-
Perpetual Exploration of a Ring in Presence of Byzantine Black Hole
Authors:
Pritam Goswami,
Adri Bhattacharya,
Raja Das,
Partha Sarathi Mandal
Abstract:
Perpetual exploration is a fundamental problem in the domain of mobile agents, where an agent needs to visit each node infinitely often. This issue has received lot of attention, mainly for ring topologies, presence of black holes adds more complexity. A black hole can destroy any incoming agent without any observable trace. In \cite{BampasImprovedPeriodicDataRetrieval,KralovivcPeriodicDataRetriev…
▽ More
Perpetual exploration is a fundamental problem in the domain of mobile agents, where an agent needs to visit each node infinitely often. This issue has received lot of attention, mainly for ring topologies, presence of black holes adds more complexity. A black hole can destroy any incoming agent without any observable trace. In \cite{BampasImprovedPeriodicDataRetrieval,KralovivcPeriodicDataRetrievalFirst}, the authors considered this problem in the context of \textit{ Periodic data retrieval}. They introduced a variant of black hole called gray hole (where the adversary chooses whether to destroy an agent or let it pass) among others and showed that 4 asynchronous and co-located agents are essential to solve this problem (hence perpetual exploration) in presence of such a gray hole if each node of the ring has a whiteboard. This paper investigates the exploration of a ring in presence of a ``byzantine black hole''. In addition to the capabilities of a gray hole, in this variant, the adversary chooses whether to erase any previously stored information on that node. Previously, one particular initial scenario (i.e., agents are co-located) and one particular communication model (i.e., whiteboard) are investigated. Now, there can be other initial scenarios where all agents may not be co-located. Also, there are many weaker models of communications (i.e., Face-to-Face, Pebble) where this problem is yet to be investigated. The agents are synchronous. The main results focus on minimizing the agent number while ensuring that perpetual exploration is achieved even in presence of such a node under various communication models and starting positions. Further, we achieved a better upper and lower bound result (i.e., 3 agents) for this problem (where the malicious node is a generalized version of a gray hole), by trading-off scheduler capability, for co-located and in presence of a whiteboard.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Black Hole Search in Dynamic Graphs
Authors:
Tanvir Kaur,
Ashish Saxena,
Partha Sarathi Mandal,
Kaushik Mondal
Abstract:
A black hole in a graph is a dangerous site that disposes any incoming agent into that node without leaving any trace of its existence. In the Black Hole Search (BHS) problem, the goal is for at least one agent to survive, locate the position of the black hole, and then terminate. This problem has been extensively studied for static graphs, where the edges do not disappear with time. In dynamic gr…
▽ More
A black hole in a graph is a dangerous site that disposes any incoming agent into that node without leaving any trace of its existence. In the Black Hole Search (BHS) problem, the goal is for at least one agent to survive, locate the position of the black hole, and then terminate. This problem has been extensively studied for static graphs, where the edges do not disappear with time. In dynamic graphs, where the edges may disappear and reappear with time, the problem has only been studied for specific graphs such as rings and cactuses. In this work, we investigate the problem of BHS for general graphs with a much weaker model with respect to the one used for the cases of rings and cactus graphs\cite{bhattacharya_2023, Paola_2024}. We consider two cases: (a) where the adversary can remove at most one edge in each round, and (b) where the adversary can remove at most $f$ edges in each round. In both scenarios, we consider rooted configuration.
In the case when the adversary can remove at most one edge from the graph, we provide an algorithm that uses 9 agents to solve the BHS problem in $O(m^2)$ time given that each node $v$ is equipped with $O(\log δ_v)$ storage in the form of a whiteboard, where $m$ is the number of edges in $G$ and $δ_v$ is the degree of node $v$. We also prove that it is impossible for $2δ_{BH}$ many agents with $O(\log n)$ memory to locate the black hole where $δ_{BH}$ is the degree of the black hole even if the nodes are equipped with whiteboards of $O(\log δ_v)$ storage.
In a scenario where the adversary can remove at most $f$ edges and the initial configuration is rooted, we present an algorithm that uses $6f$ agents to solve the BHS problem. We also prove that solving BHS using $2f+1$ agents starting from a rooted configuration on a general graph is impossible, even with unlimited node storage and infinite agent memory.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Online Drone Scheduling for Last-mile Delivery
Authors:
Saswata Jana,
Giuseppe F. Italiano,
Manas Jyoti Kashyop,
Athanasios L. Konstantinidis,
Evangelos Kosinas,
Partha Sarathi Mandal
Abstract:
Delivering a parcel from the distribution hub to the customer's doorstep is called the \textit{last-mile delivery} step in delivery logistics. In this paper, we study a hybrid {\it truck-drones} model for the last-mile delivery step, in which a truck moves on a predefined path carrying parcels and drones deliver the parcels. We define the \textsc{online drone scheduling} problem, where the truck m…
▽ More
Delivering a parcel from the distribution hub to the customer's doorstep is called the \textit{last-mile delivery} step in delivery logistics. In this paper, we study a hybrid {\it truck-drones} model for the last-mile delivery step, in which a truck moves on a predefined path carrying parcels and drones deliver the parcels. We define the \textsc{online drone scheduling} problem, where the truck moves in a predefined path, and the customer's requests appear online during the truck's movement. The objective is to schedule a drone associated with every request to minimize the number of drones used subject to the battery budget of the drones and compatibility of the schedules. We propose a 3-competitive deterministic algorithm using the next-fit strategy and 2.7-competitive algorithms using the first-fit strategy for the problem with $O(\log n)$ worst-case time complexity per request, where $n$ is the maximum number of active requests at any time. We also introduce \textsc{online variable-size drone scheduling} problem (OVDS). Here, we know all the customer's requests in advance; however, the drones with different battery capacities appear online. The objective is to schedule customers' requests for drones to minimize the number of drones used. We propose a $(2α+ 1)$-competitive algorithm for the OVDS problem with total running time $O(n \log n)$ for $n$ customer requests, where $α$ is the ratio of the maximum battery capacity to the minimum battery capacity of the drones. Finally, we address how to generate intervals corresponding to each customer request when there are discrete stop** points on the truck's route, from where the drone can fly and meet with the truck.
△ Less
Submitted 25 February, 2024;
originally announced February 2024.
-
Black Hole Search in Dynamic Tori
Authors:
Adri Bhattacharya,
Giuseppe F. Italiano,
Partha Sarathi Mandal
Abstract:
We investigate the black hole search problem by a set of mobile agents in a dynamic torus. Black hole is defined to be a dangerous stationary node which has the capability to destroy any number of incoming agents without leaving any trace of its existence. A torus of size $n\times m$ ($3\leq n \leq m$) is a collection of $n$ row rings and $m$ column rings, and the dynamicity is such that each ring…
▽ More
We investigate the black hole search problem by a set of mobile agents in a dynamic torus. Black hole is defined to be a dangerous stationary node which has the capability to destroy any number of incoming agents without leaving any trace of its existence. A torus of size $n\times m$ ($3\leq n \leq m$) is a collection of $n$ row rings and $m$ column rings, and the dynamicity is such that each ring is considered to be 1-interval connected, i.e., in other words at most one edge can be missing from each ring at any round. The parameters which define the efficiency of any black hole search algorithm are: the number of agents and the number of rounds (or \textit{time}) for termination. We consider two initial configurations of mobile agents: first, the agents are co-located and second, the agents are scattered. In each case, we establish lower and upper bounds on the number of agents and on the amount of time required to solve the black hole search problem.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Black Hole Search in Dynamic Cactus Graph
Authors:
Adri Bhattacharya,
Giuseppe F. Italiano,
Partha Sarathi Mandal
Abstract:
We study the problem of black hole search by a set of mobile agents, where the underlying graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates any visiting agent without leaving any trace behind. Key parameters that dictate the complexity of finding the black hole include: the number of agents required (termed as \textit{size}), the number of moves performed b…
▽ More
We study the problem of black hole search by a set of mobile agents, where the underlying graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates any visiting agent without leaving any trace behind. Key parameters that dictate the complexity of finding the black hole include: the number of agents required (termed as \textit{size}), the number of moves performed by the agents in order to determine the black hole location (termed as \textit{move}) and the \textit{time} (or round) taken to terminate. This problem has already been studied where the underlying graph is a dynamic ring \cite{di2021black}. In this paper, we extend the same problem to a dynamic cactus. We introduce two categories of dynamicity, but still the underlying graph needs to be connected: first, we examine the scenario where, at most, one dynamic edge can disappear or reappear at any round. Secondly, we consider the problem for at most $k$ dynamic edges. In both scenarios, we establish lower and upper bounds for the necessary number of agents, moves and rounds.
△ Less
Submitted 18 November, 2023;
originally announced November 2023.
-
Uniform Partitioning of a Bounded Region using Opaque ASYNC Luminous Mobile Robots
Authors:
Subhajit Pramanick,
Saswata Jana,
Adri Bhattacharya,
Partha Sarathi Mandal
Abstract:
We are given $N$ autonomous mobile robots inside a bounded region. The robots are opaque which means that three collinear robots are unable to see each other as one of the robots acts as an obstruction for the other two. They operate in classical \emph{Look-Compute-Move} (LCM) activation cycles. Moreover, the robots are oblivious except for a persistent light (which is why they are called \emph{Lu…
▽ More
We are given $N$ autonomous mobile robots inside a bounded region. The robots are opaque which means that three collinear robots are unable to see each other as one of the robots acts as an obstruction for the other two. They operate in classical \emph{Look-Compute-Move} (LCM) activation cycles. Moreover, the robots are oblivious except for a persistent light (which is why they are called \emph{Luminous robots}) that can determine a color from a fixed color set. Obliviousness does not allow the robots to remember any information from past activation cycles. The Uniform Partitioning problem requires the robots to partition the whole region into sub-regions of equal area, each of which contains exactly one robot. Due to application-oriented motivation, we, in this paper consider the region to be well-known geometric shapes such as rectangle, square and circle. We investigate the problem in \emph{asynchronous} setting where there is no notion of common time and any robot gets activated at any time with a fair assumption that every robot needs to get activated infinitely often. To the best of our knowledge, this is the first attempt to study the Uniform Partitioning problem using oblivious opaque robots working under asynchronous settings. We propose three algorithms considering three different regions: rectangle, square and circle. The algorithms proposed for rectangular and square regions run in $O(N)$ epochs whereas the algorithm for circular regions runs in $O(N^2)$ epochs, where an epoch is the smallest unit of time in which all robots are activated at least once and execute their LCM cycles. The algorithms for the rectangular, square and circular regions require $2$ (which is optimal), $5$ and $8$ colors, respectively.
△ Less
Submitted 1 May, 2024; v1 submitted 8 November, 2023;
originally announced November 2023.
-
Pebble guided Treasure Hunt in Plane
Authors:
Adri Bhattacharya,
Barun Gorain,
Partha Sarathi Mandal
Abstract:
We study the problem of treasure hunt in a Euclidean plane by a mobile agent with the guidance of pebbles. The initial position of the agent and position of the treasure are modeled as special points in the Euclidean plane. The treasure is situated at a distance at most $D>0$ from the initial position of the agent. The agent has a perfect compass, but an adversary controls the speed of the agent.…
▽ More
We study the problem of treasure hunt in a Euclidean plane by a mobile agent with the guidance of pebbles. The initial position of the agent and position of the treasure are modeled as special points in the Euclidean plane. The treasure is situated at a distance at most $D>0$ from the initial position of the agent. The agent has a perfect compass, but an adversary controls the speed of the agent. Hence, the agent can not measure how much distance it traveled for a given time. The agent can find the treasure only when it reaches the exact position of the treasure. The cost of the treasure hunt is defined as the total distance traveled by the agent before it finds the treasure. The agent has no prior knowledge of the position of the treasure or the value of $D$. An Oracle, which knows the treasure's position and the agent's initial location, places some pebbles to guide the agent towards the treasure. Once decided to move along some specified angular direction, the agent can decide to change its direction only when it encounters a pebble or a special point.
We ask the following central question in this paper:
``For given $k \ge 0$, What is cheapest treasure hunt algorithm if at most $k$ pebbles are placed by the Oracle?"
We show that for $k=1$, there does not exist any treasure hunt algorithm that finds the treasure with finite cost. We show the existence of an algorithm with cost $O(D)$ for $k=2$. For $k>8$ we have designed an algorithm that uses $k$ many pebbles to find the treasure with cost $O(k^{2}) + D(\sinθ' + \cosθ')$, where $θ'=\fracπ{2^{k-8}}$. The second result shows the existence of an algorithm with cost arbitrarily close to $D$ for sufficiently large values of $D$.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Approximation Algorithms for Drone Delivery Scheduling Problem
Authors:
Saswata Jana,
Partha Sarathi Mandal
Abstract:
The coordination among drones and ground vehicles for last-mile delivery has gained significant interest in recent years. In this paper, we study \textit{multiple drone delivery scheduling problem(MDSP) \cite{Betti_ICDCN22} for last-mile delivery, where we have a set of drones with an identical battery budget and a set of delivery locations, along with reward or profit for delivery, cost and deliv…
▽ More
The coordination among drones and ground vehicles for last-mile delivery has gained significant interest in recent years. In this paper, we study \textit{multiple drone delivery scheduling problem(MDSP) \cite{Betti_ICDCN22} for last-mile delivery, where we have a set of drones with an identical battery budget and a set of delivery locations, along with reward or profit for delivery, cost and delivery time intervals. The objective of the MDSP is to find a collection of conflict-free schedules for each drone such that the total profit for delivery is maximum subject to the battery constraint of the drones. Here we propose a fully polynomial time approximation scheme (FPTAS) for the single drone delivery scheduling problem (SDSP) and a $\frac{1}{4}$-approximation algorithm for MDSP with a constraint on the number of drones.
△ Less
Submitted 12 November, 2022;
originally announced November 2022.
-
Treasure Hunt in Graph using Pebbles
Authors:
Adri Bhattacharya,
Barun Gorain,
Partha Sarathi Mandal
Abstract:
In this paper, we study the treasure hunt problem in a graph by a mobile agent. The nodes in the graph $G=(V,E)$ are anonymous and the edges incident to a vertex $v\in V$ whose degree is $deg(v)$ are labeled arbitrarily as $0,1,\ldots, deg(v)-1$. At a node $t$ in $G$ a stationary object, called {\it treasure} is located. The mobile agent that is initially located at a node $s$ in $G$, the starting…
▽ More
In this paper, we study the treasure hunt problem in a graph by a mobile agent. The nodes in the graph $G=(V,E)$ are anonymous and the edges incident to a vertex $v\in V$ whose degree is $deg(v)$ are labeled arbitrarily as $0,1,\ldots, deg(v)-1$. At a node $t$ in $G$ a stationary object, called {\it treasure} is located. The mobile agent that is initially located at a node $s$ in $G$, the starting point of the agent, must find the treasure by reaching the node $t$. The distance from $s$ to $t$ is $D$. The {\it time} required to find the treasure is the total number of edges the agent visits before it finds the treasure. The agent does not have any prior knowledge about the graph or the position of the treasure. An oracle, that knows the graph, the initial position of the agent, and the position of the treasure, places some pebbles on the nodes, at most one per node, of the graph to guide the agent towards the treasure.
This paper aims to study the trade-off between the number of pebbles provided and the time required to find the treasure. To be specific, we aim to answer the following question. ``What is the minimum time for treasure hunt in a graph with maximum degree $Δ$ and diameter $D$ if $k$ pebbles are placed? "
We answer the above question when $k<D$ or $k=cD$ for some positive integer $c$. We design efficient algorithms for the agent for different values of $k$. We also propose an almost matching lower bound result for $k<D$.
△ Less
Submitted 2 September, 2022;
originally announced September 2022.
-
Approximation Algorithms for Drone Delivery Packing Problem
Authors:
Saswata Jana,
Partha Sarathi Mandal
Abstract:
Recent advancements in unmanned aerial vehicles, also known as drones, have motivated logistics to use drones for multiple operations. Collaboration between drones and trucks in a last-mile delivery system has numerous benefits and reduces a number of challenges. In this paper, we introduce \textit{drone-delivery packing problem} (DDP), where we have a set of deliveries and respective customers wi…
▽ More
Recent advancements in unmanned aerial vehicles, also known as drones, have motivated logistics to use drones for multiple operations. Collaboration between drones and trucks in a last-mile delivery system has numerous benefits and reduces a number of challenges. In this paper, we introduce \textit{drone-delivery packing problem} (DDP), where we have a set of deliveries and respective customers with their prescribed locations, delivery time intervals, associated cost for deliveries, and a set of drones with identical battery budgets. The objective of the DDP is to find an assignment for all deliveries to the drones by using the minimum number of drones subject to the battery budget and compatibility of the assignment of each drone. We prove that DDP is NP-Hard and formulate the integer linear programming (ILP) formulation for it. We proposed two greedy approximation algorithms for DDP. The first algorithm uses at most $2OPT + (Δ+ 1)$ drones. The second algorithm uses at most $2OPT + ω$ drones, where OPT is the optimum solution for DDP, $ω$ is the maximum clique size, and $Δ$ is the maximum degree of the interval graph $G$ constructed from the delivery time intervals.
△ Less
Submitted 30 August, 2022;
originally announced August 2022.
-
Collaborative Dispersion by Silent Robots
Authors:
Barun Gorain,
Partha Sarathi Mandal,
Kaushik Mondal,
Supantha Pandit
Abstract:
In the dispersion problem, a set of $k$ co-located mobile robots must relocate themselves in distinct nodes of an unknown network. The network is modeled as an anonymous graph $G=(V,E)$, where the nodes of the graph are not labeled. The edges incident to a node $v$ with degree $d$ are labeled with port numbers in the range $0,1, \cdots, d-1$ at $v$. The robots have unique ids in the range $[0,L]$,…
▽ More
In the dispersion problem, a set of $k$ co-located mobile robots must relocate themselves in distinct nodes of an unknown network. The network is modeled as an anonymous graph $G=(V,E)$, where the nodes of the graph are not labeled. The edges incident to a node $v$ with degree $d$ are labeled with port numbers in the range $0,1, \cdots, d-1$ at $v$. The robots have unique ids in the range $[0,L]$, where $L \ge k$, and are initially placed at a source node $s$. Each robot knows only its own id but does not know the ids of the other robots or the values of $L,k$. The task of dispersion was traditionally achieved with the assumption of two types of communication abilities: (a) when some robots are at the same node, they can communicate by exchanging messages between them (b) any two robots in the network can exchange messages between them.
In this paper, we ask whether this ability of communication among co-located robots is necessary to achieve dispersion. We show that even if the ability of communication is not available, the task of dispersion by a set of mobile robots can be achieved in a much weaker model where a robot at a node $v$ has the access of following very restricted information at the beginning of any round: (1) am I alone at $v$? (2) the number of robots at $v$ increased or decreased compare to the previous round?
We propose a deterministic algorithm that achieves dispersion on any given graph $G=(V,E)$ in time $O\left( k\log L+k^2 \log Δ\right)$, where $Δ$ is the maximum degree of a node in $G$. Each robot uses $O(\log L+ \log Δ)$ additional memory. We also prove that the task of dispersion cannot be achieved by a set of mobile robots with $o(\log L + \log Δ)$ additional memory.
△ Less
Submitted 11 February, 2022;
originally announced February 2022.
-
Filling MIS Vertices by Myopic Luminous Robots
Authors:
Subhajit Pramanick,
Sai Vamshi Samala,
Debasish Pattanayak,
Partha Sarathi Mandal
Abstract:
We present the problem of finding a maximal independent set (MIS) (named as \emph{MIS Filling problem}) of an arbitrary connected graph having $n$ vertices with luminous myopic mobile robots. The robots enter the graph one after another from a particular vertex called the \emph{Door} and disperse along the edges of the graph without collision to occupy vertices such that the set of vertices occupi…
▽ More
We present the problem of finding a maximal independent set (MIS) (named as \emph{MIS Filling problem}) of an arbitrary connected graph having $n$ vertices with luminous myopic mobile robots. The robots enter the graph one after another from a particular vertex called the \emph{Door} and disperse along the edges of the graph without collision to occupy vertices such that the set of vertices occupied by the robots is a maximal independent set. We assume the robots have knowledge only about the maximum degree of the graph, denoted by $Δ$.
In this paper, we explore two versions of the problem: the solution to the first version, named as \emph{MIS Filling with Single Door}, works under an asynchronous scheduler using robots with 3 hops of visibility range, $Δ+ 6$ number of colors and $O(\log Δ)$ bits of persistent storage. The time complexity is measured in terms of epochs and it can be solved in $O(n^2)$ epochs. An epoch is the smallest time interval in which each participating robot gets activated and executes the algorithm at least once. For the second version with $k~ ( > 1)$ \textit{Doors}, named as \emph{MIS Filling with Multiple Doors}, the solution works under a semi-synchronous scheduler using robots with 5 hops of visibility range, $Δ+ k + 6$ number of colors and $O(\log (Δ+ k))$ bits of persistent storage. The problem with multiple Doors can be solved in $O(n^2)$ epochs.
△ Less
Submitted 15 October, 2022; v1 submitted 10 July, 2021;
originally announced July 2021.
-
Fort Formation by an Automaton
Authors:
Kartikey Kant,
Debasish Pattanayak,
Partha Sarathi Mandal
Abstract:
Building structures by low capability robots is a very recent research development. A robot (or a mobile agent) is designed as a deterministic finite automaton. The objective is to make a structure from a given distribution of materials (\textit{bricks}) in an infinite grid $Z\times Z$. The grid cells may contain a brick (\textit{full cells}) or it may be empty (\textit{empty cells}). The \textit{…
▽ More
Building structures by low capability robots is a very recent research development. A robot (or a mobile agent) is designed as a deterministic finite automaton. The objective is to make a structure from a given distribution of materials (\textit{bricks}) in an infinite grid $Z\times Z$. The grid cells may contain a brick (\textit{full cells}) or it may be empty (\textit{empty cells}). The \textit{field}, a sub-graph induced by the full cells, is initially connected. At a given point in time, a robot can carry at most one brick. The robot can move in four directions (north, east, south, and west) and starts from a \textit{full cell}. The \textit{Manhattan distance} between the farthest full cells is the \textit{span} of the field.
We consider the construction of a \textit{fort}, a structure with the minimum span and maximum covered area. On a square grid, a fort is a hollow rectangle with bricks on the perimeter. We show that the construction of such a fort can be done in $O(z^2)$ time -- with a matching lower bound $Ω(z^2)$ -- where $z$ is the number of bricks present in the environment.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
A Distributed Algorithm for Overlapped Community Detection in Large-Scale Networks
Authors:
Dibakar Saha,
Partha Sarathi Mandal
Abstract:
Overlapped community detection in social networks has become an important research area with the increasing popularity and complexity of the networks. Most of the existing solutions are either centralized or parallel algorithms, which are computationally intensive - require complete knowledge of the entire networks. But it isn't easy to collect entire network data because the size of the actual ne…
▽ More
Overlapped community detection in social networks has become an important research area with the increasing popularity and complexity of the networks. Most of the existing solutions are either centralized or parallel algorithms, which are computationally intensive - require complete knowledge of the entire networks. But it isn't easy to collect entire network data because the size of the actual networks may be prohibitively large. This may be a result of either privacy concerns or technological impediments. Performing in-network computation solves both problems utilizing the computational capability of the individual nodes of the network. Simultaneously, nodes communicate and share data with their neighbors via message passing, which may go a long way toward mitigating individual nodes' privacy concerns in the network. All the aforementioned concerns motivated us to design a decentralized or distributed technique to detect overlapped communities in a large-scale network. It is desirable because this technique does not offer a single point of failure, and the system as a whole can continue to function even when many of the nodes fail. In this paper, we address the overlapped community detection problem for large-scale networks. We present an efficient distributed algorithm, named DOCD, to identify the overlapped communities in the network. The DOCD algorithm's efficiency is verified with extensive simulation study on real network data such as Dolphin, Zachary karate club, Football club, and Facebook ego networks. We show that DOCD algorithm is capable of kee** the asymptotically same results with the existing classical centralized algorithms in terms of community modularity and the number of identified communities. The DOCD algorithm can also efficiently identify the overlapped nodes and overlapped communities with a small number of rounds of communication and computation.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Magnetization relaxation and search for the magnetic gap in bulk-insulating V-doped (Bi, Sb)$_2$Te$_3$
Authors:
E. Golias,
E. Weschke,
T. Flanagan,
E. Schierle,
A. Richardella,
E. D. L. Rienks,
P. S. Mandal,
A. Varykhalov,
J. Sánchez-Barriga,
F. Radu,
N. Samarth,
O. Rader
Abstract:
V-doped (Bi,Sb)$_2$Te$_3$ has a ten times higher magnetic coercivity than its Cr-doped counterpart and therefore is believed to be a superior system for the quantum anomalous Hall effect (QAHE). The QAHE requires the opening of a magnetic band gap at the Dirac point. We do not find this gap by angle-resolved photoelectron spectroscopy down to 1 K. By x-ray magnetic circular dichroism (XMCD) we dir…
▽ More
V-doped (Bi,Sb)$_2$Te$_3$ has a ten times higher magnetic coercivity than its Cr-doped counterpart and therefore is believed to be a superior system for the quantum anomalous Hall effect (QAHE). The QAHE requires the opening of a magnetic band gap at the Dirac point. We do not find this gap by angle-resolved photoelectron spectroscopy down to 1 K. By x-ray magnetic circular dichroism (XMCD) we directly probe the magnetism at the V site and in zerofield. Hysteresis curves of the XMCD signal show a strong dependence of the coercivity on the ram** velocity of the magnetic field. The XMCD signal decays on a time scale of minutes which we conclude contributes to the absence of a detectable magnetic gap at the Dirac point.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
Conic Formation in Presence of Faulty Robots
Authors:
Debasish Pattanayak,
Klaus-Tycho Foerster,
Partha Sarathi Mandal,
Stefan Schmid
Abstract:
Pattern formation is one of the most fundamental problems in distributed computing, which has recently received much attention. In this paper, we initiate the study of distributed pattern formation in situations when some robots can be \textit{faulty}. In particular, we consider the well-established \textit{look-compute-move} model with oblivious, anonymous robots. We first present lower bounds an…
▽ More
Pattern formation is one of the most fundamental problems in distributed computing, which has recently received much attention. In this paper, we initiate the study of distributed pattern formation in situations when some robots can be \textit{faulty}. In particular, we consider the well-established \textit{look-compute-move} model with oblivious, anonymous robots. We first present lower bounds and show that any deterministic algorithm takes at least two rounds to form simple patterns in the presence of faulty robots. We then present distributed algorithms for our problem which match this bound, \textit{for conic sections}: in at most two rounds, robots form lines, circles and parabola tolerating $f=2,3$ and $4$ faults, respectively. For $f=5$, the target patterns are parabola, hyperbola and ellipse. We show that the resulting pattern includes the $f$ faulty robots in the pattern of $n$ robots, where $n \geq 2f+1$, and that $f < n < 2f+1$ robots cannot form such patterns. We conclude by discussing several relaxations and extensions.
△ Less
Submitted 27 August, 2020; v1 submitted 4 March, 2020;
originally announced March 2020.
-
Randomized Gathering of Asynchronous Mobile Robots
Authors:
Debasish Pattanayak,
John Augustine,
Partha Sarathi Mandal
Abstract:
This paper revisits the widely researched \textit{gathering} problem for two robots in a scenario which allows randomization in the asynchronous scheduling model. The scheduler is considered to be the adversary which determines the activation schedule of the robots. The adversary comes in two flavors, namely, oblivious and adaptive, based on the knowledge of the outcome of random bits. The robots…
▽ More
This paper revisits the widely researched \textit{gathering} problem for two robots in a scenario which allows randomization in the asynchronous scheduling model. The scheduler is considered to be the adversary which determines the activation schedule of the robots. The adversary comes in two flavors, namely, oblivious and adaptive, based on the knowledge of the outcome of random bits. The robots follow \textit{wait-look-compute-move} cycle.
In this paper, we classify the problems based on the capability of the adversary to control the parameters such as wait time, computation delay and the speed of robots and check the feasibility of gathering in terms of adversarial knowledge and capabilities. The main contributions include the possibility of gathering for an oblivious adversary with (i) zero computation delay; (ii) the sum of wait time and computation delay is more than a positive value. We complement the possibilities with an impossibility.
We show that it is impossible for the robots to gather against an adaptive adversary with non-negative wait time and non-negative computation delay. Finally, we also extend our algorithm for multiple robots with merging.
△ Less
Submitted 22 September, 2019;
originally announced September 2019.
-
Chauffeuring a Crashed Robot from a Disk
Authors:
Debasish Pattanayak,
H. Ramesh,
Partha Sarathi Mandal
Abstract:
Evacuation of robots from a disk has attained a lot of attention recently. We visit the problem from the perspective of fault-tolerance. We consider two robots trying to evacuate from a disk via a single hidden exit on the perimeter of the disk. The robots communicate wirelessly. The robots are susceptible to crash faults after which they stop moving and communicating. We design the algorithms for…
▽ More
Evacuation of robots from a disk has attained a lot of attention recently. We visit the problem from the perspective of fault-tolerance. We consider two robots trying to evacuate from a disk via a single hidden exit on the perimeter of the disk. The robots communicate wirelessly. The robots are susceptible to crash faults after which they stop moving and communicating. We design the algorithms for tolerating one fault. The objective is to minimize the worst-case time required to evacuate both the robots from the disk. When the non-faulty robot chauffeurs the crashed robot, it takes $α\geq 1$ amount of time to travel unit distance. With this, we also provide a lower bound for the evacuation time. Further, we evaluate the worst-case of the algorithms for different values of $α$ and the crash time.
△ Less
Submitted 7 June, 2019;
originally announced June 2019.
-
Large magnetic gap at the Dirac point in a Mn-induced Bi$_2$Te$_3$ heterostructure
Authors:
E. D. L. Rienks,
S. Wimmer,
P. S. Mandal,
O. Caha,
J. Růžička,
A. Ney,
H. Steiner,
V. V. Volobuev,
H. Groiss,
M. Albu,
S. A. Khan,
J. Minár,
H. Ebert,
G. Bauer,
A. Varykhalov,
J. Sánchez-Barriga,
O. Rader,
G. Springholz
Abstract:
Magnetically doped topological insulators enable the quantum anomalous Hall effect (QAHE) which provides quantized edge states for lossless charge transport applications. The edge states are hosted by a magnetic energy gap at the Dirac point but all attempts to observe it directly have been unsuccessful. The gap size is considered crucial to overcoming the present limitations of the QAHE, which so…
▽ More
Magnetically doped topological insulators enable the quantum anomalous Hall effect (QAHE) which provides quantized edge states for lossless charge transport applications. The edge states are hosted by a magnetic energy gap at the Dirac point but all attempts to observe it directly have been unsuccessful. The gap size is considered crucial to overcoming the present limitations of the QAHE, which so far occurs only at temperatures one to two orders of magnitude below its principle limit set by the ferromagnetic Curie temperature $T_C$. Here, we use low temperature photoelectron spectroscopy to unambiguously reveal the magnetic gap of Mn-doped Bi$_2$Te$_3$ films, which is present only below $T_C$. Surprisingly, the gap turns out to be $\sim$90 meV wide, which not only exceeds $k_BT$ at room temperature but is also 5 times larger than predicted by density functional theory. By an exhaustive multiscale structure characterization we show that this enhancement is due to a remarkable structure modification induced by Mn do**. Instead of a disordered impurity system, it forms an alternating sequence of septuple and quintuple layer blocks, where Mn is predominantly incorporated in the septuple layers. This self-organized heterostructure substantially enhances the wave-function overlap and the size of the magnetic gap at the Dirac point, as recently predicted. Mn-doped Bi$_2$Se$_3$ forms a similar heterostructure, however, only a large, nonmagnetic gap is formed. We explain both differences based on the higher spin-orbit interaction in Bi$_2$Te$_3$ with the most important consequence of a magnetic anisotropy perpendicular to the films, whereas for Bi$_2$Se$_3$ the spin-orbit interaction it is too weak to overcome the dipole-dipole interaction. Our findings provide crucial insights for pushing the lossless transport properties of topological insulators towards room-temperature applications.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Evacuating Two Robots from Two Unknown Exits on the Perimeter of a Disk
Authors:
Debasish Pattanayak,
H. Ramesh,
Partha Sarathi Mandal,
Stefan Schmid
Abstract:
Distributed evacuation of mobile robots is a recent development. We consider the evacuation problem of two robots which are initially located at the center of a unit disk. Both the robots have to evacuate the disk through the exits situated on the perimeter of the disk at an unknown location. The distance between two exits along the perimeter $d$ is given. We consider two different communication m…
▽ More
Distributed evacuation of mobile robots is a recent development. We consider the evacuation problem of two robots which are initially located at the center of a unit disk. Both the robots have to evacuate the disk through the exits situated on the perimeter of the disk at an unknown location. The distance between two exits along the perimeter $d$ is given. We consider two different communication models. First, in the wireless model, the robots can send a message to each other over a long distance. Second, in face-to-face communication model, the robots can exchange information with each other only when they touch each other. The objective of the evacuation problem is to design an algorithm which minimizes the evacuation time of both the robots. For the wireless communication model, we propose a generic algorithm for two robots moving to two points on the perimeter with an initial separation of $ζ\leq d$. We also investigate evacuation problem for both unlabeled and labeled exits in the wireless communication model. For the face-to-face communication model, we propose two different algorithms for $ζ=0$ and $ζ=d$ for unlabeled exits. We also propose a generic algorithm for $ζ\leq d$ for labeled exits. We provide lower bounds corresponding to different $d$ values in the face-to-face communication model. We evaluate the performance our algorithms with simulation for both of the communication models.
△ Less
Submitted 12 August, 2017;
originally announced August 2017.
-
Approximation Algorithms for Barrier Sweep Coverage
Authors:
Barun Gorain,
Partha Sarathi Mandal
Abstract:
Time-varying coverage, namely sweep coverage is a recent development in the area of wireless sensor networks, where a small number of mobile sensors sweep or monitor comparatively large number of locations periodically. In this article we study barrier sweep coverage with mobile sensors where the barrier is considered as a finite length continuous curve on a plane. The coverage at every point on t…
▽ More
Time-varying coverage, namely sweep coverage is a recent development in the area of wireless sensor networks, where a small number of mobile sensors sweep or monitor comparatively large number of locations periodically. In this article we study barrier sweep coverage with mobile sensors where the barrier is considered as a finite length continuous curve on a plane. The coverage at every point on the curve is time-variant. We propose an optimal solution for sweep coverage of a finite length continuous curve. Usually energy source of a mobile sensor is battery with limited power, so energy restricted sweep coverage is a challenging problem for long running applications. We propose an energy restricted sweep coverage problem where every mobile sensors must visit an energy source frequently to recharge or replace its battery. We propose a $\frac{13}{3}$-approximation algorithm for this problem. The proposed algorithm for multiple curves achieves the best possible approximation factor 2 for a special case. We propose a 5-approximation algorithm for the general problem. As an application of the barrier sweep coverage problem for a set of line segments, we formulate a data gathering problem. In this problem a set of mobile sensors is arbitrarily monitoring the line segments one for each. A set of data mules periodically collects the monitoring data from the set of mobile sensors. We prove that finding the minimum number of data mules to collect data periodically from every mobile sensor is NP-hard and propose a 3-approximation algorithm to solve it.
△ Less
Submitted 8 April, 2017;
originally announced April 2017.
-
Negative longitudinal magnetoresistance from anomalous N=0 Landau level in topological materials
Authors:
B. A. Assaf,
T. Phuphachong,
E. Kampert,
V. V. Volobuev,
P. S. Mandal,
J. Sánchez-Barriga,
O. Rader,
G. Bauer,
G. Springholz,
L. A. de Vaulchier,
Y. Guldner
Abstract:
Negative longitudinal magnetoresistance (NLMR) is shown to occur in topological materials in the extreme quantum limit, when a magnetic field is applied parallel to the excitation current. We perform pulsed and DC field measurements on Pb1-xSnxSe epilayers where the topological state can be chemically tuned. The NLMR is observed in the topological state, but is suppressed and becomes positive when…
▽ More
Negative longitudinal magnetoresistance (NLMR) is shown to occur in topological materials in the extreme quantum limit, when a magnetic field is applied parallel to the excitation current. We perform pulsed and DC field measurements on Pb1-xSnxSe epilayers where the topological state can be chemically tuned. The NLMR is observed in the topological state, but is suppressed and becomes positive when the system becomes trivial. In a topological material, the lowest N=0 conduction Landau level disperses down in energy as a function of increasing magnetic field, while the N=0 valence Landau level disperses upwards. This anomalous behavior is shown to be responsible for the observed NLMR. Our work provides an explanation of the outstanding question of NLMR in topological insulators and establishes this effect as a possible hallmark of bulk conduction in topological matter.
△ Less
Submitted 11 August, 2017; v1 submitted 6 April, 2017;
originally announced April 2017.
-
Convergence of Even Simpler Robots without Location Information
Authors:
Debasish Pattanayak,
Kaushik Mondal,
Partha Sarathi Mandal,
Stefan Schmid
Abstract:
The design of distributed gathering and convergence algorithms for tiny robots has recently received much attention. In particular, it has been shown that convergence problems can even be solved for very weak, \emph{oblivious} robots: robots which cannot maintain state from one round to the next. The oblivious robot model is hence attractive from a self-stabilization perspective, where state is su…
▽ More
The design of distributed gathering and convergence algorithms for tiny robots has recently received much attention. In particular, it has been shown that convergence problems can even be solved for very weak, \emph{oblivious} robots: robots which cannot maintain state from one round to the next. The oblivious robot model is hence attractive from a self-stabilization perspective, where state is subject to adversarial manipulation. However, to the best of our knowledge, all existing robot convergence protocols rely on the assumption that robots, despite being "weak", can measure distances.
We in this paper initiate the study of convergence protocols for even simpler robots, called \emph{monoculus robots}: robots which cannot measure distances. In particular, we introduce two natural models which relax the assumptions on the robots' cognitive capabilities: (1) a Locality Detection ($\mathcal{LD}$) model in which a robot can only detect whether another robot is closer than a given constant distance or not, (2) an Orthogonal Line Agreement ($\mathcal{OLA}$) model in which robots only agree on a pair of orthogonal lines (say North-South and West-East, but without knowing which is which).
The problem turns out to be non-trivial, and simple median and angle bisection strategies can easily increase the distances among robots (e.g., the area of the enclosing convex hull) over time. Our main contribution are deterministic self-stabilizing convergence algorithms for these two models, together with a complexity analysis. We also show that in some sense, the assumptions made in our models are minimal: by relaxing the assumptions on the \textit{monoculus robots} further, we run into impossibility results.
△ Less
Submitted 21 August, 2016;
originally announced August 2016.
-
Fault-Tolerant Gathering of Mobile Robots with Weak Multiplicity Detection
Authors:
Debasish Pattanayak,
Kaushik Mondal,
H. Ramesh,
Partha Sarathi Mandal
Abstract:
There has been a wide interest in designing distributed algorithms for tiny robots. In particular, it has been shown that the robots can complete certain tasks even in the presence of faulty robots. In this paper, we focus on gathering of all non-faulty robots at a single point in presence of faulty robots. We propose a wait-free algorithm (i.e., no robot waits for other robot and algorithm instru…
▽ More
There has been a wide interest in designing distributed algorithms for tiny robots. In particular, it has been shown that the robots can complete certain tasks even in the presence of faulty robots. In this paper, we focus on gathering of all non-faulty robots at a single point in presence of faulty robots. We propose a wait-free algorithm (i.e., no robot waits for other robot and algorithm instructs each robot to move in every step, unless it is already at the gathering location), that gathers all non-faulty robots in semi-synchronous model without any agreement in the coordinate system and with weak multiplicity detection (i.e., a robot can only detect that either there is one or more robot at a location) in the presence of at most $n-1$ faulty robots for $n\geqslant 3$. We show that the required capability for gathering robots is minimal in the above model, since relaxing it further makes gathering impossible to solve.
Also, we introduce an intermediate scheduling model \textit{ASYNC$_{IC}$} between the asynchronous ( i.e., no instantaneous movement or computation) and the semi-synchronous (i.e., both instantaneous movement and computation) as the asynchronous model with instantaneous computation. Then we propose another algorithm in \textit{ASYNC$_{IC}$} model for gathering all non-faulty robots with weak multiplicity detection without any agreement on the coordinate system in the presence of at most $\lfloor n/2\rfloor-2$ faulty robots for $n\geqslant 7$.
△ Less
Submitted 8 August, 2016;
originally announced August 2016.
-
Designing Path Planning Algorithms for Mobile Anchor towards Range-Free Localization
Authors:
Kaushik Mondal,
Arindam Karmakar,
Partha Sarathi Mandal
Abstract:
Localization is one of the most important factor in wireless sensor networks as many applications demand position information of sensors. Recently there is an increasing interest on the use of mobile anchors for localizing sensors. Most of the works available in the literature either looks into the aspect of reducing path length of mobile anchor or tries to increase localization accuracy. The chal…
▽ More
Localization is one of the most important factor in wireless sensor networks as many applications demand position information of sensors. Recently there is an increasing interest on the use of mobile anchors for localizing sensors. Most of the works available in the literature either looks into the aspect of reducing path length of mobile anchor or tries to increase localization accuracy. The challenge is to design a movement strategy for a mobile anchor that reduces path length while meeting the requirements of a good range-free localization technique. In this paper we propose two cost-effective movement strategies i.e., path planning for a mobile anchor so that localization can be done using the localization scheme \cite{Lee2009}. In one strategy we use a hexagonal movement pattern for the mobile anchor to localize all sensors inside a bounded rectangular region with lesser movement compared to the existing works in literature. In other strategy we consider a connected network in an unbounded region where the mobile anchor moves in the hexagonal pattern to localize the sensors. In this approach, we guarantee localization of all sensors within $r/2$ error-bound where $r$ is the communication range of the mobile anchor and sensors. Our simulation results support theoretical results along with localization accuracy.
△ Less
Submitted 30 August, 2014;
originally announced September 2014.
-
Optimal Covering with Mobile Sensors in an Unbounded Region
Authors:
Barun Gorain,
Partha Sarathi Mandal
Abstract:
Covering a bounded region with minimum number of homogeneous sensor nodes is a NP-complete problem \cite{Li09}. In this paper we have proposed an {\it id} based distributed algorithm for optimal coverage in an unbounded region. The proposed algorithm guarantees maximum spreading in $O(\sqrt{n})$ rounds without creating any coverage hole. The algorithm executes in synchronous rounds without exchang…
▽ More
Covering a bounded region with minimum number of homogeneous sensor nodes is a NP-complete problem \cite{Li09}. In this paper we have proposed an {\it id} based distributed algorithm for optimal coverage in an unbounded region. The proposed algorithm guarantees maximum spreading in $O(\sqrt{n})$ rounds without creating any coverage hole. The algorithm executes in synchronous rounds without exchanging any message.
We have also explained how our proposed algorithm can achieve optimal energy consumption and handle random sensor node deployment for optimal spreading.
△ Less
Submitted 1 November, 2012;
originally announced November 2012.
-
Fixing Data Anomalies with Prediction Based Algorithm in Wireless Sensor Networks
Authors:
Abhishek Kr. Singh,
Bollibisai Giridhar,
Partha Sarathi Mandal
Abstract:
Data inconsistencies are present in the data collected over a large wireless sensor network (WSN), usually deployed for any kind of monitoring applications. Before passing this data to some WSN applications for decision making, it is necessary to ensure that the data received are clean and accurate. In this paper, we have used a statistical tool to examine the past data to fit in a highly sophisti…
▽ More
Data inconsistencies are present in the data collected over a large wireless sensor network (WSN), usually deployed for any kind of monitoring applications. Before passing this data to some WSN applications for decision making, it is necessary to ensure that the data received are clean and accurate. In this paper, we have used a statistical tool to examine the past data to fit in a highly sophisticated prediction model i.e., ARIMA for a given sensor node and with this, the model corrects the data using forecast value if any data anomaly exists there. Another scheme is also proposed for detecting data anomaly at sink among the aggregated data in the data are received from a particular sensor node. The effectiveness of our methods are validated by data collected over a real WSN application consisting of Crossbow IRIS Motes \cite{Crossbow:2009}.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
Secure Position Verification for Wireless Sensor Networks in Noisy Channels
Authors:
Partha Sarathi Mandal,
Anil K. Ghosh
Abstract:
Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations) during the verification stage. In the literature of WSNs, most of the existing methods of position verification have used trusted verifiers, which are in fact vulnerable to attacks b…
▽ More
Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations) during the verification stage. In the literature of WSNs, most of the existing methods of position verification have used trusted verifiers, which are in fact vulnerable to attacks by malicious nodes. They also depend on some distance estimation techniques, which are not accurate in noisy channels (mediums). In this article, we propose a secure position verification scheme for WSNs in noisy channels without relying on any trusted entities. Our verification scheme detects and filters out all malicious nodes from the network with very high probability.
△ Less
Submitted 5 May, 2011; v1 submitted 3 May, 2011;
originally announced May 2011.
-
Reconstruction of Aggregation Tree in spite of Faulty Nodes in Wireless Sensor Networks
Authors:
Punit Sharma,
Partha Sarathi Mandal
Abstract:
Recent advances in wireless sensor networks (WSNs) have led to many new promissing applications. However data communication between nodes consumes a large portion of the total energy of WSNs. Consequently efficient data aggregation technique can help greatly to reduce power consumption. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of senso…
▽ More
Recent advances in wireless sensor networks (WSNs) have led to many new promissing applications. However data communication between nodes consumes a large portion of the total energy of WSNs. Consequently efficient data aggregation technique can help greatly to reduce power consumption. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of sensor nodes over {\it aggregation tree} and hence minimizing the overall power consumption in the network. If a sensor node fails during data aggregation then the aggregation tree is disconnected. Hence the WSNs rely on in-network aggregation for efficiency but a single faulty node can severely influence the outcome by contributing an arbitrary partial aggregate value.
In this paper we have presented a distributed algorithm that reconstruct the aggregation tree from the initial aggregation tree excluding the faulty sensor node. This is a synchronous model that is completed in several rounds. Our proposed scheme can handle multiple number of faulty nodes as well.
△ Less
Submitted 5 October, 2010;
originally announced October 2010.
-
Deterministic Secure Positioning in Wireless Sensor Networks
Authors:
Sylvie Delaët,
Partha Sarathi Mandal,
Mariusz Rokicki,
Sébastien Tixeuil
Abstract:
Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identificatio…
▽ More
Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identification of faking sensors in a WSN. Our scheme does \emph{not} rely on a subset of \emph{trusted} nodes that are not allowed to misbehave and are known to every node in the network. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most $\lfloor \frac{n}{2} \rfloor-2$ faking sensors. Also, when the time of flight (ToF) technique is used, our protocol manages at most $\lfloor \frac{n}{2} \rfloor - 3$ misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is $\lceil \frac{n}{2}\rceil -1$. Thus our scheme is almost optimal with respect to the number of faking sensors. We discuss application of our technique in the trusted sensor model. More precisely our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.
△ Less
Submitted 22 October, 2007;
originally announced October 2007.