34,235 results on '"Ramesh, P"'
Search Results
2. Morphological and Yield Attribute of Blackgram Genotypes under Different Salinity Stress Conditions
- Author
-
Shanthi, P., Ramesh, P., Parameshwaran, M., Umadevi, M., Sakaravarthy, K. Sibi, and Vivekananthan, T.
- Published
- 2024
- Full Text
- View/download PDF
3. Trypanosomiasis in a dog - A case report
- Author
-
Haritha, G S, Ramesh, P, Hemanth, I, and Devi, Rama P
- Published
- 2024
- Full Text
- View/download PDF
4. Therapeutic management of Russell's Viper Snake bite in a labrador dog
- Author
-
Haritha, G S, Kumar, Prakash B, Hemanth, I, Kumar, Vinay Ch, and Ramesh, P
- Published
- 2024
- Full Text
- View/download PDF
5. Forensic Evaluation of Image Tempering Using Error Level Analysis (ELA)
- Author
-
Mukherjee, Anirban, Singh, Gaurav Kumar, Maheswari, M., Ramesh, P Paul, and Das, Anamika
- Published
- 2023
- Full Text
- View/download PDF
6. Sarcoptic mange and its therapeutic management in pet rabbits
- Author
-
Haritha, G S, Ramesh, P, Ramadevi, P, Srilatha, B, and Kumar, Manoj K
- Published
- 2023
- Full Text
- View/download PDF
7. Prevalence of Anemia in Small Ruminants in Garividi region of Andhra Pradesh
- Author
-
Haritha, G S and Ramesh, P
- Published
- 2022
- Full Text
- View/download PDF
8. Learning Life Skills through Multicultural Exchange: An Examination of Prospective English Language Teachers' Experiences
- Author
-
Fahriye Altinay, Nesrin M. Bahcelerli, Ramesh Chander Sharma, Nurdan Atamturk, Zehra Altinay, Gokmen Dagli, and Mehmtinay
- Abstract
The student exchange programs are venues for learning opportunities by offering multicultural contexts. This study reports on the experiences of ten prospective English language teachers in a virtual student exchange program to investigate likely skill development in a multicultural and open and distance learning setting. This descriptive study used the qualitative method. The textual data were elicited through eighty reflective essays written by the participants. Virtual classroom observations and WhatsApp chat data ensured data triangulation. The results revealed the themes as developed learning and life skills and enhanced internal gains. It was found that internal outcomes, such as self-confidence, empathy, and self-reliance, were enhanced rather than external gains. One of the limitations of this study was the brevity of the exchange program, which lasted only eight days. Additionally, the current study is a small-scale study, which limits the generalizability of the results. Last but not least, only two participants placed in the researcher's class were observed. The study poses a few implications for education policymakers, curriculum developers, and teachers. In light of the results, it is posed that adding a multicultural aspect to the teacher training curriculum is imperative for teacher empowerment. Though the literature on student exchange reports findings on the gains and challenges, there is a scarcity of studies delving into what skills students develop and how with vivid examples. In this respect, this study adds to the relevant literature.
- Published
- 2024
9. Assessment of knowledge of dairy farmers on Ooruraa pasu graasa kshetralu (OPGK) scheme and its relationship with their profile characteristics in Srikakulam district of Andhra Pradesh
- Author
-
Ramesh, P., Triveni, G., Sharma, G R K, and Reddy, Y. Ravindra
- Published
- 2022
- Full Text
- View/download PDF
10. Hierarchical Multi-Agent Framework for Carbon-Efficient Liquid-Cooled Data Center Clusters
- Author
-
Sarkar, Soumyendu, Naug, Avisek, Guillen, Antonio, Gundecha, Vineet, Gutierrez, Ricardo Luna, Ghorbanpour, Sahand, Mousavi, Sajad, Babu, Ashwin Ramesh, Rengarajan, Desik, and Bash, Cullen
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Electrical Engineering and Systems Science - Systems and Control - Abstract
Reducing the environmental impact of cloud computing requires efficient workload distribution across geographically dispersed Data Center Clusters (DCCs) and simultaneously optimizing liquid and air (HVAC) cooling with time shift of workloads within individual data centers (DC). This paper introduces Green-DCC, which proposes a Reinforcement Learning (RL) based hierarchical controller to optimize both workload and liquid cooling dynamically in a DCC. By incorporating factors such as weather, carbon intensity, and resource availability, Green-DCC addresses realistic constraints and interdependencies. We demonstrate how the system optimizes multiple data centers synchronously, enabling the scope of digital twins, and compare the performance of various RL approaches based on carbon emissions and sustainability metrics while also offering a framework and benchmark simulation for broader ML research in sustainability.
- Published
- 2025
11. The impact of hole $g$-factor anisotropy on spin-photon entanglement generation with InGaAs quantum dots
- Author
-
Ramesh, P. R., Annoni, E., Margaria, N., Fioretto, D. A., Pishchagin, A., Morassi, M., Lemaître, A., Doty, M. F., Senellart, P., Lanco, L., Belabas, N., Wein, S. C., and Krebs, O.
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Quantum Physics - Abstract
Self-assembled InGaAs/GaAs quantum dots (QDs) are of particular importance for the deterministic generation of spin-photon entanglement. One promising scheme relies on the Larmor precession of a spin in a transverse magnetic field, which is governed by the in-plane $g$-factors of the electron and valence band heavy-hole. We probe the origin of heavy-hole $g$-factor anisotropy with respect to the in-plane magnetic field direction and uncover how it impacts the entanglement generated between the spin and the photon polarization. First, using polarization-resolved photoluminescence measurements on a single QD, we determine that the impact of valence-band mixing dominates over effects due to a confinement-renormalized cubic Luttinger $q$ parameter. From this, we construct a comprehensive hole $g$-tensor model. We then use this model to simulate the concurrence and fidelity of spin-photon entanglement generation with anisotropic hole $g$-factors, which can be tuned via magnetic field angle and excitation polarization. The results demonstrate that post-growth control of the hole $g$-factor can be used to improve spin-photon cluster state generation.
- Published
- 2025
12. Ideas and Requirements for the Global Cosmic-Ray Observatory (GCOS)
- Author
-
Ahlers, Markus, Allekotte, Ingo, Alvarez-Muniz, Jaime, Anastasi, Gioacchino Alex, Anchordoqui, Luis, Anjos, Rita de Cassia Dos, Balakrishnan, Hari Haran, Batista, Rafael Alves, Bellido, Jose, Bertaina, Mario, Bhatnagar, Sonali, Billoir, Pierre, Bismark, Kathrin, Bister, Teresa, Bohacova, Martina, Bonifazi, Carla, Bradfield, Fraser, Castellina, Antonella, Cazon, Lorenzo, Cheminant, Kevin Almeida, Coleman, Alan, Convenga, Fabio, Veberič, Darko, Dasgupta, Paramita, Daumiller, Kai, Dawson, Bruce, Deval, Luca, Engel, Ralph, Eser, Johannes, Fang, Ke, Farrar, Glennys R., Fedynitch, Anatoli, Fenu, Francesco, Fitoussi, Thomas, Flaggs, Benjamin, Fodran, Tomas, Fujii, Toshihiro, Fujita, Keitaro, Garzelli, Maria Vittoria, Globus, Noemie, Goksu, Hazal, Gou, Quanbu, Hahn, Steffen, Hariharan, Balakrishnan, Haungs, Andreas, Higuchi, Ryo, Hnatyk, Bohdan, Hörandel, Jörg, Huege, Tim, Ikeda, Daisuke, Ikkatai, Yuko, Mariş, Ioana, Isar, Gina, James, Robin, Carvalho Jr, Washington, Kaderi, Yunos El, Kadler, Matthias, Kampert, Karl-Heinz, Kang, Donghwa, Khakurdikar, Abha, Kido, Eiji, Kleifges, Matthias, Koirala, Ramesh, Kong, Chuizheng, Koyama, C., Krizmanic, John, Kulshrestha, Shivam, Kungel, Viktoria, Leszczyńska, Agnieszka, Liu, Ruoyu, Luce, Quentin, Marchenko, Volodymyr, Mariazzi, Analisa, di Matteo, Armando, Matthews, John N., Mayotte, Eric, Mazur, Peter, Meli, Athina, Menjo, Hiroaki, Montanet, François, Müller, Ana Laura, Murase, Kohta, Muzio, Marco, Nellen, Lukas, Niechciol, Marcus, Nitz, David, Nonaka, Toshiyuki, Ogio, Shoichi, Ohira, Yutaka, Oikonomou, Foteini, Olinto, Angela V, Oshima, Hitoshi, Oueslati, Rami, Paudel, Ek Narayan, Paul, Thomas, Pawlowsky, Jannis, Payeras, Allan Machado, Pelgrims, Vincent, Perrone, Lorenzo, Pont, Bjarni, Porcelli, Alessio, Rautenberg, Julian, Riehn, Felix, Risse, Markus, Roth, Markus, Saftoiu, Alexandra, Sako, Takashi, Sakurai, Shunsuke, Salamida, Francesco, Sánchez, Juan Antonio Aguilar, Santangelo, Andrea, Santos, Eva, Sarazin, Fred, Schäfer, Christoph, Scherini, Viviana, Schieler, Harald, Schmidt, David, Schoorlemmer, Harm, Schroeder, Frank, Sergijenko, Olga, Shin, H. S., Soldin, Dennis, Suarez-Duran, Mauricio, Takahashi, Kaoru, Takeda, Masahiro, Tameda, Yuichiro, Tkachenko, Olena, Tomida, Takayuki, Travnicek, Petr, Unger, Michael, Urban, Federico, Venters, Tonia, Verzi, Valerio, Vicha, Jakub, van Vliet, Arjen, Watson, Alan A., Yushkov, Alexey, Zapparrata, Orazio, and Zhang, Pengfei
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics ,Astrophysics - High Energy Astrophysical Phenomena - Abstract
After a successful kick-off meeting in 2021. two workshops in 2022 and 2023 on the future Global Cosmic-Ray Observatory (GCOS) focused mainly on a straw man design of the detector and science possibilities for astro- and particle physics. About 100 participants gathered for in-person and hybrid panel discussions. In this report, we summarize these discussions, present a preliminary straw-man design for GCOS and collect short write-ups of the flash talks given during the focus sessions., Comment: 48 pages, 27 figures
- Published
- 2025
13. Demonstrating CavePI: Autonomous Exploration of Underwater Caves by Semantic Guidance
- Author
-
Gupta, Alankrit, Abdullah, Adnan, Li, Xianyao, Ramesh, Vaishnav, Rekleitis, Ioannis, and Islam, Md Jahidul
- Subjects
Computer Science - Robotics - Abstract
Enabling autonomous robots to safely and efficiently navigate, explore, and map underwater caves is of significant importance to water resource management, hydrogeology, archaeology, and marine robotics. In this work, we demonstrate the system design and algorithmic integration of a visual servoing framework for semantically guided autonomous underwater cave exploration. We present the hardware and edge-AI design considerations to deploy this framework on a novel AUV (Autonomous Underwater Vehicle) named CavePI. The guided navigation is driven by a computationally light yet robust deep visual perception module, delivering a rich semantic understanding of the environment. Subsequently, a robust control mechanism enables CavePI to track the semantic guides and navigate within complex cave structures. We evaluate the system through field experiments in natural underwater caves and spring-water sites and further validate its ROS (Robot Operating System)-based digital twin in a simulation environment. Our results highlight how these integrated design choices facilitate reliable navigation under feature-deprived, GPS-denied, and low-visibility conditions., Comment: V1, 15 pages
- Published
- 2025
14. Algebraic cycles and values of Green's functions I- Products of Elliptic Curves
- Author
-
Sreekantan, Ramesh
- Subjects
Mathematics - Algebraic Geometry ,Mathematics - Number Theory ,11G15, 11G55, 14K22, 14C25, 14G35, 19E15 - Abstract
Gross and Zagier defined certain `higher Green's functions' on products of modular curves and conjectured that the value of these functions at complex multiplication points should be logarithms of algebraic numbers. This is now a theorem of Li. We relate this question to the existence of motivic cycles in the universal family of products of elliptic curves along the lines of Mellit and Zhang. We then construct infinitely many such cycles. In the appendix we work out an example of algebraicity. The work of Li, Bruinier-Ehlen-Yang, Viazovska and others relate this conjecture to Borcherds' lifts of weakly holomorphic modular forms. This suggests that there should be a link between motivic cycles in the universal family on the one hand and Borcherds' lifts on the other. We formulate a precise conjecture relating the two objects., Comment: 35 pages
- Published
- 2025
15. Accelerating OTA Circuit Design: Transistor Sizing Based on a Transformer Model and Precomputed Lookup Tables
- Author
-
Ghosh, Subhadip, Gebru, Endalk Y., Kashyap, Chandramouli V., Harjani, Ramesh, and Sapatnekar, Sachin S.
- Subjects
Computer Science - Hardware Architecture ,B.7.2 - Abstract
Device sizing is crucial for meeting performance specifications in operational transconductance amplifiers (OTAs), and this work proposes an automated sizing framework based on a transformer model. The approach first leverages the driving-point signal flow graph (DP-SFG) to map an OTA circuit and its specifications into transformer-friendly sequential data. A specialized tokenization approach is applied to the sequential data to expedite the training of the transformer on a diverse range of OTA topologies, under multiple specifications. Under specific performance constraints, the trained transformer model is used to accurately predict DP-SFG parameters in the inference phase. The predicted DP-SFG parameters are then translated to transistor sizes using a precomputed look-up table-based approach inspired by the gm/Id methodology. In contrast to previous conventional or machine-learning-based methods, the proposed framework achieves significant improvements in both speed and computational efficiency by reducing the need for expensive SPICE simulations within the optimization loop; instead, almost all SPICE simulations are confined to the one-time training phase. The method is validated on a variety of unseen specifications, and the sizing solution demonstrates over 90% success in meeting specifications with just one SPICE simulation for validation, and 100% success with 3-5 additional SPICE simulations., Comment: Title: Accelerating OTA Circuit Design: Transistor Sizing Based on a Transformer Model and Precomputed Lookup Tables Authors: Subhadip Ghosh, Endalk Y. Gebru, Chandramouli V. Kashyap, Ramesh Harjani, Sachin S. Sapatnekar Accepted in conference: Proceedings of Design, Automation and Test in Europe, 2025 No. of Pages: 7 No. of figures: 7 No. of tables: 9
- Published
- 2025
16. AAD-DCE: An Aggregated Multimodal Attention Mechanism for Early and Late Dynamic Contrast Enhanced Prostate MRI Synthesis
- Author
-
Bharti, Divya, Ramanarayanan, Sriprabha, S, Sadhana, M, Kishore Kumar, Ram, Keerthi, Agarwal, Harsh, Venkatesan, Ramesh, and Sivaprakasam, Mohanasankar
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Dynamic Contrast-Enhanced Magnetic Resonance Imaging (DCE-MRI) is a medical imaging technique that plays a crucial role in the detailed visualization and identification of tissue perfusion in abnormal lesions and radiological suggestions for biopsy. However, DCE-MRI involves the administration of a Gadolinium based (Gad) contrast agent, which is associated with a risk of toxicity in the body. Previous deep learning approaches that synthesize DCE-MR images employ unimodal non-contrast or low-dose contrast MRI images lacking focus on the local perfusion information within the anatomy of interest. We propose AAD-DCE, a generative adversarial network (GAN) with an aggregated attention discriminator module consisting of global and local discriminators. The discriminators provide a spatial embedded attention map to drive the generator to synthesize early and late response DCE-MRI images. Our method employs multimodal inputs - T2 weighted (T2W), Apparent Diffusion Coefficient (ADC), and T1 pre-contrast for image synthesis. Extensive comparative and ablation studies on the ProstateX dataset show that our model (i) is agnostic to various generator benchmarks and (ii) outperforms other DCE-MRI synthesis approaches with improvement margins of +0.64 dB PSNR, +0.0518 SSIM, -0.015 MAE for early response and +0.1 dB PSNR, +0.0424 SSIM, -0.021 MAE for late response, and (ii) emphasize the importance of attention ensembling. Our code is available at https://github.com/bhartidivya/AAD-DCE., Comment: Accepted at ICASSP 2025
- Published
- 2025
17. The Impact of Logic Locking on Confidentiality: An Automated Evaluation
- Author
-
Reimann, Lennart M., Rezunov, Evgenii, Germek, Dominik, Collini, Luca, Pilato, Christian, Karri, Ramesh, and Leupers, Rainer
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Hardware Architecture - Abstract
Logic locking secures hardware designs in untrusted foundries by incorporating key-driven gates to obscure the original blueprint. While this method safeguards the integrated circuit from malicious alterations during fabrication, its influence on data confidentiality during runtime has been ignored. In this study, we employ path sensitization to formally examine the impact of logic locking on confidentiality. By applying three representative logic locking mechanisms on open-source cryptographic benchmarks, we utilize an automatic test pattern generation framework to evaluate the effect of locking on cryptographic encryption keys and sensitive data signals. Our analysis reveals that logic locking can inadvertently cause sensitive data leakage when incorrect logic locking keys are used. We show that a single malicious logic locking key can expose over 70% of an encryption key. If an adversary gains control over other inputs, the entire encryption key can be compromised. This research uncovers a significant security vulnerability in logic locking and emphasizes the need for comprehensive security assessments that extend beyond key-recovery attacks., Comment: 8 pages, accepted at 26th International Symposium on Quality Electronic Design (ISQED'25)
- Published
- 2025
18. Almost Surely Safe Alignment of Large Language Models at Inference-Time
- Author
-
Ji, Xiaotong, Ramesh, Shyam Sundhar, Zimmer, Matthieu, Bogunovic, Ilija, Wang, Jun, and Ammar, Haitham Bou
- Subjects
Computer Science - Machine Learning ,Computer Science - Computation and Language - Abstract
Even highly capable large language models (LLMs) can produce biased or unsafe responses, and alignment techniques, such as RLHF, aimed at mitigating this issue, are expensive and prone to overfitting as they retrain the LLM. This paper introduces a novel inference-time alignment approach that ensures LLMs generate safe responses almost surely, i.e., with a probability approaching one. We achieve this by framing the safe generation of inference-time responses as a constrained Markov decision process within the LLM's latent space. Crucially, we augment a safety state that tracks the evolution of safety constraints and enables us to demonstrate formal safety guarantees upon solving the MDP in the latent space. Building on this foundation, we propose InferenceGuard, a practical implementation that safely aligns LLMs without modifying the model weights. Empirically, we demonstrate InferenceGuard effectively balances safety and task performance, outperforming existing inference-time alignment methods in generating safe and aligned responses.
- Published
- 2025
19. Comprehensive Evaluation for a Large Scale Knowledge Graph Question Answering Service
- Author
-
Potdar, Saloni, Lee, Daniel, Attia, Omar, Embar, Varun, Meng, De, Balaji, Ramesh, Seivwright, Chloe, Choi, Eric, Farid, Mina H., Sun, Yiwen, and Li, Yunyao
- Subjects
Computer Science - Computation and Language ,Computer Science - Databases - Abstract
Question answering systems for knowledge graph (KGQA), answer factoid questions based on the data in the knowledge graph. KGQA systems are complex because the system has to understand the relations and entities in the knowledge-seeking natural language queries and map them to structured queries against the KG to answer them. In this paper, we introduce Chronos, a comprehensive evaluation framework for KGQA at industry scale. It is designed to evaluate such a multi-component system comprehensively, focusing on (1) end-to-end and component-level metrics, (2) scalable to diverse datasets and (3) a scalable approach to measure the performance of the system prior to release. In this paper, we discuss the unique challenges associated with evaluating KGQA systems at industry scale, review the design of Chronos, and how it addresses these challenges. We will demonstrate how it provides a base for data-driven decisions and discuss the challenges of using it to measure and improve a real-world KGQA system.
- Published
- 2025
20. Sensitivity of Quantitative Susceptibility Mapping in Clinical Brain Research
- Author
-
Salman, Fahad, Ramesh, Abhisri, Jochmann, Thomas, Prayer, Mirjam, Adegbemigun, Ademola, Reeves, Jack A., Wilding, Gregory E., Cho, Junghun, Jakimovski, Dejan, Bergsland, Niels, Dwyer, Michael G., Zivadinov, Robert, and Schweser, Ferdinand
- Subjects
Quantitative Biology - Quantitative Methods ,Electrical Engineering and Systems Science - Image and Video Processing ,Physics - Computational Physics ,Physics - Medical Physics - Abstract
Background: Quantitative susceptibility mapping (QSM) of the brain is an advanced MRI technique for assessing tissue characteristics based on magnetic susceptibility, which varies with the composition of the tissue, such as iron, calcium, and myelin levels. QSM consists of multiple processing steps, with various choices for each step. Despite its increasing application in detecting and monitoring neurodegenerative diseases, the impact of algorithmic choices in QSM's workflow on clinical outcomes has not been thoroughly quantified. Objective: This study aimed to evaluate how choices in background field removal (BFR), dipole inversion algorithms, and anatomical referencing impact the sensitivity and reproducibility error of QSM in detecting group-level and longitudinal changes in deep gray matter susceptibility in a clinical setting. Methods: We compared 378 different QSM pipelines using a 10-year follow-up dataset of healthy adults. We analyzed the sensitivity of pipelines to detect known aging-related susceptibility changes in the DGM over time. Results: We found high variability in the sensitivity of QSM pipelines to detect susceptibility changes. The study highlighted that while most pipelines could detect changes reliably, the choice of BFR algorithm and the referencing strategy substantially influenced the outcome reproducibility error and sensitivity. Notably, pipelines using RESHARP with AMP-PE, HEIDI or LSQR inversion showed the highest overall sensitivity. Conclusions: The findings underscore the critical influence of algorithmic choices in QSM processing on the accuracy and reliability of detecting physiological changes in the brain. This has profound implications for clinical research and trials where QSM is used as a biomarker for disease progression, highlighting that careful consideration should be given to pipeline configuration to optimize clinical outcomes.
- Published
- 2025
21. SHIELD: Secure Host-Independent Extensible Logging for SATA/Network Storage Towards Ransomware Detection
- Author
-
Raz, Md, Charan, P. V. Sai, Krishnamurthy, Prashanth, Khorrami, Farshad, and Karri, Ramesh
- Subjects
Computer Science - Cryptography and Security ,Electrical Engineering and Systems Science - Systems and Control - Abstract
As malware such as ransomware becomes sophisticated, the ability to find and neutralize it requires more robust and tamper-resistant solutions. Current methods rely on data from compromised hosts, lack hardware isolation, and cannot detect emerging threats. To address these limitations, we introduce SHIELD - a detection architecture leveraging FPGA-based open-source SATA and Network Block Device (NBD) technology to provide off-host, tamper-proof measurements for continuous observation of disk activity for software executing on a target device. SHIELD provides three distinct contributions: It (1) develops a framework to obtain and analyze multi-level hardware metrics at NBD, FPGA, and SATA storage levels, and shows their ability to differentiate between harmless and malicious software; (2) Broadens the functionality of an open-source FPGA-driven SATA Host Bus Adapter (HBA) to offer complete data storage capabilities through NBD without relying on the host system; (3) Provides a foundation for using the methodology and metrics in automated machine learning-assisted detection and ASIC integration for advanced mitigation capabilities in data storage devices. SHIELD analyzes 10 benign programs and 10 modern ransomware families to illustrate its capacity for real-time monitoring and use in distinguishing between ransomware and benign software. Experimental evidence shows SHIELD's robust host-independent and hardware-assisted metrics are a basis for detection, allowing to observe program execution and detect malicious activities at the storage level., Comment: 7 pages, 4 figures
- Published
- 2025
22. Spin frustration and unconventional spin twisting state in van der Waals ferromagnet/antiferromagnet heterostructures
- Author
-
Wang, Tianye, Li, Qian, Yang, Mengmeng, Sun, Yu, N'Diaye, Alpha T., Klewe, Christoph, Scholl, Andreas, Chen, Xianzhe, Huang, Xiaoxi, Zhang, Hongrui, Yang, Santai, Zhang, Xixiang, Hwang, Chanyong, Shafer, Padraic C., Crommie, Michael F., Ramesh, Ramamoorthy, and Qiu, Zi Q.
- Subjects
Condensed Matter - Materials Science - Abstract
Atomically flat surfaces of van der Waals (vdW) materials pave an avenue for addressing a long-standing fundamental issue of how a perfectly compensated antiferromagnet (AFM) surface frustrates a ferromagnetic (FM) overlayer in FM/AFM heterostructures. By revealing the AFM and FM spin structures separately in vdW Fe5GeTe2/NiPS3 heterostructures, we find that C-type in-plane AFM NiPS3 develops three equivalent AFM domains which are robust against external magnetic field and magnetic coupling with Fe5GeTe2. Consequently, spin frustration at the Fe5GeTe2/NiPS3 interface was shown to develop a perpendicular Fe5GeTe2 magnetization in the interfacial region that switches separately from the bulk of the Fe5GeTe2 magnetizations. In particular, we discover an unconventional spin twisting state that the Fe5GeTe2 spins twist from perpendicular direction near the interface to in-plane direction away from the interface in Fe5GeTe2/NiPS3. Our finding of the twisting spin texture is a unique property of spin frustration in van der Waals magnetic heterostructures., Comment: 28 pages, 8 figures
- Published
- 2025
23. What if Eye...? Computationally Recreating Vision Evolution
- Author
-
Tiwary, Kushagra, Young, Aaron, Tasneem, Zaid, Klinghoffer, Tzofi, Dave, Akshat, Poggio, Tomaso, Nilsson, Dan-Eric, Cheung, Brian, and Raskar, Ramesh
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Neural and Evolutionary Computing ,Quantitative Biology - Neurons and Cognition - Abstract
Vision systems in nature show remarkable diversity, from simple light-sensitive patches to complex camera eyes with lenses. While natural selection has produced these eyes through countless mutations over millions of years, they represent just one set of realized evolutionary paths. Testing hypotheses about how environmental pressures shaped eye evolution remains challenging since we cannot experimentally isolate individual factors. Computational evolution offers a way to systematically explore alternative trajectories. Here we show how environmental demands drive three fundamental aspects of visual evolution through an artificial evolution framework that co-evolves both physical eye structure and neural processing in embodied agents. First, we demonstrate computational evidence that task specific selection drives bifurcation in eye evolution - orientation tasks like navigation in a maze leads to distributed compound-type eyes while an object discrimination task leads to the emergence of high-acuity camera-type eyes. Second, we reveal how optical innovations like lenses naturally emerge to resolve fundamental tradeoffs between light collection and spatial precision. Third, we uncover systematic scaling laws between visual acuity and neural processing, showing how task complexity drives coordinated evolution of sensory and computational capabilities. Our work introduces a novel paradigm that illuminates evolutionary principles shaping vision by creating targeted single-player games where embodied agents must simultaneously evolve visual systems and learn complex behaviors. Through our unified genetic encoding framework, these embodied agents serve as next-generation hypothesis testing machines while providing a foundation for designing manufacturable bio-inspired vision systems. Website: http://eyes.mit.edu/, Comment: Website: http://eyes.mit.edu/
- Published
- 2025
24. Limb-Brightened Jet in M87 from Anisotropic Nonthermal Electrons
- Author
-
Tsunetoe, Yuh, Pesce, Dominic W., Narayan, Ramesh, Chael, Andrew, Gelles, Zachary, Gammie, Charles F., Quataert, Eliot, and Palumbo, Daniel C. M.
- Subjects
Astrophysics - High Energy Astrophysical Phenomena ,Astrophysics - Astrophysics of Galaxies - Abstract
Very long baseline interferometry observations reveal that relativistic jets like the one in M87 have a limb-brightened, double-edged structure. Analytic and numerical models struggle to reproduce this limb-brightening. We propose a model in which we invoke anisotropy in the distribution function of synchrotron-emitting nonthermal electrons such that electron velocities are preferentially directed parallel to magnetic field lines, as suggested by recent particle-in-cell simulations of electron acceleration and the effects of synchrotron cooling. We assume that the energy injected into nonthermal electrons is proportional to the jet Poynting flux, and we account for synchrotron cooling via a broken power-law energy distribution. We implement our emission model in both general relativistic magnetohydrodynamic (GRMHD) simulations and axisymmetric force-free electrodynamic (GRFFE) jet models and produce simulated jet images at multiple scales and frequencies using polarized general relativistic radiative transfer. We find that the synchrotron emission is concentrated parallel to the local helical magnetic field and that this feature produces limb-brightened jet images on scales ranging from tens of microarcseconds to hundreds of milliarcseconds in M87. We present theoretical predictions for horizon-scale M87 jet images at 230 and 345 GHz that can be tested with next generation instruments. Due to the scale-invariance of the GRMHD and GRFFE models, our emission prescription can be applied to other targets and serve as a foundation for a unified description of limb-brightened synchrotron images of extragalactic jets., Comment: 21 pages, 6 figures. Submitted to ApJ
- Published
- 2025
25. Reinforcement Learning Platform for Adversarial Black-box Attacks with Custom Distortion Filters
- Author
-
Sarkar, Soumyendu, Babu, Ashwin Ramesh, Mousavi, Sajad, Gundecha, Vineet, Ghorbanpour, Sahand, Naug, Avisek, Gutierrez, Ricardo Luna, and Guillen, Antonio
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security ,Computer Science - Computer Vision and Pattern Recognition - Abstract
We present a Reinforcement Learning Platform for Adversarial Black-box untargeted and targeted attacks, RLAB, that allows users to select from various distortion filters to create adversarial examples. The platform uses a Reinforcement Learning agent to add minimum distortion to input images while still causing misclassification by the target model. The agent uses a novel dual-action method to explore the input image at each step to identify sensitive regions for adding distortions while removing noises that have less impact on the target model. This dual action leads to faster and more efficient convergence of the attack. The platform can also be used to measure the robustness of image classification models against specific distortion types. Also, retraining the model with adversarial samples significantly improved robustness when evaluated on benchmark datasets. The proposed platform outperforms state-of-the-art methods in terms of the average number of queries required to cause misclassification. This advances trustworthiness with a positive social impact., Comment: Under Review for 2025 AAAI Conference on Artificial Intelligence Proceedings
- Published
- 2025
26. Communicating Activations Between Language Model Agents
- Author
-
Ramesh, Vignav and Li, Kenneth
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Communication between multiple language model (LM) agents has been shown to scale up the reasoning ability of LMs. While natural language has been the dominant medium for inter-LM communication, it is not obvious this should be the standard: not only does natural language communication incur high inference costs that scale quickly with the number of both agents and messages, but also the decoding process abstracts away too much rich information that could be otherwise accessed from the internal activations. In this work, we propose a simple technique whereby LMs communicate via activations; concretely, we pause an LM $\textit{B}$'s computation at an intermediate layer, combine its current activation with another LM $\textit{A}$'s intermediate activation via some function $\textit{f}$, then pass $\textit{f}$'s output into the next layer of $\textit{B}$ and continue the forward pass till decoding is complete. This approach scales up LMs on new tasks with zero additional parameters and data, and saves a substantial amount of compute over natural language communication. We test our method with various functional forms $\textit{f}$ on two experimental setups--multi-player coordination games and reasoning benchmarks--and find that it achieves up to $27.0\%$ improvement over natural language communication across datasets with $<$$1/4$ the compute, illustrating the superiority and robustness of activations as an alternative "language" for communication between LMs.
- Published
- 2025
27. Grain-size dependence of plastic-brittle transgranular fracture
- Author
-
Scherer, Jean-Michel, Ramesh, Mythreyi, Bourdin, Blaise, and Bhattacharya, Kaushik
- Subjects
Condensed Matter - Materials Science - Abstract
The role of grain size in determining fracture toughness in metals is incompletely understood with apparently contradictory experimental observations. We study this grain-size dependence computationally by building a model that combines the phase-field formulation of fracture mechanics with dislocation density-based crystal plasticity. We apply the model to cleavage fracture of body-centered cubic materials in plane strain conditions, and find non-monotonic grain-size dependence of plastic-brittle transgranular fracture. We find two mechanisms at play. The first is the nucleation of failure due to cross-slip in critically located grains within transgranular band of localized deformation, and this follows the classical Hall-Petch law that predicts a higher failure stress for smaller grains. The second is the resistance to the propagation of a mode I crack, where grain boundaries can potentially pin a crack, and this follows an inverse Hall-Petch law with higher toughness for larger grains. The result of the competition between the two mechanisms gives rise to non-monotonic behavior and reconciles the apparently contradictory experimental observations.
- Published
- 2025
28. Real-Time Multi-Modal Subcomponent-Level Measurements for Trustworthy System Monitoring and Malware Detection
- Author
-
Khorrami, Farshad, Karri, Ramesh, and Krishnamurthy, Prashanth
- Subjects
Computer Science - Cryptography and Security - Abstract
With increasingly sophisticated cyber-adversaries able to access a wider repertoire of mechanisms to implant malware such as ransomware, CPU/GPU keyloggers, and stealthy kernel rootkits, there is an urgent need for techniques to detect and mitigate such attacks. While state of the art relies on digital and analog side channel measurements assuming trustworthiness of measurements obtained on the main processor, such an approach has limitations since processor-based side channel measurements are potentially untrustworthy. Sophisticated adversaries (especially in late stage cyber attacks when they have breached the computer and network security systems such as firewalls and antivirus and penetrated the computer's OS) can compromise user-space and kernel-space measurements. To address this key limitation of state of the art, we propose a "subcomponent-level" approach to collect side channel measurements so as to enable robust anomaly detection in a modern computer even when the main processor is compromised. Our proposed approach leverages the fact that modern computers are complex systems with multiple interacting subcomponents and measurements from subcomponents can be used to detect anomalies even when the main processor is no longer trustworthy. We develop mechanisms to obtain time series measurements of activity of several subcomponents and methodologies to process and fuse these measurements for anomaly detection. The subcomponents include network interface controller, GPU, CPU Hardware Performance Counters, CPU power, and keyboard. Our main hypothesis is that subcomponent measurements can enable detection of security threats without requiring a trustworthy main processor. By enabling real-time measurements from multiple subcomponents, the goal is to provide a deeper visibility into system operation, thereby yielding a powerful tool to track system operation and detect anomalies., Comment: 12 pages, 29 figures
- Published
- 2025
29. On finite groups whose order supergraphs satisfy a connectivity condition
- Author
-
Panda, Ramesh Prasad and Ray, Papi
- Subjects
Mathematics - Combinatorics ,Cyclically separable graph, vertex connectivity, cyclic vertex connectivity, finite group, order supergraph - Abstract
Let $\Gamma$ be an undirected and simple graph. A set $ S $ of vertices in $\Gamma$ is called a {cyclic vertex cutset} of $\Gamma$ if $\Gamma - S$ is disconnected and has at least two components containing cycles. If $\Gamma$ has a cyclic vertex cutset, then it is said to be {cyclically separable}. The {cyclic vertex connectivity} of $\Gamma$ is the minimum of cardinalities of the cyclic vertex cutsets of $\Gamma$. For any finite group $G$, the order supergraph $\mathcal{S}(G)$ is the simple and undirected graph whose vertices are elements of $G$, and two vertices are adjacent if the order of one divides that of the other. In this paper, we characterize the finite nilpotent groups and various non-nilpotent groups whose order super graphs are cyclically separable.
- Published
- 2025
30. Electric field reconstruction with three polarizations for the radio detection of ultra-high energy particles
- Author
-
Zhang, Kewen, Huege, Tim, Koirala, Ramesh, Ma, Pengxiong, Tueros, Matías, Xu, Xin, Zhang, Chao, Zhang, Pengfei, and Zhang, Yi
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics ,High Energy Physics - Experiment - Abstract
The amplitude, polarization, frequency spectrum and energy fluence carried by the electric field at a given measurement position are the key parameters for retrieving information from radio signals generated by extensive air showers. Accurate reconstruction of the electric field from the signals recorded by the antennas is therefore essential for the radio detection technique. Conventional reconstruction methods primarily focus on electric field reconstruction for antennas with two horizontal polarizations. In this paper, we introduce an analytical least-squares ($\chi^2$) reconstruction method that operates with both two and three polarizations, providing the reconstructed electric field at each antenna. This solution has been verified for simple and realistic antenna responses, with a particular focus on inclined air showers. Our method achieves an accuracy better than 4\% in determining the Hilbert peak amplitude of the electric field and better than 6\% accuracy on the estimation of the energy fluence, with minimal bias. Additionally, this was found to be reliable for almost any arrival directions, and the direction dependence has been investigated. This work also demonstrates that incorporating vertically polarized antennas enhances the precision of reconstruction, leading to a more accurate and reliable electric field estimation for inclined air showers. Consequently, the method enhances our ability to extract information about cosmic rays from the detected signals in current and future experiments.
- Published
- 2025
31. Data-Constrained Magnetohydrodynamics Simulation of a Confined X-class Flare in NOAA Active Region 11166
- Author
-
Kumar, Sanjay, Kumar, Pawan, Sadashiv, Nayak, Sushree S., Agarwal, Satyam, Prasad, Avijeet, Bhattacharyya, Ramit, and Chandra, Ramesh
- Subjects
Astrophysics - Solar and Stellar Astrophysics - Abstract
In this paper, we present a magnetohydrodynamics simulation of NOAA active region 11166 to understand the origin of a confined X-class flare that peaked at 23:23 UT on 2011 March 9. The simulation is initiated with a magnetic field extrapolated from the corresponding photospheric magnetogram using a non-force-free-field extrapolation technique. Importantly, the initial magnetic configuration identifies three-dimensional (3D) magnetic nulls and quasi-separatrix layers (QSLs), which nearly agree with the bright structures appeared in multi-wavelength observations. The Lorentz force associated with the extrapolated field self-consistently generates the dynamics that leads to the magnetic reconnections at the 3D nulls and the QSLs. These reconnections are found to contribute to the pre-flare activities and, ultimately, lead to the development of the flare ribbons. Notably, the anchored spine of the 3D null and the complete absence of flux rope in the flaring region are congruent with the confined nature of the flare. Furthermore, the simulation also suggests the role of reconnections at the 3D null with an open spine in the onset of a jet away from the flaring site., Comment: 22 pages, Accepted for Publication in Solar Physics
- Published
- 2025
32. A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things
- Author
-
Prajapati, Anil K, Pilli, Emmanuel S, Battula, Ramesh B, Varadharajan, Vijay, Verma, Abhishek, and Joshi, R C
- Subjects
Computer Science - Cryptography and Security - Abstract
The Internet of Things (IoT) is a network of digital devices like sensors, processors, embedded and communication devices that can connect to and exchange data with other devices and systems over the internet. IoT devices have limitations on power, memory, and computational resources. Researchers have developed the IPv6 Over Low-power Wireless Personal Area Network (6LoWPAN) protocols to provide wireless connectivity among these devices while overcoming the constraints on resources. 6LoWPAN has been approved subsequently by the Internet Engineering Task Force (IETF). The IETF Routing Over Low-power and Lossy Networks (ROLL) standardized the Routing Protocol for LLNs known as RPL (IETF RFC 6550), which is part of the 6LoWPAN stack. However, IoT devices are vulnerable to various attacks on RPL-based routing. This survey provides an in depth study of existing RPL-based attacks and defense published from year 2011 to 2024 from highly reputed journals and conferences. By thematic analysis of existing routing attacks on RPL, we developed a novel attack taxonomy which focuses on the nature of routing attacks and classifies them into 12 major categories. Subsequently, the impact of each attack on the network is analyzed and discussed real life scenarios of these attacks. Another contribution of this survey proposed a novel taxonomy for classification of defense mechanisms into 8 major categories against routing attacks based on type of defense strategy. The detailed analysis of each defense mechanism with real life applicability is explained. Furthermore, evaluation tools such as testbeds and simulators for RPL-based attack and defense are discussed and critically analyzed in terms of real world applicability. Finally, open research challenges are presented on the basis of research gaps of existing literature along with research directions for practitioners and researchers.
- Published
- 2025
- Full Text
- View/download PDF
33. Efficient Auto-Labeling of Large-Scale Poultry Datasets (ALPD) Using Semi-Supervised Models, Active Learning, and Prompt-then-Detect Approach
- Author
-
Bist, Ramesh Bahadur, Chai, Lilong, Weimer, Shawna, Atungulua, Hannah, Pennicott, Chantel, Yang, Xiao, Subedi, Sachin, Pallerla, Chaitanya, Tian, Yang, and Wang, Dongyi
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
The rapid growth of AI in poultry farming has highlighted the challenge of efficiently labeling large, diverse datasets. Manual annotation is time-consuming, making it impractical for modern systems that continuously generate data. This study explores semi-supervised auto-labeling methods, integrating active learning, and prompt-then-detect paradigm to develop an efficient framework for auto-labeling of large poultry datasets aimed at advancing AI-driven behavior and health monitoring. Viideo data were collected from broilers and laying hens housed at the University of Arkansas and the University of Georgia. The collected videos were converted into images, pre-processed, augmented, and labeled. Various machine learning models, including zero-shot models like Grounding DINO, YOLO-World, and CLIP, and supervised models like YOLO and Faster-RCNN, were utilized for broilers, hens, and behavior detection. The results showed that YOLOv8s-World and YOLOv9s performed better when compared performance metrics for broiler and hen detection under supervised learning, while among the semi-supervised model, YOLOv8s-ALPD achieved the highest precision (96.1%) and recall (99.0%) with an RMSE of 1.9. The hybrid YOLO-World model, incorporating the optimal YOLOv8s backbone, demonstrated the highest overall performance. It achieved a precision of 99.2%, recall of 99.4%, and an F1 score of 98.7% for breed detection, alongside a precision of 88.4%, recall of 83.1%, and an F1 score of 84.5% for individual behavior detection. Additionally, semi-supervised models showed significant improvements in behavior detection, achieving up to 31% improvement in precision and 16% in F1-score. The semi-supervised models with minimal active learning reduced annotation time by over 80% compared to full manual labeling. Moreover, integrating zero-shot models enhanced detection and behavior identification.
- Published
- 2025
34. Word-representability of co-bipartite graph
- Author
-
Das, Biswajit and Hariharasubramanian, Ramesh
- Subjects
Mathematics - Combinatorics - Abstract
A graph $G = (V, E)$ is word-representable, if there exists a word $w$ over the alphabet $V$ such that for letters $\{x,y\}\in V$, $x$ and $y$ alternate in $w$ if and only if $xy \in E$. A graph is co-bipartite if its complement is a bipartite graph. Therefore, the vertex set of a co-bipartite graph can be partitioned into two disjoint cliques. The concept of word-representability for co-bipartite graphs has not yet been fully studied. In the book Words and Graphs written by Sergey Kitaev and Vadim Lozin, examples of co-bipartite graphs that are not word-representable are provided. The authors have stated that it remains an open problem to characterize word-representable co-bipartite graphs. It is known that taking the complement of word-representable graphs does not preserve their word-representability. In this paper, we first identify certain classes of bipartite graphs for which word-representation is preserved after the complement operation. We found that the complement of the path graphs, even cycle graphs and generalized crown graphs are also word-representable. Next, we aim to find word-representable co-bipartite graphs in which the size of one clique partition is fixed while the other one can vary. We studied the word-representability of co-bipartite graphs where the sizes of one clique partition are $2$ and $3$. We found that any co-bipartite graphs where the size of the one clique partition is $2$ are word-representable. Also, when the size of the one clique partition is $3$, we found certain co-bipartite graphs are word-representable. Additionally, for word-representable graphs, it has been established that a graph is word-representable if and only if it can be oriented in a specific manner, known as semi-transitive orientation. We provide the necessary and sufficient conditions for a co-bipartite graph to have a semi-transitive orientation., Comment: arXiv admin note: text overlap with arXiv:1709.09725 by other authors
- Published
- 2025
35. The putative center in NGC 1052
- Author
-
Baczko, Anne-Kathrin, Kadler, Matthias, Ros, Eduardo, Fromm, Christian M., Wielgus, Maciek, Perucho, Manel, Krichbaum, Thomas P., Baloković, Mislav, Blackburn, Lindy, Chan, Chi-kwan, Issaoun, Sara, Janssen, Michael, Ricci, Luca, Akiyama, Kazunori, Albentosa-Ruíz, Ezequiel, Alberdi, Antxon, Alef, Walter, Algaba, Juan Carlos, Anantua, Richard, Asada, Keiichi, Azulay, Rebecca, Bach, Uwe, Ball, David, Bandyopadhyay, Bidisha, Barrett, John, Bauböck, Michi, Benson, Bradford A., Bintley, Dan, Blundell, Raymond, Bouman, Katherine L., Bower, Geoffrey C., Boyce, Hope, Bremer, Michael, Brinkerink, Christiaan D., Brissenden, Roger, Britzen, Silke, Broderick, Avery E., Broguiere, Dominique, Bronzwaer, Thomas, Bustamante, Sandra, Byun, Do-Young, Carlstrom, John E., Ceccobello, Chiara, Chael, Andrew, Chang, Dominic O., Chatterjee, Koushik, Chatterjee, Shami, Chen, Ming-Tang, Chen, Yongjun, Cheng, Xiaopeng, Cho, Ilje, Christian, Pierre, Conroy, Nicholas S., Conway, John E., Cordes, James M., Crawford, Thomas M., Crew, Geoffrey B., Cruz-Osorio, Alejandro, Cui, Yuzhu, Dahale, Rohan, Davelaar, Jordy, De Laurentis, Mariafelicia, Deane, Roger, Dempsey, Jessica, Desvignes, Gregory, Dexter, Jason, Dhruv, Vedant, Dihingia, Indu K., Doeleman, Sheperd S., Dougall, Sean Taylor, Dzib, Sergio A., Eatough, Ralph P., Emami, Razieh, Falcke, Heino, Farah, Joseph, Fish, Vincent L., Fomalont, Edward, Ford, H. Alyson, Foschi, Marianna, Fraga-Encinas, Raquel, Freeman, William T., Friberg, Per, Fuentes, Antonio, Galison, Peter, Gammie, Charles F., García, Roberto, Gentaz, Olivier, Georgiev, Boris, Goddi, Ciriaco, Gold, Roman, Gómez-Ruiz, Arturo I., Gómez, José L., Gu, Minfeng, Gurwell, Mark, Hada, Kazuhiro, Haggard, Daryl, Haworth, Kari, Hecht, Michael H., Hesper, Ronald, Heumann, Dirk, Ho, Luis C., Ho, Paul, Honma, Mareki, Huang, Chih-Wei L., Huang, Lei, Hughes, David H., Impellizzeri, C. M. Violette, Inoue, Makoto, James, David J., Jannuzi, Buell T., Jeter, Britton, Jiang, Wu, Jiménez-Rosales, Alejandra, Johnson, Michael D., Jorstad, Svetlana, Joshi, Abhishek V., Jung, Taehyun, Karami, Mansour, Karuppusamy, Ramesh, Kawashima, Tomohisa, Keating, Garrett K., Kettenis, Mark, Kim, Dong-Jin, Kim, Jae-Young, Kim, Jongsoo, Kim, Junhan, Kino, Motoki, Koay, Jun Yi, Kocherlakota, Prashant, Kofuji, Yutaro, Koyama, Shoko, Kramer, Carsten, Kramer, Joana A., Kramer, Michael, Kuo, Cheng-Yu, La Bella, Noemi, Lauer, Tod R., Lee, Daeyoung, Lee, Sang-Sung, Leung, Po Kin, Levis, Aviad, Li, Zhiyuan, Lico, Rocco, Lindahl, Greg, Lindqvist, Michael, Lisakov, Mikhail, Liu, Jun, Liu, Kuo, Liuzzo, Elisabetta, Lo, Wen-Ping, Lobanov, Andrei P., Loinard, Laurent, Lonsdale, Colin J., Lowitz, Amy E., Lu, Ru-Sen, MacDonald, Nicholas R., Mao, Jirong, Marchili, Nicola, Markoff, Sera, Marrone, Daniel P., Marscher, Alan P., Martí-Vidal, Iván, Matsushita, Satoki, Matthews, Lynn D., Medeiros, Lia, Menten, Karl M., Michalik, Daniel, Mizuno, Izumi, Mizuno, Yosuke, Moran, James M., Moriyama, Kotaro, Moscibrodzka, Monika, Mulaudzi, Wanga, Müller, Cornelia, Müller, Hendrik, Mus, Alejandro, Musoke, Gibwa, Myserlis, Ioannis, Nadolski, Andrew, Nagai, Hiroshi, Nagar, Neil M., Nair, Dhanya G., Nakamura, Masanori, Narayanan, Gopal, Natarajan, Iniyan, Nathanail, Antonios, Fuentes, Santiago Navarro, Neilsen, Joey, Neri, Roberto, Ni, Chunchong, Noutsos, Aristeidis, Nowak, Michael A., Oh, Junghwan, Okino, Hiroki, Sánchez, Héctor Raúl Olivares, Ortiz-León, Gisela N., Oyama, Tomoaki, Özel, Feryal, Palumbo, Daniel C. M., Paraschos, Georgios Filippos, Park, Jongho, Parsons, Harriet, Patel, Nimesh, Pen, Ue-Li, Pesce, Dominic W., Piétu, Vincent, Plambeck, Richard, PopStefanija, Aleksandar, Porth, Oliver, Pötzl, Felix M., Prather, Ben, Preciado-López, Jorge A., Principe, Giacomo, Psaltis, Dimitrios, Pu, Hung-Yi, Ramakrishnan, Venkatessh, Rao, Ramprasad, Rawlings, Mark G., Raymond, Alexander W., Ricarte, Angelo, Ripperda, Bart, Roelofs, Freek, Rogers, Alan, Romero-Cañizales, Cristina, Roshanineshat, Arash, Rottmann, Helge, Roy, Alan L., Ruiz, Ignacio, Ruszczyk, Chet, Rygl, Kazi L. J., Sánchez, Salvador, Sánchez-Argüelles, David, Sánchez-Portal, Miguel, Sasada, Mahito, Satapathy, Kaushik, Savolainen, Tuomas, Schloerb, F. Peter, Schonfeld, Jonathan, Schuster, Karl-Friedrich, Shao, Lijing, Shen, Zhiqiang, Small, Des, Sohn, Bong Won, SooHoo, Jason, Salas, León David Sosapanta, Souccar, Kamal, Stanway, Joshua S., Sun, He, Tazaki, Fumie, Tetarenko, Alexandra J., Tiede, Paul, Tilanus, Remo P. J., Titus, Michael, Torne, Pablo, Toscano, Teresa, Traianou, Efthalia, Trent, Tyler, Trippe, Sascha, Turk, Matthew, van Bemmel, Ilse, van Langevelde, Huib Jan, van Rossum, Daniel R., Vos, Jesse, Wagner, Jan, Ward-Thompson, Derek, Wardle, John, Washington, Jasmin E., Weintroub, Jonathan, Wharton, Robert, Wiik, Kaj, Witzel, Gunther, Wondrak, Michael F., Wong, George N., Wu, Qingwen, Yadlapalli, Nitika, Yamaguchi, Paul, Yfantis, Aristomenis, Yoon, Doosoo, Young, André, Young, Ken, Younsi, Ziri, Yu, Wei, Yuan, Feng, Yuan, Ye-Fei, Zensus, J. Anton, Zhang, Shuo, and Zhao, Guang-Yao
- Subjects
Astrophysics - High Energy Astrophysical Phenomena ,Astrophysics - Astrophysics of Galaxies - Abstract
Many active galaxies harbor powerful relativistic jets, however, the detailed mechanisms of their formation and acceleration remain poorly understood. To investigate the area of jet acceleration and collimation with the highest available angular resolution, we study the innermost region of the bipolar jet in the nearby low-ionization nuclear emission-line region (LINER) galaxy NGC 1052. We combined observations of NGC 1052 taken with VLBA, GMVA, and EHT over one week in the spring of 2017. For the first time, NGC 1052 was detected with the EHT, providing a size of the central region in-between both jet bases of 250 RS (Schwarzschild radii) perpendicular to the jet axes. This size estimate supports previous studies of the jets expansion profile which suggest two breaks of the profile at around 300 RS and 10000 RS distances to the core. Furthermore, we estimated the magnetic field to be 1.25 Gauss at a distance of 22 {\mu}as from the central engine by fitting a synchrotron-self absorption spectrum to the innermost emission feature, which shows a spectral turn-over at about 130 GHz. Assuming a purely poloidal magnetic field, this implies an upper limit on the magnetic field strength at the event horizon of 26000 Gauss, which is consistent with previous measurements. The complex, low-brightness, double-sided jet structure in NGC 1052 makes it a challenge to detect the source at millimeter (mm) wavelengths. However, our first EHT observations have demonstrated that detection is possible up to at least 230 GHz. This study offers a glimpse through the dense surrounding torus and into the innermost central region, where the jets are formed. This has enabled us to finally resolve this region and provide improved constraints on its expansion and magnetic field strength., Comment: 22 pages, 10 figures, published in A&A
- Published
- 2025
- Full Text
- View/download PDF
36. Improvements to monoscopic analysis for imaging atmospheric Cherenkov telescopes: Application to H.E.S.S
- Author
-
Unbehaun, Tim, Lang, Rodrigo Guedes, Baruah, Anita Deka, Ramesh, Prajath Bedur, Celic, Jelena, Mohrmann, Lars, Steinmassl, Simon, Olivera-Nieto, Laura, Hinton, Jim, and Funk, Stefan
- Subjects
Astrophysics - Instrumentation and Methods for Astrophysics ,Astrophysics - High Energy Astrophysical Phenomena - Abstract
Imaging atmospheric Cherenkov telescopes (IACTs) detect gamma rays by measuring the Cherenkov light emitted by secondary particles in the air shower when the gamma rays hit the atmosphere. At low energies, the limited amount of Cherenkov light produced typically implies that the event is registered by one IACT only. Such events are called monoscopic events, and their analysis is particularly difficult. Challenges include the reconstruction of the event's arrival direction, energy, and the rejection of background events. Here, we present a set of improvements, including a machine-learning algorithm to determine the correct orientation of the image, an intensity-dependent selection cut that ensures optimal performance, and a collection of new image parameters. To quantify these improvements, we use the central telescope of the H.E.S.S. IACT array. Knowing the correct image orientation, which corresponds to the arrival direction of the photon in the camera frame, is especially important for the angular reconstruction, which could be improved in resolution by 57% at 100 GeV. The event selection cut, which now depends on the total measured intensity of the events, leads to a reduction of the low-energy threshold for source analyses by ~50%. The new image parameters characterize the intensity and time distribution within the recorded images and complement the traditionally used Hillas parameters in the machine learning algorithms. We evaluate their importance to the algorithms in a systematic approach and carefully evaluate associated systematic uncertainties. We find that including subsets of the new variables in machine-learning algorithms improves the reconstruction and background rejection, resulting in a sensitivity improved by 41% at the low-energy threshold.
- Published
- 2025
- Full Text
- View/download PDF
37. Anomalous and Planar Hall Effects in Cobalt-Holmium Thin Films Near Magnetic Sublattice Compensation
- Author
-
Budhani, Ramesh C, Nepal, Rajeev, Sharma, Vinay, and Sadowski, Jerzy
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics - Abstract
Metallic amorphous ferrimagnets derived from alloying 3d transition metals with 4f electron rare earths host fascinating effects of compensation between the 3d and 4f magnetic sublattices. Here, a detailed study of anisotropic magnetoresistance (AMR), planar Hall effect (PHE) and anomalous Hall effect (AHE) are reported on a series of CoHo thin films over a wide field temperature phase space. Close to magnetic compensation temperature, the AHE loops show a double sign reversal and signatures of spin flop transition at higher fields. The AMR and PHE also display strong deviations from the classical angular dependence seen in soft ferromagnets like permalloy as the angle between in-plane current and magnetic field is scanned from 0 to 360 degrees. It is argued that the non zero orbital angular momentum of Ho ions in the lattice and stabilization of bubble domains below magnetic saturation may be responsible for such features. Direct imaging of magnetic textures with X ray photoelectron microscopy shows formation of stripe domain patterns in the regime of sublattice compensation. Such stripes are likely to transform into magnetic bubbles before full saturation is reached in a large magnetic field.
- Published
- 2025
38. An Error Analysis of Second Order Elliptic Optimal Control Problem via Hybrid Higher Order Methods
- Author
-
Mallik, Gouranga and Sau, Ramesh Chandra
- Subjects
Mathematics - Numerical Analysis ,Mathematics - Optimization and Control - Abstract
This paper presents the design and analysis of a Hybrid High-Order (HHO) approximation for a distributed optimal control problem governed by the Poisson equation. We propose three distinct schemes to address unconstrained control problems and two schemes for constrained control problems. For the unconstrained control problem, while standard finite elements achieve a convergence rate of \( k+1 \) (with \( k \) representing the polynomial degree), our approach enhances this rate to \( k+2 \) by selecting the control from a carefully constructed reconstruction space. For the box-constrained problem, we demonstrate that using lowest-order elements (\( \mathbb{P}_0 \)) yields linear convergence, in contrast to finite element methods (FEM) that require linear elements to achieve comparable results. Furthermore, we derive a cubic convergence rate for control in the variational discretization scheme. Numerical experiments are provided to validate the theoretical findings., Comment: 34 pages
- Published
- 2025
39. Static Segmentation by Tracking: A Frustratingly Label-Efficient Approach to Fine-Grained Segmentation
- Author
-
Feng, Zhenyang, Wang, Zihe, Bueno, Saul Ibaven, Frelek, Tomasz, Ramesh, Advikaa, Bai, Jingyan, Wang, Lemeng, Huang, Zanming, Gu, Jianyang, Yoo, Jinsu, Pan, Tai-Yu, Chowdhury, Arpita, Ramirez, Michelle, Campolongo, Elizabeth G., Thompson, Matthew J., Lawrence, Christopher G., Record, Sydne, Rosser, Neil, Karpatne, Anuj, Rubenstein, Daniel, Lapp, Hilmar, Stewart, Charles V., Berger-Wolf, Tanya, Su, Yu, and Chao, Wei-Lun
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
We study image segmentation in the biological domain, particularly trait and part segmentation from specimen images (e.g., butterfly wing stripes or beetle body parts). This is a crucial, fine-grained task that aids in understanding the biology of organisms. The conventional approach involves hand-labeling masks, often for hundreds of images per species, and training a segmentation model to generalize these labels to other images, which can be exceedingly laborious. We present a label-efficient method named Static Segmentation by Tracking (SST). SST is built upon the insight: while specimens of the same species have inherent variations, the traits and parts we aim to segment show up consistently. This motivates us to concatenate specimen images into a ``pseudo-video'' and reframe trait and part segmentation as a tracking problem. Concretely, SST generates masks for unlabeled images by propagating annotated or predicted masks from the ``pseudo-preceding'' images. Powered by Segment Anything Model 2 (SAM~2) initially developed for video segmentation, we show that SST can achieve high-quality trait and part segmentation with merely one labeled image per species -- a breakthrough for analyzing specimen images. We further develop a cycle-consistent loss to fine-tune the model, again using one labeled image. Additionally, we highlight the broader potential of SST, including one-shot instance segmentation on images taken in the wild and trait-based image retrieval.
- Published
- 2025
40. On the Reliability of Biometric Datasets: How Much Test Data Ensures Reliability?
- Author
-
Fallahi, Matin, Ramesh, Ragini, Ramasamy, Pankaja Priya, Cabarcos, Patricia Arias, Strufe, Thorsten, and Terhörst, Philipp
- Subjects
Computer Science - Cryptography and Security - Abstract
Biometric authentication is increasingly popular for its convenience and accuracy. However, while recent advancements focus on reducing errors and expanding modalities, the reliability of reported performance metrics often remains overlooked. Understanding reliability is critical, as it communicates how accurately reported error rates represent a system's actual performance, considering the uncertainty in error-rate estimates from test data. Currently, there is no widely accepted standard for reporting these uncertainties and indeed biometric studies rarely provide reliability estimates, limiting comparability and interpretation. To address this gap, we introduce BioQuake--a measure to estimate uncertainty in biometric verification systems--and empirically validate it on four systems and three datasets. Based on BioQuake, we provide simple guidelines for estimating performance uncertainty and facilitating reliable reporting. Additionally, we apply BioQuake to analyze biometric recognition performance on 62 biometric datasets used in research across eight modalities: face, fingerprint, gait, iris, keystroke, eye movement, Electroencephalogram (EEG), and Electrocardiogram (ECG). Our analysis shows that reported state-of-the-art performance often deviates significantly from actual error rates, potentially leading to inaccurate conclusions. To support researchers and foster the development of more reliable biometric systems and datasets, we release BioQuake as an easy-to-use web tool for reliability calculations.
- Published
- 2025
41. A multi-frequency study of sub-parsec jets with the Event Horizon Telescope
- Author
-
Röder, Jan, Wielgus, Maciek, Lobanov, Andrei P., Krichbaum, Thomas P., Nair, Dhanya G., Lee, Sang-Sung, Ros, Eduardo, Fish, Vincent L., Blackburn, Lindy, Chan, Chi-kwan, Issaoun, Sara, Janssen, Michael, Johnson, Michael D., Doeleman, Sheperd S., Bower, Geoffrey C., Crew, Geoffrey B., Tilanus, Remo P. J., Savolainen, Tuomas, Impellizzeri, C. M. Violette, Alberdi, Antxon, Baczko, Anne-Kathrin, Gómez, José L., Lu, Ru-Sen, Paraschos, Georgios F., Traianou, Efthalia, Goddi, Ciriaco, Kim, Daewon, Lisakov, Mikhail, Kovalev, Yuri Y., Voitsik, Petr A., Sokolovsky, Kirill V., Akiyama, Kazunori, Albentosa-Ruíz, Ezequiel, Alef, Walter, Algaba, Juan Carlos, Anantua, Richard, Asada, Keiichi, Azulay, Rebecca, Bach, Uwe, Ball, David, Baloković, Mislav, Bandyopadhyay, Bidisha, Barrett, John, Bauböck, Michi, Benson, Bradford A., Bintley, Dan, Blundell, Raymond, Bouman, Katherine L., Bremer, Michael, Brinkerink, Christiaan D., Brissenden, Roger, Britzen, Silke, Broderick, Avery E., Broguiere, Dominique, Bronzwaer, Thomas, Bustamante, Sandra, Byun, Do-Young, Carlstrom, John E., Ceccobello, Chiara, Chael, Andrew, Chang, Dominic O., Chatterjee, Koushik, Chatterjee, Shami, Chen, Ming-Tang, Chen, Yongjun, Cheng, Xiaopeng, Cho, Ilje, Christian, Pierre, Conroy, Nicholas S., Conway, John E., Cordes, James M., Crawford, Thomas M., Cruz-Osorio, Alejandro, Cui, Yuzhu, Curd, Brandon, Dahale, Rohan, Davelaar, Jordy, De Laurentis, Mariafelicia, Deane, Roger, Dempsey, Jessica, Desvignes, Gregory, Dexter, Jason, Dhruv, Vedant, Dihingia, Indu K., Dougall, Sean Taylor, Dzib, Sergio A., Eatough, Ralph P., Emami, Razieh, Falcke, Heino, Farah, Joseph, Fomalont, Edward, Ford, H. Alyson, Foschi, Marianna, Fraga-Encinas, Raquel, Freeman, William T., Friberg, Per, Fromm, Christian M., Fuentes, Antonio, Galison, Peter, Gammie, Charles F., García, Roberto, Gentaz, Olivier, Georgiev, Boris, Gold, Roman, Gómez-Ruiz, Arturo I., Gu, Minfeng, Gurwell, Mark, Hada, Kazuhiro, Haggard, Daryl, Haworth, Kari, Hecht, Michael H., Hesper, Ronald, Heumann, Dirk, Ho, Luis C., Ho, Paul, Honma, Mareki, Huang, Chih-Wei L., Huang, Lei, Hughes, David H., Ikeda, Shiro, Inoue, Makoto, James, David J., Jannuzi, Buell T., Jeter, Britton, Jiang, Wu, Jiménez-Rosales, Alejandra, Jorstad, Svetlana, Joshi, Abhishek V., Jung, Taehyun, Karami, Mansour, Karuppusamy, Ramesh, Kawashima, Tomohisa, Keating, Garrett K., Kettenis, Mark, Kim, Dong-Jin, Kim, Jae-Young, Kim, Jongsoo, Kim, Junhan, Kino, Motoki, Koay, Jun Yi, Kocherlakota, Prashant, Kofuji, Yutaro, Koyama, Shoko, Kramer, Carsten, Kramer, Joana A., Kramer, Michael, Kuo, Cheng-Yu, La Bella, Noemi, Lauer, Tod R., Lee, Daeyoung, Leung, Po Kin, Levis, Aviad, Li, Zhiyuan, Lico, Rocco, Lindahl, Greg, Lindqvist, Michael, Liu, Jun, Liu, Kuo, Liuzzo, Elisabetta, Lo, Wen-Ping, Loinard, Laurent, Lonsdale, Colin J., Lowitz, Amy E., MacDonald, Nicholas R., Mao, Jirong, Marchili, Nicola, Markoff, Sera, Marrone, Daniel P., Marscher, Alan P., Martí-Vidal, Iván, Matsushita, Satoki, Matthews, Lynn D., Medeiros, Lia, Menten, Karl M., Michalik, Daniel, Mizuno, Izumi, Mizuno, Yosuke, Moran, James M., Moriyama, Kotaro, Moscibrodzka, Monika, Mulaudzi, Wanga, Müller, Cornelia, Müller, Hendrik, Mus, Alejandro, Musoke, Gibwa, Myserlis, Ioannis, Nadolski, Andrew, Nagai, Hiroshi, Nagar, Neil M., Nakamura, Masanori, Narayanan, Gopal, Natarajan, Iniyan, Nathanail, Antonios, Fuentes, Santiago Navarro, Neilsen, Joey, Neri, Roberto, Ni, Chunchong, Noutsos, Aristeidis, Nowak, Michael A., Oh, Junghwan, Okino, Hiroki, Sánchez, Héctor R. Olivares, Ortiz-León, Gisela N., Oyama, Tomoaki, özel, Feryal, Palumbo, Daniel C. M., Park, Jongho, Parsons, Harriet, Patel, Nimesh, Pen, Ue-Li, Pesce, Dominic W., Piétu, Vincent, Plambeck, Richard, PopStefanija, Aleksandar, Porth, Oliver, Pötzl, Felix M., Prather, Ben, Preciado-López, Jorge A., Principe, Giacomo, Psaltis, Dimitrios, Pu, Hung-Yi, Ramakrishnan, Venkatessh, Rao, Ramprasad, Rawlings, Mark G., Ricarte, Angelo, Ripperda, Bart, Roelofs, Freek, Rogers, Alan, Romero-Cañizales, Cristina, Roshanineshat, Arash, Rottmann, Helge, Roy, Alan L., Ruiz, Ignacio, Ruszczyk, Chet, Rygl, Kazi L. J., Sánchez, Salvador, Sánchez-Argüelles, David, Sánchez-Portal, Miguel, Sasada, Mahito, Satapathy, Kaushik, Schloerb, F. Peter, Schonfeld, Jonathan, Schuster, Karl-Friedrich, Shao, Lijing, Shen, Zhiqiang, Small, Des, Sohn, Bong Won, SooHoo, Jason, Salas, León David Sosapanta, Souccar, Kamal, Stanway, Joshua S., Sun, He, Tazaki, Fumie, Tetarenko, Alexandra J., Tiede, Paul, Titus, Michael, Torne, Pablo, Toscano, Teresa, Trent, Tyler, Trippe, Sascha, Turk, Matthew, van Bemmel, Ilse, van Langevelde, Huib J., van Rossum, Daniel R., Vos, Jesse, Wagner, Jan, Ward-Thompson, Derek, Wardle, John, Washington, Jasmin E., Weintroub, Jonathan, Wharton, Robert, Wiik, Kaj, Witzel, Gunther, Wondrak, Michael F., Wong, George N., Wu, Qingwen, Yadlapalli, Nitika, Yamaguchi, Paul, Yfantis, Aristomenis, Yoon, Doosoo, Young, André, Young, Ken, Younsi, Ziri, Yu, Wei, Yuan, Feng, Yuan, Ye-Fei, Zensus, J. Anton, Zhang, Shuo, Zhao, Guang-Yao, and Zhao, Shan-Shan
- Subjects
Astrophysics - High Energy Astrophysical Phenomena ,Astrophysics - Astrophysics of Galaxies ,Astrophysics - Instrumentation and Methods for Astrophysics - Abstract
The 2017 observing campaign of the Event Horizon Telescope (EHT) delivered the first very long baseline interferometry (VLBI) images at the observing frequency of 230 GHz, leading to a number of unique studies on black holes and relativistic jets from active galactic nuclei (AGN). In total, eighteen sources were observed: the main science targets, Sgr A* and M87 along with various calibrators. We investigated the morphology of the sixteen AGN in the EHT 2017 data set, focusing on the properties of the VLBI cores: size, flux density, and brightness temperature. We studied their dependence on the observing frequency in order to compare it with the Blandford-K\"onigl (BK) jet model. We modeled the source structure of seven AGN in the EHT 2017 data set using linearly polarized circular Gaussian components and collected results for the other nine AGN from dedicated EHT publications, complemented by lower frequency data in the 2-86 GHz range. Then, we studied the dependences of the VLBI core flux density, size, and brightness temperature on the frequency measured in the AGN host frame. We compared the observations with the BK jet model and estimated the magnetic field strength dependence on the distance from the central black hole. Our results indicate a deviation from the standard BK model, particularly in the decrease of the brightness temperature with the observing frequency. Either bulk acceleration of the jet material, energy transfer from the magnetic field to the particles, or both are required to explain the observations.
- Published
- 2025
42. Run-and-tumble chemotaxis using reinforcement learning
- Author
-
Pramanik, Ramesh, Mishra, Shradha, and Chatterjee, Sakuntala
- Subjects
Quantitative Biology - Cell Behavior ,Computer Science - Machine Learning ,Physics - Biological Physics - Abstract
Bacterial cells use run-and-tumble motion to climb up attractant concentration gradient in their environment. By extending the uphill runs and shortening the downhill runs the cells migrate towards the higher attractant zones. Motivated by this, we formulate a reinforcement learning (RL) algorithm where an agent moves in one dimension in the presence of an attractant gradient. The agent can perform two actions: either persistent motion in the same direction or reversal of direction. We assign costs for these actions based on the recent history of the agent's trajectory. We ask the question: which RL strategy works best in different types of attractant environment. We quantify efficiency of the RL strategy by the ability of the agent (a) to localize in the favorable zones after large times, and (b) to learn about its complete environment. Depending on the attractant profile and the initial condition, we find an optimum balance is needed between exploration and exploitation to ensure the most efficient performance.
- Published
- 2025
- Full Text
- View/download PDF
43. Quantum Diffusion Model for Quark and Gluon Jet Generation
- Author
-
Baidachna, Mariia, Guadarrama, Rey, Dahale, Gopal Ramesh, Magorsch, Tom, Pedraza, Isabel, Matchev, Konstantin T., Matcheva, Katia, Kong, Kyoungchul, and Gleyzer, Sergei
- Subjects
Quantum Physics ,Computer Science - Machine Learning ,High Energy Physics - Phenomenology - Abstract
Diffusion models have demonstrated remarkable success in image generation, but they are computationally intensive and time-consuming to train. In this paper, we introduce a novel diffusion model that benefits from quantum computing techniques in order to mitigate computational challenges and enhance generative performance within high energy physics data. The fully quantum diffusion model replaces Gaussian noise with random unitary matrices in the forward process and incorporates a variational quantum circuit within the U-Net in the denoising architecture. We run evaluations on the structurally complex quark and gluon jets dataset from the Large Hadron Collider. The results demonstrate that the fully quantum and hybrid models are competitive with a similar classical model for jet generation, highlighting the potential of using quantum techniques for machine learning problems., Comment: Accepted for the NeurIPS 2024 MLNCP workshop
- Published
- 2024
44. Dependence of the estimated electric potential in thunderstorms observed at GRAPES-3 on the hadronic interaction generators used in simulations
- Author
-
Hariharan, B., Gupta, S. K., Hayashi, Y., Jagadeesan, P., Jain, A., Kawakami, S., Kojima, H., Mohanty, P. K., Muraki, Y., Nayak, P. K., Oshima, A., Rameez, M., Ramesh, K., Reddy, L. V., Shibata, S., and Zuberi, M.
- Subjects
Astrophysics - High Energy Astrophysical Phenomena - Abstract
A potential difference of 1.3 Giga-Volts (GV) was inferred across a thundercloud using data from the GRAPES-3 muon telescope (G3MT). This was the first-ever estimation of gigavolt potential in thunderstorms, confirming prediction of C.T.R. Wilson almost a century ago. To infer the thundercloud potential required acceleration of muons in atmospheric electric field to be incorporated in the Monte Carlo simulation software CORSIKA. The G3MT records over 4 billion muons daily that are grouped into 169 directions covering 2.3 sr sky. This enabled changes as small as 0.1% in the muon flux on minute timescale, caused by thunderstorms to be accurately measured. But that requires high statistics simulation of muon fluxes in thunderstorm electric fields. The CORSIKA offers a choice of several generators for low- (FLUKA, GHEISHA, and UrQMD) and high-energy (SIBYLL, EPOS-LHC, and QGSJETII) hadronic interactions. Since it is unclear which combination of the low- and high-energy generators provides the correct description of hadronic interactions, all nine combinations of generators were explored, and they yielded thundercloud potentials ranging from 1.3 GV to 1.6 GV for the event recorded on 1 December 2014. The result of SIBYLL-FLUKA combination yielded the lowest electric potential of 1.3 GV was reported. Furthermore, another seven major thunderstorm events recorded between April 2011 and December 2020 were analyzed to measure the dependence of their thundercloud potential on the hadronic interaction generators. It is observed that the low-energy generators produce larger variation ($\sim$14%) in thundercloud potential than the high-energy generators ($\sim$8%). This probably reflects the fact that the GeV muons are predominantly produced in low-energy ($<$80 GeV) interactions, which effectively magnifies the differences in the meson production cross-sections among the low-energy generators.
- Published
- 2024
45. Towards Environmentally Equitable AI
- Author
-
Hajiesmaili, Mohammad, Ren, Shaolei, Sitaraman, Ramesh K., and Wierman, Adam
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computers and Society - Abstract
The skyrocketing demand for artificial intelligence (AI) has created an enormous appetite for globally deployed power-hungry servers. As a result, the environmental footprint of AI systems has come under increasing scrutiny. More crucially, the current way that we exploit AI workloads' flexibility and manage AI systems can lead to wildly different environmental impacts across locations, increasingly raising environmental inequity concerns and creating unintended sociotechnical consequences. In this paper, we advocate environmental equity as a priority for the management of future AI systems, advancing the boundaries of existing resource management for sustainable AI and also adding a unique dimension to AI fairness. Concretely, we uncover the potential of equity-aware geographical load balancing to fairly re-distribute the environmental cost across different regions, followed by algorithmic challenges. We conclude by discussing a few future directions to exploit the full potential of system management approaches to mitigate AI's environmental inequity., Comment: Accepted by Communications of the ACM. All the authors contributed equally and are listed in alphabetical order of last name
- Published
- 2024
46. Points on Rational Normal Curves and the ABCT Variety
- Author
-
Agostini, Daniele, Ramesh, Lakshmi, and Shen, Dawei
- Subjects
Mathematics - Algebraic Geometry ,Mathematical Physics ,Mathematics - Combinatorics ,05E05, 14J81, 14N05, 14N15, 14N20 - Abstract
The ABCT variety is defined as the closure of the image of $G(2,n)$ under the Veronese map. We realize the ABCT variety $V(3,n)$ as the determinantal variety of a vector bundle morphism. We use this to give a recursive formula for the fundamental class of $V(3,n)$. As an application, we show that special Schubert coefficients of this class are given by Eulerian numbers, matching a formula by Cachazo-He-Yuan. On the way to this, we prove that the variety of configuration of points on a common divisor on a smooth variety is reduced and irreducible, generalizing a result of Caminata-Moon-Schaffler., Comment: 20 pages
- Published
- 2024
47. Epitaxial Strain Tuning of Er3+ in Ferroelectric Thin Films
- Author
-
Brinn, Rafaela M., Meisenheimer, Peter, Dandu, Medha, Barré, Elyse, Behera, Piush, Raja, Archana, Ramesh, Ramamoorthy, and Stevenson, Paul
- Subjects
Condensed Matter - Materials Science ,Condensed Matter - Mesoscale and Nanoscale Physics ,Physics - Optics - Abstract
Er3+ color centers are promising candidates for quantum science and technology due to their long electron and nuclear spin coherence times, as well as their desirable emission wavelength. By selecting host materials with suitable, controllable properties, we introduce new parameters that can be used to tailor the Er3+ emission spectrum. PbTiO3 is a well-studied ferroelectric material with known methods of engineering different domain configurations through epitaxial strain. By distorting the structure of Er3+-doped PbTiO3 thin films, we can manipulate the crystal fields around the Er3+ dopant. This is resolved through changes in the Er3+ resonant fluorescence spectra, tying the optical properties of the defect directly to the domain configurations of the ferroelectic matrix. Additionally, we are able to resolve a second set of peaks for films with in-plane ferroelectric polarization. We hypothesize these results to be due to either the Er3+ substituting different sites of the PbTiO3 crystal, differences in charges between the Er3+ dopant and the original substituent ion, or selection rules. Systematically studying the relationship between the Er3+ emission and the epitaxial strain of the ferroelectric matrix lays the pathway for future optical studies of spin manipulation by altering ferroelectric order parameters
- Published
- 2024
48. Analysis of Object Detection Models for Tiny Object in Satellite Imagery: A Dataset-Centric Approach
- Author
-
PS, Kailas, R, Selvakumaran, Murugan, Palani, Kumar V, Ramesh, and M, Malaya Kumar Biswal
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In recent years, significant advancements have been made in deep learning-based object detection algorithms, revolutionizing basic computer vision tasks, notably in object detection, tracking, and segmentation. This paper delves into the intricate domain of Small-Object-Detection (SOD) within satellite imagery, highlighting the unique challenges stemming from wide imaging ranges, object distribution, and their varying appearances in bird's-eye-view satellite images. Traditional object detection models face difficulties in detecting small objects due to limited contextual information and class imbalances. To address this, our research presents a meticulously curated dataset comprising 3000 images showcasing cars, ships, and airplanes in satellite imagery. Our study aims to provide valuable insights into small object detection in satellite imagery by empirically evaluating state-of-the-art models. Furthermore, we tackle the challenges of satellite video-based object tracking, employing the Byte Track algorithm on the SAT-MTB dataset. Through rigorous experimentation, we aim to offer a comprehensive understanding of the efficacy of state-of-the-art models in Small-Object-Detection for satellite applications. Our findings shed light on the effectiveness of these models and pave the way for future advancements in satellite imagery analysis., Comment: Conference Proceesings of AIAA SciTech Forum 2025 and Exposition
- Published
- 2024
49. Constraining inflation with nonminimal derivative coupling with the Parkes Pulsar Timing Array third data release
- Author
-
Han, Chang, Chen, Li-Yang, Chen, Zu-Cheng, Fu, Chengjie, Wu, Puxun, Yu, Hongwei, Bhat, N. D. Ramesh, Liu, Xiaojin, Di Marco, Valentina, Mishra, Saurav, Reardon, Daniel J., Russell, Christopher J., Shannon, Ryan M., Zhang, Lei, Zhu, Xingjiang, and Zic, Andrew
- Subjects
General Relativity and Quantum Cosmology ,Astrophysics - Cosmology and Nongalactic Astrophysics - Abstract
We study an inflation model with nonminimal derivative coupling that features a coupling between the derivative of the inflaton field and the Einstein tensor. This model naturally amplifies curvature perturbations at small scales via gravitationally enhanced friction, a mechanism critical for the formation of primordial black holes and the associated production of potentially detectable scalar-induced gravitational waves. We derive analytical expressions for the primordial power spectrum, enabling efficient exploration of the model parameter space without requiring computationally intensive numerical solutions of the Mukhanov-Sasaki equation. Using the third data release of the Parkes Pulsar Timing Array (PPTA DR3), we constrain the model parameters characterizing the coupling function: $\phi_c = 3.7^{+0.3}_{-0.5} M_\mathrm{P}$, $\log_{10} \omega_L = 7.1^{+0.6}_{-0.3}$, and $\log_{10} \sigma = -8.3^{+0.3}_{-0.6}$ at 90\% confidence level. Our results demonstrate the growing capability of pulsar timing arrays to probe early Universe physics, complementing traditional cosmic microwave background observations by providing unique constraints on inflationary dynamics at small scales., Comment: 14 pages, 5figures
- Published
- 2024
50. Magnetic Reconnection between a Solar Jet and a Filament Channel
- Author
-
Karki, Garima, Schmieder, Brigitte, Devi, Pooja, Chandra, Ramesh, Labrosse, Nicolas, Joshi, Reetika, and Gelly, Bernard
- Subjects
Astrophysics - Solar and Stellar Astrophysics - Abstract
The solar corona is highly structured by bunches of magnetic field lines forming either loops, or twisted flux ropes representing prominences/filaments, or very dynamic structures such as jets. The aim of this paper is to understand the interaction between filament channels and jets. We use high-resolution H$\alpha$ spectra obtained by the ground-based Telescope Heliographique pour lEtude du Magnetisme et des Instabilites Solaires (THEMIS) in Canary Islands, and data from Helioseismic Magnetic Imager (HMI) and Atmospheric Imaging Assembly (AIA) aboard the Solar Dynamics Observatory (SDO). In this paper we present a multi-wavelength study of the interaction of filaments and jets. They both consist of cool plasma embedded in magnetic structures. A jet is particularly well studied in all the AIA channels with a flow reaching 100-180 km s$^{-1}$. Its origin is linked to cancelling flux at the edge of the active region. Large Dopplershifts in H$\alpha$ are derived in a typical area for a short time (order of min). They correspond to flows around 140 km s$^{-1}$. In conclusion we conjecture that these flows correspond to some interchange of magnetic field lines between the filament channel and the jets leading to cool plasmoid ejections or reconnection jets perpendicularly to the jet trajectory., Comment: 13 Figures, 14 pages
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.