-
Recommenadation aided Caching using Combinatorial Multi-armed Bandits
Authors:
Pavamana K J,
Chandramani Kishore Singh
Abstract:
We study content caching with recommendations in a wireless network where the users are connected through a base station equipped with a finite-capacity cache. We assume a fixed set of contents with unknown user preferences and content popularities. We can recommend a subset of the contents to the users which encourages the users to request these contents. Recommendation can thus be used to increa…
▽ More
We study content caching with recommendations in a wireless network where the users are connected through a base station equipped with a finite-capacity cache. We assume a fixed set of contents with unknown user preferences and content popularities. We can recommend a subset of the contents to the users which encourages the users to request these contents. Recommendation can thus be used to increase cache hits. We formulate the cache hit optimization problem as a combinatorial multi-armed bandit (CMAB). We propose a UCB-based algorithm to decide which contents to cache and recommend. We provide an upper bound on the regret of our algorithm. We numerically demonstrate the performance of our algorithm and compare it to state-of-the-art algorithms.
△ Less
Submitted 3 May, 2024; v1 submitted 30 April, 2024;
originally announced May 2024.
-
Spherical codes with prescribed signed permutation automorphisms inside shells of low-dimensional integer lattices
Authors:
Ganzhinov Mikhail,
Östergård Patric R. J
Abstract:
Let $\textrm{S}(n,t,k)$ be the maximum size of a code containing only vectors of the $k$th shell of the integer lattice $\mathbb{Z}^n$ such that the inner product between distinct vectors does not exceed $t$. In this paper we compute lower bounds for $\textrm{S}(n,t,k)$ for small values of $n$, $t$ and $k$ by carrying out computer searches for codes with prescribed automorphisms. We prescribe grou…
▽ More
Let $\textrm{S}(n,t,k)$ be the maximum size of a code containing only vectors of the $k$th shell of the integer lattice $\mathbb{Z}^n$ such that the inner product between distinct vectors does not exceed $t$. In this paper we compute lower bounds for $\textrm{S}(n,t,k)$ for small values of $n$, $t$ and $k$ by carrying out computer searches for codes with prescribed automorphisms. We prescribe groups of signed permutation automorphisms acting transitively on the pairs of coordinates and coordinate values as well as other closely related groups of automorphisms. Several of the constructed codes lead to improved lower bounds for spherical codes.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Imaging detection of the inner dust belt and the four exoplanets in the HR8799 system with JWST's MIRI coronagraph
Authors:
Boccaletti A.,
Mâlin M.,
Baudoz P.,
Tremplin P.,
Perrot C.,
Rouan D.,
Lagage P. -O.,
Whiteford N.,
Mollière P.,
Waters R.,
Henning T.,
Decin L.,
Güdel M.,
Vadenbussche B.,
Absil O.,
Argyriou I.,
Bouwman J.,
Cossou C.,
Coulais A.,
Gastaud R.,
Glasse A.,
Glauser A.,
Kamp I.,
Kendrew S.,
Krause O.
, et al. (13 additional authors not shown)
Abstract:
The multi planet system HR8799 is the first target observed with MIRI's coronagraphs as part of the MIRI-EC Guaranteed Time Observations exoplanets programme in Nov. 2022. We obtained deep observations in three coronagraphic filters from 10 to 15mic (F1065C, F1140C, F1550C), and one standard imaging filter at 20 mic (F2100W), with the goal to extract the photometry of the four planets, as well as…
▽ More
The multi planet system HR8799 is the first target observed with MIRI's coronagraphs as part of the MIRI-EC Guaranteed Time Observations exoplanets programme in Nov. 2022. We obtained deep observations in three coronagraphic filters from 10 to 15mic (F1065C, F1140C, F1550C), and one standard imaging filter at 20 mic (F2100W), with the goal to extract the photometry of the four planets, as well as to detect and investigate the distribution of circumstellar dust. Using dedicated observations of a reference star, we tested several algorithms to subtract the stellar diffraction pattern while preserving the fluxes of planets, which can be significantly affected by over-subtraction. Measuring correctly the planet's flux values requires accounting for the attenuation by the coronagraphs as a function of their position, and to estimate the normalisation with respect to the central star. We tested several procedures to derive averaged photometric values and error bars. These observations have enabled us to obtain two main results. First of all, the four planets in the system are well recovered, and their mid-IR fluxes, combined with near-IR flux values from the literature, are compared to two exoplanet atmosphere models, ATMO and Exo-REM. As a main outcome, the MIRI photometric data points imply larger radii (0.86 or 1.07 RJ for planet b) and cooler temperatures (950 or 1100 K for planet b), especially for planet b, in better agreement with evolutionary models. Second of all, these JWST/MIRI coronagraphic data also deliver the first spatially resolved detection of the inner warm debris disk, the radius of which is constrained to about 15 au, with flux densities comparable, but lower than former unresolved spectroscopic measurements with Spitzer. abridged...
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
Energy Management in a Cooperative Energy Harvesting Wireless Sensor Network
Authors:
Arghyadeep Barat,
Prabuchandran. K. J,
Shalabh Bhatnagar
Abstract:
In this paper, we consider the problem of finding an optimal energy management policy for a network of sensor nodes capable of harvesting their own energy and sharing it with other nodes in the network. We formulate this problem in the discounted cost Markov decision process framework and obtain good energy-sharing policies using the Deep Deterministic Policy Gradient (DDPG) algorithm. Earlier wor…
▽ More
In this paper, we consider the problem of finding an optimal energy management policy for a network of sensor nodes capable of harvesting their own energy and sharing it with other nodes in the network. We formulate this problem in the discounted cost Markov decision process framework and obtain good energy-sharing policies using the Deep Deterministic Policy Gradient (DDPG) algorithm. Earlier works have attempted to obtain the optimal energy allocation policy for a single sensor and for multiple sensors arranged on a mote with a single centralized energy buffer. Our algorithms, on the other hand, provide optimal policies for a distributed network of sensors individually harvesting energy and capable of sharing energy amongst themselves. Through simulations, we illustrate that the policies obtained by our DDPG algorithm using this enhanced network model outperform algorithms that do not share energy or use a centralized energy buffer in the distributed multi-nodal case.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
A degree of image identification at sub-human scales could be possible with more advanced clusters
Authors:
Prateek Y J
Abstract:
The purpose of the research is to determine if currently available self-supervised learning techniques can accomplish human level comprehension of visual images using the same degree and amount of sensory input that people acquire from. Initial research on this topic solely considered data volume scaling. Here, we scale both the volume of data and the quality of the image. This scaling experiment…
▽ More
The purpose of the research is to determine if currently available self-supervised learning techniques can accomplish human level comprehension of visual images using the same degree and amount of sensory input that people acquire from. Initial research on this topic solely considered data volume scaling. Here, we scale both the volume of data and the quality of the image. This scaling experiment is a self-supervised learning method that may be done without any outside financing. We find that scaling up data volume and picture resolution at the same time enables human-level item detection performance at sub-human sizes.We run a scaling experiment with vision transformers trained on up to 200000 images up to 256 ppi.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Medical ministrations through web scra**
Authors:
Niketha Sabesan,
Nivethitha,
J. N Shreyah,
Pranauv A J,
Shyam R
Abstract:
Web scra** is a technique that allows us to extract data from websites automatically. in the field of medicine, web scra** can be used to collect information about medical procedures, treatments, and healthcare providers. this information can be used to improve patient care, monitor the quality of healthcare services, and identify areas for improvement. one area where web scra** can be parti…
▽ More
Web scra** is a technique that allows us to extract data from websites automatically. in the field of medicine, web scra** can be used to collect information about medical procedures, treatments, and healthcare providers. this information can be used to improve patient care, monitor the quality of healthcare services, and identify areas for improvement. one area where web scra** can be particularly useful is in medical ministrations. medical ministrations are the actions taken to provide medical care to patients, and web scra** can help healthcare providers identify the most effective ministrations for their patients. for example, healthcare providers can use web scra** to collect data about the symptoms and medical histories of their patients, and then use this information to determine the most appropriate ministrations. they can also use web scra** to gather information about the latest medical research and clinical trials, which can help them stay up-to-date with the latest treatments and procedures.
△ Less
Submitted 21 June, 2023;
originally announced June 2023.
-
Practical First-Order Bayesian Optimization Algorithms
Authors:
Utkarsh Prakash,
Aryan Chollera,
Kushagra Khatwani,
Prabuchandran K. J.,
Tejas Bodas
Abstract:
First Order Bayesian Optimization (FOBO) is a sample efficient sequential approach to find the global maxima of an expensive-to-evaluate black-box objective function by suitably querying for the function and its gradient evaluations. Such methods assume Gaussian process (GP) models for both, the function and its gradient, and use them to construct an acquisition function that identifies the next q…
▽ More
First Order Bayesian Optimization (FOBO) is a sample efficient sequential approach to find the global maxima of an expensive-to-evaluate black-box objective function by suitably querying for the function and its gradient evaluations. Such methods assume Gaussian process (GP) models for both, the function and its gradient, and use them to construct an acquisition function that identifies the next query point. In this paper, we propose a class of practical FOBO algorithms that efficiently utilizes the information from the gradient GP to identify potential query points with zero gradients. We construct a multi-level acquisition function where in the first step, we optimize a lower level acquisition function with multiple restarts to identify potential query points with zero gradient value. We then use the upper level acquisition function to rank these query points based on their function values to potentially identify the global maxima. As a final step, the potential point of maxima is chosen as the actual query point. We validate the performance of our proposed algorithms on several test functions and show that our algorithms outperform state-of-the-art FOBO algorithms. We also illustrate the application of our algorithms in finding optimal set of hyper-parameters in machine learning and in learning the optimal policy in reinforcement learning tasks.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
Beyond the disk: EUV coronagraphic observations of the Extreme Ultraviolet Imager on board Solar Orbiter
Authors:
Auchère,
F.,
Berghmans,
D.,
Dumesnil,
C.,
Halain,
J. -P.,
Mercier,
R.,
Rochus,
P.,
Delmotte,
F.,
François,
S.,
Hermans,
A.,
Hervier,
V.,
Kraaikamp,
E.,
Meltchakov,
E.,
Morinaud
, et al. (57 additional authors not shown)
Abstract:
Most observations of the solar corona beyond 2 Rs consist of broadband visible light imagery from coronagraphs. The associated diagnostics mainly consist of kinematics and derivations of the electron number density. While the measurement of the properties of emission lines can provide crucial additional diagnostics of the coronal plasma (temperatures, velocities, abundances, etc.), these observati…
▽ More
Most observations of the solar corona beyond 2 Rs consist of broadband visible light imagery from coronagraphs. The associated diagnostics mainly consist of kinematics and derivations of the electron number density. While the measurement of the properties of emission lines can provide crucial additional diagnostics of the coronal plasma (temperatures, velocities, abundances, etc.), these observations are comparatively rare. In visible wavelengths, observations at these heights are limited to total eclipses. In the VUV range, very few additional observations have been achieved since the pioneering results of UVCS. One of the objectives of the Full Sun Imager (FSI) channel of the EUI telescope on board the Solar Orbiter mission has been to provide very wide field-of-view EUV diagnostics of the morphology and dynamics of the solar atmosphere in temperature regimes that are typical of the lower transition region and of the corona. FSI carries out observations in two narrowbands of the EUV spectrum centered on 17.4 nm and 30.4 nm that are dominated, respectively, by lines of Fe IX/X (formed in the corona around 1 MK) and by the resonance line of He II (formed around 80 kK in the lower transition region). Unlike previous EUV imagers, FSI includes a moveable occulting disk that can be inserted in the optical path to reduce the amount of instrumental stray light to a minimum. FSI detects signals at 17.4 nm up to the edge of its FOV (7~Rs), which is about twice further than was previously possible. Comparisons with observations by the LASCO and Metis coronagraphs confirm the presence of morphological similarities and differences between the broadband visible light and EUV emissions, as documented on the basis of prior eclipse and space-based observations. The very-wide-field observations of FSI are paving the way for future dedicated instruments.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Caching Contents with Varying Popularity using Restless Bandits
Authors:
Pavamana K J,
Chandramani Singh
Abstract:
We study content caching in a wireless network in which the users are connected through a base station that is equipped with a finite-capacity cache. We assume a fixed set of contents whose popularity varies with time. Users' requests for the content depend on their instantaneous popularity levels. Proactively caching contents at the base station incurs a cost but not having requested contents at…
▽ More
We study content caching in a wireless network in which the users are connected through a base station that is equipped with a finite-capacity cache. We assume a fixed set of contents whose popularity varies with time. Users' requests for the content depend on their instantaneous popularity levels. Proactively caching contents at the base station incurs a cost but not having requested contents at the base station also incurs a cost. We propose to proactively cache contents at the base station so as to minimize content missing and caching costs. We formulate the problem as a discounted cost Markov decision problem that is a restless multi-armed bandit problem. We provide conditions under which the problem is indexable and also propose a novel approach to maneuver a few parameters to render the problem indexable. We demonstrate the efficacy of the Whittle index policy via numerical evaluation.
△ Less
Submitted 17 September, 2023; v1 submitted 24 April, 2023;
originally announced April 2023.
-
Bayesian Optimization for Function Compositions with Applications to Dynamic Pricing
Authors:
Kunal Jain,
Prabuchandran K. J.,
Tejas Bodas
Abstract:
Bayesian Optimization (BO) is used to find the global optima of black box functions. In this work, we propose a practical BO method of function compositions where the form of the composition is known but the constituent functions are expensive to evaluate. By assuming an independent Gaussian process (GP) model for each of the constituent black-box function, we propose Expected Improvement (EI) and…
▽ More
Bayesian Optimization (BO) is used to find the global optima of black box functions. In this work, we propose a practical BO method of function compositions where the form of the composition is known but the constituent functions are expensive to evaluate. By assuming an independent Gaussian process (GP) model for each of the constituent black-box function, we propose Expected Improvement (EI) and Upper Confidence Bound (UCB) based BO algorithms and demonstrate their ability to outperform not just vanilla BO but also the current state-of-art algorithms. We demonstrate a novel application of the proposed methods to dynamic pricing in revenue management when the underlying demand function is expensive to evaluate.
△ Less
Submitted 1 May, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Caching Contents with Varying Popularity using Restless Bandits
Authors:
Pavamana K J,
Chandramani Kishore Singh
Abstract:
Mobile networks are experiencing prodigious increase in data volume and user density , which exerts a great burden on mobile core networks and backhaul links. An efficient technique to lessen this problem is to use caching i.e. to bring the data closer to the users by making use of the caches of edge network nodes, such as fixed or mobile access points and even user devices. The performance of a c…
▽ More
Mobile networks are experiencing prodigious increase in data volume and user density , which exerts a great burden on mobile core networks and backhaul links. An efficient technique to lessen this problem is to use caching i.e. to bring the data closer to the users by making use of the caches of edge network nodes, such as fixed or mobile access points and even user devices. The performance of a caching depends on contents that are cached. In this paper, we examine the problem of content caching at the wireless edge(i.e. base stations) to minimize the discounted cost incurred over infinite horizon. We formulate this problem as a restless bandit problem, which is hard to solve. We begin by showing an optimal policy is of threshold type. Using these structural results, we prove the indexability of the problem, and use Whittle index policy to minimize the discounted cost.
△ Less
Submitted 20 June, 2023; v1 submitted 31 October, 2022;
originally announced December 2022.
-
Amateur Observers Witness the Return of Venus' Cloud Discontinuity
Authors:
Kardasis E.,
Peralta J.,
Maravelias G.,
Imai M.,
Wesley A.,
Olivetti T.,
Naryzhniy Y.,
Morrone L.,
Gallardo A.,
Calapai G.,
Camarena J.,
Casquinha P.,
Kananovich D.,
MacNeill N.,
Viladrich C.,
Takoudi A
Abstract:
Firstly identified in images from JAXA's orbiter Akatsuki, the cloud discontinuity of Venus is a planetary-scale phenomenon known to be recurrent since, at least, the 1980s. Interpreted as a new type of Kelvin wave, this disruption is associated to dramatic changes in the clouds' opacity and distribution of aerosols, and it may constitute a critical piece for our understanding of the thermal balan…
▽ More
Firstly identified in images from JAXA's orbiter Akatsuki, the cloud discontinuity of Venus is a planetary-scale phenomenon known to be recurrent since, at least, the 1980s. Interpreted as a new type of Kelvin wave, this disruption is associated to dramatic changes in the clouds' opacity and distribution of aerosols, and it may constitute a critical piece for our understanding of the thermal balance and atmospheric circulation of Venus. Here, we report its reappearance on the dayside middle clouds four years after its last detection with Akatsuki/IR1, and for the first time, we characterize its main properties using exclusively near-infrared images from amateur observations. In agreement with previous reports, the discontinuity exhibited temporal variations in its zonal speed, orientation, length, and its effect over the clouds' albedo during the 2019/2020 eastern elongation. Finally, a comparison with simultaneous observations by Akatsuki UVI and LIR confirmed that the discontinuity is not visible on the upper clouds' albedo or thermal emission, while zonal speeds are slower than winds at the clouds' top and faster than at the middle clouds, evidencing that this Kelvin wave might be transporting momentum up to upper clouds.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
Local heating due to convective overshooting and the solar modelling problem
Authors:
Baraffe I,
Constantino T,
Clarke J,
Le Saux A,
Goffrey T,
Guillet T,
Pratt J,
Vlaykov D. G
Abstract:
Recent hydrodynamical simulations of convection in a solar-like model suggest that penetrative convective flows at the boundary of the convective envelope modify the thermal background in the overshooting layer. Based on these results, we implement in one-dimensional stellar evolution codes a simple prescription to modify the temperature gradient below the convective boundary of a solar model. Thi…
▽ More
Recent hydrodynamical simulations of convection in a solar-like model suggest that penetrative convective flows at the boundary of the convective envelope modify the thermal background in the overshooting layer. Based on these results, we implement in one-dimensional stellar evolution codes a simple prescription to modify the temperature gradient below the convective boundary of a solar model. This simple prescription qualitatively reproduces the behaviour found in the hydrodynamical simulations, namely a local heating and smoothing of the temperature gradient below the convective boundary. We show that introducing local heating in the overshooting layer can reduce the sound-speed discrepancy usually reported between solar models and the structure of the Sun inferred from helioseismology. It also affects key quantities in the convective envelope, such as the density, the entropy, and the speed of sound. These effects could help reduce the discrepancies between solar models and observed constraints based on seismic inversions of the Ledoux discriminant. Since mixing due to overshooting and local heating are the result of the same convective penetration process, the goal of this work is to invite solar modellers to consider both processes for a more consistent approach.
△ Less
Submitted 1 January, 2022;
originally announced January 2022.
-
Neural Network Compatible Off-Policy Natural Actor-Critic Algorithm
Authors:
Raghuram Bharadwaj Diddigi,
Prateek Jain,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
Learning optimal behavior from existing data is one of the most important problems in Reinforcement Learning (RL). This is known as "off-policy control" in RL where an agent's objective is to compute an optimal policy based on the data obtained from the given policy (known as the behavior policy). As the optimal policy can be very different from the behavior policy, learning optimal behavior is ve…
▽ More
Learning optimal behavior from existing data is one of the most important problems in Reinforcement Learning (RL). This is known as "off-policy control" in RL where an agent's objective is to compute an optimal policy based on the data obtained from the given policy (known as the behavior policy). As the optimal policy can be very different from the behavior policy, learning optimal behavior is very hard in the "off-policy" setting compared to the "on-policy" setting where new data from the policy updates will be utilized in learning. This work proposes an off-policy natural actor-critic algorithm that utilizes state-action distribution correction for handling the off-policy behavior and the natural policy gradient for sample efficiency. The existing natural gradient-based actor-critic algorithms with convergence guarantees require fixed features for approximating both policy and value functions. This often leads to sub-optimal learning in many RL applications. On the other hand, our proposed algorithm utilizes compatible features that enable one to use arbitrary neural networks to approximate the policy and the value function and guarantee convergence to a locally optimal policy. We illustrate the benefit of the proposed off-policy natural gradient algorithm by comparing it with the vanilla gradient actor-critic algorithm on benchmark RL tasks.
△ Less
Submitted 15 June, 2022; v1 submitted 19 October, 2021;
originally announced October 2021.
-
LOCNES: a solar telescope to study stellar activity in the near infrared
Authors:
Claudi R.,
Ghedina A.,
Pace E.,
Di Giorgio A. M.,
D'Orazi V.,
Gallorini L.,
Lanza A. F.,
Liu S. J.,
Rainer M.,
Tozzi A.,
Carleo I.,
Maldonado Prado J.,
Micela G.,
Molinari E.,
Poretti E.,
Phillips D.,
Tripodo G.,
Cecconi M.,
Galli A.,
Gonzalez M. D.,
Guerra Padilla V.,
Guerra Ramòn J. G.,
Harutyunyan A.,
Hernàndez Càceres N.,
Hernàndez Dìaz M.
, et al. (5 additional authors not shown)
Abstract:
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an ent…
▽ More
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an entirely new area of investigation that will provide timely results to improve the search of telluric planets with NIR spectrographs such as iSHELL, CARMENES, and GIANO-B. We will extract several disc-integrated activity indicators and average magnetic field measurements for the Sun in the NIR. Eventually, they will be correlated with both the RV of the Sun-as-a -star and the resolved images of the solar disc in visible and NIR. Such an approach will allow for a better understanding of the origin of activity-induced RV variations in the two spectral domains and will help in improving the techniques for their corrections. In this paper, we outline the science drivers for the LOCNES project and its first commissioning results.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Asymptotic linking of volume-preserving actions of ${\mathbb R}^k$
Authors:
José L. Lizarbe Chira,
Paul A. Schweitzer S. J
Abstract:
We extend V. Arnold's theory of asymptotic linking for two volume preserving flows on a domain in ${\mathbb R}^3$ and $S^3$ to volume preserving actions of ${\mathbb R}^k$ and ${\mathbb R}^\ell$ on certain domains in ${\mathbb R}^n$ and also to linking of a volume preserving action of ${\mathbb R}^k$ with a closed oriented singular $\ell$-dimensional submanifold in ${\mathbb R}^n$, where…
▽ More
We extend V. Arnold's theory of asymptotic linking for two volume preserving flows on a domain in ${\mathbb R}^3$ and $S^3$ to volume preserving actions of ${\mathbb R}^k$ and ${\mathbb R}^\ell$ on certain domains in ${\mathbb R}^n$ and also to linking of a volume preserving action of ${\mathbb R}^k$ with a closed oriented singular $\ell$-dimensional submanifold in ${\mathbb R}^n$, where $n=k+\ell+1$. We also extend the Biot-Savart formula to higher dimensions.
△ Less
Submitted 19 December, 2022; v1 submitted 4 August, 2020;
originally announced August 2020.
-
KLASH Conceptual Design Report
Authors:
D. Alesini,
D. Babusci,
P. Beltrame S. J.,
F. Björkeroth,
F. Bossi,
P. Ciambrone,
G. Delle Monache,
D. Di Gioacchino,
P. Falferi,
A. Gallo,
C. Gatti,
A. Ghigo,
M. Giannotti,
G. Lamanna,
C. Ligi,
G. Maccarrone,
A. Mirizzi,
D. Montanino,
D. Moricciani,
A. Mostacci,
M. Mück,
E. Nardi,
F. Nguyen,
L. Pellegrino,
A. Rettaroli
, et al. (4 additional authors not shown)
Abstract:
The last decade witnessed an increasing interest in axions and axion-like particles with many theoretical works published and many new experimental proposals that started a real race towards their discovery. This paper is the Conceptual Design Report of the KLASH (KLoe magnet for Axion SearcH) experiment at the Laboratori Nazionali di Frascati (LNF). The idea of this experiment has been stimulated…
▽ More
The last decade witnessed an increasing interest in axions and axion-like particles with many theoretical works published and many new experimental proposals that started a real race towards their discovery. This paper is the Conceptual Design Report of the KLASH (KLoe magnet for Axion SearcH) experiment at the Laboratori Nazionali di Frascati (LNF). The idea of this experiment has been stimulated by the availability of the large volume superconducting magnet, with a moderate magnetic field of 0.6 T, used in the KLOE detector at the DAFNE collider. The main conclusion we draw from this report is the possibility to build and put in operation at LNF in 2-3 years a large haloscope with the sensitivity to KSVZ axions in the low mass range between 0.2 and 1 $μ$eV, complementary to that of other experiments. Timeline and cost are competitive with respect to other proposals in the same mass region thanks to the availability of most of the infrastructure, in particular the superconducting magnet and the cryogenics plant.
△ Less
Submitted 6 November, 2019;
originally announced November 2019.
-
NAOMI: the adaptive optics system of the Auxiliary Telescopes of the VLTI
Authors:
Woillez J.,
Abad J. A.,
Abuter R.,
Aller Carpentier E.,
Alonso J.,
Andolfato L.,
Barriga P.,
Berger J. -P.,
Beuzit J. -L.,
Bonnet H.,
Bourdarot G.,
Bourget P.,
Brast R.,
Caniguante L.,
Cottalorda E.,
Darré P.,
Delabre B.,
Delboulbé A.,
Delplancke-Ströbele F.,
Dembet R.,
Donaldson R.,
Dorn R.,
Dupeyron J.,
Dupuy C.,
Egner S.
, et al. (58 additional authors not shown)
Abstract:
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking e…
▽ More
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking even in degraded conditions. We deployed a new adaptive optics module for interferometry (NAOMI) on the Auxiliary Telescopes. We present its design, performance, and effect on the observations that are carried out with the interferometric instruments.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Reinforcement Learning in Non-Stationary Environments
Authors:
Sindhu Padakandla,
Prabuchandran K. J,
Shalabh Bhatnagar
Abstract:
Reinforcement learning (RL) methods learn optimal decisions in the presence of a stationary environment. However, the stationary assumption on the environment is very restrictive. In many real world problems like traffic signal control, robotic applications, one often encounters situations with non-stationary environments and in these scenarios, RL methods yield sub-optimal decisions. In this pape…
▽ More
Reinforcement learning (RL) methods learn optimal decisions in the presence of a stationary environment. However, the stationary assumption on the environment is very restrictive. In many real world problems like traffic signal control, robotic applications, one often encounters situations with non-stationary environments and in these scenarios, RL methods yield sub-optimal decisions. In this paper, we thus consider the problem of develo** RL methods that obtain optimal decisions in a non-stationary environment. The goal of this problem is to maximize the long-term discounted reward achieved when the underlying model of the environment changes over time. To achieve this, we first adapt a change point algorithm to detect change in the statistics of the environment and then develop an RL algorithm that maximizes the long-run reward accrued. We illustrate that our change point method detects change in the model of the environment effectively and thus facilitates the RL algorithm in maximizing the long-run reward. We further validate the effectiveness of the proposed solution on non-stationary random Markov decision processes, a sensor energy management problem and a traffic signal control problem.
△ Less
Submitted 19 May, 2020; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Actor-Critic Algorithms for Constrained Multi-agent Reinforcement Learning
Authors:
Raghuram Bharadwaj Diddigi,
Sai Koti Reddy Danda,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
In cooperative stochastic games multiple agents work towards learning joint optimal actions in an unknown environment to achieve a common goal. In many real-world applications, however, constraints are often imposed on the actions that can be jointly taken by the agents. In such scenarios the agents aim to learn joint actions to achieve a common goal (minimizing a specified cost function) while me…
▽ More
In cooperative stochastic games multiple agents work towards learning joint optimal actions in an unknown environment to achieve a common goal. In many real-world applications, however, constraints are often imposed on the actions that can be jointly taken by the agents. In such scenarios the agents aim to learn joint actions to achieve a common goal (minimizing a specified cost function) while meeting the given constraints (specified via certain penalty functions). In this paper, we consider the relaxation of the constrained optimization problem by constructing the Lagrangian of the cost and penalty functions. We propose a nested actor-critic solution approach to solve this relaxed problem. In this approach, an actor-critic scheme is employed to improve the policy for a given Lagrange parameter update on a faster timescale as in the classical actor-critic architecture. A meta actor-critic scheme using this faster timescale policy updates is then employed to improve the Lagrange parameters on the slower timescale. Utilizing the proposed nested actor-critic schemes, we develop three Nested Actor-Critic (N-AC) algorithms. Through experiments on constrained cooperative tasks, we show the effectiveness of the proposed algorithms.
△ Less
Submitted 12 July, 2020; v1 submitted 8 May, 2019;
originally announced May 2019.
-
An Online Sample Based Method for Mode Estimation using ODE Analysis of Stochastic Approximation Algorithms
Authors:
Chandramouli Kamanchi,
Raghuram Bharadwaj Diddigi,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
One of the popular measures of central tendency that provides better representation and interesting insights of the data compared to the other measures like mean and median is the metric mode. If the analytical form of the density function is known, mode is an argument of the maximum value of the density function and one can apply the optimization techniques to find mode. In many of the practical…
▽ More
One of the popular measures of central tendency that provides better representation and interesting insights of the data compared to the other measures like mean and median is the metric mode. If the analytical form of the density function is known, mode is an argument of the maximum value of the density function and one can apply the optimization techniques to find mode. In many of the practical applications, the analytical form of the density is not known and only the samples from the distribution are available. Most of the techniques proposed in the literature for estimating the mode from the samples assume that all the samples are available beforehand. Moreover, some of the techniques employ computationally expensive operations like sorting. In this work we provide a computationally effective, on-line iterative algorithm that estimates the mode of a unimodal smooth density given only the samples generated from the density. Asymptotic convergence of the proposed algorithm using an ordinary differential equation (ODE) based analysis is provided. We also prove the stability of estimates by utilizing the concept of regularization. Experimental results further demonstrate the effectiveness of the proposed algorithm.
△ Less
Submitted 3 June, 2019; v1 submitted 11 February, 2019;
originally announced February 2019.
-
A Wide Orbit Exoplanet OGLE-2012-BLG-0838Lb
Authors:
Poleski R.,
Suzuki D.,
Udalski A.,
Xie X.,
Yee J. C.,
Koshimoto N.,
Gaudi B. S.,
Gould A.,
Skowron J.,
Szymanski M. K.,
Soszynski I.,
Pietrukowicz P.,
Kozlowski S.,
Wyrzykowski L.,
Ulaczyk K.,
Abe F.,
Barry R. K.,
Bennett D. P.,
Bhattacharya A.,
Bond I. A.,
Donachie M.,
Fujii H.,
Fukui A.,
Itow Y.,
Hirao Y.
, et al. (26 additional authors not shown)
Abstract:
We present the discovery of a planet on a very wide orbit in the microlensing event OGLE-2012-BLG-0838. The signal of the planet is well separated from the main peak of the event and the planet-star projected separation is found to be twice larger than the Einstein ring radius, which roughly corresponds to a projected separation of ~4 AU. Similar planets around low-mass stars are very hard to find…
▽ More
We present the discovery of a planet on a very wide orbit in the microlensing event OGLE-2012-BLG-0838. The signal of the planet is well separated from the main peak of the event and the planet-star projected separation is found to be twice larger than the Einstein ring radius, which roughly corresponds to a projected separation of ~4 AU. Similar planets around low-mass stars are very hard to find using any technique other than microlensing. We discuss microlensing model fitting in detail and discuss the prospects for measuring the mass and distance of lens system directly.
△ Less
Submitted 17 November, 2021; v1 submitted 16 January, 2019;
originally announced January 2019.
-
Change Point Detection for Compositional Multivariate Data
Authors:
Prabuchandran K. J.,
Nitin Singh,
Pankaj Dayama,
Vinayaka Pandit
Abstract:
Change point detection algorithms have numerous applications in fields of scientific and economic importance. We consider the problem of change point detection on compositional multivariate data (each sample is a probability mass function), which is a practically important sub-class of general multivariate data. While the problem of change-point detection is well studied in univariate setting, and…
▽ More
Change point detection algorithms have numerous applications in fields of scientific and economic importance. We consider the problem of change point detection on compositional multivariate data (each sample is a probability mass function), which is a practically important sub-class of general multivariate data. While the problem of change-point detection is well studied in univariate setting, and there are few viable implementations for a general multivariate data, the existing methods do not perform well on compositional data. In this paper, we propose a parametric approach for change point detection in compositional data. Moreover, using simple transformations on data, we extend our approach to handle any general multivariate data. Experimentally, we show that our method performs significantly better on compositional data and is competitive on general data compared to the available state of the art implementations.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks
Authors:
Raghuram Bharadwaj Diddigi,
Prabuchandran K. J.,
Shalabh Bhatnagar
Abstract:
We consider the problem of tracking an intruder using a network of wireless sensors. For tracking the intruder at each instant, the optimal number and the right configuration of sensors has to be powered. As powering the sensors consumes energy, there is a trade off between accurately tracking the position of the intruder at each instant and the energy consumption of sensors. This problem has been…
▽ More
We consider the problem of tracking an intruder using a network of wireless sensors. For tracking the intruder at each instant, the optimal number and the right configuration of sensors has to be powered. As powering the sensors consumes energy, there is a trade off between accurately tracking the position of the intruder at each instant and the energy consumption of sensors. This problem has been formulated in the framework of Partially Observable Markov Decision Process (POMDP). Even for the state-of-the-art algorithm in the literature, the curse of dimensionality renders the problem intractable. In this paper, we formulate the Intrusion Detection (ID) problem with a suitable state-action space in the framework of POMDP and develop a Reinforcement Learning (RL) algorithm utilizing the Upper Confidence Tree Search (UCT) method to solve the ID problem. Through simulations, we show that our algorithm performs and scales well with the increasing state and action spaces.
△ Less
Submitted 24 February, 2018; v1 submitted 27 August, 2017;
originally announced August 2017.
-
Information Diffusion in Social Networks in Two Phases
Authors:
Swapnil Dhamal,
Prabuchandran K. J.,
Y. Narahari
Abstract:
The problem of maximizing information diffusion, given a certain budget expressed in terms of the number of seed nodes, is an important topic in social networks research. Existing literature focuses on single phase diffusion where all seed nodes are selected at the beginning of diffusion and all the selected nodes are activated simultaneously. This paper undertakes a detailed investigation of the…
▽ More
The problem of maximizing information diffusion, given a certain budget expressed in terms of the number of seed nodes, is an important topic in social networks research. Existing literature focuses on single phase diffusion where all seed nodes are selected at the beginning of diffusion and all the selected nodes are activated simultaneously. This paper undertakes a detailed investigation of the effect of selecting and activating seed nodes in multiple phases. Specifically, we study diffusion in two phases assuming the well-studied independent cascade model. First, we formulate an objective function for two-phase diffusion, investigate its properties, and propose efficient algorithms for finding seed nodes in the two phases. Next, we study two associated problems: (1) budget splitting which seeks to optimally split the total budget between the two phases and (2) scheduling which seeks to determine an optimal delay after which to commence the second phase. Our main conclusions include: (a) under strict temporal constraints, use single phase diffusion, (b) under moderate temporal constraints, use two-phase diffusion with a short delay while allocating most of the budget to the first phase, and (c) when there are no temporal constraints, use two-phase diffusion with a long delay while allocating roughly one-third of the budget to the first phase.
△ Less
Submitted 23 June, 2017;
originally announced June 2017.
-
Offline Handwritten Recognition of Malayalam District Name - A Holistic Approach
Authors:
**o P J,
Kannan Balakrishnan
Abstract:
Various machine learning methods for writer independent recognition of Malayalam handwritten district names are discussed in this paper. Data collected from 56 different writers are used for the experiments. The proposed work can be used for the recognition of district in the address written in Malayalam. Different methods for Dimensionality reduction are discussed. Features consider for the recog…
▽ More
Various machine learning methods for writer independent recognition of Malayalam handwritten district names are discussed in this paper. Data collected from 56 different writers are used for the experiments. The proposed work can be used for the recognition of district in the address written in Malayalam. Different methods for Dimensionality reduction are discussed. Features consider for the recognition are Histogram of Oriented Gradient descriptor, Number of Black Pixels in the upper half and lower half, length of image. Classifiers used in this work are Neural Network, SVM and RandomForest.
△ Less
Submitted 2 May, 2017;
originally announced May 2017.
-
A Dominant Strategy Truthful, Deterministic Multi-Armed Bandit Mechanism with Logarithmic Regret
Authors:
Divya Padmanabhan,
Satyanath Bhat,
Prabuchandran K. J.,
Shirish Shevade,
Y. Narahari
Abstract:
Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $Ω(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where t…
▽ More
Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of $Ω(T^{2/3})$, where $T$ is the number of time steps. This happens because the existing mechanisms consider the worst case scenario where the means of the agents' stochastic rewards are separated by a very small amount that depends on $T$. We make, and, exploit the crucial observation that in most scenarios, the separation between the agents' rewards is rarely a function of $T$. Moreover, in the case that the rewards of the arms are arbitrarily close, the regret contributed by such sub-optimal arms is minimal. Our idea is to allow the center to indicate the resolution, $Δ$, with which the agents must be distinguished. This immediately leads us to introduce the notion of $Δ$-Regret. Using sponsored search auctions as a concrete example (the same idea applies for other applications as well), we propose a dominant strategy incentive compatible (DSIC) and individually rational (IR), deterministic MAB mechanism, based on ideas from the Upper Confidence Bound (UCB) family of MAB algorithms. Remarkably, the proposed mechanism $Δ$-UCB achieves a $Δ$-regret of $O(\log T)$ for the case of sponsored search auctions. We first establish the results for single slot sponsored search auctions and then non-trivially extend the results to the case where multiple slots are to be allocated.
△ Less
Submitted 29 May, 2020; v1 submitted 2 March, 2017;
originally announced March 2017.
-
A Hot Companion to a Blue Straggler in NGC188 as Revealed by the Ultra-violet Imaging Telescope (UVIT) on ASTROSAT
Authors:
Subramaniam Annapurni,
Sindhu N.,
Tandon S. N.,
Rao N. Kameswara,
Postma J.,
Cot'e Patrick,
Hutchings J.,
Ghosh S. K.,
George K.,
Girish V.,
Mohan R.,
Murthy J.,
Sankarasubramanian K.,
Stalin C. S.,
Sutaria F.,
Mondal C.,
Sahu S.
Abstract:
We present early results from the Ultra-Violet Imaging Telescope (UVIT) onboard the ASTROSAT observatory. We report the discovery of a hot companion associated with one of the blue straggler stars (BSSs) in the old open cluster, NGC188. Using fluxes measured in four filters in UVIT's Far-UV (FUV) channel, and two filters in the near-UV (NUV) channel, we have constructed the spectral energy distrib…
▽ More
We present early results from the Ultra-Violet Imaging Telescope (UVIT) onboard the ASTROSAT observatory. We report the discovery of a hot companion associated with one of the blue straggler stars (BSSs) in the old open cluster, NGC188. Using fluxes measured in four filters in UVIT's Far-UV (FUV) channel, and two filters in the near-UV (NUV) channel, we have constructed the spectral energy distribution (SED) of the star WOCS-5885, after combining with flux measurements from GALEX, UIT, UVOT, SPITZER, WISE and several ground-based facilities. The resulting SED spans a wavelength range of 0.15~$μ$m to 7.8~$μ$m. This object is found to be one of the brightest FUV sources in the cluster. An analysis of the SED reveals the presence of two components. The cooler component is found to have a temperature of 6,000$\pm$150~K, confirming that it is a BSS. Assuming it to be a main-sequence star, we estimate its mass to be $\sim$ 1.1 - 1.2M$_\odot$. The hotter component, with an estimated temperature of 17,000$\pm$500~K, has a radius of $\sim$ 0.6R$_\odot$ and L $\sim$ 30L$_\odot$. Bigger and more luminous than a white dwarf, yet cooler than a sub-dwarf, we speculate that it is a post-AGB/HB star that has recently transferred its mass to the BSS, which is known to be a rapid rotator. This binary system, which is the first BSS with a post-AGB/HB companion identified in an open cluster, is an ideal laboratory to study the process of BSS formation via mass transfer.
△ Less
Submitted 8 December, 2016;
originally announced December 2016.
-
On Information and Energy Cooperation in Energy Harvesting Cognitive Radio
Authors:
Jeya Pradha J,
Sanket S. Kalamkar,
Adrish Banerjee
Abstract:
This paper considers the cooperation between primary and secondary users at information and energy levels when both users are energy harvesting nodes. In particular, a secondary transmitter helps relaying the primary message, and in turn, gains the spectrum access as a reward. Also, the primary transmitter supplies energy to the secondary transmitter if the latter is energy-constrained, which faci…
▽ More
This paper considers the cooperation between primary and secondary users at information and energy levels when both users are energy harvesting nodes. In particular, a secondary transmitter helps relaying the primary message, and in turn, gains the spectrum access as a reward. Also, the primary transmitter supplies energy to the secondary transmitter if the latter is energy-constrained, which facilitates an uninterrupted cooperation. We address this two-level cooperation over a finite horizon with the finite battery constraint at the secondary transmitter. While promising the rate-guaranteed service to both primary and secondary users, we aim to maximize the primary rate. We develop an iterative algorithm that obtains the optimal offline power policies for primary and secondary users. To acquire insights about the structure of the optimal solution, we examine specific scenarios. Furthermore, we investigate the effects of the secondary rate constraint and finite battery on the primary rate and the probability of cooperation. We show that the joint information and energy cooperation increases the chances of cooperation and achieves significant rate gains over only information cooperation.
△ Less
Submitted 16 July, 2015;
originally announced July 2015.
-
Energy Sharing for Multiple Sensor Nodes with Finite Buffers
Authors:
Sindhu Padakandla,
Prabuchandran K. J,
Shalabh Bhatnagar
Abstract:
We consider the problem of finding optimal energy sharing policies that maximize the network performance of a system comprising of multiple sensor nodes and a single energy harvesting (EH) source. Sensor nodes periodically sense the random field and generate data, which is stored in the corresponding data queues. The EH source harnesses energy from ambient energy sources and the generated energy i…
▽ More
We consider the problem of finding optimal energy sharing policies that maximize the network performance of a system comprising of multiple sensor nodes and a single energy harvesting (EH) source. Sensor nodes periodically sense the random field and generate data, which is stored in the corresponding data queues. The EH source harnesses energy from ambient energy sources and the generated energy is stored in an energy buffer. Sensor nodes receive energy for data transmission from the EH source. The EH source has to efficiently share the stored energy among the nodes in order to minimize the long-run average delay in data transmission. We formulate the problem of energy sharing between the nodes in the framework of average cost infinite-horizon Markov decision processes (MDPs). We develop efficient energy sharing algorithms, namely Q-learning algorithm with exploration mechanisms based on the $ε$-greedy method as well as upper confidence bound (UCB). We extend these algorithms by incorporating state and action space aggregation to tackle state-action space explosion in the MDP. We also develop a cross entropy based method that incorporates policy parameterization in order to find near optimal energy sharing policies. Through simulations, we show that our algorithms yield energy sharing policies that outperform the heuristic greedy method.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
Low-Level Features for Image Retrieval Based on Extraction of Directional Binary Patterns and Its Oriented Gradients Histogram
Authors:
Nagaraja S.,
Prabhakar C. J.
Abstract:
In this paper, we present a novel approach for image retrieval based on extraction of low level features using techniques such as Directional Binary Code, Haar Wavelet transform and Histogram of Oriented Gradients. The DBC texture descriptor captures the spatial relationship between any pair of neighbourhood pixels in a local region along a given direction, while Local Binary Patterns descriptor c…
▽ More
In this paper, we present a novel approach for image retrieval based on extraction of low level features using techniques such as Directional Binary Code, Haar Wavelet transform and Histogram of Oriented Gradients. The DBC texture descriptor captures the spatial relationship between any pair of neighbourhood pixels in a local region along a given direction, while Local Binary Patterns descriptor considers the relationship between a given pixel and its surrounding neighbours. Therefore, DBC captures more spatial information than LBP and its variants, also it can extract more edge information than LBP. Hence, we employ DBC technique in order to extract grey level texture feature from each RGB channels individually and computed texture maps are further combined which represents colour texture features of an image. Then, we decomposed the extracted colour texture map and original image using Haar wavelet transform. Finally, we encode the shape and local features of wavelet transformed images using Histogram of Oriented Gradients for content based image retrieval. The performance of proposed method is compared with existing methods on two databases such as Wang's corel image and Caltech 256. The evaluation results show that our approach outperforms the existing methods for image retrieval.
△ Less
Submitted 12 March, 2015;
originally announced March 2015.
-
A Multi-phase Approach for Improving Information Diffusion in Social Networks
Authors:
Swapnil Dhamal,
Prabuchandran K. J.,
Y. Narahari
Abstract:
For maximizing influence spread in a social network, given a certain budget on the number of seed nodes, we investigate the effects of selecting and activating the seed nodes in multiple phases. In particular, we formulate an appropriate objective function for two-phase influence maximization under the independent cascade model, investigate its properties, and propose algorithms for determining th…
▽ More
For maximizing influence spread in a social network, given a certain budget on the number of seed nodes, we investigate the effects of selecting and activating the seed nodes in multiple phases. In particular, we formulate an appropriate objective function for two-phase influence maximization under the independent cascade model, investigate its properties, and propose algorithms for determining the seed nodes in the two phases. We also study the problem of determining an optimal budget-split and delay between the two phases.
△ Less
Submitted 21 February, 2015;
originally announced February 2015.
-
Parallax Effect Free Mosaicing of Underwater Video Sequence Based on Texture Features
Authors:
Nagaraja S.,
Prabhakar C. J.,
Praveen Kumar P. U
Abstract:
In this paper, we present feature-based technique for construction of mosaic image from underwater video sequence, which suffers from parallax distortion due to propagation properties of light in the underwater environment. The most of the available mosaic tools and underwater image mosaicing techniques yields final result with some artifacts such as blurring, ghosting and seam due to presence of…
▽ More
In this paper, we present feature-based technique for construction of mosaic image from underwater video sequence, which suffers from parallax distortion due to propagation properties of light in the underwater environment. The most of the available mosaic tools and underwater image mosaicing techniques yields final result with some artifacts such as blurring, ghosting and seam due to presence of parallax in the input images. The removal of parallax from input images may not reduce its effects instead it must be corrected in successive steps of mosaicing. Thus, our approach minimizes the parallax effects by adopting an efficient local alignment technique after global registration. We extract texture features using Centre Symmetric Local Binary Pattern (CS-LBP) descriptor in order to find feature correspondences, which are used further for estimation of homography through RANSAC. In order to increase the accuracy of global registration, we perform preprocessing such as colour alignment between two selected frames based on colour distribution adjustment. Because of existence of 100% overlap in consecutive frames of underwater video, we select frames with minimum overlap based on mutual offset in order to reduce the computation cost during mosaicing. Our approach minimizes the parallax effects considerably in final mosaic constructed using our own underwater video sequences.
△ Less
Submitted 8 November, 2014;
originally announced November 2014.
-
VirtuMob : Remote Desktop Virtualization Solution for Smarphones
Authors:
M H Soorajprasad,
Balapradeep K N,
Antony P J
Abstract:
Mobility is an important attribute in todays computing world. Mobile devices,smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android based Smartphone. Virtual Network Computing based architecture is used to deve…
▽ More
Mobility is an important attribute in todays computing world. Mobile devices,smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android based Smartphone. Virtual Network Computing based architecture is used to develop the proposed system. Through a VirtuMob viewer provided on the users Smartphone, the user will be able to access and manipulate the desktops of remote computers. Several functionality such as viewing the desktop, mouse operations, keyboard operations, manipulation of documents can be performed from the Smartphone. VirtuMob server should be running on the remote system and it must be attached to a network. VirtuMob Accelerator is used to process the RFB frames of the desktop, perform Encoding of the frames and then relay the frames to the viewer over the internet. Several Encoding techniques are studied and analysed to determine which is best suited for the proposed system.
△ Less
Submitted 2 June, 2014;
originally announced June 2014.
-
Energy Harvesting Cognitive Radio with Channel-Aware Sensing Strategy
Authors:
Jeya Pradha J,
Sanket S. Kalamkar,
Adrish Banerjee
Abstract:
An energy harvesting cognitive radio scenario is considered where a secondary user (SU) with finite battery capacity opportunistically accesses the primary user (PU) channels. The objective is to maximize the throughput of SU under energy neutrality constraint and fading channel conditions in a single-user multi-channel setting. Channel selection criterion based on the probabilistic availability o…
▽ More
An energy harvesting cognitive radio scenario is considered where a secondary user (SU) with finite battery capacity opportunistically accesses the primary user (PU) channels. The objective is to maximize the throughput of SU under energy neutrality constraint and fading channel conditions in a single-user multi-channel setting. Channel selection criterion based on the probabilistic availability of energy with SU, channel conditions, and primary network's belief state is proposed, which chooses the best subset of channels for sensing, yielding higher throughput. We construct channel-aware optimal and myopic sensing strategies in a Partially Observable Markov Decision Process framework based on the proposed channel selection criterion. The effects of sensing errors and collisions between PU and SU on the throughput of latter are studied. It is shown that there exists a trade-off between the transmission duration and the energy lost in collisions.
△ Less
Submitted 25 May, 2014;
originally announced May 2014.
-
Multi Modal Face Recognition Using Block Based Curvelet Features
Authors:
Jyothi K,
Prabhakar C. J
Abstract:
In this paper, we present multimodal 2D +3D face recognition method using block based curvelet features. The 3D surface of face (Depth Map) is computed from the stereo face images using stereo vision technique. The statistical measures such as mean, standard deviation, variance and entropy are extracted from each block of curvelet subband for both depth and intensity images independently.In order…
▽ More
In this paper, we present multimodal 2D +3D face recognition method using block based curvelet features. The 3D surface of face (Depth Map) is computed from the stereo face images using stereo vision technique. The statistical measures such as mean, standard deviation, variance and entropy are extracted from each block of curvelet subband for both depth and intensity images independently.In order to compute the decision score, the KNN classifier is employed independently for both intensity and depth map. Further, computed decision scoresof intensity and depth map are combined at decision level to improve the face recognition rate. The combination of intensity and depth map is verified experimentally using benchmark face database. The experimental results show that the proposed multimodal method is better than individual modality.
△ Less
Submitted 21 May, 2014; v1 submitted 12 May, 2014;
originally announced May 2014.
-
Locally convex hypersurfaces immersed in $H^n \times R$
Authors:
Inês Silva de Oliveira,
Paul A. Schweitzer S. J
Abstract:
We prove a theorem of Hadamard-Stoker type: a connected locally convex complete hypersurface immersed in $H^n \times R$ (n>1), where $H^n$ is n-dimensional hyperbolic space, is embedded and homeomorphic either to the n-sphere or to $R^n$. In the latter case it is either a vertical graph over a convex domain in $H^n$ or has what we call a simple end.
We prove a theorem of Hadamard-Stoker type: a connected locally convex complete hypersurface immersed in $H^n \times R$ (n>1), where $H^n$ is n-dimensional hyperbolic space, is embedded and homeomorphic either to the n-sphere or to $R^n$. In the latter case it is either a vertical graph over a convex domain in $H^n$ or has what we call a simple end.
△ Less
Submitted 2 May, 2012;
originally announced May 2012.
-
Normal subgroups of diffeomorphism and homeomorphism groups of R^n and other open manifolds
Authors:
Paul A. Schweitzer S. J.
Abstract:
We determine all the normal subgroups of the group of C^r diffeomorphisms of R^n, r = 1,2,...,infinity, except when r=n+1 or n=4, and also of the group of homeomorphisms of R^n (r=0). We also study the group A_0 of diffeomorphisms of an open manifold M that are isotopic to the identity. If M is the interior of a compact manifold with nonempty boundary, then the quotient of A_0 by the normal subgro…
▽ More
We determine all the normal subgroups of the group of C^r diffeomorphisms of R^n, r = 1,2,...,infinity, except when r=n+1 or n=4, and also of the group of homeomorphisms of R^n (r=0). We also study the group A_0 of diffeomorphisms of an open manifold M that are isotopic to the identity. If M is the interior of a compact manifold with nonempty boundary, then the quotient of A_0 by the normal subgroup of diffeomorphisms that coincide with the identity near to a given end e of M is simple.
△ Less
Submitted 10 April, 2012; v1 submitted 25 November, 2009;
originally announced November 2009.
-
Nonminimal coupling and quintessence
Authors:
O. Bertolami,
P. J. Martins
Abstract:
Recent studies of Type Ia Supernovae with redshifts up to about $z~\laq~1$ reveal evidence for a cosmic acceleration in the expansion of the Universe. The most straightforward explanation to account for this acceleration is a cosmological constant dominating the recent history of our Universe; however, a more interesting suggestion is to consider an evolving vacuum energy. Several proposals have…
▽ More
Recent studies of Type Ia Supernovae with redshifts up to about $z~\laq~1$ reveal evidence for a cosmic acceleration in the expansion of the Universe. The most straightforward explanation to account for this acceleration is a cosmological constant dominating the recent history of our Universe; however, a more interesting suggestion is to consider an evolving vacuum energy. Several proposals have been put forward along these lines, most of them in the context of General Relativity. In this work we analyse the conditions under which the dynamics of a self-interacting Brans-Dicke field can account for this accelerated expansion of the Universe. We show that accelerated expanding solutions can be achieved with a quadratic self-coupling of the Brans-Dicke field and a negative coupling constant $ω$.
△ Less
Submitted 17 January, 2000; v1 submitted 15 October, 1999;
originally announced October 1999.