Skip to main content

Showing 51–100 of 124 results for author: Murthy, R

.
  1. arXiv:2005.11994  [pdf

    cs.HC cs.CV eess.IV

    Eye Gaze Controlled Robotic Arm for Persons with SSMI

    Authors: Vinay Krishna Sharma, L. R. D. Murthy, KamalPreet Singh Saluja, Vimal Mollyn, Gourav Sharma, Pradipta Biswas

    Abstract: Background: People with severe speech and motor impairment (SSMI) often uses a technique called eye pointing to communicate with outside world. One of their parents, caretakers or teachers hold a printed board in front of them and by analyzing their eye gaze manually, their intentions are interpreted. This technique is often error prone and time consuming and depends on a single caretaker. Objec… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: Citation: VK Sharma, KPS Saluja, LRD Murthy, G Sharma and P Biswas, Webcam Controlled Robotic Arm for Persons with SSMI, Technology and Disability 32 (3), IOS Press 2020 [Official journal of EU AAATE association]

    ACM Class: I.4; I.2; H.5.2; K.4

  2. Classification of stroke using Neural Networks in Electrical Impedance Tomography

    Authors: Juan Pablo Agnelli, Aynur Çöl, Matti Lassas, Rashmi Murthy, Matteo Santacesaria, Samuli Siltanen

    Abstract: Electrical Impedance Tomography (EIT) is an emerging non-invasive medical imaging modality. It is based on feeding electrical currents into the patient, measuring the resulting voltages at the skin, and recovering the internal conductivity distribution. The mathematical task of EIT image reconstruction is a nonlinear and ill-posed inverse problem. Therefore any EIT image reconstruction method need… ▽ More

    Submitted 2 September, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Journal ref: Inverse Problems 36 (2020) 115008

  3. Controllability of Linear Dynamical Systems Under Input Sparsity Constraints

    Authors: Geethu Joseph, Chandra R. Murthy

    Abstract: In this work, we consider the controllability of a discrete-time linear dynamical system with sparse control inputs. Sparsity constraints on the input arises naturally in networked systems, where activating each input variable adds to the cost of control. We derive algebraic necessary and sufficient conditions for ensuring controllability of a system with an arbitrary transfer matrix. The derived… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

    Comments: 11 pages

    Journal ref: IEEE Transactions on Automatic Control, 2020

  4. arXiv:1912.11247  [pdf, ps, other

    cs.IT

    Sample-Measurement Tradeoff in Support Recovery under a Subgaussian Prior

    Authors: Lekshmi Ramesh, Chandra R Murthy, Himanshu Tyagi

    Abstract: Data samples from $\mathbb{R}^{d}$ with a common support of size $k$ are accessed through $m$ random linear projections (measurements) per sample. It is well-known that roughly $k$ measurements from a single sample are sufficient to recover the support. In the multiple sample setting, do $k$ overall measurements still suffice when only $m$ measurements per sample are allowed, with $m<k$? We answer… ▽ More

    Submitted 19 September, 2020; v1 submitted 24 December, 2019; originally announced December 2019.

    Comments: A preliminary version of this paper appeared at IEEE International Symposium on Information Theory 2019

  5. arXiv:1911.01212  [pdf, other

    cs.CL cs.LG stat.ML

    Scrambled Translation Problem: A Problem of Denoising UNMT

    Authors: Tamali Banerjee, Rudra Murthy V, Pushpak Bhattacharyya

    Abstract: In this paper, we identify an interesting kind of error in the output of Unsupervised Neural Machine Translation (UNMT) systems like \textit{Undreamt}(footnote). We refer to this error type as \textit{Scrambled Translation problem}. We observe that UNMT models which use \textit{word shuffle} noise (as in case of Undreamt) can generate correct words, but fail to stitch them together to form phrases… ▽ More

    Submitted 17 June, 2021; v1 submitted 30 October, 2019; originally announced November 2019.

    Comments: Accepted by MT Summit 2021

  6. arXiv:1909.08185  [pdf, ps, other

    cs.IT cs.LG eess.SP

    Learned-SBL: A Deep Learning Architecture for Sparse Signal Recovery

    Authors: Rubin Jose Peter, Chandra R. Murthy

    Abstract: In this paper, we present a computationally efficient sparse signal recovery scheme using Deep Neural Networks (DNN). The architecture of the introduced neural network is inspired from sparse Bayesian learning (SBL) and named as Learned-SBL (L-SBL). We design a common architecture to recover sparse as well as block sparse vectors from single measurement vector (SMV) or multiple measurement vectors… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: 13 pages, 22 figures

  7. arXiv:1908.09284  [pdf, ps, other

    math.PR

    Autocorrelation Function Characterization of Continuous Time Markov Chains

    Authors: G. Rama Murthy, Douglas G. Down

    Abstract: We study certain properties of the function space of autocorrelation functions of Unit Continuous Time Markov Chains (CTMCs). It is shown that under particular conditions, the $L^p$ norm of the autocorrelation function of arbitrary finite state space CTMCs is infinite. Several interesting inferences are made for point processes associated with CTMCs/ Discrete Time Markov Chains (DTMCs).

    Submitted 25 August, 2019; originally announced August 2019.

  8. arXiv:1907.05199  [pdf

    physics.med-ph q-bio.MN

    Fundamental Limitations in Biomarker Based Early Disease Diagnosis

    Authors: Tuhin Chakrabortty, Chandra R. Murthy, Manoj Varma

    Abstract: Clinical biosensors with low detection limit hold significant promise in the early diagnosis of debilitating diseases. Recent progress in sensor development has led to the demonstration of detection capable of detecting target molecules even down to single-molecule level. One crucial performance parameter which is not adequately discussed is the issue of measurement fidelity in such sensors. We de… ▽ More

    Submitted 4 December, 2019; v1 submitted 11 July, 2019; originally announced July 2019.

    Comments: 12 pages, 4 figures

  9. The More the Merrier: Enhancing Reliability of 5G Communication Services with Guaranteed Delay

    Authors: Prabhu Kaliyammal Thiruvasagam, Vijeth J Kotagi, C Siva Ram Murthy

    Abstract: Although network functions virtualization and software-defined networking offer many dynamic features such as flexibility, scalability, and programmability for easy provisioning of services at a lesser cost and time through service function chaining, it introduces new challenges in terms of reliability, availability, and latency of services. Particularly, softwarization of network and service func… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: 4 pages, 10 figures

  10. arXiv:1811.00383  [pdf, other

    cs.CL

    Addressing word-order Divergence in Multilingual Neural Machine Translation for extremely Low Resource Languages

    Authors: Rudra Murthy V, Anoop Kunchukuttan, Pushpak Bhattacharyya

    Abstract: Transfer learning approaches for Neural Machine Translation (NMT) train a NMT model on the assisting-target language pair (parent model) which is later fine-tuned for the source-target language pair of interest (child model), with the target language being the same. In many cases, the assisting language has a different word order from the source language. We show that divergent word order adversel… ▽ More

    Submitted 10 April, 2019; v1 submitted 1 November, 2018; originally announced November 2018.

    Comments: Accepted as Short Paper at NAACL 2019

  11. arXiv:1810.10169  [pdf, other

    math.OC

    Exploiting Partial Correlations in Distributionally Robust Optimization

    Authors: Divya Padmanabhan, Karthik Natarajan, Karthyek R. A. Murthy

    Abstract: In this paper, we identify partial correlation information structures that allow for simpler reformulations in evaluating the maximum expected value of mixed integer linear programs with random objective coefficients. To this end, assuming only the knowledge of the mean and the covariance matrix entries restricted to block-diagonal patterns, we develop a reduced semidefinite programming formulatio… ▽ More

    Submitted 23 October, 2018; originally announced October 2018.

  12. arXiv:1801.03813  [pdf, ps, other

    cs.IT

    Energy Harvesting Communications Using Dual Alternating Batteries

    Authors: Rajshekhar Vishweshwar Bhat, Mehul Motani, Chandra R Murthy, Rahul Vaze

    Abstract: Practical energy harvesting (EH) based communication systems typically use a battery to temporarily store the harvested energy prior to its use for communication. The batteries can be damaged when they are repeatedly charged (discharged) after being partially discharged (charged), overcharged or deeply discharged. This motivates the cycle constraint which says that a battery must be charged (disch… ▽ More

    Submitted 18 December, 2018; v1 submitted 11 January, 2018; originally announced January 2018.

    Comments: A single battery case is added and its performance is compared with that of the dual-battery case, with additional simulation results

  13. On the Restricted Isometry of the Columnwise Khatri-Rao Product

    Authors: Saurabh Khanna, Chandra R Murthy

    Abstract: The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the… ▽ More

    Submitted 23 July, 2018; v1 submitted 18 September, 2017; originally announced September 2017.

    Comments: The probabilistic RIC bounds presented as Theorems 2 and 3 in the earlier version (v1 and v2) could be potentially incorrect and have been restated with new proofs in this revised manuscript

  14. arXiv:1706.04442  [pdf, other

    cs.IT

    On Distributed Power Control for Uncoordinated Dual Energy Harvesting Links: Performance Bounds and Near-Optimal Policies

    Authors: Mohit K. Sharma, Chandra R. Murthy, Rahul Vaze

    Abstract: In this paper, we consider a point-to-point link between an energy harvesting transmitter and receiver, where neither node has the information about the battery state or energy availability at the other node. We consider a model where data is successfully delivered only in slots where both nodes are active. Energy loss occurs whenever one node turns on while the other node is in sleep mode. In eac… ▽ More

    Submitted 14 June, 2017; originally announced June 2017.

    Comments: 8 pages

  15. arXiv:1706.00149  [pdf, other

    cs.NI

    Analysis of Full-Duplex Downlink Using Diversity Gain

    Authors: Chandan Pradhan, Garimella Rama Murthy

    Abstract: The paper carries out performance analysis of a multiuser full-duplex (FD) communication system. Multiple FD UEs share the same spectrum resources, simultaneously, at both the uplink and downlink. This results in co-channel interference (CCI) at the downlink of a UE from uplink signals of other UEs. This work proposes the use of diversity gain at the receiver to mitigate the effects of the CCI. Fo… ▽ More

    Submitted 31 May, 2017; originally announced June 2017.

    Comments: Under review at Wireless Personal Communication

  16. arXiv:1703.04930  [pdf, ps, other

    cs.IT

    On the Support Recovery of Jointly Sparse Gaussian Sources using Sparse Bayesian Learning

    Authors: Saurabh Khanna, Chandra R. Murthy

    Abstract: In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the sou… ▽ More

    Submitted 26 July, 2021; v1 submitted 15 March, 2017; originally announced March 2017.

  17. arXiv:1611.08358  [pdf

    cs.CL

    Kannada Spell Checker with Sandhi Splitter

    Authors: A N Akshatha, Chandana G Upadhyaya, Rajashekara S Murthy

    Abstract: Spelling errors are introduced in text either during ty**, or when the user does not know the correct phoneme or grapheme. If a language contains complex words like sandhi where two or more morphemes join based on some rules, spell checking becomes very tedious. In such situations, having a spell checker with sandhi splitter which alerts the user by flagging the errors and providing suggestions… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: 7 pages, 10 figures

  18. arXiv:1607.00198  [pdf, other

    cs.CL

    Sharing Network Parameters for Crosslingual Named Entity Recognition

    Authors: Rudra Murthy V, Mitesh Khapra, Pushpak Bhattacharyya

    Abstract: Most state of the art approaches for Named Entity Recognition rely on hand crafted features and annotated corpora. Recently Neural network based models have been proposed which do not require handcrafted features but still require annotated corpora. However, such annotated corpora may not be available for many languages. In this paper, we propose a neural network based model which allows sharing t… ▽ More

    Submitted 1 July, 2016; originally announced July 2016.

  19. arXiv:1606.02849  [pdf, ps, other

    cs.IT

    Time Optimal Spectrum Sensing

    Authors: Garimella Rama Murthy, Rhishi Pratap Singh, Samdarshi Abhijeet, Sachin Chaudhary

    Abstract: Spectrum sensing is a fundamental operation in cognitive radio environment. It gives information about spectrum availability by scanning the bands. Usually a fixed amount of time is given to scan individual bands. Most of the times, historical information about the traffic in the spectrum bands is not used. But this information gives the idea, how busy a specific band is. Therefore, instead of sca… ▽ More

    Submitted 9 June, 2016; originally announced June 2016.

  20. arXiv:1605.02969  [pdf, other

    cs.IT

    Spatial Modulation- Spatial Multiplexing in Massive MIMO

    Authors: Garimella Rama Murthy, Kunal Sankhe

    Abstract: Massive MIMO, a candidate for 5G technology, promises significant gains in wireless data rates and link reliability by using large numbers of antennas (more than 64) at the base transceiver station (BTS). Extra antennas help by focusing the transmission and reception of signal energy into ever-smaller regions of space. This brings huge improvements in throughput. However, it requires a large numbe… ▽ More

    Submitted 7 May, 2016; originally announced May 2016.

  21. arXiv:1604.02468  [pdf, ps, other

    cs.IT

    Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation

    Authors: Parthajit Mohapatra, Chandra R. Murthy, Jemin Lee

    Abstract: This paper derives outer bounds on the secrecy capacity region of the 2-user Z interference channel (Z-IC) with rate-limited unidirectional cooperation between the transmitters. First, the model is studied under the linear deterministic setting. The derivation of the outer bounds on the secrecy capacity region involves careful selection of the side information to be provided to the receivers and u… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 13 pages, 10 figures, submitted to IEEE transactions on information forensics and security. arXiv admin note: text overlap with arXiv:1604.02442

  22. arXiv:1604.02442  [pdf, ps, other

    cs.IT

    On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation

    Authors: Parthajit Mohapatra, Chandra R. Murthy, Jemin Lee

    Abstract: In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2-user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic mo… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 13 pages, 10 figures, submitted to transaction on information forensic and security

  23. arXiv:1604.01446  [pdf, other

    math.PR math.ST

    Quantifying Distributional Model Risk via Optimal Transport

    Authors: Jose Blanchet, Karthyek R. A. Murthy

    Abstract: This paper deals with the problem of quantifying the impact of model misspecification when computing general expected values of interest. The methodology that we propose is applicable in great generality, in particular, we provide examples involving path dependent expectations of stochastic processes. Our approach consists in computing bounds for the expectation of interest regardless of the proba… ▽ More

    Submitted 1 July, 2017; v1 submitted 5 April, 2016; originally announced April 2016.

    MSC Class: 60G07; 60F99; 62P05

  24. On distributionally robust extreme value analysis

    Authors: Jose Blanchet, Fei He, Karthyek R. A. Murthy

    Abstract: We study distributional robustness in the context of Extreme Value Theory (EVT). We provide a data-driven method for estimating extreme quantiles in a manner that is robust against incorrect model assumptions underlying the application of the standard Extremal Types Theorem. Typical studies in distributional robustness involve computing worst case estimates over a model uncertainty region expresse… ▽ More

    Submitted 6 June, 2020; v1 submitted 25 January, 2016; originally announced January 2016.

    MSC Class: 60G70 and 62G32

  25. arXiv:1512.06498  [pdf, ps, other

    cs.CV

    Harnessing the Deep Net Object Models for Enhancing Human Action Recognition

    Authors: O. V. Ramana Murthy, Roland Goecke

    Abstract: In this study, the influence of objects is investigated in the scenario of human action recognition with large number of classes. We hypothesize that the objects the humans are interacting will have good say in determining the action being performed. Especially, if the objects are non-moving, such as objects appearing in the background, features such as spatio-temporal interest points, dense traje… ▽ More

    Submitted 23 December, 2015; v1 submitted 21 December, 2015; originally announced December 2015.

    Comments: 6 pages. arXiv admin note: text overlap with arXiv:1411.4006 by other authors

  26. arXiv:1510.04772  [pdf, other

    cs.NI

    Analysis of Path Loss mitigation through Dynamic Spectrum Access: Software Defined Radio

    Authors: Chandan Pradhan, Garimella Rama Murthy

    Abstract: In this paper, an analysis is carried out for a method to mitigate the path loss through the dynamic spectrum access (DSA) method. The path loss is a major component which determines the QoS of a wireless link. Its effect is complemented by the presence of obstruction between the transmitter and receiver. The future cellular network (5G) focuses on operating with the millimeter-wave (mmW). In high… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: Accepted in ICMOCE-2015 (IIT Bhubaneswar, India)

  27. arXiv:1509.03000  [pdf, other

    cs.NI cs.IT

    Full-Duplex Transceiver for Future Cellular Network: A Smart Antenna Approach

    Authors: Chandan Pradhan, Garimella Rama Murthy

    Abstract: In this paper, we propose a transceiver architecture for full-duplex (FD) eNodeB (eNB) and FD user equipment (UE) transceiver. For FD communication,.i.e., simultaneous in-band uplink and downlink operation, same subcarriers can be allocated to UE in both uplink and downlink. Hence, contrary to traditional LTE, we propose using single-carrier frequency division multiple accesses (SC-FDMA) for downl… ▽ More

    Submitted 9 September, 2015; originally announced September 2015.

    Comments: arXiv admin note: text overlap with arXiv:1506.02132

  28. Decentralized Joint-Sparse Signal Recovery: A Sparse Bayesian Learning Approach

    Authors: Saurabh Khanna, Chandra R. Murthy

    Abstract: This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to stan… ▽ More

    Submitted 18 December, 2015; v1 submitted 9 July, 2015; originally announced July 2015.

    Comments: Submitted to IEEE Transactions on Signal and Information Processing over Networks, 15 pages, 10 figures

  29. arXiv:1506.02132  [pdf

    cs.IT cs.NI

    Full-Duplex eNodeB and UE Design for 5G Networks

    Authors: Chandan Pradhan, Kunal Sankhe, Sumit Kumar, Garimella Rama Murthy

    Abstract: The recent progress in the area of self-interference cancellation (SIC) design has enabled the development of full-duplex (FD) single and multiple antenna systems. In this paper, we propose a design for FD eNodeB (eNB) and user equipment (UE) for 5G networks. The use of FD operation enables simultaneous in-band uplink and downlink operation and thereby cutting down the spectrum requirement by half… ▽ More

    Submitted 6 June, 2015; originally announced June 2015.

    Comments: 7 pages and 6 figures, Accepted and will also be available in proceedings of Wireless Telecommunications Symposium (WTS) 2015

    Report number: 1506.01910

  30. arXiv:1502.04169  [pdf, ps, other

    cs.IT

    Computationally Tractable Algorithms for Finding a Subset of Non-defective Items from a Large Population

    Authors: Abhay Sharma, Chandra R. Murthy

    Abstract: In the classical non-adaptive group testing setup, pools of items are tested together, and the main goal of a recovery algorithm is to identify the "complete defective set" given the outcomes of different group tests. In contrast, the main goal of a "non-defective subset recovery" algorithm is to identify a "subset" of non-defective items given the test outcomes. In this paper, we present a suite… ▽ More

    Submitted 28 February, 2016; v1 submitted 14 February, 2015; originally announced February 2015.

    Comments: In this revision: Unified some proofs and reorganized the paper, corrected a small mistake in one of the proofs, added more references

  31. arXiv:1411.0570  [pdf, other

    q-fin.ST

    Incorporating Views on Marginal Distributions in the Calibration of Risk Models

    Authors: Santanu Dey, Sandeep Juneja, Karthyek R. A. Murthy

    Abstract: Entropy based ideas find wide-ranging applications in finance for calibrating models of portfolio risk as well as options pricing. The abstracted problem, extensively studied in the literature, corresponds to finding a probability measure that minimizes relative entropy with respect to a specified measure while satisfying constraints on moments of associated random variables. These moments may cor… ▽ More

    Submitted 3 November, 2014; originally announced November 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.0643

  32. arXiv:1406.4324  [pdf

    cs.AI

    Towards a theory of granular sets

    Authors: Garimella Rama Murthy

    Abstract: Motivated by the application problem of sensor fusion the author introduced the concept of graded set. It is reasoned that in classification problem arising in an information system (represented by information table), a novel set called Granular set naturally arises. It is realized that in any hierarchical classification problem, Granular set naturally arises. Also when the target set of objects f… ▽ More

    Submitted 17 June, 2014; originally announced June 2014.

    Comments: 6 pages

  33. arXiv:1405.6469  [pdf, ps, other

    math.PR stat.CO

    Exact Simulation of Multidimensional Reflected Brownian Motion

    Authors: Jose Blanchet, Karthyek R. A. Murthy

    Abstract: We present the first exact simulation method for multidimensional reflected Brownian motion (RBM). Exact simulation in this setting is challenging because of the presence of correlated local-time-like terms in the definition of RBM. We apply recently developed so-called $\varepsilon-$strong simulation techniques (also known as Tolerance-Enforced Simulation) which allow us to provide a piece-wise l… ▽ More

    Submitted 30 August, 2017; v1 submitted 26 May, 2014; originally announced May 2014.

    MSC Class: 65C05; 65C05 (Primary) 60J60; 60J65 (Secondary)

  34. arXiv:1402.5845  [pdf

    cs.IT cs.NI

    Mathematical Modelling of Energy Wastage in Absence of Levelling and Sectoring in Wireless Sensor Networks

    Authors: Priyanka Sharma, Garimella Rama Murthy

    Abstract: In this paper, we quantitatively (mathematically) reason the energy savings achieved by the Leveling and Sectoring protocol. Due to the energy constraints on the sensor nodes (in terms of supply of energy) energy awareness has become crucial in networking protocol stack. The understanding of routing protocols along with energy awareness in a network would help in energy opti-mization with efficien… ▽ More

    Submitted 24 February, 2014; originally announced February 2014.

  35. arXiv:1402.5359  [pdf, ps, other

    cs.IT

    On the Capacity of the 2-User Interference Channel with Transmitter Cooperation and Secrecy Constraints

    Authors: Parthajit Mohapatra, Chandra R. Murthy

    Abstract: This paper studies the value of limited rate cooperation between the transmitters for managing interference and simultaneously ensuring secrecy, in the 2-user Gaussian symmetric interference channel (GSIC). First, the problem is studied in the symmetric linear deterministic IC (SLDIC) setting, and achievable schemes are proposed, based on interference cancelation, relaying of the other user's data… ▽ More

    Submitted 13 June, 2016; v1 submitted 21 February, 2014; originally announced February 2014.

    Comments: 77 pages, part of it has been accepted for publication in SPAWC 2013 and NCC 2014. Accepted, IEEE Transactions on Information Theory, May 2016

  36. arXiv:1401.7129  [pdf

    math.NA

    Towards a Resolution of P = NP Conjecture

    Authors: Garimella Rama Murthy

    Abstract: In this research paper, the problem of optimization of a quadratic form over the convex hull generated by the corners of hypercube is attempted and solved. It is reasoned that under some conditions, the optimum occurs at the corners of hypercube. Results related to the computation of global optimum stable state (an NP hard problem) are discussed. An algorithm is proposed. It is hoped that the resu… ▽ More

    Submitted 28 January, 2014; originally announced January 2014.

    Comments: 15 pages. arXiv admin note: substantial text overlap with arXiv:1207.0634

  37. arXiv:1309.7439  [pdf

    cs.NI cs.LG

    Optimal Hybrid Channel Allocation:Based On Machine Learning Algorithms

    Authors: K Viswanadh, Dr. G Rama Murthy

    Abstract: Recent advances in cellular communication systems resulted in a huge increase in spectrum demand. To meet the requirements of the ever-growing need for spectrum, efficient utilization of the existing resources is of utmost importance. Channel Allocation, has thus become an inevitable research topic in wireless communications. In this paper, we propose an optimal channel allocation scheme, Optimal… ▽ More

    Submitted 28 September, 2013; originally announced September 2013.

    Comments: 5 pages, 1 figure

  38. arXiv:1307.8240  [pdf, ps, other

    cs.IT

    On Finding a Subset of Healthy Individuals from a Large Population

    Authors: Abhay Sharma, Chandra R. Murthy

    Abstract: In this paper, we derive mutual information based upper and lower bounds on the number of nonadaptive group tests required to identify a given number of "non defective" items from a large population containing a small number of "defective" items. We show that a reduction in the number of tests is achievable compared to the approach of first identifying all the defective items and then picking the… ▽ More

    Submitted 28 February, 2016; v1 submitted 31 July, 2013; originally announced July 2013.

    Comments: 32 pages, 2 figures, 3 tables, revised version of a paper submitted to IEEE Trans. Inf. Theory

  39. arXiv:1304.3554  [pdf

    cs.ET cs.NI

    Global cognitive radio based communication systems: Space-time communications

    Authors: Dr. G. Rama Murthy, M. Srikanth, K. Viswanadh

    Abstract: Spectrum Scarcity is a global problem across the world. This paper emphasizes on the fact that a global problem has to be dealt on global basis, not just locally by applying the principle of global cognitive radio,Global Opportunistic Remote Spectrum Access. The Future Internet and Internet of Things literally scare the communication system designer regarding the available bandwidth and spectrum r… ▽ More

    Submitted 12 April, 2013; originally announced April 2013.

    Comments: 9 pages, 4 figures

  40. arXiv:1303.1597  [pdf

    cs.NI

    Concurrent Cyber Physical Systems:Tensor State Space Representation

    Authors: Garimella Rama Murthy

    Abstract: In this research paper, state space representation of concurrent, linearly coupled dynamical systems is discussed. It is reasoned that the Tensor State Space Representation (TSSR) proposed in [Rama1] is directly applicable in such a problem. Also some discussion on linearly coupled, concurrent systems evolving on multiple time scales is included. Briefly new ideas related to distributed signal pro… ▽ More

    Submitted 6 March, 2013; originally announced March 2013.

  41. arXiv:1302.5903  [pdf

    cs.NI

    Heterogeneous Dynamic Priority Scheduling in time critical applications: Mobile Wireless Sensor Networks

    Authors: Arvind Viswanathan, Dr. Garimella Rama Murthy

    Abstract: In the unlicensed band, the notion of primary user and secondary user (To implement cognitive radio) is not explicit. By dynamic priority assignment we propose to implement cognitive radio in the unlicensed band. In time critical events, the data which is most important, has to be given the time slots. Wireless Sensor nodes in our case are considered to be mobile, and hence make it difficult to pr… ▽ More

    Submitted 3 March, 2013; v1 submitted 24 February, 2013; originally announced February 2013.

  42. arXiv:1301.6512  [pdf, ps, other

    cs.IT

    Secrecy in the 2-User Symmetric Deterministic Interference Channel with Transmitter Cooperation

    Authors: Parthajit Mohapatra, Chandra R. Murthy

    Abstract: This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user's data bits, time sharing, and transmission of random bits, depending on the rate of… ▽ More

    Submitted 3 April, 2013; v1 submitted 28 January, 2013; originally announced January 2013.

    Comments: 5 pages, submitted to SPAWC 2013

  43. arXiv:1301.5545  [pdf

    cs.NI

    Time/Computationally Optimal Network Architecture: Wireless Sensor Fusion

    Authors: Gadi Gayathri Devi, Priya Kumari, Eslavath Jyoshna, Deepika, Garimella Rama Murthy

    Abstract: In this research paper, the problems dealing with sensor network architecture, sensor fusion are addressed. Time/Computationally optimal network architectures are investigated. Some novel ideas on sensor fusion are proposed.

    Submitted 15 February, 2013; v1 submitted 23 January, 2013; originally announced January 2013.

  44. arXiv:1212.1644  [pdf

    math.GM

    Arithmetical Functions : Infinite Products

    Authors: Garimella Rama Murthy

    Abstract: In this technical report, certain interesting classification of arithmetical functions is proposed. The notion of additively decomposable and multiplicatively decomposable arithmetical functions is proposed. The concepts of arithmetical polynomials and arithmetical power series are introduced. Using these concepts, an interesting Theorem relating arithmetical power series and infinite products has… ▽ More

    Submitted 26 November, 2012; originally announced December 2012.

  45. Throughput Analysis of Primary and Secondary Networks in a Shared IEEE 802.11 System

    Authors: Santhosh Kumar, Nirmal Shende, Chandra R. Murthy, Arun Ayyagari

    Abstract: In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integ… ▽ More

    Submitted 5 December, 2012; originally announced December 2012.

    Comments: To appear in IEEE Transactions on Wireless Communications

    Journal ref: IEEE Transactions on Wireless Communications, ISSN 1536-1276, Vol. 12, No. 3, pp. 1006-1017, March 2013

  46. arXiv:1211.4674  [pdf, other

    cs.IT

    On Whitespace Identification Using Randomly Deployed Sensors

    Authors: Rahul Vaze, Chandra R. Murthy

    Abstract: This work considers the identification of the available whitespace, i.e., the regions that are not covered by any of the existing transmitters, within a given geographical area. To this end, $n$ sensors are deployed at random locations within the area. These sensors detect for the presence of a transmitter within their radio range $r_s$, and their individual decisions are combined to estimate the… ▽ More

    Submitted 20 November, 2012; originally announced November 2012.

    Comments: 25 pages, 5 figures. Submitted to IEEE J. Sel. Areas in Commun., Series on Cognitive Radio

  47. arXiv:1209.3387  [pdf

    cs.DS

    Graphs: Associated Markov Chains

    Authors: Garimella Rama Murthy

    Abstract: In this research paper, weighted / unweighted, directed / undirected graphs are associated with interesting Discrete Time Markov Chains (DTMCs) as well as Continuous Time Markov Chains (CTMCs). The equilibrium / transient behaviour of such Markov chains is studied. Also entropy dynamics (Shannon entropy) of certain structured Markov chains is investigated. Finally certain structured graphs and the… ▽ More

    Submitted 15 September, 2012; originally announced September 2012.

  48. arXiv:1208.3286  [pdf

    cond-mat.mes-hall

    Direct evidence of photo-ionization causing luminescence "off" state in CdTe Quantum dots

    Authors: A. V. R. Murthy, Padmashri Patil, Shouvik Datta, Shivprasad Patil

    Abstract: We present a direct experimental evidence of photo-ionized CdTe quantum dot core having luminescence "off" state at band-edge photo-excitation. We use the autocorrelation of fluorescence fluctuations from dilute colloidal solution of CdTe quantum dots in a diffraction limited detection volume to determine their photo-ionization probability. The ionization probability is in the same order of magnit… ▽ More

    Submitted 16 August, 2012; originally announced August 2012.

    Comments: 10 pages 4 figures

  49. arXiv:1207.6027  [pdf

    math.GM

    Structured Multi-Matrix Variate, Matrix Polynomial Equations: Solution Techniques

    Authors: Garimella Rama Murthy

    Abstract: In this research paper, structured bi-matrix variate, matrix quadratic equations are considered. Some lemmas related to determining the eigenvalues of unknown matrices are proved. Also, a method of determining the diagonalizabe unknown matrices is provided. The results are generalized to multi-matrix variate, matrix polynomial equations. Briefly generalization to tensor variate polynomial equation… ▽ More

    Submitted 21 July, 2012; originally announced July 2012.

  50. arXiv:1207.0634  [pdf

    cs.CC

    Optimization of Quadratic Forms: NP Hard Problems : Neural Networks

    Authors: Garimella Rama Murthy

    Abstract: In this research paper, the problem of optimization of a quadratic form over the convex hull generated by the corners of hypercube is attempted and solved. Some results related to stable states/vectors, anti-stable states/vectors (over the hypercube) are discussed. Some results related to the computation of global optimum stable state (an NP hard problem) are discussed. It is hoped that the result… ▽ More

    Submitted 3 July, 2012; originally announced July 2012.