180 results on '"Gad, P"'
Search Results
2. SQuARE: Sequential Question Answering Reasoning Engine for Enhanced Chain-of-Thought in Large Language Models
- Author
-
Fleischer, Daniel, Berchansky, Moshe, Markovits, Gad, and Wasserblat, Moshe
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
In the rapidly evolving field of Natural Language Processing, Large Language Models (LLMs) are tasked with increasingly complex reasoning challenges. Traditional methods like chain-of-thought prompting have shown promise but often fall short in fully leveraging a model's reasoning capabilities. This paper introduces SQuARE (Sequential Question Answering Reasoning Engine), a novel prompting technique designed to improve reasoning through a self-interrogation paradigm. Building upon CoT frameworks, SQuARE prompts models to generate and resolve multiple auxiliary questions before tackling the main query, promoting a more thorough exploration of various aspects of a topic. Our expansive evaluations, conducted with Llama 3 and GPT-4o models across multiple question-answering datasets, demonstrate that SQuARE significantly surpasses traditional CoT prompts and existing rephrase-and-respond methods. By systematically decomposing queries, SQuARE advances LLM capabilities in reasoning tasks. The code is publicly available at https://github.com/IntelLabs/RAG-FiT/tree/square., Comment: 14 pages more...
- Published
- 2025
Catalog
3. Conformal Solutions of Static Plane Symmetric Cosmological Models in Cases of a Perfect Fluid and a Cosmic String Cloud
- Author
-
Gad, Ragab M., Al-Jedani, Awatif, and Alsulami, Shahad T.
- Subjects
General Relativity and Quantum Cosmology ,Mathematical Physics ,53Q76. 83C10, 83C15 - Abstract
In this work, we obtained exact solutions of Einstein's field equations for plane symmetric cosmological models by assuming that thy admit conformal motion. The space-time geometry of these solutions is found to be nonsingular, non-vacuum and conformally flat. We have shown that in the case of a perfect fluid, these solutions have an energy-momentum tensor possessing dark energy with negative pressure and the energy equation of state is $\rho +p=0$. We have shown that a fluid has acceleration, rotation, shear-free, vanishing expansion, and rotation. In the case of a cosmic string cloud, we found that the tension density and particle density decrease as the fluid moves along the direction of the strings, then vanish at infinity. We shown that the exact conformal solution for a static plane symmetric model reduces to the the well-known anti-De Sitter space time. We obtained that the space-time under consideration admits a conformal vector field orthogonal to the four-velocity vector and does not admits a vector parallel to the four-velocity vector. Some physical and kinematic properties of the resulting models are also discussed., Comment: 19 pages more...
- Published
- 2025
4. Temporal Graph Memory Networks For Knowledge Tracing
- Author
-
Gad, Seif, Abdelfattah, Sherif, and Abdelrahman, Ghodai
- Subjects
Computer Science - Computers and Society ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Tracing a student's knowledge growth given the past exercise answering is a vital objective in automatic tutoring systems to customize the learning experience. Yet, achieving this objective is a non-trivial task as it involves modeling the knowledge state across multiple knowledge components (KCs) while considering their temporal and relational dynamics during the learning process. Knowledge tracing methods have tackled this task by either modeling KCs' temporal dynamics using recurrent models or relational dynamics across KCs and questions using graph models. Albeit, there is a lack of methods that could learn joint embedding between relational and temporal dynamics of the task. Moreover, many methods that count for the impact of a student's forgetting behavior during the learning process use hand-crafted features, limiting their generalization on different scenarios. In this paper, we propose a novel method that jointly models the relational and temporal dynamics of the knowledge state using a deep temporal graph memory network. In addition, we propose a generic technique for representing a student's forgetting behavior using temporal decay constraints on the graph memory module. We demonstrate the effectiveness of our proposed method using multiple knowledge tracing benchmarks while comparing it to state-of-the-art methods. more...
- Published
- 2024
5. Survey on Emotion Recognition through Posture Detection and the possibility of its application in Virtual Reality
- Author
-
Elansary, Leina, Taha, Zaki, and Gad, Walaa
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
A survey is presented focused on using pose estimation techniques in Emotional recognition using various technologies normal cameras, and depth cameras for real-time, and the potential use of VR and inputs including images, videos, and 3-dimensional poses described in vector space. We discussed 19 research papers collected from selected journals and databases highlighting their methodology, classification algorithm, and the used datasets that relate to emotion recognition and pose estimation. A benchmark has been made according to their accuracy as it was the most common performance measurement metric used. We concluded that the multimodal Approaches overall made the best accuracy and then we mentioned futuristic concerns that can improve the development of this research topic. more...
- Published
- 2024
6. VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection
- Author
-
Ramachandra, Raghavendra, Vetrekar, Narayan, Venkatesh, Sushma, Nageshker, Savita, Singh, Jag Mohan, and Gad, R. S.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Cryptography and Security - Abstract
Facial biometrics are an essential components of smartphones to ensure reliable and trustworthy authentication. However, face biometric systems are vulnerable to Presentation Attacks (PAs), and the availability of more sophisticated presentation attack instruments such as 3D silicone face masks will allow attackers to deceive face recognition systems easily. In this work, we propose a novel Presentation Attack Detection (PAD) algorithm based on 3D point clouds captured using the frontal camera of a smartphone to detect presentation attacks. The proposed PAD algorithm, VoxAtnNet, processes 3D point clouds to obtain voxelization to preserve the spatial structure. Then, the voxelized 3D samples were trained using the novel convolutional attention network to detect PAs on the smartphone. Extensive experiments were carried out on the newly constructed 3D face point cloud dataset comprising bona fide and two different 3D PAIs (3D silicone face mask and wrap photo mask), resulting in 3480 samples. The performance of the proposed method was compared with existing methods to benchmark the detection performance using three different evaluation protocols. The experimental results demonstrate the improved performance of the proposed method in detecting both known and unknown face presentation attacks., Comment: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG) more...
- Published
- 2024
7. Adaptive multi-criteria-based load balancing technique for resource allocation in fog-cloud environments
- Author
-
Gad-Elrab, Ahmed A. A., Alsharkawy, Almohammady S., Embabi, Mahmoud E., Sobhi, Ahmed, and Emara, Farouk A.
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Recently, to deliver services directly to the network edge, fog computing, an emerging and developing technology, acts as a layer between the cloud and the IoT worlds. The cloud or fog computing nodes could be selected by IoTs applications to meet their resource needs. Due to the scarce resources of fog devices that are available, as well as the need to meet user demands for low latency and quick reaction times, resource allocation in the fog-cloud environment becomes a difficult problem. In this problem, the load balancing between several fog devices is the most important element in achieving resource efficiency and preventing overload on fog devices. In this paper, a new adaptive resource allocation technique for load balancing in a fog-cloud environment is proposed. The proposed technique ranks each fog device using hybrid multi-criteria decision-making approaches Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (FTOPSIS), then selects the most effective fog device based on the resulting ranking set. The simulation results show that the proposed technique outperforms existing techniques in terms of load balancing, response time, resource utilization, and energy consumption. The proposed technique decreases the number of fog nodes by 11%, load balancing variance by 69% and increases resource utilization to 90% which is comparatively higher than the comparable methods. more...
- Published
- 2024
- Full Text
- View/download PDF
8. On the Late-Time Evolution of Velocity-Dependent Self-Interacting Dark Matter Halos
- Author
-
Gad-Nasr, Sophia, Boddy, Kimberly K., Kaplinghat, Manoj, Outmezguine, Nadav Joseph, and Sagunski, Laura
- Subjects
Astrophysics - Astrophysics of Galaxies ,High Energy Physics - Phenomenology - Abstract
We study the evolution of isolated self-interacting dark matter (SIDM) halos that undergo gravothermal collapse and are driven deep into the short-mean-free-path regime. We assume spherical Navarro-Frenk-White (NFW) halos as initial conditions and allow for elastic dark matter self-interactions. We discuss the structure of the halo core deep in the core-collapsed regime and how it depends on the particle physics properties of dark matter, in particular, the velocity dependence of the self-interaction cross section. We find an approximate universality deep in this regime that allows us to connect the evolution in the short- and long-mean-free-path regimes, and approximately map the velocity-dependent self-interaction cross sections to constant ones for the full gravothermal evolution. We provide a semi-analytic prescription based on our numerical results for halo evolution deep in the core-collapsed regime. Our results are essential for estimating the masses of the black holes that are likely to be left in the core of SIDM halos., Comment: 18 pages, 13 figures. Sample code available in https://github.com/Nadav-out/Gravothermal-Instability-mass, gravothermal code available in https://github.com/kboddy/GravothermalSIDM more...
- Published
- 2023
9. Does complimentary information from multispectral imaging improve face presentation attack detection?
- Author
-
Vetrekar, Narayan, Ramachandra, Raghavendra, Venkatesh, Sushma, Pawar, Jyoti D., and Gad, R. S.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Presentation Attack Detection (PAD) has been extensively studied, particularly in the visible spectrum. With the advancement of sensing technology beyond the visible range, multispectral imaging has gained significant attention in this direction. We present PAD based on multispectral images constructed for eight different presentation artifacts resulted from three different artifact species. In this work, we introduce Face Presentation Attack Multispectral (FPAMS) database to demonstrate the significance of employing multispectral imaging. The goal of this work is to study complementary information that can be combined in two different ways (image fusion and score fusion) from multispectral imaging to improve the face PAD. The experimental evaluation results present an extensive qualitative analysis of 61650 sample multispectral images collected for bonafide and artifacts. The PAD based on the score fusion and image fusion method presents superior performance, demonstrating the significance of employing multispectral imaging to detect presentation artifacts., Comment: Accepted in International IEEE Applied Sensing Conference (IEEE APSCON) 2024 more...
- Published
- 2023
10. Addressing the Scalability Bottleneck of Semantic Technologies at Bosch
- Author
-
Rincon-Yanez, Diego, Gad-Elrab, Mohamed H., Stepanova, Daria, Tran, Kien Trung, Xuan, Cuong Chu, Zhou, Baifan, and Karlamov, Evgeny
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
At the heart of smart manufacturing is real-time semi-automatic decision-making. Such decisions are vital for optimizing production lines, e.g., reducing resource consumption, improving the quality of discrete manufacturing operations, and optimizing the actual products, e.g., optimizing the sampling rate for measuring product dimensions during production. Such decision-making relies on massive industrial data thus posing a real-time processing bottleneck. more...
- Published
- 2023
11. A novel framework employing deep multi-attention channels network for the autonomous detection of metastasizing cells through fluorescence microscopy
- Author
-
Mamalakis, Michail, Macfarlane, Sarah C., Notley, Scott V., Gad, Annica K. B, and Panoutsos, George
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
We developed a transparent computational large-scale imaging-based framework that can distinguish between normal and metastasizing human cells. The method relies on fluorescence microscopy images showing the spatial organization of actin and vimentin filaments in normal and metastasizing single cells, using a combination of multi-attention channels network and global explainable techniques. We test a classification between normal cells (Bj primary fibroblast), and their isogenically matched, transformed and invasive counterpart (BjTertSV40TRasV12). Manual annotation is not trivial to automate due to the intricacy of the biologically relevant features. In this research, we utilized established deep learning networks and our new multi-attention channel architecture. To increase the interpretability of the network - crucial for this application area - we developed an interpretable global explainable approach correlating the weighted geometric mean of the total cell images and their local GradCam scores. The significant results from our analysis unprecedently allowed a more detailed, and biologically relevant understanding of the cytoskeletal changes that accompany oncogenic transformation of normal to invasive and metastasizing cells. We also paved the way for a possible spatial micrometre-level biomarker for future development of diagnostic tools against metastasis (spatial distribution of vimentin). more...
- Published
- 2023
- Full Text
- View/download PDF
12. Towards quantum-enabled cell-centric therapeutics
- Author
-
Basu, Saugata, Born, Jannis, Bose, Aritra, Capponi, Sara, Chalkia, Dimitra, Chan, Timothy A, Doga, Hakan, Flother, Frederik F., Getz, Gad, Goldsmith, Mark, Gujarati, Tanvi, Guzman-Saenz, Aldo, Iliopoulos, Dimitrios, Jones, Gavin O., Knecht, Stefan, Madan, Dhiraj, Maniscalco, Sabrina, Mariella, Nicola, Morrone, Joseph A., Najafi, Khadijeh, Pati, Pushpak, Platt, Daniel, Rapsomaniki, Maria Anna, Ray, Anupama, Rhrissorrakrai, Kahn, Shehab, Omar, Tavernelli, Ivano, Tolunay, Meltem, Utro, Filippo, Woerner, Stefan, Zhuk, Sergiy, Garcia, Jeannette M., and Parida, Laxmi more...
- Subjects
Quantum Physics ,Quantitative Biology - Quantitative Methods - Abstract
In recent years, there has been tremendous progress in the development of quantum computing hardware, algorithms and services leading to the expectation that in the near future quantum computers will be capable of performing simulations for natural science applications, operations research, and machine learning at scales mostly inaccessible to classical computers. Whereas the impact of quantum computing has already started to be recognized in fields such as cryptanalysis, natural science simulations, and optimization among others, very little is known about the full potential of quantum computing simulations and machine learning in the realm of healthcare and life science (HCLS). Herein, we discuss the transformational changes we expect from the use of quantum computation for HCLS research, more specifically in the field of cell-centric therapeutics. Moreover, we identify and elaborate open problems in cell engineering, tissue modeling, perturbation modeling, and bio-topology while discussing candidate quantum algorithms for research on these topics and their potential advantages over classical computational approaches., Comment: 6 figures more...
- Published
- 2023
13. ExeKGLib: Knowledge Graphs-Empowered Machine Learning Analytics
- Author
-
Klironomos, Antonis, Zhou, Baifan, Tan, Zhipeng, Zheng, Zhuoxun, Mohamed, Gad-Elrab, Paulheim, Heiko, and Kharlamov, Evgeny
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Many machine learning (ML) libraries are accessible online for ML practitioners. Typical ML pipelines are complex and consist of a series of steps, each of them invoking several ML libraries. In this demo paper, we present ExeKGLib, a Python library that allows users with coding skills and minimal ML knowledge to build ML pipelines. ExeKGLib relies on knowledge graphs to improve the transparency and reusability of the built ML workflows, and to ensure that they are executable. We demonstrate the usage of ExeKGLib and compare it with conventional ML code to show its benefits., Comment: This paper has been accepted as a Demo paper at ESWC 2023 more...
- Published
- 2023
14. The Optimization and Application of The Propagated Riemannian Wavefield Extrapolator in VTI Media- Pseudo-Depth Domain Least-Squares Reverse-Time Migration
- Author
-
Muhammed, Hussein, Sun, Xiaodong, Li, Zhenchun, and El-Mula, Abdel Hafiz Gad
- Subjects
Physics - Geophysics ,Physics - Computational Physics - Abstract
The general framework of LSRTM consists of two steps; the first one is generating the RTM image and the second is applying the Least-Squares Migration, however, the convergence of both operations consumes a lot of time to extract the final Least-Squares Reverse-Time Migration image and moreover generates oversampling when simulating the data. Applying Reverse-Time Migration to seismic data will generate results with some migration artifacts depending on the applied imaging conditions. To overcome this dilemma, the Least-Squares Reverse-Time Migration is applied to the migrated section through Born modeling and Conjugate Gradient algorithm. Vertical transverse isotropy (VTI) media yielded as the velocity decreases with depth which distorts the Reverse-Time Migration results significantly. This problem can be overcome by applying the Least-Squares Reverse-Time Migration in either the Cartesian or pseudo-depth domains by applying a proper wavefield extrapolator. Extrapolation of Least-Squares Reverse-Time Migration reconstructed wavefield using the 2D constant-density acoustic wave equation transformed into Riemannian domain treats the oversampling effect of seismic signals by making even sampling and allows more amplitude to be recovered in the final migrated image...At a reduced cost, the Finite Difference Riemannian wavefield extrapolator acts on the Born modelled seismic data, producing accurately similar results to the classical LSRTM, yet some amplitude differences are appeared due to various implementation issues and oversampling effect in the latter. The results support that the domain transformation strategy effectively reduces the computational time without affecting the accuracy of the conventional LSRTM results., Comment: 30 pages and more than 12 Figs more...
- Published
- 2023
15. Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study
- Author
-
Ramachandra, Raghavendra, Venkatesh, Sushma, Damer, Naser, Vetrekar, Narayan, and Gad, Rajendra
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Face morphing attack detection is emerging as an increasingly challenging problem owing to advancements in high-quality and realistic morphing attack generation. Reliable detection of morphing attacks is essential because these attacks are targeted for border control applications. This paper presents a multispectral framework for differential morphing-attack detection (D-MAD). The D-MAD methods are based on using two facial images that are captured from the ePassport (also called the reference image) and the trusted device (for example, Automatic Border Control (ABC) gates) to detect whether the face image presented in ePassport is morphed. The proposed multispectral D-MAD framework introduce a multispectral image captured as a trusted capture to acquire seven different spectral bands to detect morphing attacks. Extensive experiments were conducted on the newly created Multispectral Morphed Datasets (MSMD) with 143 unique data subjects that were captured using both visible and multispectral cameras in multiple sessions. The results indicate the superior performance of the proposed multispectral framework compared to visible images., Comment: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024 more...
- Published
- 2023
16. Order-Preserving Squares in Strings
- Author
-
Gawrychowski, Paweł, Ghazawi, Samah, and Landau, Gad M.
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Formal Languages and Automata Theory - Abstract
An order-preserving square in a string is a fragment of the form $uv$ where $u\neq v$ and $u$ is order-isomorphic to $v$. We show that a string $w$ of length $n$ over an alphabet of size $\sigma$ contains $\mathcal{O}(\sigma n)$ order-preserving squares that are distinct as words. This improves the upper bound of $\mathcal{O}(\sigma^{2}n)$ by Kociumaka, Radoszewski, Rytter, and Wale\'n [TCS 2016]. Further, for every $\sigma$ and $n$ we exhibit a string with $\Omega(\sigma n)$ order-preserving squares that are distinct as words, thus establishing that our upper bound is asymptotically tight. Finally, we design an $\mathcal{O}(\sigma n)$ time algorithm that outputs all order-preserving squares that occur in a given string and are distinct as words. By our lower bound, this is optimal in the worst case. more...
- Published
- 2023
17. Fully transformer-based biomarker prediction from colorectal cancer histology: a large-scale multicentric study
- Author
-
Wagner, Sophia J., Reisenbüchler, Daniel, West, Nicholas P., Niehues, Jan Moritz, Veldhuizen, Gregory Patrick, Quirke, Philip, Grabsch, Heike I., Brandt, Piet A. van den, Hutchins, Gordon G. A., Richman, Susan D., Yuan, Tanwei, Langer, Rupert, Jenniskens, Josien Christina Anna, Offermans, Kelly, Mueller, Wolfram, Gray, Richard, Gruber, Stephen B., Greenson, Joel K., Rennert, Gad, Bonner, Joseph D., Schmolze, Daniel, James, Jacqueline A., Loughrey, Maurice B., Salto-Tellez, Manuel, Brenner, Hermann, Hoffmeister, Michael, Truhn, Daniel, Schnabel, Julia A., Boxberg, Melanie, Peng, Tingying, and Kather, Jakob Nikolas more...
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Background: Deep learning (DL) can extract predictive and prognostic biomarkers from routine pathology slides in colorectal cancer. For example, a DL test for the diagnosis of microsatellite instability (MSI) in CRC has been approved in 2022. Current approaches rely on convolutional neural networks (CNNs). Transformer networks are outperforming CNNs and are replacing them in many applications, but have not been used for biomarker prediction in cancer at a large scale. In addition, most DL approaches have been trained on small patient cohorts, which limits their clinical utility. Methods: In this study, we developed a new fully transformer-based pipeline for end-to-end biomarker prediction from pathology slides. We combine a pre-trained transformer encoder and a transformer network for patch aggregation, capable of yielding single and multi-target prediction at patient level. We train our pipeline on over 9,000 patients from 10 colorectal cancer cohorts. Results: A fully transformer-based approach massively improves the performance, generalizability, data efficiency, and interpretability as compared with current state-of-the-art algorithms. After training on a large multicenter cohort, we achieve a sensitivity of 0.97 with a negative predictive value of 0.99 for MSI prediction on surgical resection specimens. We demonstrate for the first time that resection specimen-only training reaches clinical-grade performance on endoscopic biopsy tissue, solving a long-standing diagnostic problem. Interpretation: A fully transformer-based end-to-end pipeline trained on thousands of pathology slides yields clinical-grade performance for biomarker prediction on surgical resections and biopsies. Our new methods are freely available under an open source license., Comment: Updated Figure 2 and Table A.5 more...
- Published
- 2023
18. Analysis of Longitudinal Data with Missing Values in the Response and Covariates Using the Stochastic EM Algorithm
- Author
-
Gad, Ahmed M. and Darwish, Nesma M.
- Subjects
Statistics - Methodology - Abstract
In longitudinal data a response variable is measured over time, or under different conditions, for a cohort of individuals. In many situations all intended measurements are not available which results in missing values. If the missing value is never followed by an observed measurement, this leads to dropout pattern. The missing values could be in the response variable, the covariates or in both. The missingness mechanism is termed non-random when the probability of missingness depends on the missing value and may be on the observed values. In this case the missing values should be considered in the analysis to avoid any potential bias. The aim of this article is to employ multiple imputations (MI) to handle missing values in covariates using. The selection model is used to model longitudinal data in the presence of non-random dropout. The stochastic EM algorithm (SEM) is developed to obtain the model parameter estimates in addition to the estimates of the dropout model. The SEM algorithm does not provide standard errors of the estimates. We developed a Monte Carlo method to obtain the standard errors. The proposed approach performance is evaluated through a simulation study. Also, the proposed approach is applied to a real data set., Comment: 14 pages more...
- Published
- 2022
19. Universal gravothermal evolution of isolated self-interacting dark matter halos for velocity-dependent cross sections
- Author
-
Outmezguine, Nadav Joseph, Boddy, Kimberly K., Gad-Nasr, Sophia, Kaplinghat, Manoj, and Sagunski, Laura
- Subjects
Astrophysics - Astrophysics of Galaxies ,High Energy Physics - Phenomenology - Abstract
We study the evolution of isolated self-interacting dark matter (SIDM) halos using spherically-symmetric gravothermal equations allowing for the scattering cross section to be velocity dependent. We focus our attention on the large class of models where the core is in the long mean free path regime for a substantial time. We find that the temporal evolution exhibits an approximate universality that allows velocity-dependent models to be mapped onto velocity-independent models in a well-defined way using the scattering timescale computed when the halo achieves its minimum central density. We show how this timescale depends on the halo parameters and an average cross section computed at the central velocity dispersion when the central density is minimum. The predicted collapse time is fully defined by the scattering timescale, with negligible variation due to the velocity dependence of the cross section. We derive new self-similar solutions that provide an analytic understanding of the numerical results., Comment: Matched to the published version more...
- Published
- 2022
- Full Text
- View/download PDF
20. Controlled Transition Metal Nucleated Growth of Carbon Nanotubes by Molten Electrolysis of CO$_2$
- Author
-
Liu, Xinye, Licht, Gad, Wang, Xirui, and Licht, Stuart
- Subjects
Condensed Matter - Materials Science ,Physics - Chemical Physics - Abstract
The electrolysis of CO$_2$ in molten carbonate has been introduced as an alternative mechanism to synthesize carbon nanomaterials inexpensively at high yield. Until recently, CO$_2$ was thought to be unreactive, making its removal a challenge. CO$_2$ is the main cause of anthropogenic global warming and its utilization and transformation into a stable, valuable material provides an incentivized pathway to mitigate climate change. This study focuses on controlled electrochemical conditions in molten lithium carbonate to split CO$_2$ absorbed from the atmosphere into into carbon nanotubes, and into various macroscopic assemblies of CNTs,, which may be useful for nano-filtration. Different CNTs, morphologies were prepared electrochemically by variation of the anode and cathode composition and architecture, electrolyte composition pre-electrolysis processing, and the variation of current application and current density. Individual CNT morphologies structures and the CNT molten carbonate growth mechanism are explored by SEM, TEM, HAADF EDX, XRD and Raman. The principle commercial technology for CNT production had been chemical vapor deposition, which is an order of magnitude more expensive, generally requires metallo-organics, rather than CO$_2$ as reactants, and can be highly energy and CO$_2$ emission intensive (carries a high carbon positive, rather than negative, footprint)., Comment: 24 pages, 10 figures more...
- Published
- 2022
21. Ensembling of Distilled Models from Multi-task Teachers for Constrained Resource Language Pairs
- Author
-
Hendy, Amr, Gad, Esraa A., Abdelghaffar, Mohamed, ElMosalami, Jailan S., Afify, Mohamed, Tawfik, Ahmed Y., and Awadalla, Hany Hassan
- Subjects
Computer Science - Computation and Language - Abstract
This paper describes our submission to the constrained track of WMT21 shared news translation task. We focus on the three relatively low resource language pairs Bengali to and from Hindi, English to and from Hausa, and Xhosa to and from Zulu. To overcome the limitation of relatively low parallel data we train a multilingual model using a multitask objective employing both parallel and monolingual data. In addition, we augment the data using back translation. We also train a bilingual model incorporating back translation and knowledge distillation then combine the two models using sequence-to-sequence mapping. We see around 70% relative gain in BLEU point for English to and from Hausa, and around 25% relative improvements for both Bengali to and from Hindi, and Xhosa to and from Zulu compared to bilingual baselines. more...
- Published
- 2021
22. Subjective Difficulty in a Verbal Recognition-based Memory Task: Exploring Brain-behaviour Relationships at the Individual Level in Healthy Young Adults
- Author
-
Steffener, Jason, Habeck, Chris, Franklin, Dylan, Lau, Meghan, Yakoub, Yara, and Gad, Maryse
- Subjects
Quantitative Biology - Neurons and Cognition - Abstract
The vast majority of fMRI studies of task-related brain activity utilize common levels of task demands and analyses that rely on the central tendencies of the data. This approach does not take into account perceived difficulty nor regional variations in brain activity between people. The results are findings of brain-behavior relationships that weaken as sample sizes increase. Participants of the current study included twenty-six healthy young adults evenly split between the sexes. The current work utilizes five parametrically modulated levels of memory load centered around each individualâÂÂs predetermined working memory cognitive capacity. Principal components analyses (PCA) identified the group-level central tendency of the data. After removing the group effect from the data, PCA identified individual-level patterns of brain activity across the five levels of task demands. Expression of the group effect significantly differed between the sexes across all load levels. Expression of the individual level patterns demonstrated a significant load by sex interaction. Furthermore, expressions of the individual maps make better predictors of response time behavior than group-derived maps., Comment: 6806 Words, 9 Figures, 2 Tables more...
- Published
- 2021
23. Data for the green synthesis of exceptional braided, helical carbon nanotubes and nano spiral platelets made directly from CO$_2$
- Author
-
Liu, Xinye, Licht, Gad, and Licht, Stuart
- Subjects
Physics - Applied Physics ,Condensed Matter - Materials Science - Abstract
This article describes base-line data used in conjunction with the Materials Today Chemistry article: The green synthesis of exceptional braided, helical carbon nanotubes and nano spiral platelets made directly from CO$_2$. The data includes Raman, XRD, SEM, TEM, EDX and high contrast TEM of conventional carbon nanotubes (CNTs) synthesized from carbon dioxide electrolytic splitting in molten electrolyte for comparison to synthesized helical carbon nanotubes grown in the main article. This data article also presents SEM showing that uncontrolled electrolytic CO$_2$ splitting leads to bent and deformed CNTs, rather than straight or helical CNTs, and SEM that helical carbon nanotubes and helical carbon nanoplatelets can be produced with only partial control of the electrolysis current and with no defect inducing agents. A novel, cheap synthesis of high purity helical nanocarbon is discovered. A baseline and comparative experimental data for non-helical analogues is presented. Both the non-helical and helical nanocarbon are synthesized from the greenhouse gas CO$_2$ by molten carbonate electrolysis., Comment: 12 pages, 7 figures more...
- Published
- 2021
24. Exclusive decay study of the 16.62\,MeV (2$^-$, T=1) resonance in $^{12}$C
- Author
-
Kuhlwein, Morten, Lytje, Kristian, Fynbo, Hans Otto Uldall, Gad, Andreas, Jensen, Erik, Kirsebom, Oliver Sølund, Munch, Michael, Refsgaard, Jonas, and Riisager, Karsten
- Subjects
Nuclear Experiment - Abstract
The 3$\alpha$ decay of the 16.62\,MeV (2$^-$, T=1) resonance in $^{12}$C has been studied for nearly a century starting with one of the first nuclear reaction studies at the Cavendish Laboratory in the 1930s. In the hitherto latest study published a decade ago a model based on earlier work from the 1960s was found to give a good account of a set of inclusive data. This model describes the decay as an l=3 $\alpha$-particle populating the 2$^+$ state of $^8$Be. Here we provide new exclusive data on the 3$\alpha$ decay of the 16.62\,MeV resonance, and demonstrate that the decay is best described by a model with predominantly l=1 emission with an admixture of l=3., Comment: 5 pages, 3 figures more...
- Published
- 2021
- Full Text
- View/download PDF
25. Crystalline quality in aluminium single crystals, characterized by X-Ray diffraction and Rocking-Curve analysis
- Author
-
Orr, Gilad and Golan, Gad
- Subjects
Condensed Matter - Materials Science - Abstract
Aluminum single crystals are tested using X-Ray Bragg diffraction, which may have applications in microscopy and electronics fabrication industry. Yet, their efficiency for x- ray beam diffraction depends on the accurate crystal orientation, the microstructure and imperfections. Moreover, the final sample that is formed from the as-grown crystal by cutting, grinding, polishing and chemical etching, introduces various surface defects that penetrate deep into the crystal affecting its natural structure. Defect penetration is attributed to the fact that ultra-pure aluminum single crystals are soft and ductile with a hardness in the range of 2~2.5 mho. This leads to lattice deformation, resulting in a deviation from the crystallographic orientation of the final device, affecting the diffraction intensity and an apparent shift in the Bragg angle. In this work we investigate the influence of processing aluminum single crystals by mechanical and chemical means using XRD and Rocking-Curve broadening as a quantitative indication concerning the depth of the damage. This is a preliminary step in supporting future work on the study of electrical conduction in aluminum single crystals. Supplementing electrical conductivity measurements of aluminum, quality assessment of defects in front cell aluminum conductors can assist in designing novel low resistance aluminum conductors replacing the currently widely used and relatively rare silver. more...
- Published
- 2021
- Full Text
- View/download PDF
26. Recycling rejected silicon wafers and dies for high grade PV cells
- Author
-
Golan, Gad, Azoulay, Moshe, and Orr, Gilad
- Subjects
Physics - Applied Physics - Abstract
The recent return of the US to the Paris Climate Accord, massive increase in solar panel production and energy storage solutions has resulted in pressure on supply for solar cell materials and recycling of panels installed in the 90's and beginning of the 2000's which have reached their end of life. In this work we focus on recycling silicon wafers and dies by stripping previous structures from the die using potent acids after which its base material is characterized and binned. We demonstrate the process for silicon p-type substrates where n-type doping is attained by using a simple solution of phosphoric acid, which is diffused into the substrate using a furnace thus creating a PN junction. In case the substrate is n-type it could be replaced by boric acid. This is followed by deposition of a conductive antireflective coating, bus bars and rear wafer metal coating. The initial demonstrated laboratory results indicate the feasibility of recycling wafers using simple low cost standard industrial methods. more...
- Published
- 2021
- Full Text
- View/download PDF
27. PyGAD: An Intuitive Genetic Algorithm Python Library
- Author
-
Gad, Ahmed Fawzy
- Subjects
Computer Science - Neural and Evolutionary Computing ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Mathematics - Optimization and Control - Abstract
This paper introduces PyGAD, an open-source easy-to-use Python library for building the genetic algorithm. PyGAD supports a wide range of parameters to give the user control over everything in its life cycle. This includes, but is not limited to, population, gene value range, gene data type, parent selection, crossover, and mutation. PyGAD is designed as a general-purpose optimization library that allows the user to customize the fitness function. Its usage consists of 3 main steps: build the fitness function, create an instance of the pygad.GA class, and calling the pygad.GA.run() method. The library supports training deep learning models created either with PyGAD itself or with frameworks like Keras and PyTorch. Given its stable state, PyGAD is also in active development to respond to the user's requested features and enhancement received on GitHub https://github.com/ahmedfgad/GeneticAlgorithmPython. PyGAD comes with documentation https://pygad.readthedocs.io for further details and examples. more...
- Published
- 2021
28. Lower Bounds for the Number of Repetitions in 2D Strings
- Author
-
Gawrychowski, Paweł, Ghazawi, Samah, and Landau, Gad M.
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Discrete Mathematics - Abstract
A two-dimensional string is simply a two-dimensional array. We continue the study of the combinatorial properties of repetitions in such strings over the binary alphabet, namely the number of distinct tandems, distinct quartics, and runs. First, we construct an infinite family of $n\times n$ 2D strings with $\Omega(n^{3})$ distinct tandems. Second, we construct an infinite family of $n\times n$ 2D strings with $\Omega(n^{2}\log n)$ distinct quartics. Third, we construct an infinite family of $n\times n$ 2D strings with $\Omega(n^{2}\log n)$ runs. This resolves an open question of Charalampopoulos, Radoszewski, Rytter, Wale\'n, and Zuba [ESA 2020], who asked if the number of distinct quartics and runs in an $n\times n$ 2D string is $\mathcal{O}(n^{2})$. more...
- Published
- 2021
29. Real-time ultrasound sensing with a mode-optimized photonic crystal slab
- Author
-
Zhu, Eric Y., Charles-Herrera, Maria, Rewcastle, Cory, Gad, Raanan, Qian, Li, and Levi, Ofer
- Subjects
Physics - Applied Physics ,Physics - Optics - Abstract
Integrated photonic sensors can provide large scale, flexible detection schemes. Photonic crystal slabs (PCS) offer a miniaturized platform for wideband, sensitive ultrasound detection by exploiting the photoelastic effect in water. However, poor modal overlap with the sensing medium and non-negligible absorption loss of the aqueous medium have previously limited PCS sensor performance. In this study, we detail the development and optimization of a PCS-based acoustic sensor, by adding to it a low-loss high-index polymer cladding layer. Exploiting a mode-optimized TM-like optical resonance present in a PCS, with high bulk index sensitivity (>600 nm/RIU) and quality factor Q (>8000), we demonstrate real-time ultrasound-sensing at a noise equivalent pressure (NEP) of 170 Pa (1.9 Pa/rt Hz). The PCS sensor is backside-coupled to optical fiber which, along with its intensity-based ultrasound-sensing architecture, will allow us to scale up easily to a 2D array. This work paves the way to a sensitive compact ultrasound detector for photoacoustic-based diagnostics and monitoring of tissue. more...
- Published
- 2021
- Full Text
- View/download PDF
30. PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database
- Author
-
Jafarbeiki, Sara, Sakzad, Amin, Kermanshahi, Shabnam Kasra, Gaire, Raj, Steinfeld, Ron, Lai, Shangqi, and Abraham, Gad
- Subjects
Computer Science - Cryptography and Security - Abstract
Searchable symmetric encryption (SSE) has been used to protect the confidentiality of genomic data while providing substring search and range queries on a sequence of genomic data, but it has not been studied for protecting single nucleotide polymorphism (SNP)-phenotype data. In this article, we propose a novel model, PrivGenDB, for securely storing and efficiently conducting different queries on genomic data outsourced to an honest-but-curious cloud server. To instantiate PrivGenDB, we use SSE to ensure confidentiality while conducting different types of queries on encrypted genomic data, phenotype and other information of individuals to help analysts/clinicians in their analysis/care. To the best of our knowledge, PrivGenDB construction is the first SSE-based approach ensuring the confidentiality of shared SNP-phenotype data through encryption while making the computation/query process efficient and scalable for biomedical research and care. Furthermore, it supports a variety of query types on genomic data, including count queries, Boolean queries, and k'-out-of-k match queries. Finally, the PrivGenDB model handles the dataset containing both genotype and phenotype, and it also supports storing and managing other metadata like gender and ethnicity privately. Computer evaluations on a dataset with 5,000 records and 1,000 SNPs demonstrate that a count/Boolean query and a k'-out-of-k match query over 40 SNPs take approximately 4.3s and 86.4{\mu}s, respectively, that outperforms the existing schemes. more...
- Published
- 2021
31. Gravitational Energy in Van Stockum Space-Time
- Author
-
Gad, Ragab M and Alharbi, H. A.
- Subjects
General Relativity and Quantum Cosmology ,83C40 - Abstract
The purpose of this paper is to illustrate the problem of energy and momentum distributions of Van Stockum space-time within the framework of two different theories of gravity, general relativity and teleparallel gravity. We have shown that for all homogeneous space-times with metric components $g_{\mu\nu}$ being functions of time variable, $t$, alone and independent of space variables the total gravitational energy for any finite volume is identically zero. By working with general relativity, we have calculated the energy-momentum density for Van Stockum space-time using double index complexes and in the framework teleparallel gravity, we used the energy-momentum complexes of Einstein, Bergmann-Thomson and Landau-Lifshitz. In our analysis, we sustained that general relativity and teleparallel gravity are equivalent theories of space-time under consideration. For space-time under consideration, we have shown that different complexes of energy-momentum density do not provide the same results neither in general relativity nor in teleparallel gravity., Comment: 16 pages No figures, Accepted for publication in Indian journal of physics (2021) more...
- Published
- 2021
- Full Text
- View/download PDF
32. Smart Build Targets Batching Service at Google
- Author
-
Wang, Kaiyuan, Rall, Daniel, Tener, Greg, Gullapalli, Vijay, Huang, Xin, and Gad, Ahmed
- Subjects
Computer Science - Software Engineering - Abstract
Google has a monolithic codebase with tens of millions build targets. Each build target specifies the information that is needed to build a software artifact or run tests. It is common to execute a subset of build targets at each revision and make sure that the change does not break the codebase. Google's build service system uses Bazel to build targets. Bazel takes as input a build that specifies the execution context, flags and build targets to run. The outputs are the build libraries, binaries or test results. To be able to support developer's daily activities, the build service system runs millions of builds per day. It is a known issue that a build with many targets could run out of the allocated memory or exceed its execution deadline. This is problematic because it reduces the developer's productivity, e.g. code submissions or binary releases. In this paper, we propose a technique that predicts the memory usage and executor occupancy of a build. The technique batches a set of targets such that the build created with those targets does not run out of memory or exceed its deadline. This approach significantly reduces the number of builds that run out of memory or exceed the deadlines, hence improving developer's productivity. more...
- Published
- 2021
33. Characterizing Order of Convergence in the Obreshkov Method in Differential-Algebraic Equations
- Author
-
Gad, Emad
- Subjects
Mathematics - Numerical Analysis - Abstract
The Obreshkov method is a single-step multi-derivative method used in the numerical solution of differential equations and has been used in recent years in efficient circuit simulation. It has been shown that it can be made of arbitrary high local order of convergence while maintaining unconditional numerical stability. Nevertheless, the theoretical basis for the high order of convergence has been known only for the special case where the underlying system of differential equations is of the ordinary type, i.e., for ordinary differential equations (ODE). On the other hand, theoretical analysis of the order of convergence for the more general case of a system consisting of differential and algebraic equations (DAE) is still lacking in the literature. This paper presents the theoretical characterization for the local order of convergence of the Obreshkov method when used in the numerical solution of a system of DAE. The contribution presented in this paper demonstrates that, in DAE, the local order of convergence is a function of the differentiation index of the system and, under certain conditions, becomes lower than the order obtained in ODE. more...
- Published
- 2021
34. Carrier Density and Thickness Dependent Proximity Effect in Doped Topological Insulator -- Metallic Ferromagnet Bilayers
- Author
-
Jarach, Yaron, Koren, Gad, Lindner, Netanel H., and Kanigel, Amit
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Materials Science ,Condensed Matter - Strongly Correlated Electrons - Abstract
We use magneto-conductivity to study the magnetic proximity effect on surface states of doped topological insulators. Our bilayers consist of a layer of Fe$_7$Se$_8$, which is a metallic ferrimagnet and a layer of Bi$_{0.8}$Sb$_{1.2}$Te$_{3}$ which is a highly hole-doped topological insulator. Using transport measurements and a modified Hikami-Larkin-Nagaoka model, we show that the ferromagnet shortens significantly the effective coherence length of the surface states, suggesting that a gap is opened at the Dirac point. We show that the magnetically induced gap persists on surface states which are separated from the magnet by a topological insulator layer as thick as 170 [nm]. Furthermore, the size of the gap is found to be proportional to the magnetization that we extract from the anomalous Hall effect. Our results give information on the ties between carrier density, induced magnetization and magnetically induced gap in topological insulator/ferromagnet bilayers. This information is important both for a theoretical understanding of magnetic interactions in topological insulators and for the practical fabrication of such bilayers, which are the basis of various suggested technologies, such as spintronic devices, far infra-red detectors etc., Comment: 12 pages, 8 figures more...
- Published
- 2021
- Full Text
- View/download PDF
35. A Stringent Upper Limit on Dark Matter Self-Interaction Cross Section from Cluster Strong Lensing
- Author
-
Andrade, Kevin E., Fuson, Jackson, Gad-Nasr, Sophia, Kong, Demao, Minor, Quinn, Roberts, M. Grant, and Kaplinghat, Manoj
- Subjects
Astrophysics - Cosmology and Nongalactic Astrophysics - Abstract
We analyze strongly lensed images in 8 galaxy clusters to measure their dark matter density profiles in the radial region between 10 kpc and 150 kpc, and use this to constrain the self-interaction cross section of dark matter (DM) particles. We infer the mass profiles of the central DM halos, bright central galaxies, key member galaxies, and DM subhalos for the member galaxies for all 8 clusters using the Qlens code. The inferred DM halo surface densities are fit to a self-interacting dark matter (SIDM) model, which allows us to constrain the self-interaction cross section over mass $\sigma$/m. When our full method is applied to mock data generated from two clusters in the Illustris-TNG simulation, we find results consistent with no dark matter self-interactions as expected. For the eight observed clusters with average relative velocities of $1458_{-81}^{+80}$ km/s, we infer $\sigma$/m = $0.082_{-0.021}^{+0.027}$ cm$^2$/g and $\sigma$/m < 0.13 cm$^2$/g at the 95% confidence level., Comment: 28 pages more...
- Published
- 2020
- Full Text
- View/download PDF
36. An unexpected high concentration for the dark substructure in the gravitational lens SDSSJ0946+1006
- Author
-
Minor, Quinn E., Gad-Nasr, Sophia, Kaplinghat, Manoj, and Vegetti, Simona
- Subjects
Astrophysics - Astrophysics of Galaxies ,Astrophysics - Cosmology and Nongalactic Astrophysics - Abstract
The presence of an invisible substructure has previously been detected in the gravitational lens galaxy SDSSJ0946+1006 through its perturbation of the lensed images. Using flexible models for the main halo and the subhalo perturbation to fit the lensed images, we demonstrate that the subhalo has an extraordinarily high central density and steep density slope. The inferred concentration for the subhalo is well above the expected scatter in concentrations for $\Lambda$CDM halos of similar mass. We robustly infer the subhalo's projected mass within 1 kpc to be $\sim 2$-$3.7\times 10^9$M$_\odot$ at $>$95% CL for all our lens models, while the average slope of the subhalo's projected density profile over the radial range 0.75-1.25 kpc is constrained to be steeper than isothermal ($\gamma_{2D} \lesssim -1$). By modeling the subhalo light directly, we infer a conservative upper bound on its luminosity $L_V < 1.2\times 10^8L_\odot$ at 95% CL, which shows that the perturber is dark matter dominated. To compare to $\Lambda$CDM expectations, we analyze subhalos within analogues of lensing galaxies in the Illustris TNG100-1 simulation over many lines of sight, and find hundreds of subhalos that achieve a projected mass within 1 kpc of $\gtrsim 2\times10^9M_\odot$. However, less than 1% of the mock observations yield a log-slope steep enough to be consistent with our lensing models, and they $all$ have stellar masses in excess of that allowed by observations by about an order of magnitude or more. We conclude that the presence of such a dark, highly concentrated subhalo is unexpected in a $\Lambda$CDM universe. Finally, we show that this tension with CDM is not significantly reduced if the perturber is assumed to be a line-of-sight structure, rather than a subhalo., Comment: 24 pages, 18 figures, 3 appendices more...
- Published
- 2020
- Full Text
- View/download PDF
37. Observation of Josephson-like tunneling junction characteristics and positive magnetoresistance in Oxygen deficient Nickelate films of $Nd_{0.8}Sr_{0.2}NiO_{3-\delta}$
- Author
-
Koren, Gad, Eyal, Anna, Iomin, Leonid, and Nitzav, Yuval
- Subjects
Condensed Matter - Superconductivity ,Condensed Matter - Materials Science ,Condensed Matter - Strongly Correlated Electrons - Abstract
Nickelate films have recently attracted broad attention due to the observation of superconductivity in the infinite layer phase of $Nd_{0.8}Sr_{0.2}NiO_2$ (obtained by reducing Sr doped $NdNiO_3$ films) and their similarity to the cuprates high temperature superconductors. Here we report on the observation of a new type of transport in oxygen poor $Nd_{0.8}Sr_{0.2}NiO_{3-\delta}$ films. At high temperatures, variable range hopping is observed while at low temperatures a novel tunneling behavior is found where Josephson-like tunneling junction characteristic with serial resistance is revealed. We attribute this phenomenon to coupling between superconductive (S) surfaces of the grains in our Oxygen poor films via the insulating (I) grain boundaries, which yields SIS junctions in series with the normal (N) resistance of the grains themselves. The similarity of the observed conductance spectra to tunneling junction characteristic with Josephson-like current is striking, and seems to support the existence of superconductivity in our samples., Comment: This version includes: 1. A new Fig, 1 with the surface morphology and a surface tunneling model. 2. Fig. 2 of the XRD now shows more details including minority Ni_xO_y phases. 3. More VRH models are now included in Fig. 4. 4. Extended conductance range in Fig. 6 (c) now shows the second quasi-particle branch more clearly more...
- Published
- 2020
- Full Text
- View/download PDF
38. An Algebraic Approach for the Stability Analysis of BLDC Motor Controllers
- Author
-
Gad, Emad and Pimentel, Julio
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
This paper presents an algebraic technique to compute the maximum time-delay that can be accepted in the control loop of a Brushless DC Motor (BLDCM) speed controller before the closed loop response becomes unstable. Using a recently proposed time-delay stability analysis methodology, we derive accurate stability conditions for the BLDCM speed controller. The results of applying the new method show that tuning the PI controller for very fast response in the order of magnitude of the BLDCM mechanical time constant cause the time-delay to significantly affect the system stability., Comment: 12 pages more...
- Published
- 2020
39. Velocity-dependent Self-interacting Dark Matter from Groups and Clusters of Galaxies
- Author
-
Sagunski, Laura, Gad-Nasr, Sophia, Colquhoun, Brian, Robertson, Andrew, and Tulin, Sean
- Subjects
Astrophysics - Cosmology and Nongalactic Astrophysics ,High Energy Physics - Phenomenology - Abstract
We probe the self-interactions of dark matter using observational data of relaxed galaxy groups and clusters. Our analysis uses the Jeans formalism and considers a wider range of systematic effects than in previous work, including adiabatic contraction and stellar anisotropy, to robustly constrain the self-interaction cross section. For both groups and clusters, our results show a mild preference for a nonzero cross section compared with cold collisionless dark matter. Our groups result, $\sigma/m=0.5\pm0.2~\mathrm{cm}^2/\mathrm{g}$, places the first constraint on self-interacting dark matter (SIDM) at an intermediate scale between galaxies and massive clusters. Our clusters result is $\sigma/m=0.19\pm0.09~\mathrm{cm}^2/\mathrm{g}$, with an upper limit of $\sigma / m < 0.35~\mathrm{cm}^2/\mathrm{g}$ (95% CL). Thus, our results disfavor a velocity-independent cross section of order $1~\mathrm{cm}^2/\mathrm{g}$ or larger needed to address small scale structure problems in galaxies, but are consistent with a velocity-dependent cross section that decreases with increasing scattering velocity. Comparing the cross sections with and without the effect of adiabatic contraction, we find that adiabatic contraction produces slightly larger values for our data sample, but they are consistent at the $1\sigma$ level. Finally, to validate our approach, we apply our Jeans analysis to a sample of mock data generated from SIDM-plus-baryons simulations with $\sigma/m = 1~\mathrm{cm}^2/\mathrm{g}$. This is the first test of the Jeans model at the level of stellar and lensing observables directly measured from simulations. We find our analysis gives a robust determination of the cross section, as well as consistently inferring the true baryon and dark matter density profiles., Comment: 36 pages, 17 figures, 3 tables more...
- Published
- 2020
- Full Text
- View/download PDF
40. Fair Principal Component Analysis and Filter Design
- Author
-
Zalcberg, Gad and Wiesel, Ami
- Subjects
Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
We consider Fair Principal Component Analysis (FPCA) and search for a low dimensional subspace that spans multiple target vectors in a fair manner. FPCA is defined as a non-concave maximization of the worst projected target norm within a given set. The problem arises in filter design in signal processing, and when incorporating fairness into dimensionality reduction schemes. The state of the art approach to FPCA is via semidefinite relaxation and involves a polynomial yet computationally expensive optimization. To allow scalability, we propose to address FPCA using naive sub-gradient descent. We analyze the landscape of the underlying optimization in the case of orthogonal targets. We prove that the landscape is benign and that all local minima are globally optimal. Interestingly, the SDR approach leads to sub-optimal solutions in this simple case. Finally, we discuss the equivalence between orthogonal FPCA and the design of normalized tight frames. more...
- Published
- 2020
- Full Text
- View/download PDF
41. On Torsion Axial Vector and gravitational Energy in Lewis-Papapetrou Space-Time in the Theory of Teleparallel Gravity
- Author
-
Alofi, A. S. and Gad, Ragab M
- Subjects
General Relativity and Quantum Cosmology - Abstract
The teleparallel version of Lewis-Papapetrou space-time is investigated. For this space-time the true discussion of the geometric and physical properties is given. We show that the value of space-like torsion-axial vector does not depend on the choice of tetrad field. Consequently, the spin procession of the Dirac particle and the corresponding Hamiltonian do. The energy and momentum densities for such space-time are calculated. We show that when choosing two sets of tetrad fields the dependence and independence of the aforementioned quantities on the tetrad field depend on the Lorentz factor, which links the two sets of tetrad fields., Comment: 16 pages, no figures more...
- Published
- 2019
42. Beyond the Coverage of Information Spreading: Analytical and Empirical Evidence of Re-exposure in Large-scale Online Social Networks
- Author
-
Lu, Xin, Qin, Shuo, Holme, Petter, Meng, Fanhui, Hu, Yanqing, Liljeros, Fredrik, and Allon, Gad
- Subjects
Physics - Physics and Society ,Statistics - Applications - Abstract
Peer influence and social contagion are key denominators in the adoption and participation of information spreading, such as news propagation, word-of-mouth or viral marketing. In this study, we argue that it is biased to only focus on the scale and coverage of information spreading, and propose that the level of influence reinforcement, quantified by the re-exposure rate, i.e., the rate of individuals who are repeatedly exposed to the same information, should be considered together to measure the effectiveness of spreading. We show that local network structural characteristics significantly affects the probability of being exposed or re-exposed to the same information. After analyzing trending news on the super large-scale online network of Sina Weibo (China's Twitter) with 430 million connected users, we find a class of users with extremely low exposure rate, even they are following tens of thousands of others; and the re-exposure rate is substantially higher for news with more transmission waves and stronger secondary forwarding. While exposure and re-exposure rate typically grow together with the scale of spreading, we find exceptional cases where it is possible to achieve a high exposure rate while maintaining low re-exposure rate, or vice versa., Comment: 16 pages,7 figures,1 table more...
- Published
- 2019
43. R-Parity Violating Supersymmetry and the 125 GeV Higgs signals
- Author
-
Cohen, Jonathan, Bar-Shalom, Shaouly, Eilam, Gad, and Soni, Amarjit
- Subjects
High Energy Physics - Phenomenology - Abstract
We study the impact of R-parity violating Supersymmetry (RPV SUSY) on the 125 GeV Higgs production and decay modes at the LHC. We assume a heavy SUSY spectrum with multi-TeV squarks and SU(2) scalar singlets as well as the decoupling limit in the SUSY Higgs sector. In this case the lightest CP-even Higgs is SM-like when R-parity is conserved. In contrast, we show that when R-parity violating interactions are added to the SUSY framework, significant deviations may occur in some production and decay channels of the 125 GeV Higgs-like state. Indeed, we assume a single-flavor (mostly third generation) Bilinear RPV (BRPV) interactions, which generate Higgs-sneutrino mixing, lepton-chargino mixing and neutrino-neutralino mixing, and find that notable deviations of ${\cal O}(20-30\%)$ may be expected in the Higgs signal strength observables in some channels, e.g., in $p p \to h \to \mu^+ \mu^-, \tau^+ \tau^-$. Moreover, we find that new and detectable signals associated with BRPV Higgs decays to gauginos, $h\rightarrow\nu_{\tau}\tilde{\chi}_{2}^{0}$ and $h\rightarrow\tau^{\pm}\chi_{2}^{\mp}$, may also arise in this scenario. These decays yield a typical signature of $h \to \tau^\pm \ell^\mp + {{\not\!\! E_T}}$ ($\ell =e,\mu,\tau$) that can be much larger than in the SM, and may also be accompanied by an ${\cal O}(20-30\%)$ enhancement in the di-photon signal $pp \to h \to \gamma \gamma$. We also examine potential interesting signals of Trilinear R-parity violation (TRPV) interactions in the production and decays of the Higgs-sneutrino BRPV mixed state (assuming it is the 125 GeV scalar) and show that, in this case also, large deviations up to ${\cal O}(100\%)$ are expected in e.g., $p p \to h \to \mu^+ \mu^-, \tau^+ \tau^-$, which are sensitive to the BRPV$\times$TRPV coupling product., Comment: 33 pages, 5 figures, 17 tables more...
- Published
- 2019
- Full Text
- View/download PDF
44. Cartesian Tree Matching and Indexing
- Author
-
Park, Sung Gwan, Amir, Amihood, Landau, Gad M., and Park, Kunsoo
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
We introduce a new metric of match, called Cartesian tree matching, which means that two strings match if they have the same Cartesian trees. Based on Cartesian tree matching, we define single pattern matching for a text of length n and a pattern of length m, and multiple pattern matching for a text of length n and k patterns of total length m. We present an O(n+m) time algorithm for single pattern matching, and an O((n+m) log k) deterministic time or O(n+m) randomized time algorithm for multiple pattern matching. We also define an index data structure called Cartesian suffix tree, and present an O(n) randomized time algorithm to build the Cartesian suffix tree. Our efficient algorithms for Cartesian tree matching use a representation of the Cartesian tree, called the parent-distance representation., Comment: 14 pages, 3 figures, Submitted to CPM 2019 more...
- Published
- 2019
45. Top Tree Compression of Tries
- Author
-
Bille, Philip, Gørtz, Inge Li, Gawrychowski, Paweł, Landau, Gad M., and Weimann, Oren
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
We present a compressed representation of tries based on top tree compression [ICALP 2013] that works on a standard, comparison-based, pointer machine model of computation and supports efficient prefix search queries. Namely, we show how to preprocess a set of strings of total length $n$ over an alphabet of size $\sigma$ into a compressed data structure of worst-case optimal size $O(n/\log_\sigma n)$ that given a pattern string $P$ of length $m$ determines if $P$ is a prefix of one of the strings in time $O(\min(m\log \sigma,m + \log n))$. We show that this query time is in fact optimal regardless of the size of the data structure. Existing solutions either use $\Omega(n)$ space or rely on word RAM techniques, such as tabulation, hashing, address arithmetic, or word-level parallelism, and hence do not work on a pointer machine. Our result is the first solution on a pointer machine that achieves worst-case $o(n)$ space. Along the way, we develop several interesting data structures that work on a pointer machine and are of independent interest. These include an optimal data structures for random access to a grammar-compressed string and an optimal data structure for a variant of the level ancestor problem., Comment: Extended abstract appeared at ISAAC 2019 more...
- Published
- 2019
46. Unconventional order parameter induced by helical chiral molecules adsorbed on a metal proximity-coupled to a superconductor
- Author
-
Shapira, Tamar, Alpern, Hen, Yochelis, Shira, Lee, Ting-Kuo, Kaun, Chao-Cheng, Paltiel, Yossi, Koren, Gad, and Millo*, Oded
- Subjects
Condensed Matter - Superconductivity - Abstract
Following our previous results, which provide evidence for the emergence of a chiral p-wave triplet-pairing component in superconducting Nb upon the adsorption of chiral molecules, we turned to investigate whether such an effect can take place in a proximal superconductor consisting of metal on superconductor bilayer. Note that in such proximity systems, correlated electron-hole (Andreev) pairs exist in the normal metal rather than genuine Cooper pairs. To that end, we used scanning tunneling spectroscopy (STS) on thin Au films grown in-situ on NbN (a conventional s-wave superconductor) before and after adsorbing helical chiral, alpha-helix polyalanine molecules. The tunneling spectra measured on the pristine Au surface showed conventional (s-wave like) proximity gaps. However, upon molecules adsorption the spectra significantly changed, all exhibiting a zero-bias conductance peak embedded inside a gap, indicating unconventional superconductivity. The peak reduced with magnetic field but did not split, consistent with equal-spin triplet-pairing p-wave symmetry. In contrast, adsorption of non-helical chiral cysteine molecules did not yield any apparent change in the order parameter, and the tunneling spectra exhibited only gaps free of in-gap structure., Comment: 20 pages, 5 figures more...
- Published
- 2019
47. Iterative Programming of Noisy Memory Cells
- Author
-
Horovitz, Michal, Yaakobi, Eitan, Gad, Eyal En, and Bruck, Jehoshua
- Subjects
Computer Science - Information Theory - Abstract
In this paper, we study a model, which was first presented by Bunte and Lapidoth, that mimics the programming operation of memory cells. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read the cell state in order to determine its programming success, and in case of programming failure, to reprogram the cell again. Reprogramming a cell can reduce the bit error rate, however this comes with the price of increasing the overall programming time and thereby affecting the writing speed of the memory. An iterative programming scheme is an algorithm which specifies the number of attempts to program each cell. Given the programming channel and constraints on the average and maximum number of attempts to program a cell, we study programming schemes which maximize the number of bits that can be reliably stored in the memory. We extend the results by Bunte and Lapidoth and study this problem when the programming channel is either the BSC, BEC, or $Z$ channel. For the BSC and the BEC our analysis is also extended for the case where the error probabilities on consecutive writes are not necessarily the same. Lastly, we also study a related model which is motivated by the synthesis process of DNA molecules., Comment: 10 pages, 2 figures more...
- Published
- 2019
48. Scalable Block-Wise Product BCH Codes
- Author
-
Wu, Yingquan and Gad, Eyal En
- Subjects
Computer Science - Information Theory - Abstract
In this paper we comprehensively investigate block-wise product (BWP) BCH codes, wherein raw data is arranged in the form of block-wise matrix and each row and column BCH codes intersect on one data block. We first devise efficient BCH decoding algorithms, including reduced-1-bit decoding, extra-1-bit list decoding, and extra-2-bit list decoding. We next present a systematic construction of BWP-BCH codes upon given message and parity lengths that takes into account for performance, implementation and scalability, rather than focusing on a regularly defined BWP-BCH code. It can easily accommodate different message length or parity length at minimal changes. It employs extended BCH codes instead of BCH codes to reduce miscorrection rate and an inner RS code to lower error floor. We also describe a high-speed scalable encoder. We finally present a novel iterative decoding algorithm which is divided into three phases. The first phase iteratively applies reduced BCH correction capabilities to correct lightly corrupted rows/columns while suppressing miscorrection, until the process stalls. The second phase iteratively decodes up to the designed correction capabilities, until the process stalls. The last phase iteratively applies the proposed list decoding in a novel manner which effectively determines the correct candidate. The key idea is to use cross decoding upon each list candidate to pick the candidate which enables the maximum number of successful cross decoding. Our simulations show that the proposed algorithm provides a significant performance boost compared to the state-of-the-art algorithms., Comment: Submitted to IEEE trans. Info. Theory more...
- Published
- 2018
49. Refractive-Index-based ultrasound sensing with photonic crystal slabs
- Author
-
Zhu, Eric Y., Rewcastle, Cory, Gad, Raanan, Qian, Li, and Levi, Ofer
- Subjects
Physics - Applied Physics ,Physics - Optics - Abstract
We demonstrate ultrasound detection with 500-$\mu\mathrm{{m}}$-diameter photonic-crystal slab (PCS) sensors fabricated from CMOS-compatible technology. An ultrasound signal impinging a PCS sensor causes a local modulation of the refractive index (RI) of the medium (water) in which the PCS is immersed, resulting in a periodic spectral shift of the optical resonance of the PCS. The acoustic sensitivity is found to scale with the index sensitivity $S$ and quality factor $Q$. A noise equivalent pressure (NEP) of 650 Pa with averaging (7.4 Pa$/\sqrt{\mathrm{Hz}}$) and relative wavelength shifts of up to 4.3$\times10^{-5}$ MPa$^{-1}$ are measured. The frequency response of the sensors is observed to be flat from 1-20 MHz, with the range limited only by our measurement apparatus., Comment: 5 pages, 4 figures, 1 table more...
- Published
- 2018
- Full Text
- View/download PDF
50. Overview of PicTropes, a film trope dataset
- Author
-
García-Ortega, Rubén H., Merelo-Guervós, Juan J., Sánchez, Pablo García, and Pitaru, Gad
- Subjects
Computer Science - Computers and Society ,Computer Science - Information Retrieval ,Computer Science - Machine Learning - Abstract
From the database DBTropes.org, we have created a dataset of films and the tropes that they use, which we have called PicTropes. In this report we provide the descriptive analysis and a further discussion on the dataset PicTropes: The extracted features will help us decide the best values for a future recommendation system and content generator, whereas the analysis of the distribution functions that fit the best will help us interpret the relation between the films and the tropes that were found inside them. Additionally, we provide rankings of the top-25 tropes and films, which will help us discuss and formulate questions to guide future extensions of the PicTropes dataset. more...
- Published
- 2018
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.