-
Vietoris--Rips Shadow for Euclidean Graph Reconstruction
Authors:
Rafal Komendarczyk,
Sushovan Majhi,
Atish Mitra
Abstract:
The shadow of an abstract simplicial complex $K$ with vertices in $\mathbb R^N$ is a subset of $\mathbb R^N$ defined as the union of the convex hulls of simplices of $K$. The Vietoris--Rips complex of a metric space $(S,d)$ at scale $β$ is an abstract simplicial complex whose each $k$-simplex corresponds to $(k+1)$ points of $S$ within diameter $β$. In case $S\subset\mathbb R^2$ and…
▽ More
The shadow of an abstract simplicial complex $K$ with vertices in $\mathbb R^N$ is a subset of $\mathbb R^N$ defined as the union of the convex hulls of simplices of $K$. The Vietoris--Rips complex of a metric space $(S,d)$ at scale $β$ is an abstract simplicial complex whose each $k$-simplex corresponds to $(k+1)$ points of $S$ within diameter $β$. In case $S\subset\mathbb R^2$ and $d(a,b)=\|a-b\|$ standard Euclidean, the natural shadow projection of the Vietoris--Rips is already proved to be $1$-connected. We extend the result beyond the standard Euclidean distance on $S\subset\mathbb R^N$ to a family of path-based metrics $d^\varepsilon_{S}$. From the pairwise Euclidean distances of points of $S$, we introduce a family (parametrized by $\varepsilon$) of path-based Vietoris--Rips complexes $R^\varepsilon_β(S)$ for a scale $β>0$. If $S\subset\mathbb R^2$ is Hausdorff-close to a planar Euclidean graph $G$, we provide quantitative bounds on scales $β,\varepsilon$ for the shadow projection map of the Vietoris--Rips of $(S,d^\varepsilon_{S})$ at scale $β$ to be $1$-connected. As a novel application, this paper first studies the homotopy-type recovery of $G\subset\mathbb R^N$ using the abstract Vietoris--Rips complex of a Hausdorff-close sample $S$ under the $d^\varepsilon_{S}$ metric. Then, our result on the $1$-connectivity of the shadow projection lends itself to providing also a geometrically close embedding for the reconstruction. Based on the length of the shortest loop and large-scale distortion of the embedding of $G$, we quantify the choice of a suitable sample density $\varepsilon$ and a scale $β$ at which the shadow of $R^\varepsilon_β(S)$ is homotopy-equivalent and Hausdorff-close to $G$.
△ Less
Submitted 2 June, 2025;
originally announced June 2025.
-
Just Dance with $π$! A Poly-modal Inductor for Weakly-supervised Video Anomaly Detection
Authors:
Snehashis Majhi,
Giacomo D'Amicantonio,
Antitza Dantcheva,
Quan Kong,
Lorenzo Garattoni,
Gianpiero Francesca,
Egor Bondarev,
Francois Bremond
Abstract:
Weakly-supervised methods for video anomaly detection (VAD) are conventionally based merely on RGB spatio-temporal features, which continues to limit their reliability in real-world scenarios. This is due to the fact that RGB-features are not sufficiently distinctive in setting apart categories such as shoplifting from visually similar events. Therefore, towards robust complex real-world VAD, it i…
▽ More
Weakly-supervised methods for video anomaly detection (VAD) are conventionally based merely on RGB spatio-temporal features, which continues to limit their reliability in real-world scenarios. This is due to the fact that RGB-features are not sufficiently distinctive in setting apart categories such as shoplifting from visually similar events. Therefore, towards robust complex real-world VAD, it is essential to augment RGB spatio-temporal features by additional modalities. Motivated by this, we introduce the Poly-modal Induced framework for VAD: "PI-VAD", a novel approach that augments RGB representations by five additional modalities. Specifically, the modalities include sensitivity to fine-grained motion (Pose), three dimensional scene and entity representation (Depth), surrounding objects (Panoptic masks), global motion (optical flow), as well as language cues (VLM). Each modality represents an axis of a polygon, streamlined to add salient cues to RGB. PI-VAD includes two plug-in modules, namely Pseudo-modality Generation module and Cross Modal Induction module, which generate modality-specific prototypical representation and, thereby, induce multi-modal information into RGB cues. These modules operate by performing anomaly-aware auxiliary tasks and necessitate five modality backbones -- only during training. Notably, PI-VAD achieves state-of-the-art accuracy on three prominent VAD datasets encompassing real-world scenarios, without requiring the computational overhead of five modality backbones at inference.
△ Less
Submitted 19 May, 2025;
originally announced May 2025.
-
SAM-Mamba: Mamba Guided SAM Architecture for Generalized Zero-Shot Polyp Segmentation
Authors:
Tapas Kumar Dutta,
Snehashis Majhi,
Deepak Ranjan Nayak,
Debesh Jha
Abstract:
Polyp segmentation in colonoscopy is crucial for detecting colorectal cancer. However, it is challenging due to variations in the structure, color, and size of polyps, as well as the lack of clear boundaries with surrounding tissues. Traditional segmentation models based on Convolutional Neural Networks (CNNs) struggle to capture detailed patterns and global context, limiting their performance. Vi…
▽ More
Polyp segmentation in colonoscopy is crucial for detecting colorectal cancer. However, it is challenging due to variations in the structure, color, and size of polyps, as well as the lack of clear boundaries with surrounding tissues. Traditional segmentation models based on Convolutional Neural Networks (CNNs) struggle to capture detailed patterns and global context, limiting their performance. Vision Transformer (ViT)-based models address some of these issues but have difficulties in capturing local context and lack strong zero-shot generalization. To this end, we propose the Mamba-guided Segment Anything Model (SAM-Mamba) for efficient polyp segmentation. Our approach introduces a Mamba-Prior module in the encoder to bridge the gap between the general pre-trained representation of SAM and polyp-relevant trivial clues. It injects salient cues of polyp images into the SAM image encoder as a domain prior while capturing global dependencies at various scales, leading to more accurate segmentation results. Extensive experiments on five benchmark datasets show that SAM-Mamba outperforms traditional CNN, ViT, and Adapter-based models in both quantitative and qualitative measures. Additionally, SAM-Mamba demonstrates excellent adaptability to unseen datasets, making it highly suitable for real-time clinical use.
△ Less
Submitted 11 December, 2024;
originally announced December 2024.
-
A PDD-Inspired Channel Estimation Scheme in NOMA Network
Authors:
Sumita Majhi,
Pinaki Mitra
Abstract:
In 5G networks, non-orthogonal multiple access (NOMA) provides a number of benefits by providing uneven power distribution to multiple users at once. On the other hand, effective power allocation, successful successive interference cancellation (SIC), and user fairness all depend on precise channel state information (CSI). Because of dynamic channels, imperfect models, and feedback overhead, CSI p…
▽ More
In 5G networks, non-orthogonal multiple access (NOMA) provides a number of benefits by providing uneven power distribution to multiple users at once. On the other hand, effective power allocation, successful successive interference cancellation (SIC), and user fairness all depend on precise channel state information (CSI). Because of dynamic channels, imperfect models, and feedback overhead, CSI prediction in NOMA is difficult. Our aim is to propose a CSI prediction technique based on an ML model that accounts for partially decoded data (PDD), a byproduct of the SIC process. Our proposed technique has been shown to be efficient in handover failure (HOF) prediction and reducing pilot overhead, which is particularly important in 5G. We have shown how machine learning (ML) models may be used to forecast CSI in NOMA handover.
△ Less
Submitted 29 November, 2024;
originally announced November 2024.
-
Embedded Graph Reconstruction under Hausdorff Noise
Authors:
Halley Fritze,
Sushovan Majhi,
Marissa Masden,
Atish Mitra,
Michael Stickney
Abstract:
Filamentary structures (topologically embedded graphs with a metric structure) are ubiquitous in science and engineering. A challenging problem in topological data analysis (TDA) is to reconstruct the topology and geometry of such an underlying (usually unknown) metric graph from possibly noisy data sampled around it. Reeb graphs have recently been successfully employed in abstract metric graph re…
▽ More
Filamentary structures (topologically embedded graphs with a metric structure) are ubiquitous in science and engineering. A challenging problem in topological data analysis (TDA) is to reconstruct the topology and geometry of such an underlying (usually unknown) metric graph from possibly noisy data sampled around it. Reeb graphs have recently been successfully employed in abstract metric graph reconstruction under Gromov$\unicode{x2013}$Hausdorff noise: the sample is assumed to be metrically close to the ground truth. However, such a strong global density assumption is hardly achieved in applications, making the existing Reeb graph-based methods untractible. We relax the density assumption to give provable geometric reconstruction schemes, even when the sample is metrically close only locally. A very different yet more relevant paradigm focuses on the reconstruction of metric graphs$\unicode{x2014}$embedded in the Euclidean space$\unicode{x2014}$from Euclidean samples that are only Hausdorff-close. We further extend our methodologies to provide novel, provable guarantees for the successful geometric reconstruction of Euclidean graphs under the Hausdorff noise model. Our technique produces promising results in reconstructing earthquake plate tectonic boundaries from the global earthquake catalog.
△ Less
Submitted 25 October, 2024;
originally announced October 2024.
-
A Further Investigation on Complete Complementary Codes from $q$-ary Functions
Authors:
Palash Sarkar,
Chunlei Li,
Sudhan Majhi,
Zilong Liu
Abstract:
This research focuses on constructing $q$-ary functions for complete complementary codes (CCCs) with flexible parameters. Most existing work has primarily identified sufficient conditions for $q$-ary functions related to $q$-ary CCCs. To the best of the authors' knowledge, this study is the first to establish both the necessary and sufficient conditions for $q$-ary functions, encompassing most exi…
▽ More
This research focuses on constructing $q$-ary functions for complete complementary codes (CCCs) with flexible parameters. Most existing work has primarily identified sufficient conditions for $q$-ary functions related to $q$-ary CCCs. To the best of the authors' knowledge, this study is the first to establish both the necessary and sufficient conditions for $q$-ary functions, encompassing most existing CCCs constructions as special cases. For $q$-ary CCCs with a length of $q^m$ and a set size of $q^{n+1}$, we begin by analyzing the necessary and sufficient conditions for $q$-ary functions defined over the domain $\mathbb{Z}_q^m$. Additionally, we construct CCCs with lengths given by $L = \prod_{i=1}^k p_i^{m_i}$, set sizes given by $K = \prod_{i=1}^k p_i^{n_i+1}$, and an alphabet size of $ν= \prod_{i=1}^k p_i$, where $p_1 < p_2 < \cdots < p_k$. To achieve these specific parameters, we examine the necessary and sufficient conditions for $ν$-ary functions over the domain $\mathbf{Z}_{p_1}^{m_1} \times \cdots \times \mathbf{Z}_{p_k}^{m_k}$, which is a subset of $\mathbb{Z}_ν^m$ and contains $\prod_{i=1}^k p_i^{m_i}$ vectors. In this context, $\mathbf{Z}_{p_i}^{m_i} = \{0, 1, \ldots, p_i - 1\}^{m_i}$, and $m$ is the sum of $m_1, m_2, \ldots, m_k$. The $q$-ary and $ν$-ary functions allow us to cover all possible length sequences. However, we find that the proposed $ν$-ary functions are more suitable for generating CCCs with a length of $L = \prod_{i=1}^k p_i^{m_i}$, particularly when $m_i$ is coprime to $m_j$ for some $1 \leq i \neq j \leq k$. While the proposed $q$-ary functions can also produce CCCs of the same length $L$, the set size and alphabet size become as large as $L$, since in this case, the only choice for $q$ is $L$. In contrast, the proposed $ν$-ary functions yield CCCs with a more flexible set size $K\leq L$ and an alphabet size of $ν<L$.
△ Less
Submitted 22 September, 2024;
originally announced September 2024.
-
What Matters in Autonomous Driving Anomaly Detection: A Weakly Supervised Horizon
Authors:
Utkarsh Tiwari,
Snehashis Majhi,
Michal Balazia,
François Brémond
Abstract:
Video anomaly detection (VAD) in autonomous driving scenario is an important task, however it involves several challenges due to the ego-centric views and moving camera. Due to this, it remains largely under-explored. While recent developments in weakly-supervised VAD methods have shown remarkable progress in detecting critical real-world anomalies in static camera scenario, the development and va…
▽ More
Video anomaly detection (VAD) in autonomous driving scenario is an important task, however it involves several challenges due to the ego-centric views and moving camera. Due to this, it remains largely under-explored. While recent developments in weakly-supervised VAD methods have shown remarkable progress in detecting critical real-world anomalies in static camera scenario, the development and validation of such methods are yet to be explored for moving camera VAD. This is mainly due to existing datasets like DoTA not following training pre-conditions of weakly-supervised learning. In this paper, we aim to promote weakly-supervised method development for autonomous driving VAD. We reorganize the DoTA dataset and aim to validate recent powerful weakly-supervised VAD methods on moving camera scenarios. Further, we provide a detailed analysis of what modifications on state-of-the-art methods can significantly improve the detection performance. Towards this, we propose a "feature transformation block" and through experimentation we show that our propositions can empower existing weakly-supervised VAD methods significantly in improving the VAD in autonomous driving. Our codes/dataset/demo will be released at github.com/ut21/WSAD-Driving
△ Less
Submitted 10 August, 2024;
originally announced August 2024.
-
Topological Stability and Latschev-type Reconstruction Theorems for Spaces of Curvature Bounded Above
Authors:
Rafal Komendarczyk,
Sushovan Majhi,
Will Tran
Abstract:
We consider the problem of homotopy-type reconstruction of compact subsets $X\subset\R^N$ that have the Alexandrov curvature bounded above ($\leq$ $κ$) in the intrinsic length metric. The reconstructed spaces are in the form of Vietoris--Rips complexes computed from a compact sample $S$, Hausdorff--close to the unknown shape $X$. Instead of the Euclidean metric on the sample, our reconstruction te…
▽ More
We consider the problem of homotopy-type reconstruction of compact subsets $X\subset\R^N$ that have the Alexandrov curvature bounded above ($\leq$ $κ$) in the intrinsic length metric. The reconstructed spaces are in the form of Vietoris--Rips complexes computed from a compact sample $S$, Hausdorff--close to the unknown shape $X$. Instead of the Euclidean metric on the sample, our reconstruction technique leverages a path-based metric to compute these complexes. As naturally emerging in the framework of reconstruction, we also study the Gromov--Hausdorff topological stability and finiteness problem for general compact for subspaces of curvature bounded above. Our techniques provide novel sampling conditions as an alternative to the existing and commonly used techniques using weak feature size and $μ$--reach. In particular, we leverage the concept of the {\em large scale distortion}, and show examples of Euclidean subspaces, for which the known parameters such as the reach, $μ$--reach and weak features size vanish, whereas the large scale distortion is finite, making our reconstruction results applicable for such cases.
△ Less
Submitted 24 May, 2025; v1 submitted 6 June, 2024;
originally announced June 2024.
-
A New Construction of Optimal Symmetrical ZCCS
Authors:
Rajen Kumar,
Prashant Kumar Srivastava,
Sudhan Majhi
Abstract:
We propose new constructions for a two-dimensional ($2$D) perfect array, complete complementary code (CCC), and multiple CCCs as an optimal symmetrical $Z$-complementary code set (ZCCS). We propose a method to generate a two-dimensional perfect array and CCC. By utilising mutually orthogonal sequences, we developed a method to extend the length of a CCC without affecting the set or code size. Addi…
▽ More
We propose new constructions for a two-dimensional ($2$D) perfect array, complete complementary code (CCC), and multiple CCCs as an optimal symmetrical $Z$-complementary code set (ZCCS). We propose a method to generate a two-dimensional perfect array and CCC. By utilising mutually orthogonal sequences, we developed a method to extend the length of a CCC without affecting the set or code size. Additionally, this concept is extended to include the development of multiple CCCs, and the correlation characteristics of these multiple CCCs are identical with the characteristics of optimal symmetrical ZCCS.
△ Less
Submitted 25 May, 2024;
originally announced May 2024.
-
Systematic Construction of Golay Complementary Sets of Arbitrary Lengths and Alphabet Sizes
Authors:
Abhishek Roy,
Sudhan Majhi,
Subhabrata Paul
Abstract:
One of the important applications of Golay complementary sets (GCSs) is the reduction of peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency division multiplexing (OFDM) systems. OFDM has played a major role in modern wireless systems such as long-term-evolution (LTE), 5th generation (5G) wireless standards, etc. This paper searches for systematic constructions of GCSs of arbitrary l…
▽ More
One of the important applications of Golay complementary sets (GCSs) is the reduction of peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency division multiplexing (OFDM) systems. OFDM has played a major role in modern wireless systems such as long-term-evolution (LTE), 5th generation (5G) wireless standards, etc. This paper searches for systematic constructions of GCSs of arbitrary lengths and alphabet sizes. The proposed constructions are based on extended Boolean functions (EBFs). For the first time, we can generate codes of independent parameter choices.
△ Less
Submitted 2 January, 2025; v1 submitted 2 May, 2024;
originally announced May 2024.
-
Multiple Spectrally Null Constrained Complete Complementary Codes of Various Lengths Over Small Alphabet
Authors:
Rajen Kumar,
Palash Sarkar,
Prashant Kumar Srivastava,
Sudhan Majhi
Abstract:
Complete complementary codes (CCCs) are highly valuable in the fields of information security, radar and communication. The spectrally null constrained (SNC) problem arises in radar and modern communication systems due to the reservation or prohibition of specific spectrums from transmission. The literature on SNC-CCCs is somewhat limited in comparison to the literature on traditional CCCs. The ma…
▽ More
Complete complementary codes (CCCs) are highly valuable in the fields of information security, radar and communication. The spectrally null constrained (SNC) problem arises in radar and modern communication systems due to the reservation or prohibition of specific spectrums from transmission. The literature on SNC-CCCs is somewhat limited in comparison to the literature on traditional CCCs. The main objective of this paper is to discover several configurations of SNC-CCCs that possess more flexibility in their parameters. The proposed construction utilised the existing CCCs and mutually orthogonal sequences. The proposed construction can cover almost all lengths with the smallest alphabets $\{-1,0,1\}$. Further, the idea of SNC-CCC is extended to multiple SNC-CCC with an inter-set zero cross-correlation zone (ZCCZ). Based on our construction, we can also control the correlation value outside the ZCCZ. The beauty of the obtained codes have aperiodic and periodic inter-set ZCCZ and low cross-correlation side-lobs.
△ Less
Submitted 11 October, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Exploring the Limits of Zero Shot Vision Language Models for Hate Meme Detection: The Vulnerabilities and their Interpretations
Authors:
Naquee Rizwan,
Paramananda Bhaskar,
Mithun Das,
Swadhin Satyaprakash Majhi,
Punyajoy Saha,
Animesh Mukherjee
Abstract:
There is a rapid increase in the use of multimedia content in current social media platforms. One of the highly popular forms of such multimedia content are memes. While memes have been primarily invented to promote funny and buoyant discussions, malevolent users exploit memes to target individuals or vulnerable communities, making it imperative to identify and address such instances of hateful me…
▽ More
There is a rapid increase in the use of multimedia content in current social media platforms. One of the highly popular forms of such multimedia content are memes. While memes have been primarily invented to promote funny and buoyant discussions, malevolent users exploit memes to target individuals or vulnerable communities, making it imperative to identify and address such instances of hateful memes. Thus social media platforms are in dire need for active moderation of such harmful content. While manual moderation is extremely difficult due to the scale of such content, automatic moderation is challenged by the need of good quality annotated data to train hate meme detection algorithms. This makes a perfect pretext for exploring the power of modern day vision language models (VLMs) that have exhibited outstanding performance across various tasks. In this paper we study the effectiveness of VLMs in handling intricate tasks such as hate meme detection in a completely zero-shot setting so that there is no dependency on annotated data for the task. We perform thorough prompt engineering and query state-of-the-art VLMs using various prompt types to detect hateful/harmful memes. We further interpret the misclassification cases using a novel superpixel based occlusion method. Finally we show that these misclassifications can be neatly arranged into a typology of error classes the knowledge of which should enable the design of better safety guardrails in future.
△ Less
Submitted 23 March, 2025; v1 submitted 19 February, 2024;
originally announced February 2024.
-
Metric and Path-Connectedness Properties of the Frechet Distance for Paths and Graphs
Authors:
Erin Chambers,
Brittany Fasy,
Benjamin Holmgren,
Sushovan Majhi,
Carola Wenk
Abstract:
The Frechet distance is often used to measure distances between paths, with applications in areas ranging from map matching to GPS trajectory analysis to handwriting recognition. More recently, the Frechet distance has been generalized to a distance between two copies of the same graph embedded or immersed in a metric space; this more general setting opens up a wide range of more complex applicati…
▽ More
The Frechet distance is often used to measure distances between paths, with applications in areas ranging from map matching to GPS trajectory analysis to handwriting recognition. More recently, the Frechet distance has been generalized to a distance between two copies of the same graph embedded or immersed in a metric space; this more general setting opens up a wide range of more complex applications in graph analysis. In this paper, we initiate a study of some of the fundamental topological properties of spaces of paths and of graphs mapped to R^n under the Frechet distance, in an effort to lay the theoretical groundwork for understanding how these distances can be used in practice. In particular, we prove whether or not these spaces, and the metric balls therein, are path-connected.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Graph Mover's Distance: An Efficiently Computable Distance Measure for Geometric Graphs
Authors:
Sushovan Majhi
Abstract:
Many applications in pattern recognition represent patterns as a geometric graph. The geometric graph distance (GGD) has recently been studied as a meaningful measure of similarity between two geometric graphs. Since computing the GGD is known to be $\mathcal{NP}$-hard, the distance measure proves an impractical choice for applications. As a computationally tractable alternative, we propose in thi…
▽ More
Many applications in pattern recognition represent patterns as a geometric graph. The geometric graph distance (GGD) has recently been studied as a meaningful measure of similarity between two geometric graphs. Since computing the GGD is known to be $\mathcal{NP}$-hard, the distance measure proves an impractical choice for applications. As a computationally tractable alternative, we propose in this paper the Graph Mover's Distance (GMD), which has been formulated as an instance of the earth mover's distance. The computation of the GMD between two geometric graphs with at most $n$ vertices takes only $O(n^3)$-time. Alongside studying the metric properties of the GMD, we investigate the stability of the GGD and GMD. The GMD also demonstrates extremely promising empirical evidence at recognizing letter drawings from the {\tt LETTER} dataset \cite{da_vitoria_lobo_iam_2008}.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
Direct Constructions of Multiple Shift Complementary Sets of Flexible Lengths
Authors:
Abhishek Roy,
Sudhan Majhi
Abstract:
Golay complementary set (GCS) plays a vital role in reducing peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency division multiplexing (OFDM). A more general version of GCS is a multiple shift complementary set (MSCS), where by relaxing the condition of zero auto-correlation sum throughout all the non-zero time shifts to the integer multiples of some fixed time shift, more sequence s…
▽ More
Golay complementary set (GCS) plays a vital role in reducing peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency division multiplexing (OFDM). A more general version of GCS is a multiple shift complementary set (MSCS), where by relaxing the condition of zero auto-correlation sum throughout all the non-zero time shifts to the integer multiples of some fixed time shift, more sequence sets can be made available. In this paper, we propose direct constructions of MSCSs with flexible and arbitrary lengths and flexible set sizes, by using multivariable functions, which have not been reported before.
△ Less
Submitted 10 May, 2023; v1 submitted 8 May, 2023;
originally announced May 2023.
-
A Direct Construction of Optimal Symmetrical Z-Complementary Code Sets of Prime Power Lengths
Authors:
Praveen Kumar,
Sudhan Majhi,
Subhabrata Paul
Abstract:
This paper presents a direct construction of an optimal symmetrical Z-complementary code set (SZCCS) of prime power lengths using a multi-variable function (MVF). SZCCS is a natural extension of the Z-complementary code set (ZCCS), which has only front-end zero correlation zone (ZCZ) width. SZCCS has both front-end and tail-end ZCZ width. SZCCSs are used in developing optimal training sequences fo…
▽ More
This paper presents a direct construction of an optimal symmetrical Z-complementary code set (SZCCS) of prime power lengths using a multi-variable function (MVF). SZCCS is a natural extension of the Z-complementary code set (ZCCS), which has only front-end zero correlation zone (ZCZ) width. SZCCS has both front-end and tail-end ZCZ width. SZCCSs are used in developing optimal training sequences for broadband generalized spatial modulation systems over frequency-selective channels because they have ZCZ width on both the front and tail ends. The construction of optimal SZCCS with large set sizes and prime power lengths is presented for the first time in this paper. Furthermore, it is worth noting that several existing works on ZCCS and SZCCS can be viewed as special cases of the proposed construction.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
A Construction of Arbitrarily Large Type-II $Z$ Complementary Code Set
Authors:
Rajen Kumar,
Prashant Kumar Srivastava,
Sudhan Majhi
Abstract:
For a type-I $(K,M,Z,N)$-ZCCS, it follows $K \leq M \left\lfloor \frac{N}{Z}\right\rfloor$. In this paper, we propose a construction of type-II $(p^{k+n},p^k,p^{n+r}-p^r+1,p^{n+r})$-$Z$ complementary code set (ZCCS) using an extended Boolean function, its properties of Hamiltonian paths and the concept of isolated vertices, where $p\ge 2$. However, the proposed type-II ZCCS provides…
▽ More
For a type-I $(K,M,Z,N)$-ZCCS, it follows $K \leq M \left\lfloor \frac{N}{Z}\right\rfloor$. In this paper, we propose a construction of type-II $(p^{k+n},p^k,p^{n+r}-p^r+1,p^{n+r})$-$Z$ complementary code set (ZCCS) using an extended Boolean function, its properties of Hamiltonian paths and the concept of isolated vertices, where $p\ge 2$. However, the proposed type-II ZCCS provides $K = M(N-Z+1)$ codes, where as for type-I $(K,M,N,Z)$-ZCCS, it is $K \leq M \left\lfloor \frac{N}{Z}\right\rfloor$. Therefore, the proposed type-II ZCCS provides a larger number of codes compared to type-I ZCCS. Further, as a special case of the proposed construction, $(p^k,p^k,p^n)$-CCC can be generated, for any integral value of $p\ge2$ and $k\le n$.
△ Less
Submitted 14 May, 2024; v1 submitted 2 May, 2023;
originally announced May 2023.
-
Human-Scene Network: A Novel Baseline with Self-rectifying Loss for Weakly supervised Video Anomaly Detection
Authors:
Snehashis Majhi,
Rui Dai,
Quan Kong,
Lorenzo Garattoni,
Gianpiero Francesca,
Francois Bremond
Abstract:
Video anomaly detection in surveillance systems with only video-level labels (i.e. weakly-supervised) is challenging. This is due to, (i) the complex integration of human and scene based anomalies comprising of subtle and sharp spatio-temporal cues in real-world scenarios, (ii) non-optimal optimization between normal and anomaly instances under weak supervision. In this paper, we propose a Human-S…
▽ More
Video anomaly detection in surveillance systems with only video-level labels (i.e. weakly-supervised) is challenging. This is due to, (i) the complex integration of human and scene based anomalies comprising of subtle and sharp spatio-temporal cues in real-world scenarios, (ii) non-optimal optimization between normal and anomaly instances under weak supervision. In this paper, we propose a Human-Scene Network to learn discriminative representations by capturing both subtle and strong cues in a dissociative manner. In addition, a self-rectifying loss is also proposed that dynamically computes the pseudo temporal annotations from video-level labels for optimizing the Human-Scene Network effectively. The proposed Human-Scene Network optimized with self-rectifying loss is validated on three publicly available datasets i.e. UCF-Crime, ShanghaiTech and IITB-Corridor, outperforming recently reported state-of-the-art approaches on five out of the six scenarios considered.
△ Less
Submitted 19 January, 2023;
originally announced January 2023.
-
Construction of Optimal Binary Z-Complementary Code Sets with New Lengths
Authors:
Gobinda Ghosh,
Sudhan Majhi,
Shubabrata Paul
Abstract:
Z-complementary code sets (ZCCSs) are used in multicarrier code-division multiple access (MC-CDMA) systems, for interference-free communication over multiuser and quasi-asynchronous environments.
In this letter, we propose three new constructions of optimal binary $\left(R2^{k+1},2^{k+1}, Rγ,γ\right)$-ZCCS, $\left(R2^{k+1},2^{k+1}, R2^{m_{2}},2^{m_{2}}\right)$-ZCCS and…
▽ More
Z-complementary code sets (ZCCSs) are used in multicarrier code-division multiple access (MC-CDMA) systems, for interference-free communication over multiuser and quasi-asynchronous environments.
In this letter, we propose three new constructions of optimal binary $\left(R2^{k+1},2^{k+1}, Rγ,γ\right)$-ZCCS, $\left(R2^{k+1},2^{k+1}, R2^{m_{2}},2^{m_{2}}\right)$-ZCCS and $\left(2^{k+1},2^{k+1},3γ,2γ\right)$-ZCCS
based on generalized Boolean functions (GBFs), where $γ=2^{m_{1}-1}+2^{m_{1}-3}, m_{1}\geq 5, k\geq 1,m_{2}\geq 1$ and $R$ is any even number. The proposed ZCCSs cover many unreported lengths and large set sizes.
△ Less
Submitted 22 February, 2023; v1 submitted 9 January, 2023;
originally announced January 2023.
-
A Direct Construction of Optimal 2D-ZCACS with Flexible Array Size and Large Set Size
Authors:
Gobinda Ghosh,
Sudhan Majhi,
Shubhabrata Paul
Abstract:
In this paper, we propose a direct construction of optimal two-dimensional Z-complementary array code sets (2D-ZCACS) using multivariable functions (MVFs). In contrast to earlier works, the proposed construction allows for a flexible array size and a large set size. Additionally, the proposed design can be transformed into a one-dimensional Z-complementary code set (1D-ZCCS). Many of the 1D-ZCCS d…
▽ More
In this paper, we propose a direct construction of optimal two-dimensional Z-complementary array code sets (2D-ZCACS) using multivariable functions (MVFs). In contrast to earlier works, the proposed construction allows for a flexible array size and a large set size. Additionally, the proposed design can be transformed into a one-dimensional Z-complementary code set (1D-ZCCS). Many of the 1D-ZCCS described in the literature appeared to be special cases of this proposed construction. At last, we compare our work with the current state of the art and then draw our conclusions.
△ Less
Submitted 6 January, 2023;
originally announced January 2023.
-
A Direct and New Construction of Near-Optimal Multiple ZCZ Sequence Sets
Authors:
Nishant Kumar,
Sudhan Majhi,
Ashish K. Upadhyay
Abstract:
In this paper, for the first time, we present a direct and new construction of multiple zero-correlation zone (ZCZ) sequence sets with inter-set zero-cross correlation zone (ZCCZ) from generalised Boolean function. Tang \emph{et al.} in their 2010 paper, proposed an open problem to construct $N$ binary ZCZ sequence sets such that each of these ZCZ sequence sets is optimal and if the union of these…
▽ More
In this paper, for the first time, we present a direct and new construction of multiple zero-correlation zone (ZCZ) sequence sets with inter-set zero-cross correlation zone (ZCCZ) from generalised Boolean function. Tang \emph{et al.} in their 2010 paper, proposed an open problem to construct $N$ binary ZCZ sequence sets such that each of these ZCZ sequence sets is optimal and if the union of these $N$ sets is taken then that union is again an optimal ZCZ sequence set. The proposed construction partially settles this open problem by presenting a construction of optimal ZCZ sequence sets such that their union is a near-optimal ZCZ sequence set. Further, the performance parameter of each binary ZCZ sequence set in the proposed construction is $1$ and tends to $1$ for their union. The proposed construction is presented by a two-layer graphical representation and compared with the existing state-of-the-art. Finally, novel multi-cluster quasi synchronous-code division multiple access (QS-CDMA) system model is provided by using the proposed multiple ZCZ sequence sets.
△ Less
Submitted 6 February, 2023; v1 submitted 5 January, 2023;
originally announced January 2023.
-
Distance Measures for Geometric Graphs
Authors:
Sushovan Majhi,
Carola Wenk
Abstract:
A geometric graph is a combinatorial graph, endowed with a geometry that is inherited from its embedding in a Euclidean space. Formulation of a meaningful measure of (dis-)similarity in both the combinatorial and geometric structures of two such geometric graphs is a challenging problem in pattern recognition. We study two notions of distance measures for geometric graphs, called the geometric edi…
▽ More
A geometric graph is a combinatorial graph, endowed with a geometry that is inherited from its embedding in a Euclidean space. Formulation of a meaningful measure of (dis-)similarity in both the combinatorial and geometric structures of two such geometric graphs is a challenging problem in pattern recognition. We study two notions of distance measures for geometric graphs, called the geometric edit distance (GED) and geometric graph distance (GGD). While the former is based on the idea of editing one graph to transform it into the other graph, the latter is inspired by inexact matching of the graphs. For decades, both notions have been lending themselves well as measures of similarity between attributed graphs. If used without any modification, however, they fail to provide a meaningful distance measure for geometric graphs -- even cease to be a metric. We have curated their associated cost functions for the context of geometric graphs. Alongside studying the metric properties of GED and GGD, we investigate how the two notions compare. We further our understanding of the computational aspects of GGD by showing that the distance is $\mathcal{NP}$-hard to compute, even if the graphs are planar and arbitrary cost coefficients are allowed.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
On Rate-Splitting With Non-unique Decoding In Multi-cell Massive MIMO Systems
Authors:
Meysam Shahrbaf Motlagh,
Subhajit Majhi,
Patrick Mitran,
Hideki Ochiai
Abstract:
We consider the downlink of a multi-cell massive MIMO system suffering from asymptotic rate saturation due to pilot contamination. As opposed to treating pilot contamination interference as noise (TIN), we study the performance of decoding the pilot contamination interference. We model pilot-sharing users as an interference channel (IC) and study the performance of schemes that decode this interfe…
▽ More
We consider the downlink of a multi-cell massive MIMO system suffering from asymptotic rate saturation due to pilot contamination. As opposed to treating pilot contamination interference as noise (TIN), we study the performance of decoding the pilot contamination interference. We model pilot-sharing users as an interference channel (IC) and study the performance of schemes that decode this interference partially based on rate-splitting (RS), and compare the performance to schemes that decode the interference in its entirety based on simultaneous unique decoding (SD) or non-unique decoding (SND). For RS, we non-uniquely decode each layer of the pilot contamination interference and use one common power splitting coefficient per IC. Additionally, we establish an achievable region for this RS scheme. Solving a maximum symmetric rate allocation problem based on linear programming (LP), we show that for zero-forcing (ZF) with spatially correlated/uncorrelated channels and with a practical number of BS antennas, RS achieves significantly higher spectral efficiencies than TIN, SD and SND. Furthermore, we numerically examine the impact of increasing the correlation of the channel across antennas, the number of users as well as the degree of shadow fading. In all cases, we show that RS maintains significant gain over TIN, SD and SND.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
A Direct Construction of Complete Complementary Code with Zero Correlation Zone property for Prime-Power Length
Authors:
Nishant Kumar,
Sudhan Majhi,
A. K. Upadhyay
Abstract:
In this paper, we propose a direct construction of a novel type of code set, which has combined properties of complete complementary code (CCC) and zero-correlation zone (ZCZ) sequences and called it complete complementary-ZCZ (CC-ZCZ) code set. The code set is constructed by using multivariable functions. The proposed construction also provides Golay-ZCZ codes with new lengths, i.e., prime-power…
▽ More
In this paper, we propose a direct construction of a novel type of code set, which has combined properties of complete complementary code (CCC) and zero-correlation zone (ZCZ) sequences and called it complete complementary-ZCZ (CC-ZCZ) code set. The code set is constructed by using multivariable functions. The proposed construction also provides Golay-ZCZ codes with new lengths, i.e., prime-power lengths. The proposed Golay-ZCZ codes are optimal and asymptotically optimal for binary and non-binary cases, respectively, by \emph{Tang-Fan-Matsufuzi} bound. Furthermore, the proposed direct construction provides novel ZCZ sequences of length $p^k$, where $k$ is an integer $\geq 2$. We establish a relationship between the proposed CC-ZCZ code set and the first-order generalized Reed-Muller (GRM) code, and proved that both have the same Hamming distance. We also counted the number of CC-ZCZ code set in first-order GRM codes. The column sequence peak-to-mean envelope power ratio (PMEPR) of the proposed CC-ZCZ construction is derived and compared with existing works. The proposed construction is also deduced to Golay-ZCZ and ZCZ sequences which are compared to the existing work. The proposed construction generalizes many of the existing work.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
A Direct Construction of Cross Z-Complementary Sets with Flexible Lengths and Large Zero Correlation Zone
Authors:
Praveen Kumar,
Sudhan Majhi,
Subhabrata Paul
Abstract:
This letter proposes a direct construction for cross Z-complementary sets (CZCSs) with flexible lengths and a large zero correlation zone (ZCZ). CZCS is an extension of the cross Z-complementary pair (CZCP). The maximum possible ZCZ width of a CZCP is half of its sequence length. In this letter, for the first time, a generalized Boolean function based construction of CZCSs with a large number of c…
▽ More
This letter proposes a direct construction for cross Z-complementary sets (CZCSs) with flexible lengths and a large zero correlation zone (ZCZ). CZCS is an extension of the cross Z-complementary pair (CZCP). The maximum possible ZCZ width of a CZCP is half of its sequence length. In this letter, for the first time, a generalized Boolean function based construction of CZCSs with a large number of constituent sequences and a ZCZ ratio of $2/3$ is presented. For integers $m$ and $δ$, the proposed construction produces CZCS with length expressed as $2^{m-1}+2^δ$ ($0 \leq δ<m-1,m\geq 4$), where both odd and even lengths CZCS can be obtained. Additionally, the constructed CZCS also feature a complementary set of the same length. Finally, the proposed construction is compared with the existing works.
△ Less
Submitted 24 July, 2022;
originally announced July 2022.
-
A Construction of Type-II ZCCS for the MC-CDMA System with Low PMEPR
Authors:
Rajen Kumar,
Sushant Kumar Jha,
Prashant Kumar Srivastava,
Sudhan Majhi
Abstract:
In this letter, we propose a novel construction of type-II $Z$-complementary code set (ZCCS) having arbitrary sequence length using the Kronecker product between a complete complementary code (CCC) and mutually orthogonal uni-modular sequences. In this construction, Barker sequences are used to reduce row sequence peak-to-mean envelope power ratio (PMEPR) for some specific lengths sequence and col…
▽ More
In this letter, we propose a novel construction of type-II $Z$-complementary code set (ZCCS) having arbitrary sequence length using the Kronecker product between a complete complementary code (CCC) and mutually orthogonal uni-modular sequences. In this construction, Barker sequences are used to reduce row sequence peak-to-mean envelope power ratio (PMEPR) for some specific lengths sequence and column sequence PMEPR for some specific sizes of codes. The column sequence PMEPR of the proposed type-II ZCCS is upper bounded by a number smaller than $2$. The proposed construction also contributes new lengths of type-II $Z$-complementary pair (ZCP) and type-II $Z$-complementary set (ZCS). Furthermore, the PMEPR of these new type-II ZCPs is also lower than existing type-II ZCPs.
△ Less
Submitted 22 August, 2023; v1 submitted 6 July, 2022;
originally announced July 2022.
-
A Direct Construction of Cross Z-Complementary Sequence Sets with Large Set Size
Authors:
Praveen Kumar,
Sudhan Majhi,
Subhabrata Paul
Abstract:
This letter presents a direct construction of cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The propos…
▽ More
This letter presents a direct construction of cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The proposed generalized Boolean function based construction can generate CZCSS of length in the form of non-power-of-two with variable set size $2^{n+1}$, where each code has $2^{n+1}$ constituent sequences. The proposed construction also yields cross Z-complementary pairs and cross Z-complementary sets with a large number of constituent sequences compared to the existing work.
△ Less
Submitted 6 July, 2022;
originally announced July 2022.
-
New Correlation Bound and Construction of Quasi-Complementary Code Sets
Authors:
Palash Sarkar,
Chunlei Li,
Sudhan Majhi,
Zilong Liu
Abstract:
Quasi-complementary sequence sets (QCSSs) have attracted sustained research interests for simultaneously supporting more active users in multi-carrier code-division multiple-access (MC-CDMA) systems compared to complete complementary codes (CCCs). In this paper, we investigate a novel class of QCSSs composed of multiple CCCs. We derive a new aperiodic correlation lower bound for this type of QCSSs…
▽ More
Quasi-complementary sequence sets (QCSSs) have attracted sustained research interests for simultaneously supporting more active users in multi-carrier code-division multiple-access (MC-CDMA) systems compared to complete complementary codes (CCCs). In this paper, we investigate a novel class of QCSSs composed of multiple CCCs. We derive a new aperiodic correlation lower bound for this type of QCSSs, which is tighter than the existing bounds for QCSSs. We then present a systematic construction of such QCSSs with a small alphabet size and low maximum correlation magnitude, and also show that the constructed aperiodic QCSSs can meet the newly derived bound asymptotically.
△ Less
Submitted 11 January, 2024; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Dynamics on higher-order networks: A review
Authors:
Soumen Majhi,
Matjaz Perc,
Dibakar Ghosh
Abstract:
Network science has evolved into an indispensable platform for studying complex systems. But recent research has identified limits of classical networks, where links connect pairs of nodes, to comprehensively describe group interactions. Higher-order networks, where a link can connect more than two nodes, have therefore emerged as a new frontier in network science. Since group interactions are com…
▽ More
Network science has evolved into an indispensable platform for studying complex systems. But recent research has identified limits of classical networks, where links connect pairs of nodes, to comprehensively describe group interactions. Higher-order networks, where a link can connect more than two nodes, have therefore emerged as a new frontier in network science. Since group interactions are common in social, biological, and technological systems, higher-order networks have recently led to important new discoveries across many fields of research. We here review these works, focusing in particular on the novel aspects of the dynamics that emerges on higher-order networks. We cover a variety of dynamical processes that have thus far been studied, including different synchronization phenomena, contagion processes, the evolution of cooperation, and consensus formation. We also outline open challenges and promising directions for future research.
△ Less
Submitted 13 March, 2022;
originally announced March 2022.
-
Q-Learning Based Energy-Efficient Network Planning in IP-over-EON
Authors:
Pramit Biswas,
Md Shahbaz Akhtar,
Aneek Adhya,
Sriparna Saha,
Sudhan Majhi
Abstract:
During network planning phase, optimal network planning implemented through efficient resource allocation and static traffic demand provisioning in IP-over-elastic optical network (IP-over-EON) is significantly challenging compared with the fixed-grid wavelength division multiplexing (WDM) network due to increased flexibility in IP-over-EON. Mathematical optimization models used for this purpose m…
▽ More
During network planning phase, optimal network planning implemented through efficient resource allocation and static traffic demand provisioning in IP-over-elastic optical network (IP-over-EON) is significantly challenging compared with the fixed-grid wavelength division multiplexing (WDM) network due to increased flexibility in IP-over-EON. Mathematical optimization models used for this purpose may not provide solution for large networks due to large computational complexity. In this regard, a greedy heuristic may be used that intuitively selects traffic elements in sequence from static traffic demand matrix and attempts to find the best solution. However, in general, such greedy heuristics offer suboptimal solutions, since appropriate traffic sequence offering the optimal performance is rarely selected. In this regard, we propose a reinforcement learning technique (in particular a Q-learning method), combined with an auxiliary graph (AG)-based energy efficient greedy method to be used for large network planning. The Q-learning method is used to decide the suitable sequence of traffic allocation such that the overall power consumption in the network reduces. In the proposed heuristic, each traffic from the given static traffic demand matrix is successively selected using the Q-learning technique and provisioned using the AG-based greedy method.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Construction of Spectrally-Null-Constrained Zero-Correlation Zone Sequences with Flexible Support
Authors:
Nishant Kumar,
Palash Sarkar,
Sudhan Majhi
Abstract:
In recent years, traditional zero-correlation zone (ZCZ) sequences are being studied due to support interference-free quasi-synchronous code division multiple access (QS-CDMA) systems. However, in cognitive radio (CR) network, it is desirable to design ZCZ sequences having spectral null constraint (SNC) property to achieve low spectral density profile. This paper focuses on the construction of SNC…
▽ More
In recent years, traditional zero-correlation zone (ZCZ) sequences are being studied due to support interference-free quasi-synchronous code division multiple access (QS-CDMA) systems. However, in cognitive radio (CR) network, it is desirable to design ZCZ sequences having spectral null constraint (SNC) property to achieve low spectral density profile. This paper focuses on the construction of SNC-ZCZ sequences having flexible support, where support refers to a collection of indices corresponding to non-zero entries in the sequence. The proposed SNC-ZCZ sequences reduce to traditional ZCZ sequences when the size of the support becomes equal to the length of the sequence. To obtain ZCZ sequences, we first propose construction of traditional/SNC-Complete complementary codes (SNC-CCCs) using a class of extended Boolean functions (EBFs). With the help of this class we propose another class of EBFs that generates asymptotically optimal traditional/SNC-ZCZ sequences of prime-power lengths with respect to Tang-Fan-Matsufuzi bound. Furthermore, a relation between the second-order cosets of first-order generalized Reed-Muller code and the proposed traditional ZCZ sequences is also established.
△ Less
Submitted 5 September, 2023; v1 submitted 12 November, 2021;
originally announced November 2021.
-
On Downlink Interference Decoding In Multi-Cell Massive MIMO Systems
Authors:
Meysam Shahrbaf Motlagh,
Subhajit Majhi,
Patrick Mitran,
Hideki Ochiai
Abstract:
In this paper, the downlink of a multi-cell massive MIMO system is considered where the channel state information (CSI) is estimated via pilot symbols that are orthogonal in a cell but re-used in other cells. Re-using the pilots, however, contaminates the CSI estimate at each base station (BS) by the channel of the users sharing the same pilot in other cells. The resulting inter-cell interference…
▽ More
In this paper, the downlink of a multi-cell massive MIMO system is considered where the channel state information (CSI) is estimated via pilot symbols that are orthogonal in a cell but re-used in other cells. Re-using the pilots, however, contaminates the CSI estimate at each base station (BS) by the channel of the users sharing the same pilot in other cells. The resulting inter-cell interference does not vanish even when the number of BS antennas $M$ is large, i.e., $M\rightarrow\infty$, and thus the rates achieved by treating interference as noise (TIN) saturate even if $M\rightarrow\infty$. In this paper, interference aware decoding schemes based on simultaneous unique decoding (SD) and simultaneous non-unique decoding (SND) of the full interference or a part of the interference (PD) are studied with two different linear precoding techniques: maximum ratio transmission (MRT) and zero forcing (ZF). The resulting rates are shown to grow unbounded as $M\rightarrow\infty$. In addition, the rates achievable via SD/SND/PD for finite $M$ are derived using a worst-case uncorrelated noise technique, which are shown to scale as $\mathcal{O}(\log M)$. To compare the performance of different schemes, the maximum symmetric rate problem is studied, where it is confirmed that with large, yet practical, values of $M$, SND strictly outperforms TIN, and also that PD strictly outperforms SND.
△ Less
Submitted 19 December, 2021; v1 submitted 13 October, 2021;
originally announced October 2021.
-
A Direct Construction of GCP and Binary CCC of Length Non Power of Two
Authors:
Praveen Kumar,
Sudhan Majhi,
Subhabrata Paul
Abstract:
Golay complementary pairs (GCPs) and complete complementary codes (CCCs) have found a wide range of practical applications in coding, signal processing and wireless communication due to their ideal correlation properties. In fact, binary CCCs have special advantages in spread spectrum communication due to their simple modulo-2 arithmetic operation, modulation and correlation simplicity, but they a…
▽ More
Golay complementary pairs (GCPs) and complete complementary codes (CCCs) have found a wide range of practical applications in coding, signal processing and wireless communication due to their ideal correlation properties. In fact, binary CCCs have special advantages in spread spectrum communication due to their simple modulo-2 arithmetic operation, modulation and correlation simplicity, but they are limited in length. In this paper, we present a direct construction of GCPs, mutually orthogonal complementary sets (MOCSs) and binary CCCs of non-power of two lengths to widen their application in the recent field. First, a generalised Boolean function (GBF) based truncation technique has been used to construct GCPs of non-power of two lengths. Then Complementary sets (CSs) and MOCSs of lengths of the form $2^{m-1}+2^{m-3}$ ($m \geq 5$) and $2^{m-1}+2^{m-2}+2^{m-4}$ ($m \geq 6$) are generated by GBFs. Finally, binary CCCs with desired lengths are constructed using the union of MOCSs. The row and column sequence peak to mean envelope power ratio (PMEPR) has been investigated and compared with existing work. The column sequence PMEPR of resultant CCCs can be effectively upper bounded by $2$.
△ Less
Submitted 7 April, 2022; v1 submitted 17 September, 2021;
originally announced September 2021.
-
A Construction of 2-D Z-Complementary Array Code Sets with Flexible Even Row Lengths and Applications in Massive MIMO
Authors:
Abhishek Roy,
Sudhan Majhi
Abstract:
The need for two-dimensional (2-D) arrays with good 2-D correlation properties and flexible parameters has been of great interest due to their application in the field of wireless communications such as massive multiple input multiple output (MIMO), phased array antenna, multi-carrier code division multiple access (MC-CDMA), 2D-MC-CDMA, etc. In this paper, we propose a direct construction of a 2-D…
▽ More
The need for two-dimensional (2-D) arrays with good 2-D correlation properties and flexible parameters has been of great interest due to their application in the field of wireless communications such as massive multiple input multiple output (MIMO), phased array antenna, multi-carrier code division multiple access (MC-CDMA), 2D-MC-CDMA, etc. In this paper, we propose a direct construction of a 2-D Z-complementary array code set (ZCACS) with flexible parameters. For this purpose, we first propose a construction of inter-group complementary (IGC) code sets using multivariable function and by using this construction 2-D Z-complementary array code (ZCAC) and 2-D ZCAC set (ZCACS) are provided. In some special case, the proposed 2-D ZCAC reduces to a 2-D Z-complementary array pair (ZCAP), which is not reported till date. The peak-to-mean envelope power ratio (PMEPR) of row and column sequences of 2-D ZCAC is shown to be better than the existing ones for use in MC-CDMA. 2-D Golay complementary array set (GCAS) and Golay complementary set (GCS) are derived from the proposed construction, which can be applied in omnidirectional precoding (OP) based transmission through massive MIMO. The proposed construction can support a more flexible number of antennas for a uniform rectangular array (URA) to transmit space-time block coded (STBC) data, than the existing constructions. The bit-error-rate (BER) simulation result also shows the performance benefits of derived 2-D GCAS and GCS compared to the existing ones.
△ Less
Submitted 26 March, 2024; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Weakly-supervised Joint Anomaly Detection and Classification
Authors:
Snehashis Majhi,
Srijan Das,
Francois Bremond,
Ratnakar Dash,
Pankaj Kumar Sa
Abstract:
Anomaly activities such as robbery, explosion, accidents, etc. need immediate actions for preventing loss of human life and property in real world surveillance systems. Although the recent automation in surveillance systems are capable of detecting the anomalies, but they still need human efforts for categorizing the anomalies and taking necessary preventive actions. This is due to the lack of met…
▽ More
Anomaly activities such as robbery, explosion, accidents, etc. need immediate actions for preventing loss of human life and property in real world surveillance systems. Although the recent automation in surveillance systems are capable of detecting the anomalies, but they still need human efforts for categorizing the anomalies and taking necessary preventive actions. This is due to the lack of methodology performing both anomaly detection and classification for real world scenarios. Thinking of a fully automatized surveillance system, which is capable of both detecting and classifying the anomalies that need immediate actions, a joint anomaly detection and classification method is a pressing need. The task of joint detection and classification of anomalies becomes challenging due to the unavailability of dense annotated videos pertaining to anomalous classes, which is a crucial factor for training modern deep architecture. Furthermore, doing it through manual human effort seems impossible. Thus, we propose a method that jointly handles the anomaly detection and classification in a single framework by adopting a weakly-supervised learning paradigm. In weakly-supervised learning instead of dense temporal annotations, only video-level labels are sufficient for learning. The proposed model is validated on a large-scale publicly available UCF-Crime dataset, achieving state-of-the-art results.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Direct Construction of Optimal Z-Complementary Code Sets for all Possible Even Length by Using Pseudo-Boolean Functions
Authors:
Gobinda Ghosh,
Sudhan Majhi,
Palash Sarkar,
Ashish Kumar Upadhyay
Abstract:
Z-complementary code set (ZCCS) are well known to be used in multicarrier code-division multiple access (MCCDMA) system to provide a interference free environment. Based on the existing literature, the direct construction of optimal ZCCSs are limited to its length. In this paper, we are interested in constructing optimal ZCCSs of all possible even lengths using Pseudo-Boolean functions. The maximu…
▽ More
Z-complementary code set (ZCCS) are well known to be used in multicarrier code-division multiple access (MCCDMA) system to provide a interference free environment. Based on the existing literature, the direct construction of optimal ZCCSs are limited to its length. In this paper, we are interested in constructing optimal ZCCSs of all possible even lengths using Pseudo-Boolean functions. The maximum column sequence peakto-man envelop power ratio (PMEPR) of the proposed ZCCSs is upper-bounded by two, which may give an extra benefit in managing PMEPR in an ZCCS based MC-CDMA system, as well as the ability to handle a large number of users.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
Pseudo-Boolean Functions for Optimal Z-Complementary Code Sets with Flexible Lengths
Authors:
Palash Sarkar,
Sudhan Majhi,
Zilong Liu
Abstract:
This paper aims to construct optimal Z-complementary code set (ZCCS) with non-power-of-two (NPT) lengths to enable interference-free multicarrier code-division multiple access (MC-CDMA) systems. The existing ZCCSs with NPT lengths, which are constructed from generalized Boolean functions (GBFs), are sub-optimal only with respect to the set size upper bound. For the first time in the literature, we…
▽ More
This paper aims to construct optimal Z-complementary code set (ZCCS) with non-power-of-two (NPT) lengths to enable interference-free multicarrier code-division multiple access (MC-CDMA) systems. The existing ZCCSs with NPT lengths, which are constructed from generalized Boolean functions (GBFs), are sub-optimal only with respect to the set size upper bound. For the first time in the literature, we advocate the use of pseudo-Boolean functions (PBFs) (each of which transforms a number of binary variables to a real number as a natural generalization of GBF) for direct constructions of optimal ZCCSs with NPT lengths.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
Construction of Complete Complementary Codes over Small Alphabet
Authors:
Palash Sarkar,
Chunlei Li,
Sudhan Majhi,
Zilong Liu
Abstract:
Complete complementary codes (CCCs) play a vital role not only in wireless communication, particularly in multicarrier systems where achieving an interference-free environment is of paramount importance, but also in the construction of other codes that necessitate appropriate functions to meet the diverse demands within today's landscape of wireless communication evaluation. This research is focus…
▽ More
Complete complementary codes (CCCs) play a vital role not only in wireless communication, particularly in multicarrier systems where achieving an interference-free environment is of paramount importance, but also in the construction of other codes that necessitate appropriate functions to meet the diverse demands within today's landscape of wireless communication evaluation. This research is focused on the area of constructing $q$-ary functions for both of {traditional and spectrally null constraint (SNC) CCCs}\footnote{When no codes in CCCs having zero components, we call it as traditonal CCCs, else, we call it as SNC-CCCs in this pape.} of flexible length, set size and alphabet. We construct traditional CCCs with lengths, defined as $L = \prod_{i=1}^k p_i^{m_i}$, set sizes, defined as $K = \prod_{i=1}^k p_i^{n_i+1}$, and an alphabet size of $q=\prod_{i=1}^k p_i$, such that $p_1<p_2<\cdots<p_k $. The parameters $m_1, m_2, \ldots, m_k$ (each greater than or equal to $2$) are positive integers, while $n_1, n_2, \ldots, n_k$ are non-negative integers satisfying $n_i \leq m_i-1$, and the variable $k$ represents a positive integer. To achieve these specific parameters, we define $q$-ary functions over a domain $\mathbf{Z}_{p_1}^{m_1}\times \cdots \times \mathbf{Z}_{p_k}^{m_k}$ that is considered a proper subset of $\mathbb{Z}_{q}^m$ and encompasses $\prod_{i=1}^k p_i^{m_i}$ vectors, where $\mathbf{Z}_{p_i}^{m_i}=\{0,1,\hdots,p_i-1\}^{m_i}$, and the value of $m$ is derived from the sum of $m_1, m_2, \ldots, m_k$. This organization of the domain allows us to encompass all conceivable integer-valued length sequences over the alphabet $\mathbb{Z}_q$. It has been demonstrated that by constraining a $q$-ary function that generates traditional CCCs, we can derive SNC-CCCs with identical length and alphabet, yet a smaller or equal set size compared to the traditional CCCs.
△ Less
Submitted 21 March, 2024; v1 submitted 21 February, 2021;
originally announced February 2021.
-
Consensus of Multi-Agent Systems Using Back-Tracking and History Following Algorithms
Authors:
Yanumula V. Karteek,
Indrani Kar,
Somanath Majhi
Abstract:
This paper proposes two algorithms, namely "back-tracking" and "history following", to reach consensus in case of communication loss for a network of distributed agents with switching topologies. To reach consensus in distributed control, considered communication topology forms a strongly connected graph. The graph is no more strongly connected whenever an agent loses communication.Whenever an age…
▽ More
This paper proposes two algorithms, namely "back-tracking" and "history following", to reach consensus in case of communication loss for a network of distributed agents with switching topologies. To reach consensus in distributed control, considered communication topology forms a strongly connected graph. The graph is no more strongly connected whenever an agent loses communication.Whenever an agent loses communication, the topology is no more strongly connected. The proposed back-tracking algorithm makes sure that the agent backtracks its position unless the communication is reestablished, and path is changed to reach consensus. In history following, the agents use their memory and move towards previous consensus point until the communication is regained. Upon regaining communication, a new consensus point is calculated depending on the current positions of the agents and they change their trajectories accordingly. Simulation results, for a network of six agents, show that when the agents follow the previous history, the average consensus time is less than that of back-tracking. However, situation may arise in history following where a false notion of reaching consensus makes one of the agents stop at a point near to the actual consensus point. An obstacle avoidance algorithm is integrated with the proposed algorithms to avoid collisions. Hardware implementation for a three robots system shows the effectiveness of the algorithms.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Approximating Gromov-Hausdorff Distance in Euclidean Space
Authors:
Sushovan Majhi,
Jeffrey Vitter,
Carola Wenk
Abstract:
The Gromov-Hausdorff distance $(d_{GH})$ proves to be a useful distance measure between shapes. In order to approximate $d_{GH}$ for compact subsets $X,Y\subset\mathbb{R}^d$, we look into its relationship with $d_{H,iso}$, the infimum Hausdorff distance under Euclidean isometries. As already known for dimension $d\geq 2$, the $d_{H,iso}$ cannot be bounded above by a constant factor times $d_{GH}$.…
▽ More
The Gromov-Hausdorff distance $(d_{GH})$ proves to be a useful distance measure between shapes. In order to approximate $d_{GH}$ for compact subsets $X,Y\subset\mathbb{R}^d$, we look into its relationship with $d_{H,iso}$, the infimum Hausdorff distance under Euclidean isometries. As already known for dimension $d\geq 2$, the $d_{H,iso}$ cannot be bounded above by a constant factor times $d_{GH}$. For $d=1$, however, we prove that $d_{H,iso}\leq\frac{5}{4}d_{GH}$. We also show that the bound is tight. In effect, this gives rise to an $O(n\log{n})$-time algorithm to approximate $d_{GH}$ with an approximation factor of $\left(1+\frac{1}{4}\right)$.
△ Less
Submitted 7 June, 2022; v1 submitted 30 December, 2019;
originally announced December 2019.
-
Topological and Geometric Reconstruction of Metric Graphs in $\mathbb{R}^n$
Authors:
Brittany Terese Fasy,
Rafal Komendarczyk,
Sushovan Majhi,
Carola Wenk
Abstract:
We propose an algorithm to estimate the topology of an embedded metric graph from a well-sampled finite subset of the underlying graph.
We propose an algorithm to estimate the topology of an embedded metric graph from a well-sampled finite subset of the underlying graph.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Threshold-Based Graph Reconstruction Using Discrete Morse Theory
Authors:
Brittany Terese Fasy,
Sushovan Majhi,
Carola Wenk
Abstract:
Discrete Morse theory has recently been applied in metric graph reconstruction from a given density function concentrated around an (unknown) underlying embedded graph. We propose a new noise model for the density function to reconstruct a connected graph both topologically and geometrically.
Discrete Morse theory has recently been applied in metric graph reconstruction from a given density function concentrated around an (unknown) underlying embedded graph. We propose a new noise model for the density function to reconstruct a connected graph both topologically and geometrically.
△ Less
Submitted 28 November, 2019;
originally announced November 2019.
-
Performance of Multi-Cell Massive MIMO Systems With Interference Decoding
Authors:
Meysam Shahrbaf Motlagh,
Subhajit Majhi,
Patrick Mitran
Abstract:
We consider a multi-cell massive MIMO system where a time-division duplex protocol is used to estimate the channel state information via uplink pilots. When maximum ratio combining (MRC) is used at the BSs, the re-use of pilots across cells causes the pilot contamination effect which yields interference components that do not vanish as the number of base-station (BS) antennas…
▽ More
We consider a multi-cell massive MIMO system where a time-division duplex protocol is used to estimate the channel state information via uplink pilots. When maximum ratio combining (MRC) is used at the BSs, the re-use of pilots across cells causes the pilot contamination effect which yields interference components that do not vanish as the number of base-station (BS) antennas $M \rightarrow \infty$. When treating interference as noise (TIN), this phenomenon limits the performance of multi-cell massive MIMO systems. In this paper, we analyze more advanced schemes based on simultaneous unique decoding (SD) as well as simultaneous non-unique decoding (SND) of the interference that can provide unbounded rate as $M \rightarrow \infty$. We also establish a worst-case uncorrelated noise technique for multiple-access channels to derive achievable rate expressions for finite $M$. Furthermore, we study a much simpler subset of SND (called S-SND) which provides a lower bound to SND and achieves unbounded rate as $M \rightarrow \infty$, and also outperforms SD for finite $M$. For the special cases of two-cell and three-cell systems, using a maximum symmetric rate allocation policy we compare the performance of different interference decoding schemes with that of TIN. Finally, we numerically illustrate the improved performance of the proposed schemes.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Optimal Z-complementary Code Set From Generalized Reed-Muller Codes
Authors:
Palash Sarkar,
Sudhan Majhi,
Zilong Liu
Abstract:
Z-complementary code set (ZCCS), an extension of perfect complementary codes (CCs), refers to a set of two-dimensional matrices having zero correlation zone properties. ZCCS can be used in various multi-channel systems to support, for example, quasi-synchronous interference-free multicarrier code-division multiple access communication and optimal channel estimation in multiple-input multiple-outpu…
▽ More
Z-complementary code set (ZCCS), an extension of perfect complementary codes (CCs), refers to a set of two-dimensional matrices having zero correlation zone properties. ZCCS can be used in various multi-channel systems to support, for example, quasi-synchronous interference-free multicarrier code-division multiple access communication and optimal channel estimation in multiple-input multiple-output systems. Traditional constructions of ZCCS heavily rely on a series of sequence operations which may not be feasible for rapid hardware generation particularly for long ZCCSs. In this paper, we propose a direct construction of ZCCS using second-order Reed-Muller codes with efficient graphical representation. Our proposed construction, valid for any number of isolated vertices present in the graph, is capable of generating optimal ZCCS meeting the set size upper bound.
△ Less
Submitted 8 November, 2019;
originally announced November 2019.
-
New Sets of Optimal Odd-length Binary Z-Complementary Pairs
Authors:
Avik Ranjan Adhikary,
Sudhan Majhi,
Zilong Liu,
Yong Liang Guan
Abstract:
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums (AACSs) for time-shifts within a certain region, called zero correlation zone (ZCZ). Optimal odd-length binary ZCPs (OB-ZCPs) display closest correlation properties to Golay complementary pairs (GCPs) in that each OB-ZCP achieves maximum ZCZ of width (N+1)/2 (where N is the sequence length) and…
▽ More
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums (AACSs) for time-shifts within a certain region, called zero correlation zone (ZCZ). Optimal odd-length binary ZCPs (OB-ZCPs) display closest correlation properties to Golay complementary pairs (GCPs) in that each OB-ZCP achieves maximum ZCZ of width (N+1)/2 (where N is the sequence length) and every out-of-zone AACSs reaches the minimum magnitude value, i.e. 2. Till date, systematic constructions of optimal OB-ZCPs exist only for lengths $2^α \pm 1$, where $α$ is a positive integer. In this paper, we construct optimal OB-ZCPs of generic lengths $2^α10^β26^γ+1$ (where $α,~ β, ~ γ$ are non-negative integers and $α\geq 1$) from inserted versions of binary GCPs. The key leading to the proposed constructions is several newly identified structure properties of binary GCPs obtained from Turyn's method. This key also allows us to construct OB-ZCPs with possible ZCZ widths of $4 \times 10^{β-1} +1$, $12 \times 26^{γ-1}+1$ and $12 \times 10^β26^{γ-1}+1$ through proper insertions of GCPs of lengths $10^β,~ 26^γ, \text{and } 10^β26^γ$, respectively. Our proposed OB-ZCPs have applications in communications and radar (as an alternative to GCPs).
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
A Direct Construction of Optimal ZCCS With Maximum Column Sequence PMEPR Two for MC-CDMA System
Authors:
Palash Sarkar,
Sudhan Majhi
Abstract:
Multicarrier code-division multiple-access (MC-CDMA) combines an orthogonal frequency division multiplexing (OFDM) modulation and a code-division multiple-access (CDMA) scheme to exploits the benefits of both the technologies. The high peak-to-mean envelope power ratio (PMEPR) is a considerable problem in MC-CDMA system. However, the problem can be addressed by utilizing complete complementary cod…
▽ More
Multicarrier code-division multiple-access (MC-CDMA) combines an orthogonal frequency division multiplexing (OFDM) modulation and a code-division multiple-access (CDMA) scheme to exploits the benefits of both the technologies. The high peak-to-mean envelope power ratio (PMEPR) is a considerable problem in MC-CDMA system. However, the problem can be addressed by utilizing complete complementary codes (CCCs) in MC-CDMA system. But the set size upper bound of CCC does not allow the system to support large number of users for a given number of subcarriers in the system. In a CCC and Z-complementary code set (ZCCS) based asynchronous MC-CDMA system, the PMEPR is determined by column sequence PMEPR of the codes. In order to support a large number of users with low column sequence PMEPR, in this paper, we have proposed a new optimal ZCCS with larger set size. The code is constructed using Boolean function approach, i.e., by a direct construction method. The number of constituent sequences in ZCCS is the same as the number of subcarriers in MC-CDMA. So, large size ZCCS for large number of users in MC-CDMA can be constructed through a rapid hardware generation. The proposed ZCCS has maximum column sequence PMEPR of 2 and it achieves the theoretical upper bound of optimality. Our proposed construction can also generate inter-group complementary (IGC) code set for MC-CDMA with the same PMEPR. This work also establishes a link from ZCCS and IGC code set to higher-order ($\geq 2$) Reed-Muller (RM) code.
△ Less
Submitted 19 September, 2019; v1 submitted 2 July, 2019;
originally announced July 2019.
-
New Optimal $Z$-Complementary Code Sets from Matrices of Polynomials
Authors:
Shibsankar Das,
Udaya Parampalli,
Sudhan Majhi,
Zilong Liu
Abstract:
The concept of paraunitary (PU) matrices arose in the early 1990s in the study of multi-rate filter banks. So far, these matrices have found wide applications in cryptography, digital signal processing, and wireless communications. Existing PU matrices are subject to certain constraints on their existence and hence their availability is not guaranteed in practice. Motivated by this, for the first…
▽ More
The concept of paraunitary (PU) matrices arose in the early 1990s in the study of multi-rate filter banks. So far, these matrices have found wide applications in cryptography, digital signal processing, and wireless communications. Existing PU matrices are subject to certain constraints on their existence and hence their availability is not guaranteed in practice. Motivated by this, for the first time, we introduce a novel concept, called $Z$-paraunitary (ZPU) matrix, whose orthogonality is defined over a matrix of polynomials with identical degree not necessarily taking the maximum value. We show that there exists an equivalence between a ZPU matrix and a $Z$-complementary code set when the latter is expressed as a matrix with polynomial entries. Furthermore, we investigate some important properties of ZPU matrices, which are useful for the extension of matrix sizes and sequence lengths. Finally, we propose a unifying construction framework for optimal ZPU matrices which includes existing PU matrices as a special case.
△ Less
Submitted 22 June, 2019;
originally announced June 2019.
-
Dual-Band Fading Multiple Access Relay Channels
Authors:
Subhajit Majhi,
Patrick Mitran
Abstract:
Relay cooperation and integrated microwave and millimeter-wave (mm-wave) dual-band communication are likely to play key roles in 5G. In this paper, we study a two-user uplink scenario in such dual-bands, modeled as a multiple-access relay channel (MARC), where two sources communicate to a destination assisted by a relay. However, unlike the microwave band, transmitters in the mm-wave band must emp…
▽ More
Relay cooperation and integrated microwave and millimeter-wave (mm-wave) dual-band communication are likely to play key roles in 5G. In this paper, we study a two-user uplink scenario in such dual-bands, modeled as a multiple-access relay channel (MARC), where two sources communicate to a destination assisted by a relay. However, unlike the microwave band, transmitters in the mm-wave band must employ highly directional antenna arrays to combat the ill effects of severe path-loss and small wavelength. The resulting mm-wave links are point-to-point and highly directional, and are thus used to complement the microwave band by transmitting to a specific receiver. For such MARCs, the capacity is partially characterized for sources that are near the relay in a joint sense over both bands. We then study the impact of the mm-wave spectrum on the performance of such MARCs by characterizing the transmit power allocation scheme for phase faded mm-wave links that maximizes the sum-rate under a total power budget. The resulting scheme adapts the link transmission powers to channel conditions by transmitting in different modes, and all such modes and corresponding conditions are characterized. Finally, we study the properties of the optimal link powers and derive practical insights.
△ Less
Submitted 11 June, 2019;
originally announced June 2019.
-
A Direct and Generalized Construction of Polyphase Complementary Set with Low PMEPR and High Code-Rate for OFDM System
Authors:
Palash Sarkar,
Sudhan Majhi,
Zilong Liu
Abstract:
A major drawback of orthogonal frequency division multiplexing (OFDM) systems is their high peak-to-mean envelope power ratio (PMEPR). The PMEPR problem can be solved by adopting large codebooks consisting of complementary sequences with low PMEPR. In this paper, we present a new construction of polyphase complementary sets (CSs) using generalized Boolean functions (GBFs), which generalizes Schmid…
▽ More
A major drawback of orthogonal frequency division multiplexing (OFDM) systems is their high peak-to-mean envelope power ratio (PMEPR). The PMEPR problem can be solved by adopting large codebooks consisting of complementary sequences with low PMEPR. In this paper, we present a new construction of polyphase complementary sets (CSs) using generalized Boolean functions (GBFs), which generalizes Schmidt's construction in 2007, Paterson's construction in 2000 and Golay complementary pairs (GCPs) given by Davis and Jedwab in 1999. Compared with Schmidt's approach, our proposed CSs lead to lower PMEPR with higher code-rate for sequences constructed from higher-order ($\geq 3$) GBFs. We obtain polyphase complementary sequences with maximum PMEPR of $2^{k+1}$ and $2^{k+2}-2M$ where $k,M$ are non-negative integers that can be easily derived from the GBF associated with the CS.
△ Less
Submitted 23 June, 2020; v1 submitted 16 January, 2019;
originally announced January 2019.
-
Consensus of second order multi-agents with actuator saturation and asynchronous time-delays
Authors:
Venkata Karteek Yanumula,
Indrani Kar,
Somanath Majhi
Abstract:
This article presents the consensus of a saturated second order multi-agent system with non-switching dynamics that can be represented by a directed graph. The system is affected by data processing (input delay) and communication time-delays that are assumed to be asynchronous. The agents have saturation nonlinearities, each of them is approximated into separate linear and nonlinear elements. Nonl…
▽ More
This article presents the consensus of a saturated second order multi-agent system with non-switching dynamics that can be represented by a directed graph. The system is affected by data processing (input delay) and communication time-delays that are assumed to be asynchronous. The agents have saturation nonlinearities, each of them is approximated into separate linear and nonlinear elements. Nonlinear elements are represented by describing functions. Describing functions and stability of linear elements are used to estimate the existence of limit cycles in the system with multiple control laws. Stability analysis of the linear element is performed using Lyapunov-Krasovskii functions and frequency domain analysis. A comparison of pros and cons of both the analyses with respect to time-delay ranges, applicability and computation complexity is presented. Simulation and corresponding hardware implementation results are demonstrated to support theoretical results.
△ Less
Submitted 23 November, 2017; v1 submitted 4 September, 2017;
originally announced September 2017.