-
In Planta Tattoo and Kirigami Sensors for Self-Powered Monitoring of Vapor Pressure Deficit and Growth Dynamics
Authors:
Nafize Ishtiaque Hossain,
Kundan Saha,
Atul Sharma,
Sameer Sonkusale
Abstract:
We report a scalable, self-powered in planta sensor platform for continuous monitoring of plant hydration and growth. The system integrates two components a leaf mounted tattoo sensor for estimating vapor pressure deficit and a kirigami inspired strain sensor for tracking radial stem growth. Uniquely, the tattoo sensor serves a dual function measuring temperature and humidity beneath the leaf surf…
▽ More
We report a scalable, self-powered in planta sensor platform for continuous monitoring of plant hydration and growth. The system integrates two components a leaf mounted tattoo sensor for estimating vapor pressure deficit and a kirigami inspired strain sensor for tracking radial stem growth. Uniquely, the tattoo sensor serves a dual function measuring temperature and humidity beneath the leaf surface while simultaneously harvesting power from ambient moisture via a vanadium pentoxide nanosheet membrane. This moist-electric generator configuration enables energy-autonomous operation, delivering a power density of 0.1114 miroW per square cm. The V2O5 based sensor exhibits high sensitivity to humidity and temperature, enabling accurate VPD estimation for over 10 days until leaf senescence. The eutectogel based kirigami strain sensor, wrapped around the stem, offers a gauge factor of 1.5 and immunity to unrelated mechanical disturbances, allowing continuous growth tracking for more than 20 days. Both sensors are fabricated via cleanroom-free, roll to roll compatible methods, underscoring their potential for large-scale agricultural deployment to monitor abiotic stress and improve crop management.
△ Less
Submitted 2 September, 2025;
originally announced September 2025.
-
Ku-Band AlScn-On-Diamond SAW Resonators with Phase Velocity above 8600 m/s
Authors:
Tzu-Hsuan Hsu,
Kapil Saha,
Jack Kramer,
Omar Barrera,
Pietro Simoni,
Matteo Rinaldi,
Ruochen Lu
Abstract:
In this work, an Aluminum Scandium Nitride (AlScN) on Diamond Sezawa-mode surface acoustic wave (SAW) platform for RF filtering at Ku-band (12-18 GHz) is demonstrated. Thanks to the high acoustic velocity and low-loss diamond substrate, the prototype resonator at 12.9 GHz achieves a high phase velocity ($v_p$) of 8671 m/s, a maximum Bode-$Q$ of 408, and coupling coefficient ($k_{\mathrm{eff}}^2$)…
▽ More
In this work, an Aluminum Scandium Nitride (AlScN) on Diamond Sezawa-mode surface acoustic wave (SAW) platform for RF filtering at Ku-band (12-18 GHz) is demonstrated. Thanks to the high acoustic velocity and low-loss diamond substrate, the prototype resonator at 12.9 GHz achieves a high phase velocity ($v_p$) of 8671 m/s, a maximum Bode-$Q$ of 408, and coupling coefficient ($k_{\mathrm{eff}}^2$) of 2.1%, outperforming high-velocity substrates such as SiC and sapphire by more than 20% in velocity. Resonators spanning 8-18 GHz are presented. The platform's high power handling above 12.5 dBm is also experimentally validated.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
ScAlN-on-SiC Ku-Band Solidly-Mounted Bidimensional Mode Resonators
Authors:
Luca Colombo,
Luca Spagnuolo,
Kapil Saha,
Gabriel Giribaldi,
Pietro Simeoni,
Matteo Rinaldi
Abstract:
This letter reports on Solidly-Mounted Bidimensional Mode Resonators (S2MRs) exploiting a highly-optimized Sezawa mode in 30% Scandium-doped Aluminum Nitride (ScAlN) on Silicon Carbide (SiC) and operating near 16 GHz. Experimental results demonstrate mechanical quality factors (Qm) as high as 380, Bode quality factors (QBode) approaching 500, electromechanical coupling coefficients (kt2) of 4.5%,…
▽ More
This letter reports on Solidly-Mounted Bidimensional Mode Resonators (S2MRs) exploiting a highly-optimized Sezawa mode in 30% Scandium-doped Aluminum Nitride (ScAlN) on Silicon Carbide (SiC) and operating near 16 GHz. Experimental results demonstrate mechanical quality factors (Qm) as high as 380, Bode quality factors (QBode) approaching 500, electromechanical coupling coefficients (kt2) of 4.5%, an overall Figure of Merit (FOM = Qm kt2) exceeding 17, and power handling greater than 20 dBm for devices closely matched to 50 ohms. To the best of the authors' knowledge, S2MRs exhibit the highest Key Performance Indicators (KPIs) among solidly mounted resonators in the Ku band, paving the way for the integration of nanoacoustic devices on fast substrates with high-power electronics, tailored for military and harsh-environment applications.
△ Less
Submitted 6 February, 2025; v1 submitted 20 November, 2024;
originally announced November 2024.
-
Turbulence Strength $C_n^2$ Estimation from Video using Physics-based Deep Learning
Authors:
Ripon Kumar Saha,
Esen Salcin,
Jihoo Kim,
Joseph Smith,
Suren Jayasuriya
Abstract:
Images captured from a long distance suffer from dynamic image distortion due to turbulent flow of air cells with random temperatures, and thus refractive indices. This phenomenon, known as image dancing, is commonly characterized by its refractive-index structure constant $C_n^2$ as a measure of the turbulence strength. For many applications such as atmospheric forecast model, long-range/astronom…
▽ More
Images captured from a long distance suffer from dynamic image distortion due to turbulent flow of air cells with random temperatures, and thus refractive indices. This phenomenon, known as image dancing, is commonly characterized by its refractive-index structure constant $C_n^2$ as a measure of the turbulence strength. For many applications such as atmospheric forecast model, long-range/astronomy imaging, and aviation safety, optical communication technology, $C_n^2$ estimation is critical for accurately sensing the turbulent environment. Previous methods for $C_n^2$ estimation include estimation from meteorological data (temperature, relative humidity, wind shear, etc.) for single-point measurements, two-ended pathlength measurements from optical scintillometer for path-averaged $C_n^2$, and more recently estimating $C_n^2$ from passive video cameras for low cost and hardware complexity. In this paper, we present a comparative analysis of classical image gradient methods for $C_n^2$ estimation and modern deep learning-based methods leveraging convolutional neural networks. To enable this, we collect a dataset of video capture along with reference scintillometer measurements for ground truth, and we release this unique dataset to the scientific community. We observe that deep learning methods can achieve higher accuracy when trained on similar data, but suffer from generalization errors to other, unseen imagery as compared to classical methods. To overcome this trade-off, we present a novel physics-based network architecture that combines learned convolutional layers with a differentiable image gradient method that maintains high accuracy while being generalizable across image datasets.
△ Less
Submitted 29 August, 2024;
originally announced August 2024.
-
Turb-Seg-Res: A Segment-then-Restore Pipeline for Dynamic Videos with Atmospheric Turbulence
Authors:
Ripon Kumar Saha,
Dehao Qin,
Nianyi Li,
Jinwei Ye,
Suren Jayasuriya
Abstract:
Tackling image degradation due to atmospheric turbulence, particularly in dynamic environment, remains a challenge for long-range imaging systems. Existing techniques have been primarily designed for static scenes or scenes with small motion. This paper presents the first segment-then-restore pipeline for restoring the videos of dynamic scenes in turbulent environment. We leverage mean optical flo…
▽ More
Tackling image degradation due to atmospheric turbulence, particularly in dynamic environment, remains a challenge for long-range imaging systems. Existing techniques have been primarily designed for static scenes or scenes with small motion. This paper presents the first segment-then-restore pipeline for restoring the videos of dynamic scenes in turbulent environment. We leverage mean optical flow with an unsupervised motion segmentation method to separate dynamic and static scene components prior to restoration. After camera shake compensation and segmentation, we introduce foreground/background enhancement leveraging the statistics of turbulence strength and a transformer model trained on a novel noise-based procedural turbulence generator for fast dataset augmentation. Benchmarked against existing restoration methods, our approach restores most of the geometric distortion and enhances sharpness for videos. We make our code, simulator, and data publicly available to advance the field of video restoration from turbulence: riponcs.github.io/TurbSegRes
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
Development and Validation of a Dynamic Operating Envelopes-enabled Demand Response Scheme in Low-voltage Distribution Networks
Authors:
Gayan Lankeshwara,
Rahul Sharma,
M. R. Alam,
Ruifeng Yan,
Tapan K. Saha
Abstract:
Dynamic operating envelopes (DOEs) offer an attractive solution for maintaining network integrity amidst increasing penetration of distributed energy resources (DERs) in low-voltage (LV) networks. Currently, the focus of DOEs primarily revolves around active power exports of rooftop photovoltaic (PV) generation, often neglecting the impact of demand response (DR). This paper presents a two-stage,…
▽ More
Dynamic operating envelopes (DOEs) offer an attractive solution for maintaining network integrity amidst increasing penetration of distributed energy resources (DERs) in low-voltage (LV) networks. Currently, the focus of DOEs primarily revolves around active power exports of rooftop photovoltaic (PV) generation, often neglecting the impact of demand response (DR). This paper presents a two-stage, coordinated approach for residential DR participation in electricity markets under the DOE framework. In the first stage, the distribution network service provider (DNSP) adopts a convex hull technique to establish DOEs at each customer point-of-connection (POC). In the second stage, the demand response aggregator (DRA) utilises DOEs assigned by the DNSP to develop a hierarchical control scheme for tracking a load set-point signal without jeopardising network statutory limits. To assess the effectiveness of the proposed control scheme in a practical setting, software-in-the-loop (SIL) tests are performed in a grid simulator, considering a real residential feeder with realistic household load and generation profiles. Simulation validations suggest that the DRA can provide precise DR while honouring network statutory limits and maintaining end-user thermal comfort. Furthermore, the overall approach is compliant with the market dispatch interval and preserves end-user data privacy.
△ Less
Submitted 26 November, 2023;
originally announced November 2023.
-
Expert-Agnostic Ultrasound Image Quality Assessment using Deep Variational Clustering
Authors:
Deepak Raina,
Dimitrios Ntentia,
SH Chandrashekhara,
Richard Voyles,
Subir Kumar Saha
Abstract:
Ultrasound imaging is a commonly used modality for several diagnostic and therapeutic procedures. However, the diagnosis by ultrasound relies heavily on the quality of images assessed manually by sonographers, which diminishes the objectivity of the diagnosis and makes it operator-dependent. The supervised learning-based methods for automated quality assessment require manually annotated datasets,…
▽ More
Ultrasound imaging is a commonly used modality for several diagnostic and therapeutic procedures. However, the diagnosis by ultrasound relies heavily on the quality of images assessed manually by sonographers, which diminishes the objectivity of the diagnosis and makes it operator-dependent. The supervised learning-based methods for automated quality assessment require manually annotated datasets, which are highly labour-intensive to acquire. These ultrasound images are low in quality and suffer from noisy annotations caused by inter-observer perceptual variations, which hampers learning efficiency. We propose an UnSupervised UltraSound image Quality assessment Network, US2QNet, that eliminates the burden and uncertainty of manual annotations. US2QNet uses the variational autoencoder embedded with the three modules, pre-processing, clustering and post-processing, to jointly enhance, extract, cluster and visualize the quality feature representation of ultrasound images. The pre-processing module uses filtering of images to point the network's attention towards salient quality features, rather than getting distracted by noise. Post-processing is proposed for visualizing the clusters of feature representations in 2D space. We validated the proposed framework for quality assessment of the urinary bladder ultrasound images. The proposed framework achieved 78% accuracy and superior performance to state-of-the-art clustering methods.
△ Less
Submitted 6 July, 2023; v1 submitted 5 July, 2023;
originally announced July 2023.
-
DeeBBAA: A benchmark Deep Black Box Adversarial Attack against Cyber-Physical Power Systems
Authors:
Arnab Bhattacharjee,
Tapan K. Saha,
Ashu Verma,
Sukumar Mishra
Abstract:
An increased energy demand, and environmental pressure to accommodate higher levels of renewable energy and flexible loads like electric vehicles have led to numerous smart transformations in the modern power systems. These transformations make the cyber-physical power system highly susceptible to cyber-adversaries targeting its numerous operations. In this work, a novel black box adversarial atta…
▽ More
An increased energy demand, and environmental pressure to accommodate higher levels of renewable energy and flexible loads like electric vehicles have led to numerous smart transformations in the modern power systems. These transformations make the cyber-physical power system highly susceptible to cyber-adversaries targeting its numerous operations. In this work, a novel black box adversarial attack strategy is proposed targeting the AC state estimation operation of an unknown power system using historical data. Specifically, false data is injected into the measurements obtained from a small subset of the power system components which leads to significant deviations in the state estimates. Experiments carried out on the IEEE 39 bus and 118 bus test systems make it evident that the proposed strategy, called DeeBBAA, can evade numerous conventional and state-of-the-art attack detection mechanisms with very high probability.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Slim U-Net: Efficient Anatomical Feature Preserving U-net Architecture for Ultrasound Image Segmentation
Authors:
Deepak Raina,
Kashish Verma,
SH Chandrashekhara,
Subir Kumar Saha
Abstract:
We investigate the applicability of U-Net based models for segmenting Urinary Bladder (UB) in male pelvic view UltraSound (US) images. The segmentation of UB in the US image aids radiologists in diagnosing the UB. However, UB in US images has arbitrary shapes, indistinct boundaries and considerably large inter- and intra-subject variability, making segmentation a quite challenging task. Our study…
▽ More
We investigate the applicability of U-Net based models for segmenting Urinary Bladder (UB) in male pelvic view UltraSound (US) images. The segmentation of UB in the US image aids radiologists in diagnosing the UB. However, UB in US images has arbitrary shapes, indistinct boundaries and considerably large inter- and intra-subject variability, making segmentation a quite challenging task. Our study of the state-of-the-art (SOTA) segmentation network, U-Net, for the problem reveals that it often fails to capture the salient characteristics of UB due to the varying shape and scales of anatomy in the noisy US image. Also, U-net has an excessive number of trainable parameters, reporting poor computational efficiency during training. We propose a Slim U-Net to address the challenges of UB segmentation. Slim U-Net proposes to efficiently preserve the salient features of UB by reshaping the structure of U-Net using a less number of 2D convolution layers in the contracting path, in order to preserve and impose them on expanding path. To effectively distinguish the blurred boundaries, we propose a novel annotation methodology, which includes the background area of the image at the boundary of a marked region of interest (RoI), thereby steering the model's attention towards boundaries. In addition, we suggested a combination of loss functions for network training in the complex segmentation of UB. The experimental results demonstrate that Slim U-net is statistically superior to U-net for UB segmentation. The Slim U-net further decreases the number of trainable parameters and training time by 54% and 57.7%, respectively, compared to the standard U-Net, without compromising the segmentation accuracy.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s
Authors:
Muhammed Kawser Ahmed,
Sujan Kumar Saha,
Christophe Bobda
Abstract:
Secure and trustworthy execution in heterogeneous SoCs is a major priority in the modern computing system. Security of SoCs mainly addresses two broad layers of trust issues: 1. Protection against hardware security threats(Side-channel, IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection against malicious software attacks running on SoC processors. To resist malicious s…
▽ More
Secure and trustworthy execution in heterogeneous SoCs is a major priority in the modern computing system. Security of SoCs mainly addresses two broad layers of trust issues: 1. Protection against hardware security threats(Side-channel, IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection against malicious software attacks running on SoC processors. To resist malicious software-level attackers from gaining unauthorized access and compromising security, we propose a root of trust-based trusted execution mechanism \textbf{\textit{(named as \textbf{TrustToken}) }}. TrustToken builds a security block to provide a root of trust-based IP security: secure key generation and truly random source.
\textbf{TrustToken} only allows trusted communication between the non-trusted third-party IP and the rest of the SoC world by providing essential security features, i.e., secure, isolated execution, and trusted user interaction. The proposed design achieves this by interconnecting the third-party IP interface to \textbf{TrustToken} Controller and checking IP authorization(Token) signals \texttt{`correctness'} at run-time. \textbf{TrustToken} architecture shows a very low overhead resource utilization LUT (618, 1.16 \%), FF (44, 0.04 \%), and BUFG (2 , 6.25\%) in implementation. The experiment results show that TrustToken can provide a secure, low-cost, and trusted solution for non-trusted SoC IPs.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Trusted IP solution in multi-tenant cloud FPGA platform
Authors:
Muhammed Kawser Ahmed,
Sujan Kumar Saha,
Christophe Bobda
Abstract:
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per watt and flexibility, they are being used more and more in cloud and data center applications. There are growing worries about the security risks posed by multi-tenant sharing as the demand for hardware acceleration increases and gradually gives way to FPGA multi-tenancy in the cloud. The confident…
▽ More
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per watt and flexibility, they are being used more and more in cloud and data center applications. There are growing worries about the security risks posed by multi-tenant sharing as the demand for hardware acceleration increases and gradually gives way to FPGA multi-tenancy in the cloud. The confidentiality, integrity, and availability of FPGA-accelerated applications may be compromised if space-shared FPGAs are made available to many cloud tenants. We propose a root of trust-based trusted execution mechanism called \textbf{TrustToken} to prevent harmful software-level attackers from getting unauthorized access and jeopardizing security. With safe key creation and truly random sources, \textbf{TrustToken} creates a security block that serves as the foundation of trust-based IP security. By offering crucial security characteristics, such as secure, isolated execution and trusted user interaction, \textbf{TrustToken} only permits trustworthy connection between the non-trusted third-party IP and the rest of the SoC environment. The suggested approach does this by connecting the third-party IP interface to the \textbf{TrustToken} Controller and running run-time checks on the correctness of the IP authorization(Token) signals. With an emphasis on software-based assaults targeting unauthorized access and information leakage, we offer a noble hardware/software architecture for trusted execution in FPGA-accelerated clouds and data centers.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Multi-Tenant Cloud FPGA: A Survey on Security
Authors:
Muhammed Kawser Ahmed,
Joel Mandebi,
Sujan Kumar Saha,
Christophe Bobda
Abstract:
With the exponentially increasing demand for performance and scalability in cloud applications and systems, data center architectures evolved to integrate heterogeneous computing fabrics that leverage CPUs, GPUs, and FPGAs. FPGAs differ from traditional processing platforms such as CPUs and GPUs in that they are reconfigurable at run-time, providing increased and customized performance, flexibilit…
▽ More
With the exponentially increasing demand for performance and scalability in cloud applications and systems, data center architectures evolved to integrate heterogeneous computing fabrics that leverage CPUs, GPUs, and FPGAs. FPGAs differ from traditional processing platforms such as CPUs and GPUs in that they are reconfigurable at run-time, providing increased and customized performance, flexibility, and acceleration. FPGAs can perform large-scale search optimization, acceleration, and signal processing tasks compared with power, latency, and processing speed. Many public cloud provider giants, including Amazon, Huawei, Microsoft, Alibaba, etc., have already started integrating FPGA-based cloud acceleration services. While FPGAs in cloud applications enable customized acceleration with low power consumption, it also incurs new security challenges that still need to be reviewed. Allowing cloud users to reconfigure the hardware design after deployment could open the backdoors for malicious attackers, potentially putting the cloud platform at risk. Considering security risks, public cloud providers still don't offer multi-tenant FPGA services. This paper analyzes the security concerns of multi-tenant cloud FPGAs, gives a thorough description of the security problems associated with them, and discusses upcoming future challenges in this field of study.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Modified Froelich's Equation for Modelling of a Three Phase Self-Excited Synchronous Generator
Authors:
Udayan Banerjee,
Nayan Kumar,
Thotakura NSC Sekhar,
Tapas Kumar Saha,
Chayan Kumar Paul
Abstract:
With advancement in design and analysis of electro-mechanical and electromagnetic devices, the modelling of magnetic saturation of a synchronous generator has emerged to be a subject of interest in number of publications. Most of the existing electrical machine modelling methods does ignore the saturation effect for simplicity. On the other hand, who incorporate saturation effect, are dealing with…
▽ More
With advancement in design and analysis of electro-mechanical and electromagnetic devices, the modelling of magnetic saturation of a synchronous generator has emerged to be a subject of interest in number of publications. Most of the existing electrical machine modelling methods does ignore the saturation effect for simplicity. On the other hand, who incorporate saturation effect, are dealing with complex computation of coefficients which involves tedious curve fitting techniques like non-linear regression, least-squares. This paper presents the novel method of modelling of the self-excited synchronous generator along with magnetizing characteristics with ease and good accuracy which is inspired from Froelichs equation. The proposed mathematical model is implemented in simulation environment and validated the results with a practical three phase self-excited synchronous generator in which saturation plays a vital role.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Robust Artificial Delay based Impedance Control of Robotic Manipulators with Uncertain Dynamics
Authors:
Udayan Banerjee,
Bhabani Shankar Dey,
Indra Narayan Kar,
Subir Kumar Saha
Abstract:
In this paper an artificial delay based impedance controller is proposed for robotic manipulators with uncertainty in dynamics. The control law unites the time delayed estimation (TDE) framework with a second order switching controller of super twisting algorithm (STA) type via a novel generalized filtered tracking error (GFTE). While time delayed estimation framework eliminates the need for accur…
▽ More
In this paper an artificial delay based impedance controller is proposed for robotic manipulators with uncertainty in dynamics. The control law unites the time delayed estimation (TDE) framework with a second order switching controller of super twisting algorithm (STA) type via a novel generalized filtered tracking error (GFTE). While time delayed estimation framework eliminates the need for accurate modelling of robot dynamics by estimating the uncertain robot dynamics and interaction forces from immediate past data of state and control effort, the second order switching control law in the outer loop provides robustness against the time delayed estimation (TDE) error that arises due to approximation of the manipulator dynamics. Thus, the proposed control law tries to establish a desired impedance model between the robot end effector variables i.e. force and motion in presence of uncertainties, both when it is encountering smooth contact forces and during free motion. Simulation results for a two link manipulator using the proposed controller along with convergence analysis are shown to validate the proposition.
△ Less
Submitted 20 August, 2022; v1 submitted 18 August, 2022;
originally announced August 2022.
-
AI-based automated Meibomian gland segmentation, classification and reflection correction in infrared Meibography
Authors:
Ripon Kumar Saha,
A. M. Mahmud Chowdhury,
Kyung-Sun Na,
Gyu Deok Hwang,
Youngsub Eom,
Jaeyoung Kim,
Hae-Gon Jeon,
Ho Sik Hwang,
Euiheon Chung
Abstract:
Purpose: Develop a deep learning-based automated method to segment meibomian glands (MG) and eyelids, quantitatively analyze the MG area and MG ratio, estimate the meiboscore, and remove specular reflections from infrared images. Methods: A total of 1600 meibography images were captured in a clinical setting. 1000 images were precisely annotated with multiple revisions by investigators and graded…
▽ More
Purpose: Develop a deep learning-based automated method to segment meibomian glands (MG) and eyelids, quantitatively analyze the MG area and MG ratio, estimate the meiboscore, and remove specular reflections from infrared images. Methods: A total of 1600 meibography images were captured in a clinical setting. 1000 images were precisely annotated with multiple revisions by investigators and graded 6 times by meibomian gland dysfunction (MGD) experts. Two deep learning (DL) models were trained separately to segment areas of the MG and eyelid. Those segmentation were used to estimate MG ratio and meiboscores using a classification-based DL model. A generative adversarial network was implemented to remove specular reflections from original images. Results: The mean ratio of MG calculated by investigator annotation and DL segmentation was consistent 26.23% vs 25.12% in the upper eyelids and 32.34% vs. 32.29% in the lower eyelids, respectively. Our DL model achieved 73.01% accuracy for meiboscore classification on validation set and 59.17% accuracy when tested on images from independent center, compared to 53.44% validation accuracy by MGD experts. The DL-based approach successfully removes reflection from the original MG images without affecting meiboscore grading. Conclusions: DL with infrared meibography provides a fully automated, fast quantitative evaluation of MG morphology (MG Segmentation, MG area, MG ratio, and meiboscore) which are sufficiently accurate for diagnosing dry eye disease. Also, the DL removes specular reflection from images to be used by ophthalmologists for distraction-free assessment.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
Gaussian Mixture Model Based Distributionally Robust Optimal Power Flow With CVaR Constraints
Authors:
Lei You,
Hui Ma,
Tapan Kumar Saha,
Gang Liu
Abstract:
This paper proposes a distributionally robust optimal power flow (OPF) model for transmission grids with wind power generation. The model uses the conditional value-at-risk (CVaR) constraints to control the reserve and branch flow limit violations caused by wind power forecast errors. Meanwhile, the Gaussian mixture model (GMM) is integrated into the CVaR constraints to guard against the non-Gauss…
▽ More
This paper proposes a distributionally robust optimal power flow (OPF) model for transmission grids with wind power generation. The model uses the conditional value-at-risk (CVaR) constraints to control the reserve and branch flow limit violations caused by wind power forecast errors. Meanwhile, the Gaussian mixture model (GMM) is integrated into the CVaR constraints to guard against the non-Gaussian forecast error distributions. Unlike the previous studies considering the GMM with fixed parameters, this paper allows the GMM parameters to be variable within some credible regions and develops a data-driven GMM-based ambiguity set to achieve the distributional robustness. Also, rather than using the traditional sample-based approximation of CVaR with high computational burden, this paper designs a scalable cutting-plane algorithm to handle the distributionally robust CVaR constraints. Case studies on the IEEE 2736-bus system show the effectiveness and scalability of the proposed OPF model.
△ Less
Submitted 25 October, 2021;
originally announced October 2021.
-
Estimating State of Charge for xEV batteries using 1D Convolutional Neural Networks and Transfer Learning
Authors:
Arnab Bhattacharjee,
Ashu Verma,
Sukumar Mishra,
Tapan K Saha
Abstract:
In this paper we propose a one-dimensional convolutional neural network (CNN)-based state of charge estimation algorithm for electric vehicles. The CNN is trained using two publicly available battery datasets. The influence of different types of noises on the estimation capabilities of the CNN model has been studied. Moreover, a transfer learning mechanism is proposed in order to make the develope…
▽ More
In this paper we propose a one-dimensional convolutional neural network (CNN)-based state of charge estimation algorithm for electric vehicles. The CNN is trained using two publicly available battery datasets. The influence of different types of noises on the estimation capabilities of the CNN model has been studied. Moreover, a transfer learning mechanism is proposed in order to make the developed algorithm generalize better and estimate with an acceptable accuracy when a battery with different chemical characteristics than the one used for training the model, is used. It has been observed that using transfer learning, the model can learn sufficiently well with significantly less amount of battery data. The proposed method fares well in terms of estimation accuracy, learning speed and generalization capability.
△ Less
Submitted 23 January, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Fast Geometric Surface based Segmentation of Point Cloud from Lidar Data
Authors:
Aritra Mukherjee,
Sourya Dipta Das,
Jasorsi Ghosh,
Ananda S. Chowdhury,
Sanjoy Kumar Saha
Abstract:
Mapping the environment has been an important task for robot navigation and Simultaneous Localization And Mapping (SLAM). LIDAR provides a fast and accurate 3D point cloud map of the environment which helps in map building. However, processing millions of points in the point cloud becomes a computationally expensive task. In this paper, a methodology is presented to generate the segmented surfaces…
▽ More
Mapping the environment has been an important task for robot navigation and Simultaneous Localization And Mapping (SLAM). LIDAR provides a fast and accurate 3D point cloud map of the environment which helps in map building. However, processing millions of points in the point cloud becomes a computationally expensive task. In this paper, a methodology is presented to generate the segmented surfaces in real time and these can be used in modeling the 3D objects. At first an algorithm is proposed for efficient map building from single shot data of spinning Lidar. It is based on fast meshing and sub-sampling. It exploits the physical design and the working principle of the spinning Lidar sensor. The generated mesh surfaces are then segmented by estimating the normal and considering their homogeneity. The segmented surfaces can be used as proposals for predicting geometrically accurate model of objects in the robots activity environment. The proposed methodology is compared with some popular point cloud segmentation methods to highlight the efficacy in terms of accuracy and speed.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
A Coalition Formation Game Framework for Peer-to-Peer Energy Trading
Authors:
Wayes Tushar,
Tapan K. Saha,
Chau Yuen,
M. Imran Azim,
Thomas Morstyn,
H. Vincent Poor,
Dustin Niyato,
Richard Bean
Abstract:
This paper studies social cooperation backed peer-to-peer energy trading technique by which prosumers can decide how they can use their batteries opportunistically for participating in the peer-to-peer trading. The objective is to achieve a solution in which the ultimate beneficiaries are the prosumers, i.e., a prosumer-centric solution. To do so, a coalition formation game is designed, which enab…
▽ More
This paper studies social cooperation backed peer-to-peer energy trading technique by which prosumers can decide how they can use their batteries opportunistically for participating in the peer-to-peer trading. The objective is to achieve a solution in which the ultimate beneficiaries are the prosumers, i.e., a prosumer-centric solution. To do so, a coalition formation game is designed, which enables a prosumer to compare its benefit of participating in the peer-to-peer trading with and without using its battery and thus, allows the prosumer to form suitable social coalition groups with other similar prosumers in the network for conducting peer-to-peer trading. The properties of the formed coalitions are studied, and it is shown that 1) the coalition structure that stems from the social cooperation between participating prosumers at each time slot is both stable and optimal, and 2) the outcomes of the proposed peer- to-peer trading scheme is prosumer-centric. Case studies are conducted based on real household energy usage and solar generation data to highlight how the proposed scheme can benefit prosumers through exhibiting prosumer-centric properties.
△ Less
Submitted 24 December, 2019;
originally announced January 2020.
-
Peer-to-Peer Trading in Electricity Networks: An Overview
Authors:
Wayes Tushar,
Tapan K. Saha,
Chau Yuen,
David Smith,
H. Vincent Poor
Abstract:
Peer-to-peer trading is a next-generation energy management technique that economically benefits proactive consumers (prosumers) transacting their energy as goods and services. At the same time, peer-to-peer energy trading is also expected to help the grid by reducing peak demand, lowering reserve requirements, and curtailing network loss. However, large-scale deployment of peer-to-peer trading in…
▽ More
Peer-to-peer trading is a next-generation energy management technique that economically benefits proactive consumers (prosumers) transacting their energy as goods and services. At the same time, peer-to-peer energy trading is also expected to help the grid by reducing peak demand, lowering reserve requirements, and curtailing network loss. However, large-scale deployment of peer-to-peer trading in electricity networks poses a number of challenges in modeling transactions in both the virtual and physical layers of the network. As such, this article provides a comprehensive review of the state-of-the-art in research on peer-to-peer energy trading techniques. By doing so, we provide an overview of the key features of peer-to-peer trading and its benefits of relevance to the grid and prosumers. Then, we systematically classify the existing research in terms of the challenges that the studies address in the virtual and the physical layers. We then further identify and discuss those technical approaches that have been extensively used to address the challenges in peer-to-peer transactions. Finally, the paper is concluded with potential future research directions.
△ Less
Submitted 19 January, 2020;
originally announced January 2020.
-
Feasibility Study of Financial P2P Energy Trading in a Grid-tied Power Network
Authors:
M Imran Azim,
S. A. Pourmousavi,
Wayes Tushar,
Tapan K. Saha
Abstract:
This paper studies the applicability of peer-to-peer (P2P) energy trading in a grid-tied network. The main objectives are to understand the impact of the financial P2P energy trading on the network operation, and thus demonstrate the importance of taking various issues related to power network into account while designing a practical P2P trading scheme. To do so, a simple mechanism is developed fo…
▽ More
This paper studies the applicability of peer-to-peer (P2P) energy trading in a grid-tied network. The main objectives are to understand the impact of the financial P2P energy trading on the network operation, and thus demonstrate the importance of taking various issues related to power network into account while designing a practical P2P trading scheme. To do so, a simple mechanism is developed for energy trading among prosumers without considering any network constraints, as done by many existing studies. Once the trading parameters, such as the energy traded by each prosumer in the P2P market and the price per unit of energy are determined, the developed scheme is tested on a low-voltage (LV) network model to check its feasibility of deployment in a real P2P network. It is shown that although the considered trading scheme is economically beneficial to the participating prosumers compared to the existing incentive mechanisms (such as feed-in-tariff), it could be unfit for real deployment due to violating bus voltage limits during multiple P2P trading executed simultaneously. Further, the grid operator may experience financial losses for compensating the losses during P2P transactions.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Grid Influenced Peer-to-Peer Energy Trading
Authors:
Wayes Tushar,
Tapan Kumar Saha,
Chau Yuen,
Thomas Morstyn,
Nahid-Al-Masood,
H. Vincent Poor,
Richard Bean
Abstract:
This paper proposes a peer-to-peer energy trading scheme that can help the centralized power system to reduce the total electricity demand of its customers at the peak hour. To do so, a cooperative Stackelberg game is formulated, in which the centralized power system acts as the leader that needs to decide on a price at the peak demand period to incentivize prosumers to not seeking any energy from…
▽ More
This paper proposes a peer-to-peer energy trading scheme that can help the centralized power system to reduce the total electricity demand of its customers at the peak hour. To do so, a cooperative Stackelberg game is formulated, in which the centralized power system acts as the leader that needs to decide on a price at the peak demand period to incentivize prosumers to not seeking any energy from it. The prosumers, on the other hand, act as followers and respond to the leader's decision by forming suitable coalitions with neighboring prosumers in order to participate in P2P energy trading to meet their energy demand. The properties of the proposed Stackelberg game are studied. It is shown that the game has a unique and stable Stackelberg equilibrium, as a result of the stability of prosumers' coalitions. At the equilibrium, the leader chooses its strategy using a derived closed-form expression, while the prosumers choose their equilibrium coalition structure. An algorithm is proposed that enables the centralized power system and the prosumers to reach the equilibrium solution. Numerical case studies demonstrate the beneficial properties of the proposed scheme.
△ Less
Submitted 25 August, 2019;
originally announced August 2019.
-
CT Super-resolution GAN Constrained by the Identical, Residual, and Cycle Learning Ensemble(GAN-CIRCLE)
Authors:
Chenyu You,
Guang Li,
Yi Zhang,
Xiaoliu Zhang,
Hongming Shan,
Shenghong Ju,
Zhen Zhao,
Zhuiyang Zhang,
Wenxiang Cong,
Michael W. Vannier,
Punam K. Saha,
Ge Wang
Abstract:
Computed tomography (CT) is widely used in screening, diagnosis, and image-guided therapy for both clinical and research purposes. Since CT involves ionizing radiation, an overarching thrust of related technical research is development of novel methods enabling ultrahigh quality imaging with fine structural details while reducing the X-ray radiation. In this paper, we present a semi-supervised dee…
▽ More
Computed tomography (CT) is widely used in screening, diagnosis, and image-guided therapy for both clinical and research purposes. Since CT involves ionizing radiation, an overarching thrust of related technical research is development of novel methods enabling ultrahigh quality imaging with fine structural details while reducing the X-ray radiation. In this paper, we present a semi-supervised deep learning approach to accurately recover high-resolution (HR) CT images from low-resolution (LR) counterparts. Specifically, with the generative adversarial network (GAN) as the building block, we enforce the cycle-consistency in terms of the Wasserstein distance to establish a nonlinear end-to-end mapping from noisy LR input images to denoised and deblurred HR outputs. We also include the joint constraints in the loss function to facilitate structural preservation. In this deep imaging process, we incorporate deep convolutional neural network (CNN), residual learning, and network in network techniques for feature extraction and restoration. In contrast to the current trend of increasing network depth and complexity to boost the CT imaging performance, which limit its real-world applications by imposing considerable computational and memory overheads, we apply a parallel $1\times1$ CNN to compress the output of the hidden layer and optimize the number of layers and the number of filters for each convolutional layer. Quantitative and qualitative evaluations demonstrate that our proposed model is accurate, efficient and robust for super-resolution (SR) image restoration from noisy LR input images. In particular, we validate our composite SR networks on three large-scale CT datasets, and obtain promising results as compared to the other state-of-the-art methods.
△ Less
Submitted 6 September, 2018; v1 submitted 10 August, 2018;
originally announced August 2018.