-
R-VLM: Region-Aware Vision Language Model for Precise GUI Grounding
Authors:
Joonhyung Park,
Peng Tang,
Sagnik Das,
Srikar Appalaraju,
Kunwar Yashraj Singh,
R. Manmatha,
Shabnam Ghadar
Abstract:
Visual agent models for automating human activities on Graphical User Interfaces (GUIs) have emerged as a promising research direction, driven by advances in large Vision Language Models (VLMs). A critical challenge in GUI automation is the precise grounding of interface elements across diverse platforms. Existing vision-only GUI agents directly ground elements from large and cluttered screenshots…
▽ More
Visual agent models for automating human activities on Graphical User Interfaces (GUIs) have emerged as a promising research direction, driven by advances in large Vision Language Models (VLMs). A critical challenge in GUI automation is the precise grounding of interface elements across diverse platforms. Existing vision-only GUI agents directly ground elements from large and cluttered screenshots, requiring them to process substantial irrelevant information that compromises their accuracy. In addition, these approaches typically employ basic cross-entropy loss for learning grounding objectives, which fails to effectively capture grounding quality compared to established object detection metrics like Intersection-over-Union (IoU). To address these issues, we introduce R-VLM, a novel GUI grounding approach that leverages zoomed-in region proposals for precise element localization. We also propose an IoU-aware objective function that facilitates model convergence toward high IoU predictions. Our approach bridges the gap between VLMs and conventional object detection techniques, improving the state-of-the-art grounding accuracy by 13% across diverse GUI platforms on the GUI grounding benchmarks ScreenSpot and AgentStudio. In addition, our R-VLM approach shows 3.2-9.7% absolute accuracy improvements in GUI navigation tasks on the AITW and Mind2Web benchmarks.
△ Less
Submitted 8 July, 2025;
originally announced July 2025.
-
An Iterative Algorithm to Symbolically Derive Generalized n-Trailer Vehicle Kinematics
Authors:
Yuvraj Singh,
Adithya Jayakumar,
Giorgio Rizzoni
Abstract:
Articulated multi-axle vehicles are interesting from a control-theoretic perspective due to their peculiar kinematic offtracking characteristics, instability modes, and singularities. Holonomic and nonholonomic constraints affecting the kinematic behavior is investigated in order to develop control-oriented kinematic models representative of these peculiarities. Then, the structure of these constr…
▽ More
Articulated multi-axle vehicles are interesting from a control-theoretic perspective due to their peculiar kinematic offtracking characteristics, instability modes, and singularities. Holonomic and nonholonomic constraints affecting the kinematic behavior is investigated in order to develop control-oriented kinematic models representative of these peculiarities. Then, the structure of these constraints is exploited to develop an iterative algorithm to symbolically derive yaw-plane kinematic models of generalized $n$-trailer articulated vehicles with an arbitrary number of multi-axle vehicle units. A formal proof is provided for the maximum number of kinematic controls admissible to a large-scale generalized articulated vehicle system, which leads to a generalized Ackermann steering law for $n$-trailer systems. Moreover, kinematic data collected from a test vehicle is used to validate the kinematic models and, to understand the rearward yaw rate amplification behavior of the vehicle pulling multiple simulated trailers.
△ Less
Submitted 31 March, 2025;
originally announced April 2025.
-
Semicustom Frontend VLSI Design and Analysis of a 32-bit Brent-Kung Adder in Cadence Suite
Authors:
Yashvardhan Singh
Abstract:
Adders are fundamental components in digital circuits, playing a crucial role in arithmetic operations within computing systems and many other applications. This paper focuses on the design and simulation of a 32-bit Brent-Kung parallel prefix adder, which is recognized for its efficient carry propagation and logarithmic delay characteristics. The Brent-Kung architecture balances computational spe…
▽ More
Adders are fundamental components in digital circuits, playing a crucial role in arithmetic operations within computing systems and many other applications. This paper focuses on the design and simulation of a 32-bit Brent-Kung parallel prefix adder, which is recognized for its efficient carry propagation and logarithmic delay characteristics. The Brent-Kung architecture balances computational speed and hardware complexity, making it suitable for high-speed digital applications. The design is implemented using Verilog HDL and simulated using Cadence Design Suite tools, including NCLaunch and Genus, to evaluate its performance in terms of scalability, speed, and functional working. Comparative analysis with traditional adder architectures highlights the advantages of the Brent-Kung adder for modern digital systems.
△ Less
Submitted 23 March, 2025;
originally announced March 2025.
-
Effect of Hotspot Traffic on Blocking Probability in Elastic Optical Networks
Authors:
Paresh Upadhyay,
Yatindra Nath Singh
Abstract:
In a circuit-switched network, traffic can be characterized by several factors that define how communication resources are allocated and utilized during a connection. The amount of traffic basically determines how frequently connection requests arrive, how long the setup connection remains active, and the bandwidth used. The Poisson Arrival Process models traffic arrival events at random intervals…
▽ More
In a circuit-switched network, traffic can be characterized by several factors that define how communication resources are allocated and utilized during a connection. The amount of traffic basically determines how frequently connection requests arrive, how long the setup connection remains active, and the bandwidth used. The Poisson Arrival Process models traffic arrival events at random intervals. It assumes that events happen independently of one another. This model is ideal for simulating traffic in networks where arrivals happen independently and randomly, such as the start of phone calls, data requests, or packet transmissions. The Poisson Arrival Process and uniformly choosing source and destination pair is been used most commonly by researchers to generate traffic in a network to test various promising routing and spectrum assignment algorithms. It checks the algorithm in uniformly loaded conditions and estimate its baseline performance. In real real-world scenario, a bunch of network nodes can start experiencing heavy data traffic compared to the rest of the network. This can lead to latency issues, or even outages if the network is not optimized to handle the load at these nodes which are also called hotspots. In other terms, hotspot in a network is an area or set of nodes within the network that have a higher likelihood of being involved in communication or data transmission compared to other areas. In this paper, we have tried to find what are the various factors involved in increasing the blocking probability in hotspot traffic scenarios. We have also compared the results with the uniform traffic load conditions in same topology.
△ Less
Submitted 18 March, 2025;
originally announced March 2025.
-
RMCSA Algorithm for Congestion-Aware and Service Latency Aware Dynamic Service Provisioning in Software-Defined SDM-EONs
Authors:
Baljinder Singh Heera,
Shrinivas Petale,
Yatindra Nath Singh,
Suresh Subramaniam
Abstract:
The implementation of 5G and the future deployment of 6G necessitate the utilization of optical networks that possess substantial capacity and exhibit minimal latency. The dynamic arrival and departure of connection requests in optical networks result in particular central links experiencing more traffic and congestion than non-central links. The occurrence of congested links leads to service bloc…
▽ More
The implementation of 5G and the future deployment of 6G necessitate the utilization of optical networks that possess substantial capacity and exhibit minimal latency. The dynamic arrival and departure of connection requests in optical networks result in particular central links experiencing more traffic and congestion than non-central links. The occurrence of congested links leads to service blocking despite the availability of resources within the network, restricting the efficient utilization of network resources. The available algorithms in the literature that aim to balance load among network links offer a trade-off between blocking performance and algorithmic complexity, thus increasing service provisioning time. This work proposes a dynamic routing-based congestion-aware routing, modulation, core, and spectrum assignment (RMCSA) algorithm for space division multiplexing elastic optical networks (SDM-EONs). The algorithm finds alternative candidate paths based on real-time link occupancy metrics to minimize blocking due to link congestion under dynamic traffic scenarios. As a result, the algorithm reduces the formation of congestion hotspots in the network owing to link-betweenness centrality. We have performed extensive simulations using two realistic network topologies to compare the performance of the proposed algorithm with relevant RMCSA algorithms available in the literature. The simulation results verify the superior performance of our proposed algorithm compared to the benchmark Yen's K-shortest paths and K-Disjoint shortest paths RMCSA algorithms in connection blocking ratio and spectrum utilization efficiency. To expedite the route-finding process, we present a novel caching strategy that allows the proposed algorithm to demonstrate a much-reduced service delay time compared to the recently developed adaptive link weight-based load-balancing RMCSA algorithm.
△ Less
Submitted 14 December, 2024;
originally announced December 2024.
-
A Multi-agent Simulation for the Mass School Shootings
Authors:
Wei Dai,
Yash Singh,
Rui Zhang
Abstract:
The increasing frequency of mass school shootings in the United States has been raised as a critical concern. Active shooters kill innocent students and educators in schools. These tragic events highlight the urgent need for effective strategies to minimize casualties. This study aims to address the challenge of simulating and assessing potential mitigation measures by developing a multi-agent sim…
▽ More
The increasing frequency of mass school shootings in the United States has been raised as a critical concern. Active shooters kill innocent students and educators in schools. These tragic events highlight the urgent need for effective strategies to minimize casualties. This study aims to address the challenge of simulating and assessing potential mitigation measures by developing a multi-agent simulation model. Our model is designed to estimate casualty rates and evacuation efficiency during active shooter scenarios within school buildings. The simulation evaluates the impact of a gun detection system on safety outcomes. By simulating school shooting incidents with and without this system, we observe a significant improvement in evacuation rates, which increased from 16.6% to 66.6%. Furthermore, the Gun Detection System reduced the average casualty rate from 24.0% to 12.2% within a period of six minutes, based on a simulated environment with 100 students. We conducted a total of 48 simulations across three different floor layouts, varying the number of students and time intervals to assess the system's adaptability. We anticipate that the research will provide a starting point for demonstrating that a gunshot detection system can significantly improve both evacuation rates and casualty reduction.
△ Less
Submitted 5 December, 2024;
originally announced December 2024.
-
ReputeStream: Mitigating Free-Riding through Reputation-Based Multi-Layer P2P Live Streaming
Authors:
Rashmi Kushwaha,
Rahul Bhattacharyya,
Yatindra Nath Singh
Abstract:
This paper presents a novel algorithm for peer-to-peer (P2P) live streaming that addresses the limitations of single-layer systems through a multi-layered approach. The proposed solution adapts to diverse user capabilities and bandwidth conditions while tackling common P2P challenges such as free-riding, malicious behavior, churn, and flash crowds. By implementing a reputation-based system, the al…
▽ More
This paper presents a novel algorithm for peer-to-peer (P2P) live streaming that addresses the limitations of single-layer systems through a multi-layered approach. The proposed solution adapts to diverse user capabilities and bandwidth conditions while tackling common P2P challenges such as free-riding, malicious behavior, churn, and flash crowds. By implementing a reputation-based system, the algorithm promotes fair resource sharing and active participation. The algorithm also incorporates a request-to-join mechanism to effectively manage flash crowds. In addition, a dynamic reputation system improves network efficiency by strategically positioning high-reputation peers closer to video sources or other significant contributors.
△ Less
Submitted 28 November, 2024;
originally announced November 2024.
-
Vehicle Localization in GPS-Denied Scenarios Using Arc-Length-Based Map Matching
Authors:
Nur Uddin Javed,
Yuvraj Singh,
Qadeer Ahmed
Abstract:
Automated driving systems face challenges in GPS-denied situations. To address this issue, kinematic dead reckoning is implemented using measurements from the steering angle, steering rate, yaw rate, and wheel speed sensors onboard the vehicle. However, dead reckoning methods suffer from drift. This paper provides an arc-length-based map matching method that uses a digital 2D map of the scenario i…
▽ More
Automated driving systems face challenges in GPS-denied situations. To address this issue, kinematic dead reckoning is implemented using measurements from the steering angle, steering rate, yaw rate, and wheel speed sensors onboard the vehicle. However, dead reckoning methods suffer from drift. This paper provides an arc-length-based map matching method that uses a digital 2D map of the scenario in order to correct drift in the dead reckoning estimate. The kinematic model's prediction is used to introduce a temporal notion to the spatial information available in the map data. Results show reliable improvement in drift for all GPS-denied scenarios tested in this study. This innovative approach ensures that automated vehicles can maintain continuous and reliable navigation, significantly enhancing their safety and operational reliability in environments where GPS signals are compromised or unavailable.
△ Less
Submitted 16 October, 2024;
originally announced October 2024.
-
Towards Design and Development of a Low-Cost Unmanned Surface Vehicle for Aquaculture Water Quality Monitoring in Shallow Water Environments
Authors:
Aiyelari Temilolorun,
Yogang Singh
Abstract:
Unmanned surface vessels USVs are typically autonomous or remotely operated and are specifically designed for environmental monitoring in various aquatic environments Aquaculture requires constant monitoring and management of water quality for the health and productivity of aquaculture systems Poor water quality can lead to disease outbreaks reduced growth rates and even mass mortality of cultured…
▽ More
Unmanned surface vessels USVs are typically autonomous or remotely operated and are specifically designed for environmental monitoring in various aquatic environments Aquaculture requires constant monitoring and management of water quality for the health and productivity of aquaculture systems Poor water quality can lead to disease outbreaks reduced growth rates and even mass mortality of cultured species Many small aquaculture operations operate on tight budgets and in shallow water environments such as inland ponds coastal lagoons estuaries and shallow rivers particularly in developing regions This leads to the foremost manoeuvrability challenge underscoring the crucial need for agile cost effective USVs as efficient monitoring systems The paper proposes a low cost 3D printed twin hull catamaran style platform equipped with an Inertial Measurement Unit IMU and a Global Navigation Satellite System GNSS with a two layered control framework and a differential drive configuration developed using two high efficiency T200 thrusters The design utilizes the Robot Operating System ROS to create the control framework and incorporates Extended Kalman Filter EKF based sensor fusion techniques for localisation The paper evaluates the USVs autonomy through open water captive model experiments employing remote control methods to assess the vessels manoeuvrability and overall performance in shallow water conditions
△ Less
Submitted 12 October, 2024;
originally announced October 2024.
-
Reputation-Driven Peer-to-Peer Live Streaming Architecture for Preventing Free-Riding
Authors:
Rashmi Kushwaha,
Rahul Bhattacharyya,
Yatindra Nath Singh
Abstract:
We present a peer-to-peer (P2P) live-streaming architecture designed to address challenges such as free-riding, malicious peers, churn, and network instability through the integration of a reputation system. The proposed algorithm incentivizes active peer participation while discouraging opportunistic behaviors, with a reputation mechanism that rewards altruistic peers and penalizes free riders an…
▽ More
We present a peer-to-peer (P2P) live-streaming architecture designed to address challenges such as free-riding, malicious peers, churn, and network instability through the integration of a reputation system. The proposed algorithm incentivizes active peer participation while discouraging opportunistic behaviors, with a reputation mechanism that rewards altruistic peers and penalizes free riders and malicious actors. To manage peer dynamics, the algorithm continuously updates the strategies and adjusts to changing neighbors. It also implements a request-to-join mechanism for flash crowd scenarios, allowing the source node to delegate requests to child nodes, forming an interconnected tree structure that efficiently handles high demand and maintains system stability. The decentralized reputation mechanism promotes long-term sustainability in the P2P live streaming system.
△ Less
Submitted 14 September, 2024;
originally announced September 2024.
-
Persistence Image from 3D Medical Image: Superpixel and Optimized Gaussian Coefficient
Authors:
Yanfan Zhu,
Yash Singh,
Khaled Younis,
Shunxing Bao,
Yuankai Huo
Abstract:
Topological data analysis (TDA) uncovers crucial properties of objects in medical imaging. Methods based on persistent homology have demonstrated their advantages in capturing topological features that traditional deep learning methods cannot detect in both radiology and pathology. However, previous research primarily focused on 2D image analysis, neglecting the comprehensive 3D context. In this p…
▽ More
Topological data analysis (TDA) uncovers crucial properties of objects in medical imaging. Methods based on persistent homology have demonstrated their advantages in capturing topological features that traditional deep learning methods cannot detect in both radiology and pathology. However, previous research primarily focused on 2D image analysis, neglecting the comprehensive 3D context. In this paper, we propose an innovative 3D TDA approach that incorporates the concept of superpixels to transform 3D medical image features into point cloud data. By Utilizing Optimized Gaussian Coefficient, the proposed 3D TDA method, for the first time, efficiently generate holistic Persistence Images for 3D volumetric data. Our 3D TDA method exhibits superior performance on the MedMNist3D dataset when compared to other traditional methods, showcasing its potential effectiveness in modeling 3D persistent homology-based topological analysis when it comes to classification tasks. The source code is publicly available at https://github.com/hrlblab/TopologicalDataAnalysis3D.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh,
Kumari Akansha,
Baljinder Singh Heera,
Pallavi Athe
Abstract:
Optical networks play a crucial role in todays digital topography, enabling the high-speed and reliable transmission of vast amounts of data over optical fibre for long distances. This paper provides an overview of optical networks, especially emphasising on their evolution with time.
Optical networks play a crucial role in todays digital topography, enabling the high-speed and reliable transmission of vast amounts of data over optical fibre for long distances. This paper provides an overview of optical networks, especially emphasising on their evolution with time.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Application of S-band for Protection in Multi-band Flexible-Grid Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the ex…
▽ More
The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the existing ones.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Current Topological and Machine Learning Applications for Bias Detection in Text
Authors:
Colleen Farrelly,
Yashbir Singh,
Quincy A. Hathaway,
Gunnar Carlsson,
Ashok Choudhary,
Rahul Paul,
Gianfranco Doretto,
Yassine Himeur,
Shadi Atalls,
Wathiq Mansoor
Abstract:
Institutional bias can impact patient outcomes, educational attainment, and legal system navigation. Written records often reflect bias, and once bias is identified; it is possible to refer individuals for training to reduce bias. Many machine learning tools exist to explore text data and create predictive models that can search written records to identify real-time bias. However, few previous stu…
▽ More
Institutional bias can impact patient outcomes, educational attainment, and legal system navigation. Written records often reflect bias, and once bias is identified; it is possible to refer individuals for training to reduce bias. Many machine learning tools exist to explore text data and create predictive models that can search written records to identify real-time bias. However, few previous studies investigate large language model embeddings and geometric models of biased text data to understand geometry's impact on bias modeling accuracy. To overcome this issue, this study utilizes the RedditBias database to analyze textual biases. Four transformer models, including BERT and RoBERTa variants, were explored. Post-embedding, t-SNE allowed two-dimensional visualization of data. KNN classifiers differentiated bias types, with lower k-values proving more effective. Findings suggest BERT, particularly mini BERT, excels in bias classification, while multilingual models lag. The recommendation emphasizes refining monolingual models and exploring domain-specific biases.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Protected Working Groups-based Resilient Resource Provisioning in MCF-enabled SDM-EONs
Authors:
Anjali Sharma,
Varsha Lohani,
Yatindra Nath Singh
Abstract:
Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment…
▽ More
Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment (PWCG/ UPWCG) scheme for differentiated connection requests in multicore fiber-enabled SDM-EONs. A PWCG is inherently protected by resources in a Dedicated Spare Core Group (DSCG). First, we divide the cores into three groups using traffic and crosstalk considerations. In the second step, we use the obtained core groups for resource provisioning in dynamic network scenarios. The effectiveness of our proposed technique is compared with a Link Disjoint Path Protection (LDPP) technique, and the simulation study verifies our assertions and the findings.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Credit Blockchain for Faster Transactions in P2P Energy Trading
Authors:
Amit kumar Vishwakarma,
Yatindra Nath Singh
Abstract:
P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further,…
▽ More
P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further, until now, no blockchain model has considered the role of conventional electric utility companies in P2P trading. In this paper, we have introduced a credit blockchain that reduces energy consumption by employing a new mechanism to update transactions and increases speed by providing interest free loans to buyers. This model also integrates the electric utility companies within the P2P trading framework, thereby increasing members trading options. We have also discussed the pricing strategies for trading. All the above assertions have been verified through simulations, demonstrating that this model will promote P2P trading by providing enhanced security, speed, and greater trading options. The proposed model will also help trade energy at prices beneficial for both sellers and buyers.
△ Less
Submitted 21 November, 2023; v1 submitted 13 October, 2023;
originally announced October 2023.
-
Federated Learning for Computer Vision
Authors:
Yassine Himeur,
Iraklis Varlamis,
Hamza Kheddar,
Abbes Amira,
Shadi Atalla,
Yashbir Singh,
Faycal Bensaali,
Wathiq Mansoor
Abstract:
Computer Vision (CV) is playing a significant role in transforming society by utilizing machine learning (ML) tools for a wide range of tasks. However, the need for large-scale datasets to train ML models creates challenges for centralized ML algorithms. The massive computation loads required for processing and the potential privacy risks associated with storing and processing data on central clou…
▽ More
Computer Vision (CV) is playing a significant role in transforming society by utilizing machine learning (ML) tools for a wide range of tasks. However, the need for large-scale datasets to train ML models creates challenges for centralized ML algorithms. The massive computation loads required for processing and the potential privacy risks associated with storing and processing data on central cloud servers put these algorithms under severe strain. To address these issues, federated learning (FL) has emerged as a promising solution, allowing privacy preservation by training models locally and exchanging them to improve overall performance. Additionally, the computational load is distributed across multiple clients, reducing the burden on central servers. This paper presents, to the best of the authors' knowledge, the first review discussing recent advancements of FL in CV applications, comparing them to conventional centralized training paradigms. It provides an overview of current FL applications in various CV tasks, emphasizing the advantages of FL and the challenges of implementing it in CV. To facilitate this, the paper proposes a taxonomy of FL techniques in CV, outlining their applications and security threats. It also discusses privacy concerns related to implementing blockchain in FL schemes for CV tasks and summarizes existing privacy preservation methods. Moving on, the paper identifies open research challenges and potential future research directions to further exploit the potential of FL and blockchain in CV applications.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
Decoding ChatGPT: A Taxonomy of Existing Research, Current Challenges, and Possible Future Directions
Authors:
Shahab Saquib Sohail,
Faiza Farhat,
Yassine Himeur,
Mohammad Nadeem,
Dag Øivind Madsen,
Yashbir Singh,
Shadi Atalla,
Wathiq Mansoor
Abstract:
Chat Generative Pre-trained Transformer (ChatGPT) has gained significant interest and attention since its launch in November 2022. It has shown impressive performance in various domains, including passing exams and creative writing. However, challenges and concerns related to biases and trust persist. In this work, we present a comprehensive review of over 100 Scopus-indexed publications on ChatGP…
▽ More
Chat Generative Pre-trained Transformer (ChatGPT) has gained significant interest and attention since its launch in November 2022. It has shown impressive performance in various domains, including passing exams and creative writing. However, challenges and concerns related to biases and trust persist. In this work, we present a comprehensive review of over 100 Scopus-indexed publications on ChatGPT, aiming to provide a taxonomy of ChatGPT research and explore its applications. We critically analyze the existing literature, identifying common approaches employed in the studies. Additionally, we investigate diverse application areas where ChatGPT has found utility, such as healthcare, marketing and financial services, software engineering, academic and scientific writing, research and education, environmental science, and natural language processing. Through examining these applications, we gain valuable insights into the potential of ChatGPT in addressing real-world challenges. We also discuss crucial issues related to ChatGPT, including biases and trustworthiness, emphasizing the need for further research and development in these areas. Furthermore, we identify potential future directions for ChatGPT research, proposing solutions to current challenges and speculating on expected advancements. By fully leveraging the capabilities of ChatGPT, we can unlock its potential across various domains, leading to advancements in conversational AI and transformative impacts in society.
△ Less
Submitted 25 August, 2023; v1 submitted 26 July, 2023;
originally announced July 2023.
-
Generalized Distance Metric for Various DHT Routing Algorithms in Peer-to-Peer Networks
Authors:
Rashmi Kushwaha,
Shreyas Kulkarni,
Yatindra Nath Singh
Abstract:
We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance r…
▽ More
We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance representation. We also proposes that nodes can have routing tables of varying sizes based on their memory capabilities but with the fact that each node must have at least two entries, one for the node closest from it, and the other for the node from whom it is closest in each ring components for all the algorithms. Messages will always reach the correct root nodes by following the above rule. We also further observe that in any network, if the distance metric to define the root node in the DHT is same at all the nodes, then the root node for a key will also be the same, irrespective of the size of the routing table at different nodes.
△ Less
Submitted 28 February, 2024; v1 submitted 24 March, 2023;
originally announced March 2023.
-
Design Perspectives of Multitask Deep Learning Models and Applications
Authors:
Yeshwant Singh,
Anupam Biswas,
Angshuman Bora,
Debashish Malakar,
Subham Chakraborty,
Suman Bera
Abstract:
In recent years, multi-task learning has turned out to be of great success in various applications. Though single model training has promised great results throughout these years, it ignores valuable information that might help us estimate a metric better. Under learning-related tasks, multi-task learning has been able to generalize the models even better. We try to enhance the feature mapping of…
▽ More
In recent years, multi-task learning has turned out to be of great success in various applications. Though single model training has promised great results throughout these years, it ignores valuable information that might help us estimate a metric better. Under learning-related tasks, multi-task learning has been able to generalize the models even better. We try to enhance the feature mapping of the multi-tasking models by sharing features among related tasks and inductive transfer learning. Also, our interest is in learning the task relationships among various tasks for acquiring better benefits from multi-task learning. In this chapter, our objective is to visualize the existing multi-tasking models, compare their performances, the methods used to evaluate the performance of the multi-tasking models, discuss the problems faced during the design and implementation of these models in various domains, and the advantages and milestones achieved by them
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Availability-Aware Dynamic RSA with Protection using Consecutive Sub-Channels
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
Flexible grid Optical Networks provide efficient spectrum utilization by employing the mechanisms to provide flexibility in the optical channel (spectrum slot) sizes. One of the research problems in Flexible grid Optical Networks is their survivability against failure. On the other hand, p-Cycles have not found practical use due to the significant compute time required for finding optimal configur…
▽ More
Flexible grid Optical Networks provide efficient spectrum utilization by employing the mechanisms to provide flexibility in the optical channel (spectrum slot) sizes. One of the research problems in Flexible grid Optical Networks is their survivability against failure. On the other hand, p-Cycles have not found practical use due to the significant compute time required for finding optimal configuration for the size of networks seen in real-life. Therefore, for real-time scenarios, we can write heuristics which can assign protection to the new working paths without disturbing the existing traffic on all the other routes in flexible grid networks. The provisioning of protection to each link or path of the lightpath requests can be done using Dynamic Cycles (D-Cycles) or Dynamic Shared Backup Resource Protection (D-SBRP). However, protecting each link or path can lead to the wastage of the resources in the network.
△ Less
Submitted 10 June, 2022;
originally announced June 2022.
-
Towards Differential Relational Privacy and its use in Question Answering
Authors:
Simone Bombari,
Alessandro Achille,
Zijian Wang,
Yu-Xiang Wang,
Yusheng Xie,
Kunwar Yashraj Singh,
Srikar Appalaraju,
Vijay Mahadevan,
Stefano Soatto
Abstract:
Memorization of the relation between entities in a dataset can lead to privacy issues when using a trained model for question answering. We introduce Relational Memorization (RM) to understand, quantify and control this phenomenon. While bounding general memorization can have detrimental effects on the performance of a trained model, bounding RM does not prevent effective learning. The difference…
▽ More
Memorization of the relation between entities in a dataset can lead to privacy issues when using a trained model for question answering. We introduce Relational Memorization (RM) to understand, quantify and control this phenomenon. While bounding general memorization can have detrimental effects on the performance of a trained model, bounding RM does not prevent effective learning. The difference is most pronounced when the data distribution is long-tailed, with many queries having only few training examples: Impeding general memorization prevents effective learning, while impeding only relational memorization still allows learning general properties of the underlying concepts. We formalize the notion of Relational Privacy (RP) and, inspired by Differential Privacy (DP), we provide a possible definition of Differential Relational Privacy (DrP). These notions can be used to describe and compute bounds on the amount of RM in a trained model. We illustrate Relational Privacy concepts in experiments with large-scale models for Question Answering.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Optimal Slot Size under Various Bandwidth Distributions in the Flexible-grid Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
Flexible grid Optical Networks are efficient mechanism to provide flexibility in the optical spectrum utilization. For such networks, the slot width size as specified by the ITU-T G.694.1 is 12.5 GHz. However, one should question if it is the optimal grid size? In this paper, under different bandwidth distribution scenarios, we review which slot size give appropriate spectrum efficiency. Moreover,…
▽ More
Flexible grid Optical Networks are efficient mechanism to provide flexibility in the optical spectrum utilization. For such networks, the slot width size as specified by the ITU-T G.694.1 is 12.5 GHz. However, one should question if it is the optimal grid size? In this paper, under different bandwidth distribution scenarios, we review which slot size give appropriate spectrum efficiency. Moreover, we present a study of the slot sizes with varying incoming traffic having some bandwidth requirement under different scenarios.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
HIERMATCH: Leveraging Label Hierarchies for Improving Semi-Supervised Learning
Authors:
Ashima Garg,
Shaurya Bagga,
Yashvardhan Singh,
Saket Anand
Abstract:
Semi-supervised learning approaches have emerged as an active area of research to combat the challenge of obtaining large amounts of annotated data. Towards the goal of improving the performance of semi-supervised learning methods, we propose a novel framework, HIERMATCH, a semi-supervised approach that leverages hierarchical information to reduce labeling costs and performs as well as a vanilla s…
▽ More
Semi-supervised learning approaches have emerged as an active area of research to combat the challenge of obtaining large amounts of annotated data. Towards the goal of improving the performance of semi-supervised learning methods, we propose a novel framework, HIERMATCH, a semi-supervised approach that leverages hierarchical information to reduce labeling costs and performs as well as a vanilla semi-supervised learning method. Hierarchical information is often available as prior knowledge in the form of coarse labels (e.g., woodpeckers) for images with fine-grained labels (e.g., downy woodpeckers or golden-fronted woodpeckers). However, the use of supervision using coarse category labels to improve semi-supervised techniques has not been explored. In the absence of fine-grained labels, HIERMATCH exploits the label hierarchy and uses coarse class labels as a weak supervisory signal. Additionally, HIERMATCH is a generic-approach to improve any semisupervised learning framework, we demonstrate this using our results on recent state-of-the-art techniques MixMatch and FixMatch. We evaluate the efficacy of HIERMATCH on two benchmark datasets, namely CIFAR-100 and NABirds. HIERMATCH can reduce the usage of fine-grained labels by 50% on CIFAR-100 with only a marginal drop of 0.59% in top-1 accuracy as compared to MixMatch. Code: https://github.com/07Agarg/HIERMATCH
△ Less
Submitted 21 December, 2021; v1 submitted 29 October, 2021;
originally announced November 2021.
-
Dynamic Routing and Spectrum Assignment based on the Availability of Consecutive Sub-channels in Flexi-grid Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
Using Optical Orthogonal Frequency Multiplexing (O-OFDM), variable bandwidth channels can be created in Elastic Optical Networks (EON). This allows the use of spectrum more efficiently by allocating integral multiple of basic bandwidth slots to the lightpath requests. Consequently, such networks are also called flexible grid optical networks. It also adds a constraint of keeping all the allocated…
▽ More
Using Optical Orthogonal Frequency Multiplexing (O-OFDM), variable bandwidth channels can be created in Elastic Optical Networks (EON). This allows the use of spectrum more efficiently by allocating integral multiple of basic bandwidth slots to the lightpath requests. Consequently, such networks are also called flexible grid optical networks. It also adds a constraint of keeping all the allocated slots together when deciding the routes for the requests. This constraint called the contiguity constraint makes the routing and spectrum algorithms more challenging. In any network, the lightpath requests will arrive and depart dynamically and will invariably lead to spectrum fragmentation, and hence network will have a reduction in maximum possible utilization due to increased blocking probability. In this paper, we have presented an improvised RSA algorithm that leads to lesser fragmentation. It is evident from the results that the presented RSA algorithm uses adaptive parameters to reduce the blocking probability and fragmentation compared to other algorithms reported in the recent past.
△ Less
Submitted 2 October, 2021; v1 submitted 16 May, 2021;
originally announced May 2021.
-
A Vectored Fragmentation Metric for Elastic Optical Networks
Authors:
Anjali Sharma,
Varsha Lohani,
Yatindra Nath Singh
Abstract:
When circuits are set up and dismantled dynamically in elastic optical networks, spectrum tends to become fragmented in the fiber links. The fragmentation limits the available path choices and may lead to significant blocking of connection requests. There are two types of fragmentation in the network spectrum in the links due to contiguity constraints and over the paths due to continuity. Study of…
▽ More
When circuits are set up and dismantled dynamically in elastic optical networks, spectrum tends to become fragmented in the fiber links. The fragmentation limits the available path choices and may lead to significant blocking of connection requests. There are two types of fragmentation in the network spectrum in the links due to contiguity constraints and over the paths due to continuity. Study of fragmentation and its management is essential to operate the networks efficiently. This paper proposes a vectored fragmentation metric for characterizing the fragmentation, which covers both types of fragmentation. We discuss the characteristics of this metric in both transient and steady-state of the dynamic network. We also test the proposed metric for connection requests granularity range, arrival rates and holding times, to establish functionality of this metric. We also compare the link-based fragmentation metric with our Vectored Fragmentation Metric to understand the better representation.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
Sub-Graph p-cycle formation for span failures in all-Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
p-Cycles offer ring-like switching speed and mesh-like spare capacity efficiency for protecting network against link failures. This makes them extremely efficient and effective protection technique. p-Cycles can also protect all the links in a network against simultaneous failures of multiple links. But it has been mostly studied for single link failure scenarios in the networks with the objective…
▽ More
p-Cycles offer ring-like switching speed and mesh-like spare capacity efficiency for protecting network against link failures. This makes them extremely efficient and effective protection technique. p-Cycles can also protect all the links in a network against simultaneous failures of multiple links. But it has been mostly studied for single link failure scenarios in the networks with the objective to minimize spare capacity under the condition of100% restorability. For large networks, use of p-cycles is difficult because their optimization requires an excessive amount of time as the number of variables in the corresponding Integer Linear Program (ILP) increase with the increase in the network size. In a real-time network situation,setting up a highly efficient protection in a short time is essential.Thus, we introduce a network sub-graphing approach, in which a network is segmented into smaller parts based on certain network attributes. Then, an optimal solution is found for each sub-graph. Finally, the solutions for all the sub-graphs is combined to get a sub-optimal solution for the whole network. We achieved better computational efficiency at the expense of marginal spare capacity increases with this approach.
△ Less
Submitted 15 February, 2021;
originally announced February 2021.
-
NxTF: An API and Compiler for Deep Spiking Neural Networks on Intel Loihi
Authors:
Bodo Rueckauer,
Connor Bybee,
Ralf Goettsche,
Yashwardhan Singh,
Joyesh Mishra,
Andreas Wild
Abstract:
Spiking Neural Networks (SNNs) are a promising paradigm for efficient event-driven processing of spatio-temporally sparse data streams. SNNs have inspired the design and can take advantage of the emerging class of neuromorphic processors like Intel Loihi. These novel hardware architectures expose a variety of constraints that affect firmware, compiler and algorithm development alike. To enable rap…
▽ More
Spiking Neural Networks (SNNs) are a promising paradigm for efficient event-driven processing of spatio-temporally sparse data streams. SNNs have inspired the design and can take advantage of the emerging class of neuromorphic processors like Intel Loihi. These novel hardware architectures expose a variety of constraints that affect firmware, compiler and algorithm development alike. To enable rapid and flexible development of SNN algorithms on Loihi, we developed NxTF: a programming interface derived from Keras and compiler optimized for mapping deep convolutional SNNs to the multi-core Intel Loihi architecture. We evaluate NxTF on DNNs trained directly on spikes as well as models converted from traditional DNNs, processing both sparse event-based and dense frame-based data sets. Further, we assess the effectiveness of the compiler to distribute models across a large number of cores and to compress models by exploiting Loihi's weight sharing features. Finally, we evaluate model accuracy, energy and time to solution compared to other architectures. The compiler achieves near optimal resource utilization of 80% across 16 Loihi chips for a 28-layer, 4M parameter MobileNet model with input size 128x128. In addition, we report the lowest error rate of 8.52% for the CIFAR-10 dataset on neuromorphic hardware, using an off-the-shelf MobileNet.
△ Less
Submitted 11 January, 2021;
originally announced January 2021.
-
Probabilistic Random Indexing for Continuous Event Detection
Authors:
Yashank Singh,
Niladri Chatterjee
Abstract:
The present paper explores a novel variant of Random Indexing (RI) based representations for encoding language data with a view to using them in a dynamic scenario where events are happening in a continuous fashion. As the size of the representations in the general method of onehot encoding grows linearly with the size of the vocabulary, they become non-scalable for online purposes with high volum…
▽ More
The present paper explores a novel variant of Random Indexing (RI) based representations for encoding language data with a view to using them in a dynamic scenario where events are happening in a continuous fashion. As the size of the representations in the general method of onehot encoding grows linearly with the size of the vocabulary, they become non-scalable for online purposes with high volumes of dynamic data. On the other hand, existing pre-trained embedding models are not suitable for detecting happenings of new events due to the dynamic nature of the text data. The present work addresses this issue by using a novel RI representation by imposing a probability distribution on the number of randomized entries which leads to a class of RI representations. It also provides a rigorous analysis of the goodness of the representation methods to encode semantic information in terms of the probability of orthogonality. Building on these ideas we propose an algorithm that is log-linear with the size of vocabulary to track the semantic relationship of a query word to other words for suggesting the events that are relevant to the word in question. We ran simulations using the proposed algorithm for tweet data specific to three different events and present our findings. The proposed probabilistic RI representations are found to be much faster and scalable than Bag of Words (BoW) embeddings while maintaining accuracy in depicting semantic relationships.
△ Less
Submitted 9 December, 2021; v1 submitted 28 August, 2020;
originally announced August 2020.
-
On Learning Combinatorial Patterns to Assist Large-Scale Airline Crew Pairing Optimization
Authors:
Divyam Aggarwal,
Yash Kumar Singh,
Dhish Kumar Saxena
Abstract:
Airline Crew Pairing Optimization (CPO) aims at generating a set of legal flight sequences (crew pairings), to cover an airline's flight schedule, at minimum cost. It is usually performed using Column Generation (CG), a mathematical programming technique for guided search-space exploration. CG exploits the interdependencies between the current and the preceding CG-iteration for generating new vari…
▽ More
Airline Crew Pairing Optimization (CPO) aims at generating a set of legal flight sequences (crew pairings), to cover an airline's flight schedule, at minimum cost. It is usually performed using Column Generation (CG), a mathematical programming technique for guided search-space exploration. CG exploits the interdependencies between the current and the preceding CG-iteration for generating new variables (pairings) during the optimization-search. However, with the unprecedented scale and complexity of the emergent flight networks, it has become imperative to learn higher-order interdependencies among the flight-connection graphs, and utilize those to enhance the efficacy of the CPO. In first of its kind and what marks a significant departure from the state-of-the-art, this paper proposes a novel adaptation of the Variational Graph Auto-Encoder for learning plausible combinatorial patterns among the flight-connection data obtained through the search-space exploration by an Airline Crew Pairing Optimizer, AirCROP (developed by the authors and validated by the research consortium's industrial sponsor, GE Aviation). The resulting flight-connection predictions are combined on-the-fly using a novel heuristic to generate new pairings for the optimizer. The utility of the proposed approach is demonstrated on large-scale (over 4200 flights), real-world, complex flight-networks of US-based airlines, characterized by multiple hub-and-spoke subnetworks and several crew bases.
△ Less
Submitted 2 May, 2020; v1 submitted 28 April, 2020;
originally announced April 2020.
-
On Partial Coverage and Connectivity Relationship in Deterministic WSN Topologies
Authors:
Rameshwar Nath Tripathi,
Kumar Gaurav,
Yatindra Nath Singh
Abstract:
The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for full coverage scenarios. But, investing in full coverage incurs unnecessary cost when partial coverage is sufficient. In this work, we focus on the…
▽ More
The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for full coverage scenarios. But, investing in full coverage incurs unnecessary cost when partial coverage is sufficient. In this work, we focus on the relationship between partial coverage and connectivity. We find the conditions when partial coverage implies connectivity as a function of coverage fraction. This condition facilitates the network designers to configure the connected network for desired coverage fraction.
△ Less
Submitted 2 September, 2019;
originally announced September 2019.
-
Algorithms for screening of Cervical Cancer: A chronological review
Authors:
Yasha Singh,
Dhruv Srivastava,
P. S. Chandranand,
Dr. Surinder Singh
Abstract:
There are various algorithms and methodologies used for automated screening of cervical cancer by segmenting and classifying cervical cancer cells into different categories. This study presents a critical review of different research papers published that integrated AI methods in screening cervical cancer via different approaches analyzed in terms of typical metrics like dataset size, drawbacks, a…
▽ More
There are various algorithms and methodologies used for automated screening of cervical cancer by segmenting and classifying cervical cancer cells into different categories. This study presents a critical review of different research papers published that integrated AI methods in screening cervical cancer via different approaches analyzed in terms of typical metrics like dataset size, drawbacks, accuracy etc. An attempt has been made to furnish the reader with an insight of Machine Learning algorithms like SVM (Support Vector Machines), GLCM (Gray Level Co-occurrence Matrix), k-NN (k-Nearest Neighbours), MARS (Multivariate Adaptive Regression Splines), CNNs (Convolutional Neural Networks), spatial fuzzy clustering algorithms, PNNs (Probabilistic Neural Networks), Genetic Algorithm, RFT (Random Forest Trees), C5.0, CART (Classification and Regression Trees) and Hierarchical clustering algorithm for feature extraction, cell segmentation and classification. This paper also covers the publicly available datasets related to cervical cancer. It presents a holistic review on the computational methods that have evolved over the period of time, in chronological order in detection of malignant cells.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
Going Viral: The Epidemiological Strategy of Referral Marketing
Authors:
Sayantari Ghosh,
Saumik Bhattacharya,
Kumar Gaurav,
Yatindra Nath Singh
Abstract:
By now, Internet word-of-mouth marketing has established its importance for almost every kind of products. When word-of-mouth spread of a marketing campaign goes viral, the success of its strategy has been proved to be path-breaking for the firms. The current study is designed to extend knowledge about customer response to these campaigns, and is focused on the motivations that lead them to differ…
▽ More
By now, Internet word-of-mouth marketing has established its importance for almost every kind of products. When word-of-mouth spread of a marketing campaign goes viral, the success of its strategy has been proved to be path-breaking for the firms. The current study is designed to extend knowledge about customer response to these campaigns, and is focused on the motivations that lead them to different responses. Primary goal of this study is to investigate the reasons that drive this dynamics and to generate a justified theoretical framework of diffusion dynamics of viral marketing campaigns. A rigorous analysis of data obtained through a questionnaire-based survey helped us to understand how people, who are from different age group, sex and locations, define and evaluate the encounter with a referral campaign online, in similar and unique logical ways. The key finding was a conceptual framework of customer motivation which in turn dictates the dynamics of the campaign. We have identified important themes related to customer motives, like significance of: incentives and ease, inherent forgetting, reminders from peers compared to company's remarketing mails, trust and brand value etc. Drawing an analogy with differential equation-based models of infectious disease spread, this paper further provides some initial evidence that participation in viral marketing campaigns has several consumer related dynamical factors which can be incorporated in an epidemiological model for mathematical treatment, to indicate key operational factors in ensuring an effective spread of the marketing campaign.
△ Less
Submitted 11 August, 2018;
originally announced August 2018.
-
Impact Zone Analysis of p-Cycle
Authors:
Pallavi Athe,
Yatindra Nath Singh
Abstract:
Pre-configured cycle (p-Cycle) method has been studied in literature extensively for optical network protection. A large p-cycle has high capacity efficiency and can protect a large number of nodes against the single link failure scenarios. All the links protected by such a p-cycle lose protection when the p-cycle is consumed to restore traffic after a failure. As the probability of multiple link…
▽ More
Pre-configured cycle (p-Cycle) method has been studied in literature extensively for optical network protection. A large p-cycle has high capacity efficiency and can protect a large number of nodes against the single link failure scenarios. All the links protected by such a p-cycle lose protection when the p-cycle is consumed to restore traffic after a failure. As the probability of multiple link failure is high for a large network, it also means that with higher probability, on the second failure, protection may not be there for the failed link. Thus, if the number of links protected by a p-cycle is large, it makes the network unprotected with high probability on the advent of the second failure. In this paper, we study the impact zone due to a first link failure in the various configurations of the p-cycles. The study gives insight into how to choose the p-cycle configuration to reduce the impact zone while using minimum spare capacity. We propose few methods and compare them to show how the impact zone analysis can be used to improve the fault tolerance in an optical network.
△ Less
Submitted 21 June, 2018;
originally announced June 2018.
-
Convergence Rate Analysis for Periodic Gossip Algorithms in Wireless Sensor Networks
Authors:
S. Kouachi,
Sateeshkrishna Dhuli,
Y. N. Singh
Abstract:
Periodic gossip algorithms have generated a lot of interest due to their ability to compute the global statistics by using local pairwise communications among nodes. Simple execution, robustness to topology changes, and distributed nature make these algorithms quite suitable for wireless sensor networks (WSN). However, these algorithms converge to the global statistics after certain rounds of pair…
▽ More
Periodic gossip algorithms have generated a lot of interest due to their ability to compute the global statistics by using local pairwise communications among nodes. Simple execution, robustness to topology changes, and distributed nature make these algorithms quite suitable for wireless sensor networks (WSN). However, these algorithms converge to the global statistics after certain rounds of pair-wise communications. A significant challenge for periodic gossip algorithms is difficult to predict the convergence rate for large-scale networks. To facilitate the convergence rate evaluation, we study a one-dimensional lattice network model. In this scenario, to derive the explicit formula for convergence rate, we have to obtain a closed form expression for second largest eigenvalue of perturbed pentadiagonal matrices. In our approach, we derive the explicit expressions of eigenvalues by exploiting the theory of recurrent sequences. Unlike the existing methods in the literature, this is a direct method which avoids the theory of orthogonal polynomials [18]. Finally, we derive the explicit expressions for convergence rate of the average periodic gossip algorithm in one-dimensional WSNs. We analyze the convergence rate by considering the linear weight updating approach and investigate the impact of gossip weights on the convergence rates for a different number of nodes. Further, we also study the effect of link failures on the convergence rate for average periodic gossip algorithms.
△ Less
Submitted 14 August, 2018; v1 submitted 7 May, 2018;
originally announced May 2018.
-
An Improved Fatigue Detection System Based on Behavioral Characteristics of Driver
Authors:
Rajat Gupta,
Kanishk Aman,
Nalin Shiva,
Yadvendra Singh
Abstract:
In recent years, road accidents have increased significantly. One of the major reasons for these accidents, as reported is driver fatigue. Due to continuous and longtime driving, the driver gets exhausted and drowsy which may lead to an accident. Therefore, there is a need for a system to measure the fatigue level of driver and alert him when he/she feels drowsy to avoid accidents. Thus, we propos…
▽ More
In recent years, road accidents have increased significantly. One of the major reasons for these accidents, as reported is driver fatigue. Due to continuous and longtime driving, the driver gets exhausted and drowsy which may lead to an accident. Therefore, there is a need for a system to measure the fatigue level of driver and alert him when he/she feels drowsy to avoid accidents. Thus, we propose a system which comprises of a camera installed on the car dashboard. The camera detect the driver's face and observe the alteration in its facial features and uses these features to observe the fatigue level. Facial features include eyes and mouth. Principle Component Analysis is thus implemented to reduce the features while minimizing the amount of information lost. The parameters thus obtained are processed through Support Vector Classifier for classifying the fatigue level. After that classifier output is sent to the alert unit.
△ Less
Submitted 17 September, 2017;
originally announced September 2017.
-
Simplified Biased Contribution Index (SBCI): A Mechanism to Make P2P Network Fair and Efficient for Resource Sharing
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
To balance the load and to discourage the free-riding in peer-to-peer (P2P) networks, many incentive mechanisms and policies have been proposed in recent years. Global peer ranking is one such mechanism. In this mechanism, peers are ranked based on a metric called contribution index. Contribution index is defined in such a manner that peers are motivated to share the resources in the network. Fair…
▽ More
To balance the load and to discourage the free-riding in peer-to-peer (P2P) networks, many incentive mechanisms and policies have been proposed in recent years. Global peer ranking is one such mechanism. In this mechanism, peers are ranked based on a metric called contribution index. Contribution index is defined in such a manner that peers are motivated to share the resources in the network. Fairness in the terms of upload to download ratio in each peer can be achieved by this method. However, calculation of contribution index is not trivial. It is computed distributively and iteratively in the entire network and requires strict clock synchronization among the peers. A very small error in clock synchronization may lead to wrong results. Furthermore, iterative calculation requires a lot of message overhead and storage capacity, which makes its implementation more complex. In this paper, we are proposing a simple incentive mechanism based on the contributions of peers, which can balance the upload and download amount of resources in each peer. It does not require iterative calculation, therefore, can be implemented with lesser message overhead and storage capacity without requiring strict clock synchronization. This approach is efficient as there are very less rejections among the cooperative peers. It can be implemented in a truly distributed fashion with $O(N)$ time complexity per peer.
△ Less
Submitted 26 February, 2017;
originally announced February 2017.
-
Double Link Failure Protection using a Single P-cycle
Authors:
Pallavi Athe,
Yatindra Nath Singh
Abstract:
In this letter, we investigate survivability in optical networks for protection from two simultaneous link failures. Failure probability of two links with overlapping protection can be high if these links are geographically close. In a network with deterministic single link protection, simultaneous failure of two links may lead to partial or full loss of traffic on the failed links. Two link failu…
▽ More
In this letter, we investigate survivability in optical networks for protection from two simultaneous link failures. Failure probability of two links with overlapping protection can be high if these links are geographically close. In a network with deterministic single link protection, simultaneous failure of two links may lead to partial or full loss of traffic on the failed links. Two link failure protection will make the network more resilient by protecting double failures having overlapping protection. A method for achieving double fault tolerance is double cycle method (DB); it uses two pre-configured cycles (p-cycles) to protect a link. Single p-cycle (SG) method, which uses one p-cycle to protect a link from two simultaneous link failure is introduced in this letter. Integer linear programs (ILP) are formulated for the SG method as well as DB method. It has been observed that the SG method provides a solution to bigger networks with lesser computational resources as compared to the DB method.
△ Less
Submitted 3 May, 2017; v1 submitted 4 January, 2017;
originally announced January 2017.
-
Analysis of Network Robustness for Finite Sized Wireless Sensor Networks
Authors:
Sateeshkrishna Dhuli,
Chakravarthy Gopi,
Yatindra Nath Singh
Abstract:
Studying network robustness for wireless sensor networks(WSNs) is an exciting topic of research as sensor nodes often fail due to hardware degradation, resource constraints, and environmental changes. The application of spectral graph theory to networked systems has generated several important results. However, previous research has often failed to consider the network parameters, which is crucial…
▽ More
Studying network robustness for wireless sensor networks(WSNs) is an exciting topic of research as sensor nodes often fail due to hardware degradation, resource constraints, and environmental changes. The application of spectral graph theory to networked systems has generated several important results. However, previous research has often failed to consider the network parameters, which is crucial to study the real network applications. Network criticality is one of the effective metrics to quantify the network robustness against such failures and attacks. In this work, we derive the exact formulas of network criticality for WSNs using r-nearest neighbor networks and we show the effect of nearest neighbors and network dimension on robustness using analytical and numerical evaluations. Furthermore, we also show how symmetric and static approximations can wrongly designate the network robustness when implemented to WSNs.
△ Less
Submitted 1 April, 2021; v1 submitted 22 September, 2016;
originally announced September 2016.
-
Biased Contribution Index: A Simpler Mechanism to Maintain Fairness in Peer to Peer Network
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
To maintain fairness, in the terms of resources shared by an individual peer, a proper incentive policy is required in a peer to peer network. This letter proposes, a simpler mechanism to rank the peers based on their resource contributions to the network. This mechanism will suppress the free riders from downloading the resources from the network. Contributions of the peers are biased in such a w…
▽ More
To maintain fairness, in the terms of resources shared by an individual peer, a proper incentive policy is required in a peer to peer network. This letter proposes, a simpler mechanism to rank the peers based on their resource contributions to the network. This mechanism will suppress the free riders from downloading the resources from the network. Contributions of the peers are biased in such a way that it can balance the download and upload amount of resources at each peer. This mechanism can be implemented in a distributed system and it converges much faster than the other existing approaches.
△ Less
Submitted 2 June, 2016;
originally announced June 2016.
-
Generalized Analysis of Convergence of Absolute Trust in Peer to Peer Networks
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
Open and anonymous nature of peer to peer networks provides an opportunity to malicious peers to behave unpredictably in the network. This leads the lack of trust among the peers. To control the behavior of peers in the network, reputation system can be used. In a reputation system, aggregation of trust is a primary issue. Algorithm for aggregation of trust should be designed such that, it can con…
▽ More
Open and anonymous nature of peer to peer networks provides an opportunity to malicious peers to behave unpredictably in the network. This leads the lack of trust among the peers. To control the behavior of peers in the network, reputation system can be used. In a reputation system, aggregation of trust is a primary issue. Algorithm for aggregation of trust should be designed such that, it can converge to a certain finite value. Absolute Trust is one of the algorithm, which is used for the aggregation of trust in peer to peer networks. In this letter, we present the generalized analysis of convergence of the Absolute Trust algorithm.
△ Less
Submitted 2 March, 2016;
originally announced March 2016.
-
Absolute Trust: Algorithm for Aggregation of Trust in Peer-to- Peer Networks
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
To mitigate the attacks by malicious peers and to motivate the peers to share the resources in peer-to-peer networks, several reputation systems have been proposed in the past. In most of them, the peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However such an aggregation process requires approximations in order to converge at…
▽ More
To mitigate the attacks by malicious peers and to motivate the peers to share the resources in peer-to-peer networks, several reputation systems have been proposed in the past. In most of them, the peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However such an aggregation process requires approximations in order to converge at some global consensus. It may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation, we can only know that who is better among them without knowing their rank in the whole network. In this paper, we are proposing a new algorithm which accounts for the past behavior of the peers and will estimate the absolute value of the trust of peers. Consequently, we can suitably identify them as a good peers or malicious peers. Our algorithm converges at some global consensus much faster by choosing suitable parameters. Because of its absolute nature it will equally load all the peers in network. It will also reduce the inauthentic download in the network which was not possible in existing algorithms.
△ Less
Submitted 7 January, 2016;
originally announced January 2016.
-
Loop Free Multipath Routing Algorithm
Authors:
Rashmi Singh,
Yatindra Nath Singh,
Anita Yadav
Abstract:
Single path routing that is currently used in the internet routers,is easy to implement as it simplifies the routing tables and packet flow paths. However it is not optimal and has shortcomings in utilizing the network resources optimally, load balancing & fast recovery in case of faults (fault tolerance). The given algorithm resolves all these problems by using all possible multiple paths for tra…
▽ More
Single path routing that is currently used in the internet routers,is easy to implement as it simplifies the routing tables and packet flow paths. However it is not optimal and has shortcomings in utilizing the network resources optimally, load balancing & fast recovery in case of faults (fault tolerance). The given algorithm resolves all these problems by using all possible multiple paths for transfer of information, while retaining loop-free property. We have proposed a new dynamic loop-free multipath routing algorithm which improves network throughput and network resource utilization, reduces average transmission delay, and is not affected by faults in the links and router nodes. The main idea of this algorithm is to maintain multiple possible next hops for a destination along with weights. At every node, the traffic to a destination is split among multiple next hops in proportion to the estimated weights. The number of multiple next hops also changes depending on the traffic conditions, but it is never less than one.
△ Less
Submitted 6 January, 2016;
originally announced January 2016.
-
Resource allocation in Peer-to-Peer Networks: A Control-Theoretical Perspective
Authors:
Nitin Singha,
Ruchir Gupta,
Yatindra Nath Singh
Abstract:
P2P system rely on voluntary allocation of resources by its members due to absence of any central controlling authority. This resource allocation can be viewed as classical control problem where feedback is the amount of resource received, which controls the output i.e. the amount of resources shared back to the network by the node. The motivation behind the use of control system in resource alloc…
▽ More
P2P system rely on voluntary allocation of resources by its members due to absence of any central controlling authority. This resource allocation can be viewed as classical control problem where feedback is the amount of resource received, which controls the output i.e. the amount of resources shared back to the network by the node. The motivation behind the use of control system in resource allocation is to exploit already existing tools in control theory to improve the overall allocation process and thereby solving the problem of freeriding and whitewashing in the network. At the outset, we have derived the transfer function to model the P2P system. Subsequently, through the simulation results we have shown that transfer function was able to provide optimal value of resource sharing for the peers during the normal as well as high degree of overloading in the network. Thereafter we verified the accuracy of the transfer function derived by comparing its output with the simulated P2P network. To demonstrate how control system reduces free riding it has been shown through simulations how the control systems penalizes the nodes indulging in different levels of freeriding. Our proposed control system shows considerable gain over existing state of art algorithm. This improvement is achieved through PI action of controller. Since low reputation peers usually subvert reputation system by whitewashing. We propose and substantiate a technique modifying transfer function such that systems' sluggishness becomes adaptive in such a way that it encourage genuine new comers to enter network and discourages member peers to whitewash.
△ Less
Submitted 24 December, 2015; v1 submitted 26 September, 2015;
originally announced September 2015.
-
A Parameter-free Affinity Based Clustering
Authors:
Bhaskar Mukhoty,
Ruchir Gupta,
Y. N. Singh
Abstract:
Several methods have been proposed to estimate the number of clusters in a dataset; the basic ideal behind all of them has been to study an index that measures inter-cluster separation and intra-cluster cohesion over a range of cluster numbers and report the number which gives an optimum value of the index. In this paper we propose a simple, parameter free approach that is like human cognition to…
▽ More
Several methods have been proposed to estimate the number of clusters in a dataset; the basic ideal behind all of them has been to study an index that measures inter-cluster separation and intra-cluster cohesion over a range of cluster numbers and report the number which gives an optimum value of the index. In this paper we propose a simple, parameter free approach that is like human cognition to form clusters, where closely lying points are easily identified to form a cluster and total number of clusters are revealed. To identify closely lying points, affinity of two points is defined as a function of distance and a threshold affinity is identified, above which two points in a dataset are likely to be in the same cluster. Well separated clusters are identified even in the presence of outliers, whereas for not so well separated dataset, final number of clusters are estimated and the detected clusters are merged to produce the final clusters. Experiments performed with several large dimensional synthetic and real datasets show good results with robustness to noise and density variation within dataset.
△ Less
Submitted 11 January, 2016; v1 submitted 20 July, 2015;
originally announced July 2015.
-
Analysis of Average Travel Time for Stateless Opportunistic Routing Techniques
Authors:
Sateeshkrishna Dhuli,
Yatindra Nath Singh
Abstract:
Wireless network applications, such as, searching, routing, self stabilization and query processing can be modeled as random walks on graphs. Stateless Opportunistic routing technique is a robust distributed routing technique based on random walk approach, where nodes transfer the packets to one of their direct neighbors uniformly, until the packets reach their destinations. Simplicity in executio…
▽ More
Wireless network applications, such as, searching, routing, self stabilization and query processing can be modeled as random walks on graphs. Stateless Opportunistic routing technique is a robust distributed routing technique based on random walk approach, where nodes transfer the packets to one of their direct neighbors uniformly, until the packets reach their destinations. Simplicity in execution, fault tolerance, low overhead and robustness to topology changes made it more suitable to wireless sensor networks scenarios. But the main disadvantage of stateless opportunistic routing is estimating and studying the effect of network parameters on the packet latency. In this work, we derived the analytical expressions for mean latency or average packet travel time for r-nearest neighbor cycle, r-nearest neighbor torus networks. Further, we derived the generalized expression for mean latency for m-dimensional r- nearest neighbor torus networks and studied the effect of number of nodes, nearest neighbors and network dimension on average packet travel time.
△ Less
Submitted 9 December, 2014;
originally announced December 2014.
-
Network Criticality Analysis for Finite Sized Wireless Sensor Networks
Authors:
Sateeshkrishna Dhuli,
Yatindra Nath Singh
Abstract:
The topology of a sensor network changes very frequently due to node failures because of power constraints or physical destruction. Robustness to topology changes is one of the important design factors of wireless sensor networks which makes them suitable to military, communications, health and surveillance applications. Network criticality is a measure which capture the properties of network robu…
▽ More
The topology of a sensor network changes very frequently due to node failures because of power constraints or physical destruction. Robustness to topology changes is one of the important design factors of wireless sensor networks which makes them suitable to military, communications, health and surveillance applications. Network criticality is a measure which capture the properties of network robustness to environmental changes. In this work, we derived the analytical formulas for network criticality, normalized network criticality and studied the network robustness for r-nearest neighbor cycle and r-nearest neighbor torus networks. Further, we compared our analytical results with simulation results and studied the effect of number of nodes, nearest neighbors and network dimension on the network criticality and normalized network criticality.
△ Less
Submitted 30 March, 2021; v1 submitted 9 December, 2014;
originally announced December 2014.
-
Convergence Analysis for Regular Wireless Consensus Networks
Authors:
Sateeshkrishna Dhuli,
Kumar Gaurav,
Y. N. Singh
Abstract:
Average consensus algorithms can be implemented over wireless sensor networks (WSN), where global statistics can be computed using communications among sensor nodes locally. Simple execution, robustness to global topology changes due to frequent node failures and underlying distributed philosophy has made consensus algorithms more suitable to WSNs. Since these algorithms are iterative in nature, t…
▽ More
Average consensus algorithms can be implemented over wireless sensor networks (WSN), where global statistics can be computed using communications among sensor nodes locally. Simple execution, robustness to global topology changes due to frequent node failures and underlying distributed philosophy has made consensus algorithms more suitable to WSNs. Since these algorithms are iterative in nature, their performance is characterized by convergence speed. We study the convergence of the average consensus algorithms for WSNs using regular graphs. We obtained the analytical expressions for optimal consensus and convergence parameters which decides the convergence time for r-nearest neighbor cycle and torus networks. We have also derived the generalized expression for optimal consensus and convergence parameters for m-dimensional r-nearest neighbor torus networks. The obtained analytical results agree with the simulation results and shown the effect of network dimension, number of nodes and transmission radius on convergence time. This work provides the basic analytical tools for managing and controlling the performance of average consensus algorithm in the finite sized practical networks.
△ Less
Submitted 22 September, 2016; v1 submitted 4 November, 2014;
originally announced November 2014.
-
Robust Statistical Approach for Extraction of Moving Human Silhouettes from Videos
Authors:
Oinam Binarani Devi,
Nissi S. Paul,
Y. Jayanta Singh
Abstract:
Human pose estimation is one of the key problems in computer vision that has been studied in the recent years. The significance of human pose estimation is in the higher level tasks of understanding human actions applications such as recognition of anomalous actions present in videos and many other related applications. The human poses can be estimated by extracting silhouettes of humans as silhou…
▽ More
Human pose estimation is one of the key problems in computer vision that has been studied in the recent years. The significance of human pose estimation is in the higher level tasks of understanding human actions applications such as recognition of anomalous actions present in videos and many other related applications. The human poses can be estimated by extracting silhouettes of humans as silhouettes are robust to variations and it gives the shape information of the human body. Some common challenges include illumination changes, variation in environments, and variation in human appearances. Thus there is a need for a robust method for human pose estimation. This paper presents a study and analysis of approaches existing for silhouette extraction and proposes a robust technique for extracting human silhouettes in video sequences. Gaussian Mixture Model (GMM) A statistical approach is combined with HSV (Hue, Saturation and Value) color space model for a robust background model that is used for background subtraction to produce foreground blobs, called human silhouettes. Morphological operations are then performed on foreground blobs from background subtraction. The silhouettes obtained from this work can be used in further tasks associated with human action interpretation and activity processes like human action classification, human pose estimation and action recognition or action interpretation.
△ Less
Submitted 17 August, 2014;
originally announced August 2014.
-
Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks
Authors:
Ruchir Gupta,
Abhijeet C. Maali,
Yatindra Nath Singh
Abstract:
Real life networks are generally modelled as scale free networks. Information diffusion in such networks in decentralised environment is a difficult and resource consuming affair. Gossip algorithms have come up as a good solution to this problem. In this paper, we have proposed Adaptive First Push Then Pull gossip algorithm. We show that algorithm works with minimum cost when the transition round…
▽ More
Real life networks are generally modelled as scale free networks. Information diffusion in such networks in decentralised environment is a difficult and resource consuming affair. Gossip algorithms have come up as a good solution to this problem. In this paper, we have proposed Adaptive First Push Then Pull gossip algorithm. We show that algorithm works with minimum cost when the transition round to switch from Adaptive Push to Adaptive Pull is close to Round(log(N)). Furthermore, we compare our algorithm with Push, Pull and First Push Then Pull and show that the proposed algorithm is the most cost efficient in Scale Free networks.
△ Less
Submitted 22 October, 2013;
originally announced October 2013.