-
Variable X-ray reflection from 1H~0419--577
Authors:
Main Pal,
Gulab C. Dewangan
Abstract:
We present detailed broadband X-ray spectral variability of a Seyfert 1 galaxy 1H~0419--577 based on an archival \suzaku{} observation in July 2007, a new \suzaku{} observation performed in January 2010 and the two latest \xmm{} observations from May 2010. All the observations show soft X-ray excess emission below $2\kev$ and both \suzaku{} observations show a hard X-ray excess emission above…
▽ More
We present detailed broadband X-ray spectral variability of a Seyfert 1 galaxy 1H~0419--577 based on an archival \suzaku{} observation in July 2007, a new \suzaku{} observation performed in January 2010 and the two latest \xmm{} observations from May 2010. All the observations show soft X-ray excess emission below $2\kev$ and both \suzaku{} observations show a hard X-ray excess emission above $10\kev$ when compared to a power-law. We have tested three physical models -- a complex partial covering absorption model, a blurred reflection model and an intrinsic disk Comptonization model. Among these three models, the blurred reflection model provided statistically the best-fit to all the four observations. Irrespective of the models used, the soft X-ray excess emission requires contribution from a thermal component similar to that expected from an accretion disk. The partial covering absorption model results in a nonphysical high temperature ($kT_{in} \sim 100\ev$) for an accretion disk and is also statistically the worst fit among the three models. 1H~0419--577 showed remarkable X-ray spectral variability. The soft X-ray excess and the power-law both became weaker in January 2010 as well as in May 2010. A moderately broad iron line, detected in July 2007, is absent in the January 2010 observation. Correlated variability of the soft X-ray excess and the iron $Kα$ line strongly suggest reflection origin for both the components. However, such spectral variability cannot be explained by the light bending model alone and requires changes in the accretion disk/corona geometry possibly arising from changes in the accretion rate.
△ Less
Submitted 23 July, 2013;
originally announced July 2013.
-
Early signatures of regime shifts in gene expression dynamics
Authors:
Mainak Pal,
Amit Kumar Pal,
Sayantari Ghosh,
Indrani Bose
Abstract:
Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. Signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bif…
▽ More
Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. Signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, Models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.
△ Less
Submitted 16 May, 2013; v1 submitted 21 December, 2012;
originally announced December 2012.
-
Irregular Bipolar Fuzzy Graphs
Authors:
Sovan Samanta,
Madhumangal Pal
Abstract:
In this paper, we define irregular bipolar fuzzy graphs and its various classifications. Size of regular bipolar fuzzy graphs is derived. The relation between highly and neighbourly irregular bipolar fuzzy graphs are established. Some basic theorems related to the stated graphs have also been presented.
In this paper, we define irregular bipolar fuzzy graphs and its various classifications. Size of regular bipolar fuzzy graphs is derived. The relation between highly and neighbourly irregular bipolar fuzzy graphs are established. Some basic theorems related to the stated graphs have also been presented.
△ Less
Submitted 7 September, 2012;
originally announced September 2012.
-
FCM Based Blood Vessel Segmentation Method for Retinal Images
Authors:
Nilanjan Dey,
Anamitra Bardhan Roy,
Moumita Pal,
Achintya Das
Abstract:
Segmentation of blood vessels in retinal images provides early diagnosis of diseases like glaucoma, diabetic retinopathy and macular degeneration. Among these diseases occurrence of Glaucoma is most frequent and has serious ocular consequences that can even lead to blindness, if it is not detected early. The clinical criteria for the diagnosis of glaucoma include intraocular pressure measurement,…
▽ More
Segmentation of blood vessels in retinal images provides early diagnosis of diseases like glaucoma, diabetic retinopathy and macular degeneration. Among these diseases occurrence of Glaucoma is most frequent and has serious ocular consequences that can even lead to blindness, if it is not detected early. The clinical criteria for the diagnosis of glaucoma include intraocular pressure measurement, optic nerve head evaluation, retinal nerve fiber layer and visual field defects. This form of blood vessel segmentation helps in early detection for ophthalmic diseases, and potentially reduces the risk of blindness. The low-contrast images at the retina owing to narrow blood vessels of the retina are difficult to extract. These low contrast images are, however useful in revealing certain systemic diseases. Motivated by the goals of improving detection of such vessels, this present work proposes an algorithm for segmentation of blood vessels and compares the results between expert ophthalmologist hand-drawn ground-truths and segmented image(i.e. the output of the present work).Sensitivity, specificity, positive predictive value (PPV), positive likelihood ratio (PLR) and accuracy are used to evaluate overall performance.It is found that this work segments blood vessels successfully with sensitivity, specificity, PPV, PLR and accuracy of 99.62%, 54.66%, 95.08%, 219.72 and 95.03%, respectively.
△ Less
Submitted 6 September, 2012;
originally announced September 2012.
-
A Session Based Blind Watermarking Technique within the NROI of Retinal Fundus Images for Authentication Using DWT, Spread Spectrum and Harris Corner Detection
Authors:
Nilanjan Dey,
Moumita Pal,
Achintya Das
Abstract:
Digital Retinal Fundus Images helps to detect various ophthalmic diseases by detecting morphological changes in optical cup, optical disc and macula. Present work proposes a method for the authentication of medical images based on Discrete Wavelet Transformation (DWT) and Spread Spectrum. Proper selection of the Non Region of Interest (NROI) for watermarking is crucial, as the area under concern h…
▽ More
Digital Retinal Fundus Images helps to detect various ophthalmic diseases by detecting morphological changes in optical cup, optical disc and macula. Present work proposes a method for the authentication of medical images based on Discrete Wavelet Transformation (DWT) and Spread Spectrum. Proper selection of the Non Region of Interest (NROI) for watermarking is crucial, as the area under concern has to be the least required portion conveying any medical information. Proposed method discusses both the selection of least impact area and the blind watermarking technique. Watermark is embedded within the High-High (HH) sub band. During embedding, watermarked image is dispersed within the band using a pseudo random sequence and a Session key. Watermarked image is extracted using the session key and the size of the image. In this approach the generated watermarked image having an acceptable level of imperceptibility and distortion is compared to the Original retinal image based on Peak Signal to Noise Ratio (PSNR) and correlation value.
△ Less
Submitted 1 September, 2012;
originally announced September 2012.
-
The Parameterized Complexity Analysis of Partition Sort for Negative Binomial Distribution Inputs
Authors:
Niraj Kumar Singh,
Mita Pal,
Soubhik Chakraborty
Abstract:
The present paper makes a study on Partition sort algorithm for negative binomial inputs. Comparing the results with those for binomial inputs in our previous work, we find that this algorithm is sensitive to parameters of both distributions. But the main effects as well as the interaction effects involving these parameters and the input size are more significant for negative binomial case.
The present paper makes a study on Partition sort algorithm for negative binomial inputs. Comparing the results with those for binomial inputs in our previous work, we find that this algorithm is sensitive to parameters of both distributions. But the main effects as well as the interaction effects involving these parameters and the input size are more significant for negative binomial case.
△ Less
Submitted 23 April, 2012;
originally announced April 2012.
-
Partition Sort Revisited: Reconfirming the Robustness in Average Case and much more!
Authors:
Niraj Kumar Singh,
Mita Pal,
Soubhik Chakraborty
Abstract:
In our previous work there was some indication that Partition Sort could be having a more robust average case O(nlogn) complexity than the popular Quick Sort. In our first study in this paper, we reconfirm this through computer experiments for inputs from Cauchy distribution for which expectation theoretically does not exist. Additionally, the algorithm is found to be sensitive to parameters of th…
▽ More
In our previous work there was some indication that Partition Sort could be having a more robust average case O(nlogn) complexity than the popular Quick Sort. In our first study in this paper, we reconfirm this through computer experiments for inputs from Cauchy distribution for which expectation theoretically does not exist. Additionally, the algorithm is found to be sensitive to parameters of the input probability distribution demanding further investigation on parameterized complexity. The results on this algorithm for Binomial inputs in our second study are very encouraging in that direction.
△ Less
Submitted 27 March, 2012; v1 submitted 8 March, 2012;
originally announced March 2012.
-
How does the Shift-insertion sort behave when the sorting elements follow a Normal distribution?
Authors:
Mita Pal,
Soubhik Chakraborty,
N. C. Mahanti
Abstract:
The present paper examines the behavior of Shift-insertion sort (insertion sort with shifting) for normal distribution inputs and is in continuation of our earlier work on this new algorithm for discrete distribution inputs, namely, negative binomial. Shift insertion sort is found more sensitive for main effects but not for all interaction effects compared to conventional insertion sort.
The present paper examines the behavior of Shift-insertion sort (insertion sort with shifting) for normal distribution inputs and is in continuation of our earlier work on this new algorithm for discrete distribution inputs, namely, negative binomial. Shift insertion sort is found more sensitive for main effects but not for all interaction effects compared to conventional insertion sort.
△ Less
Submitted 1 March, 2012;
originally announced March 2012.
-
Non-parametric convolution based image-segmentation of ill-posed objects applying context window approach
Authors:
Upendra Kumar,
Tapobrata Lahiri,
Manoj Kumar Pal
Abstract:
Context-dependence in human cognition process is a well-established fact. Following this, we introduced the image segmentation method that can use context to classify a pixel on the basis of its membership to a particular object-class of the concerned image. In the broad methodological steps, each pixel was defined by its context window (CW) surrounding it the size of which was fixed heuristically…
▽ More
Context-dependence in human cognition process is a well-established fact. Following this, we introduced the image segmentation method that can use context to classify a pixel on the basis of its membership to a particular object-class of the concerned image. In the broad methodological steps, each pixel was defined by its context window (CW) surrounding it the size of which was fixed heuristically. CW texture defined by the intensities of its pixels was convoluted with weights optimized through a non-parametric function supported by a backpropagation network. Result of convolution was used to classify them. The training data points (i.e., pixels) were carefully chosen to include all variety of contexts of types, i) points within the object, ii) points near the edge but inside the objects, iii) points at the border of the objects, iv) points near the edge but outside the objects, v) points near or at the edge of the image frame. Moreover the training data points were selected from all the images within image-dataset. CW texture information for 1000 pixels from face area and background area of images were captured, out of which 700 CWs were used as training input data, and remaining 300 for testing. Our work gives the first time foundation of quantitative enumeration of efficiency of image-segmentation which is extendable to segment out more than 2 objects within an image.
△ Less
Submitted 9 February, 2012;
originally announced February 2012.
-
The Entropy Influence Conjecture Revisited
Authors:
Bireswar Das,
Manjish Pal,
Vijay Visavaliya
Abstract:
In this paper, we prove that most of the boolean functions, $f : \{-1,1\}^n \rightarrow \{-1,1\}$ satisfy the Fourier Entropy Influence (FEI) Conjecture due to Friedgut and Kalai (Proc. AMS'96). The conjecture says that the Entropy of a boolean function is at most a constant times the Influence of the function. The conjecture has been proven for families of functions of smaller sizes. O'donnell, W…
▽ More
In this paper, we prove that most of the boolean functions, $f : \{-1,1\}^n \rightarrow \{-1,1\}$ satisfy the Fourier Entropy Influence (FEI) Conjecture due to Friedgut and Kalai (Proc. AMS'96). The conjecture says that the Entropy of a boolean function is at most a constant times the Influence of the function. The conjecture has been proven for families of functions of smaller sizes. O'donnell, Wright and Zhou (ICALP'11) verified the conjecture for the family of symmetric functions, whose size is $2^{n+1}$. They are in fact able to prove the conjecture for the family of $d$-part symmetric functions for constant $d$, the size of whose is $2^{O(n^d)}$. Also it is known that the conjecture is true for a large fraction of polynomial sized DNFs (COLT'10). Using elementary methods we prove that a random function with high probability satisfies the conjecture with the constant as $(2 + δ)$, for any constant $δ> 0$.
△ Less
Submitted 20 October, 2011; v1 submitted 19 October, 2011;
originally announced October 2011.
-
K-sort: A new sorting algorithm that beats Heap sort for n <= 70 lakhs!
Authors:
Kiran Kumar Sundararajan,
Mita Pal,
Soubhik Chakraborty,
N. C. Mahanti
Abstract:
Sundararajan and Chakraborty (2007) introduced a new version of Quick sort removing the interchanges. Khreisat (2007) found this algorithm to be competing well with some other versions of Quick sort. However, it uses an auxiliary array thereby increasing the space complexity. Here, we provide a second version of our new sort where we have removed the auxiliary array. This second improved version o…
▽ More
Sundararajan and Chakraborty (2007) introduced a new version of Quick sort removing the interchanges. Khreisat (2007) found this algorithm to be competing well with some other versions of Quick sort. However, it uses an auxiliary array thereby increasing the space complexity. Here, we provide a second version of our new sort where we have removed the auxiliary array. This second improved version of the algorithm, which we call K-sort, is found to sort elements faster than Heap sort for an appreciably large array size (n <= 70,00,000) for uniform U[0, 1] inputs.
△ Less
Submitted 19 July, 2011;
originally announced July 2011.
-
Maximum Matchings via Glauber Dynamics
Authors:
Anant **dal,
Gazal Kochar,
Manjish Pal
Abstract:
In this paper we study the classic problem of computing a maximum cardinality matching in general graphs $G = (V, E)$. The best known algorithm for this problem till date runs in $O(m \sqrt{n})$ time due to Micali and Vazirani \cite{MV80}. Even for general bipartite graphs this is the best known running time (the algorithm of Karp and Hopcroft \cite{HK73} also achieves this bound). For regular bip…
▽ More
In this paper we study the classic problem of computing a maximum cardinality matching in general graphs $G = (V, E)$. The best known algorithm for this problem till date runs in $O(m \sqrt{n})$ time due to Micali and Vazirani \cite{MV80}. Even for general bipartite graphs this is the best known running time (the algorithm of Karp and Hopcroft \cite{HK73} also achieves this bound). For regular bipartite graphs one can achieve an $O(m)$ time algorithm which, following a series of papers, has been recently improved to $O(n \log n)$ by Goel, Kapralov and Khanna (STOC 2010) \cite{GKK10}. In this paper we present a randomized algorithm based on the Markov Chain Monte Carlo paradigm which runs in $O(m \log^2 n)$ time, thereby obtaining a significant improvement over \cite{MV80}.
We use a Markov chain similar to the \emph{hard-core model} for Glauber Dynamics with \emph{fugacity} parameter $λ$, which is used to sample independent sets in a graph from the Gibbs Distribution \cite{V99}, to design a faster algorithm for finding maximum matchings in general graphs. Our result crucially relies on the fact that the mixing time of our Markov Chain is independent of $λ$, a significant deviation from the recent series of works \cite{GGSVY11,MWW09, RSVVY10, S10, W06} which achieve computational transition (for estimating the partition function) on a threshold value of $λ$. As a result we are able to design a randomized algorithm which runs in $O(m\log^2 n)$ time that provides a major improvement over the running time of the algorithm due to Micali and Vazirani. Using the conductance bound, we also prove that mixing takes $Ω(\frac{m}{k})$ time where $k$ is the size of the maximum matching.
△ Less
Submitted 17 August, 2011; v1 submitted 13 July, 2011;
originally announced July 2011.
-
Adsorption of a Cationic Laser Dye onto Polymer/Surfactant Complex Film Fabricated by Layer-by-Layer Electrostatic Self-Assembly Technique
Authors:
P. K. Paula,
S. A. Hussain,
D. Bhattacharjee,
M. Pal
Abstract:
Fabrication of complex molecular films of organic materials is one of the most important issues in modern nanoscience and nanotechnology. Soft materials with flexible properties have been given much attention and can be obtained through bottom up processing from functional molecules, where self-assembly based on supramolecular chemistry and designed assembly have become crucial processes and techn…
▽ More
Fabrication of complex molecular films of organic materials is one of the most important issues in modern nanoscience and nanotechnology. Soft materials with flexible properties have been given much attention and can be obtained through bottom up processing from functional molecules, where self-assembly based on supramolecular chemistry and designed assembly have become crucial processes and technologies. In this short communication, we report the successful incorporation of cationic laser dye Rhodamine 6G abbreviated as R6G into the pre-assembled polyelectrolyte/Surfactant complex film onto quartz substrate by electrostatic adsorption technique. Poly(allylamine hydrochloride) (PAH) was used as polycation and Sodium dodecyl sulphate(SDS) was used as anionic surfactant. UV-Vis absorption spectroscopic characterization reveals the formation of only H-type aggregates of R6G in their aqueous solution and both H and J-type aggregates in PAH/SDS/R6G complex LbL films as well as the kinetics of adsorption of R6G onto the complex films. The ratio of the absorbance intensity of two aggregated bands in PAH/SDS/R6G complex films is merely independent of the concentration range of the SDS solution used to fabricate PAH/SDS complex self-assembled films. Atomic Force Microscopy reveals the formation of R6G aggregates in PAH/SDS/R6G complex films.
△ Less
Submitted 20 June, 2011;
originally announced June 2011.
-
Support vector machines/relevance vector machine for remote sensing classification: A review
Authors:
Mahesh Pal
Abstract:
Kernel-based machine learning algorithms are based on map** data from the original input feature space to a kernel feature space of higher dimensionality to solve a linear problem in that space. Over the last decade, kernel based classification and regression approaches such as support vector machines have widely been used in remote sensing as well as in various civil engineering applications. I…
▽ More
Kernel-based machine learning algorithms are based on map** data from the original input feature space to a kernel feature space of higher dimensionality to solve a linear problem in that space. Over the last decade, kernel based classification and regression approaches such as support vector machines have widely been used in remote sensing as well as in various civil engineering applications. In spite of their better performance with different datasets, support vector machines still suffer from shortcomings such as visualization/interpretation of model, choice of kernel and kernel specific parameter as well as the regularization parameter. Relevance vector machines are another kernel based approach being explored for classification and regression with in last few years. The advantages of the relevance vector machines over the support vector machines is the availability of probabilistic predictions, using arbitrary kernel functions and not requiring setting of the regularization parameter. This paper presents a state-of-the-art review of SVM and RVM in remote sensing and provides some details of their use in other civil engineering application also.
△ Less
Submitted 15 January, 2011;
originally announced January 2011.
-
Combinatorial Geometry of Graph Partitioning - I
Authors:
Manjish Pal
Abstract:
The {\sc $c$-Balanced Separator} problem is a graph-partitioning problem in which given a graph $G$, one aims to find a cut of minimum size such that both the sides of the cut have at least $cn$ vertices. In this paper, we present new directions of progress in the {\sc $c$-Balanced Separator} problem. More specifically, we propose a family of mathematical programs, that depend upon a parameter…
▽ More
The {\sc $c$-Balanced Separator} problem is a graph-partitioning problem in which given a graph $G$, one aims to find a cut of minimum size such that both the sides of the cut have at least $cn$ vertices. In this paper, we present new directions of progress in the {\sc $c$-Balanced Separator} problem. More specifically, we propose a family of mathematical programs, that depend upon a parameter $p > 0$, and is an extension of the uniform version of the SDPs proposed by Goemans and Linial for this problem. In fact for the case, when $p=1$, if one can solve this program in polynomial time then simply using the Goemans-Williamson's randomized rounding algorithm for {\sc Max Cut} \cite{WG95} will give an $O(1)$-factor approximation algorithm for {\sc $c$-Balanced Separator} improving the best known approximation factor of $O(\sqrt{\log n})$ due to Arora, Rao and Vazirani \cite{ARV}. This family of programs is not convex but one can transform them into so called \emph{\textbf{concave programs}} in which one optimizes a concave function over a convex feasible set. It is well known that the optima of such programs lie at one of the extreme points of the feasible set \cite{TTT85}. Our main contribution is a combinatorial characterization of some extreme points of the feasible set of the mathematical program, for $p=1$ case, which to the best of our knowledge is the first of its kind. We further demonstrate how this characterization can be used to solve the program in a restricted setting. Non-convex programs have recently been investigated by Bhaskara and Vijayaraghvan \cite{BV11} in which they design algorithms for approximating Matrix $p$-norms although their algorithmic techniques are analytical in nature.
△ Less
Submitted 19 November, 2010;
originally announced November 2010.
-
Multiarmed Bandit Problems with Delayed Feedback
Authors:
Sudipto Guha,
Kamesh Munagala,
Martin Pal
Abstract:
In this paper we initiate the study of optimization of bandit type problems in scenarios where the feedback of a play is not immediately known. This arises naturally in allocation problems which have been studied extensively in the literature, albeit in the absence of delays in the feedback. We study this problem in the Bayesian setting. In presence of delays, no solution with provable guarantee…
▽ More
In this paper we initiate the study of optimization of bandit type problems in scenarios where the feedback of a play is not immediately known. This arises naturally in allocation problems which have been studied extensively in the literature, albeit in the absence of delays in the feedback. We study this problem in the Bayesian setting. In presence of delays, no solution with provable guarantees is known to exist with sub-exponential running time.
We show that bandit problems with delayed feedback that arise in allocation settings can be forced to have significant structure, with a slight loss in optimality. This structure gives us the ability to reason about the relationship of single arm policies to the entangled optimum policy, and eventually leads to a O(1) approximation for a significantly general class of priors. The structural insights we develop are of key interest and carry over to the setting where the feedback of an action is available instantaneously, and we improve all previous results in this setting as well.
△ Less
Submitted 18 June, 2013; v1 submitted 4 November, 2010;
originally announced November 2010.
-
Design and fabrication of an intrinsically gain flattened Erbium doped fiber amplifier
Authors:
B. Nagaraju,
M. C. Paul,
M. Pal,
A. Pal,
Ravi K. Varshney,
B. P. Pal,
S. K. Bhadra,
Gérard Monnom,
Bernard Dussardier
Abstract:
We report design and subsequent fabrication of an intrinsically gain flattened Erbium doped fiber amplifier (EDFA) based on a highly asymmetrical and concentric dual-core fiber, inner core of which was only partially doped. Phase-resonant optical coupling between the two cores was so tailored through optimization of its refractive index profile parameters that the longer wavelengths within the C…
▽ More
We report design and subsequent fabrication of an intrinsically gain flattened Erbium doped fiber amplifier (EDFA) based on a highly asymmetrical and concentric dual-core fiber, inner core of which was only partially doped. Phase-resonant optical coupling between the two cores was so tailored through optimization of its refractive index profile parameters that the longer wavelengths within the C-band experience relatively higher amplification compared to the shorter wavelengths thereby reducing the difference in the well-known tilt in the gains between the shorter and longer wavelength regions. The fabricated EDFA exhibited a median gain ?28 dB (gain excursion below $\pm$2.2 dB within the C-band) when 16 simultaneous standard signal channels were launched by kee** the I/P level for each at ?20 dBm/ channel. Such EDFAs should be attractive for deployment in metro networks, where economics is a premium, because it would cut down the cost on gain flattening filter head.
△ Less
Submitted 19 November, 2009;
originally announced November 2009.
-
On Low Distortion Embeddings of Statistical Distance Measures into Low Dimensional Spaces
Authors:
Arnab Bhattacharya,
Purushottam Kar,
Manjish Pal
Abstract:
Statistical distance measures have found wide applicability in information retrieval tasks that typically involve high dimensional datasets. In order to reduce the storage space and ensure efficient performance of queries, dimensionality reduction while preserving the inter-point similarity is highly desirable. In this paper, we investigate various statistical distance measures from the point of…
▽ More
Statistical distance measures have found wide applicability in information retrieval tasks that typically involve high dimensional datasets. In order to reduce the storage space and ensure efficient performance of queries, dimensionality reduction while preserving the inter-point similarity is highly desirable. In this paper, we investigate various statistical distance measures from the point of view of discovering low distortion embeddings into low-dimensional spaces. More specifically, we consider the Mahalanobis distance measure, the Bhattacharyya class of divergences and the Kullback-Leibler divergence. We present a dimensionality reduction method based on the Johnson-Lindenstrauss Lemma for the Mahalanobis measure that achieves arbitrarily low distortion. By using the Johnson-Lindenstrauss Lemma again, we further demonstrate that the Bhattacharyya distance admits dimensionality reduction with arbitrarily low additive error. We also examine the question of embeddability into metric spaces for these distance measures due to the availability of efficient indexing schemes on metric spaces. We provide explicit constructions of point sets under the Bhattacharyya and the Kullback-Leibler divergences whose embeddings into any metric space incur arbitrarily large distortions. We show that the lower bound presented for Bhattacharyya distance is nearly tight by providing an embedding that approaches the lower bound for relatively small dimensional datasets.
△ Less
Submitted 17 September, 2009;
originally announced September 2009.
-
Towards an $O(\sqrt[3]{\log n})$-Approximation Algorithm for {\sc Balanced Separator}
Authors:
Manjish Pal
Abstract:
The {\sc $c$-Balanced Separator} problem is a graph-partitioning problem in which given a graph $G$, one aims to find a cut of minimum size such that both the sides of the cut have at least $cn$ vertices. In this paper, we present new directions of progress in the {\sc $c$-Balanced Separator} problem. More specifically, we propose a new family of mathematical programs, which depends upon a param…
▽ More
The {\sc $c$-Balanced Separator} problem is a graph-partitioning problem in which given a graph $G$, one aims to find a cut of minimum size such that both the sides of the cut have at least $cn$ vertices. In this paper, we present new directions of progress in the {\sc $c$-Balanced Separator} problem. More specifically, we propose a new family of mathematical programs, which depends upon a parameter $ε> 0$, and extend the seminal work of Arora-Rao-Vazirani ({\sf ARV}) \cite{ARV} to show that the polynomial time solvability of the proposed family of programs implies an improvement in the approximation factor to $O(\log^{{1/3} + ε} n)$ from the best-known factor of $O(\sqrt{\log n})$ due to {\sf ARV}. In fact, for $ε= 1/3$, the program we get is the SDP proposed by {\sf ARV}. For $ε< 1/3$, this family of programs is not convex but one can transform them into so called \emph{\textbf{concave programs}} in which one optimizes a concave function over a convex feasible set. The properties of concave programs allows one to apply techniques due to Hoffman \cite{H81} or Tuy \emph{et al} \cite{TTT85} to solve such problems with arbitrary accuracy. But the problem of finding of a method to solve these programs that converges in polynomial time still remains open. Our result, although conditional, introduces a new family of programs which is more powerful than semi-definite programming in the context of approximation algorithms and hence it will of interest to investigate this family both in the direction of designing efficient algorithms and proving hardness results.
△ Less
Submitted 8 July, 2009;
originally announced July 2009.
-
General Auction Mechanism for Search Advertising
Authors:
Gagan Aggarwal,
S. Muthukrishnan,
David Pal,
Martin Pal
Abstract:
In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being wi…
▽ More
In sponsored search, a number of advertising slots is available on a search results page, and have to be allocated among a set of advertisers competing to display an ad on the page. This gives rise to a bipartite matching market that is typically cleared by the way of an automated auction. Several auction mechanisms have been proposed, with variants of the Generalized Second Price (GSP) being widely used in practice.
A rich body of work on bipartite matching markets builds upon the stable marriage model of Gale and Shapley and the assignment model of Shapley and Shubik. We apply insights from this line of research into the structure of stable outcomes and their incentive properties to advertising auctions.
We model advertising auctions in terms of an assignment model with linear utilities, extended with bidder and item specific maximum and minimum prices. Auction mechanisms like the commonly used GSP or the well-known Vickrey-Clarke-Groves (VCG) are interpreted as simply computing a \emph{bidder-optimal stable matching} in this model, for a suitably defined set of bidder preferences. In our model, the existence of a stable matching is guaranteed, and under a non-degeneracy assumption a bidder-optimal stable matching exists as well. We give an algorithm to find such matching in polynomial time, and use it to design truthful mechanism that generalizes GSP, is truthful for profit-maximizing bidders, implements features like bidder-specific minimum prices and position-specific bids, and works for rich mixtures of bidders and preferences.
△ Less
Submitted 8 July, 2008;
originally announced July 2008.
-
Algorithms for Secretary Problems on Graphs and Hypergraphs
Authors:
Nitish Korula,
Martin Pal
Abstract:
We examine several online matching problems, with applications to Internet advertising reservation systems. Consider an edge-weighted bipartite graph G, with partite sets L, R. We develop an 8-competitive algorithm for the following secretary problem: Initially given R, and the size of L, the algorithm receives the vertices of L sequentially, in a random order. When a vertex l \in L is seen, all…
▽ More
We examine several online matching problems, with applications to Internet advertising reservation systems. Consider an edge-weighted bipartite graph G, with partite sets L, R. We develop an 8-competitive algorithm for the following secretary problem: Initially given R, and the size of L, the algorithm receives the vertices of L sequentially, in a random order. When a vertex l \in L is seen, all edges incident to l are revealed, together with their weights. The algorithm must immediately either match l to an available vertex of R, or decide that l will remain unmatched.
Dimitrov and Plaxton show a 16-competitive algorithm for the transversal matroid secretary problem, which is the special case with weights on vertices, not edges. (Equivalently, one may assume that for each l \in L, the weights on all edges incident to l are identical.) We use a similar algorithm, but simplify and improve the analysis to obtain a better competitive ratio for the more general problem. Perhaps of more interest is the fact that our analysis is easily extended to obtain competitive algorithms for similar problems, such as to find disjoint sets of edges in hypergraphs where edges arrive online. We also introduce secretary problems with adversarially chosen groups. Finally, we give a 2e-competitive algorithm for the secretary problem on graphic matroids, where, with edges appearing online, the goal is to find a maximum-weight acyclic subgraph of a given graph.
△ Less
Submitted 7 July, 2008;
originally announced July 2008.
-
Online Ad Slotting With Cancellations
Authors:
Florin Constantin,
Jon Feldman,
S. Muthukrishnan,
Martin Pal
Abstract:
Many advertisers buy advertisements (ads) on the Internet or on traditional media and seek simple, online mechanisms to reserve ad slots in advance. Media publishers represent a vast and varying inventory, and they too seek automatic, online mechanisms for pricing and allocating such reservations. In this paper, we present and study a simple model for auctioning such ad slots in advance. Bidders…
▽ More
Many advertisers buy advertisements (ads) on the Internet or on traditional media and seek simple, online mechanisms to reserve ad slots in advance. Media publishers represent a vast and varying inventory, and they too seek automatic, online mechanisms for pricing and allocating such reservations. In this paper, we present and study a simple model for auctioning such ad slots in advance. Bidders arrive sequentially and report which slots they are interested in. The seller must decide immediately whether or not to grant a reservation. Our model allows a seller to accept reservations, but possibly cancel the allocations later and pay the bidder a cancellation compensation (bump payment). Our main result is an online mechanism to derive prices and bump payments that is efficient to implement. This mechanism has many desirable properties. It is individually rational; winners have an incentive to be honest and bidding one's true value dominates any lower bid. Our mechanism's efficiency is within a constant fraction of the a posteriori optimally efficient solution. Its revenue is within a constant fraction of the a posteriori revenue of the Vickrey-Clarke-Groves mechanism. Our results make no assumptions about the order of arrival of bids or the value distribution of bidders and still hold if the items for sale are elements of a matroid, a more general setting than slot allocation.
△ Less
Submitted 8 May, 2008;
originally announced May 2008.
-
Sponsored Search Auctions with Markovian Users
Authors:
Gagan Aggarwal,
Jon Feldman,
S. Muthukrishnan,
Martin Pal
Abstract:
Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. Currently, the most popular auction for sponsored search is the "Generalized Second Price" (GSP) auction in which advertisers are assigned to slots in the decreasing order of their "score," which is defined as the product of their bid and click-thro…
▽ More
Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. Currently, the most popular auction for sponsored search is the "Generalized Second Price" (GSP) auction in which advertisers are assigned to slots in the decreasing order of their "score," which is defined as the product of their bid and click-through rate. In the past few years, there has been significant research on the game-theoretic issues that arise in an advertiser's interaction with the mechanism as well as possible redesigns of the mechanism, but this ranking order has remained standard.
From a search engine's perspective, the fundamental question is: what is the best assignment of advertisers to slots? Here "best" could mean "maximizing user satisfaction," "most efficient," "revenue-maximizing," "simplest to interact with," or a combination of these. To answer this question we need to understand the behavior of a search engine user when she sees the displayed ads, since that defines the commodity the advertisers are bidding on, and its value. Most prior work has assumed that the probability of a user clicking on an ad is independent of the other ads shown on the page.
We propose a simple Markovian user model that does not make this assumption. We then present an algorithm to determine the most efficient assignment under this model, which turns out to be different than that of GSP. A truthful auction then follows from an application of the Vickrey-Clarke-Groves (VCG) mechanism. Further, we show that our assignment has many of the desirable properties of GSP that makes bidding intuitive. At the technical core of our result are a number of insights about the structure of the optimal assignment.
△ Less
Submitted 6 May, 2008;
originally announced May 2008.
-
Geographic Information Systems in Evaluation and Visualization of Construction Schedule
Authors:
V. K. Bansal,
Mahesh Pal
Abstract:
Commercially available scheduling tools such as Primavera and Microsoft Project fail to provide information pertaining to the spatial aspects of construction project. A methodology using geographical information systems (GIS) is developed to represent spatial aspects of the construction progress graphically by synchronizing it with construction schedule. The spatial aspects are depicted by 3D mo…
▽ More
Commercially available scheduling tools such as Primavera and Microsoft Project fail to provide information pertaining to the spatial aspects of construction project. A methodology using geographical information systems (GIS) is developed to represent spatial aspects of the construction progress graphically by synchronizing it with construction schedule. The spatial aspects are depicted by 3D model developed in AutoCAD and construction schedule is generated using Microsoft Excel. Spatial and scheduling information are linked together into the GIS environment (ArcGIS). The GIS-based system developed in this study may help in better understanding the schedule along with its spatial aspects.
△ Less
Submitted 25 March, 2008;
originally announced March 2008.
-
Multiclass Approaches for Support Vector Machine Based Land Cover Classification
Authors:
Mahesh Pal
Abstract:
SVMs were initially developed to perform binary classification; though, applications of binary classification are very limited. Most of the practical applications involve multiclass classification, especially in remote sensing land cover classification. A number of methods have been proposed to implement SVMs to produce multiclass classification. A number of methods to generate multiclass SVMs f…
▽ More
SVMs were initially developed to perform binary classification; though, applications of binary classification are very limited. Most of the practical applications involve multiclass classification, especially in remote sensing land cover classification. A number of methods have been proposed to implement SVMs to produce multiclass classification. A number of methods to generate multiclass SVMs from binary SVMs have been proposed by researchers and is still a continuing research topic. This paper compares the performance of six multi-class approaches to solve classification problem with remote sensing data in term of classification accuracy and computational cost. One vs. one, one vs. rest, Directed Acyclic Graph (DAG), and Error Corrected Output Coding (ECOC) based multiclass approaches creates many binary classifiers and combines their results to determine the class label of a test pixel. Another catogery of multi class approach modify the binary class objective function and allows simultaneous computation of multiclass classification by solving a single optimisation problem. Results from this study conclude the usefulness of One vs. One multi class approach in term of accuracy and computational cost over other multi class approaches.
△ Less
Submitted 17 February, 2008;
originally announced February 2008.
-
Support Vector classifiers for Land Cover Classification
Authors:
Mahesh Pal,
Paul M. Mather
Abstract:
Support vector machines represent a promising development in machine learning research that is not widely used within the remote sensing community. This paper reports the results of Multispectral(Landsat-7 ETM+) and Hyperspectral DAIS)data in which multi-class SVMs are compared with maximum likelihood and artificial neural network methods in terms of classification accuracy. Our results show tha…
▽ More
Support vector machines represent a promising development in machine learning research that is not widely used within the remote sensing community. This paper reports the results of Multispectral(Landsat-7 ETM+) and Hyperspectral DAIS)data in which multi-class SVMs are compared with maximum likelihood and artificial neural network methods in terms of classification accuracy. Our results show that the SVM achieves a higher level of classification accuracy than either the maximum likelihood or the neural classifier, and that the support vector machine can be used with small training datasets and high-dimensional data.
△ Less
Submitted 14 February, 2008;
originally announced February 2008.
-
Extreme Learning Machine for land cover classification
Authors:
Mahesh Pal
Abstract:
This paper explores the potential of extreme learning machine based supervised classification algorithm for land cover classification. In comparison to a backpropagation neural network, which requires setting of several user-defined parameters and may produce local minima, extreme learning machine require setting of one parameter and produce a unique solution. ETM+ multispectral data set (Englan…
▽ More
This paper explores the potential of extreme learning machine based supervised classification algorithm for land cover classification. In comparison to a backpropagation neural network, which requires setting of several user-defined parameters and may produce local minima, extreme learning machine require setting of one parameter and produce a unique solution. ETM+ multispectral data set (England) was used to judge the suitability of extreme learning machine for remote sensing classifications. A back propagation neural network was used to compare its performance in term of classification accuracy and computational cost. Results suggest that the extreme learning machine perform equally well to back propagation neural network in term of classification accuracy with this data set. The computational cost using extreme learning machine is very small in comparison to back propagation neural network.
△ Less
Submitted 11 February, 2008;
originally announced February 2008.
-
A Truthful Mechanism for Offline Ad Slot Scheduling
Authors:
Jon Feldman,
S. Muthukrishnan,
Evdokia Nikolova,
Martin Pal
Abstract:
We consider the "Offline Ad Slot Scheduling" problem, where advertisers must be scheduled to "sponsored search" slots during a given period of time. Advertisers specify a budget constraint, as well as a maximum cost per click, and may not be assigned to more than one slot for a particular search.
We give a truthful mechanism under the utility model where bidders try to maximize their clicks, s…
▽ More
We consider the "Offline Ad Slot Scheduling" problem, where advertisers must be scheduled to "sponsored search" slots during a given period of time. Advertisers specify a budget constraint, as well as a maximum cost per click, and may not be assigned to more than one slot for a particular search.
We give a truthful mechanism under the utility model where bidders try to maximize their clicks, subject to their personal constraints. In addition, we show that the revenue-maximizing mechanism is not truthful, but has a Nash equilibrium whose outcome is identical to our mechanism. As far as we can tell, this is the first treatment of sponsored search that directly incorporates both multiple slots and budget constraints into an analysis of incentives.
Our mechanism employs a descending-price auction that maintains a solution to a certain machine scheduling problem whose job lengths depend on the price, and hence is variable over the auction. The price stops when the set of bidders that can afford that price pack exactly into a block of ad slots, at which point the mechanism allocates that block and continues on the remaining slots. To prove our result on the equilibrium of the revenue-maximizing mechanism, we first show that a greedy algorithm suffices to solve the revenue-maximizing linear program; we then use this insight to prove that bidders allocated in the same block of our mechanism have no incentive to deviate from bidding the fixed price of that block.
△ Less
Submitted 18 January, 2008;
originally announced January 2008.
-
Stochastic Models for Budget Optimization in Search-Based Advertising
Authors:
S. Muthukrishnan,
Martin Pal,
Zoya Svitkina
Abstract:
Internet search companies sell advertisement slots based on users' search queries via an auction. Advertisers have to determine how to place bids on the keywords of their interest in order to maximize their return for a given budget: this is the budget optimization problem. The solution depends on the distribution of future queries.
In this paper, we formulate stochastic versions of the budget…
▽ More
Internet search companies sell advertisement slots based on users' search queries via an auction. Advertisers have to determine how to place bids on the keywords of their interest in order to maximize their return for a given budget: this is the budget optimization problem. The solution depends on the distribution of future queries.
In this paper, we formulate stochastic versions of the budget optimization problem based on natural probabilistic models of distribution over future queries, and address two questions that arise.
[Evaluation] Given a solution, can we evaluate the expected value of the objective function?
[Optimization] Can we find a solution that maximizes the objective function in expectation?
Our main results are approximation and complexity results for these two problems in our three stochastic models. In particular, our algorithmic results show that simple prefix strategies that bid on all cheap keywords up to some level are either optimal or good approximations for many cases; we show other cases to be NP-hard.
△ Less
Submitted 24 September, 2007; v1 submitted 14 December, 2006;
originally announced December 2006.
-
Budget Optimization in Search-Based Advertising Auctions
Authors:
Jon Feldman,
S. Muthukrishnan,
Martin Pal,
Cliff Stein
Abstract:
Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (t…
▽ More
Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem.
△ Less
Submitted 8 December, 2006;
originally announced December 2006.
-
Scale-Dependent Price Fluctuations for the Indian Stock Market
Authors:
Kaushik Matia,
Mukul Pal,
H. Eugene Stanley,
H. Salunkay
Abstract:
Classic studies of the probability density of price fluctuations $g$ for stocks and foreign exchanges of several highly developed economies have been interpreted using a {\it power-law} probability density function $P(g) \sim g^{-(α+1)}$ with exponent values $α> 2$, which are outside the Lévy-stable regime $0 < α< 2$. To test the universality of this relationship for less highly developed econom…
▽ More
Classic studies of the probability density of price fluctuations $g$ for stocks and foreign exchanges of several highly developed economies have been interpreted using a {\it power-law} probability density function $P(g) \sim g^{-(α+1)}$ with exponent values $α> 2$, which are outside the Lévy-stable regime $0 < α< 2$. To test the universality of this relationship for less highly developed economies, we analyze daily returns for the period Nov. 1994--June 2002 for the 49 largest stocks of the National Stock Exchange which has the highest volume of trade in India. We find that $P(g)$ decays as an {\it exponential} function $P(g) \sim \exp(-βg)$ with a characteristic decay scales $β= 1.51 \pm 0.05$ for the negative tail and $β= 1.34 \pm 0.04$ for the positive tail, which is significantly different from that observed for developed economies. Thus we conclude that the Indian stock market may belong to a universality class that differs from those of developed countries analyzed previously.
△ Less
Submitted 1 August, 2003;
originally announced August 2003.