-
Existence of a maximum flow rate in electro-osmotic systems
Authors:
Sleeba Varghese,
Billy D. Todd,
Jesper S. Hansen
Abstract:
In this work, we investigate the effect of the hydrodynamic wall-fluid friction in electro-osmotic flows. First, we present the solution to the electro-hydrodynamic equation for the electro-osmotic velocity profile, which is derived for an ionic system composed of cations immersed in uncharged solvent particles. The system (solution and walls) is kept electrically neutral using negatively charged…
▽ More
In this work, we investigate the effect of the hydrodynamic wall-fluid friction in electro-osmotic flows. First, we present the solution to the electro-hydrodynamic equation for the electro-osmotic velocity profile, which is derived for an ionic system composed of cations immersed in uncharged solvent particles. The system (solution and walls) is kept electrically neutral using negatively charged walls and will here be referred to as a "counterion-only" system. The theory predicts the existence of a counterion concentration that results in a maximum electro-osmotic flow rate, but only if the wall-fluid friction, or equivalently the slip length, is correlated with the system electrostatic screening length. Through equilibrium molecular dynamics simulations we precisely determine the hydrodynamic slip from the wall-fluid friction, and this is then used as input to the theoretical predictions. Comparison between the theory and independent non-equilibrium molecular dynamics simulation data confirms the existence of the maximum. Also, we find that standard hydrodynamic theory quantitatively agrees with simulation results for charged nanoscale systems for sufficiently small charge densities and ion charges, if the correct slip boundaries are applied.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
View-Invariant Pixelwise Anomaly Detection in Multi-object Scenes with Adaptive View Synthesis
Authors:
Subin Varghese,
Vedhus Hoskere
Abstract:
The inspection and monitoring of infrastructure assets typically requires identifying visual anomalies in scenes periodically photographed over time. Images collected manually or with robots such as unmanned aerial vehicles from the same scene at different instances in time are typically not perfectly aligned. Supervised segmentation methods can be applied to identify known problems, but unsupervi…
▽ More
The inspection and monitoring of infrastructure assets typically requires identifying visual anomalies in scenes periodically photographed over time. Images collected manually or with robots such as unmanned aerial vehicles from the same scene at different instances in time are typically not perfectly aligned. Supervised segmentation methods can be applied to identify known problems, but unsupervised anomaly detection approaches are required when unknown anomalies occur. Current unsupervised pixel-level anomaly detection methods have mainly been developed for industrial settings where the camera position is known and constant. However, we find that these methods fail to generalize to the case when images are not perfectly aligned. We term the problem of unsupervised anomaly detection between two such imperfectly aligned sets of images as Scene Anomaly Detection (Scene AD). We present a novel network termed OmniAD to address the Scene AD problem posed. Specifically, we refine the anomaly detection method reverse distillation to achieve a 40% increase in pixel-level anomaly detection performance. The network's performance is further demonstrated to improve with two new data augmentation strategies proposed that leverage novel view synthesis and camera localization to improve generalization. We validate our approach with qualitative and quantitative results on a new dataset, ToyCity, the first Scene AD dataset with multiple objects, as well as on the established single object-centric dataset, MAD. https://drags99.github.io/OmniAD/
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
The Model Openness Framework: Promoting Completeness and Openness for Reproducibility, Transparency, and Usability in Artificial Intelligence
Authors:
Matt White,
Ibrahim Haddad,
Cailean Osborne,
Xiao-Yang Liu Yanglet,
Ahmed Abdelmonsef,
Sachin Varghese
Abstract:
Generative AI (GAI) offers unprecedented opportunities for research and innovation, but its commercialization has raised concerns about transparency, reproducibility, and safety. Many open GAI models lack the necessary components for full understanding and reproducibility, and some use restrictive licenses whilst claiming to be ``open-source''. To address these concerns, we propose the Model Openn…
▽ More
Generative AI (GAI) offers unprecedented opportunities for research and innovation, but its commercialization has raised concerns about transparency, reproducibility, and safety. Many open GAI models lack the necessary components for full understanding and reproducibility, and some use restrictive licenses whilst claiming to be ``open-source''. To address these concerns, we propose the Model Openness Framework (MOF), a ranked classification system that rates machine learning models based on their completeness and openness, following principles of open science, open source, open data, and open access. The MOF requires specific components of the model development lifecycle to be included and released under appropriate open licenses. This framework aims to prevent misrepresentation of models claiming to be open, guide researchers and developers in providing all model components under permissive licenses, and help individuals and organizations identify models that can be safely adopted without restrictions. By promoting transparency and reproducibility, the MOF combats ``openwashing'' practices and establishes completeness and openness as primary criteria alongside the core tenets of responsible AI. Wide adoption of the MOF will foster a more open AI ecosystem, benefiting research, innovation, and adoption of state-of-the-art models.
△ Less
Submitted 3 June, 2024; v1 submitted 20 March, 2024;
originally announced March 2024.
-
Spatially Resolved Observations of Meteor Radio Afterglows with the OVRO-LWA
Authors:
S. S. Varghese,
J. Dowell,
K. S. Obenberger,
G. B. Taylor,
M. Anderson,
G. Hallinan
Abstract:
We conducted an all-sky imaging transient search with the Owens Valley Radio Observatory Long Wavelength Array (OVRO-LWA) data collected during the Perseid meteor shower in 2018. The data collection during the meteor shower was motivated to conduct a search for intrinsic radio emission from meteors below 60 MHz known as the meteor radio afterglows (MRAs). The data collected were calibrated and ima…
▽ More
We conducted an all-sky imaging transient search with the Owens Valley Radio Observatory Long Wavelength Array (OVRO-LWA) data collected during the Perseid meteor shower in 2018. The data collection during the meteor shower was motivated to conduct a search for intrinsic radio emission from meteors below 60 MHz known as the meteor radio afterglows (MRAs). The data collected were calibrated and imaged using the core array to obtain lower angular resolution images of the sky. These images were input to a pre-existing LWA transient search pipeline to search for MRAs as well as cosmic radio transients. This search detected 5 MRAs and did not find any cosmic transients. We further conducted peeling of bright sources, near-field correction, visibility differencing and higher angular resolution imaging using the full array for these 5 MRAs. These higher angular resolution images were used to study their plasma emission structures and monitor their evolution as a function of frequency and time. With higher angular resolution imaging, we resolved the radio emission size scales to less than 1 km physical size at 100 km heights. The spectral index mapping of one of the long duration event showed signs of diffusion of plasma within the meteor trails. The unpolarized emission from the resolved radio components suggest resonant transition radiation as the possible radiation mechanism of MRAs.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Symmetry and classification of solutions to an integral equation in the Heisenberg group $\mathbb{H}^n$
Authors:
Jyotshana V. Prajapat,
Anoop Skaria Varghese
Abstract:
In this paper we prove symmetry of nonnegative solutions of the integral equation \[ u (ζ) = \int\limits_{{\mathbb H}^n} |ζ^{-1} ξ|^{-(Q-α)} u(ξ)^{p} dξ\quad 1< p \leq \frac{Q+α}{Q-α},\quad 0< α<Q \] on the Heisenberg group ${\mathbb H}^n = {\mathbb C}^n \times {\mathbb R}$, $Q= 2n +2$ using the moving plane method and the Hardy-Littlewood-Sobolev inequality proved by Frank and Lieb for the Heisen…
▽ More
In this paper we prove symmetry of nonnegative solutions of the integral equation \[ u (ζ) = \int\limits_{{\mathbb H}^n} |ζ^{-1} ξ|^{-(Q-α)} u(ξ)^{p} dξ\quad 1< p \leq \frac{Q+α}{Q-α},\quad 0< α<Q \] on the Heisenberg group ${\mathbb H}^n = {\mathbb C}^n \times {\mathbb R}$, $Q= 2n +2$ using the moving plane method and the Hardy-Littlewood-Sobolev inequality proved by Frank and Lieb for the Heisenberg group. For $p$ subcritical, i.e., $1< p < \frac{Q+α}{Q-α}$ we show nonexistence of positive solution of this integral equation, while for the critical case, $p = \frac{Q+α}{Q-α}$ we prove that the solutions are cylindrical and are unique upto Heisenberg translation and suitable scaling of the function \[ u_0 (z,t) = \left( (1+ |z|^2)^2 + t^2 \right)^{- \frac{Q-α}{4}} \quad (z,t ) \in {\mathbb H}^n. \] As a consequence, we also obtain the symmetry and classification of nonnegative $C^2$ solution of the equation \[ Δ_{\mathbb H} u + u^{p} = 0 \quad \mbox{for } 1< p \leq \frac{Q+α}{Q-α} \mbox{ in } {\mathbb H}^n \] without any partial symmetry assumption on the function $u$.
△ Less
Submitted 9 February, 2024; v1 submitted 25 January, 2024;
originally announced January 2024.
-
The Breakthrough Listen Search for Intelligent Life: Technosignature Search of 97 Nearby Galaxies
Authors:
Carmen Choza,
Daniel Bautista,
Steve Croft,
Bryan Brzycki,
Andrew Siemion,
Krishnakumar Bhattaram,
Daniel Czech,
Imke de Pater,
Vishal Gajjar,
Howard Isaacson,
Kevin Lacker,
Brian Lacki,
Matthew Lebofsky,
David H. E. MacMahon,
Danny Price,
Sarah Schoultz,
Sofia Sheikh,
Savin Shynu Varghese,
Lawrence Morgan,
Jamie Drew,
S. Pete Worden
Abstract:
The Breakthrough Listen search for intelligent life is, to date, the most extensive technosignature search of nearby celestial objects. We present a radio technosignature search of the centers of 97 nearby galaxies, observed by Breakthrough Listen at the Robert C. Byrd Green Bank Telescope. We performed a narrowband Doppler drift search using the turboSETI pipeline with a minimum signal-to-noise p…
▽ More
The Breakthrough Listen search for intelligent life is, to date, the most extensive technosignature search of nearby celestial objects. We present a radio technosignature search of the centers of 97 nearby galaxies, observed by Breakthrough Listen at the Robert C. Byrd Green Bank Telescope. We performed a narrowband Doppler drift search using the turboSETI pipeline with a minimum signal-to-noise parameter threshold of 10, across a drift rate range of $\pm$ 4 Hz\ $s^{-1}$, with a spectral resolution of 3 Hz and a time resolution of $\sim$ 18.25 s. We removed radio frequency interference by using an on-source/off-source cadence pattern of six observations and discarding signals with Doppler drift rates of 0. We assess factors affecting the sensitivity of the Breakthrough Listen data reduction and search pipeline using signal injection and recovery techniques and apply new methods for the investigation of the RFI environment. We present results in four frequency bands covering 1 -- 11 GHz, and place constraints on the presence of transmitters with equivalent isotropic radiated power on the order of $10^{26}$ W, corresponding to the theoretical power consumption of Kardashev Type II civilizations.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
TTCF4LAMMPS: A toolkit for simulation of the non-equilibrium behaviour of molecular fluids at experimentally accessible shear rates
Authors:
Luca Maffioli,
James P. Ewen,
Edward R. Smith,
Sleeba Varghese,
Peter J. Daivis,
Daniele Dini,
B. D. Todd
Abstract:
We present TTCF4LAMMPS, a toolkit for performing non-equilibrium molecular dynamics (NEMD) simulations to study fluid behaviour at low shear rates using the LAMMPS software. By combining direct NEMD simulations and the transient-time correlation function (TTCF) technique, we study the behaviour of fluids over shear rates spanning $15$ orders of magnitude. We present two example systems consisting…
▽ More
We present TTCF4LAMMPS, a toolkit for performing non-equilibrium molecular dynamics (NEMD) simulations to study fluid behaviour at low shear rates using the LAMMPS software. By combining direct NEMD simulations and the transient-time correlation function (TTCF) technique, we study the behaviour of fluids over shear rates spanning $15$ orders of magnitude. We present two example systems consisting of simple monatomic systems: one containing a bulk liquid and another with a liquid layer confined between two solid walls. The small bulk system is suitable for testing on personal computers, while the larger confined system requires high-performance computing (HPC) resources. We demonstrate that the TTCF formalism can successfully detect the system response for arbitrarily weak external fields. We provide a brief mathematical explanation for this feature. Although we showcase the method for simple monatomic systems, TTCF can be readily extended to study more complex molecular fluids. Moreover, in addition to shear flows, the method can be extended to investigate elongational or mixed flows as well as thermal or electric fields. The reasonably high computational cost needed for the method is offset by the two following benefits: i) the cost is independent of the magnitude of the external field, and ii) the simulations can be made highly efficient on HPC architectures by exploiting the parallel design of LAMMPS. We expect the toolkit to be useful for computational researchers striving to study the nonequilibrium behaviour of fluids under experimentally-accessible conditions.
△ Less
Submitted 27 November, 2023;
originally announced December 2023.
-
COSMIC: An Ethernet-based Commensal, Multimode Digital Backend on the Karl G. Jansky Very Large Array for the Search for Extraterrestrial Intelligence
Authors:
Chenoa D. Tremblay,
Savin Shynu Varghese,
Jack Hickish,
Paul Demorest,
Cherry Ng,
Andrew P. V. Siemion,
Daniel Czech,
Ross A. Donnachie,
Wael Farah,
Vishal Gajjar,
Matt Lebofsky,
David E. MacMahon,
Talon Myburgh,
Mark Ruzindana,
Joseph S. Bright,
Alan Erickson,
Kevin Lacker
Abstract:
The primary goal of the search for extraterrestrial intelligence (SETI) is to gain an understanding of the prevalence of technologically advanced beings (organic or inorganic) in the Galaxy. One way to approach this is to look for technosignatures: remotely detectable indicators of technology, such as temporal or spectral electromagnetic emissions consistent with an artificial source. With the new…
▽ More
The primary goal of the search for extraterrestrial intelligence (SETI) is to gain an understanding of the prevalence of technologically advanced beings (organic or inorganic) in the Galaxy. One way to approach this is to look for technosignatures: remotely detectable indicators of technology, such as temporal or spectral electromagnetic emissions consistent with an artificial source. With the new Commensal Open-Source Multimode Interferometer Cluster (COSMIC) digital backend on the Karl G. Jansky Very Large Array (VLA), we aim to conduct a search for technosignatures that is significantly more comprehensive, more sensitive, and more efficient than previously attempted. The COSMIC system is currently operational on the VLA, recording data, and designed with the flexibility to provide user-requested modes. This paper describes the hardware system design, the current software pipeline, and plans for future development.
△ Less
Submitted 26 November, 2023; v1 submitted 13 October, 2023;
originally announced October 2023.
-
A pre-time-zero spatiotemporal microscopy technique for the ultrasensitive determination of the thermal diffusivity of thin films
Authors:
Sebin Varghese,
Jake Dudley Mehew,
Alexander Block,
David Saleta Reig,
Paweł Woźniak,
Roberta Farris,
Zeila Zanolli,
Pablo Ordejón,
Matthieu J. Verstraete,
Niek F. van Hulst,
Klaas-Jan Tielrooij
Abstract:
Diffusion is one of the most ubiquitous transport phenomena in nature. Experimentally, it can be tracked by following point spreading in space and time. Here, we introduce a spatiotemporal pump-probe microscopy technique that exploits the residual spatial temperature profile obtained through the transient reflectivity when probe pulses arrive before pump pulses. This corresponds to an effective pu…
▽ More
Diffusion is one of the most ubiquitous transport phenomena in nature. Experimentally, it can be tracked by following point spreading in space and time. Here, we introduce a spatiotemporal pump-probe microscopy technique that exploits the residual spatial temperature profile obtained through the transient reflectivity when probe pulses arrive before pump pulses. This corresponds to an effective pump-probe time delay of 13 ns, determined by the repetition rate of our laser system (76 MHz). This pre-time-zero technique enables probing the diffusion of long-lived excitations created by previous pump pulses with nanometer accuracy, and is particularly powerful for following in-plane heat diffusion in thin films. In contrast to existing techniques for quantifying thermal transport it does not require any material input parameters or strong heating. We demonstrate the direct determination of the thermal diffusivities of the layered materials MoSe$_2$ (0.18 cm$^2$/s), WSe$_2$ (0.20 cm$^2$/s), MoS$_2$ (0.35 cm$^2$/s), and WS$_2$ (0.59 cm$^2$/s). This technique paves the way for observing novel nanoscale thermal transport phenomena and tracking diffusion of a broad range of species.
△ Less
Submitted 10 November, 2022; v1 submitted 9 November, 2022;
originally announced November 2022.
-
Milliwatt terahertz harmonic generation from topological insulator metamaterials
Authors:
Klaas-Jan Tielrooij,
Alessandro Principi,
David Saleta Reig,
Alexander Block,
Sebin Varghese,
Steffen Schreyeck,
Karl Brunner,
Grzegorz Karczewski,
Igor Ilyakov,
Oleksiy Ponomaryov,
Thales V. A. G. de Oliveira,
Min Chen,
Jan-Christoph Deinert,
Carmen Gomez Carbonell,
Sergio O. Valenzuela,
Laurens W. Molenkamp,
Tobias Kiessling,
Georgy V. Astakhov,
Sergey Kovalev
Abstract:
Achieving efficient, high-power harmonic generation in the terahertz spectral domain has technological applications, for example in sixth generation (6G) communication networks. Massless Dirac fermions possess extremely large terahertz nonlinear susceptibilities and harmonic conversion efficiencies. However, the observed maximum generated harmonic power is limited, because of saturation effects at…
▽ More
Achieving efficient, high-power harmonic generation in the terahertz spectral domain has technological applications, for example in sixth generation (6G) communication networks. Massless Dirac fermions possess extremely large terahertz nonlinear susceptibilities and harmonic conversion efficiencies. However, the observed maximum generated harmonic power is limited, because of saturation effects at increasing incident powers, as shown recently for graphene. Here, we demonstrate room-temperature terahertz harmonic generation in a Bi$_2$Se$_3$ topological insulator and topological-insulator-grating metamaterial structures with surface-selective terahertz field enhancement. We obtain a third-harmonic power approaching the milliwatt range for an incident power of 75 mW - an improvement by two orders of magnitude compared to a benchmarked graphene sample. We establish a framework in which this exceptional performance is the result of thermodynamic harmonic generation by the massless topological surface states, benefiting from ultrafast dissipation of electronic heat via surface-bulk Coulomb interactions. These results are an important step towards on-chip terahertz (opto)electronic applications.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Opportunities for Technosignature Science in the Planetary Science and Astrobiology Decadal Survey
Authors:
Jacob Haqq-Misra,
Reza Ashtari,
James Benford,
Jonathan Carroll-Nellenback,
Niklas A. Döbler,
Wael Farah,
Thomas J. Fauchez,
Vishal Gajjar,
David Grinspoon,
Advait Huggahalli,
Ravi K. Kopparapu,
Joseph Lazio,
George Profitiliotis,
Evan L. Sneed,
Savin Shynu Varghese,
Clément Vidal
Abstract:
Solar system exploration provides numerous possibilities for advancing technosignature science. The search for life in the solar system includes missions designed to search for evidence of biosignatures on other planetary bodies, but many missions could also attempt to search for and constrain the presence of technology within the solar system. Technosignatures and biosignatures represent compleme…
▽ More
Solar system exploration provides numerous possibilities for advancing technosignature science. The search for life in the solar system includes missions designed to search for evidence of biosignatures on other planetary bodies, but many missions could also attempt to search for and constrain the presence of technology within the solar system. Technosignatures and biosignatures represent complementary approaches toward searching for evidence of life in our solar neighborhood, and beyond. This report summarizes the potential technosignature opportunities within ongoing solar system exploration and the recommendations of the "Origins, Worlds, and Life" Planetary Science and Astrobiology Decadal Survey. We discuss opportunities for constraining the prevalence of technosignatures within the solar system using current or future missions at negligible additional cost, and we present a preliminary assessment of gaps that may exist in the search for technosignatures within the solar system.
△ Less
Submitted 21 September, 2022;
originally announced September 2022.
-
Digital Twin-based Intrusion Detection for Industrial Control Systems
Authors:
Seba Anna Varghese,
Alireza Dehlaghi Ghadim,
Ali Balador,
Zahra Alimadadi,
Panos Papadimitratos
Abstract:
Digital twins have recently gained significant interest in simulation, optimization, and predictive maintenance of Industrial Control Systems (ICS). Recent studies discuss the possibility of using digital twins for intrusion detection in industrial systems. Accordingly, this study contributes to a digital twin-based security framework for industrial control systems, extending its capabilities for…
▽ More
Digital twins have recently gained significant interest in simulation, optimization, and predictive maintenance of Industrial Control Systems (ICS). Recent studies discuss the possibility of using digital twins for intrusion detection in industrial systems. Accordingly, this study contributes to a digital twin-based security framework for industrial control systems, extending its capabilities for simulation of attacks and defense mechanisms. Four types of process-aware attack scenarios are implemented on a standalone open-source digital twin of an industrial filling plant: command injection, network Denial of Service (DoS), calculated measurement modification, and naive measurement modification. A stacked ensemble classifier is proposed as the real-time intrusion detection, based on the offline evaluation of eight supervised machine learning algorithms. The designed stacked model outperforms previous methods in terms of F1-Score and accuracy, by combining the predictions of various algorithms, while it can detect and classify intrusions in near real-time (0.1 seconds). This study also discusses the practicality and benefits of the proposed digital twin-based security framework.
△ Less
Submitted 20 July, 2022;
originally announced July 2022.
-
Unraveling heat transport and dissipation in suspended MoSe$_2$ crystals from bulk to monolayer
Authors:
D. Saleta Reig,
S. Varghese,
R. Farris,
A. Block,
J. D. Mehew,
O. Hellman,
P. Woźniak,
M. Sledzinska,
A. El Sachat,
E. Chávez-Ángel,
S. O. Valenzuela,
N. F. Van Hulst,
P. Ordejón,
Z. Zanolli,
C. M. Sotomayor Torres,
M. J. Verstraete,
K. J. Tielrooij
Abstract:
Understanding thermal transport in layered transition metal dichalcogenide (TMD) crystals is crucial for a myriad of applications exploiting these materials. Despite significant efforts, several basic thermal transport properties of TMDs are currently not well understood. Here, we present a combined experimental-theoretical study of the intrinsic lattice thermal conductivity of the representative…
▽ More
Understanding thermal transport in layered transition metal dichalcogenide (TMD) crystals is crucial for a myriad of applications exploiting these materials. Despite significant efforts, several basic thermal transport properties of TMDs are currently not well understood. Here, we present a combined experimental-theoretical study of the intrinsic lattice thermal conductivity of the representative TMD MoSe$_2$, focusing on the effect of material thickness and the material's environment. We use Raman thermometry measurements on suspended crystals, where we identify and eliminate crucial artefacts, and perform $ab$ $initio$ simulations with phonons at finite, rather than zero, temperature. We find that phonon dispersions and lifetimes change strongly with thickness, yet (sub)nanometer thin TMD films exhibit a similar in-plane thermal conductivity ($\sim$20~Wm$^{-1}$K$^{-1}$) as bulk crystals ($\sim$40~Wm$^{-1}$K$^{-1}$). This is the result of compensating phonon contributions, in particular low-frequency modes with a surprisingly long mean free path of several micrometers that contribute significantly to thermal transport for monolayers. We furthermore demonstrate that out-of-plane heat dissipation to air is remarkably efficient, in particular for the thinnest crystals. These results are crucial for the design of TMD-based applications in thermal management, thermoelectrics and (opto)electronics.
△ Less
Submitted 19 September, 2021;
originally announced September 2021.
-
Inspect, Understand, Overcome: A Survey of Practical Methods for AI Safety
Authors:
Sebastian Houben,
Stephanie Abrecht,
Maram Akila,
Andreas Bär,
Felix Brockherde,
Patrick Feifel,
Tim Fingscheidt,
Sujan Sai Gannamaneni,
Seyed Eghbal Ghobadi,
Ahmed Hammam,
Anselm Haselhoff,
Felix Hauser,
Christian Heinzemann,
Marco Hoffmann,
Nikhil Kapoor,
Falk Kappel,
Marvin Klingner,
Jan Kronenberger,
Fabian Küppers,
Jonas Löhdefink,
Michael Mlynarski,
Michael Mock,
Firas Mualla,
Svetlana Pavlitskaya,
Maximilian Poretschkin
, et al. (16 additional authors not shown)
Abstract:
The use of deep neural networks (DNNs) in safety-critical applications like mobile health and autonomous driving is challenging due to numerous model-inherent shortcomings. These shortcomings are diverse and range from a lack of generalization over insufficient interpretability to problems with malicious inputs. Cyber-physical systems employing DNNs are therefore likely to suffer from safety conce…
▽ More
The use of deep neural networks (DNNs) in safety-critical applications like mobile health and autonomous driving is challenging due to numerous model-inherent shortcomings. These shortcomings are diverse and range from a lack of generalization over insufficient interpretability to problems with malicious inputs. Cyber-physical systems employing DNNs are therefore likely to suffer from safety concerns. In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged. This work provides a structured and broad overview of them. We first identify categories of insufficiencies to then describe research activities aiming at their detection, quantification, or mitigation. Our paper addresses both machine learning experts and safety engineers: The former ones might profit from the broad range of machine learning topics covered and discussions on limitations of recent methods. The latter ones might gain insights into the specifics of modern ML methods. We moreover hope that our contribution fuels discussions on desiderata for ML systems and strategies on how to propel existing approaches accordingly.
△ Less
Submitted 29 April, 2021;
originally announced April 2021.
-
Broadband Imaging to Study the Spectral Distribution of Meteor Radio Afterglows
Authors:
S. S. Varghese,
J. Dowell,
K. S. Obenberger,
G. B. Taylor,
J. Malins
Abstract:
We present observations of 86 meteor radio afterglows (MRAs) using the new broadband imager at the Long Wavelength Array Sevilleta (LWA-SV) station. The MRAs were detected using the all-sky images with a bandwidth up to 20 MHz. We fit the spectra with both a power law and a log-normal function. When fit with a power law, the spectra varied from flat to steep and the derived spectral index distribu…
▽ More
We present observations of 86 meteor radio afterglows (MRAs) using the new broadband imager at the Long Wavelength Array Sevilleta (LWA-SV) station. The MRAs were detected using the all-sky images with a bandwidth up to 20 MHz. We fit the spectra with both a power law and a log-normal function. When fit with a power law, the spectra varied from flat to steep and the derived spectral index distribution from the fit peaked at -1.73. When fit with a log-normal function, the spectra exhibits turnovers at frequencies between 30-40 MHz, and appear to be a better functional fit to the spectra. We compared the spectral parameters from the two fitting methods with the physical properties of MRAs. We observe a weak correlation between the log-normal turnover frequency and the altitude of MRAs. The spectral indices from the power law fit do not show any strong correlations with the physical properties of MRAs. However, the full width half maximum (FWHM) duration of MRAs is correlated with the local time, incidence angle, luminosity and optically derived kinetic energy of parent meteoroid. Also, the average luminosity of MRAs seems to be correlated with the kinetic energy of parent meteoroid and the altitude at which they occur.
△ Less
Submitted 11 October, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Sensitivity of Indian summer monsoon rainfall forecast skill of CFSv2 model to initial conditions and the role of model biases
Authors:
K Rajendran,
Sajani Surendran,
Stella Jes Varghese,
Arindam Chakraborty
Abstract:
We analyse Indian summer monsoon (ISM) seasonal reforecasts by CFSv2 model, initiated from January (4-month lead time, L4) through May (0-month lead time, L0) initial conditions (ICs), to examine the cause for highest all-India ISM rainfall (ISMR) forecast skill with February (L3) ICs. The reported highest L3 skill is based on correlation between observed and predicted interannual variation (IAV)…
▽ More
We analyse Indian summer monsoon (ISM) seasonal reforecasts by CFSv2 model, initiated from January (4-month lead time, L4) through May (0-month lead time, L0) initial conditions (ICs), to examine the cause for highest all-India ISM rainfall (ISMR) forecast skill with February (L3) ICs. The reported highest L3 skill is based on correlation between observed and predicted interannual variation (IAV) of ISMR. Other scores such as mean error, bias, RMSE, mean, standard deviation and coefficient of variation, indicate higher or comparable skill for April(L1)/May(L0) ICs. Though theory suggests that forecast skill degrades with increase in lead-time, CFSv2 shows highest skill with L3 ICs, due to predicting 1983 ISMR excess for which other ICs fail. But this correct prediction is caused by wrong forecast of La Nina or cooling of equatorial central Pacific (NINO3.4) during ISM season. In observation, normal sea surface temperatures (SSTs) prevailed over NINO3.4 and ISMR excess was due to variation of convection over equatorial Indian Ocean or EQUINOO, which CFSv2 failed to capture with all ICs. Major results are reaffirmed by analysing an optimum number of 5 experimental reforecasts by current version of CFSv2 with late-April/early-May ICs having short yet useful lead-time. These reforecasts showed least seasonal biases and highest ISMR correlation skill if 1983 is excluded. Model deficiencies such as over-sensitivity of ISMR to SST variation over NINO3.4 (ENSO) and unrealistic influence of ENSO on EQUINOO, contribute to errors in ISMR forecasting. Whereas, in observation, ISMR is influenced by both ENSO and EQUINOO. Forecast skill for Boreal summer ENSO is found to be deficient with lowest skill for L3/L4 ICs, hinting the possible influence of long lead-time induced dynamical drift. The results warrant the need for minimisation of bias in SST boundary forcing to achieve improved ISMR forecasts.
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
The Vulnerability of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing
Authors:
Andreas Bär,
Jonas Löhdefink,
Nikhil Kapoor,
Serin J. Varghese,
Fabian Hüger,
Peter Schlicht,
Tim Fingscheidt
Abstract:
Enabling autonomous driving (AD) can be considered one of the biggest challenges in today's technology. AD is a complex task accomplished by several functionalities, with environment perception being one of its core functions. Environment perception is usually performed by combining the semantic information captured by several sensors, i.e., lidar or camera. The semantic information from the respe…
▽ More
Enabling autonomous driving (AD) can be considered one of the biggest challenges in today's technology. AD is a complex task accomplished by several functionalities, with environment perception being one of its core functions. Environment perception is usually performed by combining the semantic information captured by several sensors, i.e., lidar or camera. The semantic information from the respective sensor can be extracted by using convolutional neural networks (CNNs) for dense prediction. In the past, CNNs constantly showed state-of-the-art performance on several vision-related tasks, such as semantic segmentation of traffic scenes using nothing but the red-green-blue (RGB) images provided by a camera. Although CNNs obtain state-of-the-art performance on clean images, almost imperceptible changes to the input, referred to as adversarial perturbations, may lead to fatal deception. The goal of this article is to illuminate the vulnerability aspects of CNNs used for semantic segmentation with respect to adversarial attacks, and share insights into some of the existing known adversarial defense strategies. We aim to clarify the advantages and disadvantages associated with applying CNNs for environment perception in AD to serve as a motivation for future research in this field.
△ Less
Submitted 13 January, 2021; v1 submitted 11 January, 2021;
originally announced January 2021.
-
Improving Video Instance Segmentation by Light-weight Temporal Uncertainty Estimates
Authors:
Kira Maag,
Matthias Rottmann,
Serin Varghese,
Fabian Hueger,
Peter Schlicht,
Hanno Gottschalk
Abstract:
Instance segmentation with neural networks is an essential task in environment perception. In many works, it has been observed that neural networks can predict false positive instances with high confidence values and true positives with low ones. Thus, it is important to accurately model the uncertainties of neural networks in order to prevent safety issues and foster interpretability. In applicat…
▽ More
Instance segmentation with neural networks is an essential task in environment perception. In many works, it has been observed that neural networks can predict false positive instances with high confidence values and true positives with low ones. Thus, it is important to accurately model the uncertainties of neural networks in order to prevent safety issues and foster interpretability. In applications such as automated driving, the reliability of neural networks is of highest interest. In this paper, we present a time-dynamic approach to model uncertainties of instance segmentation networks and apply this to the detection of false positives as well as the estimation of prediction quality. The availability of image sequences in online applications allows for tracking instances over multiple frames. Based on an instances history of shape and uncertainty information, we construct temporal instance-wise aggregated metrics. The latter are used as input to post-processing models that estimate the prediction quality in terms of instance-wise intersection over union. The proposed method only requires a readily trained neural network (that may operate on single frames) and video sequence input. In our experiments, we further demonstrate the use of the proposed method by replacing the traditional score value from object detection and thereby improving the overall performance of the instance segmentation network.
△ Less
Submitted 13 April, 2021; v1 submitted 14 December, 2020;
originally announced December 2020.
-
From a Fourier-Domain Perspective on Adversarial Examples to a Wiener Filter Defense for Semantic Segmentation
Authors:
Nikhil Kapoor,
Andreas Bär,
Serin Varghese,
Jan David Schneider,
Fabian Hüger,
Peter Schlicht,
Tim Fingscheidt
Abstract:
Despite recent advancements, deep neural networks are not robust against adversarial perturbations. Many of the proposed adversarial defense approaches use computationally expensive training mechanisms that do not scale to complex real-world tasks such as semantic segmentation, and offer only marginal improvements. In addition, fundamental questions on the nature of adversarial perturbations and t…
▽ More
Despite recent advancements, deep neural networks are not robust against adversarial perturbations. Many of the proposed adversarial defense approaches use computationally expensive training mechanisms that do not scale to complex real-world tasks such as semantic segmentation, and offer only marginal improvements. In addition, fundamental questions on the nature of adversarial perturbations and their relation to the network architecture are largely understudied. In this work, we study the adversarial problem from a frequency domain perspective. More specifically, we analyze discrete Fourier transform (DFT) spectra of several adversarial images and report two major findings: First, there exists a strong connection between a model architecture and the nature of adversarial perturbations that can be observed and addressed in the frequency domain. Second, the observed frequency patterns are largely image- and attack-type independent, which is important for the practical impact of any defense making use of such patterns. Motivated by these findings, we additionally propose an adversarial defense method based on the well-known Wiener filters that captures and suppresses adversarial frequencies in a data-driven manner. Our proposed method not only generalizes across unseen attacks but also beats five existing state-of-the-art methods across two models in a variety of attack settings.
△ Less
Submitted 21 April, 2021; v1 submitted 2 December, 2020;
originally announced December 2020.
-
A Self-Supervised Feature Map Augmentation (FMA) Loss and Combined Augmentations Finetuning to Efficiently Improve the Robustness of CNNs
Authors:
Nikhil Kapoor,
Chun Yuan,
Jonas Löhdefink,
Roland Zimmermann,
Serin Varghese,
Fabian Hüger,
Nico Schmidt,
Peter Schlicht,
Tim Fingscheidt
Abstract:
Deep neural networks are often not robust to semantically-irrelevant changes in the input. In this work we address the issue of robustness of state-of-the-art deep convolutional neural networks (CNNs) against commonly occurring distortions in the input such as photometric changes, or the addition of blur and noise. These changes in the input are often accounted for during training in the form of d…
▽ More
Deep neural networks are often not robust to semantically-irrelevant changes in the input. In this work we address the issue of robustness of state-of-the-art deep convolutional neural networks (CNNs) against commonly occurring distortions in the input such as photometric changes, or the addition of blur and noise. These changes in the input are often accounted for during training in the form of data augmentation. We have two major contributions: First, we propose a new regularization loss called feature-map augmentation (FMA) loss which can be used during finetuning to make a model robust to several distortions in the input. Second, we propose a new combined augmentations (CA) finetuning strategy, that results in a single model that is robust to several augmentation types at the same time in a data-efficient manner. We use the CA strategy to improve an existing state-of-the-art method called stability training (ST). Using CA, on an image classification task with distorted images, we achieve an accuracy improvement of on average 8.94% with FMA and 8.86% with ST absolute on CIFAR-10 and 8.04% with FMA and 8.27% with ST absolute on ImageNet, compared to 1.98% and 2.12%, respectively, with the well known data augmentation method, while keeping the clean baseline performance.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Global strain-induced scalar potential in graphene devices
Authors:
Lujun Wang,
Andreas Baumgartner,
Péter Makk,
Simon Zihlmann,
Blesson S. Varghese,
David I. Indolese,
Kenji Watanabe,
Takashi Taniguchi,
Christian Schönenberger
Abstract:
By mechanically distorting a crystal lattice it is possible to engineer the electronic and optical properties of a material. In graphene, one of the major effects of such a distortion is an energy shift of the Dirac point, often described as a scalar potential. We demonstrate how such a scalar potential can be generated systematically over an entire electronic device and how the resulting changes…
▽ More
By mechanically distorting a crystal lattice it is possible to engineer the electronic and optical properties of a material. In graphene, one of the major effects of such a distortion is an energy shift of the Dirac point, often described as a scalar potential. We demonstrate how such a scalar potential can be generated systematically over an entire electronic device and how the resulting changes in the graphene work function can be detected in transport experiments. Combined with Raman spectroscopy, we obtain a characteristic scalar potential consistent with recent theoretical estimates. This direct evidence for a scalar potential on a macroscopic scale due to deterministically generated strain in graphene paves the way for engineering the optical and electronic properties of graphene and similar materials by using external strain.
△ Less
Submitted 7 September, 2020;
originally announced September 2020.
-
Detection of a Low-frequency Cosmic Radio Transient Using Two LWA Stations
Authors:
S. S. Varghese,
K. S. Obenberger,
J. Dowell,
G. B. Taylor
Abstract:
We report the detection of a potential cosmic radio transient source using the two stations of the Long Wavelength Array. The transient was detected on 18 October 2017 08:47 UTC near the celestial equator while reducing 10,240 hours of archival all-sky images from the LWA1 and LWA-SV stations. The detected transient at 34 MHz has a duration of 15 - 20 seconds and a flux density of 842 +/- 116 Jy a…
▽ More
We report the detection of a potential cosmic radio transient source using the two stations of the Long Wavelength Array. The transient was detected on 18 October 2017 08:47 UTC near the celestial equator while reducing 10,240 hours of archival all-sky images from the LWA1 and LWA-SV stations. The detected transient at 34 MHz has a duration of 15 - 20 seconds and a flux density of 842 +/- 116 Jy at LWA1 and 830 +/- 92 Jy at LWA-SV. The transient source has not repeated, and its nature is not well understood. The Pan-STARRS optical telescope has detected a supernova that occurred on the edge of the position error circle of the transient on the same day.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
Testing the Radiation Pattern of Meteor Radio Afterglow
Authors:
S. S. Varghese,
K. S. Obenberger,
G. B. Taylor,
J. Dowell
Abstract:
Radio emission from meteors or meteor radio afterglows (MRAs) were first detected using the all-sky imaging capabilities of the first station of the Long Wavelength Array (LWA1). In this work, we use the recently commissioned LWA Sevilleta (LWA-SV) station along with the LWA1 to carry out co-ordinated observations. The combined all-sky observations with LWA1 and LWA-SV have co-observed 32 MRAs and…
▽ More
Radio emission from meteors or meteor radio afterglows (MRAs) were first detected using the all-sky imaging capabilities of the first station of the Long Wavelength Array (LWA1). In this work, we use the recently commissioned LWA Sevilleta (LWA-SV) station along with the LWA1 to carry out co-ordinated observations. The combined all-sky observations with LWA1 and LWA-SV have co-observed 32 MRAs and 21 transmitter reflections from meteors (meteor scatter events) which are believed to be specular reflections from overdense trails. The flux density of the events observed by each station were measured from the all-sky images. Triangulating the angular direction of events from each station gave the physical location and the distance of the event to each station. The luminosity of the events in each station were calculated using the flux distance relation for an isotropic source. The luminosity distribution for MRAs and meteor scatter events observed by each station shows a clear distinction between these two types of events as the ratio of luminosities are closer to unity for MRAs than the meteor scatter events. Furthermore, we find that MRAs follow an isotropic radiation pattern. This suggests, either a complete incoherent emission mechanism or an incoherent addition of coherently emitting small regions within the meteor trail.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA
Authors:
Noah Apthorpe,
Sarah Varghese,
Nick Feamster
Abstract:
Increased concern about data privacy has prompted new and updated data protection regulations worldwide. However, there has been no rigorous way to test whether the practices mandated by these regulations actually align with the privacy norms of affected populations. Here, we demonstrate that surveys based on the theory of contextual integrity provide a quantifiable and scalable method for measuri…
▽ More
Increased concern about data privacy has prompted new and updated data protection regulations worldwide. However, there has been no rigorous way to test whether the practices mandated by these regulations actually align with the privacy norms of affected populations. Here, we demonstrate that surveys based on the theory of contextual integrity provide a quantifiable and scalable method for measuring the conformity of specific regulatory provisions to privacy norms. We apply this method to the U.S. Children's Online Privacy Protection Act (COPPA), surveying 195 parents and providing the first data that COPPA's mandates generally align with parents' privacy expectations for Internet-connected "smart" children's toys. Nevertheless, variations in the acceptability of data collection across specific smart toys, information types, parent ages, and other conditions emphasize the importance of detailed contextual factors to privacy norms, which may not be adequately captured by COPPA.
△ Less
Submitted 12 March, 2019;
originally announced March 2019.
-
Heredity for generalized power domination
Authors:
Paul Dorbec,
Seethu Varghese,
Ambat Vijayakumar
Abstract:
In this paper, we study the behaviour of the generalized power domination number of a graph by small changes on the graph, namely edge and vertex deletion and edge contraction. We prove optimal bounds for $γ\_{p,k}(G-e)$, $γ\_{p,k}(G/e)$ and for $γ\_{p,k}(G-v)$ in terms of $γ\_{p,k}(G)$, and give examples for which these bounds are tight. We characterize all graphs for which…
▽ More
In this paper, we study the behaviour of the generalized power domination number of a graph by small changes on the graph, namely edge and vertex deletion and edge contraction. We prove optimal bounds for $γ\_{p,k}(G-e)$, $γ\_{p,k}(G/e)$ and for $γ\_{p,k}(G-v)$ in terms of $γ\_{p,k}(G)$, and give examples for which these bounds are tight. We characterize all graphs for which $γ\_{p,k}(G-e) = γ\_{p,k}(G)+1$ for any edge $e$. We also consider the behaviour of the propagation radius of graphs by similar modifications.
△ Less
Submitted 23 March, 2016;
originally announced March 2016.
-
Generalized power domination in WK-Pyramid Networks
Authors:
Seethu Varghese,
A. Vijayakumar
Abstract:
The notion of power domination arises in the context of monitoring an electric power system with as few phase measurement units as possible. The $k-$power domination number of a graph $G$ is the minimum cardinality of a $k-$power dominating set ($k-$PDS) of $G$. In this paper, we determine the $k-$power domination number of WK-Pyramid networks, $WKP_{(C,L)}$, for all positive values of $k$ except…
▽ More
The notion of power domination arises in the context of monitoring an electric power system with as few phase measurement units as possible. The $k-$power domination number of a graph $G$ is the minimum cardinality of a $k-$power dominating set ($k-$PDS) of $G$. In this paper, we determine the $k-$power domination number of WK-Pyramid networks, $WKP_{(C,L)}$, for all positive values of $k$ except for $k=C-1, C \geq 2$, for which we give an upper bound. The $k-$propagation radius of a graph $G$ is the minimum number of propagation steps needed to monitor the graph $G$ over all minimum $k-$PDS. We obtain the $k-$propagation radius of $WKP_{(C,L)}$ in some cases.
△ Less
Submitted 3 August, 2015;
originally announced August 2015.
-
Contrast Enhancement And Brightness Preservation Using Multi- Decomposition Histogram Equalization
Authors:
Sayali Nimkar,
Sanal Varghese,
Sucheta Shrivastava
Abstract:
Histogram Equalization (HE) has been an essential addition to the Image Enhancement world. Enhancement techniques like Classical Histogram Equalization (CHE), Adaptive Histogram Equalization (ADHE), Bi-Histogram Equalization (BHE) and Recursive Mean Separate Histogram Equalization (RMSHE) methods enhance contrast, however, brightness is not well preserved with these methods, which gives an unpleas…
▽ More
Histogram Equalization (HE) has been an essential addition to the Image Enhancement world. Enhancement techniques like Classical Histogram Equalization (CHE), Adaptive Histogram Equalization (ADHE), Bi-Histogram Equalization (BHE) and Recursive Mean Separate Histogram Equalization (RMSHE) methods enhance contrast, however, brightness is not well preserved with these methods, which gives an unpleasant look to the final image obtained. Thus, we introduce a novel technique Multi-Decomposition Histogram Equalization (MDHE) to eliminate the drawbacks of the earlier methods. In MDHE, we have decomposed the input sixty-four parts, applied CHE in each of the sub-images and then finally interpolated them in correct order. The final image after MDHE results in contrast enhanced and brightness preserved image compared to all other techniques mentioned above. We have calculated the various parameters like PSNR, SNR, RMSE, MSE, etc. for every technique. Our results are well supported by bar graphs, histograms and the parameter calculations at the end.
△ Less
Submitted 11 July, 2013;
originally announced July 2013.
-
Multidimensional User Data Model for Web Personalization
Authors:
Nithin K. Anil,
Sharath Basil Kurian,
Aby Abahai T,
Surekha Mariam Varghese
Abstract:
Personalization is being applied to great extend in many systems. This paper presents a multi-dimensional user data model and its application in web search. Online and Offline activities of the user are tracked for creating the user model. The main phases are identification of relevant documents and the representation of relevance and similarity of the documents. The concepts Keywords, Topics, URL…
▽ More
Personalization is being applied to great extend in many systems. This paper presents a multi-dimensional user data model and its application in web search. Online and Offline activities of the user are tracked for creating the user model. The main phases are identification of relevant documents and the representation of relevance and similarity of the documents. The concepts Keywords, Topics, URLs and clusters are used in the implementation. The algorithms for profiling, grading and clustering the concepts in the user model and algorithm for determining the personalized search results by re-ranking the results in a search bank are presented in this paper. Simple experiments for evaluation of the model and their results are described.
△ Less
Submitted 19 June, 2013;
originally announced June 2013.
-
Personalised product design using virtual interactive techniques
Authors:
Kurien Zacharia,
Eldo P. Elias,
Surekha Mariam Varghese
Abstract:
Use of Virtual Interactive Techniques for personalized product design is described in this paper. Usually products are designed and built by considering general usage patterns and Prototyping is used to mimic the static or working behaviour of an actual product before manufacturing the product. The user does not have any control on the design of the product. Personalized design postpones design to…
▽ More
Use of Virtual Interactive Techniques for personalized product design is described in this paper. Usually products are designed and built by considering general usage patterns and Prototyping is used to mimic the static or working behaviour of an actual product before manufacturing the product. The user does not have any control on the design of the product. Personalized design postpones design to a later stage. It allows for personalized selection of individual components by the user. This is implemented by displaying the individual components over a physical model constructed using Cardboard or Thermocol in the actual size and shape of the original product. The components of the equipment or product such as screen, buttons etc. are then projected using a projector connected to the computer into the physical model. Users can interact with the prototype like the original working equipment and they can select, shape, position the individual components displayed on the interaction panel using simple hand gestures. Computer Vision techniques as well as sound processing techniques are used to detect and recognize the user gestures captured using a web camera and microphone.
△ Less
Submitted 8 February, 2012;
originally announced February 2012.
-
Modelling Gesture Based Ubiquitous Applications
Authors:
Kurien Zacharia,
Eldo P. Elias,
Surekha Mariam Varghese
Abstract:
A cost effective, gesture based modelling technique called Virtual Interactive Prototyping (VIP) is described in this paper. Prototyping is implemented by projecting a virtual model of the equipment to be prototyped. Users can interact with the virtual model like the original working equipment. For capturing and tracking the user interactions with the model image and sound processing techniques ar…
▽ More
A cost effective, gesture based modelling technique called Virtual Interactive Prototyping (VIP) is described in this paper. Prototyping is implemented by projecting a virtual model of the equipment to be prototyped. Users can interact with the virtual model like the original working equipment. For capturing and tracking the user interactions with the model image and sound processing techniques are used. VIP is a flexible and interactive prototyping method that has much application in ubiquitous computing environments. Different commercial as well as socio-economic applications and extension to interactive advertising of VIP are also discussed.
△ Less
Submitted 9 December, 2011;
originally announced December 2011.
-
Steep Faint-end Slopes of Galaxy Mass and Luminosity Functions at z>=6 and the Implications for Reionisation
Authors:
Jason Jaacks,
Jun-Hwan Choi,
Kentaro Nagamine,
Robert Thompson,
Saju Varghese
Abstract:
We present the results of a numerical study comparing photometric and physical properties of simulated z=6-9 galaxies to the observations taken by the WFC3 instrument aboard the Hubble Space Telescope. Using cosmological hydrodynamical simulations we find good agreement with observations in color-color space at all studied redshifts. We also find good agreement between observations and our Schecht…
▽ More
We present the results of a numerical study comparing photometric and physical properties of simulated z=6-9 galaxies to the observations taken by the WFC3 instrument aboard the Hubble Space Telescope. Using cosmological hydrodynamical simulations we find good agreement with observations in color-color space at all studied redshifts. We also find good agreement between observations and our Schechter luminosity function fit in the observable range, Muv<= -18, provided that a moderate dust extinction effect exists for massive galaxies. However beyond what currently can be observed, simulations predict a very large number of low-mass galaxies and evolving steep faint-end slopes from alpha_L = -2.15 at z=6 to alpha_L = -2.64 at z=9, with a dependence of |alpha_L| \propto (1+z)^0.59. During the same epoch, the normalization phi* increases and the characteristic magnitude Muv* becomes moderately brighter with decreasing redshift. We find similar trends for galaxy stellar mass function with evolving low-mass end slope from alpha_M = - 2.26 at z=6 to alpha_M = -2.87 at z=9, with a dependence of |alpha_M| \propto (1+z)^0.65. Together with our recent result on the high escape fraction of ionizing photons for low-mass galaxies, our results suggest that the low-mass galaxies are important contributor of ionizing photons for the reionisation of the Universe at z>=6.
△ Less
Submitted 14 November, 2011; v1 submitted 12 April, 2011;
originally announced April 2011.