-
Thermal state preparation of the SYK model using a variational quantum algorithm
Authors:
Jack Y. Araz,
Raghav G. Jha,
Felix Ringer,
Bharath Sambasivam
Abstract:
We study the preparation of thermal states of the dense and sparse Sachdev-Ye-Kitaev (SYK) model using a variational quantum algorithm for $6 \le N \le 12$ Majorana fermions over a wide range of temperatures. Utilizing IBM's 127-qubit quantum processor, we perform benchmark computations for the dense SYK model with $N = 6$, showing good agreement with exact results. The preparation of thermal stat…
▽ More
We study the preparation of thermal states of the dense and sparse Sachdev-Ye-Kitaev (SYK) model using a variational quantum algorithm for $6 \le N \le 12$ Majorana fermions over a wide range of temperatures. Utilizing IBM's 127-qubit quantum processor, we perform benchmark computations for the dense SYK model with $N = 6$, showing good agreement with exact results. The preparation of thermal states of a non-local random Hamiltonian with all-to-all coupling using the simulator and quantum hardware represents a significant step toward future computations of thermal out-of-time order correlators in quantum many-body systems.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
$SU(2)$ principal chiral model with tensor renormalization group on a cubic lattice
Authors:
Shinichiro Akiyama,
Raghav G. Jha,
Judah Unmuth-Yockey
Abstract:
We study the continuous phase transition and thermodynamic observables in the three-dimensional Euclidean $SU(2)$ principal chiral field model with the triad tensor renormalization group (tTRG) and the anisotropic tensor renormalization group (ATRG) methods. Using these methods, we find results that are consistent with previous Monte Carlo estimates and the predicted renormalization group scaling…
▽ More
We study the continuous phase transition and thermodynamic observables in the three-dimensional Euclidean $SU(2)$ principal chiral field model with the triad tensor renormalization group (tTRG) and the anisotropic tensor renormalization group (ATRG) methods. Using these methods, we find results that are consistent with previous Monte Carlo estimates and the predicted renormalization group scaling of the magnetization close to criticality. These results bring us one step closer to studying finite-density QCD in four dimensions using tensor network methods.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Reindex-Then-Adapt: Improving Large Language Models for Conversational Recommendation
Authors:
Zhankui He,
Zhouhang Xie,
Harald Steck,
Dawen Liang,
Rahul Jha,
Nathan Kallus,
Julian McAuley
Abstract:
Large language models (LLMs) are revolutionizing conversational recommender systems by adeptly indexing item content, understanding complex conversational contexts, and generating relevant item titles. However, controlling the distribution of recommended items remains a challenge. This leads to suboptimal performance due to the failure to capture rapidly changing data distributions, such as item p…
▽ More
Large language models (LLMs) are revolutionizing conversational recommender systems by adeptly indexing item content, understanding complex conversational contexts, and generating relevant item titles. However, controlling the distribution of recommended items remains a challenge. This leads to suboptimal performance due to the failure to capture rapidly changing data distributions, such as item popularity, on targeted conversational recommendation platforms. In conversational recommendation, LLMs recommend items by generating the titles (as multiple tokens) autoregressively, making it difficult to obtain and control the recommendations over all items. Thus, we propose a Reindex-Then-Adapt (RTA) framework, which converts multi-token item titles into single tokens within LLMs, and then adjusts the probability distributions over these single-token item titles accordingly. The RTA framework marries the benefits of both LLMs and traditional recommender systems (RecSys): understanding complex queries as LLMs do; while efficiently controlling the recommended item distributions in conversational recommendations as traditional RecSys do. Our framework demonstrates improved accuracy metrics across three different conversational recommendation datasets and two adaptation settings
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Aging Effects on Superconducting Properties of BiS2-Based Compounds: First-12-Year Restudy
Authors:
Poonam Rani,
Rajveer Jha,
V. P. S. Awana,
Yoshikazu Mizuguchi
Abstract:
Decomposition of superconductors sometimes becomes crucial when studying essential physical properties of the superconductors. For example, the cuprate superconductor YBa2Cu3O7-d decomposes by long-time air exposure. In this study, we investigate the aging effects on superconducting properties of BiS2-based superconductors Bi4O4S3 and LaO0.5F0.5BiS2, both were first synthesized in 2012, using thei…
▽ More
Decomposition of superconductors sometimes becomes crucial when studying essential physical properties of the superconductors. For example, the cuprate superconductor YBa2Cu3O7-d decomposes by long-time air exposure. In this study, we investigate the aging effects on superconducting properties of BiS2-based superconductors Bi4O4S3 and LaO0.5F0.5BiS2, both were first synthesized in 2012, using their polycrystalline samples synthesized several years ago. We find that 12-year-old Bi4O4S3 samples exhibit bulk superconductivity with a slight degradation of the superconducting transition temperature (Tc) of 0.2 K. For a high-pressure-synthesized LaO0.5F0.5BiS2 sample, clear decrease in Tc is observed, which suggests that high-pressure strain is reduced by aging.
△ Less
Submitted 25 June, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
Phase diagram of generalized XY model using tensor renormalization group
Authors:
Abhishek Samlodia,
Vamika Longia,
Raghav G. Jha,
Anosh Joseph
Abstract:
We use the higher-order tensor renormalization group method to study the two-dimensional generalized XY model that admits integer and half-integer vortices. This model is the deformation of the classical XY model and has a rich phase structure consisting of nematic, ferromagnetic, and disordered phases and three transition lines belonging to the Berezinskii-Kosterlitz-Thouless and Ising class. We…
▽ More
We use the higher-order tensor renormalization group method to study the two-dimensional generalized XY model that admits integer and half-integer vortices. This model is the deformation of the classical XY model and has a rich phase structure consisting of nematic, ferromagnetic, and disordered phases and three transition lines belonging to the Berezinskii-Kosterlitz-Thouless and Ising class. We explore the model for a wide range of temperatures, $T$, and the deformation parameter, $Δ$, and compute specific heat along with integer and half-integer magnetic susceptibility, finding both BKT-like and Ising-like transitions and the region where they meet.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Hamiltonian simulation of minimal holographic sparsified SYK model
Authors:
Raghav G. Jha
Abstract:
The circuit complexity for Hamiltonian simulation of the sparsified SYK model with $N$ Majorana fermions and $q=4$ (quartic interactions) which retains holographic features (referred to as `minimal holographic sparsified SYK') with $k\ll N^{3}/24$ (where $k$ is the total number of interaction terms times 1/$N$) using second-order Trotter method and Jordan-Wigner encoding is found to be…
▽ More
The circuit complexity for Hamiltonian simulation of the sparsified SYK model with $N$ Majorana fermions and $q=4$ (quartic interactions) which retains holographic features (referred to as `minimal holographic sparsified SYK') with $k\ll N^{3}/24$ (where $k$ is the total number of interaction terms times 1/$N$) using second-order Trotter method and Jordan-Wigner encoding is found to be $\widetilde{\mathcal{O}}(k^{p}N^{3/2} \log N (\mathcal{J}t)^{3/2}\varepsilon^{-1/2})$ where $t$ is the simulation time, $\varepsilon$ is the desired error in the implementation of the unitary $U = \exp(-iHt)$, $\mathcal{J}$ is the disorder strength, and $p < 1$. This complexity implies that with less than a hundred logical qubits and about $10^{6}$ gates, it will be possible to achieve an advantage in this model and simulate real-time dynamics up to scrambling time.
△ Less
Submitted 9 May, 2024; v1 submitted 23 April, 2024;
originally announced April 2024.
-
RanLayNet: A Dataset for Document Layout Detection used for Domain Adaptation and Generalization
Authors:
Avinash Anand,
Raj Jaiswal,
Mohit Gupta,
Siddhesh S Bangar,
Pijush Bhuyan,
Naman Lal,
Rajeev Singh,
Ritika Jha,
Rajiv Ratn Shah,
Shin'ichi Satoh
Abstract:
Large ground-truth datasets and recent advances in deep learning techniques have been useful for layout detection. However, because of the restricted layout diversity of these datasets, training on them requires a sizable number of annotated instances, which is both expensive and time-consuming. As a result, differences between the source and target domains may significantly impact how well these…
▽ More
Large ground-truth datasets and recent advances in deep learning techniques have been useful for layout detection. However, because of the restricted layout diversity of these datasets, training on them requires a sizable number of annotated instances, which is both expensive and time-consuming. As a result, differences between the source and target domains may significantly impact how well these models function. To solve this problem, domain adaptation approaches have been developed that use a small quantity of labeled data to adjust the model to the target domain. In this research, we introduced a synthetic document dataset called RanLayNet, enriched with automatically assigned labels denoting spatial positions, ranges, and types of layout elements. The primary aim of this endeavor is to develop a versatile dataset capable of training models with robustness and adaptability to diverse document formats. Through empirical experimentation, we demonstrate that a deep layout identification model trained on our dataset exhibits enhanced performance compared to a model trained solely on actual documents. Moreover, we conduct a comparative analysis by fine-tuning inference models using both PubLayNet and IIIT-AR-13K datasets on the Doclaynet dataset. Our findings emphasize that models enriched with our dataset are optimal for tasks such as achieving 0.398 and 0.588 mAP95 score in the scientific document domain for the TABLE class.
△ Less
Submitted 19 April, 2024; v1 submitted 15 April, 2024;
originally announced April 2024.
-
Krylov localization as a probe for ergodicity breaking
Authors:
Heiko Georg Menzler,
Rishabh Jha
Abstract:
Krylov complexity has recently gained attention where the growth of operator complexity in time is measured in terms of the off-diagonal operator Lanczos coefficients. The operator Lanczos algorithm reduces the problem of complexity growth to a single-particle semi-infinite tight-binding chain (known as the Krylov chain). Employing the phenomenon of Anderson localization, we propose the inverse lo…
▽ More
Krylov complexity has recently gained attention where the growth of operator complexity in time is measured in terms of the off-diagonal operator Lanczos coefficients. The operator Lanczos algorithm reduces the problem of complexity growth to a single-particle semi-infinite tight-binding chain (known as the Krylov chain). Employing the phenomenon of Anderson localization, we propose the inverse localization length on the Krylov chain as a probe to detect weak ergodicity-breaking. On the Krylov chain we find delocalization in an ergodic regime, as we show for the SYK model, and localization in case of a weakly ergodicity-broken regime. Considering the dynamics beyond scrambling, we find a collapse across different system sizes at the point of weak ergodicity-breaking leading to a quantitative prediction. We further show universal traits of different operators in the ergodic regime beyond the scrambling dynamics. We test for two settings: (1) the coupled SYK model, and (2) the quantum East model. Our findings open avenues for mapping ergodicity/weak ergodicity-breaking transitions to delocalization/localization phenomenology on the Krylov chain.
△ Less
Submitted 16 April, 2024; v1 submitted 21 March, 2024;
originally announced March 2024.
-
Large tunable kinetic inductance in a twisted graphene superconductor
Authors:
Rounak Jha,
Martin Endres,
Kenji Watanabe,
Takashi Taniguchi,
Mitali Banerjee,
Christian Schönenberger,
Paritosh Karnatak
Abstract:
Twisted graphene based moiré heterostructures host a flat band at the magic angles where the kinetic energy of the charge carriers is quenched and interaction effects dominate. This results in emergent phases such as superconductors and correlated insulators that are electrostatically tunable. We investigate superconductivity in twisted trilayer graphene (TTG) by integrating it as the weak link in…
▽ More
Twisted graphene based moiré heterostructures host a flat band at the magic angles where the kinetic energy of the charge carriers is quenched and interaction effects dominate. This results in emergent phases such as superconductors and correlated insulators that are electrostatically tunable. We investigate superconductivity in twisted trilayer graphene (TTG) by integrating it as the weak link in a superconducting quantum interference device (SQUID). The measured current phase relation (CPR) yields a large and tunable kinetic inductance, up to 150 nH per square, of the electron and hole type intrinsic superconductors. We further show that the specific kinetic inductance and the critical current density are universally related via the superconducting coherence length, and extract an upper bound of 200 nm for the coherence length. Our work opens avenues for using graphene-based superconductors as tunable elements in superconducting circuits.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Workspace Analysis for Laparoscopic Rectal Surgery : A Preliminary Study
Authors:
Alexandra Thomieres,
Dhruva Khanzode,
Emilie Duchalais,
Ranjan Jha,
Damien Chablat
Abstract:
The integration of medical imaging, computational analysis, and robotic technology has brought about a significant transformation in minimally invasive surgical procedures, particularly in the realm of laparoscopic rectal surgery (LRS). This specialized surgical technique, aimed at addressing rectal cancer, requires an in-depth comprehension of the spatial dynamics within the narrow space of the p…
▽ More
The integration of medical imaging, computational analysis, and robotic technology has brought about a significant transformation in minimally invasive surgical procedures, particularly in the realm of laparoscopic rectal surgery (LRS). This specialized surgical technique, aimed at addressing rectal cancer, requires an in-depth comprehension of the spatial dynamics within the narrow space of the pelvis. Leveraging Magnetic Resonance Imaging (MRI) scans as a foundational dataset, this study incorporates them into Computer-Aided Design (CAD) software to generate precise three-dimensional (3D) reconstructions of the patient's anatomy. At the core of this research is the analysis of the surgical workspace, a critical aspect in the optimization of robotic interventions. Sophisticated computational algorithms process MRI data within the CAD environment, meticulously calculating the dimensions and contours of the pelvic internal regions. The outcome is a nuanced understanding of both viable and restricted zones during LRS, taking into account factors such as curvature, diameter variations, and potential obstacles. This paper delves deeply into the complexities of workspace analysis for robotic LRS, illustrating the seamless collaboration between medical imaging, CAD software, and surgical robotics. Through this interdisciplinary approach, the study aims to surpass traditional surgical methodologies, offering novel insights for a paradigm shift in optimizing robotic interventions within the complex environment of the pelvis.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Estimating the key parameters of Nova V5668 SGR using the Uniform Slab Model
Authors:
Rain Jha,
Nishchal Dwivedi
Abstract:
Novae, explosive events in binary star systems involving a white dwarf and a companion star, offer profound insights into extreme astrophysical conditions. During the eruption of a nova, material accreted onto the white dwarf's surface undergoes a thermonuclear runaway reaction resulting in the ejection of matter into space and the formation of a luminous shell. The classical V5668 Sgr (Nova Sagit…
▽ More
Novae, explosive events in binary star systems involving a white dwarf and a companion star, offer profound insights into extreme astrophysical conditions. During the eruption of a nova, material accreted onto the white dwarf's surface undergoes a thermonuclear runaway reaction resulting in the ejection of matter into space and the formation of a luminous shell. The classical V5668 Sgr (Nova Sagittarii) was the second and brighter of the two novae in the southern constellation of Sagittarius. It was discovered by John Seach of Chatsworth Island, Australia, on March 15, 2015. In this paper, drawing on data from Karl G. Jansky Very Large Array, the US-based radio astronomy observatory, on V5668 Sgr as well as from research that aggregates data from a range of sources including telescope archives, this study used the Uniform Slab Model and statistical techniques to plot the nova's light and frequency curves and estimate its ejected shell mass and the brightness temperature. These characteristics help us better understand the nova's formation and eruption. The paper presents the light curves in a machine-readable format and provides insight into the behaviour of ionised gas clouds.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Thermodynamics and dynamics of coupled complex SYK models
Authors:
Jan C. Louw,
Linda M. van Manen,
Rishabh Jha
Abstract:
It has been known that the large-$q$ complex SYK model falls under the same universality class as that of van der Waals (mean-field) and saturates the Maldacena-Shenker-Stanford bound, both features shared by various black holes. This makes the SYK model a useful tool in probing the fundamental nature of quantum chaos and holographic duality. This work establishes the robustness of this shared uni…
▽ More
It has been known that the large-$q$ complex SYK model falls under the same universality class as that of van der Waals (mean-field) and saturates the Maldacena-Shenker-Stanford bound, both features shared by various black holes. This makes the SYK model a useful tool in probing the fundamental nature of quantum chaos and holographic duality. This work establishes the robustness of this shared universality class and chaotic properties for SYK-like models by extending to a system of coupled large-$q$ complex SYK models of different orders. We provide a detailed derivation of thermodynamic properties, specifically the critical exponents for an observed phase transition, as well as dynamical properties, in particular the Lyapunov exponent, via the out-of-time correlator calculations. Our analysis reveals that, despite the introduction of an additional scaling parameter through interaction strength ratios, the system undergoes a continuous phase transition at low temperatures, similar to that of the single SYK model. The critical exponents align with the Landau-Ginzburg (mean-field) universality class, shared with van der Waals gases and various AdS black holes. Furthermore, we demonstrate that the coupled SYK system remains maximally chaotic in the large-$q$ limit at low temperatures, adhering to the Maldacena-Shenker-Stanford bound, a feature consistent with the single SYK model. These findings establish robustness and open avenues for broader inquiries into the universality and chaos in complex quantum systems. We provide a detailed outlook for future work by considering the ``very" low-temperature regime, where we discuss relations with the Hawking-Page phase transition observed in the holographic dual black holes. We present preliminary calculations and discuss the possible follow-ups that might be be taken to make the connection robust.
△ Less
Submitted 14 May, 2024; v1 submitted 22 December, 2023;
originally announced December 2023.
-
Tensor renormalization group study of 3D principal chiral model
Authors:
Shinichiro Akiyama,
Raghav G. Jha,
Judah Unmuth-Yockey
Abstract:
We study the three-dimensional $SU(2)$ principal chiral model (PCM) using different tensor renormalization group methods based on the triad and anisotropic decomposition of the tensor. The tensor network representation is formulated based on the character expansion of the Boltzmann weight. We compare the average action obtained using these two tensor network algorithms and confirm that the resulti…
▽ More
We study the three-dimensional $SU(2)$ principal chiral model (PCM) using different tensor renormalization group methods based on the triad and anisotropic decomposition of the tensor. The tensor network representation is formulated based on the character expansion of the Boltzmann weight. We compare the average action obtained using these two tensor network algorithms and confirm that the resulting critical coupling and exponent are comparable with the recent estimations from the Monte Carlo methods.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
Phase diagram of two-dimensional SU($N$) super-Yang--Mills theory with four supercharges
Authors:
Navdeep Singh Dhindsa,
Raghav G. Jha,
Anosh Joseph,
David Schaich
Abstract:
We non-perturbatively study two-dimensional SU($N$) supersymmetric Yang--Mills theory with four supercharges and large $12 \leq N \leq 20$. Although this theory has no known holographic dual, we conduct numerical investigations to check for features similar to the sixteen-supercharge theory, which has a well-defined gravity dual. We carry out lattice field theory calculations to determine the phas…
▽ More
We non-perturbatively study two-dimensional SU($N$) supersymmetric Yang--Mills theory with four supercharges and large $12 \leq N \leq 20$. Although this theory has no known holographic dual, we conduct numerical investigations to check for features similar to the sixteen-supercharge theory, which has a well-defined gravity dual. We carry out lattice field theory calculations to determine the phase diagram, observing a spatial deconfinement transition, similar to the maximally supersymmetric case. However, the transition does not continue to strong couplings, implying the absence of a holographic interpretation for this four-supercharge theory.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Sachdev-Ye-Kitaev model on a noisy quantum computer
Authors:
Muhammad Asaduzzaman,
Raghav G. Jha,
Bharath Sambasivam
Abstract:
We study the SYK model -- an important toy model for quantum gravity on IBM's superconducting qubit quantum computers. By using a graph-coloring algorithm to minimize the number of commuting clusters of terms in the qubitized Hamiltonian, we find the gate complexity of the time evolution using the first-order product formula for $N$ Majorana fermions is $\mathcal{O}(N^5 J^{2}t^2/ε)$ where $J$ is t…
▽ More
We study the SYK model -- an important toy model for quantum gravity on IBM's superconducting qubit quantum computers. By using a graph-coloring algorithm to minimize the number of commuting clusters of terms in the qubitized Hamiltonian, we find the gate complexity of the time evolution using the first-order product formula for $N$ Majorana fermions is $\mathcal{O}(N^5 J^{2}t^2/ε)$ where $J$ is the dimensionful coupling parameter, $t$ is the evolution time, and $ε$ is the desired precision. With this improved resource requirement, we perform the time evolution for $N=6, 8$ with maximum two-qubit circuit depth of 343. We perform different error mitigation schemes on the noisy hardware results and find good agreement with the exact diagonalization results on classical computers and noiseless simulators. In particular, we compute return probability after time $t$ and out-of-time order correlators (OTOC) which is a standard observable of quantifying the chaotic nature of quantum systems.
△ Less
Submitted 2 May, 2024; v1 submitted 29 November, 2023;
originally announced November 2023.
-
Label Poisoning is All You Need
Authors:
Rishi D. Jha,
Jonathan Hayase,
Sewoong Oh
Abstract:
In a backdoor attack, an adversary injects corrupted data into a model's training dataset in order to gain control over its predictions on images with a specific attacker-defined trigger. A typical corrupted training example requires altering both the image, by applying the trigger, and the label. Models trained on clean images, therefore, were considered safe from backdoor attacks. However, in so…
▽ More
In a backdoor attack, an adversary injects corrupted data into a model's training dataset in order to gain control over its predictions on images with a specific attacker-defined trigger. A typical corrupted training example requires altering both the image, by applying the trigger, and the label. Models trained on clean images, therefore, were considered safe from backdoor attacks. However, in some common machine learning scenarios, the training labels are provided by potentially malicious third-parties. This includes crowd-sourced annotation and knowledge distillation. We, hence, investigate a fundamental question: can we launch a successful backdoor attack by only corrupting labels? We introduce a novel approach to design label-only backdoor attacks, which we call FLIP, and demonstrate its strengths on three datasets (CIFAR-10, CIFAR-100, and Tiny-ImageNet) and four architectures (ResNet-32, ResNet-18, VGG-19, and Vision Transformer). With only 2% of CIFAR-10 labels corrupted, FLIP achieves a near-perfect attack success rate of 99.4% while suffering only a 1.8% drop in the clean test accuracy. Our approach builds upon the recent advances in trajectory matching, originally introduced for dataset distillation.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
Continuous variable quantum computation of the $O(3)$ model in 1+1 dimensions
Authors:
Raghav G. Jha,
Felix Ringer,
George Siopsis,
Shane Thompson
Abstract:
We formulate the $O(3)$ non-linear sigma model in 1+1 dimensions as a limit of a three-component scalar field theory restricted to the unit sphere in the large squeezing limit. This allows us to describe the model in terms of the continuous variable (CV) approach to quantum computing. We construct the ground state and excited states using the coupled-cluster Ansatz and find excellent agreement wit…
▽ More
We formulate the $O(3)$ non-linear sigma model in 1+1 dimensions as a limit of a three-component scalar field theory restricted to the unit sphere in the large squeezing limit. This allows us to describe the model in terms of the continuous variable (CV) approach to quantum computing. We construct the ground state and excited states using the coupled-cluster Ansatz and find excellent agreement with the exact diagonalization results for a small number of lattice sites. We then present the simulation protocol for the time evolution of the model using CV gates and obtain numerical results using a photonic quantum simulator. We expect that the methods developed in this work will be useful for exploring interesting dynamics for a wide class of sigma models and gauge theories, as well as for simulating scattering events on quantum hardware in the coming decades.
△ Less
Submitted 14 May, 2024; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Studying Accuracy of Machine Learning Models Trained on Lab Lifting Data in Solving Real-World Problems Using Wearable Sensors for Workplace Safety
Authors:
Joseph Bertrand,
Nick Griffey,
Ming-Lun Lu,
Rashmi Jha
Abstract:
Porting ML models trained on lab data to real-world situations has long been a challenge. This paper discusses porting a lab-trained lifting identification model to the real-world. With performance much lower than on training data, we explored causes of the failure and proposed four potential solutions to increase model performance
Porting ML models trained on lab data to real-world situations has long been a challenge. This paper discusses porting a lab-trained lifting identification model to the real-world. With performance much lower than on training data, we explored causes of the failure and proposed four potential solutions to increase model performance
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Linking Symptom Inventories using Semantic Textual Similarity
Authors:
Eamonn Kennedy,
Shashank Vadlamani,
Hannah M Lindsey,
Kelly S Peterson,
Kristen Dams OConnor,
Kenton Murray,
Ronak Agarwal,
Houshang H Amiri,
Raeda K Andersen,
Talin Babikian,
David A Baron,
Erin D Bigler,
Karen Caeyenberghs,
Lisa Delano-Wood,
Seth G Disner,
Ekaterina Dobryakova,
Blessen C Eapen,
Rachel M Edelstein,
Carrie Esopenko,
Helen M Genova,
Elbert Geuze,
Naomi J Goodrich-Hunsaker,
Jordan Grafman,
Asta K Haberg,
Cooper B Hodges
, et al. (57 additional authors not shown)
Abstract:
An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores…
▽ More
An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores across previously incongruous symptom inventories. We tested the ability of four pre-trained STS models to screen thousands of symptom description pairs for related content - a challenging task typically requiring expert panels. Models were tasked to predict symptom severity across four different inventories for 6,607 participants drawn from 16 international data sources. The STS approach achieved 74.8% accuracy across five tasks, outperforming other models tested. This work suggests that incorporating contextual, semantic information can assist expert decision-making processes, yielding gains for both general and disease-specific clinical assessment.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Adversarial Illusions in Multi-Modal Embeddings
Authors:
Tingwei Zhang,
Rishi Jha,
Eugene Bagdasaryan,
Vitaly Shmatikov
Abstract:
Multi-modal embeddings encode texts, images, thermal images, sounds, and videos into a single embedding space, aligning representations across different modalities (e.g., associate an image of a dog with a barking sound). In this paper, we show that multi-modal embeddings can be vulnerable to an attack we call "adversarial illusions." Given an image or a sound, an adversary can perturb it to make…
▽ More
Multi-modal embeddings encode texts, images, thermal images, sounds, and videos into a single embedding space, aligning representations across different modalities (e.g., associate an image of a dog with a barking sound). In this paper, we show that multi-modal embeddings can be vulnerable to an attack we call "adversarial illusions." Given an image or a sound, an adversary can perturb it to make its embedding close to an arbitrary, adversary-chosen input in another modality.
These attacks are cross-modal and targeted: the adversary can align any image or sound with any target of his choice. Adversarial illusions exploit proximity in the embedding space and are thus agnostic to downstream tasks and modalities, enabling a wholesale compromise of current and future tasks, as well as modalities not available to the adversary. Using ImageBind and AudioCLIP embeddings, we demonstrate how adversarially aligned inputs, generated without knowledge of specific downstream tasks, mislead image generation, text generation, zero-shot classification, and audio retrieval.
We investigate transferability of illusions across different embeddings and develop a black-box version of our method that we use to demonstrate the first adversarial alignment attack on Amazon's commercial, proprietary Titan embedding. Finally, we analyze countermeasures and evasion attacks.
△ Less
Submitted 16 June, 2024; v1 submitted 22 August, 2023;
originally announced August 2023.
-
Large Language Models as Zero-Shot Conversational Recommenders
Authors:
Zhankui He,
Zhouhang Xie,
Rahul Jha,
Harald Steck,
Dawen Liang,
Yesu Feng,
Bodhisattwa Prasad Majumder,
Nathan Kallus,
Julian McAuley
Abstract:
In this paper, we present empirical studies on conversational recommendation tasks using representative large language models in a zero-shot setting with three primary contributions. (1) Data: To gain insights into model behavior in "in-the-wild" conversational recommendation scenarios, we construct a new dataset of recommendation-related conversations by scraping a popular discussion website. Thi…
▽ More
In this paper, we present empirical studies on conversational recommendation tasks using representative large language models in a zero-shot setting with three primary contributions. (1) Data: To gain insights into model behavior in "in-the-wild" conversational recommendation scenarios, we construct a new dataset of recommendation-related conversations by scraping a popular discussion website. This is the largest public real-world conversational recommendation dataset to date. (2) Evaluation: On the new dataset and two existing conversational recommendation datasets, we observe that even without fine-tuning, large language models can outperform existing fine-tuned conversational recommendation models. (3) Analysis: We propose various probing tasks to investigate the mechanisms behind the remarkable performance of large language models in conversational recommendation. We analyze both the large language models' behaviors and the characteristics of the datasets, providing a holistic understanding of the models' effectiveness, limitations and suggesting directions for the design of future conversational recommenders
△ Less
Submitted 19 August, 2023;
originally announced August 2023.
-
Toward quantum computations of the $O(3)$ model using qumodes
Authors:
Raghav G. Jha,
Felix Ringer,
George Siopsis,
Shane Thompson
Abstract:
We express the discrete 1+1-dimensional $O(3)$ non-linear sigma model (NL$σ$M) in a form well-suited for the continuous variable approach to quantum computing. Within the Schwinger boson formulation, we need two qumodes (quantum-mechanical oscillators) at each lattice site. We envision that it might be possible to reach the scaling regime of this model and observe asymptotic freedom on near-term p…
▽ More
We express the discrete 1+1-dimensional $O(3)$ non-linear sigma model (NL$σ$M) in a form well-suited for the continuous variable approach to quantum computing. Within the Schwinger boson formulation, we need two qumodes (quantum-mechanical oscillators) at each lattice site. We envision that it might be possible to reach the scaling regime of this model and observe asymptotic freedom on near-term photonic quantum devices in the coming decade.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Evaluation of insulating behavior by Pb Substitution and Pressure-Induced Superconductivity in La2O2Bi3-xPb1+xS6
Authors:
Rajveer Jha,
Valenta Jarosla,
Naohito Tsujii,
Takashi Naka,
Takeshi Kawahata,
Chiduru Kawashima,
Hiroki Takahashi,
Takao Mori,
Yoshikazu Mizuguchi
Abstract:
We report synthesis, characterization, and physical properties of layered bismuth-sulfide compounds La2O2Bi3-xPb1+xS6. We synthesized a new La2O2Bi3PbS6 compound, whose crystal structure is similar to those of the La2O2Bi3AgS6 superconductor or La2O2Bi2Pb2S6 (insulator) with a four-layer-type conducting layer. The crystal structure of La2O2Bi3PbS6 is characterized in a tetragonal P4/nmm space grou…
▽ More
We report synthesis, characterization, and physical properties of layered bismuth-sulfide compounds La2O2Bi3-xPb1+xS6. We synthesized a new La2O2Bi3PbS6 compound, whose crystal structure is similar to those of the La2O2Bi3AgS6 superconductor or La2O2Bi2Pb2S6 (insulator) with a four-layer-type conducting layer. The crystal structure of La2O2Bi3PbS6 is characterized in a tetragonal P4/nmm space group, and the lattice parameters are a = 4.084(1) Å and c = 19.71(2) Å. The obtained La2O2Bi3PbS6 sample exhibits narrow gap semiconductor (metallic-like) transport behavior with an anomaly near the 160 K. A metallic-like to insulator transition has been observed through Pb substitution, with increasing x in La2O2Bi3-xPb1+xS6. Furthermore, we applied external pressure for x = 0 and observed pressure-induced superconductivity. The onset of superconductivity appeared at 0.93 GPa, and the highest transition temperature was 3.1 K at 2.21 GPa.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Validating polyp and instrument segmentation methods in colonoscopy through Medico 2020 and MedAI 2021 Challenges
Authors:
Debesh Jha,
Vanshali Sharma,
Debapriya Banik,
Debayan Bhattacharya,
Kaushiki Roy,
Steven A. Hicks,
Nikhil Kumar Tomar,
Vajira Thambawita,
Adrian Krenzer,
Ge-Peng Ji,
Sahadev Poudel,
George Batchkala,
Saruar Alam,
Awadelrahman M. A. Ahmed,
Quoc-Huy Trinh,
Zeshan Khan,
Tien-Phat Nguyen,
Shruti Shrestha,
Sabari Nathan,
Jeonghwan Gwak,
Ritika K. Jha,
Zheyuan Zhang,
Alexander Schlaefer,
Debotosh Bhattacharjee,
M. K. Bhuyan
, et al. (8 additional authors not shown)
Abstract:
Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has…
▽ More
Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has emerged as a promising solution to this challenge as it can assist endoscopists in detecting and classifying overlooked polyps and abnormalities in real time. In addition to the algorithm's accuracy, transparency and interpretability are crucial to explaining the whys and hows of the algorithm's prediction. Further, most algorithms are developed in private data, closed source, or proprietary software, and methods lack reproducibility. Therefore, to promote the development of efficient and transparent methods, we have organized the "Medico automatic polyp segmentation (Medico 2020)" and "MedAI: Transparency in Medical Image Segmentation (MedAI 2021)" competitions. We present a comprehensive summary and analyze each contribution, highlight the strength of the best-performing methods, and discuss the possibility of clinical translations of such methods into the clinic. For the transparency task, a multi-disciplinary team, including expert gastroenterologists, accessed each submission and evaluated the team based on open-source practices, failure case analysis, ablation studies, usability and understandability of evaluations to gain a deeper understanding of the models' credibility for clinical deployment. Through the comprehensive analysis of the challenge, we not only highlight the advancements in polyp and surgical instrument segmentation but also encourage qualitative evaluation for building more transparent and understandable AI-based colonoscopy systems.
△ Less
Submitted 6 May, 2024; v1 submitted 30 July, 2023;
originally announced July 2023.
-
Unified Embedding Based Personalized Retrieval in Etsy Search
Authors:
Rishikesh Jha,
Siddharth Subramaniyam,
Ethan Benjamin,
Thrivikrama Taula
Abstract:
Embedding-based neural retrieval is a prevalent approach to address the semantic gap problem which often arises in product search on tail queries. In contrast, popular queries typically lack context and have a broad intent where additional context from users historical interaction can be helpful. In this paper, we share our novel approach to address both: the semantic gap problem followed by an en…
▽ More
Embedding-based neural retrieval is a prevalent approach to address the semantic gap problem which often arises in product search on tail queries. In contrast, popular queries typically lack context and have a broad intent where additional context from users historical interaction can be helpful. In this paper, we share our novel approach to address both: the semantic gap problem followed by an end to end trained model for personalized semantic retrieval. We propose learning a unified embedding model incorporating graph, transformer and term-based embeddings end to end and share our design choices for optimal tradeoff between performance and efficiency. We share our learnings in feature engineering, hard negative sampling strategy, and application of transformer model, including a novel pre-training strategy and other tricks for improving search relevance and deploying such a model at industry scale. Our personalized retrieval model significantly improves the overall search experience, as measured by a 5.58% increase in search purchase rate and a 2.63% increase in site-wide conversion rate, aggregated across multiple A/B tests - on live traffic.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
GPU-Acceleration of Tensor Renormalization with PyTorch using CUDA
Authors:
Raghav G. Jha,
Abhishek Samlodia
Abstract:
We show that numerical computations based on tensor renormalization group (TRG) methods can be significantly accelerated with PyTorch on graphics processing units (GPUs) by leveraging NVIDIA's Compute Unified Device Architecture (CUDA). We find improvement in the runtime and its scaling with bond dimension for two-dimensional systems. Our results establish that the utilization of GPU resources is…
▽ More
We show that numerical computations based on tensor renormalization group (TRG) methods can be significantly accelerated with PyTorch on graphics processing units (GPUs) by leveraging NVIDIA's Compute Unified Device Architecture (CUDA). We find improvement in the runtime and its scaling with bond dimension for two-dimensional systems. Our results establish that the utilization of GPU resources is essential for future precision computations with TRG.
△ Less
Submitted 15 September, 2023; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Dynamics and Charge Fluctuations in Large-q Sachdev-Ye-Kitaev Lattices
Authors:
Rishabh Jha,
Jan C. Louw
Abstract:
It is known that the large-$q$ complex Sachdev-Ye-Kitaev (SYK) dot thermalizes instantaneously under rather general dynamical protocols. We consider a lattice of such dots coupled together, allowing for $r/2$ body hopping of particles between nearest neighbors. We develop a rather general analytical framework to study the dynamics to leading order in $1/q$ on such a lattice, allowing for arbitrary…
▽ More
It is known that the large-$q$ complex Sachdev-Ye-Kitaev (SYK) dot thermalizes instantaneously under rather general dynamical protocols. We consider a lattice of such dots coupled together, allowing for $r/2$ body hopping of particles between nearest neighbors. We develop a rather general analytical framework to study the dynamics to leading order in $1/q$ on such a lattice, allowing for arbitrary time dependent couplings, hence general dynamical protocols. We find that the physics of the diffusive case $r>2$ is effectively the same as the kinetic case $r=2$, assuming $r=\mathcal{O}(q^0)$. Remarkably, we find that the local charge densities $\mathcal{Q}_i$ form a closed set of equations. They however only show fluctuations of the order $\mathcal{O}(\mathcal{Q}_i/q)$, hence remaining constant in the limit $q\rightarrow \infty$. Despite this effective lack of charge dynamics, the dots do not in fact behave as isolated lattice sites which would thermalize instantaneously. Indeed, we show via a proof by contradiction that such instantaneously thermalize is not generally possible for a connected lattice. Importantly, the results are shown to be independent of the dimensionality of the lattice.
△ Less
Submitted 8 February, 2024; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Notes on Quantum Computation and Information
Authors:
Raghav G. Jha
Abstract:
We discuss fundamentals of quantum computing and information - quantum gates, circuits, algorithms, theorems, error correction, and provide collection of QISKIT programs and exercises for the interested reader.
We discuss fundamentals of quantum computing and information - quantum gates, circuits, algorithms, theorems, error correction, and provide collection of QISKIT programs and exercises for the interested reader.
△ Less
Submitted 7 August, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Tactile based Intelligence Touch Technology in IoT configured WCN in B5G/6G-A Survey
Authors:
Mantisha Gupta,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Touch enabled sensation and actuation is expected to be one of the most promising, straightforward and important uses of the next generation communication networks. In B5G/6G need for low latency, the infrastructure should be reconfigurable and intelligent to be able to work in real time and interoperable with the existing wireless network. It has a drastic impact on the society due to its high pr…
▽ More
Touch enabled sensation and actuation is expected to be one of the most promising, straightforward and important uses of the next generation communication networks. In B5G/6G need for low latency, the infrastructure should be reconfigurable and intelligent to be able to work in real time and interoperable with the existing wireless network. It has a drastic impact on the society due to its high precision, accuracy, reliability and efficiency and the ability to connect a user from far away or remote areas. Such a touch-enabled interaction is primarily concerned with the real time transmission of the tactile based haptic information over the internet, in addition to the usual audio, visual and data traffic, thus enabling a paradigm shift towards establishing a real time control and steering communication system. The existing system latency and overhead creates delays and limits the usability of the future applications. This study proposes an intelligent touch-enabled system for B5G/6G and IoT based wireless communication network that incorporates the AR/VR technologies. The tactile internet and network slicing serve as the backbone of the touch technology which incorporates intelligence from techniques such as AI/ML/DL. The survey introduces a layered and interfacing architecture complete with its E2E solution for the intelligent touch based wireless communication system. It is anticipated for the next generation system to provide numerous opportunities for various sectors utilizing AR/VR technology in robotics and healthcare facilities, all with the intention of helping in addressing severe problems faced by the society. Conclusively the article presents a few use cases concerning the deployment of touch infrastructure in automation and robotics as well as in intelligent healthcare systems, assisting in the diagnosis and treatment of the prevailing COVID-19 cases.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Plasmonic Dimers Enhanced Polarized Single Photon Coupled to Optical Nanowire
Authors:
Subrat Sahu,
Harsh Mishra,
Rajan Jha
Abstract:
We propose a system for guiding plasmon-enhanced polarized single photons into optical nanowire (ONW) guided modes. It is shown that spontaneous emission properties of quantum emitters (QEs) can be strongly enhanced in the presence of gold nanorod dimer (GNRD) leading to the emission of highly polarized and bright single photons. We have calculated that a high Purcell factor of 279, coupling effic…
▽ More
We propose a system for guiding plasmon-enhanced polarized single photons into optical nanowire (ONW) guided modes. It is shown that spontaneous emission properties of quantum emitters (QEs) can be strongly enhanced in the presence of gold nanorod dimer (GNRD) leading to the emission of highly polarized and bright single photons. We have calculated that a high Purcell factor of 279, coupling efficiency of 11 %, and degree of polarization (DOP) of single photons is estimated to be as high as 99.57% in the guided modes of ONW by suitably placing a QE on an optimized location of the GNRD system. This proposed hybrid quantum system can be in-line with fiber networks, opening the door for possible quantum information processing and quantum cryptography applications.
△ Less
Submitted 17 December, 2022;
originally announced December 2022.
-
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the comm…
▽ More
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Persuasion Strategies in Advertisements
Authors:
Yaman Kumar Singla,
Rajat Jha,
Arunim Gupta,
Milan Aggarwal,
Aditya Garg,
Tushar Malyan,
Ayush Bhardwaj,
Rajiv Ratn Shah,
Balaji Krishnamurthy,
Changyou Chen
Abstract:
Modeling what makes an advertisement persuasive, i.e., eliciting the desired response from consumer, is critical to the study of propaganda, social psychology, and marketing. Despite its importance, computational modeling of persuasion in computer vision is still in its infancy, primarily due to the lack of benchmark datasets that can provide persuasion-strategy labels associated with ads. Motivat…
▽ More
Modeling what makes an advertisement persuasive, i.e., eliciting the desired response from consumer, is critical to the study of propaganda, social psychology, and marketing. Despite its importance, computational modeling of persuasion in computer vision is still in its infancy, primarily due to the lack of benchmark datasets that can provide persuasion-strategy labels associated with ads. Motivated by persuasion literature in social psychology and marketing, we introduce an extensive vocabulary of persuasion strategies and build the first ad image corpus annotated with persuasion strategies. We then formulate the task of persuasion strategy prediction with multi-modal learning, where we design a multi-task attention fusion model that can leverage other ad-understanding tasks to predict persuasion strategies. Further, we conduct a real-world case study on 1600 advertising campaigns of 30 Fortune-500 companies where we use our model's predictions to analyze which strategies work with different demographics (age and gender). The dataset also provides image segmentation masks, which labels persuasion strategies in the corresponding ad images on the test split. We publicly release our code and dataset https://midas-research.github.io/persuasion-advertisements/.
△ Less
Submitted 6 May, 2023; v1 submitted 20 August, 2022;
originally announced August 2022.
-
Behavioral Model For Live Detection of Apps Based Attack
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid autho…
▽ More
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State In…
▽ More
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State Information). Depending on the achieved path loss based on the distance of the user from the BS, the user with the highest path loss is particularized for the attack. The formulation of AD divulges the increased susceptibilities of the secure network specifically for the selected legitimate user. The parameter of visibility defines the amount of AD present in the communication channel. Based on the enumerated attenuation created by the artificial dust, the parameter of secrecy rate is evaluated with varying distance of the user from the BS and the operating frequency. Furthermore, the proposed scheme of the HD attack is initiated by the intruder at the specified valid user. The strategy of the attack focuses on the continuous monitor of the uplink and attempts the spoofing attack on the downlink wherein the allocation of the resources takes place. The efficacy of the proposed approach is corroborated through the examination of simulation results. The assessment of the proposed mechanism highlights notable characteristics as compared to the conventional methodology of the FD (Full- Duplex) attack.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Hyper-Universal Policy Approximation: Learning to Generate Actions from a Single Image using Hypernets
Authors:
Dimitrios C. Gklezakos,
Rishi Jha,
Rajesh P. N. Rao
Abstract:
Inspired by Gibson's notion of object affordances in human vision, we ask the question: how can an agent learn to predict an entire action policy for a novel object or environment given only a single glimpse? To tackle this problem, we introduce the concept of Universal Policy Functions (UPFs) which are state-to-action mappings that generalize not only to new goals but most importantly to novel, u…
▽ More
Inspired by Gibson's notion of object affordances in human vision, we ask the question: how can an agent learn to predict an entire action policy for a novel object or environment given only a single glimpse? To tackle this problem, we introduce the concept of Universal Policy Functions (UPFs) which are state-to-action mappings that generalize not only to new goals but most importantly to novel, unseen environments. Specifically, we consider the problem of efficiently learning such policies for agents with limited computational and communication capacity, constraints that are frequently encountered in edge devices. We propose the Hyper-Universal Policy Approximator (HUPA), a hypernetwork-based model to generate small task- and environment-conditional policy networks from a single image, with good generalization properties. Our results show that HUPAs significantly outperform an embedding-based alternative for generated policies that are size-constrained. Although this work is restricted to a simple map-based navigation task, future work includes applying the principles behind HUPAs to learning more general affordances for objects and environments.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Introduction to Hamiltonian Formulation of General Relativity and Homogeneous Cosmologies
Authors:
Rishabh Jha
Abstract:
We give a pedagogical introduction to the Hamiltonian formalism of general relativity at an advanced undergraduate and graduate levels. After covering the mathematical pre-requisites as well as the $3+1$-decomposition of spacetime, we proceed to discuss the Arnowitt-Deser-Misner (ADM) formalism (a Hamiltonian approach) of general relativity. Then we proceed to give a brief but self-contained intro…
▽ More
We give a pedagogical introduction to the Hamiltonian formalism of general relativity at an advanced undergraduate and graduate levels. After covering the mathematical pre-requisites as well as the $3+1$-decomposition of spacetime, we proceed to discuss the Arnowitt-Deser-Misner (ADM) formalism (a Hamiltonian approach) of general relativity. Then we proceed to give a brief but self-contained introduction to homogeneous (but not necessarily isotropic) universes and discuss the associated Bianchi classification. We first study their dynamics in the Lagrangian formulation, followed by the Hamiltonian formulation to show the equivalence of both approaches. We present a variety of examples to illustrate the ADM formalism: (i) free & massless scalar field coupled to homogeneous (in particular, Bianchi IX) universe, (ii) scalar field with a potential term coupled to Bianchi IX universe, (iii) electromagnetic field coupled to gravity in general, and (iv) electromagnetic field coupled to Bianchi IX universe.
△ Less
Submitted 14 August, 2023; v1 submitted 6 April, 2022;
originally announced April 2022.
-
Stacked Tensegrity Mechanism for Medical Application
Authors:
Dhruva Khanzode,
Ranjan Jha,
Emilie Duchalais,
Damien Chablat
Abstract:
In this article a multi-segmented planar tensegrity mechanism was presented. This mechanism has a three-segment structure with each segment residing on top of another. The size of the segments may decrease proportionally from base to top, resulting in a tapered shape from base to tip like an elephant trunk. The system was mechanically formulated as having linear springs and cables functioning as a…
▽ More
In this article a multi-segmented planar tensegrity mechanism was presented. This mechanism has a three-segment structure with each segment residing on top of another. The size of the segments may decrease proportionally from base to top, resulting in a tapered shape from base to tip like an elephant trunk. The system was mechanically formulated as having linear springs and cables functioning as actuators. The singularities, as well as the stability of the parallel mechanism, were analyzed by using the principle of minimum energy. Optimization was also done to obtain the greatest angular deflection for a segment according to a ratio between the size of the base and the moving platform of the robotic system. The result of this work is a family of mechanisms that can generate the same workspace for different stability properties.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Pressure tuning of localization and superconductivity in LaOPbBiS$_{3}$ and La$_{2}$O$_{2}$Bi$_{3}$AgS$_{6}$
Authors:
Y. Yuan,
H. Arima,
M. Masaoka,
Y. Naito,
Y. Hijikata,
R. Jha,
Y. Mizuguchi,
K. Matsubayashi
Abstract:
We report the effect of pressure on the electrical transport properties of the four-layer-type bismuth chalcogenide semiconductors LaOPbBiS$_{3}$ and La$_{2}$O$_{2}$Bi$_{3}$AgS$_{6}$ and present the discovery of a pressure-induced superconductivity. In both compounds, the semiconductorlike behavior concomitant with an anomaly in the more insulating state is gradually suppressed with increasing pre…
▽ More
We report the effect of pressure on the electrical transport properties of the four-layer-type bismuth chalcogenide semiconductors LaOPbBiS$_{3}$ and La$_{2}$O$_{2}$Bi$_{3}$AgS$_{6}$ and present the discovery of a pressure-induced superconductivity. In both compounds, the semiconductorlike behavior concomitant with an anomaly in the more insulating state is gradually suppressed with increasing pressure while the superconductivity develops. The obtained phase diagrams, in sharp contrast with the interplay between the conventional charge density waves and superconductivity, suggest that the enhancement of the superconductivity is due to the disorder near the localization threshold. These results indicate that pressure tuning of the local disorder in four-layer-type bismuth chalcogenides provides an attractive opportunity to study the interplay between disorder and superconductivity.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Non-perturbative phase structure of the bosonic BMN matrix model
Authors:
Navdeep Singh Dhindsa,
Raghav G. Jha,
Anosh Joseph,
Abhishek Samlodia,
David Schaich
Abstract:
We study the bosonic part of the BMN matrix model for wide ranges of temperatures, values of the deformation parameter, and numbers of colors $16 \leq N \leq 48$. Using lattice computations, we analyze phase transitions in the model, observing a single first-order transition from a uniform to a gapped phase for all values of the deformation parameter. We study the functional form of the dependence…
▽ More
We study the bosonic part of the BMN matrix model for wide ranges of temperatures, values of the deformation parameter, and numbers of colors $16 \leq N \leq 48$. Using lattice computations, we analyze phase transitions in the model, observing a single first-order transition from a uniform to a gapped phase for all values of the deformation parameter. We study the functional form of the dependence of the critical temperature on the deformation parameter, to describe how our results smoothly interpolate between the limits of the bosonic BFSS model and the gauged Gaussian model.
△ Less
Submitted 27 May, 2022; v1 submitted 21 January, 2022;
originally announced January 2022.
-
Thermal phase structure of dimensionally reduced super-Yang--Mills
Authors:
David Schaich,
Raghav G. Jha,
Anosh Joseph
Abstract:
We present our current results from ongoing lattice investigations of the Berenstein--Maldacena--Nastase deformation of maximally supersymmetric Yang--Mills quantum mechanics. We focus on the thermal phase structure of this theory, which depends on both the temperature $T$ and the deformation parameter $μ$, through the dimensionless ratios $T / μ$ and $g = λ/ μ^3$ with $λ$ the 't Hooft coupling. W…
▽ More
We present our current results from ongoing lattice investigations of the Berenstein--Maldacena--Nastase deformation of maximally supersymmetric Yang--Mills quantum mechanics. We focus on the thermal phase structure of this theory, which depends on both the temperature $T$ and the deformation parameter $μ$, through the dimensionless ratios $T / μ$ and $g = λ/ μ^3$ with $λ$ the 't Hooft coupling. We determine the critical $T / μ$ of the confinement transition for couplings $g$ that span three orders of magnitude, to connect weak-coupling perturbative calculations and large-$N$ dual supergravity predictions in the strong-coupling limit. Analyzing multiple lattice sizes up to $N_τ = 24$ and numbers of colors up to $N = 16$ allows initial checks of the large-$N$ continuum limit.
△ Less
Submitted 9 January, 2022;
originally announced January 2022.
-
MaskMTL: Attribute prediction in masked facial images with deep multitask learning
Authors:
Prerana Mukherjee,
Vinay Kaushik,
Ronak Gupta,
Ritika Jha,
Daneshwari Kankanwadi,
Brejesh Lall
Abstract:
Predicting attributes in the landmark free facial images is itself a challenging task which gets further complicated when the face gets occluded due to the usage of masks. Smart access control gates which utilize identity verification or the secure login to personal electronic gadgets may utilize face as a biometric trait. Particularly, the Covid-19 pandemic increasingly validates the essentiality…
▽ More
Predicting attributes in the landmark free facial images is itself a challenging task which gets further complicated when the face gets occluded due to the usage of masks. Smart access control gates which utilize identity verification or the secure login to personal electronic gadgets may utilize face as a biometric trait. Particularly, the Covid-19 pandemic increasingly validates the essentiality of hygienic and contactless identity verification. In such cases, the usage of masks become more inevitable and performing attribute prediction helps in segregating the target vulnerable groups from community spread or ensuring social distancing for them in a collaborative environment. We create a masked face dataset by efficiently overlaying masks of different shape, size and textures to effectively model variability generated by wearing mask. This paper presents a deep Multi-Task Learning (MTL) approach to jointly estimate various heterogeneous attributes from a single masked facial image. Experimental results on benchmark face attribute UTKFace dataset demonstrate that the proposed approach supersedes in performance to other competing techniques. The source code is available at https://github.com/ritikajha/Attribute-prediction-in-masked-facial-images-with-deep-multitask-learning
△ Less
Submitted 11 January, 2022; v1 submitted 9 January, 2022;
originally announced January 2022.
-
Tensor renormalization of three-dimensional Potts model
Authors:
Raghav G. Jha
Abstract:
We study the $q$-state Potts models on a cubic lattice in the thermodynamic limit using tensor renormalization group transformations with the triad approximation. By computing the thermodynamic potentials, we locate the first-order phase transitions for $10 < q \le 20$ which has not been explored using any method. We also examine the efficiency of the triad approximation method in obtaining the fi…
▽ More
We study the $q$-state Potts models on a cubic lattice in the thermodynamic limit using tensor renormalization group transformations with the triad approximation. By computing the thermodynamic potentials, we locate the first-order phase transitions for $10 < q \le 20$ which has not been explored using any method. We also examine the efficiency of the triad approximation method in obtaining the fixed-point tensor and comment on how this can be improved.
△ Less
Submitted 5 January, 2022;
originally announced January 2022.
-
MHATC: Autism Spectrum Disorder identification utilizing multi-head attention encoder along with temporal consolidation modules
Authors:
Ranjeet Ranjan Jha,
Abhishek Bhardwaj,
Devin Garg,
Arnav Bhavsar,
Aditya Nigam
Abstract:
Resting-state fMRI is commonly used for diagnosing Autism Spectrum Disorder (ASD) by using network-based functional connectivity. It has been shown that ASD is associated with brain regions and their inter-connections. However, discriminating based on connectivity patterns among imaging data of the control population and that of ASD patients' brains is a non-trivial task. In order to tackle said c…
▽ More
Resting-state fMRI is commonly used for diagnosing Autism Spectrum Disorder (ASD) by using network-based functional connectivity. It has been shown that ASD is associated with brain regions and their inter-connections. However, discriminating based on connectivity patterns among imaging data of the control population and that of ASD patients' brains is a non-trivial task. In order to tackle said classification task, we propose a novel deep learning architecture (MHATC) consisting of multi-head attention and temporal consolidation modules for classifying an individual as a patient of ASD. The devised architecture results from an in-depth analysis of the limitations of current deep neural network solutions for similar applications. Our approach is not only robust but computationally efficient, which can allow its adoption in a variety of other research and clinical settings.
△ Less
Submitted 27 December, 2021;
originally announced January 2022.
-
Fast Universal Control of an Oscillator with Weak Dispersive Coupling to a Qubit
Authors:
Alec Eickbusch,
Volodymyr Sivak,
Andy Z. Ding,
Salvatore S. Elder,
Shantanu R. Jha,
Jayameenakshi Venkatraman,
Baptiste Royer,
S. M. Girvin,
Robert J. Schoelkopf,
Michel H. Devoret
Abstract:
A controlled evolution generated by nonlinear interactions is required to perform full manipulation of a quantum system, and such control is only coherent when the rate of nonlinearity is large compared to the rate of decoherence. As a result, engineered quantum systems typically rely on a bare nonlinearity much stronger than all decoherence rates, and this hierarchy is usually assumed to be neces…
▽ More
A controlled evolution generated by nonlinear interactions is required to perform full manipulation of a quantum system, and such control is only coherent when the rate of nonlinearity is large compared to the rate of decoherence. As a result, engineered quantum systems typically rely on a bare nonlinearity much stronger than all decoherence rates, and this hierarchy is usually assumed to be necessary. In this work, we challenge this assumption by demonstrating the universal control of a quantum system where the relevant rate of bare nonlinear interaction is comparable to the fastest rate of decoherence. We do this by introducing a novel noise-resilient protocol for the universal quantum control of a nearly-harmonic oscillator that takes advantage of an in-situ enhanced nonlinearity instead of harnessing a bare nonlinearity. Our experiment consists of a high quality-factor microwave cavity with weak-dispersive coupling to a much lower quality superconducting qubit. By using strong drives to temporarily excite the oscillator, we realize an amplified three-wave-mixing interaction, achieving typical operation speeds over an order of magnitude faster than expected from the bare dispersive coupling. Our demonstrations include preparation of a single-photon state with $98\pm 1(\%)$ fidelity and preparation of squeezed vacuum with a squeezing level of $11.1$ dB, the largest intracavity squeezing reported in the microwave regime. Finally, we also demonstrate fast measurement-free preparation of logical states for the binomial and Gottesman-Kitaev-Preskill (GKP) quantum error-correcting codes.
△ Less
Submitted 10 February, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Introduction to Monte Carlo for Matrix Models
Authors:
Raghav G. Jha
Abstract:
We consider a wide range of matrix models and study them using the Monte Carlo technique in the large $N$ limit. The results we obtain agree with exact analytic expressions and recent numerical bootstrap methods for models with one and two matrices. We then present new results for several unsolved multi-matrix models where no other tool is yet available. In order to encourage an exchange of ideas…
▽ More
We consider a wide range of matrix models and study them using the Monte Carlo technique in the large $N$ limit. The results we obtain agree with exact analytic expressions and recent numerical bootstrap methods for models with one and two matrices. We then present new results for several unsolved multi-matrix models where no other tool is yet available. In order to encourage an exchange of ideas between different numerical approaches to matrix models, we provide programs in Python that can be easily modified to study potentials other than the ones discussed. These programs were tested on a laptop and took between a few minutes to several hours to finish depending on the model, $N$, and the required precision.
△ Less
Submitted 25 March, 2022; v1 submitted 3 November, 2021;
originally announced November 2021.
-
Asymmetric Diamond Emitters for Unidirectional Photon Coupling
Authors:
Satyajit Murmu,
Avijit Kumar,
Rajan Jha
Abstract:
The demand of single photon coupling to optical systems requires a suitable interface between negatively charged Nitrogen Vacancy (NV-) emitters in diamond to waveguides or optical circuits for applications in quantum network systems and in unidirectional emission with controlled photon states. Here, we propose a hybrid asymmetric structure of elliptically faceted (ELFA) diamond nanowire with Brag…
▽ More
The demand of single photon coupling to optical systems requires a suitable interface between negatively charged Nitrogen Vacancy (NV-) emitters in diamond to waveguides or optical circuits for applications in quantum network systems and in unidirectional emission with controlled photon states. Here, we propose a hybrid asymmetric structure of elliptically faceted (ELFA) diamond nanowire with Bragg Grating containing negatively charged NV center for efficient and unidirectional optical coupling to optical nanowire. Our calculations indicate that the structure can provide coupling efficiency of ~90% towards the elliptically facet direction and ~1% towards the opposite direction. Further, Purcell factor is enhanced due to the augmented electric field intensity in the Bragg Grating assisted ELFA structure. Further, we observe higher chirality constant for ELFA+BG structure -- an indicative of efficient unidirectional photon coupling. By integrating two ELFA diamond nanowire having opposite aligned elliptical facet can be used to design and develop complex optical circuits. Further, this structure can also be used as an inline polarizer filter where it can reflect only one particular mode (e.g. TE mode or TM mode) with higher extinct ratio. The hybrid structure can potentially be used for various applications in quantum photonics, quantum-nonlinear systems.
△ Less
Submitted 23 October, 2021;
originally announced October 2021.
-
Large-$N$ limit of two-dimensional Yang--Mills theory with four supercharges
Authors:
Navdeep Singh Dhindsa,
Raghav G. Jha,
Anosh Joseph,
David Schaich
Abstract:
We study the two-dimensional Yang--Mills theory with four supercharges in the large-$N$ limit. By using thermal boundary conditions, we analyze the internal energy and the distribution of scalars. We compare their behavior to the maximally supersymmetric case with sixteen supercharges, which is known to admit a holographic interpretation. Our lattice results for the scalar distribution show no vis…
▽ More
We study the two-dimensional Yang--Mills theory with four supercharges in the large-$N$ limit. By using thermal boundary conditions, we analyze the internal energy and the distribution of scalars. We compare their behavior to the maximally supersymmetric case with sixteen supercharges, which is known to admit a holographic interpretation. Our lattice results for the scalar distribution show no visible dependence on $N$ and the energy at strong coupling appears independent of temperature.
△ Less
Submitted 2 September, 2021;
originally announced September 2021.
-
Extremum-Seeking Adaptive-Droop for Model-free and Localized Volt-VAR Optimization
Authors:
Hongda Ren,
Rahul Ranjan Jha,
Anamika Dubey,
Noel N. Schulz
Abstract:
In an active power distribution system, Volt-VAR optimization (VVO) methods are employed to achieve network-level objectives such as minimization of network power losses. The commonly used model-based centralized and distributed VVO algorithms perform poorly in the absence of a communication system and with model and measurement uncertainties. In this paper, we proposed a model-free local Volt-VAR…
▽ More
In an active power distribution system, Volt-VAR optimization (VVO) methods are employed to achieve network-level objectives such as minimization of network power losses. The commonly used model-based centralized and distributed VVO algorithms perform poorly in the absence of a communication system and with model and measurement uncertainties. In this paper, we proposed a model-free local Volt-VAR control approach for network-level optimization that does not require communication with other decision-making agents. The proposed algorithm is based on extremum-seeking approach that uses only local measurements to minimize the network power losses. To prove that the proposed extremum-seeking controller converges to the optimum solution, we also derive mathematical conditions for which the loss minimization problem is convex with respect to the control variables. Local controllers pose stability concerns during highly variable scenarios. Thus, the proposed extremum-seeking controller is integrated with an adaptive-droop control module to provide a stable local control response. The proposed approach is validated using IEEE 4-bus and IEEE 123-bus systems and achieves the loss minimization objective while maintaining the voltage within the pre-specific limits even during highly variable DER generation scenarios.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
SRIB Submission to Interspeech 2021 DiCOVA Challenge
Authors:
Vishwanath Pratap Singh,
Shashi Kumar,
Ravi Shekhar Jha,
Abhishek Pandey
Abstract:
The COVID-19 pandemic has resulted in more than 125 million infections and more than 2.7 million casualties. In this paper, we attempt to classify covid vs non-covid cough sounds using signal processing and deep learning methods. Air turbulence, the vibration of tissues, movement of fluid through airways, opening, and closure of glottis are some of the causes for the production of the acoustic sou…
▽ More
The COVID-19 pandemic has resulted in more than 125 million infections and more than 2.7 million casualties. In this paper, we attempt to classify covid vs non-covid cough sounds using signal processing and deep learning methods. Air turbulence, the vibration of tissues, movement of fluid through airways, opening, and closure of glottis are some of the causes for the production of the acoustic sound signals during cough. Does the COVID-19 alter the acoustic characteristics of breath, cough, and speech sounds produced through the respiratory system? This is an open question waiting for answers. In this paper, we incorporated novel data augmentation methods for cough sound augmentation and multiple deep neural network architectures and methods along with handcrafted features. Our proposed system gives 14% absolute improvement in area under the curve (AUC). The proposed system is developed as part of Interspeech 2021 special sessions and challenges viz. diagnosing of COVID-19 using acoustics (DiCOVA). Our proposed method secured the 5th position on the leaderboard among 29 participants.
△ Less
Submitted 15 June, 2021;
originally announced June 2021.
-
Tensor renormalization group study of the 3d $O(2)$ model
Authors:
Jacques Bloch,
Raghav G. Jha,
Robert Lohmayer,
Maximilian Meister
Abstract:
We calculate thermodynamic potentials and their derivatives for the three-dimensional $O(2)$ model using tensor-network methods to investigate the well-known second-order phase transition. We also consider the model at non-zero chemical potential to study the Silver Blaze phenomenon, which is related to the particle number density at zero temperature. Furthermore, the temperature dependence of the…
▽ More
We calculate thermodynamic potentials and their derivatives for the three-dimensional $O(2)$ model using tensor-network methods to investigate the well-known second-order phase transition. We also consider the model at non-zero chemical potential to study the Silver Blaze phenomenon, which is related to the particle number density at zero temperature. Furthermore, the temperature dependence of the number density is explored using asymmetric lattices. Our results for both zero and non-zero magnetic field, temperature, and chemical potential are consistent with those obtained using other methods.
△ Less
Submitted 5 October, 2021; v1 submitted 17 May, 2021;
originally announced May 2021.