-
Self-testing of genuine multipartite non-local and non-maximally entangled states
Authors:
Ranendu Adhikary
Abstract:
Self-testing enables the characterization of quantum systems with minimal assumptions on their internal working as such it represents the strongest form of certification for quantum systems. In the existing self-testing literature, self-testing states that are not maximally entangled, but exhibit genuine multipartite nonlocality, have remained an open problem. This is particularly important becaus…
▽ More
Self-testing enables the characterization of quantum systems with minimal assumptions on their internal working as such it represents the strongest form of certification for quantum systems. In the existing self-testing literature, self-testing states that are not maximally entangled, but exhibit genuine multipartite nonlocality, have remained an open problem. This is particularly important because, for many-body systems, genuine multipartite nonlocality has been recognized as the strongest form of multipartite quantum correlation. In this work, we present a Cabello-like paradox for scenarios involving an arbitrary number of parties. This paradox is a tool for detecting genuine multipartite nonlocality, allowing for the specific identification and self-testing of states that defy the paradox's limits the most, which turn out to be non-maximally multipartite entangled states. While recent results [\textit{Šupić et al., Nature Physics, 2023}] suggest network self-testing as a means to self-test all quantum states, here we operate within the standard self-testing framework to self-test genuine multipartite non-local and non-maximally entangled states.
△ Less
Submitted 11 May, 2024; v1 submitted 26 February, 2024;
originally announced March 2024.
-
Minimum Detection Efficiencies for Loophole-free Genuine Nonlocality Tests
Authors:
Subhendu B. Ghosh,
Snehasish Roy Chowdhury,
Ranendu Adhikary,
Arup Roy,
Tamal Guha
Abstract:
The certification of quantum nonlocality, which has immense significance in architecting device-independent technologies, confronts severe experimental challenges. Detection loophole, originating from the unavailability of perfect detectors, is one of the major issues amongst them. In the present study we focus on the minimum detection efficiency (MDE) required to detect various forms of genuine n…
▽ More
The certification of quantum nonlocality, which has immense significance in architecting device-independent technologies, confronts severe experimental challenges. Detection loophole, originating from the unavailability of perfect detectors, is one of the major issues amongst them. In the present study we focus on the minimum detection efficiency (MDE) required to detect various forms of genuine nonlocality, originating from the type of causal constraints imposed on the involved parties. In this context, we demonstrate that the MDE needed to manifest the recently suggested $T_2$-type nonlocality deviates significantly from perfection. Additionally, we have computed the MDE necessary to manifest Svetlichny's nonlocality, with state-independent approach markedly reducing the previously established bound. Finally, considering the inevitable existence of noise we demonstrate the robustness of the imperfect detectors to certify $T_2$-type nonlocality.
△ Less
Submitted 18 May, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Network-assist free self-testing of genuine multipartite entangled states
Authors:
Ranendu Adhikary,
Abhishek Mishra,
Ramij Rahaman
Abstract:
Self-testing is a method to certify quantum states and measurements in a device-independent way. The device-independent certification of quantum properties is purely based on input-output measurement statistics of the involved devices with minimal knowledge about their internal workings. Bipartite pure entangled states can be self-tested, but, in the case of multipartite pure entangled states, the…
▽ More
Self-testing is a method to certify quantum states and measurements in a device-independent way. The device-independent certification of quantum properties is purely based on input-output measurement statistics of the involved devices with minimal knowledge about their internal workings. Bipartite pure entangled states can be self-tested, but, in the case of multipartite pure entangled states, the answer is not so straightforward. Nevertheless, Šupić et al. recently introduced a novel self-testing method for any pure entangled quantum state, which leverages network assistance and relies on bipartite entangled measurements. Hence, their scheme loses the true device-independent flavor of self-testing. In this regard, we provide a self-testing scheme for genuine multipartite pure entangle states in the true sense by employing a generalized Hardy-type non-local argument. Our scheme involves only local operations and classical communications and does not depend on bipartite entangled measurements and is free from any network assistance. In addition, we provide the device-independent bound of the maximum probability of success for generalized Hardy-type nonlocality argument.
△ Less
Submitted 25 January, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
Plasmon-enhanced circular dichroism spectroscopy of chiral drug solutions
Authors:
Matteo Venturi,
Raju Adhikary,
Ambaresh Sahoo,
Carino Ferrante,
Isabella Daidone,
Francesco Di Stasio,
Andrea Toma,
Francesco Tani,
Hatice Altug,
Antonio Mecozzi,
Massimiliano Aschi,
Andrea Marini
Abstract:
We investigate the potential of surface plasmon polaritons at noble metal interfaces for surface-enhanced chiroptical sensing of dilute chiral drug solutions. The high quality factor of surface plasmon resonances in both Otto and Kretschmann configurations enables the enhancement of circular dichroism differenatial absorption thanks to the large near-field intensity of such plasmonic excitations.…
▽ More
We investigate the potential of surface plasmon polaritons at noble metal interfaces for surface-enhanced chiroptical sensing of dilute chiral drug solutions. The high quality factor of surface plasmon resonances in both Otto and Kretschmann configurations enables the enhancement of circular dichroism differenatial absorption thanks to the large near-field intensity of such plasmonic excitations. Furthermore, the subwavelength confinement of surface plasmon polaritons is key to attain chiroptical sensitivity to small amounts of drug volumes placed around $\simeq 100$ nm by the metal surface. Our calculations focus on reparixin, a pharmaceutical molecule currently used in clinical studies for patients with community-acquired pneumonia, including COVID-19 and acute respiratory distress syndrome. Considering realistic dilute solutions of reparixin dissolved in water with concentration $\leq 5$ mg$/$ml, we find a circular-dichroism differential absorption enhancement factor of the order $\simeq 20$ and chirality-induced polarization distortion upon surface plasmon polariton excitation.
△ Less
Submitted 27 September, 2023; v1 submitted 16 August, 2023;
originally announced August 2023.
-
New sets of Non-Orthogonal Spreading Sequences With Low Correlation and Low PAPR Using Extended Boolean Functions
Authors:
Kaiqiang Liu,
Zhengchun Zhou,
Avik Ranjan Adhikary,
Rong Luo
Abstract:
Extended Boolean functions (EBFs) are one of the most important tools in cryptography and spreading sequence design in communication systems. In this paper, we use EBFs to design new sets of spreading sequences for non-orthogonal multiple access (NOMA), which is an emerging technique capable of supporting massive machine-type communications (mMTC) in 5G and beyond. In this work, first $p$-ary comp…
▽ More
Extended Boolean functions (EBFs) are one of the most important tools in cryptography and spreading sequence design in communication systems. In this paper, we use EBFs to design new sets of spreading sequences for non-orthogonal multiple access (NOMA), which is an emerging technique capable of supporting massive machine-type communications (mMTC) in 5G and beyond. In this work, first $p$-ary complementary sequences are constructed using EBFs and then, these sequences are used to design new sets of non-orthogonal spreading sequence sets having very low coherence and peak to average power ratio (PAPR). The proposed spreading sequence sets are capable of supporting a large number of active devices simultaneously. In fact, for a $p$-ary spreading sequence set, we theoretically achieve an overloading factor of $2p$, where $p$ is an odd prime. Specifically, for $p=3$, we achieve an overloading factor of $6$, which cannot be achieved through the existing constructions till date.
△ Less
Submitted 5 May, 2023; v1 submitted 30 April, 2023;
originally announced May 2023.
-
Data-driven Knowledge Fusion for Deep Multi-instance Learning
Authors:
Yu-Xuan Zhang,
Zhengchun Zhou,
Xingxing He,
Avik Ranjan Adhikary,
Bapi Dutta
Abstract:
Multi-instance learning (MIL) is a widely-applied technique in practical applications that involve complex data structures. MIL can be broadly categorized into two types: traditional methods and those based on deep learning. These approaches have yielded significant results, especially with regards to their problem-solving strategies and experimental validation, providing valuable insights for res…
▽ More
Multi-instance learning (MIL) is a widely-applied technique in practical applications that involve complex data structures. MIL can be broadly categorized into two types: traditional methods and those based on deep learning. These approaches have yielded significant results, especially with regards to their problem-solving strategies and experimental validation, providing valuable insights for researchers in the MIL field. However, a considerable amount of knowledge is often trapped within the algorithm, leading to subsequent MIL algorithms that solely rely on the model's data fitting to predict unlabeled samples. This results in a significant loss of knowledge and impedes the development of more intelligent models. In this paper, we propose a novel data-driven knowledge fusion for deep multi-instance learning (DKMIL) algorithm. DKMIL adopts a completely different idea from existing deep MIL methods by analyzing the decision-making of key samples in the data set (referred to as the data-driven) and using the knowledge fusion module designed to extract valuable information from these samples to assist the model's training. In other words, this module serves as a new interface between data and the model, providing strong scalability and enabling the use of prior knowledge from existing algorithms to enhance the learning ability of the model. Furthermore, to adapt the downstream modules of the model to more knowledge-enriched features extracted from the data-driven knowledge fusion module, we propose a two-level attention module that gradually learns shallow- and deep-level features of the samples to achieve more effective classification. We will prove the scalability of the knowledge fusion module while also verifying the efficacy of the proposed architecture by conducting experiments on 38 data sets across 6 categories.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Interpreting Vulnerabilities of Multi-Instance Learning to Adversarial Perturbations
Authors:
Yu-Xuan Zhang,
Hua Meng,
Xue-Mei Cao,
Zhengchun Zhou,
Mei Yang,
Avik Ranjan Adhikary
Abstract:
Multi-Instance Learning (MIL) is a recent machine learning paradigm which is immensely useful in various real-life applications, like image analysis, video anomaly detection, text classification, etc. It is well known that most of the existing machine learning classifiers are highly vulnerable to adversarial perturbations. Since MIL is a weakly supervised learning, where information is available f…
▽ More
Multi-Instance Learning (MIL) is a recent machine learning paradigm which is immensely useful in various real-life applications, like image analysis, video anomaly detection, text classification, etc. It is well known that most of the existing machine learning classifiers are highly vulnerable to adversarial perturbations. Since MIL is a weakly supervised learning, where information is available for a set of instances, called bag and not for every instances, adversarial perturbations can be fatal. In this paper, we have proposed two adversarial perturbation methods to analyze the effect of adversarial perturbations to interpret the vulnerability of MIL methods. Out of the two algorithms, one can be customized for every bag, and the other is a universal one, which can affect all bags in a given data set and thus has some generalizability. Through simulations, we have also shown the effectiveness of the proposed algorithms to fool the state-of-the-art (SOTA) MIL methods. Finally, we have discussed through experiments, about taking care of these kind of adversarial perturbations through a simple strategy. Source codes are available at https://github.com/InkiInki/MI-UAP.
△ Less
Submitted 16 April, 2023; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Reduction in turbulence-induced non-linear dynamic vibration using tuned liquid damper (TLD)
Authors:
Ananya Majumdar,
Biplab Ranjan Adhikary,
Partha Bhattacharya
Abstract:
In the present research work, an attempt is made to develop a coupled non-linear turbulence-structure-damper model in a finite volume-finite difference (FV-FD) framework. Tuned liquid damper (TLD) is used as the additional damping system along with inherent structural damping. Real-time simulation of flow-excited bridge box girder or chimney section and the vibration reduction using TLD can be per…
▽ More
In the present research work, an attempt is made to develop a coupled non-linear turbulence-structure-damper model in a finite volume-finite difference (FV-FD) framework. Tuned liquid damper (TLD) is used as the additional damping system along with inherent structural damping. Real-time simulation of flow-excited bridge box girder or chimney section and the vibration reduction using TLD can be performed using the developed model. The turbulent flow field around a structure is modeled using an OpenFOAM transient PISO solver, and the time-varying drag force is calculated. This force perturbs the structure, causing the sloshing phenomena of the attached TLD, modeled using shallow depth approximation, damping the flow-induced vibration of the structure. The structural motion with and without the attached TLD is modeled involving the FD-based Newmark-Beta method using in-house MATLAB codes. The TLD is tuned with the vortex-shedding frequency of the low-Reynolds number flows, and it is found to be reducing the structural excitation significantly. On the other hand, the high-Reynolds number turbulent flow exhibits a broadband excitation, for which by tuning the TLD with few frequencies obtained through investigations, a good reduction in vibration is observed.
△ Less
Submitted 19 October, 2023; v1 submitted 2 October, 2022;
originally announced October 2022.
-
Sensitivity mapping of TBL wall-pressure spectra with CFD turbulence models for wind tunnel test result prediction
Authors:
Biplab Ranjan Adhikary,
Ananya Majumdar,
Subhadeep Sarkar,
Partha Bhattacharya
Abstract:
In the present work, an attempt is made to map the sensitivity of the existing zero pressure gradient (ZPG) turbulent boundary layer (TBL) wall-pressure spectrum models with different TBL parameters, and eventually, with different Reynolds Averaged Navier Stokes (RANS) turbulence models, simulated in OpenFOAM and ANSYS Fluent solvers. This study will help future researchers to choose a particular…
▽ More
In the present work, an attempt is made to map the sensitivity of the existing zero pressure gradient (ZPG) turbulent boundary layer (TBL) wall-pressure spectrum models with different TBL parameters, and eventually, with different Reynolds Averaged Navier Stokes (RANS) turbulence models, simulated in OpenFOAM and ANSYS Fluent solvers. This study will help future researchers to choose a particular RANS turbulence model vis-à-vis a particular wall-spectrum model in order to obtain a reasonably accurate wind tunnel result predicting capability. First, the best-predicting pressure spectrum models are selected by comparing them with wind tunnel test data. Next, considering the experimental TBL parameters as benchmarks, errors in RANS-produced data are estimated. Furthermore, wall-pressure spectra are calculated following semi-empirical spectrum models using TBL parameter feed obtained from experiments and computational fluid dynamics (CFD) simulations. Finally, sensitivity mapping is performed between spectrum models and the RANS models, with different normalized wall-normal distances (y+).
△ Less
Submitted 24 September, 2022;
originally announced September 2022.
-
TBL-induced energy transmission into a double wall backed enclosure system computed in a cloud-based Python-FE environment
Authors:
Biplab Ranjan Adhikary,
Atanu Sahu,
Partha Bhattacharya
Abstract:
We propose a fully coupled numerical model to predict turbulent boundary layer (TBL) induced energy transmission behavior for a double-wall backed enclosure system in a finite element (FE) framework computed in cloud-based Python environment. Goody single point wall-pressure spectrum and Corcos spatial correlation function are used to generate the TBL cross-power spectra. Mindlins first order shea…
▽ More
We propose a fully coupled numerical model to predict turbulent boundary layer (TBL) induced energy transmission behavior for a double-wall backed enclosure system in a finite element (FE) framework computed in cloud-based Python environment. Goody single point wall-pressure spectrum and Corcos spatial correlation function are used to generate the TBL cross-power spectra. Mindlins first order shear deformation model is considered for the panels and a fully coupled TBL-structure-acoustic model is developed using the FE approach to predict the acoustic power level inside the enclosure for variable gap distance between the panels. The model is developed in a way to capture the contribution of orthotropic lamina sequence, frequency-dependent structural damping, and stiffening orientation in predicting the energy transmission into a double-wall backed enclosure. Thus, a new numerical model is presented that enables the designers with more precise energy transmission quantification with greater flexibility in terms of the number of panel leaves, geometry, and boundary conditions of the enclosure system, backed by double wall made of isotropic or orthotropic laminates.
△ Less
Submitted 17 September, 2022;
originally announced September 2022.
-
A coupled FE-BE approach for vibro-acoustic response prediction of laminated composite panels due to turbulent boundary layer excitation involving Cholesky decomposition
Authors:
Biplab Ranjan Adhikary,
Atanu Sahu,
Partha Bhattacharya
Abstract:
An original numerical framework is developed in the present research work in order to estimate the free field sound radiation from baffled structural panels subjected to turbulent boundary layer-induced excitation. A semi-analytical method is used to estimate the TBL wall pressure spectrum which is decomposed using Cholesky technique to obtain random wall pressure in the frequency domain. Structur…
▽ More
An original numerical framework is developed in the present research work in order to estimate the free field sound radiation from baffled structural panels subjected to turbulent boundary layer-induced excitation. A semi-analytical method is used to estimate the TBL wall pressure spectrum which is decomposed using Cholesky technique to obtain random wall pressure in the frequency domain. Structural panels are modeled using the finite element technique and a coupled finite element boundary element modeling technique is developed to estimate the sound power level radiating into the free field. Results are obtained for laminated composite structural panels with various fiber orientations and significant findings are discussed. The developed technique has the potential to be further extended for complex structures in terms of geometry, material properties, and boundary conditions. The complete numerical toolbox, developed in an in-house MATLAB environment, enables the prediction of turbulent structure acoustic coupled behavior at an early design stage.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
A coupled FE-RRM-based numerical model for analysis of energy transmission loss through stiffened double-wall panel due to TBL excitation
Authors:
Biplab Ranjan Adhikary,
Atanu Sahu,
Partha Bhattacharya
Abstract:
We propose a fully coupled numerical model to predict energy transmission through a turbulent boundary layer (TBL) excited stiffened double-leaf flexible aircraft panel using a finite element (FE) framework. Mindlin first order shear deformation model is adopted for the panels and a TBL-structure-acoustic coupling model is developed using finite element-radiation resistance matrix (FE-RRM) approac…
▽ More
We propose a fully coupled numerical model to predict energy transmission through a turbulent boundary layer (TBL) excited stiffened double-leaf flexible aircraft panel using a finite element (FE) framework. Mindlin first order shear deformation model is adopted for the panels and a TBL-structure-acoustic coupling model is developed using finite element-radiation resistance matrix (FE-RRM) approach to predict the transmission loss (TL) through double-leaf panels with variable thickness and stiffener orientation. The model is also capable to capture the contribution of orthotropic lamina sequence and frequency-dependent structural damping in predicting the TL. Thus, a new numerical model is proposed that enables the designers with greater flexibility in terms of the number of panel leaves, boundary, and stiffening condition of the aircraft panel-cavity-panel system, made of isotropic or orthotropic laminates.
△ Less
Submitted 23 August, 2022;
originally announced August 2022.
-
SpiroMask: Measuring Lung Function Using Consumer-Grade Masks
Authors:
Rishiraj Adhikary,
Dhruvi Lodhavia,
Chris Francis,
Rohit Patil,
Tanmay Srivastava,
Prerna Khanna,
Nipun Batra,
Joe Breda,
Jacob Peplinski,
Shwetak Patel
Abstract:
According to the World Health Organisation (WHO), 235 million people suffer from respiratory illnesses and four million people die annually due to air pollution. Regular lung health monitoring can lead to prognoses about deteriorating lung health conditions. This paper presents our system SpiroMask that retrofits a microphone in consumer-grade masks (N95 and cloth masks) for continuous lung health…
▽ More
According to the World Health Organisation (WHO), 235 million people suffer from respiratory illnesses and four million people die annually due to air pollution. Regular lung health monitoring can lead to prognoses about deteriorating lung health conditions. This paper presents our system SpiroMask that retrofits a microphone in consumer-grade masks (N95 and cloth masks) for continuous lung health monitoring. We evaluate our approach on 48 participants (including 14 with lung health issues) and find that we can estimate parameters such as lung volume and respiration rate within the approved error range by the American Thoracic Society (ATS). Further, we show that our approach is robust to sensor placement inside the mask.
△ Less
Submitted 26 October, 2022; v1 submitted 23 January, 2022;
originally announced January 2022.
-
Asymptotically Optimal Golay-ZCZ Sequence Sets with Flexible Length
Authors:
Zhi Gu,
Zhengchun Zhou,
Avik Ranjan Adhikary,
Yanghe Feng,
Pingzhi Fan
Abstract:
Zero correlation zone (ZCZ) sequences and Golay complementary sequences are two kinds of sequences with different preferable correlation properties. Golay-ZCZ sequences are special kinds of complementary sequences which also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay-ZCZ sequences reported in the literature have a limitation in the length which is the form…
▽ More
Zero correlation zone (ZCZ) sequences and Golay complementary sequences are two kinds of sequences with different preferable correlation properties. Golay-ZCZ sequences are special kinds of complementary sequences which also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay-ZCZ sequences reported in the literature have a limitation in the length which is the form of a power of 2. In this paper, we propose two constructions of Golay-ZCZ sequence sets with new parameters which generalize the constructions of Gong et al. (IEEE Transaction on Communications 61(9), 2013) and Chen et al (IEEE Transaction on Communications 61(9), 2018). Notably, one of the constructions results in optimal binary Golay-ZCZ sequences, while the other results in asymptotically optimal polyphase Golay-ZCZ sequences as the number of sequences increases.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
New Constructions of Golay Complementary Pair/Array with Large Zero Correlation Zone
Authors:
Zhi Gu,
Zhengchun Zhou,
Avik Ranjan Adhikary,
Yanghe Feng,
Pingzhi Fan
Abstract:
Zero correlation zone (ZCZ) sequences and Golay sequences are two kinds of sequences with different preferable correlation properties. It was shown by Gong \textit{et al.} and Chen \textit{et al.} that some Golay sequences also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay sequences with ZCZ reported in the literature have a limitation in the length which is t…
▽ More
Zero correlation zone (ZCZ) sequences and Golay sequences are two kinds of sequences with different preferable correlation properties. It was shown by Gong \textit{et al.} and Chen \textit{et al.} that some Golay sequences also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay sequences with ZCZ reported in the literature have a limitation in the length which is the form of a power of 2. One objective of this paper is to propose a construction of Golay complementary pairs (GCPs) with new lengths whose periodic autocorrelation of each of the Golay sequences and periodic corss-correlation of the pair displays a zero correlation zone (ZCZ) around the in-phase position. Specifically, the proposed GCPs have length $4N$ (where, $N$ is the length of a GCP) and ZCZ width $N+1$. Another objective of this paper is to extend the construction to two-dimensional Golay complementary array pairs (GCAPs). Interestingly the periodic corss-correlation of the proposed GACPs also have large ZCZs around the in-phase position.
△ Less
Submitted 13 August, 2021; v1 submitted 12 August, 2021;
originally announced August 2021.
-
Asymptotically Optimal and Near-optimal Aperiodic Quasi-Complementary Sequence Sets Based on Florentine Rectangles
Authors:
Avik Ranjan Adhikary,
Yanghe Feng,
Zhengchun Zhou,
Pingzhi Fan
Abstract:
Quasi-complementary sequence sets (QCSSs) can be seen as a generalized version of complete complementary codes (CCCs), which enables multicarrier communication systems to support more users. The contribution of this work is two-fold. First, we propose a systematic construction of Florentine rectangles. Secondly, we propose several sets of CCCs and QCSS, using Florentine rectangles. The CCCs and QC…
▽ More
Quasi-complementary sequence sets (QCSSs) can be seen as a generalized version of complete complementary codes (CCCs), which enables multicarrier communication systems to support more users. The contribution of this work is two-fold. First, we propose a systematic construction of Florentine rectangles. Secondly, we propose several sets of CCCs and QCSS, using Florentine rectangles. The CCCs and QCSS are constructed over $\mathbb{Z}_N$, where $N\geq2$ is any integer. The cross-correlation magnitude of any two of the constructed CCCs is upper bounded by $N$. By combining the proposed CCCs, we propose asymptotically optimal and near-optimal QCSSs with new parameters. This solves a long-standing problem, of designing asymptotically optimal aperiodic QCSS over $\mathbb{Z}_N$, where $N$ is any integer.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
Distributed Localization of Wireless Sensor Network Using Communication Wheel
Authors:
Kaustav Bose,
Manash Kumar Kundu,
Ranendu Adhikary,
Buddhadeb Sau
Abstract:
We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, un…
▽ More
We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, unless RP = NP. So we are interested in algorithms that efficiently localize the network partially. A widely used technique that can efficiently localize a uniquely localizable portion of the network is trilateration: starting from three anchors (nodes with known positions), nodes having at least three localized neighbors are sequentially localized. However, the performance of trilateration can substantially differ for different choices of the initial three anchors. In this paper, we propose a distributed localization scheme with a theoretical characterization of nodes that are guaranteed to be localized. In particular, our proposed distributed algorithm starts localization from a strongly interior node and provided that the subgraph induced by the strongly interior nodes is connected, it localizes all nodes of the network except some boundary nodes and isolated weakly interior nodes.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
Complexity of Maximum Cut on Interval Graphs
Authors:
Ranendu Adhikary,
Kaustav Bose,
Satwik Mukherjee,
Bodhayan Roy
Abstract:
We resolve the longstanding open problem concerning the computational complexity of Max Cut on interval graphs by showing that it is NP-complete.
We resolve the longstanding open problem concerning the computational complexity of Max Cut on interval graphs by showing that it is NP-complete.
△ Less
Submitted 31 March, 2021; v1 submitted 29 May, 2020;
originally announced June 2020.
-
New Constructions of Cross Z-Complementary Pairs
Authors:
Avik Ranjan Adhikary,
Zhengchun Zhou,
Yang Yang,
Pingzhi Fan
Abstract:
Spatial modulation (SM) is a new paradigm of multiple-input multiple-output (MIMO) systems, in which only one antenna at the transmitter is activated during each symbol period. Recently, it is observed that SM training sequences derived from corss Z-complementary pairs (CZCPs) lead to optimal channel estimation performance over frequency-selective channels. CZCPs are special form of sequence pairs…
▽ More
Spatial modulation (SM) is a new paradigm of multiple-input multiple-output (MIMO) systems, in which only one antenna at the transmitter is activated during each symbol period. Recently, it is observed that SM training sequences derived from corss Z-complementary pairs (CZCPs) lead to optimal channel estimation performance over frequency-selective channels. CZCPs are special form of sequence pairs which have zero aperiodic autocorrelation zones and cross-correlation zone at certain time-shifts. Recent paper by Liu \textit{et al.} discussed only perfect CZCPs. In this paper, we focus on non-perfect CZCPs. We introduce the term cross Z-complementary ratio and re-categorise the CZCPs, both perfect and non-perfect, based on that. We propose a systematic construction of CZCPs based on generalised Boolean functions (GBFs). We further extend the lengths of the CZCPs by using the insertion method. The proposed CZCPs are all of new lengths of the form $2^\alpha10^\beta26^γ+2~(α\geq1)$, $10^β+2$, $26^γ+2$ and $10^β26^γ+2$. Finally we propose a construction of optimal binary CZCPs having parameters $(12,5)$ and $(24,11)$ from binary Barker sequences. These CZCPs are also extended to $(12N,5N)$- CZCPs and $(24N,11N)$- CZCPs, where $N$ is the length of a binary Golay complementary pair (GCP). During the proof, we also found a new structural property of binary CZCPs and concluded all binary GCPs are CZCPs too. Finally, we give some numerical simulations to confirm that depending on the number of multi-paths, the proposed CZCPs can be used to design SM training matrix which attains the minimum mean square error.
△ Less
Submitted 21 May, 2021; v1 submitted 16 February, 2020;
originally announced February 2020.
-
Generalized Constructions of Complementary Sets of Sequences of Lengths Non-Power-of-Two
Authors:
Gaoxiang Wang,
Avik Ranjan Adhikary,
Zhengchun Zhou,
Yang Yang
Abstract:
The construction of complementary sets (CSs) of sequences with different set size and sequence length become important due to its practical application for OFDM systems. Most of the constructions of CSs, based on generalized Boolean functions (GBFs), are of length $2^α$ ($α$ is a natural number). Recently some works have been reported on construction of CSs having lengths non-power of two, i.e., i…
▽ More
The construction of complementary sets (CSs) of sequences with different set size and sequence length become important due to its practical application for OFDM systems. Most of the constructions of CSs, based on generalized Boolean functions (GBFs), are of length $2^α$ ($α$ is a natural number). Recently some works have been reported on construction of CSs having lengths non-power of two, i.e., in the form of $2^{m-1}+2^v$ ($m$ is natural number, $0\leq v <m $), $N+1$ and $N+2$, where $N$ is a length for which $q$-ary complementary pairs exist. In this paper, we propose a construction of CSs of lengths $M+N$ for set size $4n$, using concatenation of CSs of lengths $M$ and $N$, and set size $4n$, where $M$ and $N$ are lengths for which $q$-ary complementary pairs exists. Also, we construct CSs of length $M+P$ for set size $8n$ by concatenating CSs of lengths $M$ and $P$, and set size $8n$, where $M$ and $P$ are lengths for which $q$-ary complementary pairs and complementary sets of size $4$ exists, respectively. The proposed constructions cover all the previous constructions as special cases in terms of lengths and lead to more CSs of new sequence lengths which have not been reported before.
△ Less
Submitted 10 December, 2019; v1 submitted 27 November, 2019;
originally announced November 2019.
-
Arbitrary Pattern Formation by Opaque Fat Robots with Lights
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has b…
▽ More
Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has been studied in the obstructed visibility model, where the view of a robot can be obstructed by the presence of other robots. However, in these works, the robots have been modelled as dimensionless points in the plane. In this paper, we have considered the problem in the more realistic setting where the robots have a physical extent. In particular, the robots are modelled as opaque disks. Furthermore, the robots operate under a fully asynchronous scheduler. They do not have access to any global coordinate system, but agree on the direction and orientation of one coordinate axis. Each robot is equipped with an externally visible light which can assume a constant number of predefined colors. In this setting, we have given a complete characterization of initial configurations from where any arbitrary pattern can be formed by a deterministic distributed algorithm.
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
New Sets of Optimal Odd-length Binary Z-Complementary Pairs
Authors:
Avik Ranjan Adhikary,
Sudhan Majhi,
Zilong Liu,
Yong Liang Guan
Abstract:
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums (AACSs) for time-shifts within a certain region, called zero correlation zone (ZCZ). Optimal odd-length binary ZCPs (OB-ZCPs) display closest correlation properties to Golay complementary pairs (GCPs) in that each OB-ZCP achieves maximum ZCZ of width (N+1)/2 (where N is the sequence length) and…
▽ More
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums (AACSs) for time-shifts within a certain region, called zero correlation zone (ZCZ). Optimal odd-length binary ZCPs (OB-ZCPs) display closest correlation properties to Golay complementary pairs (GCPs) in that each OB-ZCP achieves maximum ZCZ of width (N+1)/2 (where N is the sequence length) and every out-of-zone AACSs reaches the minimum magnitude value, i.e. 2. Till date, systematic constructions of optimal OB-ZCPs exist only for lengths $2^α \pm 1$, where $α$ is a positive integer. In this paper, we construct optimal OB-ZCPs of generic lengths $2^α10^β26^γ+1$ (where $α,~ β, ~ γ$ are non-negative integers and $α\geq 1$) from inserted versions of binary GCPs. The key leading to the proposed constructions is several newly identified structure properties of binary GCPs obtained from Turyn's method. This key also allows us to construct OB-ZCPs with possible ZCZ widths of $4 \times 10^{β-1} +1$, $12 \times 26^{γ-1}+1$ and $12 \times 10^β26^{γ-1}+1$ through proper insertions of GCPs of lengths $10^β,~ 26^γ, \text{and } 10^β26^γ$, respectively. Our proposed OB-ZCPs have applications in communications and radar (as an alternative to GCPs).
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
A Generalised Construction of Multiple Complete Complementary Codes and Asymptotically Optimal Aperiodic Quasi-Complementary Sequence Sets
Authors:
Zhengchun Zhou,
Fangrui Liu,
Avik Ranjan Adhikary,
Pingzhi Fan
Abstract:
In recent years, complementary sequence sets have found many important applications in multi-carrier code-division multiple-access (MC-CDMA) systems for their good correlation properties. In this paper, we propose a construction, which can generate multiple sets of complete complementary codes (CCCs) over $\mathbb{Z}_N$, where $N~(N\geq 3)$ is a positive integer of the form…
▽ More
In recent years, complementary sequence sets have found many important applications in multi-carrier code-division multiple-access (MC-CDMA) systems for their good correlation properties. In this paper, we propose a construction, which can generate multiple sets of complete complementary codes (CCCs) over $\mathbb{Z}_N$, where $N~(N\geq 3)$ is a positive integer of the form $N=p_0^{e^0}p_1^{e^1}\dots p_{n-1}^{e^{n-1}}$, $p_0<p_1<\cdots<p_{n-1}$ are prime factors of $N$ and $e_0,e_1,\cdots,e_{n-1}$ are non-negative integers. Interestingly, the maximum inter-set aperiodic cross-correlation magnitude of the proposed CCCs is upper bounded by $N$. When $N$ is odd, the combination of the proposed CCCs results to a new set of sequences to obtain asymptotically optimal and near-optimal aperiodic quasi-complementary sequence sets (QCSSs) with more flexible parameters.
△ Less
Submitted 21 May, 2021; v1 submitted 9 September, 2019;
originally announced September 2019.
-
A Direct Construction of Z-Complementary Pairs Using Generalized Boolean Functions
Authors:
Avik Ranjan Adhikary,
Palash Sarkar,
Sudhan Majhi
Abstract:
The zero correlation zone (ZCZ) ratio, i.e., the ratio of the width of the ZCZ and the length of the sequence plays a major role in reducing interference in an asynchronous environment of communication systems. However, to the best of the author's knowledge, the highest ZCZ ratio for even-length binary Z-complementary pairs (EB-ZCPs) which are directly constructed using generalized Boolean functio…
▽ More
The zero correlation zone (ZCZ) ratio, i.e., the ratio of the width of the ZCZ and the length of the sequence plays a major role in reducing interference in an asynchronous environment of communication systems. However, to the best of the author's knowledge, the highest ZCZ ratio for even-length binary Z-complementary pairs (EB-ZCPs) which are directly constructed using generalized Boolean functions (GBFs), is $\frac{2}{3}$. In this research, we present a direct construction of EB-ZCPs through GBFs, which can achieve a ZCZ ratio of $\frac{3}{4}$. In general, the constructed EB-ZCPs are of length $2^{m-1}+2$, having a ZCZ width of $2^{m-2}+2^{π(m-3)}+1$ where pi is a permutation over $m-2$ variables.
△ Less
Submitted 31 July, 2019;
originally announced July 2019.
-
Positional Encoding by Robots with Non-Rigid Movements
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For th…
▽ More
Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For this, the robots need an unlimited amount of persistent memory to store the snapshots taken from different points inside the polygon. However, it has been shown by Di Luna et al. [DISC 2017] that map construction can be done even by oblivious robots by employing a positional encoding strategy where a robot carefully positions itself inside the polygon to encode information in the binary representation of its distance from the closest polygon vertex. Of course, to execute this strategy, it is crucial for the robots to make accurate movements. In this paper, we address the question whether this technique can be implemented even when the movements of the robots are unpredictable in the sense that the robot can be stopped by the adversary during its movement before reaching its destination. However, there exists a constant $δ> 0$, unknown to the robot, such that the robot can always reach its destination if it has to move by no more than $δ$ amount. This model is known in literature as \emph{non-rigid} movement. We give a partial answer to the question in the affirmative by presenting a map construction algorithm for robots with non-rigid movement, but having $O(1)$ bits of persistent memory and ability to make circular moves.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Arbitrary Pattern Formation by Asynchronous Opaque Robots with Lights
Authors:
Kaustav Bose,
Manash Kumar Kundu,
Ranendu Adhikary,
Buddhadeb Sau
Abstract:
The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is ass…
▽ More
The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is assumed to be rigid, which means that each robot is able to reach its desired destination without interruption. The existing literature that investigates this problem, considers robots with unobstructed visibility. This work considers the problem in the more realistic obstructed visibility model, where the view of a robot can be obstructed by the presence of other robots. The robots are assumed to be punctiform and equipped with visible lights that can assume a constant number of predefined colors. We have studied the problem in two settings based on the level of consistency among the local coordinate systems of the robots: two axis agreement (they agree on the direction and orientation of both coordinate axes) and one axis agreement (they agree on the direction and orientation of only one coordinate axis). In both settings, we have provided a full characterization of initial configurations from where any arbitrary pattern can be formed.
△ Less
Submitted 7 October, 2020; v1 submitted 13 February, 2019;
originally announced February 2019.
-
Arbitrary Pattern Formation on Infinite Grid by Asynchronous Oblivious Robots
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The…
▽ More
The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The robots are assumed to be autonomous, identical, anonymous and oblivious. They operate in Look-Compute-Move cycles under a fully asynchronous scheduler. The robots do not agree on any common global coordinate system or chirality. We have shown that a set of robots can form any arbitrary pattern, if their starting configuration is asymmetric.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
DCSM Protocol for Content Transfer in Deep Space Network
Authors:
Rojina Adhikary,
John N. Daigle,
Lei Cao
Abstract:
To maximize file transfer from space vehicles to the Earth, we propose a new space-to-earth content transfer protocol that combines turbo codes, RaptorQ codes, real-time channel prediction, and dynamic code-rate selection. The protocol features a practical signal-to-noise ratio prediction model that facilitates periodic adjustment of the turbo encoder to achieve adaptive rate transmission. Our sim…
▽ More
To maximize file transfer from space vehicles to the Earth, we propose a new space-to-earth content transfer protocol that combines turbo codes, RaptorQ codes, real-time channel prediction, and dynamic code-rate selection. The protocol features a practical signal-to-noise ratio prediction model that facilitates periodic adjustment of the turbo encoder to achieve adaptive rate transmission. Our simulation results indicate that an increase of about 20% in file transfer rate is achievable using the proposed protocol.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
Crash tolerant gathering on grid by asynchronous oblivious robots
Authors:
Kaustav Bose,
Ranendu Adhikary,
Sruti Gan Chaudhuri,
Buddhadeb Sau
Abstract:
Consider a system of autonomous mobile robots initially randomly deployed on the nodes of an anonymous finite grid. A gathering algorithm is a sequence of moves to be executed independently by each robot so that all robots meet at a single node after finite time. The robots operate in Look-Compute-Move cycles. In each cycle, a robot takes a snapshot of the current configuration of the grid in term…
▽ More
Consider a system of autonomous mobile robots initially randomly deployed on the nodes of an anonymous finite grid. A gathering algorithm is a sequence of moves to be executed independently by each robot so that all robots meet at a single node after finite time. The robots operate in Look-Compute-Move cycles. In each cycle, a robot takes a snapshot of the current configuration of the grid in terms of occupied nodes (\emph{Look}), then based on the perceived configuration, decides whether to stay put or to move to an adjacent node (\emph{Compute}), and in the later case makes an instantaneous move accordingly (\emph{Move}). The robots have \emph{weak multiplicity detection} capability, which enables them to detect if a node is empty or occupied by a single robot or by multiple robots. The robots are \emph{asynchronous}, \emph{oblivious}, \emph{anonymous}, can not communicate with each other and execute the same distributed algorithm. In a faulty system, however, any robot can \emph{crash}, which means that it becomes completely inactive and does not take part in the process any further. In that case a fault-tolerant gathering algorithm is an algorithm that gathers all the non-faulty robots at a single node. This paper considers a faulty system that can have at most one crash fault. With these assumptions deterministic fault-tolerant gathering algorithms are presented that gather all initial configurations that are gatherable in a non-faulty system, except for one specific configuration called the \emph{2S2 configuration}.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Euclidean 1-center of a set of static and mobile points
Authors:
Kaustav Bose,
Ranendu Adhikary,
Sruti Gan Chaudhuri,
Buddhadeb Sau
Abstract:
In this paper, we consider the problem of computing the algebraic parametric equation of the Euclidean 1-center function in $\mathbb{R}^d$, $d \geq 2$, for a system of $n$ static points and $m$ mobile points having motion defined by rational parametric functions. We have shown that the corresponding Euclidean 1-center function is a piecewise differentiable function and have derived its exact param…
▽ More
In this paper, we consider the problem of computing the algebraic parametric equation of the Euclidean 1-center function in $\mathbb{R}^d$, $d \geq 2$, for a system of $n$ static points and $m$ mobile points having motion defined by rational parametric functions. We have shown that the corresponding Euclidean 1-center function is a piecewise differentiable function and have derived its exact parametric algebraic equation. If the positions of the static points and the rational parametric equations of the motion of the mobile points are given, we have proposed an algorithm that computes the parametric equation of the Euclidean 1-center function.
△ Less
Submitted 21 November, 2016; v1 submitted 2 September, 2016;
originally announced September 2016.