-
Lorecast: Layout-Aware Performance and Power Forecasting from Natural Language
Authors:
Runzhi Wang,
Prianka Sengupta,
Cristhian Roman-Vicharra,
Yiran Chen,
Jiang Hu
Abstract:
In chip design planning, obtaining reliable performance and power forecasts for various design options is of critical importance. Traditionally, this involves using system-level models, which often lack accuracy, or trial synthesis, which is both labor-intensive and time-consuming. We introduce a new methodology, called Lorecast, which accepts English prompts as input to rapidly generate layout-aw…
▽ More
In chip design planning, obtaining reliable performance and power forecasts for various design options is of critical importance. Traditionally, this involves using system-level models, which often lack accuracy, or trial synthesis, which is both labor-intensive and time-consuming. We introduce a new methodology, called Lorecast, which accepts English prompts as input to rapidly generate layout-aware performance and power estimates. This approach bypasses the need for HDL code development and synthesis, making it both fast and user-friendly. Experimental results demonstrate that Lorecast achieves accuracy within a few percent of error compared to post-layout analysis, while significantly reducing turnaround time.
△ Less
Submitted 22 April, 2025; v1 submitted 14 February, 2025;
originally announced March 2025.
-
Finding Influential Cores via Normalized Ricci Flows in Directed and Undirected Hypergraphs with Applications
Authors:
Prithviraj Sengupta,
Nazanin Azarhooshang,
Reka Albert,
Bhaskar DasGupta
Abstract:
Many biological and social systems are naturally represented as edge-weighted directed or undirected hypergraphs since they exhibit group interactions involving three or more system units as opposed to pairwise interactions that can be incorporated in graph-theoretic representations. However, finding influential cores in hypergraphs is still not as extensively studied as their graph-theoretic coun…
▽ More
Many biological and social systems are naturally represented as edge-weighted directed or undirected hypergraphs since they exhibit group interactions involving three or more system units as opposed to pairwise interactions that can be incorporated in graph-theoretic representations. However, finding influential cores in hypergraphs is still not as extensively studied as their graph-theoretic counter-parts. To this end, we develop and implement a hypergraph-curvature guided discrete time diffusion process with suitable topological surgeries and edge-weight re-normalization procedures for both undirected and directed weighted hypergraphs to find influential cores. We successfully apply our framework for directed hypergraphs to seven metabolic hypergraphs and our framework for undirected hypergraphs to two social (co-authorship) hypergraphs to find influential cores, thereby demonstrating the practical feasibility of our approach. In addition, we prove a theorem showing that a certain edge weight re-normalization procedure in a prior research work for Ricci flows for edge-weighted graphs has the undesirable outcome of modifying the edge-weights to negative numbers, thereby rendering the procedure impossible to use. To the best of our knowledge, this seems to be one of the first articles that formulates algorithmic approaches for finding core(s) of (weighted or unweighted) directed hypergraphs.
△ Less
Submitted 22 February, 2025;
originally announced February 2025.
-
Privacy-preserving transactive energy systems: Key topics and open research challenges
Authors:
Daniel Gerbi Duguma,
Juliana Zhang,
Meysam Aboutalebi,
Shiliang Zhang,
Catherine Banet,
Cato Bjørkli,
Chinmayi Baramashetru,
Frank Eliassen,
Hui Zhang,
Jonathan Muringani,
Josef Noll,
Knut Inge Fostervold,
Lars Böcker,
Lee Andrew Bygrave,
Matin Bagherpour,
Maunya Doroudi Moghadam,
Olaf Owe,
Poushali Sengupta,
Roman Vitenberg,
Sabita Maharjan,
Thiago Garrett,
Yushuai Li,
Zhengyu Shan
Abstract:
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover resear…
▽ More
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover research topics in energy technology and energy informatics, energy law, data law, energy market and socio-psychology that are relevant to the seamless integration of renewable energy resources and the transactive energy systems-in smart microgrids-focusing on distributed frameworks such as peer-to-peer (P2P) energy trading. We clarify issues, identify barriers, and suggest possible solutions to open questions in diversified topics, such as block-chain interoperability, consumer privacy and data sharing, and participation incentivization. Furthermore, we also elaborate challenges associated with cross-disciplinary collaboration and coordination for transactive energy systems, and enumerate the lessons learned from our work so far.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
A Comparative Study of Portfolio Optimization Methods for the Indian Stock Market
Authors:
Jaydip Sen,
Arup Dasgupta,
Partha Pratim Sengupta,
Sayantani Roy Choudhury
Abstract:
This chapter presents a comparative study of the three portfolio optimization methods, MVP, HRP, and HERC, on the Indian stock market, particularly focusing on the stocks chosen from 15 sectors listed on the National Stock Exchange of India. The top stocks of each cluster are identified based on their free-float market capitalization from the report of the NSE published on July 1, 2022 (NSE Websit…
▽ More
This chapter presents a comparative study of the three portfolio optimization methods, MVP, HRP, and HERC, on the Indian stock market, particularly focusing on the stocks chosen from 15 sectors listed on the National Stock Exchange of India. The top stocks of each cluster are identified based on their free-float market capitalization from the report of the NSE published on July 1, 2022 (NSE Website). For each sector, three portfolios are designed on stock prices from July 1, 2019, to June 30, 2022, following three portfolio optimization approaches. The portfolios are tested over the period from July 1, 2022, to June 30, 2023. For the evaluation of the performances of the portfolios, three metrics are used. These three metrics are cumulative returns, annual volatilities, and Sharpe ratios. For each sector, the portfolios that yield the highest cumulative return, the lowest volatility, and the maximum Sharpe Ratio over the training and the test periods are identified.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Predictive Maintenance of Armoured Vehicles using Machine Learning Approaches
Authors:
Prajit Sengupta,
Anant Mehta,
Prashant Singh Rana
Abstract:
Armoured vehicles are specialized and complex pieces of machinery designed to operate in high-stress environments, often in combat or tactical situations. This study proposes a predictive maintenance-based ensemble system that aids in predicting potential maintenance needs based on sensor data collected from these vehicles. The proposed model's architecture involves various models such as Light Gr…
▽ More
Armoured vehicles are specialized and complex pieces of machinery designed to operate in high-stress environments, often in combat or tactical situations. This study proposes a predictive maintenance-based ensemble system that aids in predicting potential maintenance needs based on sensor data collected from these vehicles. The proposed model's architecture involves various models such as Light Gradient Boosting, Random Forest, Decision Tree, Extra Tree Classifier and Gradient Boosting to predict the maintenance requirements of the vehicles accurately. In addition, K-fold cross validation, along with TOPSIS analysis, is employed to evaluate the proposed ensemble model's stability. The results indicate that the proposed system achieves an accuracy of 98.93%, precision of 99.80% and recall of 99.03%. The algorithm can effectively predict maintenance needs, thereby reducing vehicle downtime and improving operational efficiency. Through comparisons between various algorithms and the suggested ensemble, this study highlights the potential of machine learning-based predictive maintenance solutions.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Benchmarking the Effectiveness of Classification Algorithms and SVM Kernels for Dry Beans
Authors:
Anant Mehta,
Prajit Sengupta,
Divisha Garg,
Harpreet Singh,
Yosi Shacham Diamand
Abstract:
Plant breeders and agricultural researchers can increase crop productivity by identifying desirable features, disease resistance, and nutritional content by analysing the Dry Bean dataset. This study analyses and compares different Support Vector Machine (SVM) classification algorithms, namely linear, polynomial, and radial basis function (RBF), along with other popular classification algorithms.…
▽ More
Plant breeders and agricultural researchers can increase crop productivity by identifying desirable features, disease resistance, and nutritional content by analysing the Dry Bean dataset. This study analyses and compares different Support Vector Machine (SVM) classification algorithms, namely linear, polynomial, and radial basis function (RBF), along with other popular classification algorithms. The analysis is performed on the Dry Bean Dataset, with PCA (Principal Component Analysis) conducted as a preprocessing step for dimensionality reduction. The primary evaluation metric used is accuracy, and the RBF SVM kernel algorithm achieves the highest Accuracy of 93.34%, Precision of 92.61%, Recall of 92.35% and F1 Score as 91.40%. Along with adept visualization and empirical analysis, this study offers valuable guidance by emphasizing the importance of considering different SVM algorithms for complex and non-linear structured datasets.
△ Less
Submitted 15 July, 2023;
originally announced July 2023.
-
Balancing Explainability-Accuracy of Complex Models
Authors:
Poushali Sengupta,
Yan Zhang,
Sabita Maharjan,
Frank Eliassen
Abstract:
Explainability of AI models is an important topic that can have a significant impact in all domains and applications from autonomous driving to healthcare. The existing approaches to explainable AI (XAI) are mainly limited to simple machine learning algorithms, and the research regarding the explainability-accuracy tradeoff is still in its infancy especially when we are concerned about complex mac…
▽ More
Explainability of AI models is an important topic that can have a significant impact in all domains and applications from autonomous driving to healthcare. The existing approaches to explainable AI (XAI) are mainly limited to simple machine learning algorithms, and the research regarding the explainability-accuracy tradeoff is still in its infancy especially when we are concerned about complex machine learning techniques like neural networks and deep learning (DL). In this work, we introduce a new approach for complex models based on the co-relation impact which enhances the explainability considerably while also ensuring the accuracy at a high level. We propose approaches for both scenarios of independent features and dependent features. In addition, we study the uncertainty associated with features and output. Furthermore, we provide an upper bound of the computation complexity of our proposed approach for the dependent features. The complexity bound depends on the order of logarithmic of the number of observations which provides a reliable result considering the higher dimension of dependent feature space with a smaller number of observations.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Fairly Private Through Group Tagging and Relation Impact
Authors:
Poushali Sengupta,
Subhankar Mishra
Abstract:
Privacy and Fairness both are very important nowadays. For most of the cases in the online service providing system, users have to share their personal information with the organizations. In return, the clients not only demand a high privacy guarantee to their sensitive data but also expected to be treated fairly irrespective of their age, gender, religion, race, skin color, or other sensitive pro…
▽ More
Privacy and Fairness both are very important nowadays. For most of the cases in the online service providing system, users have to share their personal information with the organizations. In return, the clients not only demand a high privacy guarantee to their sensitive data but also expected to be treated fairly irrespective of their age, gender, religion, race, skin color, or other sensitive protected attributes. Our work introduces a novel architecture that is balanced among the privacy-utility-fairness trade-off. The proposed mechanism applies Group Tagging Method and Fairly Iterative Shuffling (FIS) that amplifies privacy through random shuffling and prevents linkage attack. The algorithm introduces a fair classification problem by Relation Impact based on Equalized Minimal FPR-FNR among the protected tagged group. For the count report generation, the aggregator uses TF-IDF to add noise for providing longitudinal Differential Privacy guarantee. Lastly, the mechanism boosts the utility through risk minimization function and obtain the optimal privacy-utility budget of the system. In our work, we have done a case study on gender equality in the admission system and helps to obtain a satisfying result which implies that the proposed architecture achieves the group fairness and optimal privacy-utility trade-off for both the numerical and decision making Queries.
△ Less
Submitted 15 May, 2021;
originally announced May 2021.
-
FLaPS: Federated Learning and Privately Scaling
Authors:
Sudipta Paul,
Poushali Sengupta,
Subhankar Mishra
Abstract:
Federated learning (FL) is a distributed learning process where the model (weights and checkpoints) is transferred to the devices that posses data rather than the classical way of transferring and aggregating the data centrally. In this way, sensitive data does not leave the user devices. FL uses the FedAvg algorithm, which is trained in the iterative model averaging way, on the non-iid and unbala…
▽ More
Federated learning (FL) is a distributed learning process where the model (weights and checkpoints) is transferred to the devices that posses data rather than the classical way of transferring and aggregating the data centrally. In this way, sensitive data does not leave the user devices. FL uses the FedAvg algorithm, which is trained in the iterative model averaging way, on the non-iid and unbalanced distributed data, without depending on the data quantity. Some issues with the FL are, 1) no scalability, as the model is iteratively trained over all the devices, which amplifies with device drops; 2) security and privacy trade-off of the learning process still not robust enough and 3) overall communication efficiency and the cost are higher. To mitigate these challenges we present Federated Learning and Privately Scaling (FLaPS) architecture, which improves scalability as well as the security and privacy of the system. The devices are grouped into clusters which further gives better privacy scaled turn around time to finish a round of training. Therefore, even if a device gets dropped in the middle of training, the whole process can be started again after a definite amount of time. The data and model both are communicated using differentially private reports with iterative shuffling which provides a better privacy-utility trade-off. We evaluated FLaPS on MNIST, CIFAR10, and TINY-IMAGENET-200 dataset using various CNN models. Experimental results prove FLaPS to be an improved, time and privacy scaled environment having better and comparable after-learning-parameters with respect to the central and FL models.
△ Less
Submitted 13 September, 2020;
originally announced September 2020.
-
Learning With Differential Privacy
Authors:
Poushali Sengupta,
Sudipta Paul,
Subhankar Mishra
Abstract:
The leakage of data might have been an extreme effect on the personal level if it contains sensitive information. Common prevention methods like encryption-decryption, endpoint protection, intrusion detection system are prone to leakage. Differential privacy comes to the rescue with a proper promise of protection against leakage, as it uses a randomized response technique at the time of collection…
▽ More
The leakage of data might have been an extreme effect on the personal level if it contains sensitive information. Common prevention methods like encryption-decryption, endpoint protection, intrusion detection system are prone to leakage. Differential privacy comes to the rescue with a proper promise of protection against leakage, as it uses a randomized response technique at the time of collection of the data which promises strong privacy with better utility. Differential privacy allows one to access the forest of data by describing their pattern of groups without disclosing any individual trees. The current adaption of differential privacy by leading tech companies and academia encourages authors to explore the topic in detail. The different aspects of differential privacy, it's application in privacy protection and leakage of information, a comparative discussion, on the current research approaches in this field, its utility in the real world as well as the trade-offs - will be discussed.
△ Less
Submitted 11 June, 2020; v1 submitted 9 June, 2020;
originally announced June 2020.
-
BUDS: Balancing Utility and Differential Privacy by Shuffling
Authors:
Poushali Sengupta,
Sudipta Paul,
Subhankar Mishra
Abstract:
Balancing utility and differential privacy by shuffling or \textit{BUDS} is an approach towards crowd-sourced, statistical databases, with strong privacy and utility balance using differential privacy theory. Here, a novel algorithm is proposed using one-hot encoding and iterative shuffling with the loss estimation and risk minimization techniques, to balance both the utility and privacy. In this…
▽ More
Balancing utility and differential privacy by shuffling or \textit{BUDS} is an approach towards crowd-sourced, statistical databases, with strong privacy and utility balance using differential privacy theory. Here, a novel algorithm is proposed using one-hot encoding and iterative shuffling with the loss estimation and risk minimization techniques, to balance both the utility and privacy. In this work, after collecting one-hot encoded data from different sources and clients, a step of novel attribute shuffling technique using iterative shuffling (based on the query asked by the analyst) and loss estimation with an updation function and risk minimization produces a utility and privacy balanced differential private report. During empirical test of balanced utility and privacy, BUDS produces $ε= 0.02$ which is a very promising result. Our algorithm maintains a privacy bound of $ε= ln [t/((n_1 - 1)^S)]$ and loss bound of $c' \bigg|e^{ln[t/((n_1 - 1)^S)]} - 1\bigg|$.
△ Less
Submitted 7 June, 2020;
originally announced June 2020.
-
Automated Management of Pothole related Disasters Using Image Processing and Geotagging
Authors:
Madhura Katageri,
Manisha Mandal,
Mansi Gandhi,
Navin Koregaonkar,
Prof. Sharmila Sengupta
Abstract:
Potholes though seem inconsequential, may cause accidents resulting in loss of human life. In this paper, we present an automated system to efficiently manage the potholes in a ward by deploying geotagging and image processing techniques that overcomes the drawbacks associated with the existing survey-oriented systems. Image processing is used for identification of target pothole regions in the 2D…
▽ More
Potholes though seem inconsequential, may cause accidents resulting in loss of human life. In this paper, we present an automated system to efficiently manage the potholes in a ward by deploying geotagging and image processing techniques that overcomes the drawbacks associated with the existing survey-oriented systems. Image processing is used for identification of target pothole regions in the 2D images using edge detection and morphological image processing operations. A method is developed to accurately estimate the dimensions of the potholes from their images, analyze their area and depth, estimate the quantity of filling material required and therefore enabling pothole attendance on a priority basis. This will further enable the government official to have a fully automated system for effectively managing pothole related disasters.
△ Less
Submitted 8 January, 2016;
originally announced October 2016.
-
Development of Disciplined Interpretation Using Computational Modeling in the Elementary Science Classroom
Authors:
Amy Voss Farris,
Amanda Catherine Dickes,
Pratim Sengupta
Abstract:
Studies of scientists building models show that the development of scientific models involves a great deal of subjectivity. However, science as experienced in school settings typically emphasizes an overly objective and rationalistic view. In this paper, we argue for focusing on the development of disciplined interpretation as an epistemic and representational practice that progressively deepens s…
▽ More
Studies of scientists building models show that the development of scientific models involves a great deal of subjectivity. However, science as experienced in school settings typically emphasizes an overly objective and rationalistic view. In this paper, we argue for focusing on the development of disciplined interpretation as an epistemic and representational practice that progressively deepens students' computational modeling in science by valuing, rather than deemphasizing, the subjective nature of the experience of modeling. We report results from a study in which fourth grade children engaged in computational modeling throughout the academic year. We present three salient themes that characterize the development of students' disciplined interpretations in terms of their development of computational modeling as a way of seeing and doing science.
△ Less
Submitted 22 February, 2016;
originally announced February 2016.
-
Modeling Oligarchs' Campaign Donations and Ideological Preferences with Simulated Agent-Based Spatial Elections
Authors:
Mason Wright,
Pratim Sengupta
Abstract:
In this paper, we investigate the interactions among oligarchs, political parties, and voters using an agent-based modeling approach. We introduce the OLIGO model, which is based on the spatial model of democracy, where voters have positions in a policy space and vote for the party that appears closest to them, and parties move in policy space to seek more votes. We extend the existing literature…
▽ More
In this paper, we investigate the interactions among oligarchs, political parties, and voters using an agent-based modeling approach. We introduce the OLIGO model, which is based on the spatial model of democracy, where voters have positions in a policy space and vote for the party that appears closest to them, and parties move in policy space to seek more votes. We extend the existing literature on agent-based models of political economy in the following manner: (1) by introducing a new class of agents- oligarchs - that represent leaders of firms in a common industry who lobby for beneficial subsidies through campaign donations; and (2) by investigating the effects of ideological preferences of the oligarchs on legislative action. We test hypotheses from the literature in political economics on the behavior of oligarchs and political parties as they interact, under conditions of imperfect information and bounded rationality. Our key results indicate that (1) oligarchs tend to donate less to political campaigns when the parties are more resistant to changing their policies, or when voters are more informed; and (2) if Oligarchs donate to parties based on a combination of ideological and profit motivations, Oligarchs will tend to donate at a lower equilibrium level, due to the influence of lost profits. We validate these outcomes via comparisons to real world polling data on changes in party support over time.
△ Less
Submitted 18 December, 2014; v1 submitted 26 October, 2013;
originally announced October 2013.