-
Eye Gaze Controlled Robotic Arm for Persons with SSMI
Authors:
Vinay Krishna Sharma,
L. R. D. Murthy,
KamalPreet Singh Saluja,
Vimal Mollyn,
Gourav Sharma,
Pradipta Biswas
Abstract:
Background: People with severe speech and motor impairment (SSMI) often uses a technique called eye pointing to communicate with outside world. One of their parents, caretakers or teachers hold a printed board in front of them and by analyzing their eye gaze manually, their intentions are interpreted. This technique is often error prone and time consuming and depends on a single caretaker.
Objec…
▽ More
Background: People with severe speech and motor impairment (SSMI) often uses a technique called eye pointing to communicate with outside world. One of their parents, caretakers or teachers hold a printed board in front of them and by analyzing their eye gaze manually, their intentions are interpreted. This technique is often error prone and time consuming and depends on a single caretaker.
Objective: We aimed to automate the eye tracking process electronically by using commercially available tablet, computer or laptop and without requiring any dedicated hardware for eye gaze tracking. The eye gaze tracker is used to develop a video see through based AR (augmented reality) display that controls a robotic device with eye gaze and deployed for a fabric printing task.
Methodology: We undertook a user centred design process and separately evaluated the web cam based gaze tracker and the video see through based human robot interaction involving users with SSMI. We also reported a user study on manipulating a robotic arm with webcam based eye gaze tracker.
Results: Using our bespoke eye gaze controlled interface, able bodied users can select one of nine regions of screen at a median of less than 2 secs and users with SSMI can do so at a median of 4 secs. Using the eye gaze controlled human-robot AR display, users with SSMI could undertake representative pick and drop task at an average duration less than 15 secs and reach a randomly designated target within 60 secs using a COTS eye tracker and at an average time of 2 mins using the webcam based eye gaze tracker.
△ Less
Submitted 25 May, 2020;
originally announced May 2020.
-
Classification of stroke using Neural Networks in Electrical Impedance Tomography
Authors:
Juan Pablo Agnelli,
Aynur Çöl,
Matti Lassas,
Rashmi Murthy,
Matteo Santacesaria,
Samuli Siltanen
Abstract:
Electrical Impedance Tomography (EIT) is an emerging non-invasive medical imaging modality. It is based on feeding electrical currents into the patient, measuring the resulting voltages at the skin, and recovering the internal conductivity distribution. The mathematical task of EIT image reconstruction is a nonlinear and ill-posed inverse problem. Therefore any EIT image reconstruction method need…
▽ More
Electrical Impedance Tomography (EIT) is an emerging non-invasive medical imaging modality. It is based on feeding electrical currents into the patient, measuring the resulting voltages at the skin, and recovering the internal conductivity distribution. The mathematical task of EIT image reconstruction is a nonlinear and ill-posed inverse problem. Therefore any EIT image reconstruction method needs to be regularized, typically resulting in blurred images. One promising application is stroke-EIT, or classification of stroke into either ischemic or hemorrhagic. Ischemic stroke involves a blood clot, preventing blood flow to a part of the brain causing a low-conductivity region. Hemorrhagic stroke means bleeding in the brain causing a high-conductivity region. In both cases the symptoms are identical, so a cost-effective and portable classification device is needed. Typical EIT are not optimal for stroke-EIT because of blurriness. This paper explores the possibilities of machine learning in improving the classification results. Two paradigms are compared: (a) learning from the EIT data, that is Dirichlet-to-Neumann (DN) maps and (b) extracting robust features from data and learning from them. The features of choice are Virtual Hybrid Edge Detection (VHED) functions [Greenleaf {\it et al.}, Analysis \& PDE 11, 2018] that have a geometric interpretation and whose computation from EIT data does not involve calculating a full image of the conductivity. We report the measures of accuracy, sensitivity and specificity of the networks trained with EIT data and VHED functions separately. Computational evidence based on simulated noisy EIT data suggests that the regularized grey-box paradigm (b) leads to significantly better classification results than the black-box paradigm (a).
△ Less
Submitted 2 September, 2020; v1 submitted 14 April, 2020;
originally announced April 2020.
-
Controllability of Linear Dynamical Systems Under Input Sparsity Constraints
Authors:
Geethu Joseph,
Chandra R. Murthy
Abstract:
In this work, we consider the controllability of a discrete-time linear dynamical system with sparse control inputs. Sparsity constraints on the input arises naturally in networked systems, where activating each input variable adds to the cost of control. We derive algebraic necessary and sufficient conditions for ensuring controllability of a system with an arbitrary transfer matrix. The derived…
▽ More
In this work, we consider the controllability of a discrete-time linear dynamical system with sparse control inputs. Sparsity constraints on the input arises naturally in networked systems, where activating each input variable adds to the cost of control. We derive algebraic necessary and sufficient conditions for ensuring controllability of a system with an arbitrary transfer matrix. The derived conditions can be verified in polynomial time complexity, unlike the more traditional Kalman-type rank tests. Further, we characterize the minimum number of input vectors required to satisfy the derived conditions for controllability. Finally, we present a generalized Kalman decomposition-like procedure that separates the state-space into subspaces corresponding to sparse-controllable and sparse-uncontrollable parts. These results form a theoretical basis for designing networked linear control systems with sparse inputs.
△ Less
Submitted 27 December, 2019;
originally announced December 2019.
-
Sample-Measurement Tradeoff in Support Recovery under a Subgaussian Prior
Authors:
Lekshmi Ramesh,
Chandra R Murthy,
Himanshu Tyagi
Abstract:
Data samples from $\mathbb{R}^{d}$ with a common support of size $k$ are accessed through $m$ random linear projections (measurements) per sample. It is well-known that roughly $k$ measurements from a single sample are sufficient to recover the support. In the multiple sample setting, do $k$ overall measurements still suffice when only $m$ measurements per sample are allowed, with $m<k$? We answer…
▽ More
Data samples from $\mathbb{R}^{d}$ with a common support of size $k$ are accessed through $m$ random linear projections (measurements) per sample. It is well-known that roughly $k$ measurements from a single sample are sufficient to recover the support. In the multiple sample setting, do $k$ overall measurements still suffice when only $m$ measurements per sample are allowed, with $m<k$? We answer this question in the negative by considering a generative model setting with independent samples drawn from a subgaussian prior. We show that $n=Θ((k^2/m^2)\cdot\log k(d-k))$ samples are necessary and sufficient to recover the support exactly. In turn, this shows that when $m<k$, $k$ overall measurements are insufficient for support recovery; instead we need about $m$ measurements each from $k^{2}/m^2$ samples, i.e., $k^{2}/m$ overall measurements are necessary.
△ Less
Submitted 19 September, 2020; v1 submitted 24 December, 2019;
originally announced December 2019.
-
Scrambled Translation Problem: A Problem of Denoising UNMT
Authors:
Tamali Banerjee,
Rudra Murthy V,
Pushpak Bhattacharyya
Abstract:
In this paper, we identify an interesting kind of error in the output of Unsupervised Neural Machine Translation (UNMT) systems like \textit{Undreamt}(footnote). We refer to this error type as \textit{Scrambled Translation problem}. We observe that UNMT models which use \textit{word shuffle} noise (as in case of Undreamt) can generate correct words, but fail to stitch them together to form phrases…
▽ More
In this paper, we identify an interesting kind of error in the output of Unsupervised Neural Machine Translation (UNMT) systems like \textit{Undreamt}(footnote). We refer to this error type as \textit{Scrambled Translation problem}. We observe that UNMT models which use \textit{word shuffle} noise (as in case of Undreamt) can generate correct words, but fail to stitch them together to form phrases. As a result, words of the translated sentence look \textit{scrambled}, resulting in decreased BLEU. We hypothesise that the reason behind \textit{scrambled translation problem} is 'shuffling noise' which is introduced in every input sentence as a denoising strategy. To test our hypothesis, we experiment by retraining UNMT models with a simple \textit{retraining} strategy. We stop the training of the Denoising UNMT model after a pre-decided number of iterations and resume the training for the remaining iterations -- which number is also pre-decided -- using original sentence as input without adding any noise. Our proposed solution achieves significant performance improvement UNMT models that train conventionally. We demonstrate these performance gains on four language pairs, \textit{viz.}, English-French, English-German, English-Spanish, Hindi-Punjabi. Our qualitative and quantitative analysis shows that the retraining strategy helps achieve better alignment as observed by attention heatmap and better phrasal translation, leading to statistically significant improvement in BLEU scores.
△ Less
Submitted 17 June, 2021; v1 submitted 30 October, 2019;
originally announced November 2019.
-
Learned-SBL: A Deep Learning Architecture for Sparse Signal Recovery
Authors:
Rubin Jose Peter,
Chandra R. Murthy
Abstract:
In this paper, we present a computationally efficient sparse signal recovery scheme using Deep Neural Networks (DNN). The architecture of the introduced neural network is inspired from sparse Bayesian learning (SBL) and named as Learned-SBL (L-SBL). We design a common architecture to recover sparse as well as block sparse vectors from single measurement vector (SMV) or multiple measurement vectors…
▽ More
In this paper, we present a computationally efficient sparse signal recovery scheme using Deep Neural Networks (DNN). The architecture of the introduced neural network is inspired from sparse Bayesian learning (SBL) and named as Learned-SBL (L-SBL). We design a common architecture to recover sparse as well as block sparse vectors from single measurement vector (SMV) or multiple measurement vectors (MMV) depending on the nature of the training data. In the MMV model, the L-SBL network can be trained to learn any underlying sparsity pattern among the vectors including joint sparsity, block sparsity, etc. In particular, for block sparse recovery, learned-SBL does not require any prior knowledge of block boundaries. In each layer of the L-SBL, an estimate of the signal covariance matrix is obtained as the output of a neural network. Then a maximum a posteriori (MAP) estimator of the unknown sparse vector is implemented with non-trainable parameters. In many applications, the measurement matrix may be time-varying. The existing DNN based sparse signal recovery schemes demand the retraining of the neural network using current measurement matrix. The architecture of L-SBL allows it to accept the measurement matrix as an input to the network, and thereby avoids the need for retraining. We also evaluate the performance of Learned-SBL in the detection of an extended target using a multiple-input multiple-output (MIMO) radar. Simulation results illustrate that the proposed approach offers superior sparse recovery performance compared to the state-of-the-art methods.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Autocorrelation Function Characterization of Continuous Time Markov Chains
Authors:
G. Rama Murthy,
Douglas G. Down
Abstract:
We study certain properties of the function space of autocorrelation functions of Unit Continuous Time Markov Chains (CTMCs). It is shown that under particular conditions, the $L^p$ norm of the autocorrelation function of arbitrary finite state space CTMCs is infinite. Several interesting inferences are made for point processes associated with CTMCs/ Discrete Time Markov Chains (DTMCs).
We study certain properties of the function space of autocorrelation functions of Unit Continuous Time Markov Chains (CTMCs). It is shown that under particular conditions, the $L^p$ norm of the autocorrelation function of arbitrary finite state space CTMCs is infinite. Several interesting inferences are made for point processes associated with CTMCs/ Discrete Time Markov Chains (DTMCs).
△ Less
Submitted 25 August, 2019;
originally announced August 2019.
-
Fundamental Limitations in Biomarker Based Early Disease Diagnosis
Authors:
Tuhin Chakrabortty,
Chandra R. Murthy,
Manoj Varma
Abstract:
Clinical biosensors with low detection limit hold significant promise in the early diagnosis of debilitating diseases. Recent progress in sensor development has led to the demonstration of detection capable of detecting target molecules even down to single-molecule level. One crucial performance parameter which is not adequately discussed is the issue of measurement fidelity in such sensors. We de…
▽ More
Clinical biosensors with low detection limit hold significant promise in the early diagnosis of debilitating diseases. Recent progress in sensor development has led to the demonstration of detection capable of detecting target molecules even down to single-molecule level. One crucial performance parameter which is not adequately discussed is the issue of measurement fidelity in such sensors. We define measurement fidelity based on the false positive rate of the system as we expect systems with higher sensitivity to concomitantly respond more to interfering molecules thus increasing the false-positive rates. We present a model which allows us to estimate the limit of detection of a biosensor system constrained by a specified false-positive rate. Two major results emerging from our model is that a) there is a lower bound to the detection limit for a target molecule determined by the variation in the concentration of background molecules interfering with the molecular recognition process and b) systems which use a secondary label, such as a fluorophore, can achieve lower detection limits for a given false positive rate. We also present data collected from literature to support our model. The insights from our model will be useful in the systematic design of future clinical biosensors to achieve relevant detection limits with assured fidelity.
△ Less
Submitted 4 December, 2019; v1 submitted 11 July, 2019;
originally announced July 2019.
-
The More the Merrier: Enhancing Reliability of 5G Communication Services with Guaranteed Delay
Authors:
Prabhu Kaliyammal Thiruvasagam,
Vijeth J Kotagi,
C Siva Ram Murthy
Abstract:
Although network functions virtualization and software-defined networking offer many dynamic features such as flexibility, scalability, and programmability for easy provisioning of services at a lesser cost and time through service function chaining, it introduces new challenges in terms of reliability, availability, and latency of services. Particularly, softwarization of network and service func…
▽ More
Although network functions virtualization and software-defined networking offer many dynamic features such as flexibility, scalability, and programmability for easy provisioning of services at a lesser cost and time through service function chaining, it introduces new challenges in terms of reliability, availability, and latency of services. Particularly, softwarization of network and service functions (e.g., virtualization, anything as a service, dynamic virtual chaining, and routing) impose high possibility of network failures due to software issues than hardware. In this letter, we propose a novel solution called eRESERV to enhance the reliability of service chains in 5G while meeting the service level agreements.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
Addressing word-order Divergence in Multilingual Neural Machine Translation for extremely Low Resource Languages
Authors:
Rudra Murthy V,
Anoop Kunchukuttan,
Pushpak Bhattacharyya
Abstract:
Transfer learning approaches for Neural Machine Translation (NMT) train a NMT model on the assisting-target language pair (parent model) which is later fine-tuned for the source-target language pair of interest (child model), with the target language being the same. In many cases, the assisting language has a different word order from the source language. We show that divergent word order adversel…
▽ More
Transfer learning approaches for Neural Machine Translation (NMT) train a NMT model on the assisting-target language pair (parent model) which is later fine-tuned for the source-target language pair of interest (child model), with the target language being the same. In many cases, the assisting language has a different word order from the source language. We show that divergent word order adversely limits the benefits from transfer learning when little to no parallel corpus between the source and target language is available. To bridge this divergence, We propose to pre-order the assisting language sentence to match the word order of the source language and train the parent model. Our experiments on many language pairs show that bridging the word order gap leads to significant improvement in the translation quality.
△ Less
Submitted 10 April, 2019; v1 submitted 1 November, 2018;
originally announced November 2018.
-
Exploiting Partial Correlations in Distributionally Robust Optimization
Authors:
Divya Padmanabhan,
Karthik Natarajan,
Karthyek R. A. Murthy
Abstract:
In this paper, we identify partial correlation information structures that allow for simpler reformulations in evaluating the maximum expected value of mixed integer linear programs with random objective coefficients. To this end, assuming only the knowledge of the mean and the covariance matrix entries restricted to block-diagonal patterns, we develop a reduced semidefinite programming formulatio…
▽ More
In this paper, we identify partial correlation information structures that allow for simpler reformulations in evaluating the maximum expected value of mixed integer linear programs with random objective coefficients. To this end, assuming only the knowledge of the mean and the covariance matrix entries restricted to block-diagonal patterns, we develop a reduced semidefinite programming formulation, the complexity of solving which is related to characterizing a suitable projection of the convex hull of the set $\{(\bold{x}, \bold{x}\bold{x}'): \bold{x} \in \mathcal{X}\}$ where $\mathcal{X}$ is the feasible region. In some cases, this lends itself to efficient representations that result in polynomial-time solvable instances, most notably for the distributionally robust appointment scheduling problem with random job durations as well as for computing tight bounds in Project Evaluation and Review Technique (PERT) networks and linear assignment problems. To the best of our knowledge, this is the first example of a distributionally robust optimization formulation for appointment scheduling that permits a tight polynomial-time solvable semidefinite programming reformulation which explicitly captures partially known correlation information between uncertain processing times of the jobs to be scheduled.
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
Energy Harvesting Communications Using Dual Alternating Batteries
Authors:
Rajshekhar Vishweshwar Bhat,
Mehul Motani,
Chandra R Murthy,
Rahul Vaze
Abstract:
Practical energy harvesting (EH) based communication systems typically use a battery to temporarily store the harvested energy prior to its use for communication. The batteries can be damaged when they are repeatedly charged (discharged) after being partially discharged (charged), overcharged or deeply discharged. This motivates the cycle constraint which says that a battery must be charged (disch…
▽ More
Practical energy harvesting (EH) based communication systems typically use a battery to temporarily store the harvested energy prior to its use for communication. The batteries can be damaged when they are repeatedly charged (discharged) after being partially discharged (charged), overcharged or deeply discharged. This motivates the cycle constraint which says that a battery must be charged (discharged) only after it is sufficiently discharged (charged). We also assume Bernoulli energy arrivals, and a half-duplex constraint due to which the batteries are not charged and discharged simultaneously. In this context, we study EH communication systems with: (a) a single-battery with capacity 2B units and (b) dual-batteries, each having capacity of B units. The aim is to obtain the best possible long-term average throughputs and throughput regions in point-to-point (P2P) channels and multiple access channels (MAC), respectively. For the P2P channel, we obtain an analytical optimal solution in the single-battery case, and propose optimal and sub-optimal power allocation policies for the dual-battery case. We extend these policies to obtain achievable throughput regions in MACs by jointly allocating rates and powers. From numerical simulations, we find that the optimal throughput in the dual-battery case is significantly higher than that in the single-battery case, although the total storage capacity in both cases is 2B units. Further, in the proposed policies, the largest throughput region in the single-battery case is contained within that of the dual-battery case.
△ Less
Submitted 18 December, 2018; v1 submitted 11 January, 2018;
originally announced January 2018.
-
On the Restricted Isometry of the Columnwise Khatri-Rao Product
Authors:
Saurabh Khanna,
Chandra R Murthy
Abstract:
The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the…
▽ More
The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the RIP of a generic columnwise Khatri-Rao product matrix by deriving two upper bounds for its $k^{\text{th}}$ order Restricted Isometry Constant ($k$-RIC) for different values of $k$. The first RIC bound is computed in terms of the individual RICs of the input matrices participating in the Khatri-Rao product. The second RIC bound is probabilistic, and is specified in terms of the input matrix dimensions. We show that the Khatri-Rao product of a pair of $m \times n$ sized random matrices comprising independent and identically distributed subgaussian entries satisfies $k$-RIP with arbitrarily high probability, provided $m$ exceeds $O(k \log n)$. Our RIC bounds confirm that the Khatri-Rao product exhibits stronger restricted isometry compared to its constituent matrices for the same RIP order. The proposed RIC bounds are potentially useful in the sample complexity analysis of several sparse recovery problems.
△ Less
Submitted 23 July, 2018; v1 submitted 18 September, 2017;
originally announced September 2017.
-
On Distributed Power Control for Uncoordinated Dual Energy Harvesting Links: Performance Bounds and Near-Optimal Policies
Authors:
Mohit K. Sharma,
Chandra R. Murthy,
Rahul Vaze
Abstract:
In this paper, we consider a point-to-point link between an energy harvesting transmitter and receiver, where neither node has the information about the battery state or energy availability at the other node. We consider a model where data is successfully delivered only in slots where both nodes are active. Energy loss occurs whenever one node turns on while the other node is in sleep mode. In eac…
▽ More
In this paper, we consider a point-to-point link between an energy harvesting transmitter and receiver, where neither node has the information about the battery state or energy availability at the other node. We consider a model where data is successfully delivered only in slots where both nodes are active. Energy loss occurs whenever one node turns on while the other node is in sleep mode. In each slot, based on their own energy availability, the transmitter and receiver need to independently decide whether or not to turn on, with the aim of maximizing the long-term time-average throughput. We present an upper bound on the throughput achievable by analyzing a genie-aided system that has noncausal knowledge of the energy arrivals at both the nodes. Next, we propose an online policy requiring an occasional one-bit feedback whose throughput is within one bit of the upper bound, asymptotically in the battery size. In order to further reduce the feedback required, we propose a time-dilated version of the online policy. As the time dilation gets large, this policy does not require any feedback and achieves the upper bound asymptotically in the battery size. Inspired by this, we also propose a near-optimal fully uncoordinated policy. We use Monte Carlo simulations to validate our theoretical results and illustrate the performance of the proposed policies.
△ Less
Submitted 14 June, 2017;
originally announced June 2017.
-
Analysis of Full-Duplex Downlink Using Diversity Gain
Authors:
Chandan Pradhan,
Garimella Rama Murthy
Abstract:
The paper carries out performance analysis of a multiuser full-duplex (FD) communication system. Multiple FD UEs share the same spectrum resources, simultaneously, at both the uplink and downlink. This results in co-channel interference (CCI) at the downlink of a UE from uplink signals of other UEs. This work proposes the use of diversity gain at the receiver to mitigate the effects of the CCI. Fo…
▽ More
The paper carries out performance analysis of a multiuser full-duplex (FD) communication system. Multiple FD UEs share the same spectrum resources, simultaneously, at both the uplink and downlink. This results in co-channel interference (CCI) at the downlink of a UE from uplink signals of other UEs. This work proposes the use of diversity gain at the receiver to mitigate the effects of the CCI. For this an architecture for the FD eNB and FD UE is proposed and corresponding downlink operation is described. Finally, the performance of the system is studied in terms of downlink capacity of a UE. It is shown that through the deployment of sufficient number of transmit and receive antennas at the eNB and UEs, respectively, significant improvement in performance can be achieved in the presence of CCI.
△ Less
Submitted 31 May, 2017;
originally announced June 2017.
-
On the Support Recovery of Jointly Sparse Gaussian Sources using Sparse Bayesian Learning
Authors:
Saurabh Khanna,
Chandra R. Murthy
Abstract:
In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the sou…
▽ More
In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the source signals. We derive conditions under which the resulting nonconvex constrained optimization perfectly recovers the nonzero support of a joint-sparse Gaussian source ensemble with arbitrarily high probability. The support error probability decays exponentially with the number of MMVs at a rate that depends on the smallest restricted singular value and the nonnegative null space property of the self Khatri-Rao product of the sensing matrix. Our analysis confirms that nonzero supports of size as high as O($m^2$) are recoverable from $m$ measurements per sparse vector. Our derived sufficient conditions for support consistency of the proposed constrained type-II ML solution also guarantee the support consistency of any global solution of the multiple sparse Bayesian learning (M-SBL) optimization whose nonzero coefficients lie inside a bounded interval. For the case of noiseless measurements, we further show that a single MMV is sufficient for perfect recovery of the $k$-sparse support by M-SBL, provided all subsets of $k + 1$ columns of the sensing matrix are linearly independent.
△ Less
Submitted 26 July, 2021; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Kannada Spell Checker with Sandhi Splitter
Authors:
A N Akshatha,
Chandana G Upadhyaya,
Rajashekara S Murthy
Abstract:
Spelling errors are introduced in text either during ty**, or when the user does not know the correct phoneme or grapheme. If a language contains complex words like sandhi where two or more morphemes join based on some rules, spell checking becomes very tedious. In such situations, having a spell checker with sandhi splitter which alerts the user by flagging the errors and providing suggestions…
▽ More
Spelling errors are introduced in text either during ty**, or when the user does not know the correct phoneme or grapheme. If a language contains complex words like sandhi where two or more morphemes join based on some rules, spell checking becomes very tedious. In such situations, having a spell checker with sandhi splitter which alerts the user by flagging the errors and providing suggestions is very useful. A novel algorithm of sandhi splitting is proposed in this paper. The sandhi splitter can split about 7000 most common sandhi words in Kannada language used as test samples. The sandhi splitter was integrated with a Kannada spell checker and a mechanism for generating suggestions was added. A comprehensive, platform independent, standalone spell checker with sandhi splitter application software was thus developed and tested extensively for its efficiency and correctness. A comparative analysis of this spell checker with sandhi splitter was made and results concluded that the Kannada spell checker with sandhi splitter has an improved performance. It is twice as fast, 200 times more space efficient, and it is 90% accurate in case of complex nouns and 50% accurate for complex verbs. Such a spell checker with sandhi splitter will be of foremost significance in machine translation systems, voice processing, etc. This is the first sandhi splitter in Kannada and the advantage of the novel algorithm is that, it can be extended to all Indian languages.
△ Less
Submitted 25 November, 2016;
originally announced November 2016.
-
Sharing Network Parameters for Crosslingual Named Entity Recognition
Authors:
Rudra Murthy V,
Mitesh Khapra,
Pushpak Bhattacharyya
Abstract:
Most state of the art approaches for Named Entity Recognition rely on hand crafted features and annotated corpora. Recently Neural network based models have been proposed which do not require handcrafted features but still require annotated corpora. However, such annotated corpora may not be available for many languages. In this paper, we propose a neural network based model which allows sharing t…
▽ More
Most state of the art approaches for Named Entity Recognition rely on hand crafted features and annotated corpora. Recently Neural network based models have been proposed which do not require handcrafted features but still require annotated corpora. However, such annotated corpora may not be available for many languages. In this paper, we propose a neural network based model which allows sharing the decoder as well as word and character level parameters between two languages thereby allowing a resource fortunate language to aid a resource deprived language. Specifically, we focus on the case when limited annotated corpora is available in one language ($L_1$) and abundant annotated corpora is available in another language ($L_2$). Sharing the network architecture and parameters between $L_1$ and $L_2$ leads to improved performance in $L_1$. Further, our approach does not require any hand crafted features but instead directly learns meaningful feature representations from the training data itself. We experiment with 4 language pairs and show that indeed in a resource constrained setup (lesser annotated corpora), a model jointly trained with data from another language performs better than a model trained only on the limited corpora in one language.
△ Less
Submitted 1 July, 2016;
originally announced July 2016.
-
Time Optimal Spectrum Sensing
Authors:
Garimella Rama Murthy,
Rhishi Pratap Singh,
Samdarshi Abhijeet,
Sachin Chaudhary
Abstract:
Spectrum sensing is a fundamental operation in cognitive radio environment. It gives information about spectrum availability by scanning the bands. Usually a fixed amount of time is given to scan individual bands. Most of the times, historical information about the traffic in the spectrum bands is not used. But this information gives the idea, how busy a specific band is. Therefore, instead of sca…
▽ More
Spectrum sensing is a fundamental operation in cognitive radio environment. It gives information about spectrum availability by scanning the bands. Usually a fixed amount of time is given to scan individual bands. Most of the times, historical information about the traffic in the spectrum bands is not used. But this information gives the idea, how busy a specific band is. Therefore, instead of scanning a band for a fixed amount of time, more time can be given to less occupied bands and less time to heavily occupied ones. In this paper we have formulated the time assignment problem as integer linear programming and source coding problems. The time assignment problem is solved using the associated stochastic optimization problem.
△ Less
Submitted 9 June, 2016;
originally announced June 2016.
-
Spatial Modulation- Spatial Multiplexing in Massive MIMO
Authors:
Garimella Rama Murthy,
Kunal Sankhe
Abstract:
Massive MIMO, a candidate for 5G technology, promises significant gains in wireless data rates and link reliability by using large numbers of antennas (more than 64) at the base transceiver station (BTS). Extra antennas help by focusing the transmission and reception of signal energy into ever-smaller regions of space. This brings huge improvements in throughput. However, it requires a large numbe…
▽ More
Massive MIMO, a candidate for 5G technology, promises significant gains in wireless data rates and link reliability by using large numbers of antennas (more than 64) at the base transceiver station (BTS). Extra antennas help by focusing the transmission and reception of signal energy into ever-smaller regions of space. This brings huge improvements in throughput. However, it requires a large number of Radio Frequency (RF) chains (usually equal to number of transmit antennas), which is a major drawback. One approach to overcome these issues is to use Spatial Modulation (SM). In SM, an index of transmit antenna is used as an additional source of information to improve the overall spectral efficiency. In particular, a group of any number of information bits is mapped into two constellations: a signal constellation based on modulation scheme and a spatial constellation to encode the index of the transmit antenna. However, a low spectral efficiency is main drawback of SM. Therefore, a combination of SM with Spatial Multiplexing is an effective way to increase spectral efficiency with limited number of RF chains.
△ Less
Submitted 7 May, 2016;
originally announced May 2016.
-
Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation
Authors:
Parthajit Mohapatra,
Chandra R. Murthy,
Jemin Lee
Abstract:
This paper derives outer bounds on the secrecy capacity region of the 2-user Z interference channel (Z-IC) with rate-limited unidirectional cooperation between the transmitters. First, the model is studied under the linear deterministic setting. The derivation of the outer bounds on the secrecy capacity region involves careful selection of the side information to be provided to the receivers and u…
▽ More
This paper derives outer bounds on the secrecy capacity region of the 2-user Z interference channel (Z-IC) with rate-limited unidirectional cooperation between the transmitters. First, the model is studied under the linear deterministic setting. The derivation of the outer bounds on the secrecy capacity region involves careful selection of the side information to be provided to the receivers and using the secrecy constraints at the receivers in a judicious manner. To this end, a novel partitioning of the encoded messages and outputs is proposed for the deterministic model based on the strength of interference and signal. The obtained outer bounds are shown to be tight using the achievable scheme derived by the authors in a previous work. Using the insight obtained from the deterministic model, outer bounds on the secrecy capacity region of the 2-user Gaussian Z-IC are obtained. The equivalence between the outer bounds for both the models is also established. It is also shown that secrecy constraint at the receiver does not hurt the capacity region of the 2-user Z-IC for the deterministic model in the weak/moderate interference regime. On the other hand, the outer bounds developed for the Gaussian case shows that secrecy constraint at the receiver can reduce the capacity region for the weak/moderate interference regime. The study of the relative performance of these bounds reveals insight into the fundamental limits of the 2-user Z-IC with limited rate transmitter cooperation.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation
Authors:
Parthajit Mohapatra,
Chandra R. Murthy,
Jemin Lee
Abstract:
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2-user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic mo…
▽ More
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2-user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic model use a fusion of cooperative precoding and transmission of a jamming signal. The optimality of the proposed scheme is established for the deterministic model for all possible parameter settings using the outer bounds derived by the authors in a previous work. Using the insights obtained from the deterministic model, a lower bound on the secrecy capacity region of the 2-user Gaussian Z-IC are obtained. The achievable scheme in this case uses stochastic encoding in addition to cooperative precoding and transmission of a jamming signal. The secure sum generalized degrees of freedom (GDOF) is characterized and shown to be optimal for the weak/moderate interference regime. It is also shown that the secure sum capacity lies within 2 bits/s/Hz of the outer bound for the weak/moderate interference regime for all values of the capacity of the cooperative link. Interestingly, in case of the deterministic model, it is found that there is no penalty on the capacity region of the Z-IC due to the secrecy constraints at the receivers in the weak/moderate interference regimes. Similarly, it is found that there is no loss in the secure sum GDOF for the Gaussian case due to the secrecy constraint at the receiver, in the weak/moderate interference regimes. The results highlight the importance of cooperation in facilitating secure communication over the Z-IC.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
Quantifying Distributional Model Risk via Optimal Transport
Authors:
Jose Blanchet,
Karthyek R. A. Murthy
Abstract:
This paper deals with the problem of quantifying the impact of model misspecification when computing general expected values of interest. The methodology that we propose is applicable in great generality, in particular, we provide examples involving path dependent expectations of stochastic processes. Our approach consists in computing bounds for the expectation of interest regardless of the proba…
▽ More
This paper deals with the problem of quantifying the impact of model misspecification when computing general expected values of interest. The methodology that we propose is applicable in great generality, in particular, we provide examples involving path dependent expectations of stochastic processes. Our approach consists in computing bounds for the expectation of interest regardless of the probability measure used, as long as the measure lies within a prescribed tolerance measured in terms of a flexible class of distances from a suitable baseline model. These distances, based on optimal transportation between probability measures, include Wasserstein's distances as particular cases. The proposed methodology is well-suited for risk analysis, as we demonstrate with a number of applications. We also discuss how to estimate the tolerance region non-parametrically using Skorokhod-type embeddings in some of these applications.
△ Less
Submitted 1 July, 2017; v1 submitted 5 April, 2016;
originally announced April 2016.
-
On distributionally robust extreme value analysis
Authors:
Jose Blanchet,
Fei He,
Karthyek R. A. Murthy
Abstract:
We study distributional robustness in the context of Extreme Value Theory (EVT). We provide a data-driven method for estimating extreme quantiles in a manner that is robust against incorrect model assumptions underlying the application of the standard Extremal Types Theorem. Typical studies in distributional robustness involve computing worst case estimates over a model uncertainty region expresse…
▽ More
We study distributional robustness in the context of Extreme Value Theory (EVT). We provide a data-driven method for estimating extreme quantiles in a manner that is robust against incorrect model assumptions underlying the application of the standard Extremal Types Theorem. Typical studies in distributional robustness involve computing worst case estimates over a model uncertainty region expressed in terms of the Kullback-Leibler discrepancy. We go beyond standard distributional robustness in that we investigate different forms of discrepancies, and prove rigorous results which are helpful for understanding the role of a putative model uncertainty region in the context of extreme quantile estimation. Finally, we illustrate our data-driven method in various settings, including examples showing how standard EVT can significantly underestimate quantiles of interest.
△ Less
Submitted 6 June, 2020; v1 submitted 25 January, 2016;
originally announced January 2016.
-
Harnessing the Deep Net Object Models for Enhancing Human Action Recognition
Authors:
O. V. Ramana Murthy,
Roland Goecke
Abstract:
In this study, the influence of objects is investigated in the scenario of human action recognition with large number of classes. We hypothesize that the objects the humans are interacting will have good say in determining the action being performed. Especially, if the objects are non-moving, such as objects appearing in the background, features such as spatio-temporal interest points, dense traje…
▽ More
In this study, the influence of objects is investigated in the scenario of human action recognition with large number of classes. We hypothesize that the objects the humans are interacting will have good say in determining the action being performed. Especially, if the objects are non-moving, such as objects appearing in the background, features such as spatio-temporal interest points, dense trajectories may fail to detect them. Hence we propose to detect objects using pre-trained object detectors in every frame statically. Trained Deep network models are used as object detectors. Information from different layers in conjunction with different encoding techniques is extensively studied to obtain the richest feature vectors. This technique is observed to yield state-of-the-art performance on HMDB51 and UCF101 datasets.
△ Less
Submitted 23 December, 2015; v1 submitted 21 December, 2015;
originally announced December 2015.
-
Analysis of Path Loss mitigation through Dynamic Spectrum Access: Software Defined Radio
Authors:
Chandan Pradhan,
Garimella Rama Murthy
Abstract:
In this paper, an analysis is carried out for a method to mitigate the path loss through the dynamic spectrum access (DSA) method. The path loss is a major component which determines the QoS of a wireless link. Its effect is complemented by the presence of obstruction between the transmitter and receiver. The future cellular network (5G) focuses on operating with the millimeter-wave (mmW). In high…
▽ More
In this paper, an analysis is carried out for a method to mitigate the path loss through the dynamic spectrum access (DSA) method. The path loss is a major component which determines the QoS of a wireless link. Its effect is complemented by the presence of obstruction between the transmitter and receiver. The future cellular network (5G) focuses on operating with the millimeter-wave (mmW). In higher frequency, path loss can play a significant role in degrading the link quality due to higher attenuation. In a scenario, where the operating environment is changing dynamically, sudden degradation of operating conditions or arrival of obstruction between transmitter and receiver may result in link failure. The method analyzed here includes dynamically allocating spectrum at a lower frequency band for a link suffering from high path loss. For the analysis, a wireless link was set up using Universal Software Radio Peripherals (USRPs). The received power is observed to increase by dynamically changing the operating frequency from 1.9 GHz to 830 MHz. Finally the utility of software defined radio (SDR) in the RF front end, to combat the path loss in the future cellular networks, is studied.
△ Less
Submitted 15 October, 2015;
originally announced October 2015.
-
Full-Duplex Transceiver for Future Cellular Network: A Smart Antenna Approach
Authors:
Chandan Pradhan,
Garimella Rama Murthy
Abstract:
In this paper, we propose a transceiver architecture for full-duplex (FD) eNodeB (eNB) and FD user equipment (UE) transceiver. For FD communication,.i.e., simultaneous in-band uplink and downlink operation, same subcarriers can be allocated to UE in both uplink and downlink. Hence, contrary to traditional LTE, we propose using single-carrier frequency division multiple accesses (SC-FDMA) for downl…
▽ More
In this paper, we propose a transceiver architecture for full-duplex (FD) eNodeB (eNB) and FD user equipment (UE) transceiver. For FD communication,.i.e., simultaneous in-band uplink and downlink operation, same subcarriers can be allocated to UE in both uplink and downlink. Hence, contrary to traditional LTE, we propose using single-carrier frequency division multiple accesses (SC-FDMA) for downlink along with the conventional method of using it for uplink. The use of multiple antennas at eNB and singular value decomposition (SVD) in the downlink allows multiple users (MU) to operate on the same set of ubcarriers. In the uplink, successive interference cancellation with optimal ordering (SSIC-OO) algorithm is used to decouple signals of UEs operating in the same set of subcarriers. A smart antenna approach is adopted which prevents interference, in downlink of a UE, from uplink signals of other UEs sharing same subcarriers. The approach includes using multiple antennas at UEs to form directed beams towards eNode and nulls towards other UEs. The proposed architecture results in significant improvement of the overall spectrum efficiency per cell of the cellular network.
△ Less
Submitted 9 September, 2015;
originally announced September 2015.
-
Decentralized Joint-Sparse Signal Recovery: A Sparse Bayesian Learning Approach
Authors:
Saurabh Khanna,
Chandra R. Murthy
Abstract:
This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to stan…
▽ More
This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to standalone sparse signal recovery schemes. To reduce the amount of inter-node communication and the associated overheads, the nodes exchange messages with only a small subset of their single hop neighbors. Under this communication scheme, we separately analyze the convergence of the underlying Alternating Directions Method of Multipliers (ADMM) iterations used in our proposed algorithm and establish its linear convergence rate. The findings from the convergence analysis of decentralized ADMM are used to accelerate the convergence of the proposed CB-DSBL algorithm. Using Monte Carlo simulations, we demonstrate the superior signal reconstruction as well as support recovery performance of our proposed algorithm compared to existing decentralized algorithms: DRL-1, DCOMP and DCSP.
△ Less
Submitted 18 December, 2015; v1 submitted 9 July, 2015;
originally announced July 2015.
-
Full-Duplex eNodeB and UE Design for 5G Networks
Authors:
Chandan Pradhan,
Kunal Sankhe,
Sumit Kumar,
Garimella Rama Murthy
Abstract:
The recent progress in the area of self-interference cancellation (SIC) design has enabled the development of full-duplex (FD) single and multiple antenna systems. In this paper, we propose a design for FD eNodeB (eNB) and user equipment (UE) for 5G networks. The use of FD operation enables simultaneous in-band uplink and downlink operation and thereby cutting down the spectrum requirement by half…
▽ More
The recent progress in the area of self-interference cancellation (SIC) design has enabled the development of full-duplex (FD) single and multiple antenna systems. In this paper, we propose a design for FD eNodeB (eNB) and user equipment (UE) for 5G networks. The use of FD operation enables simultaneous in-band uplink and downlink operation and thereby cutting down the spectrum requirement by half. FD operation requires the same subcarrier allocation to UE in both uplink and downlink. Long Term Evolution LTE) uses orthogonal frequency division multiple access (OFDMA) for downlink. To enable FD operation, we propose using single carrier frequency division multiple access SC-FDMA) for downlink along with the conventional method of using it for uplink. Taking advantage of channel reciprocity, singular value decomposition (SVD) based eamforming in the downlink allows multiple users (MU) to operate on same set of subcarriers. In uplink, frequency domain minimum mean square error (MMSE) equalizer along with successive interference cancellation with optimal ordering (SSIC-OO) algorithm is used to decouple signals of users operating in the same set of subcarriers. The work includes simulations showing efficient FD operation both at UE and eNB for downlink and uplink respectively.
△ Less
Submitted 6 June, 2015;
originally announced June 2015.
-
Computationally Tractable Algorithms for Finding a Subset of Non-defective Items from a Large Population
Authors:
Abhay Sharma,
Chandra R. Murthy
Abstract:
In the classical non-adaptive group testing setup, pools of items are tested together, and the main goal of a recovery algorithm is to identify the "complete defective set" given the outcomes of different group tests. In contrast, the main goal of a "non-defective subset recovery" algorithm is to identify a "subset" of non-defective items given the test outcomes. In this paper, we present a suite…
▽ More
In the classical non-adaptive group testing setup, pools of items are tested together, and the main goal of a recovery algorithm is to identify the "complete defective set" given the outcomes of different group tests. In contrast, the main goal of a "non-defective subset recovery" algorithm is to identify a "subset" of non-defective items given the test outcomes. In this paper, we present a suite of computationally efficient and analytically tractable non-defective subset recovery algorithms. By analyzing the probability of error of the algorithms, we obtain bounds on the number of tests required for non-defective subset recovery with arbitrarily small probability of error. Our analysis accounts for the impact of both the additive noise (false positives) and dilution noise (false negatives). By comparing with the information theoretic lower bounds, we show that the upper bounds on the number of tests are order-wise tight up to a $\log^2K$ factor, where $K$ is the number of defective items. We also provide simulation results that compare the relative performance of the different algorithms and provide further insights into their practical utility. The proposed algorithms significantly outperform the straightforward approaches of testing items one-by-one, and of first identifying the defective set and then choosing the non-defective items from the complement set, in terms of the number of measurements required to ensure a given success rate.
△ Less
Submitted 28 February, 2016; v1 submitted 14 February, 2015;
originally announced February 2015.
-
Incorporating Views on Marginal Distributions in the Calibration of Risk Models
Authors:
Santanu Dey,
Sandeep Juneja,
Karthyek R. A. Murthy
Abstract:
Entropy based ideas find wide-ranging applications in finance for calibrating models of portfolio risk as well as options pricing. The abstracted problem, extensively studied in the literature, corresponds to finding a probability measure that minimizes relative entropy with respect to a specified measure while satisfying constraints on moments of associated random variables. These moments may cor…
▽ More
Entropy based ideas find wide-ranging applications in finance for calibrating models of portfolio risk as well as options pricing. The abstracted problem, extensively studied in the literature, corresponds to finding a probability measure that minimizes relative entropy with respect to a specified measure while satisfying constraints on moments of associated random variables. These moments may correspond to views held by experts in the portfolio risk setting and to market prices of liquid options for options pricing models. However, it is reasonable that in the former settings, the experts may have views on tails of risks of some securities. Similarly, in options pricing, significant literature focuses on arriving at the implied risk neutral density of benchmark instruments through observed market prices. With the intent of calibrating models to these more general stipulations, we develop a unified entropy based methodology to allow constraints on both moments as well as marginal distributions of functions of underlying securities. This is applied to Markowitz portfolio framework, where a view that a particular portfolio incurs heavy tailed losses is shown to lead to fatter and more reasonable tails for losses of component securities. We also use this methodology to price non-traded options using market information such as observed option prices and implied risk neutral densities of benchmark instruments.
△ Less
Submitted 3 November, 2014;
originally announced November 2014.
-
Towards a theory of granular sets
Authors:
Garimella Rama Murthy
Abstract:
Motivated by the application problem of sensor fusion the author introduced the concept of graded set. It is reasoned that in classification problem arising in an information system (represented by information table), a novel set called Granular set naturally arises. It is realized that in any hierarchical classification problem, Granular set naturally arises. Also when the target set of objects f…
▽ More
Motivated by the application problem of sensor fusion the author introduced the concept of graded set. It is reasoned that in classification problem arising in an information system (represented by information table), a novel set called Granular set naturally arises. It is realized that in any hierarchical classification problem, Granular set naturally arises. Also when the target set of objects forms a graded set the lower and upper approximations of target sets form a graded set. This generalizes the concept of rough set. It is hoped that a detailed theory of granular/ graded sets finds several applications.
△ Less
Submitted 17 June, 2014;
originally announced June 2014.
-
Exact Simulation of Multidimensional Reflected Brownian Motion
Authors:
Jose Blanchet,
Karthyek R. A. Murthy
Abstract:
We present the first exact simulation method for multidimensional reflected Brownian motion (RBM). Exact simulation in this setting is challenging because of the presence of correlated local-time-like terms in the definition of RBM. We apply recently developed so-called $\varepsilon-$strong simulation techniques (also known as Tolerance-Enforced Simulation) which allow us to provide a piece-wise l…
▽ More
We present the first exact simulation method for multidimensional reflected Brownian motion (RBM). Exact simulation in this setting is challenging because of the presence of correlated local-time-like terms in the definition of RBM. We apply recently developed so-called $\varepsilon-$strong simulation techniques (also known as Tolerance-Enforced Simulation) which allow us to provide a piece-wise linear approximation to RBM with $\varepsilon $ (deterministic) error in uniform norm. A novel conditional acceptance/rejection step is then used to eliminate the error. In particular, we condition on a suitably designed information structure so that a feasible proposal distribution can be applied.
△ Less
Submitted 30 August, 2017; v1 submitted 26 May, 2014;
originally announced May 2014.
-
Mathematical Modelling of Energy Wastage in Absence of Levelling and Sectoring in Wireless Sensor Networks
Authors:
Priyanka Sharma,
Garimella Rama Murthy
Abstract:
In this paper, we quantitatively (mathematically) reason the energy savings achieved by the Leveling and Sectoring protocol. Due to the energy constraints on the sensor nodes (in terms of supply of energy) energy awareness has become crucial in networking protocol stack. The understanding of routing protocols along with energy awareness in a network would help in energy opti-mization with efficien…
▽ More
In this paper, we quantitatively (mathematically) reason the energy savings achieved by the Leveling and Sectoring protocol. Due to the energy constraints on the sensor nodes (in terms of supply of energy) energy awareness has become crucial in networking protocol stack. The understanding of routing protocols along with energy awareness in a network would help in energy opti-mization with efficient routing .We provide analytical modelling of the energy wastage in the absence of Leveling and Sectoring protocol by considering the network in the form of binary tree, nested tree and Q-ary tree. The simulation results reflect the energy wastage in the absence of Levelling and Sectoring based hybrid protocol.
△ Less
Submitted 24 February, 2014;
originally announced February 2014.
-
On the Capacity of the 2-User Interference Channel with Transmitter Cooperation and Secrecy Constraints
Authors:
Parthajit Mohapatra,
Chandra R. Murthy
Abstract:
This paper studies the value of limited rate cooperation between the transmitters for managing interference and simultaneously ensuring secrecy, in the 2-user Gaussian symmetric interference channel (GSIC). First, the problem is studied in the symmetric linear deterministic IC (SLDIC) setting, and achievable schemes are proposed, based on interference cancelation, relaying of the other user's data…
▽ More
This paper studies the value of limited rate cooperation between the transmitters for managing interference and simultaneously ensuring secrecy, in the 2-user Gaussian symmetric interference channel (GSIC). First, the problem is studied in the symmetric linear deterministic IC (SLDIC) setting, and achievable schemes are proposed, based on interference cancelation, relaying of the other user's data bits, and transmission of random bits. In the proposed achievable scheme, the limited rate cooperative link is used to share a combination of data bits and random bits depending on the model parameters. Outer bounds on the secrecy rate are also derived, using a novel partitioning of the encoded messages and outputs depending on the relative strength of the signal and the interference. The inner and outer bounds are derived under all possible parameter settings. It is found that, for some parameter settings, the inner and outer bounds match, yielding the capacity of the SLDIC under transmitter cooperation and secrecy constraints. In some other scenarios, the achievable rate matches with the capacity region of the 2-user SLDIC without secrecy constraints derived by Wang and Tse [1]; thus, the proposed scheme offers secrecy for free, in these cases. Inspired by the achievable schemes and outer bounds in the deterministic case, achievable schemes and outer bounds are derived in the Gaussian case. The proposed achievable scheme for the Gaussian case is based on Marton's coding scheme and stochastic encoding along with dummy message transmission. One of the key techniques used in the achievable scheme for both the models is interference cancelation, which simultaneously offers two seemingly conflicting benefits: it cancels interference and ensures secrecy. Many of the results derived in this paper extend to the asymmetric case also.
△ Less
Submitted 13 June, 2016; v1 submitted 21 February, 2014;
originally announced February 2014.
-
Towards a Resolution of P = NP Conjecture
Authors:
Garimella Rama Murthy
Abstract:
In this research paper, the problem of optimization of a quadratic form over the convex hull generated by the corners of hypercube is attempted and solved. It is reasoned that under some conditions, the optimum occurs at the corners of hypercube. Results related to the computation of global optimum stable state (an NP hard problem) are discussed. An algorithm is proposed. It is hoped that the resu…
▽ More
In this research paper, the problem of optimization of a quadratic form over the convex hull generated by the corners of hypercube is attempted and solved. It is reasoned that under some conditions, the optimum occurs at the corners of hypercube. Results related to the computation of global optimum stable state (an NP hard problem) are discussed. An algorithm is proposed. It is hoped that the results shed light on resolving the P not equal to NP problem.
△ Less
Submitted 28 January, 2014;
originally announced January 2014.
-
Optimal Hybrid Channel Allocation:Based On Machine Learning Algorithms
Authors:
K Viswanadh,
Dr. G Rama Murthy
Abstract:
Recent advances in cellular communication systems resulted in a huge increase in spectrum demand. To meet the requirements of the ever-growing need for spectrum, efficient utilization of the existing resources is of utmost importance. Channel Allocation, has thus become an inevitable research topic in wireless communications. In this paper, we propose an optimal channel allocation scheme, Optimal…
▽ More
Recent advances in cellular communication systems resulted in a huge increase in spectrum demand. To meet the requirements of the ever-growing need for spectrum, efficient utilization of the existing resources is of utmost importance. Channel Allocation, has thus become an inevitable research topic in wireless communications. In this paper, we propose an optimal channel allocation scheme, Optimal Hybrid Channel Allocation (OHCA) for an effective allocation of channels. We improvise upon the existing Fixed Channel Allocation (FCA) technique by imparting intelligence to the existing system by employing the multilayer perceptron technique.
△ Less
Submitted 28 September, 2013;
originally announced September 2013.
-
On Finding a Subset of Healthy Individuals from a Large Population
Authors:
Abhay Sharma,
Chandra R. Murthy
Abstract:
In this paper, we derive mutual information based upper and lower bounds on the number of nonadaptive group tests required to identify a given number of "non defective" items from a large population containing a small number of "defective" items. We show that a reduction in the number of tests is achievable compared to the approach of first identifying all the defective items and then picking the…
▽ More
In this paper, we derive mutual information based upper and lower bounds on the number of nonadaptive group tests required to identify a given number of "non defective" items from a large population containing a small number of "defective" items. We show that a reduction in the number of tests is achievable compared to the approach of first identifying all the defective items and then picking the required number of non-defective items from the complement set. In the asymptotic regime with the population size $N \rightarrow \infty$, to identify $L$ non-defective items out of a population containing $K$ defective items, when the tests are reliable, our results show that $\frac{C_s K}{1-o(1)} (Φ(α_0, β_0) + o(1))$ measurements are sufficient, where $C_s$ is a constant independent of $N, K$ and $L$, and $Φ(α_0, β_0)$ is a bounded function of $α_0 \triangleq \lim_{N\rightarrow \infty} \frac{L}{N-K}$ and $β_0 \triangleq \lim_{N\rightarrow \infty} \frac{K} {N-K}$. Further, in the nonadaptive group testing setup, we obtain rigorous upper and lower bounds on the number of tests under both dilution and additive noise models. Our results are derived using a general sparse signal model, by virtue of which, they are also applicable to other important sparse signal based applications such as compressive sensing.
△ Less
Submitted 28 February, 2016; v1 submitted 31 July, 2013;
originally announced July 2013.
-
Global cognitive radio based communication systems: Space-time communications
Authors:
Dr. G. Rama Murthy,
M. Srikanth,
K. Viswanadh
Abstract:
Spectrum Scarcity is a global problem across the world. This paper emphasizes on the fact that a global problem has to be dealt on global basis, not just locally by applying the principle of global cognitive radio,Global Opportunistic Remote Spectrum Access. The Future Internet and Internet of Things literally scare the communication system designer regarding the available bandwidth and spectrum r…
▽ More
Spectrum Scarcity is a global problem across the world. This paper emphasizes on the fact that a global problem has to be dealt on global basis, not just locally by applying the principle of global cognitive radio,Global Opportunistic Remote Spectrum Access. The Future Internet and Internet of Things literally scare the communication system designer regarding the available bandwidth and spectrum resources. There is absolutely no scope to waste or under utilize the available resources. Hence the proposed idea of Global Cognitive Radio Concept can undoubtedly solve the resource problems in next Generation Communications.
△ Less
Submitted 12 April, 2013;
originally announced April 2013.
-
Concurrent Cyber Physical Systems:Tensor State Space Representation
Authors:
Garimella Rama Murthy
Abstract:
In this research paper, state space representation of concurrent, linearly coupled dynamical systems is discussed. It is reasoned that the Tensor State Space Representation (TSSR) proposed in [Rama1] is directly applicable in such a problem. Also some discussion on linearly coupled, concurrent systems evolving on multiple time scales is included. Briefly new ideas related to distributed signal pro…
▽ More
In this research paper, state space representation of concurrent, linearly coupled dynamical systems is discussed. It is reasoned that the Tensor State Space Representation (TSSR) proposed in [Rama1] is directly applicable in such a problem. Also some discussion on linearly coupled, concurrent systems evolving on multiple time scales is included. Briefly new ideas related to distributed signal processing in cyber physical systems are included.
△ Less
Submitted 6 March, 2013;
originally announced March 2013.
-
Heterogeneous Dynamic Priority Scheduling in time critical applications: Mobile Wireless Sensor Networks
Authors:
Arvind Viswanathan,
Dr. Garimella Rama Murthy
Abstract:
In the unlicensed band, the notion of primary user and secondary user (To implement cognitive radio) is not explicit. By dynamic priority assignment we propose to implement cognitive radio in the unlicensed band. In time critical events, the data which is most important, has to be given the time slots. Wireless Sensor nodes in our case are considered to be mobile, and hence make it difficult to pr…
▽ More
In the unlicensed band, the notion of primary user and secondary user (To implement cognitive radio) is not explicit. By dynamic priority assignment we propose to implement cognitive radio in the unlicensed band. In time critical events, the data which is most important, has to be given the time slots. Wireless Sensor nodes in our case are considered to be mobile, and hence make it difficult to prioritize one over another. A node may be out of the reach of the cluster head or base station by the time it is allotted a time slot and hence mobility is a constraint. With the data changing dynamically and factors such as energy and mobility, which are major constraints, assigning priority to the nodes becomes difficult. In this paper, we have discussed about how Wireless Sensor Networks are able to allocate priorities to nodes in the unlicensed band with multiple parameters being posed. We have done simulations on NS-2 and have shown the implementation results.
△ Less
Submitted 3 March, 2013; v1 submitted 24 February, 2013;
originally announced February 2013.
-
Secrecy in the 2-User Symmetric Deterministic Interference Channel with Transmitter Cooperation
Authors:
Parthajit Mohapatra,
Chandra R. Murthy
Abstract:
This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user's data bits, time sharing, and transmission of random bits, depending on the rate of…
▽ More
This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user's data bits, time sharing, and transmission of random bits, depending on the rate of the cooperative link and the relative strengths of the signal and the interference. The results show, for example, that the proposed scheme achieves the same rate as the capacity without the secrecy constraints, in the initial part of the weak interference regime. Also, sharing random bits through the cooperative link can achieve a higher secrecy rate compared to sharing data bits, in the very high interference regime. The results highlight the importance of limited transmitter cooperation in facilitating secure communications over 2-user interference channels.
△ Less
Submitted 3 April, 2013; v1 submitted 28 January, 2013;
originally announced January 2013.
-
Time/Computationally Optimal Network Architecture: Wireless Sensor Fusion
Authors:
Gadi Gayathri Devi,
Priya Kumari,
Eslavath Jyoshna,
Deepika,
Garimella Rama Murthy
Abstract:
In this research paper, the problems dealing with sensor network architecture, sensor fusion are addressed. Time/Computationally optimal network architectures are investigated. Some novel ideas on sensor fusion are proposed.
In this research paper, the problems dealing with sensor network architecture, sensor fusion are addressed. Time/Computationally optimal network architectures are investigated. Some novel ideas on sensor fusion are proposed.
△ Less
Submitted 15 February, 2013; v1 submitted 23 January, 2013;
originally announced January 2013.
-
Arithmetical Functions : Infinite Products
Authors:
Garimella Rama Murthy
Abstract:
In this technical report, certain interesting classification of arithmetical functions is proposed. The notion of additively decomposable and multiplicatively decomposable arithmetical functions is proposed. The concepts of arithmetical polynomials and arithmetical power series are introduced. Using these concepts, an interesting Theorem relating arithmetical power series and infinite products has…
▽ More
In this technical report, certain interesting classification of arithmetical functions is proposed. The notion of additively decomposable and multiplicatively decomposable arithmetical functions is proposed. The concepts of arithmetical polynomials and arithmetical power series are introduced. Using these concepts, an interesting Theorem relating arithmetical power series and infinite products has been proved. Also arithmetical polynomials are related to probabilistic number theory. Furthermore some results related to the Waring problem are discussed.
△ Less
Submitted 26 November, 2012;
originally announced December 2012.
-
Throughput Analysis of Primary and Secondary Networks in a Shared IEEE 802.11 System
Authors:
Santhosh Kumar,
Nirmal Shende,
Chandra R. Murthy,
Arun Ayyagari
Abstract:
In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integ…
▽ More
In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integrate the notion of transmission slots in Bianchi's Markov model with the physical time slots, to derive the transmission probability of the secondary network as a function of its scan duration. This is used to obtain analytical expressions for the throughput achievable by the primary and secondary networks. Our analysis considers both saturated and unsaturated networks. By performing a numerical search, the secondary network parameters are selected to maximize its throughput for a given level of protection of the primary network throughput. The theoretical expressions are validated using extensive simulations carried out in the Network Simulator 2. Our results provide critical insights into the performance and robustness of different schemes for medium access by the secondary network. In particular, we find that the channel captures by the secondary network does not significantly impact the primary throughput, and that simply increasing the secondary contention window size is only marginally inferior to silent-period based methods in terms of its throughput performance.
△ Less
Submitted 5 December, 2012;
originally announced December 2012.
-
On Whitespace Identification Using Randomly Deployed Sensors
Authors:
Rahul Vaze,
Chandra R. Murthy
Abstract:
This work considers the identification of the available whitespace, i.e., the regions that are not covered by any of the existing transmitters, within a given geographical area. To this end, $n$ sensors are deployed at random locations within the area. These sensors detect for the presence of a transmitter within their radio range $r_s$, and their individual decisions are combined to estimate the…
▽ More
This work considers the identification of the available whitespace, i.e., the regions that are not covered by any of the existing transmitters, within a given geographical area. To this end, $n$ sensors are deployed at random locations within the area. These sensors detect for the presence of a transmitter within their radio range $r_s$, and their individual decisions are combined to estimate the available whitespace. The limiting behavior of the recovered whitespace as a function of $n$ and $r_s$ is analyzed. It is shown that both the fraction of the available whitespace that the nodes fail to recover as well as their radio range both optimally scale as $\log(n)/n$ as $n$ gets large. The analysis is extended to the case of unreliable sensors, and it is shown that, surprisingly, the optimal scaling is still $\log(n)/n$ even in this case. A related problem of estimating the number of transmitters and their locations is also analyzed, with the sum absolute error in localization as performance metric. The optimal scaling of the radio range and the necessary minimum transmitter separation is determined, that ensure that the sum absolute error in transmitter localization is minimized, with high probability, as $n$ gets large. Finally, the optimal distribution of sensor deployment is determined, given the distribution of the transmitters, and the resulting performance benefit is characterized.
△ Less
Submitted 20 November, 2012;
originally announced November 2012.
-
Graphs: Associated Markov Chains
Authors:
Garimella Rama Murthy
Abstract:
In this research paper, weighted / unweighted, directed / undirected graphs are associated with interesting Discrete Time Markov Chains (DTMCs) as well as Continuous Time Markov Chains (CTMCs). The equilibrium / transient behaviour of such Markov chains is studied. Also entropy dynamics (Shannon entropy) of certain structured Markov chains is investigated. Finally certain structured graphs and the…
▽ More
In this research paper, weighted / unweighted, directed / undirected graphs are associated with interesting Discrete Time Markov Chains (DTMCs) as well as Continuous Time Markov Chains (CTMCs). The equilibrium / transient behaviour of such Markov chains is studied. Also entropy dynamics (Shannon entropy) of certain structured Markov chains is investigated. Finally certain structured graphs and the associated Markov chains are studied.
△ Less
Submitted 15 September, 2012;
originally announced September 2012.
-
Direct evidence of photo-ionization causing luminescence "off" state in CdTe Quantum dots
Authors:
A. V. R. Murthy,
Padmashri Patil,
Shouvik Datta,
Shivprasad Patil
Abstract:
We present a direct experimental evidence of photo-ionized CdTe quantum dot core having luminescence "off" state at band-edge photo-excitation. We use the autocorrelation of fluorescence fluctuations from dilute colloidal solution of CdTe quantum dots in a diffraction limited detection volume to determine their photo-ionization probability. The ionization probability is in the same order of magnit…
▽ More
We present a direct experimental evidence of photo-ionized CdTe quantum dot core having luminescence "off" state at band-edge photo-excitation. We use the autocorrelation of fluorescence fluctuations from dilute colloidal solution of CdTe quantum dots in a diffraction limited detection volume to determine their photo-ionization probability. The ionization probability is in the same order of magnitude (\approx10-6) as the CdSe and CdSe/ZnS core/shell quantum dots. Further, we measured the ionization/ neutralization rates (\approx104 s-1) after addition of β-mercaptanol and found that ionization rate is enhanced by two orders of magnitude after the addition. However, a comparable neutralization rate enhances the light emission quantum yield. The ionization/ neutralization at microsecond time scales puts an upper limit on achieving better quantum yield by thiol addition. The results also indicate that the dominant ionization mechanism at band-edge excitation is tunneling.
△ Less
Submitted 16 August, 2012;
originally announced August 2012.
-
Structured Multi-Matrix Variate, Matrix Polynomial Equations: Solution Techniques
Authors:
Garimella Rama Murthy
Abstract:
In this research paper, structured bi-matrix variate, matrix quadratic equations are considered. Some lemmas related to determining the eigenvalues of unknown matrices are proved. Also, a method of determining the diagonalizabe unknown matrices is provided. The results are generalized to multi-matrix variate, matrix polynomial equations. Briefly generalization to tensor variate polynomial equation…
▽ More
In this research paper, structured bi-matrix variate, matrix quadratic equations are considered. Some lemmas related to determining the eigenvalues of unknown matrices are proved. Also, a method of determining the diagonalizabe unknown matrices is provided. The results are generalized to multi-matrix variate, matrix polynomial equations. Briefly generalization to tensor variate polynomial equations is discussed. It is hoped that the results lead to important contributions in "non-commutative algebra".
△ Less
Submitted 21 July, 2012;
originally announced July 2012.
-
Optimization of Quadratic Forms: NP Hard Problems : Neural Networks
Authors:
Garimella Rama Murthy
Abstract:
In this research paper, the problem of optimization of a quadratic form over the convex hull generated by the corners of hypercube is attempted and solved. Some results related to stable states/vectors, anti-stable states/vectors (over the hypercube) are discussed. Some results related to the computation of global optimum stable state (an NP hard problem) are discussed. It is hoped that the result…
▽ More
In this research paper, the problem of optimization of a quadratic form over the convex hull generated by the corners of hypercube is attempted and solved. Some results related to stable states/vectors, anti-stable states/vectors (over the hypercube) are discussed. Some results related to the computation of global optimum stable state (an NP hard problem) are discussed. It is hoped that the results shed light on resolving the P \neq NP problem.
△ Less
Submitted 3 July, 2012;
originally announced July 2012.