mathrm{var}_φ(\boldsymbol A)$. We derive characterizations of $ε$-Birkhoff orthogonality using the subdifferential of the norm in this setting.
△ Less
Submitted 11 May, 2025;
originally announced May 2025.
-
Secure domination in $P_5$-free graphs
Authors:
Paras Vinubhai Maniya,
Uttam K. Gupta,
Michael A. Henning,
Dinabandhu Pradhan
Abstract:
A dominating set of a graph $G$ is a set $S \subseteq V(G)$ such that every vertex in $V(G) \setminus S$ has a neighbor in $S$, where two vertices are neighbors if they are adjacent. A secure dominating set of $G$ is a dominating set $S$ of $G$ with the additional property that for every vertex $v \in V(G) \setminus S$, there exists a neighbor $u$ of $v$ in $S$ such that…
▽ More
A dominating set of a graph $G$ is a set $S \subseteq V(G)$ such that every vertex in $V(G) \setminus S$ has a neighbor in $S$, where two vertices are neighbors if they are adjacent. A secure dominating set of $G$ is a dominating set $S$ of $G$ with the additional property that for every vertex $v \in V(G) \setminus S$, there exists a neighbor $u$ of $v$ in $S$ such that $(S \setminus \{u\}) \cup \{v\}$ is a dominating set of $G$. The secure domination number of $G$, denoted by $γ_s(G)$, is the minimum cardinality of a secure dominating set of $G$. We prove that if $G$ is a $P_5$-free graph, then $γ_s(G) \le \frac{3}{2}α(G)$, where $α(G)$ denotes the independence number of $G$. We further show that if $G$ is a connected $(P_5, H)$-free graph for some $H \in \{ P_3 \cup P_1, K_2 \cup 2K_1, ~\text{paw},~ C_4\}$, then $γ_s(G)\le \max\{3,α(G)\}$. We also show that if $G$ is a $(P_3 \cup P_2)$-free graph, then $γ_s(G)\le α(G)+1$.
△ Less
Submitted 11 March, 2025;
originally announced March 2025.
-
Momentum-based minimization of the Ginzburg-Landau functional on Euclidean spaces and graphs
Authors:
Oluwatosin Akande,
Patrick Dondl,
Kanan Gupta,
Akwum Onwunta,
Stephan Wojtowytsch
Abstract:
We study the momentum-based minimization of a diffuse perimeter functional on Euclidean spaces and on graphs with applications to semi-supervised classification tasks in machine learning. While the gradient flow in the task at hand is a parabolic partial differential equation, the momentum method corresponds to a damped hyperbolic PDE, leading to qualitatively and quantitatively different trajecto…
▽ More
We study the momentum-based minimization of a diffuse perimeter functional on Euclidean spaces and on graphs with applications to semi-supervised classification tasks in machine learning. While the gradient flow in the task at hand is a parabolic partial differential equation, the momentum method corresponds to a damped hyperbolic PDE, leading to qualitatively and quantitatively different trajectories. Using a convex-concave splitting-based FISTA-type time discretization, we demonstrate empirically that momentum can lead to faster convergence if the time step size is large but not too large. With large time steps, the PDE analysis offers only limited insight into the geometric behavior of solutions and typical hyperbolic phenomena like loss of regularity are not be observed in sample simulations. We obtain the singular limit of the evolution equations as the length parameter of the phase fields tends to zero by formal expansions and numerically confirm its validity for circles in two dimensions. Our analysis is complemented by numerical experiments for planar curves, surfaces in three-dimensional space, and semi-supervised learning tasks on graphs.
△ Less
Submitted 24 June, 2025; v1 submitted 31 December, 2024;
originally announced January 2025.
-
Linking disks, spinning vortices and exponential networks of augmentation curves
Authors:
Kunal Gupta,
Pietro Longhi
Abstract:
We propose a mirror derivation of the quiver description of open topological strings known as the knots-quivers correspondence, based on enumerative invariants of augmentation curves encoded by exponential networks. Quivers are obtained by studying M2 branes wrapping holomorphic disks with Lagrangian boundary conditions on an M5 brane, through their identification with a distinguished sector of BP…
▽ More
We propose a mirror derivation of the quiver description of open topological strings known as the knots-quivers correspondence, based on enumerative invariants of augmentation curves encoded by exponential networks. Quivers are obtained by studying M2 branes wrapping holomorphic disks with Lagrangian boundary conditions on an M5 brane, through their identification with a distinguished sector of BPS kinky vortices in the 3d-3d dual QFT. Our proposal suggests that holomorphic disks with Lagrangian boundary conditions are mirror to calibrated 1-chains on the associated augmentation curve, whose intersections encode the linking of boundaries.
△ Less
Submitted 19 December, 2024;
originally announced December 2024.
-
On $L^1$-$L^2$ dichotomy for flat symmetric spaces
Authors:
Sanjeev Kumar Gupta,
Nico Spronk
Abstract:
For rank 1 flat symmetric spaces, continuous orbital measures admit absolutely continuous convolution squares, except for Cartan type AI. Hence $L^1$-$L^2$ dichotomy for these spaces holds true in parallel to the compact and non-compact rank 1 symmetric spaces. We also study $L^1$-$L^2$ dichotomy for flat symmetric spaces of ranks $p=2,3$ of type AIII, i.e.\ associated with…
▽ More
For rank 1 flat symmetric spaces, continuous orbital measures admit absolutely continuous convolution squares, except for Cartan type AI. Hence $L^1$-$L^2$ dichotomy for these spaces holds true in parallel to the compact and non-compact rank 1 symmetric spaces. We also study $L^1$-$L^2$ dichotomy for flat symmetric spaces of ranks $p=2,3$ of type AIII, i.e.\ associated with $SU(p,q)/S(U(p)\times U(q))$ where $q\geq p$. For continuous orbital measures given by regular points $L^1$-$L^2$ dichotomy holds. We study such measures given by certain singular points when $p=2$, and show that $L^1$-$L^2$ dichotomy fails. This is the first time such results are observed for any type of symmetric spaces of rank 2.
△ Less
Submitted 23 November, 2024;
originally announced November 2024.
-
Nesterov acceleration in benignly non-convex landscapes
Authors:
Kanan Gupta,
Stephan Wojtowytsch
Abstract:
While momentum-based optimization algorithms are commonly used in the notoriously non-convex optimization problems of deep learning, their analysis has historically been restricted to the convex and strongly convex setting. In this article, we partially close this gap between theory and practice and demonstrate that virtually identical guarantees can be obtained in optimization problems with a `be…
▽ More
While momentum-based optimization algorithms are commonly used in the notoriously non-convex optimization problems of deep learning, their analysis has historically been restricted to the convex and strongly convex setting. In this article, we partially close this gap between theory and practice and demonstrate that virtually identical guarantees can be obtained in optimization problems with a `benign' non-convexity. We show that these weaker geometric assumptions are well justified in overparametrized deep learning, at least locally. Variations of this result are obtained for a continuous time model of Nesterov's accelerated gradient descent algorithm (NAG), the classical discrete time version of NAG, and versions of NAG with stochastic gradient estimates with purely additive noise and with noise that exhibits both additive and multiplicative scaling.
△ Less
Submitted 12 May, 2025; v1 submitted 10 October, 2024;
originally announced October 2024.
-
Functional H_infity Filtering for Descriptor Systems with Monotone nonlinearities
Authors:
Rishabh Sharma,
Mahendra Kumar Gupta,
Nutan Kumar Tomar
Abstract:
This paper introduces a novel approach to design of functional H_\infty filters for a class of nonlinear descriptor systems subjected to disturbances. Departing from conventional assumptions regarding system regularity, we adopt a more inclusive approach by considering general descriptor systems that satisfy a rank condition on their coefficient matrices. Under this rank condition, we establish a…
▽ More
This paper introduces a novel approach to design of functional H_\infty filters for a class of nonlinear descriptor systems subjected to disturbances. Departing from conventional assumptions regarding system regularity, we adopt a more inclusive approach by considering general descriptor systems that satisfy a rank condition on their coefficient matrices. Under this rank condition, we establish a linear matrix inequality (LMI) as a sufficient criterion ensuring the stability of the error system and constraining the L 2 gain of the mapping from disturbances to errors to a predetermined level. The efficacy of the proposed approach is demonstrated through a practical example involving a simple constrained mechanical system.
△ Less
Submitted 9 September, 2024;
originally announced September 2024.
-
Simplicial degree $d$ self-maps on $n$-spheres
Authors:
Biplab Basak,
Raju Kumar Gupta,
Ayushi Trivedi
Abstract:
The degree of a map between orientable manifolds is a crucial concept in topology, providing deep insights into the structure and properties of the manifolds and the corresponding maps. This concept has been thoroughly investigated, particularly in the realm of simplicial maps between orientable triangulable spaces. In this paper, we concentrate on constructing simplicial degree $d$ self-maps on…
▽ More
The degree of a map between orientable manifolds is a crucial concept in topology, providing deep insights into the structure and properties of the manifolds and the corresponding maps. This concept has been thoroughly investigated, particularly in the realm of simplicial maps between orientable triangulable spaces. In this paper, we concentrate on constructing simplicial degree $d$ self-maps on $n$-spheres. We describe the construction of several such maps, demonstrating that for every $d \in \mathbb{Z} \setminus {0}$, there exists a degree $d$ simplicial map from a triangulated $n$-sphere with $3|d| + n - 1$ vertices to $\mathbb{S}^n_{n+2}$. Further, we prove that, for every $d \in \mathbb{Z} \setminus {0}$, there exists a simplicial map of degree $3 d$ from a triangulated $n$-sphere with $6|d| + n$ vertices, as well as a simplicial map of degree $3d+\frac{d}{|d|}$ from a triangulated $n$-sphere with $6|d|+n+3$ vertices, to $\mathbb{S}^{n}_{n+2}$. Furthermore, we show that for any $|k| \geq 2$ and $n \geq |k|$, a degree $k$ simplicial map exists from a triangulated $n$-sphere $K$ with $|k| + n + 3$ vertices to $\mathbb{S}^n_{n+2}$. We also prove that for $d = 2$ and 3, these constructions produce vertex-minimal degree $d$ self-maps of $n$-spheres. Additionally, for every $n \geq 2$, we construct a degree $n+1$ simplicial map from a triangulated $n$-sphere with $2n + 4$ vertices to $\mathbb{S}^{n}_{n+2}$. We also prove that this construction provides facet minimal degree $n+1$ self-maps of $n$-spheres.
△ Less
Submitted 1 September, 2024;
originally announced September 2024.
-
Average edge order of normal $3$-pseudomanifolds
Authors:
Biplab Basak,
Raju Kumar Gupta
Abstract:
In their work [10], Feng Luo and Richard Stong introduced the concept of the average edge order, denoted as $μ_0(K)$. They demonstrated that if $μ_0(K)\leq \frac{9}{2}$ for a closed $3$-manifold $K$, then $K$ must be a sphere. Building upon this foundation, Makoto Tamura extended similar results to $3$-manifolds with non-empty boundaries in [12,13]. In our present study, we extend these findings t…
▽ More
In their work [10], Feng Luo and Richard Stong introduced the concept of the average edge order, denoted as $μ_0(K)$. They demonstrated that if $μ_0(K)\leq \frac{9}{2}$ for a closed $3$-manifold $K$, then $K$ must be a sphere. Building upon this foundation, Makoto Tamura extended similar results to $3$-manifolds with non-empty boundaries in [12,13]. In our present study, we extend these findings to normal $3$-pseudomanifolds. Specifically, we establish that for a normal $3$-pseudomanifold $K$ with singularities, $μ_0(K)\geq\frac{30}{7}$. Moreover, equality holds if and only if $K$ is a one-vertex suspension of a triangulation of $\mathbb{RP}^2$ with seven vertices. Furthermore, we establish that when $\frac{30}{7}\leqμ_0(K)\leq\frac{9}{2}$, the $3$-pseudomanifold $K$ can be derived from some boundary complexes of $4$-simplices by a sequence of possible operations, including connected sums, bistellar $1$-moves, edge contractions, edge expansions, vertex folding, and edge folding.
△ Less
Submitted 8 May, 2025; v1 submitted 20 June, 2024;
originally announced June 2024.
-
On Naisargik Images of Varshamov-Tenengolts and Helberg Codes
Authors:
Kalp Pandya,
Devdeep Shetranjiwala,
Naisargi Savaliya,
Manish K. Gupta
Abstract:
The VT and Helberg codes, both in binary and non-binary forms, stand as elegant solutions for rectifying insertion and deletion errors. In this paper we consider the quaternary versions of these codes. It is well known that many optimal binary non-linear codes like Kerdock and Prepreta can be depicted as Gray images (isometry) of codes defined over $\mathbb{Z}_4$. Thus a natural question arises: C…
▽ More
The VT and Helberg codes, both in binary and non-binary forms, stand as elegant solutions for rectifying insertion and deletion errors. In this paper we consider the quaternary versions of these codes. It is well known that many optimal binary non-linear codes like Kerdock and Prepreta can be depicted as Gray images (isometry) of codes defined over $\mathbb{Z}_4$. Thus a natural question arises: Can we find similar maps between quaternary and binary spaces which gives interesting properties when applied to the VT and Helberg codes. We found several such maps called Naisargik (natural) maps and we study the images of quaternary VT and Helberg codes under these maps. Naisargik and inverse Naisargik images gives interesting error-correcting properties for VT and Helberg codes. If two Naisargik images of VT code generates an intersecting one deletion sphere, then the images holds the same weights. A quaternary Helberg code designed to correct $s$ deletions can effectively rectify $s+1$ deletion errors when considering its Naisargik image, and $s$-deletion correcting binary Helberg code can corrects $\lfloor\frac{s}{2}\rfloor$ errors with inverse Naisargik image.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
On the matching complexes of categorical product of path graphs
Authors:
Raju Kumar Gupta,
Sourav Sarkar,
Sagar S. Sawant,
Samir Shukla
Abstract:
The matching complex $\mathsf{M}(G)$ of a graph $G$ is a simplicial complex whose simplices are matchings in $G$. These complexes appears in various places and found applications in many areas of mathematics including; discrete geometry, representation theory, combinatorics, etc. In this article, we consider the matching complexes of categorical product $P_n \times P_m$ of path graphs $P_n$ and…
▽ More
The matching complex $\mathsf{M}(G)$ of a graph $G$ is a simplicial complex whose simplices are matchings in $G$. These complexes appears in various places and found applications in many areas of mathematics including; discrete geometry, representation theory, combinatorics, etc. In this article, we consider the matching complexes of categorical product $P_n \times P_m$ of path graphs $P_n$ and $P_m$. For $m = 1$, $P_n \times P_m$ is a discrete graph and therefore its matching complex is the void complex. For $m = 2$, $\mathsf{M}(P_n \times P_m)$ has been proved to be homotopy equivalent to a wedge of spheres by Kozlov. We show that for $n \geq 2$ and $3 \leq m \leq 5$, the matching complex of $P_n \times P_m$ is homotopy equivalent to a wedge of spheres. For $m =3$, we give a closed form formula for the number and dimension of spheres appearing in the wedge. Further, for $m \in \{4, 5\}$, we give minimum and maximum dimension of spheres appearing in the wedge in the homotopy type of $\mathsf{M}(P_n \times P_m)$.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Anticipating Tipping Points for Disordered Traffic: Critical Slowing Down on the Onset of Congestion
Authors:
Shankha Narayan Chattopadhyay,
Arvind Kumar Gupta
Abstract:
Regime shifts are quite common in complex systems like cell regulations, disease transmissions, ecosystems, marine ice instability, etc. Several statistical indicators known as early warning signals (EWS) have been theorized to anticipate these abrupt transitions in advance. These regime shifts happen because they cross some critical value of the parameter that influences the overall dynamics. Thi…
▽ More
Regime shifts are quite common in complex systems like cell regulations, disease transmissions, ecosystems, marine ice instability, etc. Several statistical indicators known as early warning signals (EWS) have been theorized to anticipate these abrupt transitions in advance. These regime shifts happen because they cross some critical value of the parameter that influences the overall dynamics. This critical threshold is known as tipping point. In the vicinity of a tipping point, perturbations gradually increases, and as a consequence, system-state extensively swing around the quasi-static attractor, and the local dynamics become progressively slow, which is known as critical slowing down (CSD). Because of this CSD, statistical measures known as early warning signals (EWS) such as variance and lag-1 autocorrelation increase. From the point of view of physics, a free flow can become congested when the mean car density crosses its tipping point. Recently, for lane-based traffic system using continuum model, study reveals that analysis of the generic EWSs serve as a good measure to predict upstream stop-and-go traffic jams. Now, we introduce EWSs to anticipate traffic jam for heterogeneous disordered traffic relevant for non-lane-based systems. We have analyzed a lattice hydrodynamic area occupancy model with passing and through numerical simulations, we have shown emergence of kink or chaotic jam. Also, we provided proper framework for prediction of traffic jams via different EWSs. From simulated data, we demonstrated that EWSs are sensitive as tipping is approached.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
On the Classification of Weierstrass Elliptic Curves over $\mathbb{Z}_n$
Authors:
Param Parekh,
Paavan Parekh,
Sourav Deb,
Manish K Gupta
Abstract:
The development of secure cryptographic protocols and the subsequent attack mechanisms have been placed in the literature with the utmost curiosity.
While sophisticated quantum attacks bring a concern to the classical cryptographic protocols present in the applications used in everyday life, the necessity of developing post-quantum protocols is felt primarily.
In post-quantum cryptography, ell…
▽ More
The development of secure cryptographic protocols and the subsequent attack mechanisms have been placed in the literature with the utmost curiosity.
While sophisticated quantum attacks bring a concern to the classical cryptographic protocols present in the applications used in everyday life, the necessity of developing post-quantum protocols is felt primarily.
In post-quantum cryptography, elliptic curve-base protocols are exciting to the researchers.
While the comprehensive study of elliptic curves over finite fields is well known, the extended study over finite rings is still missing.
In this work, we generalize the study of Weierstrass elliptic curves over finite ring $\mathbb{Z}_n$ through classification.
Several expressions to compute critical factors in studying elliptic curves are conferred.
An all-around computational classification on the Weierstrass elliptic curves over $\mathbb{Z}_n$ for rigorous understanding is also attached to this work.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
High Fidelity Fast Simulation of Human in the Loop Human in the Plant (HIL-HIP) Systems
Authors:
Ayan Banerjee,
Payal Kamboj,
Aranyak Maity,
Riya Sudhakar Salian,
Sandeep K. S. Gupta
Abstract:
Non-linearities in simulation arise from the time variance in wireless mobile networks when integrated with human in the loop, human in the plant (HIL-HIP) physical systems under dynamic contexts, leading to simulation slowdown. Time variance is handled by deriving a series of piece wise linear time invariant simulations (PLIS) in intervals, which are then concatenated in time domain. In this pape…
▽ More
Non-linearities in simulation arise from the time variance in wireless mobile networks when integrated with human in the loop, human in the plant (HIL-HIP) physical systems under dynamic contexts, leading to simulation slowdown. Time variance is handled by deriving a series of piece wise linear time invariant simulations (PLIS) in intervals, which are then concatenated in time domain. In this paper, we conduct a formal analysis of the impact of discretizing time-varying components in wireless network-controlled HIL-HIP systems on simulation accuracy and speedup, and evaluate trade-offs with reliable guarantees. We develop an accurate simulation framework for an artificial pancreas wireless network system that controls blood glucose in Type 1 Diabetes patients with time varying properties such as physiological changes associated with psychological stress and meal patterns. PLIS approach achieves accurate simulation with greater than 2.1 times speedup than a non-linear system simulation for the given dataset.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
Nesterov acceleration despite very noisy gradients
Authors:
Kanan Gupta,
Jonathan W. Siegel,
Stephan Wojtowytsch
Abstract:
We present a generalization of Nesterov's accelerated gradient descent algorithm. Our algorithm (AGNES) provably achieves acceleration for smooth convex and strongly convex minimization tasks with noisy gradient estimates if the noise intensity is proportional to the magnitude of the gradient at every point. Nesterov's method converges at an accelerated rate if the constant of proportionality is b…
▽ More
We present a generalization of Nesterov's accelerated gradient descent algorithm. Our algorithm (AGNES) provably achieves acceleration for smooth convex and strongly convex minimization tasks with noisy gradient estimates if the noise intensity is proportional to the magnitude of the gradient at every point. Nesterov's method converges at an accelerated rate if the constant of proportionality is below 1, while AGNES accommodates any signal-to-noise ratio. The noise model is motivated by applications in overparametrized machine learning. AGNES requires only two parameters in convex and three in strongly convex minimization tasks, improving on existing methods. We further provide clear geometric interpretations and heuristics for the choice of parameters.
△ Less
Submitted 31 October, 2024; v1 submitted 10 February, 2023;
originally announced February 2023.
-
Generalizations of Chainability and Compactness, and the Hypertopologies
Authors:
Ajit Kumar Gupta,
Saikat Mukherjee
Abstract:
We study two properties for subsets of a metric space. One of them is generalization of chainability, finite chainability, and Menger convexity for metric spaces; while the other is a generalization of compactness. We explore the basic results related to these two properties. Further, in the perspective of these properties, we explore relations among the Hausdorff, Vietoris, and locally finite hyp…
▽ More
We study two properties for subsets of a metric space. One of them is generalization of chainability, finite chainability, and Menger convexity for metric spaces; while the other is a generalization of compactness. We explore the basic results related to these two properties. Further, in the perspective of these properties, we explore relations among the Hausdorff, Vietoris, and locally finite hypertopologies.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
On Using Deep Learning Proxies as Forward Models in Deep Learning Problems
Authors:
Fatima Albreiki,
Nidhal Belayouni,
Deepak K. Gupta
Abstract:
Physics-based optimization problems are generally very time-consuming, especially due to the computational complexity associated with the forward model. Recent works have demonstrated that physics-modelling can be approximated with neural networks. However, there is always a certain degree of error associated with this learning, and we study this aspect in this paper. We demonstrate through experi…
▽ More
Physics-based optimization problems are generally very time-consuming, especially due to the computational complexity associated with the forward model. Recent works have demonstrated that physics-modelling can be approximated with neural networks. However, there is always a certain degree of error associated with this learning, and we study this aspect in this paper. We demonstrate through experiments on popular mathematical benchmarks, that neural network approximations (NN-proxies) of such functions when plugged into the optimization framework, can lead to erroneous results. In particular, we study the behavior of particle swarm optimization and genetic algorithm methods and analyze their stability when coupled with NN-proxies. The correctness of the approximate model depends on the extent of sampling conducted in the parameter space, and through numerical experiments, we demonstrate that caution needs to be taken when constructing this landscape with neural networks. Further, the NN-proxies are hard to train for higher dimensional functions, and we present our insights for 4D and 10D problems. The error is higher for such cases, and we demonstrate that it is sensitive to the choice of the sampling scheme used to build the NN-proxy. The code is available at https://github.com/Fa-ti-ma/NN-proxy-in-optimization.
△ Less
Submitted 15 January, 2023;
originally announced January 2023.
-
List recoloring of planar graphs
Authors:
L. Sunil Chandran,
Uttam K. Gupta,
Dinabandhu Pradhan
Abstract:
A list assignment $L$ of a graph $G$ is a function that assigns to every vertex $v$ of $G$ a set $L(v)$ of colors. A proper coloring $α$ of $G$ is called an $L$-coloring of $G$ if $α(v)\in L(v)$ for every $v\in V(G)$. For a list assignment $L$ of $G$, the $L$-recoloring graph $\mathcal{G}(G,L)$ of $G$ is a graph whose vertices correspond to the $L$-colorings of $G$ and two vertices of…
▽ More
A list assignment $L$ of a graph $G$ is a function that assigns to every vertex $v$ of $G$ a set $L(v)$ of colors. A proper coloring $α$ of $G$ is called an $L$-coloring of $G$ if $α(v)\in L(v)$ for every $v\in V(G)$. For a list assignment $L$ of $G$, the $L$-recoloring graph $\mathcal{G}(G,L)$ of $G$ is a graph whose vertices correspond to the $L$-colorings of $G$ and two vertices of $\mathcal{G}(G,L)$ are adjacent if their corresponding $L$-colorings differ at exactly one vertex of $G$. A $d$-face in a plane graph is a face of length $d$. Dvořák and Feghali conjectured for a planar graph $G$ and a list assignment $L$ of $G$, that: (i) If $|L(v)|\geq 10$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is $O(|V(G)|)$. (ii) If $G$ is triangle-free and $|L(v)|\geq 7$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is $O(|V(G)|)$. In a recent paper, Cranston (European J. Combin. (2022)) has proved (ii). In this paper, we prove the following results. Let $G$ be a plane graph and $L$ be a list assignment of $G$.
$\bullet$ If for every $3$-face of $G$, there are at most two $3$-faces adjacent to it and $|L(v)|\geq 10$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $190|V(G)|$.
$\bullet$ If for every $3$-face of $G$, there is at most one $3$-face adjacent to it and $|L(v)|\geq 9$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $13|V(G)|$.
$\bullet$ If the faces adjacent to any $3$-face have length at least $6$ and $|L(v)|\geq 7$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $242|V(G)|$. This result strengthens the Cranston's result on (ii).
△ Less
Submitted 29 November, 2022; v1 submitted 13 September, 2022;
originally announced September 2022.
-
Modules in which pure submodule is essential in a direct summand
Authors:
Kaushal Gupta,
Shiv Kumar,
Ashok Ji Gupta
Abstract:
In this paper, we study the class of modules have the property that every pure submodule is essential in a direct summand. These modules are termed as pure extending modules which is a proper generalisation of extending modules. Examples and counterexamples are given. We study some properties of pure extending modules and characterize regular ring, semisimple ring, local ring and PDS ring in terms…
▽ More
In this paper, we study the class of modules have the property that every pure submodule is essential in a direct summand. These modules are termed as pure extending modules which is a proper generalisation of extending modules. Examples and counterexamples are given. We study some properties of pure extending modules and characterize regular ring, semisimple ring, local ring and PDS ring in terms of pure extending modules.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
Computations and observations on congruence covering systems
Authors:
Raj Agrawal,
Prarthana Bhatia,
Kratik Gupta,
Powers Lamb,
Andrew Lott,
Alex Rice,
Christine Rose Ward
Abstract:
A $\textit{covering system}$ is a collection of integer congruences such that every integer satisfies at least one congruence in the collection. A covering system is called $\textit{distinct}$ if all of its moduli are distinct. An expansive literature has developed on covering systems since their introduction by Erdős. Here we provide a full classification of distinct covering systems with at most…
▽ More
A $\textit{covering system}$ is a collection of integer congruences such that every integer satisfies at least one congruence in the collection. A covering system is called $\textit{distinct}$ if all of its moduli are distinct. An expansive literature has developed on covering systems since their introduction by Erdős. Here we provide a full classification of distinct covering systems with at most ten moduli, which we group together based on two forms of equivalence. As a consequence, we determine the minimum cardinality of a distinct covering system with all moduli exceeding $2$, which is $11$.
△ Less
Submitted 22 August, 2023; v1 submitted 20 August, 2022;
originally announced August 2022.
-
On the Classification of Codes over Non-Unital Ring of Order 4
Authors:
Sourav Deb,
Isha Kikani,
Manish K Gupta
Abstract:
In the last 60 years coding theory has been studied a lot over finite fields $\mathbb{F}_q$ or commutative rings $\mathcal{R}$ with unity. Although in $1993$, a study on the classification of the rings (not necessarily commutative or ring with unity) of order $p^2$ had been presented, the construction of codes over non-commutative rings or non-commutative non-unital rings surfaced merely two years…
▽ More
In the last 60 years coding theory has been studied a lot over finite fields $\mathbb{F}_q$ or commutative rings $\mathcal{R}$ with unity. Although in $1993$, a study on the classification of the rings (not necessarily commutative or ring with unity) of order $p^2$ had been presented, the construction of codes over non-commutative rings or non-commutative non-unital rings surfaced merely two years ago. In this letter, we extend the diverse research on exploring the codes over the non-commutative and non-unital ring $E= \langle 2a=2b=0, a^2=a, b^2=b, ab=a, ba=b \rangle$ by presenting the classification of optimal and nice codes of length $n\leq7$ over $E$, along-with respective weight enumerators and complete weight enumerators.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
Lebesgue Number and Total Boundedness
Authors:
Ajit Kumar Gupta,
Saikat Mukherjee
Abstract:
A generalization of the Lebesgue number lemma is obtained. It is proved that, if each countably infinite locally finite open cover of a chainable metric space $X$ has a Lebesgue number, then $X$ is totally bounded. A property of metric spaces which is a generalization of connectedness and Menger convexity is introduced. It is observed that Atsujiness and compactness are equivalent for a metric spa…
▽ More
A generalization of the Lebesgue number lemma is obtained. It is proved that, if each countably infinite locally finite open cover of a chainable metric space $X$ has a Lebesgue number, then $X$ is totally bounded. A property of metric spaces which is a generalization of connectedness and Menger convexity is introduced. It is observed that Atsujiness and compactness are equivalent for a metric space with this introduced property as well as for a chainable metric space.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Induced Homeomorphism and Atsuji Hyperspaces
Authors:
Ajit Kumar Gupta,
Saikat Mukherjee
Abstract:
Given uniformly homeomorphic metric spaces $X$ and $Y$, it is proved that the hyperspaces $C(X)$ and $C(Y)$ are uniformly homeomorphic, where $C(X)$ denotes the collection of all nonempty closed subsets of $X$, and is endowed with Hausdorff distance. Gerald Beer has proved that the hyperspace $C(X)$ is Atsuji when $X$ is either compact or uniformly discrete. An Atsuji space is a generalization of…
▽ More
Given uniformly homeomorphic metric spaces $X$ and $Y$, it is proved that the hyperspaces $C(X)$ and $C(Y)$ are uniformly homeomorphic, where $C(X)$ denotes the collection of all nonempty closed subsets of $X$, and is endowed with Hausdorff distance. Gerald Beer has proved that the hyperspace $C(X)$ is Atsuji when $X$ is either compact or uniformly discrete. An Atsuji space is a generalization of compact metric spaces as well as of uniformly discrete spaces. In this article, we investigate the space $C(X)$ when $X$ is Atsuji, and a class of Atsuji subspaces of $C(X)$ is obtained. Using the obtained results, some fixed point results for continuous maps on Atsuji spaces are obtained.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
On Hypersurface of a Finsler space subjected to h-Matsumoto change
Authors:
M. K. Gupta,
Suman Sharma
Abstract:
Recently, we have studied the Finsler space with h-Matsumoto change and found Cartan connection for the transformed space [2]. In this paper, we have discussed certain geometrical properties of the hypersurface of a Finsler space for the h-Matsumoto change.
Recently, we have studied the Finsler space with h-Matsumoto change and found Cartan connection for the transformed space [2]. In this paper, we have discussed certain geometrical properties of the hypersurface of a Finsler space for the h-Matsumoto change.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
Cartan Connection for h-Matsumoto change
Authors:
M. K. Gupta,
Abha Sahu,
Suman Sharma
Abstract:
In the present paper, we have studied the Matsumoto change $\overline{L}(x,y)= \frac{L^{2}(x,y)}{L(x,y) - β(x,y)} $ with an \textsl{h-}vector $b_{i}(x,y)$. We have derived some fundamental tensors for this transformation. We have also obtained the necessary and sufficient condition for which the Cartan connection coefficients for both the spaces $F^{n}=(M^n,L)$ and…
▽ More
In the present paper, we have studied the Matsumoto change $\overline{L}(x,y)= \frac{L^{2}(x,y)}{L(x,y) - β(x,y)} $ with an \textsl{h-}vector $b_{i}(x,y)$. We have derived some fundamental tensors for this transformation. We have also obtained the necessary and sufficient condition for which the Cartan connection coefficients for both the spaces $F^{n}=(M^n,L)$ and $\overline{F}^{\,n}=(M^{n},\overline{L})$ are same.
△ Less
Submitted 14 April, 2022;
originally announced April 2022.
-
Developing solution algorithm for LR-type fully interval-valued intuitionistic fuzzy linear programming problems using lexicographic-ranking method
Authors:
Manisha Malik,
S. K. Gupta,
Manuel Arana-Jiménez
Abstract:
In this article, a new concept of LR-type interval-valued intuitionistic fuzzy numbers (LR-type IVIFN) has been introduced. The theory has also been enriched by demonstrating diagrammatic representations of LR-type IVIFNs and establishing arithmetic operations among these fuzzy numbers. The total order properties of lexicographic criteria have been used for ranking LR-type IVIFNs. Further, a linea…
▽ More
In this article, a new concept of LR-type interval-valued intuitionistic fuzzy numbers (LR-type IVIFN) has been introduced. The theory has also been enriched by demonstrating diagrammatic representations of LR-type IVIFNs and establishing arithmetic operations among these fuzzy numbers. The total order properties of lexicographic criteria have been used for ranking LR-type IVIFNs. Further, a linear programming problem having both equality as well as inequality type constraints with all the parameters as LR-type IVIFNs and unrestricted decision variables has been formulated. An algorithm to find a unique optimal solution to the problem using the lexicographic ranking method has been developed. In the proposed methodology, the given linear programming problem is converted to an equivalent mixed 0-1 lexicographic non-linear programming problem. Various theorems have been proved to show the equivalence of the proposed problem and its different constructions. The model formulation, algorithm and discussed results have not only developed a new idea but also generalized various well-known related works existing in the literature. A numerical problem has also been exemplified to show the steps involved in the approach. Finally, a practical application in production planning is framed, solved and analyzed to establish the applicability of the study.
△ Less
Submitted 18 January, 2023; v1 submitted 2 March, 2022;
originally announced March 2022.
-
A characterization of normal $3$-pseudomanifolds with $g_2\leq4$
Authors:
Biplab Basak,
Raju Kumar Gupta
Abstract:
We characterize normal $3$-pseudomanifolds with $g_2\leq4$. We know that if a $3$-pseudomanifold with $g_2\leq4$ does not have any singular vertices then it is a $3$-sphere. We first prove that a normal $3$-pseudomanifold with $g_2\leq4$ has at most two singular vertices. Then we prove that a normal $3$-pseudomanifold with $g_2 \leq 4$, which is not a $3$-sphere is obtained from some boundary of…
▽ More
We characterize normal $3$-pseudomanifolds with $g_2\leq4$. We know that if a $3$-pseudomanifold with $g_2\leq4$ does not have any singular vertices then it is a $3$-sphere. We first prove that a normal $3$-pseudomanifold with $g_2\leq4$ has at most two singular vertices. Then we prove that a normal $3$-pseudomanifold with $g_2 \leq 4$, which is not a $3$-sphere is obtained from some boundary of $4$-simplices by a sequence of operations connected sum, edge expansion and an edge folding. In addition, by using [17], we re-framed the characterization of normal $3$-pseudomanifolds with $g_2\leq 9$, when it has no singular vertices.
△ Less
Submitted 14 February, 2022;
originally announced February 2022.
-
A characterization of $g_2$-minimal normal 3-pseudomanifolds with at most four singularities
Authors:
Biplab Basak,
Raju Kumar Gupta,
Sourav Sarkar
Abstract:
Let $Δ$ be a $g_2$-minimal normal 3-pseudomanifold. A vertex in $Δ$ whose link is not a sphere is called a singular vertex. When $Δ$ contains at most two singular vertices, its combinatorial characterization is known [9]. In this article, we present a combinatorial characterization of such a $Δ$ when it has three singular vertices, including one $\mathbb{RP}^2$-singularity, or four singular vertic…
▽ More
Let $Δ$ be a $g_2$-minimal normal 3-pseudomanifold. A vertex in $Δ$ whose link is not a sphere is called a singular vertex. When $Δ$ contains at most two singular vertices, its combinatorial characterization is known [9]. In this article, we present a combinatorial characterization of such a $Δ$ when it has three singular vertices, including one $\mathbb{RP}^2$-singularity, or four singular vertices, including two $\mathbb{RP}^2$-singularities. In both cases, we prove that $Δ$ is obtained from a one-vertex suspension of a surface, and some boundary complexes of $4$-simplices by applying the combinatorial operations of types connected sums, vertex foldings, and edge foldings.
△ Less
Submitted 18 April, 2024; v1 submitted 14 February, 2022;
originally announced February 2022.
-
Cops and robber on subclasses of $P_5$-free graphs
Authors:
Uttam K. Gupta,
Suchismita Mishra,
Dinabandhu Pradhan
Abstract:
The game of cops and robber is a turn based vertex pursuit game played on a connected graph between a team of cops and a single robber. The cops and the robber move alternately along the edges of the graph. We say the team of cops win the game if a cop and the robber are at the same vertex of the graph. The minimum number of cops required to win in each component of a graph is called the cop numbe…
▽ More
The game of cops and robber is a turn based vertex pursuit game played on a connected graph between a team of cops and a single robber. The cops and the robber move alternately along the edges of the graph. We say the team of cops win the game if a cop and the robber are at the same vertex of the graph. The minimum number of cops required to win in each component of a graph is called the cop number of the graph. Sivaraman [Discrete Math. 342(2019), pp. 2306-2307] conjectured that for every $t\geq 5$, the cop number of a connected $P_t$-free graph is at most $t-3$, where $P_t$ denotes a path on $t$~vertices. Turcotte [Discrete Math. 345 (2022), pp. 112660] showed that the cop number of any $2K_2$-free graph is at most $2$, which was earlier conjectured by Sivaraman and Testa. Note that if a connected graph is $2K_2$-free, then it is also $P_5$-free. Liu showed that the cop number of a connected ($P_t$, $H$)-free graph is at most $t-3$, where $H$ is a cycle of length at most $t$ or a claw. So the conjecture of Sivaraman is true for ($P_5$, $H$)-free graphs, where $H$ is a cycle of length at most $5$ or a claw. In this paper, we show that the cop number of a connected ($P_5,H$)-free graph is at most $2$, where $H\in \{C_4$, $C_5$, diamond, paw, $K_4$, $2K_1\cup K_2$, $K_3\cup K_1$, $P_3\cup P_1\}$.
△ Less
Submitted 29 November, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Cyclic and Quasi-Cyclic DNA Codes
Authors:
Adel Alahmadi,
Alaa Altassan,
Amani Alyoubi,
Manish K. Gupta,
Hatoon Shoaib
Abstract:
In this paper, we discuss DNA codes that are cyclic or quasi-cyclic over $\Z_{4}+ω\Z_{4}$, where $ω^{2}=2+2ω$ along with methods to construct these with combinatorial constraints. We also generalize results obtained for the ring $\Z_{4}+ω\Z_{4}$, where $ω^{2}=2+2ω$, and some other rings to the sixteen rings $R_θ=\Z_{4}+ω\Z_{4}$, where $ω^{2}=θ\in \Z_{4}+ω\Z_{4}$, using the generalized Gau map and…
▽ More
In this paper, we discuss DNA codes that are cyclic or quasi-cyclic over $\Z_{4}+ω\Z_{4}$, where $ω^{2}=2+2ω$ along with methods to construct these with combinatorial constraints. We also generalize results obtained for the ring $\Z_{4}+ω\Z_{4}$, where $ω^{2}=2+2ω$, and some other rings to the sixteen rings $R_θ=\Z_{4}+ω\Z_{4}$, where $ω^{2}=θ\in \Z_{4}+ω\Z_{4}$, using the generalized Gau map and Gau distance in \cite{3}. We determine a relationship between the Gau distance and Hamming distance for linear codes over the sixteen rings $R_θ$ which enables us to attain an upper boundary for the Gau distance of free codes that are self-dual over the rings $R_θ$.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
DNA Codes over the Ring $\mathbb{Z}_4 + w\mathbb{Z}_4$
Authors:
Adel Alahmadi,
Krishna Gopal Benerjee,
Sourav Deb,
Manish K Gupta
Abstract:
In this present work, we generalize the study of construction of DNA codes over the rings $\mathcal{R}_θ=\mathbb{Z}_4+w\mathbb{Z}_4$, $w^2 = θ$ for $θ\in \mathbb{Z}_4+w\mathbb{Z}_4$. Rigorous study along with characterization of the ring structures is presented. We extend the Gau map and Gau distance, defined in \cite{DKBG}, over all the $16$ rings $\mathcal{R}_θ$. Furthermore, an isometry between…
▽ More
In this present work, we generalize the study of construction of DNA codes over the rings $\mathcal{R}_θ=\mathbb{Z}_4+w\mathbb{Z}_4$, $w^2 = θ$ for $θ\in \mathbb{Z}_4+w\mathbb{Z}_4$. Rigorous study along with characterization of the ring structures is presented. We extend the Gau map and Gau distance, defined in \cite{DKBG}, over all the $16$ rings $\mathcal{R}_θ$. Furthermore, an isometry between the codes over the rings $\mathcal{R}_θ$ and the analogous DNA codes is established in general. Brief study of dual and self dual codes over the rings is given including the construction of special class of self dual codes that satisfy reverse and reverse-complement constraints. The technical contributions of this paper are twofold. Considering the Generalized Gau distance, Sphere Packing-like bound, GV-like bound, Singleton like bound and Plotkin-like bound are established over the rings $\mathcal{R}_θ$. In addition to this, optimal class of codes are provided with respect to Singleton-like bound and Plotkin-like bound. Moreover, the construction of family of DNA codes is proposed that satisfies reverse and reverse-complement constraints using the Reed-Muller type codes over the rings $\mathcal{R}_θ$.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
A characterization of normal 3-pseudomanifolds with at most two singularities
Authors:
Biplab Basak,
Raju Kumar Gupta,
Sourav Sarkar
Abstract:
Characterizing face-number-related invariants of a given class of simplicial complexes has been a central topic in combinatorial topology. In this regard, one of the well-known invariants is $g_2$. Let $K$ be a normal $3$-pseudomanifold such that $g_2(K) \leq g_2(lk (v)) + 9$ for some vertex $v$ in $K$. Suppose either $K$ has only one singularity or $K$ has two singularities (at least) one of whic…
▽ More
Characterizing face-number-related invariants of a given class of simplicial complexes has been a central topic in combinatorial topology. In this regard, one of the well-known invariants is $g_2$. Let $K$ be a normal $3$-pseudomanifold such that $g_2(K) \leq g_2(lk (v)) + 9$ for some vertex $v$ in $K$. Suppose either $K$ has only one singularity or $K$ has two singularities (at least) one of which is an $\mathbb{RP}^2$-singularity. We prove that $K$ is obtained from some boundary complexes of $4$-simplices by a sequence of operations of types connected sums, bistellar $1$-moves, edge contractions, edge expansions, vertex foldings, and edge foldings. In case $K$ has one singularity, $|K|$ is a handlebody with its boundary coned off. Further, we prove that the above upper bound is sharp for such normal $3$-pseudomanifolds.
△ Less
Submitted 22 June, 2023; v1 submitted 8 April, 2021;
originally announced April 2021.
-
Impacts of Game-Theoretic Activation on Epidemic Spread over Dynamical Networks
Authors:
Ashish R. Hota,
Tanya Sneh,
Kavish Gupta
Abstract:
We investigate the evolution of epidemics over dynamical networks when nodes choose to interact with others in a selfish and decentralized manner. Specifically, we analyze the susceptible-asymptomatic-infected-recovered (SAIR) epidemic in the framework of activity-driven networks with heterogeneous node degrees and time-varying activation rates, and derive both individual and degree-based mean-fie…
▽ More
We investigate the evolution of epidemics over dynamical networks when nodes choose to interact with others in a selfish and decentralized manner. Specifically, we analyze the susceptible-asymptomatic-infected-recovered (SAIR) epidemic in the framework of activity-driven networks with heterogeneous node degrees and time-varying activation rates, and derive both individual and degree-based mean-field approximations of the exact state evolution. We then present a game-theoretic model where nodes choose their activation probabilities in a strategic manner using current state information as feedback, and characterize the quantal response equilibrium (QRE) of the proposed setting. We then consider the activity-driven susceptible-infected-susceptible (SIS) epidemic model, characterize equilibrium activation probabilities and analyze epidemic evolution in closed-loop. Our numerical results provide compelling insights into epidemic evolution under game-theoretic activation. Specifically, for the SAIR epidemic, we show that under suitable conditions, the epidemic can persist, as any decrease in infected proportion is counteracted by an increase in activity rates by the nodes. For the SIS epidemic, we show that in regimes where there is an endemic state, the infected proportion could be significantly smaller under game-theoretic activation if the loss upon infection is sufficiently high.
△ Less
Submitted 27 September, 2021; v1 submitted 1 November, 2020;
originally announced November 2020.
-
The smoothness of orbital measures on noncompact symmetric spaces
Authors:
Sanjiv Kumar Gupta,
Kathryn E. Hare
Abstract:
Let $G/K$ be an irreducible symmetric space where $G$ is a non-compact, connected Lie group and $K$ is a compact, connected subgroup. We use decay properties of the spherical functions to show that the convolution product of any $r=r(G/K)$ continuous orbital measures has its density function in $% L^{2}(G)$ and hence is an absolutely continuous measure with respect to Haar measure. The number $r$…
▽ More
Let $G/K$ be an irreducible symmetric space where $G$ is a non-compact, connected Lie group and $K$ is a compact, connected subgroup. We use decay properties of the spherical functions to show that the convolution product of any $r=r(G/K)$ continuous orbital measures has its density function in $% L^{2}(G)$ and hence is an absolutely continuous measure with respect to Haar measure. The number $r$ is approximately the rank of $G/K$. For the special case of the orbital measures, $ν_{a_{i}}$, supported on the double cosets $Ka_{i}K$ where $a_{i}$ belongs to the dense set of regular elements, we prove the sharp result that $ν_{a_{1}}\ast ν_{a_{2}}\in L^{2},$ except for the symmetric space of Cartan type $AI$ when the convolution of three orbital measures is needed (even though $ν_{a_{1}}\ast ν_{a_{2}}$ is absolutely continuous).
△ Less
Submitted 29 September, 2020;
originally announced September 2020.
-
Menger Convexity and Hausdorff Metric
Authors:
Ajit Kumar Gupta,
Saikat Mukherjee
Abstract:
Shimizu and Takahashi have shown that every decreasing sequence of nonempty, bounded, closed, convex subsets of a complete, uniformly Takahashi convex metric space has nonempty intersection. It is well known that the Menger convexity is a generalization of the Takahashi convexity. In this article, we acquire a nonempty intersection property, in terms of the Hausdorff metric, for Menger convex metr…
▽ More
Shimizu and Takahashi have shown that every decreasing sequence of nonempty, bounded, closed, convex subsets of a complete, uniformly Takahashi convex metric space has nonempty intersection. It is well known that the Menger convexity is a generalization of the Takahashi convexity. In this article, we acquire a nonempty intersection property, in terms of the Hausdorff metric, for Menger convex metric spaces, that also provides a class of reflexive Menger convex spaces. We introduce a generalization of $(α, β)-$generalized hybrid mapping, and using the obtained nonempty intersection property we derive the fixed point results for this generalized mapping defined on Menger convex spaces.
△ Less
Submitted 12 August, 2024; v1 submitted 26 September, 2019;
originally announced September 2019.
-
On Nonempty Intersection Properties in Metric Spaces
Authors:
Ajit K. Gupta,
Saikat Mukherjee
Abstract:
The classical Cantor's intersection theorem states that in a complete metric space $X$, intersection of every decreasing sequence of nonempty closed bounded subsets, with diameter approaches zero, has exactly one point. In this article, we deal with decreasing sequences $\{K_n\}$ of nonempty closed bounded subsets of a metric space $X$, for which the Hausdorff distance $H(K_n, K_{n+1})$ tends to…
▽ More
The classical Cantor's intersection theorem states that in a complete metric space $X$, intersection of every decreasing sequence of nonempty closed bounded subsets, with diameter approaches zero, has exactly one point. In this article, we deal with decreasing sequences $\{K_n\}$ of nonempty closed bounded subsets of a metric space $X$, for which the Hausdorff distance $H(K_n, K_{n+1})$ tends to $0$, as well as for which the excess of $K_n$ over $X\setminus K_n$ tends to $0$. We achieve nonempty intersection properties in metric spaces. The obtained results also provide partial generalizations of Cantor's theorem.
△ Less
Submitted 24 May, 2022; v1 submitted 16 September, 2019;
originally announced September 2019.
-
A unifying computations of Whittle's Index for Markovian bandits
Authors:
Urtzi Ayesta,
Manu K. Gupta,
Ina Maria Verloop
Abstract:
The multi-armed restless bandit framework allows to model a wide variety of decision-making problems in areas as diverse as industrial engineering, computer communication, operations research, financial engineering, communication networks etc. In a seminal work, Whittle developed a methodology to derive well-performing (Whittle's) index policies that are obtained by solving a relaxed version of th…
▽ More
The multi-armed restless bandit framework allows to model a wide variety of decision-making problems in areas as diverse as industrial engineering, computer communication, operations research, financial engineering, communication networks etc. In a seminal work, Whittle developed a methodology to derive well-performing (Whittle's) index policies that are obtained by solving a relaxed version of the original problem. However, the computation of Whittle's index itself is a difficult problem and hence researchers focused on calculating Whittle's index numerically or with a problem dependent approach.
In our main contribution we derive an analytical expression for Whittle's index for any Markovian bandit with both finite and infinite transition rates. We derive sufficient conditions for the optimal solution of the relaxed problem to be of threshold type, and obtain conditions for the bandit to be indexable, a property assuring the existence of Whittle's index. Our solution approach provides a unifying expression for Whittle's index, which we highlight by retrieving known indices from literature as particular cases. The applicability of finite rates is illustrated with the machine repairmen problem, and that of infinite rates by an example of communication networks where transmission rates react instantaneously to packet losses.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
The smoothness of convolutions of orbital measures on complex Grassmannian symmetric spaces
Authors:
Sanjiv Kumar Gupta,
Kathryn E. Hare
Abstract:
It is well known that if $G/K$ is any irreducible symmetric space and $μ_{a}$ is a continuous orbital measure supported on the double coset $KaK,$ then the convolution product, $μ_{a}^{k},$ is absolutely continuous for some suitably large $k\leq \dim G/K$. The minimal value of $k$ is known in some symmetric spaces and in the special case of groups or rank one symmetric spaces it has even been show…
▽ More
It is well known that if $G/K$ is any irreducible symmetric space and $μ_{a}$ is a continuous orbital measure supported on the double coset $KaK,$ then the convolution product, $μ_{a}^{k},$ is absolutely continuous for some suitably large $k\leq \dim G/K$. The minimal value of $k$ is known in some symmetric spaces and in the special case of groups or rank one symmetric spaces it has even been shown that $μ_{a}^{k}$ belongs to the smaller space $L^{2}$ for some $k$. Here we prove that this $L^{2}$ property holds for all the compact, complex Grassmanian symmetric spaces, $% SU(p+q)/S(U(p)\times U(q))$. Moreover, for the orbital measures at a dense set of points $a$, we prove that $μ_{a}^{2}\in L^{2}$ (or $μ_{a}^{3}\in L^{2}$ if $p=q$).
△ Less
Submitted 27 March, 2019;
originally announced March 2019.
-
On Conflict Free DNA Codes
Authors:
Krishna Gopal Benerjee,
Sourav Deb,
Manish K Gupta
Abstract:
DNA storage has emerged as an important area of research. The reliability of DNA storage system depends on designing the DNA strings (called DNA codes) that are sufficiently dissimilar. In this work, we introduce DNA codes that satisfy a special constraint. Each codeword of the DNA code has a specific property that any two consecutive sub-strings of the DNA codeword will not be the same (a general…
▽ More
DNA storage has emerged as an important area of research. The reliability of DNA storage system depends on designing the DNA strings (called DNA codes) that are sufficiently dissimilar. In this work, we introduce DNA codes that satisfy a special constraint. Each codeword of the DNA code has a specific property that any two consecutive sub-strings of the DNA codeword will not be the same (a generalization of homo-polymers constraint). This is in addition to the usual constraints such as Hamming, reverse, reverse-complement and $GC$-content. We believe that the new constraint will help further in reducing the errors during reading and writing data into the synthetic DNA strings. We also present a construction (based on a variant of stochastic local search algorithm) to calculate the size of the DNA codes with all the above constraints, which improves the lower bounds from the existing literature, for some specific cases. Moreover, a recursive isometric map between binary vectors and DNA strings is proposed. Using the map and the well known binary codes we obtain few classes of DNA codes with all the constraints including the property that the constructed DNA codewords are free from the hairpin-like secondary structures.
△ Less
Submitted 8 July, 2019; v1 submitted 12 February, 2019;
originally announced February 2019.
-
On a Conjecture for Dynamic Priority Queues and Nash Equilibrium for Quality of Service Sensitive Markets
Authors:
Manu K. Gupta,
N. Hemachandra
Abstract:
Many economic transactions, including those of online markets, have a time lag between the start and end times of transactions. Customers need to wait for completion of their transaction (order fulfillment) and hence are also interested in their waiting time as a Quality of Service (QoS) attribute. So, they factor this QoS in the demand they offer to the firm (service-provider) and some customers…
▽ More
Many economic transactions, including those of online markets, have a time lag between the start and end times of transactions. Customers need to wait for completion of their transaction (order fulfillment) and hence are also interested in their waiting time as a Quality of Service (QoS) attribute. So, they factor this QoS in the demand they offer to the firm (service-provider) and some customers (user-set) would be willing to pay for shorter waiting times. On the other hand, such waiting times depend on the demand user-set offers to the service-provider. We model the above economic-QoS strategic interaction between service-provider and user-set under a fairly generic scheduling framework as a non-cooperative constrained game. We use an existing joint pricing and scheduling model. An optimal solution to this joint pricing and scheduling problem was guaranteed by a finite step algorithm subject to a conjecture. We first settle this conjecture based on queuing and optimization arguments and discuss its implications on the above game. We show that a continuum of Nash equilibria (NE) exists and it can be computed easily using constrained best response dynamics. Revenue maximal NE is identified by above finite step algorithm. We illustrate how both players can benefit at such revenue maximal NE by identifying suitable operational decisions, i.e., by choosing an appropriate game along the theme of pricing and revenue management.
△ Less
Submitted 18 October, 2018;
originally announced October 2018.
-
Squashed Toric Manifolds and Higher Depth Mock Modular Forms
Authors:
Rajesh Kumar Gupta,
Sameer Murthy,
Caner Nazaroglu
Abstract:
Squashed toric sigma models are a class of sigma models whose target space is a toric manifold in which the torus fibration is squashed away from the fixed points so as to produce a neck-like region. The elliptic genera of squashed toric-Calabi-Yau manifolds are known to obey the modular transformation property of holomorphic Jacobi forms, but have an explicit non-holomorphic dependence on the mod…
▽ More
Squashed toric sigma models are a class of sigma models whose target space is a toric manifold in which the torus fibration is squashed away from the fixed points so as to produce a neck-like region. The elliptic genera of squashed toric-Calabi-Yau manifolds are known to obey the modular transformation property of holomorphic Jacobi forms, but have an explicit non-holomorphic dependence on the modular parameter. The elliptic genus of the simplest one-dimensional example is known to be a mixed mock Jacobi form, but the precise automorphic nature for the general case remained to be understood. We show that these elliptic genera fall precisely into a class of functions called higher-depth mock modular forms that have been formulated recently in terms of indefinite theta series. We also compute a generalization of the elliptic genera of these models corresponding to an additional set of charges corresponding to the toric symmetries. Finally we speculate on some relations of the elliptic genera of squashed toric models with the Vafa-Witten partition functions of $\mathcal{N}=4$ SYM theory on $\mathbb{CP}^2$.
△ Less
Submitted 5 February, 2019; v1 submitted 31 July, 2018;
originally announced August 2018.
-
On DNA Codes using the Ring Z4 + wZ4
Authors:
Dixita Limbachiya,
Krishna Gopal,
Bansari Rao,
Manish K. Gupta
Abstract:
In this work, we study the DNA codes from the ring R = Z4 + wZ4, where w^2 = 2+2w with 16 elements. We establish a one to one correspondence between the elements of the ring R and all the DNA codewords of length 2 by defining a distance-preserving Gau map phi. Using this map, we give several new classes of the DNA codes which satisfies reverse and reverse complement constraints. Some of the constr…
▽ More
In this work, we study the DNA codes from the ring R = Z4 + wZ4, where w^2 = 2+2w with 16 elements. We establish a one to one correspondence between the elements of the ring R and all the DNA codewords of length 2 by defining a distance-preserving Gau map phi. Using this map, we give several new classes of the DNA codes which satisfies reverse and reverse complement constraints. Some of the constructed DNA codes are optimal.
△ Less
Submitted 9 January, 2018; v1 submitted 20 November, 2017;
originally announced November 2017.
-
Transferring spherical multipliers on compact symmetric spaces
Authors:
Sanjiv K. Gupta,
Kathryn E. Hare
Abstract:
We prove a two-sided transference theorem between $L^{p}$ spherical multipliers on the compact symmetric space $U/K$ and $L^{p}$ multipliers on the vector space $i\mathfrak{p},$ where the Lie algebra of $U$ has Cartan decomposition $\mathfrak{k\oplus }i\mathfrak{p}$. This generalizes the classic theorem transference theorem of deLeeuw relating multipliers on $% L^{p}(\mathbb{T)}$ and…
▽ More
We prove a two-sided transference theorem between $L^{p}$ spherical multipliers on the compact symmetric space $U/K$ and $L^{p}$ multipliers on the vector space $i\mathfrak{p},$ where the Lie algebra of $U$ has Cartan decomposition $\mathfrak{k\oplus }i\mathfrak{p}$. This generalizes the classic theorem transference theorem of deLeeuw relating multipliers on $% L^{p}(\mathbb{T)}$ and $L^{p}(\mathbb{R)}$.
△ Less
Submitted 19 October, 2017;
originally announced October 2017.
-
Squashed toric sigma models and mock modular forms
Authors:
Rajesh Kumar Gupta,
Sameer Murthy
Abstract:
We study a class of two-dimensional N=(2,2) sigma models called squashed toric sigma models, using their Gauged Linear Sigma Models (GLSM) description. These models are obtained by gauging the global U(1) symmetries of toric GLSMs and introducing a set of corresponding compensator superfields. The geometry of the resulting vacuum manifold is a deformation of the corresponding toric manifold in whi…
▽ More
We study a class of two-dimensional N=(2,2) sigma models called squashed toric sigma models, using their Gauged Linear Sigma Models (GLSM) description. These models are obtained by gauging the global U(1) symmetries of toric GLSMs and introducing a set of corresponding compensator superfields. The geometry of the resulting vacuum manifold is a deformation of the corresponding toric manifold in which the torus fibration maintains a constant size in the interior of the manifold, thus producing a neck-like region. We compute the elliptic genus of these models, using localization, in the case when the unsquashed vacuum manifolds obey the Calabi-Yau condition. The elliptic genera have a non-holomorphic dependence on the modular parameter $τ$ coming from the continuum produced by the neck. In the simplest case corresponding to squashed $\mathbb{C}/\mathbb{Z}_{2}$ the elliptic genus is a mixed mock Jacobi form which coincides with the elliptic genus of the N=(2,2) SL(2,R)/U(1) cigar coset.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Nearly-optimal Robust Matrix Completion
Authors:
Yeshwanth Cherapanamjeri,
Kartik Gupta,
Prateek Jain
Abstract:
In this paper, we consider the problem of Robust Matrix Completion (RMC) where the goal is to recover a low-rank matrix by observing a small number of its entries out of which a few can be arbitrarily corrupted. We propose a simple projected gradient descent method to estimate the low-rank matrix that alternately performs a projected gradient descent step and cleans up a few of the corrupted entri…
▽ More
In this paper, we consider the problem of Robust Matrix Completion (RMC) where the goal is to recover a low-rank matrix by observing a small number of its entries out of which a few can be arbitrarily corrupted. We propose a simple projected gradient descent method to estimate the low-rank matrix that alternately performs a projected gradient descent step and cleans up a few of the corrupted entries using hard-thresholding. Our algorithm solves RMC using nearly optimal number of observations as well as nearly optimal number of corruptions. Our result also implies significant improvement over the existing time complexity bounds for the low-rank matrix completion problem. Finally, an application of our result to the robust PCA problem (low-rank+sparse matrix separation) leads to nearly linear time (in matrix dimensions) algorithm for the same; existing state-of-the-art methods require quadratic time. Our empirical results corroborate our theoretical results and show that even for moderate sized problems, our method for robust PCA is an an order of magnitude faster than the existing methods.
△ Less
Submitted 8 December, 2016; v1 submitted 23 June, 2016;
originally announced June 2016.
-
Hypersurface of a Finsler space subjected to an h-exponential change of metric
Authors:
M. K. Gupta,
Anil K. Gupta
Abstract:
Recently we have obtained the Cartan connection for the Finsler space whose metric is given by an exponential change with an h-vector. In this paper, we discuss certain geometric properties of a Finslerian hyperspace subjected to an h-exponential change of metric.
Recently we have obtained the Cartan connection for the Finsler space whose metric is given by an exponential change with an h-vector. In this paper, we discuss certain geometric properties of a Finslerian hyperspace subjected to an h-exponential change of metric.
△ Less
Submitted 31 March, 2016;
originally announced March 2016.
-
H-exponential change of Finsler metric
Authors:
M. K. Gupta,
Anil K. Gupta
Abstract:
In this paper, we studied a Finsler space whose metric is given by an h-exponential change and obtain the Cartan connection coefficients for the change. We also find the necessary and sufficient condition for an h-exponential change of Finsler metric to be projective.
In this paper, we studied a Finsler space whose metric is given by an h-exponential change and obtain the Cartan connection coefficients for the change. We also find the necessary and sufficient condition for an h-exponential change of Finsler metric to be projective.
△ Less
Submitted 17 March, 2016;
originally announced March 2016.
-
The absolute continuity of convolutions of orbital measures in symmetric spaces
Authors:
Sanjiv Kumar Gupta,
Kathryn E. Hare
Abstract:
We characterize the absolute continuity of convolution products of orbital measures on the classical, irreducible Riemannian symmetric spaces $G/K$ of Cartan type $III$, where $G$ is a non-compact, connected Lie group and $K$ is a compact, connected subgroup. By the orbital measures, we mean the uniform measures supported on the double cosets, $KzK,$ in $G$. The characterization can be expressed i…
▽ More
We characterize the absolute continuity of convolution products of orbital measures on the classical, irreducible Riemannian symmetric spaces $G/K$ of Cartan type $III$, where $G$ is a non-compact, connected Lie group and $K$ is a compact, connected subgroup. By the orbital measures, we mean the uniform measures supported on the double cosets, $KzK,$ in $G$. The characterization can be expressed in terms of dimensions of eigenspaces or combinatorial properties of the annihilating roots of the elements $z$.
A consequence of our work is to show that the convolution product of any rank% $G/K,$ continuous, $K$-bi-invariant measures is absolutely continuous in any of these symmetric spaces, other than those whose restricted root system is type $A_{n}$ or $D_{3}$, when rank$G/K$ $+1$ is needed.
△ Less
Submitted 5 May, 2015;
originally announced May 2015.