-
HELPER-X: A Unified Instructable Embodied Agent to Tackle Four Interactive Vision-Language Domains with Memory-Augmented Language Models
Authors:
Gabriel Sarch,
Sahil Somani,
Raghav Kapoor,
Michael J. Tarr,
Katerina Fragkiadaki
Abstract:
Recent research on instructable agents has used memory-augmented Large Language Models (LLMs) as task planners, a technique that retrieves language-program examples relevant to the input instruction and uses them as in-context examples in the LLM prompt to improve the performance of the LLM in inferring the correct action and task plans. In this technical report, we extend the capabilities of HELP…
▽ More
Recent research on instructable agents has used memory-augmented Large Language Models (LLMs) as task planners, a technique that retrieves language-program examples relevant to the input instruction and uses them as in-context examples in the LLM prompt to improve the performance of the LLM in inferring the correct action and task plans. In this technical report, we extend the capabilities of HELPER, by expanding its memory with a wider array of examples and prompts, and by integrating additional APIs for asking questions. This simple expansion of HELPER into a shared memory enables the agent to work across the domains of executing plans from dialogue, natural language instruction following, active question asking, and commonsense room reorganization. We evaluate the agent on four diverse interactive visual-language embodied agent benchmarks: ALFRED, TEACh, DialFRED, and the Tidy Task. HELPER-X achieves few-shot, state-of-the-art performance across these benchmarks using a single agent, without requiring in-domain training, and remains competitive with agents that have undergone in-domain training.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
OmniACT: A Dataset and Benchmark for Enabling Multimodal Generalist Autonomous Agents for Desktop and Web
Authors:
Raghav Kapoor,
Yash Parag Butala,
Melisa Russak,
**g Yu Koh,
Kiran Kamble,
Waseem Alshikh,
Ruslan Salakhutdinov
Abstract:
For decades, human-computer interaction has fundamentally been manual. Even today, almost all productive work done on the computer necessitates human input at every step. Autonomous virtual agents represent an exciting step in automating many of these menial tasks. Virtual agents would empower users with limited technical proficiency to harness the full possibilities of computer systems. They coul…
▽ More
For decades, human-computer interaction has fundamentally been manual. Even today, almost all productive work done on the computer necessitates human input at every step. Autonomous virtual agents represent an exciting step in automating many of these menial tasks. Virtual agents would empower users with limited technical proficiency to harness the full possibilities of computer systems. They could also enable the efficient streamlining of numerous computer tasks, ranging from calendar management to complex travel bookings, with minimal human intervention. In this paper, we introduce OmniACT, the first-of-a-kind dataset and benchmark for assessing an agent's capability to generate executable programs to accomplish computer tasks. Our scope extends beyond traditional web automation, covering a diverse range of desktop applications. The dataset consists of fundamental tasks such as "Play the next song", as well as longer horizon tasks such as "Send an email to John Doe mentioning the time and place to meet". Specifically, given a pair of screen image and a visually-grounded natural language task, the goal is to generate a script capable of fully executing the task. We run several strong baseline language model agents on our benchmark. The strongest baseline, GPT-4, performs the best on our benchmark However, its performance level still reaches only 15% of the human proficiency in generating executable scripts capable of completing the task, demonstrating the challenge of our task for conventional web agents. Our benchmark provides a platform to measure and evaluate the progress of language model agents in automating computer tasks and motivates future work towards building multimodal models that bridge large language models and the visual grounding of computer screens.
△ Less
Submitted 28 February, 2024; v1 submitted 27 February, 2024;
originally announced February 2024.
-
MoEmo Vision Transformer: Integrating Cross-Attention and Movement Vectors in 3D Pose Estimation for HRI Emotion Detection
Authors:
David C. Jeong,
Tianma Shen,
Hongji Liu,
Raghav Kapoor,
Casey Nguyen,
Song Liu,
Christopher A. Kitts
Abstract:
Emotion detection presents challenges to intelligent human-robot interaction (HRI). Foundational deep learning techniques used in emotion detection are limited by information-constrained datasets or models that lack the necessary complexity to learn interactions between input data elements, such as the the variance of human emotions across different contexts. In the current effort, we introduce 1)…
▽ More
Emotion detection presents challenges to intelligent human-robot interaction (HRI). Foundational deep learning techniques used in emotion detection are limited by information-constrained datasets or models that lack the necessary complexity to learn interactions between input data elements, such as the the variance of human emotions across different contexts. In the current effort, we introduce 1) MoEmo (Motion to Emotion), a cross-attention vision transformer (ViT) for human emotion detection within robotics systems based on 3D human pose estimations across various contexts, and 2) a data set that offers full-body videos of human movement and corresponding emotion labels based on human gestures and environmental contexts. Compared to existing approaches, our method effectively leverages the subtle connections between movement vectors of gestures and environmental contexts through the use of cross-attention on the extracted movement vectors of full-body human gestures/poses and feature maps of environmental contexts. We implement a cross-attention fusion model to combine movement vectors and environment contexts into a joint representation to derive emotion estimation. Leveraging our Naturalistic Motion Database, we train the MoEmo system to jointly analyze motion and context, yielding emotion detection that outperforms the current state-of-the-art.
△ Less
Submitted 15 October, 2023;
originally announced October 2023.
-
SummQA at MEDIQA-Chat 2023:In-Context Learning with GPT-4 for Medical Summarization
Authors:
Yash Mathur,
Sanketh Rangreji,
Raghav Kapoor,
Medha Palavalli,
Amanda Bertsch,
Matthew R. Gormley
Abstract:
Medical dialogue summarization is challenging due to the unstructured nature of medical conversations, the use of medical terminology in gold summaries, and the need to identify key information across multiple symptom sets. We present a novel system for the Dialogue2Note Medical Summarization tasks in the MEDIQA 2023 Shared Task. Our approach for section-wise summarization (Task A) is a two-stage…
▽ More
Medical dialogue summarization is challenging due to the unstructured nature of medical conversations, the use of medical terminology in gold summaries, and the need to identify key information across multiple symptom sets. We present a novel system for the Dialogue2Note Medical Summarization tasks in the MEDIQA 2023 Shared Task. Our approach for section-wise summarization (Task A) is a two-stage process of selecting semantically similar dialogues and using the top-k similar dialogues as in-context examples for GPT-4. For full-note summarization (Task B), we use a similar solution with k=1. We achieved 3rd place in Task A (2nd among all teams), 4th place in Task B Division Wise Summarization (2nd among all teams), 15th place in Task A Section Header Classification (9th among all teams), and 8th place among all teams in Task B. Our results highlight the effectiveness of few-shot prompting for this task, though we also identify several weaknesses of prompting-based approaches. We compare GPT-4 performance with several finetuned baselines. We find that GPT-4 summaries are more abstractive and shorter. We make our code publicly available.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Neural Network Architecture for Database Augmentation Using Shared Features
Authors:
William C. Sleeman IV,
Rishabh Kapoor,
Preetam Ghosh
Abstract:
The popularity of learning from data with machine learning and neural networks has lead to the creation of many new datasets for almost every problem domain. However, even within a single domain, these datasets are often collected with disparate features, sampled from different sub-populations, and recorded at different time points. Even with the plethora of individual datasets, large data science…
▽ More
The popularity of learning from data with machine learning and neural networks has lead to the creation of many new datasets for almost every problem domain. However, even within a single domain, these datasets are often collected with disparate features, sampled from different sub-populations, and recorded at different time points. Even with the plethora of individual datasets, large data science projects can be difficult as it is often not trivial to merge these smaller datasets. Inherent challenges in some domains such as medicine also makes it very difficult to create large single source datasets or multi-source datasets with identical features. Instead of trying to merge these non-matching datasets directly, we propose a neural network architecture that can provide data augmentation using features common between these datasets. Our results show that this style of data augmentation can work for both image and tabular data.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
Movement Analytics: Current Status, Application to Manufacturing, and Future Prospects from an AI Perspective
Authors:
Peter Baumgartner,
Daniel Smith,
Mashud Rana,
Reena Kapoor,
Elena Tartaglia,
Andreas Schutt,
Ashfaqur Rahman,
John Taylor,
Simon Dunstall
Abstract:
Data-driven decision making is becoming an integral part of manufacturing companies. Data is collected and commonly used to improve efficiency and produce high quality items for the customers. IoT-based and other forms of object tracking are an emerging tool for collecting movement data of objects/entities (e.g. human workers, moving vehicles, trolleys etc.) over space and time. Movement data can…
▽ More
Data-driven decision making is becoming an integral part of manufacturing companies. Data is collected and commonly used to improve efficiency and produce high quality items for the customers. IoT-based and other forms of object tracking are an emerging tool for collecting movement data of objects/entities (e.g. human workers, moving vehicles, trolleys etc.) over space and time. Movement data can provide valuable insights like process bottlenecks, resource utilization, effective working time etc. that can be used for decision making and improving efficiency.
Turning movement data into valuable information for industrial management and decision making requires analysis methods. We refer to this process as movement analytics. The purpose of this document is to review the current state of work for movement analytics both in manufacturing and more broadly.
We survey relevant work from both a theoretical perspective and an application perspective. From the theoretical perspective, we put an emphasis on useful methods from two research areas: machine learning, and logic-based knowledge representation. We also review their combinations in view of movement analytics, and we discuss promising areas for future development and application. Furthermore, we touch on constraint optimization.
From an application perspective, we review applications of these methods to movement analytics in a general sense and across various industries. We also describe currently available commercial off-the-shelf products for tracking in manufacturing, and we overview main concepts of digital twins and their applications.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
Hate Me Not: Detecting Hate Inducing Memes in Code Switched Languages
Authors:
Kshitij Rajput,
Raghav Kapoor,
Kaushal Rai,
Preeti Kaur
Abstract:
The rise in the number of social media users has led to an increase in the hateful content posted online. In countries like India, where multiple languages are spoken, these abhorrent posts are from an unusual blend of code-switched languages. This hate speech is depicted with the help of images to form "Memes" which create a long-lasting impact on the human mind. In this paper, we take up the tas…
▽ More
The rise in the number of social media users has led to an increase in the hateful content posted online. In countries like India, where multiple languages are spoken, these abhorrent posts are from an unusual blend of code-switched languages. This hate speech is depicted with the help of images to form "Memes" which create a long-lasting impact on the human mind. In this paper, we take up the task of hate and offense detection from multimodal data, i.e. images (Memes) that contain text in code-switched languages. We firstly present a novel triply annotated Indian political Memes (IPM) dataset, which comprises memes from various Indian political events that have taken place post-independence and are classified into three distinct categories. We also propose a binary-channelled CNN cum LSTM based model to process the images using the CNN model and text using the LSTM model to get state-of-the-art results for this task.
△ Less
Submitted 24 April, 2022;
originally announced April 2022.
-
Multimodal Classification: Current Landscape, Taxonomy and Future Directions
Authors:
William C. Sleeman IV,
Rishabh Kapoor,
Preetam Ghosh
Abstract:
Multimodal classification research has been gaining popularity in many domains that collect more data from multiple sources including satellite imagery, biometrics, and medicine. However, the lack of consistent terminology and architectural descriptions makes it difficult to compare different existing solutions. We address these challenges by proposing a new taxonomy for describing such systems ba…
▽ More
Multimodal classification research has been gaining popularity in many domains that collect more data from multiple sources including satellite imagery, biometrics, and medicine. However, the lack of consistent terminology and architectural descriptions makes it difficult to compare different existing solutions. We address these challenges by proposing a new taxonomy for describing such systems based on trends found in recent publications on multimodal classification. Many of the most difficult aspects of unimodal classification have not yet been fully addressed for multimodal datasets including big data, class imbalance, and instance level difficulty. We also provide a discussion of these challenges and future directions.
△ Less
Submitted 18 September, 2021;
originally announced September 2021.
-
A review of Einstein Cartan Theory to describe superstrings with intrinsic torsion
Authors:
Richa Kapoor
Abstract:
This paper reviews the Einstein Cartan theory (ECT), the famous extension of general relativity (GR) in presence of spacetime torsion. The vacuum equations are derived step by step. Vielbein formulation is discussed for determining the field equations in presence of matter. This review would be easily comprehensible for any student familiar with general relativity. Further, ECT is used to describe…
▽ More
This paper reviews the Einstein Cartan theory (ECT), the famous extension of general relativity (GR) in presence of spacetime torsion. The vacuum equations are derived step by step. Vielbein formulation is discussed for determining the field equations in presence of matter. This review would be easily comprehensible for any student familiar with general relativity. Further, ECT is used to describe superstrings with intrinsic torsion, assuming a $D_p$-brane in presence of a curved background of the NS-NS Kalb-Ramond field. D-brane worldvolume is a flat spacetime governed by the Dirac-Born-Infeld (DBI) action. In presence of the dynamical NS-NS $B$-field, the contortion tensor equals the totally antisymmetric torsion. Using this, the form of the $D_p$-brane action in presence of torsion is determined.
△ Less
Submitted 11 September, 2020;
originally announced September 2020.
-
Deformation of $D_p$-Brane Worldvolume in Weakly Curved Background
Authors:
Richa Kapoor
Abstract:
We study a $D_p$-brane in a parallelizable NS-NS background. The article starts with a brief review of the non-associative deformation of $D$-brane worldvolume in presence of torsion \cite{cornalba}. We suggest an alternative form and heuristic derivation of the open string metric for weakly curved backgrounds, by promoting the constant two-form in the flat space formula to a dynamical two-form an…
▽ More
We study a $D_p$-brane in a parallelizable NS-NS background. The article starts with a brief review of the non-associative deformation of $D$-brane worldvolume in presence of torsion \cite{cornalba}. We suggest an alternative form and heuristic derivation of the open string metric for weakly curved backgrounds, by promoting the constant two-form in the flat space formula to a dynamical two-form and then Taylor expanding the bulk fields in Riemann Normal Coordinates at the origin. For weakly curved backgrounds, terms only upto the leading order in the NS-NS field strength or torsion contribute. This formalism differs from the author's earlier works in a collaboration \cite{richa}. We use the open string metric proposed in this paper to determine the deformation of $D_5$-brane for a particular NS-NS background. It turns out that a spherical $D_5$-brane with torsion acts like an extremal black 5-brane in the limit of radius $r \rightarrow 0$. This is an interesting case of gauge/gravity duality with an intractable non-commutative and non-associative gauge theory on a $D_p$-brane with torsion, which is equivalent to a simpler and ordinary gravity theory on the extremal black brane.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Sketch2Code: Transformation of Sketches to UI in Real-time Using Deep Neural Network
Authors:
Vanita Jain,
Piyush Agrawal,
Subham Banga,
Rishabh Kapoor,
Shashwat Gulyani
Abstract:
User Interface (UI) prototy** is a necessary step in the early stages of application development. Transforming sketches of a Graphical User Interface (UI) into a coded UI application is an uninspired but time-consuming task performed by a UI designer. An automated system that can replace human efforts for straightforward implementation of UI designs will greatly speed up this procedure. The work…
▽ More
User Interface (UI) prototy** is a necessary step in the early stages of application development. Transforming sketches of a Graphical User Interface (UI) into a coded UI application is an uninspired but time-consuming task performed by a UI designer. An automated system that can replace human efforts for straightforward implementation of UI designs will greatly speed up this procedure. The works that propose such a system primarily focus on using UI wireframes as input rather than hand-drawn sketches. In this paper, we put forward a novel approach wherein we employ a Deep Neural Network that is trained on our custom database of such sketches to detect UI elements in the input sketch. Detection of objects in sketches is a peculiar visual recognition task that requires a specific solution that our deep neural network model attempts to provide. The output from the network is a platform-independent UI representation object. The UI representation object is a dictionary of key-value pairs to represent the UI elements recognized along with their properties. This is further consumed by our UI parser which creates code for different platforms. The intrinsic platform-independence allows the model to create a UI prototype for multiple platforms with single training. This two-step approach without the need for two trained models improves over other methods giving time-efficient results (average time: 129 ms) with good accuracy.
△ Less
Submitted 20 October, 2019;
originally announced October 2019.
-
Mind Your Language: Abuse and Offense Detection for Code-Switched Languages
Authors:
Raghav Kapoor,
Yaman Kumar,
Kshitij Rajput,
Rajiv Ratn Shah,
Ponnurangam Kumaraguru,
Roger Zimmermann
Abstract:
In multilingual societies like the Indian subcontinent, use of code-switched languages is much popular and convenient for the users. In this paper, we study offense and abuse detection in the code-switched pair of Hindi and English (i.e. Hinglish), the pair that is the most spoken. The task is made difficult due to non-fixed grammar, vocabulary, semantics and spellings of Hinglish language. We app…
▽ More
In multilingual societies like the Indian subcontinent, use of code-switched languages is much popular and convenient for the users. In this paper, we study offense and abuse detection in the code-switched pair of Hindi and English (i.e. Hinglish), the pair that is the most spoken. The task is made difficult due to non-fixed grammar, vocabulary, semantics and spellings of Hinglish language. We apply transfer learning and make a LSTM based model for hate speech classification. This model surpasses the performance shown by the current best models to establish itself as the state-of-the-art in the unexplored domain of Hinglish offensive text classification.We also release our model and the embeddings trained for research purposes
△ Less
Submitted 23 September, 2018;
originally announced September 2018.
-
Heuristic and Cost-based Optimization for Diverse Provenance Tasks
Authors:
Xing Niu,
Raghav Kapoor,
Boris Glavic,
Dieter Gawlick,
Zhen Hua Liu,
Vasudha Krishnaswamy,
Venkatesh Radhakrishnan
Abstract:
A well-established technique for capturing database provenance as annotations on data is to instrument queries to propagate such annotations. However, even sophisticated query optimizers often fail to produce efficient execution plans for instrumented queries. We develop provenance-aware optimization techniques to address this problem. Specifically, we study algebraic equivalences targeted at inst…
▽ More
A well-established technique for capturing database provenance as annotations on data is to instrument queries to propagate such annotations. However, even sophisticated query optimizers often fail to produce efficient execution plans for instrumented queries. We develop provenance-aware optimization techniques to address this problem. Specifically, we study algebraic equivalences targeted at instrumented queries and alternative ways of instrumenting queries for provenance capture. Furthermore, we present an extensible heuristic and cost-based optimization framework utilizing these optimizations. Our experiments confirm that these optimizations are highly effective, improving performance by several orders of magnitude for diverse provenance tasks.
△ Less
Submitted 17 April, 2018;
originally announced April 2018.
-
Using Contexts and Constraints for Improved Geotagging of Human Trafficking Webpages
Authors:
Rahul Kapoor,
Mayank Kejriwal,
Pedro Szekely
Abstract:
Extracting geographical tags from webpages is a well-motivated application in many domains. In illicit domains with unusual language models, like human trafficking, extracting geotags with both high precision and recall is a challenging problem. In this paper, we describe a geotag extraction framework in which context, constraints and the openly available Geonames knowledge base work in tandem in…
▽ More
Extracting geographical tags from webpages is a well-motivated application in many domains. In illicit domains with unusual language models, like human trafficking, extracting geotags with both high precision and recall is a challenging problem. In this paper, we describe a geotag extraction framework in which context, constraints and the openly available Geonames knowledge base work in tandem in an Integer Linear Programming (ILP) model to achieve good performance. In preliminary empirical investigations, the framework improves precision by 28.57% and F-measure by 36.9% on a difficult human trafficking geotagging task compared to a machine learning-based baseline. The method is already being integrated into an existing knowledge base construction system widely used by US law enforcement agencies to combat human trafficking.
△ Less
Submitted 18 April, 2017;
originally announced April 2017.
-
Quantum effects in topological and Schwarzschild de Sitter brane: Aspects of torsion on ${\mathbf{(D{\bar D})_4}}$-brane universe
Authors:
Richa Kapoor,
Supriya Kar,
Deobrat Singh
Abstract:
We investigate an effective torsion curvature in a second order formalism underlying a two form world-volume dynamics in a $D_5$-brane. In particular, we consider the two form in presence of a background (open string) metric in a $U(1)$ gauge theory. Interestingly the formalism may be viewed via a non-coincident pair of $(D{\bar D})_5$-brane with a global NS two form on an anti brane and a local t…
▽ More
We investigate an effective torsion curvature in a second order formalism underlying a two form world-volume dynamics in a $D_5$-brane. In particular, we consider the two form in presence of a background (open string) metric in a $U(1)$ gauge theory. Interestingly the formalism may be viewed via a non-coincident pair of $(D{\bar D})_5$-brane with a global NS two form on an anti brane and a local two form on a brane. The energy-momentum tensor is computed in the six dimensional CFT. It is shown to source a metric fluctuation on a vacuum created pair of $(D{\bar D})_4$-brane at a cosmological horizon by the two form quanta in the gauge theory. The emergent gravity scenario is shown to describe a low energy (perturbative) string vacuum in $6D$ with a (non-perturbative) quantum correction by a lower ($p<5$) dimensional $D_p$ brane or an anti brane in the formalism. A closed string exchange between a pair of $(D{\bar D})_4$-brane, underlying a closed/open string duality, is argued to describe the Einstein vacuum in a low energy limit. We obtain topological de Sitter and Schwarzschild brane universe in six dimensions. The brane/anti-brane geometries are analyzed to explore some of their characteristic and thermal behaviours in presence of the quantum effects. They reveal an underlying nine dimensional type IIA and IIB superstring theories on $S^1$.
△ Less
Submitted 18 October, 2014; v1 submitted 29 July, 2014;
originally announced July 2014.
-
Toward Software Measurement and Quality Analysis of MARF and GIPSY Case Studies, a Team 8 SOEN6611-S14 Project Report
Authors:
Chanpreet Singh,
Kanwaldeep Singh,
Parth Manrao,
Rashi Kapoor,
Sagar Shukla,
Shivam Patel,
Simar Preet,
Suman Alungh
Abstract:
Measurement is an important criterion to improve the performance of a product. This paper presents a comparative study involving measurements between two frameworks MARF and GIPSY. Initially it establishes a thorough understanding of these frameworks and their applications. MARF comprises of a number of algorithms for voice and speech processing etc. GIPSY on the contrary provides a multi lingual…
▽ More
Measurement is an important criterion to improve the performance of a product. This paper presents a comparative study involving measurements between two frameworks MARF and GIPSY. Initially it establishes a thorough understanding of these frameworks and their applications. MARF comprises of a number of algorithms for voice and speech processing etc. GIPSY on the contrary provides a multi lingual platform for develo** compiler components. These frameworks are meant to provide an open source environment for the programmers or users and implement them in applications. Several metrics are used for object-oriented design quality assessment. We use these metrics to evaluate the code quality of both MARF and GIPSY. We describe how tools can be used to analyze these metric values and categorize the quality of the code as excellent or worse. Based on these values we interpret the results in terms of quality attributes achieved. Quantitative and qualitative analysis of metric values is made in this regard to elaborate the impact of design parameters on the quality of the code.
△ Less
Submitted 4 July, 2014;
originally announced July 2014.
-
Quintessence and effective RN de Sitter brane geometries
Authors:
K. Priyabrat Pandey,
Abhishek K. Singh,
Sunita Singh,
Richa Kapoor,
Supriya Kar
Abstract:
We revisit an effective space-time torsion curvature in a second order formalism, underlying the non-linear $U(1)$ gauge dynamics, of a two form on a $D_4$-brane in type IIA superstring theory. The formalism incorporates the significance of a global NS two form into the theory via its perturbative coupling to a dynamical two form. In particular, we explore the non-linear gauge dynamics on a $D_4$-…
▽ More
We revisit an effective space-time torsion curvature in a second order formalism, underlying the non-linear $U(1)$ gauge dynamics, of a two form on a $D_4$-brane in type IIA superstring theory. The formalism incorporates the significance of a global NS two form into the theory via its perturbative coupling to a dynamical two form. In particular, we explore the non-linear gauge dynamics on a $D_4$-brane in presence of a non-trivial background metric. The fact that the global modes of a NS two form in an open string theory sources the background metric on a $D_4$-brane may hint at the existence of an anti $D_4$-brane in the formalism. An effective de Sitter universe is shown to emerge on a vacuum created pair of $(D{\bar D})_3$-brane by a local two form at the past horizon with a Big Bang. We obtain a number of 4D de Sitter quantum black holes, including a Reissner-Nordstrom vacuum, with and without a propagating torsion. The quantum black holes are shown to be free from curvature singularity at $r\rightarrow 0$. In a low energy limit, the nonperturbative correction sourced by a torison may seen to be insignificant. The quantum black hole undergoes an expansion in the limit and presumably identifies with the Einstein vacuum. Interestingly our analysis reveals a plausible quintessence (axion) on an anti $D_3$-brane which may source the dark energy in a $D_3$-brane universe. Arguably a brane universe moves away from its anti-brane due to the conjectured repulsive gravity underlying the quintessence. It leads to a growth in extra fifth dimension between a brane and an anti-brane which may provide a clue behind an accelerating universe observed in cosmology.
△ Less
Submitted 15 May, 2014;
originally announced May 2014.
-
A reclaimer scheduling problem arising in coal stockyard management
Authors:
Enrico Angelelli,
Thomas Kalinowski,
Reena Kapoor,
Martin W. P. Savelsbergh
Abstract:
We study a number of variants of an abstract scheduling problem inspired by the scheduling of reclaimers in the stockyard of a coal export terminal. We analyze the complexity of each of the variants, providing complexity proofs for some and polynomial algorithms for others. For one, especially interesting variant, we also develop a constant factor approximation algorithm.
We study a number of variants of an abstract scheduling problem inspired by the scheduling of reclaimers in the stockyard of a coal export terminal. We analyze the complexity of each of the variants, providing complexity proofs for some and polynomial algorithms for others. For one, especially interesting variant, we also develop a constant factor approximation algorithm.
△ Less
Submitted 1 January, 2015; v1 submitted 17 February, 2014;
originally announced February 2014.
-
RISM -- Reputation Based Intrusion Detection System for Mobile Ad hoc Networks
Authors:
Animesh Kr Trivedi,
Rishi Kapoor,
Rajan Arora,
Sudip Sanyal,
Sugata Sanyal
Abstract:
This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keep…
▽ More
This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keeps them entirely locally; however, managing to communicate this vital information without accretion of the network traffic. This innovative approach also avoids void assumptions and complex calculations for calculating and maintaining trust values used to estimate the reliability of other nodes observations. A robust Path Manager and Monitor system and Redemption and Fading concepts are other salient features of this design. The design has shown to outperform normal DSR in terms of Packet Delivery Ratio and Routing Overhead even when up to half of nodes in the network behave as malicious.
△ Less
Submitted 30 July, 2013;
originally announced July 2013.
-
Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results
Authors:
Natashia Boland,
Thomas Kalinowski,
Reena Kapoor,
Simranjit Kaur
Abstract:
We study the problem of scheduling maintenance on arcs of a capacitated network so as to maximize the total flow from a source node to a sink node over a set of time periods. Maintenance on an arc shuts down the arc for the duration of the period in which its maintenance is scheduled, making its capacity zero for that period. A set of arcs is designated to have maintenance during the planning peri…
▽ More
We study the problem of scheduling maintenance on arcs of a capacitated network so as to maximize the total flow from a source node to a sink node over a set of time periods. Maintenance on an arc shuts down the arc for the duration of the period in which its maintenance is scheduled, making its capacity zero for that period. A set of arcs is designated to have maintenance during the planning period, which will require each to be shut down for exactly one time period. In general this problem is known to be NP-hard. Here we identify a number of characteristics that are relevant for the complexity of instance classes. In particular, we discuss instances with restrictions on the set of arcs that have maintenance to be scheduled; series parallel networks; capacities that are balanced, in the sense that the total capacity of arcs entering a (non-terminal) node equals the total capacity of arcs leaving the node; and identical capacities on all arcs.
△ Less
Submitted 20 June, 2013;
originally announced June 2013.
-
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Authors:
Animesh Kr Trivedi,
Rajan Arora,
Rishi Kapoor,
Sudip Sanyal,
Sugata Sanyal
Abstract:
A Mobile Adhoc Network (MANET) is a cooperative engagement of a collection of mobile nodes without any centralized access point or infrastructure to coordinate among the peers. The underlying concept of coordination among nodes in a cooperative MANET has induced in them a vulnerability to attacks due to issues like lack of fixed infrastructure, dynamically changing network topology, cooperative al…
▽ More
A Mobile Adhoc Network (MANET) is a cooperative engagement of a collection of mobile nodes without any centralized access point or infrastructure to coordinate among the peers. The underlying concept of coordination among nodes in a cooperative MANET has induced in them a vulnerability to attacks due to issues like lack of fixed infrastructure, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. We propose a semi-distributed approach towards Reputation Based Intrusion Detection System (IDS) that combines with the DSR routing protocol for strengthening the defense of a MANET. Our system inherits the features of reputation from human behavior, hence making the IDS socially inspired. It has a semi-distributed architecture as the critical observation results of the system are neither spread globally nor restricted locally. The system assigns maximum weightage to self observation by nodes for updating any reputation values, thus avoiding the need of a trust relationship between nodes. Our system is also unique in the sense that it features the concepts of Redemption and Fading with a robust Path Manager and Monitor system. Simulation studies show that DSR fortified with our system outperforms normal DSR in terms of the packet delivery ratio and routing overhead even when up to half of nodes in the network behave as malicious. Various parameters introduced such as timing window size, reputation update values, congestion parameter and other thresholds have been optimized over several simulation test runs of the system. By combining the semi-distributed architecture and other design essentials like path manager, monitor module, redemption and fading concepts; Our system proves to be robust enough to counter most common attacks in MANETs.
△ Less
Submitted 11 June, 2010; v1 submitted 10 June, 2010;
originally announced June 2010.
-
Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges
Authors:
Rolly Seth,
Rishi Kapoor,
Hameed Al-Qaheri,
Sugata Sanyal
Abstract:
Although 'Halcyon' means serene environment which pervasive computing aims at, we have tried to present a different interpretation of this word. Through our approach, we look at it in context of achieving future 'calm technology'. The paper gives a general overview of the state of pervasive computing today, proposes the 'HALCYON Model' and outlines the 'social' challenges faced by system designers…
▽ More
Although 'Halcyon' means serene environment which pervasive computing aims at, we have tried to present a different interpretation of this word. Through our approach, we look at it in context of achieving future 'calm technology'. The paper gives a general overview of the state of pervasive computing today, proposes the 'HALCYON Model' and outlines the 'social' challenges faced by system designers.
△ Less
Submitted 11 March, 2010;
originally announced March 2010.
-
Phase offsets between core and conal components of radio pulsars and their emission altitudes
Authors:
R. C. Kapoor,
C. S. Shukre
Abstract:
We present a new method for investigating emission altitudes of radio pulsar core and conal components by attributing them different altitudes and by providing a framework to understand the resulting longitude offsets between them which are frequently observed. By investigating the contributions to these offsets due to aberration and the magnetic field line sweepback, we show that they are alway…
▽ More
We present a new method for investigating emission altitudes of radio pulsar core and conal components by attributing them different altitudes and by providing a framework to understand the resulting longitude offsets between them which are frequently observed. By investigating the contributions to these offsets due to aberration and the magnetic field line sweepback, we show that they are always dominated by aberration for all emission altitudes and inclination angles. This directly allows the conclusion that the core emission does not necessarily come from the surface. Our results and the observational trends imply that for a large number of pulsars the emission altitudes of core and conal components are close when compared to the light cylinder radius but not necessarily relative to the stellar radius. The core/cone altitude differences that we find are typically larger than the individual altitudes ascribed to them so far. Widely different core/cone altitudes for some pulsars are also supported by data and suggest a novel explanation of the precursors in the Crab and similar pulsars. We show that the question of emission altitudes can not be divorced from considerations of the core/cone components' filling factors of the polar flux tube. We propose an empirical '1/3 rule' to describe the observed core/cone morphologies. With it core/cone phase offsets allow a glimpse into the variation of the filling factors with altitude.
△ Less
Submitted 24 May, 2002;
originally announced May 2002.
-
Are Radio Pulsars Strange Stars ?
Authors:
R. C. Kapoor,
C. S. Shukre
Abstract:
A remarkably precise observational relation for pulse core component widths of radio pulsars is used to derive stringent limits on pulsar radii, strongly indicating that pulsars are strange stars rather than neutron stars. This is achieved by inclusion of general relativistic effects due to the pulsar mass on the size of the emission region needed to explain the observed pulse widths, which cons…
▽ More
A remarkably precise observational relation for pulse core component widths of radio pulsars is used to derive stringent limits on pulsar radii, strongly indicating that pulsars are strange stars rather than neutron stars. This is achieved by inclusion of general relativistic effects due to the pulsar mass on the size of the emission region needed to explain the observed pulse widths, which constrain the pulsar masses to be less than 2.5 Solar masses and radii to be smaller than 10.5 km.
△ Less
Submitted 12 September, 2001; v1 submitted 21 November, 2000;
originally announced November 2000.