-
Infinitely divisible modified Bessel distributions
Authors:
Árpád Baricz,
Dhivya Prabhu K,
Sanjeev Singh,
Antony Vijesh V
Abstract:
In this paper we focus on continuous univariate probability distributions, like McKay distributions, $K$-distribution, generalized inverse Gaussian distribution and generalised McKay distributions, with support $[0,\infty),$ which are related to modified Bessel functions of the first and second kinds and in most cases we show that they belong to the class infinitely divisible distributions, self-d…
▽ More
In this paper we focus on continuous univariate probability distributions, like McKay distributions, $K$-distribution, generalized inverse Gaussian distribution and generalised McKay distributions, with support $[0,\infty),$ which are related to modified Bessel functions of the first and second kinds and in most cases we show that they belong to the class infinitely divisible distributions, self-decomposable distributions, generalized gamma convolutions and hyperbolically completely monotone densities. Some of the results are known, however the proofs are new and we use special functions technique. Integral representations of quotients of Tricomi hypergeometric functions as well as of quotients of Gaussian hypergeometric functions, or modified Bessel functions of the second kind play an important role in our study. In addition, by using a different approach we rediscover a Stieltjes transform representation due to Hermann Hankel for the product of modified Bessel functions of the first and second kinds and we also deduce a series of new Stieltjes transform representations for products, quotients and their reciprocals concerning modified Bessel functions of the first and second kinds. By using these results we obtain new infinitely divisible modified Bessel distributions with Laplace transforms related to modified Bessel functions of the first and second kind. Moreover, we show that the new Stieltjes transform representations have some interesting applications and we list some open problems which may be of interest for further research. In addition, we present a new proof via the Pick function characterization theorem for the infinite divisibility of the ratio of two gamma random variables and we present some new Stieltjes transform representations of quotients of Tricomi hypergeometric functions.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Comparative Study of Machine Learning Algorithms in Detecting Cardiovascular Diseases
Authors:
Dayana K,
S. Nandini,
Sanjjushri Varshini R
Abstract:
The detection of cardiovascular diseases (CVD) using machine learning techniques represents a significant advancement in medical diagnostics, aiming to enhance early detection, accuracy, and efficiency. This study explores a comparative analysis of various machine learning algorithms, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine (SVM), K-Ne…
▽ More
The detection of cardiovascular diseases (CVD) using machine learning techniques represents a significant advancement in medical diagnostics, aiming to enhance early detection, accuracy, and efficiency. This study explores a comparative analysis of various machine learning algorithms, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and XGBoost. By utilising a structured workflow encompassing data collection, preprocessing, model selection and hyperparameter tuning, training, evaluation, and choice of the optimal model, this research addresses the critical need for improved diagnostic tools. The findings highlight the efficacy of ensemble methods and advanced algorithms in providing reliable predictions, thereby offering a comprehensive framework for CVD detection that can be readily implemented and adapted in clinical settings.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Observations of the Crab Nebula with MACE (Major Atmospheric Cherenkov Experiment)
Authors:
Borwankar C.,
Sharma M.,
Hariharan J.,
Venugopal K.,
Godambe S.,
Mankuzhyil N.,
Chandra P.,
Khurana M.,
Pathania A.,
Chouhan N.,
Dhar V. K.,
Thubstan R.,
Norlha S.,
Keshavananda,
Sarkar D.,
Dar Z. A.,
Kotwal S. V.,
Godiyal S.,
Kushwaha C. P.,
Singh K. K.,
Das M. P.,
Tolamatti A.,
Ghosal B.,
Chanchalani K.,
Pandey P.
, et al. (10 additional authors not shown)
Abstract:
The Major Atmospheric Cherenkov Experiment (MACE) is a large size (21m) Imaging Atmospheric Cherenkov Telescope (IACT) installed at an altitude of 4270m above sea level at Hanle, Ladakh in northern India. Here we report the detection of Very High Energy (VHE) gamma-ray emission from Crab Nebula above 80 GeV. We analysed ~15 hours of data collected at low zenith angle between November 2022 and Febr…
▽ More
The Major Atmospheric Cherenkov Experiment (MACE) is a large size (21m) Imaging Atmospheric Cherenkov Telescope (IACT) installed at an altitude of 4270m above sea level at Hanle, Ladakh in northern India. Here we report the detection of Very High Energy (VHE) gamma-ray emission from Crab Nebula above 80 GeV. We analysed ~15 hours of data collected at low zenith angle between November 2022 and February 2023. The energy spectrum is well described by a log-parabola function with a flux of ~(3.46 +/- 0.26stat) x 10-10 TeV-1 cm-2 s-1, at 400 GeV with spectral index of 2.09 +/- 0.06stat and a curvature parameter of 0.08 +/- 0.07stat. The gamma-rays are detected in an energy range spanning from 80 GeV to ~5 TeV. The energy resolution improves from ~34% at an analysis energy threshold of 80 GeV to ~21% above 1 TeV. The daily light curve and the spectral energy distribution obtained for the Crab Nebula is in agreement with previous measurements, considering statistical and systematic uncertainties.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Record cryogenic cooling in ferroelectric hafnia proximity induced via Mott transition
Authors:
Jalaja M A,
Shubham Kumar Parate,
Binoy Krishna De,
Sai Dutt K,
Pavan Nukala
Abstract:
On-chip refrigeration at cryogenic temperatures is becoming an important requirement in the context of quantum technologies and nanoelectronics. Ferroic materials with enhanced electrocaloric effects at phase transitions are good material candidates for the same. By exploiting the Mott metal-insulator transition (MIT) of TiOx(Ny), the bottom electrode, we engineer a depolarization field controlled…
▽ More
On-chip refrigeration at cryogenic temperatures is becoming an important requirement in the context of quantum technologies and nanoelectronics. Ferroic materials with enhanced electrocaloric effects at phase transitions are good material candidates for the same. By exploiting the Mott metal-insulator transition (MIT) of TiOx(Ny), the bottom electrode, we engineer a depolarization field controlled reversible polar to non-polar phase transition in thick La-doped hafnia (40 nm). This transition occurs between ~125 and 140 K and produces giant negative pyroelectric and electrocaloric effects. Refrigeration metrics were estimated between 120 to 200 K, with a peak refrigerant capacity of 25 kJ Kg-1 (2 kJ Kg-1), peak isothermal entropy ΔS~ 8 kJ Kg-1 K-1 (0.5 kJ Kg-1 K-1) and adiabatic ΔTcooling ~ 106 K (11 K) at ~140 K and 5 MV cm-1 (0.5 MV cm-1, and these are the largest reported in any electrocaloric system. Our work fundamentally proposes design guidelines to induce significant solid-state refrigeration through proximity effects, even at cryogenic temperatures relevant to quantum technologies.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Fisher Mask Nodes for Language Model Merging
Authors:
Thennal D K,
Ganesh Nathan,
Suchithra M S
Abstract:
Fine-tuning pre-trained models provides significant advantages in downstream performance. The ubiquitous nature of pre-trained models such as BERT and its derivatives in natural language processing has also led to a proliferation of task-specific fine-tuned models. As these models typically only perform one task well, additional training or ensembling is required in multi-task scenarios. The growi…
▽ More
Fine-tuning pre-trained models provides significant advantages in downstream performance. The ubiquitous nature of pre-trained models such as BERT and its derivatives in natural language processing has also led to a proliferation of task-specific fine-tuned models. As these models typically only perform one task well, additional training or ensembling is required in multi-task scenarios. The growing field of model merging provides a solution, dealing with the challenge of combining multiple task-specific models into a single multi-task model. In this study, we introduce a novel model merging method for Transformers, combining insights from previous work in Fisher-weighted averaging and the use of Fisher information in model pruning. Utilizing the Fisher information of mask nodes within the Transformer architecture, we devise a computationally efficient weighted-averaging scheme. Our method exhibits a regular and significant performance increase across various models in the BERT family, outperforming full-scale Fisher-weighted averaging in a fraction of the computational cost, with baseline performance improvements of up to +6.5 and a speedup between 57.4x and 321.7x across models. Our results prove the potential of our method in current multi-task learning environments and suggest its scalability and adaptability to new model architectures and learning scenarios.
△ Less
Submitted 3 May, 2024; v1 submitted 14 March, 2024;
originally announced March 2024.
-
Exploiting Inter-Layer Expert Affinity for Accelerating Mixture-of-Experts Model Inference
Authors:
**ghan Yao,
Quentin Anthony,
Aamir Shafi,
Hari Subramoni,
Dhabaleswar K.,
Panda
Abstract:
In large language models like the Generative Pre-trained Transformer, the Mixture of Experts paradigm has emerged as a powerful technique for enhancing model expressiveness and accuracy. However, deploying GPT MoE models for parallel inference on distributed systems presents significant challenges, primarily due to the extensive Alltoall communication required for expert routing and aggregation. T…
▽ More
In large language models like the Generative Pre-trained Transformer, the Mixture of Experts paradigm has emerged as a powerful technique for enhancing model expressiveness and accuracy. However, deploying GPT MoE models for parallel inference on distributed systems presents significant challenges, primarily due to the extensive Alltoall communication required for expert routing and aggregation. This communication bottleneck exacerbates the already complex computational landscape, hindering the efficient utilization of high-performance computing resources. In this paper, we propose a lightweight optimization technique called ExFlow, to largely accelerate the inference of these MoE models. We take a new perspective on alleviating the communication overhead by exploiting the inter-layer expert affinity. Unlike previous methods, our solution can be directly applied to pre-trained MoE models without any fine-tuning or accuracy degradation. By proposing a context-coherent expert parallelism on distributed systems, our design only uses one Alltoall communication to deliver the same functionality while previous methods all require two Alltoalls. By carefully examining the conditional probability in tokens' routing across multiple layers, we proved that pre-trained GPT MoE models implicitly exhibit a strong inter-layer expert affinity. We then design an efficient integer programming model to capture such features and show that by properly placing the experts on corresponding GPUs, we can reduce up to 67% cross-GPU routing latency. Our solution beats the cutting-edge MoE implementations with experts from 8 to 64, with up to 2.2x improvement in inference throughput. We further provide a detailed study of how the model implicitly acquires this expert affinity at the very early training stage and how this affinity evolves and stabilizes during training.
△ Less
Submitted 16 January, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
Epidemic outbreak prediction using machine learning models
Authors:
Akshara Pramod,
JS Abhishek,
Dr. Suganthi K
Abstract:
In today's world,the risk of emerging and re-emerging epidemics have increased.The recent advancement in healthcare technology has made it possible to predict an epidemic outbreak in a region.Early prediction of an epidemic outbreak greatly helps the authorities to be prepared with the necessary medications and logistics required to keep things in control. In this article, we try to predict the ep…
▽ More
In today's world,the risk of emerging and re-emerging epidemics have increased.The recent advancement in healthcare technology has made it possible to predict an epidemic outbreak in a region.Early prediction of an epidemic outbreak greatly helps the authorities to be prepared with the necessary medications and logistics required to keep things in control. In this article, we try to predict the epidemic outbreak (influenza, hepatitis and malaria) for the state of New York, USA using machine and deep learning algorithms, and a portal has been created for the same which can alert the authorities and health care organizations of the region in case of an outbreak. The algorithm takes historical data to predict the possible number of cases for 5 weeks into the future. Non-clinical factors like google search trends,social media data and weather data have also been used to predict the probability of an outbreak.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
Two Fish Encryption Based Blockchain Technology for Secured Data Storage
Authors:
Dinesh Kumar K,
Duraimutharasan N
Abstract:
Data security and sharing remains nuisance among many applications like business data, medical data, banking data etc. In this research, block chain technology is built with encryption algorithm for high level data security in cloud storage. Medical data security seems critical aspect due to sensitivity of patient information. Unauthorized access of medical data creates major issue to patients. Th…
▽ More
Data security and sharing remains nuisance among many applications like business data, medical data, banking data etc. In this research, block chain technology is built with encryption algorithm for high level data security in cloud storage. Medical data security seems critical aspect due to sensitivity of patient information. Unauthorized access of medical data creates major issue to patients. This article proposed block chain with hybrid encryption technique for securing medical data stored in block chain model at cloud storage. New Two fish encryption model is implemented based on RSA Multiple Precision Arithmetic. MPA works by using library concept. The objective of using this methodology is to enhance security performance with less execution time. Patient data is processed by encryption algorithm and stored at blockchain infrastructure using encrypted key. Access permission allows user to read or write the medical data attached in block chain framework. The performance of traditional cryptographic techniques is very less in providing security infrastructure.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
On the Spectral properties of Andrásfai Graphs
Authors:
Bharani Dharan K,
S Radha
Abstract:
In this paper, we investigate the spectral properties of Andrásfai graphs, focusing on key parameters: the second-largest and smallest eigenvalues, the number of distinct eigenvalues, and the multiplicities of the eigenvalues 1 and -1. The results obtained reveal insights into the connectivity, the structural properties, and the spectral distinctiveness.
In this paper, we investigate the spectral properties of Andrásfai graphs, focusing on key parameters: the second-largest and smallest eigenvalues, the number of distinct eigenvalues, and the multiplicities of the eigenvalues 1 and -1. The results obtained reveal insights into the connectivity, the structural properties, and the spectral distinctiveness.
△ Less
Submitted 12 March, 2024; v1 submitted 14 September, 2023;
originally announced September 2023.
-
A Simple Robot Selection Criteria After Path Planning Using Wavefront Algorithm
Authors:
Rajashekhar V S,
Dhaya C,
Dinakar Raj C K,
Dharshan P,
Mukesh Kumar S,
Harish B,
Ajith R,
Kamaleshwaran K
Abstract:
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of the…
▽ More
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of these robots are capable of performing certain activities and also they have their own limitations. The process of considering the robot performances and acting based on their limitations is the focus of this work. The wavefront algorithm is used to find the nature of terrain. Based on the terrain a suitable robot is selected from the list of five robots by the wavefront algorithm. Using this robot the mission is accomplished.
△ Less
Submitted 30 July, 2023;
originally announced July 2023.
-
Flover: A Temporal Fusion Framework for Efficient Autoregressive Model Parallel Inference
Authors:
**ghan Yao,
Nawras Alnaasan,
Tian Chen,
Aamir Shafi,
Hari Subramoni,
Dhabaleswar K.,
Panda
Abstract:
Autoregressive models, despite their commendable performance in a myriad of generative tasks, face challenges stemming from their inherently sequential structure. Inference on these models, by design, harnesses a temporal dependency, where the current token's probability distribution is conditioned on preceding tokens. This inherent characteristic severely impedes computational efficiency during i…
▽ More
Autoregressive models, despite their commendable performance in a myriad of generative tasks, face challenges stemming from their inherently sequential structure. Inference on these models, by design, harnesses a temporal dependency, where the current token's probability distribution is conditioned on preceding tokens. This inherent characteristic severely impedes computational efficiency during inference as a typical inference request can require more than thousands of tokens, where generating each token requires a load of entire model weights, making the inference more memory-bound. The large overhead becomes profound in real deployment where requests arrive randomly, necessitating various generation lengths. Existing solutions, such as dynamic batching and concurrent instances, introduce significant response delays and bandwidth contention, falling short of achieving optimal latency and throughput. To address these shortcomings, we propose Flover -- a temporal fusion framework for efficiently inferring multiple requests in parallel. We deconstruct the general generation pipeline into pre-processing and token generation, and equip the framework with a dedicated work scheduler for fusing the generation process temporally across all requests. By orchestrating the token-level parallelism, Flover exhibits optimal hardware efficiency and significantly spares the system resources. By further employing a fast buffer reordering algorithm that allows memory eviction of finished tasks, it brings over 11x inference speedup on GPT and 16x on LLAMA compared to the cutting-edge solutions provided by NVIDIA FasterTransformer. Crucially, by leveraging the advanced tensor parallel technique, Flover proves efficacious across diverse computational landscapes, from single-GPU setups to distributed scenarios, thereby offering robust performance optimization that adapts to variable use cases.
△ Less
Submitted 2 November, 2023; v1 submitted 22 May, 2023;
originally announced May 2023.
-
Spontaneous vacuum decay in low-energy collisions of heavy nuclei beyond the monopole approximation
Authors:
Popov R. V.,
Shabaev V. M.,
Maltsev I. A.,
Telnov D. A.,
Dulaev N. K.,
Tumakov D. A
Abstract:
The problem of spontaneous vacuum decay in low-energy collisions of heavy nuclei is considered beyond the scope of the monopole approximation. The time-dependent Dirac equation is solved in a rotating coordinate system with $z$-axis directed along the internuclear line and the origin placed at the center of mass. The probabilities of electron-positron pair creation and the positron energy spectra…
▽ More
The problem of spontaneous vacuum decay in low-energy collisions of heavy nuclei is considered beyond the scope of the monopole approximation. The time-dependent Dirac equation is solved in a rotating coordinate system with $z$-axis directed along the internuclear line and the origin placed at the center of mass. The probabilities of electron-positron pair creation and the positron energy spectra are calculated in the approximation neglecting the rotational coupling. The two-center potential is expanded over spherical harmonics and the convergence with respect to the number of terms in this expansion is studied. The results show that taking into account the two-center potential instead of its spherically symmetric part preserves all the signatures of the transition to the supercritical regime that have been found in the framework of the monopole approximation and even enhances some of them.
△ Less
Submitted 22 May, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Control Barrier Function-based Predictive Control for Close Proximity operation of UAVs inside a Tunnel
Authors:
Vedant Mundheda,
Damodar Datta K,
Harikumar Kandath
Abstract:
This paper introduces a method for effectively controlling the movement of an Unmanned Aerial Vehicle (UAV) within a tunnel. The primary challenge of this problem lies in the UAV's exposure to nonlinear distance-dependent torques and forces generated by the tunnel walls, along with the need to operate safely within a defined region while in close proximity to these walls. To address this problem,…
▽ More
This paper introduces a method for effectively controlling the movement of an Unmanned Aerial Vehicle (UAV) within a tunnel. The primary challenge of this problem lies in the UAV's exposure to nonlinear distance-dependent torques and forces generated by the tunnel walls, along with the need to operate safely within a defined region while in close proximity to these walls. To address this problem, the paper proposes the implementation of a Model Predictive Control (MPC) framework with constraints based on Control Barrier Function (CBF). The paper approaches the issue in two distinct ways; first, by maintaining a safe distance from the tunnel walls to avoid the effects of both the walls and ceiling, and second, by minimizing the distance from the walls to effectively manage the nonlinear forces associated with close proximity tasks. Finally, the paper demonstrates the effectiveness of its approach through testing on simulation for various close proximity trajectories with the realistic model of aerodynamic disturbances due to the proximity of the ceiling and boundary walls.
△ Less
Submitted 28 March, 2023;
originally announced March 2023.
-
Performance Characterization of using Quantization for DNN Inference on Edge Devices: Extended Version
Authors:
Hyunho Ahn,
Tian Chen,
Nawras Alnaasan,
Aamir Shafi,
Mustafa Abduljabbar,
Hari Subramoni,
Dhabaleswar K.,
Panda
Abstract:
Quantization is a popular technique used in Deep Neural Networks (DNN) inference to reduce the size of models and improve the overall numerical performance by exploiting native hardware. This paper attempts to conduct an elaborate performance characterization of the benefits of using quantization techniques -- mainly FP16/INT8 variants with static and dynamic schemes -- using the MLPerf Edge Infer…
▽ More
Quantization is a popular technique used in Deep Neural Networks (DNN) inference to reduce the size of models and improve the overall numerical performance by exploiting native hardware. This paper attempts to conduct an elaborate performance characterization of the benefits of using quantization techniques -- mainly FP16/INT8 variants with static and dynamic schemes -- using the MLPerf Edge Inference benchmarking methodology. The study is conducted on Intel x86 processors and Raspberry Pi device with ARM processor. The paper uses a number of DNN inference frameworks, including OpenVINO (for Intel CPUs only), TensorFlow Lite (TFLite), ONNX, and PyTorch with MobileNetV2, VGG-19, and DenseNet-121. The single-stream, multi-stream, and offline scenarios of the MLPerf Edge Inference benchmarks are used for measuring latency and throughput in our experiments. Our evaluation reveals that OpenVINO and TFLite are the most optimized frameworks for Intel CPUs and Raspberry Pi device, respectively. We observe no loss in accuracy except for the static quantization techniques. We also observed the benefits of using quantization for these optimized frameworks. For example, INT8-based quantized models deliver $3.3\times$ and $4\times$ better performance over FP32 using OpenVINO on Intel CPU and TFLite on Raspberry Pi device, respectively, for the MLPerf offline scenario. To the best of our knowledge, this paper is the first one that presents a unique characterization study characterizing the impact of quantization for a range of DNN inference frameworks -- including OpenVINO, TFLite, PyTorch, and ONNX -- on Intel x86 processors and Raspberry Pi device with ARM processor using the MLPerf Edge Inference benchmark methodology.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
IMaSC -- ICFOSS Malayalam Speech Corpus
Authors:
Deepa P Gopinath,
Thennal D K,
Vrinda V Nair,
Swaraj K S,
Sachin G
Abstract:
Modern text-to-speech (TTS) systems use deep learning to synthesize speech increasingly approaching human quality, but they require a database of high quality audio-text sentence pairs for training. Malayalam, the official language of the Indian state of Kerala and spoken by 35+ million people, is a low resource language in terms of available corpora for TTS systems. In this paper, we present IMaS…
▽ More
Modern text-to-speech (TTS) systems use deep learning to synthesize speech increasingly approaching human quality, but they require a database of high quality audio-text sentence pairs for training. Malayalam, the official language of the Indian state of Kerala and spoken by 35+ million people, is a low resource language in terms of available corpora for TTS systems. In this paper, we present IMaSC, a Malayalam text and speech corpora containing approximately 50 hours of recorded speech. With 8 speakers and a total of 34,473 text-audio pairs, IMaSC is larger than every other publicly available alternative. We evaluated the database by using it to train TTS models for each speaker based on a modern deep learning architecture. Via subjective evaluation, we show that our models perform significantly better in terms of naturalness compared to previous studies and publicly available models, with an average mean opinion score of 4.50, indicating that the synthesized speech is close to human quality.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
Outlier-based Autism Detection using Longitudinal Structural MRI
Authors:
Devika K,
Venkata Ramana Murthy Oruganti,
Dwarikanath Mahapatra,
Ramanathan Subramanian
Abstract:
Diagnosis of Autism Spectrum Disorder (ASD) using clinical evaluation (cognitive tests) is challenging due to wide variations amongst individuals. Since no effective treatment exists, prompt and reliable ASD diagnosis can enable the effective preparation of treatment regimens. This paper proposes structural Magnetic Resonance Imaging (sMRI)-based ASD diagnosis via an outlier detection approach. To…
▽ More
Diagnosis of Autism Spectrum Disorder (ASD) using clinical evaluation (cognitive tests) is challenging due to wide variations amongst individuals. Since no effective treatment exists, prompt and reliable ASD diagnosis can enable the effective preparation of treatment regimens. This paper proposes structural Magnetic Resonance Imaging (sMRI)-based ASD diagnosis via an outlier detection approach. To learn Spatio-temporal patterns in structural brain connectivity, a Generative Adversarial Network (GAN) is trained exclusively with sMRI scans of healthy subjects. Given a stack of three adjacent slices as input, the GAN generator reconstructs the next three adjacent slices; the GAN discriminator then identifies ASD sMRI scan reconstructions as outliers. This model is compared against two other baselines -- a simpler UNet and a sophisticated Self-Attention GAN. Axial, Coronal, and Sagittal sMRI slices from the multi-site ABIDE II dataset are used for evaluation. Extensive experiments reveal that our ASD detection framework performs comparably with the state-of-the-art with far fewer training data. Furthermore, longitudinal data (two scans per subject over time) achieve 17-28% higher accuracy than cross-sectional data (one scan per subject). Among other findings, metrics employed for model training as well as reconstruction loss computation impact detection performance, and the coronal modality is found to best encode structural information for ASD detection.
△ Less
Submitted 10 March, 2022; v1 submitted 20 February, 2022;
originally announced February 2022.
-
Design and Analysis of a Robotic Lizard using Five-Bar Mechanism
Authors:
Rajashekhar V S,
Dinakar Raj C K,
Vishwesh S,
Selva Perumal E,
Nirmal Kumar M
Abstract:
Legged robots are being used to explore rough terrains as they are capable of traversing gaps and obstacles. In this paper, a new mechanism is designed to replicate a robotic lizard using integrated five-bar mechanisms. There are two five bar mechanisms from which two more are formed by connecting the links in a particular order. The legs are attached to the links of the five bar mechanism such th…
▽ More
Legged robots are being used to explore rough terrains as they are capable of traversing gaps and obstacles. In this paper, a new mechanism is designed to replicate a robotic lizard using integrated five-bar mechanisms. There are two five bar mechanisms from which two more are formed by connecting the links in a particular order. The legs are attached to the links of the five bar mechanism such that, when the mechanism is actuated, they move the robot forward. Position analysis using vector loop approach has been done for the mechanism. A prototype has been built and controlled using servo motors to verify the robotic lizard mechanism.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Second Order and Moderate Deviation Analysis of a Block Fading Channel with Deterministic and Energy Harvesting Power Constraints
Authors:
Deekshith P K,
K Gautam Shenoy,
Vinod Sharma
Abstract:
We consider a block fading additive white Gaussian noise (AWGN) channel with perfect channel state information (CSI) at the transmitter and the receiver. First, for a given codeword length and non-vanishing average probability of error, we obtain lower and upper bounds on the maximum transmission rate. We derive bounds for three kinds of power constraints inherent to a wireless transmitter. These…
▽ More
We consider a block fading additive white Gaussian noise (AWGN) channel with perfect channel state information (CSI) at the transmitter and the receiver. First, for a given codeword length and non-vanishing average probability of error, we obtain lower and upper bounds on the maximum transmission rate. We derive bounds for three kinds of power constraints inherent to a wireless transmitter. These include the canonical peak power constraint and average power constraint. In addition, we consider a time varying peak power constraint imposed by an \emph{energy harvesting device}-a mechanism that powers many modern-day wireless transmitters. The bounds characterize \emph{second order} deviation of finite blocklength coding rates from the channel capacity, which is in turn achieved by \textit{water-filling} power allocation across time. The bounds obtained also indicate the rate enhancement possible due to CSI at the transmitter in the finite blocklength regime. Next, we provide bounds on the optimal exponent with which error probability drops to zero when channel coding rate is simultaneously allowed to approach capacity \emph{at a certain rate}, as the codeword length increases. These bounds identify what is known as the moderate deviation regime of the block fading channel. We compare the bounds numerically to bring out the efficacy of our results.
△ Less
Submitted 9 April, 2019;
originally announced April 2019.
-
Asynchronous Wi-Fi Control Interface (AWCI) Using Socket IO Technology
Authors:
Devipriya T K,
Jovita Franci A,
Deepa R,
Godwin Sam Josh
Abstract:
The Internet of Things (IoT) is a system of interrelated computing devices to the Internet that are provided with unique identifiers which has the ability to transfer data over a network without requiring human-to- human or human-to- computer interaction. Raspberry pi-3 a popular, cheap, small and powerful computer with built in Wi-Fi can be used to make any devices smart by connecting to that par…
▽ More
The Internet of Things (IoT) is a system of interrelated computing devices to the Internet that are provided with unique identifiers which has the ability to transfer data over a network without requiring human-to- human or human-to- computer interaction. Raspberry pi-3 a popular, cheap, small and powerful computer with built in Wi-Fi can be used to make any devices smart by connecting to that particular device and embedding the required software to Raspberry pi-3 and connect it to Internet. It is difficult to install a full Linux OS inside a small devices like light switch so in that case to connect to a Wi-Fi connection a model was proposed known as Asynchronous Wi-Fi Control Interface (AWCI) which is a simple Wi-Fi connectivity software for a Debian compatible Linux OS). The objective of this paper is to make the interactive user interface for Wi-Fi connection in Raspberry Pi touch display by providing live updates using Socket IO technology. The Socket IO technology enables real-time bidirectional communication between client and server. Asynchronous Wi-Fi Control Interface (AWCI) is compatible with every platform, browser or device.
△ Less
Submitted 6 October, 2018;
originally announced October 2018.
-
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware
Authors:
Deepa K,
Radhamani G,
Vinod P,
Mohammad Shojafar,
Neeraj Kumar,
Mauro Conti
Abstract:
Ever increasing number of Android malware, has always been a concern for cybersecurity professionals. Even though plenty of anti-malware solutions exist, a rational and pragmatic approach for the same is rare and has to be inspected further. In this paper, we propose a novel two-set feature selection approach based on Rough Set and Statistical Test named as RSST to extract relevant system calls. T…
▽ More
Ever increasing number of Android malware, has always been a concern for cybersecurity professionals. Even though plenty of anti-malware solutions exist, a rational and pragmatic approach for the same is rare and has to be inspected further. In this paper, we propose a novel two-set feature selection approach based on Rough Set and Statistical Test named as RSST to extract relevant system calls. To address the problem of higher dimensional attribute set, we derived suboptimal system call space by applying the proposed feature selection method to maximize the separability between malware and benign samples. Comprehensive experiments conducted on a dataset consisting of 3500 samples with 30 RSST derived essential system calls resulted in an accuracy of 99.9%, Area Under Curve (AUC) of 1.0, with 1% False Positive Rate (FPR). However, other feature selectors (Information Gain, CFsSubsetEval, ChiSquare, FreqSel and Symmetric Uncertainty) used in the domain of malware analysis resulted in the accuracy of 95.5% with 8.5% FPR. Besides, empirical analysis of RSST derived system calls outperform other attributes such as permissions, opcodes, API, methods, call graphs, Droidbox attributes and network traces.
△ Less
Submitted 17 September, 2018;
originally announced September 2018.
-
Finite Blocklength Rates over a Fading Channel with CSIT and CSIR
Authors:
Deekshith P K,
Vinod Sharma
Abstract:
In this work, we obtain lower and upper bounds on the maximal transmission rate at a given codeword length $n$, average probability of error $ε$ and power constraint $\bar{P}$, over a finite valued, block fading additive white Gaussian noise (AWGN) channel with channel state information (CSI) at the transmitter and the receiver. These bounds characterize deviation of the finite blocklength coding…
▽ More
In this work, we obtain lower and upper bounds on the maximal transmission rate at a given codeword length $n$, average probability of error $ε$ and power constraint $\bar{P}$, over a finite valued, block fading additive white Gaussian noise (AWGN) channel with channel state information (CSI) at the transmitter and the receiver. These bounds characterize deviation of the finite blocklength coding rates from the channel capacity which is in turn achieved by the water filling power allocation across time. The bounds obtained also characterize the rate enhancement possible due to the CSI at the transmitter in the finite blocklength regime. The results are further elucidated via numerical examples.
△ Less
Submitted 13 November, 2017; v1 submitted 22 May, 2017;
originally announced May 2017.
-
Littlewood subordination principle for proper holomorphic functions
Authors:
Wiegerinck Jan,
Djire Ibrahim K
Abstract:
We generalize Littlewood subordination principle for proper holomorphic functions and give many applications.
We generalize Littlewood subordination principle for proper holomorphic functions and give many applications.
△ Less
Submitted 30 October, 2014;
originally announced October 2014.
-
AWGN Channel Capacity of Energy Harvesting Transmitters with a Finite Energy Buffer
Authors:
Deekshith P K,
Vinod Sharma,
R Rajesh
Abstract:
We consider an AWGN channel with a transmitter powered by an energy harvesting source. The node is equipped with a finite energy buffer. Such a system can be modelled as a channel with side information (about energy in the energy buffer) causally known at the transmitter. The receiver may or may not have the side information. We prove that Markov energy management policies are sufficient to achiev…
▽ More
We consider an AWGN channel with a transmitter powered by an energy harvesting source. The node is equipped with a finite energy buffer. Such a system can be modelled as a channel with side information (about energy in the energy buffer) causally known at the transmitter. The receiver may or may not have the side information. We prove that Markov energy management policies are sufficient to achieve the capacity of the system and provide a single letter characterization for the capacity. The computation of the capacity is expensive. Therefore, we discuss an achievable scheme that is easy to compute. This achievable rate converges to the infinite buffer capacity as the buffer length increases.
△ Less
Submitted 17 July, 2013;
originally announced July 2013.
-
Capacity of Gaussian MAC Powered by Energy Harvesters without Storage Buffer
Authors:
R Rajesh,
Deekshith P K,
Vinod Sharma
Abstract:
We consider a Gaussian multiple access channel (GMAC) where the users are sensor nodes powered by energy harvesters. The energy harvester has no buffer to store the harvested energy and hence the energy need to be expended immediately. We assume that the decoder has perfect knowledge of the energy harvesting process. We characterize the capacity region of such a GMAC. We also provide the capacity…
▽ More
We consider a Gaussian multiple access channel (GMAC) where the users are sensor nodes powered by energy harvesters. The energy harvester has no buffer to store the harvested energy and hence the energy need to be expended immediately. We assume that the decoder has perfect knowledge of the energy harvesting process. We characterize the capacity region of such a GMAC. We also provide the capacity region when one of the users has infinite buffer to store the energy harvested. Next we find the achievable rates when the energy harvesting information is not available at the decoder.
△ Less
Submitted 22 April, 2012;
originally announced April 2012.