-
A Large Convolutional Neural Network for Clinical Target and Multi-organ Segmentation in Gynecologic Brachytherapy with Multi-stage Learning
Authors:
Mingzhe Hu,
Yuan Gao,
Yuheng Li,
Ricahrd LJ Qiu,
Chih-Wei Chang,
Keyur D. Shah,
Priyanka Kapoor,
Beth Bradshaw,
Yuan Shao,
Justin Roper,
Jill Remick,
Zhen Tian,
Xiaofeng Yang
Abstract:
Purpose: Accurate segmentation of clinical target volumes (CTV) and organs-at-risk is crucial for optimizing gynecologic brachytherapy (GYN-BT) treatment planning. However, anatomical variability, low soft-tissue contrast in CT imaging, and limited annotated datasets pose significant challenges. This study presents GynBTNet, a novel multi-stage learning framework designed to enhance segmentation p…
▽ More
Purpose: Accurate segmentation of clinical target volumes (CTV) and organs-at-risk is crucial for optimizing gynecologic brachytherapy (GYN-BT) treatment planning. However, anatomical variability, low soft-tissue contrast in CT imaging, and limited annotated datasets pose significant challenges. This study presents GynBTNet, a novel multi-stage learning framework designed to enhance segmentation performance through self-supervised pretraining and hierarchical fine-tuning strategies. Methods: GynBTNet employs a three-stage training strategy: (1) self-supervised pretraining on large-scale CT datasets using sparse submanifold convolution to capture robust anatomical representations, (2) supervised fine-tuning on a comprehensive multi-organ segmentation dataset to refine feature extraction, and (3) task-specific fine-tuning on a dedicated GYN-BT dataset to optimize segmentation performance for clinical applications. The model was evaluated against state-of-the-art methods using the Dice Similarity Coefficient (DSC), 95th percentile Hausdorff Distance (HD95), and Average Surface Distance (ASD). Results: Our GynBTNet achieved superior segmentation performance, significantly outperforming nnU-Net and Swin-UNETR. Notably, it yielded a DSC of 0.837 +/- 0.068 for CTV, 0.940 +/- 0.052 for the bladder, 0.842 +/- 0.070 for the rectum, and 0.871 +/- 0.047 for the uterus, with reduced HD95 and ASD compared to baseline models. Self-supervised pretraining led to consistent performance improvements, particularly for structures with complex boundaries. However, segmentation of the sigmoid colon remained challenging, likely due to anatomical ambiguities and inter-patient variability. Statistical significance analysis confirmed that GynBTNet's improvements were significant compared to baseline models.
△ Less
Submitted 1 June, 2025;
originally announced June 2025.
-
Demonstrating ViSafe: Vision-enabled Safety for High-speed Detect and Avoid
Authors:
Parv Kapoor,
Ian Higgins,
Nikhil Keetha,
Jay Patrikar,
Brady Moon,
Zelin Ye,
Yao He,
Ivan Cisneros,
Yaoyu Hu,
Changliu Liu,
Eunsuk Kang,
Sebastian Scherer
Abstract:
Assured safe-separation is essential for achieving seamless high-density operation of airborne vehicles in a shared airspace. To equip resource-constrained aerial systems with this safety-critical capability, we present ViSafe, a high-speed vision-only airborne collision avoidance system. ViSafe offers a full-stack solution to the Detect and Avoid (DAA) problem by tightly integrating a learning-ba…
▽ More
Assured safe-separation is essential for achieving seamless high-density operation of airborne vehicles in a shared airspace. To equip resource-constrained aerial systems with this safety-critical capability, we present ViSafe, a high-speed vision-only airborne collision avoidance system. ViSafe offers a full-stack solution to the Detect and Avoid (DAA) problem by tightly integrating a learning-based edge-AI framework with a custom multi-camera hardware prototype designed under SWaP-C constraints. By leveraging perceptual input-focused control barrier functions (CBF) to design, encode, and enforce safety thresholds, ViSafe can provide provably safe runtime guarantees for self-separation in high-speed aerial operations. We evaluate ViSafe's performance through an extensive test campaign involving both simulated digital twins and real-world flight scenarios. By independently varying agent types, closure rates, interaction geometries, and environmental conditions (e.g., weather and lighting), we demonstrate that ViSafe consistently ensures self-separation across diverse scenarios. In first-of-its-kind real-world high-speed collision avoidance tests with closure rates reaching 144 km/h, ViSafe sets a new benchmark for vision-only autonomous collision avoidance, establishing a new standard for safety in high-speed aerial navigation.
△ Less
Submitted 8 May, 2025; v1 submitted 6 May, 2025;
originally announced May 2025.
-
Pretrained Embeddings as a Behavior Specification Mechanism
Authors:
Parv Kapoor,
Abigail Hammer,
Ashish Kapoor,
Karen Leung,
Eunsuk Kang
Abstract:
We propose an approach to formally specifying the behavioral properties of systems that rely on a perception model for interactions with the physical world. The key idea is to introduce embeddings -- mathematical representations of a real-world concept -- as a first-class construct in a specification language, where properties are expressed in terms of distances between a pair of ideal and observe…
▽ More
We propose an approach to formally specifying the behavioral properties of systems that rely on a perception model for interactions with the physical world. The key idea is to introduce embeddings -- mathematical representations of a real-world concept -- as a first-class construct in a specification language, where properties are expressed in terms of distances between a pair of ideal and observed embeddings. To realize this approach, we propose a new type of temporal logic called Embedding Temporal Logic (ETL), and describe how it can be used to express a wider range of properties about AI-enabled systems than previously possible. We demonstrate the applicability of ETL through a preliminary evaluation involving planning tasks in robots that are driven by foundation models; the results are promising, showing that embedding-based specifications can be used to steer a system towards desirable behaviors.
△ Less
Submitted 6 March, 2025; v1 submitted 3 March, 2025;
originally announced March 2025.
-
RF Desense significance and its impact on the EVM at Signal Near the Noise Floor
Authors:
Rajesh Vedala,
Harkirat Kaur,
Palak Kapoor
Abstract:
Hardware impairments and system non-linearities impacting communication signal is one of key aspect for having harmonics and RF desense which overall causing the lower quality and integrity of the modulated signal, resulting in I/Q imbalance, further bit error and spectral efficiency degradation. This presentation outlines the RF Desense results, EVM Measurement and it impact at the almost noise f…
▽ More
Hardware impairments and system non-linearities impacting communication signal is one of key aspect for having harmonics and RF desense which overall causing the lower quality and integrity of the modulated signal, resulting in I/Q imbalance, further bit error and spectral efficiency degradation. This presentation outlines the RF Desense results, EVM Measurement and it impact at the almost noise floor with step size by 1 dB in QPSK at LTE Bands, Note for mmW 3GPP 38.521-2 clause 6.4.2.1 indicates single polarization.
△ Less
Submitted 26 February, 2025;
originally announced March 2025.
-
STLCG++: A Masking Approach for Differentiable Signal Temporal Logic Specification
Authors:
Parv Kapoor,
Kazuki Mizuta,
Eunsuk Kang,
Karen Leung
Abstract:
Signal Temporal Logic (STL) offers a concise yet expressive framework for specifying and reasoning about spatio-temporal behaviors of robotic systems. Attractively, STL admits the notion of robustness, the degree to which an input signal satisfies or violates an STL specification, thus providing a nuanced evaluation of system performance. Notably, the differentiability of STL robustness enables di…
▽ More
Signal Temporal Logic (STL) offers a concise yet expressive framework for specifying and reasoning about spatio-temporal behaviors of robotic systems. Attractively, STL admits the notion of robustness, the degree to which an input signal satisfies or violates an STL specification, thus providing a nuanced evaluation of system performance. Notably, the differentiability of STL robustness enables direct integration to robotics workflows that rely on gradient-based optimization, such as trajectory optimization and deep learning. However, existing approaches to evaluating and differentiating STL robustness rely on recurrent computations, which become inefficient with longer sequences, limiting their use in time-sensitive applications. In this paper, we present STLCG++, a masking-based approach that parallelizes STL robustness evaluation and backpropagation across timesteps, achieving more than 1000x faster computation time than the recurrent approach. We also introduce a smoothing technique for differentiability through time interval bounds, expanding STL's applicability in gradient-based optimization tasks over spatial and temporal variables. Finally, we demonstrate STLCG++'s benefits through three robotics use cases and provide open-source Python libraries in JAX and PyTorch for seamless integration into modern robotics workflows.
△ Less
Submitted 7 January, 2025;
originally announced January 2025.
-
Machine Learning-Based Security Policy Analysis
Authors:
Krish Jain,
Joann Sum,
Pranav Kapoor,
Amir Eaman
Abstract:
Security-Enhanced Linux (SELinux) is a robust security mechanism that enforces mandatory access controls (MAC), but its policy language's complexity creates challenges for policy analysis and management. This research investigates the automation of SELinux policy analysis using graph-based techniques combined with machine learning approaches to detect policy anomalies. The study addresses two key…
▽ More
Security-Enhanced Linux (SELinux) is a robust security mechanism that enforces mandatory access controls (MAC), but its policy language's complexity creates challenges for policy analysis and management. This research investigates the automation of SELinux policy analysis using graph-based techniques combined with machine learning approaches to detect policy anomalies. The study addresses two key questions: Can SELinux policy analysis be automated through graph analysis, and how do different anomaly detection models compare in analyzing SELinux policies? We will be comparing different machine learning models by evaluating their effectiveness in detecting policy violations and anomalies. Our approach utilizes Neo4j for graph representation of policies, with Node2vec transforming these graph structures into meaningful vector embeddings that can be processed by our machine learning models. In our results, the MLP Neural Network consistently demonstrated superior performance across different dataset sizes, achieving 95% accuracy with balanced precision and recall metrics, while both Random Forest and SVM models showed competitive but slightly lower performance in detecting policy violations. This combination of graph-based modeling and machine learning provides a more sophisticated and automated approach to understanding and analyzing complex SELinux policies compared to traditional manual analysis methods.
△ Less
Submitted 6 January, 2025; v1 submitted 30 December, 2024;
originally announced January 2025.
-
Constrained LTL Specification Learning from Examples
Authors:
Changjian Zhang,
Parv Kapoor,
Ian Dardik,
Leyi Cui,
Romulo Meira-Goes,
David Garlan,
Eunsuk Kang
Abstract:
Temporal logic specifications play an important role in a wide range of software analysis tasks, such as model checking, automated synthesis, program comprehension, and runtime monitoring. Given a set of positive and negative examples, specified as traces, LTL learning is the problem of synthesizing a specification, in linear temporal logic (LTL), that evaluates to true over the positive traces an…
▽ More
Temporal logic specifications play an important role in a wide range of software analysis tasks, such as model checking, automated synthesis, program comprehension, and runtime monitoring. Given a set of positive and negative examples, specified as traces, LTL learning is the problem of synthesizing a specification, in linear temporal logic (LTL), that evaluates to true over the positive traces and false over the negative ones. In this paper, we propose a new type of LTL learning problem called constrained LTL learning, where the user, in addition to positive and negative examples, is given an option to specify one or more constraints over the properties of the LTL formula to be learned. We demonstrate that the ability to specify these additional constraints significantly increases the range of applications for LTL learning, and also allows efficient generation of LTL formulas that satisfy certain desirable properties (such as minimality). We propose an approach for solving the constrained LTL learning problem through an encoding in first-order relational logic and reduction to an instance of the maximal satisfiability (MaxSAT) problem. An experimental evaluation demonstrates that ATLAS, an implementation of our proposed approach, is able to solve new types of learning problems while performing better than or competitively with the state-of-the-art tools in LTL learning.
△ Less
Submitted 30 December, 2024; v1 submitted 3 December, 2024;
originally announced December 2024.
-
Logically Constrained Robotics Transformers for Enhanced Perception-Action Planning
Authors:
Parv Kapoor,
Sai Vemprala,
Ashish Kapoor
Abstract:
With the advent of large foundation model based planning, there is a dire need to ensure their output aligns with the stakeholder's intent. When these models are deployed in the real world, the need for alignment is magnified due to the potential cost to life and infrastructure due to unexpected faliures. Temporal Logic specifications have long provided a way to constrain system behaviors and are…
▽ More
With the advent of large foundation model based planning, there is a dire need to ensure their output aligns with the stakeholder's intent. When these models are deployed in the real world, the need for alignment is magnified due to the potential cost to life and infrastructure due to unexpected faliures. Temporal Logic specifications have long provided a way to constrain system behaviors and are a natural fit for these use cases. In this work, we propose a novel approach to factor in signal temporal logic specifications while using autoregressive transformer models for trajectory planning. We also provide a trajectory dataset for pretraining and evaluating foundation models. Our proposed technique acheives 74.3 % higher specification satisfaction over the baselines.
△ Less
Submitted 9 August, 2024;
originally announced August 2024.
-
Tolerance of Reinforcement Learning Controllers against Deviations in Cyber Physical Systems
Authors:
Changjian Zhang,
Parv Kapoor,
Eunsuk Kang,
Romulo Meira-Goes,
David Garlan,
Akila Ganlath,
Shatadal Mishra,
Nejib Ammar
Abstract:
Cyber-physical systems (CPS) with reinforcement learning (RL)-based controllers are increasingly being deployed in complex physical environments such as autonomous vehicles, the Internet-of-Things(IoT), and smart cities. An important property of a CPS is tolerance; i.e., its ability to function safely under possible disturbances and uncertainties in the actual operation. In this paper, we introduc…
▽ More
Cyber-physical systems (CPS) with reinforcement learning (RL)-based controllers are increasingly being deployed in complex physical environments such as autonomous vehicles, the Internet-of-Things(IoT), and smart cities. An important property of a CPS is tolerance; i.e., its ability to function safely under possible disturbances and uncertainties in the actual operation. In this paper, we introduce a new, expressive notion of tolerance that describes how well a controller is capable of satisfying a desired system requirement, specified using Signal Temporal Logic (STL), under possible deviations in the system. Based on this definition, we propose a novel analysis problem, called the tolerance falsification problem, which involves finding small deviations that result in a violation of the given requirement. We present a novel, two-layer simulation-based analysis framework and a novel search heuristic for finding small tolerance violations. To evaluate our approach, we construct a set of benchmark problems where system parameters can be configured to represent different types of uncertainties and disturbancesin the system. Our evaluation shows that our falsification approach and heuristic can effectively find small tolerance violations.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Safe Planning through Incremental Decomposition of Signal Temporal Logic Specifications
Authors:
Parv Kapoor,
Eunsuk Kang,
Romulo Meira-Goes
Abstract:
Trajectory planning is a critical process that enables autonomous systems to safely navigate complex environments. Signal temporal logic (STL) specifications are an effective way to encode complex temporally extended objectives for trajectory planning in cyber-physical systems (CPS). However, planning from these specifications using existing techniques scale exponentially with the number of nested…
▽ More
Trajectory planning is a critical process that enables autonomous systems to safely navigate complex environments. Signal temporal logic (STL) specifications are an effective way to encode complex temporally extended objectives for trajectory planning in cyber-physical systems (CPS). However, planning from these specifications using existing techniques scale exponentially with the number of nested operators and the horizon of specification. Additionally, performance is exacerbated at runtime due to limited computational budgets and compounding modeling errors. Decomposing a complex specification into smaller subtasks and incrementally planning for them can remedy these issues. In this work, we present a way to decompose STL requirements temporally to improve planning efficiency and performance. The key insight in our work is to encode all specifications as a set of reachability and invariance constraints and scheduling these constraints sequentially at runtime. Our proposed technique outperforms the state-of-the-art trajectory synthesis techniques for both linear and non linear dynamical systems.
△ Less
Submitted 18 March, 2024; v1 submitted 13 March, 2024;
originally announced March 2024.
-
Investigating Robustness in Cyber-Physical Systems: Specification-Centric Analysis in the face of System Deviations
Authors:
Changjian Zhang,
Parv Kapoor,
Romulo Meira-Goes,
David Garlan,
Eunsuk Kang,
Akila Ganlath,
Shatadal Mishra,
Nejib Ammar
Abstract:
The adoption of cyber-physical systems (CPS) is on the rise in complex physical environments, encompassing domains such as autonomous vehicles, the Internet of Things (IoT), and smart cities. A critical attribute of CPS is robustness, denoting its capacity to operate safely despite potential disruptions and uncertainties in the operating environment. This paper proposes a novel specification-based…
▽ More
The adoption of cyber-physical systems (CPS) is on the rise in complex physical environments, encompassing domains such as autonomous vehicles, the Internet of Things (IoT), and smart cities. A critical attribute of CPS is robustness, denoting its capacity to operate safely despite potential disruptions and uncertainties in the operating environment. This paper proposes a novel specification-based robustness, which characterizes the effectiveness of a controller in meeting a specified system requirement, articulated through Signal Temporal Logic (STL) while accounting for possible deviations in the system. This paper also proposes the robustness falsification problem based on the definition, which involves identifying minor deviations capable of violating the specified requirement. We present an innovative two-layer simulation-based analysis framework designed to identify subtle robustness violations. To assess our methodology, we devise a series of benchmark problems wherein system parameters can be adjusted to emulate various forms of uncertainties and disturbances. Initial evaluations indicate that our falsification approach proficiently identifies robustness violations, providing valuable insights for comparing robustness between conventional and reinforcement learning (RL)-based controllers
△ Less
Submitted 25 March, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
"Do it my way!": Impact of Customizations on Trust perceptions in Human-Robot Collaboration
Authors:
Parv Kapoor,
Simon Chu,
Angela Chen
Abstract:
Trust has been shown to be a key factor in effective human-robot collaboration. In the context of assistive robotics, the effect of trust factors on human experience is further pronounced. Personalization of assistive robots is an orthogonal factor positively correlated with robot adoption and user perceptions. In this work, we investigate the relationship between these factors through a within-su…
▽ More
Trust has been shown to be a key factor in effective human-robot collaboration. In the context of assistive robotics, the effect of trust factors on human experience is further pronounced. Personalization of assistive robots is an orthogonal factor positively correlated with robot adoption and user perceptions. In this work, we investigate the relationship between these factors through a within-subjects study (N=17). We provide different levels of customization possibilities over baseline autonomous robot behavior and investigate its impact on trust. Our findings indicate that increased levels of customization was associated with higher trust and comfort perceptions. The assistive robot design process can benefit significantly from our insights for designing trustworthy and customized robots.
△ Less
Submitted 28 October, 2023;
originally announced October 2023.
-
FoundLoc: Vision-based Onboard Aerial Localization in the Wild
Authors:
Yao He,
Ivan Cisneros,
Nikhil Keetha,
Jay Patrikar,
Zelin Ye,
Ian Higgins,
Yaoyu Hu,
Parv Kapoor,
Sebastian Scherer
Abstract:
Robust and accurate localization for Unmanned Aerial Vehicles (UAVs) is an essential capability to achieve autonomous, long-range flights. Current methods either rely heavily on GNSS, face limitations in visual-based localization due to appearance variances and stylistic dissimilarities between camera and reference imagery, or operate under the assumption of a known initial pose. In this paper, we…
▽ More
Robust and accurate localization for Unmanned Aerial Vehicles (UAVs) is an essential capability to achieve autonomous, long-range flights. Current methods either rely heavily on GNSS, face limitations in visual-based localization due to appearance variances and stylistic dissimilarities between camera and reference imagery, or operate under the assumption of a known initial pose. In this paper, we developed a GNSS-denied localization approach for UAVs that harnesses both Visual-Inertial Odometry (VIO) and Visual Place Recognition (VPR) using a foundation model. This paper presents a novel vision-based pipeline that works exclusively with a nadir-facing camera, an Inertial Measurement Unit (IMU), and pre-existing satellite imagery for robust, accurate localization in varied environments and conditions. Our system demonstrated average localization accuracy within a $20$-meter range, with a minimum error below $1$ meter, under real-world conditions marked by drastic changes in environmental appearance and with no assumption of the vehicle's initial pose. The method is proven to be effective and robust, addressing the crucial need for reliable UAV localization in GNSS-denied environments, while also being computationally efficient enough to be deployed on resource-constrained platforms.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Challenges in Close-Proximity Safe and Seamless Operation of Manned and Unmanned Aircraft in Shared Airspace
Authors:
Jay Patrikar,
Joao P. A. Dantas,
Sourish Ghosh,
Parv Kapoor,
Ian Higgins,
Jasmine J. Aloor,
Ingrid Navarro,
Jimin Sun,
Ben Stoler,
Milad Hamidi,
Rohan Baijal,
Brady Moon,
Jean Oh,
Sebastian Scherer
Abstract:
We propose developing an integrated system to keep autonomous unmanned aircraft safely separated and behave as expected in conjunction with manned traffic. The main goal is to achieve safe manned-unmanned vehicle teaming to improve system performance, have each (robot/human) teammate learn from each other in various aircraft operations, and reduce the manning needs of manned aircraft. The proposed…
▽ More
We propose developing an integrated system to keep autonomous unmanned aircraft safely separated and behave as expected in conjunction with manned traffic. The main goal is to achieve safe manned-unmanned vehicle teaming to improve system performance, have each (robot/human) teammate learn from each other in various aircraft operations, and reduce the manning needs of manned aircraft. The proposed system anticipates and reacts to other aircraft using natural language instructions and can serve as a co-pilot or operate entirely autonomously. We point out the main technical challenges where improvements on current state-of-the-art are needed to enable Visual Flight Rules to fully autonomous aerial operations, bringing insights to these critical areas. Furthermore, we present an interactive demonstration in a prototypical scenario with one AI pilot and one human pilot sharing the same terminal airspace, interacting with each other using language, and landing safely on the same runway. We also show a demonstration of a vision-only aircraft detection system.
△ Less
Submitted 13 November, 2022;
originally announced November 2022.
-
Follow The Rules: Online Signal Temporal Logic Tree Search for Guided Imitation Learning in Stochastic Domains
Authors:
Jasmine Jerry Aloor,
Jay Patrikar,
Parv Kapoor,
Jean Oh,
Sebastian Scherer
Abstract:
Seamlessly integrating rules in Learning-from-Demonstrations (LfD) policies is a critical requirement to enable the real-world deployment of AI agents. Recently, Signal Temporal Logic (STL) has been shown to be an effective language for encoding rules as spatio-temporal constraints. This work uses Monte Carlo Tree Search (MCTS) as a means of integrating STL specification into a vanilla LfD policy…
▽ More
Seamlessly integrating rules in Learning-from-Demonstrations (LfD) policies is a critical requirement to enable the real-world deployment of AI agents. Recently, Signal Temporal Logic (STL) has been shown to be an effective language for encoding rules as spatio-temporal constraints. This work uses Monte Carlo Tree Search (MCTS) as a means of integrating STL specification into a vanilla LfD policy to improve constraint satisfaction. We propose augmenting the MCTS heuristic with STL robustness values to bias the tree search towards branches with higher constraint satisfaction. While the domain-independent method can be applied to integrate STL rules online into any pre-trained LfD algorithm, we choose goal-conditioned Generative Adversarial Imitation Learning as the offline LfD policy. We apply the proposed method to the domain of planning trajectories for General Aviation aircraft around a non-towered airfield. Results using the simulator trained on real-world data showcase 60% improved performance over baseline LfD methods that do not use STL heuristics.
△ Less
Submitted 6 March, 2023; v1 submitted 27 September, 2022;
originally announced September 2022.
-
Towards Automatic Speech to Sign Language Generation
Authors:
Parul Kapoor,
Rudrabha Mukhopadhyay,
Sindhu B Hegde,
Vinay Namboodiri,
C V Jawahar
Abstract:
We aim to solve the highly challenging task of generating continuous sign language videos solely from speech segments for the first time. Recent efforts in this space have focused on generating such videos from human-annotated text transcripts without considering other modalities. However, replacing speech with sign language proves to be a practical solution while communicating with people sufferi…
▽ More
We aim to solve the highly challenging task of generating continuous sign language videos solely from speech segments for the first time. Recent efforts in this space have focused on generating such videos from human-annotated text transcripts without considering other modalities. However, replacing speech with sign language proves to be a practical solution while communicating with people suffering from hearing loss. Therefore, we eliminate the need of using text as input and design techniques that work for more natural, continuous, freely uttered speech covering an extensive vocabulary. Since the current datasets are inadequate for generating sign language directly from speech, we collect and release the first Indian sign language dataset comprising speech-level annotations, text transcripts, and the corresponding sign-language videos. Next, we propose a multi-tasking transformer network trained to generate signer's poses from speech segments. With speech-to-text as an auxiliary task and an additional cross-modal discriminator, our model learns to generate continuous sign pose sequences in an end-to-end manner. Extensive experiments and comparisons with other baselines demonstrate the effectiveness of our approach. We also conduct additional ablation studies to analyze the effect of different modules of our network. A demo video containing several results is attached to the supplementary material.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Point Cloud based Hierarchical Deep Odometry Estimation
Authors:
Farzan Erlik Nowruzi,
Dhanvin Kolhatkar,
Prince Kapoor,
Robert Laganiere
Abstract:
Processing point clouds using deep neural networks is still a challenging task. Most existing models focus on object detection and registration with deep neural networks using point clouds. In this paper, we propose a deep model that learns to estimate odometry in driving scenarios using point cloud data. The proposed model consumes raw point clouds in order to extract frame-to-frame odometry esti…
▽ More
Processing point clouds using deep neural networks is still a challenging task. Most existing models focus on object detection and registration with deep neural networks using point clouds. In this paper, we propose a deep model that learns to estimate odometry in driving scenarios using point cloud data. The proposed model consumes raw point clouds in order to extract frame-to-frame odometry estimation through a hierarchical model architecture. Also, a local bundle adjustment variation of this model using LSTM layers is implemented. These two approaches are comprehensively evaluated and are compared against the state-of-the-art.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
PolarNet: Accelerated Deep Open Space Segmentation Using Automotive Radar in Polar Domain
Authors:
Farzan Erlik Nowruzi,
Dhanvin Kolhatkar,
Prince Kapoor,
Elnaz Jahani Heravi,
Fahed Al Hassanat,
Robert Laganiere,
Julien Rebut,
Waqas Malik
Abstract:
Camera and Lidar processing have been revolutionized with the rapid development of deep learning model architectures. Automotive radar is one of the crucial elements of automated driver assistance and autonomous driving systems. Radar still relies on traditional signal processing techniques, unlike camera and Lidar based methods. We believe this is the missing link to achieve the most robust perce…
▽ More
Camera and Lidar processing have been revolutionized with the rapid development of deep learning model architectures. Automotive radar is one of the crucial elements of automated driver assistance and autonomous driving systems. Radar still relies on traditional signal processing techniques, unlike camera and Lidar based methods. We believe this is the missing link to achieve the most robust perception system. Identifying drivable space and occupied space is the first step in any autonomous decision making task. Occupancy grid map representation of the environment is often used for this purpose. In this paper, we propose PolarNet, a deep neural model to process radar information in polar domain for open space segmentation. We explore various input-output representations. Our experiments show that PolarNet is a effective way to process radar data that achieves state-of-the-art performance and processing speeds while maintaining a compact size.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
NNStreamer: Efficient and Agile Development of On-Device AI Systems
Authors:
MyungJoo Ham,
Jijoong Moon,
Geunsik Lim,
Jaeyun Jung,
Hyoungjoo Ahn,
Wook Song,
Sangjung Woo,
Parichay Kapoor,
Dongju Chae,
Gichan Jang,
Yongjoo Ahn,
Jihoon Lee
Abstract:
We propose NNStreamer, a software system that handles neural networks as filters of stream pipelines, applying the stream processing paradigm to deep neural network applications. A new trend with the wide-spread of deep neural network applications is on-device AI. It is to process neural networks on mobile devices or edge/IoT devices instead of cloud servers. Emerging privacy issues, data transmis…
▽ More
We propose NNStreamer, a software system that handles neural networks as filters of stream pipelines, applying the stream processing paradigm to deep neural network applications. A new trend with the wide-spread of deep neural network applications is on-device AI. It is to process neural networks on mobile devices or edge/IoT devices instead of cloud servers. Emerging privacy issues, data transmission costs, and operational costs signify the need for on-device AI, especially if we deploy a massive number of devices. NNStreamer efficiently handles neural networks with complex data stream pipelines on devices, significantly improving the overall performance with minimal efforts. Besides, NNStreamer simplifies implementations and allows reusing off-the-shelf media filters directly, which reduces developmental costs significantly. We are already deploying NNStreamer for a wide range of products and platforms, including the Galaxy series and various consumer electronic devices. The experimental results suggest a reduction in developmental costs and enhanced performance of pipeline architectures and NNStreamer. It is an open-source project incubated by Linux Foundation AI, available to the public and applicable to various hardware and software platforms.
△ Less
Submitted 15 January, 2021;
originally announced January 2021.
-
Model-based Reinforcement Learning from Signal Temporal Logic Specifications
Authors:
Parv Kapoor,
Anand Balakrishnan,
Jyotirmoy V. Deshmukh
Abstract:
Techniques based on Reinforcement Learning (RL) are increasingly being used to design control policies for robotic systems. RL fundamentally relies on state-based reward functions to encode desired behavior of the robot and bad reward functions are prone to exploitation by the learning agent, leading to behavior that is undesirable in the best case and critically dangerous in the worst. On the oth…
▽ More
Techniques based on Reinforcement Learning (RL) are increasingly being used to design control policies for robotic systems. RL fundamentally relies on state-based reward functions to encode desired behavior of the robot and bad reward functions are prone to exploitation by the learning agent, leading to behavior that is undesirable in the best case and critically dangerous in the worst. On the other hand, designing good reward functions for complex tasks is a challenging problem. In this paper, we propose expressing desired high-level robot behavior using a formal specification language known as Signal Temporal Logic (STL) as an alternative to reward/cost functions. We use STL specifications in conjunction with model-based learning to design model predictive controllers that try to optimize the satisfaction of the STL specification over a finite time horizon. The proposed algorithm is empirically evaluated on simulations of robotic system such as a pick-and-place robotic arm, and adaptive cruise control for autonomous vehicles.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
Deep Open Space Segmentation using Automotive Radar
Authors:
Farzan Erlik Nowruzi,
Dhanvin Kolhatkar,
Prince Kapoor,
Fahed Al Hassanat,
Elnaz Jahani Heravi,
Robert Laganiere,
Julien Rebut,
Waqas Malik
Abstract:
In this work, we propose the use of radar with advanced deep segmentation models to identify open space in parking scenarios. A publically available dataset of radar observations called SCORP was collected. Deep models are evaluated with various radar input representations. Our proposed approach achieves low memory usage and real-time processing speeds, and is thus very well suited for embedded de…
▽ More
In this work, we propose the use of radar with advanced deep segmentation models to identify open space in parking scenarios. A publically available dataset of radar observations called SCORP was collected. Deep models are evaluated with various radar input representations. Our proposed approach achieves low memory usage and real-time processing speeds, and is thus very well suited for embedded deployment.
△ Less
Submitted 18 March, 2020;
originally announced April 2020.
-
How much real data do we actually need: Analyzing object detection performance using synthetic and real data
Authors:
Farzan Erlik Nowruzi,
Prince Kapoor,
Dhanvin Kolhatkar,
Fahed Al Hassanat,
Robert Laganiere,
Julien Rebut
Abstract:
In recent years, deep learning models have resulted in a huge amount of progress in various areas, including computer vision. By nature, the supervised training of deep models requires a large amount of data to be available. This ideal case is usually not tractable as the data annotation is a tremendously exhausting and costly task to perform. An alternative is to use synthetic data. In this paper…
▽ More
In recent years, deep learning models have resulted in a huge amount of progress in various areas, including computer vision. By nature, the supervised training of deep models requires a large amount of data to be available. This ideal case is usually not tractable as the data annotation is a tremendously exhausting and costly task to perform. An alternative is to use synthetic data. In this paper, we take a comprehensive look into the effects of replacing real data with synthetic data. We further analyze the effects of having a limited amount of real data. We use multiple synthetic and real datasets along with a simulation tool to create large amounts of cheaply annotated synthetic data. We analyze the domain similarity of each of these datasets. We provide insights about designing a methodological procedure for training deep networks using these datasets.
△ Less
Submitted 16 July, 2019;
originally announced July 2019.
-
Structured Compression by Weight Encryption for Unstructured Pruning and Quantization
Authors:
Se Jung Kwon,
Dongsoo Lee,
Byeongwook Kim,
Parichay Kapoor,
Baeseong Park,
Gu-Yeon Wei
Abstract:
Model compression techniques, such as pruning and quantization, are becoming increasingly important to reduce the memory footprints and the amount of computations. Despite model size reduction, achieving performance enhancement on devices is, however, still challenging mainly due to the irregular representations of sparse matrix formats. This paper proposes a new weight representation scheme for S…
▽ More
Model compression techniques, such as pruning and quantization, are becoming increasingly important to reduce the memory footprints and the amount of computations. Despite model size reduction, achieving performance enhancement on devices is, however, still challenging mainly due to the irregular representations of sparse matrix formats. This paper proposes a new weight representation scheme for Sparse Quantized Neural Networks, specifically achieved by fine-grained and unstructured pruning method. The representation is encrypted in a structured regular format, which can be efficiently decoded through XOR-gate network during inference in a parallel manner. We demonstrate various deep learning models that can be compressed and represented by our proposed format with fixed and high compression ratio. For example, for fully-connected layers of AlexNet on ImageNet dataset, we can represent the sparse weights by only 0.28 bits/weight for 1-bit quantization and 91% pruning rate with a fixed decoding rate and full memory bandwidth usage. Decoding through XOR-gate network can be performed without any model accuracy degradation with additional patch data associated with small overhead.
△ Less
Submitted 5 March, 2020; v1 submitted 24 May, 2019;
originally announced May 2019.
-
Network Pruning for Low-Rank Binary Indexing
Authors:
Dongsoo Lee,
Se Jung Kwon,
Byeongwook Kim,
Parichay Kapoor,
Gu-Yeon Wei
Abstract:
Pruning is an efficient model compression technique to remove redundancy in the connectivity of deep neural networks (DNNs). Computations using sparse matrices obtained by pruning parameters, however, exhibit vastly different parallelism depending on the index representation scheme. As a result, fine-grained pruning has not gained much attention due to its irregular index form leading to large mem…
▽ More
Pruning is an efficient model compression technique to remove redundancy in the connectivity of deep neural networks (DNNs). Computations using sparse matrices obtained by pruning parameters, however, exhibit vastly different parallelism depending on the index representation scheme. As a result, fine-grained pruning has not gained much attention due to its irregular index form leading to large memory footprint and low parallelism for convolutions and matrix multiplications. In this paper, we propose a new network pruning technique that generates a low-rank binary index matrix to compress index data while decompressing index data is performed by simple binary matrix multiplication. This proposed compression method finds a particular fine-grained pruning mask that can be decomposed into two binary matrices. We also propose a tile-based factorization technique that not only lowers memory requirements but also enhances compression ratio. Various DNN models can be pruned with much fewer indexes compared to previous sparse matrix formats while maintaining the same pruning rate.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
DeepTwist: Learning Model Compression via Occasional Weight Distortion
Authors:
Dongsoo Lee,
Parichay Kapoor,
Byeongwook Kim
Abstract:
Model compression has been introduced to reduce the required hardware resources while maintaining the model accuracy. Lots of techniques for model compression, such as pruning, quantization, and low-rank approximation, have been suggested along with different inference implementation characteristics. Adopting model compression is, however, still challenging because the design complexity of model c…
▽ More
Model compression has been introduced to reduce the required hardware resources while maintaining the model accuracy. Lots of techniques for model compression, such as pruning, quantization, and low-rank approximation, have been suggested along with different inference implementation characteristics. Adopting model compression is, however, still challenging because the design complexity of model compression is rapidly increasing due to additional hyper-parameters and computation overhead in order to achieve a high compression ratio. In this paper, we propose a simple and efficient model compression framework called DeepTwist which distorts weights in an occasional manner without modifying the underlying training algorithms. The ideas of designing weight distortion functions are intuitive and straightforward given formats of compressed weights. We show that our proposed framework improves compression rate significantly for pruning, quantization, and low-rank approximation techniques while the efforts of additional retraining and/or hyper-parameter search are highly reduced. Regularization effects of DeepTwist are also reported.
△ Less
Submitted 30 October, 2018;
originally announced October 2018.
-
A method of limiting performance loss of CNNs in noisy environments
Authors:
James R. Geraci,
Parichay Kapoor
Abstract:
Convolutional Neural Network (CNN) recognition rates drop in the presence of noise. We demonstrate a novel method of counteracting this drop in recognition rate by adjusting the biases of the neurons in the convolutional layers according to the noise conditions encountered at runtime. We compare our technique to training one network for all possible noise levels, dehazing via preprocessing a signa…
▽ More
Convolutional Neural Network (CNN) recognition rates drop in the presence of noise. We demonstrate a novel method of counteracting this drop in recognition rate by adjusting the biases of the neurons in the convolutional layers according to the noise conditions encountered at runtime. We compare our technique to training one network for all possible noise levels, dehazing via preprocessing a signal with a denoising autoencoder, and training a network specifically for each noise level. Our system compares favorably in terms of robustness, computational complexity and recognition rate.
△ Less
Submitted 3 February, 2017;
originally announced February 2017.
-
Chaos in Dynamics of a Family of Transcendental Meromorphic Functions
Authors:
M. Sajid,
G. P. Kapoor
Abstract:
The characterization and properties of Julia sets of one parameter family of transcendental meromorphic functions $ζ_λ(z)=λ\frac{z}{z+1} e^{-z}$, $λ>0$, $z\in \mathbb{C}$ is investigated in the present paper. It is found that bifurcations in the dynamics of $ζ_λ(x)$, $x\in {\mathbb{R}}\setminus \{-1\}$, occur at several parameter values and the dynamics of the family becomes chaotic when the param…
▽ More
The characterization and properties of Julia sets of one parameter family of transcendental meromorphic functions $ζ_λ(z)=λ\frac{z}{z+1} e^{-z}$, $λ>0$, $z\in \mathbb{C}$ is investigated in the present paper. It is found that bifurcations in the dynamics of $ζ_λ(x)$, $x\in {\mathbb{R}}\setminus \{-1\}$, occur at several parameter values and the dynamics of the family becomes chaotic when the parameter $λ$ crosses certain values. The Lyapunov exponent of $ζ_λ(x)$ for certain values of the parameter $λ$ is computed for quantifying the chaos in its dynamics. The characterization of the Julia set of the function $ζ_λ(z)$ as complement of the basin of attraction of an attracting real fixed point of $ζ_λ(z)$ is found here and is applied to computationally simulate the images of the Julia sets of $ζ_λ(z)$. Further, it is established that the Julia set of $ζ_λ(z)$ for $λ>(\sqrt{2}+1) e^{\sqrt{2}}$ contains the complement of attracting periodic orbits of $ζ_λ(x)$. Finally, the results on the dynamics of functions $λ\tan z$, $λ\in {\mathbb{\hat{C}}}\setminus\{0\}$, $E_λ(z) = λ\frac{e^{z} -1}{z}$, $λ> 0$ and $f_λ=λf(z)$, $λ>0$, where $f(z)$ has certain properties, are compared with the results found in the present paper.
△ Less
Submitted 7 September, 2014;
originally announced September 2014.
-
Lidstone Fractal Interpolation and Error Analysis
Authors:
G. P. Kapoor,
M. Sahoo
Abstract:
In the present paper, the notion of Lidstone Fractal Interpolation Function ($Lidstone \ FIF$) is introduced to interpolate and approximate data generating functions that arise from real life objects and outcomes of several scientific experiments. A Lidstone FIF extends the classical Lidstone Interpolation Function which is generally found not to be satisfactory in interpolation and approximation…
▽ More
In the present paper, the notion of Lidstone Fractal Interpolation Function ($Lidstone \ FIF$) is introduced to interpolate and approximate data generating functions that arise from real life objects and outcomes of several scientific experiments. A Lidstone FIF extends the classical Lidstone Interpolation Function which is generally found not to be satisfactory in interpolation and approximation of such functions. For a data $\{(x_n,y_{n,2k}); n=0,1,\ldots,N \ \text{and} \ k=0,1,\ldots,p\}$ with $N,p\in\mathbb{N}$, the existence of Lidstone FIF is proved in the present work and a computational method for its construction is developed. The constructed Lidstone FIF is a $C^{2p}[x_0,x_N]$ fractal function $\ell_α$ satisfying $\ell_α^{(2k)}(x_n)=y_{n,2k}$, $n=0,1,\ldots,N$,\ $k=0,1,\ldots,p$. Our error estimates establish that the order of $L^\infty$-error in approximation of a data generating function in $C^{2p}[x_0,x_N]$ by Lidstone FIF is of the order $N^{-2p}$, while $L^\infty$-error in approximation of $2k$-order derivative of the data generating function by corresponding order derivative of Lidstone FIF is of the order $N^{-(2p-2k)}$. The results found in the present work are illustrated for computational constructions of a Lidstone FIF and its derivatives with an example of a data generating function.
△ Less
Submitted 9 July, 2014;
originally announced July 2014.
-
Earthquake and Geothermal Energy
Authors:
Surya Prakash Kapoor,
Bhag Chand Chauhan
Abstract:
The origin of earthquake has long been recognized as resulting from strike-slip instability of plate tectonics along the fault lines. Several events of earthquake around the globe have happened which cannot be explained by this theory. In this work we investigated the earthquake data along with other observed facts like heat flow profiles etc... of the Indian subcontinent. In our studies we found…
▽ More
The origin of earthquake has long been recognized as resulting from strike-slip instability of plate tectonics along the fault lines. Several events of earthquake around the globe have happened which cannot be explained by this theory. In this work we investigated the earthquake data along with other observed facts like heat flow profiles etc... of the Indian subcontinent. In our studies we found a high-quality correlation between the earthquake events, seismic prone zones, heat flow regions and the geothermal hot springs. As a consequence, we proposed a hypothesis which can adequately explain all the earthquake events around the globe as well as the overall geo-dynamics. It is basically the geothermal power, which makes the plates to stand still, strike and slip over. The plates are merely a working solid while the driving force is the geothermal energy. The violent flow and enormous pressure of this power shake the earth along the plate boundaries and also triggers the intra-plate seismicity. In the light of the results reported by the California Energy Commission from the ongoing geothermal power project at the Big Geysers in California, we further propounded that by harnessing the surplus geothermal energy the intensity and risk of the impending earthquakes can be substantially reduced.
△ Less
Submitted 30 September, 2013;
originally announced September 2013.
-
Convergence of Cubic Spline Super Fractal Interpolation Functions
Authors:
G. P. Kapoor,
Srijanani Anurag Prasad
Abstract:
In the present work, the notion of Cubic Spline Super Fractal Interpolation Function (SFIF) is introduced to simulate an object that depicts one structure embedded into another and its approximation properties are investigated. It is shown that, for an equidistant partition points of [x_0,x_N], the interpolating Cubic Spline (SFIF) and their derivatives converge respectively to the data generating…
▽ More
In the present work, the notion of Cubic Spline Super Fractal Interpolation Function (SFIF) is introduced to simulate an object that depicts one structure embedded into another and its approximation properties are investigated. It is shown that, for an equidistant partition points of [x_0,x_N], the interpolating Cubic Spline (SFIF) and their derivatives converge respectively to the data generating function and its derivatives at the rate of h^(2-j+e) (0<e<1), j=0,1,2 as the norm h of the partition of [x_0,x_N] approaches zero. The convergence results for Cubic Spline (SFIF) found here show that any desired accuracy can be achieved in the approximation of a regular data generating function and its derivatives by a Cubic Spline (SFIF) and its corresponding derivatives.
△ Less
Submitted 19 January, 2012;
originally announced January 2012.
-
Multiresolution Analysis Based on Coalescence Hidden-variable FIF
Authors:
G. P. Kapoor,
Srijanani Anurag Prasad
Abstract:
In the present paper, multiresolution analysis arising from Coalescence Hidden-variable Fractal Interpolation Functions (CHFIFs) is accomplished. The availability of a larger set of free variables and constrained variables with CHFIF in multiresolution analysis based on CHFIFs provides more control in reconstruction of functions in L2(\mathbb{R})than that provided by multiresolution analysis based…
▽ More
In the present paper, multiresolution analysis arising from Coalescence Hidden-variable Fractal Interpolation Functions (CHFIFs) is accomplished. The availability of a larger set of free variables and constrained variables with CHFIF in multiresolution analysis based on CHFIFs provides more control in reconstruction of functions in L2(\mathbb{R})than that provided by multiresolution analysis based only on Affine Fractal Interpolation Functions (AFIFs). In our approach, the vector space of CHFIFs is introduced, its dimension is determined and Riesz bases of vector subspaces Vk, k \in \mathbb{Z}, consisting of certain CHFIFs in L2(\mathbb{R}) \cap C0(\mathbb{R}) are constructed. As a special case, for the vector space of CHFIFs of dimension 4, orthogonal bases for the vector subspaces Vk, k \in \mathbb{Z}, are explicitly constructed and, using these bases, compactly supported continuous orthonormal wavelets are generated.
△ Less
Submitted 17 January, 2012;
originally announced January 2012.
-
Super Fractal Interpolation Functions
Authors:
G. P. Kapoor,
Srijanani Anurag Prasad
Abstract:
In the present work, the notion of Super Fractal Interpolation Function (SFIF) is introduced for finer simulation of the objects of the nature or outcomes of scientific experiments that reveal one or more structures embedded in to another. In the construction of SFIF, an IFS is chosen from a pool of several IFS at each level of iteration leading to implementation of the desired randomness and vari…
▽ More
In the present work, the notion of Super Fractal Interpolation Function (SFIF) is introduced for finer simulation of the objects of the nature or outcomes of scientific experiments that reveal one or more structures embedded in to another. In the construction of SFIF, an IFS is chosen from a pool of several IFS at each level of iteration leading to implementation of the desired randomness and variability in fractal interpolation of the given data. Further, an expository description of our investigations on the integral, the smoothness and determination of conditions for existence of derivatives of a SFIF is given in the present work.
△ Less
Submitted 17 January, 2012;
originally announced January 2012.
-
Stability of Coalescence Hidden variable Fractal Interpolation Surfaces
Authors:
G. P. Kapoor,
Srijanani Anurag Prasad
Abstract:
In the present paper, the stability of Coalescence Hidden variable Fractal Interpolation Surfaces(CHFIS) is established. The estimates on error in approximation of the data generating function by CHFIS are found when there is a perturbation in independent, dependent and hidden variables. It is proved that any small perturbation in any of the variables of generalized interpolation data results in…
▽ More
In the present paper, the stability of Coalescence Hidden variable Fractal Interpolation Surfaces(CHFIS) is established. The estimates on error in approximation of the data generating function by CHFIS are found when there is a perturbation in independent, dependent and hidden variables. It is proved that any small perturbation in any of the variables of generalized interpolation data results in only small perturbation of CHFIS. Our results are likely to be useful in investigations of texture of surfaces arising from the simulation of surfaces of rocks, sea surfaces, clouds and similar natural objects wherein the generating function depends on more than one variable.
△ Less
Submitted 3 September, 2009;
originally announced September 2009.
-
Coefficient Estimates for Inverses of Starlike Functions of Positive Order
Authors:
G. P. Kapoor,
A. K. Mishra
Abstract:
In the present paper, the coefficient estimates are found for the class $\mathcal S^{*-1}(α)$ consisting of inverses of functions in the class of univalent starlike functions of order $α$ in $\mathcal D=\{z\in\mathbb C:|z|<1\}$. These estimates extend the work of {\it Krzyz, Libera and Zlotkiewicz [Ann. Univ. Marie Curie-Sklodowska, 33(1979), 103-109]} who found sharp estimates on only first two…
▽ More
In the present paper, the coefficient estimates are found for the class $\mathcal S^{*-1}(α)$ consisting of inverses of functions in the class of univalent starlike functions of order $α$ in $\mathcal D=\{z\in\mathbb C:|z|<1\}$. These estimates extend the work of {\it Krzyz, Libera and Zlotkiewicz [Ann. Univ. Marie Curie-Sklodowska, 33(1979), 103-109]} who found sharp estimates on only first two coefficients for the functions in the class $\mathcal S^{*-1}(α)$. The coefficient estimates are also found for the class $\sum^{*-1}(α)$, consisting of inverses of functions in the class $\sum^*(α)$ of univalent starlike functions of order $α$ in $\mathcal V=\{z\in\mathbb C:1<|z|<\infty\}$. The open problem of finding sharp coefficient estimates for functions in the class $\sum^*(α)$ stands completely settled in the present work by our method developed here.
△ Less
Submitted 3 November, 2005;
originally announced November 2005.
-
Coalescence Hidden Variable Fractal Interpolation Functions and its Smoothness Analysis
Authors:
A. K. B. Chand,
G. P. Kapoor
Abstract:
We construct a coalescence hidden variable fractal interpolation function (CHFIF) through a non-diagonal iterated function system(IFS). Such a FIF may be self-affine or non-self-affine depending on the parameters of the defining non-diagonal IFS. The smoothness analysis of the CHFIF has been carried out by using the operator approximation technique. The deterministic construction of functions ha…
▽ More
We construct a coalescence hidden variable fractal interpolation function (CHFIF) through a non-diagonal iterated function system(IFS). Such a FIF may be self-affine or non-self-affine depending on the parameters of the defining non-diagonal IFS. The smoothness analysis of the CHFIF has been carried out by using the operator approximation technique. The deterministic construction of functions having order of modulus continuity O (|t|^{delta} (log|t|)^m), (m a non-negative integer and 0 < delta le 1) is possible through our CHFIF. The bounds of fractal dimension of CHFIFs are obtained first in certain critical cases and then, using estimation of these bounds, the bounds of fractal dimension of any FIF are found.
△ Less
Submitted 3 November, 2005;
originally announced November 2005.