-
Towards Generalized On-Chip Communication for Programmable Accelerators in Heterogeneous Architectures
Authors:
Joseph Zuckerman,
John-David Wellman,
Ajay Vanamali,
Manish Shankar,
Gabriele Tombesi,
Karthik Swaminathan,
Kevin Lee,
Mohit Kapur,
Robert Philhower,
Pradip Bose,
Luca P. Carloni
Abstract:
We present several enhancements to the open-source ESP platform to support flexible and efficient on-chip communication for programmable accelerators in heterogeneous SoCs. These enhancements include 1) a flexible point-to-point communication mechanism between accelerators, 2) a multicast NoC that supports data forwarding to multiple accelerators simultaneously, 3) accelerator synchronization leve…
▽ More
We present several enhancements to the open-source ESP platform to support flexible and efficient on-chip communication for programmable accelerators in heterogeneous SoCs. These enhancements include 1) a flexible point-to-point communication mechanism between accelerators, 2) a multicast NoC that supports data forwarding to multiple accelerators simultaneously, 3) accelerator synchronization leveraging the SoC's coherence protocol, 4) an accelerator interface that offers fine-grained control over the communication mode used, and 5) an example ISA extension to support our enhancements. Our solution adds negligible area to the SoC architecture and requires minimal changes to the accelerators themselves. We have validated most of these features in complex FPGA prototypes and plan to include them in the open-source release of ESP in the coming months.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
A Parameterized Algorithm for Vertex and Edge Connectivity of Embedded Graphs
Authors:
Therese Biedl,
Prosenjit Bose,
Karthik Murali
Abstract:
The problem of computing vertex and edge connectivity of a graph are classical problems in algorithmic graph theory. The focus of this paper is on computing these parameters on embedded graphs. A typical example of an embedded graph is a planar graph which can be drawn with no edge crossings. It has long been known that vertex and edge connectivity of planar embedded graphs can be computed in line…
▽ More
The problem of computing vertex and edge connectivity of a graph are classical problems in algorithmic graph theory. The focus of this paper is on computing these parameters on embedded graphs. A typical example of an embedded graph is a planar graph which can be drawn with no edge crossings. It has long been known that vertex and edge connectivity of planar embedded graphs can be computed in linear time. Very recently, Biedl and Murali extended the techniques from planar graphs to 1-plane graphs without $\times$-crossings, i.e., crossings whose endpoints induce a matching. While the tools used were novel, they were highly tailored to 1-plane graphs, and do not provide much leeway for further extension. In this paper, we develop alternate techniques that are simpler, have wider applications to near-planar graphs, and can be used to test both vertex and edge connectivity. Our technique works for all those embedded graphs where any pair of crossing edges are connected by a path that, roughly speaking, can be covered with few cells of the drawing. Important examples of such graphs include optimal 2-planar and optimal 3-planar graphs, $d$-map graphs, $d$-framed graphs, graphs with bounded crossing number, and $k$-plane graphs with bounded number of $\times$-crossings.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Approximating shortest paths in weighted square and hexagonal meshes
Authors:
Prosenjit Bose,
Guillermo Esteban,
David Orden,
Rodrigo I. Silveira
Abstract:
Continuous 2-dimensional space is often discretized by considering a mesh of weighted cells. In this work we study how well a weighted mesh approximates the space, with respect to shortest paths. We consider a shortest path $ \mathit{SP_w}(s,t) $ from $ s $ to $ t $ in the continuous 2-dimensional space, a shortest vertex path $ \mathit{SVP_w}(s,t) $ (or any-angle path), which is a shortest path w…
▽ More
Continuous 2-dimensional space is often discretized by considering a mesh of weighted cells. In this work we study how well a weighted mesh approximates the space, with respect to shortest paths. We consider a shortest path $ \mathit{SP_w}(s,t) $ from $ s $ to $ t $ in the continuous 2-dimensional space, a shortest vertex path $ \mathit{SVP_w}(s,t) $ (or any-angle path), which is a shortest path where the vertices of the path are vertices of the mesh, and a shortest grid path $ \mathit{SGP_w}(s,t) $, which is a shortest path in a graph associated to the weighted mesh. We provide upper and lower bounds on the ratios $ \frac{\lVert \mathit{SGP_w}(s,t)\rVert}{\lVert \mathit{SP_w}(s,t)\rVert} $, $ \frac{\lVert \mathit{SVP_w}(s,t)\rVert}{\lVert \mathit{SP_w}(s,t)\rVert} $, $ \frac{\lVert \mathit{SGP_w}(s,t)\rVert}{\lVert \mathit{SVP_w}(s,t)\rVert} $ in square and hexagonal meshes, extending previous results for triangular grids. These ratios determine the effectiveness of existing algorithms that compute shortest paths on the graphs obtained from the grids. Our main results are that the ratio $ \frac{\lVert \mathit{SGP_w}(s,t)\rVert}{\lVert \mathit{SP_w}(s,t)\rVert} $ is at most $ \frac{2}{\sqrt{2+\sqrt{2}}} \approx 1.08 $ and $ \frac{2}{\sqrt{2+\sqrt{3}}} \approx 1.04 $ in a square and a hexagonal mesh, respectively.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
DADIT: A Dataset for Demographic Classification of Italian Twitter Users and a Comparison of Prediction Methods
Authors:
Lorenzo Lupo,
Paul Bose,
Mahyar Habibi,
Dirk Hovy,
Carlo Schwarz
Abstract:
Social scientists increasingly use demographically stratified social media data to study the attitudes, beliefs, and behavior of the general public. To facilitate such analyses, we construct, validate, and release publicly the representative DADIT dataset of 30M tweets of 20k Italian Twitter users, along with their bios and profile pictures. We enrich the user data with high-quality labels for gen…
▽ More
Social scientists increasingly use demographically stratified social media data to study the attitudes, beliefs, and behavior of the general public. To facilitate such analyses, we construct, validate, and release publicly the representative DADIT dataset of 30M tweets of 20k Italian Twitter users, along with their bios and profile pictures. We enrich the user data with high-quality labels for gender, age, and location. DADIT enables us to train and compare the performance of various state-of-the-art models for the prediction of the gender and age of social media users. In particular, we investigate if tweets contain valuable information for the task, since popular classifiers like M3 don't leverage them. Our best XLM-based classifier improves upon the commonly used competitor M3 by up to 53% F1. Especially for age prediction, classifiers profit from including tweets as features. We also confirm these findings on a German test set.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Approximating the Smallest $k$-Enclosing Geodesic Disc in a Simple Polygon
Authors:
Prosenjit Bose,
Anthony D'Angelo,
Stephane Durocher
Abstract:
We consider the problem of finding a geodesic disc of smallest radius containing at least $k$ points from a set of $n$ points in a simple polygon that has $m$ vertices, $r$ of which are reflex vertices. We refer to such a disc as a SKEG disc. We present an algorithm to compute a SKEG disc using higher-order geodesic Voronoi diagrams with worst-case time…
▽ More
We consider the problem of finding a geodesic disc of smallest radius containing at least $k$ points from a set of $n$ points in a simple polygon that has $m$ vertices, $r$ of which are reflex vertices. We refer to such a disc as a SKEG disc. We present an algorithm to compute a SKEG disc using higher-order geodesic Voronoi diagrams with worst-case time $O(k^{2} n + k^{2} r + \min(kr, r(n-k)) + m)$ ignoring polylogarithmic factors.
We then present two $2$-approximation algorithms that find a geodesic disc containing at least $k$ points whose radius is at most twice that of a SKEG disc. The first algorithm computes a $2$-approximation with high probability in $O((n^{2} / k) \log n \log r + m)$ worst-case time with $O(n + m)$ space. The second algorithm runs in $O(n \log^{2} n \log r + m)$ expected time using $O(n + m)$ expected space, independent of $k$. Note that the first algorithm is faster when $k \in ω(n / \log n)$.
△ Less
Submitted 31 January, 2024;
originally announced February 2024.
-
Routing on Heavy Path WSPD Spanners
Authors:
Prosenjit Bose,
Tyler Tuttle
Abstract:
In this article, we present a construction of a spanner on a set of $n$ points in $\mathbf{R}^d$ that we call a heavy path WSPD spanner. The construction is parameterized by a constant $s > 2$ called the separation ratio. The size of the graph is $O(s^dn)$ and the spanning ratio is at most $1 + 2/s + 2/(s - 1)$. We also show that this graph has a hop spanning ratio of at most $2\lg n + 1$.
We pr…
▽ More
In this article, we present a construction of a spanner on a set of $n$ points in $\mathbf{R}^d$ that we call a heavy path WSPD spanner. The construction is parameterized by a constant $s > 2$ called the separation ratio. The size of the graph is $O(s^dn)$ and the spanning ratio is at most $1 + 2/s + 2/(s - 1)$. We also show that this graph has a hop spanning ratio of at most $2\lg n + 1$.
We present a memoryless local routing algorithm for heavy path WSPD spanners. The routing algorithm requires a vertex $v$ of the graph to store $O(\mathrm{deg}(v)\log n)$ bits of information, where $\mathrm{deg}(v)$ is the degree of $v$. The routing ratio is at most $1 + 4/s + 1/(s - 1)$ and at least $1 + 4/s$ in the worst case. The number of edges on the routing path is bounded by $2\lg n + 1$.
We then show that the heavy path WSPD spanner can be constructed in metric spaces of bounded doubling dimension. These metric spaces have been studied in computational geometry as a generalization of Euclidean space. We show that, in a metric space with doubling dimension $λ$, the heavy path WSPD spanner has size $O(s^λn)$ where $s$ is the separation ratio. The spanning ratio and hop spanning ratio are the same as in the Euclidean case.
Finally, we show that the local routing algorithm works in the bounded doubling dimension case. The vertices require the same amount of storage, but the routing ratio becomes at most $1 + (2 + \fracτ{τ-1})/s + 1/(s - 1)$ in the worst case, where $τ\ge 11$ is a constant related to the doubling dimension.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
The Exact Spanning Ratio of the Parallelogram Delaunay Graph
Authors:
Prosenjit Bose,
Jean-Lou De Carufel,
Sandrine Njoo
Abstract:
Finding the exact spanning ratio of a Delaunay graph has been one of the longstanding open problems in Computational Geometry. Currently there are only four convex shapes for which the exact spanning ratio of their Delaunay graph is known: the equilateral triangle, the square, the regular hexagon and the rectangle. In this paper, we show the exact spanning ratio of the parallelogram Delaunay graph…
▽ More
Finding the exact spanning ratio of a Delaunay graph has been one of the longstanding open problems in Computational Geometry. Currently there are only four convex shapes for which the exact spanning ratio of their Delaunay graph is known: the equilateral triangle, the square, the regular hexagon and the rectangle. In this paper, we show the exact spanning ratio of the parallelogram Delaunay graph, making the parallelogram the fifth convex shape for which an exact bound is known. The worst-case spanning ratio is exactly $$\frac{\sqrt{2}\sqrt{1+A^2+2A\cos(θ_0)+(A+\cos(θ_0))\sqrt{1+A^2+2A\cos(θ_0)}}}{\sin(θ_0)} .$$ where $A$ is the aspect ratio and $θ_0$ is the non-obtuse angle of the parallelogram. Moreover, we show how to construct a parallelogram Delaunay graph whose spanning ratio matches the above mentioned spanning ratio.
△ Less
Submitted 28 February, 2024; v1 submitted 21 December, 2023;
originally announced December 2023.
-
On Separating Path and Tree Systems in Graphs
Authors:
Ahmad Biniaz,
Prosenjit Bose,
Jean-Lou De Carufel,
Anil Maheshwari,
Babak Miraftab,
Saeed Odak,
Michiel Smid,
Shakhar Smorodinsky,
Yelena Yuditsky
Abstract:
We explore the concept of separating systems of vertex sets of graphs. A separating system of a set $X$ is a collection of subsets of $X$ such that for any pair of distinct elements in $X$, there exists a set in the separating system that contains exactly one of the two elements. A separating system of the vertex set of a graph $G$ is called a vertex-separating path (tree) system of $G$ if the ele…
▽ More
We explore the concept of separating systems of vertex sets of graphs. A separating system of a set $X$ is a collection of subsets of $X$ such that for any pair of distinct elements in $X$, there exists a set in the separating system that contains exactly one of the two elements. A separating system of the vertex set of a graph $G$ is called a vertex-separating path (tree) system of $G$ if the elements of the separating system are paths (trees) in the graph $G$. In this paper, we focus on the size of the smallest vertex-separating path (tree) system for different types of graphs, including trees, grids, and maximal outerplanar graphs.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Connected Dominating Sets in Triangulations
Authors:
Prosenjit Bose,
Vida Dujmović,
Hussein Houdrouge,
Pat Morin,
Saeed Odak
Abstract:
We show that every $n$-vertex triangulation has a connected dominating set of size at most $10n/21$. Equivalently, every $n$ vertex triangulation has a spanning tree with at least $11n/21$ leaves. Prior to the current work, the best known bounds were $n/2$, which follows from work of Albertson, Berman, Hutchinson, and Thomassen (J. Graph Theory \textbf{14}(2):247--258). One immediate consequence o…
▽ More
We show that every $n$-vertex triangulation has a connected dominating set of size at most $10n/21$. Equivalently, every $n$ vertex triangulation has a spanning tree with at least $11n/21$ leaves. Prior to the current work, the best known bounds were $n/2$, which follows from work of Albertson, Berman, Hutchinson, and Thomassen (J. Graph Theory \textbf{14}(2):247--258). One immediate consequence of this result is an improved bound for the SEFENOMAP graph drawing problem of Angelini, Evans, Frati, and Gudmundsson (J. Graph Theory \textbf{82}(1):45--64). As a second application, we show that for every set $P$ of $\lceil 11n/21\rceil$ points in $\R^2$ every $n$-vertex planar graph has a one-bend non-crossing drawing in which some set of $11n/21$ vertices is drawn on the points of $P$. The main result extends to $n$-vertex triangulations of genus-$g$ surfaces, and implies that these have connected dominating sets of size at most $10n/21+O(\sqrt{gn})$.
△ Less
Submitted 4 April, 2024; v1 submitted 6 December, 2023;
originally announced December 2023.
-
Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market
Authors:
Priyanka Bose,
Dipanjan Das,
Fabio Gritti,
Nicola Ruaro,
Christopher Kruegel,
Giovanni Vigna
Abstract:
As cryptocurrency evolved, new financial instruments, such as lending and borrowing protocols, currency exchanges, fungible and non-fungible tokens (NFT), staking and mining protocols have emerged. A financial ecosystem built on top of a blockchain is supposed to be fair and transparent for each participating actor. Yet, there are sophisticated actors who turn their domain knowledge and market ine…
▽ More
As cryptocurrency evolved, new financial instruments, such as lending and borrowing protocols, currency exchanges, fungible and non-fungible tokens (NFT), staking and mining protocols have emerged. A financial ecosystem built on top of a blockchain is supposed to be fair and transparent for each participating actor. Yet, there are sophisticated actors who turn their domain knowledge and market inefficiencies to their strategic advantage; thus extracting value from trades not accessible to others. This situation is further exacerbated by the fact that blockchain-based markets and decentralized finance (DeFi) instruments are mostly unregulated. Though a large body of work has already studied the unfairness of different aspects of DeFi and cryptocurrency trading, the economic intricacies of non-fungible token (NFT) trades necessitate further analysis and academic scrutiny.
The trading volume of NFTs has skyrocketed in recent years. A single NFT trade worth over a million US dollars, or marketplaces making billions in revenue is not uncommon nowadays. While previous research indicated the presence of wrongdoings in the NFT market, to our knowledge, we are the first to study predatory trading practices, what we call opportunistic trading, in depth. Opportunistic traders are sophisticated actors who employ automated, high-frequency NFT trading strategies, which, oftentimes, are malicious, deceptive, or, at the very least, unfair. Such attackers weaponize their advanced technical knowledge and superior understanding of DeFi protocols to disrupt trades of unsuspecting users, and collect profits from economic situations that are inaccessible to ordinary users, in a "supposedly" fair market. In this paper, we explore three such broad classes of opportunistic strategies aiming to realize three distinct trading objectives, viz., acquire, instant profit generation, and loss minimization.
△ Less
Submitted 5 September, 2023;
originally announced October 2023.
-
On the Restricted $k$-Steiner Tree Problem
Authors:
Prosenjit Bose,
Anthony D'Angelo,
Stephane Durocher
Abstract:
Given a set $P$ of $n$ points in $\mathbb{R}^2$ and an input line $γ$ in $\mathbb{R}^2$, we present an algorithm that runs in optimal $Θ(n\log n)$ time and $Θ(n)$ space to solve a restricted version of the $1$-Steiner tree problem. Our algorithm returns a minimum-weight tree interconnecting $P$ using at most one Steiner point $s \in γ$, where edges are weighted by the Euclidean distance between th…
▽ More
Given a set $P$ of $n$ points in $\mathbb{R}^2$ and an input line $γ$ in $\mathbb{R}^2$, we present an algorithm that runs in optimal $Θ(n\log n)$ time and $Θ(n)$ space to solve a restricted version of the $1$-Steiner tree problem. Our algorithm returns a minimum-weight tree interconnecting $P$ using at most one Steiner point $s \in γ$, where edges are weighted by the Euclidean distance between their endpoints. We then extend the result to $j$ input lines. Following this, we show how the algorithm of Brazil et al. ("Generalised k-Steiner Tree Problems in Normed Planes", arXiv:1111.1464) that solves the $k$-Steiner tree problem in $\mathbb{R}^2$ in $O(n^{2k})$ time can be adapted to our setting. For $k>1$, restricting the (at most) $k$ Steiner points to lie on an input line, the runtime becomes $O(n^{k})$. Next we show how the results of Brazil et al. ("Generalised k-Steiner Tree Problems in Normed Planes", arXiv:1111.1464) allow us to maintain the same time and space bounds while extending to some non-Euclidean norms and different tree cost functions. Lastly, we extend the result to $j$ input curves.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
Columbus: Android App Testing Through Systematic Callback Exploration
Authors:
Priyanka Bose,
Dipanjan Das,
Saastha Vasan,
Sebastiano Mariani,
Ilya Grishchenko,
Andrea Continella,
Antonio Bianchi,
Christopher Kruegel,
Giovanni Vigna
Abstract:
With the continuous rise in the popularity of Android mobile devices, automated testing of apps has become more important than ever. Android apps are event-driven programs. Unfortunately, generating all possible types of events by interacting with the app's interface is challenging for an automated testing approach. Callback-driven testing eliminates the need for event generation by directly invok…
▽ More
With the continuous rise in the popularity of Android mobile devices, automated testing of apps has become more important than ever. Android apps are event-driven programs. Unfortunately, generating all possible types of events by interacting with the app's interface is challenging for an automated testing approach. Callback-driven testing eliminates the need for event generation by directly invoking app callbacks. However, existing callback-driven testing techniques assume prior knowledge of Android callbacks, and they rely on a human expert, who is familiar with the Android API, to write stub code that prepares callback arguments before invocation. Since the Android API is huge and keeps evolving, prior techniques could only support a small fraction of callbacks present in the Android framework.
In this work, we introduce Columbus, a callback-driven testing technique that employs two strategies to eliminate the need for human involvement: (i) it automatically identifies callbacks by simultaneously analyzing both the Android framework and the app under test, and (ii) it uses a combination of under-constrained symbolic execution (primitive arguments), and type-guided dynamic heap introspection (object arguments) to generate valid and effective inputs. Lastly, Columbus integrates two novel feedback mechanisms -- data dependency and crash-guidance, during testing to increase the likelihood of triggering crashes, and maximizing coverage. In our evaluation, Columbus outperforms state-of-the-art model-driven, checkpoint-based, and callback-driven testing tools both in terms of crashes and coverage.
△ Less
Submitted 17 February, 2023;
originally announced February 2023.
-
Unveiling the Risks of NFT Promotion Scams
Authors:
Sayak Saha Roy,
Dipanjan Das,
Priyanka Bose,
Christopher Kruegel,
Giovanni Vigna,
Shirin Nilizadeh
Abstract:
The rapid growth in popularity and hype surrounding digital assets such as art, video, and music in the form of non-fungible tokens (NFTs) has made them a lucrative investment opportunity, with NFT-based sales surpassing $25B in 2021 alone. However, the volatility and general lack of technical understanding of the NFT ecosystem have led to the spread of various scams. The success of an NFT heavily…
▽ More
The rapid growth in popularity and hype surrounding digital assets such as art, video, and music in the form of non-fungible tokens (NFTs) has made them a lucrative investment opportunity, with NFT-based sales surpassing $25B in 2021 alone. However, the volatility and general lack of technical understanding of the NFT ecosystem have led to the spread of various scams. The success of an NFT heavily depends on its online virality. As a result, creators use dedicated promotion services to drive engagement to their projects on social media websites, such as Twitter. However, these services are also utilized by scammers to promote fraudulent projects that attempt to steal users' cryptocurrency assets, thus posing a major threat to the ecosystem of NFT sales.
In this paper, we conduct a longitudinal study of 439 promotion services (accounts) on Twitter that have collectively promoted 823 unique NFT projects through giveaway competitions over a period of two months. Our findings reveal that more than 36% of these projects were fraudulent, comprising of phishing, rug pull, and pre-mint scams. We also found that a majority of accounts engaging with these promotions (including those for fraudulent NFT projects) are bots that artificially inflate the popularity of the fraudulent NFT collections by increasing their likes, followers, and retweet counts. This manipulation results in significant engagement from real users, who then invest in these scams. We also identify several shortcomings in existing anti-scam measures, such as blocklists, browser protection tools, and domain hosting services, in detecting NFT-based scams. We utilized our findings to develop a machine learning classifier tool that was able to proactively detect 382 new fraudulent NFT projects on Twitter.
△ Less
Submitted 11 September, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion
Authors:
Ehud Aharoni,
Moran Baruch,
Pradip Bose,
Alper Buyuktosunoglu,
Nir Drucker,
Subhankar Pal,
Tomer Pelleg,
Kanthi Sarpatwar,
Hayim Shaul,
Omri Soceanu,
Roman Vaculin
Abstract:
Privacy-preserving neural network (NN) inference solutions have recently gained significant traction with several solutions that provide different latency-bandwidth trade-offs. Of these, many rely on homomorphic encryption (HE), a method of performing computations over encrypted data. However, HE operations even with state-of-the-art schemes are still considerably slow compared to their plaintext…
▽ More
Privacy-preserving neural network (NN) inference solutions have recently gained significant traction with several solutions that provide different latency-bandwidth trade-offs. Of these, many rely on homomorphic encryption (HE), a method of performing computations over encrypted data. However, HE operations even with state-of-the-art schemes are still considerably slow compared to their plaintext counterparts. Pruning the parameters of a NN model is a well-known approach to improving inference latency. However, pruning methods that are useful in the plaintext context may lend nearly negligible improvement in the HE case, as has also been demonstrated in recent work.
In this work, we propose a novel set of pruning methods that reduce the latency and memory requirement, thus bringing the effectiveness of plaintext pruning methods to HE. Crucially, our proposal employs two key techniques, viz. permutation and expansion of the packed model weights, that enable pruning significantly more ciphertexts and recuperating most of the accuracy loss, respectively. We demonstrate the advantage of our method on fully connected layers where the weights are packed using a recently proposed packing technique called tile tensors, which allows executing deep NN inference in a non-interactive mode. We evaluate our methods on various autoencoder architectures and demonstrate that for a small mean-square reconstruction loss of 1.5*10^{-5} on MNIST, we reduce the memory requirement and latency of HE-enabled inference by 60%.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Effectivity of super resolution convolutional neural network for the enhancement of land cover classification from medium resolution satellite images
Authors:
Pritom Bose,
Debolina Halder,
Oliur Rahman,
Turash Haque Pial
Abstract:
In the modern world, satellite images play a key role in forest management and degradation monitoring. For a precise quantification of forest land cover changes, the availability of spatially fine resolution data is a necessity. Since 1972, NASAs LANDSAT Satellites are providing terrestrial images covering every corner of the earth, which have been proved to be a highly useful resource for terrest…
▽ More
In the modern world, satellite images play a key role in forest management and degradation monitoring. For a precise quantification of forest land cover changes, the availability of spatially fine resolution data is a necessity. Since 1972, NASAs LANDSAT Satellites are providing terrestrial images covering every corner of the earth, which have been proved to be a highly useful resource for terrestrial change analysis and have been used in numerous other sectors. However, freely accessible satellite images are, generally, of medium to low resolution which is a major hindrance to the precision of the analysis. Hence, we performed a comprehensive study to prove our point that, enhancement of resolution by Super-Resolution Convolutional Neural Network (SRCNN) will lessen the chance of misclassification of pixels, even under the established recognition methods. We tested the method on original LANDSAT-7 images of different regions of Sundarbans and their upscaled versions which were produced by bilinear interpolation, bicubic interpolation, and SRCNN respectively and it was discovered that SRCNN outperforms the others by a significant amount.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Linear versus centred chromatic numbers
Authors:
Prosenjit Bose,
Vida Dujmović,
Hussein Houdrouge,
Mehrnoosh Javarsineh,
Pat Morin
Abstract:
$\DeclareMathOperator{\chicen}{χ_{\mathrm{cen}}}\DeclareMathOperator{\chilin}{χ_{\mathrm{lin}}}$ A centred colouring of a graph is a vertex colouring in which every connected subgraph contains a vertex whose colour is unique and a \emph{linear colouring} is a vertex colouring in which every (not-necessarily induced) path contains a vertex whose colour is unique. For a graph $G…
▽ More
$\DeclareMathOperator{\chicen}{χ_{\mathrm{cen}}}\DeclareMathOperator{\chilin}{χ_{\mathrm{lin}}}$ A centred colouring of a graph is a vertex colouring in which every connected subgraph contains a vertex whose colour is unique and a \emph{linear colouring} is a vertex colouring in which every (not-necessarily induced) path contains a vertex whose colour is unique. For a graph $G$, the centred chromatic number $\chicen(G)$ and the linear chromatic number $\chilin(G)$ denote the minimum number of distinct colours required for a centred, respectively, linear colouring of $G$. From these definitions, it follows immediately that $\chilin(G)\le \chicen(G)$ for every graph $G$. The centred chromatic number is equivalent to treedepth and has been studied extensively. Much less is known about linear colouring. Kun et al [Algorithmica 83(1)] prove that $\chicen(G) \le \tilde{O}(\chilin(G)^{190})$ for any graph $G$ and conjecture that $\chicen(G)\le 2\chilin(G)$. Their upper bound was subsequently improved by Czerwinski et al [SIDMA 35(2)] to $\chicen(G)\le\tilde{O}(\chilin(G)^{19})$. The proof of both upper bounds relies on establishing a lower bound on the linear chromatic number of pseudogrids, which appear in the proof due to their critical relationship to treewidth. Specifically, Kun et al prove that $k\times k$ pseudogrids have linear chromatic number $Ω(\sqrt{k})$. Our main contribution is establishing a tight bound on the linear chromatic number of pseudogrids, specifically $\chilin(G)\ge Ω(k)$ for every $k\times k$ pseudogrid $G$. As a consequence we improve the general bound for all graphs to $\chicen(G)\le \tilde{O}(\chilin(G)^{10})$. In addition, this tight bound gives further evidence in support of Kun et al's conjecture (above) that the centred chromatic number of any graph is upper bounded by a linear function of its linear chromatic number.
△ Less
Submitted 10 April, 2024; v1 submitted 30 May, 2022;
originally announced May 2022.
-
A Deep Learning Approach to Dst Index Prediction
Authors:
Yasser Abduallah,
Jason T. L. Wang,
Prianka Bose,
Genwei Zhang,
Firas Gerges,
Haimin Wang
Abstract:
The disturbance storm time (Dst) index is an important and useful measurement in space weather research. It has been used to characterize the size and intensity of a geomagnetic storm. A negative Dst value means that the Earth's magnetic field is weakened, which happens during storms. In this paper, we present a novel deep learning method, called the Dst Transformer, to perform short-term, 1-6 hou…
▽ More
The disturbance storm time (Dst) index is an important and useful measurement in space weather research. It has been used to characterize the size and intensity of a geomagnetic storm. A negative Dst value means that the Earth's magnetic field is weakened, which happens during storms. In this paper, we present a novel deep learning method, called the Dst Transformer, to perform short-term, 1-6 hour ahead, forecasting of the Dst index based on the solar wind parameters provided by the NASA Space Science Data Coordinated Archive. The Dst Transformer combines a multi-head attention layer with Bayesian inference, which is capable of quantifying both aleatoric uncertainty and epistemic uncertainty when making Dst predictions. Experimental results show that the proposed Dst Transformer outperforms related machine learning methods in terms of the root mean square error and R-squared. Furthermore, the Dst Transformer can produce both data and model uncertainty quantification results, which can not be done by the existing methods. To our knowledge, this is the first time that Bayesian deep learning has been used for Dst index forecasting.
△ Less
Submitted 5 May, 2022;
originally announced May 2022.
-
Pursuit-Evasion in Graphs: Zombies, Lazy Zombies and a Survivor
Authors:
Prosenjit Bose,
Jean-Lou De Carufel,
Thomas Shermer
Abstract:
We study zombies and survivor, a variant of the game of cops and robber on graphs. In this variant, the single survivor plays the role of the robber and attempts to escape from the zombies that play the role of the cops. The zombies are restricted, on their turn, to always follow an edge of a shortest path towards the survivor. Let $z(G)$ be the smallest number of zombies required to catch the sur…
▽ More
We study zombies and survivor, a variant of the game of cops and robber on graphs. In this variant, the single survivor plays the role of the robber and attempts to escape from the zombies that play the role of the cops. The zombies are restricted, on their turn, to always follow an edge of a shortest path towards the survivor. Let $z(G)$ be the smallest number of zombies required to catch the survivor on a graph $G$ with $n$ vertices. We show that there exist outerplanar graphs and visibility graphs of simple polygons such that $z(G) = Θ(n)$. We also show that there exist maximum-degree-$3$ outerplanar graphs such that $z(G) = Ω\left(n/\log(n)\right)$.
Let $z_L(G)$ be the smallest number of lazy zombies (zombies that can stay still on their turn) required to catch the survivor on a graph $G$. We establish that lazy zombies are more powerful than normal zombies but less powerful than cops. We prove that $z_L(G) = 2$ for connected outerplanar graphs. We show that $z_L(G)\leq k$ for connected graphs with treedepth $k$. This result implies that $z_L(G)$ is at most $(k+1)\log n$ for connected graphs with treewidth $k$, $O(\sqrt{n})$ for connected planar graphs, $O(\sqrt{gn})$ for connected graphs with genus $g$ and $O(h\sqrt{hn})$ for connected graphs with any excluded $h$-vertex minor. Our results on lazy zombies still hold when an adversary chooses the initial positions of the zombies.
△ Less
Submitted 25 April, 2022;
originally announced April 2022.
-
HetSched: Quality-of-Mission Aware Scheduling for Autonomous Vehicle SoCs
Authors:
Aporva Amarnath,
Subhankar Pal,
Hiwot Kassa,
Augusto Vega,
Alper Buyuktosunoglu,
Hubertus Franke,
John-David Wellman,
Ronald Dreslinski,
Pradip Bose
Abstract:
Systems-on-Chips (SoCs) that power autonomous vehicles (AVs) must meet stringent performance and safety requirements prior to deployment. With increasing complexity in AV applications, the system needs to meet these real-time demands of multiple safety-critical applications simultaneously. A typical AV-SoC is a heterogeneous multiprocessor consisting of accelerators supported by general-purpose co…
▽ More
Systems-on-Chips (SoCs) that power autonomous vehicles (AVs) must meet stringent performance and safety requirements prior to deployment. With increasing complexity in AV applications, the system needs to meet these real-time demands of multiple safety-critical applications simultaneously. A typical AV-SoC is a heterogeneous multiprocessor consisting of accelerators supported by general-purpose cores. Such heterogeneity, while needed for power-performance efficiency, complicates the art of task scheduling.
In this paper, we demonstrate that hardware heterogeneity impacts the scheduler's effectiveness and that optimizing for only the real-time aspect of applications is not sufficient in AVs. Therefore, a more holistic approach is required -- one that considers global Quality-of-Mission (QoM) metrics, as defined in the paper. We then propose HetSched, a multi-step scheduler that leverages dynamic runtime information about the underlying heterogeneous hardware platform, along with the applications' real-time constraints and the task traffic in the system to optimize overall mission performance. HetSched proposes two scheduling policies: MSstat and MSdyn and scheduling optimizations like task pruning, hybrid heterogeneous ranking and rank update. HetSched improves overall mission performance on average by 4.6x, 2.6x and 2.6x when compared against CPATH, ADS and 2lvl-EDF (state-of-the-art real-time schedulers built for heterogeneous systems), respectively, and achieves an average of 53.3% higher hardware utilization, while meeting 100% critical deadlines for real-world applications of autonomous vehicles. Furthermore, when used as part of an SoC design space exploration loop, in comparison to prior schedulers, HetSched reduces the number of processing elements required by an SoC to safely complete AV's missions by 35% on average while achieving 2.7x lower energy-mission time product.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
An Optimal Algorithm for Product Structure in Planar Graphs
Authors:
Prosenjit Bose,
Pat Morin,
Saeed Odak
Abstract:
The \emph{Product Structure Theorem} for planar graphs (Dujmović et al.\ \emph{JACM}, \textbf{67}(4):22) states that any planar graph is contained in the strong product of a planar $3$-tree, a path, and a $3$-cycle. We give a simple linear-time algorithm for finding this decomposition as well as several related decompositions. This improves on the previous $O(n\log n)$ time algorithm (Morin.\ \emp…
▽ More
The \emph{Product Structure Theorem} for planar graphs (Dujmović et al.\ \emph{JACM}, \textbf{67}(4):22) states that any planar graph is contained in the strong product of a planar $3$-tree, a path, and a $3$-cycle. We give a simple linear-time algorithm for finding this decomposition as well as several related decompositions. This improves on the previous $O(n\log n)$ time algorithm (Morin.\ \emph{Algorithmica}, \textbf{85}(5):1544--1558).
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
On approximating shortest paths in weighted triangular tessellations
Authors:
Prosenjit Bose,
Guillermo Esteban,
David Orden,
Rodrigo I. Silveira
Abstract:
We study the quality of weighted shortest paths when a continuous 2-dimensional space is discretized by a weighted triangular tessellation. In order to evaluate how well the tessellation approximates the 2-dimensional space, we study three types of shortest paths: a weighted shortest path~$ \mathit{SP_w}(s,t) $, which is a shortest path from $ s $ to $ t $ in the space; a weighted shortest vertex…
▽ More
We study the quality of weighted shortest paths when a continuous 2-dimensional space is discretized by a weighted triangular tessellation. In order to evaluate how well the tessellation approximates the 2-dimensional space, we study three types of shortest paths: a weighted shortest path~$ \mathit{SP_w}(s,t) $, which is a shortest path from $ s $ to $ t $ in the space; a weighted shortest vertex path $ \mathit{SVP_w}(s,t) $, which is a shortest path where the vertices of the path are vertices of the tessellation; and a weighted shortest grid path~$ \mathit{SGP_w}(s,t) $, which is a shortest path whose edges are edges of the tessellation. The ratios $ \frac{\lVert \mathit{SGP_w}(s,t)\rVert}{\lVert \mathit{SP_w}(s,t)\rVert} $, $ \frac{\lVert \mathit{SVP_w}(s,t)\rVert}{\lVert \mathit{SP_w}(s,t)\rVert} $, $ \frac{\lVert \mathit{SGP_w}(s,t)\rVert}{\lVert \mathit{SVP_w}(s,t)\rVert} $ provide estimates on the quality of the approximation.
Given any arbitrary weight assignment to the faces of a triangular tessellation, we prove upper and lower bounds on the estimates that are independent of the weight assignment. Our main result is that $ \frac{\lVert \mathit{SGP_w}(s,t)\rVert}{\lVert \mathit{SP_w}(s,t)\rVert} = \frac{2}{\sqrt{3}} \approx 1.15 $ in the worst case, and this is tight.
△ Less
Submitted 27 November, 2021;
originally announced November 2021.
-
Understanding Security Issues in the NFT Ecosystem
Authors:
Dipanjan Das,
Priyanka Bose,
Nicola Ruaro,
Christopher Kruegel,
Giovanni Vigna
Abstract:
Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth in trading volumes over the last year. Unfortunately, these marketplaces have not yet received much security scrutiny. Instead, most academic rese…
▽ More
Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth in trading volumes over the last year. Unfortunately, these marketplaces have not yet received much security scrutiny. Instead, most academic research has focused on attacks against decentralized finance (DeFi) protocols and automated techniques to detect smart contract vulnerabilities. To the best of our knowledge, we are the first to study the market dynamics and security issues of the multi-billion dollar NFT ecosystem.
In this paper, we first present a systematic overview of how the NFT ecosystem works, and we identify three major actors: marketplaces, external entities, and users. We perform an in-depth analysis of the top 8 marketplaces (ranked by transaction volume) to discover potential issues associated with such marketplaces. Many of these issues can lead to substantial financial losses. We also collected a large amount of asset and event data pertaining to the NFTs being traded in the examined marketplaces. We automatically analyze this data to understand how the entities external to the blockchain are able to interfere with NFT markets, leading to serious consequences, and quantify the malicious trading behaviors carried out by users under the cloak of anonymity.
△ Less
Submitted 27 April, 2022; v1 submitted 16 November, 2021;
originally announced November 2021.
-
Dynamic Schnyder Woods
Authors:
Sujoy Bhore,
Prosenjit Bose,
Pilar Cano,
Jean Cardinal,
John Iacono
Abstract:
A realizer, commonly known as Schnyder woods, of a triangulation is a partition of its interior edges into three oriented rooted trees. A flip in a realizer is a local operation that transforms one realizer into another. Two types of flips in a realizer have been introduced: colored flips and cycle flips. A corresponding flip graph is defined for each of these two types of flips. The vertex sets a…
▽ More
A realizer, commonly known as Schnyder woods, of a triangulation is a partition of its interior edges into three oriented rooted trees. A flip in a realizer is a local operation that transforms one realizer into another. Two types of flips in a realizer have been introduced: colored flips and cycle flips. A corresponding flip graph is defined for each of these two types of flips. The vertex sets are the realizers, and two realizers are adjacent if they can be transformed into each other by one flip. In this paper we study the relation between these two types of flips and their corresponding flip graphs. We show that a cycle flip can be obtained from linearly many colored flips. We also prove an upper bound of $O(n^2)$ on the diameter of the flip graph of realizers defined by colored flips. In addition, a data structure is given to dynamically maintain a realizer over a sequence of colored flips which supports queries, including getting a node's barycentric coordinates, in $O(\log n)$ time per flip or query.
△ Less
Submitted 28 June, 2021;
originally announced June 2021.
-
Improved Spanning on Theta-5
Authors:
Prosenjit Bose,
Darryl Hill,
Aurélien Ooms
Abstract:
We show an upper bound of $\frac{
\sin\left(\frac{3π}{10}\right)
}{
\sin\left(\frac{2π}{5}\right)-\sin\left(\frac{3π}{10}\right)
}
<5.70$ on the spanning ratio of $Θ_5$-graphs, improving on the previous best known upper bound of $9.96$ [Bose, Morin, van Renssen, and Verdonschot. The Theta-5-graph is a spanner. Computational Geometry, 2015.]
We show an upper bound of $\frac{
\sin\left(\frac{3π}{10}\right)
}{
\sin\left(\frac{2π}{5}\right)-\sin\left(\frac{3π}{10}\right)
}
<5.70$ on the spanning ratio of $Θ_5$-graphs, improving on the previous best known upper bound of $9.96$ [Bose, Morin, van Renssen, and Verdonschot. The Theta-5-graph is a spanner. Computational Geometry, 2015.]
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Separating layered treewidth and row treewidth
Authors:
Prosenjit Bose,
Vida Dujmović,
Mehrnoosh Javarsineh,
Pat Morin,
David R. Wood
Abstract:
Layered treewidth and row treewidth are recently introduced graph parameters that have been key ingredients in the solution of several well-known open problems. It follows from the definitions that the layered treewidth of a graph is at most its row treewidth plus 1. Moreover, a minor-closed class has bounded layered treewidth if and only if it has bounded row treewidth. However, it has been open…
▽ More
Layered treewidth and row treewidth are recently introduced graph parameters that have been key ingredients in the solution of several well-known open problems. It follows from the definitions that the layered treewidth of a graph is at most its row treewidth plus 1. Moreover, a minor-closed class has bounded layered treewidth if and only if it has bounded row treewidth. However, it has been open whether row treewidth is bounded by a function of layered treewidth. This paper answers this question in the negative. In particular, for every integer $k$ we describe a graph with layered treewidth 1 and row treewidth $k$. We also prove an analogous result for layered pathwidth and row pathwidth.
△ Less
Submitted 5 May, 2022; v1 submitted 3 May, 2021;
originally announced May 2021.
-
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
Authors:
Priyanka Bose,
Dipanjan Das,
Yanju Chen,
Yu Feng,
Christopher Kruegel,
Giovanni Vigna
Abstract:
This paper presents SAILFISH, a scalable system for automatically finding state-inconsistency bugs in smart contracts. To make the analysis tractable, we introduce a hybrid approach that includes (i) a light-weight exploration phase that dramatically reduces the number of instructions to analyze, and (ii) a precise refinement phase based on symbolic evaluation guided by our novel value-summary ana…
▽ More
This paper presents SAILFISH, a scalable system for automatically finding state-inconsistency bugs in smart contracts. To make the analysis tractable, we introduce a hybrid approach that includes (i) a light-weight exploration phase that dramatically reduces the number of instructions to analyze, and (ii) a precise refinement phase based on symbolic evaluation guided by our novel value-summary analysis, which generates extra constraints to over-approximate the side effects of whole-program execution, thereby ensuring the precision of the symbolic evaluation. We developed a prototype of SAILFISH and evaluated its ability to detect two state-inconsistency flaws, viz., reentrancy and transaction order dependence (TOD) in Ethereum smart contracts. Further, we present detection rules for other kinds of smart contract flaws that SAILFISH can be extended to detect.
Our experiments demonstrate the efficiency of our hybrid approach as well as the benefit of the value summary analysis. In particular, we show that S SAILFISH outperforms five state-of-the-art smart contract analyzers (SECURITY, MYTHRIL, OYENTE, SEREUM and VANDAL ) in terms of performance, and precision. In total, SAILFISH discovered 47 previously unknown vulnerable smart contracts out of 89,853 smart contracts from ETHERSCAN .
△ Less
Submitted 12 December, 2021; v1 submitted 17 April, 2021;
originally announced April 2021.
-
Fragile Complexity of Adaptive Algorithms
Authors:
Prosenjit Bose,
Pilar Cano,
Rolf Fagerberg,
John Iacono,
Riko Jacob,
Stefan Langerman
Abstract:
The fragile complexity of a comparison-based algorithm is $f(n)$ if each input element participates in $O(f(n))$ comparisons. In this paper, we explore the fragile complexity of algorithms adaptive to various restrictions on the input, i.e., algorithms with a fragile complexity parameterized by a quantity other than the input size n. We show that searching for the predecessor in a sorted array has…
▽ More
The fragile complexity of a comparison-based algorithm is $f(n)$ if each input element participates in $O(f(n))$ comparisons. In this paper, we explore the fragile complexity of algorithms adaptive to various restrictions on the input, i.e., algorithms with a fragile complexity parameterized by a quantity other than the input size n. We show that searching for the predecessor in a sorted array has fragile complexity $Θ(\log k)$, where $k$ is the rank of the query element, both in a randomized and a deterministic setting. For predecessor searches, we also show how to optimally reduce the amortized fragile complexity of the elements in the array. We also prove the following results: Selecting the $k$-th smallest element has expected fragile complexity $O(\log \log k)$ for the element selected. Deterministically finding the minimum element has fragile complexity $Θ(\log(Inv))$ and $Θ(\log(Runs))$, where $Inv$ is the number of inversions in a sequence and $Runs$ is the number of increasing runs in a sequence. Deterministically finding the median has fragile complexity $O(\log(Runs) + \log \log n)$ and $Θ(\log(Inv))$. Deterministic sorting has fragile complexity $Θ(\log(Inv))$ but it has fragile complexity $Θ(\log n)$ regardless of the number of runs.
△ Less
Submitted 30 January, 2021;
originally announced February 2021.
-
Mechanical Properties of Au Coated Si Nanowafer: an Atomistic Study
Authors:
Shahriar Nahian,
Shahriar Muhammad Nahid,
Mohammad Motalab,
Pritom Bose
Abstract:
Combined gold and silicon nano-system has spurred tremendous interest in the scientific community due to its application in different metal-semiconductor electronic devices and solar driven water splitting cells. Silicon, fabricated on gold layer, is prone to gold atom diffusion at its surface. In this study, detailed analysis of mechanical properties of gold coated silicon nanowafer is studied by…
▽ More
Combined gold and silicon nano-system has spurred tremendous interest in the scientific community due to its application in different metal-semiconductor electronic devices and solar driven water splitting cells. Silicon, fabricated on gold layer, is prone to gold atom diffusion at its surface. In this study, detailed analysis of mechanical properties of gold coated silicon nanowafer is studied by performing molecular dynamics tensile and compressive simulations. The effects of temperature, gold coating thickness, strain rate and crystallographic orientation of silicon on the mechanical properties are observed for the nanowafer. It is found that both the ultimate tensile and compressive strength show inverse relationship with temperature. The nanowafer fails mainly by slip** along {110} plane due to excessive shear when loaded in [100] direction while a mixed slip and crack type failure occurs for 300K. Interesting crystallographic transformation from fcc to hcp crystal is observed in gold layer for the highest gold layer thickness during tension. The effects of strain rate in tension and compression is also studied. Finally, the crystal orientation of silicon is varied and the tension-compression asymmetry inn the gold coated silicon nanowafer is investigated. Reverse tension-compression asymmetry is observed in case of loading along [110] crystal orientation. The failure mechanism reveals that interesting crystal transformation of silicon occurs during compression leading to early yielding of the material.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Affine invariant triangulations
Authors:
Prosenjit Bose,
Pilar Cano,
Rodrigo I. Silveira
Abstract:
We study affine invariant 2D triangulation methods. That is, methods that produce the same triangulation for a point set $S$ for any (unknown) affine transformation of $S$. Our work is based on a method by Nielson [A characterization of an affine invariant triangulation. Geom. Mod, 191-210. Springer, 1993] that uses the inverse of the covariance matrix of $S$ to define an affine invariant norm, de…
▽ More
We study affine invariant 2D triangulation methods. That is, methods that produce the same triangulation for a point set $S$ for any (unknown) affine transformation of $S$. Our work is based on a method by Nielson [A characterization of an affine invariant triangulation. Geom. Mod, 191-210. Springer, 1993] that uses the inverse of the covariance matrix of $S$ to define an affine invariant norm, denoted $A_{S}$, and an affine invariant triangulation, denoted ${DT}_{A_{S}}[S]$. We revisit the $A_{S}$-norm from a geometric perspective, and show that ${DT}_{A_{S}}[S]$ can be seen as a standard Delaunay triangulation of a transformed point set based on $S$. We prove that it retains all of its well-known properties such as being 1-tough, containing a perfect matching, and being a constant spanner of the complete geometric graph of $S$. We show that the $A_{S}$-norm extends to a hierarchy of related geometric structures such as the minimum spanning tree, nearest neighbor graph, Gabriel graph, relative neighborhood graph, and higher order versions of these graphs. In addition, we provide different affine invariant sorting methods of a point set $S$ and of the vertices of a polygon $P$ that can be combined with known algorithms to obtain other affine invariant triangulation methods of $S$ and of $P$.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
Nanomechanics of Antimonene Allotropes
Authors:
Tanmay Sarkar Akash,
Rafsan A. S. I. Subad,
Pritom Bose,
Md Mahbubul Islam
Abstract:
Monolayer antimonene has drawn the attention of research communities due to its promising physical properties. But mechanical properties of antimonene is still largely unexplored. In this work, we investigate the mechanical properties and fracture mechanisms of two stable phases of monolayer antimonene -- the $α$ antimonene ($α$-Sb) and the $β$ antimonene ($β$-Sb), through molecular dynamics (MD)…
▽ More
Monolayer antimonene has drawn the attention of research communities due to its promising physical properties. But mechanical properties of antimonene is still largely unexplored. In this work, we investigate the mechanical properties and fracture mechanisms of two stable phases of monolayer antimonene -- the $α$ antimonene ($α$-Sb) and the $β$ antimonene ($β$-Sb), through molecular dynamics (MD) simulations. Our simulations reveal that stronger chiral effect results in a greater anisotropic elastic behavior in $β$-antimonene than in $α$-antimonene. In this paper we focus on crack-tip stress distribution using local volume averaged virial stress definition and derive the fracture toughness from the crack-line stress. Our calculated crack tip stress distribution ensures the applicability of linear elastic fracture mechanics (LEFM) for cracked antimonene allotropes with considerable accuracy up to a pristine structure. We evaluate the effect of temperature, strain rate, crack-length and point-defect concentration on the strength and elastic properties. Tensile strength goes through significant degradation with the increment of temperature, crack length and defect percentage. Elastic modulus is less susceptible to temperature variation but is largely affected by the defect concentration. Strain rate induces a power law relation between strength and fracture strain. Finally, we discuss the fracture mechanisms in the light of crack propagation and establish the links between the fracture mechanism and the observed anisotropic properties.
△ Less
Submitted 17 September, 2020;
originally announced September 2020.
-
Atomistic Modelling of Functionally Graded Cu-Ni Alloy and its Implication on the Mechanical Properties of Nanowires
Authors:
Md Shajedul Hoque Thakur,
Mahmudul Islam,
Nur Jahan Monisha,
Pritom Bose,
Md. Adnan Mahathir Munshi,
Turash Haque Pial
Abstract:
Functionally graded materials (FGM) eliminate the stress singularity in the interface between two different materials and therefore have a wide range of applications in high temperature environments such as engines, nuclear reactors, spacecrafts etc. Therefore, it is essential to study the mechanical properties of different FGM materials. This paper aims at establishing a method for modelling FGMs…
▽ More
Functionally graded materials (FGM) eliminate the stress singularity in the interface between two different materials and therefore have a wide range of applications in high temperature environments such as engines, nuclear reactors, spacecrafts etc. Therefore, it is essential to study the mechanical properties of different FGM materials. This paper aims at establishing a method for modelling FGMs in molecular dynamics (MD) to get a better insight of their mechanical properties. In this study, the mechanical characteristics of Cu-Ni FGM nanowires (NW) under uniaxial loading have been investigated using the proposed method through MD simulations. In order to describe the inter-atomic forces and hence predict the properties properly, EAM (Embedded atom model) potential has been used. The nanowire is composed of an alloying constituent in the core and the other constituent graded functionally along the outward radial direction. Simple Linear and Exponential functions have been considered as the functions which defines the grading pattern. The alloying percentage on the surface has been varied from 0% to 50% for both Cu-cored and Ni-cored nanowires. All the simulations have been carried out at 300 K. The L/D ratios are 10.56 and 10.67 for Cu-cored and Ni-cored NWs, respectively. This study suggests that Ultimate Tensile Stress and Young's modulus increase with increasing surface Ni percentage in Cu-cored NWs. However, in Ni-cored NWs these values decrease with the increase of surface Cu percentage. Also, for the same surface percentage of Ni in Cu-cored NW, the values are higher in linearly graded FGMs than that in exponentially graded FGMs. While in Ni-cored NWs, exponentially graded FGM shows higher values of UTS and E than those in linearly graded FGM. Thus, grading functions and surface percentages can be used as parameters for modulating the mechanical properties of FGM nanowires.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
MicroGrad: A Centralized Framework for Workload Cloning and Stress Testing
Authors:
Gokul Subramanian Ravi,
Ramon Bertran,
Pradip Bose,
Mikko Lipasti
Abstract:
We present MicroGrad, a centralized automated framework that is able to efficiently analyze the capabilities, limits and sensitivities of complex modern processors in the face of constantly evolving application domains. MicroGrad uses Microprobe, a flexible code generation framework as its back-end and a Gradient Descent based tuning mechanism to efficiently enable the evolution of the test cases…
▽ More
We present MicroGrad, a centralized automated framework that is able to efficiently analyze the capabilities, limits and sensitivities of complex modern processors in the face of constantly evolving application domains. MicroGrad uses Microprobe, a flexible code generation framework as its back-end and a Gradient Descent based tuning mechanism to efficiently enable the evolution of the test cases to suit tasks such as Workload Cloning and Stress Testing. MicroGrad can interface with a variety of execution infrastructure such as performance and power simulators as well as native hardware. Further, the modular 'abstract workload model' approach to building MicroGrad allows it to be easily extended for further use.
In this paper, we evaluate MicroGrad over different use cases and architectures and showcase that MicroGrad can achieve greater than 99\% accuracy across different tasks within few tuning epochs and low resource requirements. We also observe that MicroGrad's accuracy is 25 to 30\% higher than competing techniques. At the same time, it is 1.5x to 2.5x faster or would consume 35 to 60\% less compute resources (depending on implementation) over alternate mechanisms. Overall, MicroGrad's fast, resource efficient and accurate test case generation capability allow it to perform rapid evaluation of complex processors.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
STOMP: A Tool for Evaluation of Scheduling Policies in Heterogeneous Multi-Processors
Authors:
Augusto Vega,
Aporva Amarnath,
John-David Wellman,
Hiwot Kassa,
Subhankar Pal,
Hubertus Franke,
Alper Buyuktosunoglu,
Ronald Dreslinski,
Pradip Bose
Abstract:
The proliferation of heterogeneous chip multiprocessors in recent years has reached unprecedented levels. Traditional homogeneous platforms have shown fundamental limitations when it comes to enabling high-performance yet-ultra-low-power computing, in particular in application domains with real-time execution deadlines or criticality constraints. By combining the right set of general purpose cores…
▽ More
The proliferation of heterogeneous chip multiprocessors in recent years has reached unprecedented levels. Traditional homogeneous platforms have shown fundamental limitations when it comes to enabling high-performance yet-ultra-low-power computing, in particular in application domains with real-time execution deadlines or criticality constraints. By combining the right set of general purpose cores and hardware accelerators together, along with proper chip interconnects and memory technology, heterogeneous chip multiprocessors have become an effective high-performance and low-power computing alternative.
One of the challenges of heterogeneous architectures relates to efficient scheduling of application tasks (processes, threads) across the variety of options in the chip. As a result, it is key to provide tools to enable early-stage prototy** and evaluation of new scheduling policies for heterogeneous platforms. In this paper, we present STOMP (Scheduling Techniques Optimization in heterogeneous Multi-Processors), a simulator for fast implementation and evaluation of task scheduling policies in multi-core/multi-processor systems with a convenient interface for "plugging" in new scheduling policies in a simple manner. Thorough validation of STOMP exhibits small relative errors when compared against closed-formed equivalent models during steady-state analysis.
△ Less
Submitted 28 July, 2020;
originally announced July 2020.
-
Asymptotically Optimal Vertex Ranking of Planar Graphs
Authors:
Prosenjit Bose,
Vida Dujmović,
Mehrnoosh Javarsineh,
Pat Morin
Abstract:
A (vertex) $\ell$-ranking is a colouring $\varphi:V(G)\to\mathbb{N}$ of the vertices of a graph $G$ with integer colours so that for any path $u_0,\ldots,u_p$ of length at most $\ell$, $\varphi(u_0)\neq\varphi(u_p)$ or $\varphi(u_0)<\max\{\varphi(u_0),\ldots,\varphi(u_p)\}$. We show that, for any fixed integer $\ell\ge 2$, every $n$-vertex planar graph has an $\ell$-ranking using…
▽ More
A (vertex) $\ell$-ranking is a colouring $\varphi:V(G)\to\mathbb{N}$ of the vertices of a graph $G$ with integer colours so that for any path $u_0,\ldots,u_p$ of length at most $\ell$, $\varphi(u_0)\neq\varphi(u_p)$ or $\varphi(u_0)<\max\{\varphi(u_0),\ldots,\varphi(u_p)\}$. We show that, for any fixed integer $\ell\ge 2$, every $n$-vertex planar graph has an $\ell$-ranking using $O(\log n/\log\log\log n)$ colours and this is tight even when $\ell=2$; for infinitely many values of $n$, there are $n$-vertex planar graphs, for which any 2-ranking requires $Ω(\log n/\log\log\log n)$ colours. This result also extends to bounded genus graphs.
In develo** this proof we obtain optimal bounds on the number of colours needed for $\ell$-ranking graphs of treewidth $t$ and graphs of simple treewidth $t$. These upper bounds are constructive and give $O(n)$-time algorithms. Additional results that come from our techniques include new sublogarithmic upper bounds on the number of colours needed for $\ell$-rankings of apex minor-free graphs and $k$-planar graphs.
△ Less
Submitted 18 August, 2022; v1 submitted 13 July, 2020;
originally announced July 2020.
-
Investigation on the Mechanical Properties of Functionally Graded Nickel and Aluminium Alloy by Molecular Dynamics Study
Authors:
Shailee Mitra,
Md. Habibur Rahman,
Mohammad Motalab,
Tawfiqur Rakib,
Pritom Bose
Abstract:
Functionally graded materials (FGMs), have drawn considerable attention of the worldwide researchers and scientific community because of its unique mechanical, thermal and electrical properties which may be exploited by varying the compositions gradually over volume. This makes FGM multifunctional material (properties changing continuously in a certain direction) for specific purpose without creat…
▽ More
Functionally graded materials (FGMs), have drawn considerable attention of the worldwide researchers and scientific community because of its unique mechanical, thermal and electrical properties which may be exploited by varying the compositions gradually over volume. This makes FGM multifunctional material (properties changing continuously in a certain direction) for specific purpose without creating any phase interface thus making it superior to its composite counterparts. In this paper, we applied Molecular Dynamics (MD) approach to investigate the mechanical properties of functional graded Ni-Al alloy with Ni coating by applying uniaxial tension. Nickel-Aluminum (Ni-Al) alloy has been used extensively in the industry due to its remarkable mechanical and thermal properties. Our aim is to find the difference in material behavior when we change the grading function (linear, elliptical and parabolic), temperature and crystallographic direction. We also observe distinct type of failure mechanism for different grading function at different temperature. Close observation reveals that elliptically graded Ni-Al alloy has high tensile strength at low temperature whereas at high temperature, the highest tensile strength is found for parabolic grading. Besides, at any temperature, the parabolically graded Ni-Al alloy shows superior elasticity than its elliptical and linear counterpart. Moreover, it is also observed that [111] crystallographic direction for this alloy demonstrates more resistivity towards failure than any other crystallographic direction. It is found that lattice disorder plays a significant role on the mechanical properties of Functionally Graded Materials (FGMs). This paper details a pathway to tune the mechanical properties like Young's Modulus, plasticity and yield strength at molecular level by varying the composition of materials along different grading functions.
△ Less
Submitted 12 April, 2020;
originally announced April 2020.
-
Atomic Scale Insights Into The Mechanical Characteristics of Monolayer 1T-Titanium Disulphide: A Molecular Dynamics Study
Authors:
Tanmay Sarkar Akash,
Rafsan A. S. I. Subad,
Pritom Bose,
Md Mahbubul Islam
Abstract:
In this work, we report on the mechanical responses and fracture behavior of pristine and defected monolayer 1T-Titanium Disulfide using classical molecular dynamics simulation. We investigated the effect of temperature, strain rate and defect ratio on the uniaxial tensile properties in both armchair and zigzag direction. We found that monolayer TiS2 shows isotropic uniaxial tensile properties exc…
▽ More
In this work, we report on the mechanical responses and fracture behavior of pristine and defected monolayer 1T-Titanium Disulfide using classical molecular dynamics simulation. We investigated the effect of temperature, strain rate and defect ratio on the uniaxial tensile properties in both armchair and zigzag direction. We found that monolayer TiS2 shows isotropic uniaxial tensile properties except for failure strain which is greater in zigzag direction than armchair direction. We also observed a negative correlation of ultimate tensile strength, failure strain and young's modulus with temperature and defect ratio. Results depicts that strain rate has no effect on the young's modulus of monolayer TiS2 but higher strain rate results in higher ultimate tensile strength and failure strain.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
(Faster) Multi-Sided Boundary Labelling
Authors:
Prosenjit Bose,
Saeed Mehrabi,
Debajyoti Mondal
Abstract:
A 1-bend boundary labelling problem consists of an axis-aligned rectangle $B$, $n$ points (called sites) in the interior, and $n$ points (called ports) on the labels along the boundary of $B$. The goal is to find a set of $n$ axis-aligned curves (called leaders), each having at most one bend and connecting one site to one port, such that the leaders are pairwise disjoint. A 1-bend boundary labelli…
▽ More
A 1-bend boundary labelling problem consists of an axis-aligned rectangle $B$, $n$ points (called sites) in the interior, and $n$ points (called ports) on the labels along the boundary of $B$. The goal is to find a set of $n$ axis-aligned curves (called leaders), each having at most one bend and connecting one site to one port, such that the leaders are pairwise disjoint. A 1-bend boundary labelling problem is $k$-sided ($1\leq k\leq 4$) if the ports appear on $k$ different sides of $B$. Kindermann et al. ["Multi-Sided Boundary Labeling", Algorithmica, 76(1): 225-258, 2016] showed that the 1-bend three-sided and four-sided boundary labelling problems can be solved in $O(n^4)$ and $O(n^9)$ time, respectively. Bose et al. [SWAT, 12:1-12:14, 2018] improved the latter running time to $O(n^6)$ by reducing the problem to computing maximum independent set in an outerstring graph. In this paper, we improve both previous results by giving new algorithms with running times $O(n^3\log n)$ and $O(n^5)$ to solve the 1-bend three-sided and four-sided boundary labelling problems, respectively.
△ Less
Submitted 22 February, 2020;
originally announced February 2020.
-
Drawing Graphs as Spanners
Authors:
Oswin Aichholzer,
Manuel Borrazzo,
Prosenjit Bose,
Jean Cardinal,
Fabrizio Frati,
Pat Morin,
Birgit Vogtenhuber
Abstract:
We study the problem of embedding graphs in the plane as good geometric spanners. That is, for a graph $G$, the goal is to construct a straight-line drawing $Γ$ of $G$ in the plane such that, for any two vertices $u$ and $v$ of $G$, the ratio between the minimum length of any path from $u$ to $v$ and the Euclidean distance between $u$ and $v$ is small. The maximum such ratio, over all pairs of ver…
▽ More
We study the problem of embedding graphs in the plane as good geometric spanners. That is, for a graph $G$, the goal is to construct a straight-line drawing $Γ$ of $G$ in the plane such that, for any two vertices $u$ and $v$ of $G$, the ratio between the minimum length of any path from $u$ to $v$ and the Euclidean distance between $u$ and $v$ is small. The maximum such ratio, over all pairs of vertices of $G$, is the spanning ratio of $Γ$.
First, we show that deciding whether a graph admits a straight-line drawing with spanning ratio $1$, a proper straight-line drawing with spanning ratio $1$, and a planar straight-line drawing with spanning ratio $1$ are NP-complete, $\exists \mathbb R$-complete, and linear-time solvable problems, respectively, where a drawing is proper if no two vertices overlap and no edge overlaps a vertex.
Second, we show that moving from spanning ratio $1$ to spanning ratio $1+ε$ allows us to draw every graph. Namely, we prove that, for every $ε>0$, every (planar) graph admits a proper (resp. planar) straight-line drawing with spanning ratio smaller than $1+ε$.
Third, our drawings with spanning ratio smaller than $1+ε$ have large edge-length ratio, that is, the ratio between the length of the longest edge and the length of the shortest edge is exponential. We show that this is sometimes unavoidable. More generally, we identify having bounded toughness as the criterion that distinguishes graphs that admit straight-line drawings with constant spanning ratio and polynomial edge-length ratio from graphs that require exponential edge-length ratio in any straight-line drawing with constant spanning ratio.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
Parameterized Complexity of Two-Interval Pattern Problem
Authors:
Prosenjit Bose,
Saeed Mehrabi,
Debajyoti Mondal
Abstract:
A \emph{2-interval} is the union of two disjoint intervals on the real line. Two 2-intervals $D_1$ and $D_2$ are \emph{disjoint} if their intersection is empty (i.e., no interval of $D_1$ intersects any interval of $D_2$). There can be three different relations between two disjoint 2-intervals; namely, preceding ($<$), nested ($\sqsubset$) and crossing ($\between$). Two 2-intervals $D_1$ and…
▽ More
A \emph{2-interval} is the union of two disjoint intervals on the real line. Two 2-intervals $D_1$ and $D_2$ are \emph{disjoint} if their intersection is empty (i.e., no interval of $D_1$ intersects any interval of $D_2$). There can be three different relations between two disjoint 2-intervals; namely, preceding ($<$), nested ($\sqsubset$) and crossing ($\between$). Two 2-intervals $D_1$ and $D_2$ are called \emph{$R$-comparable} for some $R\in\{<,\sqsubset,\between\}$, if either $D_1RD_2$ or $D_2RD_1$. A set $\mathcal{D}$ of disjoint 2-intervals is $\mathcal{R}$-comparable, for some $\mathcal{R}\subseteq\{<,\sqsubset,\between\}$ and $\mathcal{R}\neq\emptyset$, if every pair of 2-intervals in $\mathcal{R}$ are $R$-comparable for some $R\in\mathcal{R}$. Given a set of 2-intervals and some $\mathcal{R}\subseteq\{<,\sqsubset,\between\}$, the objective of the \emph{2-interval pattern problem} is to find a largest subset of 2-intervals that is $\mathcal{R}$-comparable.
The 2-interval pattern problem is known to be $W[1]$-hard when $|\mathcal{R}|=3$ and $NP$-hard when $|\mathcal{R}|=2$ (except for $\mathcal{R}=\{<,\sqsubset\}$, which is solvable in quadratic time). In this paper, we fully settle the parameterized complexity of the problem by showing it to be $W[1]$-hard for both $\mathcal{R}=\{\sqsubset,\between\}$ and $\mathcal{R}=\{<,\between\}$ (when parameterized by the size of an optimal solution); this answers an open question posed by Vialette [Encyclopedia of Algorithms, 2008].
△ Less
Submitted 12 February, 2020;
originally announced February 2020.
-
Engineered Defects to Modulate Fracture Strength of Single Layer MoS2: An Atomistic Study
Authors:
Rafsan A. S. I. Subad,
Tanmay Sarkar Akash,
Pritom Bose,
Md Mahbubul Islam
Abstract:
We use classical molecular dynamics (MD) simulations to investigate the mechanical properties of pre-cracked, nano-porous single layer MoS2 (SLMoS2) and the effect of interactions between cracks and pores. We found that the failure of pre-cracked and nano-porous SLMoS2 is dominated by brittle type fracture. Bonds in armchair direction show a stronger resistance to crack propagation compared to the…
▽ More
We use classical molecular dynamics (MD) simulations to investigate the mechanical properties of pre-cracked, nano-porous single layer MoS2 (SLMoS2) and the effect of interactions between cracks and pores. We found that the failure of pre-cracked and nano-porous SLMoS2 is dominated by brittle type fracture. Bonds in armchair direction show a stronger resistance to crack propagation compared to the zigzag direction. We compared the brittle failure of Griffith prediction with the MD fracture strength and toughness and found substantial differences that limit the applicability of Griffith criterion for SLMoS2 in case of nano-cracks and pores. Next, we demonstrate that the mechanical properties of pre-cracked SLMoS2 can be enhanced via symmetrically placed pores and auxiliary cracks around a central crack and position of such arrangements can be optimized for maximum enhancement of strengths. Such a study would help towards strain engineering based advanced designing of SLMoS2 and other similar Transition Metal Dichalcogenides.
△ Less
Submitted 22 April, 2020; v1 submitted 11 January, 2020;
originally announced January 2020.
-
Expected Complexity of Routing in $Θ$ 6 and Half-$Θ$ 6 Graphs
Authors:
Prosenjit Bose,
Jean-Lou de Carufel,
Olivier Devillers
Abstract:
We study online routing algorithms on the $Θ$6-graph and the half-$Θ$6-graph (which is equivalent to a variant of the Delaunay triangulation). Given a source vertex s and a target vertex t in the $Θ$6-graph (resp. half-$Θ$6-graph), there exists a deterministic online routing algorithm that finds a path from s to t whose length is at most 2 st (resp. 2.89 st) which is optimal in the worst case [Bos…
▽ More
We study online routing algorithms on the $Θ$6-graph and the half-$Θ$6-graph (which is equivalent to a variant of the Delaunay triangulation). Given a source vertex s and a target vertex t in the $Θ$6-graph (resp. half-$Θ$6-graph), there exists a deterministic online routing algorithm that finds a path from s to t whose length is at most 2 st (resp. 2.89 st) which is optimal in the worst case [Bose et al., siam J. on Computing, 44(6)]. We propose alternative, slightly simpler routing algorithms that are optimal in the worst case and for which we provide an analysis of the average routing ratio for the $Θ$6-graph and half-$Θ$6-graph defined on a Poisson point process. For the $Θ$6-graph, our online routing algorithm has an expected routing ratio of 1.161 (when s and t random) and a maximum expected routing ratio of 1.22 (maximum for fixed s and t where all other points are random), much better than the worst-case routing ratio of 2. For the half-$Θ$6-graph, our memoryless online routing algorithm has an expected routing ratio of 1.43 and a maximum expected routing ratio of 1.58. Our online routing algorithm that uses a constant amount of additional memory has an expected routing ratio of 1.34 and a maximum expected routing ratio of 1.40. The additional memory is only used to remember the coordinates of the starting point of the route. Both of these algorithms have an expected routing ratio that is much better than their worst-case routing ratio of 2.89.
△ Less
Submitted 29 November, 2019; v1 submitted 31 October, 2019;
originally announced October 2019.
-
Multiperspective Conformance Analysis of Central Venous Catheter Installation Procedure
Authors:
R. P. Jagadeesh Chandra Bose
Abstract:
Training and practice play a key role in a medical students' attainment of surgical procedural skills. It is beyond doubt that good skills correlate with better clinical outcomes and improved healthcare. Timely, holistic, and effective feedback provide a significant impetus to students acquiring skills with precision. In this paper, we analyze the activities performed by students while learning th…
▽ More
Training and practice play a key role in a medical students' attainment of surgical procedural skills. It is beyond doubt that good skills correlate with better clinical outcomes and improved healthcare. Timely, holistic, and effective feedback provide a significant impetus to students acquiring skills with precision. In this paper, we analyze the activities performed by students while learning the central venous catheter installation procedure. We perform a holistic analysis, using trace alignment, declarative conformance checking, data visualization, and statistical analysis techniques, at different levels of abstraction on control-flow and time perspectives and provide insights at individual student level as well as across students. These insights can help students discover what they are doing right and where they are not and take corrective steps. Instructors can uncover common patterns and mistakes that students demonstrate and think of interventions in their teaching methodology.
△ Less
Submitted 14 August, 2019;
originally announced August 2019.
-
Competitive Online Search Trees on Trees
Authors:
Prosenjit Bose,
Jean Cardinal,
John Iacono,
Grigorios Koumoutsos,
Stefan Langerman
Abstract:
We consider the design of adaptive data structures for searching elements of a tree-structured space. We use a natural generalization of the rotation-based online binary search tree model in which the underlying search space is the set of vertices of a tree. This model is based on a simple structure for decomposing graphs, previously known under several names including elimination trees, vertex ra…
▽ More
We consider the design of adaptive data structures for searching elements of a tree-structured space. We use a natural generalization of the rotation-based online binary search tree model in which the underlying search space is the set of vertices of a tree. This model is based on a simple structure for decomposing graphs, previously known under several names including elimination trees, vertex rankings, and tubings. The model is equivalent to the classical binary search tree model exactly when the underlying tree is a path. We describe an online $O(\log \log n)$-competitive search tree data structure in this model, matching the best known competitive ratio of binary search trees. Our method is inspired by Tango trees, an online binary search tree algorithm, but critically needs several new notions including one which we call Steiner-closed search trees, which may be of independent interest. Moreover our technique is based on a novel use of two levels of decomposition, first from search space to a set of Steiner-closed trees, and secondly from these trees into paths.
△ Less
Submitted 2 August, 2019;
originally announced August 2019.
-
Computing Maximum Independent Set on Outerstring Graphs and Their Relatives
Authors:
Prosenjit Bose,
Paz Carmi,
J. Mark Keil,
Anil Maheshwari,
Saeed Mehrabi,
Debajyoti Mondal,
Michiel Smid
Abstract:
A graph $G$ with $n$ vertices is called an outerstring graph if it has an intersection representation of a set of $n$ curves inside a disk such that one endpoint of every curve is attached to the boundary of the disk. Given an outerstring graph representation, the Maximum Independent Set (MIS) problem of the underlying graph can be computed in $O(s^3)$ time, where $s$ is the number of segments in…
▽ More
A graph $G$ with $n$ vertices is called an outerstring graph if it has an intersection representation of a set of $n$ curves inside a disk such that one endpoint of every curve is attached to the boundary of the disk. Given an outerstring graph representation, the Maximum Independent Set (MIS) problem of the underlying graph can be computed in $O(s^3)$ time, where $s$ is the number of segments in the representation (Keil et al., Comput. Geom., 60:19--25, 2017). If the strings are of constant size (e.g., line segments, L-shapes, etc.), then the algorithm takes $O(n^3)$ time.
In this paper, we examine the fine-grained complexity of the MIS problem on some well-known outerstring representations. We show that solving the MIS problem on grounded segment and grounded square-L representations is at least as hard as solving MIS on circle graph representations. Note that no $O(n^{2-δ})$-time algorithm, $δ>0$, is known for the MIS problem on circle graphs. For the grounded string representations where the strings are $y$-monotone simple polygonal paths of constant length with segments at integral coordinates, we solve MIS in $O(n^2)$ time and show this to be the best possible under the strong exponential time hypothesis (SETH). For the intersection graph of $n$ L-shapes in the plane, we give a $(4\cdot \log OPT)$-approximation algorithm for MIS (where $OPT$ denotes the size of an optimal solution), improving the previously best-known $(4\cdot \log n)$-approximation algorithm of Biedl and Derka (WADS 2017).
△ Less
Submitted 1 August, 2021; v1 submitted 17 March, 2019;
originally announced March 2019.
-
Near-Optimal $O(k)$-Robust Geometric Spanners
Authors:
Prosenjit Bose,
Paz Carmi,
Vida Dujmovic,
Pat Morin
Abstract:
For any constants $d\ge 1$, $ε>0$, $t>1$, and any $n$-point set $P\subset\mathbb{R}^d$, we show that there is a geometric graph $G=(P,E)$ having $O(n\log^2 n\log\log n)$ edges with the following property: For any $F\subseteq P$, there exists $F^+\supseteq F$, $|F^+| \le (1+ε)|F|$ such that, for any pair $p,q\in P\setminus F^+$, the graph $G-F$ contains a path from $p$ to $q$ whose (Euclidean) leng…
▽ More
For any constants $d\ge 1$, $ε>0$, $t>1$, and any $n$-point set $P\subset\mathbb{R}^d$, we show that there is a geometric graph $G=(P,E)$ having $O(n\log^2 n\log\log n)$ edges with the following property: For any $F\subseteq P$, there exists $F^+\supseteq F$, $|F^+| \le (1+ε)|F|$ such that, for any pair $p,q\in P\setminus F^+$, the graph $G-F$ contains a path from $p$ to $q$ whose (Euclidean) length is at most $t$ times the Euclidean distance between $p$ and $q$.
In the terminology of robust spanners (Bose \et al, SICOMP, 42(4):1720--1736, 2013) the graph $G$ is a $(1+ε)k$-robust $t$-spanner of $P$. This construction is sparser than the recent constructions of Buchin, Olàh, and Har-Peled (arXiv:1811.06898) who prove the existence of $(1+ε)k$-robust $t$-spanners with $n\log^{O(d)} n$ edges.
△ Less
Submitted 6 January, 2019; v1 submitted 24 December, 2018;
originally announced December 2018.
-
Gathering by Repulsion
Authors:
Prosenjit Bose,
Thomas Shermer
Abstract:
We consider a repulsion actuator located in an $n$-sided convex environment full of point particles. When the actuator is activated, all the particles move away from the actuator. We study the problem of gathering all the particles to a point. We give an $O(n^2)$ time algorithm to compute all the actuator locations that gather the particles to one point with one activation, and an $O(n)$ time algo…
▽ More
We consider a repulsion actuator located in an $n$-sided convex environment full of point particles. When the actuator is activated, all the particles move away from the actuator. We study the problem of gathering all the particles to a point. We give an $O(n^2)$ time algorithm to compute all the actuator locations that gather the particles to one point with one activation, and an $O(n)$ time algorithm to find a single such actuator location if one exists. We then provide an $O(n)$ time algorithm to place the optimal number of actuators whose sequential activation results in the gathering of the particles when such a placement exists.
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
Pole Dancing: 3D Morphs for Tree Drawings
Authors:
Elena Arseneva,
Prosenjit Bose,
Pilar Cano,
Anthony D'Angelo,
Vida Dujmovic,
Fabrizio Frati,
Stefan Langerman,
Alessandra Tappini
Abstract:
We study the question whether a crossing-free 3D morph between two straight-line drawings of an $n$-vertex tree can be constructed consisting of a small number of linear morphing steps. We look both at the case in which the two given drawings are two-dimensional and at the one in which they are three-dimensional. In the former setting we prove that a crossing-free 3D morph always exists with…
▽ More
We study the question whether a crossing-free 3D morph between two straight-line drawings of an $n$-vertex tree can be constructed consisting of a small number of linear morphing steps. We look both at the case in which the two given drawings are two-dimensional and at the one in which they are three-dimensional. In the former setting we prove that a crossing-free 3D morph always exists with $O(\log n)$ steps, while for the latter $Θ(n)$ steps are always sufficient and sometimes necessary.
△ Less
Submitted 3 September, 2018; v1 submitted 31 August, 2018;
originally announced August 2018.
-
Identifying Implementation Bugs in Machine Learning based Image Classifiers using Metamorphic Testing
Authors:
Anurag Dwarakanath,
Manish Ahuja,
Samarth Sikand,
Raghotham M. Rao,
R. P. Jagadeesh Chandra Bose,
Neville Dubash,
Sanjay Podder
Abstract:
We have recently witnessed tremendous success of Machine Learning (ML) in practical applications. Computer vision, speech recognition and language translation have all seen a near human level performance. We expect, in the near future, most business applications will have some form of ML. However, testing such applications is extremely challenging and would be very expensive if we follow today's m…
▽ More
We have recently witnessed tremendous success of Machine Learning (ML) in practical applications. Computer vision, speech recognition and language translation have all seen a near human level performance. We expect, in the near future, most business applications will have some form of ML. However, testing such applications is extremely challenging and would be very expensive if we follow today's methodologies. In this work, we present an articulation of the challenges in testing ML based applications. We then present our solution approach, based on the concept of Metamorphic Testing, which aims to identify implementation bugs in ML based image classifiers. We have developed metamorphic relations for an application based on Support Vector Machine and a Deep Learning based application. Empirical validation showed that our approach was able to catch 71% of the implementation bugs in the ML applications.
△ Less
Submitted 16 August, 2018;
originally announced August 2018.
-
On the Spanning and Routing Ratio of Directed Theta-Four
Authors:
Prosenjit Bose,
Jean-Lou De Carufel,
Darryl Hill,
Michiel Smid
Abstract:
We present a routing algorithm for the directed $Θ_4$-graph, here denoted as the $\overrightarrow{Θ_4}}$-graph, that computes a path between any two vertices $s$ and $t$ having length at most $17$ times the Euclidean distance between $s$ and $t$. To compute this path, at each step, the algorithm only uses knowledge of the location of the current vertex, its (at most four) outgoing edges, the desti…
▽ More
We present a routing algorithm for the directed $Θ_4$-graph, here denoted as the $\overrightarrow{Θ_4}}$-graph, that computes a path between any two vertices $s$ and $t$ having length at most $17$ times the Euclidean distance between $s$ and $t$. To compute this path, at each step, the algorithm only uses knowledge of the location of the current vertex, its (at most four) outgoing edges, the destination vertex, and one additional bit of information in order to determine the next edge to follow. This provides the first known online, local, competitive routing algorithm with constant routing ratio for the $Θ_4$-graph, as well as improving the best known upper bound on the spanning ratio of these graphs from $237$ to $17$. We also show that without this additional bit of information, the routing ratio increases to $\sqrt{290} \approx 17.03$.
△ Less
Submitted 12 July, 2021; v1 submitted 3 August, 2018;
originally announced August 2018.
-
High performing ionanofluid electrolyte with higher lithium salt concentration for safer lithium metal batteries
Authors:
P. Bose,
D. Deb,
S. Bhattacharya
Abstract:
A new class of high-performance pyrrolidinium cation based ionanofluid electrolytes with higher lithium salt concentration are developed. The electrolytes are formed by dispersing imidazolium ionic liquid functionalized TiO2 nanoparticles in low conducting, 0.6 M lithium salt doped N-alkyl-N-butylpyrrolidinium bis(trifluoromethylsulfonyl)imide (Pyr14TFSI) ionic liquid (IL) hosted electrolyte. Visc…
▽ More
A new class of high-performance pyrrolidinium cation based ionanofluid electrolytes with higher lithium salt concentration are developed. The electrolytes are formed by dispersing imidazolium ionic liquid functionalized TiO2 nanoparticles in low conducting, 0.6 M lithium salt doped N-alkyl-N-butylpyrrolidinium bis(trifluoromethylsulfonyl)imide (Pyr14TFSI) ionic liquid (IL) hosted electrolyte. Viscosity, ionic conductivity and thermal properties of these electrolytes are compared with well studied 0.2 M salt doped Pyr14TFSI IL-based electrolyte. The highly crystalline 0.6 M lithium salt dissolved IL-based electrolytes gradually become amorphous with the increasing dispersion of surface functionalized nanoparticles within it. The ionic conductivity of the electrolytes shows unusual viscosity decoupled characteristics and at the 5.0 wt% nanoparticle dispersion it attains a maximum value, higher than that of pure IL host. As compared to pure IL-based electrolytes, the ionanofluid electrolyte also possesses a significantly higher value of lithium ion transference number. The Li/LiMn2O4 cell with the best conducting ionanofluid electrolyte delivers a discharge capacity of about 131 mAh g-1 at 25 degree C at a current density of 24 mA g-1, much higher than that obtained in 0.2 M Li salt dissociated Pyr14TFSI electrolyte (87 mAh g-1). Superior interfacial compatibility between ionanofluid electrolyte and electrodes as indicated by the excellent rate performance with outstanding capacity retention of the cell as compared to pure IL-based analogue, further establish great application potentiality of this optimized newly developed electrolyte for safer LMBs.
△ Less
Submitted 19 June, 2018;
originally announced July 2018.