-
BRACTIVE: A Brain Activation Approach to Human Visual Brain Learning
Authors:
Xuan-Bac Nguyen,
Hojin Jang,
Xin Li,
Samee U. Khan,
Pawan Sinha,
Khoa Luu
Abstract:
The human brain is a highly efficient processing unit, and understanding how it works can inspire new algorithms and architectures in machine learning. In this work, we introduce a novel framework named Brain Activation Network (BRACTIVE), a transformer-based approach to studying the human visual brain. The main objective of BRACTIVE is to align the visual features of subjects with corresponding b…
▽ More
The human brain is a highly efficient processing unit, and understanding how it works can inspire new algorithms and architectures in machine learning. In this work, we introduce a novel framework named Brain Activation Network (BRACTIVE), a transformer-based approach to studying the human visual brain. The main objective of BRACTIVE is to align the visual features of subjects with corresponding brain representations via fMRI signals. It allows us to identify the brain's Regions of Interest (ROI) of the subjects. Unlike previous brain research methods, which can only identify ROIs for one subject at a time and are limited by the number of subjects, BRACTIVE automatically extends this identification to multiple subjects and ROIs. Our experiments demonstrate that BRACTIVE effectively identifies person-specific regions of interest, such as face and body-selective areas, aligning with neuroscience findings and indicating potential applicability to various object categories. More importantly, we found that leveraging human visual brain activity to guide deep neural networks enhances performance across various benchmarks. It encourages the potential of BRACTIVE in both neuroscience and machine intelligence studies.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
The Argument for Meta-Modeling-Based Approaches to Hardware Generation Languages
Authors:
Johannes Schreiner,
Daniel Gerl,
Robert Kunzelmann,
Paritosh Kumar Sinha,
Wolfgang Ecker
Abstract:
The rapid evolution of Integrated Circuit (IC) development necessitates innovative methodologies such as code generation to manage complexity and increase productivity. Using the right methodology for generator development to maximize the capability and, most notably, the feasibility of generators is a crucial part of this work. Meta-Modeling-based approaches drawing on the principles of Model Dri…
▽ More
The rapid evolution of Integrated Circuit (IC) development necessitates innovative methodologies such as code generation to manage complexity and increase productivity. Using the right methodology for generator development to maximize the capability and, most notably, the feasibility of generators is a crucial part of this work. Meta-Modeling-based approaches drawing on the principles of Model Driven Architecture (MDA) are a promising methodology for generator development. The goal of this paper is to show why such an MDA-based approach can provide extremely powerful generators with minimal implementation effort and to demonstrate that this approach is a superior alternative to the most advanced hardware generation languages such as SpinalHDL and Chisel. For this purpose, this paper provides an in-depth comparison of the Meta-Modeling approach against these hardware generation languages, highlighting the unique advantages of a Meta-Modeling-based approach and summarizes the benefits.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Proper vs Improper Quantum PAC learning
Authors:
Ashwin Nayak,
Pulkit Sinha
Abstract:
A basic question in the PAC model of learning is whether proper learning is harder than improper learning. In the classical case, there are examples of concept classes with VC dimension $d$ that have sample complexity $Ω\left(\frac dε\log\frac1ε\right)$ for proper learning with error $ε$, while the complexity for improper learning is O$\!\left(\frac dε\right)$. One such example arises from the Cou…
▽ More
A basic question in the PAC model of learning is whether proper learning is harder than improper learning. In the classical case, there are examples of concept classes with VC dimension $d$ that have sample complexity $Ω\left(\frac dε\log\frac1ε\right)$ for proper learning with error $ε$, while the complexity for improper learning is O$\!\left(\frac dε\right)$. One such example arises from the Coupon Collector problem.
Motivated by the efficiency of proper versus improper learning with quantum samples, Arunachalam, Belovs, Childs, Kothari, Rosmanis, and de Wolf (TQC 2020) studied an analogue, the Quantum Coupon Collector problem. Curiously, they discovered that for learning size $k$ subsets of $[n]$ the problem has sample complexity $Θ(k\log\min\{k,n-k+1\})$, in contrast with the complexity of $Θ(k\log k)$ for Coupon Collector. This effectively negates the possibility of a separation between the two modes of learning via the quantum problem, and Arunachalam et al.\ posed the possibility of such a separation as an open question.
In this work, we first present an algorithm for the Quantum Coupon Collector problem with sample complexity that matches the sharper lower bound of $(1-o_k(1))k\ln\min\{k,n-k+1\}$ shown recently by Bab Hadiashar, Nayak, and Sinha (IEEE TIT 2024), for the entire range of the parameter $k$. Next, we devise a variant of the problem, the Quantum Padded Coupon Collector. We prove that its sample complexity matches that of the classical Coupon Collector problem for both modes of learning, thereby exhibiting the same asymptotic separation between proper and improper quantum learning as mentioned above. The techniques we develop in the process can be directly applied to any form of padded quantum data. We hope that padding can more generally lift other forms of classical learning behaviour to the quantum setting.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Shabari: Delayed Decision-Making for Faster and Efficient Serverless Functions
Authors:
Prasoon Sinha,
Kostis Kaffes,
Neeraja J. Yadwadkar
Abstract:
Serverless computing relieves developers from the burden of resource management, thus providing ease-of-use to the users and the opportunity to optimize resource utilization for the providers. However, today's serverless systems lack performance guarantees for function invocations, thus limiting support for performance-critical applications: we observed severe performance variability (up to 6x). P…
▽ More
Serverless computing relieves developers from the burden of resource management, thus providing ease-of-use to the users and the opportunity to optimize resource utilization for the providers. However, today's serverless systems lack performance guarantees for function invocations, thus limiting support for performance-critical applications: we observed severe performance variability (up to 6x). Providers lack visibility into user functions and hence find it challenging to right-size them: we observed heavy resource underutilization (up to 80%). To understand the causes behind the performance variability and underutilization, we conducted a measurement study of commonly deployed serverless functions and learned that the function performance and resource utilization depend crucially on function semantics and inputs. Our key insight is to delay making resource allocation decisions until after the function inputs are available. We introduce Shabari, a resource management framework for serverless systems that makes decisions as late as possible to right-size each invocation to meet functions' performance objectives (SLOs) and improve resource utilization. Shabari uses an online learning agent to right-size each function invocation based on the features of the function input and makes cold-start-aware scheduling decisions. For a range of serverless functions and inputs, Shabari reduces SLO violations by 11-73% while not wasting any vCPUs and reducing wasted memory by 64-94% in the median case, compared to state-of-the-art systems, including Aquatope, Parrotfish, and Cypress.
△ Less
Submitted 25 January, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
Brainformer: Mimic Human Visual Brain Functions to Machine Vision Models via fMRI
Authors:
Xuan-Bac Nguyen,
Xin Li,
Pawan Sinha,
Samee U. Khan,
Khoa Luu
Abstract:
Human perception plays a vital role in forming beliefs and understanding reality. A deeper understanding of brain functionality will lead to the development of novel deep neural networks. In this work, we introduce a novel framework named Brainformer, a straightforward yet effective Transformer-based framework, to analyze Functional Magnetic Resonance Imaging (fMRI) patterns in the human perceptio…
▽ More
Human perception plays a vital role in forming beliefs and understanding reality. A deeper understanding of brain functionality will lead to the development of novel deep neural networks. In this work, we introduce a novel framework named Brainformer, a straightforward yet effective Transformer-based framework, to analyze Functional Magnetic Resonance Imaging (fMRI) patterns in the human perception system from a machine-learning perspective. Specifically, we present the Multi-scale fMRI Transformer to explore brain activity patterns through fMRI signals. This architecture includes a simple yet efficient module for high-dimensional fMRI signal encoding and incorporates a novel embedding technique called 3D Voxels Embedding. Secondly, drawing inspiration from the functionality of the brain's Region of Interest, we introduce a novel loss function called Brain fMRI Guidance Loss. This loss function mimics brain activity patterns from these regions in the deep neural network using fMRI data. This work introduces a prospective approach to transfer knowledge from human perception to neural networks. Our experiments demonstrate that leveraging fMRI information allows the machine vision model to achieve results comparable to State-of-the-Art methods in various image recognition tasks.
△ Less
Submitted 29 May, 2024; v1 submitted 30 November, 2023;
originally announced December 2023.
-
Deep Representation Learning for Prediction of Temporal Event Sets in the Continuous Time Domain
Authors:
Parag Dutta,
Kawin Mayilvaghanan,
Pratyaksha Sinha,
Ambedkar Dukkipati
Abstract:
Temporal Point Processes (TPP) play an important role in predicting or forecasting events. Although these problems have been studied extensively, predicting multiple simultaneously occurring events can be challenging. For instance, more often than not, a patient gets admitted to a hospital with multiple conditions at a time. Similarly people buy more than one stock and multiple news breaks out at…
▽ More
Temporal Point Processes (TPP) play an important role in predicting or forecasting events. Although these problems have been studied extensively, predicting multiple simultaneously occurring events can be challenging. For instance, more often than not, a patient gets admitted to a hospital with multiple conditions at a time. Similarly people buy more than one stock and multiple news breaks out at the same time. Moreover, these events do not occur at discrete time intervals, and forecasting event sets in the continuous time domain remains an open problem. Naive approaches for extending the existing TPP models for solving this problem lead to dealing with an exponentially large number of events or ignoring set dependencies among events. In this work, we propose a scalable and efficient approach based on TPPs to solve this problem. Our proposed approach incorporates contextual event embeddings, temporal information, and domain features to model the temporal event sets. We demonstrate the effectiveness of our approach through extensive experiments on multiple datasets, showing that our model outperforms existing methods in terms of prediction metrics and computational efficiency. To the best of our knowledge, this is the first work that solves the problem of predicting event set intensities in the continuous time domain by using TPPs.
△ Less
Submitted 29 September, 2023;
originally announced September 2023.
-
Is Grad-CAM Explainable in Medical Images?
Authors:
Subhashis Suara,
Aayush Jha,
Pratik Sinha,
Arif Ahmed Sekh
Abstract:
Explainable Deep Learning has gained significant attention in the field of artificial intelligence (AI), particularly in domains such as medical imaging, where accurate and interpretable machine learning models are crucial for effective diagnosis and treatment planning. Grad-CAM is a baseline that highlights the most critical regions of an image used in a deep learning model's decision-making proc…
▽ More
Explainable Deep Learning has gained significant attention in the field of artificial intelligence (AI), particularly in domains such as medical imaging, where accurate and interpretable machine learning models are crucial for effective diagnosis and treatment planning. Grad-CAM is a baseline that highlights the most critical regions of an image used in a deep learning model's decision-making process, increasing interpretability and trust in the results. It is applied in many computer vision (CV) tasks such as classification and explanation. This study explores the principles of Explainable Deep Learning and its relevance to medical imaging, discusses various explainability techniques and their limitations, and examines medical imaging applications of Grad-CAM. The findings highlight the potential of Explainable Deep Learning and Grad-CAM in improving the accuracy and interpretability of deep learning models in medical imaging. The code is available in (will be available).
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Writing your own book: A method for going from closed to open book QA to improve robustness and performance of smaller LLMs
Authors:
Giorgi Kokaia,
Pratyush Sinha,
Yutong Jiang,
Nozha Boujemaa
Abstract:
We introduce two novel methods, Tree-Search and Self-contextualizing QA, designed to enhance the performance of large language models (LLMs) in question-answering tasks. Tree-Search is a sampling technique specifically created to extract diverse information from an LLM for a given prompt. Self-contextualizing QA leverages Tree-Search to enable the model to create its own context using a wide range…
▽ More
We introduce two novel methods, Tree-Search and Self-contextualizing QA, designed to enhance the performance of large language models (LLMs) in question-answering tasks. Tree-Search is a sampling technique specifically created to extract diverse information from an LLM for a given prompt. Self-contextualizing QA leverages Tree-Search to enable the model to create its own context using a wide range of information relevant to the prompt, evaluate it explicitly and return a open book answer to the initial prompt . We demonstrate that the quality of generated answers improves according to various metrics, including accuracy, informativeness, coherence, and consistency, as evaluated by GPT3.5(text-davinci-003). Furthermore, we show that our methods result in increased robustness and that performance is positively correlated with tree size, benefiting both answer quality and robustness. Finally, we discuss other promising applications of Tree-Search, highlighting its potential to enhance a broad range of tasks beyond question-answering.
\noindent We also discuss several areas for future work, including refining the Tree-Search and Self-Contextualizing QA methods, improving the coherence of the generated context, and investigating the impact of bootstrapping on model robustness
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work together to Surface Algorithmic Harms?
Authors:
Rena Li,
Sara Kingsley,
Chelsea Fan,
Proteeti Sinha,
Nora Wai,
Jaimie Lee,
Hong Shen,
Motahhare Eslami,
Jason Hong
Abstract:
Recent years have witnessed an interesting phenomenon in which users come together to interrogate potentially harmful algorithmic behaviors they encounter in their everyday lives. Researchers have started to develop theoretical and empirical understandings of these user driven audits, with a hope to harness the power of users in detecting harmful machine behaviors. However, little is known about u…
▽ More
Recent years have witnessed an interesting phenomenon in which users come together to interrogate potentially harmful algorithmic behaviors they encounter in their everyday lives. Researchers have started to develop theoretical and empirical understandings of these user driven audits, with a hope to harness the power of users in detecting harmful machine behaviors. However, little is known about user participation and their division of labor in these audits, which are essential to support these collective efforts in the future. Through collecting and analyzing 17,984 tweets from four recent cases of user driven audits, we shed light on patterns of user participation and engagement, especially with the top contributors in each case. We also identified the various roles user generated content played in these audits, including hypothesizing, data collection, amplification, contextualization, and escalation. We discuss implications for designing tools to support user driven audits and users who labor to raise awareness of algorithm bias.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Optimal lower bounds for Quantum Learning via Information Theory
Authors:
Shima Bab Hadiashar,
Ashwin Nayak,
Pulkit Sinha
Abstract:
Although a concept class may be learnt more efficiently using quantum samples as compared with classical samples in certain scenarios, Arunachalam and de Wolf (JMLR, 2018) proved that quantum learners are asymptotically no more efficient than classical ones in the quantum PAC and Agnostic learning models. They established lower bounds on sample complexity via quantum state identification and Fouri…
▽ More
Although a concept class may be learnt more efficiently using quantum samples as compared with classical samples in certain scenarios, Arunachalam and de Wolf (JMLR, 2018) proved that quantum learners are asymptotically no more efficient than classical ones in the quantum PAC and Agnostic learning models. They established lower bounds on sample complexity via quantum state identification and Fourier analysis. In this paper, we derive optimal lower bounds for quantum sample complexity in both the PAC and agnostic models via an information-theoretic approach. The proofs are arguably simpler, and the same ideas can potentially be used to derive optimal bounds for other problems in quantum learning theory.
We then turn to a quantum analogue of the Coupon Collector problem, a classic problem from probability theory also of importance in the study of PAC learning. Arunachalam, Belovs, Childs, Kothari, Rosmanis, and de Wolf (TQC, 2020) characterized the quantum sample complexity of this problem up to constant factors. First, we show that the information-theoretic approach mentioned above provably does not yield the optimal lower bound. As a by-product, we get a natural ensemble of pure states in arbitrarily high dimensions which are not easily (simultaneously) distinguishable, while the ensemble has close to maximal Holevo information. Second, we discover that the information-theoretic approach yields an asymptotically optimal bound for an approximation variant of the problem. Finally, we derive a sharper lower bound for the Quantum Coupon Collector problem, via the generalized Holevo-Curlander bounds on the distinguishability of an ensemble. All the aspects of the Quantum Coupon Collector problem we study rest on properties of the spectrum of the associated Gram matrix, which may be of independent interest.
△ Less
Submitted 27 February, 2024; v1 submitted 5 January, 2023;
originally announced January 2023.
-
Information Transfer Rate in BCIs: Towards Tightly Integrated Symbiosis
Authors:
Suayb S. Arslan,
Pawan Sinha
Abstract:
The information transmission rate (ITR), or effective bit rate, is a popular and widely used information measurement metric, particularly popularized for SSVEP-based Brain-Computer (BCI) interfaces. By combining speed and accuracy into a single-valued parameter, this metric aids in the evaluation and comparison of various target identification algorithms across different BCI communities. In order…
▽ More
The information transmission rate (ITR), or effective bit rate, is a popular and widely used information measurement metric, particularly popularized for SSVEP-based Brain-Computer (BCI) interfaces. By combining speed and accuracy into a single-valued parameter, this metric aids in the evaluation and comparison of various target identification algorithms across different BCI communities. In order to calculate ITR, it is customary to assume a uniform input distribution and an oversimplified channel model that is memoryless, stationary, and symmetrical in nature with discrete alphabet sizes. To accurately depict performance and inspire an end-to-end design for futuristic BCI designs, a more thorough examination and definition of ITR is therefore required. We model the symbiotic communication medium, hosted by the retinogeniculate visual pathway, as a discrete memoryless channel and use the modified capacity expressions to redefine the ITR. We leverage a result for directed graphs to characterize the relationship between the asymmetry of the transition statistics and the ITR gain due to the new definition, leading to potential bounds on data rate performance. On two well-known SSVEP datasets, we compared two cutting-edge target identification methods. Results indicate that the induced DM channel asymmetry has a greater impact on the actual perceived ITR than the change in input distribution. Moreover, it is demonstrated that the ITR gain under the new definition is inversely correlated with the asymmetry in the channel transition statistics. Individual input customizations are further shown to yield perceived ITR performance improvements. Finally, an algorithm is proposed to find the capacity of binary classification and further discussions are given to extend such results to multi-class case through ensemble techniques.
△ Less
Submitted 10 June, 2023; v1 submitted 1 January, 2023;
originally announced January 2023.
-
Digital Literacy and Reading Habits of The DMI-St. Eugene University Students
Authors:
Subaveerapandiyan A,
Priyanka Sinha
Abstract:
Digital literacy is the skill of finding, evaluating, consuming, and generating information using digital technologies. The study attempted to comprehend university students' digital reading habits and skills. It also provides a glimpse of the pupils' favorite reading materials, including physical and digital sources. We examined BSc and BE Computer Science students of DMI-St. Eugene University, Z…
▽ More
Digital literacy is the skill of finding, evaluating, consuming, and generating information using digital technologies. The study attempted to comprehend university students' digital reading habits and skills. It also provides a glimpse of the pupils' favorite reading materials, including physical and digital sources. We examined BSc and BE Computer Science students of DMI-St. Eugene University, Zambia. The tool was a structured questionnaire that was distributed through WhatsApp. The study's findings revealed that most students thoroughly understand digital tools and how to use them but lack the skills to build their websites and portfolio. Out of 115 students, all agreed they used computers for learning purposes. Usage of digital environments, generally, they used the World Wide Web for searching for information. Additionally, most students have medium digital application skills, despite their preference for reading electronic books. The results indicate that students' gender and level of education had a statistically significant link with their digital literacy, whereas age wasn't shown to be a statistically relevant predictor. The findings show that, in terms of education, especially reading, students' or readers' top priorities are electronic resources; print book preferences are reduced.
△ Less
Submitted 29 October, 2022;
originally announced November 2022.
-
Library and Information Science Scholarly Journals Publishing Simulation: A Study
Authors:
Priyanka Sinha,
Subaveerapandiyan A
Abstract:
The author's productivity is assessed based on publications, which requires a lot of motivation and time. Manuscripts get through several steps before being accepted and published. The purpose of this paper is to understand the time gap between acceptance to the publication of manuscripts in reputed journals of Library and Information Science.
This paper is useful to contemporary researchers for…
▽ More
The author's productivity is assessed based on publications, which requires a lot of motivation and time. Manuscripts get through several steps before being accepted and published. The purpose of this paper is to understand the time gap between acceptance to the publication of manuscripts in reputed journals of Library and Information Science.
This paper is useful to contemporary researchers for knowing the journal publication duration. In this paper, we discussed the refereed and index journals in the field of library and information science. For this study, we collected the data from six LIS journals which were published from the 2020 January to December Asian region. The study focuses on detailed analyses of journal processing and publishing duration. The major contribution of this study gives the six LIS journal processing time they are: author manuscript submitted to accepted, accepted to published, and submitted to published period.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Digital Literacy and Reading Habits of the Central University of Tamil Nadu Students: A Survey Study
Authors:
Subaveerapandiyan A,
Priyanka Sinha
Abstract:
The study attempted to understand the University students' digital reading habits and their related skills. It also has a view of students' preferred sources of reading, whether physical or digital resources. For this study, we conducted a survey study with students and research scholars of the Central University of Tamil Nadu, India. The instrument was a structured questionnaire distributed with…
▽ More
The study attempted to understand the University students' digital reading habits and their related skills. It also has a view of students' preferred sources of reading, whether physical or digital resources. For this study, we conducted a survey study with students and research scholars of the Central University of Tamil Nadu, India. The instrument was a structured questionnaire distributed with various modes. The result found that the majority of the students are well known about digital tools and usage, most of the students are excellent in digital literacy skills and other findings is however they are good in digital literacy even though they like to read print books is their most favorable preference. The results conclude that whatever technological devices are developed and students have also grown their technical knowledge. The result finds out, in education especially reading-wise, students or readers' first wish is printed resources; digital books are secondary to them.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Research Data Management and Services in South Asian Academic Libraries
Authors:
Jahnavi Yidavalapati,
Priyanka Sinha,
Subaveerapandiyan A
Abstract:
The study examined the research data management and related services offered by South Asian countries' academic libraries. Research applied quantitative approach and survey research design method were used for this study. The survey questionnaire was distributed randomly to academic library professionals in five countries: Afghanistan, Bangladesh, India, Pakistan, and Sri Lanka. The sample populat…
▽ More
The study examined the research data management and related services offered by South Asian countries' academic libraries. Research applied quantitative approach and survey research design method were used for this study. The survey questionnaire was distributed randomly to academic library professionals in five countries: Afghanistan, Bangladesh, India, Pakistan, and Sri Lanka. The sample population comprised 67 library professionals from various institutes of five countries. The study recommends that institutes or funding organizations support staff to attend conferences and workshops on research data management, library professionals have to join MOOC to take courses related to research data services, Institute or professionals conduct in-house staff workshops and presentations. The study also found that 64.2 per cent agreed compliance with funder requirements and preservation are major issues.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Not All GPUs Are Created Equal: Characterizing Variability in Large-Scale, Accelerator-Rich Systems
Authors:
Prasoon Sinha,
Akhil Guliani,
Rutwik Jain,
Brandon Tran,
Matthew D. Sinclair,
Shivaram Venkataraman
Abstract:
Scientists are increasingly exploring and utilizing the massive parallelism of general-purpose accelerators such as GPUs for scientific breakthroughs. As a result, datacenters, hyperscalers, national computing centers, and supercomputers have procured hardware to support this evolving application paradigm. These systems contain hundreds to tens of thousands of accelerators, enabling peta- and exa-…
▽ More
Scientists are increasingly exploring and utilizing the massive parallelism of general-purpose accelerators such as GPUs for scientific breakthroughs. As a result, datacenters, hyperscalers, national computing centers, and supercomputers have procured hardware to support this evolving application paradigm. These systems contain hundreds to tens of thousands of accelerators, enabling peta- and exa-scale levels of compute for scientific workloads. Recent work demonstrated that power management (PM) can impact application performance in CPU-based HPC systems, even when machines have the same architecture and SKU (stock keeping unit). This variation occurs due to manufacturing variability and the chip's PM. However, while modern HPC systems widely employ accelerators such as GPUs, it is unclear how much this variability affects applications. Accordingly, we seek to characterize the extent of variation due to GPU PM in modern HPC and supercomputing systems. We study a variety of applications that stress different GPU components on five large-scale computing centers with modern GPUs: Oak Ridge's Summit, Sandia's Vortex, TACC's Frontera and Longhorn, and Livermore's Corona. These clusters use a variety of cooling methods and GPU vendors. In total, we collect over 18,800 hours of data across more than 90% of the GPUs in these clusters. Regardless of the application, cluster, GPU vendor, and cooling method, our results show significant variation: 8% (max 22%) average performance variation even though the GPU architecture and vendor SKU are identical within each cluster, with outliers up to 1.5X slower than the median GPU. These results highlight the difficulty in efficiently using existing GPU clusters for modern HPC and scientific workloads, and the need to embrace variability in future accelerator-based systems.
△ Less
Submitted 8 November, 2022; v1 submitted 23 August, 2022;
originally announced August 2022.
-
Neural Correlates of Face Familiarity Perception
Authors:
Evan Ehrenberg,
Kleovoulos Leo Tsourides,
Hossein Nejati,
Ngai-Man Cheung,
Pawan Sinha
Abstract:
In the domain of face recognition, there exists a puzzling timing discrepancy between results from macaque neurophysiology on the one hand and human electrophysiology on the other. Single unit recordings in macaques have demonstrated face identity specific responses in extra-striate visual cortex within 100 milliseconds of stimulus onset. In EEG and MEG experiments with humans, however, a consiste…
▽ More
In the domain of face recognition, there exists a puzzling timing discrepancy between results from macaque neurophysiology on the one hand and human electrophysiology on the other. Single unit recordings in macaques have demonstrated face identity specific responses in extra-striate visual cortex within 100 milliseconds of stimulus onset. In EEG and MEG experiments with humans, however, a consistent distinction between neural activity corresponding to unfamiliar and familiar faces has been reported to emerge around 250 ms. This points to the possibility that there may be a hitherto undiscovered early correlate of face familiarity perception in human electrophysiological traces. We report here a successful search for such a correlate in dense MEG recordings using pattern classification techniques. Our analyses reveal markers of face familiarity as early as 85 ms after stimulus onset. Low-level attributes of the images, such as luminance and color distributions, are unable to account for this early emerging response difference. These results help reconcile human and macaque data, and provide clues regarding neural mechanisms underlying familiar face perception.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
Consensus of networked double integrator systems under sensor bias
Authors:
Pallavi Sinha,
Srikant Sukumar,
Himani Sinhmar
Abstract:
A novel distributed control law for consensus of networked double integrator systems with biased measurements is developed in this article. The agents measure relative positions over a time-varying, undirected graph with an unknown and constant sensor bias corrupting the measurements. An adaptive control law is derived using Lyapunov methods to estimate the individual sensor biases accurately. The…
▽ More
A novel distributed control law for consensus of networked double integrator systems with biased measurements is developed in this article. The agents measure relative positions over a time-varying, undirected graph with an unknown and constant sensor bias corrupting the measurements. An adaptive control law is derived using Lyapunov methods to estimate the individual sensor biases accurately. The proposed algorithm ensures that position consensus is achieved exponentially in addition to bias estimation. The results leverage recent advances in collective initial excitation based results in adaptive estimation. Conditions connecting bipartite graphs and collective initial excitation are also developed. The algorithms are illustrated via simulation studies on a network of double integrators with local communication and biased measurements.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
Three approaches to facilitate DNN generalization to objects in out-of-distribution orientations and illuminations
Authors:
Akira Sakai,
Taro Sunagawa,
Spandan Madan,
Kanata Suzuki,
Takashi Katoh,
Hiromichi Kobashi,
Hanspeter Pfister,
Pawan Sinha,
Xavier Boix,
Tomotake Sasaki
Abstract:
The training data distribution is often biased towards objects in certain orientations and illumination conditions. While humans have a remarkable capability of recognizing objects in out-of-distribution (OoD) orientations and illuminations, Deep Neural Networks (DNNs) severely suffer in this case, even when large amounts of training examples are available. In this paper, we investigate three diff…
▽ More
The training data distribution is often biased towards objects in certain orientations and illumination conditions. While humans have a remarkable capability of recognizing objects in out-of-distribution (OoD) orientations and illuminations, Deep Neural Networks (DNNs) severely suffer in this case, even when large amounts of training examples are available. In this paper, we investigate three different approaches to improve DNNs in recognizing objects in OoD orientations and illuminations. Namely, these are (i) training much longer after convergence of the in-distribution (InD) validation accuracy, i.e., late-stopping, (ii) tuning the momentum parameter of the batch normalization layers, and (iii) enforcing invariance of the neural activity in an intermediate layer to orientation and illumination conditions. Each of these approaches substantially improves the DNN's OoD accuracy (more than 20% in some cases). We report results in four datasets: two datasets are modified from the MNIST and iLab datasets, and the other two are novel (one of 3D rendered cars and another of objects taken from various controlled orientations and illumination conditions). These datasets allow to study the effects of different amounts of bias and are challenging as DNNs perform poorly in OoD conditions. Finally, we demonstrate that even though the three approaches focus on different aspects of DNNs, they all tend to lead to the same underlying neural mechanism to enable OoD accuracy gains --individual neurons in the intermediate layers become more selective to a category and also invariant to OoD orientations and illuminations. We anticipate this study to be a basis for further improvement of deep neural networks' OoD generalization performance, which is highly demanded to achieve safe and fair AI applications.
△ Less
Submitted 25 January, 2022; v1 submitted 29 October, 2021;
originally announced November 2021.
-
Emergent Neural Network Mechanisms for Generalization to Objects in Novel Orientations
Authors:
Avi Cooper,
Xavier Boix,
Daniel Harari,
Spandan Madan,
Hanspeter Pfister,
Tomotake Sasaki,
Pawan Sinha
Abstract:
The capability of Deep Neural Networks (DNNs) to recognize objects in orientations outside the distribution of the training data is not well understood. We present evidence that DNNs are capable of generalizing to objects in novel orientations by disseminating orientation-invariance obtained from familiar objects seen from many viewpoints. This capability strengthens when training the DNN with an…
▽ More
The capability of Deep Neural Networks (DNNs) to recognize objects in orientations outside the distribution of the training data is not well understood. We present evidence that DNNs are capable of generalizing to objects in novel orientations by disseminating orientation-invariance obtained from familiar objects seen from many viewpoints. This capability strengthens when training the DNN with an increasing number of familiar objects, but only in orientations that involve 2D rotations of familiar orientations. We show that this dissemination is achieved via neurons tuned to common features between familiar and unfamiliar objects. These results implicate brain-like neural mechanisms for generalization.
△ Less
Submitted 13 July, 2023; v1 submitted 27 September, 2021;
originally announced September 2021.
-
Fast constraint satisfaction problem and learning-based algorithm for solving Minesweeper
Authors:
Yash Pratyush Sinha,
Pranshu Malviya,
Rupaj Kumar Nayak
Abstract:
Minesweeper is a popular spatial-based decision-making game that works with incomplete information. As an exemplary NP-complete problem, it is a major area of research employing various artificial intelligence paradigms. The present work models this game as Constraint Satisfaction Problem (CSP) and Markov Decision Process (MDP). We propose a new method named as dependents from the independent set…
▽ More
Minesweeper is a popular spatial-based decision-making game that works with incomplete information. As an exemplary NP-complete problem, it is a major area of research employing various artificial intelligence paradigms. The present work models this game as Constraint Satisfaction Problem (CSP) and Markov Decision Process (MDP). We propose a new method named as dependents from the independent set using deterministic solution search (DSScsp) for the faster enumeration of all solutions of a CSP based Minesweeper game and improve the results by introducing heuristics. Using MDP, we implement machine learning methods on these heuristics. We train the classification model on sparse data with results from CSP formulation. We also propose a new rewarding method for applying a modified deep Q-learning for better accuracy and versatile learning in the Minesweeper game. The overall results have been analyzed for different kinds of Minesweeper games and their accuracies have been recorded. Results from these experiments show that the proposed method of MDP based classification model and deep Q-learning overall is the best methods in terms of accuracy for games with given mine densities.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Explaining Outcomes of Multi-Party Dialogues using Causal Learning
Authors:
Priyanka Sinha,
Pabitra Mitra,
Antonio Anastasio Bruto da Costa,
Nikolaos Kekatos
Abstract:
Multi-party dialogues are common in enterprise social media on technical as well as non-technical topics. The outcome of a conversation may be positive or negative. It is important to analyze why a dialogue ends with a particular sentiment from the point of view of conflict analysis as well as future collaboration design. We propose an explainable time series mining algorithm for such analysis. A…
▽ More
Multi-party dialogues are common in enterprise social media on technical as well as non-technical topics. The outcome of a conversation may be positive or negative. It is important to analyze why a dialogue ends with a particular sentiment from the point of view of conflict analysis as well as future collaboration design. We propose an explainable time series mining algorithm for such analysis. A dialogue is represented as an attributed time series of occurrences of keywords, EMPATH categories, and inferred sentiments at various points in its progress. A special decision tree, with decision metrics that take into account temporal relationships between dialogue events, is used for predicting the cause of the outcome sentiment. Interpretable rules mined from the classifier are used to explain the prediction. Experimental results are presented for the enterprise social media posts in a large company.
△ Less
Submitted 3 May, 2021;
originally announced May 2021.
-
A Structurally Regularized Convolutional Neural Network for Image Classification using Wavelet-based SubBand Decomposition
Authors:
Pavel Sinha,
Ioannis Psaromiligkos,
Zeljko Zilic
Abstract:
We propose a convolutional neural network (CNN) architecture for image classification based on subband decomposition of the image using wavelets. The proposed architecture decomposes the input image spectra into multiple critically sampled subbands, extracts features using a single CNN per subband, and finally, performs classification by combining the extracted features using a fully connected lay…
▽ More
We propose a convolutional neural network (CNN) architecture for image classification based on subband decomposition of the image using wavelets. The proposed architecture decomposes the input image spectra into multiple critically sampled subbands, extracts features using a single CNN per subband, and finally, performs classification by combining the extracted features using a fully connected layer. Processing each of the subbands by an individual CNN, thereby limiting the learning scope of each CNN to a single subband, imposes a form of structural regularization. This provides better generalization capability as seen by the presented results. The proposed architecture achieves best-in-class performance in terms of total multiply-add-accumulator operations and nearly best-in-class performance in terms of total parameters required, yet it maintains competitive classification performance. We also show the proposed architecture is more robust than the regular full-band CNN to noise caused by weight-and-bias quantization and input quantization.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
A Novel Framework for Neural Architecture Search in the Hill Climbing Domain
Authors:
Mudit Verma,
Pradyumna Sinha,
Karan Goyal,
Apoorva Verma,
Seba Susan
Abstract:
Neural networks have now long been used for solving complex problems of image domain, yet designing the same needs manual expertise. Furthermore, techniques for automatically generating a suitable deep learning architecture for a given dataset have frequently made use of reinforcement learning and evolutionary methods which take extensive computational resources and time. We propose a new framewor…
▽ More
Neural networks have now long been used for solving complex problems of image domain, yet designing the same needs manual expertise. Furthermore, techniques for automatically generating a suitable deep learning architecture for a given dataset have frequently made use of reinforcement learning and evolutionary methods which take extensive computational resources and time. We propose a new framework for neural architecture search based on a hill-climbing procedure using morphism operators that makes use of a novel gradient update scheme. The update is based on the aging of neural network layers and results in the reduction in the overall training time. This technique can search in a broader search space which subsequently yields competitive results. We achieve a 4.96% error rate on the CIFAR-10 dataset in 19.4 hours of a single GPU training.
△ Less
Submitted 21 February, 2021;
originally announced February 2021.
-
Exploring the dynamics of protest against National Register of Citizens & Citizenship Amendment Act through online social media: the Indian experience
Authors:
Souvik Roy,
Milan Mukherjee,
Priyadarsini Sinha,
Sukanta Das,
Subhasis Bandopadhyay,
Abhik Mukherjee
Abstract:
The generic fluidity observed in the nature of political protest movements across the world during the last decade weigh heavily with the presence of social media. As such, there is a possibility to study the contemporary movements with an interdisciplinary approach combining computational analytics with social science perspectives. The present study has put efforts to understand such dynamics in…
▽ More
The generic fluidity observed in the nature of political protest movements across the world during the last decade weigh heavily with the presence of social media. As such, there is a possibility to study the contemporary movements with an interdisciplinary approach combining computational analytics with social science perspectives. The present study has put efforts to understand such dynamics in the context of the ongoing nationwide movement in India opposing the NRC-CAA enactment. The transformative nature of individual discontent into collective mobilization, especially with a reflective intervention in social media across a sensitive region of the nation state, is presented here with a combination of qualitative (fieldwork) and quantitative (computing) techniques. The study is augmented further by the primary data generation coupled with real-time application of analytical approaches.
△ Less
Submitted 21 February, 2021;
originally announced February 2021.
-
Auditing Digital Platforms for Discrimination in Economic Opportunity Advertising
Authors:
Sara Kingsley,
Clara Wang,
Alex Mikhalenko,
Proteeti Sinha,
Chinmay Kulkarni
Abstract:
Digital platforms, including social networks, are major sources of economic information. Evidence suggests that digital platforms display different socioeconomic opportunities to demographic groups. Our work addresses this issue by presenting a methodology and software to audit digital platforms for bias and discrimination. To demonstrate, an audit of the Facebook platform and advertising network…
▽ More
Digital platforms, including social networks, are major sources of economic information. Evidence suggests that digital platforms display different socioeconomic opportunities to demographic groups. Our work addresses this issue by presenting a methodology and software to audit digital platforms for bias and discrimination. To demonstrate, an audit of the Facebook platform and advertising network was conducted. Between October 2019 and May 2020, we collected 141,063 ads from the Facebook Ad Library API. Using machine learning classifiers, each ad was automatically labeled by the primary marketing category (housing, employment, credit, political, other). For each of the categories, we analyzed the distribution of the ad content by age group and gender. From the audit findings, we considered and present the limitations, needs, infrastructure and policies that would enable researchers to conduct more systematic audits in the future and advocate for why this work must be done. We also discuss how biased distributions impact what socioeconomic opportunities people have, especially when on digital platforms some demographic groups are disproportionately excluded from the population(s) that receive(s) content regulated by law.
△ Less
Submitted 21 August, 2020;
originally announced August 2020.
-
Robustness to Transformations Across Categories: Is Robustness To Transformations Driven by Invariant Neural Representations?
Authors:
Hojin Jang,
Syed Suleman Abbas Zaidi,
Xavier Boix,
Neeraj Prasad,
Sharon Gilad-Gutnick,
Shlomit Ben-Ami,
Pawan Sinha
Abstract:
Deep Convolutional Neural Networks (DCNNs) have demonstrated impressive robustness to recognize objects under transformations (eg. blur or noise) when these transformations are included in the training set. A hypothesis to explain such robustness is that DCNNs develop invariant neural representations that remain unaltered when the image is transformed. However, to what extent this hypothesis holds…
▽ More
Deep Convolutional Neural Networks (DCNNs) have demonstrated impressive robustness to recognize objects under transformations (eg. blur or noise) when these transformations are included in the training set. A hypothesis to explain such robustness is that DCNNs develop invariant neural representations that remain unaltered when the image is transformed. However, to what extent this hypothesis holds true is an outstanding question, as robustness to transformations could be achieved with properties different from invariance, eg. parts of the network could be specialized to recognize either transformed or non-transformed images. This paper investigates the conditions under which invariant neural representations emerge by leveraging that they facilitate robustness to transformations beyond the training distribution. Concretely, we analyze a training paradigm in which only some object categories are seen transformed during training and evaluate whether the DCNN is robust to transformations across categories not seen transformed. Our results with state-of-the-art DCNNs indicate that invariant neural representations do not always drive robustness to transformations, as networks show robustness for categories seen transformed during training even in the absence of invariant neural representations. Invariance only emerges as the number of transformed categories in the training set is increased. This phenomenon is much more prominent with local transformations such as blurring and high-pass filtering than geometric transformations such as rotation and thinning, which entail changes in the spatial arrangement of the object. Our results contribute to a better understanding of invariant neural representations in deep learning and the conditions under which it spontaneously emerges.
△ Less
Submitted 14 June, 2023; v1 submitted 30 June, 2020;
originally announced July 2020.
-
Was there COVID-19 back in 2012? Challenge for AI in Diagnosis with Similar Indications
Authors:
Imon Banerjee,
Priyanshu Sinha,
Saptarshi Purkayastha,
Nazanin Mashhaditafreshi,
Amara Tariq,
Jiwoong Jeong,
Hari Trivedi,
Judy W. Gichoya
Abstract:
Purpose: Since the recent COVID-19 outbreak, there has been an avalanche of research papers applying deep learning based image processing to chest radiographs for detection of the disease. To test the performance of the two top models for CXR COVID-19 diagnosis on external datasets to assess model generalizability. Methods: In this paper, we present our argument regarding the efficiency and applic…
▽ More
Purpose: Since the recent COVID-19 outbreak, there has been an avalanche of research papers applying deep learning based image processing to chest radiographs for detection of the disease. To test the performance of the two top models for CXR COVID-19 diagnosis on external datasets to assess model generalizability. Methods: In this paper, we present our argument regarding the efficiency and applicability of existing deep learning models for COVID-19 diagnosis. We provide results from two popular models - COVID-Net and CoroNet evaluated on three publicly available datasets and an additional institutional dataset collected from EMORY Hospital between January and May 2020, containing patients tested for COVID-19 infection using RT-PCR. Results: There is a large false positive rate (FPR) for COVID-Net on both ChexPert (55.3%) and MIMIC-CXR (23.4%) dataset. On the EMORY Dataset, COVID-Net has 61.4% sensitivity, 0.54 F1-score and 0.49 precision value. The FPR of the CoroNet model is significantly lower across all the datasets as compared to COVID-Net - EMORY(9.1%), ChexPert (1.3%), ChestX-ray14 (0.02%), MIMIC-CXR (0.06%). Conclusion: The models reported good to excellent performance on their internal datasets, however we observed from our testing that their performance dramatically worsened on external data. This is likely from several causes including overfitting models due to lack of appropriate control patients and ground truth labels. The fourth institutional dataset was labeled using RT-PCR, which could be positive without radiographic findings and vice versa. Therefore, a fusion model of both clinical and radiographic data may have better performance and generalization.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
A DICOM Framework for Machine Learning Pipelines against Real-Time Radiology Images
Authors:
Pradeeban Kathiravelu,
Puneet Sharma,
Ashish Sharma,
Imon Banerjee,
Hari Trivedi,
Saptarshi Purkayastha,
Priyanshu Sinha,
Alexandre Cadrin-Chenevert,
Nabile Safdar,
Judy Wawira Gichoya
Abstract:
Executing machine learning (ML) pipelines in real-time on radiology images is hard due to the limited computing resources in clinical environments and the lack of efficient data transfer capabilities to run them on research clusters. We propose Niffler, an integrated framework that enables the execution of ML pipelines at research clusters by efficiently querying and retrieving radiology images fr…
▽ More
Executing machine learning (ML) pipelines in real-time on radiology images is hard due to the limited computing resources in clinical environments and the lack of efficient data transfer capabilities to run them on research clusters. We propose Niffler, an integrated framework that enables the execution of ML pipelines at research clusters by efficiently querying and retrieving radiology images from the Picture Archiving and Communication Systems (PACS) of the hospitals. Niffler uses the Digital Imaging and Communications in Medicine (DICOM) protocol to fetch and store imaging data and provides metadata extraction capabilities and Application programming interfaces (APIs) to apply filters on the images. Niffler further enables the sharing of the outcomes from the ML pipelines in a de-identified manner. Niffler has been running stable for more than 19 months and has supported several research projects at the department. In this paper, we present its architecture and three of its use cases: an inferior vena cava (IVC) filter detection from the images in real-time, identification of scanner utilization, and scanner clock calibration. Evaluations on the Niffler prototype highlight its feasibility and efficiency in facilitating the ML pipelines on the images and metadata in real-time and retrospectively.
△ Less
Submitted 5 August, 2020; v1 submitted 16 April, 2020;
originally announced April 2020.
-
Contextual Care Protocol using Neural Networks and Decision Trees
Authors:
Yash Pratyush Sinha,
Pranshu Malviya,
Minerva Panda,
Syed Mohd Ali
Abstract:
A contextual care protocol is used by a medical practitioner for patient healthcare, given the context or situation that the specified patient is in. This paper proposes a method to build an automated self-adapting protocol which can help make relevant, early decisions for effective healthcare delivery. The hybrid model leverages neural networks and decision trees. The neural network estimates the…
▽ More
A contextual care protocol is used by a medical practitioner for patient healthcare, given the context or situation that the specified patient is in. This paper proposes a method to build an automated self-adapting protocol which can help make relevant, early decisions for effective healthcare delivery. The hybrid model leverages neural networks and decision trees. The neural network estimates the chances of each disease and each tree in the decision trees represents care protocol for a disease. These trees are subject to change in case of aberrations found by the diagnosticians. These corrections or prediction errors are clustered into similar groups for scalability and review by the experts. The corrections as suggested by the experts are incorporated into the model.
△ Less
Submitted 15 November, 2018;
originally announced November 2018.
-
AlertMix: A Big Data platform for multi-source streaming data
Authors:
Ayush Singhal,
Rakesh Pant,
Pradeep Sinha
Abstract:
The demand for stream processing is increasing at an unprecedented rate. Big data is no longer limited to processing of big volumes of data. In most real-world scenarios, the need for processing stream data as it comes can only meet the business needs. It is required for trading, fraud detection, system monitoring, product maintenance and of course social media data such as Twitter and YouTube vid…
▽ More
The demand for stream processing is increasing at an unprecedented rate. Big data is no longer limited to processing of big volumes of data. In most real-world scenarios, the need for processing stream data as it comes can only meet the business needs. It is required for trading, fraud detection, system monitoring, product maintenance and of course social media data such as Twitter and YouTube videos. In such cases, a "too late architecture" that focuses on batch processing cannot realize the use cases. In this article, we present an end to end Big data platform called AlertMix for processing multi-source streaming data. Its architecture and how various Big data technologies are utilized are explained in this work. We present the performance of our platform on real live streaming data which is currently handled by the platform.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Use of Deep Learning in Modern Recommendation System: A Summary of Recent Works
Authors:
Ayush Singhal,
Pradeep Sinha,
Rakesh Pant
Abstract:
With the exponential increase in the amount of digital information over the internet, online shops, online music, video and image libraries, search engines and recommendation system have become the most convenient ways to find relevant information within a short time. In the recent times, deep learning's advances have gained significant attention in the field of speech recognition, image processin…
▽ More
With the exponential increase in the amount of digital information over the internet, online shops, online music, video and image libraries, search engines and recommendation system have become the most convenient ways to find relevant information within a short time. In the recent times, deep learning's advances have gained significant attention in the field of speech recognition, image processing and natural language processing. Meanwhile, several recent studies have shown the utility of deep learning in the area of recommendation systems and information retrieval as well. In this short review, we cover the recent advances made in the field of recommendation using various variants of deep learning technology. We organize the review in three parts: Collaborative system, Content based system and Hybrid system. The review also discusses the contribution of deep learning integrated recommendation systems into several application domains. The review concludes by discussion of the impact of deep learning in recommendation system in various domain and whether deep learning has shown any significant improvement over the conventional systems for recommendation. Finally, we also provide future directions of research which are possible based on the current state of use of deep learning in recommendation systems.
△ Less
Submitted 20 December, 2017;
originally announced December 2017.
-
Multimedia Channel Allocation in Cognitive Radio Networks using FDM-FDMA and OFDM-FDMA
Authors:
Ansuman Bhattacharya,
Rabindranath Ghosh,
Koushik Sinha,
Debasish Datta,
Bhabani P. Sinha
Abstract:
In conventional wireless systems, unless a contiguous frequency band with width at least equal to the required bandwidth is obtained, multimedia communication can not be effected with the desired Quality of Service. We propose here a novel channel allocation technique to overcome this limitation in a Cognitive Radio Network which is based on utilizing several non-contiguous channels, each of width…
▽ More
In conventional wireless systems, unless a contiguous frequency band with width at least equal to the required bandwidth is obtained, multimedia communication can not be effected with the desired Quality of Service. We propose here a novel channel allocation technique to overcome this limitation in a Cognitive Radio Network which is based on utilizing several non-contiguous channels, each of width smaller than the required bandwidth, but whose sum equals at least the required bandwidth. We present algorithms for channel sensing, channel reservation and channel deallocation along with transmission and reception protocols with two different implementations based on $FDM-FDMA$ and $OFDM-FDMA$ techniques. Simulation results for both these implementations show that the proposed technique outperforms the existing first-fit and best-fit~\cite{b109, b110} allocation techniques in terms of the average number of attempts needed for acquiring the necessary number of channels for all traffic situations ranging from light to extremely heavy traffic. Further, the proposed technique can allocate the required numbers of channels in less than one second with $FDM-FDMA$ ($4.5$ second with $OFDM-FDMA$) even for $96\%$ traffic load, while the first-fit and best-fit techniques fail to allocate any channel in such situations.
△ Less
Submitted 12 March, 2016;
originally announced March 2016.
-
Handwriting Recognition
Authors:
Jayati Ghosh Dastidar,
Surabhi Sarkar,
Rick Punyadyuti Sinha,
Kasturi Basu
Abstract:
This paper describes the method to recognize offline handwritten characters. A robust algorithm for handwriting segmentation is described here with the help of which individual characters can be segmented from a selected word from a paragraph of handwritten text image which is given as input.
This paper describes the method to recognize offline handwritten characters. A robust algorithm for handwriting segmentation is described here with the help of which individual characters can be segmented from a selected word from a paragraph of handwritten text image which is given as input.
△ Less
Submitted 18 July, 2015;
originally announced July 2015.
-
Heavy Traffic Limits for GI/H/n Queues: Theory and Application
Authors:
Yousi Zheng,
Ness Shroff,
Prasun Sinha
Abstract:
We consider a GI/H/n queueing system. In this system, there are multiple servers in the queue. The inter-arrival time is general and independent, and the service time follows hyper-exponential distribution. Instead of stochastic differential equations, we propose two heavy traffic limits for this system, which can be easily applied in practical systems. In applications, we show how to use these he…
▽ More
We consider a GI/H/n queueing system. In this system, there are multiple servers in the queue. The inter-arrival time is general and independent, and the service time follows hyper-exponential distribution. Instead of stochastic differential equations, we propose two heavy traffic limits for this system, which can be easily applied in practical systems. In applications, we show how to use these heavy traffic limits to design a power efficient cloud computing environment based on different QoS requirements.
△ Less
Submitted 11 September, 2014;
originally announced September 2014.
-
Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
Authors:
Ranjeet Masram,
Vivek Shahare,
Jibi Abraham,
Rajni Moona,
Pradeep Sinha,
Gaur Sunder,
Prashant Bendale,
Sayali Pophalkar
Abstract:
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical imp…
▽ More
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical implementation of different cryptographic algorithms like implementation cost and performance. This paper provides comparative analysis of time taken for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2, Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density, data size and key sizes.
△ Less
Submitted 24 June, 2014;
originally announced June 2014.
-
When Queueing Meets Coding: Optimal-Latency Data Retrieving Scheme in Storage Clouds
Authors:
Shengbo Chen,
Yin Sun,
Ulas C. Kozat,
Longbo Huang,
Prasun Sinha,
Guanfeng Liang,
Xin Liu,
Ness B. Shroff
Abstract:
In this paper, we study the problem of reducing the delay of downloading data from cloud storage systems by leveraging multiple parallel threads, assuming that the data has been encoded and stored in the clouds using fixed rate forward error correction (FEC) codes with parameters (n, k). That is, each file is divided into k equal-sized chunks, which are then expanded into n chunks such that any k…
▽ More
In this paper, we study the problem of reducing the delay of downloading data from cloud storage systems by leveraging multiple parallel threads, assuming that the data has been encoded and stored in the clouds using fixed rate forward error correction (FEC) codes with parameters (n, k). That is, each file is divided into k equal-sized chunks, which are then expanded into n chunks such that any k chunks out of the n are sufficient to successfully restore the original file. The model can be depicted as a multiple-server queue with arrivals of data retrieving requests and a server corresponding to a thread. However, this is not a typical queueing model because a server can terminate its operation, depending on when other servers complete their service (due to the redundancy that is spread across the threads). Hence, to the best of our knowledge, the analysis of this queueing model remains quite uncharted.
Recent traces from Amazon S3 show that the time to retrieve a fixed size chunk is random and can be approximated as a constant delay plus an i.i.d. exponentially distributed random variable. For the tractability of the theoretical analysis, we assume that the chunk downloading time is i.i.d. exponentially distributed. Under this assumption, we show that any work-conserving scheme is delay-optimal among all on-line scheduling schemes when k = 1. When k > 1, we find that a simple greedy scheme, which allocates all available threads to the head of line request, is delay optimal among all on-line scheduling schemes. We also provide some numerical results that point to the limitations of the exponential assumption, and suggest further research directions.
△ Less
Submitted 26 April, 2014;
originally announced April 2014.
-
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access On the Go
Authors:
Zizhan Zheng,
Zhixue Lu,
Prasun Sinha,
Santosh Kumar
Abstract:
With increasing popularity of media enabled hand-helds and their integration with the in-vehicle entertainment systems, the need for high data-rate services for mobile users on the go is evident. This ever-increasing demand of data is constantly surpassing what cellular networks can economically support. Large-scale Wireless LANs (WLANs) can provide such a service, but they are expensive to deploy…
▽ More
With increasing popularity of media enabled hand-helds and their integration with the in-vehicle entertainment systems, the need for high data-rate services for mobile users on the go is evident. This ever-increasing demand of data is constantly surpassing what cellular networks can economically support. Large-scale Wireless LANs (WLANs) can provide such a service, but they are expensive to deploy and maintain. Open WLAN access-points, on the other hand, need no new deployments, but can offer only opportunistic services, lacking any performance guarantees. In contrast, a carefully planned sparse deployment of roadside WiFi provides an economically scalable infrastructure with quality of service assurance to mobile users. In this paper, we present a new metric, called Contact Opportunity, to closely model the quality of data service that a mobile user might experience when driving through the system. We then present efficient deployment algorithms for minimizing the cost for ensuring a required level of contact opportunity. We further extend this concept and the deployment techniques to a more intuitive metric -- the average throughput -- by taking various dynamic elements into account. Simulations over a real road network and experimental results show that our approach achieves significantly better cost vs. throughput tradeoff in both the worst case and average case compared with some commonly used deployment algorithms.
△ Less
Submitted 4 January, 2014;
originally announced January 2014.
-
Life-Add: Lifetime Adjustable Design for WiFi Networks with Heterogeneous Energy Supplies
Authors:
Shengbo Chen,
Tarun Bansal,
Yin Sun,
Prasun Sinha,
Ness B. Shroff
Abstract:
WiFi usage significantly reduces the battery lifetime of handheld devices such as smartphones and tablets, due to its high energy consumption. In this paper, we propose "Life-Add": a Lifetime Adjustable design for WiFi networks, where the devices are powered by battery, electric power, and/or renewable energy. In Life-Add, a device turns off its radio to save energy when the channel is sensed to b…
▽ More
WiFi usage significantly reduces the battery lifetime of handheld devices such as smartphones and tablets, due to its high energy consumption. In this paper, we propose "Life-Add": a Lifetime Adjustable design for WiFi networks, where the devices are powered by battery, electric power, and/or renewable energy. In Life-Add, a device turns off its radio to save energy when the channel is sensed to be busy, and sleeps for a random time period before sensing the channel again. Life-Add carefully controls the devices' average sleep periods to improve their throughput while satisfying their operation time requirement. It is proven that Life-Add achieves near-optimal proportional-fair utility performance for single access point (AP) scenarios. Moreover, Life-Add alleviates the near-far effect and hidden terminal problem in general multiple AP scenarios. Our ns-3 simulations show that Life-Add simultaneously improves the lifetime, throughput, and fairness performance of WiFi networks, and coexists harmoniously with IEEE 802.11.
△ Less
Submitted 21 May, 2013;
originally announced May 2013.