-
Fortifying Fully Convolutional Generative Adversarial Networks for Image Super-Resolution Using Divergence Measures
Authors:
Arkaprabha Basu,
Kushal Bose,
Sankha Subhra Mullick,
Anish Chakrabarty,
Swagatam Das
Abstract:
Super-Resolution (SR) is a time-hallowed image processing problem that aims to improve the quality of a Low-Resolution (LR) sample up to the standard of its High-Resolution (HR) counterpart. We aim to address this by introducing Super-Resolution Generator (SuRGe), a fully-convolutional Generative Adversarial Network (GAN)-based architecture for SR. We show that distinct convolutional features obta…
▽ More
Super-Resolution (SR) is a time-hallowed image processing problem that aims to improve the quality of a Low-Resolution (LR) sample up to the standard of its High-Resolution (HR) counterpart. We aim to address this by introducing Super-Resolution Generator (SuRGe), a fully-convolutional Generative Adversarial Network (GAN)-based architecture for SR. We show that distinct convolutional features obtained at increasing depths of a GAN generator can be optimally combined by a set of learnable convex weights to improve the quality of generated SR samples. In the process, we employ the Jensen-Shannon and the Gromov-Wasserstein losses respectively between the SR-HR and LR-SR pairs of distributions to further aid the generator of SuRGe to better exploit the available information in an attempt to improve SR. Moreover, we train the discriminator of SuRGe with the Wasserstein loss with gradient penalty, to primarily prevent mode collapse. The proposed SuRGe, as an end-to-end GAN workflow tailor-made for super-resolution, offers improved performance while maintaining low inference time. The efficacy of SuRGe is substantiated by its superior performance compared to 18 state-of-the-art contenders on 10 benchmark datasets.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Deep learning based detection of collateral circulation in coronary angiographies
Authors:
Cosmin-Andrei Hatfaludi,
Daniel Bunescu,
Costin Florian Ciusdel,
Alex Serban,
Karl Bose,
Marc Oppel,
Stephanie Schroder,
Christopher Seehase,
Harald F. Langer,
Jeanette Erdmann,
Henry Nording,
Lucian Mihai Itu
Abstract:
Coronary artery disease (CAD) is the dominant cause of death and hospitalization across the globe. Atherosclerosis, an inflammatory condition that gradually narrows arteries and has potentially fatal effects, is the most frequent cause of CAD. Nonetheless, the circulation regularly adapts in the presence of atherosclerosis, through the formation of collateral arteries, resulting in significant lon…
▽ More
Coronary artery disease (CAD) is the dominant cause of death and hospitalization across the globe. Atherosclerosis, an inflammatory condition that gradually narrows arteries and has potentially fatal effects, is the most frequent cause of CAD. Nonetheless, the circulation regularly adapts in the presence of atherosclerosis, through the formation of collateral arteries, resulting in significant long-term health benefits. Therefore, timely detection of coronary collateral circulation (CCC) is crucial for CAD personalized medicine. We propose a novel deep learning based method to detect CCC in angiographic images. Our method relies on a convolutional backbone to extract spatial features from each frame of an angiography sequence. The features are then concatenated, and subsequently processed by another convolutional layer that processes embeddings temporally. Due to scarcity of data, we also experiment with pretraining the backbone on coronary artery segmentation, which improves the results consistently. Moreover, we experiment with few-shot learning to further improve performance, given our low data regime. We present our results together with subgroup analyses based on Rentrop grading, collateral flow, and collateral grading, which provide valuable insights into model performance. Overall, the proposed method shows promising results in detecting CCC, and can be further extended to perform landmark based CCC detection and CCC quantification.
△ Less
Submitted 8 January, 2024;
originally announced March 2024.
-
HyPE-GT: where Graph Transformers meet Hyperbolic Positional Encodings
Authors:
Kushal Bose,
Swagatam Das
Abstract:
Graph Transformers (GTs) facilitate the comprehension of graph-structured data by calculating the self-attention of node pairs without considering node position information. To address this limitation, we introduce an innovative and efficient framework that introduces Positional Encodings (PEs) into the Transformer, generating a set of learnable positional encodings in the hyperbolic space, a non-…
▽ More
Graph Transformers (GTs) facilitate the comprehension of graph-structured data by calculating the self-attention of node pairs without considering node position information. To address this limitation, we introduce an innovative and efficient framework that introduces Positional Encodings (PEs) into the Transformer, generating a set of learnable positional encodings in the hyperbolic space, a non-Euclidean domain. This approach empowers us to explore diverse options for optimal selection of PEs for specific downstream tasks, leveraging hyperbolic neural networks or hyperbolic graph convolutional networks. Additionally, we repurpose these positional encodings to mitigate the impact of over-smoothing in deep Graph Neural Networks (GNNs). Comprehensive experiments on molecular benchmark datasets, co-author, and co-purchase networks substantiate the effectiveness of hyperbolic positional encodings in enhancing the performance of deep GNNs.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
From Small to Large: Clos Network for Scaling All-Optical Switching
Authors:
Jiemin Lin,
Zeshan Chang,
Liangjia Zong,
Sanjay K. Bose,
Tianhai Chang,
Gangxiang Shen
Abstract:
To cater to the demands of our rapidly growing Internet traffic, backbone networks need high-degree reconfigurable optical add/drop multiplexers (ROADMs) to simultaneously support multiple pairs of bi-directional fibers on each link. However, the traditional ROADM architecture based on the Spanke network is too complex to be directly scaled up to construct high-degree ROADMs. In addition, the wide…
▽ More
To cater to the demands of our rapidly growing Internet traffic, backbone networks need high-degree reconfigurable optical add/drop multiplexers (ROADMs) to simultaneously support multiple pairs of bi-directional fibers on each link. However, the traditional ROADM architecture based on the Spanke network is too complex to be directly scaled up to construct high-degree ROADMs. In addition, the widely deployed Spine-Leaf datacenter networks (DCNs) based on electrical switches consume too much power and exhibit high packet latency. Because of these issues, Clos networks are considered as promising alternatives for constructing large-scale ROADMs and all-optical DCNs. In this article, we look at a next-generation Clos-based ROADM architecture and show that it indeed provides better blocking performance with lower element and fiber complexities compared with a traditional Spanke-based ROADM architecture. We also discuss the application of a Clos network in all-optical DCNs to show that it can be used to effectively construct large-scale DCNs with significantly greater flexibility in supporting a variety of multicast services and in combining different network topologies.
△ Less
Submitted 13 February, 2023;
originally announced February 2023.
-
Mutual Visibility by Fat Robots with Slim Omnidirectional Camera
Authors:
Kaustav Bose,
Abhinav Chakraborty,
Krishnendu Mukhopadhyaya
Abstract:
In the existing literature of the Mutual Visibility problem for autonomous robot swarms, the adopted visibility models have some idealistic assumptions that are not consistent with practical sensing device implementations. This paper investigates the problem in the more realistic visibility model called opaque fat robots with slim omnidirectional camera. The robots are modeled as unit disks, each…
▽ More
In the existing literature of the Mutual Visibility problem for autonomous robot swarms, the adopted visibility models have some idealistic assumptions that are not consistent with practical sensing device implementations. This paper investigates the problem in the more realistic visibility model called opaque fat robots with slim omnidirectional camera. The robots are modeled as unit disks, each having an omnidirectional camera represented as a disk of smaller size. We assume that the robots have compasses that allow agreement in the direction and orientation of both axes of their local coordinate systems. The robots are equipped with visible lights which serve as a medium of communication and also as a form of memory. We present a distributed algorithm for the Mutual Visibility problem which is provably correct in the semi-synchronous setting. Our algorithm also provides a solution for Leader Election which we use as a subroutine in our main algorithm. Although Leader Election is trivial with two axis agreement in the full visibility model, it is challenging in our case and is of independent interest.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
Development and accuracy evaluation of Coded Phase-shift 3D scanner
Authors:
Pranav Kant Gaur,
D. M. Sarode,
S. K. Bose
Abstract:
In this paper, we provide an overview of development of a structured light 3D-scanner based on combination of binary-coded patterns and sinusoidal phase-shifted fringe patterns called Coded Phase-shift technique. Further, we describe the experiments performed to evaluate measurement accuracy and precision of the developed system. A study of this kind is expected to be helpful in understanding the…
▽ More
In this paper, we provide an overview of development of a structured light 3D-scanner based on combination of binary-coded patterns and sinusoidal phase-shifted fringe patterns called Coded Phase-shift technique. Further, we describe the experiments performed to evaluate measurement accuracy and precision of the developed system. A study of this kind is expected to be helpful in understanding the basic working of current structured-light 3D scanners and the approaches followed for their performance assessment.
△ Less
Submitted 20 October, 2021;
originally announced October 2021.
-
A 51.3 TOPS/W, 134.4 GOPS In-memory Binary Image Filtering in 65nm CMOS
Authors:
Sumon Kumar Bose,
Deepak Singla,
Arindam Basu
Abstract:
Neuromorphic vision sensors (NVS) can enable energy savings due to their event-driven that exploits the temporal redundancy in video streams from a stationary camera. However, noise-driven events lead to the false triggering of the object recognition processor. Image denoise operations require memoryintensive processing leading to a bottleneck in energy and latency. In this paper, we present in-me…
▽ More
Neuromorphic vision sensors (NVS) can enable energy savings due to their event-driven that exploits the temporal redundancy in video streams from a stationary camera. However, noise-driven events lead to the false triggering of the object recognition processor. Image denoise operations require memoryintensive processing leading to a bottleneck in energy and latency. In this paper, we present in-memory filtering (IMF), a 6TSRAM in-memory computing based image denoising for eventbased binary image (EBBI) frame from an NVS. We propose a non-overlap median filter (NOMF) for image denoising. An inmemory computing framework enables hardware implementation of NOMF leveraging the inherent read disturb phenomenon of 6T-SRAM. To demonstrate the energy-saving and effectiveness of the algorithm, we fabricated the proposed architecture in a 65nm CMOS process. As compared to fully digital implementation, IMF enables > 70x energy savings and a > 3x improvement of processing time when tested with the video recordings from a DAVIS sensor and achieves a peak throughput of 134.4 GOPS. Furthermore, the peak energy efficiencies of the NOMF is 51.3 TOPS/W, comparable with state of the art inmemory processors. We also show that the accuracy of the images obtained by NOMF provide comparable accuracy in tracking and classification applications when compared with images obtained by conventional median filtering.
△ Less
Submitted 29 July, 2021; v1 submitted 25 July, 2021;
originally announced July 2021.
-
Exploring a Dynamic Ring without Landmark
Authors:
Archak Das,
Kaustav Bose,
Buddhadeb Sau
Abstract:
Consider a group of autonomous mobile computational entities, called agents, arbitrarily placed at some nodes of a dynamic but always connected ring. The agents neither have any knowledge about the size of the ring nor have a common notion of orientation. We consider the \textsc{Exploration} problem where the agents have to collaboratively to explore the graph and terminate, with the requirement t…
▽ More
Consider a group of autonomous mobile computational entities, called agents, arbitrarily placed at some nodes of a dynamic but always connected ring. The agents neither have any knowledge about the size of the ring nor have a common notion of orientation. We consider the \textsc{Exploration} problem where the agents have to collaboratively to explore the graph and terminate, with the requirement that each node has to be visited by at least one agent. It has been shown by Di Luna et al. [Distrib. Comput. 2020] that the problem is solvable by two anonymous agents if there is a single observably different node in the ring called landmark node. The problem is unsolvable by any number of anonymous agents in absence of a landmark node. We consider the problem with non-anonymous agents (agents with distinct identifiers) in a ring with no landmark node. The assumption of agents with distinct identifiers is strictly weaker than having a landmark node as the problem is unsolvable by two agents with distinct identifiers in absence of a landmark node. This setting has been recently studied by Mandal et al. [ALGOSENSORS 2020]. There it is shown that the problem is solvable in this setting by three agents assuming that they have edge crossing detection capability. Edge crossing detection capability is a strong assumption which enables two agents moving in opposite directions through an edge in the same round to detect each other and also exchange information. In this paper we give an algorithm that solves the problem with three agents without the edge crossing detection capability.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Pattern Formation by Robots with Inaccurate Movements
Authors:
Kaustav Bose,
Archak Das,
Buddhadeb Sau
Abstract:
\textsc{Arbitrary Pattern Formation} is a fundamental problem in autonomous mobile robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern $F$ given as input. In this paper, we study the problem for robots whose movements can be inaccurate. Our movement model assumes errors in both direct…
▽ More
\textsc{Arbitrary Pattern Formation} is a fundamental problem in autonomous mobile robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern $F$ given as input. In this paper, we study the problem for robots whose movements can be inaccurate. Our movement model assumes errors in both direction and extent of the intended movement. Forming the given pattern exactly is not possible in this setting. So we require that the robots must form a configuration which is close to the given pattern $F$. We call this the \textsc{Approximate Arbitrary Pattern Formation} problem. We show that with no agreement in coordinate system, the problem is unsolvable, even by fully synchronous robots, if the initial configuration 1) has rotational symmetry and there is no robot at the center of rotation or 2) has reflectional symmetry and there is no robot on the reflection axis. From all other initial configurations, we solve the problem by 1) oblivious, silent and semi-synchronous robots and 2) oblivious, asynchronous robots that can communicate using externally visible lights.
△ Less
Submitted 16 February, 2021; v1 submitted 19 October, 2020;
originally announced October 2020.
-
ADIC: Anomaly Detection Integrated Circuit in 65nm CMOS utilizing Approximate Computing
Authors:
Bapi Kar,
Pradeep Kumar Gopalakrishnan,
Sumon Kumar Bose,
Mohendra Roy,
Arindam Basu
Abstract:
In this paper, we present a low-power anomaly detection integrated circuit (ADIC) based on a one-class classifier (OCC) neural network. The ADIC achieves low-power operation through a combination of (a) careful choice of algorithm for online learning and (b) approximate computing techniques to lower average energy. In particular, online pseudoinverse update method (OPIUM) is used to train a random…
▽ More
In this paper, we present a low-power anomaly detection integrated circuit (ADIC) based on a one-class classifier (OCC) neural network. The ADIC achieves low-power operation through a combination of (a) careful choice of algorithm for online learning and (b) approximate computing techniques to lower average energy. In particular, online pseudoinverse update method (OPIUM) is used to train a randomized neural network for quick and resource efficient learning. An additional 42% energy saving can be achieved when a lighter version of OPIUM method is used for training with the same number of data samples lead to no significant compromise on the quality of inference. Instead of a single classifier with large number of neurons, an ensemble of K base learner approach is chosen to reduce learning memory by a factor of K. This also enables approximate computing by dynamically varying the neural network size based on anomaly detection. Fabricated in 65nm CMOS, the ADIC has K = 7 Base Learners (BL) with 32 neurons in each BL and dissipates 11.87pJ/OP and 3.35pJ/OP during learning and inference respectively at Vdd = 0.75V when all 7 BLs are enabled. Further, evaluated on the NASA bearing dataset, approximately 80% of the chip can be shut down for 99% of the lifetime leading to an energy efficiency of 0.48pJ/OP, an 18.5 times reduction over full-precision computing running at Vdd = 1.2V throughout the lifetime.
△ Less
Submitted 21 August, 2020;
originally announced August 2020.
-
Distributed Localization of Wireless Sensor Network Using Communication Wheel
Authors:
Kaustav Bose,
Manash Kumar Kundu,
Ranendu Adhikary,
Buddhadeb Sau
Abstract:
We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, un…
▽ More
We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, unless RP = NP. So we are interested in algorithms that efficiently localize the network partially. A widely used technique that can efficiently localize a uniquely localizable portion of the network is trilateration: starting from three anchors (nodes with known positions), nodes having at least three localized neighbors are sequentially localized. However, the performance of trilateration can substantially differ for different choices of the initial three anchors. In this paper, we propose a distributed localization scheme with a theoretical characterization of nodes that are guaranteed to be localized. In particular, our proposed distributed algorithm starts localization from a strongly interior node and provided that the subgraph induced by the strongly interior nodes is connected, it localizes all nodes of the network except some boundary nodes and isolated weakly interior nodes.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
Memory Optimal Dispersion by Anonymous Mobile Robots
Authors:
Archak Das,
Kaustav Bose,
Buddhadeb Sau
Abstract:
Consider a team of $k \leq n$ autonomous mobile robots initially placed at a node of an arbitrary graph $G$ with $n$ nodes. The dispersion problem asks for a distributed algorithm that allows the robots to reach a configuration in which each robot is at a distinct node of the graph. If the robots are anonymous, i.e., they do not have any unique identifiers, then the problem is not solvable by any…
▽ More
Consider a team of $k \leq n$ autonomous mobile robots initially placed at a node of an arbitrary graph $G$ with $n$ nodes. The dispersion problem asks for a distributed algorithm that allows the robots to reach a configuration in which each robot is at a distinct node of the graph. If the robots are anonymous, i.e., they do not have any unique identifiers, then the problem is not solvable by any deterministic algorithm. However, the problem can be solved even by anonymous robots if each robot is given access to a fair coin which they can use to generate random bits. In this setting, it is known that the robots require $Ω(\logΔ)$ bits of memory to achieve dispersion, where $Δ$ is the maximum degree of $G$. On the other hand, the best known memory upper bound is $min \{Δ, max\{\logΔ, \log{D}\}\}$ ($D$ = diameter of $G$), which can be $ω(\logΔ)$, depending on the values of $Δ$ and $D$. In this paper, we close this gap by presenting an optimal algorithm requiring $O(\logΔ)$ bits of memory.
△ Less
Submitted 4 December, 2020; v1 submitted 3 August, 2020;
originally announced August 2020.
-
Complexity of Maximum Cut on Interval Graphs
Authors:
Ranendu Adhikary,
Kaustav Bose,
Satwik Mukherjee,
Bodhayan Roy
Abstract:
We resolve the longstanding open problem concerning the computational complexity of Max Cut on interval graphs by showing that it is NP-complete.
We resolve the longstanding open problem concerning the computational complexity of Max Cut on interval graphs by showing that it is NP-complete.
△ Less
Submitted 31 March, 2021; v1 submitted 29 May, 2020;
originally announced June 2020.
-
A 75kb SRAM in 65nm CMOS for In-Memory Computing Based Neuromorphic Image Denoising
Authors:
Sumon Kumar Bose,
Vivek Mohan,
Arindam Basu
Abstract:
This paper presents an in-memory computing (IMC) architecture for image denoising. The proposed SRAM based in-memory processing framework works in tandem with approximate computing on a binary image generated from neuromorphic vision sensors. Implemented in TSMC 65nm process, the proposed architecture enables approximately 2000X energy savings (approximately 222X from IMC) compared to a digital im…
▽ More
This paper presents an in-memory computing (IMC) architecture for image denoising. The proposed SRAM based in-memory processing framework works in tandem with approximate computing on a binary image generated from neuromorphic vision sensors. Implemented in TSMC 65nm process, the proposed architecture enables approximately 2000X energy savings (approximately 222X from IMC) compared to a digital implementation when tested with the video recordings from a DAVIS sensor and achieves a peak throughput of 1.25-1.66 frames/us.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Is my Neural Network Neuromorphic? Taxonomy, Recent Trends and Future Directions in Neuromorphic Engineering
Authors:
Sumon Kumar Bose,
Jyotibdha Acharya,
Arindam Basu
Abstract:
In this paper, we review recent work published over the last 3 years under the umbrella of Neuromorphic engineering to analyze what are the common features among such systems. We see that there is no clear consensus but each system has one or more of the following features:(1) Analog computing (2) Non vonNeumann Architecture and low-precision digital processing (3) Spiking Neural Networks (SNN) wi…
▽ More
In this paper, we review recent work published over the last 3 years under the umbrella of Neuromorphic engineering to analyze what are the common features among such systems. We see that there is no clear consensus but each system has one or more of the following features:(1) Analog computing (2) Non vonNeumann Architecture and low-precision digital processing (3) Spiking Neural Networks (SNN) with components closely related to biology. We compare recent machine learning accelerator chips to show that indeed analog processing and reduced bit precision architectures have best throughput, energy and area efficiencies. However, pure digital architectures can also achieve quite high efficiencies by just adopting a non von-Neumann architecture. Given the design automation tools for digital hardware design, it raises a question on the likelihood of adoption of analog processing in the near future for industrial designs. Next, we argue about the importance of defining standards and choosing proper benchmarks for the progress of neuromorphic system designs and propose some desired characteristics of such benchmarks. Finally, we show brain-machine interfaces as a potential task that fulfils all the criteria of such benchmarks.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
ADEPOS: A Novel Approximate Computing Framework for Anomaly Detection Systems and its Implementation in 65nm CMOS
Authors:
Sumon Kumar Bose,
Bapi Kar,
Mohendra Roy,
Pradeep Kumar Gopalakrishnan,
Zhang Lei,
Aakash Patil,
Arindam Basu
Abstract:
To overcome the energy and bandwidth limitations of traditional IoT systems, edge computing or information extraction at the sensor node has become popular. However, now it is important to create very low energy information extraction or pattern recognition systems. In this paper, we present an approximate computing method to reduce the computation energy of a specific type of IoT system used for…
▽ More
To overcome the energy and bandwidth limitations of traditional IoT systems, edge computing or information extraction at the sensor node has become popular. However, now it is important to create very low energy information extraction or pattern recognition systems. In this paper, we present an approximate computing method to reduce the computation energy of a specific type of IoT system used for anomaly detection (e.g. in predictive maintenance, epileptic seizure detection, etc). Termed as Anomaly Detection Based Power Savings (ADEPOS), our proposed method uses low precision computing and low complexity neural networks at the beginning when it is easy to distinguish healthy data. However, on the detection of anomalies, the complexity of the network and computing precision are adaptively increased for accurate predictions. We show that ensemble approaches are well suited for adaptively changing network size. To validate our proposed scheme, a chip has been fabricated in UMC65nm process that includes an MSP430 microprocessor along with an on-chip switching mode DC-DC converter for dynamic voltage and frequency scaling. Using NASA bearing dataset for machine health monitoring, we show that using ADEPOS we can achieve 8.95X saving of energy along the lifetime without losing any detection accuracy. The energy savings are obtained by reducing the execution time of the neural network on the microprocessor.
△ Less
Submitted 4 December, 2019;
originally announced December 2019.
-
Blockchain-Assisted Spectrum Trading between Elastic Virtual Optical Networks
Authors:
Shifeng Ding,
Kevin X. Pan,
Sanjay K. Bose,
Qiong Zhang,
Gangxiang Shen
Abstract:
In communication networks, network virtualization can usually provide better capacity utilization and quality of service (QoS) than what can be achieved otherwise. However, conventional resource allocation for virtualized networks would still follow a fixed pattern based on the predicted capacity needs of the users, even though, in reality, the actual traffic demand of a user will always tend to f…
▽ More
In communication networks, network virtualization can usually provide better capacity utilization and quality of service (QoS) than what can be achieved otherwise. However, conventional resource allocation for virtualized networks would still follow a fixed pattern based on the predicted capacity needs of the users, even though, in reality, the actual traffic demand of a user will always tend to fluctuate. The mismatch between the fixed capacity allocation and the actual fluctuating traffic would lead to degradation of provisioned network services and inefficiency in the assigned network capacity. To overcome this, we propose a new spectrum trading (ST) scheme between virtual optical networks (VONs) in the context of an elastic optical network (EON). The key idea here is to allow different VONs to trade their spectrum resources according to the actual capacity they need at different time instants. A VON with unused spectra can then trade away its unused spectra to other VONs that are short of spectrum resources at that time. In exchange, it is rewarded with a certain amount of credit for its contribution to the ST community, which it can then use later to get extra bandwidth, if needed. The trust-worthiness of the trading records between the VONs is ensured in a distributed fashion through a blockchain-assisted account book that is updated whenever a new trade occurs. For this, we develop a software-defined control plane to enable spectrum trading in an EON. The performance of the ST scheme is evaluated and compared with a scenario without such trading. Our results show that the proposed ST scheme is effective in improving the QoS of each VON and significantly improves the overall network capacity utilization.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Arbitrary Pattern Formation by Opaque Fat Robots with Lights
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has b…
▽ More
Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has been studied in the obstructed visibility model, where the view of a robot can be obstructed by the presence of other robots. However, in these works, the robots have been modelled as dimensionless points in the plane. In this paper, we have considered the problem in the more realistic setting where the robots have a physical extent. In particular, the robots are modelled as opaque disks. Furthermore, the robots operate under a fully asynchronous scheduler. They do not have access to any global coordinate system, but agree on the direction and orientation of one coordinate axis. Each robot is equipped with an externally visible light which can assume a constant number of predefined colors. In this setting, we have given a complete characterization of initial configurations from where any arbitrary pattern can be formed by a deterministic distributed algorithm.
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
Positional Encoding by Robots with Non-Rigid Movements
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For th…
▽ More
Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For this, the robots need an unlimited amount of persistent memory to store the snapshots taken from different points inside the polygon. However, it has been shown by Di Luna et al. [DISC 2017] that map construction can be done even by oblivious robots by employing a positional encoding strategy where a robot carefully positions itself inside the polygon to encode information in the binary representation of its distance from the closest polygon vertex. Of course, to execute this strategy, it is crucial for the robots to make accurate movements. In this paper, we address the question whether this technique can be implemented even when the movements of the robots are unpredictable in the sense that the robot can be stopped by the adversary during its movement before reaching its destination. However, there exists a constant $δ> 0$, unknown to the robot, such that the robot can always reach its destination if it has to move by no more than $δ$ amount. This model is known in literature as \emph{non-rigid} movement. We give a partial answer to the question in the affirmative by presenting a map construction algorithm for robots with non-rigid movement, but having $O(1)$ bits of persistent memory and ability to make circular moves.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Arbitrary Pattern Formation by Asynchronous Opaque Robots with Lights
Authors:
Kaustav Bose,
Manash Kumar Kundu,
Ranendu Adhikary,
Buddhadeb Sau
Abstract:
The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is ass…
▽ More
The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is assumed to be rigid, which means that each robot is able to reach its desired destination without interruption. The existing literature that investigates this problem, considers robots with unobstructed visibility. This work considers the problem in the more realistic obstructed visibility model, where the view of a robot can be obstructed by the presence of other robots. The robots are assumed to be punctiform and equipped with visible lights that can assume a constant number of predefined colors. We have studied the problem in two settings based on the level of consistency among the local coordinate systems of the robots: two axis agreement (they agree on the direction and orientation of both coordinate axes) and one axis agreement (they agree on the direction and orientation of only one coordinate axis). In both settings, we have provided a full characterization of initial configurations from where any arbitrary pattern can be formed.
△ Less
Submitted 7 October, 2020; v1 submitted 13 February, 2019;
originally announced February 2019.
-
Counter-Propagating Core Assignment in Multi-Core Fiber Optical Networks to Reduce Inter-Core Crosstalk and Capacity Wastage
Authors:
Fengxian Tang,
Yonghu Yan,
Limei Peng,
Sanjay K. Bose,
Gangxiang Shen
Abstract:
Inter-core crosstalk is one of the most serious impairments for signal transmission in a multi-core fiber (MCF) optical network. On the other hand, because of wide deployment of data centers (DCs), we are seeing an increasing bidirectional traffic demand asymmetry, which leads to significant capacity wastage in designing and operating an optical transport network. To alleviate these effects, for a…
▽ More
Inter-core crosstalk is one of the most serious impairments for signal transmission in a multi-core fiber (MCF) optical network. On the other hand, because of wide deployment of data centers (DCs), we are seeing an increasing bidirectional traffic demand asymmetry, which leads to significant capacity wastage in designing and operating an optical transport network. To alleviate these effects, for an MCF optical network, we propose to assign fiber cores in an MCF in an asymmetric and counter-propagating manner. This can not only significantly reduce inter-core crosstalk between counter-propagating fiber cores but also flexibly assign different numbers of fiber cores in the opposite directions of a fiber link, thereby overcoming network capacity wastage due to the bidirectional traffic demand asymmetry. To evaluate the benefits of the proposed strategy, we consider the routing, spectrum, and core assignment (RSCA) problem for the MCF optical network. An integer linear programming (ILP) model and an auxiliary graph (AG) based heuristic algorithm are developed to optimize network spectrum resource utilization. Simulation studies show the effectiveness of the proposed core counter-propagation strategy, which can significantly outperform its counterpart, i.e., the co-propagation scheme, in terms of the total number of MCFs used and average inter-core crosstalk. In addition, the proposed RSCA heuristic algorithm is efficient to perform close to the ILP model, which can minimize the number of MCFs used and crosstalk between neighboring cores.
△ Less
Submitted 3 December, 2018;
originally announced December 2018.
-
Arbitrary Pattern Formation on Infinite Grid by Asynchronous Oblivious Robots
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The…
▽ More
The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The robots are assumed to be autonomous, identical, anonymous and oblivious. They operate in Look-Compute-Move cycles under a fully asynchronous scheduler. The robots do not agree on any common global coordinate system or chirality. We have shown that a set of robots can form any arbitrary pattern, if their starting configuration is asymmetric.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
A Stacked Autoencoder Neural Network based Automated Feature Extraction Method for Anomaly detection in On-line Condition Monitoring
Authors:
Mohendra Roy,
Sumon Kumar Bose,
Bapi Kar,
Pradeep Kumar Gopalakrishnan,
Arindam Basu
Abstract:
Condition monitoring is one of the routine tasks in all major process industries. The mechanical parts such as a motor, gear, bearings are the major components of a process industry and any fault in them may cause a total shutdown of the whole process, which may result in serious losses. Therefore, it is very crucial to predict any approaching defects before its occurrence. Several methods exist f…
▽ More
Condition monitoring is one of the routine tasks in all major process industries. The mechanical parts such as a motor, gear, bearings are the major components of a process industry and any fault in them may cause a total shutdown of the whole process, which may result in serious losses. Therefore, it is very crucial to predict any approaching defects before its occurrence. Several methods exist for this purpose and many research are being carried out for better and efficient models. However, most of them are based on the processing of raw sensor signals, which is tedious and expensive. Recently, there has been an increase in the feature based condition monitoring, where only the useful features are extracted from the raw signals and interpreted for the prediction of the fault. Most of these are handcrafted features, where these are manually obtained based on the nature of the raw data. This of course requires the prior knowledge of the nature of data and related processes. This limits the feature extraction process. However, recent development in the autoencoder based feature extraction method provides an alternative to the traditional handcrafted approaches; however, they have mostly been confined in the area of image and audio processing. In this work, we have developed an automated feature extraction method for on-line condition monitoring based on the stack of the traditional autoencoder and an on-line sequential extreme learning machine(OSELM) network. The performance of this method is comparable to that of the traditional feature extraction approaches. The method can achieve 100% detection accuracy for determining the bearing health states of NASA bearing dataset. The simple design of this method is promising for the easy hardware implementation of Internet of Things(IoT) based prognostics solutions.
△ Less
Submitted 18 October, 2018;
originally announced October 2018.
-
Offline Extraction of Indic Regional Language from Natural Scene Image using Text Segmentation and Deep Convolutional Sequence
Authors:
Sauradip Nag,
Pallab Kumar Ganguly,
Sumit Roy,
Sourab Jha,
Krishna Bose,
Abhishek Jha,
Kousik Dasgupta
Abstract:
Regional language extraction from a natural scene image is always a challenging proposition due to its dependence on the text information extracted from Image. Text Extraction on the other hand varies on different lighting condition, arbitrary orientation, inadequate text information, heavy background influence over text and change of text appearance. This paper presents a novel unified method for…
▽ More
Regional language extraction from a natural scene image is always a challenging proposition due to its dependence on the text information extracted from Image. Text Extraction on the other hand varies on different lighting condition, arbitrary orientation, inadequate text information, heavy background influence over text and change of text appearance. This paper presents a novel unified method for tackling the above challenges. The proposed work uses an image correction and segmentation technique on the existing Text Detection Pipeline an Efficient and Accurate Scene Text Detector (EAST). EAST uses standard PVAnet architecture to select features and non maximal suppression to detect text from image. Text recognition is done using combined architecture of MaxOut convolution neural network (CNN) and Bidirectional long short term memory (LSTM) network. After recognizing text using the Deep Learning based approach, the native Languages are translated to English and tokenized using standard Text Tokenizers. The tokens that very likely represent a location is used to find the Global Positioning System (GPS) coordinates of the location and subsequently the regional languages spoken in that location is extracted. The proposed method is tested on a self generated dataset collected from Government of India dataset and experimented on Standard Dataset to evaluate the performance of the proposed technique. Comparative study with a few state-of-the-art methods on text detection, recognition and extraction of regional language from images shows that the proposed method outperforms the existing methods.
△ Less
Submitted 6 July, 2018; v1 submitted 16 June, 2018;
originally announced June 2018.
-
Machine Learning-Assisted Least Loaded Routing to Improve Performance of Circuit-Switched Networks
Authors:
Gangxiang Shen,
Longfei Li,
Ya Zhang,
Wei Chen,
Sanjay K. Bose,
Moshe Zukerman
Abstract:
The Least Loaded (LL) routing algorithm has been in recent decades the routing method of choice in circuit switched networks and therefore it provides a benchmark against which new methods can be compared. This paper improves the performance of the LL algorithm by additionally incorporating a machine learning approach, using a conceptually simple supervised naïve Bayes (NB) classifier. Based on a…
▽ More
The Least Loaded (LL) routing algorithm has been in recent decades the routing method of choice in circuit switched networks and therefore it provides a benchmark against which new methods can be compared. This paper improves the performance of the LL algorithm by additionally incorporating a machine learning approach, using a conceptually simple supervised naïve Bayes (NB) classifier. Based on a sequence of historical network snapshots, this predicts the potential future circuit blocking probability between each node pair. These snapshots are taken for each service request arriving to the network and record the number of busy capacity units on each link at that instant. The candidate route for serving a current service request is based on both the link loads and the potential future blocking probability of the entire network in case this route is indeed used. The performance of this proposed approach is studied via simulations and compared with both the conventional LL algorithm and the Shortest Path (SP) based approach. Results indicate that the proposed supervised naïve Bayes classifier-assisted LL routing algorithm significantly reduces blocking probability of service connection requests and outperforms both the conventional LL and SP routing algorithms. To enable the learning process based on a large number of network snapshots, we also develop a parallel computing framework to implement parallel learning and performance evaluation. Also, a network control system supporting naïve Bayes classifier-assisted LL routing algorithm is addressed.
△ Less
Submitted 3 April, 2018;
originally announced April 2018.
-
Stable Self-Assembled Atomic-Switch Networks for Neuromorphic Applications
Authors:
Saurabh K. Bose,
Joshua B. Mallinson,
Rodrigo M. Gazoni,
Simon A. Brown
Abstract:
Nature inspired neuromorphic architectures are being explored as an alternative to imminent limitations of conventional complementary metal-oxide semiconductor (CMOS) architectures. Utilization of such architectures for practical applications like advanced pattern recognition tasks will require synaptic connections that are both reconfigurable and stable. Here, we report realization of stable atom…
▽ More
Nature inspired neuromorphic architectures are being explored as an alternative to imminent limitations of conventional complementary metal-oxide semiconductor (CMOS) architectures. Utilization of such architectures for practical applications like advanced pattern recognition tasks will require synaptic connections that are both reconfigurable and stable. Here, we report realization of stable atomic-switch networks (ASN), with inherent complex connectivity, self-assembled from percolating metal nanoparticles (NPs). The device conductance reflects the configuration of synapses which can be modulated via voltage stimulus. By controlling Relative Humidity (RH) and oxygen partial-pressure during NP deposition we obtain stochastic conductance switching that is stable over several months. Detailed characterization reveals signatures of electric-field induced atomic-wire formation within the tunnel-gaps of the oxidized percolating network. Finally we show that the synaptic structure can be reconfigured by stimulating at different repetition rates, which can be utilized as short-term to long-term memory conversion. This demonstration of stable stochastic switching in ASNs provides a promising route to hardware implementation of biological neuronal models and, as an example, we highlight possible applications in Reservoir Computing (RC).
△ Less
Submitted 27 December, 2017;
originally announced December 2017.
-
Crash tolerant gathering on grid by asynchronous oblivious robots
Authors:
Kaustav Bose,
Ranendu Adhikary,
Sruti Gan Chaudhuri,
Buddhadeb Sau
Abstract:
Consider a system of autonomous mobile robots initially randomly deployed on the nodes of an anonymous finite grid. A gathering algorithm is a sequence of moves to be executed independently by each robot so that all robots meet at a single node after finite time. The robots operate in Look-Compute-Move cycles. In each cycle, a robot takes a snapshot of the current configuration of the grid in term…
▽ More
Consider a system of autonomous mobile robots initially randomly deployed on the nodes of an anonymous finite grid. A gathering algorithm is a sequence of moves to be executed independently by each robot so that all robots meet at a single node after finite time. The robots operate in Look-Compute-Move cycles. In each cycle, a robot takes a snapshot of the current configuration of the grid in terms of occupied nodes (\emph{Look}), then based on the perceived configuration, decides whether to stay put or to move to an adjacent node (\emph{Compute}), and in the later case makes an instantaneous move accordingly (\emph{Move}). The robots have \emph{weak multiplicity detection} capability, which enables them to detect if a node is empty or occupied by a single robot or by multiple robots. The robots are \emph{asynchronous}, \emph{oblivious}, \emph{anonymous}, can not communicate with each other and execute the same distributed algorithm. In a faulty system, however, any robot can \emph{crash}, which means that it becomes completely inactive and does not take part in the process any further. In that case a fault-tolerant gathering algorithm is an algorithm that gathers all the non-faulty robots at a single node. This paper considers a faulty system that can have at most one crash fault. With these assumptions deterministic fault-tolerant gathering algorithms are presented that gather all initial configurations that are gatherable in a non-faulty system, except for one specific configuration called the \emph{2S2 configuration}.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
On recent advances in 2D Constrained Delaunay triangulation algorithms
Authors:
Pranav Kant Gaur,
S. K. Bose
Abstract:
In this article, recent works on 2D Constrained Delaunay triangulation(CDT) algorithms have been reported. Since the review of CDT algorithms presented by de Floriani(Issues on Machine Vision, Springer Vienna, pg. 95--104, 1989), different algorithms for construction and applications of CDT have appeared in literature each concerned with different aspects of computation and different suitabilities…
▽ More
In this article, recent works on 2D Constrained Delaunay triangulation(CDT) algorithms have been reported. Since the review of CDT algorithms presented by de Floriani(Issues on Machine Vision, Springer Vienna, pg. 95--104, 1989), different algorithms for construction and applications of CDT have appeared in literature each concerned with different aspects of computation and different suitabilities. Therefore, objective of this work is to report an update over that review article considering contemporary prominent algorithms and generalizations for the problem of two dimensional Constrained Delaunay triangulation.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
Improving congestion control for Concurrent Multipath Transfer through bandwidth estimation based resource pooling
Authors:
Samar Shailendra,
R. Bhattacharjee,
Sanjay K. Bose
Abstract:
Stream Control Transmission Protocol (SCTP) was introduced in 2001 as a multipath variant to traditional transport protocols, i.e. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Concurrent Multipath Transfer (CMT) has been proposed as an extension for SCTP to support concurrent usage of available multiple paths. In this paper, we propose a new congestion control algorithm fo…
▽ More
Stream Control Transmission Protocol (SCTP) was introduced in 2001 as a multipath variant to traditional transport protocols, i.e. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Concurrent Multipath Transfer (CMT) has been proposed as an extension for SCTP to support concurrent usage of available multiple paths. In this paper, we propose a new congestion control algorithm for CMT-SCTP based on the principle of resource pooling. We use the connection bandwidth estimates to obtain the collection of the network resources being used by different flows on multiple paths. Based on these bandwidth estimates, we have used the bandwidth estimation based resource pooling approach to adjust the congestion window of the respective paths. We compare our proposed scheme with CMT-SCTP through ns-2 based simulations.
△ Less
Submitted 3 December, 2016;
originally announced December 2016.
-
A Cross-layer Contention Based Synchronous MAC Protocol for Transmission Delay Reduction in Multi-Hop WSNs
Authors:
Ripudaman Singh,
Brijesh Kumar Rai,
Sanjay Kumar Bose
Abstract:
Recently designed cross-layer contention based synchronous MAC protocols like the PRMAC protocol, for wireless sensor networks (WSNs) enable a node to schedule multi-hop transmission of multiple data packets in a cycle. However, these systems accommodate both the request-to-send data process and the confirmation-to-send data process in the same data transmission scheduling window (i.e. data window…
▽ More
Recently designed cross-layer contention based synchronous MAC protocols like the PRMAC protocol, for wireless sensor networks (WSNs) enable a node to schedule multi-hop transmission of multiple data packets in a cycle. However, these systems accommodate both the request-to-send data process and the confirmation-to-send data process in the same data transmission scheduling window (i.e. data window). This reduces the length of the multi-hop flow setup in the data window. In a multi-hop scenario, this degrades both the packet delivery ratio (PDR) and the end-to-end transmission delay (E2ETD). In this paper, we propose a cross-layer contention based synchronous MAC protocol, which accommodates the request-to-send data process in the data window and the confirmation-to-send data process in the sleep window for increased efficiency. We evaluate our proposed protocol through ns-2.35 simulations and compare its performance with the PRMAC protocol. Results suggest that in multi-hop scenario, proposed protocol outperforms PRMAC both in terms of the E2ETD and the packet delivery ratio (PDR).
△ Less
Submitted 6 September, 2016;
originally announced September 2016.
-
Euclidean 1-center of a set of static and mobile points
Authors:
Kaustav Bose,
Ranendu Adhikary,
Sruti Gan Chaudhuri,
Buddhadeb Sau
Abstract:
In this paper, we consider the problem of computing the algebraic parametric equation of the Euclidean 1-center function in $\mathbb{R}^d$, $d \geq 2$, for a system of $n$ static points and $m$ mobile points having motion defined by rational parametric functions. We have shown that the corresponding Euclidean 1-center function is a piecewise differentiable function and have derived its exact param…
▽ More
In this paper, we consider the problem of computing the algebraic parametric equation of the Euclidean 1-center function in $\mathbb{R}^d$, $d \geq 2$, for a system of $n$ static points and $m$ mobile points having motion defined by rational parametric functions. We have shown that the corresponding Euclidean 1-center function is a piecewise differentiable function and have derived its exact parametric algebraic equation. If the positions of the static points and the rational parametric equations of the motion of the mobile points are given, we have proposed an algorithm that computes the parametric equation of the Euclidean 1-center function.
△ Less
Submitted 21 November, 2016; v1 submitted 2 September, 2016;
originally announced September 2016.