-
Assistance-Seeking in Human-Supervised Autonomy: Role of Trust and Secondary Task Engagement (Extended Version)
Authors:
Dong Hae Mangalindan,
Vaibhav Srivastava
Abstract:
Using a dual-task paradigm, we explore how robot actions, performance, and the introduction of a secondary task influence human trust and engagement. In our study, a human supervisor simultaneously engages in a target-tracking task while supervising a mobile manipulator performing an object collection task. The robot can either autonomously collect the object or ask for human assistance. The human…
▽ More
Using a dual-task paradigm, we explore how robot actions, performance, and the introduction of a secondary task influence human trust and engagement. In our study, a human supervisor simultaneously engages in a target-tracking task while supervising a mobile manipulator performing an object collection task. The robot can either autonomously collect the object or ask for human assistance. The human supervisor also has the choice to rely upon or interrupt the robot. Using data from initial experiments, we model the dynamics of human trust and engagement using a linear dynamical system (LDS). Furthermore, we develop a human action model to define the probability of human reliance on the robot. Our model suggests that participants are more likely to interrupt the robot when their trust and engagement are low during high-complexity collection tasks. Using Model Predictive Control (MPC), we design an optimal assistance-seeking policy. Evaluation experiments demonstrate the superior performance of the MPC policy over the baseline policy for most participants.
△ Less
Submitted 11 June, 2024; v1 submitted 30 May, 2024;
originally announced May 2024.
-
Compressing Large Language Models using Low Rank and Low Precision Decomposition
Authors:
Rajarshi Saha,
Naomi Sagan,
Varun Srivastava,
Andrea J. Goldsmith,
Mert Pilanci
Abstract:
The prohibitive sizes of Large Language Models (LLMs) today make it difficult to deploy them on memory-constrained edge devices. This work introduces $\rm CALDERA$ -- a new post-training LLM compression algorithm that harnesses the inherent low-rank structure of a weight matrix $\mathbf{W}$ by approximating it via a low-rank, low-precision decomposition as…
▽ More
The prohibitive sizes of Large Language Models (LLMs) today make it difficult to deploy them on memory-constrained edge devices. This work introduces $\rm CALDERA$ -- a new post-training LLM compression algorithm that harnesses the inherent low-rank structure of a weight matrix $\mathbf{W}$ by approximating it via a low-rank, low-precision decomposition as $\mathbf{W} \approx \mathbf{Q} + \mathbf{L}\mathbf{R}$. Here, $\mathbf{L}$ and $\mathbf{R}$ are low rank factors, and the entries of $\mathbf{Q}$, $\mathbf{L}$ and $\mathbf{R}$ are quantized. The model is compressed by substituting each layer with its $\mathbf{Q} + \mathbf{L}\mathbf{R}$ decomposition, and the zero-shot performance of the compressed model is evaluated. Additionally, $\mathbf{L}$ and $\mathbf{R}$ are readily amenable to low-rank adaptation, consequently enhancing the zero-shot performance. $\rm CALDERA$ obtains this decomposition by formulating it as an optimization problem $\min_{\mathbf{Q},\mathbf{L},\mathbf{R}}\lVert(\mathbf{Q} + \mathbf{L}\mathbf{R} - \mathbf{W})\mathbf{X}^\top\rVert_{\rm F}^2$, where $\mathbf{X}$ is the calibration data, and $\mathbf{Q}, \mathbf{L}, \mathbf{R}$ are constrained to be representable using low-precision formats. Theoretical upper bounds on the approximation error of $\rm CALDERA$ are established using a rank-constrained regression framework, and the tradeoff between compression ratio and model performance is studied by analyzing the impact of target rank and quantization bit budget. Results illustrate that compressing LlaMa-$2$ $7$B/$70$B and LlaMa-$3$ $8$B models obtained using $\rm CALDERA$ outperforms existing post-training LLM compression techniques in the regime of less than $2.5$ bits per parameter. The implementation is available at: \href{https://github.com/pilancilab/caldera}{https://github.com/pilancilab/caldera}.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Towards Rational Consensus in Honest Majority
Authors:
Varul Srivastava,
Sujit Gujar
Abstract:
Distributed consensus protocols reach agreement among $n$ players in the presence of $f$ adversaries; different protocols support different values of $f$. Existing works study this problem for different adversary types (captured by threat models). There are three primary threat models: (i) Crash fault tolerance (CFT), (ii) Byzantine fault tolerance (BFT), and (iii) Rational fault tolerance (RFT),…
▽ More
Distributed consensus protocols reach agreement among $n$ players in the presence of $f$ adversaries; different protocols support different values of $f$. Existing works study this problem for different adversary types (captured by threat models). There are three primary threat models: (i) Crash fault tolerance (CFT), (ii) Byzantine fault tolerance (BFT), and (iii) Rational fault tolerance (RFT), each more general than the previous. Agreement in repeated rounds on both (1) the proposed value in each round and (2) the ordering among agreed-upon values across multiple rounds is called Atomic BroadCast (ABC). ABC is more generalized than consensus and is employed in blockchains.
This work studies ABC under the RFT threat model. We consider $t$ byzantine and $k$ rational adversaries among $n$ players. We also study different types of rational players based on their utility towards (1) liveness attack, (2) censorship or (3) disagreement (forking attack). We study the problem of ABC under this general threat model in partially-synchronous networks. We show (1) ABC is impossible for $n/3< (t+k) <n/2$ if rational players prefer liveness or censorship attacks and (2) the consensus protocol proposed by Ranchal-Pedrosa and Gramoli cannot be generalized to solve ABC due to insecure Nash equilibrium (resulting in disagreement). For ABC in partially synchronous network settings, we propose a novel protocol \textsf{pRFT}(practical Rational Fault Tolerance). We show \textsf{pRFT} achieves ABC if (a) rational players prefer only disagreement attacks and (b) $t < \frac{n}{4}$ and $(t + k) < \frac{n}{2}$. In \textsf{pRFT}, we incorporate accountability (capturing deviating players) within the protocol by leveraging honest players. We also show that the message complexity of \textsf{pRFT} is at par with the best consensus protocols that guarantee accountability.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Role of coupled electrochemistry and stress on the Li-anode instability: A continuum approach
Authors:
Shabnam Konica,
Brian W. Sheldon,
Vikas Srivastava
Abstract:
We present a coupled mechanistic approach that elucidates the intricate interplay between stress and electrochemistry, enabling the prediction of the onset of instabilities in Li-metal anodes and the solid electrolyte interphase (SEI) in liquid-electrolyte Li-metal batteries. Our continuum theory considers a two-way coupling between stress and electrochemistry, includes Li and electron transport t…
▽ More
We present a coupled mechanistic approach that elucidates the intricate interplay between stress and electrochemistry, enabling the prediction of the onset of instabilities in Li-metal anodes and the solid electrolyte interphase (SEI) in liquid-electrolyte Li-metal batteries. Our continuum theory considers a two-way coupling between stress and electrochemistry, includes Li and electron transport through SEI, incorporates effects of Li viscoplasticity, includes SEI and electrolyte interface surface energy and evaluates crucial roles of these mechanistic effects on the continuously evolving anode surface due to the viscoplastic deformation of lithium. In the model, spatial current density evolves with the stress-induced potential across the deformed anode/SEI interface. We assume SEI as a homogeneous, artificial layer on the Li-anode, which allows the investigation of the mechanical and electrochemical properties of the SEI systematically. Subsequently, we solve a set of coupled electrochemistry and displacement equations within the SEI and anode domains. The model is implemented numerically by writing a user element subroutine in Abaqus/Standard. We conduct numerical simulations under various galvanostatic conditions and SEI properties and predict conditions for anode instability. We find that Li viscoplasticity is one of the key attributes that drives instability in the Li-anode and show that applying a soft artificial SEI layer on the Li-anode to minimize viscoplastic deformation can be an effective method. We also report the role of artificial SEI elasticity and thickness on anode stability. Selected stability maps are provided as a design aid for artificial SEI.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Human Motor Learning Dynamics in High-dimensional Tasks
Authors:
Ankur Kamboj,
Rajiv Ranganathan,
Xiaobo Tan,
Vaibhav Srivastava
Abstract:
Conventional approaches to enhancing movement coordination, such as providing instructions and visual feedback, are often inadequate in complex motor tasks with multiple degrees of freedom (DoFs). To effectively address coordination deficits in such complex motor systems, it becomes imperative to develop interventions grounded in a model of human motor learning; however, modeling such learning pro…
▽ More
Conventional approaches to enhancing movement coordination, such as providing instructions and visual feedback, are often inadequate in complex motor tasks with multiple degrees of freedom (DoFs). To effectively address coordination deficits in such complex motor systems, it becomes imperative to develop interventions grounded in a model of human motor learning; however, modeling such learning processes is challenging due to the large DoFs. In this paper, we present a computational motor learning model that leverages the concept of motor synergies to extract low-dimensional learning representations in the high-dimensional motor space and the internal model theory of motor control to capture both fast and slow motor learning processes. We establish the model's convergence properties and validate it using data from a target capture game played by human participants. We study the influence of model parameters on several motor learning trade-offs such as speed-accuracy, exploration-exploitation, satisficing, and flexibility-performance, and show that the human motor learning system tunes these parameters to optimize learning and various output performance metrics.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Centralization in Proof-of-Stake Blockchains: A Game-Theoretic Analysis of Bootstrapping Protocols
Authors:
Varul Srivastava,
Sankarshan Damle,
Sujit Gujar
Abstract:
Proof-of-stake (PoS) has emerged as a natural alternative to the resource-intensive Proof-of-Work (PoW) blockchain, as was recently seen with the Ethereum Merge. PoS-based blockchains require an initial stake distribution among the participants. Typically, this initial stake distribution is called bootstrapping. This paper argues that existing bootstrapping protocols are prone to centralization. T…
▽ More
Proof-of-stake (PoS) has emerged as a natural alternative to the resource-intensive Proof-of-Work (PoW) blockchain, as was recently seen with the Ethereum Merge. PoS-based blockchains require an initial stake distribution among the participants. Typically, this initial stake distribution is called bootstrapping. This paper argues that existing bootstrapping protocols are prone to centralization. To address centralization due to bootstrapping, we propose a novel game $Γ_\textsf{bootstrap}$. Next, we define three conditions: (i) Individual Rationality (IR), (ii) Incentive Compatibility (IC), and (iii) $(τ,δ,ε)-$ Decentralization that an \emph{ideal} bootstrapping protocol must satisfy. $(τ,δ,ε)$ are certain parameters to quantify decentralization. Towards this, we propose a novel centralization metric, C-NORM, to measure centralization in a PoS System. We define a centralization game -- $Γ_\textsf{cent}$, to analyze the efficacy of centralization metrics. We show that C-NORM effectively captures centralization in the presence of strategic players capable of launching Sybil attacks. With C-NORM, we analyze popular bootstrapping protocols such as Airdrop and Proof-of-Burn (PoB) and prove that they do not satisfy IC and IR, respectively. Motivated by the Ethereum Merge, we study W2SB (a PoW-based bootstrapping protocol) and prove it is ideal. In addition, we conduct synthetic simulations to empirically validate that W2SB bootstrapped PoS is decentralized.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication
Authors:
Tapaswini Mohanty,
Vikas Srivastava,
Sumit Kumar Debnath,
Debasish Roy,
Kouichi Sakurai,
Sourav Mukhopadhyay
Abstract:
Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital sign…
▽ More
Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital signatures using only the identifiers of signers, such as email, phone number, etc. Nearly all existing IBS protocols rely on several theoretical assumption-based hard problems. Unfortunately, these hard problems are unsafe and pose a hazard in the quantum realm. Thus, designing IBS algorithms that can withstand quantum attacks and ensure long-term security is an important direction for future research. Quantum cryptography (QC) is one such approach. In this paper, we propose an IBS based on QC. Our scheme's security is based on the laws of quantum mechanics. It thereby achieves long-term security and provides resistance against quantum attacks. We verify the proposed design's correctness and feasibility by simulating it in a prototype quantum device and the IBM Qiskit quantum simulator. The implementation code in qiskit with Jupyternotebook is provided in the Annexure. Moreover, we discuss the application of our design in secure email communication.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
No Transaction Fees? No Problem! Achieving Fairness in Transaction Fee Mechanism Design
Authors:
Sankarshan Damle,
Varul Srivastava,
Sujit Gujar
Abstract:
The recently proposed Transaction Fee Mechanism (TFM) literature studies the strategic interaction between the miner of a block and the transaction creators (or users) in a blockchain. In a TFM, the miner includes transactions that maximize its utility while users submit fees for a slot in the block. The existing TFM literature focuses on satisfying standard incentive properties -- which may limit…
▽ More
The recently proposed Transaction Fee Mechanism (TFM) literature studies the strategic interaction between the miner of a block and the transaction creators (or users) in a blockchain. In a TFM, the miner includes transactions that maximize its utility while users submit fees for a slot in the block. The existing TFM literature focuses on satisfying standard incentive properties -- which may limit widespread adoption. We argue that a TFM is "fair" to the transaction creators if it satisfies specific notions, namely Zero-fee Transaction Inclusion and Monotonicity. First, we prove that one generally cannot ensure both these properties and prevent a miner's strategic manipulation. We also show that existing TFMs either do not satisfy these notions or do so at a high cost to the miners' utility. As such, we introduce a novel TFM using on-chain randomness -- rTFM. We prove that rTFM guarantees incentive compatibility for miners and users while satisfying our novel fairness constraints.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
DECENT-BRM: Decentralization through Block Reward Mechanisms
Authors:
Varul Srivastava,
Sujit Gujar
Abstract:
Proof-of-Work is a consensus algorithm where miners solve cryptographic puzzles to mine blocks and obtain a reward through some Block Reward Mechanism (BRM). PoW blockchain faces the problem of centralization due to the formation of mining pools, where miners mine blocks as a group and distribute rewards. The rationale is to reduce the risk (variance) in reward while obtaining the same expected bl…
▽ More
Proof-of-Work is a consensus algorithm where miners solve cryptographic puzzles to mine blocks and obtain a reward through some Block Reward Mechanism (BRM). PoW blockchain faces the problem of centralization due to the formation of mining pools, where miners mine blocks as a group and distribute rewards. The rationale is to reduce the risk (variance) in reward while obtaining the same expected block reward. In this work, we address the problem of centralization due to mining pools in PoW blockchain. We propose a two-player game between the new miner joining the system and the PoW blockchain system.
We model the utility for the incoming miner as a combination of (i) expected block reward, (ii) risk, and (iii) cost of switching between different mining pools. With this utility structure, we analyze the equilibrium strategy of the incoming miner for different BRMs: (a) memoryless -- block reward is history independent (e.g., Bitcoin) (b) retentive: block reward is history-dependent (e.g., Fruitchains). For memoryless BRMs, we show that depending on the coefficient of switching cost $c$, the protocol is decentralized when $c = 0$ and centralized when $c > \underline{c}$. In addition, we show the impossibility of constructing a memoryless BRM where solo mining gives a higher payoff than forming/joining mining pools. While retentive BRM in Fruitchains reduces risk in solo mining, the equilibrium strategy for incoming miners is still to join mining pools, leading to centralization. We then propose our novel retentive BRM -- \textsf{Decent-BRM}. We show that under \textsf{Decent-BRM}, incoming miners obtain higher utility in solo mining than joining mining pools. Therefore, no mining pools are formed, and the Pow blockchain using \textsf{Decent-BRM} is decentralized.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management
Authors:
Vikas Srivastava,
Paresh Baidya,
Sihem Mesnager,
Debasish Roy,
Sumit Kumar Debnath
Abstract:
Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations and enterprise business systems. There are many cases where the audit logs contain sensitive data, or the audit logs are enormous. In these situations, dealing with a subset of the data is more practical than the entire data set. To provide a secur…
▽ More
Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations and enterprise business systems. There are many cases where the audit logs contain sensitive data, or the audit logs are enormous. In these situations, dealing with a subset of the data is more practical than the entire data set. To provide a secure solution to handle these issues, a sanitizable signature scheme (SSS) is a viable cryptographic primitive. Herein, we first present the first post-quantum secure multivariate-based SSS, namely Mul-SAN. Our proposed design provides unforgeability, privacy, immutability, signer accountability, and sanitizer accountability under the assumption that the MQ problem is NP-hard. Mul-SAN is very efficient and only requires computing field multiplications and additions over a finite field for its implementation. Mul-SAN presents itself as a practical method to partially delegate control of the authenticated data in avenues like the healthcare industry and government organizations. We also explore using Blockchain to provide a tamper-proof and robust audit log mechanism.
△ Less
Submitted 25 March, 2024; v1 submitted 26 December, 2023;
originally announced December 2023.
-
Quantum Secure Protocols for Multiparty Computations
Authors:
Tapaswini Mohanty,
Vikas Srivastava,
Sumit Kumar Debnath,
Pantelimon Stanica
Abstract:
Secure multiparty computation (MPC) schemes allow two or more parties to conjointly compute a function on their private input sets while revealing nothing but the output. Existing state-of-the-art number-theoretic-based designs face the threat of attacks through quantum algorithms. In this context, we present secure MPC protocols that can withstand quantum attacks. We first present the design and…
▽ More
Secure multiparty computation (MPC) schemes allow two or more parties to conjointly compute a function on their private input sets while revealing nothing but the output. Existing state-of-the-art number-theoretic-based designs face the threat of attacks through quantum algorithms. In this context, we present secure MPC protocols that can withstand quantum attacks. We first present the design and analysis of an information-theoretic secure oblivious linear evaluation (OLE), namely ${\sf qOLE}$ in the quantum domain, and show that our ${\sf qOLE}$ is safe from external attacks. In addition, our scheme satisfies all the security requirements of a secure OLE. We further utilize ${\sf qOLE}$ as a building block to construct a quantum-safe multiparty private set intersection (MPSI) protocol.
△ Less
Submitted 26 December, 2023;
originally announced December 2023.
-
Optimal Fidelity Selection for Improved Performance in Human-in-the-Loop Queues for Underwater Search
Authors:
Piyush Gupta,
Vaibhav Srivastava
Abstract:
In the context of human-supervised autonomy, we study the problem of optimal fidelity selection for a human operator performing an underwater visual search task. Human performance depends on various cognitive factors such as workload and fatigue. We perform human experiments in which participants perform two tasks simultaneously: a primary task, which is subject to evaluation, and a secondary task…
▽ More
In the context of human-supervised autonomy, we study the problem of optimal fidelity selection for a human operator performing an underwater visual search task. Human performance depends on various cognitive factors such as workload and fatigue. We perform human experiments in which participants perform two tasks simultaneously: a primary task, which is subject to evaluation, and a secondary task to estimate their workload. The primary task requires participants to search for underwater mines in videos, while the secondary task involves a simple visual test where they respond when a green light displayed on the side of their screens turns red. Videos arrive as a Poisson process and are stacked in a queue to be serviced by the human operator. The operator can choose to watch the video with either normal or high fidelity, with normal fidelity videos playing at three times the speed of high fidelity ones. Participants receive rewards for their accuracy in mine detection for each primary task and penalties based on the number of videos waiting in the queue. We consider the workload of the operator as a hidden state and model the workload dynamics as an Input-Output Hidden Markov Model (IOHMM). We use a Partially Observable Markov Decision Process (POMDP) to learn an optimal fidelity selection policy, where the objective is to maximize total rewards. Our results demonstrate improved performance when videos are serviced based on the optimal fidelity policy compared to a baseline where humans choose the fidelity level themselves.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Fostering Human Learning in Sequential Decision-Making: Understanding the Role of Evaluative Feedback
Authors:
Piyush Gupta,
Subir Biswas,
Vaibhav Srivastava
Abstract:
Cognitive rehabilitation, STEM (science, technology, engineering, and math) skill acquisition, and coaching games such as chess often require tutoring decision-making strategies. The advancement of AI-driven tutoring systems for facilitating human learning requires an understanding of the impact of evaluative feedback on human decision-making and skill development. To this end, we conduct human ex…
▽ More
Cognitive rehabilitation, STEM (science, technology, engineering, and math) skill acquisition, and coaching games such as chess often require tutoring decision-making strategies. The advancement of AI-driven tutoring systems for facilitating human learning requires an understanding of the impact of evaluative feedback on human decision-making and skill development. To this end, we conduct human experiments using Amazon Mechanical Turk to study the influence of evaluative feedback on human decision-making in sequential tasks. In these experiments, participants solve the Tower of Hanoi puzzle and receive AI-generated feedback while solving it. We examine how this feedback affects their learning and skill transfer to related tasks. Additionally, treating humans as noisy optimal agents, we employ maximum entropy inverse reinforcement learning to analyze the effect of feedback on the implicit human reward structure that guides their decision making. Lastly, we explore various computational models to understand how people incorporate evaluative feedback into their decision-making processes. Our findings underscore that humans perceive evaluative feedback as indicative of their long-term strategic success, thus aiding in skill acquisition and transfer in sequential decision-making tasks. Moreover, we demonstrate that evaluative feedback fosters a more structured and organized learning experience compared to learning without feedback. Furthermore, our results indicate that providing intermediate goals alone does not significantly enhance human learning outcomes.
△ Less
Submitted 4 May, 2024; v1 submitted 6 November, 2023;
originally announced November 2023.
-
Matrix Compression via Randomized Low Rank and Low Precision Factorization
Authors:
Rajarshi Saha,
Varun Srivastava,
Mert Pilanci
Abstract:
Matrices are exceptionally useful in various fields of study as they provide a convenient framework to organize and manipulate data in a structured manner. However, modern matrices can involve billions of elements, making their storage and processing quite demanding in terms of computational resources and memory usage. Although prohibitively large, such matrices are often approximately low rank. W…
▽ More
Matrices are exceptionally useful in various fields of study as they provide a convenient framework to organize and manipulate data in a structured manner. However, modern matrices can involve billions of elements, making their storage and processing quite demanding in terms of computational resources and memory usage. Although prohibitively large, such matrices are often approximately low rank. We propose an algorithm that exploits this structure to obtain a low rank decomposition of any matrix $\mathbf{A}$ as $\mathbf{A} \approx \mathbf{L}\mathbf{R}$, where $\mathbf{L}$ and $\mathbf{R}$ are the low rank factors. The total number of elements in $\mathbf{L}$ and $\mathbf{R}$ can be significantly less than that in $\mathbf{A}$. Furthermore, the entries of $\mathbf{L}$ and $\mathbf{R}$ are quantized to low precision formats $--$ compressing $\mathbf{A}$ by giving us a low rank and low precision factorization. Our algorithm first computes an approximate basis of the range space of $\mathbf{A}$ by randomly sketching its columns, followed by a quantization of the vectors constituting this basis. It then computes approximate projections of the columns of $\mathbf{A}$ onto this quantized basis. We derive upper bounds on the approximation error of our algorithm, and analyze the impact of target rank and quantization bit-budget. The tradeoff between compression ratio and approximation accuracy allows for flexibility in choosing these parameters based on specific application requirements. We empirically demonstrate the efficacy of our algorithm in image compression, nearest neighbor classification of image and text embeddings, and compressing the layers of LlaMa-$7$b. Our results illustrate that we can achieve compression ratios as aggressive as one bit per matrix coordinate, all while surpassing or maintaining the performance of traditional compression techniques.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Stability and bifurcation analysis of a two-patch model with Allee effect and dispersal
Authors:
Yue Xia,
Lijuan Chen,
Vaibhava Srivastava,
Rana D. Parshad
Abstract:
In the current manuscript, a first two-patch model with Allee effect and nonlinear dispersal is presented. We study both the ODE case and the PDE case here. In the ODE model, the stability of the equilibrium points and the existence of saddle-node bifurcation are discussed. The phase diagram and bifurcation curve of our model are also given by numerical simulation. Besides, the corresponding linea…
▽ More
In the current manuscript, a first two-patch model with Allee effect and nonlinear dispersal is presented. We study both the ODE case and the PDE case here. In the ODE model, the stability of the equilibrium points and the existence of saddle-node bifurcation are discussed. The phase diagram and bifurcation curve of our model are also given by numerical simulation. Besides, the corresponding linear dispersal case is also presented. We show that when the Allee effect is large, high intensity of linear dispersal is not favorable to the persistence of the species. We further show when the Allee effect is large, nonlinear diffusion is more favorable to the survival of the population than linear diffusion. Moreover, the results of the PDE model extends our findings from discrete patches to continuous patches.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
On Multi-Fidelity Impedance Tuning for Human-Robot Cooperative Manipulation
Authors:
Ethan Lau,
Vaibhav Srivastava,
Shaunak D. Bopardikar
Abstract:
We examine how a human-robot interaction (HRI) system may be designed when input-output data from previous experiments are available. In particular, we consider how to select an optimal impedance in the assistance design for a cooperative manipulation task with a new operator. Due to the variability between individuals, the design parameters that best suit one operator of the robot may not be the…
▽ More
We examine how a human-robot interaction (HRI) system may be designed when input-output data from previous experiments are available. In particular, we consider how to select an optimal impedance in the assistance design for a cooperative manipulation task with a new operator. Due to the variability between individuals, the design parameters that best suit one operator of the robot may not be the best parameters for another one. However, by incorporating historical data using a linear auto-regressive (AR-1) Gaussian process, the search for a new operator's optimal parameters can be accelerated. We lay out a framework for optimizing the human-robot cooperative manipulation that only requires input-output data. We establish how the AR-1 model improves the bound on the regret and numerically simulate a human-robot cooperative manipulation task to show the regret improvement. Further, we show how our approach's input-output nature provides robustness against modeling error through an additional numerical study.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Semi-device-independent certification of quantum non-Markovianity using sequential Random Access Codes
Authors:
Abhinash Kumar Roy,
Varun Srivastava,
Soumik Mahanti,
Christina Giarmatzi,
Alexei Gilchrist
Abstract:
The characterization of multi-time correlations in open quantum systems is of fundamental importance. In this work, we investigate multi-time processes using the process matrix formalism and show that the presence of a quantum non-Markovian environment plays a significant role in enhancing the communication capacity in sequential prepare-transform-measure Quantum Random Access Codes (QRAC). The co…
▽ More
The characterization of multi-time correlations in open quantum systems is of fundamental importance. In this work, we investigate multi-time processes using the process matrix formalism and show that the presence of a quantum non-Markovian environment plays a significant role in enhancing the communication capacity in sequential prepare-transform-measure Quantum Random Access Codes (QRAC). The correlated environment enables a quantum advantage to multiple parties, even with projective measurements. In particular, we show that the Markovian and classical non-Markovian processes, i.e. quantum processes with classical feedback from the environment, do not yield sequential quantum advantage. In contrast, it is possible to achieve an advantage in the presence of a quantum non-Markovian environment. Therefore this approach allows a semi-device-independent certification of quantum non-Markovianity. As opposed to entanglement-detection criteria which require the knowledge of the complete process, this method allows to certify the presence of a quantum non-Markovian environment from the observed measurement statistics. Moreover, quantum memory ameliorates the unambiguous certifiable region of unsharp instruments in a semi-device-independent manner.
△ Less
Submitted 28 September, 2023;
originally announced September 2023.
-
Dynamical Analysis of an Allelopathic Phytoplankton Model with Fear Effect
Authors:
Shangming Chen,
Fengde Chen,
Vaibhava Srivastava,
Rana D. Parshad
Abstract:
This paper is the first to propose an allelopathic phytoplankton competition ODE model influenced by a fear effect based on natural biological phenomena. It is shown that the interplay of this fear effect and the allelopathic term cause rich dynamics in the proposed competition model, such as global stability, transcritical bifurcation, pitchfork bifurcation, and saddle-node bifurcation. We also c…
▽ More
This paper is the first to propose an allelopathic phytoplankton competition ODE model influenced by a fear effect based on natural biological phenomena. It is shown that the interplay of this fear effect and the allelopathic term cause rich dynamics in the proposed competition model, such as global stability, transcritical bifurcation, pitchfork bifurcation, and saddle-node bifurcation. We also consider the spatially explicit version of the model and prove analogous results. Numerical simulations verify the feasibility of the theoretical analysis. The results demonstrate that the primary cause of the extinction of non-toxic species is the fear of toxic species compared to toxins. Allelopathy only affects the density of non-toxic species. The discussion provides guidance for the conservation of species and the maintenance of biodiversity.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
A Joint Fermi-GBM and Swift-BAT Analysis of Gravitational-Wave Candidates from the Third Gravitational-wave Observing Run
Authors:
C. Fletcher,
J. Wood,
R. Hamburg,
P. Veres,
C. M. Hui,
E. Bissaldi,
M. S. Briggs,
E. Burns,
W. H. Cleveland,
M. M. Giles,
A. Goldstein,
B. A. Hristov,
D. Kocevski,
S. Lesage,
B. Mailyan,
C. Malacaria,
S. Poolakkil,
A. von Kienlin,
C. A. Wilson-Hodge,
The Fermi Gamma-ray Burst Monitor Team,
M. Crnogorčević,
J. DeLaunay,
A. Tohuvavohu,
R. Caputo,
S. B. Cenko
, et al. (1674 additional authors not shown)
Abstract:
We present Fermi Gamma-ray Burst Monitor (Fermi-GBM) and Swift Burst Alert Telescope (Swift-BAT) searches for gamma-ray/X-ray counterparts to gravitational wave (GW) candidate events identified during the third observing run of the Advanced LIGO and Advanced Virgo detectors. Using Fermi-GBM on-board triggers and sub-threshold gamma-ray burst (GRB) candidates found in the Fermi-GBM ground analyses,…
▽ More
We present Fermi Gamma-ray Burst Monitor (Fermi-GBM) and Swift Burst Alert Telescope (Swift-BAT) searches for gamma-ray/X-ray counterparts to gravitational wave (GW) candidate events identified during the third observing run of the Advanced LIGO and Advanced Virgo detectors. Using Fermi-GBM on-board triggers and sub-threshold gamma-ray burst (GRB) candidates found in the Fermi-GBM ground analyses, the Targeted Search and the Untargeted Search, we investigate whether there are any coincident GRBs associated with the GWs. We also search the Swift-BAT rate data around the GW times to determine whether a GRB counterpart is present. No counterparts are found. Using both the Fermi-GBM Targeted Search and the Swift-BAT search, we calculate flux upper limits and present joint upper limits on the gamma-ray luminosity of each GW. Given these limits, we constrain theoretical models for the emission of gamma-rays from binary black hole mergers.
△ Less
Submitted 25 August, 2023;
originally announced August 2023.
-
Search for Eccentric Black Hole Coalescences during the Third Observing Run of LIGO and Virgo
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
A. G. Abac,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
C. Adamcewicz,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
I. Aguilar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi
, et al. (1750 additional authors not shown)
Abstract:
Despite the growing number of confident binary black hole coalescences observed through gravitational waves so far, the astrophysical origin of these binaries remains uncertain. Orbital eccentricity is one of the clearest tracers of binary formation channels. Identifying binary eccentricity, however, remains challenging due to the limited availability of gravitational waveforms that include effect…
▽ More
Despite the growing number of confident binary black hole coalescences observed through gravitational waves so far, the astrophysical origin of these binaries remains uncertain. Orbital eccentricity is one of the clearest tracers of binary formation channels. Identifying binary eccentricity, however, remains challenging due to the limited availability of gravitational waveforms that include effects of eccentricity. Here, we present observational results for a waveform-independent search sensitive to eccentric black hole coalescences, covering the third observing run (O3) of the LIGO and Virgo detectors. We identified no new high-significance candidates beyond those that were already identified with searches focusing on quasi-circular binaries. We determine the sensitivity of our search to high-mass (total mass $M>70$ $M_\odot$) binaries covering eccentricities up to 0.3 at 15 Hz orbital frequency, and use this to compare model predictions to search results. Assuming all detections are indeed quasi-circular, for our fiducial population model, we place an upper limit for the merger rate density of high-mass binaries with eccentricities $0 < e \leq 0.3$ at $0.33$ Gpc$^{-3}$ yr$^{-1}$ at 90\% confidence level.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Exploring unique dynamics in a predator-prey model with generalist predator and group defence in prey
Authors:
Vaibhava Srivastava,
Kwadwo Antwi-Fordjour,
Rana D. Parshad
Abstract:
In the current manuscript, we consider a predator-prey model where the predator is modeled as a generalist using a modified Leslie-Gower scheme, and the prey exhibits group defence via a generalised response. We show that the model could exhibit finite time blow-up, contrary to the current literature (Eur. Phys. J. Plus 137, 28). We also propose a new concept via which the predator population blow…
▽ More
In the current manuscript, we consider a predator-prey model where the predator is modeled as a generalist using a modified Leslie-Gower scheme, and the prey exhibits group defence via a generalised response. We show that the model could exhibit finite time blow-up, contrary to the current literature (Eur. Phys. J. Plus 137, 28). We also propose a new concept via which the predator population blows up in finite time while the prey population quenches in finite time. The blow-up and quenching times are proved to be one and the same. Our analysis is complemented by numerical findings. This includes a numerical description of the basin of attraction for large data blow-up solutions, as well as several rich bifurcations leading to multiple limit cycles, both in co-dimension one and two. Lastly, we posit a delayed version of the model with globally existing solutions for any initial data.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
The effect of "very fast" strategies on two species competition
Authors:
Aniket Banerjee,
Vaibhava Srivastava,
Rana D. Parshad
Abstract:
We consider the effect of finite time extinction mechanisms (FTEM) such as (1) semi-linear harvesting terms, and (2) quasi-linear fast diffusion terms on two species Lokta-Volterra competition models. We show that these mechanisms can alter classical dynamics of competitive exclusion, and weak and strong competition by acting only on a \emph{small} portion of the weaker competitors' population, an…
▽ More
We consider the effect of finite time extinction mechanisms (FTEM) such as (1) semi-linear harvesting terms, and (2) quasi-linear fast diffusion terms on two species Lokta-Volterra competition models. We show that these mechanisms can alter classical dynamics of competitive exclusion, and weak and strong competition by acting only on a \emph{small} portion of the weaker competitors' population, analogous to small defector populations in game theory \cite{DC23}. In particular, a stronger competitors population, with a few individuals dispersing (``defecting") very quickly, could exhibit bi-stability, as well as competitive exclusion \emph{reversal}. The non-linear harvesting is applied to aphid-soybean crop systems, wherein novel dynamics are observed. Applications to bio-control of invasive pests such as the soybean aphid are discussed.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
A method to measure the embedded crack length and position in high-density polyethylene using microseconds ultrasound time signal
Authors:
Sijun Niu,
Venkatsai Bellala,
Daanish A. Qureshi,
Vikas Srivastava
Abstract:
High-density polyethylene (HDPE) is used in applications ranging from cooling water pipelines in nuclear power plants and distribution pipelines for natural gas and hydrogen to biomedical implants. Embedded crack-like flaws form within HDPE during fabrication or operations. Non-visible flaws can cause catastrophic failure if undetected. Large structures such as HDPE pipelines require a fast, non-d…
▽ More
High-density polyethylene (HDPE) is used in applications ranging from cooling water pipelines in nuclear power plants and distribution pipelines for natural gas and hydrogen to biomedical implants. Embedded crack-like flaws form within HDPE during fabrication or operations. Non-visible flaws can cause catastrophic failure if undetected. Large structures such as HDPE pipelines require a fast, non-destructive evaluation (NDE) method where the sensor can move rapidly across the structure. This is only possible if the flaw is evaluated using microseconds of time signal. We propose and show the accuracy of a machine learning-based Ultrasound NDE method that can rapidly and accurately predict embedded crack length and position simultaneously in HDPE with only tens of microseconds of time signal sensing. A method to quantify crack size in HDPE and other polymers using a very short Ultrasound time signal is lacking. We propose that an optimally trained machine learning model can decipher the crack characteristics using short measures of time signal, but a lack of large, well-distributed, and labeled datasets to train machine learning models continues to be a major limitation. To overcome this limitation, we have conducted computer simulations of ultrasound on HDPE to develop training data. We show that fully simulations trained convolutional neural network (CNN) can accurately predict crack lengths and positions in HDPE from experimentally measured ultrasound A-scan microsecond signals. Our method is based on the 1D time amplitude signal acquired over a very short time period and not based on 2D image analysis. The proposed methodology presents a pathway for training CNN using computationally generated data and applying the trained CNN in the field to quantify hidden cracks in large HDPE or other polymer structures.
△ Less
Submitted 7 June, 2024; v1 submitted 22 April, 2023;
originally announced April 2023.
-
A Multi-Fidelity Bayesian Approach to Safe Controller Design
Authors:
Ethan Lau,
Vaibhav Srivastava,
Shaunak D. Bopardikar
Abstract:
Safely controlling unknown dynamical systems is one of the biggest challenges in the field of control. Oftentimes, an approximate model of a system's dynamics exists which provides beneficial information for the selection of controls. However, differences between the approximate and true systems present challenges as well as safety concerns. We propose an algorithm called SAFE-SLOPE to safely eval…
▽ More
Safely controlling unknown dynamical systems is one of the biggest challenges in the field of control. Oftentimes, an approximate model of a system's dynamics exists which provides beneficial information for the selection of controls. However, differences between the approximate and true systems present challenges as well as safety concerns. We propose an algorithm called SAFE-SLOPE to safely evaluate points from a Gaussian process model of a function when its Lipschitz constant is unknown. We establish theoretical guarantees for the performance of SAFE-SLOPE and quantify how multi-fidelity modeling improves the algorithm's performance. Finally, we demonstrate how SAFE-SLOPE achieves lower cumulative regret than a naive sampling method by applying it to find the control gains of a linear time-invariant system.
△ Less
Submitted 9 August, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
Search for gravitational-lensing signatures in the full third observing run of the LIGO-Virgo network
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
C. Alléné,
A. Allocca,
P. A. Altin
, et al. (1670 additional authors not shown)
Abstract:
Gravitational lensing by massive objects along the line of sight to the source causes distortions of gravitational wave-signals; such distortions may reveal information about fundamental physics, cosmology and astrophysics. In this work, we have extended the search for lensing signatures to all binary black hole events from the third observing run of the LIGO--Virgo network. We search for repeated…
▽ More
Gravitational lensing by massive objects along the line of sight to the source causes distortions of gravitational wave-signals; such distortions may reveal information about fundamental physics, cosmology and astrophysics. In this work, we have extended the search for lensing signatures to all binary black hole events from the third observing run of the LIGO--Virgo network. We search for repeated signals from strong lensing by 1) performing targeted searches for subthreshold signals, 2) calculating the degree of overlap amongst the intrinsic parameters and sky location of pairs of signals, 3) comparing the similarities of the spectrograms amongst pairs of signals, and 4) performing dual-signal Bayesian analysis that takes into account selection effects and astrophysical knowledge. We also search for distortions to the gravitational waveform caused by 1) frequency-independent phase shifts in strongly lensed images, and 2) frequency-dependent modulation of the amplitude and phase due to point masses. None of these searches yields significant evidence for lensing. Finally, we use the non-detection of gravitational-wave lensing to constrain the lensing rate based on the latest merger-rate estimates and the fraction of dark matter composed of compact objects.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
A large deformation model for quasi-static to high strain rate response of a rate-stiffening soft polymer
Authors:
Aditya Konale,
Zahra Ahmed,
Piyush Wanchoo,
Vikas Srivastava
Abstract:
Polyborosiloxane (PBS) is an important rate-stiffening soft polymer with dynamic, reversible crosslinks used in applications ranging from self-healing sensing and actuation to body and structural protection. Its highly rate-dependent response, especially for impact-mitigating structures, is important. However, the large strain response of PBS has not been characterized over quasi-static to high st…
▽ More
Polyborosiloxane (PBS) is an important rate-stiffening soft polymer with dynamic, reversible crosslinks used in applications ranging from self-healing sensing and actuation to body and structural protection. Its highly rate-dependent response, especially for impact-mitigating structures, is important. However, the large strain response of PBS has not been characterized over quasi-static to high strain rates. Currently, there are no constitutive models that can predict the strongly rate-dependent large-deformation elastic-viscoplastic response of PBS. To address this gap, we have developed a microstructural physics motivated constitutive model for PBS and similar soft polymers and polymer gels with dynamic crosslinks to predict their large strain, non-linear loading-unloading, and significantly rate-dependent response. We have conducted compression experiments on PBS up to true strains of $\sim$125$\%$ over a wide strain rate range of 10$^{-3}$ s$^{-1}$ to 10$^{3}$ s$^{-1}$. The model reasonably accurately captures the response of PBS over six decades of strain rates. We propose boron-oxygen coordinate-bond dynamic crosslinks with macroscopic relaxation timescale $τ\approx 3$ s and temporary entanglement lockups at high strain rates acting as crosslinks with $τ\approx 0.0005$ s as the two types of crosslink mechanisms in PBS. We have outlined a numerical update procedure to evaluate the convolution-like time integrals arising from dynamic crosslink kinetics. Experiments involving three-dimensional inhomogeneous deformations were used to verify the predictive capabilities of our model and its finite element implementation. The modeling framework can be adopted for other dynamically crosslinked rate-stiffening soft polymers and polymer gels that are microstructurally similar to PBS.
△ Less
Submitted 18 July, 2023; v1 submitted 10 April, 2023;
originally announced April 2023.
-
MMT: A Multilingual and Multi-Topic Indian Social Media Dataset
Authors:
Dwip Dalal,
Vivek Srivastava,
Mayank Singh
Abstract:
Social media plays a significant role in cross-cultural communication. A vast amount of this occurs in code-mixed and multilingual form, posing a significant challenge to Natural Language Processing (NLP) tools for processing such information, like language identification, topic modeling, and named-entity recognition. To address this, we introduce a large-scale multilingual, and multi-topic datase…
▽ More
Social media plays a significant role in cross-cultural communication. A vast amount of this occurs in code-mixed and multilingual form, posing a significant challenge to Natural Language Processing (NLP) tools for processing such information, like language identification, topic modeling, and named-entity recognition. To address this, we introduce a large-scale multilingual, and multi-topic dataset (MMT) collected from Twitter (1.7 million Tweets), encompassing 13 coarse-grained and 63 fine-grained topics in the Indian context. We further annotate a subset of 5,346 tweets from the MMT dataset with various Indian languages and their code-mixed counterparts. Also, we demonstrate that the currently existing tools fail to capture the linguistic diversity in MMT on two downstream tasks, i.e., topic modeling and language identification. To facilitate future research, we will make the anonymized and annotated dataset available in the public domain.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
Non-Local Multi-Qubit Quantum Gates via a Driven Cavity
Authors:
Sven Jandura,
Vineesha Srivastava,
Laura Pecorari,
Gavin Brennen,
Guido Pupillo
Abstract:
We present two protocols for implementing deterministic non-local multi-qubit quantum gates on qubits coupled to a common cavity mode. The protocols rely only on a classical drive of the cavity modes, while no external drive of the qubits is required. In the first protocol, the state of the cavity follows a closed trajectory in phase space and accumulates a geometric phase depending on the state o…
▽ More
We present two protocols for implementing deterministic non-local multi-qubit quantum gates on qubits coupled to a common cavity mode. The protocols rely only on a classical drive of the cavity modes, while no external drive of the qubits is required. In the first protocol, the state of the cavity follows a closed trajectory in phase space and accumulates a geometric phase depending on the state of the qubits. The second protocol uses an adiabatic evolution of the combined qubit-cavity system to accumulate a dynamical phase. Repeated applications of this protocol allow for the realization of phase gates with arbitrary phases, e.g. phase-rotation gates and multi-controlled-Z gates. For both protocols, we provide analytic solutions for the error rates, which scale as $\sim N/\sqrt{C}$, with $C$ the cooperativity and $N$ the qubit number. Our protocols are applicable to a variety of systems and can be generalized by replacing the cavity by a different bosonic mode, such as a phononic mode. We provide estimates of gate fidelities and durations for atomic and molecular qubits coupled to optical or microwave cavities, and suggest applications for quantum error correction.
△ Less
Submitted 29 October, 2023; v1 submitted 23 March, 2023;
originally announced March 2023.
-
Dynamical Analysis of a Lotka-Volterra Competition Model with both Allee and Fear Effect
Authors:
Shangming Chen,
Fengde Chen,
Vaibhava Srivastava,
Rana D. Parshad
Abstract:
Population ecology theory is replete with density dependent processes. However trait-mediated or behavioral indirect interactions can both reinforce or oppose density-dependent effects. This paper presents the first two species competitive ODE and PDE systems where an Allee effect, which is a density dependent process and the fear effect, which is non-consumptive and behavioral are both present. T…
▽ More
Population ecology theory is replete with density dependent processes. However trait-mediated or behavioral indirect interactions can both reinforce or oppose density-dependent effects. This paper presents the first two species competitive ODE and PDE systems where an Allee effect, which is a density dependent process and the fear effect, which is non-consumptive and behavioral are both present. The stability of the equilibria is discussed analytically using the qualitative theory of ordinary differential equations. It is found that the Allee effect and the fear effect change the extinction dynamics of the system and the number of positive equilibrium points, but they do not affect the stability of the positive equilibria. We also observe some special dynamics that induce bifurcations in the system by varying the Allee or fear parameter. Interestingly we find that the Allee effect working in conjunction with the fear effect, can bring about several qualitative changes to the dynamical behavior of the system with only the fear effect in place, in regimes of small fear. That is, for small amounts of the fear parameter, it can change a competitive exclusion type situation to a strong competition type situation. It can also change a weak competition type situation to a bi-stability type situation. However for large fear regimes the Allee effect reinforces the dynamics driven by the fear effect. The analysis of the corresponding spatially explicit model is also presented. To this end the comparison principle for parabolic PDE is used. The conclusions of this paper have strong implications for conservation biology, biological control as well as the preservation of biodiversity.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
MUTANT: A Multi-sentential Code-mixed Hinglish Dataset
Authors:
Rahul Gupta,
Vivek Srivastava,
Mayank Singh
Abstract:
The multi-sentential long sequence textual data unfolds several interesting research directions pertaining to natural language processing and generation. Though we observe several high-quality long-sequence datasets for English and other monolingual languages, there is no significant effort in building such resources for code-mixed languages such as Hinglish (code-mixing of Hindi-English). In this…
▽ More
The multi-sentential long sequence textual data unfolds several interesting research directions pertaining to natural language processing and generation. Though we observe several high-quality long-sequence datasets for English and other monolingual languages, there is no significant effort in building such resources for code-mixed languages such as Hinglish (code-mixing of Hindi-English). In this paper, we propose a novel task of identifying multi-sentential code-mixed text (MCT) from multilingual articles. As a use case, we leverage multilingual articles from two different data sources and build a first-of-its-kind multi-sentential code-mixed Hinglish dataset i.e., MUTANT. We propose a token-level language-aware pipeline and extend the existing metrics measuring the degree of code-mixing to a multi-sentential framework and automatically identify MCT in the multilingual articles. The MUTANT dataset comprises 67k articles with 85k identified Hinglish MCTs. To facilitate future research, we make the publicly available.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
PRAGTHOS:Practical Game Theoretically Secure Proof-of-Work Blockchain
Authors:
Varul Srivastava,
Dr. Sujit Gujar
Abstract:
Security analysis of blockchain technology is an active domain of research. There has been both cryptographic and game-theoretic security analysis of Proof-of-Work (PoW) blockchains. Prominent work includes the cryptographic security analysis under the Universal Composable framework and Game-theoretic security analysis using Rational Protocol Design. These security analysis models rely on stricter…
▽ More
Security analysis of blockchain technology is an active domain of research. There has been both cryptographic and game-theoretic security analysis of Proof-of-Work (PoW) blockchains. Prominent work includes the cryptographic security analysis under the Universal Composable framework and Game-theoretic security analysis using Rational Protocol Design. These security analysis models rely on stricter assumptions that might not hold. In this paper, we analyze the security of PoW blockchain protocols. We first show how assumptions made by previous models need not be valid in reality, which attackers can exploit to launch attacks that these models fail to capture. These include Difficulty Alternating Attack, under which forking is possible for an adversary with less than 0.5 mining power, Quick-Fork Attack, a general bound on selfish mining attack and transaction withholding attack. Following this, we argue why previous models for security analysis fail to capture these attacks and propose a more practical framework for security analysis pRPD. We then propose a framework to build PoW blockchains PRAGTHOS, which is secure from the attacks mentioned above. Finally, we argue that PoW blockchains complying with the PRAGTHOS framework are secure against a computationally bounded adversary under certain conditions on the reward scheme.
△ Less
Submitted 13 February, 2023;
originally announced February 2023.
-
Incorporating Total Variation Regularization in the design of an intelligent Query by Humming system
Authors:
Shivangi Ranjan,
Vishal Srivastava
Abstract:
A Query-By-Humming (QBH) system constitutes a particular case of music information retrieval where the input is a user-hummed melody and the output is the original song which contains that melody. A typical QBH system consists of melody extraction and candidate melody retrieval.
For melody extraction, accurate note transcription is the key enabling technology. However, current transcription meth…
▽ More
A Query-By-Humming (QBH) system constitutes a particular case of music information retrieval where the input is a user-hummed melody and the output is the original song which contains that melody. A typical QBH system consists of melody extraction and candidate melody retrieval.
For melody extraction, accurate note transcription is the key enabling technology. However, current transcription methods are unable to definitively capture the melody and address inaccuracies in user-hummed queries. In this paper, we incorporate Total Variation Regularization (TVR) to denoise queries. This approach accounts for user error in humming without loss of meaningful data and reliably captures the underlying melody.
For candidate melody retrieval, we employ a deep learning approach to time series classification using a Fully Convolutional Neural Network. The trained network classifies the incoming query as belonging to one of the target songs.
For our experiments, we use Roger Jang's MIR-QBSH dataset which is the standard MIREX dataset. We demonstrate that inclusion of TVR denoised queries in the training set enhances the overall accuracy of the system to 93% which is higher than other state-of-the-art QBH systems.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Open data from the third observing run of LIGO, Virgo, KAGRA and GEO
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
A. Al-Jodah,
C. Alléné,
A. Allocca
, et al. (1719 additional authors not shown)
Abstract:
The global network of gravitational-wave observatories now includes five detectors, namely LIGO Hanford, LIGO Livingston, Virgo, KAGRA, and GEO 600. These detectors collected data during their third observing run, O3, composed of three phases: O3a starting in April of 2019 and lasting six months, O3b starting in November of 2019 and lasting five months, and O3GK starting in April of 2020 and lasti…
▽ More
The global network of gravitational-wave observatories now includes five detectors, namely LIGO Hanford, LIGO Livingston, Virgo, KAGRA, and GEO 600. These detectors collected data during their third observing run, O3, composed of three phases: O3a starting in April of 2019 and lasting six months, O3b starting in November of 2019 and lasting five months, and O3GK starting in April of 2020 and lasting 2 weeks. In this paper we describe these data and various other science products that can be freely accessed through the Gravitational Wave Open Science Center at https://gwosc.org. The main dataset, consisting of the gravitational-wave strain time series that contains the astrophysical signals, is released together with supporting data useful for their analysis and documentation, tutorials, as well as analysis software packages.
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
Shapeception: Unravelling Brain Activity during Animated Shape Perception and Mentalization
Authors:
Varad Srivastava,
Minaxi Goel
Abstract:
In this paper, we investigate the brain activity elicited during perception of animated shapes as stimuli, which have been found to evoke mental state attributions. Contrary to a previous study, we incorporated the participants' responses in the analysis, and observed robust activations in mPFC, which has been found to play an important role in understanding other's and one's own nature. From our…
▽ More
In this paper, we investigate the brain activity elicited during perception of animated shapes as stimuli, which have been found to evoke mental state attributions. Contrary to a previous study, we incorporated the participants' responses in the analysis, and observed robust activations in mPFC, which has been found to play an important role in understanding other's and one's own nature. From our analyses, TPOj was observed showing robust activation during the task as well as functionally connected to AA and LTC, which lead to speculation that empathy might co-occur with mentalizing in the task and that humans might be able to empathize with these interacting shapes, in spite of lacking human features. Along with this, in one of our analyses, we were able to localize a region close to the pSTS, where the activation depicted the participants' 'ability to mentalize'. Based on our observations, we modelled the prediction of mentalization and propose our model as an approach towards developing a brain-activity based model to detect ToM (Theory of Mind) difficulties, which could be useful in research about disorders like Autism Spectrum Disorder (ASD) as well as assessment of mentalization-based treatments. Additionally, we use our findings to reiterate how the Resting State might not always act as a good control condition and that control conditions should be task-specific.
△ Less
Submitted 21 November, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Search for subsolar-mass black hole binaries in the second part of Advanced LIGO's and Advanced Virgo's third observing run
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
C. Alléné,
A. Allocca,
P. A. Altin
, et al. (1680 additional authors not shown)
Abstract:
We describe a search for gravitational waves from compact binaries with at least one component with mass 0.2 $M_\odot$ -- $1.0 M_\odot$ and mass ratio $q \geq 0.1$ in Advanced LIGO and Advanced Virgo data collected between 1 November 2019, 15:00 UTC and 27 March 2020, 17:00 UTC. No signals were detected. The most significant candidate has a false alarm rate of 0.2 $\mathrm{yr}^{-1}$. We estimate t…
▽ More
We describe a search for gravitational waves from compact binaries with at least one component with mass 0.2 $M_\odot$ -- $1.0 M_\odot$ and mass ratio $q \geq 0.1$ in Advanced LIGO and Advanced Virgo data collected between 1 November 2019, 15:00 UTC and 27 March 2020, 17:00 UTC. No signals were detected. The most significant candidate has a false alarm rate of 0.2 $\mathrm{yr}^{-1}$. We estimate the sensitivity of our search over the entirety of Advanced LIGO's and Advanced Virgo's third observing run, and present the most stringent limits to date on the merger rate of binary black holes with at least one subsolar-mass component. We use the upper limits to constrain two fiducial scenarios that could produce subsolar-mass black holes: primordial black holes (PBH) and a model of dissipative dark matter. The PBH model uses recent prescriptions for the merger rate of PBH binaries that include a rate suppression factor to effectively account for PBH early binary disruptions. If the PBHs are monochromatically distributed, we can exclude a dark matter fraction in PBHs $f_\mathrm{PBH} \gtrsim 0.6$ (at 90% confidence) in the probed subsolar-mass range. However, if we allow for broad PBH mass distributions we are unable to rule out $f_\mathrm{PBH} = 1$. For the dissipative model, where the dark matter has chemistry that allows a small fraction to cool and collapse into black holes, we find an upper bound $f_{\mathrm{DBH}} < 10^{-5}$ on the fraction of atomic dark matter collapsed into black holes.
△ Less
Submitted 26 January, 2024; v1 submitted 2 December, 2022;
originally announced December 2022.
-
On a new measure on the Levi-Civita field $\mathcal{R}$
Authors:
Mateo Restrepo Borrero,
Vatsal Srivastava,
Khodr Shamseddine
Abstract:
The Levi-Civita field $\mathcal{R}$ is the smallest non-Archimidean ordered field extension of the real numbers that is real closed and Cauchy complete in the topology induced by the order. In an earlier paper [Shamseddine-Berz-2003], a measure was defined on $\mathcal{R}$ in terms of the limit of the sums of the lengths of inner and outer covers of a set by countable unions of intervals as those…
▽ More
The Levi-Civita field $\mathcal{R}$ is the smallest non-Archimidean ordered field extension of the real numbers that is real closed and Cauchy complete in the topology induced by the order. In an earlier paper [Shamseddine-Berz-2003], a measure was defined on $\mathcal{R}$ in terms of the limit of the sums of the lengths of inner and outer covers of a set by countable unions of intervals as those inner and outer sums get closer together. That definition proved useful in developing an integration theory over $\mathcal{R}$ in which the integral satisfies many of the essential properties of the Lebesgue integral of real analysis. Nevertheless, that measure theory lacks some intuitive results that one would expect in any reasonable definition for a measure; for example, the complement of a measurable set within another measurable set need not be measurable.
In this paper, we will give a characterization for the measurable sets defined in [Shamseddine-Berz-2003]. Then we will introduce the notion of an outer measure on $\mathcal{R}$ and show some key properties the outer measure has. Finally, we will use the notion of outer measure to define a new measure on $\mathcal{R}$ that proves to be a better generalization of the Lebesgue measure from $\mathbb{R}$ to $\mathcal{R}$ and that leads to a family of measurable sets in $\mathcal{R}$ that strictly contains the family of measurable sets from [Shamseddine-Berz-2003], and for which most of the classic results for Lebesgue measurable sets in $\mathbb{R}$ hold.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
SIS Epidemic Spreading under Multi-layer Population Dispersal in Patchy Environments
Authors:
Vishal Abhishek,
Vaibhav Srivastava
Abstract:
We study SIS epidemic spreading models under population dispersal on multi-layer networks. We consider a patchy environment in which each patch comprises individuals belonging to different classes. Individuals disperse to other patches on a multi-layer network in which each layer corresponds to a class. The dispersal on each layer is modeled by a Continuous Time Markov Chain (CTMC). At each time,…
▽ More
We study SIS epidemic spreading models under population dispersal on multi-layer networks. We consider a patchy environment in which each patch comprises individuals belonging to different classes. Individuals disperse to other patches on a multi-layer network in which each layer corresponds to a class. The dispersal on each layer is modeled by a Continuous Time Markov Chain (CTMC). At each time, individuals disperse according to their CTMC and subsequently interact with the local individuals in the patch according to an SIS model. We establish the existence of various equilibria under different parameter regimes and establish their (almost) global asymptotic stability using Lyapunov techniques. We also derive simple conditions that highlight the influence of the multi-layer network on the stability of these equilibria. For this model, we study optimal intervention strategies using a convex optimization framework. Finally, we numerically illustrate the influence of the multi-layer network structure and the effectiveness of the optimal intervention strategies.
△ Less
Submitted 31 October, 2022;
originally announced November 2022.
-
Search for gravitational-wave transients associated with magnetar bursts in Advanced LIGO and Advanced Virgo data from the third observing run
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
K. Agatsuma,
N. Aggarwal,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
A. Allocca,
P. A. Altin
, et al. (1645 additional authors not shown)
Abstract:
Gravitational waves are expected to be produced from neutron star oscillations associated with magnetar giant flares and short bursts. We present the results of a search for short-duration (milliseconds to seconds) and long-duration ($\sim$ 100 s) transient gravitational waves from 13 magnetar short bursts observed during Advanced LIGO, Advanced Virgo and KAGRA's third observation run. These 13 bu…
▽ More
Gravitational waves are expected to be produced from neutron star oscillations associated with magnetar giant flares and short bursts. We present the results of a search for short-duration (milliseconds to seconds) and long-duration ($\sim$ 100 s) transient gravitational waves from 13 magnetar short bursts observed during Advanced LIGO, Advanced Virgo and KAGRA's third observation run. These 13 bursts come from two magnetars, SGR 1935$+$2154 and Swift J1818.0$-$1607. We also include three other electromagnetic burst events detected by Fermi GBM which were identified as likely coming from one or more magnetars, but they have no association with a known magnetar. No magnetar giant flares were detected during the analysis period. We find no evidence of gravitational waves associated with any of these 16 bursts. We place upper bounds on the root-sum-square of the integrated gravitational-wave strain that reach $2.2 \times 10^{-23}$ $/\sqrt{\text{Hz}}$ at 100 Hz for the short-duration search and $8.7 \times 10^{-23}$ $/\sqrt{\text{Hz}}$ at $450$ Hz for the long-duration search, given a detection efficiency of 50%. For a ringdown signal at 1590 Hz targeted by the short-duration search the limit is set to $1.8 \times 10^{-22}$ $/\sqrt{\text{Hz}}$. Using the estimated distance to each magnetar, we derive upper bounds on the emitted gravitational-wave energy of $3.2 \times 10^{43}$ erg ($7.3 \times 10^{43}$ erg) for SGR 1935$+$2154 and $8.2 \times 10^{42}$ erg ($2.8 \times 10^{43}$ erg) for Swift J1818.0$-$1607, for the short-duration (long-duration) search. Assuming isotropic emission of electromagnetic radiation of the burst fluences, we constrain the ratio of gravitational-wave energy to electromagnetic energy for bursts from SGR 1935$+$2154 with available fluence information. The lowest of these ratios is $3 \times 10^3$.
△ Less
Submitted 19 October, 2022;
originally announced October 2022.
-
The effect of "fear" on two species competition
Authors:
Vaibhava Srivastava,
Eric M. Takyi,
Rana D. Parshad
Abstract:
Non-consumptive effects such as fear of depredation, can strongly influence predator-prey dynamics. These effects have not been as well studied in the case of purely competitive systems, despite ecological and social motivations for the same. In this work we consider the classic two species ODE and PDE Lokta-Volterra competition models, where \emph{one} of the competitors is "fearful" of the other…
▽ More
Non-consumptive effects such as fear of depredation, can strongly influence predator-prey dynamics. These effects have not been as well studied in the case of purely competitive systems, despite ecological and social motivations for the same. In this work we consider the classic two species ODE and PDE Lokta-Volterra competition models, where \emph{one} of the competitors is "fearful" of the other. We find that the presence of fear can have several interesting dynamical effects on the classical scenarios of weak and strong competition, and competitive exclusion. Notably, for fear levels in certain regimes, we show bi-stability between interior equilibrium and boundary equilibrium is possible - contrary to the classical strong competition situation where bi-stability is only possible between boundary equilibrium. Furthermore, in the spatially explicit setting, the effects of several spatially heterogeneous fear functions are investigated. In particular, we show that under certain $\mathbb{L}^{1}$ restrictions on the fear function, a weak competition type situation can change to competitive exclusion. Applications of these results to ecological as well as sociopolitical settings are discussed, that connect to the "landscape of fear" (LOF) concept in ecology.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Coupled Evolutionary Behavioral and Disease Dynamics under Reinfection Risk
Authors:
Abhisek Satapathi,
Narendra Kumar Dhar,
Ashish R. Hota,
Vaibhav Srivastava
Abstract:
We study the interplay between epidemic dynamics and human decision making for epidemics that involve reinfection risk; in particular, the susceptible-infected-susceptible (SIS) and the susceptible-infected-recovered-infected (SIRI) epidemic models. In the proposed game-theoretic setting, individuals choose whether to adopt protection or not based on the trade-off between the cost of adopting prot…
▽ More
We study the interplay between epidemic dynamics and human decision making for epidemics that involve reinfection risk; in particular, the susceptible-infected-susceptible (SIS) and the susceptible-infected-recovered-infected (SIRI) epidemic models. In the proposed game-theoretic setting, individuals choose whether to adopt protection or not based on the trade-off between the cost of adopting protection and the risk of infection; the latter depends on the current prevalence of the epidemic and the fraction of individuals who adopt protection in the entire population. We define the coupled epidemic-behavioral dynamics by modeling the evolution of individual protection adoption behavior according to the replicator dynamics. For the SIS epidemic, we fully characterize the equilibria and their stability properties. We further analyze the coupled dynamics under timescale separation when individual behavior evolves faster than the epidemic, and characterize the equilibria of the resulting discontinuous hybrid dynamical system for both SIS and SIRI models. Numerical results illustrate how the coupled dynamics exhibits oscillatory behavior and convergence to sliding mode solutions under suitable parameter regimes.
△ Less
Submitted 29 May, 2023; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Deterministic Sequencing of Exploration and Exploitation for Reinforcement Learning
Authors:
Piyush Gupta,
Vaibhav Srivastava
Abstract:
We propose Deterministic Sequencing of Exploration and Exploitation (DSEE) algorithm with interleaving exploration and exploitation epochs for model-based RL problems that aim to simultaneously learn the system model, i.e., a Markov decision process (MDP), and the associated optimal policy. During exploration, DSEE explores the environment and updates the estimates for expected reward and transiti…
▽ More
We propose Deterministic Sequencing of Exploration and Exploitation (DSEE) algorithm with interleaving exploration and exploitation epochs for model-based RL problems that aim to simultaneously learn the system model, i.e., a Markov decision process (MDP), and the associated optimal policy. During exploration, DSEE explores the environment and updates the estimates for expected reward and transition probabilities. During exploitation, the latest estimates of the expected reward and transition probabilities are used to obtain a robust policy with high probability. We design the lengths of the exploration and exploitation epochs such that the cumulative regret grows as a sub-linear function of time.
△ Less
Submitted 19 December, 2022; v1 submitted 12 September, 2022;
originally announced September 2022.
-
Model-based cross-correlation search for gravitational waves from the low-mass X-ray binary Scorpius X-1 in LIGO O3 data
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
C. Alléné,
A. Allocca,
P. A. Altin
, et al. (1670 additional authors not shown)
Abstract:
We present the results of a model-based search for continuous gravitational waves from the low-mass X-ray binary Scorpius X-1 using LIGO detector data from the third observing run of Advanced LIGO, Advanced Virgo and KAGRA. This is a semicoherent search which uses details of the signal model to coherently combine data separated by less than a specified coherence time, which can be adjusted to bala…
▽ More
We present the results of a model-based search for continuous gravitational waves from the low-mass X-ray binary Scorpius X-1 using LIGO detector data from the third observing run of Advanced LIGO, Advanced Virgo and KAGRA. This is a semicoherent search which uses details of the signal model to coherently combine data separated by less than a specified coherence time, which can be adjusted to balance sensitivity with computing cost. The search covered a range of gravitational-wave frequencies from 25Hz to 1600Hz, as well as ranges in orbital speed, frequency and phase determined from observational constraints. No significant detection candidates were found, and upper limits were set as a function of frequency. The most stringent limits, between 100Hz and 200Hz, correspond to an amplitude h0 of about 1e-25 when marginalized isotropically over the unknown inclination angle of the neutron star's rotation axis, or less than 4e-26 assuming the optimal orientation. The sensitivity of this search is now probing amplitudes predicted by models of torque balance equilibrium. For the usual conservative model assuming accretion at the surface of the neutron star, our isotropically-marginalized upper limits are close to the predicted amplitude from about 70Hz to 100Hz; the limits assuming the neutron star spin is aligned with the most likely orbital angular momentum are below the conservative torque balance predictions from 40Hz to 200Hz. Assuming a broader range of accretion models, our direct limits on gravitational-wave amplitude delve into the relevant parameter space over a wide range of frequencies, to 500Hz or more.
△ Less
Submitted 2 January, 2023; v1 submitted 6 September, 2022;
originally announced September 2022.
-
Multiple Attribute Fairness: Application to Fraud Detection
Authors:
Meghanath Macha Y,
Sriram Ravindran,
Deepak Pai,
Anish Narang,
Vijay Srivastava
Abstract:
We propose a fairness measure relaxing the equality conditions in the popular equal odds fairness regime for classification. We design an iterative, model-agnostic, grid-based heuristic that calibrates the outcomes per sensitive attribute value to conform to the measure. The heuristic is designed to handle high arity attribute values and performs a per attribute sanitization of outcomes across dif…
▽ More
We propose a fairness measure relaxing the equality conditions in the popular equal odds fairness regime for classification. We design an iterative, model-agnostic, grid-based heuristic that calibrates the outcomes per sensitive attribute value to conform to the measure. The heuristic is designed to handle high arity attribute values and performs a per attribute sanitization of outcomes across different protected attribute values. We also extend our heuristic for multiple attributes. Highlighting our motivating application, fraud detection, we show that the proposed heuristic is able to achieve fairness across multiple values of a single protected attribute, multiple protected attributes. When compared to current fairness techniques, that focus on two groups, we achieve comparable performance across several public data sets.
△ Less
Submitted 28 July, 2022;
originally announced July 2022.
-
A Non-intrusive Approach for Physics-constrained Learning with Application to Fuel Cell Modeling
Authors:
Vishal Srivastava,
Valentin Sulzer,
Peyman Mohtat,
Jason B. Siegel,
Karthik Duraisamy
Abstract:
A data-driven model augmentation framework, referred to as Weakly-coupled Integrated Inference and Machine Learning (IIML), is presented to improve the predictive accuracy of physical models. In contrast to parameter calibration, this work seeks corrections to the structure of the model by a) inferring augmentation fields that are consistent with the underlying model, and b) transforming these fie…
▽ More
A data-driven model augmentation framework, referred to as Weakly-coupled Integrated Inference and Machine Learning (IIML), is presented to improve the predictive accuracy of physical models. In contrast to parameter calibration, this work seeks corrections to the structure of the model by a) inferring augmentation fields that are consistent with the underlying model, and b) transforming these fields into corrective model forms. The proposed approach couples the inference and learning steps in a weak sense via an alternating optimization approach. This coupling ensures that the augmentation fields remain learnable and maintain consistent functional relationships with local modeled quantities across the training dataset. An iterative solution procedure is presented in this paper, removing the need to embed the augmentation function during the inference process. This framework is used to infer an augmentation introduced within a Polymer electrolyte membrane fuel cell (PEMFC) model using a small amount of training data (from only 14 training cases.) These training cases belong to a dataset consisting of high-fidelity simulation data obtained from a high-fidelity model of a first generation Toyota Mirai. All cases in this dataset are characterized by different inflow and outflow conditions on the same geometry. When tested on 1224 different configurations, the inferred augmentation significantly improves the predictive accuracy for a wide range of physical conditions. Predictions and available data for the current density distribution are also compared to demonstrate the predictive capability of the model for quantities of interest which were not involved in the inference process. The results demonstrate that the weakly-coupled IIML framework offers sophisticated and robust model augmentation capabilities without requiring extensive changes to the numerical solver.
△ Less
Submitted 30 June, 2022;
originally announced July 2022.
-
Search for continuous gravitational wave emission from the Milky Way center in O3 LIGO--Virgo data
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
K. Agatsuma,
N. Aggarwal,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
A. Allocca,
P. A. Altin
, et al. (1645 additional authors not shown)
Abstract:
We present a directed search for continuous gravitational wave (CW) signals emitted by spinning neutron stars located in the inner parsecs of the Galactic Center (GC). Compelling evidence for the presence of a numerous population of neutron stars has been reported in the literature, turning this region into a very interesting place to look for CWs. In this search, data from the full O3 LIGO--Virgo…
▽ More
We present a directed search for continuous gravitational wave (CW) signals emitted by spinning neutron stars located in the inner parsecs of the Galactic Center (GC). Compelling evidence for the presence of a numerous population of neutron stars has been reported in the literature, turning this region into a very interesting place to look for CWs. In this search, data from the full O3 LIGO--Virgo run in the detector frequency band $[10,2000]\rm~Hz$ have been used. No significant detection was found and 95$\%$ confidence level upper limits on the signal strain amplitude were computed, over the full search band, with the deepest limit of about $7.6\times 10^{-26}$ at $\simeq 142\rm~Hz$. These results are significantly more constraining than those reported in previous searches. We use these limits to put constraints on the fiducial neutron star ellipticity and r-mode amplitude. These limits can be also translated into constraints in the black hole mass -- boson mass plane for a hypothetical population of boson clouds around spinning black holes located in the GC.
△ Less
Submitted 9 April, 2022;
originally announced April 2022.
-
Search for Gravitational Waves Associated with Fast Radio Bursts Detected by CHIME/FRB During the LIGO--Virgo Observing Run O3a
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
the CHIME/FRB Collaboration,
:,
R. Abbott,
T. D. Abbott,
F. Acernese,
K. Ackley,
C. Adams,
N. Adhikari,
R. X. Adhikari,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
K. Agatsuma,
N. Aggarwal,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
A. Allocca
, et al. (1633 additional authors not shown)
Abstract:
We search for gravitational-wave transients associated with fast radio bursts (FRBs) detected by the Canadian Hydrogen Intensity Mapping Experiment Fast Radio Burst Project (CHIME/FRB), during the first part of the third observing run of Advanced LIGO and Advanced Virgo (1 April 2019 15:00 UTC-1 Oct 2019 15:00 UTC). Triggers from 22 FRBs were analyzed with a search that targets compact binary coal…
▽ More
We search for gravitational-wave transients associated with fast radio bursts (FRBs) detected by the Canadian Hydrogen Intensity Mapping Experiment Fast Radio Burst Project (CHIME/FRB), during the first part of the third observing run of Advanced LIGO and Advanced Virgo (1 April 2019 15:00 UTC-1 Oct 2019 15:00 UTC). Triggers from 22 FRBs were analyzed with a search that targets compact binary coalescences with at least one neutron star component. A targeted search for generic gravitational-wave transients was conducted on 40 FRBs. We find no significant evidence for a gravitational-wave association in either search. Given the large uncertainties in the distances of the FRBs inferred from the dispersion measures in our sample, however, this does not conclusively exclude any progenitor models that include emission of a gravitational wave of the types searched for from any of these FRB events. We report $90\%$ confidence lower bounds on the distance to each FRB for a range of gravitational-wave progenitor models. By combining the inferred maximum distance information for each FRB with the sensitivity of the gravitational-wave searches, we set upper limits on the energy emitted through gravitational waves for a range of emission scenarios. We find values of order $10^{51}$-$10^{57}$ erg for a range of different emission models with central gravitational wave frequencies in the range 70-3560 Hz. Finally, we also found no significant coincident detection of gravitational waves with the repeater, FRB 20200120E, which is the closest known extragalactic FRB.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Epidemic Propagation under Evolutionary Behavioral Dynamics: Stability and Bifurcation Analysis
Authors:
Abhisek Satapathi,
Narendra Kumar Dhar,
Ashish R. Hota,
Vaibhav Srivastava
Abstract:
We consider the class of SIS epidemic models in which a large population of individuals chooses whether to adopt protection or to remain unprotected as the epidemic evolves. For a susceptible individual, adopting protection reduces the probability of becoming infected but it comes with a cost that is weighed with the instantaneous risk of becoming infected. An infected individual adopting protecti…
▽ More
We consider the class of SIS epidemic models in which a large population of individuals chooses whether to adopt protection or to remain unprotected as the epidemic evolves. For a susceptible individual, adopting protection reduces the probability of becoming infected but it comes with a cost that is weighed with the instantaneous risk of becoming infected. An infected individual adopting protection transmits a new infection with a smaller probability compared to an unprotected infected individual. We focus on the replicator evolutionary dynamics to model the evolution of protection decisions by susceptible and infected subpopulations. We completely characterize the existence and local stability of the equilibria of the resulting coupled epidemic and replicator dynamics. We further show how the stability of different equilibrium points gets exchanged as certain parameters change. Finally, we investigate the system behavior under timescale separation between the epidemic and the evolutionary dynamics.
△ Less
Submitted 19 March, 2022;
originally announced March 2022.
-
First joint observation by the underground gravitational-wave detector, KAGRA, with GEO600
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
R. Abbott,
H. Abe,
F. Acernese,
K. Ackley,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
K. Agatsuma,
N. Aggarwal,
O. D. Aguiar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi,
R. A. Alfaidi,
A. Allocca,
P. A. Altin
, et al. (1647 additional authors not shown)
Abstract:
We report the results of the first joint observation of the KAGRA detector with GEO600. KAGRA is a cryogenic and underground gravitational-wave detector consisting of a laser interferometer with three-kilometer arms, and located in Kamioka, Gifu, Japan. GEO600 is a British--German laser interferometer with 600 m arms, and located near Hannover, Germany. GEO600 and KAGRA performed a joint observing…
▽ More
We report the results of the first joint observation of the KAGRA detector with GEO600. KAGRA is a cryogenic and underground gravitational-wave detector consisting of a laser interferometer with three-kilometer arms, and located in Kamioka, Gifu, Japan. GEO600 is a British--German laser interferometer with 600 m arms, and located near Hannover, Germany. GEO600 and KAGRA performed a joint observing run from April 7 to 20, 2020. We present the results of the joint analysis of the GEO--KAGRA data for transient gravitational-wave signals, including the coalescence of neutron-star binaries and generic unmodeled transients. We also perform dedicated searches for binary coalescence signals and generic transients associated with gamma-ray burst events observed during the joint run. No gravitational-wave events were identified. We evaluate the minimum detectable amplitude for various types of transient signals and the spacetime volume for which the network is sensitive to binary neutron-star coalescences. We also place lower limits on the distances to the gamma-ray bursts analysed based on the non-detection of an associated gravitational-wave signal for several signal models, including binary coalescences. These analyses demonstrate the feasibility and utility of KAGRA as a member of the global gravitational-wave detector network.
△ Less
Submitted 19 August, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
Towards Modeling Human Motor Learning Dynamics in High-Dimensional Spaces
Authors:
Ankur Kamboj,
Rajiv Ranganathan,
Xiaobo Tan,
Vaibhav Srivastava
Abstract:
Designing effective rehabilitation strategies for upper extremities, particularly hands and fingers, warrants the need for a computational model of human motor learning. The presence of large degrees of freedom (DoFs) available in these systems makes it difficult to balance the trade-off between learning the full dexterity and accomplishing manipulation goals. The motor learning literature argues…
▽ More
Designing effective rehabilitation strategies for upper extremities, particularly hands and fingers, warrants the need for a computational model of human motor learning. The presence of large degrees of freedom (DoFs) available in these systems makes it difficult to balance the trade-off between learning the full dexterity and accomplishing manipulation goals. The motor learning literature argues that humans use motor synergies to reduce the dimension of control space. Using the low-dimensional space spanned by these synergies, we develop a computational model based on the internal model theory of motor control. We analyze the proposed model in terms of its convergence properties and fit it to the data collected from human experiments. We compare the performance of the fitted model to the experimental data and show that it captures human motor learning behavior well.
△ Less
Submitted 26 March, 2022; v1 submitted 6 February, 2022;
originally announced February 2022.
-
Science-Driven Tunable Design of Cosmic Explorer Detectors
Authors:
Varun Srivastava,
Derek Davis,
Kevin Kuns,
Philippe Landry,
Stefan Ballmer,
Matt Evans,
Evan Hall,
Jocelyn Read,
B. S. Sathyaprakash
Abstract:
Ground-based gravitational-wave detectors like Cosmic Explorer can be tuned to improve their sensitivity at high or low frequencies by tuning the response of the signal extraction cavity. Enhanced sensitivity above 2 kHz enables measurements of the post-merger gravitational-wave spectrum from binary neutron star mergers, which depends critically on the unknown equation of state of hot, ultra-dense…
▽ More
Ground-based gravitational-wave detectors like Cosmic Explorer can be tuned to improve their sensitivity at high or low frequencies by tuning the response of the signal extraction cavity. Enhanced sensitivity above 2 kHz enables measurements of the post-merger gravitational-wave spectrum from binary neutron star mergers, which depends critically on the unknown equation of state of hot, ultra-dense matter. Improved sensitivity below 500 Hz favors precision tests of extreme gravity with black hole ringdown signals and improves the detection prospects while facilitating an improved measurement of source properties for compact binary inspirals at cosmological distances. At intermediate frequencies, a more sensitive detector can better measure the tidal properties of neutron stars. We present and characterize the performance of tuned Cosmic Explorer configurations that are designed to optimize detections across different astrophysical source populations. These tuning options give Cosmic Explorer the flexibility to target a diverse set of science goals with the same detector infrastructure. We find that a 40 km Cosmic Explorer detector outperforms a 20 km in all key science goals other than access to post-merger physics. This suggests that Cosmic Explorer should include at least one 40 km facility.
△ Less
Submitted 12 July, 2022; v1 submitted 25 January, 2022;
originally announced January 2022.