-
CharSS: Character-Level Transformer Model for Sanskrit Word Segmentation
Authors:
Krishnakant Bhatt,
Karthika N J,
Ganesh Ramakrishnan,
Preethi Jyothi
Abstract:
Subword tokens in Indian languages inherently carry meaning, and isolating them can enhance NLP tasks, making sub-word segmentation a crucial process. Segmenting Sanskrit and other Indian languages into subtokens is not straightforward, as it may include sandhi, which may lead to changes in the word boundaries. We propose a new approach of utilizing a Character-level Transformer model for Sanskrit…
▽ More
Subword tokens in Indian languages inherently carry meaning, and isolating them can enhance NLP tasks, making sub-word segmentation a crucial process. Segmenting Sanskrit and other Indian languages into subtokens is not straightforward, as it may include sandhi, which may lead to changes in the word boundaries. We propose a new approach of utilizing a Character-level Transformer model for Sanskrit Word Segmentation (CharSS). We perform experiments on three benchmark datasets to compare the performance of our method against existing methods. On the UoH+SandhiKosh dataset, our method outperforms the current state-of-the-art system by an absolute gain of 6.72 points in split prediction accuracy. On the hackathon dataset, our method achieves a gain of 2.27 points over the current SOTA system in terms of perfect match metric. We also propose a use-case of Sanskrit-based segments for a linguistically informed translation of technical terms to lexically similar low-resource Indian languages. In two separate experimental settings for this task, we achieve an average improvement of 8.46 and 6.79 chrF++ scores, respectively.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Entanglement and fidelity across quantum phase transitions in locally perturbed topological codes with open boundaries
Authors:
Harikrishnan K J,
Amit Kumar Pal
Abstract:
We investigate the topological-to-non-topological quantum phase transitions (QPTs) occurring in the Kitaev code under local perturbations in the form of local magnetic field and spin-spin interactions of the Ising-type using fidelity susceptibility (FS) and entanglement as the probes. We assume the code to be embedded on the surface of a wide cylinder of height $M$ and circumference $D$ with…
▽ More
We investigate the topological-to-non-topological quantum phase transitions (QPTs) occurring in the Kitaev code under local perturbations in the form of local magnetic field and spin-spin interactions of the Ising-type using fidelity susceptibility (FS) and entanglement as the probes. We assume the code to be embedded on the surface of a wide cylinder of height $M$ and circumference $D$ with $M\ll D$. We demonstrate a power-law divergence of FS across the QPT, and determine the quantum critical points (QCPs) via a finite-size scaling analysis. We verify these results by map** the perturbed Kitaev code to the 2D Ising model with nearest- and next-nearest-neighbor interactions, and computing the single-site magnetization as order parameter using quantum Monte-Carlo technique. We also point out an odd-even dichotomy in the occurrence of the QPT in the Kitaev ladder with respect to the odd and even values of $D$, when the system is perturbed with only Ising interaction. Our results also indicate a higher robustness of the topological phase of the Kitaev code against local perturbations if the boundary is made open along one direction. We further consider a local entanglement witness operator designed specifically to capture a lower bound to the localizable entanglement on the vertical non-trivial loop of the code. We show that the first derivative of the expectation value of the witness operator exhibits a logarithmic divergence across the QPT, and perform the finite-size scaling analysis. We demonstrate similar behaviour of the expectation value of the appropriately constructed witness operator also in the case of locally perturbed color code with open boundaries.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Recommenadation aided Caching using Combinatorial Multi-armed Bandits
Authors:
Pavamana K J,
Chandramani Kishore Singh
Abstract:
We study content caching with recommendations in a wireless network where the users are connected through a base station equipped with a finite-capacity cache. We assume a fixed set of contents with unknown user preferences and content popularities. We can recommend a subset of the contents to the users which encourages the users to request these contents. Recommendation can thus be used to increa…
▽ More
We study content caching with recommendations in a wireless network where the users are connected through a base station equipped with a finite-capacity cache. We assume a fixed set of contents with unknown user preferences and content popularities. We can recommend a subset of the contents to the users which encourages the users to request these contents. Recommendation can thus be used to increase cache hits. We formulate the cache hit optimization problem as a combinatorial multi-armed bandit (CMAB). We propose a UCB-based algorithm to decide which contents to cache and recommend. We provide an upper bound on the regret of our algorithm. We numerically demonstrate the performance of our algorithm and compare it to state-of-the-art algorithms.
△ Less
Submitted 3 May, 2024; v1 submitted 30 April, 2024;
originally announced May 2024.
-
Self-navigation in crowds: An invariant set-based approach
Authors:
Veejay Karthik J,
Leena Vachhani
Abstract:
Self-navigation in non-coordinating crowded environments is formidably challenging within multi-agent systems consisting of non-holonomic robots operating through local sensing. Our primary objective is the development of a novel, rapid, sensor-driven, self-navigation controller that directly computes control commands to enable safe maneuvering while coexisting with other agents. We propose an inp…
▽ More
Self-navigation in non-coordinating crowded environments is formidably challenging within multi-agent systems consisting of non-holonomic robots operating through local sensing. Our primary objective is the development of a novel, rapid, sensor-driven, self-navigation controller that directly computes control commands to enable safe maneuvering while coexisting with other agents. We propose an input-constrained feedback controller meticulously crafted for non-holonomic mobile robots and the characterization of associated invariant sets. The invariant sets are the key to maintaining stability and safety amidst the non-cooperating agents. We then propose a planning strategy that strategically guides the generation of invariant sets toward the agent's intended target. This enables the agents to directly compute theoretically safe control inputs without explicitly requiring pre-planned paths/trajectories to reliably navigate through crowded multi-agent environments. The practicality of our technique is demonstrated through hardware experiments, and the ability to parallelize computations to shorten computational durations for synthesizing safe control commands. The proposed approach finds potential applications in crowded multi-agent scenarios that require rapid control computations based on perceived safety bounds during run-time.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Electronic phase transition, vibrational properties and structural stability of single and two polyyne chains under external electric field
Authors:
Karthik H J,
Sarga P K,
Swastibrata Bhattacharyya
Abstract:
Search for one dimensional (1D) van der Waals materials has become an urgent need to meet the demand as building blocks for high performance, miniaturized, lightweight device applications. Polyyne, a 1D atomic chain of carbon is the thinnest and strongest allotrope of carbon, showing promising applications in new generation low dimensional devices due to the presence of a band gap. A system of two…
▽ More
Search for one dimensional (1D) van der Waals materials has become an urgent need to meet the demand as building blocks for high performance, miniaturized, lightweight device applications. Polyyne, a 1D atomic chain of carbon is the thinnest and strongest allotrope of carbon, showing promising applications in new generation low dimensional devices due to the presence of a band gap. A system of two carbon chains held together by van der Waals interaction has been theoretically postulated and shows band gap tunability under structural changes which finds applications in the realms of resistive switching and spintronics. In this study, we use first principles Density Functional Theory (DFT) to show a sharp semiconductor to metal transition along with the emergence of an asymmetry in the spin polarized density of states for single and two polyyne chains under a transverse electric field. The thermodynamic stability of the system has been substantiated through the utilization of Ab Initio Molecular Dynamics (AIMD) simulations, phonon dispersion curve analyses, and formation energy calculations. Furthermore, in addition to its dynamic stability assessment, phonon calculations have served to identify Raman active vibrational modes which offers an invaluable non-destructive experimental avenue for discerning electronic phase transitions in response to an applied electric field. Our study presents a predictive framework for the prospective utilization of one and two polyyne chains in forthcoming flexible nano-electronic and spintronic devices. The future prospects of the system are contingent upon advancements in nano-electronics fabrication techniques and the precise construction of circuitry for harnessing spin-related applications.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Energy Management in a Cooperative Energy Harvesting Wireless Sensor Network
Authors:
Arghyadeep Barat,
Prabuchandran. K. J,
Shalabh Bhatnagar
Abstract:
In this paper, we consider the problem of finding an optimal energy management policy for a network of sensor nodes capable of harvesting their own energy and sharing it with other nodes in the network. We formulate this problem in the discounted cost Markov decision process framework and obtain good energy-sharing policies using the Deep Deterministic Policy Gradient (DDPG) algorithm. Earlier wor…
▽ More
In this paper, we consider the problem of finding an optimal energy management policy for a network of sensor nodes capable of harvesting their own energy and sharing it with other nodes in the network. We formulate this problem in the discounted cost Markov decision process framework and obtain good energy-sharing policies using the Deep Deterministic Policy Gradient (DDPG) algorithm. Earlier works have attempted to obtain the optimal energy allocation policy for a single sensor and for multiple sensors arranged on a mote with a single centralized energy buffer. Our algorithms, on the other hand, provide optimal policies for a distributed network of sensors individually harvesting energy and capable of sharing energy amongst themselves. Through simulations, we illustrate that the policies obtained by our DDPG algorithm using this enhanced network model outperform algorithms that do not share energy or use a centralized energy buffer in the distributed multi-nodal case.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
Synergy of machine learning with quantum computing and communication
Authors:
Debasmita Bhoumik,
Susmita Sur-Kolay,
Latesh Kumar K. J.,
Sundaraja Sitharama Iyengar
Abstract:
Machine learning in quantum computing and communication provides intensive opportunities for revolutionizing the field of Physics, Mathematics, and Computer Science. There exists an aperture of understanding behind this interdisciplinary domain and a lack of core understanding renders an opportunity to explore the machine learning techniques for this domain. This paper gives a comprehensive review…
▽ More
Machine learning in quantum computing and communication provides intensive opportunities for revolutionizing the field of Physics, Mathematics, and Computer Science. There exists an aperture of understanding behind this interdisciplinary domain and a lack of core understanding renders an opportunity to explore the machine learning techniques for this domain. This paper gives a comprehensive review of state-of-the-art approaches in quantum computing and quantum communication in the context of Artificial Intelligence and machine learning models. The paper reviews the classical ML models that have been employed in various ways for quantum computation such as quantum error correction, quantum communication, quantum cryptography, and map** quantum algorithms to the existing hardware. The paper also illustrates how the relevant current challenges can be transformed into future research avenues.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
Exotic swarming dynamics of high-dimensional swarmalators
Authors:
Akash Yadav,
Krishnanand J,
V. K. Chandrasekar,
Wei Zou,
Jürgen Kurths,
D. V. Senthilkumar
Abstract:
Swarmalators are oscillators that can swarm as well as sync via a dynamic balance between their spatial proximity and phase similarity. We present a generalized D-dimensional swarmalator model, which is more realistic and versatile, that captures the self-organizing behaviors of a plethora of real-world collectives. This allows for modeling complicated processes such as flocking, schooling of fish…
▽ More
Swarmalators are oscillators that can swarm as well as sync via a dynamic balance between their spatial proximity and phase similarity. We present a generalized D-dimensional swarmalator model, which is more realistic and versatile, that captures the self-organizing behaviors of a plethora of real-world collectives. This allows for modeling complicated processes such as flocking, schooling of fish, cell sorting during embryonic development, residential segregation, and opinion dynamics in social groups. We demonstrate its versatility by capturing the manoeuvers of the school of fish and traveling waves of gene expression, both qualitatively and quantitatively, embryonic cell sorting, microrobot collectives, and various life stages of slime mold by a suitable extension of the original model to incorporate appropriate features besides a gallery of its intrinsic self-organizations for various interactions. We expect this high-dimensional model to be potentially useful in describing swarming systems in a wide range of disciplines including physics of active matter, developmental biology, sociology, and engineering.
△ Less
Submitted 6 August, 2023;
originally announced August 2023.
-
Entanglement in XYZ model on a spin-star system: Anisotropy vs. field-induced dynamics
Authors:
Jithin G. Krishnan,
Harikrishnan K. J.,
Amit Kumar Pal
Abstract:
We consider a star-network of $n=n_0+n_p$ spin-$\frac{1}{2}$ particles, where interaction between $n_0$ central spins and $n_p$ peripheral spins are of the XYZ-type. In the limit $n_0/n_p\ll 1$, we show that for odd $n$, the ground state is doubly degenerate, while for even $n$, the energy gap becomes negligible when $n$ is large, inducing an \emph{effective} double degeneracy. In the same limit,…
▽ More
We consider a star-network of $n=n_0+n_p$ spin-$\frac{1}{2}$ particles, where interaction between $n_0$ central spins and $n_p$ peripheral spins are of the XYZ-type. In the limit $n_0/n_p\ll 1$, we show that for odd $n$, the ground state is doubly degenerate, while for even $n$, the energy gap becomes negligible when $n$ is large, inducing an \emph{effective} double degeneracy. In the same limit, we show that for vanishing $xy$-anisotropy $γ$, bipartite entanglement on the peripheral spins computed using either a partial trace-based, or a measurement-based approach exhibits a logarithmic growth with $n_p$, where the sizes of the partitions are typically $\sim n_p/2$. This feature disappears for $γ\neq 0$, which we refer to as the \emph{anisotropy effect}. Interestingly, when the system is taken out of equilibrium by the introduction of a magnetic field of constant strength on all spins, the time-averaged bipartite entanglement on the periphery at the long-time limit exhibits a logarithmic growth with $n_p$ irrespective of the value of $γ$. We further study the $n_0/n_p\gg 1$ and $n_0/n_p\rightarrow 1$ limits of the model, and show that the behaviour of bipartite peripheral entanglement is qualitatively different from that of the $n_0/n_p\ll 1$ limit.
△ Less
Submitted 29 July, 2023;
originally announced July 2023.
-
Practical First-Order Bayesian Optimization Algorithms
Authors:
Utkarsh Prakash,
Aryan Chollera,
Kushagra Khatwani,
Prabuchandran K. J.,
Tejas Bodas
Abstract:
First Order Bayesian Optimization (FOBO) is a sample efficient sequential approach to find the global maxima of an expensive-to-evaluate black-box objective function by suitably querying for the function and its gradient evaluations. Such methods assume Gaussian process (GP) models for both, the function and its gradient, and use them to construct an acquisition function that identifies the next q…
▽ More
First Order Bayesian Optimization (FOBO) is a sample efficient sequential approach to find the global maxima of an expensive-to-evaluate black-box objective function by suitably querying for the function and its gradient evaluations. Such methods assume Gaussian process (GP) models for both, the function and its gradient, and use them to construct an acquisition function that identifies the next query point. In this paper, we propose a class of practical FOBO algorithms that efficiently utilizes the information from the gradient GP to identify potential query points with zero gradients. We construct a multi-level acquisition function where in the first step, we optimize a lower level acquisition function with multiple restarts to identify potential query points with zero gradient value. We then use the upper level acquisition function to rank these query points based on their function values to potentially identify the global maxima. As a final step, the potential point of maxima is chosen as the actual query point. We validate the performance of our proposed algorithms on several test functions and show that our algorithms outperform state-of-the-art FOBO algorithms. We also illustrate the application of our algorithms in finding optimal set of hyper-parameters in machine learning and in learning the optimal policy in reinforcement learning tasks.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
Quantum state transfer using 1D Heisenberg Hamiltonian on quasi-1D lattices
Authors:
Chandrima B. Pushpan,
Harikrishnan K. J.,
Amit Kumar Pal
Abstract:
We consider transfer of single and multi-qubit states on a quasi-1D lattice, where the time evolutions involved in the state transfer protocol are generated by only 1D Hamiltonians. We use the quasi-1D isotropic Heisenberg model under a magnetic field along the $z$ direction, where the spin-spin interaction strengths along the vertical sublattices, referred to as rungs, are much stronger than the…
▽ More
We consider transfer of single and multi-qubit states on a quasi-1D lattice, where the time evolutions involved in the state transfer protocol are generated by only 1D Hamiltonians. We use the quasi-1D isotropic Heisenberg model under a magnetic field along the $z$ direction, where the spin-spin interaction strengths along the vertical sublattices, referred to as rungs, are much stronger than the interactions along other sublattices. Tuning the field-strength to a special value, in the strong rung-coupling limit, the quasi-1D isotropic Heisenberg model can be mapped to an effective 1D XXZ model, where each rung mimics an effective two-level system. Consequently, the transfer of low-energy rung states from one rung to another can be represented by a transfer of an arbitrary single-qubit state from one lattice site to another using the 1D XXZ model. Exploiting this, we propose protocols for transferring arbitrary single-qubit states from one lattice site to another by using specific encoding of the single-qubit state into a low-energy rung state, and a subsequent decoding of the transferred state on the receiver rung. These encoding and decoding protocols involve a time evolution generated by the 1D rung Hamiltonian and single-qubit phase gates, ensuring that all time-evolutions required for transferring the single-qubit state are generated from 1D Hamiltonians. We show that the performance of the single-qubit state transfer using the proposed protocol is always better than the same when a time-evolution generated by the full quasi-1D Hamiltonian is used.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
Caching Contents with Varying Popularity using Restless Bandits
Authors:
Pavamana K J,
Chandramani Singh
Abstract:
We study content caching in a wireless network in which the users are connected through a base station that is equipped with a finite-capacity cache. We assume a fixed set of contents whose popularity varies with time. Users' requests for the content depend on their instantaneous popularity levels. Proactively caching contents at the base station incurs a cost but not having requested contents at…
▽ More
We study content caching in a wireless network in which the users are connected through a base station that is equipped with a finite-capacity cache. We assume a fixed set of contents whose popularity varies with time. Users' requests for the content depend on their instantaneous popularity levels. Proactively caching contents at the base station incurs a cost but not having requested contents at the base station also incurs a cost. We propose to proactively cache contents at the base station so as to minimize content missing and caching costs. We formulate the problem as a discounted cost Markov decision problem that is a restless multi-armed bandit problem. We provide conditions under which the problem is indexable and also propose a novel approach to maneuver a few parameters to render the problem indexable. We demonstrate the efficacy of the Whittle index policy via numerical evaluation.
△ Less
Submitted 17 September, 2023; v1 submitted 24 April, 2023;
originally announced April 2023.
-
Bayesian Optimization for Function Compositions with Applications to Dynamic Pricing
Authors:
Kunal Jain,
Prabuchandran K. J.,
Tejas Bodas
Abstract:
Bayesian Optimization (BO) is used to find the global optima of black box functions. In this work, we propose a practical BO method of function compositions where the form of the composition is known but the constituent functions are expensive to evaluate. By assuming an independent Gaussian process (GP) model for each of the constituent black-box function, we propose Expected Improvement (EI) and…
▽ More
Bayesian Optimization (BO) is used to find the global optima of black box functions. In this work, we propose a practical BO method of function compositions where the form of the composition is known but the constituent functions are expensive to evaluate. By assuming an independent Gaussian process (GP) model for each of the constituent black-box function, we propose Expected Improvement (EI) and Upper Confidence Bound (UCB) based BO algorithms and demonstrate their ability to outperform not just vanilla BO but also the current state-of-art algorithms. We demonstrate a novel application of the proposed methods to dynamic pricing in revenue management when the underlying demand function is expensive to evaluate.
△ Less
Submitted 1 May, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Open RAN: Evolution of Architecture, Deployment Aspects, and Future Directions
Authors:
Prabhu Kaliyammal Thiruvasagam,
Chandrasekar T,
Vinay Venkataram,
Vivek Raja Ilangovan,
Maneesha Perapalla,
Rajisha Payyanur,
Senthilnathan M D,
Vishal Kumar,
Kokila J
Abstract:
The Open Radio Access Network (Open RAN) aims to enable disaggregated, virtualized, programmable, and data-driven intelligent network with open interfaces to support various real-time and non-real-time applications for different classes of users and multiple industry verticals in beyond 5G and 6G networks while providing interoperability among multi-vendor network functions and components. In this…
▽ More
The Open Radio Access Network (Open RAN) aims to enable disaggregated, virtualized, programmable, and data-driven intelligent network with open interfaces to support various real-time and non-real-time applications for different classes of users and multiple industry verticals in beyond 5G and 6G networks while providing interoperability among multi-vendor network functions and components. In this article, we first discuss the evolution of RAN and then the O-RAN Alliance standardization activities and objectives to provide a comprehensive overview of O-RAN from a standardization point of view. Then, we discuss the O-RAN security aspects, use cases, deployment aspects, and open source projects and related activities in other forums. Finally, we summarize the open issues, challenges, and future research directions to explore further for in-depth study and analysis.
△ Less
Submitted 17 January, 2023;
originally announced January 2023.
-
Estimating entanglement in 2D Heisenberg model in the strong rung-coupling limit
Authors:
Chandrima B. Pushpan,
Harikrishnan K. J.,
Prithvi Narayan,
Amit Kumar Pal
Abstract:
In this paper, we calculate entanglement in the isotropic Heisenberg model in a magnetic field on a two-dimensional rectangular zig-zag lattice in the strong rung-coupling limit, using the one-dimensional XXZ model as a proxy. Focusing on the leading order in perturbation, for arbitrary size of the lattice, we show how the one-dimensional effective description emerges. We point out specific states…
▽ More
In this paper, we calculate entanglement in the isotropic Heisenberg model in a magnetic field on a two-dimensional rectangular zig-zag lattice in the strong rung-coupling limit, using the one-dimensional XXZ model as a proxy. Focusing on the leading order in perturbation, for arbitrary size of the lattice, we show how the one-dimensional effective description emerges. We point out specific states in the low-energy sector of the two-dimensional model that are well-approximated by the one-dimensional spin-1/2 XXZ model. We propose a systematic approach for map** matrix-elements of operators defined on the two-dimensional model to their low-energy counterparts on the one-dimensional XXZ model. We also show that partial trace-based description of entanglement in the two-dimensional model can be satisfactorily approximated using the one-dimensional XXZ model as a substitute. We further show numerically that the one-dimensional XXZ model performs well in estimating entanglement quantified using a measurement-based approach in the two-dimensional model for specific choices of measured Hermitian operators.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Caching Contents with Varying Popularity using Restless Bandits
Authors:
Pavamana K J,
Chandramani Kishore Singh
Abstract:
Mobile networks are experiencing prodigious increase in data volume and user density , which exerts a great burden on mobile core networks and backhaul links. An efficient technique to lessen this problem is to use caching i.e. to bring the data closer to the users by making use of the caches of edge network nodes, such as fixed or mobile access points and even user devices. The performance of a c…
▽ More
Mobile networks are experiencing prodigious increase in data volume and user density , which exerts a great burden on mobile core networks and backhaul links. An efficient technique to lessen this problem is to use caching i.e. to bring the data closer to the users by making use of the caches of edge network nodes, such as fixed or mobile access points and even user devices. The performance of a caching depends on contents that are cached. In this paper, we examine the problem of content caching at the wireless edge(i.e. base stations) to minimize the discounted cost incurred over infinite horizon. We formulate this problem as a restless bandit problem, which is hard to solve. We begin by showing an optimal policy is of threshold type. Using these structural results, we prove the indexability of the problem, and use Whittle index policy to minimize the discounted cost.
△ Less
Submitted 20 June, 2023; v1 submitted 31 October, 2022;
originally announced December 2022.
-
The MUSE second-generation VLT instrument
Authors:
Bacon R.,
Accardo M.,
Adjali L.,
Anwand H.,
Bauer S.,
Biswas I.,
Blaizot J.,
Boudon D.,
Brau-Nogue S.,
Brinchmann J.,
Caillier P.,
Capoani L.,
Carollo C. M.,
Contini T.,
Couderc P.,
Daguise E.,
Deiries S.,
Delabre B.,
Dreizler S.,
Dubois J. P.,
Dupieux M.,
Dupuy C.,
Emsellem E.,
Fechner T.,
Fleischmann A.
, et al. (43 additional authors not shown)
Abstract:
The Multi Unit Spectroscopic Explorer (MUSE) is a second-generation VLT panoramic integral-field spectrograph currently in manufacturing, assembly and integration phase. MUSE has a field of 1x1 arcmin2 sampled at 0.2x0.2 arcsec2 and is assisted by the VLT ground layer adaptive optics ESO facility using four laser guide stars. The instrument is a large assembly of 24 identical high performance inte…
▽ More
The Multi Unit Spectroscopic Explorer (MUSE) is a second-generation VLT panoramic integral-field spectrograph currently in manufacturing, assembly and integration phase. MUSE has a field of 1x1 arcmin2 sampled at 0.2x0.2 arcsec2 and is assisted by the VLT ground layer adaptive optics ESO facility using four laser guide stars. The instrument is a large assembly of 24 identical high performance integral field units, each one composed of an advanced image slicer, a spectrograph and a 4kx4k detector. In this paper we review the progress of the manufacturing and report the performance achieved with the first integral field unit.
△ Less
Submitted 30 November, 2022;
originally announced November 2022.
-
Localizing genuine multiparty entanglement in noisy stabilizer states
Authors:
Harikrishnan K. J.,
Amit Kumar Pal
Abstract:
Characterizing large noisy multiparty quantum states using genuine multiparty entanglement is a challenging task. In this paper, we calculate lower bounds of genuine multiparty entanglement localized over a chosen multiparty subsystem of multi-qubit stabilizer states in the noiseless and noisy scenario. In the absence of noise, adopting a graph-based technique, we perform the calculation for arbit…
▽ More
Characterizing large noisy multiparty quantum states using genuine multiparty entanglement is a challenging task. In this paper, we calculate lower bounds of genuine multiparty entanglement localized over a chosen multiparty subsystem of multi-qubit stabilizer states in the noiseless and noisy scenario. In the absence of noise, adopting a graph-based technique, we perform the calculation for arbitrary graph states as representatives of the stabilizer states, and show that the graph operations required for the calculation has a polynomial scaling with the system size. As demonstrations, we compute the localized genuine multiparty entanglement over subsystems of large graphs having linear, ladder, and square structures. We also extend the calculation for graph states subjected to single-qubit Markovian or non-Markovian Pauli noise on all qubits, and demonstrate, for a specific lower bound of the localizable genuine multiparty entanglement corresponding to a specific Pauli measurement setup, the existence of a critical noise strength beyond which all of the post measured states are biseparable. The calculation is also useful for arbitrary large stabilizer states under noise due to the local unitary connection between stabilizer states and graph states. We demonstrate this by considering a toric code defined on a square lattice, and computing a lower bound of localizable genuine multiparty entanglement over a non-trivial loop of the code. Similar to the graph states, we show the existence of the critical noise strength in this case also, and discuss its interesting features.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
MIMA -- Multifunctional IoT Integrated Menstrual Aid
Authors:
Jyothish Kumar J,
Subhankar Mishra,
Amish Bibhu,
Shreya Shivangi,
Sulagna Saha
Abstract:
Menstruation is the monthly shedding of the endometrium lining of a woman's uterus. The average age when girls start menstruating is around the age of 12 years (menarche), and the cycle continues until they attain menopause (about the age of 51). Medical research and analysis in this field reveal that most women have to go through a painful cycle of abdominal cramps along with sanitary pad rashes,…
▽ More
Menstruation is the monthly shedding of the endometrium lining of a woman's uterus. The average age when girls start menstruating is around the age of 12 years (menarche), and the cycle continues until they attain menopause (about the age of 51). Medical research and analysis in this field reveal that most women have to go through a painful cycle of abdominal cramps along with sanitary pad rashes, while painkillers or endurance ability are their go-to solution. Heat pads or hot water bags also help in pain reduction. Currently, the concept of period pants revolves around pad-free and hassle-free periods for women, whereas most women still prefer sanitary pads during their period cycle. MIMA aims at the development of IoT integrated smart, functional intimate wear for women that would help women comfort during menstruation by catering to issues of menstrual cramps, rashes, leakage and stains, malodor, etc. The proposed methodology has been implemented by referring to the online survey conducted from Indian women (17-58 years old). MIMA can provide comfort during the menstruation cycle with IoT integrated Heat-Pad and functional alterations in the garment for a rash-free, anti-odor, and leak-proof period.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Controlling gain with loss: Bounds on localizable entanglement in multi-qubit systems
Authors:
Jithin G. Krishnan,
Harikrishnan K. J.,
Amit Kumar Pal
Abstract:
We investigate the relation between the amount of entanglement localized on a chosen subsystem of a multi-qubit system via local measurements on the rest of the system, and the bipartite entanglement that is lost during this measurement process. We study a number of paradigmatic pure states, including the generalized GHZ, the generalized W, Dicke, and the generalized Dicke states. For the generali…
▽ More
We investigate the relation between the amount of entanglement localized on a chosen subsystem of a multi-qubit system via local measurements on the rest of the system, and the bipartite entanglement that is lost during this measurement process. We study a number of paradigmatic pure states, including the generalized GHZ, the generalized W, Dicke, and the generalized Dicke states. For the generalized GHZ and W states, we analytically derive bounds on localizable entanglement in terms of the entanglement present in the system prior to the measurement. Also, for the Dicke and the generalized Dicke states, we demonstrate that with increasing system size, localizable entanglement tends to be equal to the bipartite entanglement present in the system over a specific partition before measurement. We extend the investigation numerically in the case of arbitrary multi-qubit pure states. We also analytically determine the modification of these results, including the proposed bounds, in situations where these pure states are subjected to single-qubit phase-flip noise on all qubits. Additionally, we study one-dimensional paradigmatic quantum spin models, namely the transverse-field XY model and the XXZ model in an external field, and numerically demonstrate a quadratic dependence of the localized entanglement on the lost entanglement. We show that this relation is robust even in the presence of disorder in the strength of the external field.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
Efficient Decoding of Surface Code Syndromes for Error Correction in Quantum Computing
Authors:
Debasmita Bhoumik,
Pinaki Sen,
Ritajit Majumdar,
Susmita Sur-Kolay,
Latesh Kumar K J,
Sundaraja Sitharama Iyengar
Abstract:
Errors in surface code have typically been decoded by Minimum Weight Perfect Matching (MWPM) based method. Recently, neural-network-based Machine Learning (ML) techniques have been employed for this purpose. Here we propose a two-level (low and high) ML-based decoding scheme, where the first level corrects errors on physical qubits and the second one corrects any existing logical errors, for diffe…
▽ More
Errors in surface code have typically been decoded by Minimum Weight Perfect Matching (MWPM) based method. Recently, neural-network-based Machine Learning (ML) techniques have been employed for this purpose. Here we propose a two-level (low and high) ML-based decoding scheme, where the first level corrects errors on physical qubits and the second one corrects any existing logical errors, for different noise models. Our results show that our proposed decoding method achieves $\sim10 \times$ and $\sim2 \times$ higher values of pseudo-threshold and threshold respectively, than for MWPM. We show that usage of more sophisticated ML models with higher training/testing time, do not provide significant improvement in the decoder performance. Finally, data generation for training the ML decoder requires significant overhead hence lower volume of training data is desirable. We have shown that our decoder maintains a good performance with the train-test-ratio as low as $40:60$.
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
Neural Network Compatible Off-Policy Natural Actor-Critic Algorithm
Authors:
Raghuram Bharadwaj Diddigi,
Prateek Jain,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
Learning optimal behavior from existing data is one of the most important problems in Reinforcement Learning (RL). This is known as "off-policy control" in RL where an agent's objective is to compute an optimal policy based on the data obtained from the given policy (known as the behavior policy). As the optimal policy can be very different from the behavior policy, learning optimal behavior is ve…
▽ More
Learning optimal behavior from existing data is one of the most important problems in Reinforcement Learning (RL). This is known as "off-policy control" in RL where an agent's objective is to compute an optimal policy based on the data obtained from the given policy (known as the behavior policy). As the optimal policy can be very different from the behavior policy, learning optimal behavior is very hard in the "off-policy" setting compared to the "on-policy" setting where new data from the policy updates will be utilized in learning. This work proposes an off-policy natural actor-critic algorithm that utilizes state-action distribution correction for handling the off-policy behavior and the natural policy gradient for sample efficiency. The existing natural gradient-based actor-critic algorithms with convergence guarantees require fixed features for approximating both policy and value functions. This often leads to sub-optimal learning in many RL applications. On the other hand, our proposed algorithm utilizes compatible features that enable one to use arbitrary neural networks to approximate the policy and the value function and guarantee convergence to a locally optimal policy. We illustrate the benefit of the proposed off-policy natural gradient algorithm by comparing it with the vanilla gradient actor-critic algorithm on benchmark RL tasks.
△ Less
Submitted 15 June, 2022; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Distinguishing Phases via Non-Markovian Dynamics of Entanglement in Topological Quantum Codes under Parallel Magnetic Field
Authors:
Harikrishnan K. J.,
Amit Kumar Pal
Abstract:
We investigate the static and the dynamical behavior of localizable entanglement and its lower bounds on nontrivial loops of topological quantum codes with parallel magnetic field. Exploiting the connection between the stabilizer states and graph states in the absence of the parallel field and external noise, we identify a specific measurement basis, referred to as the canonical measurement basis,…
▽ More
We investigate the static and the dynamical behavior of localizable entanglement and its lower bounds on nontrivial loops of topological quantum codes with parallel magnetic field. Exploiting the connection between the stabilizer states and graph states in the absence of the parallel field and external noise, we identify a specific measurement basis, referred to as the canonical measurement basis, that optimizes localizable entanglement when measurement is restricted to single-qubit Pauli measurements only, thereby providing a lower bound. We also propose an approximation of the lower bound that can be computed for larger systems according to the computational resource in hand. Additionally, we compute a lower bound of the localizable entanglement that can be computed by determining the expectation value of an appropriately designed witness operator. We study the behavior of these lower bounds in the vicinity of the topological to nontopological quantum phase transition of the system, and perform a finite-size scaling analysis. We also investigate the dynamical features of these lower bounds when the system is subjected to Markovian or non-Markovian single-qubit dephasing noise. We find that in the case of the non-Markovian dephasing noise, at large time, the canonical measurement-based lower bound oscillates with a larger amplitude when the initial state of the system undergoing dephasing dynamics is chosen from the nontopological phase, compared to the same for an initial state from the topological phase. These features can be utilized to distinguish the topological phase of the system from the nontopological phase in the presence of dephasing noise.
△ Less
Submitted 30 May, 2022; v1 submitted 25 August, 2021;
originally announced August 2021.
-
Zero Shot Domain Generalization
Authors:
Udit Maniyar,
Joseph K J,
Aniket Anand Deshmukh,
Urun Dogan,
Vineeth N Balasubramanian
Abstract:
Standard supervised learning setting assumes that training data and test data come from the same distribution (domain). Domain generalization (DG) methods try to learn a model that when trained on data from multiple domains, would generalize to a new unseen domain. We extend DG to an even more challenging setting, where the label space of the unseen domain could also change. We introduce this prob…
▽ More
Standard supervised learning setting assumes that training data and test data come from the same distribution (domain). Domain generalization (DG) methods try to learn a model that when trained on data from multiple domains, would generalize to a new unseen domain. We extend DG to an even more challenging setting, where the label space of the unseen domain could also change. We introduce this problem as Zero-Shot Domain Generalization (to the best of our knowledge, the first such effort), where the model generalizes across new domains and also across new classes in those domains. We propose a simple strategy which effectively exploits semantic information of classes, to adapt existing DG methods to meet the demands of Zero-Shot Domain Generalization. We evaluate the proposed methods on CIFAR-10, CIFAR-100, F-MNIST and PACS datasets, establishing a strong baseline to foster interest in this new research direction.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
NAOMI: the adaptive optics system of the Auxiliary Telescopes of the VLTI
Authors:
Woillez J.,
Abad J. A.,
Abuter R.,
Aller Carpentier E.,
Alonso J.,
Andolfato L.,
Barriga P.,
Berger J. -P.,
Beuzit J. -L.,
Bonnet H.,
Bourdarot G.,
Bourget P.,
Brast R.,
Caniguante L.,
Cottalorda E.,
Darré P.,
Delabre B.,
Delboulbé A.,
Delplancke-Ströbele F.,
Dembet R.,
Donaldson R.,
Dorn R.,
Dupeyron J.,
Dupuy C.,
Egner S.
, et al. (58 additional authors not shown)
Abstract:
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking e…
▽ More
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking even in degraded conditions. We deployed a new adaptive optics module for interferometry (NAOMI) on the Auxiliary Telescopes. We present its design, performance, and effect on the observations that are carried out with the interferometric instruments.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Reinforcement Learning in Non-Stationary Environments
Authors:
Sindhu Padakandla,
Prabuchandran K. J,
Shalabh Bhatnagar
Abstract:
Reinforcement learning (RL) methods learn optimal decisions in the presence of a stationary environment. However, the stationary assumption on the environment is very restrictive. In many real world problems like traffic signal control, robotic applications, one often encounters situations with non-stationary environments and in these scenarios, RL methods yield sub-optimal decisions. In this pape…
▽ More
Reinforcement learning (RL) methods learn optimal decisions in the presence of a stationary environment. However, the stationary assumption on the environment is very restrictive. In many real world problems like traffic signal control, robotic applications, one often encounters situations with non-stationary environments and in these scenarios, RL methods yield sub-optimal decisions. In this paper, we thus consider the problem of develo** RL methods that obtain optimal decisions in a non-stationary environment. The goal of this problem is to maximize the long-term discounted reward achieved when the underlying model of the environment changes over time. To achieve this, we first adapt a change point algorithm to detect change in the statistics of the environment and then develop an RL algorithm that maximizes the long-run reward accrued. We illustrate that our change point method detects change in the model of the environment effectively and thus facilitates the RL algorithm in maximizing the long-run reward. We further validate the effectiveness of the proposed solution on non-stationary random Markov decision processes, a sensor energy management problem and a traffic signal control problem.
△ Less
Submitted 19 May, 2020; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Actor-Critic Algorithms for Constrained Multi-agent Reinforcement Learning
Authors:
Raghuram Bharadwaj Diddigi,
Sai Koti Reddy Danda,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
In cooperative stochastic games multiple agents work towards learning joint optimal actions in an unknown environment to achieve a common goal. In many real-world applications, however, constraints are often imposed on the actions that can be jointly taken by the agents. In such scenarios the agents aim to learn joint actions to achieve a common goal (minimizing a specified cost function) while me…
▽ More
In cooperative stochastic games multiple agents work towards learning joint optimal actions in an unknown environment to achieve a common goal. In many real-world applications, however, constraints are often imposed on the actions that can be jointly taken by the agents. In such scenarios the agents aim to learn joint actions to achieve a common goal (minimizing a specified cost function) while meeting the given constraints (specified via certain penalty functions). In this paper, we consider the relaxation of the constrained optimization problem by constructing the Lagrangian of the cost and penalty functions. We propose a nested actor-critic solution approach to solve this relaxed problem. In this approach, an actor-critic scheme is employed to improve the policy for a given Lagrange parameter update on a faster timescale as in the classical actor-critic architecture. A meta actor-critic scheme using this faster timescale policy updates is then employed to improve the Lagrange parameters on the slower timescale. Utilizing the proposed nested actor-critic schemes, we develop three Nested Actor-Critic (N-AC) algorithms. Through experiments on constrained cooperative tasks, we show the effectiveness of the proposed algorithms.
△ Less
Submitted 12 July, 2020; v1 submitted 8 May, 2019;
originally announced May 2019.
-
INFER: INtermediate representations for FuturE pRediction
Authors:
Shashank Srikanth,
Junaid Ahmed Ansari,
Karnik Ram R,
Sarthak Sharma,
Krishna Murthy J.,
Madhava Krishna K
Abstract:
In urban driving scenarios, forecasting future trajectories of surrounding vehicles is of paramount importance. While several approaches for the problem have been proposed, the best-performing ones tend to require extremely detailed input representations (eg. image sequences). But, such methods do not generalize to datasets they have not been trained on. We propose intermediate representations tha…
▽ More
In urban driving scenarios, forecasting future trajectories of surrounding vehicles is of paramount importance. While several approaches for the problem have been proposed, the best-performing ones tend to require extremely detailed input representations (eg. image sequences). But, such methods do not generalize to datasets they have not been trained on. We propose intermediate representations that are particularly well-suited for future prediction. As opposed to using texture (color) information, we rely on semantics and train an autoregressive model to accurately predict future trajectories of traffic participants (vehicles) (see fig. above). We demonstrate that using semantics provides a significant boost over techniques that operate over raw pixel intensities/disparities. Uncharacteristic of state-of-the-art approaches, our representations and models generalize to completely different datasets, collected across several cities, and also across countries where people drive on opposite sides of the road (left-handed vs right-handed driving). Additionally, we demonstrate an application of our approach in multi-object tracking (data association). To foster further research in transferrable representations and ensure reproducibility, we release all our code and data.
△ Less
Submitted 25 March, 2019;
originally announced March 2019.
-
An Online Sample Based Method for Mode Estimation using ODE Analysis of Stochastic Approximation Algorithms
Authors:
Chandramouli Kamanchi,
Raghuram Bharadwaj Diddigi,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
One of the popular measures of central tendency that provides better representation and interesting insights of the data compared to the other measures like mean and median is the metric mode. If the analytical form of the density function is known, mode is an argument of the maximum value of the density function and one can apply the optimization techniques to find mode. In many of the practical…
▽ More
One of the popular measures of central tendency that provides better representation and interesting insights of the data compared to the other measures like mean and median is the metric mode. If the analytical form of the density function is known, mode is an argument of the maximum value of the density function and one can apply the optimization techniques to find mode. In many of the practical applications, the analytical form of the density is not known and only the samples from the distribution are available. Most of the techniques proposed in the literature for estimating the mode from the samples assume that all the samples are available beforehand. Moreover, some of the techniques employ computationally expensive operations like sorting. In this work we provide a computationally effective, on-line iterative algorithm that estimates the mode of a unimodal smooth density given only the samples generated from the density. Asymptotic convergence of the proposed algorithm using an ordinary differential equation (ODE) based analysis is provided. We also prove the stability of estimates by utilizing the concept of regularization. Experimental results further demonstrate the effectiveness of the proposed algorithm.
△ Less
Submitted 3 June, 2019; v1 submitted 11 February, 2019;
originally announced February 2019.
-
Change Point Detection for Compositional Multivariate Data
Authors:
Prabuchandran K. J.,
Nitin Singh,
Pankaj Dayama,
Vinayaka Pandit
Abstract:
Change point detection algorithms have numerous applications in fields of scientific and economic importance. We consider the problem of change point detection on compositional multivariate data (each sample is a probability mass function), which is a practically important sub-class of general multivariate data. While the problem of change-point detection is well studied in univariate setting, and…
▽ More
Change point detection algorithms have numerous applications in fields of scientific and economic importance. We consider the problem of change point detection on compositional multivariate data (each sample is a probability mass function), which is a practically important sub-class of general multivariate data. While the problem of change-point detection is well studied in univariate setting, and there are few viable implementations for a general multivariate data, the existing methods do not perform well on compositional data. In this paper, we propose a parametric approach for change point detection in compositional data. Moreover, using simple transformations on data, we extend our approach to handle any general multivariate data. Experimentally, we show that our method performs significantly better on compositional data and is competitive on general data compared to the available state of the art implementations.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks
Authors:
Raghuram Bharadwaj Diddigi,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
We consider the problem of tracking an intruder using a network of wireless sensors. For tracking the intruder at each instant, the optimal number and the right configuration of sensors has to be powered. As powering the sensors consumes energy, there is a trade off between accurately tracking the position of the intruder at each instant and the energy consumption of sensors. This problem has been…
▽ More
We consider the problem of tracking an intruder using a network of wireless sensors. For tracking the intruder at each instant, the optimal number and the right configuration of sensors has to be powered. As powering the sensors consumes energy, there is a trade off between accurately tracking the position of the intruder at each instant and the energy consumption of sensors. This problem has been formulated in the framework of Partially Observable Markov Decision Process (POMDP). Even for the state-of-the-art algorithm in the literature, the curse of dimensionality renders the problem intractable. In this paper, we formulate the Intrusion Detection (ID) problem with a suitable state-action space in the framework of POMDP and develop a Reinforcement Learning (RL) algorithm utilizing the Upper Confidence Tree Search (UCT) method to solve the ID problem. Through simulations, we show that our algorithm performs and scales well with the increasing state and action spaces.
△ Less
Submitted 24 February, 2018; v1 submitted 27 August, 2017;
originally announced August 2017.
-
Information Diffusion in Social Networks in Two Phases
Authors:
Swapnil Dhamal,
Prabuchandran K. J.,
Y. Narahari
Abstract:
The problem of maximizing information diffusion, given a certain budget expressed in terms of the number of seed nodes, is an important topic in social networks research. Existing literature focuses on single phase diffusion where all seed nodes are selected at the beginning of diffusion and all the selected nodes are activated simultaneously. This paper undertakes a detailed investigation of the…
▽ More
The problem of maximizing information diffusion, given a certain budget expressed in terms of the number of seed nodes, is an important topic in social networks research. Existing literature focuses on single phase diffusion where all seed nodes are selected at the beginning of diffusion and all the selected nodes are activated simultaneously. This paper undertakes a detailed investigation of the effect of selecting and activating seed nodes in multiple phases. Specifically, we study diffusion in two phases assuming the well-studied independent cascade model. First, we formulate an objective function for two-phase diffusion, investigate its properties, and propose efficient algorithms for finding seed nodes in the two phases. Next, we study two associated problems: (1) budget splitting which seeks to optimally split the total budget between the two phases and (2) scheduling which seeks to determine an optimal delay after which to commence the second phase. Our main conclusions include: (a) under strict temporal constraints, use single phase diffusion, (b) under moderate temporal constraints, use two-phase diffusion with a short delay while allocating most of the budget to the first phase, and (c) when there are no temporal constraints, use two-phase diffusion with a long delay while allocating roughly one-third of the budget to the first phase.
△ Less
Submitted 23 June, 2017;
originally announced June 2017.
-
A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret
Authors:
Divya Padmanabhan,
Satyanath Bhat,
Prabuchandran K. J.,
Shirish Shevade,
Y. Narahari
Abstract:
Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $Ω(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where t…
▽ More
Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $Ω(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $Δ$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $Δ$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $Δ$-UCB achieves a $Δ$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated.
△ Less
Submitted 29 May, 2020; v1 submitted 2 March, 2017;
originally announced March 2017.
-
Energy Sharing for Multiple Sensor Nodes with Finite Buffers
Authors:
Sindhu Padakandla,
Prabuchandran K. J,
Shalabh Bhatnagar
Abstract:
We consider the problem of finding optimal energy sharing policies that maximize the network performance of a system comprising of multiple sensor nodes and a single energy harvesting (EH) source. Sensor nodes periodically sense the random field and generate data, which is stored in the corresponding data queues. The EH source harnesses energy from ambient energy sources and the generated energy i…
▽ More
We consider the problem of finding optimal energy sharing policies that maximize the network performance of a system comprising of multiple sensor nodes and a single energy harvesting (EH) source. Sensor nodes periodically sense the random field and generate data, which is stored in the corresponding data queues. The EH source harnesses energy from ambient energy sources and the generated energy is stored in an energy buffer. Sensor nodes receive energy for data transmission from the EH source. The EH source has to efficiently share the stored energy among the nodes in order to minimize the long-run average delay in data transmission. We formulate the problem of energy sharing between the nodes in the framework of average cost infinite-horizon Markov decision processes (MDPs). We develop efficient energy sharing algorithms, namely Q-learning algorithm with exploration mechanisms based on the $ε$-greedy method as well as upper confidence bound (UCB). We extend these algorithms by incorporating state and action space aggregation to tackle state-action space explosion in the MDP. We also develop a cross entropy based method that incorporates policy parameterization in order to find near optimal energy sharing policies. Through simulations, we show that our algorithms yield energy sharing policies that outperform the heuristic greedy method.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
A Multi-phase Approach for Improving Information Diffusion in Social Networks
Authors:
Swapnil Dhamal,
Prabuchandran K. J.,
Y. Narahari
Abstract:
For maximizing influence spread in a social network, given a certain budget on the number of seed nodes, we investigate the effects of selecting and activating the seed nodes in multiple phases. In particular, we formulate an appropriate objective function for two-phase influence maximization under the independent cascade model, investigate its properties, and propose algorithms for determining th…
▽ More
For maximizing influence spread in a social network, given a certain budget on the number of seed nodes, we investigate the effects of selecting and activating the seed nodes in multiple phases. In particular, we formulate an appropriate objective function for two-phase influence maximization under the independent cascade model, investigate its properties, and propose algorithms for determining the seed nodes in the two phases. We also study the problem of determining an optimal budget-split and delay between the two phases.
△ Less
Submitted 21 February, 2015;
originally announced February 2015.
-
Synchronization transitions in coupled time-delay electronic circuits with a threshold nonlinearity
Authors:
Srinivasan. k,
Senthilkumar D. V.,
Murali. K,
Lakshmanan. M,
Kurths. J
Abstract:
Experimental observations of typical kinds of synchronization transitions are reported in unidirectionally coupled time-delay electronic circuits with a threshold nonlinearity and two time delays, namely feedback delay $τ_1$ and coupling delay $τ_2$. We have observed transitions from anticipatory to lag via complete synchronization and their inverse counterparts with excitatory and inhibitory coup…
▽ More
Experimental observations of typical kinds of synchronization transitions are reported in unidirectionally coupled time-delay electronic circuits with a threshold nonlinearity and two time delays, namely feedback delay $τ_1$ and coupling delay $τ_2$. We have observed transitions from anticipatory to lag via complete synchronization and their inverse counterparts with excitatory and inhibitory couplings, respectively, as a function of the coupling delay $τ_2$. The anticipating and lag times depend on the difference between the feedback and the coupling delays. A single stability condition for all the different types of synchronization is found to be valid as the stability condition is independent of both the delays. Further, the existence of different kinds of synchronizations observed experimentally is corroborated by numerical simulations, and from the changes in the Lyapunov exponents of the coupled time-delay systems.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.