-
Quantum computation of SU(2) lattice gauge theory with continuous variables
Authors:
Victor Ale,
Nora M. Bauer,
Raghav G. Jha,
Felix Ringer,
George Siopsis
Abstract:
We present a quantum computational framework for SU(2) lattice gauge theory, leveraging continuous variables instead of discrete qubits to represent the infinite-dimensional Hilbert space of the gauge fields. We consider a ladder as well as a two-dimensional grid of plaquettes, detailing the use of gauge fixing to reduce the degrees of freedom and simplify the Hamiltonian. We demonstrate how the s…
▽ More
We present a quantum computational framework for SU(2) lattice gauge theory, leveraging continuous variables instead of discrete qubits to represent the infinite-dimensional Hilbert space of the gauge fields. We consider a ladder as well as a two-dimensional grid of plaquettes, detailing the use of gauge fixing to reduce the degrees of freedom and simplify the Hamiltonian. We demonstrate how the system dynamics, ground states, and energy gaps can be computed using the continuous-variable approach to quantum computing. Our results indicate that it is feasible to study non-Abelian gauge theories with continuous variables, providing new avenues for understanding the real-time dynamics of quantum field theories.
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
LSTMSE-Net: Long Short Term Speech Enhancement Network for Audio-visual Speech Enhancement
Authors:
Arnav Jain,
Jasmer Singh Sanjotra,
Harshvardhan Choudhary,
Krish Agrawal,
Rupal Shah,
Rohan Jha,
M. Sajid,
Amir Hussain,
M. Tanveer
Abstract:
In this paper, we propose long short term memory speech enhancement network (LSTMSE-Net), an audio-visual speech enhancement (AVSE) method. This innovative method leverages the complementary nature of visual and audio information to boost the quality of speech signals. Visual features are extracted with VisualFeatNet (VFN), and audio features are processed through an encoder and decoder. The syste…
▽ More
In this paper, we propose long short term memory speech enhancement network (LSTMSE-Net), an audio-visual speech enhancement (AVSE) method. This innovative method leverages the complementary nature of visual and audio information to boost the quality of speech signals. Visual features are extracted with VisualFeatNet (VFN), and audio features are processed through an encoder and decoder. The system scales and concatenates visual and audio features, then processes them through a separator network for optimized speech enhancement. The architecture highlights advancements in leveraging multi-modal data and interpolation techniques for robust AVSE challenge systems. The performance of LSTMSE-Net surpasses that of the baseline model from the COG-MHEAR AVSE Challenge 2024 by a margin of 0.06 in scale-invariant signal-to-distortion ratio (SISDR), $0.03$ in short-time objective intelligibility (STOI), and $1.32$ in perceptual evaluation of speech quality (PESQ). The source code of the proposed LSTMSE-Net is available at \url{https://github.com/mtanveer1/AVSEC-3-Challenge}.
△ Less
Submitted 3 September, 2024;
originally announced September 2024.
-
Flight Delay Prediction using Hybrid Machine Learning Approach: A Case Study of Major Airlines in the United States
Authors:
Rajesh Kumar Jha,
Shashi Bhushan Jha,
Vijay Pandey,
Radu F. Babiceanu
Abstract:
The aviation industry has experienced constant growth in air traffic since the deregulation of the U.S. airline industry in 1978. As a result, flight delays have become a major concern for airlines and passengers, leading to significant research on factors affecting flight delays such as departure, arrival, and total delays. Flight delays result in increased consumption of limited resources such a…
▽ More
The aviation industry has experienced constant growth in air traffic since the deregulation of the U.S. airline industry in 1978. As a result, flight delays have become a major concern for airlines and passengers, leading to significant research on factors affecting flight delays such as departure, arrival, and total delays. Flight delays result in increased consumption of limited resources such as fuel, labor, and capital, and are expected to increase in the coming decades. To address the flight delay problem, this research proposes a hybrid approach that combines the feature of deep learning and classic machine learning techniques. In addition, several machine learning algorithms are applied on flight data to validate the results of proposed model. To measure the performance of the model, accuracy, precision, recall, and F1-score are calculated, and ROC and AUC curves are generated. The study also includes an extensive analysis of the flight data and each model to obtain insightful results for U.S. airlines.
△ Less
Submitted 1 September, 2024;
originally announced September 2024.
-
PolypDB: A Curated Multi-Center Dataset for Development of AI Algorithms in Colonoscopy
Authors:
Debesh Jha,
Nikhil Kumar Tomar,
Vanshali Sharma,
Quoc-Huy Trinh,
Koushik Biswas,
Hongyi Pan,
Ritika K. Jha,
Gorkem Durak,
Alexander Hann,
Jonas Varkey,
Hang Viet Dao,
Long Van Dao,
Binh Phuc Nguyen,
Khanh Cong Pham,
Quang Trung Tran,
Nikolaos Papachrysos,
Brandon Rieders,
Peter Thelin Schmidt,
Enrik Geissler,
Tyler Berzin,
Pål Halvorsen,
Michael A. Riegler,
Thomas de Lange,
Ulas Bagci
Abstract:
Colonoscopy is the primary method for examination, detection, and removal of polyps. Regular screening helps detect and prevent colorectal cancer at an early curable stage. However, challenges such as variation among the endoscopists' skills, bowel quality preparation, and complex nature of the large intestine which cause large number of polyp miss-rate. These missed polyps can develop into cancer…
▽ More
Colonoscopy is the primary method for examination, detection, and removal of polyps. Regular screening helps detect and prevent colorectal cancer at an early curable stage. However, challenges such as variation among the endoscopists' skills, bowel quality preparation, and complex nature of the large intestine which cause large number of polyp miss-rate. These missed polyps can develop into cancer later on, which underscores the importance of improving the detection methods. A computer-aided diagnosis system can support physicians by assisting in detecting overlooked polyps. However, one of the important challenges for developing novel deep learning models for automatic polyp detection and segmentation is the lack of publicly available, multi-center large and diverse datasets. To address this gap, we introduce PolypDB, a large scale publicly available dataset that contains 3934 still polyp images and their corresponding ground truth from real colonoscopy videos to design efficient polyp detection and segmentation architectures. The dataset has been developed and verified by a team of 10 gastroenterologists. PolypDB comprises of images from five modalities: Blue Light Imaging (BLI), Flexible Imaging Color Enhancement (FICE), Linked Color Imaging (LCI), Narrow Band Imaging (NBI), and White Light Imaging (WLI) and three medical centers from Norway, Sweden and Vietnam. Thus, we split the dataset based on modality and medical center for modality-wise and center-wise analysis. We provide a benchmark on each modality using eight popular segmentation methods and six standard benchmark polyp detection methods. Furthermore, we also provide benchmark on center-wise under federated learning settings. Our dataset is public and can be downloaded at \url{https://osf.io/pr7ms/}.
△ Less
Submitted 19 August, 2024;
originally announced September 2024.
-
Jina-ColBERT-v2: A General-Purpose Multilingual Late Interaction Retriever
Authors:
Rohan Jha,
Bo Wang,
Michael Günther,
Georgios Mastrapas,
Saba Sturua,
Isabelle Mohr,
Andreas Koukounas,
Mohammad Kalim Akram,
Nan Wang,
Han Xiao
Abstract:
Multi-vector dense models, such as ColBERT, have proven highly effective in information retrieval. ColBERT's late interaction scoring approximates the joint query-document attention seen in cross-encoders while maintaining inference efficiency closer to traditional dense retrieval models, thanks to its bi-encoder architecture and recent optimizations in indexing and search. In this work we propose…
▽ More
Multi-vector dense models, such as ColBERT, have proven highly effective in information retrieval. ColBERT's late interaction scoring approximates the joint query-document attention seen in cross-encoders while maintaining inference efficiency closer to traditional dense retrieval models, thanks to its bi-encoder architecture and recent optimizations in indexing and search. In this work we propose a number of incremental improvements to the ColBERT model architecture and training pipeline, using methods shown to work in the more mature single-vector embedding model training paradigm, particularly those that apply to heterogeneous multilingual data or boost efficiency with little tradeoff. Our new model, Jina-ColBERT-v2, demonstrates strong performance across a range of English and multilingual retrieval tasks.
△ Less
Submitted 14 September, 2024; v1 submitted 29 August, 2024;
originally announced August 2024.
-
Current Correlations and Conductivity in SYK-Like Systems: An Analytical Study
Authors:
Rishabh Jha,
Stefan Kehrein,
Jan C. Louw
Abstract:
We present a functional-based approach to compute thermal expectation values for actions expressed in the $G-Σ$ formalism, applicable to any time sequence ordering. Utilizing this framework, we analyze the linear response to an electric field in various Sachdev-Ye-Kitaev (SYK) chains. We consider the SYK chain where each dot is a complex $q/2$-body interacting SYK model, and we allow for $r/2$-bod…
▽ More
We present a functional-based approach to compute thermal expectation values for actions expressed in the $G-Σ$ formalism, applicable to any time sequence ordering. Utilizing this framework, we analyze the linear response to an electric field in various Sachdev-Ye-Kitaev (SYK) chains. We consider the SYK chain where each dot is a complex $q/2$-body interacting SYK model, and we allow for $r/2$-body nearest-neighbor hopping where $r=κq$. We find exact analytical expressions in the large-$q$ limit for conductivities across all temperatures at leading order in $1/q$ for three cases, namely $κ= \{ 1/2, 1, 2\}$. When $κ= \{1/2, 1\}$, we observe linear-in-temperature $T$ resistivities at low temperatures, indicative of strange metal behavior. Conversely, when $κ= 2$, the resistivity diverges as a power law at low temperatures, namely as $1/T^2$, resembling insulating behavior. As $T$ increases, there is a crossover to Fermi liquid behavior ($\sim T^2$) at the minimum resistivity. Beyond this, another crossover occurs to strange metal behavior ($\sim T$). In comparison to previous linear-in-$T$ results in the literature, we also show that the resistivity behavior exists even below the MIR bound, indicating a true strange metal instead of a bad metal. In particular, we find for the $κ= 2$ case a smooth crossover from an insulating phase to a Fermi liquid behavior to a true strange metal and eventually becoming a bad metal as temperature increases. We extend and generalize previously known results on resistivities to all temperatures, do a comparative analysis across the three models where we highlight the universal features and invoke scaling arguments to create a physical picture out of our analyses. Remarkably, we find a universal maximum DC conductivity across all three models when the hopping coupling strength becomes large.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Sparsity dependence of Krylov state complexity in the SYK model
Authors:
Raghav G. Jha,
Ranadeep Roy
Abstract:
We study the Krylov state complexity of the Sachdev-Ye-Kitaev (SYK) model for $N \le 28$ Majorana fermions with $q$-body fermion interaction with $q=4,6,8$ for a range of sparse parameter $k$. Using the peak of the Krylov complexity as a probe, we find change in behavior as we vary $k$ for various $q$. We argue that this captures the change from holographic to non-holographic behavior in the spars…
▽ More
We study the Krylov state complexity of the Sachdev-Ye-Kitaev (SYK) model for $N \le 28$ Majorana fermions with $q$-body fermion interaction with $q=4,6,8$ for a range of sparse parameter $k$. Using the peak of the Krylov complexity as a probe, we find change in behavior as we vary $k$ for various $q$. We argue that this captures the change from holographic to non-holographic behavior in the sparse SYK-type models such that model is holographic for all $k \ge k_{\text{min}}$.
△ Less
Submitted 11 September, 2024; v1 submitted 30 July, 2024;
originally announced July 2024.
-
Green and Safe 6G Wireless Networks: A Hybrid Approach
Authors:
Haneet Kour,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
With the wireless internet access being increasingly popular with services such as HD video streaming and so on, the demand for high data consuming applications is also rising. This increment in demand is coupled with a proportional rise in the power consumption. It is required that the internet traffic is offloaded to technologies that serve the users and contribute in energy consumption. There i…
▽ More
With the wireless internet access being increasingly popular with services such as HD video streaming and so on, the demand for high data consuming applications is also rising. This increment in demand is coupled with a proportional rise in the power consumption. It is required that the internet traffic is offloaded to technologies that serve the users and contribute in energy consumption. There is a need to decrease the carbon footprint in the atmosphere and also make the network safe and reliable. In this article we propose a hybrid system of RF (Radio Frequency) and VLC (Visible Light Communication) for indoor communication that can provide communication along with illumination with least power consumption. The hybrid network is viable as it utilizes power with respect to the user demand and maintains the required Quality of ServiceQoS and Quality of Experience QoE for a particular application in use. This scheme aims for Green Communication and reduction in Electromagnetic EM Radiation. A comparative analysis for RF communication, Hybrid RF+ VLC and pure VLC is made and simulations are carried out using Python, Scilab and MathWorks tool. The proposal achieves high energy efficiency of about 37% low Specific Absorption Rate (SAR) lower incident and absorbed power density complexity and temperature elevation in human body tissues exposed to the radiation. It also enhances the battery lifetime of the mobile device in use by increasing the lifetime approximately by 7 hours as validated from the obtained results. Thus the overall network reliability and safety factor is enhanced with the proposed approach.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Thermal Radiation (TR) mode: A Deployment Perspective for 5G NR
Authors:
Haneet Kour,
Rakesh Kumar Jha,
Sanjeev Jain,
Shubha Jain
Abstract:
The 5G New Radio NR technology is under standardization process by 3GPP to provide outline for a new radio interface for the next generation of cellular networks. The aim of the 5G networks include not only to provide enhanced capacity coverage but also support advanced services such as enhanced mobile broadband (eMBB) Ultra-Reliable Low Latency Communication URLLC massive Machine Type Communicati…
▽ More
The 5G New Radio NR technology is under standardization process by 3GPP to provide outline for a new radio interface for the next generation of cellular networks. The aim of the 5G networks include not only to provide enhanced capacity coverage but also support advanced services such as enhanced mobile broadband (eMBB) Ultra-Reliable Low Latency Communication URLLC massive Machine Type Communication mMTC. Key features of NR include Ultra lean carrier design to minimize the power consumption by limiting the always-on signal transmissions and to reduce interference in the neighboring cells . Another feature is the use of massive number of antennas for transmission as well as reception of signals. This rise in the number of antennas to provide a greater coverage brings about various challenges and impact in the system. With the increase in investigations in the mmWave frequencies, there is a need to investigate the health hazards they have on human body and the environment at large. This paper intends to provide an insight into the harmful impacts of Radio Frequency RF fields. The radiation metric to study the RF impact for far field is power density and for near field is Specific Absorption Rate SAR. These are the two main EM radiation metrics to find out the exposure due to uplink and downlink phenomenon in mobile communications. Mobile communication systems are addressed particularly to discuss the Electromagnetic EM Radiation impact as smart phones are used in close proximity to the body. A proposal in the form of Thermal Radiation TR mode is given to reduce the radiations emitted from a mobile phone. The performance of the proposed mode is validated from the results by achieving reduced power density, complexity and exposure ratio.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Antenna Model for Safe Human Exposure in Future 6G Smartphones: A Network Perspective
Authors:
Haneet Kour,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
In this article we present the biological effect of antenna topology on a users body. At different values of exposed frequency, the absorbent nature varies in human body. One of the major factors to be taken into consideration for designing 6G mobile antenna is the biological effect and Electromagnetic Field Exposure (EMF).
In this article we present the biological effect of antenna topology on a users body. At different values of exposed frequency, the absorbent nature varies in human body. One of the major factors to be taken into consideration for designing 6G mobile antenna is the biological effect and Electromagnetic Field Exposure (EMF).
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
A Benchmark Dataset for Multimodal Prediction of Enzymatic Function Coupling DNA Sequences and Natural Language
Authors:
Yuchen Zhang,
Ratish Kumar Chandrakant Jha,
Soumya Bharadwaj,
Vatsal Sanjaykumar Thakkar,
Adrienne Hoarfrost,
Jin Sun
Abstract:
Predicting gene function from its DNA sequence is a fundamental challenge in biology. Many deep learning models have been proposed to embed DNA sequences and predict their enzymatic function, leveraging information in public databases linking DNA sequences to an enzymatic function label. However, much of the scientific community's knowledge of biological function is not represented in these catego…
▽ More
Predicting gene function from its DNA sequence is a fundamental challenge in biology. Many deep learning models have been proposed to embed DNA sequences and predict their enzymatic function, leveraging information in public databases linking DNA sequences to an enzymatic function label. However, much of the scientific community's knowledge of biological function is not represented in these categorical labels, and is instead captured in unstructured text descriptions of mechanisms, reactions, and enzyme behavior. These descriptions are often captured alongside DNA sequences in biological databases, albeit in an unstructured manner. Deep learning of models predicting enzymatic function are likely to benefit from incorporating this multi-modal data encoding scientific knowledge of biological function. There is, however, no dataset designed for machine learning algorithms to leverage this multi-modal information. Here we propose a novel dataset and benchmark suite that enables the exploration and development of large multi-modal neural network models on gene DNA sequences and natural language descriptions of gene function. We present baseline performance on benchmarks for both unsupervised and supervised tasks that demonstrate the difficulty of this modeling objective, while demonstrating the potential benefit of incorporating multi-modal data types in function prediction compared to DNA sequences alone. Our dataset is at: https://hoarfrost-lab.github.io/BioTalk/.
△ Less
Submitted 21 July, 2024;
originally announced July 2024.
-
Thermal state preparation of the SYK model using a variational quantum algorithm
Authors:
Jack Y. Araz,
Raghav G. Jha,
Felix Ringer,
Bharath Sambasivam
Abstract:
We study the preparation of thermal states of the dense and sparse Sachdev-Ye-Kitaev (SYK) model using a variational quantum algorithm for $6 \le N \le 12$ Majorana fermions over a wide range of temperatures. Utilizing IBM's 127-qubit quantum processor, we perform benchmark computations for the dense SYK model with $N = 6$, showing good agreement with exact results. The preparation of thermal stat…
▽ More
We study the preparation of thermal states of the dense and sparse Sachdev-Ye-Kitaev (SYK) model using a variational quantum algorithm for $6 \le N \le 12$ Majorana fermions over a wide range of temperatures. Utilizing IBM's 127-qubit quantum processor, we perform benchmark computations for the dense SYK model with $N = 6$, showing good agreement with exact results. The preparation of thermal states of a non-local random Hamiltonian with all-to-all coupling using the simulator and quantum hardware represents a significant step toward future computations of thermal out-of-time order correlators in quantum many-body systems.
△ Less
Submitted 20 October, 2024; v1 submitted 21 June, 2024;
originally announced June 2024.
-
$SU(2)$ principal chiral model with tensor renormalization group on a cubic lattice
Authors:
Shinichiro Akiyama,
Raghav G. Jha,
Judah Unmuth-Yockey
Abstract:
We study the continuous phase transition and thermodynamic observables in the three-dimensional Euclidean $SU(2)$ principal chiral field model with the triad tensor renormalization group (tTRG) and the anisotropic tensor renormalization group (ATRG) methods. Using these methods, we find results that are consistent with previous Monte Carlo estimates and the predicted renormalization group scaling…
▽ More
We study the continuous phase transition and thermodynamic observables in the three-dimensional Euclidean $SU(2)$ principal chiral field model with the triad tensor renormalization group (tTRG) and the anisotropic tensor renormalization group (ATRG) methods. Using these methods, we find results that are consistent with previous Monte Carlo estimates and the predicted renormalization group scaling of the magnetization close to criticality. These results bring us one step closer to studying finite-density QCD in four dimensions using tensor network methods.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Reindex-Then-Adapt: Improving Large Language Models for Conversational Recommendation
Authors:
Zhankui He,
Zhouhang Xie,
Harald Steck,
Dawen Liang,
Rahul Jha,
Nathan Kallus,
Julian McAuley
Abstract:
Large language models (LLMs) are revolutionizing conversational recommender systems by adeptly indexing item content, understanding complex conversational contexts, and generating relevant item titles. However, controlling the distribution of recommended items remains a challenge. This leads to suboptimal performance due to the failure to capture rapidly changing data distributions, such as item p…
▽ More
Large language models (LLMs) are revolutionizing conversational recommender systems by adeptly indexing item content, understanding complex conversational contexts, and generating relevant item titles. However, controlling the distribution of recommended items remains a challenge. This leads to suboptimal performance due to the failure to capture rapidly changing data distributions, such as item popularity, on targeted conversational recommendation platforms. In conversational recommendation, LLMs recommend items by generating the titles (as multiple tokens) autoregressively, making it difficult to obtain and control the recommendations over all items. Thus, we propose a Reindex-Then-Adapt (RTA) framework, which converts multi-token item titles into single tokens within LLMs, and then adjusts the probability distributions over these single-token item titles accordingly. The RTA framework marries the benefits of both LLMs and traditional recommender systems (RecSys): understanding complex queries as LLMs do; while efficiently controlling the recommended item distributions in conversational recommendations as traditional RecSys do. Our framework demonstrates improved accuracy metrics across three different conversational recommendation datasets and two adaptation settings
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Aging Effects on Superconducting Properties of BiS2-Based Compounds: First-12-Year Restudy
Authors:
Poonam Rani,
Rajveer Jha,
V. P. S. Awana,
Yoshikazu Mizuguchi
Abstract:
Decomposition of superconductors sometimes becomes crucial when studying essential physical properties of the superconductors. For example, the cuprate superconductor YBa2Cu3O7-d decomposes by long-time air exposure. In this study, we investigate the aging effects on superconducting properties of BiS2-based superconductors Bi4O4S3 and LaO0.5F0.5BiS2, both were first synthesized in 2012, using thei…
▽ More
Decomposition of superconductors sometimes becomes crucial when studying essential physical properties of the superconductors. For example, the cuprate superconductor YBa2Cu3O7-d decomposes by long-time air exposure. In this study, we investigate the aging effects on superconducting properties of BiS2-based superconductors Bi4O4S3 and LaO0.5F0.5BiS2, both were first synthesized in 2012, using their polycrystalline samples synthesized several years ago. We find that 12-year-old Bi4O4S3 samples exhibit bulk superconductivity with a slight degradation of the superconducting transition temperature (Tc) of 0.2 K. For a high-pressure-synthesized LaO0.5F0.5BiS2 sample, clear decrease in Tc is observed, which suggests that high-pressure strain is reduced by aging.
△ Less
Submitted 25 June, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
Phase diagram of generalized XY model using tensor renormalization group
Authors:
Abhishek Samlodia,
Vamika Longia,
Raghav G. Jha,
Anosh Joseph
Abstract:
We use the higher-order tensor renormalization group method to study the two-dimensional generalized XY model that admits integer and half-integer vortices. This model is the deformation of the classical XY model and has a rich phase structure consisting of nematic, ferromagnetic, and disordered phases and three transition lines belonging to the Berezinskii-Kosterlitz-Thouless (BKT) and Ising clas…
▽ More
We use the higher-order tensor renormalization group method to study the two-dimensional generalized XY model that admits integer and half-integer vortices. This model is the deformation of the classical XY model and has a rich phase structure consisting of nematic, ferromagnetic, and disordered phases and three transition lines belonging to the Berezinskii-Kosterlitz-Thouless (BKT) and Ising class. We explore the model for a wide range of temperatures, $T$, and the deformation parameter, $Δ$, and compute specific heat along with integer and half-integer magnetic susceptibility, finding both BKT-like and Ising-like transitions and the region where they meet.
△ Less
Submitted 7 August, 2024; v1 submitted 26 April, 2024;
originally announced April 2024.
-
Hamiltonian simulation of minimal holographic sparsified SYK model
Authors:
Raghav G. Jha
Abstract:
The circuit complexity for Hamiltonian simulation of the sparsified SYK model with $N$ Majorana fermions and $q=4$ (quartic interactions) which retains holographic features (referred to as `minimal holographic sparsified SYK') with $k\ll N^{3}/24$ (where $k$ is the total number of interaction terms times 1/$N$) using second-order Trotter method and Jordan-Wigner encoding is found to be…
▽ More
The circuit complexity for Hamiltonian simulation of the sparsified SYK model with $N$ Majorana fermions and $q=4$ (quartic interactions) which retains holographic features (referred to as `minimal holographic sparsified SYK') with $k\ll N^{3}/24$ (where $k$ is the total number of interaction terms times 1/$N$) using second-order Trotter method and Jordan-Wigner encoding is found to be $\widetilde{\mathcal{O}}(k^{p}N^{3/2} \log N (\mathcal{J}t)^{3/2}\varepsilon^{-1/2})$ where $t$ is the simulation time, $\varepsilon$ is the desired error in the implementation of the unitary $U = \exp(-iHt)$, $\mathcal{J}$ is the disorder strength, and $p < 1$. This complexity implies that with less than a hundred logical qubits and about $10^{6}$ gates, it will be possible to achieve an advantage in this model and simulate real-time dynamics up to scrambling time.
△ Less
Submitted 9 May, 2024; v1 submitted 23 April, 2024;
originally announced April 2024.
-
RanLayNet: A Dataset for Document Layout Detection used for Domain Adaptation and Generalization
Authors:
Avinash Anand,
Raj Jaiswal,
Mohit Gupta,
Siddhesh S Bangar,
Pijush Bhuyan,
Naman Lal,
Rajeev Singh,
Ritika Jha,
Rajiv Ratn Shah,
Shin'ichi Satoh
Abstract:
Large ground-truth datasets and recent advances in deep learning techniques have been useful for layout detection. However, because of the restricted layout diversity of these datasets, training on them requires a sizable number of annotated instances, which is both expensive and time-consuming. As a result, differences between the source and target domains may significantly impact how well these…
▽ More
Large ground-truth datasets and recent advances in deep learning techniques have been useful for layout detection. However, because of the restricted layout diversity of these datasets, training on them requires a sizable number of annotated instances, which is both expensive and time-consuming. As a result, differences between the source and target domains may significantly impact how well these models function. To solve this problem, domain adaptation approaches have been developed that use a small quantity of labeled data to adjust the model to the target domain. In this research, we introduced a synthetic document dataset called RanLayNet, enriched with automatically assigned labels denoting spatial positions, ranges, and types of layout elements. The primary aim of this endeavor is to develop a versatile dataset capable of training models with robustness and adaptability to diverse document formats. Through empirical experimentation, we demonstrate that a deep layout identification model trained on our dataset exhibits enhanced performance compared to a model trained solely on actual documents. Moreover, we conduct a comparative analysis by fine-tuning inference models using both PubLayNet and IIIT-AR-13K datasets on the Doclaynet dataset. Our findings emphasize that models enriched with our dataset are optimal for tasks such as achieving 0.398 and 0.588 mAP95 score in the scientific document domain for the TABLE class.
△ Less
Submitted 19 April, 2024; v1 submitted 15 April, 2024;
originally announced April 2024.
-
Krylov Delocalization/Localization across Ergodicity Breaking
Authors:
Heiko Georg Menzler,
Rishabh Jha
Abstract:
Krylov complexity has recently gained attention where the growth of operator complexity in time is measured in terms of the off-diagonal operator Lanczos coefficients. The operator Lanczos algorithm reduces the problem of complexity growth to a single-particle semi-infinite tight-binding chain (known as the Krylov chain). Employing the phenomenon of Anderson localization, we propose the phenomenol…
▽ More
Krylov complexity has recently gained attention where the growth of operator complexity in time is measured in terms of the off-diagonal operator Lanczos coefficients. The operator Lanczos algorithm reduces the problem of complexity growth to a single-particle semi-infinite tight-binding chain (known as the Krylov chain). Employing the phenomenon of Anderson localization, we propose the phenomenology of inverse localization length on the Krylov chain that undergoes delocalization/localization transition on the Krylov chain while the physical system undergoes ergodicity breaking. On the Krylov chain we find delocalization in an ergodic regime, as we show for the SYK model, and localization in case of a weakly ergodicity-broken regime. Considering the dynamics beyond scrambling, we find a collapse across different operators in the ergodic regime. We test for two settings: (1) the coupled SYK model, and (2) the quantum East model. Our findings open avenues for mapping ergodicity/weak ergodicity-breaking transitions to delocalization/localization phenomenology on the Krylov chain.
△ Less
Submitted 20 September, 2024; v1 submitted 21 March, 2024;
originally announced March 2024.
-
Large tunable kinetic inductance in a twisted graphene superconductor
Authors:
Rounak Jha,
Martin Endres,
Kenji Watanabe,
Takashi Taniguchi,
Mitali Banerjee,
Christian Schönenberger,
Paritosh Karnatak
Abstract:
Twisted graphene based moiré heterostructures host a flat band at the magic angles where the kinetic energy of the charge carriers is quenched and interaction effects dominate. This results in emergent phases such as superconductors and correlated insulators that are electrostatically tunable. We investigate superconductivity in twisted trilayer graphene (TTG) by integrating it as the weak link in…
▽ More
Twisted graphene based moiré heterostructures host a flat band at the magic angles where the kinetic energy of the charge carriers is quenched and interaction effects dominate. This results in emergent phases such as superconductors and correlated insulators that are electrostatically tunable. We investigate superconductivity in twisted trilayer graphene (TTG) by integrating it as the weak link in a superconducting quantum interference device (SQUID). The measured current phase relation (CPR) yields a large and tunable kinetic inductance, up to 150 nH per square, of the electron and hole type intrinsic superconductors. We further show that the specific kinetic inductance and the critical current density are universally related via the superconducting coherence length, and extract an upper bound of 200 nm for the coherence length. Our work opens avenues for using graphene-based superconductors as tunable elements in superconducting circuits.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Workspace Analysis for Laparoscopic Rectal Surgery : A Preliminary Study
Authors:
Alexandra Thomieres,
Dhruva Khanzode,
Emilie Duchalais,
Ranjan Jha,
Damien Chablat
Abstract:
The integration of medical imaging, computational analysis, and robotic technology has brought about a significant transformation in minimally invasive surgical procedures, particularly in the realm of laparoscopic rectal surgery (LRS). This specialized surgical technique, aimed at addressing rectal cancer, requires an in-depth comprehension of the spatial dynamics within the narrow space of the p…
▽ More
The integration of medical imaging, computational analysis, and robotic technology has brought about a significant transformation in minimally invasive surgical procedures, particularly in the realm of laparoscopic rectal surgery (LRS). This specialized surgical technique, aimed at addressing rectal cancer, requires an in-depth comprehension of the spatial dynamics within the narrow space of the pelvis. Leveraging Magnetic Resonance Imaging (MRI) scans as a foundational dataset, this study incorporates them into Computer-Aided Design (CAD) software to generate precise three-dimensional (3D) reconstructions of the patient's anatomy. At the core of this research is the analysis of the surgical workspace, a critical aspect in the optimization of robotic interventions. Sophisticated computational algorithms process MRI data within the CAD environment, meticulously calculating the dimensions and contours of the pelvic internal regions. The outcome is a nuanced understanding of both viable and restricted zones during LRS, taking into account factors such as curvature, diameter variations, and potential obstacles. This paper delves deeply into the complexities of workspace analysis for robotic LRS, illustrating the seamless collaboration between medical imaging, CAD software, and surgical robotics. Through this interdisciplinary approach, the study aims to surpass traditional surgical methodologies, offering novel insights for a paradigm shift in optimizing robotic interventions within the complex environment of the pelvis.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Estimating the key parameters of Nova V5668 SGR using the Uniform Slab Model
Authors:
Rain Jha,
Nishchal Dwivedi
Abstract:
Novae, explosive events in binary star systems involving a white dwarf and a companion star, offer profound insights into extreme astrophysical conditions. During the eruption of a nova, material accreted onto the white dwarf's surface undergoes a thermonuclear runaway reaction resulting in the ejection of matter into space and the formation of a luminous shell. The classical V5668 Sgr (Nova Sagit…
▽ More
Novae, explosive events in binary star systems involving a white dwarf and a companion star, offer profound insights into extreme astrophysical conditions. During the eruption of a nova, material accreted onto the white dwarf's surface undergoes a thermonuclear runaway reaction resulting in the ejection of matter into space and the formation of a luminous shell. The classical V5668 Sgr (Nova Sagittarii) was the second and brighter of the two novae in the southern constellation of Sagittarius. It was discovered by John Seach of Chatsworth Island, Australia, on March 15, 2015. In this paper, drawing on data from Karl G. Jansky Very Large Array, the US-based radio astronomy observatory, on V5668 Sgr as well as from research that aggregates data from a range of sources including telescope archives, this study used the Uniform Slab Model and statistical techniques to plot the nova's light and frequency curves and estimate its ejected shell mass and the brightness temperature. These characteristics help us better understand the nova's formation and eruption. The paper presents the light curves in a machine-readable format and provides insight into the behaviour of ionised gas clouds.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Thermodynamics and dynamics of coupled complex SYK models
Authors:
Jan C. Louw,
Linda M. van Manen,
Rishabh Jha
Abstract:
It has been known that the large-$q$ complex SYK model falls under the same universality class as that of van der Waals (mean-field) and saturates the Maldacena-Shenker-Stanford bound, both features shared by various black holes. This makes the SYK model a useful tool in probing the fundamental nature of quantum chaos and holographic duality. This work establishes the robustness of this shared uni…
▽ More
It has been known that the large-$q$ complex SYK model falls under the same universality class as that of van der Waals (mean-field) and saturates the Maldacena-Shenker-Stanford bound, both features shared by various black holes. This makes the SYK model a useful tool in probing the fundamental nature of quantum chaos and holographic duality. This work establishes the robustness of this shared universality class and chaotic properties for SYK-like models by extending to a system of coupled large-$q$ complex SYK models of different orders. We provide a detailed derivation of thermodynamic properties, specifically the critical exponents for an observed phase transition, as well as dynamical properties, in particular the Lyapunov exponent, via the out-of-time correlator calculations. Our analysis reveals that, despite the introduction of an additional scaling parameter through interaction strength ratios, the system undergoes a continuous phase transition at low temperatures, similar to that of the single SYK model. The critical exponents align with the Landau-Ginzburg (mean-field) universality class, shared with van der Waals gases and various AdS black holes. Furthermore, we demonstrate that the coupled SYK system remains maximally chaotic in the large-$q$ limit at low temperatures, adhering to the Maldacena-Shenker-Stanford bound, a feature consistent with the single SYK model. These findings establish robustness and open avenues for broader inquiries into the universality and chaos in complex quantum systems. We provide a detailed outlook for future work by considering the "very" low-temperature regime, where we discuss relations with the Hawking-Page phase transition observed in the holographic dual black holes. We present preliminary calculations and discuss the possible follow-ups that might be taken to make the connection robust.
△ Less
Submitted 18 September, 2024; v1 submitted 22 December, 2023;
originally announced December 2023.
-
Tensor renormalization group study of 3D principal chiral model
Authors:
Shinichiro Akiyama,
Raghav G. Jha,
Judah Unmuth-Yockey
Abstract:
We study the three-dimensional $SU(2)$ principal chiral model (PCM) using different tensor renormalization group methods based on the triad and anisotropic decomposition of the tensor. The tensor network representation is formulated based on the character expansion of the Boltzmann weight. We compare the average action obtained using these two tensor network algorithms and confirm that the resulti…
▽ More
We study the three-dimensional $SU(2)$ principal chiral model (PCM) using different tensor renormalization group methods based on the triad and anisotropic decomposition of the tensor. The tensor network representation is formulated based on the character expansion of the Boltzmann weight. We compare the average action obtained using these two tensor network algorithms and confirm that the resulting critical coupling and exponent are comparable with the recent estimations from the Monte Carlo methods.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
Nonperturbative phase diagram of two-dimensional ${\cal N} = (2, 2)$ super-Yang--Mills
Authors:
Navdeep Singh Dhindsa,
Raghav G. Jha,
Anosh Joseph,
David Schaich
Abstract:
We consider two-dimensional ${\cal N} = (2, 2)$ Yang--Mills theory with gauge group SU($N$) in Euclidean signature compactified on a torus with thermal fermion boundary conditions imposed on one cycle. We perform non-perturbative lattice analyses of this theory for large $12 \leq N \leq 20$. Although no holographic dual of this theory is yet known, we conduct numerical investigations to check for…
▽ More
We consider two-dimensional ${\cal N} = (2, 2)$ Yang--Mills theory with gauge group SU($N$) in Euclidean signature compactified on a torus with thermal fermion boundary conditions imposed on one cycle. We perform non-perturbative lattice analyses of this theory for large $12 \leq N \leq 20$. Although no holographic dual of this theory is yet known, we conduct numerical investigations to check for features similar to the two-dimensional ${\cal N} = (8, 8)$ Yang--Mills theory, which has a well-defined gravity dual. We perform lattice field theory calculations to determine the phase diagram, observing a spatial deconfinement transition similar to the maximally supersymmetric case. However, the transition does not continue to low temperature, implying the absence of a topology-changing transition between black hole geometries in any holographic dual for this four-supercharge theory.
△ Less
Submitted 14 September, 2024; v1 submitted 8 December, 2023;
originally announced December 2023.
-
Sachdev-Ye-Kitaev model on a noisy quantum computer
Authors:
Muhammad Asaduzzaman,
Raghav G. Jha,
Bharath Sambasivam
Abstract:
We study the SYK model -- an important toy model for quantum gravity on IBM's superconducting qubit quantum computers. By using a graph-coloring algorithm to minimize the number of commuting clusters of terms in the qubitized Hamiltonian, we find the gate complexity of the time evolution using the first-order product formula for $N$ Majorana fermions is $\mathcal{O}(N^5 J^{2}t^2/ε)$ where $J$ is t…
▽ More
We study the SYK model -- an important toy model for quantum gravity on IBM's superconducting qubit quantum computers. By using a graph-coloring algorithm to minimize the number of commuting clusters of terms in the qubitized Hamiltonian, we find the gate complexity of the time evolution using the first-order product formula for $N$ Majorana fermions is $\mathcal{O}(N^5 J^{2}t^2/ε)$ where $J$ is the dimensionful coupling parameter, $t$ is the evolution time, and $ε$ is the desired precision. With this improved resource requirement, we perform the time evolution for $N=6, 8$ with maximum two-qubit circuit depth of 343. We perform different error mitigation schemes on the noisy hardware results and find good agreement with the exact diagonalization results on classical computers and noiseless simulators. In particular, we compute return probability after time $t$ and out-of-time order correlators (OTOC) which is a standard observable of quantifying the chaotic nature of quantum systems.
△ Less
Submitted 2 May, 2024; v1 submitted 29 November, 2023;
originally announced November 2023.
-
Label Poisoning is All You Need
Authors:
Rishi D. Jha,
Jonathan Hayase,
Sewoong Oh
Abstract:
In a backdoor attack, an adversary injects corrupted data into a model's training dataset in order to gain control over its predictions on images with a specific attacker-defined trigger. A typical corrupted training example requires altering both the image, by applying the trigger, and the label. Models trained on clean images, therefore, were considered safe from backdoor attacks. However, in so…
▽ More
In a backdoor attack, an adversary injects corrupted data into a model's training dataset in order to gain control over its predictions on images with a specific attacker-defined trigger. A typical corrupted training example requires altering both the image, by applying the trigger, and the label. Models trained on clean images, therefore, were considered safe from backdoor attacks. However, in some common machine learning scenarios, the training labels are provided by potentially malicious third-parties. This includes crowd-sourced annotation and knowledge distillation. We, hence, investigate a fundamental question: can we launch a successful backdoor attack by only corrupting labels? We introduce a novel approach to design label-only backdoor attacks, which we call FLIP, and demonstrate its strengths on three datasets (CIFAR-10, CIFAR-100, and Tiny-ImageNet) and four architectures (ResNet-32, ResNet-18, VGG-19, and Vision Transformer). With only 2% of CIFAR-10 labels corrupted, FLIP achieves a near-perfect attack success rate of 99.4% while suffering only a 1.8% drop in the clean test accuracy. Our approach builds upon the recent advances in trajectory matching, originally introduced for dataset distillation.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
Continuous variable quantum computation of the $O(3)$ model in 1+1 dimensions
Authors:
Raghav G. Jha,
Felix Ringer,
George Siopsis,
Shane Thompson
Abstract:
We formulate the $O(3)$ non-linear sigma model in 1+1 dimensions as a limit of a three-component scalar field theory restricted to the unit sphere in the large squeezing limit. This allows us to describe the model in terms of the continuous variable (CV) approach to quantum computing. We construct the ground state and excited states using the coupled-cluster Ansatz and find excellent agreement wit…
▽ More
We formulate the $O(3)$ non-linear sigma model in 1+1 dimensions as a limit of a three-component scalar field theory restricted to the unit sphere in the large squeezing limit. This allows us to describe the model in terms of the continuous variable (CV) approach to quantum computing. We construct the ground state and excited states using the coupled-cluster Ansatz and find excellent agreement with the exact diagonalization results for a small number of lattice sites. We then present the simulation protocol for the time evolution of the model using CV gates and obtain numerical results using a photonic quantum simulator. We expect that the methods developed in this work will be useful for exploring interesting dynamics for a wide class of sigma models and gauge theories, as well as for simulating scattering events on quantum hardware in the coming decades.
△ Less
Submitted 14 May, 2024; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Studying Accuracy of Machine Learning Models Trained on Lab Lifting Data in Solving Real-World Problems Using Wearable Sensors for Workplace Safety
Authors:
Joseph Bertrand,
Nick Griffey,
Ming-Lun Lu,
Rashmi Jha
Abstract:
Porting ML models trained on lab data to real-world situations has long been a challenge. This paper discusses porting a lab-trained lifting identification model to the real-world. With performance much lower than on training data, we explored causes of the failure and proposed four potential solutions to increase model performance
Porting ML models trained on lab data to real-world situations has long been a challenge. This paper discusses porting a lab-trained lifting identification model to the real-world. With performance much lower than on training data, we explored causes of the failure and proposed four potential solutions to increase model performance
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Linking Symptom Inventories using Semantic Textual Similarity
Authors:
Eamonn Kennedy,
Shashank Vadlamani,
Hannah M Lindsey,
Kelly S Peterson,
Kristen Dams OConnor,
Kenton Murray,
Ronak Agarwal,
Houshang H Amiri,
Raeda K Andersen,
Talin Babikian,
David A Baron,
Erin D Bigler,
Karen Caeyenberghs,
Lisa Delano-Wood,
Seth G Disner,
Ekaterina Dobryakova,
Blessen C Eapen,
Rachel M Edelstein,
Carrie Esopenko,
Helen M Genova,
Elbert Geuze,
Naomi J Goodrich-Hunsaker,
Jordan Grafman,
Asta K Haberg,
Cooper B Hodges
, et al. (57 additional authors not shown)
Abstract:
An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores…
▽ More
An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores across previously incongruous symptom inventories. We tested the ability of four pre-trained STS models to screen thousands of symptom description pairs for related content - a challenging task typically requiring expert panels. Models were tasked to predict symptom severity across four different inventories for 6,607 participants drawn from 16 international data sources. The STS approach achieved 74.8% accuracy across five tasks, outperforming other models tested. This work suggests that incorporating contextual, semantic information can assist expert decision-making processes, yielding gains for both general and disease-specific clinical assessment.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Adversarial Illusions in Multi-Modal Embeddings
Authors:
Tingwei Zhang,
Rishi Jha,
Eugene Bagdasaryan,
Vitaly Shmatikov
Abstract:
Multi-modal embeddings encode texts, images, thermal images, sounds, and videos into a single embedding space, aligning representations across different modalities (e.g., associate an image of a dog with a barking sound). In this paper, we show that multi-modal embeddings can be vulnerable to an attack we call "adversarial illusions." Given an image or a sound, an adversary can perturb it to make…
▽ More
Multi-modal embeddings encode texts, images, thermal images, sounds, and videos into a single embedding space, aligning representations across different modalities (e.g., associate an image of a dog with a barking sound). In this paper, we show that multi-modal embeddings can be vulnerable to an attack we call "adversarial illusions." Given an image or a sound, an adversary can perturb it to make its embedding close to an arbitrary, adversary-chosen input in another modality.
These attacks are cross-modal and targeted: the adversary can align any image or sound with any target of his choice. Adversarial illusions exploit proximity in the embedding space and are thus agnostic to downstream tasks and modalities, enabling a wholesale compromise of current and future tasks, as well as modalities not available to the adversary. Using ImageBind and AudioCLIP embeddings, we demonstrate how adversarially aligned inputs, generated without knowledge of specific downstream tasks, mislead image generation, text generation, zero-shot classification, and audio retrieval.
We investigate transferability of illusions across different embeddings and develop a black-box version of our method that we use to demonstrate the first adversarial alignment attack on Amazon's commercial, proprietary Titan embedding. Finally, we analyze countermeasures and evasion attacks.
△ Less
Submitted 16 June, 2024; v1 submitted 22 August, 2023;
originally announced August 2023.
-
Large Language Models as Zero-Shot Conversational Recommenders
Authors:
Zhankui He,
Zhouhang Xie,
Rahul Jha,
Harald Steck,
Dawen Liang,
Yesu Feng,
Bodhisattwa Prasad Majumder,
Nathan Kallus,
Julian McAuley
Abstract:
In this paper, we present empirical studies on conversational recommendation tasks using representative large language models in a zero-shot setting with three primary contributions. (1) Data: To gain insights into model behavior in "in-the-wild" conversational recommendation scenarios, we construct a new dataset of recommendation-related conversations by scraping a popular discussion website. Thi…
▽ More
In this paper, we present empirical studies on conversational recommendation tasks using representative large language models in a zero-shot setting with three primary contributions. (1) Data: To gain insights into model behavior in "in-the-wild" conversational recommendation scenarios, we construct a new dataset of recommendation-related conversations by scraping a popular discussion website. This is the largest public real-world conversational recommendation dataset to date. (2) Evaluation: On the new dataset and two existing conversational recommendation datasets, we observe that even without fine-tuning, large language models can outperform existing fine-tuned conversational recommendation models. (3) Analysis: We propose various probing tasks to investigate the mechanisms behind the remarkable performance of large language models in conversational recommendation. We analyze both the large language models' behaviors and the characteristics of the datasets, providing a holistic understanding of the models' effectiveness, limitations and suggesting directions for the design of future conversational recommenders
△ Less
Submitted 19 August, 2023;
originally announced August 2023.
-
Toward quantum computations of the $O(3)$ model using qumodes
Authors:
Raghav G. Jha,
Felix Ringer,
George Siopsis,
Shane Thompson
Abstract:
We express the discrete 1+1-dimensional $O(3)$ non-linear sigma model (NL$σ$M) in a form well-suited for the continuous variable approach to quantum computing. Within the Schwinger boson formulation, we need two qumodes (quantum-mechanical oscillators) at each lattice site. We envision that it might be possible to reach the scaling regime of this model and observe asymptotic freedom on near-term p…
▽ More
We express the discrete 1+1-dimensional $O(3)$ non-linear sigma model (NL$σ$M) in a form well-suited for the continuous variable approach to quantum computing. Within the Schwinger boson formulation, we need two qumodes (quantum-mechanical oscillators) at each lattice site. We envision that it might be possible to reach the scaling regime of this model and observe asymptotic freedom on near-term photonic quantum devices in the coming decade.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Evaluation of insulating behavior by Pb Substitution and Pressure-Induced Superconductivity in La2O2Bi3-xPb1+xS6
Authors:
Rajveer Jha,
Valenta Jarosla,
Naohito Tsujii,
Takashi Naka,
Takeshi Kawahata,
Chiduru Kawashima,
Hiroki Takahashi,
Takao Mori,
Yoshikazu Mizuguchi
Abstract:
We report synthesis, characterization, and physical properties of layered bismuth-sulfide compounds La2O2Bi3-xPb1+xS6. We synthesized a new La2O2Bi3PbS6 compound, whose crystal structure is similar to those of the La2O2Bi3AgS6 superconductor or La2O2Bi2Pb2S6 (insulator) with a four-layer-type conducting layer. The crystal structure of La2O2Bi3PbS6 is characterized in a tetragonal P4/nmm space grou…
▽ More
We report synthesis, characterization, and physical properties of layered bismuth-sulfide compounds La2O2Bi3-xPb1+xS6. We synthesized a new La2O2Bi3PbS6 compound, whose crystal structure is similar to those of the La2O2Bi3AgS6 superconductor or La2O2Bi2Pb2S6 (insulator) with a four-layer-type conducting layer. The crystal structure of La2O2Bi3PbS6 is characterized in a tetragonal P4/nmm space group, and the lattice parameters are a = 4.084(1) Å and c = 19.71(2) Å. The obtained La2O2Bi3PbS6 sample exhibits narrow gap semiconductor (metallic-like) transport behavior with an anomaly near the 160 K. A metallic-like to insulator transition has been observed through Pb substitution, with increasing x in La2O2Bi3-xPb1+xS6. Furthermore, we applied external pressure for x = 0 and observed pressure-induced superconductivity. The onset of superconductivity appeared at 0.93 GPa, and the highest transition temperature was 3.1 K at 2.21 GPa.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Validating polyp and instrument segmentation methods in colonoscopy through Medico 2020 and MedAI 2021 Challenges
Authors:
Debesh Jha,
Vanshali Sharma,
Debapriya Banik,
Debayan Bhattacharya,
Kaushiki Roy,
Steven A. Hicks,
Nikhil Kumar Tomar,
Vajira Thambawita,
Adrian Krenzer,
Ge-Peng Ji,
Sahadev Poudel,
George Batchkala,
Saruar Alam,
Awadelrahman M. A. Ahmed,
Quoc-Huy Trinh,
Zeshan Khan,
Tien-Phat Nguyen,
Shruti Shrestha,
Sabari Nathan,
Jeonghwan Gwak,
Ritika K. Jha,
Zheyuan Zhang,
Alexander Schlaefer,
Debotosh Bhattacharjee,
M. K. Bhuyan
, et al. (8 additional authors not shown)
Abstract:
Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has…
▽ More
Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has emerged as a promising solution to this challenge as it can assist endoscopists in detecting and classifying overlooked polyps and abnormalities in real time. In addition to the algorithm's accuracy, transparency and interpretability are crucial to explaining the whys and hows of the algorithm's prediction. Further, most algorithms are developed in private data, closed source, or proprietary software, and methods lack reproducibility. Therefore, to promote the development of efficient and transparent methods, we have organized the "Medico automatic polyp segmentation (Medico 2020)" and "MedAI: Transparency in Medical Image Segmentation (MedAI 2021)" competitions. We present a comprehensive summary and analyze each contribution, highlight the strength of the best-performing methods, and discuss the possibility of clinical translations of such methods into the clinic. For the transparency task, a multi-disciplinary team, including expert gastroenterologists, accessed each submission and evaluated the team based on open-source practices, failure case analysis, ablation studies, usability and understandability of evaluations to gain a deeper understanding of the models' credibility for clinical deployment. Through the comprehensive analysis of the challenge, we not only highlight the advancements in polyp and surgical instrument segmentation but also encourage qualitative evaluation for building more transparent and understandable AI-based colonoscopy systems.
△ Less
Submitted 6 May, 2024; v1 submitted 30 July, 2023;
originally announced July 2023.
-
Unified Embedding Based Personalized Retrieval in Etsy Search
Authors:
Rishikesh Jha,
Siddharth Subramaniyam,
Ethan Benjamin,
Thrivikrama Taula
Abstract:
Embedding-based neural retrieval is a prevalent approach to address the semantic gap problem which often arises in product search on tail queries. In contrast, popular queries typically lack context and have a broad intent where additional context from users historical interaction can be helpful. In this paper, we share our novel approach to address both: the semantic gap problem followed by an en…
▽ More
Embedding-based neural retrieval is a prevalent approach to address the semantic gap problem which often arises in product search on tail queries. In contrast, popular queries typically lack context and have a broad intent where additional context from users historical interaction can be helpful. In this paper, we share our novel approach to address both: the semantic gap problem followed by an end to end trained model for personalized semantic retrieval. We propose learning a unified embedding model incorporating graph, transformer and term-based embeddings end to end and share our design choices for optimal tradeoff between performance and efficiency. We share our learnings in feature engineering, hard negative sampling strategy, and application of transformer model, including a novel pre-training strategy and other tricks for improving search relevance and deploying such a model at industry scale. Our personalized retrieval model significantly improves the overall search experience, as measured by a 5.58% increase in search purchase rate and a 2.63% increase in site-wide conversion rate, aggregated across multiple A/B tests - on live traffic.
△ Less
Submitted 25 September, 2024; v1 submitted 7 June, 2023;
originally announced June 2023.
-
GPU-Acceleration of Tensor Renormalization with PyTorch using CUDA
Authors:
Raghav G. Jha,
Abhishek Samlodia
Abstract:
We show that numerical computations based on tensor renormalization group (TRG) methods can be significantly accelerated with PyTorch on graphics processing units (GPUs) by leveraging NVIDIA's Compute Unified Device Architecture (CUDA). We find improvement in the runtime and its scaling with bond dimension for two-dimensional systems. Our results establish that the utilization of GPU resources is…
▽ More
We show that numerical computations based on tensor renormalization group (TRG) methods can be significantly accelerated with PyTorch on graphics processing units (GPUs) by leveraging NVIDIA's Compute Unified Device Architecture (CUDA). We find improvement in the runtime and its scaling with bond dimension for two-dimensional systems. Our results establish that the utilization of GPU resources is essential for future precision computations with TRG.
△ Less
Submitted 15 September, 2023; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Dynamics and Charge Fluctuations in Large-q Sachdev-Ye-Kitaev Lattices
Authors:
Rishabh Jha,
Jan C. Louw
Abstract:
It is known that the large-$q$ complex Sachdev-Ye-Kitaev (SYK) dot thermalizes instantaneously under rather general dynamical protocols. We consider a lattice of such dots coupled together, allowing for $r/2$ body hopping of particles between nearest neighbors. We develop a rather general analytical framework to study the dynamics to leading order in $1/q$ on such a lattice, allowing for arbitrary…
▽ More
It is known that the large-$q$ complex Sachdev-Ye-Kitaev (SYK) dot thermalizes instantaneously under rather general dynamical protocols. We consider a lattice of such dots coupled together, allowing for $r/2$ body hopping of particles between nearest neighbors. We develop a rather general analytical framework to study the dynamics to leading order in $1/q$ on such a lattice, allowing for arbitrary time dependent couplings, hence general dynamical protocols. We find that the physics of the diffusive case $r>2$ is effectively the same as the kinetic case $r=2$, assuming $r=\mathcal{O}(q^0)$. Remarkably, we find that the local charge densities $\mathcal{Q}_i$ form a closed set of equations. They however only show fluctuations of the order $\mathcal{O}(\mathcal{Q}_i/q)$, hence remaining constant in the limit $q\rightarrow \infty$. Despite this effective lack of charge dynamics, the dots do not in fact behave as isolated lattice sites which would thermalize instantaneously. Indeed, we show via a proof by contradiction that such instantaneously thermalize is not generally possible for a connected lattice. Importantly, the results are shown to be independent of the dimensionality of the lattice.
△ Less
Submitted 25 July, 2024; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Notes on Quantum Computation and Information
Authors:
Raghav G. Jha
Abstract:
We discuss fundamentals of quantum computing and information - quantum gates, circuits, algorithms, theorems, error correction, and provide collection of QISKIT programs and exercises for the interested reader.
We discuss fundamentals of quantum computing and information - quantum gates, circuits, algorithms, theorems, error correction, and provide collection of QISKIT programs and exercises for the interested reader.
△ Less
Submitted 7 August, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Tactile based Intelligence Touch Technology in IoT configured WCN in B5G/6G-A Survey
Authors:
Mantisha Gupta,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Touch enabled sensation and actuation is expected to be one of the most promising, straightforward and important uses of the next generation communication networks. In B5G/6G need for low latency, the infrastructure should be reconfigurable and intelligent to be able to work in real time and interoperable with the existing wireless network. It has a drastic impact on the society due to its high pr…
▽ More
Touch enabled sensation and actuation is expected to be one of the most promising, straightforward and important uses of the next generation communication networks. In B5G/6G need for low latency, the infrastructure should be reconfigurable and intelligent to be able to work in real time and interoperable with the existing wireless network. It has a drastic impact on the society due to its high precision, accuracy, reliability and efficiency and the ability to connect a user from far away or remote areas. Such a touch-enabled interaction is primarily concerned with the real time transmission of the tactile based haptic information over the internet, in addition to the usual audio, visual and data traffic, thus enabling a paradigm shift towards establishing a real time control and steering communication system. The existing system latency and overhead creates delays and limits the usability of the future applications. This study proposes an intelligent touch-enabled system for B5G/6G and IoT based wireless communication network that incorporates the AR/VR technologies. The tactile internet and network slicing serve as the backbone of the touch technology which incorporates intelligence from techniques such as AI/ML/DL. The survey introduces a layered and interfacing architecture complete with its E2E solution for the intelligent touch based wireless communication system. It is anticipated for the next generation system to provide numerous opportunities for various sectors utilizing AR/VR technology in robotics and healthcare facilities, all with the intention of helping in addressing severe problems faced by the society. Conclusively the article presents a few use cases concerning the deployment of touch infrastructure in automation and robotics as well as in intelligent healthcare systems, assisting in the diagnosis and treatment of the prevailing COVID-19 cases.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Plasmonic Dimers Enhanced Polarized Single Photon Coupled to Optical Nanowire
Authors:
Subrat Sahu,
Harsh Mishra,
Rajan Jha
Abstract:
We propose a system for guiding plasmon-enhanced polarized single photons into optical nanowire (ONW) guided modes. It is shown that spontaneous emission properties of quantum emitters (QEs) can be strongly enhanced in the presence of gold nanorod dimer (GNRD) leading to the emission of highly polarized and bright single photons. We have calculated that a high Purcell factor of 279, coupling effic…
▽ More
We propose a system for guiding plasmon-enhanced polarized single photons into optical nanowire (ONW) guided modes. It is shown that spontaneous emission properties of quantum emitters (QEs) can be strongly enhanced in the presence of gold nanorod dimer (GNRD) leading to the emission of highly polarized and bright single photons. We have calculated that a high Purcell factor of 279, coupling efficiency of 11 %, and degree of polarization (DOP) of single photons is estimated to be as high as 99.57% in the guided modes of ONW by suitably placing a QE on an optimized location of the GNRD system. This proposed hybrid quantum system can be in-line with fiber networks, opening the door for possible quantum information processing and quantum cryptography applications.
△ Less
Submitted 17 December, 2022;
originally announced December 2022.
-
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the comm…
▽ More
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Persuasion Strategies in Advertisements
Authors:
Yaman Kumar Singla,
Rajat Jha,
Arunim Gupta,
Milan Aggarwal,
Aditya Garg,
Tushar Malyan,
Ayush Bhardwaj,
Rajiv Ratn Shah,
Balaji Krishnamurthy,
Changyou Chen
Abstract:
Modeling what makes an advertisement persuasive, i.e., eliciting the desired response from consumer, is critical to the study of propaganda, social psychology, and marketing. Despite its importance, computational modeling of persuasion in computer vision is still in its infancy, primarily due to the lack of benchmark datasets that can provide persuasion-strategy labels associated with ads. Motivat…
▽ More
Modeling what makes an advertisement persuasive, i.e., eliciting the desired response from consumer, is critical to the study of propaganda, social psychology, and marketing. Despite its importance, computational modeling of persuasion in computer vision is still in its infancy, primarily due to the lack of benchmark datasets that can provide persuasion-strategy labels associated with ads. Motivated by persuasion literature in social psychology and marketing, we introduce an extensive vocabulary of persuasion strategies and build the first ad image corpus annotated with persuasion strategies. We then formulate the task of persuasion strategy prediction with multi-modal learning, where we design a multi-task attention fusion model that can leverage other ad-understanding tasks to predict persuasion strategies. Further, we conduct a real-world case study on 1600 advertising campaigns of 30 Fortune-500 companies where we use our model's predictions to analyze which strategies work with different demographics (age and gender). The dataset also provides image segmentation masks, which labels persuasion strategies in the corresponding ad images on the test split. We publicly release our code and dataset https://midas-research.github.io/persuasion-advertisements/.
△ Less
Submitted 6 May, 2023; v1 submitted 20 August, 2022;
originally announced August 2022.
-
Behavioral Model For Live Detection of Apps Based Attack
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid autho…
▽ More
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State In…
▽ More
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State Information). Depending on the achieved path loss based on the distance of the user from the BS, the user with the highest path loss is particularized for the attack. The formulation of AD divulges the increased susceptibilities of the secure network specifically for the selected legitimate user. The parameter of visibility defines the amount of AD present in the communication channel. Based on the enumerated attenuation created by the artificial dust, the parameter of secrecy rate is evaluated with varying distance of the user from the BS and the operating frequency. Furthermore, the proposed scheme of the HD attack is initiated by the intruder at the specified valid user. The strategy of the attack focuses on the continuous monitor of the uplink and attempts the spoofing attack on the downlink wherein the allocation of the resources takes place. The efficacy of the proposed approach is corroborated through the examination of simulation results. The assessment of the proposed mechanism highlights notable characteristics as compared to the conventional methodology of the FD (Full- Duplex) attack.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Hyper-Universal Policy Approximation: Learning to Generate Actions from a Single Image using Hypernets
Authors:
Dimitrios C. Gklezakos,
Rishi Jha,
Rajesh P. N. Rao
Abstract:
Inspired by Gibson's notion of object affordances in human vision, we ask the question: how can an agent learn to predict an entire action policy for a novel object or environment given only a single glimpse? To tackle this problem, we introduce the concept of Universal Policy Functions (UPFs) which are state-to-action mappings that generalize not only to new goals but most importantly to novel, u…
▽ More
Inspired by Gibson's notion of object affordances in human vision, we ask the question: how can an agent learn to predict an entire action policy for a novel object or environment given only a single glimpse? To tackle this problem, we introduce the concept of Universal Policy Functions (UPFs) which are state-to-action mappings that generalize not only to new goals but most importantly to novel, unseen environments. Specifically, we consider the problem of efficiently learning such policies for agents with limited computational and communication capacity, constraints that are frequently encountered in edge devices. We propose the Hyper-Universal Policy Approximator (HUPA), a hypernetwork-based model to generate small task- and environment-conditional policy networks from a single image, with good generalization properties. Our results show that HUPAs significantly outperform an embedding-based alternative for generated policies that are size-constrained. Although this work is restricted to a simple map-based navigation task, future work includes applying the principles behind HUPAs to learning more general affordances for objects and environments.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Introduction to Hamiltonian Formulation of General Relativity and Homogeneous Cosmologies
Authors:
Rishabh Jha
Abstract:
We give a pedagogical introduction to the Hamiltonian formalism of general relativity at an advanced undergraduate and graduate levels. After covering the mathematical pre-requisites as well as the $3+1$-decomposition of spacetime, we proceed to discuss the Arnowitt-Deser-Misner (ADM) formalism (a Hamiltonian approach) of general relativity. Then we proceed to give a brief but self-contained intro…
▽ More
We give a pedagogical introduction to the Hamiltonian formalism of general relativity at an advanced undergraduate and graduate levels. After covering the mathematical pre-requisites as well as the $3+1$-decomposition of spacetime, we proceed to discuss the Arnowitt-Deser-Misner (ADM) formalism (a Hamiltonian approach) of general relativity. Then we proceed to give a brief but self-contained introduction to homogeneous (but not necessarily isotropic) universes and discuss the associated Bianchi classification. We first study their dynamics in the Lagrangian formulation, followed by the Hamiltonian formulation to show the equivalence of both approaches. We present a variety of examples to illustrate the ADM formalism: (i) free & massless scalar field coupled to homogeneous (in particular, Bianchi IX) universe, (ii) scalar field with a potential term coupled to Bianchi IX universe, (iii) electromagnetic field coupled to gravity in general, and (iv) electromagnetic field coupled to Bianchi IX universe.
△ Less
Submitted 14 August, 2023; v1 submitted 6 April, 2022;
originally announced April 2022.
-
Stacked Tensegrity Mechanism for Medical Application
Authors:
Dhruva Khanzode,
Ranjan Jha,
Emilie Duchalais,
Damien Chablat
Abstract:
In this article a multi-segmented planar tensegrity mechanism was presented. This mechanism has a three-segment structure with each segment residing on top of another. The size of the segments may decrease proportionally from base to top, resulting in a tapered shape from base to tip like an elephant trunk. The system was mechanically formulated as having linear springs and cables functioning as a…
▽ More
In this article a multi-segmented planar tensegrity mechanism was presented. This mechanism has a three-segment structure with each segment residing on top of another. The size of the segments may decrease proportionally from base to top, resulting in a tapered shape from base to tip like an elephant trunk. The system was mechanically formulated as having linear springs and cables functioning as actuators. The singularities, as well as the stability of the parallel mechanism, were analyzed by using the principle of minimum energy. Optimization was also done to obtain the greatest angular deflection for a segment according to a ratio between the size of the base and the moving platform of the robotic system. The result of this work is a family of mechanisms that can generate the same workspace for different stability properties.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Pressure tuning of localization and superconductivity in LaOPbBiS$_{3}$ and La$_{2}$O$_{2}$Bi$_{3}$AgS$_{6}$
Authors:
Y. Yuan,
H. Arima,
M. Masaoka,
Y. Naito,
Y. Hijikata,
R. Jha,
Y. Mizuguchi,
K. Matsubayashi
Abstract:
We report the effect of pressure on the electrical transport properties of the four-layer-type bismuth chalcogenide semiconductors LaOPbBiS$_{3}$ and La$_{2}$O$_{2}$Bi$_{3}$AgS$_{6}$ and present the discovery of a pressure-induced superconductivity. In both compounds, the semiconductorlike behavior concomitant with an anomaly in the more insulating state is gradually suppressed with increasing pre…
▽ More
We report the effect of pressure on the electrical transport properties of the four-layer-type bismuth chalcogenide semiconductors LaOPbBiS$_{3}$ and La$_{2}$O$_{2}$Bi$_{3}$AgS$_{6}$ and present the discovery of a pressure-induced superconductivity. In both compounds, the semiconductorlike behavior concomitant with an anomaly in the more insulating state is gradually suppressed with increasing pressure while the superconductivity develops. The obtained phase diagrams, in sharp contrast with the interplay between the conventional charge density waves and superconductivity, suggest that the enhancement of the superconductivity is due to the disorder near the localization threshold. These results indicate that pressure tuning of the local disorder in four-layer-type bismuth chalcogenides provides an attractive opportunity to study the interplay between disorder and superconductivity.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Non-perturbative phase structure of the bosonic BMN matrix model
Authors:
Navdeep Singh Dhindsa,
Raghav G. Jha,
Anosh Joseph,
Abhishek Samlodia,
David Schaich
Abstract:
We study the bosonic part of the BMN matrix model for wide ranges of temperatures, values of the deformation parameter, and numbers of colors $16 \leq N \leq 48$. Using lattice computations, we analyze phase transitions in the model, observing a single first-order transition from a uniform to a gapped phase for all values of the deformation parameter. We study the functional form of the dependence…
▽ More
We study the bosonic part of the BMN matrix model for wide ranges of temperatures, values of the deformation parameter, and numbers of colors $16 \leq N \leq 48$. Using lattice computations, we analyze phase transitions in the model, observing a single first-order transition from a uniform to a gapped phase for all values of the deformation parameter. We study the functional form of the dependence of the critical temperature on the deformation parameter, to describe how our results smoothly interpolate between the limits of the bosonic BFSS model and the gauged Gaussian model.
△ Less
Submitted 27 May, 2022; v1 submitted 21 January, 2022;
originally announced January 2022.