316,974 results on '"Arun, A."'
Search Results
2. Studies on biochemical changes and expression of Pathogenesis-Related proteins (PR Proteins) associated with plant defense mechanism induced by Arbuscular Mycorhizal Fungus Rhizophagus intraradices against Meloidogyne incognita
- Author
-
Shanthi, A., Arun, A., Shandeep, S.G., Sharmila, R., and Jayakumar, P.
- Published
- 2024
- Full Text
- View/download PDF
3. An In vitro analysis of Ficus carica's antioxidant potential
- Author
-
Arun, A., Pavithra, R C, and Kanimozhi, S.
- Published
- 2023
- Full Text
- View/download PDF
4. Perception of the University Students on Entrepreneurship Education
- Author
-
Mayank V. Sodha, Jignesh P. Vaghela, and A. Arun Kumar
- Abstract
This study focused on the perception of the students on entrepreneurship education. Entrepreneurship education is considered an effective tool for influencing students' learning orientation and expression. This study examined the effects of entrepreneurship education and learning on the entrepreneurial implementation intentions of students at the Universities. This study employed an explanatory method. For the study, 600 questionnaires were collected from north Indian university students. Multiple regression was used for the analysis of the study. The results showed that teaching methods significantly impact entrepreneurship stimulate students' interest and enhance students' knowledge innovation for business start-ups. The findings of the analysis also revealed that practical activities are mainly based on vocational skill activities, the teaching methods should contain extensive attention to critical thinking and idea generation activities as graded mechanisms of the degree program. It was also recommended that engagement of students with entrepreneurial development initiatives provided by institutions should involve students across all degree levels. Therefore, to increase the prospect of assignation in entrepreneurial activities after graduation students should generate viable business ideas, identify market gaps, engage in business startups, and practical business plans, and engage in invention and innovations. [Note: The page range (143-156) shown on the PDF is incorrect. The correct page range is 143-155.]
- Published
- 2024
5. Studies on histopathological changes in the tomato roots colonized by arbuscular mycorhizal fungus, Rhizophagus intraradices and infested by root knot nematodes, Meloidogyne incognita
- Author
-
Shanthi, A., Arun, A., and Shandeep, S.G.
- Published
- 2022
- Full Text
- View/download PDF
6. Classification of metals used in the sand casting process
- Author
-
Arun, A., Bala-Krishnan, R., Jayanthi, R., Kevin, H M S., Raj, A. Ranjith, Paramaguru, S., Kumar, R., Ganesan, M., and Rekha, R.
- Published
- 2021
- Full Text
- View/download PDF
7. Magnetic properties in polyacetylene: Exploring electronic correlation effects through density functional theory
- Author
-
Nokelainen, Johannes, Barbiellini, Bernardo, and Bansil, Arun
- Subjects
Physics - Chemical Physics - Abstract
Polyacetylene, a simple polymer, has long been studied for its unique electronic properties, yet the role of correlation in polyacetylene still is not clear. Here, we employ various density functional theory formulations to explore its effects on magnetic characteristics of polyacetylene by ab initio basis. Our results indicate that subtle correlation effects beyond the generalized gradient approximation lead to the formation of spin-density wave solutions on the $\pi$-conjugated carbon $p$ orbitals that could compete with other solutions, possibly leading to emergence of intertwined orders. Our study suggests that the phase diagram of polyacetylene should be explored further., Comment: 7 pages, 2 figures
- Published
- 2024
8. Dynamic Pricing for Electric Vehicle Charging
- Author
-
Kalakanti, Arun Kumar and Rao, Shrisha
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Artificial Intelligence - Abstract
Dynamic pricing is a promising strategy to address the challenges of smart charging, as traditional time-of-use (ToU) rates and stationary pricing (SP) do not dynamically react to changes in operating conditions, reducing revenue for charging station (CS) vendors and affecting grid stability. Previous studies evaluated single objectives or linear combinations of objectives for EV CS pricing solutions, simplifying trade-offs and preferences among objectives. We develop a novel formulation for the dynamic pricing problem by addressing multiple conflicting objectives efficiently instead of solely focusing on one objective or metric, as in earlier works. We find optimal trade-offs or Pareto solutions efficiently using Non-dominated Sorting Genetic Algorithms (NSGA) II and NSGA III. A dynamic pricing model quantifies the relationship between demand and price while simultaneously solving multiple conflicting objectives, such as revenue, quality of service (QoS), and peak-to-average ratios (PAR). A single method can only address some of the above aspects of dynamic pricing comprehensively. We present a three-part dynamic pricing approach using a Bayesian model, multi-objective optimization, and multi-criteria decision-making (MCDM) using pseudo-weight vectors. To address the research gap in CS pricing, our method selects solutions using revenue, QoS, and PAR metrics simultaneously. Two California charging sites' real-world data validates our approach., Comment: 12 pages
- Published
- 2024
9. Parametrized tests of general relativity using eccentric compact binaries
- Author
-
Bhat, Sajad A., Saini, Pankaj, Favata, Marc, Gandevikar, Chinmay, Mishra, Chandra Kant, and Arun, K. G.
- Subjects
General Relativity and Quantum Cosmology ,Astrophysics - High Energy Astrophysical Phenomena - Abstract
Astrophysical population simulations predict that a subset of dynamically formed binary black holes (BBHs) may possess eccentricity $\gtrsim 0.1$ at a gravitational wave (GW) frequency of $10 \,\text{Hz}$. Presently, the LIGO-Virgo-KAGRA (LVK) Collaboration tests general relativity (GR) assuming that the binary eccentricity has decayed well before it enters the detector's frequency band. Previous works have shown that binary eccentricity can bias GR tests if unaccounted for. Here we develop two methods to extend parametrized tests of GR to eccentric binaries. The first method extends the standard null parametrized test for quasicircular binaries by adding fractional deviations at each post-Newtonian (PN) order in the eccentric part of the GW phasing (assuming the small-eccentricity limit). Simultaneous measurement of the circular and eccentric deviation parameters ($\delta\hat{\varphi}, \delta\hat{\varphi}^e$) allows us to constrain deviations from GR for eccentric binaries. While strong constraints on the deviation parameters are not achievable with LIGO's projected sensitivity, the multibanding of LISA and CE observations can constrain these deviations to $|\delta\hat{\varphi}_2| \lesssim 3 \times 10^{-3}$ and $|\delta\hat{\varphi}^e_2|\lesssim 2\times 10^{-2}$. The second method looks for GR deviations in the rate of periastron advance ($\Delta\alpha$). The parameter $\Delta\alpha$ ($\Delta\alpha^{\rm GR} \to 0$) can be constrained with LIGO to $|\Delta\alpha|\lesssim 4 \times 10^{-2}$ (with $1 \sigma$ confidence). Multiband sources observed by LISA and CE provide an improved constraint of $|\Delta\alpha|\lesssim 3\times 10^{-5}$. The space-based detector DECIGO provides the best constraint on $\Delta\alpha$ with $|\Delta\alpha|\lesssim 8 \times 10^{-6}$., Comment: 32 pages, 7 figures
- Published
- 2024
10. Enhancing Depression Diagnosis with Chain-of-Thought Prompting
- Author
-
Shi, Elysia, Manda, Adithri, Chowdhury, London, Arun, Runeema, Zhu, Kevin, and Lam, Michael
- Subjects
Computer Science - Computation and Language - Abstract
When using AI to detect signs of depressive disorder, AI models habitually draw preemptive conclusions. We theorize that using chain-of-thought (CoT) prompting to evaluate Patient Health Questionnaire-8 (PHQ-8) scores will improve the accuracy of the scores determined by AI models. In our findings, when the models reasoned with CoT, the estimated PHQ-8 scores were consistently closer on average to the accepted true scores reported by each participant compared to when not using CoT. Our goal is to expand upon AI models' understanding of the intricacies of human conversation, allowing them to more effectively assess a patient's feelings and tone, therefore being able to more accurately discern mental disorder symptoms; ultimately, we hope to augment AI models' abilities, so that they can be widely accessible and used in the medical field.
- Published
- 2024
11. Online Fair Division with Contextual Bandits
- Author
-
Verma, Arun, Saha, Indrajit, Yokoo, Makoto, and Low, Bryan Kian Hsiang
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Statistics - Machine Learning - Abstract
This paper considers a novel online fair division problem involving multiple agents in which a learner observes an indivisible item that has to be irrevocably allocated to one of the agents while satisfying a fairness and efficiency constraint. Existing algorithms assume a small number of items with a sufficiently large number of copies, which ensures a good utility estimation for all item-agent pairs. However, such an assumption may not hold in many real-life applications, e.g., an online platform that has a large number of users (items) who only use the platform's service providers (agents) a few times (a few copies of items), which makes it difficult to estimate the utility for all item-agent pairs. To overcome this challenge, we model the online fair division problem using contextual bandits, assuming the utility is an unknown function of the item-agent features. We then propose algorithms for online fair division with sub-linear regret guarantees. Our experimental results also verify the different performance aspects of the proposed algorithms., Comment: We study an online fair division problem that has a large number of items with only a few copies of each item and propose contextual bandits-based algorithms with sub-linear regret guarantees
- Published
- 2024
12. uMedSum: A Unified Framework for Advancing Medical Abstractive Summarization
- Author
-
Nagar, Aishik, Liu, Yutong, Liu, Andy T., Schlegel, Viktor, Dwivedi, Vijay Prakash, Kaliya-Perumal, Arun-Kumar, Kalanchiam, Guna Pratheep, Tang, Yili, and Tan, Robby T.
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Medical abstractive summarization faces the challenge of balancing faithfulness and informativeness. Current methods often sacrifice key information for faithfulness or introduce confabulations when prioritizing informativeness. While recent advancements in techniques like in-context learning (ICL) and fine-tuning have improved medical summarization, they often overlook crucial aspects such as faithfulness and informativeness without considering advanced methods like model reasoning and self-improvement. Moreover, the field lacks a unified benchmark, hindering systematic evaluation due to varied metrics and datasets. This paper addresses these gaps by presenting a comprehensive benchmark of six advanced abstractive summarization methods across three diverse datasets using five standardized metrics. Building on these findings, we propose uMedSum, a modular hybrid summarization framework that introduces novel approaches for sequential confabulation removal followed by key missing information addition, ensuring both faithfulness and informativeness. Our work improves upon previous GPT-4-based state-of-the-art (SOTA) medical summarization methods, significantly outperforming them in both quantitative metrics and qualitative domain expert evaluations. Notably, we achieve an average relative performance improvement of 11.8% in reference-free metrics over the previous SOTA. Doctors prefer uMedSum's summaries 6 times more than previous SOTA in difficult cases where there are chances of confabulations or missing information. These results highlight uMedSum's effectiveness and generalizability across various datasets and metrics, marking a significant advancement in medical summarization., Comment: 12 pages
- Published
- 2024
13. On Missing Scores in Evolving Multibiometric Systems
- Author
-
Dale, Melissa R, Jain, Anil, and Ross, Arun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The use of multiple modalities (e.g., face and fingerprint) or multiple algorithms (e.g., three face comparators) has shown to improve the recognition accuracy of an operational biometric system. Over time a biometric system may evolve to add new modalities, retire old modalities, or be merged with other biometric systems. This can lead to scenarios where there are missing scores corresponding to the input probe set. Previous work on this topic has focused on either the verification or identification tasks, but not both. Further, the proportion of missing data considered has been less than 50%. In this work, we study the impact of missing score data for both the verification and identification tasks. We show that the application of various score imputation methods along with simple sum fusion can improve recognition accuracy, even when the proportion of missing scores increases to 90%. Experiments show that fusion after score imputation outperforms fusion with no imputation. Specifically, iterative imputation with K nearest neighbors consistently surpasses other imputation methods in both the verification and identification tasks, regardless of the amount of scores missing, and provides imputed values that are consistent with the ground truth complete dataset., Comment: 2022 26th International Conference on Pattern Recognition (ICPR)
- Published
- 2024
- Full Text
- View/download PDF
14. A case study on different one-factor Cheyette models for short maturity caplet calibration
- Author
-
Polala, Arun Kumar and Hientzsch, Bernhard
- Subjects
Quantitative Finance - Computational Finance ,Mathematics - Numerical Analysis ,Quantitative Finance - Mathematical Finance - Abstract
In [1], we calibrated a one-factor Cheyette SLV model with a local volatility that is linear in the benchmark forward rate and an uncorrelated CIR stochastic variance to 3M caplets of various maturities. While caplet smiles for many maturities could be reasonably well calibrated across the range of strikes, for instance the 1Y maturity could not be calibrated well across that entire range of strikes. Here, we study whether models with alternative local volatility terms and/or alternative stochastic volatility or variance models can calibrate the 1Y caplet smile better across the strike range better than the model studied in [1]. This is made possible and feasible by the generic simulation, pricing, and calibration frameworks introduced in [1] and some new frameworks presented in this paper. We find that some model settings calibrate well to the 1Y smile across the strike range under study. In particular, a model setting with a local volatility that is piece-wise linear in the benchmark forward rate together with an uncorrelated CIR stochastic variance and one with a local volatility that is linear in the benchmark rate together with a correlated lognormal stochastic volatility with quadratic drift (QDLNSV) as in [2] calibrate well. We discuss why the later might be a preferable model. [1] Arun Kumar Polala and Bernhard Hientzsch. Parametric differential machine learning for pricing and calibration. arXiv preprint arXiv:2302.06682 , 2023. [2] Artur Sepp and Parviz Rakhmonov. A Robust Stochastic Volatility Model for Interest Rate Dynamics. Risk Magazine, 2023
- Published
- 2024
15. Transfusion: Predict the Next Token and Diffuse Images with One Multi-Modal Model
- Author
-
Zhou, Chunting, Yu, Lili, Babu, Arun, Tirumala, Kushal, Yasunaga, Michihiro, Shamis, Leonid, Kahn, Jacob, Ma, Xuezhe, Zettlemoyer, Luke, and Levy, Omer
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
We introduce Transfusion, a recipe for training a multi-modal model over discrete and continuous data. Transfusion combines the language modeling loss function (next token prediction) with diffusion to train a single transformer over mixed-modality sequences. We pretrain multiple Transfusion models up to 7B parameters from scratch on a mixture of text and image data, establishing scaling laws with respect to a variety of uni- and cross-modal benchmarks. Our experiments show that Transfusion scales significantly better than quantizing images and training a language model over discrete image tokens. By introducing modality-specific encoding and decoding layers, we can further improve the performance of Transfusion models, and even compress each image to just 16 patches. We further demonstrate that scaling our Transfusion recipe to 7B parameters and 2T multi-modal tokens produces a model that can generate images and text on a par with similar scale diffusion models and language models, reaping the benefits of both worlds., Comment: 23 pages
- Published
- 2024
16. Facial Demorphing via Identity Preserving Image Decomposition
- Author
-
Shukla, Nitish and Ross, Arun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
A face morph is created by combining the face images usually pertaining to two distinct identities. The goal is to generate an image that can be matched with two identities thereby undermining the security of a face recognition system. To deal with this problem, several morph attack detection techniques have been developed. But these methods do not extract any information about the underlying bonafides used to create them. Demorphing addresses this limitation. However, current demorphing techniques are mostly reference-based, i.e, they need an image of one of the identities to recover the other. In this work, we treat demorphing as an ill-posed decomposition problem. We propose a novel method that is reference-free and recovers the bonafides with high accuracy. Our method decomposes the morph into several identity-preserving feature components. A merger network then weighs and combines these components to recover the bonafides. Our method is observed to reconstruct high-quality bonafides in terms of definition and fidelity. Experiments on the CASIA-WebFace, SMDD and AMSL datasets demonstrate the effectiveness of our method.
- Published
- 2024
17. Eulerian Graph Sparsification by Effective Resistance Decomposition
- Author
-
Jambulapati, Arun, Sachdeva, Sushant, Sidford, Aaron, Tian, Kevin, and Zhao, Yibin
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
We provide an algorithm that, given an $n$-vertex $m$-edge Eulerian graph with polynomially bounded weights, computes an $\breve{O}(n\log^{2} n \cdot \varepsilon^{-2})$-edge $\varepsilon$-approximate Eulerian sparsifier with high probability in $\breve{O}(m\log^3 n)$ time (where $\breve{O}(\cdot)$ hides $\text{polyloglog}(n)$ factors). Due to a reduction from [Peng-Song, STOC '22], this yields an $\breve{O}(m\log^3 n + n\log^6 n)$-time algorithm for solving $n$-vertex $m$-edge Eulerian Laplacian systems with polynomially-bounded weights with high probability, improving upon the previous state-of-the-art runtime of $\Omega(m\log^8 n + n\log^{23} n)$. We also give a polynomial-time algorithm that computes $O(\min(n\log n \cdot \varepsilon^{-2} + n\log^{5/3} n \cdot \varepsilon^{-4/3}, n\log^{3/2} n \cdot \varepsilon^{-2}))$-edge sparsifiers, improving the best such sparsity bound of $O(n\log^2 n \cdot \varepsilon^{-2} + n\log^{8/3} n \cdot \varepsilon^{-4/3})$ [Sachdeva-Thudi-Zhao, ICALP '24]. Finally, we show that our techniques extend to yield the first $O(m\cdot\text{polylog}(n))$ time algorithm for computing $O(n\varepsilon^{-1}\cdot\text{polylog}(n))$-edge graphical spectral sketches, as well as a natural Eulerian generalization we introduce. In contrast to prior Eulerian graph sparsification algorithms which used either short cycle or expander decompositions, our algorithms use a simple efficient effective resistance decomposition scheme we introduce. Our algorithms apply a natural sampling scheme and electrical routing (to achieve degree balance) to such decompositions. Our analysis leverages new asymmetric variance bounds specialized to Eulerian Laplacians and tools from discrepancy theory.
- Published
- 2024
18. A topological Hund nodal line antiferromagnet
- Author
-
Yang, Xian P., Yao, Yueh-Ting, Zheng, Pengyu, Guan, Shuyue, Zhou, Huibin, Cochran, Tyler A., Lin, Che-Min, Yin, Jia-Xin, Zhou, Xiaoting, Cheng, Zi-Jia, Li, Zhaohu, Shi, Tong, Hossain, Md Shafayat, Chi, Shengwei, Belopolski, Ilya, Jiang, Yu-Xiao, Litskevich, Maksim, Xu, Gang, Tian, Zhaoming, Bansil, Arun, Yin, Zhiping, Jia, Shuang, Chang, Tay-Rong, and Hasan, M. Zahid
- Subjects
Condensed Matter - Strongly Correlated Electrons ,Condensed Matter - Materials Science ,Physics - Applied Physics - Abstract
The interplay of topology, magnetism, and correlations gives rise to intriguing phases of matter. In this study, through state-of-the-art angle-resolved photoemission spectroscopy, density functional theory and dynamical mean-field theory calculations, we visualize a fourfold degenerate Dirac nodal line at the boundary of the bulk Brillouin zone in the antiferromagnet YMn2Ge2. We further demonstrate that this gapless, antiferromagnetic Dirac nodal line is enforced by the combination of magnetism, space-time inversion symmetry and nonsymmorphic lattice symmetry. The corresponding drumhead surface states traverse the whole surface Brillouin zone. YMn2Ge2 thus serves as a platform to exhibit the interplay of multiple degenerate nodal physics and antiferromagnetism. Interestingly, the magnetic nodal line displays a d-orbital dependent renormalization along its trajectory in momentum space, thereby manifesting Hund coupling. Our findings offer insights into the effect of electronic correlations on magnetic Dirac nodal lines, leading to an antiferromagnetic Hund nodal line.
- Published
- 2024
- Full Text
- View/download PDF
19. An Asymptotic Preserving Scheme for the Euler-Poisson-Boltzmann System in the Quasineutral Limit
- Author
-
Arun, K. R. and Ghorai, R.
- Subjects
Mathematics - Numerical Analysis ,35L45, 35L65, 35Q31, 65M08, 76M12 - Abstract
In this paper, we study an asymptotic preserving (AP), energy stable and positivity preserving semi-implicit finite volume scheme for the Euler-Poisson-Boltzmann (EPB) system in the quasineutral limit. The key to energy stability is the addition of appropriate stabilisation terms into the convective fluxes of mass and momenta, and the source term. The space-time fully-discrete scheme admits the positivity of the mass density, and is consistent with the weak formulation of the EPB system upon mesh refinement. In the quasineutral limit, the numerical scheme yields a consistent, semi-implicit discretisation of the isothermal compressible Euler system, thus leading to the AP property. Several benchmark numerical case studies are performed to confirm the robustness and efficacy of the proposed scheme in the dispersive as well as the quasineutral regimes. The numerical results also corroborates scheme's ability to very well resolve plasma sheaths and the related dynamics, which indicates its potential to applications involving low-temperature plasma problems., Comment: 37 pages
- Published
- 2024
20. To Impute or Not: Recommendations for Multibiometric Fusion
- Author
-
Dale, Melissa R, Singer, Elliot, Borgström, Bengt J., and Ross, Arun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Combining match scores from different biometric systems via fusion is a well-established approach to improving recognition accuracy. However, missing scores can degrade performance as well as limit the possible fusion techniques that can be applied. Imputation is a promising technique in multibiometric systems for replacing missing data. In this paper, we evaluate various score imputation approaches on three multimodal biometric score datasets, viz. NIST BSSR1, BIOCOP2008, and MIT LL Trimodal, and investigate the factors which might influence the effectiveness of imputation. Our studies reveal three key observations: (1) Imputation is preferable over not imputing missing scores, even when the fusion rule does not require complete score data. (2) Balancing the classes in the training data is crucial to mitigate negative biases in the imputation technique towards the under-represented class, even if it involves dropping a substantial number of score vectors. (3) Multivariate imputation approaches seem to be beneficial when scores between modalities are correlated, while univariate approaches seem to benefit scenarios where scores between modalities are less correlated., Comment: Proc. of IEEE International Workshop on Information Forensics and Security (WIFS), (Nuremberg, Germany), December 2023
- Published
- 2024
- Full Text
- View/download PDF
21. Detecting Near-Duplicate Face Images
- Author
-
Banerjee, Sudipta and Ross, Arun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Near-duplicate images are often generated when applying repeated photometric and geometric transformations that produce imperceptible variants of the original image. Consequently, a deluge of near-duplicates can be circulated online posing copyright infringement concerns. The concerns are more severe when biometric data is altered through such nuanced transformations. In this work, we address the challenge of near-duplicate detection in face images by, firstly, identifying the original image from a set of near-duplicates and, secondly, deducing the relationship between the original image and the near-duplicates. We construct a tree-like structure, called an Image Phylogeny Tree (IPT) using a graph-theoretic approach to estimate the relationship, i.e., determine the sequence in which they have been generated. We further extend our method to create an ensemble of IPTs known as Image Phylogeny Forests (IPFs). We rigorously evaluate our method to demonstrate robustness across other modalities, unseen transformations by latest generative models and IPT configurations, thereby significantly advancing the state-of-the-art performance by 42% on IPF reconstruction accuracy., Comment: Under review
- Published
- 2024
22. Using Retriever Augmented Large Language Models for Attack Graph Generation
- Author
-
Prapty, Renascence Tarafder, Kundu, Ashish, and Iyengar, Arun
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
As the complexity of modern systems increases, so does the importance of assessing their security posture through effective vulnerability management and threat modeling techniques. One powerful tool in the arsenal of cybersecurity professionals is the attack graph, a representation of all potential attack paths within a system that an adversary might exploit to achieve a certain objective. Traditional methods of generating attack graphs involve expert knowledge, manual curation, and computational algorithms that might not cover the entire threat landscape due to the ever-evolving nature of vulnerabilities and exploits. This paper explores the approach of leveraging large language models (LLMs), such as ChatGPT, to automate the generation of attack graphs by intelligently chaining Common Vulnerabilities and Exposures (CVEs) based on their preconditions and effects. It also shows how to utilize LLMs to create attack graphs from threat reports.
- Published
- 2024
23. ChatGPT Meets Iris Biometrics
- Author
-
Farmanifard, Parisa and Ross, Arun
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
This study utilizes the advanced capabilities of the GPT-4 multimodal Large Language Model (LLM) to explore its potential in iris recognition - a field less common and more specialized than face recognition. By focusing on this niche yet crucial area, we investigate how well AI tools like ChatGPT can understand and analyze iris images. Through a series of meticulously designed experiments employing a zero-shot learning approach, the capabilities of ChatGPT-4 was assessed across various challenging conditions including diverse datasets, presentation attacks, occlusions such as glasses, and other real-world variations. The findings convey ChatGPT-4's remarkable adaptability and precision, revealing its proficiency in identifying distinctive iris features, while also detecting subtle effects like makeup on iris recognition. A comparative analysis with Gemini Advanced - Google's AI model - highlighted ChatGPT-4's better performance and user experience in complex iris analysis tasks. This research not only validates the use of LLMs for specialized biometric applications but also emphasizes the importance of nuanced query framing and interaction design in extracting significant insights from biometric data. Our findings suggest a promising path for future research and the development of more adaptable, efficient, robust and interactive biometric security solutions., Comment: Published at IJCB 2024
- Published
- 2024
24. Ultra-soft liquid-ferrofluid interfaces
- Author
-
Dev, Arvind Arun, Hermans, Thomas, and Doudin, Bernard
- Subjects
Condensed Matter - Soft Condensed Matter ,Physics - Fluid Dynamics - Abstract
Soft interfaces are ubiquitous in nature, governing quintessential hydrodynamics functions, like lubrication, stability and cargo transport. It is shown here how a magnetic force field at a magnetic-nonmagnetic fluid interface results in an ultra-soft interface with nonlinear elasticity and tunable viscous shear properties. The balance between magnetic pressure, viscous stress and Laplace pressure results in a deformed and stable liquid-in-liquid tube with apparent elasticity in the range 2 kPa -10 kPa, possibly extended by a proper choice of liquid properties. Such highly deformable liquid-liquid interfaces of arbitrary shape with vanishing viscous shear open doors to unique microfluidic phenomena, biomaterial flows and complex biosystems mimicking., Comment: 7 pages , 5 figures. arXiv admin note: text overlap with arXiv:2310.14280
- Published
- 2024
25. Learning to Turn: Diffusion Imitation for Robust Row Turning in Under-Canopy Robots
- Author
-
Sivakumar, Arun N., Thangeda, Pranay, Fang, Yixiao, Gasparino, Mateus V., Cuaran, Jose, Ornik, Melkior, and Chowdhary, Girish
- Subjects
Computer Science - Robotics - Abstract
Under-canopy agricultural robots require robust navigation capabilities to enable full autonomy but struggle with tight row turning between crop rows due to degraded GPS reception, visual aliasing, occlusion, and complex vehicle dynamics. We propose an imitation learning approach using diffusion policies to learn row turning behaviors from demonstrations provided by human operators or privileged controllers. Simulation experiments in a corn field environment show potential in learning this task with only visual observations and velocity states. However, challenges remain in maintaining control within rows and handling varied initial conditions, highlighting areas for future improvement., Comment: Accepted as Extended Abstract to the IEEE ICRA@40 2024
- Published
- 2024
26. Automatic rating of incomplete hippocampal inversions evaluated across multiple cohorts
- Author
-
Hemforth, Lisa, Couvy-Duchesne, Baptiste, De Matos, Kevin, Brianceau, Camille, Joulot, Matthieu, Banaschewski, Tobias, Bokde, Arun L. W., Desrivières, Sylvane, Flor, Herta, Grigis, Antoine, Garavan, Hugh, Gowland, Penny, Heinz, Andreas, Brühl, Rüdiger, Martinot, Jean-Luc, Martinot, Marie-Laure Paillère, Artiges, Eric, Papadopoulos, Dimitri, Lemaitre, Herve, Paus, Tomas, Poustka, Luise, Hohmann, Sarah, Holz, Nathalie, Fröhner, Juliane H., Smolka, Michael N., Vaidya, Nilakshi, Walter, Henrik, Whelan, Robert, Schumann, Gunter, Büchel, Christian, Poline, JB, Itterman, Bernd, Frouin, Vincent, Martin, Alexandre, group, IMAGEN study, Cury, Claire, and Colliot, Olivier
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Quantitative Biology - Neurons and Cognition - Abstract
Incomplete Hippocampal Inversion (IHI), sometimes called hippocampal malrotation, is an atypical anatomical pattern of the hippocampus found in about 20% of the general population. IHI can be visually assessed on coronal slices of T1 weighted MR images, using a composite score that combines four anatomical criteria. IHI has been associated with several brain disorders (epilepsy, schizophrenia). However, these studies were based on small samples. Furthermore, the factors (genetic or environmental) that contribute to the genesis of IHI are largely unknown. Large-scale studies are thus needed to further understand IHI and their potential relationships to neurological and psychiatric disorders. However, visual evaluation is long and tedious, justifying the need for an automatic method. In this paper, we propose, for the first time, to automatically rate IHI. We proceed by predicting four anatomical criteria, which are then summed up to form the IHI score, providing the advantage of an interpretable score. We provided an extensive experimental investigation of different machine learning methods and training strategies. We performed automatic rating using a variety of deep learning models (conv5-FC3, ResNet and SECNN) as well as a ridge regression. We studied the generalization of our models using different cohorts and performed multi-cohort learning. We relied on a large population of 2,008 participants from the IMAGEN study, 993 and 403 participants from the QTIM/QTAB studies as well as 985 subjects from the UKBiobank. We showed that deep learning models outperformed a ridge regression. We demonstrated that the performances of the conv5-FC3 network were at least as good as more complex networks while maintaining a low complexity and computation time. We showed that training on a single cohort may lack in variability while training on several cohorts improves generalization., Comment: Accepted for publication at the Journal of Machine Learning for Biomedical Imaging (MELBA) https://melba-journal.org/2024:016
- Published
- 2024
- Full Text
- View/download PDF
27. Ian G. Macdonald: Works of Art
- Author
-
Ram, Arun
- Subjects
Mathematics - Combinatorics ,Mathematics - Algebraic Geometry ,Mathematics - History and Overview ,Mathematics - Representation Theory ,01A70, 05E05 - Abstract
Ian Macdonald's works changed our perspective on so many parts of algebraic combinatorics and formal power series. This talk will display some selected works of the art of Ian Macdonald, representative of different periods of his oeuvre, and analyze how they resonate, both for the past development of our subject and for its future. This paper was prepared for the occasion of a lecture in tribute to Ian G. Macdonald, delivered at FPSAC 2024 in Bochum, Germany on 22 July 2024. I want to express thanks to the Executive Committee of FPSAC, the Organizing Committee of FPSAC 2024, and to the whole of our FPSAC 2024 community for making this lecture a possibility and for considering me for its delivery. Macdonald is my hero, and to be asked to play such a role in his legacy touches me deeply.
- Published
- 2024
28. Assessing Robustness of Machine Learning Models using Covariate Perturbations
- Author
-
R, Arun Prakash, Bhattacharyya, Anwesha, Vaughan, Joel, and Nair, Vijayan N.
- Subjects
Statistics - Machine Learning ,Computer Science - Machine Learning - Abstract
As machine learning models become increasingly prevalent in critical decision-making models and systems in fields like finance, healthcare, etc., ensuring their robustness against adversarial attacks and changes in the input data is paramount, especially in cases where models potentially overfit. This paper proposes a comprehensive framework for assessing the robustness of machine learning models through covariate perturbation techniques. We explore various perturbation strategies to assess robustness and examine their impact on model predictions, including separate strategies for numeric and non-numeric variables, summaries of perturbations to assess and compare model robustness across different scenarios, and local robustness diagnosis to identify any regions in the data where a model is particularly unstable. Through empirical studies on real world dataset, we demonstrate the effectiveness of our approach in comparing robustness across models, identifying the instabilities in the model, and enhancing model robustness., Comment: 31 pages, 11 figures, 14 tables
- Published
- 2024
29. Enhancing Online Road Network Perception and Reasoning with Standard Definition Maps
- Author
-
Zhang, Hengyuan, Paz, David, Guo, Yuliang, Das, Arun, Huang, Xinyu, Haug, Karsten, Christensen, Henrik I., and Ren, Liu
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Robotics - Abstract
Autonomous driving for urban and highway driving applications often requires High Definition (HD) maps to generate a navigation plan. Nevertheless, various challenges arise when generating and maintaining HD maps at scale. While recent online mapping methods have started to emerge, their performance especially for longer ranges is limited by heavy occlusion in dynamic environments. With these considerations in mind, our work focuses on leveraging lightweight and scalable priors-Standard Definition (SD) maps-in the development of online vectorized HD map representations. We first examine the integration of prototypical rasterized SD map representations into various online mapping architectures. Furthermore, to identify lightweight strategies, we extend the OpenLane-V2 dataset with OpenStreetMaps and evaluate the benefits of graphical SD map representations. A key finding from designing SD map integration components is that SD map encoders are model agnostic and can be quickly adapted to new architectures that utilize bird's eye view (BEV) encoders. Our results show that making use of SD maps as priors for the online mapping task can significantly speed up convergence and boost the performance of the online centerline perception task by 30% (mAP). Furthermore, we show that the introduction of the SD maps leads to a reduction of the number of parameters in the perception and reasoning task by leveraging SD map graphs while improving the overall performance. Project Page: https://henryzhangzhy.github.io/sdhdmap/., Comment: Accepted by the 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2024)
- Published
- 2024
30. MIS-ME: A Multi-modal Framework for Soil Moisture Estimation
- Author
-
Rakib, Mohammed, Mohammed, Adil Aman, Diggins, D. Cole, Sharma, Sumit, Sadler, Jeff Michael, Ochsner, Tyson, and Bagavathi, Arun
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Soil moisture estimation is an important task to enable precision agriculture in creating optimal plans for irrigation, fertilization, and harvest. It is common to utilize statistical and machine learning models to estimate soil moisture from traditional data sources such as weather forecasts, soil properties, and crop properties. However, there is a growing interest in utilizing aerial and geospatial imagery to estimate soil moisture. Although these images capture high-resolution crop details, they are expensive to curate and challenging to interpret. Imagine, an AI-enhanced software tool that predicts soil moisture using visual cues captured by smartphones and statistical data given by weather forecasts. This work is a first step towards that goal of developing a multi-modal approach for soil moisture estimation. In particular, we curate a dataset consisting of real-world images taken from ground stations and their corresponding weather data. We also propose MIS-ME - Meteorological & Image based Soil Moisture Estimator, a multi-modal framework for soil moisture estimation. Our extensive analysis shows that MIS-ME achieves a MAPE of 10.14%, outperforming traditional unimodal approaches with a reduction of 3.25% in MAPE for meteorological data and 2.15% in MAPE for image data, highlighting the effectiveness of tailored multi-modal approaches. Our code and dataset will be available at https://github.com/OSU-Complex-Systems/MIS-ME.git., Comment: Accepted by DSAA2024
- Published
- 2024
31. Detection of a new sample of Galactic White Dwarfs in the direction of the Small Magellanic Cloud
- Author
-
Sidharth, A. V., Shridharan, B., Mathew, Blesson, Devaraj, A., Cysil, T. B., Stalin, C. S., Arun, R., Bhattacharyya, Suman, Kartha, Sreeja S., and Robin, T.
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - Astrophysics of Galaxies - Abstract
In this study, we demonstrate the efficacy of the Ultraviolet Imaging Telescope (UVIT) in identifying and characterizing white dwarfs (WDs) within the Milky Way Galaxy. Leveraging the UVIT point source catalogue towards SMC and crossmatching with Gaia DR3 data, we identified 43 single WDs (37 new detections), 13 new WD+main sequence (MS) candidates and 161 UV bright MS stars by analysing their Spectral Energy Distributions (SED). Using the WD evolutionary models, we determine the masses, effective temperatures, and cooling ages of these identified WDs. Masses of these WDs range from 0.2 to 1.3 M$_{\odot}$ and effective temperatures (T$_{eff}$) between 10000 K to 15000 K, with cooling ages spanning 0.1 to 2 Gyr. Notably, we detect hotter WDs compared to literature values, which is attributed to the sensitivity of UVIT. Furthermore, we report the detection of 20 new extremely low-mass (ELM) candidates from our analysis. Future spectroscopic studies of the ELM candidates will help us understand the formation scenarios of these exotic objects. Despite limitations in Gaia DR3 distance measurements for optically faint WDs, we provide a crude estimate of the WD space density within 1kpc as 1.3 $\times$ 10$^{-3}$ pc$^{-3}$, which is higher than previous estimates in the literature. Our results underscore the instrumental capabilities of UVIT and anticipate the forthcoming UV missions like INSIST for systematic WD discovery. Our methodology sets a precedent for future analyses in other UVIT fields to find more WDs and perform spectroscopic studies to verify their candidacy., Comment: Accepted for publication in Astronomy & Astrophysics
- Published
- 2024
32. The Llama 3 Herd of Models
- Author
-
Dubey, Abhimanyu, Jauhri, Abhinav, Pandey, Abhinav, Kadian, Abhishek, Al-Dahle, Ahmad, Letman, Aiesha, Mathur, Akhil, Schelten, Alan, Yang, Amy, Fan, Angela, Goyal, Anirudh, Hartshorn, Anthony, Yang, Aobo, Mitra, Archi, Sravankumar, Archie, Korenev, Artem, Hinsvark, Arthur, Rao, Arun, Zhang, Aston, Rodriguez, Aurelien, Gregerson, Austen, Spataru, Ava, Roziere, Baptiste, Biron, Bethany, Tang, Binh, Chern, Bobbie, Caucheteux, Charlotte, Nayak, Chaya, Bi, Chloe, Marra, Chris, McConnell, Chris, Keller, Christian, Touret, Christophe, Wu, Chunyang, Wong, Corinne, Ferrer, Cristian Canton, Nikolaidis, Cyrus, Allonsius, Damien, Song, Daniel, Pintz, Danielle, Livshits, Danny, Esiobu, David, Choudhary, Dhruv, Mahajan, Dhruv, Garcia-Olano, Diego, Perino, Diego, Hupkes, Dieuwke, Lakomkin, Egor, AlBadawy, Ehab, Lobanova, Elina, Dinan, Emily, Smith, Eric Michael, Radenovic, Filip, Zhang, Frank, Synnaeve, Gabriel, Lee, Gabrielle, Anderson, Georgia Lewis, Nail, Graeme, Mialon, Gregoire, Pang, Guan, Cucurell, Guillem, Nguyen, Hailey, Korevaar, Hannah, Xu, Hu, Touvron, Hugo, Zarov, Iliyan, Ibarra, Imanol Arrieta, Kloumann, Isabel, Misra, Ishan, Evtimov, Ivan, Copet, Jade, Lee, Jaewon, Geffert, Jan, Vranes, Jana, Park, Jason, Mahadeokar, Jay, Shah, Jeet, van der Linde, Jelmer, Billock, Jennifer, Hong, Jenny, Lee, Jenya, Fu, Jeremy, Chi, Jianfeng, Huang, Jianyu, Liu, Jiawen, Wang, Jie, Yu, Jiecao, Bitton, Joanna, Spisak, Joe, Park, Jongsoo, Rocca, Joseph, Johnstun, Joshua, Saxe, Joshua, Jia, Junteng, Alwala, Kalyan Vasuden, Upasani, Kartikeya, Plawiak, Kate, Li, Ke, Heafield, Kenneth, Stone, Kevin, El-Arini, Khalid, Iyer, Krithika, Malik, Kshitiz, Chiu, Kuenley, Bhalla, Kunal, Rantala-Yeary, Lauren, van der Maaten, Laurens, Chen, Lawrence, Tan, Liang, Jenkins, Liz, Martin, Louis, Madaan, Lovish, Malo, Lubo, Blecher, Lukas, Landzaat, Lukas, de Oliveira, Luke, Muzzi, Madeline, Pasupuleti, Mahesh, Singh, Mannat, Paluri, Manohar, Kardas, Marcin, Oldham, Mathew, Rita, Mathieu, Pavlova, Maya, Kambadur, Melanie, Lewis, Mike, Si, Min, Singh, Mitesh Kumar, Hassan, Mona, Goyal, Naman, Torabi, Narjes, Bashlykov, Nikolay, Bogoychev, Nikolay, Chatterji, Niladri, Duchenne, Olivier, Çelebi, Onur, Alrassy, Patrick, Zhang, Pengchuan, Li, Pengwei, Vasic, Petar, Weng, Peter, Bhargava, Prajjwal, Dubal, Pratik, Krishnan, Praveen, Koura, Punit Singh, Xu, Puxin, He, Qing, Dong, Qingxiao, Srinivasan, Ragavan, Ganapathy, Raj, Calderer, Ramon, Cabral, Ricardo Silveira, Stojnic, Robert, Raileanu, Roberta, Girdhar, Rohit, Patel, Rohit, Sauvestre, Romain, Polidoro, Ronnie, Sumbaly, Roshan, Taylor, Ross, Silva, Ruan, Hou, Rui, Wang, Rui, Hosseini, Saghar, Chennabasappa, Sahana, Singh, Sanjay, Bell, Sean, Kim, Seohyun Sonia, Edunov, Sergey, Nie, Shaoliang, Narang, Sharan, Raparthy, Sharath, Shen, Sheng, Wan, Shengye, Bhosale, Shruti, Zhang, Shun, Vandenhende, Simon, Batra, Soumya, Whitman, Spencer, Sootla, Sten, Collot, Stephane, Gururangan, Suchin, Borodinsky, Sydney, Herman, Tamar, Fowler, Tara, Sheasha, Tarek, Georgiou, Thomas, Scialom, Thomas, Speckbacher, Tobias, Mihaylov, Todor, Xiao, Tong, Karn, Ujjwal, Goswami, Vedanuj, Gupta, Vibhor, Ramanathan, Vignesh, Kerkez, Viktor, Gonguet, Vincent, Do, Virginie, Vogeti, Vish, Petrovic, Vladan, Chu, Weiwei, Xiong, Wenhan, Fu, Wenyin, Meers, Whitney, Martinet, Xavier, Wang, Xiaodong, Tan, Xiaoqing Ellen, Xie, Xinfeng, Jia, Xuchao, Wang, Xuewei, Goldschlag, Yaelle, Gaur, Yashesh, Babaei, Yasmine, Wen, Yi, Song, Yiwen, Zhang, Yuchen, Li, Yue, Mao, Yuning, Coudert, Zacharie Delpierre, Yan, Zheng, Chen, Zhengxing, Papakipos, Zoe, Singh, Aaditya, Grattafiori, Aaron, Jain, Abha, Kelsey, Adam, Shajnfeld, Adam, Gangidi, Adithya, Victoria, Adolfo, Goldstand, Ahuva, Menon, Ajay, Sharma, Ajay, Boesenberg, Alex, Vaughan, Alex, Baevski, Alexei, Feinstein, Allie, Kallet, Amanda, Sangani, Amit, Yunus, Anam, Lupu, Andrei, Alvarado, Andres, Caples, Andrew, Gu, Andrew, Ho, Andrew, Poulton, Andrew, Ryan, Andrew, Ramchandani, Ankit, Franco, Annie, Saraf, Aparajita, Chowdhury, Arkabandhu, Gabriel, Ashley, Bharambe, Ashwin, Eisenman, Assaf, Yazdan, Azadeh, James, Beau, Maurer, Ben, Leonhardi, Benjamin, Huang, Bernie, Loyd, Beth, De Paola, Beto, Paranjape, Bhargavi, Liu, Bing, Wu, Bo, Ni, Boyu, Hancock, Braden, Wasti, Bram, Spence, Brandon, Stojkovic, Brani, Gamido, Brian, Montalvo, Britt, Parker, Carl, Burton, Carly, Mejia, Catalina, Wang, Changhan, Kim, Changkyu, Zhou, Chao, Hu, Chester, Chu, Ching-Hsiang, Cai, Chris, Tindal, Chris, Feichtenhofer, Christoph, Civin, Damon, Beaty, Dana, Kreymer, Daniel, Li, Daniel, Wyatt, Danny, Adkins, David, Xu, David, Testuggine, Davide, David, Delia, Parikh, Devi, Liskovich, Diana, Foss, Didem, Wang, Dingkang, Le, Duc, Holland, Dustin, Dowling, Edward, Jamil, Eissa, Montgomery, Elaine, Presani, Eleonora, Hahn, Emily, Wood, Emily, Brinkman, Erik, Arcaute, Esteban, Dunbar, Evan, Smothers, Evan, Sun, Fei, Kreuk, Felix, Tian, Feng, Ozgenel, Firat, Caggioni, Francesco, Guzmán, Francisco, Kanayet, Frank, Seide, Frank, Florez, Gabriela Medina, Schwarz, Gabriella, Badeer, Gada, Swee, Georgia, Halpern, Gil, Thattai, Govind, Herman, Grant, Sizov, Grigory, Guangyi, Zhang, Lakshminarayanan, Guna, Shojanazeri, Hamid, Zou, Han, Wang, Hannah, Zha, Hanwen, Habeeb, Haroun, Rudolph, Harrison, Suk, Helen, Aspegren, Henry, Goldman, Hunter, Damlaj, Ibrahim, Molybog, Igor, Tufanov, Igor, Veliche, Irina-Elena, Gat, Itai, Weissman, Jake, Geboski, James, Kohli, James, Asher, Japhet, Gaya, Jean-Baptiste, Marcus, Jeff, Tang, Jeff, Chan, Jennifer, Zhen, Jenny, Reizenstein, Jeremy, Teboul, Jeremy, Zhong, Jessica, Jin, Jian, Yang, Jingyi, Cummings, Joe, Carvill, Jon, Shepard, Jon, McPhie, Jonathan, Torres, Jonathan, Ginsburg, Josh, Wang, Junjie, Wu, Kai, U, Kam Hou, Saxena, Karan, Prasad, Karthik, Khandelwal, Kartikay, Zand, Katayoun, Matosich, Kathy, Veeraraghavan, Kaushik, Michelena, Kelly, Li, Keqian, Huang, Kun, Chawla, Kunal, Lakhotia, Kushal, Huang, Kyle, Chen, Lailin, Garg, Lakshya, A, Lavender, Silva, Leandro, Bell, Lee, Zhang, Lei, Guo, Liangpeng, Yu, Licheng, Moshkovich, Liron, Wehrstedt, Luca, Khabsa, Madian, Avalani, Manav, Bhatt, Manish, Tsimpoukelli, Maria, Mankus, Martynas, Hasson, Matan, Lennie, Matthew, Reso, Matthias, Groshev, Maxim, Naumov, Maxim, Lathi, Maya, Keneally, Meghan, Seltzer, Michael L., Valko, Michal, Restrepo, Michelle, Patel, Mihir, Vyatskov, Mik, Samvelyan, Mikayel, Clark, Mike, Macey, Mike, Wang, Mike, Hermoso, Miquel Jubert, Metanat, Mo, Rastegari, Mohammad, Bansal, Munish, Santhanam, Nandhini, Parks, Natascha, White, Natasha, Bawa, Navyata, Singhal, Nayan, Egebo, Nick, Usunier, Nicolas, Laptev, Nikolay Pavlovich, Dong, Ning, Zhang, Ning, Cheng, Norman, Chernoguz, Oleg, Hart, Olivia, Salpekar, Omkar, Kalinli, Ozlem, Kent, Parkin, Parekh, Parth, Saab, Paul, Balaji, Pavan, Rittner, Pedro, Bontrager, Philip, Roux, Pierre, Dollar, Piotr, Zvyagina, Polina, Ratanchandani, Prashant, Yuvraj, Pritish, Liang, Qian, Alao, Rachad, Rodriguez, Rachel, Ayub, Rafi, Murthy, Raghotham, Nayani, Raghu, Mitra, Rahul, Li, Raymond, Hogan, Rebekkah, Battey, Robin, Wang, Rocky, Maheswari, Rohan, Howes, Russ, Rinott, Ruty, Bondu, Sai Jayesh, Datta, Samyak, Chugh, Sara, Hunt, Sara, Dhillon, Sargun, Sidorov, Sasha, Pan, Satadru, Verma, Saurabh, Yamamoto, Seiji, Ramaswamy, Sharadh, Lindsay, Shaun, Feng, Sheng, Lin, Shenghao, Zha, Shengxin Cindy, Shankar, Shiva, Zhang, Shuqiang, Wang, Sinong, Agarwal, Sneha, Sajuyigbe, Soji, Chintala, Soumith, Max, Stephanie, Chen, Stephen, Kehoe, Steve, Satterfield, Steve, Govindaprasad, Sudarshan, Gupta, Sumit, Cho, Sungmin, Virk, Sunny, Subramanian, Suraj, Choudhury, Sy, Goldman, Sydney, Remez, Tal, Glaser, Tamar, Best, Tamara, Kohler, Thilo, Robinson, Thomas, Li, Tianhe, Zhang, Tianjun, Matthews, Tim, Chou, Timothy, Shaked, Tzook, Vontimitta, Varun, Ajayi, Victoria, Montanez, Victoria, Mohan, Vijai, Kumar, Vinay Satish, Mangla, Vishal, Albiero, Vítor, Ionescu, Vlad, Poenaru, Vlad, Mihailescu, Vlad Tiberiu, Ivanov, Vladimir, Li, Wei, Wang, Wenchen, Jiang, Wenwen, Bouaziz, Wes, Constable, Will, Tang, Xiaocheng, Wang, Xiaofang, Wu, Xiaojian, Wang, Xiaolan, Xia, Xide, Wu, Xilun, Gao, Xinbo, Chen, Yanjun, Hu, Ye, Jia, Ye, Qi, Ye, Li, Yenda, Zhang, Yilin, Zhang, Ying, Adi, Yossi, Nam, Youngjin, Yu, Wang, Hao, Yuchen, Qian, Yundi, He, Yuzi, Rait, Zach, DeVito, Zachary, Rosnbrick, Zef, Wen, Zhaoduo, Yang, Zhenyu, and Zhao, Zhiwei
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical evaluation of Llama 3. We find that Llama 3 delivers comparable quality to leading language models such as GPT-4 on a plethora of tasks. We publicly release Llama 3, including pre-trained and post-trained versions of the 405B parameter language model and our Llama Guard 3 model for input and output safety. The paper also presents the results of experiments in which we integrate image, video, and speech capabilities into Llama 3 via a compositional approach. We observe this approach performs competitively with the state-of-the-art on image, video, and speech recognition tasks. The resulting models are not yet being broadly released as they are still under development.
- Published
- 2024
33. FL-DECO-BC: A Privacy-Preserving, Provably Secure, and Provenance-Preserving Federated Learning Framework with Decentralized Oracles on Blockchain for VANETs
- Author
-
Narkedimilli, Sathwik, Kumar, Rayachoti Arun, Kumar, N. V. Saran, Reddy, Ramapathruni Praneeth, and C, Pavan Kumar
- Subjects
Computer Science - Cryptography and Security - Abstract
Vehicular Ad-Hoc Networks (VANETs) hold immense potential for improving traffic safety and efficiency. However, traditional centralized approaches for machine learning in VANETs raise concerns about data privacy and security. Federated Learning (FL) offers a solution that enables collaborative model training without sharing raw data. This paper proposes FL-DECO-BC as a novel privacy-preserving, provably secure, and provenance-preserving federated learning framework specifically designed for VANETs. FL-DECO-BC leverages decentralized oracles on blockchain to securely access external data sources while ensuring data privacy through advanced techniques. The framework guarantees provable security through cryptographic primitives and formal verification methods. Furthermore, FL-DECO-BC incorporates a provenance-preserving design to track data origin and history, fostering trust and accountability. This combination of features empowers VANETs with secure and privacy-conscious machine-learning capabilities, paving the way for advanced traffic management and safety applications.
- Published
- 2024
34. Measurement of the Sequential $3\alpha$ Process in the Photodissociation of $^{12}\mathrm{C}$
- Author
-
Bharathan, Resmi K., C. V, Midhun, Musthafa, M. M, M, Sreena, Ajaykumar, Silpa, P, Farhana Thesni M., B, Swapna, T, Vafiya Thaslim T., A, Shaima, K, Nived, R, Akhil, K, Anagha P., T. V, Arunima Dev, S, Keerthi E., S, Akshay K., P. V, Arun, and Ghugre, S.
- Subjects
Nuclear Experiment - Abstract
The cross sections for the $^{12}\mathrm{C}(\gamma,\alpha)^{8}\mathrm{Be}\rightarrow 3\alpha$ reaction have been successfully measured using exclusive coincidence between three $\alpha$ particles, minimizing Compton background. Sequential breakup kinematics are evident, and the cross sections are presented as locally averaged histogram values. Theoretical \textsc{Fresco} CDCC-CRC calculations reproduce the experimental data, showing that the process involves electromagnetic coupling to both $^{8}\mathrm{Be}^{0^+}$ and $^{8}\mathrm{Be}^{2^+}$ states. This study confirms that the $^{12}\mathrm{C}(\gamma,\alpha)^{8}\mathrm{Be}\rightarrow 3\alpha$ reaction proceeds via a sequential mechanism, crucial for understanding its significance in radiotherapy dosimetry.
- Published
- 2024
35. Rates and beaming angles of GRBs associated with compact binary coalescences
- Author
-
Kapadia, Shasvath J., Dimple, Jain, Dhruv, Lekshmi, Resmi, Misra, Kuntal, and Arun, K. G.
- Subjects
Astrophysics - High Energy Astrophysical Phenomena ,General Relativity and Quantum Cosmology - Abstract
Some, if not all, binary neutron star (BNS) coalescences, and a fraction of neutron - star black hole (NSBH) mergers, are thought to produce sufficient mass-ejection to power Gamma-Ray Bursts (GRBs). However, this fraction, as well as the distribution of beaming angles of BNS-associated GRBs, are poorly constrained from observation. Recent work applied machine learning tools to analyze GRB light curves observed by {\textit{Fermi}}/GBM and {\it Swift}/BAT. GRBs were segregated into multiple distinct clusters, with the tantalizing possibility that one of them (BNS cluster) could be associated with BNSs and another (NSBH cluster) with NSBHs. As a proof of principle, assuming that all GRBs detected by {\it Fermi}/GBM and {\it Swift}/BAT associated with BNSs (NSBHs) lie in the BNS (NSBH) cluster, we estimate their rates ($\mathrm{Gpc}^{-3}\mathrm{yr}^{-1}$). We compare these rates with corresponding BNS and NSBH rates estimated by the LIGO-Virgo-Kagra (LVK) collaboration from the first three observing runs (O1, O2, O3). We find that the BNS rates are consistent with LVK's rate estimates, assuming a uniform distribution of beaming fractions ($f_b \in [0.01, 0.1]$). Conversely, using the LVK's BNS rate estimates, assuming all BNS mergers produce GRBs, we are able to constrain the beaming angle distribution to $\theta_j \in [0.8^{\circ}, 38.8^{\circ}]$ at $90\%$ confidence. We similarly place a lower limit on the fraction of GRB-Bright NSBHs to $f_B \gtrsim 0.10$ ($f_B \gtrsim 0.022$) with {\it Fermi}/GBM ({\it Swift}/BAT) data., Comment: 10 pages, 3 figures
- Published
- 2024
36. Neural Dueling Bandits
- Author
-
Verma, Arun, Dai, Zhongxiang, Lin, Xiaoqiang, Jaillet, Patrick, and Low, Bryan Kian Hsiang
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Statistics - Machine Learning - Abstract
Contextual dueling bandit is used to model the bandit problems, where a learner's goal is to find the best arm for a given context using observed noisy preference feedback over the selected arms for the past contexts. However, existing algorithms assume the reward function is linear, which can be complex and non-linear in many real-life applications like online recommendations or ranking web search results. To overcome this challenge, we use a neural network to estimate the reward function using preference feedback for the previously selected arms. We propose upper confidence bound- and Thompson sampling-based algorithms with sub-linear regret guarantees that efficiently select arms in each round. We then extend our theoretical results to contextual bandit problems with binary feedback, which is in itself a non-trivial contribution. Experimental results on the problem instances derived from synthetic datasets corroborate our theoretical results., Comment: Accepted at ICML 2024 Workshop on Foundations of Reinforcement Learning and Control
- Published
- 2024
37. PlantTrack: Task-Driven Plant Keypoint Tracking with Zero-Shot Sim2Real Transfer
- Author
-
Marri, Samhita, Sivakumar, Arun N., Uppalapati, Naveen K., and Chowdhary, Girish
- Subjects
Computer Science - Robotics ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Tracking plant features is crucial for various agricultural tasks like phenotyping, pruning, or harvesting, but the unstructured, cluttered, and deformable nature of plant environments makes it a challenging task. In this context, the recent advancements in foundational models show promise in addressing this challenge. In our work, we propose PlantTrack where we utilize DINOv2 which provides high-dimensional features, and train a keypoint heatmap predictor network to identify the locations of semantic features such as fruits and leaves which are then used as prompts for point tracking across video frames using TAPIR. We show that with as few as 20 synthetic images for training the keypoint predictor, we achieve zero-shot Sim2Real transfer, enabling effective tracking of plant features in real environments.
- Published
- 2024
38. Can Hubble tension be eased by invoking a finite range for gravity?
- Author
-
Rebecca, Louise, Sivaram, C, Sebastian, Dominic, and Arun, Kenath
- Subjects
General Relativity and Quantum Cosmology - Abstract
The estimation of the Hubble constant in the past few decades has increasingly become more accurate with the advance of new techniques. But its value seems to depend on the epoch at which the measurements are made. The Planck estimate of the Hubble constant from the observations of the cosmic microwave background radiation in the early universe is about 67 km/s/Mpc, whereas that obtained from the distance indicators at the current epoch is about 73-74 km/s/Mpc. This discrepancy between the two groups of measurement is termed as the Hubble tension which has gained much attention in the past few decades with growing significance as measurements from both, the early and the late universe, studies continue to produce results with increasing precision. In this work, we propose a modification to gravity by considering a finite range gravitational field as an alternate explanation for this discrepancy in the value of the Hubble constant., Comment: 12 pages, 2 figures, 28 equations
- Published
- 2024
- Full Text
- View/download PDF
39. A multi-functional fiber positioning system for Extremely Large Telescopes
- Author
-
Bestha, Manjunath, Sivarani, T., Surya, Arun, Yadav, Sudharsan, Unni, Athira, M, Parvathy, Divakar, Devika, Sriram, S., Prakash, Ajin, and Hasan, Amirul
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics - Abstract
We present a conceptual design for a fiber positioning system for multi-object high-resolution spectroscopy, designed to be compatible with the upcoming large telescopes with a wide field of view. The design incorporates multiple Atmospheric Dispersion Correctors (ADCs) and tip-tilt mirrors that receive non-telecentric input from individual targets and direct it to the ADCs. Here, we introduce a mechanical design for the fiber positioner that accommodates the optics and operates in a curved focal plane with a Radius of Curvature (R) of 3m. This mechanical design provides four degrees of freedom to access the focal volume, enhancing targeting efficiency. The proposed design and an efficient target allocation algorithm ensure a targeting efficiency of approximately 80-100% for a primary observation session. We also present a methodology for target assignment, positioning, and quantification based on sequential and Monte Carlo (MC) algorithms. This method has been tested on realistic fields with varying target densities to validate its performance.
- Published
- 2024
- Full Text
- View/download PDF
40. DOLOS: Tricking the Wi-Fi APs with Incorrect User Locations
- Author
-
Arun, Aditya, Anand, Vaibhav, Sun, Wei, Ayyalasomayajula, Roshan, and Bharadia, Dinesh
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Wi-Fi-based indoor localization has been extensively studied for context-aware services. As a result, the accurate Wi-Fi-based indoor localization introduces a great location privacy threat. However, the existing solutions for location privacy protection are hard to implement on current devices. They require extra hardware deployment in the environment or hardware modifications at the transmitter or receiver side. To this end, we propose DOLOS, a system that can protect the location privacy of the Wi-Fi user with a novel signal obfuscation approach. DOLOSis a software-only solution that can be deployed on existing protocol-compliant Wi-Fi user devices. We provide this obfuscation by invalidating a simple assumption made by most localization systems -- "direct path signal arrives earlier than all the reflections to distinguish this direct path prior to estimating the location". However, DOLOS creates a novel software fix that allows the user to transmit the signal wherein this direct path arrives later, creating ambiguity in the location estimates. Our experimental results demonstrate DOLOS can degrade the localization accuracy of state-of-art systems by 6x for a single AP and 2.5x for multiple AP scenarios, thereby protecting the Wi-Fi user's location privacy without compromising the Wi-Fi communication performance.
- Published
- 2024
41. LCA-on-the-Line: Benchmarking Out-of-Distribution Generalization with Class Taxonomies
- Author
-
Shi, Jia, Gare, Gautam, Tian, Jinjin, Chai, Siqi, Lin, Zhiqiu, Vasudevan, Arun, Feng, Di, Ferroni, Francesco, and Kong, Shu
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
We tackle the challenge of predicting models' Out-of-Distribution (OOD) performance using in-distribution (ID) measurements without requiring OOD data. Existing evaluations with "Effective Robustness", which use ID accuracy as an indicator of OOD accuracy, encounter limitations when models are trained with diverse supervision and distributions, such as class labels (Vision Models, VMs, on ImageNet) and textual descriptions (Visual-Language Models, VLMs, on LAION). VLMs often generalize better to OOD data than VMs despite having similar or lower ID performance. To improve the prediction of models' OOD performance from ID measurements, we introduce the Lowest Common Ancestor (LCA)-on-the-Line framework. This approach revisits the established concept of LCA distance, which measures the hierarchical distance between labels and predictions within a predefined class hierarchy, such as WordNet. We assess 75 models using ImageNet as the ID dataset and five significantly shifted OOD variants, uncovering a strong linear correlation between ID LCA distance and OOD top-1 accuracy. Our method provides a compelling alternative for understanding why VLMs tend to generalize better. Additionally, we propose a technique to construct a taxonomic hierarchy on any dataset using K-means clustering, demonstrating that LCA distance is robust to the constructed taxonomic hierarchy. Moreover, we demonstrate that aligning model predictions with class taxonomies, through soft labels or prompt engineering, can enhance model generalization. Open source code in our Project Page: https://elvishelvis.github.io/papers/lca/., Comment: ICML 2024 Oral Presentation; Project Page: https://elvishelvis.github.io/papers/lca/
- Published
- 2024
42. Understanding the Relationship between Prompts and Response Uncertainty in Large Language Models
- Author
-
Zhang, Ze Yu, Verma, Arun, Doshi-Velez, Finale, and Low, Bryan Kian Hsiang
- Subjects
Computer Science - Machine Learning ,Computer Science - Computation and Language - Abstract
Large language models (LLMs) are widely used in decision-making, but their reliability, especially in critical tasks like healthcare, is not well-established. Therefore, understanding how LLMs reason and make decisions is crucial for their safe deployment. This paper investigates how the uncertainty of responses generated by LLMs relates to the information provided in the input prompt. Leveraging the insight that LLMs learn to infer latent concepts during pretraining, we propose a prompt-response concept model that explains how LLMs generate responses and helps understand the relationship between prompts and response uncertainty. We show that the uncertainty decreases as the prompt's informativeness increases, similar to epistemic uncertainty. Our detailed experimental results on real datasets validate our proposed model., Comment: 27 pages, 13 figures
- Published
- 2024
43. Observation of paramagnetic spin-degeneracy lifting in EuZn2Sb2
- Author
-
Sprague, Milo X., Regmi, Sabin, Ghosh, Barun, Sakhya, Anup Pradhan, Mondal, Mazharul Islam, Elius, Iftakhar Bin, Valadez, Nathan, Singh, Bahadur, Romanova, Tetiana, Kaczorowski, Dariusz, Bansil, Arun, and Neupane, Madhab
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Materials Science - Abstract
Taken together, time-reversal and spatial inversion symmetries impose a two-fold spin degeneracy of the electronic states in crystals. In centrosymmetric materials, this degeneracy can be lifted by introducing magnetism, either via an externally applied field or through internal magnetization. However, a correlated alignment of spins, even in the paramagnetic phase, can lift the spin degeneracy of electronic states. Here, we report an in-depth study of the electronic band structure of the Eu-ternary pnictide EuZn2Sb2 through a combination of high-resolution angle-resolved photoemission spectroscopy measurements and first principles calculations. An analysis of the photoemission lineshapes over a range of incident photon energies and sample temperatures is shown to reveal the presence of band spin degeneracy-lifting in the paramagnetic phase. Our ARPES results are in good agreement with theoretical ferromagnetic-phase calculations, which indicates the importance of ferromagnetic fluctuations in the system. Through our calculations, we predict that spin-polarized bands in EuZn2Sb2 generate a single pair of Weyl nodes. Our observation of band-splitting in EuZn2Sb2 provides a key step toward realizing time-reversal symmetry breaking physics in the absence of long-range magnetic order., Comment: 13 pages, 7 figures
- Published
- 2024
- Full Text
- View/download PDF
44. Stacking Fault in Non-Close Packed System- Role of Interstitials at Pentahedron Voids in WC Simple Hexagonal
- Author
-
George, Alphy, Sreepriya, T., Panda, Arun Kumar, Mythili, R., Dasgupta, Arup, and Divakar, R.
- Subjects
Condensed Matter - Materials Science - Abstract
Atomistic origin of stacking faults in non-close packed systems is a fundamentally distinct mechanism from the well-known close packed structures with ABC stacking, and represents an uncharted territory in material research. According to experimental data, stacking faults in simple hexagonal WC happen in {1-100} planes that are packed rectangularly and have ABAB stacking. This work identified the type of the defect and crystallographic behaviour by creating energetically relaxed potential atomistic models of stacking faults in WC. Experimental evidence supporting the rotation axis along stacking fault caused by variation in carbon ordering at the interstitial site has been established, in accordance with the theoretical model.
- Published
- 2024
45. LiNR: Model Based Neural Retrieval on GPUs at LinkedIn
- Author
-
Borisyuk, Fedor, Song, Qingquan, Zhou, Mingzhou, Parameswaran, Ganesh, Arun, Madhu, Popuri, Siva, Bingol, Tugrul, Pei, Zhuotao, Lee, Kuang-Hsuan, Zheng, Lu, Shao, Qizhan, Naqvi, Ali, Zhou, Sen, and Gupta, Aman
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
This paper introduces LiNR, LinkedIn's large-scale, GPU-based retrieval system. LiNR supports a billion-sized index on GPU models. We discuss our experiences and challenges in creating scalable, differentiable search indexes using TensorFlow and PyTorch at production scale. In LiNR, both items and model weights are integrated into the model binary. Viewing index construction as a form of model training, we describe scaling our system for large indexes, incorporating full scans and efficient filtering. A key focus is on enabling attribute-based pre-filtering for exhaustive GPU searches, addressing the common challenge of post-filtering in KNN searches that often reduces system quality. We further provide multi-embedding retrieval algorithms and strategies for tackling cold start issues in retrieval. Our advancements in supporting larger indexes through quantization are also discussed. We believe LiNR represents one of the industry's first Live-updated model-based retrieval indexes. Applied to out-of-network post recommendations on LinkedIn Feed, LiNR has contributed to a 3% relative increase in professional daily active users. We envisage LiNR as a step towards integrating retrieval and ranking into a single GPU model, simplifying complex infrastructures and enabling end-to-end optimization of the entire differentiable infrastructure through gradient descent.
- Published
- 2024
46. Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs
- Author
-
Li, Adrian Shuai, Iyengar, Arun, Kundu, Ashish, and Bertino, Elisa
- Subjects
Computer Science - Cryptography and Security - Abstract
In the application of deep learning for malware classification, it is crucial to account for the prevalence of malware evolution, which can cause trained classifiers to fail on drifted malware. Existing solutions to combat concept drift use active learning: they select new samples for analysts to label, and then retrain the classifier with the new labels. Our key finding is, the current retraining techniques do not achieve optimal results. These models overlook that updating the model with scarce drifted samples requires learning features that remain consistent across pre-drift and post-drift data. Furthermore, the model should be capable of disregarding specific features that, while beneficial for classification of pre-drift data, are absent in post-drift data, thereby preventing prediction degradation. In this paper, we propose a method that learns retained information in malware control flow graphs post-drift by leveraging graph neural network with adversarial domain adaptation. Our approach considers drift-invariant features within assembly instructions and flow of code execution. We further propose building blocks for more robust evaluation of drift adaptation techniques that computes statistically distant malware clusters. Our approach is compared with the previously published training methods in active learning systems, and the other domain adaptation technique. Our approach demonstrates a significant enhancement in predicting unseen malware family in a binary classification task and predicting drifted malware families in a multi-class setting. In addition, we assess alternative malware representations. The best results are obtained when our adaptation method is applied to our graph representations.
- Published
- 2024
47. Confidence Sets for $Z$-estimation Problems using Self-normalization
- Author
-
Chang, Woonyoung and Kuchibhotla, Arun Kumar
- Subjects
Mathematics - Statistics Theory - Abstract
Many commonly used statistical estimators are derived from optimization problems. This includes maximum likelihood estimation, empirical risk minimization, and so on. In many cases, the resulting estimators can be written as solutions to estimating equations, sometimes referred to as $Z$-estimators. Asymptotic normality for $Z$-estimators is a well-known result albeit when the dimension of the parameter is asymptotically smaller than the square root of the sample size. This hinders statistical inference when the dimension is "large." In this paper, we propose a self-normalization-based confidence set bypassing the asymptotic normality results. The proposed method is valid in the full range of dimensions growing smaller than the sample size (ignoring logarithmic factors) and asymptotically matches the asymptotic normality based confidence sets when asymptotic normality holds. Our proposal represents the first such general construction of confidence sets in the full range of consistency of $Z$-estimators.
- Published
- 2024
48. AI-Driven Physics-Informed Bio-Silicon Intelligence System: Integrating Hybrid Systems, Biocomputing, Neural Networks, and Machine Learning, for Advanced Neurotechnology
- Author
-
Jorgsson, Vincent, Kumar, Raghav, Ahmed, Mustaf, Yung, Maxx, Pattnayak, Aryaman, Sridhar, Sri Pradhyumna, Varma, Vaishnav, Ponnambalam, Arun Ram, Weidlich, Georg, and Pinotsis, Dimitris
- Subjects
Quantitative Biology - Neurons and Cognition ,Nonlinear Sciences - Adaptation and Self-Organizing Systems - Abstract
We present the Bio-Silicon Intelligence System (BSIS), an innovative hybrid platform that integrates biological neural networks with silicon-based computing. The BSIS, a Physics-Informed Hybrid Hierarchical Reinforcement Learning State Machine, employs carbon nanotube-coated electrodes to interface rat brains with computational systems, enabling high-fidelity neural interfacing and bidirectional communication through self-organizing systems in both biological and silicon forms. Our system leverages both analogue and digital AI theory, incorporating concepts from computational theory, chaos theory, dynamical systems theory, physics, and quantum mechanics. Additionally, the BSIS replicates the neuronal dynamics typical of intelligent brain tissue, employing nonlinear operations underlying learning and information storage. Neural signals are read through the FreeEEG32 board and BrainFlow software, then features are extracted and mapped to game actions by tracking feature changes in continuous data. Metadata is encoded into both analogue and digital brain stimulation signals at the microvolt level using our proprietary software and hardware. The system employs a dual signaling approach for training the rat brain, incorporating a reward solution and sound as well as human-inaudible distress sounds. This paper details the design, theory, functionality, and technical specifications of the BSIS, highlighting its interdisciplinary approach and advanced technological integration.
- Published
- 2024
49. Velocity gradient partitioning in turbulent flows
- Author
-
Arun, Rahul and Colonius, Tim
- Subjects
Physics - Fluid Dynamics - Abstract
The velocity gradient tensor can be decomposed into axial straining, pure shearing, and rigid rotation tensors, each with distinct symmetry and normality properties. We partition the strength of velocity gradient fluctuations based on the relative contributions of these constituents in several turbulent flows. These flows include forced isotropic turbulence, channels and boundary layers, and subsonic and transonic jets. For forced isotropic turbulence, the partitioning is in excellent agreement with previous results. For wall-bounded turbulence, the partitioning collapses onto the isotropic partitioning far from the wall, where the mean shearing is relatively weak. By contrast, the near-wall partitioning is dominated by shearing. Between these two regimes, the partitioning collapses well at sufficiently high friction Reynolds numbers and its variations in the buffer layer and the log-law region can be reasonably modeled as a function of the mean shearing strength. The isotropic partitioning also applies throughout much of the turbulent jets due to the rapid decay of the mean flow shear layer near the nozzle lip. Before reaching the exterior potential flow regime, the relative contribution of rigid rotation around the turbulent/non-turbulent interface is enhanced with respect to the isotropic partitioning. Altogether, our results highlight the broad applicability of the velocity gradient partitioning to turbulence modeling., Comment: 10 pages, 3 figures
- Published
- 2024
50. ASGIR: Audio Spectrogram Transformer Guided Classification And Information Retrieval For Birds
- Author
-
Chaudhuri, Yashwardhan, Mundra, Paridhi, Batra, Arnesh, Phukan, Orchid Chetia, and Buduru, Arun Balaji
- Subjects
Electrical Engineering and Systems Science - Audio and Speech Processing ,Computer Science - Sound - Abstract
Recognition and interpretation of bird vocalizations are pivotal in ornithological research and ecological conservation efforts due to their significance in understanding avian behaviour, performing habitat assessment and judging ecological health. This paper presents an audio spectrogram-guided classification framework called ASGIR for improved bird sound recognition and information retrieval. Our work is accompanied by a simple-to-use, two-step information retrieval system that uses geographical location and bird sounds to localize and retrieve relevant bird information by scraping Wikipedia page information of recognized birds. ASGIR offers a substantial performance on a random subset of 51 classes of Xeno-Canto dataset Bird sounds from European countries with a median of 100\% performance on F1, Precision and Sensitivity metrics. Our code is available as follows: https://github.com/MainSample1234/AS-GIR ., Comment: Accepted to INTERSPEECH'24
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.