-
How much time does a photon spend as an atomic excitation before being transmitted?
Authors:
Kyle Thompson,
Kehui Li,
Daniela Angulo,
Vida-Michelle Nixon,
Josiah Sinclair,
Amal Vijayalekshmi Sivakumar,
Howard M. Wiseman,
Aephraim M. Steinberg
Abstract:
When a single photon traverses a cloud of 2-level atoms, the average time it spends as an atomic excitation -- as measured by weakly probing the atoms -- can be shown to be the spontaneous lifetime of the atoms multiplied by the probability of the photon being scattered into a side mode. A tempting inference from this is that an average scattered photon spends one spontaneous lifetime as an atomic…
▽ More
When a single photon traverses a cloud of 2-level atoms, the average time it spends as an atomic excitation -- as measured by weakly probing the atoms -- can be shown to be the spontaneous lifetime of the atoms multiplied by the probability of the photon being scattered into a side mode. A tempting inference from this is that an average scattered photon spends one spontaneous lifetime as an atomic excitation, while photons that are transmitted spend zero time as atomic excitations. However, recent experimental work by some of us [PRX Quantum 3, 010314 (2022)] refutes this intuition. We examine this problem using the weak-value formalism and show that the time a transmitted photon spends as an atomic excitation is equal to the group delay, which can take on positive or negative values. We also determine the corresponding time for scattered photons and find that it is equal to the time delay of the scattered photon pulse, which consists of a group delay and a time delay associated with elastic scattering, known as the Wigner time delay. This work provides new insight into the complex and surprising histories of photons travelling through absorptive media.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
Energy Efficient Routing For Underwater Acoustic Sensor Network Using Genetic Algorithm
Authors:
Arjun Prasad Chaurasiya,
Roshan Sah,
Dr. V. Sivakumar
Abstract:
In underwater acoustic sensor networks (UWASN), energy-reliable data transmission is a challenging task. This is due to acoustic transmission disturbances caused by excessive noise, exceptionally long propagation delays, a high bit error rate, limited bandwidth capability, and interference. One of the most important issues of UWASN for research is how to extend the life span of data transmission.…
▽ More
In underwater acoustic sensor networks (UWASN), energy-reliable data transmission is a challenging task. This is due to acoustic transmission disturbances caused by excessive noise, exceptionally long propagation delays, a high bit error rate, limited bandwidth capability, and interference. One of the most important issues of UWASN for research is how to extend the life span of data transmission. Data transfer from a source node to a destination node in UWASN is a complicated topic for researchers. Many routing algorithms, such as vector base forwarding and depth base routing, have been developed in past years. We propose a genetic algorithm-based optimization method for improving the energy efficiency of data transmission in the routing path from a source node to a destination node.
△ Less
Submitted 25 April, 2022;
originally announced July 2022.
-
GANash -- A GAN approach to steganography
Authors:
Venkatesh Subramaniyan,
Vignesh Sivakumar,
A. K. Vagheesan,
S. Sakthivelan,
K. J. Jegadish Kumar,
K. K. Nagarajan
Abstract:
Data security is of the utmost concern of a communication system. Since the early days, many developments have been made to improve the performance of the system. PSNR of the received signal, secure transmission channel, quality of encoding used, etc. are some of the key attributes of a good system. To ensure security, the most commonly used technique is cryptography in which the message is altere…
▽ More
Data security is of the utmost concern of a communication system. Since the early days, many developments have been made to improve the performance of the system. PSNR of the received signal, secure transmission channel, quality of encoding used, etc. are some of the key attributes of a good system. To ensure security, the most commonly used technique is cryptography in which the message is altered with respect to a key and using the same, the encoded message is decoded at the receiver side. A complementary technique that is popularly used to insure security is steganography. The advancements in Artificial Intelligence(AI) have paved way for performing steganography in an intelligent, tamper-proof manner. The recent discovery by researchers in the field of Deep Learning(DL), an unsupervised learning network known as the Generative Adversarial Networks(GAN) has improved the performance of this technique exponentially. It has been demonstrated that deep neural networks are highly sensitive to tiny perturbations of input data, giving rise to adversarial examples. Though this property is usually considered a weakness of learned models, it could be beneficial if used appropriately. The work that has been accomplished by MIT for this purpose, a deep-neural model by the name of SteganoGAN, has shown obligation for using this technique for steganography. In this work, we have proposed a novel approach to improve the performance of the existing system using latent space compression on the encoded data. This theoretically would improve the performance exponentially. Thus, the algorithms used to improve the system's performance and the results obtained have been enunciated in this work. The results indicate the level of dominance this system could achieve to be able to diminish the difficulties in solving real-time problems in terms of security, deployment and database management.
△ Less
Submitted 25 October, 2021;
originally announced October 2021.
-
Surface Temperature Trend Estimation over 12 Sites in Guinea Using 57 Years of Ground-Based Data
Authors:
René Tato Loua,
Hassan Bencherif,
Nelson Bègue,
Nkanyiso Mbatha,
Thierry Portafaix,
Alain Hauchecorne,
Venkataraman Sivakumar,
Zoumana Bamba
Abstract:
Trend-Run model was performed to estimate the trend in surface temperatures recorded at 12 sites in Guinea from 1960 to 2016 and to examine the contribution of each climate forcing. The coefficient of determination (R 2) calculated varies between 0.60 and 0.90, it provides total information about the simulation capability of the model. The decadal trend values also calculated show an upward trend…
▽ More
Trend-Run model was performed to estimate the trend in surface temperatures recorded at 12 sites in Guinea from 1960 to 2016 and to examine the contribution of each climate forcing. The coefficient of determination (R 2) calculated varies between 0.60 and 0.90, it provides total information about the simulation capability of the model. The decadal trend values also calculated show an upward trend (between 0.04 {\textdegree}C $\pm$ 0.06 {\textdegree}C decade --1 and 0.21 {\textdegree}C $\pm$ 0.06 {\textdegree}C decade --1). In addition, forcings' contributions were quantified, and the annual oscillation (AO) contribution is higher for most of the stations, followed by semiannual oscillation (SAO). Among the forcings, the tropical Northern Atlantic (TNA) contribution is greater than that of the sunspot number (SSN), Ni{ñ}o3.4 and Atlantic Ni{ñ}o (AN). Moreover, the Mann-Kendall test revealed a positive significant trend for all stations except at the Macenta site. Additionally, with sequential Mann-Kendall test, trend turning points were found only for the stations of Mamou, Koundara and Macenta at different dates. The temperature anomalies depict warming episodes (1970s, 1980s, 1984 and 1990s). Since then, the temperature is consistently increasing over the country. A significant warming has been shown, which might be further investigated using these models with additional contributing factors.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Structured Linear Contextual Bandits: A Sharp and Geometric Smoothed Analysis
Authors:
Vidyashankar Sivakumar,
Zhiwei Steven Wu,
Arindam Banerjee
Abstract:
Bandit learning algorithms typically involve the balance of exploration and exploitation. However, in many practical applications, worst-case scenarios needing systematic exploration are seldom encountered. In this work, we consider a smoothed setting for structured linear contextual bandits where the adversarial contexts are perturbed by Gaussian noise and the unknown parameter $θ^*$ has structur…
▽ More
Bandit learning algorithms typically involve the balance of exploration and exploitation. However, in many practical applications, worst-case scenarios needing systematic exploration are seldom encountered. In this work, we consider a smoothed setting for structured linear contextual bandits where the adversarial contexts are perturbed by Gaussian noise and the unknown parameter $θ^*$ has structure, e.g., sparsity, group sparsity, low rank, etc. We propose simple greedy algorithms for both the single- and multi-parameter (i.e., different parameter for each context) settings and provide a unified regret analysis for $θ^*$ with any assumed structure. The regret bounds are expressed in terms of geometric quantities such as Gaussian widths associated with the structure of $θ^*$. We also obtain sharper regret bounds compared to earlier work for the unstructured $θ^*$ setting as a consequence of our improved analysis. We show there is implicit exploration in the smoothed setting where a simple greedy algorithm works.
△ Less
Submitted 26 February, 2020;
originally announced February 2020.
-
Rosetta: Large scale system for text detection and recognition in images
Authors:
Fedor Borisyuk,
Albert Gordo,
Viswanath Sivakumar
Abstract:
In this paper we present a deployed, scalable optical character recognition (OCR) system, which we call Rosetta, designed to process images uploaded daily at Facebook scale. Sharing of image content has become one of the primary ways to communicate information among internet users within social networks such as Facebook and Instagram, and the understanding of such media, including its textual info…
▽ More
In this paper we present a deployed, scalable optical character recognition (OCR) system, which we call Rosetta, designed to process images uploaded daily at Facebook scale. Sharing of image content has become one of the primary ways to communicate information among internet users within social networks such as Facebook and Instagram, and the understanding of such media, including its textual information, is of paramount importance to facilitate search and recommendation applications. We present modeling techniques for efficient detection and recognition of text in images and describe Rosetta's system architecture. We perform extensive evaluation of presented technologies, explain useful practical approaches to build an OCR system at scale, and provide insightful intuitions as to why and how certain components work based on the lessons learnt during the development and deployment of the system.
△ Less
Submitted 11 October, 2019;
originally announced October 2019.
-
Random Quadratic Forms with Dependence: Applications to Restricted Isometry and Beyond
Authors:
Arindam Banerjee,
Qilong Gu,
Vidyashankar Sivakumar,
Zhiwei Steven Wu
Abstract:
Several important families of computational and statistical results in machine learning and randomized algorithms rely on uniform bounds on quadratic forms of random vectors or matrices. Such results include the Johnson-Lindenstrauss (J-L) Lemma, the Restricted Isometry Property (RIP), randomized sketching algorithms, and approximate linear algebra. The existing results critically depend on statis…
▽ More
Several important families of computational and statistical results in machine learning and randomized algorithms rely on uniform bounds on quadratic forms of random vectors or matrices. Such results include the Johnson-Lindenstrauss (J-L) Lemma, the Restricted Isometry Property (RIP), randomized sketching algorithms, and approximate linear algebra. The existing results critically depend on statistical independence, e.g., independent entries for random vectors, independent rows for random matrices, etc., which prevent their usage in dependent or adaptive modeling settings. In this paper, we show that such independence is in fact not needed for such results which continue to hold under fairly general dependence structures. In particular, we present uniform bounds on random quadratic forms of stochastic processes which are conditionally independent and sub-Gaussian given another (latent) process. Our setup allows general dependencies of the stochastic process on the history of the latent process and the latent process to be influenced by realizations of the stochastic process. The results are thus applicable to adaptive modeling settings and also allows for sequential design of random vectors and matrices. We also discuss stochastic process based forms of J-L, RIP, and sketching, to illustrate the generality of the results.
△ Less
Submitted 5 December, 2019; v1 submitted 10 October, 2019;
originally announced October 2019.
-
MVFST-RL: An Asynchronous RL Framework for Congestion Control with Delayed Actions
Authors:
Viswanath Sivakumar,
Olivier Delalleau,
Tim Rocktäschel,
Alexander H. Miller,
Heinrich Küttler,
Nantas Nardelli,
Mike Rabbat,
Joelle Pineau,
Sebastian Riedel
Abstract:
Effective network congestion control strategies are key to keeping the Internet (or any large computer network) operational. Network congestion control has been dominated by hand-crafted heuristics for decades. Recently, ReinforcementLearning (RL) has emerged as an alternative to automatically optimize such control strategies. Research so far has primarily considered RL interfaces which block the…
▽ More
Effective network congestion control strategies are key to keeping the Internet (or any large computer network) operational. Network congestion control has been dominated by hand-crafted heuristics for decades. Recently, ReinforcementLearning (RL) has emerged as an alternative to automatically optimize such control strategies. Research so far has primarily considered RL interfaces which block the sender while an agent considers its next action. This is largely an artifact of building on top of frameworks designed for RL in games (e.g. OpenAI Gym). However, this does not translate to real-world networking environments, where a network sender waiting on a policy without sending data leads to under-utilization of bandwidth. We instead propose to formulate congestion control with an asynchronous RL agent that handles delayed actions. We present MVFST-RL, a scalable framework for congestion control in the QUIC transport protocol that leverages state-of-the-art in asynchronous RL training with off-policy correction. We analyze modeling improvements to mitigate the deviation from Markovian dynamics, and evaluate our method on emulated networks from the Pantheon benchmark platform. The source code is publicly available at https://github.com/facebookresearch/mvfst-rl.
△ Less
Submitted 26 May, 2021; v1 submitted 9 October, 2019;
originally announced October 2019.
-
TorchBeast: A PyTorch Platform for Distributed RL
Authors:
Heinrich Küttler,
Nantas Nardelli,
Thibaut Lavril,
Marco Selvatici,
Viswanath Sivakumar,
Tim Rocktäschel,
Edward Grefenstette
Abstract:
TorchBeast is a platform for reinforcement learning (RL) research in PyTorch. It implements a version of the popular IMPALA algorithm for fast, asynchronous, parallel training of RL agents. Additionally, TorchBeast has simplicity as an explicit design goal: We provide both a pure-Python implementation ("MonoBeast") as well as a multi-machine high-performance version ("PolyBeast"). In the latter, p…
▽ More
TorchBeast is a platform for reinforcement learning (RL) research in PyTorch. It implements a version of the popular IMPALA algorithm for fast, asynchronous, parallel training of RL agents. Additionally, TorchBeast has simplicity as an explicit design goal: We provide both a pure-Python implementation ("MonoBeast") as well as a multi-machine high-performance version ("PolyBeast"). In the latter, parts of the implementation are written in C++, but all parts pertaining to machine learning are kept in simple Python using PyTorch, with the environments provided using the OpenAI Gym interface. This enables researchers to conduct scalable RL research using TorchBeast without any programming knowledge beyond Python and PyTorch. In this paper, we describe the TorchBeast design principles and implementation and demonstrate that it performs on-par with IMPALA on Atari. TorchBeast is released as an open-source package under the Apache 2.0 license and is available at \url{https://github.com/facebookresearch/torchbeast}.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
Deep Learning Inference in Facebook Data Centers: Characterization, Performance Optimizations and Hardware Implications
Authors:
Jongsoo Park,
Maxim Naumov,
Protonu Basu,
Summer Deng,
Aravind Kalaiah,
Daya Khudia,
James Law,
Parth Malani,
Andrey Malevich,
Satish Nadathur,
Juan Pino,
Martin Schatz,
Alexander Sidorov,
Viswanath Sivakumar,
Andrew Tulloch,
Xiaodong Wang,
Yiming Wu,
Hector Yuen,
Utku Diril,
Dmytro Dzhulgakov,
Kim Hazelwood,
Bill Jia,
Yangqing Jia,
Lin Qiao,
Vijay Rao
, et al. (3 additional authors not shown)
Abstract:
The application of deep learning techniques resulted in remarkable improvement of machine learning models. In this paper provides detailed characterizations of deep learning models used in many Facebook social network services. We present computational characteristics of our models, describe high performance optimizations targeting existing systems, point out their limitations and make suggestions…
▽ More
The application of deep learning techniques resulted in remarkable improvement of machine learning models. In this paper provides detailed characterizations of deep learning models used in many Facebook social network services. We present computational characteristics of our models, describe high performance optimizations targeting existing systems, point out their limitations and make suggestions for the future general-purpose/accelerated inference hardware. Also, we highlight the need for better co-design of algorithms, numerics and computing platforms to address the challenges of workloads often run in data centers.
△ Less
Submitted 29 November, 2018; v1 submitted 24 November, 2018;
originally announced November 2018.
-
Improving Rotated Text Detection with Rotation Region Proposal Networks
Authors:
Jing Huang,
Viswanath Sivakumar,
Mher Mnatsakanyan,
Guan Pang
Abstract:
A significant number of images shared on social media platforms such as Facebook and Instagram contain text in various forms. It's increasingly becoming commonplace for bad actors to share misinformation, hate speech or other kinds of harmful content as text overlaid on images on such platforms. A scene-text understanding system should hence be able to handle text in various orientations that the…
▽ More
A significant number of images shared on social media platforms such as Facebook and Instagram contain text in various forms. It's increasingly becoming commonplace for bad actors to share misinformation, hate speech or other kinds of harmful content as text overlaid on images on such platforms. A scene-text understanding system should hence be able to handle text in various orientations that the adversary might use. Moreover, such a system can be incorporated into screen readers used to aid the visually impaired. In this work, we extend the scene-text extraction system at Facebook, Rosetta, to efficiently handle text in various orientations. Specifically, we incorporate the Rotation Region Proposal Networks (RRPN) in our text extraction pipeline and offer practical suggestions for building and deploying a model for detecting and recognizing text in arbitrary orientations efficiently. Experimental results show a significant improvement on detecting rotated text.
△ Less
Submitted 16 November, 2018;
originally announced November 2018.
-
Structured Stochastic Linear Bandits
Authors:
Nicholas Johnson,
Vidyashankar Sivakumar,
Arindam Banerjee
Abstract:
The stochastic linear bandit problem proceeds in rounds where at each round the algorithm selects a vector from a decision set after which it receives a noisy linear loss parameterized by an unknown vector. The goal in such a problem is to minimize the (pseudo) regret which is the difference between the total expected loss of the algorithm and the total expected loss of the best fixed vector in hi…
▽ More
The stochastic linear bandit problem proceeds in rounds where at each round the algorithm selects a vector from a decision set after which it receives a noisy linear loss parameterized by an unknown vector. The goal in such a problem is to minimize the (pseudo) regret which is the difference between the total expected loss of the algorithm and the total expected loss of the best fixed vector in hindsight. In this paper, we consider settings where the unknown parameter has structure, e.g., sparse, group sparse, low-rank, which can be captured by a norm, e.g., $L_1$, $L_{(1,2)}$, nuclear norm. We focus on constructing confidence ellipsoids which contain the unknown parameter across all rounds with high-probability. We show the radius of such ellipsoids depend on the Gaussian width of sets associated with the norm capturing the structure. Such characterization leads to tighter confidence ellipsoids and, therefore, sharper regret bounds compared to bounds in the existing literature which are based on the ambient dimensionality.
△ Less
Submitted 17 June, 2016;
originally announced June 2016.
-
Estimation with Norm Regularization
Authors:
Arindam Banerjee,
Sheng Chen,
Farideh Fazayeli,
Vidyashankar Sivakumar
Abstract:
Analysis of non-asymptotic estimation error and structured statistical recovery based on norm regularized regression, such as Lasso, needs to consider four aspects: the norm, the loss function, the design matrix, and the noise model. This paper presents generalizations of such estimation error analysis on all four aspects compared to the existing literature. We characterize the restricted error se…
▽ More
Analysis of non-asymptotic estimation error and structured statistical recovery based on norm regularized regression, such as Lasso, needs to consider four aspects: the norm, the loss function, the design matrix, and the noise model. This paper presents generalizations of such estimation error analysis on all four aspects compared to the existing literature. We characterize the restricted error set where the estimation error vector lies, establish relations between error sets for the constrained and regularized problems, and present an estimation error bound applicable to any norm. Precise characterizations of the bound is presented for isotropic as well as anisotropic subGaussian design matrices, subGaussian noise models, and convex loss functions, including least squares and generalized linear models. Generic chaining and associated results play an important role in the analysis. A key result from the analysis is that the sample complexity of all such estimators depends on the Gaussian width of a spherical cap corresponding to the restricted error set. Further, once the number of samples $n$ crosses the required sample complexity, the estimation error decreases as $\frac{c}{\sqrt{n}}$, where $c$ depends on the Gaussian width of the unit norm ball.
△ Less
Submitted 30 November, 2015; v1 submitted 9 May, 2015;
originally announced May 2015.
-
Multi-task Sparse Structure Learning
Authors:
Andre R. Goncalves,
Puja Das,
Soumyadeep Chatterjee,
Vidyashankar Sivakumar,
Fernando J. Von Zuben,
Arindam Banerjee
Abstract:
Multi-task learning (MTL) aims to improve generalization performance by learning multiple related tasks simultaneously. While sometimes the underlying task relationship structure is known, often the structure needs to be estimated from data at hand. In this paper, we present a novel family of models for MTL, applicable to regression and classification problems, capable of learning the structure of…
▽ More
Multi-task learning (MTL) aims to improve generalization performance by learning multiple related tasks simultaneously. While sometimes the underlying task relationship structure is known, often the structure needs to be estimated from data at hand. In this paper, we present a novel family of models for MTL, applicable to regression and classification problems, capable of learning the structure of task relationships. In particular, we consider a joint estimation problem of the task relationship structure and the individual task parameters, which is solved using alternating minimization. The task relationship structure learning component builds on recent advances in structure learning of Gaussian graphical models based on sparse estimators of the precision (inverse covariance) matrix. We illustrate the effectiveness of the proposed model on a variety of synthetic and benchmark datasets for regression and classification. We also consider the problem of combining climate model outputs for better projections of future climate, with focus on temperature in South America, and show that the proposed model outperforms several existing methods for the problem.
△ Less
Submitted 1 September, 2014; v1 submitted 31 August, 2014;
originally announced September 2014.
-
Fractal-Based Detection of Microcalcification Clusters in Digital Mammograms
Authors:
P. Shanmugavadivu,
V. Sivakumar
Abstract:
In this paper, a novel method for edge detection of microcalcification clusters in mammogram images is presented using the concept of Fractal Dimension and Hurst co-efficient that enables to locate the microcalcifications in the mammograms. This technique detects the edges accurately than the ones obtained by the conventional Sobel method. Generally, Sobel method detects the edges of the regions/o…
▽ More
In this paper, a novel method for edge detection of microcalcification clusters in mammogram images is presented using the concept of Fractal Dimension and Hurst co-efficient that enables to locate the microcalcifications in the mammograms. This technique detects the edges accurately than the ones obtained by the conventional Sobel method. Generally, Sobel method detects the edges of the regions/objects in an image using the Fudge factor that assumes its value as 0.5, by default. In this proposed technique, the Fudge factor is suitably replaced with Hurst Co-efficient, which is computed as the difference of Fractal dimension and the topological dimension of a given input image. These two dimensions are image-dependent, and hence the respective Hurst co-efficient too varies with respect to images. Hence, the image-dependent Hurst co-efficient based Sobel method is proved to produce better results than the Fudge factor based Sobel method. The results of the proposed method substantiate the merit of the proposed technique.
△ Less
Submitted 30 April, 2013;
originally announced April 2013.