-
Grammars of Formal Uncertainty: When to Trust LLMs in Automated Reasoning Tasks
Authors:
Debargha Ganguly,
Vikash Singh,
Sreehari Sankar,
Biyao Zhang,
Xuecen Zhang,
Srinivasan Iyengar,
Xiaotian Han,
Amit Sharma,
Shivkumar Kalyanaraman,
Vipin Chaudhary
Abstract:
Large language models (LLMs) show remarkable promise for democratizing automated reasoning by generating formal specifications. However, a fundamental tension exists: LLMs are probabilistic, while formal verification demands deterministic guarantees. This paper addresses this epistemological gap by comprehensively investigating failure modes and uncertainty quantification (UQ) in LLM-generated for…
▽ More
Large language models (LLMs) show remarkable promise for democratizing automated reasoning by generating formal specifications. However, a fundamental tension exists: LLMs are probabilistic, while formal verification demands deterministic guarantees. This paper addresses this epistemological gap by comprehensively investigating failure modes and uncertainty quantification (UQ) in LLM-generated formal artifacts. Our systematic evaluation of five frontier LLMs reveals Satisfiability Modulo Theories (SMT) based autoformalization's domain-specific impact on accuracy (from +34.8% on logical tasks to -44.5% on factual ones), with known UQ techniques like the entropy of token probabilities failing to identify these errors. We introduce a probabilistic context-free grammar (PCFG) framework to model LLM outputs, yielding a refined uncertainty taxonomy. We find uncertainty signals are task-dependent (e.g., grammar entropy for logic, AUROC>0.93). Finally, a lightweight fusion of these signals enables selective verification, drastically reducing errors (14-100%) with minimal abstention, transforming LLM-driven formalization into a reliable engineering discipline.
△ Less
Submitted 26 May, 2025;
originally announced May 2025.
-
Bridge2AI: Building A Cross-disciplinary Curriculum Towards AI-Enhanced Biomedical and Clinical Care
Authors:
John Rincon,
Alexander R. Pelletier,
Destiny Gilliland,
Wei Wang,
Ding Wang,
Baradwaj S. Sankar,
Lori Scott-Sheldon,
Samson Gebreab,
William Hersh,
Parisa Rashidi,
Sally Baxter,
Wade Schulz,
Trey Ideker,
Yael Bensoussan,
Paul C. Boutros,
Alex A. T. Bui,
Colin Walsh,
Karol E. Watson,
Peipei Ping
Abstract:
Objective: As AI becomes increasingly central to healthcare, there is a pressing need for bioinformatics and biomedical training systems that are personalized and adaptable. Materials and Methods: The NIH Bridge2AI Training, Recruitment, and Mentoring (TRM) Working Group developed a cross-disciplinary curriculum grounded in collaborative innovation, ethical data stewardship, and professional devel…
▽ More
Objective: As AI becomes increasingly central to healthcare, there is a pressing need for bioinformatics and biomedical training systems that are personalized and adaptable. Materials and Methods: The NIH Bridge2AI Training, Recruitment, and Mentoring (TRM) Working Group developed a cross-disciplinary curriculum grounded in collaborative innovation, ethical data stewardship, and professional development within an adapted Learning Health System (LHS) framework. Results: The curriculum integrates foundational AI modules, real-world projects, and a structured mentee-mentor network spanning Bridge2AI Grand Challenges and the Bridge Center. Guided by six learner personas, the program tailors educational pathways to individual needs while supporting scalability. Discussion: Iterative refinement driven by continuous feedback ensures that content remains responsive to learner progress and emerging trends. Conclusion: With over 30 scholars and 100 mentors engaged across North America, the TRM model demonstrates how adaptive, persona-informed training can build interdisciplinary competencies and foster an integrative, ethically grounded AI education in biomedical contexts.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
Direct Data Driven Control Using Noisy Measurements
Authors:
Ramin Esmzad,
Gokul S. Sankar,
Teawon Han,
Hamidreza Modares
Abstract:
This paper presents a novel direct data-driven control framework for solving the linear quadratic regulator (LQR) under disturbances and noisy state measurements. The system dynamics are assumed unknown, and the LQR solution is learned using only a single trajectory of noisy input-output data while bypassing system identification. Our approach guarantees mean-square stability (MSS) and optimal per…
▽ More
This paper presents a novel direct data-driven control framework for solving the linear quadratic regulator (LQR) under disturbances and noisy state measurements. The system dynamics are assumed unknown, and the LQR solution is learned using only a single trajectory of noisy input-output data while bypassing system identification. Our approach guarantees mean-square stability (MSS) and optimal performance by leveraging convex optimization techniques that incorporate noise statistics directly into the controller synthesis. First, we establish a theoretical result showing that the MSS of an uncertain data-driven system implies the MSS of the true closed-loop system. Building on this, we develop a robust stability condition using linear matrix inequalities (LMIs) that yields a stabilizing controller gain from noisy measurements. Finally, we formulate a data-driven LQR problem as a semidefinite program (SDP) that computes an optimal gain, minimizing the steady-state covariance. Extensive simulations on benchmark systems -- including a rotary inverted pendulum and an active suspension system -- demonstrate the superior robustness and accuracy of our method compared to existing data-driven LQR approaches. The proposed framework offers a practical and theoretically grounded solution for controller design in noise-corrupted environments where system identification is infeasible.
△ Less
Submitted 9 May, 2025;
originally announced May 2025.
-
Cued Speech Generation Leveraging a Pre-trained Audiovisual Text-to-Speech Model
Authors:
Sanjana Sankar,
Martin Lenglet,
Gerard Bailly,
Denis Beautemps,
Thomas Hueber
Abstract:
This paper presents a novel approach for the automatic generation of Cued Speech (ACSG), a visual communication system used by people with hearing impairment to better elicit the spoken language. We explore transfer learning strategies by leveraging a pre-trained audiovisual autoregressive text-to-speech model (AVTacotron2). This model is reprogrammed to infer Cued Speech (CS) hand and lip movemen…
▽ More
This paper presents a novel approach for the automatic generation of Cued Speech (ACSG), a visual communication system used by people with hearing impairment to better elicit the spoken language. We explore transfer learning strategies by leveraging a pre-trained audiovisual autoregressive text-to-speech model (AVTacotron2). This model is reprogrammed to infer Cued Speech (CS) hand and lip movements from text input. Experiments are conducted on two publicly available datasets, including one recorded specifically for this study. Performance is assessed using an automatic CS recognition system. With a decoding accuracy at the phonetic level reaching approximately 77%, the results demonstrate the effectiveness of our approach.
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Analysis of Conducted and Radiated Emission on a Self-oscillating Capacitive Touch Sensing Circuit
Authors:
Subramaniam Saravana Sankar,
Stanislav Kovar,
Martin Pospisilik,
Michael Galda
Abstract:
With the advent of smartphones, there has been a recent increase in the use of capacitive touch sensing for various Human Machine Interfaces (HMI). Capacitive-based touch sensing provides higher flexibility and cost-effectiveness than, methodologies such as resistive-based touch sensing. However, Capacitive-based touch sensing is more prone to disturbances such as Electromagnetic interference (EMI…
▽ More
With the advent of smartphones, there has been a recent increase in the use of capacitive touch sensing for various Human Machine Interfaces (HMI). Capacitive-based touch sensing provides higher flexibility and cost-effectiveness than, methodologies such as resistive-based touch sensing. However, Capacitive-based touch sensing is more prone to disturbances such as Electromagnetic interference (EMI) and noise due to temperature variation. This effect becomes more dominating as the sensing excitation frequency increases. Traditional capacitance to digital circuits, such as sigma-delta capacitive sensing, requires multiple clock cycles to measure sensing capacitance, thus necessitating higher frequency operation. In turn, this produces challenges in Electromagnetic Emission while also increasing its susceptibility to EMI, such as false or ghost touch due to exposure of the sensing electrodes to various frequency electric fields. This paper discusses the conducted electromagnetic emission behavior of an external excitation-frequency independent self-oscillating capacitance-to-time converter, where sensing is done with a single clock cycle, and discusses radiated Electromagnetic emission of the touch sensing electrode. The proposed approach is suitable for touch-sensing applications, mainly when used in a noisy EMI environment, such as inside a vehicle within the Automotive industry.
△ Less
Submitted 9 December, 2024;
originally announced December 2024.
-
Invariant neuromorphic representations of tactile stimuli improve robustness of a real-time texture classification system
Authors:
Mark M. Iskarous,
Zan Chaudhry,
Fangjie Li,
Samuel Bello,
Sriramana Sankar,
Ariel Slepyan,
Natasha Chugh,
Christopher L. Hunt,
Rebecca J. Greene,
Nitish V. Thakor
Abstract:
Humans have an exquisite sense of touch which robotic and prosthetic systems aim to recreate. We developed algorithms to create neuron-like (neuromorphic) spiking representations of texture that are invariant to the scanning speed and contact force applied in the sensing process. The spiking representations are based on mimicking activity from mechanoreceptors in human skin and further processing…
▽ More
Humans have an exquisite sense of touch which robotic and prosthetic systems aim to recreate. We developed algorithms to create neuron-like (neuromorphic) spiking representations of texture that are invariant to the scanning speed and contact force applied in the sensing process. The spiking representations are based on mimicking activity from mechanoreceptors in human skin and further processing up to the brain. The neuromorphic encoding process transforms analog sensor readings into speed and force invariant spiking representations in three sequential stages: the force invariance module (in the analog domain), the spiking activity encoding module (transforms from analog to spiking domain), and the speed invariance module (in the spiking domain). The algorithms were tested on a tactile texture dataset collected in 15 speed-force conditions. An offline texture classification system built on the invariant representations has higher classification accuracy, improved computational efficiency, and increased capability to identify textures explored in novel speed-force conditions. The speed invariance algorithm was adapted to a real-time human-operated texture classification system. Similarly, the invariant representations improved classification accuracy, computational efficiency, and capability to identify textures explored in novel conditions. The invariant representation is even more crucial in this context due to human imprecision which seems to the classification system as a novel condition. These results demonstrate that invariant neuromorphic representations enable better performing neurorobotic tactile sensing systems. Furthermore, because the neuromorphic representations are based on biological processing, this work can be used in the future as the basis for naturalistic sensory feedback for upper limb amputees.
△ Less
Submitted 25 November, 2024;
originally announced November 2024.
-
Adaptive Compressive Tactile Subsampling: Enabling High Spatiotemporal Resolution in Scalable Robotic Skin
Authors:
Ariel Slepyan,
Dian Li,
Aidan Aug,
Sriramana Sankar,
Trac Tran,
Nitish Thakor
Abstract:
Robots, like humans, require full-body, high-resolution tactile sensing to operate safely and effectively in unstructured environments, enabling reflexive responses and closed-loop control. However, the high pixel counts necessary for dense, large-area coverage limit readout rates of most tactile arrays to below 100 Hz, hindering their use in high-speed tasks. We introduce Adaptive Compressive Tac…
▽ More
Robots, like humans, require full-body, high-resolution tactile sensing to operate safely and effectively in unstructured environments, enabling reflexive responses and closed-loop control. However, the high pixel counts necessary for dense, large-area coverage limit readout rates of most tactile arrays to below 100 Hz, hindering their use in high-speed tasks. We introduce Adaptive Compressive Tactile Subsampling (ACTS), a scalable and data-driven method that dramatically enhances the performance of traditional tactile matrices by leveraging sparse recovery and a learned tactile dictionary. Tested on a 1024-pixel tactile sensor array (32X32), ACTS achieved frame rates up to 1,000 Hz, an 18X improvement over conventional raster scanning, with minimal reconstruction error. For the first time, ACTS enables wearable, large-area, high-density tactile sensing systems that can deliver high-speed results. We demonstrate rapid object classification within 20 ms of contact, high-speed projectile detection, ricochet angle estimation, and soft deformation tracking, in tactile and robotics applications, all using flexible, high-density tactile arrays. These include high-resolution tactile gloves, pressure insoles, and full-body configurations covering robotic arms and human-sized mannequins. ACTS transforms standard, low-cost, and robust tactile sensors into high-speed systems, supporting applications from object manipulation to human-robot interaction. By enabling comprehensive, scalable, and efficient tactile coverage for robots and wearables, ACTS advances robotics toward lifelike, responsive, and adaptable operation in dynamic environments.
△ Less
Submitted 18 February, 2025; v1 submitted 17 October, 2024;
originally announced October 2024.
-
Explainable Biomedical Hypothesis Generation via Retrieval Augmented Generation enabled Large Language Models
Authors:
Alexander R. Pelletier,
Joseph Ramirez,
Irsyad Adam,
Simha Sankar,
Yu Yan,
Ding Wang,
Dylan Steinecke,
Wei Wang,
Peipei Ping
Abstract:
The vast amount of biomedical information available today presents a significant challenge for investigators seeking to digest, process, and understand these findings effectively. Large Language Models (LLMs) have emerged as powerful tools to navigate this complex and challenging data landscape. However, LLMs may lead to hallucinatory responses, making Retrieval Augmented Generation (RAG) crucial…
▽ More
The vast amount of biomedical information available today presents a significant challenge for investigators seeking to digest, process, and understand these findings effectively. Large Language Models (LLMs) have emerged as powerful tools to navigate this complex and challenging data landscape. However, LLMs may lead to hallucinatory responses, making Retrieval Augmented Generation (RAG) crucial for achieving accurate information. In this protocol, we present RUGGED (Retrieval Under Graph-Guided Explainable disease Distinction), a comprehensive workflow designed to support investigators with knowledge integration and hypothesis generation, identifying validated paths forward. Relevant biomedical information from publications and knowledge bases are reviewed, integrated, and extracted via text-mining association analysis and explainable graph prediction models on disease nodes, forecasting potential links among drugs and diseases. These analyses, along with biomedical texts, are integrated into a framework that facilitates user-directed mechanism elucidation as well as hypothesis exploration through RAG-enabled LLMs. A clinical use-case demonstrates RUGGED's ability to evaluate and recommend therapeutics for Arrhythmogenic Cardiomyopathy (ACM) and Dilated Cardiomyopathy (DCM), analyzing prescribed drugs for molecular interactions and unexplored uses. The platform minimizes LLM hallucinations, offers actionable insights, and improves the investigation of novel therapeutics.
△ Less
Submitted 17 July, 2024;
originally announced July 2024.
-
Individual Fairness in Graph Decomposition
Authors:
Kamesh Munagala,
Govind S. Sankar
Abstract:
In this paper, we consider classic randomized low diameter decomposition procedures for planar graphs that obtain connected clusters which are cohesive in that close-by pairs of nodes are assigned to the same cluster with high probability. We require the additional aspect of individual fairness - pairs of nodes at comparable distances should be separated with comparable probability. We show that c…
▽ More
In this paper, we consider classic randomized low diameter decomposition procedures for planar graphs that obtain connected clusters which are cohesive in that close-by pairs of nodes are assigned to the same cluster with high probability. We require the additional aspect of individual fairness - pairs of nodes at comparable distances should be separated with comparable probability. We show that classic decomposition procedures do not satisfy this property. We present novel algorithms that achieve various trade-offs between this property and additional desiderata of connectivity of the clusters and optimality in the number of clusters. We show that our individual fairness bounds may be difficult to improve by tying the improvement to resolving a major open question in metric embeddings. We finally show the efficacy of our algorithms on real planar networks modeling congressional redistricting.
△ Less
Submitted 31 May, 2024;
originally announced June 2024.
-
PVF (Parameter Vulnerability Factor): A Scalable Metric for Understanding AI Vulnerability Against SDCs in Model Parameters
Authors:
Xun Jiao,
Fred Lin,
Harish D. Dixit,
Joel Coburn,
Abhinav Pandey,
Han Wang,
Venkat Ramesh,
Jianyu Huang,
Wang Xu,
Daniel Moore,
Sriram Sankar
Abstract:
Reliability of AI systems is a fundamental concern for the successful deployment and widespread adoption of AI technologies. Unfortunately, the escalating complexity and heterogeneity of AI hardware systems make them increasingly susceptible to hardware faults, e.g., silent data corruptions (SDC), that can potentially corrupt model parameters. When this occurs during AI inference/servicing, it can…
▽ More
Reliability of AI systems is a fundamental concern for the successful deployment and widespread adoption of AI technologies. Unfortunately, the escalating complexity and heterogeneity of AI hardware systems make them increasingly susceptible to hardware faults, e.g., silent data corruptions (SDC), that can potentially corrupt model parameters. When this occurs during AI inference/servicing, it can potentially lead to incorrect or degraded model output for users, ultimately affecting the quality and reliability of AI services. In light of the escalating threat, it is crucial to address key questions: How vulnerable are AI models to parameter corruptions, and how do different components (such as modules, layers) of the models exhibit varying vulnerabilities to parameter corruptions? To systematically address this question, we propose a novel quantitative metric, Parameter Vulnerability Factor (PVF), inspired by architectural vulnerability factor (AVF) in computer architecture community, aiming to standardize the quantification of AI model vulnerability against parameter corruptions. We define a model parameter's PVF as the probability that a corruption in that particular model parameter will result in an incorrect output. In this paper, we present several use cases on applying PVF to three types of tasks/models during inference -- recommendation (DLRM), vision classification (CNN), and text classification (BERT), while presenting an in-depth vulnerability analysis on DLRM. PVF can provide pivotal insights to AI hardware designers in balancing the tradeoff between fault protection and performance/efficiency such as mapping vulnerable AI parameter components to well-protected hardware modules. PVF metric is applicable to any AI model and has a potential to help unify and standardize AI vulnerability/resilience evaluation practice.
△ Less
Submitted 11 June, 2024; v1 submitted 2 May, 2024;
originally announced May 2024.
-
Group Fairness and Multi-criteria Optimization in School Assignment
Authors:
Santhini K. A.,
Kamesh Munagala,
Meghana Nasre,
Govind S. Sankar
Abstract:
We consider the problem of assigning students to schools, when students have different utilities for schools and schools have capacity. There are additional group fairness considerations over students that can be captured either by concave objectives, or additional constraints on the groups. We present approximation algorithms for this problem via convex program rounding that achieve various trade…
▽ More
We consider the problem of assigning students to schools, when students have different utilities for schools and schools have capacity. There are additional group fairness considerations over students that can be captured either by concave objectives, or additional constraints on the groups. We present approximation algorithms for this problem via convex program rounding that achieve various trade-offs between utility violation, capacity violation, and running time. We also show that our techniques easily extend to the setting where there are arbitrary covering constraints on the feasible assignment, capturing multi-criteria and ranking optimization.
△ Less
Submitted 22 April, 2025; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Data Exchange Markets via Utility Balancing
Authors:
Aditya Bhaskara,
Sreenivas Gollapudi,
Sungjin Im,
Kostas Kollias,
Kamesh Munagala,
Govind S. Sankar
Abstract:
This paper explores the design of a balanced data-sharing marketplace for entities with heterogeneous datasets and machine learning models that they seek to refine using data from other agents. The goal of the marketplace is to encourage participation for data sharing in the presence of such heterogeneity. Our market design approach for data sharing focuses on interim utility balance, where partic…
▽ More
This paper explores the design of a balanced data-sharing marketplace for entities with heterogeneous datasets and machine learning models that they seek to refine using data from other agents. The goal of the marketplace is to encourage participation for data sharing in the presence of such heterogeneity. Our market design approach for data sharing focuses on interim utility balance, where participants contribute and receive equitable utility from refinement of their models. We present such a market model for which we study computational complexity, solution existence, and approximation algorithms for welfare maximization and core stability. We finally support our theoretical insights with simulations on a mean estimation task inspired by road traffic delay estimation.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration
Authors:
D. Dhinakaran,
S. M. Udhaya Sankar,
D. Selvaraj,
S. Edwin Raja
Abstract:
As the integration of Internet of Things devices with cloud computing proliferates, the paramount importance of privacy preservation comes to the forefront. This survey paper meticulously explores the landscape of privacy issues in the dynamic intersection of IoT and cloud systems. The comprehensive literature review synthesizes existing research, illuminating key challenges and discerning emergin…
▽ More
As the integration of Internet of Things devices with cloud computing proliferates, the paramount importance of privacy preservation comes to the forefront. This survey paper meticulously explores the landscape of privacy issues in the dynamic intersection of IoT and cloud systems. The comprehensive literature review synthesizes existing research, illuminating key challenges and discerning emerging trends in privacy preserving techniques. The categorization of diverse approaches unveils a nuanced understanding of encryption techniques, anonymization strategies, access control mechanisms, and the burgeoning integration of artificial intelligence. Notable trends include the infusion of machine learning for dynamic anonymization, homomorphic encryption for secure computation, and AI-driven access control systems. The culmination of this survey contributes a holistic view, laying the groundwork for understanding the multifaceted strategies employed in securing sensitive data within IoT-based cloud environments. The insights garnered from this survey provide a valuable resource for researchers, practitioners, and policymakers navigating the complex terrain of privacy preservation in the evolving landscape of IoT and cloud computing
△ Less
Submitted 1 January, 2024;
originally announced January 2024.
-
Gemini: A Family of Highly Capable Multimodal Models
Authors:
Gemini Team,
Rohan Anil,
Sebastian Borgeaud,
Jean-Baptiste Alayrac,
Jiahui Yu,
Radu Soricut,
Johan Schalkwyk,
Andrew M. Dai,
Anja Hauth,
Katie Millican,
David Silver,
Melvin Johnson,
Ioannis Antonoglou,
Julian Schrittwieser,
Amelia Glaese,
Jilin Chen,
Emily Pitler,
Timothy Lillicrap,
Angeliki Lazaridou,
Orhan Firat,
James Molloy,
Michael Isard,
Paul R. Barham,
Tom Hennigan,
Benjamin Lee
, et al. (1326 additional authors not shown)
Abstract:
This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr…
▽ More
This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultra model advances the state of the art in 30 of 32 of these benchmarks - notably being the first model to achieve human-expert performance on the well-studied exam benchmark MMLU, and improving the state of the art in every one of the 20 multimodal benchmarks we examined. We believe that the new capabilities of the Gemini family in cross-modal reasoning and language understanding will enable a wide variety of use cases. We discuss our approach toward post-training and deploying Gemini models responsibly to users through services including Gemini, Gemini Advanced, Google AI Studio, and Cloud Vertex AI.
△ Less
Submitted 9 May, 2025; v1 submitted 18 December, 2023;
originally announced December 2023.
-
A Neural Radiance Field-Based Architecture for Intelligent Multilayered View Synthesis
Authors:
D. Dhinakaran,
S. M. Udhaya Sankar,
G. Elumalai,
N. Jagadish kumar
Abstract:
A mobile ad hoc network is made up of a number of wireless portable nodes that spontaneously come together en route for establish a transitory network with no need for any central management. A mobile ad hoc network (MANET) is made up of a sizable and reasonably dense community of mobile nodes that travel across any terrain and rely solely on wireless interfaces for communication, not on any well…
▽ More
A mobile ad hoc network is made up of a number of wireless portable nodes that spontaneously come together en route for establish a transitory network with no need for any central management. A mobile ad hoc network (MANET) is made up of a sizable and reasonably dense community of mobile nodes that travel across any terrain and rely solely on wireless interfaces for communication, not on any well before centralized management. Furthermore, routing be supposed to offer a method for instantly delivering data across a network between any two nodes. Finding the best packet routing from across infrastructure is the major issue, though. The proposed protocol's major goal is to identify the least-expensive nominal capacity acquisition that assures the transportation of realistic transport that ensures its durability in the event of any node failure. This study suggests the Optimized Route Selection via Red Imported Fire Ants (RIFA) Strategy as a way to improve on-demand source routing systems. Predicting Route Failure and energy Utilization is used to pick the path during the routing phase. Proposed work assess the results of the comparisons based on performance parameters like as energy usage, packet delivery rate (PDR), and end-to-end (E2E) delay. The outcome demonstrates that the proposed strategy is preferable and increases network lifetime while lowering node energy consumption and typical E2E delay under the majority of network performance measures and factors.
△ Less
Submitted 3 November, 2023;
originally announced November 2023.
-
Leveraging Semi-Supervised Graph Learning for Enhanced Diabetic Retinopathy Detection
Authors:
D. Dhinakaran,
L. Srinivasan,
D. Selvaraj,
S. M. Udhaya Sankar
Abstract:
Diabetic Retinopathy (DR) is a significant cause of blindness globally, highlighting the urgent need for early detection and effective treatment. Recent advancements in Machine Learning (ML) techniques have shown promise in DR detection, but the availability of labeled data often limits their performance. This research proposes a novel Semi-Supervised Graph Learning SSGL algorithm tailored for DR…
▽ More
Diabetic Retinopathy (DR) is a significant cause of blindness globally, highlighting the urgent need for early detection and effective treatment. Recent advancements in Machine Learning (ML) techniques have shown promise in DR detection, but the availability of labeled data often limits their performance. This research proposes a novel Semi-Supervised Graph Learning SSGL algorithm tailored for DR detection, which capitalizes on the relationships between labelled and unlabeled data to enhance accuracy. The work begins by investigating data augmentation and preprocessing techniques to address the challenges of image quality and feature variations. Techniques such as image cropping, resizing, contrast adjustment, normalization, and data augmentation are explored to optimize feature extraction and improve the overall quality of retinal images. Moreover, apart from detection and diagnosis, this work delves into applying ML algorithms for predicting the risk of developing DR or the likelihood of disease progression. Personalized risk scores for individual patients are generated using comprehensive patient data encompassing demographic information, medical history, and retinal images. The proposed Semi-Supervised Graph learning algorithm is rigorously evaluated on two publicly available datasets and is benchmarked against existing methods. Results indicate significant improvements in classification accuracy, specificity, and sensitivity while demonstrating robustness against noise and outlie rs.Notably, the proposed algorithm addresses the challenge of imbalanced datasets, common in medical image analysis, further enhancing its practical applicability.
△ Less
Submitted 2 September, 2023;
originally announced September 2023.
-
Coded Aperture Radar Imaging Using Reconfigurable Intelligent Surfaces
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
In this paper, we focus on radar imaging using active sensing with a single transceiver and reconfigurable intelligent surface (RIS). RISs are arrays with tunable passive phase shifter elements that can modify the propagation channel. The RIS reflects each transmit pulse with a different phase profile. We use compressive sensing to recover the radar scene from observations at the single-antenna re…
▽ More
In this paper, we focus on radar imaging using active sensing with a single transceiver and reconfigurable intelligent surface (RIS). RISs are arrays with tunable passive phase shifter elements that can modify the propagation channel. The RIS reflects each transmit pulse with a different phase profile. We use compressive sensing to recover the radar scene from observations at the single-antenna receiver. We also provide a projected gradient descent algorithm to design the RIS phase shifts to obtain minimally coherent observations required for recovery. Through numerical simulations, we demonstrate that the proposed method recovers radar scenes with point scatterers and extended targets.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
Evaluating and Enhancing Robustness of Deep Recommendation Systems Against Hardware Errors
Authors:
Dongning Ma,
Xun Jiao,
Fred Lin,
Mengshi Zhang,
Alban Desmaison,
Thomas Sellinger,
Daniel Moore,
Sriram Sankar
Abstract:
Deep recommendation systems (DRS) heavily depend on specialized HPC hardware and accelerators to optimize energy, efficiency, and recommendation quality. Despite the growing number of hardware errors observed in large-scale fleet systems where DRS are deployed, the robustness of DRS has been largely overlooked. This paper presents the first systematic study of DRS robustness against hardware error…
▽ More
Deep recommendation systems (DRS) heavily depend on specialized HPC hardware and accelerators to optimize energy, efficiency, and recommendation quality. Despite the growing number of hardware errors observed in large-scale fleet systems where DRS are deployed, the robustness of DRS has been largely overlooked. This paper presents the first systematic study of DRS robustness against hardware errors. We develop Terrorch, a user-friendly, efficient and flexible error injection framework on top of the widely-used PyTorch. We evaluate a wide range of models and datasets and observe that the DRS robustness against hardware errors is influenced by various factors from model parameters to input characteristics. We also explore 3 error mitigation methods including algorithm based fault tolerance (ABFT), activation clipping and selective bit protection (SBP). We find that applying activation clipping can recover up to 30% of the degraded AUC-ROC score, making it a promising mitigation method.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
Investigating the dynamics of hand and lips in French Cued Speech using attention mechanisms and CTC-based decoding
Authors:
Sanjana Sankar,
Denis Beautemps,
Frédéric Elisei,
Olivier Perrotin,
Thomas Hueber
Abstract:
Hard of hearing or profoundly deaf people make use of cued speech (CS) as a communication tool to understand spoken language. By delivering cues that are relevant to the phonetic information, CS offers a way to enhance lipreading. In literature, there have been several studies on the dynamics between the hand and the lips in the context of human production. This article proposes a way to investiga…
▽ More
Hard of hearing or profoundly deaf people make use of cued speech (CS) as a communication tool to understand spoken language. By delivering cues that are relevant to the phonetic information, CS offers a way to enhance lipreading. In literature, there have been several studies on the dynamics between the hand and the lips in the context of human production. This article proposes a way to investigate how a neural network learns this relation for a single speaker while performing a recognition task using attention mechanisms. Further, an analysis of the learnt dynamics is utilized to establish the relationship between the two modalities and extract automatic segments. For the purpose of this study, a new dataset has been recorded for French CS. Along with the release of this dataset, a benchmark will be reported for word-level recognition, a novelty in the automatic recognition of French CS.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs Part II: Hardness Results
Authors:
Jacob Focke,
Dániel Marx,
Fionn Mc Inerney,
Daniel Neuen,
Govind S. Sankar,
Philipp Schepper,
Philip Wellnitz
Abstract:
For a well-studied family of domination-type problems, in bounded-treewidth graphs, we investigate whether it is possible to find faster algorithms. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) u…
▽ More
For a well-studied family of domination-type problems, in bounded-treewidth graphs, we investigate whether it is possible to find faster algorithms. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) unifies common problems like $\text{Independent Set}$, $\text{Dominating Set}$, $\text{Independent Dominating Set}$, and many others.
In an accompanying paper, it is proven that, for all pairs of finite or cofinite sets $(σ,ρ)$, there is an algorithm that counts $(σ,ρ)$-sets in time $(c_{σ,ρ})^{\text{tw}}\cdot n^{O(1)}$ (if a tree decomposition of width $\text{tw}$ is given in the input). Here, $c_{σ,ρ}$ is a constant with an intricate dependency on $σ$ and $ρ$. Despite this intricacy, we show that the algorithms in the accompanying paper are most likely optimal, i.e., for any pair $(σ, ρ)$ of finite or cofinite sets where the problem is non-trivial, and any $\varepsilon>0$, a $(c_{σ,ρ}-\varepsilon)^{\text{tw}}\cdot n^{O(1)}$-algorithm counting the number of $(σ,ρ)$-sets would violate the Counting Strong Exponential-Time Hypothesis ($\#$SETH). For finite sets $σ$ and $ρ$, our lower bounds also extend to the decision version, showing that those algorithms are optimal in this setting as well.
△ Less
Submitted 26 May, 2023;
originally announced June 2023.
-
A Secure Third-Party Auditing Scheme Based on Blockchain Technology in Cloud Storage
Authors:
S. M. Udhaya Sankar,
D. Selvaraj,
G. K. Monica,
Jeevaa Katiravan
Abstract:
With the help of a shared pool of reconfigurable computing resources, clients of the cloud-based model can keep sensitive data remotely and access the apps and services it offers on-demand without having to worry about maintaining and storing it locally. To protect the privacy of the public auditing system that supports the cloud data exchange system. The data's owner has the ability to change it…
▽ More
With the help of a shared pool of reconfigurable computing resources, clients of the cloud-based model can keep sensitive data remotely and access the apps and services it offers on-demand without having to worry about maintaining and storing it locally. To protect the privacy of the public auditing system that supports the cloud data exchange system. The data's owner has the ability to change it using the private key and publishes it in the cloud. The RSA Technique is used to produce key codes for the cloud services atmosphere's privacy utilizing the system's baseboard number, disc number, and client passcode for validation. The method is based on a cutting-edge User End Generated (UEG) privacy technique that minimizes the involvement of a third party and improves security checks by automatically documenting destructive activities. To strengthen extensibility, various authorization-assigning modalities and block access patterns were established together with current operational design approaches. In order to meet the demands for decentralization, fine-grained auditability, extensibility, flexibility, and privacy protection for multilevel data access in networked environments, the suggested approach makes use of blockchain technology. According to a thorough performance and security assessment, the current proposal is exceptionally safe and effective.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET
Authors:
S. M. Udhaya Sankar,
D. Dhinakaran,
C. Cathrin Deboral,
M. Ramakrishnan
Abstract:
Wireless networks that are decentralized and communicate without using existing infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system to detect additional security issues. Monitoring is essential to avoid attacks and provide extra protection against unaut…
▽ More
Wireless networks that are decentralized and communicate without using existing infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system to detect additional security issues. Monitoring is essential to avoid attacks and provide extra protection against unauthorized access. Although the current solutions have been designed to defeat the attack nodes, they still require additional hardware, have considerable delivery delays, do not offer high throughput or packet delivery ratios, or do not do so without using more energy. The capability of a mobile node to forward packets, which is dependent on the platform's life quality, may be impacted by the absence of the network node power source. We developed the Safe Routing Approach (SRA), which uses behaviour analysis to track and monitor attackers who discard packets during the route discovery process. The attacking node recognition system is made for irregular routing node detection to protect the controller network's usual properties from becoming recognized as an attack node. The suggested method examines the nearby attack nodes and conceals the trusted node in the routing pathway. The path is instantly assigned after the initial discovery of trust nodes based on each node's strength value. It extends the network's life span and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy consumption, network performance, and detection of attack nodes, the suggested approach is contrasted with AIS, ZIDS, and Improved AODV. The findings demonstrate that the recommended strategy performs superior in terms of PDR, residual energy, and network throughput.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection
Authors:
D. Selvaraj,
S. M. Udhaya Sankar,
D. Dhinakaran,
T. P. Anish
Abstract:
Huge diagrams have unique properties for organizations and research, such as client linkages in informal organizations and customer evaluation lattices in social channels. They necessitate a lot of financial assets to maintain because they are large and frequently continue to expand. Owners of large diagrams may need to use cloud resources due to the extensive arrangement of open cloud resources t…
▽ More
Huge diagrams have unique properties for organizations and research, such as client linkages in informal organizations and customer evaluation lattices in social channels. They necessitate a lot of financial assets to maintain because they are large and frequently continue to expand. Owners of large diagrams may need to use cloud resources due to the extensive arrangement of open cloud resources to increase capacity and computation flexibility. However, the cloud's accountability and protection of schematics have become a significant issue. In this study, we consider calculations for security savings for essential graph examination practices: schematic extraterrestrial examination for outsourcing graphs in the cloud server. We create the security-protecting variants of the two proposed Eigen decay computations. They are using two cryptographic algorithms: additional substance homomorphic encryption (ASHE) strategies and some degree homomorphic encryption (SDHE) methods. Inadequate networks also feature a distinctively confidential info adaptation convention to allow the trade-off between secrecy and data sparseness. Both dense and sparse structures are investigated. According to test results, calculations with sparse encoding can drastically reduce information. SDHE-based strategies have reduced computing time, while ASHE-based methods have reduced stockpiling expenses.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Learning to Precode for Integrated Sensing and Communications Systems
Authors:
R. S. Prasobh Sankar,
Sidharth S. Nair,
Siddhant Doshi,
Sundeep Prabhakar Chepuri
Abstract:
In this paper, we present an unsupervised learning neural model to design transmit precoders for integrated sensing and communication (ISAC) systems to maximize the worst-case target illumination power while ensuring a minimum signal-to-interference-plus-noise ratio (SINR) for all the users. The problem of learning transmit precoders from uplink pilots and echoes can be viewed as a parameterized f…
▽ More
In this paper, we present an unsupervised learning neural model to design transmit precoders for integrated sensing and communication (ISAC) systems to maximize the worst-case target illumination power while ensuring a minimum signal-to-interference-plus-noise ratio (SINR) for all the users. The problem of learning transmit precoders from uplink pilots and echoes can be viewed as a parameterized function estimation problem and we propose to learn this function using a neural network model. To learn the neural network parameters, we develop a novel loss function based on the first-order optimality conditions to incorporate the SINR and power constraints. Through numerical simulations, we demonstrate that the proposed method outperforms traditional optimization-based methods in presence of channel estimation errors while incurring lesser computational complexity and generalizing well across different channel conditions that were not shown during training.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Optimal Placement of Active and Passive Elements in Hybrid RIS-assisted Communication Systems
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
Hybrid reconfigurable intelligent surfaces (HRIS) are RIS architectures having both active and passive elements. The received signal-to-noise ratio (SNR) in HRIS-assisted communication systems depends on the placement of active elements. In this paper, we show that received SNR can be improved with a channel-aware placement of the active elements. We jointly design the transmit precoder, the RIS c…
▽ More
Hybrid reconfigurable intelligent surfaces (HRIS) are RIS architectures having both active and passive elements. The received signal-to-noise ratio (SNR) in HRIS-assisted communication systems depends on the placement of active elements. In this paper, we show that received SNR can be improved with a channel-aware placement of the active elements. We jointly design the transmit precoder, the RIS coefficients, and the location of active and passive elements of the HRIS to maximize the SNR. We solve the underlying combinatorial nonconvex optimization problem using alternating optimization and propose a low-complexity solver, which is provably nearly optimal. Through numerical simulations, we demonstrate that the proposed method offers significantly improved performance compared to communication systems having a fully passive RIS array or a hybrid RIS array with channel agnostic active element placement and performance comparable to that of communication systems with a fully active RIS array.
△ Less
Submitted 17 January, 2023;
originally announced January 2023.
-
PyGFI: Analyzing and Enhancing Robustness of Graph Neural Networks Against Hardware Errors
Authors:
Ruixuan Wang,
Fred Lin,
Daniel Moore,
Sriram Sankar,
Xun Jiao
Abstract:
Graph neural networks (GNNs) have recently emerged as a promising learning paradigm in learning graph-structured data and have demonstrated wide success across various domains such as recommendation systems, social networks, and electronic design automation (EDA). Like other deep learning (DL) methods, GNNs are being deployed in sophisticated modern hardware systems, as well as dedicated accelerat…
▽ More
Graph neural networks (GNNs) have recently emerged as a promising learning paradigm in learning graph-structured data and have demonstrated wide success across various domains such as recommendation systems, social networks, and electronic design automation (EDA). Like other deep learning (DL) methods, GNNs are being deployed in sophisticated modern hardware systems, as well as dedicated accelerators. However, despite the popularity of GNNs and the recent efforts of bringing GNNs to hardware, the fault tolerance and resilience of GNNs have generally been overlooked. Inspired by the inherent algorithmic resilience of DL methods, this paper conducts, for the first time, a large-scale and empirical study of GNN resilience, aiming to understand the relationship between hardware faults and GNN accuracy. By developing a customized fault injection tool on top of PyTorch, we perform extensive fault injection experiments on various GNN models and application datasets. We observe that the error resilience of GNN models varies by orders of magnitude with respect to different models and application datasets. Further, we explore a low-cost error mitigation mechanism for GNN to enhance its resilience. This GNN resilience study aims to open up new directions and opportunities for future GNN accelerator design and architectural optimization.
△ Less
Submitted 24 April, 2023; v1 submitted 7 December, 2022;
originally announced December 2022.
-
Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs Part I: Algorithmic Results
Authors:
Jacob Focke,
Dániel Marx,
Fionn Mc Inerney,
Daniel Neuen,
Govind S. Sankar,
Philipp Schepper,
Philip Wellnitz
Abstract:
We investigate how efficiently a well-studied family of domination-type problems can be solved on bounded-treewidth graphs. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) unifies standard problems…
▽ More
We investigate how efficiently a well-studied family of domination-type problems can be solved on bounded-treewidth graphs. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) unifies standard problems such as Independent Set, Dominating Set, Independent Dominating Set, and many others.
For all pairs of finite or cofinite sets $(σ,ρ)$, we determine (under standard complexity assumptions) the best possible value $c_{σ,ρ}$ such that there is an algorithm that counts $(σ,ρ)$-sets in time $c_{σ,ρ}^{\sf tw}\cdot n^{O(1)}$ (if a tree decomposition of width ${\sf tw}$ is given in the input). For example, for the Exact Independent Dominating Set problem (also known as Perfect Code) corresponding to $σ=\{0\}$ and $ρ=\{1\}$, we improve the $3^{\sf tw}\cdot n^{O(1)}$ algorithm of [van Rooij, 2020] to $2^{\sf tw}\cdot n^{O(1)}$.
Despite the unusually delicate definition of $c_{σ,ρ}$, an accompanying paper shows that our algorithms are most likely optimal, that is, for any pair $(σ, ρ)$ of finite or cofinite sets where the problem is non-trivial, and any $\varepsilon>0$, a $(c_{σ,ρ}-\varepsilon)^{\sf tw}\cdot n^{O(1)}$-algorithm counting the number of $(σ,ρ)$-sets would violate the Counting Strong Exponential-Time Hypothesis (#SETH). For finite sets $σ$ and $ρ$, these lower bounds also extend to the decision version, and hence, our algorithms are optimal in this setting as well. In contrast, for many cofinite sets, we show that further significant improvements for the decision and optimization versions are possible using the technique of representative sets.
△ Less
Submitted 18 April, 2025; v1 submitted 8 November, 2022;
originally announced November 2022.
-
Quantized Precoding and RIS-Assisted Modulation for Integrated Sensing and Communications Systems
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
In this paper, we present a novel reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) system with 1-bit quantization at the ISAC base station. An RIS is introduced in the ISAC system to mitigate the effects of coarse quantization and to enable the co-existence between sensing and communication functionalities. Specifically, we design transmit precoder to o…
▽ More
In this paper, we present a novel reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) system with 1-bit quantization at the ISAC base station. An RIS is introduced in the ISAC system to mitigate the effects of coarse quantization and to enable the co-existence between sensing and communication functionalities. Specifically, we design transmit precoder to obtain 1-bit sensing waveforms having a desired radiation pattern. The RIS phase shifts are then designed to modulate the 1-bit sensing waveform to transmit M-ary phase shift keying symbols to users. Through numerical simulations, we show that the proposed method offers significantly improved symbol error probabilities when compared to MIMO communication systems having quantized linear precoders, while still offering comparable sensing performance as that of unquantized sensing systems.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Adversarial and Safely Scaled Question Generation
Authors:
Sreehari Sankar,
Zhihang Dong
Abstract:
Question generation has recently gained a lot of research interest, especially with the advent of large language models. In and of itself, question generation can be considered 'AI-hard', as there is a lack of unanimously agreed sense of what makes a question 'good' or 'bad'. In this paper, we tackle two fundamental problems in parallel: on one hand, we try to solve the scaling problem, where ques…
▽ More
Question generation has recently gained a lot of research interest, especially with the advent of large language models. In and of itself, question generation can be considered 'AI-hard', as there is a lack of unanimously agreed sense of what makes a question 'good' or 'bad'. In this paper, we tackle two fundamental problems in parallel: on one hand, we try to solve the scaling problem, where question-generation and answering applications have to be applied to a massive amount of text without ground truth labeling. The usual approach to solve this problem is to either downsample or summarize. However, there are critical risks of misinformation with these approaches. On the other hand, and related to the misinformation problem, we try to solve the 'safety' problem, as many public institutions rely on a much higher level of accuracy for the content they provide. We introduce an adversarial approach to tackle the question generation safety problem with scale. Specifically, we designed a question-answering system that specifically prunes out unanswerable questions that may be generated, and further increases the quality of the answers that are generated. We build a production-ready, easily-plugged pipeline that can be used on any given body of text, that is scalable and immune from generating any hate speech, profanity, or misinformation. Based on the results, we are able to generate more than six times the number of quality questions generated by the abstractive approach, with a perceived quality being 44% higher, according to a survey of 168 participants.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
Online Algorithms for Matchings with Proportional Fairness Constraints and Diversity Constraints
Authors:
Anand Louis,
Meghana Nasre,
Prajakta Nimbhorkar,
Govind S. Sankar
Abstract:
Matching problems with group-fairness constraints and diversity constraints have numerous applications such as in allocation problems, committee selection, school choice, etc. Moreover, online matching problems have lots of applications in ad allocations and other e-commerce problems like product recommendation in digital marketing.
We study two problems involving assigning {\em items} to {\em p…
▽ More
Matching problems with group-fairness constraints and diversity constraints have numerous applications such as in allocation problems, committee selection, school choice, etc. Moreover, online matching problems have lots of applications in ad allocations and other e-commerce problems like product recommendation in digital marketing.
We study two problems involving assigning {\em items} to {\em platforms}, where items belong to various {\em groups} depending on their attributes; the set of items are available offline and the platforms arrive online. In the first problem, we study online matchings with {\em proportional fairness constraints}. Here, each platform on arrival should either be assigned a set of items in which the fraction of items from each group is within specified bounds or be assigned no items; the goal is to assign items to platforms in order to maximize the number of items assigned to platforms.
In the second problem, we study online matchings with {\em diversity constraints}, i.e. for each platform, absolute lower bounds are specified for each group. Each platform on arrival should either be assigned a set of items that satisfy these bounds or be assigned no items; the goal is to maximize the set of platforms that get matched. We study approximation algorithms and hardness results for these problems. The technical core of our proofs is a new connection between these problems and the problem of matchings in hypergraphs.
Our experimental evaluation shows the performance of our algorithms on real-world and synthetic datasets exceeds our theoretical guarantees.
△ Less
Submitted 3 August, 2023; v1 submitted 24 August, 2022;
originally announced August 2022.
-
Beamforming in Integrated Sensing and Communication Systems with Reconfigurable Intelligent Surfaces
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri,
Yonina C. Eldar
Abstract:
We consider transmit beamforming and reflection pattern design in reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) systems to jointly precode communication symbols and radar waveforms. We treat two settings of multiple users and targets. In the first, we use a single RIS to enhance the communication performance of the ISAC system and design beams with g…
▽ More
We consider transmit beamforming and reflection pattern design in reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) systems to jointly precode communication symbols and radar waveforms. We treat two settings of multiple users and targets. In the first, we use a single RIS to enhance the communication performance of the ISAC system and design beams with good cross-correlation properties to match a desired beam pattern while guaranteeing a desired signal-to-interference plus noise ratio (SINR) for each user. In the second setting, we use two dedicated RISs to aid the ISAC system, wherein the beams are designed to maximize the worst-case target illumination power while guaranteeing a desired SINR for each user. We propose solvers based on alternating optimization as the design problems in both cases are non-convex optimization problems. Through a number of numerical simulations, we demonstrate the advantages of RIS-assisted ISAC systems. In particular, we show that the proposed single-RIS assisted ISAC system improves the minimum user SINR while suffering from a moderate loss in radar target illumination power. On the other hand, the dual-RIS assisted ISAC system improves both minimum user SINR as well as worst-case target illumination power at the targets, especially when the users and targets are not directly visible.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
Energy Saving Techniques for Energy Constrained CMOS Circuits and Systems
Authors:
Sivaneswaran Sankar
Abstract:
Portable devices like smartphones, tablets, wearable electronic devices, medical implants, wireless sensor nodes, and Internet-of-Things (IoT) devices have tremendous constraints on their energy consumption. Adding more functionalities onto the portable devices increases its energy consumption significantly. However, the energy capacity of the battery does not increase proportionally. Hence, to ov…
▽ More
Portable devices like smartphones, tablets, wearable electronic devices, medical implants, wireless sensor nodes, and Internet-of-Things (IoT) devices have tremendous constraints on their energy consumption. Adding more functionalities onto the portable devices increases its energy consumption significantly. However, the energy capacity of the battery does not increase proportionally. Hence, to overcome the constraints on energy consumption, two main approaches are being undertaken by the designers to integrate more functionalities onto the energy-constrained systems. One approach involves reducing the inherent energy consumption of circuits, and the other involves harvesting energy from the ambient sources and utilizing it to power the circuits. In this thesis, both the approaches mentioned above are followed in developing energy-saving techniques for energy-constrained CMOS circuits and systems. Switched-capacitor-assisted power gating technique is proposed to reduce the leakage current of large digital circuits. Benefits in overall energy saving using nano-electromechanical switches (NEMS) for power gating is quantified on a system-on chip for a mobile platform made using a 14 nm gate length FinFET. For reducing the quiescent current in the analog front-end circuits, this thesis proposes a novel technique of realizing discrete-time (D-T) signal amplification using nano-electromechanical switches (NEMS). Apart from the three energy reduction techniques mentioned above, harvesting energy from mechanical vibrations using an efficient technique of power extraction from the piezoelectric transducer is proposed.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
Multistream neural architectures for cued-speech recognition using a pre-trained visual feature extractor and constrained CTC decoding
Authors:
Sanjana Sankar,
Denis Beautemps,
Thomas Hueber
Abstract:
This paper proposes a simple and effective approach for automatic recognition of Cued Speech (CS), a visual communication tool that helps people with hearing impairment to understand spoken language with the help of hand gestures that can uniquely identify the uttered phonemes in complement to lipreading. The proposed approach is based on a pre-trained hand and lips tracker used for visual feature…
▽ More
This paper proposes a simple and effective approach for automatic recognition of Cued Speech (CS), a visual communication tool that helps people with hearing impairment to understand spoken language with the help of hand gestures that can uniquely identify the uttered phonemes in complement to lipreading. The proposed approach is based on a pre-trained hand and lips tracker used for visual feature extraction and a phonetic decoder based on a multistream recurrent neural network trained with connectionist temporal classification loss and combined with a pronunciation lexicon. The proposed system is evaluated on an updated version of the French CS dataset CSF18 for which the phonetic transcription has been manually checked and corrected. With a decoding accuracy at the phonetic level of 70.88%, the proposed system outperforms our previous CNN-HMM decoder and competes with more complex baselines.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
Detecting silent data corruptions in the wild
Authors:
Harish Dattatraya Dixit,
Laura Boyle,
Gautham Vunnam,
Sneha Pendharkar,
Matt Beadon,
Sriram Sankar
Abstract:
Silent Errors within hardware devices occur when an internal defect manifests in a part of the circuit which does not have check logic to detect the incorrect circuit operation. The results of such a defect can range from flipping a single bit in a single data value, up to causing the software to execute the wrong instructions. Silent data corruptions (SDC) in hardware impact computational integri…
▽ More
Silent Errors within hardware devices occur when an internal defect manifests in a part of the circuit which does not have check logic to detect the incorrect circuit operation. The results of such a defect can range from flipping a single bit in a single data value, up to causing the software to execute the wrong instructions. Silent data corruptions (SDC) in hardware impact computational integrity for large-scale applications. Manifestations of silent errors are accelerated by datapath variations, temperature variance, and age, among other silicon factors. These errors do not leave any record or trace in system logs. As a result, silent errors stay undetected within workloads, and their effects can propagate across several services, causing problems to appear in systems far removed from the original defect. In this paper, we describe testing strategies to detect silent data corruptions within a large scale infrastructure. Given the challenging nature of the problem, we experimented with different methods for detection and mitigation. We compare and contrast two such approaches - 1. Fleetscanner (out-of-production testing) and 2. Ripple (in-production testing).We evaluate the infrastructure tradeoffs associated with the silicon testing funnel across 3+ years of production experience.
△ Less
Submitted 16 March, 2022;
originally announced March 2022.
-
Beamforming in Hybrid RIS assisted Integrated Sensing and Communication Systems
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
In this paper, we consider a hybrid reconfigurable intelligent surface (RIS) comprising of active and passive elements to aid an integrated sensing and communication (ISAC) system serving multiple users and targets. Active elements in a hybrid RIS include amplifiers and phase shifters, whereas passive elements include only phase shifters. We jointly design transmit beamformers and RIS coefficients…
▽ More
In this paper, we consider a hybrid reconfigurable intelligent surface (RIS) comprising of active and passive elements to aid an integrated sensing and communication (ISAC) system serving multiple users and targets. Active elements in a hybrid RIS include amplifiers and phase shifters, whereas passive elements include only phase shifters. We jointly design transmit beamformers and RIS coefficients, i.e., amplifier gains and phase shifts, to maximize the worst-case target illumination power while ensuring a desired signal-to-interference-plus-noise ratio for communication links and constraining the RIS noise power due to the active elements. Since this design problem is not convex, we propose a solver based on alternating optimization to design the transmit beamformers and RIS coefficients. Through numerical simulations, we demonstrate that the performance of the proposed hybrid RIS assisted ISAC system is significantly better than that of passive RIS assisted ISAC systems as well as ISAC systems without RIS even when only a small fraction of the hybrid RIS contains active elements.
△ Less
Submitted 11 March, 2022;
originally announced March 2022.
-
Anti-Factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard)
Authors:
Dániel Marx,
Govind S. Sankar,
Philipp Schepper
Abstract:
In the general AntiFactor problem, a graph $G$ is given with a set $X_v\subseteq \mathbb{N}$ of forbidden degrees for every vertex $v$ and the task is to find a set $S$ of edges such that the degree of $v$ in $S$ is not in the set $X_v$. Standard techniques (dynamic programming + fast convolution) can be used to show that if $M$ is the largest forbidden degree, then the problem can be solved in ti…
▽ More
In the general AntiFactor problem, a graph $G$ is given with a set $X_v\subseteq \mathbb{N}$ of forbidden degrees for every vertex $v$ and the task is to find a set $S$ of edges such that the degree of $v$ in $S$ is not in the set $X_v$. Standard techniques (dynamic programming + fast convolution) can be used to show that if $M$ is the largest forbidden degree, then the problem can be solved in time $(M+2)^k\cdot n^{O(1)}$ if a tree decomposition of width $k$ is given. However, significantly faster algorithms are possible if the sets $X_v$ are sparse: our main algorithmic result shows that if every vertex has at most $x$ forbidden degrees (we call this special case AntiFactor$_x$), then the problem can be solved in time $(x+1)^{O(k)}\cdot n^{O(1)}$. That is, the AntiFactor$_x$ is fixed-parameter tractable parameterized by treewidth $k$ and the maximum number $x$ of excluded degrees.
Our algorithm uses the technique of representative sets, which can be generalized to the optimization version, but (as expected) not to the counting version of the problem. In fact, we show that #AntiFactor$_1$ is already #W[1]-hard parameterized by the width of the given decomposition. Moreover, we show that, unlike for the decision version, the standard dynamic programming algorithm is essentially optimal for the counting version. Formally, for a fixed nonempty set $X$, we denote by $X$-AntiFactor the special case where every vertex $v$ has the same set $X_v=X$ of forbidden degrees. We show the following lower bound for every fixed set $X$: if there is an $ε>0$ such that #$X$-AntiFactor can be solved in time $(\max X+2-ε)^k\cdot n^{O(1)}$ on a tree decomposition of width $k$, then the Counting Strong Exponential-Time Hypothesis (#SETH) fails.
△ Less
Submitted 7 February, 2023; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Channel Estimation in MIMO Systems with One-bit Spatial Sigma-delta ADCs
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
This paper focuses on channel estimation in single-user and multi-user MIMO systems with multi-antenna base stations equipped with 1-bit spatial sigma-delta analog-to-digital converters (ADCs). A careful selection of the quantization voltage level and phase shift used in the feedback loop of 1-bit sigma-delta ADCs is critical to improve its effective resolution. We first develop a quantization noi…
▽ More
This paper focuses on channel estimation in single-user and multi-user MIMO systems with multi-antenna base stations equipped with 1-bit spatial sigma-delta analog-to-digital converters (ADCs). A careful selection of the quantization voltage level and phase shift used in the feedback loop of 1-bit sigma-delta ADCs is critical to improve its effective resolution. We first develop a quantization noise model for 1-bit spatial sigma-delta ADCs. Using the developed noise model, we then present a two-step channel estimation algorithm to estimate a multipath channel parameterized by the gains, angles of arrival (AoAs), and angles of departure (AoDs). Specifically, in the first step, the AoAs and path gains are estimated using uplink pilots, which excite all the angles uniformly. Next, in the second step, the AoDs are estimated by progressively refining uplink beams through a recursive bisection procedure. For this algorithm, we propose a technique to select the quantization voltage level and phase shift. Through numerical simulations, we demonstrate that with the proposed parametric channel estimation algorithm, MIMO systems with 1-bit spatial sigma-delta ADCs perform significantly better than those with regular 1-bit ADCs and are on par with MIMO systems with high-resolution ADCs.
△ Less
Submitted 19 September, 2021;
originally announced September 2021.
-
Matchings with Group Fairness Constraints: Online and Offline Algorithms
Authors:
Govind S. Sankar,
Anand Louis,
Meghana Nasre,
Prajakta Nimbhorkar
Abstract:
We consider the problem of assigning items to platforms in the presence of group fairness constraints. In the input, each item belongs to certain categories, called classes in this paper. Each platform specifies the group fairness constraints through an upper bound on the number of items it can serve from each class. Additionally, each platform also has an upper bound on the total number of items…
▽ More
We consider the problem of assigning items to platforms in the presence of group fairness constraints. In the input, each item belongs to certain categories, called classes in this paper. Each platform specifies the group fairness constraints through an upper bound on the number of items it can serve from each class. Additionally, each platform also has an upper bound on the total number of items it can serve. The goal is to assign items to platforms so as to maximize the number of items assigned while satisfying the upper bounds of each class. In some cases, there is a revenue associated with matching an item to a platform, then the goal is to maximize the revenue generated.
This problem models several important real-world problems like ad-auctions, scheduling, resource allocations, school choice etc.We also show an interesting connection to computing a generalized maximum independent set on hypergraphs and ranking items under group fairness constraints.
We show that if the classes are arbitrary, then the problem is NP-hard and has a strong inapproximability. We consider the problem in both online and offline settings under natural restrictions on the classes. Under these restrictions, the problem continues to remain NP-hard but admits approximation algorithms with small approximation factors. We also implement some of the algorithms. Our experiments show that the algorithms work well in practice both in terms of efficiency and the number of items that get assigned to some platform.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
Degrees and Gaps: Tight Complexity Results of General Factor Problems Parameterized by Treewidth and Cutwidth
Authors:
Dániel Marx,
Govind S. Sankar,
Philipp Schepper
Abstract:
For the General Factor problem we are given an undirected graph $G$ and for each vertex $v\in V(G)$ a finite set $B_v$ of non-negative integers. The task is to decide if there is a subset $S\subseteq E(G)$ such that $deg_S(v)\in B_v$ for all vertices $v$ of $G$. The maxgap of a finite integer set $B$ is the largest $d\ge 0$ such that there is an $a\ge 0$ with $[a,a+d+1]\cap B=\{a,a+d+1\}$. Cornuéj…
▽ More
For the General Factor problem we are given an undirected graph $G$ and for each vertex $v\in V(G)$ a finite set $B_v$ of non-negative integers. The task is to decide if there is a subset $S\subseteq E(G)$ such that $deg_S(v)\in B_v$ for all vertices $v$ of $G$. The maxgap of a finite integer set $B$ is the largest $d\ge 0$ such that there is an $a\ge 0$ with $[a,a+d+1]\cap B=\{a,a+d+1\}$. Cornuéjols (1988) showed that if the maxgap of all sets $B_v$ is at most 1, then the decision version of General Factor is poly-time solvable. Dudycz and Paluch (2018) extended this result for the minimization and maximization versions. Using convolution techniques from van Rooij (2020), we improve upon the previous algorithm by Arulselvan et al. (2018) and present an algorithm counting the number of solutions of a certain size in time $O^*((M+1)^k)$, given a tree decomposition of width $k$, where $M=\max_v \max B_v$.
We prove that this algorithm is essentially optimal for all cases that are not polynomial time solvable for the decision, minimization or maximization versions. We prove that such improvements are not possible even for $B$-Factor, which is General Factor on graphs where all sets $B_v$ agree with the fixed set $B$. We show that for every fixed $B$ where the problem is NP-hard, our new algorithm cannot be significantly improved: assuming the Strong Exponential Time Hypothesis (SETH), no algorithm can solve $B$-Factor in time $O^*((\max B+1-ε)^k)$ for any $ε>0$. We extend this bound to the counting version of $B$-Factor for arbitrary, non-trivial sets $B$, assuming #SETH.
We also investigate the parameterization of the problem by cutwidth. Unlike for treewidth, a larger set $B$ does not make the problem harder: Given a linear layout of width $k$ we give a $O^*(2^k)$ algorithm for any $B$ and provide a matching lower bound that this is optimal for the NP-hard cases.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Joint Communication and Radar Sensing with Reconfigurable Intelligent Surfaces
Authors:
R. S. Prasobh Sankar,
Battu Deepak,
Sundeep Prabhakar Chepuri
Abstract:
In this paper, we use a reconfigurable intelligent surface (RIS) to enhance the radar sensing and communication capabilities of a mmWave dual function radar communication system. To simultaneously localize the target and to serve the user, we propose to adaptively partition the RIS by reserving separate RIS elements for sensing and communication. We design a multi-stage hierarchical codebook to lo…
▽ More
In this paper, we use a reconfigurable intelligent surface (RIS) to enhance the radar sensing and communication capabilities of a mmWave dual function radar communication system. To simultaneously localize the target and to serve the user, we propose to adaptively partition the RIS by reserving separate RIS elements for sensing and communication. We design a multi-stage hierarchical codebook to localize the target while ensuring a strong communication link to the user. We also present a method to choose the number of times to transmit the same beam in each stage to achieve a desired target localization probability of error. The proposed algorithm typically requires fewer transmissions than an exhaustive search scheme to achieve a desired target localization probability of error. Furthermore, the average spectral efficiency of the user with the proposed algorithm is found to be comparable to that of a RIS-assisted MIMO communication system without sensing capabilities and is much better than that of traditional MIMO systems without RIS.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Silent Data Corruptions at Scale
Authors:
Harish Dattatraya Dixit,
Sneha Pendharkar,
Matt Beadon,
Chris Mason,
Tejasvi Chakravarthy,
Bharath Muthiah,
Sriram Sankar
Abstract:
Silent Data Corruption (SDC) can have negative impact on large-scale infrastructure services. SDCs are not captured by error reporting mechanisms within a Central Processing Unit (CPU) and hence are not traceable at the hardware level. However, the data corruptions propagate across the stack and manifest as application-level problems. These types of errors can result in data loss and can require m…
▽ More
Silent Data Corruption (SDC) can have negative impact on large-scale infrastructure services. SDCs are not captured by error reporting mechanisms within a Central Processing Unit (CPU) and hence are not traceable at the hardware level. However, the data corruptions propagate across the stack and manifest as application-level problems. These types of errors can result in data loss and can require months of debug engineering time. In this paper, we describe common defect types observed in silicon manufacturing that leads to SDCs. We discuss a real-world example of silent data corruption within a datacenter application. We provide the debug flow followed to root-cause and triage faulty instructions within a CPU using a case study, as an illustration on how to debug this class of errors. We provide a high-level overview of the mitigations to reduce the risk of silent data corruptions within a large production fleet. In our large-scale infrastructure, we have run a vast library of silent error test scenarios across hundreds of thousands of machines in our fleet. This has resulted in hundreds of CPUs detected for these errors, showing that SDCs are a systemic issue across generations. We have monitored SDCs for a period longer than 18 months. Based on this experience, we determine that reducing silent data corruptions requires not only hardware resiliency and production detection mechanisms, but also robust fault-tolerant software architectures.
△ Less
Submitted 22 February, 2021;
originally announced February 2021.
-
Channel Estimation for RIS-assisted Millimeter-wave MIMO Systems
Authors:
Battu Deepak,
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
Channel estimation in reconfigurable intelligent surface (RIS) assisted multiple input multiple output (MIMO) communication systems is challenging as pilots cannot be decoded at or transmitted from a RIS with only passive elements. We assume an angular model for the line-of-sight channel between the user equipment (UE) and the RIS and between the RIS and the base station (BS) with no direct path b…
▽ More
Channel estimation in reconfigurable intelligent surface (RIS) assisted multiple input multiple output (MIMO) communication systems is challenging as pilots cannot be decoded at or transmitted from a RIS with only passive elements. We assume an angular model for the line-of-sight channel between the user equipment (UE) and the RIS and between the RIS and the base station (BS) with no direct path between the UE and BS. In this letter, assuming that we can compute the RIS-BS channel (up to a complex path gain) from their known locations, we first discuss the ambiguity involved in estimating the UE-RIS channel. We propose a multiple channel sounding procedure in which we observe the channel through different RIS phase shifts and present an algorithm for channel estimation to resolve this ambiguity. Through simulations, we show that the proposed method is comparable to an oracle estimator, which perfectly knows the BS, UE, and RIS locations.
△ Less
Submitted 19 March, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Millimeter Wave MIMO Channel Estimation with 1-bit Spatial Sigma-delta Analog-to-Digital Converters
Authors:
R. S. Prasobh Sankar,
Sundeep Prabhakar Chepuri
Abstract:
This paper focuses on channel estimation for mmWave MIMO systems with 1-bit spatial sigma-delta analog-to-digital converters (ADCs). The channel estimation performance with 1-bit spatial sigma-delta ADCs depends on the quantization noise modeling. Therefore, we present a new method for modeling the quantization noise by leveraging the deterministic input-output relation of the 1-bit spatial sigma-…
▽ More
This paper focuses on channel estimation for mmWave MIMO systems with 1-bit spatial sigma-delta analog-to-digital converters (ADCs). The channel estimation performance with 1-bit spatial sigma-delta ADCs depends on the quantization noise modeling. Therefore, we present a new method for modeling the quantization noise by leveraging the deterministic input-output relation of the 1-bit spatial sigma-delta ADC. Using this new noise model, we propose an algorithm for channel estimation for a narrowband single-user mmWave line-of-sight MIMO system by determining the unknown angles and path attenuation that characterize the flat fading channel. Through simulations, we demonstrate that the performance of the developed method is comparable to the traditional analog systems and significantly better than the conventional 1-bit quantized systems.
△ Less
Submitted 23 October, 2020;
originally announced October 2020.
-
Fast Dimensional Analysis for Root Cause Investigation in a Large-Scale Service Environment
Authors:
Fred Lin,
Keyur Muzumdar,
Nikolay Pavlovich Laptev,
Mihai-Valentin Curelea,
Seunghak Lee,
Sriram Sankar
Abstract:
Root cause analysis in a large-scale production environment is challenging due to the complexity of services running across global data centers. Due to the distributed nature of a large-scale system, the various hardware, software, and tooling logs are often maintained separately, making it difficult to review the logs jointly for understanding production issues. Another challenge in reviewing the…
▽ More
Root cause analysis in a large-scale production environment is challenging due to the complexity of services running across global data centers. Due to the distributed nature of a large-scale system, the various hardware, software, and tooling logs are often maintained separately, making it difficult to review the logs jointly for understanding production issues. Another challenge in reviewing the logs for identifying issues is the scale - there could easily be millions of entities, each described by hundreds of features. In this paper we present a fast dimensional analysis framework that automates the root cause analysis on structured logs with improved scalability.
We first explore item-sets, i.e. combinations of feature values, that could identify groups of samples with sufficient support for the target failures using the Apriori algorithm and a subsequent improvement, FP-Growth. These algorithms were designed for frequent item-set mining and association rule learning over transactional databases. After applying them on structured logs, we select the item-sets that are most unique to the target failures based on lift. We propose pre-processing steps with the use of a large-scale real-time database and post-processing techniques and parallelism to further speed up the analysis and improve interpretability, and demonstrate that such optimization is necessary for handling large-scale production datasets. We have successfully rolled out this approach for root cause investigation purposes in a large-scale infrastructure. We also present the setup and results from multiple production use cases in this paper.
△ Less
Submitted 6 February, 2020; v1 submitted 31 October, 2019;
originally announced November 2019.
-
Model-based active learning to detect isometric deformable objects in the wild with deep architectures
Authors:
Shrinivasan Sankar,
Adrien Bartoli
Abstract:
In the recent past, algorithms based on Convolutional Neural Networks (CNNs) have achieved significant milestones in object recognition. With large examples of each object class, standard datasets train well for inter-class variability. However, gathering sufficient data to train for a particular instance of an object within a class is impractical. Furthermore, quantitatively assessing the imaging…
▽ More
In the recent past, algorithms based on Convolutional Neural Networks (CNNs) have achieved significant milestones in object recognition. With large examples of each object class, standard datasets train well for inter-class variability. However, gathering sufficient data to train for a particular instance of an object within a class is impractical. Furthermore, quantitatively assessing the imaging conditions for each image in a given dataset is not feasible. By generating sufficient images with known imaging conditions, we study to what extent CNNs can cope with hard imaging conditions for instance-level recognition in an active learning regime.
Leveraging powerful rendering techniques to achieve instance-level detection, we present results of training three state-of-the-art object detection algorithms namely, Fast R-CNN, Faster R-CNN and YOLO9000, for hard imaging conditions imposed into the scene by rendering. Our extensive experiments produce a mean Average Precision score of 0.92 on synthetic images and 0.83 on real images using the best performing Faster R-CNN. We show for the first time how well detection algorithms based on deep architectures fare for each hard imaging condition studied.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Recent Advances in Recurrent Neural Networks
Authors:
Hojjat Salehinejad,
Sharan Sankar,
Joseph Barfett,
Errol Colak,
Shahrokh Valaee
Abstract:
Recurrent neural networks (RNNs) are capable of learning features and long term dependencies from sequential and time-series data. The RNNs have a stack of non-linear units where at least one connection between units forms a directed cycle. A well-trained RNN can model any dynamical system; however, training RNNs is mostly plagued by issues in learning long-term dependencies. In this paper, we pre…
▽ More
Recurrent neural networks (RNNs) are capable of learning features and long term dependencies from sequential and time-series data. The RNNs have a stack of non-linear units where at least one connection between units forms a directed cycle. A well-trained RNN can model any dynamical system; however, training RNNs is mostly plagued by issues in learning long-term dependencies. In this paper, we present a survey on RNNs and several new advances for newcomers and professionals in the field. The fundamentals and recent advances are explained and the research challenges are introduced.
△ Less
Submitted 22 February, 2018; v1 submitted 28 December, 2017;
originally announced January 2018.
-
A Novel Method of Discrete-Time Amplification using NEMS Devices
Authors:
Sivaneswaran Sankar,
Maryam Shojaei Baghini,
Valipe Ramgopal Rao
Abstract:
In this paper we propose a novel method of realizing discrete-time (D-T) signal amplification using Nano-Electro-Mechanical (NEMS) devices. The amplifier uses mechanical devices instead of traditional solid-state circuits. The proposed NEMS-based D-T amplifier provides high gain and operate on a wide dynamic range of signals, consuming only a few micro watts of power. The proposed concept is subse…
▽ More
In this paper we propose a novel method of realizing discrete-time (D-T) signal amplification using Nano-Electro-Mechanical (NEMS) devices. The amplifier uses mechanical devices instead of traditional solid-state circuits. The proposed NEMS-based D-T amplifier provides high gain and operate on a wide dynamic range of signals, consuming only a few micro watts of power. The proposed concept is subsequently verified using Verilog-A model of the NEMS device. Modifications in the proposed amplifier to suit different specifications are also presented.
△ Less
Submitted 22 May, 2018; v1 submitted 18 February, 2017;
originally announced February 2017.
-
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs
Authors:
Sharmila Sankar,
Dr. V. Sankaranarayanan
Abstract:
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols which broadcasts control packets to discover routes to the destination nodes, generate a high number of broadcast packets in a larger networks causing contention and collision. We propose an…
▽ More
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols which broadcasts control packets to discover routes to the destination nodes, generate a high number of broadcast packets in a larger networks causing contention and collision. We propose an efficient route discovery protocol, which reduces the number of broadcast packet, using controlled flooding technique. The simulation results show that the proposed probabilistic flooding decreases the number of control packets floating in the network during route discovery phase, without lowering the success ratio of path discoveries. Furthermore, the proposed method adapts to the normal network conditions. The results show that up to 70% of control packet traffic is saved in route discovery phase when the network is denser.
△ Less
Submitted 30 September, 2010;
originally announced September 2010.