-
A Study On The Graph Formulation Of Union Closed Conjecture
Authors:
Nived J M
Abstract:
The Union Closed Conjecture, posed by Peter Frankl in 1979, is one of the most renowned problems in Combinatorics. Its appeal stems from the simplicity of its statement and the potential complexity of its solution. The conjecture asserts that in any union-closed family of sets, there exists an element that belongs to at least half of the sets in the family.
This paper explores the graph-theoreti…
▽ More
The Union Closed Conjecture, posed by Peter Frankl in 1979, is one of the most renowned problems in Combinatorics. Its appeal stems from the simplicity of its statement and the potential complexity of its solution. The conjecture asserts that in any union-closed family of sets, there exists an element that belongs to at least half of the sets in the family.
This paper explores the graph-theoretic formulation of the conjecture and establishes connections between the set-based and graph-based formulations. Through this connection, we derive new results and provide proofs for specific classes of graphs. Additionally, by analyzing the distribution of pendant vertices within various graphs, we demonstrate the validity of the conjecture for a broader range of graph classes.
△ Less
Submitted 3 September, 2024;
originally announced September 2024.
-
Calorie Burn Estimation in Community Parks Through DLICP: A Mathematical Modelling Approach
Authors:
Abhishek Sebastian,
Annis Fathima A,
Pragna R,
Madhan Kumar S,
Jesher Joshua M
Abstract:
Community parks play a crucial role in promoting physical activity and overall well-being. This study introduces DLICP (Deep Learning Integrated Community Parks), an innovative approach that combines deep learning techniques specifically, face recognition technology with a novel walking activity measurement algorithm to enhance user experience in community parks. The DLICP utilizes a camera with f…
▽ More
Community parks play a crucial role in promoting physical activity and overall well-being. This study introduces DLICP (Deep Learning Integrated Community Parks), an innovative approach that combines deep learning techniques specifically, face recognition technology with a novel walking activity measurement algorithm to enhance user experience in community parks. The DLICP utilizes a camera with face recognition software to accurately identify and track park users. Simultaneously, a walking activity measurement algorithm calculates parameters such as the average pace and calories burned, tailored to individual attributes. Extensive evaluations confirm the precision of DLICP, with a Mean Absolute Error (MAE) of 5.64 calories and a Mean Percentage Error (MPE) of 1.96%, benchmarked against widely available fitness measurement devices, such as the Apple Watch Series 6. This study contributes significantly to the development of intelligent smart park systems, enabling real-time updates on burned calories and personalized fitness tracking.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics
Authors:
Ragav V,
Jesher Joshua M,
Syed Ibrahim S P
Abstract:
Auto manufacturers and research groups are working on autonomous driving for long period and achieved significant progress. Autonomous vehicles (AV) are expected to transform road traffic reduction from current conditions, avoiding accidents and congestion. As the implementation of an autonomous vehicle ecosystem includes complex automotive technology, ethics, passenger behaviour, traffic manageme…
▽ More
Auto manufacturers and research groups are working on autonomous driving for long period and achieved significant progress. Autonomous vehicles (AV) are expected to transform road traffic reduction from current conditions, avoiding accidents and congestion. As the implementation of an autonomous vehicle ecosystem includes complex automotive technology, ethics, passenger behaviour, traffic management policies and liability etc., the maturity of AV solutions are still evolving. The proposed model to improve AV user experience, uses a hybrid AV Network of multiple connected autonomous vehicles which communicate with each other in an environment shared by human driven vehicles. The proposed Optimal AV Network (OAVN) solution provides better coordination and optimization of autonomous vehicles, improved Transportation efficiency, improved passenger comfort and safety, real-time dynamic adaption of traffic & road conditions along with improved in-cabin assistance with inputs from various sensors. The true optimal solution for this problem, is to devise an automated guidance system for vehicles in an AV network, to reach destinations in best possible routes along with passenger comfort and safety. A custom informed search model is proposed along with other heuristic goals for better user experience. The results are analysed and compared to evaluate the effectiveness of the solution and identify gaps and future enhancements.
△ Less
Submitted 17 March, 2024;
originally announced May 2024.
-
Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation
Authors:
Jesher Joshua M,
Adhithya R,
Sree Dananjay S,
M Revathi
Abstract:
Web phishing poses a dynamic threat, requiring detection systems to quickly adapt to the latest tactics. Traditional approaches of accumulating data and periodically retraining models are outpaced. We propose a novel paradigm combining federated learning and continual learning, enabling distributed nodes to continually update models on streams of new phishing data, without accumulating data. These…
▽ More
Web phishing poses a dynamic threat, requiring detection systems to quickly adapt to the latest tactics. Traditional approaches of accumulating data and periodically retraining models are outpaced. We propose a novel paradigm combining federated learning and continual learning, enabling distributed nodes to continually update models on streams of new phishing data, without accumulating data. These locally adapted models are then aggregated at a central server via federated learning. To enhance detection, we introduce a custom attention-based classifier model with residual connections, tailored for web phishing, leveraging attention mechanisms to capture intricate phishing patterns. We evaluate our hybrid learning paradigm across continual learning strategies (cumulative, replay, MIR, LwF) and model architectures through an empirical investigation. Our main contributions are: (1) a new hybrid federated-continual learning paradigm for robust web phishing detection, and (2) a novel attention + residual connections based model explicitly designed for this task, attaining 0.93 accuracy, 0.90 precision, 0.96 recall and 0.93 f1-score with the LwF strategy, outperforming traditional approaches in detecting emerging phishing threats while retaining past knowledge.
△ Less
Submitted 16 June, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Advanced Knowledge Extraction of Physical Design Drawings, Translation and conversion to CAD formats using Deep Learning
Authors:
Jesher Joshua M,
Ragav V,
Syed Ibrahim S P
Abstract:
The maintenance, archiving and usage of the design drawings is cumbersome in physical form in different industries for longer period. It is hard to extract information by simple scanning of drawing sheets. Converting them to their digital formats such as Computer-Aided Design (CAD), with needed knowledge extraction can solve this problem. The conversion of these machine drawings to its digital for…
▽ More
The maintenance, archiving and usage of the design drawings is cumbersome in physical form in different industries for longer period. It is hard to extract information by simple scanning of drawing sheets. Converting them to their digital formats such as Computer-Aided Design (CAD), with needed knowledge extraction can solve this problem. The conversion of these machine drawings to its digital form is a crucial challenge which requires advanced techniques. This research proposes an innovative methodology utilizing Deep Learning methods. The approach employs object detection model, such as Yolov7, Faster R-CNN, to detect physical drawing objects present in the images followed by, edge detection algorithms such as canny filter to extract and refine the identified lines from the drawing region and curve detection techniques to detect circle. Also ornaments (complex shapes) within the drawings are extracted. To ensure comprehensive conversion, an Optical Character Recognition (OCR) tool is integrated to identify and extract the text elements from the drawings. The extracted data which includes the lines, shapes and text is consolidated and stored in a structured comma separated values(.csv) file format. The accuracy and the efficiency of conversion is evaluated. Through this, conversion can be automated to help organizations enhance their productivity, facilitate seamless collaborations and preserve valuable design information in a digital format easily accessible. Overall, this study contributes to the advancement of CAD conversions, providing accurate results from the translating process. Future research can focus on handling diverse drawing types, enhanced accuracy in shape and line detection and extraction.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Pressure measurements in an elastically turbulent co-moving Kelvin-Helmholtz-like shear flow inside a straight Hele-Shaw cell
Authors:
Jimreeves David M
Abstract:
As an experimental model to mimic the flow of bio-fluids in the cell and the flow in tiny blood capillaries, we study the co-moving shear flow of dilute polymeric solutions. An inflection point shear flow profile is created by parallel streams moving at different speeds inside a pressure-driven Hele-Shaw cell. The broad aim is to explore the possible instability mechanisms that lead to Elastic Tur…
▽ More
As an experimental model to mimic the flow of bio-fluids in the cell and the flow in tiny blood capillaries, we study the co-moving shear flow of dilute polymeric solutions. An inflection point shear flow profile is created by parallel streams moving at different speeds inside a pressure-driven Hele-Shaw cell. The broad aim is to explore the possible instability mechanisms that lead to Elastic Turbulence, discovered two decades ago (Groisman & Steinberg 2000). The Reynolds number is kept very low ($Re < 0.1$) to eliminate any effects of inertia, ensuring that any present instabilities are purely elastic in nature. The interface is stable if the two co-moving fluids are Newtonian, but the interface becomes wavy (Varshney & Steinberg 2019; David & Steinberg 2024) and elastically turbulent with polymer solutions. Pressure spectra show clear transitions, and the spectral decays have a well-defined form ($S(P) \sim f^{-3.3}$), typical of Elastic Turbulence. Pressure drop measurements ($ΔP$) across the channel show an increase in drag up to 80% compared to the purely viscous case and exhibit transitions consistent with pressure spectra measurements. These measurements have led to an understanding that Elastic Turbulence in dilute polymeric flows can be excited at Reynolds numbers as low as 0.1, even with parallel shear flows and straight channels. This new finding overturns the two-decade understanding, that Elastic Turbulence could be achieved only in the presence of externally or internally imposed curvature/perturbation in the flow and supports the recent growing body of evidence (Steinberg 2022) which points to the presence of Elastic Turbulence in straight channels with weak perturbations and no curvatures.
△ Less
Submitted 22 January, 2024; v1 submitted 17 January, 2024;
originally announced January 2024.
-
Elastic waves in a Hele-Shaw cell with a co-moving Kelvin-Helmholtz-like parallel shear flow
Authors:
Jimreeves David M
Abstract:
We report the presence of traveling Elastic Waves in experiments featuring a shear flow in the very low Reynolds number regime (Re < 0.1) with no external curvatures or internal perturbations in the channel design. The classic Kelvin-Helmholtz type shear flow with an inflection point in its velocity profile is generated by co-moving dilute polymeric solutions moving at different speeds within a He…
▽ More
We report the presence of traveling Elastic Waves in experiments featuring a shear flow in the very low Reynolds number regime (Re < 0.1) with no external curvatures or internal perturbations in the channel design. The classic Kelvin-Helmholtz type shear flow with an inflection point in its velocity profile is generated by co-moving dilute polymeric solutions moving at different speeds within a Hele-Shaw cell. Notably, this is the first observation of Elastic waves in straight channels, with no internal or external wall curvatures or physical perturbation sources present in the flow or on the channel walls, making the differential velocity of the parallel streams the only possible source of generation of Elastic Waves. The interface between the co-moving streams displays a wavy and unsteady nature for all studied cases. Furthermore, the frequency and wave speed of the Elastic Waves are found to scale with the Weissenberg number, which is based on the velocity difference between the streams. This finding contributes to the emerging body of evidence regarding the presence of Elastic Waves in straight channels with minimal perturbation sources (Steinberg 2022).
△ Less
Submitted 22 January, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
CGC/saturation approach: Impact-parameter dependent model of perturbative QCD and combined HERA data
Authors:
Michael Sanhueza,
José Garrido M.,
Miguel Guevara
Abstract:
In this paper we confront the CGC/saturation approach of Ref.~\cite{CLMS} with the experimental combined HERA data and obtain its parameters. The model includes two features that are in accordance with our theoretical knowledge of deep inelastic scattering. These consist of: \textit{i}) the use of analytical solution for the non-linear Balitsky-Kovchegov (BK) evolution equation and \textit{ii}) th…
▽ More
In this paper we confront the CGC/saturation approach of Ref.~\cite{CLMS} with the experimental combined HERA data and obtain its parameters. The model includes two features that are in accordance with our theoretical knowledge of deep inelastic scattering. These consist of: \textit{i}) the use of analytical solution for the non-linear Balitsky-Kovchegov (BK) evolution equation and \textit{ii}) the exponential behavior of the saturation momentum on the impact parameter $b$-dependence, characterized by $Q_s$ $\propto\exp(-mb)$ which reproduces the correct behavior of the scattering amplitude at large $b$ in accord with Froissart theorem. The model results are then compared to data at small-$x$ for the structure-function of the proton $F_{2}$, the longitudinal structure function $F_{L}$, the charm structure function $F_2^{c\bar{c}}$, the exclusive vector meson ($J/ψ,φ,ρ$) production and Deeply Virtual Compton Scattering (DVCS). We obtain a good agreement for the processes in a wide kinematic range of $Q^2$ at small-$x$. Our results provide a strong guide for finding an approach, based on Color Glass Condensate/saturation effective theory for high energy QCD, to make reliable predictions from first principles and for forthcoming experiments like the Electron-Ion Collider and the LHeC.
△ Less
Submitted 7 September, 2024; v1 submitted 8 November, 2023;
originally announced November 2023.
-
Comparative Analysis of Imbalanced Malware Byteplot Image Classification using Transfer Learning
Authors:
Jayasudha M,
Ayesha Shaik,
Gaurav Pendharkar,
Soham Kumar,
Muhesh Kumar B,
Sudharshanan Balaji
Abstract:
Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared…
▽ More
Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared on the Malimg dataset, Blended dataset, and Malevis dataset to gain insights into the effect of class imbalance on model performance and convergence. It is observed that the more the class imbalance less the number of epochs required for convergence and a high variance across the performance of different models. Moreover, it is also observed that for malware detectors ResNet50, EfficientNetB0, and DenseNet169 can handle imbalanced and balanced data well. A maximum precision of 97% is obtained for the imbalanced dataset, a maximum precision of 95% is obtained on the intermediate imbalance dataset, and a maximum precision of 95% is obtained for the perfectly balanced dataset.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Learning (With) Distributed Optimization
Authors:
Aadharsh Aadhithya A,
Abinesh S,
Akshaya J,
Jayanth M,
Vishnu Radhakrishnan,
Sowmya V,
Soman K. P
Abstract:
This paper provides an overview of the historical progression of distributed optimization techniques, tracing their development from early duality-based methods pioneered by Dantzig, Wolfe, and Benders in the 1960s to the emergence of the Augmented Lagrangian Alternating Direction Inexact Newton (ALADIN) algorithm. The initial focus on Lagrangian relaxation for convex problems and decomposition st…
▽ More
This paper provides an overview of the historical progression of distributed optimization techniques, tracing their development from early duality-based methods pioneered by Dantzig, Wolfe, and Benders in the 1960s to the emergence of the Augmented Lagrangian Alternating Direction Inexact Newton (ALADIN) algorithm. The initial focus on Lagrangian relaxation for convex problems and decomposition strategies led to the refinement of methods like the Alternating Direction Method of Multipliers (ADMM). The resurgence of interest in distributed optimization in the late 2000s, particularly in machine learning and imaging, demonstrated ADMM's practical efficacy and its unifying potential. This overview also highlights the emergence of the proximal center method and its applications in diverse domains. Furthermore, the paper underscores the distinctive features of ALADIN, which offers convergence guarantees for non-convex scenarios without introducing auxiliary variables, differentiating it from traditional augmentation techniques. In essence, this work encapsulates the historical trajectory of distributed optimization and underscores the promising prospects of ALADIN in addressing non-convex optimization challenges.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
Combinatorial interpretations of binomial analogues of Fibonacci and q Fibonacci numbers
Authors:
Nived J M
Abstract:
The Fibonomial and Gaussian binomial coefficients are well known analogues of the binomial coefficients. A combinatorial interpretation for these analogues was first presented by Sagan and Savage in 2010. We introduce a slightly modified interpretation of Fibonomial coefficients. We also prove some identities involving Gaussian binomial coefficients. Recently Bergeron gave a similar interpretation…
▽ More
The Fibonomial and Gaussian binomial coefficients are well known analogues of the binomial coefficients. A combinatorial interpretation for these analogues was first presented by Sagan and Savage in 2010. We introduce a slightly modified interpretation of Fibonomial coefficients. We also prove some identities involving Gaussian binomial coefficients. Recently Bergeron gave a similar interpretation of the q Fibonomial coefficients. Inspired from the model given by Bennett, they obtained a staircase model for the q Fibonomial coefficients as well. They have provided the proofs for the same using induction and bijective correspondence techniques. We establish a new model for q Fibonacci numbers using which we can give a non bijective proof to the staircase model. We apply this model to prove some identities of q Fibonacci numbers. Also we will demonstrate some identities related to the q Fibonomial coefficients using the staircase model.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining
Authors:
Dhinakaran D,
Joe Prathap P. M
Abstract:
Data mining is the way toward mining fascinating patterns or information from an enormous level of the database. Data mining additionally opens another risk to privacy and data security.One of the maximum significant themes in the research fieldis privacy-preserving DM (PPDM). Along these lines, the investigation of ensuring delicate information and securing sensitive mined snippets of data withou…
▽ More
Data mining is the way toward mining fascinating patterns or information from an enormous level of the database. Data mining additionally opens another risk to privacy and data security.One of the maximum significant themes in the research fieldis privacy-preserving DM (PPDM). Along these lines, the investigation of ensuring delicate information and securing sensitive mined snippets of data without yielding the utility of the information in a dispersed domain.Extracted information from the analysis can be rules, clusters, meaningful patterns, trends or classification models. Privacy breach occur at some stage in the communication of data and aggregation of data. So far, many effective methods and techniques have been developed for privacy-preserving data mining, but yields into information loss and side effects on data utility and data mining effectiveness downgraded. In the f ocal point of consideration on the viability of Data Mining, Privacy and rightness should be improved and to lessen the expense.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing
Authors:
Dhinakaran D,
Joe Prathap P. M,
Selvaraj D,
Arul Kumar D,
Murugeshwari B
Abstract:
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori…
▽ More
With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algorithms that can obtain maximum privacy, data utility, and time savings while doing so. This paper proposes a unique double encryption and Transaction Splitter approach to alter the database to optimize the data utility and confidentiality tradeoff in the preparation phase. This paper presents a customized apriori approach for the mining process, which does not examine the entire database to estimate the support for each attribute. Existing distributed data solutions have a high encryption complexity and an insufficient specification of many participants' properties. Proposed solutions provide increased privacy protection against a variety of attack models. Furthermore, in terms of communication cycles and processing complexity, it is much simpler and quicker. Proposed work tests on top of a realworld transaction database demonstrate that the aim of the proposed method is realistic.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Subresiduated lattice ordered commutative monoids
Authors:
Cornejo J. M.,
San Martín H. J.,
Sígal V
Abstract:
A subresiduated lattice ordered commutative monoid (or srl-monoid for short) is a pair $(\textbf{A},Q)$ where $\textbf{A}=(A,\wedge,\vee,\cdot,e)$ is an algebra of type $(2,2,2,0)$ such that $(A,\wedge,\vee)$ is a lattice, $(A,\cdot,e)$ is a commutative monoid, $(a\vee b)\cdot c = (a\cdot c) \vee (b\cdot c)$ for every $a,b,c\in A$ and $Q$ is a subalgebra of \textbf{A} such that for each…
▽ More
A subresiduated lattice ordered commutative monoid (or srl-monoid for short) is a pair $(\textbf{A},Q)$ where $\textbf{A}=(A,\wedge,\vee,\cdot,e)$ is an algebra of type $(2,2,2,0)$ such that $(A,\wedge,\vee)$ is a lattice, $(A,\cdot,e)$ is a commutative monoid, $(a\vee b)\cdot c = (a\cdot c) \vee (b\cdot c)$ for every $a,b,c\in A$ and $Q$ is a subalgebra of \textbf{A} such that for each $a,b\in A$ there exists $c\in Q$ with the property that for all $q\in Q$, $a\cdot q \leq b$ if and only if $q\leq c$. This $c$ is denoted by $a\rightarrow_Q b$, or simply by $a\rightarrow b$.
The srl-monoids $(\textbf{A},Q)$ can be regarded as algebras $(A,\wedge,\vee,\cdot,\rightarrow, e)$ of type $(2,2,2,2,0)$. These algebras are a generalization of subresiduated lattices and commutative residuated lattices respectively.
In this paper we prove that the class of srl-monoids forms a variety. We show that the lattice of congruences of any srl-monoid is isomorphic to the lattice of its strongly convex subalgebras and we also give a description of the strongly convex subalgebra generated by a subset of the negative cone of any srl-monoid. We apply both results in order to study the lattice of congruences of any srl-monoid by giving as application alternative equational basis for the variety of srl-monoids generated by its totally ordered members.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
BioJam Camp: toward justice through bioengineering and biodesign co-learning with youth
Authors:
Callie Chappell,
Henry A. -A.,
Elvia B. O.,
Emily B.,
Bailey B.,
Jacqueline C. -M.,
Caroline Daws,
Cristian F.,
Emiliano G.,
Page Goddard,
Xavier G.,
Anne Hu,
Gabriela J.,
Kelley Langhans,
Briana Martin-Villa,
Penny M. -S.,
Jennifer M.,
Soyang N.,
Melissa Ortiz,
Aryana P.,
Trisha S,
Corinne Takara,
Emily T.,
Paloma Vazquez,
Rolando Perez
, et al. (1 additional authors not shown)
Abstract:
BioJam is a political, artistic, and educational project in which Bay Area artists, scientists, and educators collaborate with youth and communities of color to address historical exclusion of their communities in STEM fields and reframe what science can be. As an intergenerational collective, we co-learn on topics of culture (social and biological), community (cultural and ecological), and creati…
▽ More
BioJam is a political, artistic, and educational project in which Bay Area artists, scientists, and educators collaborate with youth and communities of color to address historical exclusion of their communities in STEM fields and reframe what science can be. As an intergenerational collective, we co-learn on topics of culture (social and biological), community (cultural and ecological), and creativity. We reject the notion that increasing the number of scientists of color requires inculcation in the ways of the dominant culture. Instead, we center cultural practices, traditional ways of knowing, storytelling, art, experiential learning, and community engagement to break down the framing that positions these practices as distinct from science. The goal of this work is to realize a future in which the practice of science is relatable, accessible, and liberatory.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Calibration-based abundances in the interstellar gas of galaxies from slit and IFU spectra
Authors:
Pilyugin L. S.,
Lara-Lopez M. A.,
Vilchez J. M.,
Duarte Puertas S.,
Zinchenko I. A.,
Dors O. L
Abstract:
In this work we make use of available Integral Field Unit (IFU) spectroscopy and slit spectra of several nearby galaxies. The pre-existing empirical R and S calibrations for abundance determinations are constructed using a sample of HII regions with high quality slit spectra. In this paper, we test the applicability of those calibrations to the IFU spectra. We estimate the calibration-based abunda…
▽ More
In this work we make use of available Integral Field Unit (IFU) spectroscopy and slit spectra of several nearby galaxies. The pre-existing empirical R and S calibrations for abundance determinations are constructed using a sample of HII regions with high quality slit spectra. In this paper, we test the applicability of those calibrations to the IFU spectra. We estimate the calibration-based abundances obtained using both the IFU and the slit spectroscopy for eight nearby galaxies. The median values of the slit and IFU spectra-based abundances in bins of 0.1 in fractional radius Rg (normalized to the optical radius) of a galaxy are determined and compared. We find that the IFU and the slit spectra-based abundances obtained through the R calibration are close to each other, the mean value of the differences of abundances is 0.005 dex and the scatter in the differences is 0.037 dex for 38 datapoints. The S calibration can produce systematically underestimated values of the IFU spectra-based abundances at high metallicities, the mean value of the differences is -0.059 dex for 21 datapoints, while at lower metallicities the mean value of the differences is -0.018 dex and the scatter is 0.045 dex for 36 data points. This evidences that the R calibration produces more consistent abundance estimations between the slit and the IFU spectra than the S calibration. We find that the same calibration can produce close estimations of the abundances using IFU spectra obtained with different spatial resolution and different spatial samplings. This is in line with the recent finding that the contribution of the diffuse ionized gas to the large aperture spectra of HII regions has a secondary effect.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
Three new brown dwarfs and a massive hot Jupiter revealed by TESS around early-type stars
Authors:
Psaridi A.,
Bouchy F.,
Lendl M.,
Grieves N.,
Stassun K. G.,
Carmichael T.,
Gill S.,
Peña Rojas P. A.,
Gan T.,
Shporer A.,
Bieryla A.,
Christiansen J. L,
Crossfield I. J. M,
Galland F. Hooton M. J. Jenkins J. M,
Jenkins J. S,
Latham D. W,
Lund M. B,
Rodriguez J. E,
Ting E. B,
Udry S. Ulmer-Moll S. Wittenmyer R. A,
Yanzhe Zhang Y.,
Zhou G.,
Addison B.,
Cointepas M.,
Collins K. A.
, et al. (18 additional authors not shown)
Abstract:
The detection and characterization of exoplanets and brown dwarfs (BDs) around massive AF-type stars is essential to investigate and constrain the impact of stellar mass on planet properties. However, such targets are still poorly explored in radial velocity (RV) surveys because they only feature a small number of stellar lines and those are usually broadened and blended by stellar rotation as wel…
▽ More
The detection and characterization of exoplanets and brown dwarfs (BDs) around massive AF-type stars is essential to investigate and constrain the impact of stellar mass on planet properties. However, such targets are still poorly explored in radial velocity (RV) surveys because they only feature a small number of stellar lines and those are usually broadened and blended by stellar rotation as well as stellar jitter. As a result, the available information about the formation and evolution of planets and BDs around hot stars is limited. We aim to increase the sample and precisely measure the masses and eccentricities of giant planets and BDs transiting AF-type stars detected by the Transiting Exoplanet Survey Satellite (TESS). We followed bright (V < 12 mag) stars with $T_{\mathrm{eff}}$ > 6200 K that host giant companions (R > 7 $\mathrm{R_{\rm \oplus}}$) using ground-based photometric observations as well as high precision RV measurements from the CORALIE, CHIRON, TRES, FEROS, and MINERVA-Australis spectrographs. In the context, we present the discovery of three BD companions, TOI-629b, TOI-1982b, and TOI-2543b, and one massive planet, TOI-1107b. From the joint analysis we find the BDs have masses between 66 and 68 $\mathrm{M_{\rm Jup}}$, periods between 7.54 and 17.17 days, and radii between 0.95 and 1.11 $\mathrm{R_{\rm Jup}}$. The hot Jupiter TOI-1107b has an orbital period of 4.08 days, a radius of 1.30 $\mathrm{R_{\rm Jup}}$, and a mass of 3.35 $\mathrm{M_{\rm Jup}}$. As a by-product of this program, we identified four low-mass eclipsing components (TOI-288b, TOI-446b, TOI-478b, and TOI-764b). Both TOI-1107b and TOI-1982b present an anomalously inflated radius with respect to the age of these systems. TOI-629 is among the hottest stars with a known transiting brown dwarf. TOI-629b and TOI-1982b are among the most eccentric brown dwarfs.
△ Less
Submitted 22 May, 2022;
originally announced May 2022.
-
OSIRIS: A New Code for Ray Tracing Around Compact Objects
Authors:
Velásquez-Cadavid J. M.,
Arrieta-Villamizar J. A.,
F. D. Lora-Clavijo,
O. M. Pimentel,
Osorio-Vargas J. E
Abstract:
The radiation observed in quasars and active galactic nuclei is mainly produced by a relativistic plasma orbiting close to the black hole event horizon, where strong gravitational effects are relevant. The observational data of such systems can be compared with theoretical models to infer the black hole and plasma properties. In the comparison process, ray tracing algorithms are essential to compu…
▽ More
The radiation observed in quasars and active galactic nuclei is mainly produced by a relativistic plasma orbiting close to the black hole event horizon, where strong gravitational effects are relevant. The observational data of such systems can be compared with theoretical models to infer the black hole and plasma properties. In the comparison process, ray tracing algorithms are essential to computing the trajectories followed by the photons from the source to our telescopes. In this paper, we present OSIRIS: a new stable FORTRAN code capable of efficiently computing null geodesics around compact objects, including general relativistic effects such as gravitational lensing, redshift, and relativistic boosting. The algorithm is based on the Hamiltonian formulation and uses different integration schemes to evolve null geodesics while tracking the error in the Hamiltonian constrain to ensure physical results. We found from an error analysis that the integration schemes are all stable, and the best one maintains an error below $10^{-11}$. Particularly, to test the robustness and ability of the code to evolve geodesics in curved spacetime, we compute the shadow and Einstein rings of a Kerr black hole with different rotation parameters and obtain the image of a thin Keplerian accretion disk around a Schwarzschild black hole. Although OSIRIS is parallelized neither with MPI nor with CUDA, the computation times are of the same order as those reported by other codes with these types of parallel computing platforms.
△ Less
Submitted 31 January, 2022;
originally announced February 2022.
-
Numerical Study of Bifurcating Flow through Sudden Expansions: Effect of divergence and geometric asymmetry
Authors:
Jithin M,
Alok Mishra,
Ashoke De,
Malay K Das
Abstract:
A numerical study of laminar flow through symmetric and slightly asymmetric sudden expansion, of expansion ratio 1:3, in channels with increasing cross section, is carried out using two different approaches - Conventional CFD and Lattice Boltzmann Method. The effect of divergence of walls of the channel, after a sudden expansion, on the symmetry of flow and recirculation is studied for various Rey…
▽ More
A numerical study of laminar flow through symmetric and slightly asymmetric sudden expansion, of expansion ratio 1:3, in channels with increasing cross section, is carried out using two different approaches - Conventional CFD and Lattice Boltzmann Method. The effect of divergence of walls of the channel, after a sudden expansion, on the symmetry of flow and recirculation is studied for various Reynolds numbers. It is seen that the angles of the walls play an active role in disrupting the symmetry of flow. For non-parallel walls, the symmetry breaking bifurcation phenomenon no longer exists and the loss of symmetry is a gradual process. The effect of asymmetry of geometry on flow is also studied by considering two types of asymmetry - First type is at the plane of expansion where the steps on either side are of unequal heights, while the second one deals the walls of the channel are at a different inclination with the direction of inflow. The present study reveals that small asymmetry impedes the sharp transition and thus smoothens the pitchfork bifurcation. Increased asymmetry finally leads to the unique solution of the governing Equations, indicating complete loss of bifurcation pattern.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Pore-scale Simulation of Shear-Thinning Fluid Flow using Lattice Boltzmann Method
Authors:
Jithin M.,
Nimish Kumar,
Ashoke De,
Malay K. Das
Abstract:
Present work attempts to identify the roles of flow- and geometric-variables on the scaling factor which is a necessary parameter for modeling the apparent viscosity of non-Newtonian fluid in porous media. While idealizing the porous media microstructure as arrays of circular and square cylinders, present study uses multi-relaxation time lattice Boltzmann method to conduct pore-scale simulation of…
▽ More
Present work attempts to identify the roles of flow- and geometric-variables on the scaling factor which is a necessary parameter for modeling the apparent viscosity of non-Newtonian fluid in porous media. While idealizing the porous media microstructure as arrays of circular and square cylinders, present study uses multi-relaxation time lattice Boltzmann method to conduct pore-scale simulation of shear thinning non-Newtonian fluid flow. Variation in the size and inclusion ratio of the solid cylinders generates wide range of porous media with varying porosity and permeability. Present study also used stochastic reconstruction technique to generate realistic, random porous microstructures. For each case, pore-scale fluid flow simulation enables the calculation of equivalent viscosity based on the computed shear rate within the pores. It is observed that the scaling factor has strong dependence on porosity, permeability, tortuosity and the percolation threshold, while approaching the maximum value at the percolation threshold porosity. Present investigation quantifies and proposes meaningful correlations between the scaling factor and the macroscopic properties of the porous media.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Bilayer graphene in magnetic fields generated by supersymmetry
Authors:
David J. Fernández C.,
Juan D. García M.,
Daniel O-Campa
Abstract:
The effective Hamiltonian for electrons in bilayer graphene with applied magnetic fields is solved through second-order supersymmetric quantum mechanics. This method transforms the corresponding eigenvalue problem into two intertwined one dimensional stationary Schrödinger equations whose potentials are determined by choosing at most two seed solutions. In this paper new kinds of magnetic fields a…
▽ More
The effective Hamiltonian for electrons in bilayer graphene with applied magnetic fields is solved through second-order supersymmetric quantum mechanics. This method transforms the corresponding eigenvalue problem into two intertwined one dimensional stationary Schrödinger equations whose potentials are determined by choosing at most two seed solutions. In this paper new kinds of magnetic fields associated to non-shape-invariant SUSY partner potentials are generated. Analytic solutions for these magnetic fields are found, the associated spectrum is analyzed, and the probability and current densities are explored.
△ Less
Submitted 31 March, 2021; v1 submitted 13 January, 2021;
originally announced January 2021.
-
Electron in bilayer graphene with magnetic fields leading to shape invariant potentials
Authors:
David J Fernández C,
Juan D García M,
Daniel O-Campa
Abstract:
The quantum behavior of electrons in bilayer graphene with applied magnetic fields is addressed. By using second-order supersymmetric quantum mechanics the problem is transformed into two intertwined one dimensional stationary Schrödinger equations whose potentials are required to be shape invariant. Analytical solutions for the energy bound states are obtained for several magnetic fields. The ass…
▽ More
The quantum behavior of electrons in bilayer graphene with applied magnetic fields is addressed. By using second-order supersymmetric quantum mechanics the problem is transformed into two intertwined one dimensional stationary Schrödinger equations whose potentials are required to be shape invariant. Analytical solutions for the energy bound states are obtained for several magnetic fields. The associated spectrum is analyzed, and the probability and current densities are determined.
△ Less
Submitted 1 September, 2020; v1 submitted 2 June, 2020;
originally announced June 2020.
-
Lightning Impulse Current Tests on some Electroconductive Fabrics
Authors:
Jorge A. Cristancho C.,
Carlos A. Rivera G.,
Jorge E. Rodriguez M.,
John J. Pantoja A.,
Liz K. Herrera Q.,
Francisco Roman
Abstract:
On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polym…
▽ More
On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polymeric film. Under laboratory conditions, each sample was subjected to several lengthwise subsequent lightning-like currents of 8/20 us standard waveform, recording both voltage and current signals. Optical and scanning electron microscope observations were performed after tests, revealing some patterns or morphological changes on the fabric surface. Despite these changes, the investigated conductive textiles withstand the several lightning impulse currents applied. Results suggest that some conductive fabrics could be used in personal mobile shelters, to protect human beings against the earth potential rise caused by a close lightning discharge.
△ Less
Submitted 2 May, 2023; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Null paths on a toroidal topological black hole in conformalWeyl gravity
Authors:
J. R. Villanueva,
Francisco Tapia,
Martín Molina,
Marco Olivares
Abstract:
The motion of massless particles on the background of a toroidal topological black hole is analyzed in the context of conformal Weyl gravity. Null geodesics, in terms of the Jacobi elliptic functions, are found analytically. In addition, the Sagnac effect in this space-time is characterized, and we find a strong condition in the theory's parameters that is required for its existence.
The motion of massless particles on the background of a toroidal topological black hole is analyzed in the context of conformal Weyl gravity. Null geodesics, in terms of the Jacobi elliptic functions, are found analytically. In addition, the Sagnac effect in this space-time is characterized, and we find a strong condition in the theory's parameters that is required for its existence.
△ Less
Submitted 13 August, 2018;
originally announced August 2018.
-
IMEX based Multi-Scale Time Advancement in ODTLES
Authors:
Christoph Glawe,
Juan A. Medina M.,
Heiko Schmidt
Abstract:
In this paper we overcome a key problem in an otherwise highly potential approach to study turbulent flows, ODTLES (One-Dimensional Turbulence Large Eddy Simulation). From a methodological point of view, ODTLES is an approach in between Direct Numerical Simulations (DNS) and averaged/filtered approaches like RANS (Reynolds Averaged Navier-Stokes) or LES (Large Eddy Simulations). In ODTLES, a set o…
▽ More
In this paper we overcome a key problem in an otherwise highly potential approach to study turbulent flows, ODTLES (One-Dimensional Turbulence Large Eddy Simulation). From a methodological point of view, ODTLES is an approach in between Direct Numerical Simulations (DNS) and averaged/filtered approaches like RANS (Reynolds Averaged Navier-Stokes) or LES (Large Eddy Simulations). In ODTLES, a set of 1D ODT models is embedded in a coarse grained 3D LES. On the ODT scale, the turbulent advection is modeled as a sequence of stochastic eddy events, also known as triplet maps, while the other (deterministic) terms are fully resolved in space (along the ODT- line) and time. Schmidt et al. first (2008) introduced ODTLES and Gonzalez et al. (2011) applied the model for a variety of wall-bounded flow problems. Although the results were notable for a first proof of concept, the numerical methods used are subject to debate. First of all, an unstable discretization for the large scale 3D advective terms was used as shown by Glawe (2013). The scheme can be stabilized by reducing the CFL number for the explicitly discretized LES terms to the order of the small scale ODT time step, but this of course reduces the advantage of the ODTLES multi-scale approach. The stochastic ODT eddies were also allowed to overlap two LES cells introducing an artificial smoothing (stabilizing) effect. Glawe (2013) limited the overlap consistently to one LES cell and used a stable Runge Kutta (RK) discretization, however maintaining the low CFL number problem. In this paper we adapt a new implicit/explicit (IMEX) time scheme to ODTLES in order to remedy the small CFL number issue.
△ Less
Submitted 5 June, 2018;
originally announced June 2018.
-
The downwind hemisphere of the heliosphere: Eight years of IBEX-Lo observations
Authors:
A. Galli,
P. Wurz,
N. A. Schwadron,
H. Kucharek,
E. Möbius,
M. Bzowski,
J. M.,
Sokół,
M. A. Kubiak,
S. A. Fuselier,
H. O. Funsten,
D. J. McComas
Abstract:
We present a comprehensive study of energetic neutral atoms (ENAs) of 10 eV to 2.5 keV from the downwind hemisphere of the heliosphere. These ENAs are believed to originate mostly from pickup protons and solar wind protons in the inner heliosheath. This study includes all low-energy observations made with the Interstellar Boundary Explorer over the first 8 years. Since the protons around 0.1 keV d…
▽ More
We present a comprehensive study of energetic neutral atoms (ENAs) of 10 eV to 2.5 keV from the downwind hemisphere of the heliosphere. These ENAs are believed to originate mostly from pickup protons and solar wind protons in the inner heliosheath. This study includes all low-energy observations made with the Interstellar Boundary Explorer over the first 8 years. Since the protons around 0.1 keV dominate the plasma pressure in the inner heliosheath in downwind direction, these ENA observations offer the unique opportunity to constrain the plasma properties and dimensions of the heliosheath where no in-situ observations are available.
We first derive energy spectra of ENA intensities averaged over time for 49 macropixels covering the entire downwind hemisphere. The results confirm previous studies regarding integral intensities and the roll-over around 0.1 keV energy. With the expanded dataset we now find that ENA intensities at 0.2 and 0.1 keV seem to anti-correlate with solar activity. We then derive the product of total plasma pressure and emission thickness of protons in the heliosheath to estimate lower limits on the thickness of the inner heliosheath. The temporally averaged ENA intensities support a rather spherical shape of the termination shock and a heliosheath thickness between 150 and 210 au for most regions of the downwind hemisphere. Around the nominal downwind direction of 76° ecliptic longitude, the heliosheath is at least 280 au thick. There, the neutral hydrogen density seems to be depleted compared to upwind directions by roughly a factor of 2.
△ Less
Submitted 4 December, 2017;
originally announced December 2017.
-
ALMA observations of the archetypal "hot core" that isn't: Orion KL
Authors:
M. T. Orozco-Aguilera,
Luis A. Zapata,
Tomoya Hirota,
Sheng-Li Qin,
Masqué Josep M.
Abstract:
We present sensitive high angular resolution ($\sim$ 0.1$''$ -- 0.3$''$) continuum ALMA (The Atacama Large Millimeter/Submillimeter Array) observations of the archetypal hot core located in Orion-KL. The observations were made in five different spectral bands (bands 3, 6, 7, 8, and 9) covering a very broad range of frequencies (149 -- 658 GHz). Apart of the well-know millimeter emitting objects lo…
▽ More
We present sensitive high angular resolution ($\sim$ 0.1$''$ -- 0.3$''$) continuum ALMA (The Atacama Large Millimeter/Submillimeter Array) observations of the archetypal hot core located in Orion-KL. The observations were made in five different spectral bands (bands 3, 6, 7, 8, and 9) covering a very broad range of frequencies (149 -- 658 GHz). Apart of the well-know millimeter emitting objects located in this region (Orion Source I and BN), we report the first submillimeter detection of three compact continuum sources (ALMA 1-3) in the vicinities of the Orion-KL hot molecular core. These three continuum objects have spectral indices between 1.47 to 1.56, and brightness temperatures between 100 to 200 K at 658 GHz suggesting that we are seeing moderate optically thick dust emission with possible grain growth. However, as these objects are not associated with warm molecular gas, and some of them are farther out from the molecular core, we thus conclude that they cannot heat the molecular core. This result favours the hypothesis that the hot molecular core in Orion-KL core is heated externally.
△ Less
Submitted 28 August, 2017;
originally announced August 2017.
-
Optimal control with non-adiabatic Molecular Dynamics: application to the Coulomb explosion of Sodium clusters
Authors:
Adrián Gómez Pueyo,
Jorge A. Budagosky M.,
Alberto Castro
Abstract:
We present an implementation of optimal control theory for the first-principles non-adiabatic Ehrenfest Molecular Dynamics model, which describes a condensed matter system by considering classical point-particle nuclei, and quantum electrons, handled in our case with time-dependent density-functional theory. The scheme is demonstrated by optimizing the Coulomb explosion of small Sodium clusters: t…
▽ More
We present an implementation of optimal control theory for the first-principles non-adiabatic Ehrenfest Molecular Dynamics model, which describes a condensed matter system by considering classical point-particle nuclei, and quantum electrons, handled in our case with time-dependent density-functional theory. The scheme is demonstrated by optimizing the Coulomb explosion of small Sodium clusters: the algorithm is set to find the optimal femtosecond laser pulses that disintegrate the clusters, for a given total pulse duration, fluence, and cut-off frequency. We describe the numerical details and difficulties of the methodology.
△ Less
Submitted 24 February, 2017; v1 submitted 24 June, 2016;
originally announced June 2016.
-
Recovering hard-to-find object instances by sampling context-based object proposals
Authors:
Jose Oramas M.,
Tinne Tuytelaars
Abstract:
In this paper we focus on improving object detection performance in terms of recall. We propose a post-detection stage during which we explore the image with the objective of recovering missed detections. This exploration is performed by sampling object proposals in the image. We analyze four different strategies to perform this sampling, giving special attention to strategies that exploit spatial…
▽ More
In this paper we focus on improving object detection performance in terms of recall. We propose a post-detection stage during which we explore the image with the objective of recovering missed detections. This exploration is performed by sampling object proposals in the image. We analyze four different strategies to perform this sampling, giving special attention to strategies that exploit spatial relations between objects. In addition, we propose a novel method to discover higher-order relations between groups of objects. Experiments on the challenging KITTI dataset show that our proposed relations-based proposal generation strategies can help improving recall at the cost of a relatively low amount of object proposals.
△ Less
Submitted 4 October, 2016; v1 submitted 5 November, 2015;
originally announced November 2015.
-
Analysis of the various key management algorithms and new proposal in the secure multicast communications
Authors:
Joe Prathap P M.,
V. Vasudevan
Abstract:
With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life.…
▽ More
With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life. Several key tree based approach has been proposed by various authors to create and distribute the multicast group key in effective manner. There are different key management algorithms that facilitate efficient distribution and rekeying of the group key. These protocols normally add communication overhead as well as computation overhead at the group key controller and at the group members. This paper explores the various algorithms along with the performances and derives an improved method.
△ Less
Submitted 22 June, 2009;
originally announced June 2009.
-
A Consistent Scenario for B to PS Decays
Authors:
D. Delepine,
J. L. Lucio M.,
J. A. Mendoza S.,
Carlos A. Ramirez
Abstract:
We consider B to PS decays where P stands for pseudoscalar and S for a heavy (~1500 MeV) scalar meson. We achieve agreement with available experimental data -- which includes a two orders of magnitude hierarchy -- assuming the scalars mesons are two quark states. The contribution of the dipolar penguin operator O_{11} is quantified.
We consider B to PS decays where P stands for pseudoscalar and S for a heavy (~1500 MeV) scalar meson. We achieve agreement with available experimental data -- which includes a two orders of magnitude hierarchy -- assuming the scalars mesons are two quark states. The contribution of the dipolar penguin operator O_{11} is quantified.
△ Less
Submitted 17 August, 2008;
originally announced August 2008.
-
The role of degeneracy in the analogy between continuous variable and spin 1/2 systems
Authors:
J. L. Lucio M.
Abstract:
We point out limitations to the analogy between the continuous variable and spin 1/2 systems and show that the maximal violation of Bell inequality is related to an infinite degeneracy. We quantify non-maximal violation of the Bell-CHSH inequality and comment potential experimental implications of our work.
We point out limitations to the analogy between the continuous variable and spin 1/2 systems and show that the maximal violation of Bell inequality is related to an infinite degeneracy. We quantify non-maximal violation of the Bell-CHSH inequality and comment potential experimental implications of our work.
△ Less
Submitted 12 October, 2006;
originally announced October 2006.
-
Non-Commutative Mechanics as a modification of space-time
Authors:
C. A. Vaquera-Araujo,
J. L. Lucio M
Abstract:
We formulate non-relativistic classical and quantum mechanics in the non-commutative two dimensional plane. The approach we use is based on the Galilei group, where the non-commutativity is seen as a central extension upon identification of the boost generators with the position operator. We perform a systematic study of the free particle, defined by the symmetries of the space time, which inclu…
▽ More
We formulate non-relativistic classical and quantum mechanics in the non-commutative two dimensional plane. The approach we use is based on the Galilei group, where the non-commutativity is seen as a central extension upon identification of the boost generators with the position operator. We perform a systematic study of the free particle, defined by the symmetries of the space time, which include the no-commutativity. The symmetries at the classical level are analyzed in terms of Noether's theorem. Canonical quantization is presented and the representation of the corresponding Heisenberg algebra is obtained. The path integral representation and Wigner distribution function in phase space are also discussed. We work out, both at the classical and at the quantum level, the harmonic oscillator, avoiding the use of the conventional non-canonical transformation that leads to a momentum dependent potential. We use Einsteins' model for a solid to corroborate that, according with intuition, as a consequence of the space fuzziness the entropy is a growing function of $θ$ in the low temperature regime.
△ Less
Submitted 19 December, 2005;
originally announced December 2005.
-
Annihilation contribution and $B\to a_0 π, f_0 K$ decays
Authors:
D. Delepine,
J. L. Lucio M.,
Carlos A. Ramirez
Abstract:
We analyze the decays $B^0 \to a^\pm_0 π^\mp$ and $B^{-,0} \to f_0 K^{-,0}$ and show that within the factorization approximation a phenomenological consistent picture can be obtained. We show that in this approach the $O_6$ operator provides the dominant contributions to the suppressed channel $B^0 \to a^+_0 π^-$. When the $a_0$ is considered a two quark state, evaluation of the annihilation for…
▽ More
We analyze the decays $B^0 \to a^\pm_0 π^\mp$ and $B^{-,0} \to f_0 K^{-,0}$ and show that within the factorization approximation a phenomenological consistent picture can be obtained. We show that in this approach the $O_6$ operator provides the dominant contributions to the suppressed channel $B^0 \to a^+_0 π^-$. When the $a_0$ is considered a two quark state, evaluation of the annihilation form factor using Perturbative $QCD$ implies that this contribution is not negligible, and furthermore it can interfere constructively or destructively with other penguin contributions. As a consequence of this ambiguity, the positive identification of $B^0 \to π^+ a_0^-$ can not distinguish between the two or four quark assignment of the $a_0$. According to our calculation, a best candidate to distinguish the nature of $a_0$ scalar is $Br(B^-\to π^0a_0^-)$ since the predictions for a four quark model is one order of magnitude smaller than for the two quark assignment. When the scalars are seen as two quarks states, simple theoretical assumptions based on SU(2) isospin symmetry provide relations between different B decays involving one scalar and one pseudoscalar meson.
△ Less
Submitted 4 January, 2005;
originally announced January 2005.
-
Minimal Gravitomagnetism
Authors:
C. A. Vaquera-Araujo,
J. L. Lucio M
Abstract:
We show that Feynman's proof applies to Newtonian gravitation, implying thus the existence of gravitational analogous of the electric and magnetic fields and the corresponding Lorentz-like force. Consistency of the formalism require particular properties of the electric and magnetic-like fields under Galilei transformations, which coincide with those obtained in previous analysis of Galilean ele…
▽ More
We show that Feynman's proof applies to Newtonian gravitation, implying thus the existence of gravitational analogous of the electric and magnetic fields and the corresponding Lorentz-like force. Consistency of the formalism require particular properties of the electric and magnetic-like fields under Galilei transformations, which coincide with those obtained in previous analysis of Galilean electromagnetism.
△ Less
Submitted 22 November, 2005; v1 submitted 21 October, 2004;
originally announced October 2004.
-
$ππ$ Invariant mass spectrum in $V'\to V~ππ$ and the $f_0(600)$ pole
Authors:
A. Gallegos,
J. L. Lucio M.,
J. Pestieau
Abstract:
We consider the phenomenological description of the two pion invariant mass spectrum in the $V' \to V ππ$ decays. We study the parametrization of the amplitude involving both $S$ and $D$ wave contributions. From a fit to the two pion decays of the $ Υ(nS)$ and $Ψ(nS)$ we determine the $f_0 (600)$ mass and width to be $m_{f_0}=528 \pm 32$ MeV and $Γ_{f_0}=413\pm 45$ MeV. The mass and width values…
▽ More
We consider the phenomenological description of the two pion invariant mass spectrum in the $V' \to V ππ$ decays. We study the parametrization of the amplitude involving both $S$ and $D$ wave contributions. From a fit to the two pion decays of the $ Υ(nS)$ and $Ψ(nS)$ we determine the $f_0 (600)$ mass and width to be $m_{f_0}=528 \pm 32$ MeV and $Γ_{f_0}=413\pm 45$ MeV. The mass and width values we report correspond to the real and imaginary part of the S matrix pole respectively.
△ Less
Submitted 10 November, 2003;
originally announced November 2003.
-
Scalar f0(980) and sigma(500) meson exchange in phi decays into pi0pi0gamma
Authors:
A. Bramon,
R. Escribano,
J. L. Lucio M.,
M. Napsuciale,
G. Pancheri
Abstract:
The complementarity between Chiral Perturbation Theory and the Linear Sigma Model is exploited to study $π^0π^0$ production in $φ$ radiative decays, where the effects of the $f_0(980)$ scalar resonance, and those of its more controversial $σ(500)$ partner, should become manifest via the $φ\to K^+ K^- (γ)\toπ^0π^0γ$ decay chain. The recently reported data on $φ\toπ^0π^0γ$ coming from the VEPP-2M…
▽ More
The complementarity between Chiral Perturbation Theory and the Linear Sigma Model is exploited to study $π^0π^0$ production in $φ$ radiative decays, where the effects of the $f_0(980)$ scalar resonance, and those of its more controversial $σ(500)$ partner, should become manifest via the $φ\to K^+ K^- (γ)\toπ^0π^0γ$ decay chain. The recently reported data on $φ\toπ^0π^0γ$ coming from the VEPP-2M $e^+ e^-$ collider in Novosibirsk and the DA$Φ$NE $φ$-factory in Frascati can be reasonably described in our approach, which we propose as a promising first step towards more detailed analyses. The $f_0(980)$ contribution, which appears as a moderately narrow peak at the high part of the dipion mass spectrum, can be interpreted as the isoscalar member of the scalar nonet with a large $f_0 K\bar{K}$ coupling and an $f_0ππ$ coupling suppressed by almost ideal $σ$-$f_0$ mixing. Indeed, the mixing angle in the flavour basis is found to be $φ_{S}\approx -6^\circ$, if the $f_0$-propagator is approximated by a simple Breit-Wigner, or $φ_{S}\approx -9^\circ$, if an improved two-channel analysis is performed. The $σ(500)$ resonance, which is then strongly coupled to pion pairs, yields a tiny contribution because, in our approach, its coupling to kaon pairs is proportional to $m^2_σ-m^2_K$ and thus quite small.
△ Less
Submitted 24 February, 2003; v1 submitted 29 April, 2002;
originally announced April 2002.
-
On the mass, width and coupling constants of the f0(980)
Authors:
R. Escribano,
A. Gallegos,
J. L. Lucio M.,
G. Moreno,
J. Pestieau
Abstract:
Using the pole approach we determine the mass and width of the $f_0(980)$; in particular, we analyze the possibility that two nearby poles are associated to it. We restrict our analysis to a neighborhood of the resonance, using $ππ$ data for the phase shift and inelasticity, and the invariant mass spectrum of the $J/ψ\toφππ, φK\bar K$ decays. The formalism we use is based on unitarity and a gene…
▽ More
Using the pole approach we determine the mass and width of the $f_0(980)$; in particular, we analyze the possibility that two nearby poles are associated to it. We restrict our analysis to a neighborhood of the resonance, using $ππ$ data for the phase shift and inelasticity, and the invariant mass spectrum of the $J/ψ\toφππ, φK\bar K$ decays. The formalism we use is based on unitarity and a generalized version of the Breit-Wigner parameterization. We find that a single pole describes the $f_0(980)$, the precise position depending upon the $ππ$ data used. As a byproduct, values for the $g_{f_0ππ}$ and $g_{f_0K\bar K}$ coupling constants are obtained.
△ Less
Submitted 10 March, 2003; v1 submitted 29 April, 2002;
originally announced April 2002.
-
Scalar sigma meson effects in rho and omega decays into pi0 pi0 gamma
Authors:
A. Bramon,
R. Escribano,
J. L. Lucio M.,
M. Napsuciale
Abstract:
The complementarity between Chiral Perturbation Theory and the Linear Sigma Model in the scalar channel is exploited to study $π^0π^0$ production in $ρ$ and $ω$ radiative decays, where the effects of a low mass scalar resonance $σ(500)$ should manifest. The recently reported data on $ρ\toπ^0π^0γ$ seem to require the contribution of a low mass and moderately narrow $σ(500)$. The properties of thi…
▽ More
The complementarity between Chiral Perturbation Theory and the Linear Sigma Model in the scalar channel is exploited to study $π^0π^0$ production in $ρ$ and $ω$ radiative decays, where the effects of a low mass scalar resonance $σ(500)$ should manifest. The recently reported data on $ρ\toπ^0π^0γ$ seem to require the contribution of a low mass and moderately narrow $σ(500)$. The properties of this controversial state could be fixed by improving the accuracy of these measurements. Data on $ω\toπ^0π^0γ$ can also be accommodated in our framework, but are much less sensitive to the $σ(500)$ properties.
△ Less
Submitted 17 May, 2001;
originally announced May 2001.
-
Resonance Propagation and Threshold Singularities
Authors:
J. L. Lucio M.,
J. Pestieau
Abstract:
We consider the problem of propagation of an unstable particle in the framework of Quantum Field Theory. Using unitarity, we show that a real renormalization constant free of threshold singularities naturally arises.
We consider the problem of propagation of an unstable particle in the framework of Quantum Field Theory. Using unitarity, we show that a real renormalization constant free of threshold singularities naturally arises.
△ Less
Submitted 16 December, 2000;
originally announced December 2000.
-
Masses and widths of the rho(770)
Authors:
M. Feuillat,
J. L. Lucio M,
J. Pestieau
Abstract:
Isospin violation in the $ρ(770)$ mass and width is considered within the $S$ matrix approach using combined fits to the $e^+e^- \toπ^+π^-$ and $τ^- \to ν_τπ^-π^0$ data performed by the ALEPH collaboration. We show that the pole position following from the parameters obtained from the ALEPH fits are not sensitive to the details of the parametrization. In this context, we have found that the pole…
▽ More
Isospin violation in the $ρ(770)$ mass and width is considered within the $S$ matrix approach using combined fits to the $e^+e^- \toπ^+π^-$ and $τ^- \to ν_τπ^-π^0$ data performed by the ALEPH collaboration. We show that the pole position following from the parameters obtained from the ALEPH fits are not sensitive to the details of the parametrization. In this context, we have found that the pole mass difference and the pole width difference between the charged and neutral $ρ$ are consistent with zero. We show that a one loop calculation including vector, axial vector and pseudo-scalar mesons can satisfactorily describe the observed isospin breaking. We also give an estimate for the mass difference between the neutral and charged states of the $a_1(1260)$.
△ Less
Submitted 26 October, 2000; v1 submitted 14 October, 2000;
originally announced October 2000.
-
Chiral loops and a_0(980) exchange in φ->π^0ηγ
Authors:
A. Bramon,
R. Escribano,
J. L. Lucio M.,
M. Napsuciale,
G. Pancheri
Abstract:
The radiative $φ\toπ^0ηγ$ decay is discussed emphasizing the effects of the $a_0$(980) scalar resonance which dominates the high values of the $π^0η$ invariant mass spectrum. In its lowest part, the proposed amplitude coincides with the reliable and ChPT-inspired contribution coming from chiral loops. The $a_0$(980) resonance is then incorporated exploiting the complementarity between ChPT and t…
▽ More
The radiative $φ\toπ^0ηγ$ decay is discussed emphasizing the effects of the $a_0$(980) scalar resonance which dominates the high values of the $π^0η$ invariant mass spectrum. In its lowest part, the proposed amplitude coincides with the reliable and ChPT-inspired contribution coming from chiral loops. The $a_0$(980) resonance is then incorporated exploiting the complementarity between ChPT and the linear sigma model for this channel. The recently reported experimental invariant mass distribution and branching ratio can be satisfactorily accommodated in our framework. For the latter, a value of $B(φ\toπ^0ηγ)$ in the range $(0.75$--$0.95)\times 10^{-4}$ is predicted.
△ Less
Submitted 17 August, 2000;
originally announced August 2000.
-
The ratio Phi->K+K-/K0K0bar
Authors:
A. Bramon,
R. Escribano,
J. L. Lucio M.,
G. Pancheri
Abstract:
The ratio Phi->K+K-/K0K0bar is discussed and its present experimental value is compared with theoretical expectations. A difference larger than two standard deviations is observed. We critically examine a number of mechanisms that could account for this discrepancy, which remains unexplained. Measurements at DAPHNE at the level of the per mille accuracy can clarify whether there exist any anomal…
▽ More
The ratio Phi->K+K-/K0K0bar is discussed and its present experimental value is compared with theoretical expectations. A difference larger than two standard deviations is observed. We critically examine a number of mechanisms that could account for this discrepancy, which remains unexplained. Measurements at DAPHNE at the level of the per mille accuracy can clarify whether there exist any anomaly.
△ Less
Submitted 7 July, 2000; v1 submitted 28 March, 2000;
originally announced March 2000.
-
Tests of flavor symmetry in J/psi decays
Authors:
G. Lopez Castro,
J. L. Lucio M.,
J. Pestieau
Abstract:
We use SU(3) flavor symmetry to analyze the $PP', VP$ and baryon-antibaryon decays of $J/ψ$. Both, the SU(3)-invariant and -violating contributions are considered. Particular attention is paid to the interference of the electromagnetic and strong amplitudes.
We use SU(3) flavor symmetry to analyze the $PP', VP$ and baryon-antibaryon decays of $J/ψ$. Both, the SU(3)-invariant and -violating contributions are considered. Particular attention is paid to the interference of the electromagnetic and strong amplitudes.
△ Less
Submitted 10 February, 1999;
originally announced February 1999.
-
Central charges in regular mechanics
Authors:
A. Cabo,
J. L. Lucio M.,
V. Villanueva
Abstract:
We consider the algebra associated to a group of transformations which are symmetries of a regular mechanical system (i.e. system free of constraints). For time dependent coordinate transformations we show that a central extension may appear at the classical level which is coordinate and momentum independent. A cochain formalism naturally arises in the argument and extends the usual configuratio…
▽ More
We consider the algebra associated to a group of transformations which are symmetries of a regular mechanical system (i.e. system free of constraints). For time dependent coordinate transformations we show that a central extension may appear at the classical level which is coordinate and momentum independent. A cochain formalism naturally arises in the argument and extends the usual configuration space cochain concepts to phase space.
△ Less
Submitted 21 November, 1997; v1 submitted 18 November, 1997;
originally announced November 1997.
-
Heavy Baryon Spin 3/2 Theory and Radiative Decays of the Decuplet
Authors:
M. Napsuciale,
J. L. Lucio M.
Abstract:
We study the radiative decays of the decuplet $(3/2 \to 1/2 γ)$ using Heavy Baryon Chiral Perturbation Theory (HBChPT). We emphasize the problems faced by the interacting spin 3/2 field theory. We argue that, to lowest order in the $1/m$ expansion, HBChPT provides a framework where R-invariance and the appropiated constraints for the interacting spin 3/2 fields are consistently incorporated. We…
▽ More
We study the radiative decays of the decuplet $(3/2 \to 1/2 γ)$ using Heavy Baryon Chiral Perturbation Theory (HBChPT). We emphasize the problems faced by the interacting spin 3/2 field theory. We argue that, to lowest order in the $1/m$ expansion, HBChPT provides a framework where R-invariance and the appropiated constraints for the interacting spin 3/2 fields are consistently incorporated. We perform a gauge invariant calculation of the decay amplitudes, to lowest order in $1/m$ and to order $w^2/Λ^2_χ$ in the chiral expansion and report analytical results for the one-loop contributions to the two form factors involved in the $3/2 \to 1/2 γ$ transitions. Parameters independent predictions for the SU(3) forbidden decays are presented.
△ Less
Submitted 4 September, 1996;
originally announced September 1996.
-
Remarks on the $W$ propagator at the resonance
Authors:
G. Lopez Castro,
J. L. Lucio M.,
J. Pestieau
Abstract:
We address the problem of properly defining the $W^{\pm}, Z^0$ propagator in the resonance region. Particular attention is paid to the longitudinal piece of this propagator. We also discuss the related renormalization procedures and the unitarity property.
We address the problem of properly defining the $W^{\pm}, Z^0$ propagator in the resonance region. Particular attention is paid to the longitudinal piece of this propagator. We also discuss the related renormalization procedures and the unitarity property.
△ Less
Submitted 20 April, 1995;
originally announced April 1995.
-
Renormalization in Quantum Statistics of Systems with Spontaneous Symmetry Breaking
Authors:
M. Chaichian,
J. L. Lucio M.,
C. Montonen,
H. Perez Rojas,
M. Vargas
Abstract:
Renormalization in quantum statistics in the presence of a charge associated to a spontaneously broken symmetry is discussed for the scalar field model. In contrast to the case of non-broken symmetry, the renormalization mass counterterm depends on the chemical potential. We argue that this is connected to the ill-defined character of the charge operator.
Renormalization in quantum statistics in the presence of a charge associated to a spontaneously broken symmetry is discussed for the scalar field model. In contrast to the case of non-broken symmetry, the renormalization mass counterterm depends on the chemical potential. We argue that this is connected to the ill-defined character of the charge operator.
△ Less
Submitted 23 September, 1993; v1 submitted 22 September, 1993;
originally announced September 1993.