-
Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework
Authors:
Shiva Raj Pokhrel,
Luxing Yang,
Sutharshan Rajasegarar,
Gang Li
Abstract:
This paper introduces a robust zero-trust architecture (ZTA) tailored for the decentralized system that empowers efficient remote work and collaboration within IoT networks. Using blockchain-based federated learning principles, our proposed framework includes a robust aggregation mechanism designed to counteract malicious updates from compromised clients, enhancing the security of the global learn…
▽ More
This paper introduces a robust zero-trust architecture (ZTA) tailored for the decentralized system that empowers efficient remote work and collaboration within IoT networks. Using blockchain-based federated learning principles, our proposed framework includes a robust aggregation mechanism designed to counteract malicious updates from compromised clients, enhancing the security of the global learning process. Moreover, secure and reliable trust computation is essential for remote work and collaboration. The robust ZTA framework integrates anomaly detection and trust computation, ensuring secure and reliable device collaboration in a decentralized fashion. We introduce an adaptive algorithm that dynamically adjusts to varying user contexts, using unsupervised clustering to detect novel anomalies, like zero-day attacks. To ensure a reliable and scalable trust computation, we develop an algorithm that dynamically adapts to varying user contexts by employing incremental anomaly detection and clustering techniques to identify and share local and global anomalies between nodes. Future directions include scalability improvements, Dirichlet process for advanced anomaly detection, privacy-preserving techniques, and the integration of post-quantum cryptographic methods to safeguard against emerging quantum threats.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Analysis, Modeling and Design of Personalized Digital Learning Environment
Authors:
Sanjaya Khanal,
Shiva Raj Pokhrel
Abstract:
This research analyzes, models and develops a novel Digital Learning Environment (DLE) fortified by the innovative Private Learning Intelligence (PLI) framework. The proposed PLI framework leverages federated machine learning (FL) techniques to autonomously construct and continuously refine personalized learning models for individual learners, ensuring robust privacy protection. Our approach is pi…
▽ More
This research analyzes, models and develops a novel Digital Learning Environment (DLE) fortified by the innovative Private Learning Intelligence (PLI) framework. The proposed PLI framework leverages federated machine learning (FL) techniques to autonomously construct and continuously refine personalized learning models for individual learners, ensuring robust privacy protection. Our approach is pivotal in advancing DLE capabilities, empowering learners to actively participate in personalized real-time learning experiences. The integration of PLI within a DLE also streamlines instructional design and development demands for personalized teaching/learning. We seek ways to establish a foundation for the seamless integration of FL into learning systems, offering a transformative approach to personalized learning in digital environments. Our implementation details and code are made public.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
An Independent Implementation of Quantum Machine Learning Algorithms in Qiskit for Genomic Data
Authors:
Navneet Singh,
Shiva Raj Pokhrel
Abstract:
In this paper, we explore the power of Quantum Machine Learning as we extend, implement and evaluate algorithms like Quantum Support Vector Classifier (QSVC), Pegasos-QSVC, Variational Quantum Circuits (VQC), and Quantum Neural Networks (QNN) in Qiskit with diverse feature map** techniques for genomic sequence classification.
In this paper, we explore the power of Quantum Machine Learning as we extend, implement and evaluate algorithms like Quantum Support Vector Classifier (QSVC), Pegasos-QSVC, Variational Quantum Circuits (VQC), and Quantum Neural Networks (QNN) in Qiskit with diverse feature map** techniques for genomic sequence classification.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Quantum Federated Learning Experiments in the Cloud with Data Encoding
Authors:
Shiva Raj Pokhrel,
Naman Yash,
Jonathan Kua,
Gang Li,
Lei Pan
Abstract:
Quantum Federated Learning (QFL) is an emerging concept that aims to unfold federated learning (FL) over quantum networks, enabling collaborative quantum model training along with local data privacy. We explore the challenges of deploying QFL on cloud platforms, emphasizing quantum intricacies and platform limitations. The proposed data-encoding-driven QFL, with a proof of concept (GitHub Open Sou…
▽ More
Quantum Federated Learning (QFL) is an emerging concept that aims to unfold federated learning (FL) over quantum networks, enabling collaborative quantum model training along with local data privacy. We explore the challenges of deploying QFL on cloud platforms, emphasizing quantum intricacies and platform limitations. The proposed data-encoding-driven QFL, with a proof of concept (GitHub Open Source) using genomic data sets on quantum simulators, shows promising results.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Higher-order Lie bracket approximation and averaging of control-affine systems with application to extremum seeking
Authors:
Sameer Pokhrel,
Sameh A. Eisa
Abstract:
This paper provides a rigorous derivation for what is known in the literature as the Lie bracket approximation of control-affine systems in a sequential framework for higher-orders. In fact, by using chronological calculus, we show that said Lie bracket approximations are themselves higher-order averaging terms. Hence, this paper bridges both averaging and approximation theories of control-affine…
▽ More
This paper provides a rigorous derivation for what is known in the literature as the Lie bracket approximation of control-affine systems in a sequential framework for higher-orders. In fact, by using chronological calculus, we show that said Lie bracket approximations are themselves higher-order averaging terms. Hence, this paper bridges both averaging and approximation theories of control-affine systems. In particular, the Lie bracket approximation of order ($n$) turns out to be a higher-order averaging of order ($n+1$). The derivation and formulation provided in this paper can be directly reduced to the first and second-order Lie bracket approximations available in the literature. However, we do not need to make many of the unproven assumptions provided in the literature and show that they are in fact natural corollaries from our work. Moreover, we use our results to show that important and useful information about control-affine extremum seeking systems can be obtained and used for performance improvement, including faster convergence of very simple structures. We provide multiple numerical simulations to demonstrate both the conceptual elements of this work as well as the significance of our results on extremum seeking with comparison against the literature.
△ Less
Submitted 25 May, 2024; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Data Augmentation through Pseudolabels in Automatic Region Based Coronary Artery Segmentation for Disease Diagnosis
Authors:
Sandesh Pokhrel,
Sanjay Bhandari,
Eduard Vazquez,
Yash Raj Shrestha,
Binod Bhattarai
Abstract:
Coronary Artery Diseases(CADs) though preventable are one of the leading causes of death and disability. Diagnosis of these diseases is often difficult and resource intensive. Segmentation of arteries in angiographic images has evolved as a tool for assistance, hel** clinicians in making accurate diagnosis. However, due to the limited amount of data and the difficulty in curating a dataset, the…
▽ More
Coronary Artery Diseases(CADs) though preventable are one of the leading causes of death and disability. Diagnosis of these diseases is often difficult and resource intensive. Segmentation of arteries in angiographic images has evolved as a tool for assistance, hel** clinicians in making accurate diagnosis. However, due to the limited amount of data and the difficulty in curating a dataset, the task of segmentation has proven challenging. In this study, we introduce the idea of using pseudolabels as a data augmentation technique to improve the performance of the baseline Yolo model. This method increases the F1 score of the baseline by 9% in the validation dataset and by 3% in the test dataset.
△ Less
Submitted 8 October, 2023;
originally announced October 2023.
-
ConvNeXtv2 Fusion with Mask R-CNN for Automatic Region Based Coronary Artery Stenosis Detection for Disease Diagnosis
Authors:
Sandesh Pokhrel,
Sanjay Bhandari,
Eduard Vazquez,
Yash Raj Shrestha,
Binod Bhattarai
Abstract:
Coronary Artery Diseases although preventable are one of the leading cause of mortality worldwide. Due to the onerous nature of diagnosis, tackling CADs has proved challenging. This study addresses the automation of resource-intensive and time-consuming process of manually detecting stenotic lesions in coronary arteries in X-ray coronary angiography images. To overcome this challenge, we employ a…
▽ More
Coronary Artery Diseases although preventable are one of the leading cause of mortality worldwide. Due to the onerous nature of diagnosis, tackling CADs has proved challenging. This study addresses the automation of resource-intensive and time-consuming process of manually detecting stenotic lesions in coronary arteries in X-ray coronary angiography images. To overcome this challenge, we employ a specialized Convnext-V2 backbone based Mask RCNN model pre-trained for instance segmentation tasks. Our empirical findings affirm that the proposed model exhibits commendable performance in identifying stenotic lesions. Notably, our approach achieves a substantial F1 score of 0.5353 in this demanding task, underscoring its effectiveness in streamlining this intensive process.
△ Less
Submitted 7 October, 2023;
originally announced October 2023.
-
Improving Federated Aggregation with Deep Unfolding Networks
Authors:
Shanika I Nanayakkara,
Shiva Raj Pokhrel,
Gang Li
Abstract:
The performance of Federated learning (FL) is negatively affected by device differences and statistical characteristics between participating clients. To address this issue, we introduce a deep unfolding network (DUN)-based technique that learns adaptive weights that unbiasedly ameliorate the adverse impacts of heterogeneity. The proposed method demonstrates impressive accuracy and quality-aware a…
▽ More
The performance of Federated learning (FL) is negatively affected by device differences and statistical characteristics between participating clients. To address this issue, we introduce a deep unfolding network (DUN)-based technique that learns adaptive weights that unbiasedly ameliorate the adverse impacts of heterogeneity. The proposed method demonstrates impressive accuracy and quality-aware aggregation. Furthermore, it evaluated the best-weighted normalization approach to define less computational power on the aggregation method. The numerical experiments in this study demonstrate the effectiveness of this approach and provide insights into the interpretability of the unbiased weights learned.
By incorporating unbiased weights into the model, the proposed approach effectively addresses quality-aware aggregation under the heterogeneity of the participating clients and the FL environment. Codes and details are \href{https://github.com/shanikairoshi/Improved_DUN_basedFL_Aggregation}{here}.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Quantum Federated Learning: Analysis, Design and Implementation Challenges
Authors:
Dev Gurung,
Shiva Raj Pokhrel,
Gang Li
Abstract:
Quantum Federated Learning (QFL) has gained significant attention due to quantum computing and machine learning advancements. As the demand for QFL continues to surge, there is a pressing need to comprehend its intricacies in distributed environments. This paper aims to provide a comprehensive overview of the current state of QFL, addressing a crucial knowledge gap in the existing literature. We d…
▽ More
Quantum Federated Learning (QFL) has gained significant attention due to quantum computing and machine learning advancements. As the demand for QFL continues to surge, there is a pressing need to comprehend its intricacies in distributed environments. This paper aims to provide a comprehensive overview of the current state of QFL, addressing a crucial knowledge gap in the existing literature. We develop ideas for new QFL frameworks, explore diverse use cases of applications, and consider the critical factors influencing their design. The technical contributions and limitations of various QFL research projects are examined while presenting future research directions and open questions for further exploration.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
Performance Analysis and Evaluation of Post Quantum Secure Blockchained Federated Learning
Authors:
Dev Gurung,
Shiva Raj Pokhrel,
Gang Li
Abstract:
Post-quantum security is critical in the quantum era. Quantum computers, along with quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or Blockchain vulnerable. The implementation of post-quantum cryptography (PQC) over such systems is poorly understood as PQC is still in its standardization phase. In this work, we propose a hybrid approach to employ PQC over blockcha…
▽ More
Post-quantum security is critical in the quantum era. Quantum computers, along with quantum algorithms, make the standard cryptography based on RSA or ECDSA over FL or Blockchain vulnerable. The implementation of post-quantum cryptography (PQC) over such systems is poorly understood as PQC is still in its standardization phase. In this work, we propose a hybrid approach to employ PQC over blockchain-based FL (BFL), where we combine a stateless signature scheme like Dilithium (or Falcon) with a stateful hash-based signature scheme like the extended Merkle Signature Scheme (XMSS). We propose a linear-based formulaic approach to device role selection mechanisms based on multiple factors to address the performance aspect. Our holistic approach of utilizing a verifiable random function (VRF) to assist in the blockchain consensus mechanism shows the practicality of the proposed approaches. The proposed method and extensive experimental results contribute to enhancing the security and performance aspects of BFL systems.
△ Less
Submitted 30 June, 2023; v1 submitted 26 June, 2023;
originally announced June 2023.
-
Decentralized Quantum Federated Learning for Metaverse: Analysis, Design and Implementation
Authors:
Dev Gurung,
Shiva Raj Pokhrel,
Gang Li
Abstract:
With the emerging developments of the Metaverse, a virtual world where people can interact, socialize, play, and conduct their business, it has become critical to ensure that the underlying systems are transparent, secure, and trustworthy. To this end, we develop a decentralized and trustworthy quantum federated learning (QFL) framework. The proposed QFL leverages the power of blockchain to create…
▽ More
With the emerging developments of the Metaverse, a virtual world where people can interact, socialize, play, and conduct their business, it has become critical to ensure that the underlying systems are transparent, secure, and trustworthy. To this end, we develop a decentralized and trustworthy quantum federated learning (QFL) framework. The proposed QFL leverages the power of blockchain to create a secure and transparent system that is robust against cyberattacks and fraud. In addition, the decentralized QFL system addresses the risks associated with a centralized server-based approach. With extensive experiments and analysis, we evaluate classical federated learning (CFL) and QFL in a distributed setting and demonstrate the practicality and benefits of the proposed design. Our theoretical analysis and discussions develop a genuinely decentralized financial system essential for the Metaverse. Furthermore, we present the application of blockchain-based QFL in a hybrid metaverse powered by a metaverse observer and world model. Our implementation details and code are publicly available 1.
△ Less
Submitted 20 June, 2023;
originally announced June 2023.
-
Deakin RF-Sensing: Experiments on Correlated Knowledge Distillation for Monitoring Human Postures with Radios
Authors:
Shiva Raj Pokhrel,
Jonathan Kua,
Deol Satish,
Philip Williams,
Arkady Zaslavsky,
Seng W. Loke,
**ho Choi
Abstract:
In this work, we propose and develop a simple experimental testbed to study the feasibility of a novel idea by coupling radio frequency (RF) sensing technology with Correlated Knowledge Distillation (CKD) theory towards designing lightweight, near real-time and precise human pose monitoring systems. The proposed CKD framework transfers and fuses pose knowledge from a robust "Teacher" model to a pa…
▽ More
In this work, we propose and develop a simple experimental testbed to study the feasibility of a novel idea by coupling radio frequency (RF) sensing technology with Correlated Knowledge Distillation (CKD) theory towards designing lightweight, near real-time and precise human pose monitoring systems. The proposed CKD framework transfers and fuses pose knowledge from a robust "Teacher" model to a parameterized "Student" model, which can be a promising technique for obtaining accurate yet lightweight pose estimates. To assure its efficacy, we implemented CKD for distilling logits in our integrated Software Defined Radio (SDR)-based experimental setup and investigated the RF-visual signal correlation. Our CKD-RF sensing technique is characterized by two modes - a camera-fed Teacher Class Network (e.g., images, videos) with an SDR-fed Student Class Network (e.g., RF signals). Specifically, our CKD model trains a dual multi-branch teacher and student network by distilling and fusing knowledge bases. The resulting CKD models are then subsequently used to identify the multimodal correlation and teach the student branch in reverse. Instead of simply aggregating their learnings, CKD training comprised multiple parallel transformations with the two domains, i.e., visual images and RF signals. Once trained, our CKD model can efficiently preserve privacy and utilize the multimodal correlated logits from the two different neural networks for estimating poses without using visual signals/video frames (by using only the RF signals).
△ Less
Submitted 10 October, 2023; v1 submitted 24 May, 2023;
originally announced May 2023.
-
Secure Communication Model For Quantum Federated Learning: A Post Quantum Cryptography (PQC) Framework
Authors:
Dev Gurung,
Shiva Raj Pokhrel,
Gang Li
Abstract:
We design a model of Post Quantum Cryptography (PQC) Quantum Federated Learning (QFL). We develop a framework with a dynamic server selection and study convergence and security conditions. The implementation and results are publicly available1.
We design a model of Post Quantum Cryptography (PQC) Quantum Federated Learning (QFL). We develop a framework with a dynamic server selection and study convergence and security conditions. The implementation and results are publicly available1.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing
Authors:
Rongxin Xu,
Shiva Raj Pokhrel,
Qiujun Lan,
Gang Li
Abstract:
Mobile Edge Computing (MEC) has been a promising paradigm for communicating and edge processing of data on the move. We aim to employ Federated Learning (FL) and prominent features of blockchain into MEC architecture such as connected autonomous vehicles to enable complete decentralization, immutability, and rewarding mechanisms simultaneously. FL is advantageous for mobile devices with constraine…
▽ More
Mobile Edge Computing (MEC) has been a promising paradigm for communicating and edge processing of data on the move. We aim to employ Federated Learning (FL) and prominent features of blockchain into MEC architecture such as connected autonomous vehicles to enable complete decentralization, immutability, and rewarding mechanisms simultaneously. FL is advantageous for mobile devices with constrained connectivity since it requires model updates to be delivered to a central point instead of substantial amounts of data communication. For instance, FL in autonomous, connected vehicles can increase data diversity and allow model customization, and predictions are possible even when the vehicles are not connected (by exploiting their local models) for short times. However, existing synchronous FL and Blockchain incur extremely high communication costs due to mobility-induced impairments and do not apply directly to MEC networks. We propose a fully asynchronous Blockchained Federated Learning (BFL) framework referred to as BFL-MEC, in which the mobile clients and their models evolve independently yet guarantee stability in the global learning process. More importantly, we employ post-quantum secure features over BFL-MEC to verify the client's identity and defend against malicious attacks. All of our design assumptions and results are evaluated with extensive simulations.
△ Less
Submitted 26 February, 2023;
originally announced February 2023.
-
Digital Privacy Under Attack: Challenges and Enablers
Authors:
Baobao Song,
Mengyue Deng,
Shiva Raj Pokhrel,
Qiujun Lan,
Robin Doss,
Gang Li
Abstract:
Users have renewed interest in protecting their private data in the digital space. When they don't believe that their privacy is sufficiently covered by one platform, they will readily switch to another. Such an increasing level of privacy awareness has made privacy preservation an essential research topic. Nevertheless, new privacy attacks are emerging day by day. Therefore, a holistic survey to…
▽ More
Users have renewed interest in protecting their private data in the digital space. When they don't believe that their privacy is sufficiently covered by one platform, they will readily switch to another. Such an increasing level of privacy awareness has made privacy preservation an essential research topic. Nevertheless, new privacy attacks are emerging day by day. Therefore, a holistic survey to compare the discovered techniques on attacks over privacy preservation and their mitigation schemes is essential in the literature. We develop a study to fill this gap by assessing the resilience of privacy-preserving methods to various attacks and conducting a comprehensive review of countermeasures from a broader perspective. First, we introduce the fundamental concepts and critical components of privacy attacks. Second, we comprehensively cover major privacy attacks targeted at anonymous data, statistical aggregate data, and privacy-preserving models. We also summarize popular countermeasures to mitigate these attacks. Finally, some promising future research directions and related issues in the privacy community are envisaged. We believe this survey will successfully shed some light on privacy research and encourage researchers to entirely understand the resilience of different existing privacy-preserving approaches.
△ Less
Submitted 18 February, 2023;
originally announced February 2023.
-
Fair and Efficient Distributed Edge Learning with Hybrid Multipath TCP
Authors:
Shiva Raj Pokhrel,
**ho Choi,
Anwar Walid
Abstract:
The bottleneck of distributed edge learning (DEL) over wireless has shifted from computing to communication, primarily the aggregation-averaging (Agg-Avg) process of DEL. The existing transmission control protocol (TCP)-based data networking schemes for DEL are application-agnostic and fail to deliver adjustments according to application layer requirements. As a result, they introduce massive exce…
▽ More
The bottleneck of distributed edge learning (DEL) over wireless has shifted from computing to communication, primarily the aggregation-averaging (Agg-Avg) process of DEL. The existing transmission control protocol (TCP)-based data networking schemes for DEL are application-agnostic and fail to deliver adjustments according to application layer requirements. As a result, they introduce massive excess time and undesired issues such as unfairness and stragglers. Other prior mitigation solutions have significant limitations as they balance data flow rates from workers across paths but often incur imbalanced backlogs when the paths exhibit variance, causing stragglers. To facilitate a more productive DEL, we develop a hybrid multipath TCP (MPTCP) by combining model-based and deep reinforcement learning (DRL) based MPTCP for DEL that strives to realize quicker iteration of DEL and better fairness (by ameliorating stragglers). Hybrid MPTCP essentially integrates two radical TCP developments: i) successful existing model-based MPTCP control strategies and ii) advanced emerging DRL-based techniques, and introduces a novel hybrid MPTCP data transport for easing the communication of the Agg-Avg process. Extensive emulation results demonstrate that the proposed hybrid MPTCP can overcome excess time consumption and ameliorate the application layer unfairness of DEL effectively without injecting additional inconstancy and stragglers.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Understand-Before-Talk (UBT): A Semantic Communication Approach to 6G Networks
Authors:
Shiva Raj Pokhrel,
**ho Choi
Abstract:
In Shannon theory, semantic aspects of communication were identified but considered irrelevant to the technical communication problems. Semantic communication (SC) techniques have recently attracted renewed research interests in (6G) wireless because they have the capability to support an efficient interpretation of the significance and meaning intended by a sender (or accomplishment of the goal)…
▽ More
In Shannon theory, semantic aspects of communication were identified but considered irrelevant to the technical communication problems. Semantic communication (SC) techniques have recently attracted renewed research interests in (6G) wireless because they have the capability to support an efficient interpretation of the significance and meaning intended by a sender (or accomplishment of the goal) when dealing with multi-modal data such as videos, images, audio, text messages, and so on, which would be the case for various applications such as intelligent transportation systems where each autonomous vehicle needs to deal with real-time videos and data from a number of sensors including radars. A notable difficulty of existing SC frameworks lies in handling the discrete constraints imposed on the pursued semantic coding and its interaction with the independent knowledge base, which makes reliable semantic extraction extremely challenging. Therefore, we develop a new lightweight hashing-based semantic extraction approach to the SC framework, where our learning objective is to generate one-time signatures (hash codes) using supervised learning for low latency, secure and efficient management of the SC dynamics. We first evaluate the proposed semantic extraction framework over large image data sets, extend it with domain adaptive hashing and then demonstrate the effectiveness of "semantics signature" in bulk transmission and multi-modal data.
△ Less
Submitted 17 September, 2022;
originally announced October 2022.
-
A Survey of Distributed Ledger Technology for IoT Verticals
Authors:
Rongxin Xu,
Qiujun Lan,
Shiva Raj Pokhrel,
Gang Li
Abstract:
The Internet of Things (IoT) and Distributed ledger technology (DLT) have significantly changed our daily lives. Due to their distributed operational environment and naturally decentralized applications, the convergence of these two technologies indicates a more lavish arrangement for the future. This article develops a comprehensive survey to investigate and illustrate state-of-the-art DLT for va…
▽ More
The Internet of Things (IoT) and Distributed ledger technology (DLT) have significantly changed our daily lives. Due to their distributed operational environment and naturally decentralized applications, the convergence of these two technologies indicates a more lavish arrangement for the future. This article develops a comprehensive survey to investigate and illustrate state-of-the-art DLT for various IoT use cases, from smart homes to autonomous vehicles and smart cities. We develop a novel framework for conducting a systematic and comprehensive review of DLT over IoT by extending the knowledge graph approach. With relevant insights from this review, we extract innovative and pragmatic techniques to DLT design that enable high-performance, sustainable, and highly scalable IoT systems. Our findings support designing an end-to-end IoT-native DLT architecture for the future that fully coordinates network-assisted functionalities.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Analyzing and Mimicking the Optimized Flight Physics of Soaring Birds: A Differential Geometric Control and Extremum Seeking System Approach with Real Time Implementation
Authors:
Sameh A. Eisa,
Sameer Pokhrel
Abstract:
For centuries, soaring birds -- such as albatrosses and eagles -- have been mysterious and intriguing for biologists, physicists, aeronautical/control engineers, and applied mathematicians. These fascinating biological organisms have the ability to fly for long-duration while spending little to no energy. This flight technique/maneuver is called dynamic soaring (DS). For biologists and physicists,…
▽ More
For centuries, soaring birds -- such as albatrosses and eagles -- have been mysterious and intriguing for biologists, physicists, aeronautical/control engineers, and applied mathematicians. These fascinating biological organisms have the ability to fly for long-duration while spending little to no energy. This flight technique/maneuver is called dynamic soaring (DS). For biologists and physicists, the DS phenomenon is nothing but a wonder of the very elegant ability of the bird's interaction with nature and using its physical ether in an optimal way for better survival and energy efficiency. For the engineering community, it is a source of inspiration and an unequivocal promising chance for bio-mimicking. In literature, significant work has been done on modeling and constructing control systems that allow the DS maneuver to be mimicked. However, mathematical characterization of the DS phenomenon in literature has been limited to optimal control configurations that utilized developments in numerical optimization algorithms along with control methods to identify the optimal DS trajectory taken (or to be taken) by the bird/mimicking system. In this paper, we provide a novel two-layered mathematical approach to characterize, model, mimic, and control DS in a simple and real-time implementation. The first layer will be a differential geometric control formulation and analysis of the DS problem. The second layer will be a linkage between the DS philosophy and a class of dynamical control systems known as extremum seeking systems. We believe our framework captures more of the biological behavior of soaring birds and opens the door for geometric control theory and extremum seeking systems to be utilized in systems biology and natural phenomena. Simulation results are provided along with comparisons with powerful optimal control solvers to illustrate the advantages of the introduced method.
△ Less
Submitted 8 July, 2023; v1 submitted 18 July, 2022;
originally announced July 2022.
-
FAIR-BFL: Flexible and Incentive Redesign for Blockchain-based Federated Learning
Authors:
Rongxin Xu,
Shiva Raj Pokhrel,
Qiujun Lan,
Gang Li
Abstract:
Vanilla Federated learning (FL) relies on the centralized global aggregation mechanism and assumes that all clients are honest. This makes it a challenge for FL to alleviate the single point of failure and dishonest clients. These impending challenges in the design philosophy of FL call for blockchain-based federated learning (BFL) due to the benefits of coupling FL and blockchain (e.g., democracy…
▽ More
Vanilla Federated learning (FL) relies on the centralized global aggregation mechanism and assumes that all clients are honest. This makes it a challenge for FL to alleviate the single point of failure and dishonest clients. These impending challenges in the design philosophy of FL call for blockchain-based federated learning (BFL) due to the benefits of coupling FL and blockchain (e.g., democracy, incentive, and immutability). However, one problem in vanilla BFL is that its capabilities do not follow adopters' needs in a dynamic fashion. Besides, vanilla BFL relies on unverifiable clients' self-reported contributions like data size because checking clients' raw data is not allowed in FL for privacy concerns. We design and evaluate a novel BFL framework, and resolve the identified challenges in vanilla BFL with greater flexibility and incentive mechanism called FAIR-BFL. In contrast to existing works, FAIR-BFL offers unprecedented flexibility via the modular design, allowing adopters to adjust its capabilities following business demands in a dynamic fashion. Our design accounts for BFL's ability to quantify each client's contribution to the global learning process. Such quantification provides a rational metric for distributing the rewards among federated clients and helps discover malicious participants that may poison the global model.
△ Less
Submitted 26 June, 2022;
originally announced June 2022.
-
A novel hypothesis for how albatrosses optimize their flight physics in real-time: an extremum seeking model and control for dynamic soaring
Authors:
Sameer Pokhrel,
Sameh A. Eisa
Abstract:
The albatross optimized flight maneuver -- known as dynamic soaring -- is nothing but a wonder of biology, physics, and engineering. By utilizing dynamic soaring, the bird can travel in the desired flight direction almost for free by harvesting energy from the wind. Dynamic soaring biological inspiration has triggered a momentous interest among many communities of science and engineering. Studying…
▽ More
The albatross optimized flight maneuver -- known as dynamic soaring -- is nothing but a wonder of biology, physics, and engineering. By utilizing dynamic soaring, the bird can travel in the desired flight direction almost for free by harvesting energy from the wind. Dynamic soaring biological inspiration has triggered a momentous interest among many communities of science and engineering. Studying, modeling, and simulating dynamic soaring have been conducted in literature by mostly configuring dynamic soaring as an optimal control problem. Said configuration requires accurate dynamic system modeling of the albatross/mimicking-object, accurate wind profile models, and a defined mathematical formula of an objective function that aims at conserving energy and minimizing its dissipation. However, the experimental observations of albatrosses indicate their ability to conduct dynamic soaring in real time. Indeed, a functioning modeling and control framework for dynamic soaring that allows for a meaningful bio-mimicry of the albatross needs to be autonomous, real-time, stable, and capable of tolerating the absence of mathematical expressions of the wind profiles and the objective function, hypothetically similar to what the bird does. The qualifications of such modeling and control framework are the very same characteristics of the so-called extremum seeking systems. In this paper, we propose an extremum seeking modeling and control framework for the dynamic soaring problem. We provide and discuss the problem setup, design, and stability of the introduced framework. Our results, supported by simulations and comparison with optimal control methods of the literature, provide a proof of concept that the dynamic soaring phenomenon can be a natural expression of extremum seeking. Hence, dynamic soaring has the potential to be performed autonomously and in real-time with stability guarantees.
△ Less
Submitted 5 January, 2023; v1 submitted 25 February, 2022;
originally announced February 2022.
-
Seasonal Predictability of Lightning over the Global Hotspot Regions
Authors:
Chandrima Mallick,
Anupam Hazra,
Subodh K. Saha,
Hemantkumar S. Chaudhari,
Samir Pokhrel,
Mahen Konwar,
Ushnanshu Dutta,
Greeshma M. Mohan,
K. Gayatri Vani
Abstract:
Skillful seasonal prediction of lightning is crucial over several global hotspot regions, as it causes severe damages to infrastructures and losses of human life. While major emphasis has been given for predicting rainfall, prediction of lightning in one season advance remained uncommon, owing to the nature of the problem, which is short-lived local phenomenon. Here we show that on the seasonal ti…
▽ More
Skillful seasonal prediction of lightning is crucial over several global hotspot regions, as it causes severe damages to infrastructures and losses of human life. While major emphasis has been given for predicting rainfall, prediction of lightning in one season advance remained uncommon, owing to the nature of the problem, which is short-lived local phenomenon. Here we show that on the seasonal time scale, lightning over the major global hot-spot regions is strongly tied with slowly varying global predictors (e.g., El Nino and Southern Oscillation). Moreover, the sub-seasonal variance of lightning is highly correlated with global predictors, suggesting a seminal role played by the global climate mode in sha** the local land-atmosphere interactions, which eventually affects seasonal lightning variability. It is shown that the seasonal predictability of lightning over the hotspot is comparable to that of seasonal rainfall, which opens up an avenue for reliable seasonal forecasting of lightning for special awareness and preventive measures.
Keywords: Lightning, Seasonal forecasting, SST, Global predictors
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Unraveling the Global Teleconnections of Indian Summer Monsoon Clouds: Expedition from CMIP5 to CMIP6
Authors:
Ushnanshu Dutta,
Anupam Hazra,
Hemantkumar S. Chaudhari,
Subodh Kumar Saha,
Samir Pokhrel,
Utkarsh Verma
Abstract:
We have analyzed the teleconnection of total cloud fraction (TCF) with global sea surface temperature (SST) in multi-model ensembles (MME) of the fifth and sixth Coupled Model Intercomparison Projects (CMIP5 and CMIP6). CMIP6-MME has a more robust and realistic teleconnection (TCF and global SST) pattern over the extra-tropics (R ~0.43) and North Atlantic (R ~0.39) region, which in turn resulted i…
▽ More
We have analyzed the teleconnection of total cloud fraction (TCF) with global sea surface temperature (SST) in multi-model ensembles (MME) of the fifth and sixth Coupled Model Intercomparison Projects (CMIP5 and CMIP6). CMIP6-MME has a more robust and realistic teleconnection (TCF and global SST) pattern over the extra-tropics (R ~0.43) and North Atlantic (R ~0.39) region, which in turn resulted in improvement of rainfall bias over the Asian summer monsoon (ASM) region. CMIP6-MME can better reproduce the mean TCF and have reduced dry (wet) rainfall bias on land (ocean) over the ASM region. CMIP6-MME has improved the biases of seasonal mean rainfall, TCF, and outgoing longwave radiation (OLR) over the Indian Summer Monsoon (ISM) region by ~40%, ~45%, and ~31%, respectively, than CMIP5-MME and demonstrates better spatial correlation with observation/reanalysis. Results establish the credibility of the CMIP6 models and provide a scientific basis for improving the seasonal prediction of ISM.
△ Less
Submitted 20 September, 2021; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Learning to Harness Bandwidth with Multipath Congestion Control and Scheduling
Authors:
Shiva Raj Pokhrel,
Anwar Walid
Abstract:
Multipath TCP (MPTCP) has emerged as a facilitator for harnessing and pooling available bandwidth in wireless/wireline communication networks and in data centers. Existing implementations of MPTCP such as, Linked Increase Algorithm (LIA), Opportunistic LIA (OLIA) and BAlanced LInked Adaptation (BALIA) include separate algorithms for congestion control and packet scheduling, with pre-selected contr…
▽ More
Multipath TCP (MPTCP) has emerged as a facilitator for harnessing and pooling available bandwidth in wireless/wireline communication networks and in data centers. Existing implementations of MPTCP such as, Linked Increase Algorithm (LIA), Opportunistic LIA (OLIA) and BAlanced LInked Adaptation (BALIA) include separate algorithms for congestion control and packet scheduling, with pre-selected control parameters. We propose a Deep Q-Learning (DQL) based framework for joint congestion control and packet scheduling for MPTCP. At the heart of the solution is an intelligent agent for interface, learning and actuation, which learns from experience optimal congestion control and scheduling mechanism using DQL techniques with policy gradients. We provide a rigorous stability analysis of system dynamics which provides important practical design insights. In addition, the proposed DQL-MPTCP algorithm utilizes the `recurrent neural network' and integrates it with `long short-term memory' for continuously i) learning dynamic behavior of subflows (paths) and ii) responding promptly to their behavior using prioritized experience replay. With extensive emulations, we show that the proposed DQL-based MPTCP algorithm outperforms MPTCP LIA, OLIA and BALIA algorithms. Moreover, the DQL-MPTCP algorithm is robust to time-varying network characteristics, and provides dynamic exploration and exploitation of paths.
△ Less
Submitted 29 May, 2021;
originally announced May 2021.
-
Control-Affine Extremum Seeking Control with Attenuating Oscillations: A Lie Bracket Estimation Approach
Authors:
Sameer Pokhrel,
Sameh A. Eisa
Abstract:
Control-affine Extremum Seeking Control (ESC) systems have been increasingly studied and applied in the last decade. In a recent effort, many control-affine ESC structures have been generalized in a unifying class and their stability was analyzed. However, guaranteeing vanishing oscillations at the extremum point for said class requires strong conditions that may not be feasible or easy to check/d…
▽ More
Control-affine Extremum Seeking Control (ESC) systems have been increasingly studied and applied in the last decade. In a recent effort, many control-affine ESC structures have been generalized in a unifying class and their stability was analyzed. However, guaranteeing vanishing oscillations at the extremum point for said class requires strong conditions that may not be feasible or easy to check/design by the user, especially when the gradient of the objective function is unknown. In this paper, we introduce a control-affine ESC structure that remedies this problem such that: (i) its oscillations attenuate structurally via a novel application of a geometric-based Kalman filter and a Lie bracket estimation approach; and (ii) its stability is characterized by a time-dependent (one-bound) condition that is easier to check and relaxed when compared to the generalized approach mentioned earlier. We provide numerical simulations of three problems to demonstrate the effectiveness of our proposed ESC; these problems cannot be solved with vanishing oscillations using the generalized approach in the literature.
△ Less
Submitted 29 April, 2023; v1 submitted 9 May, 2021;
originally announced May 2021.
-
IoT Security: Botnet detection in IoT using Machine learning
Authors:
Satish Pokhrel,
Robert Abbas,
Bhulok Aryal
Abstract:
The acceptance of Internet of Things (IoT) applications and services has seen an enormous rise of interest in IoT. Organizations have begun to create various IoT based gadgets ranging from small personal devices such as a smart watch to a whole network of smart grid, smart mining, smart manufacturing, and autonomous driver-less vehicles. The overwhelming amount and ubiquitous presence have attract…
▽ More
The acceptance of Internet of Things (IoT) applications and services has seen an enormous rise of interest in IoT. Organizations have begun to create various IoT based gadgets ranging from small personal devices such as a smart watch to a whole network of smart grid, smart mining, smart manufacturing, and autonomous driver-less vehicles. The overwhelming amount and ubiquitous presence have attracted potential hackers for cyber-attacks and data theft. Security is considered as one of the prominent challenges in IoT. The key scope of this research work is to propose an innovative model using machine learning algorithm to detect and mitigate botnet-based distributed denial of service (DDoS) attack in IoT network. Our proposed model tackles the security issue concerning the threats from bots. Different machine learning algorithms such as K- Nearest Neighbour (KNN), Naive Bayes model and Multi-layer Perception Artificial Neural Network (MLP ANN) were used to develop a model where data are trained by BoT-IoT dataset. The best algorithm was selected by a reference point based on accuracy percentage and area under the receiver operating characteristics curve (ROC AUC) score. Feature engineering and Synthetic minority oversampling technique (SMOTE) were combined with machine learning algorithms (MLAs). Performance comparison of three algorithms used was done in class imbalance dataset and on the class balanced dataset.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
Examining the variability of cloud hydrometeors and its importance on the Indian summer monsoon rainfall predictability
Authors:
Ushnanshu Dutta,
Anupam Hazra,
Subodh Kumar Saha,
Hemantkumar S. Chaudhari,
Samir Pokhrel,
Mahen Konwar
Abstract:
Skilful prediction of the seasonal Indian summer monsoon (ISM) rainfall (ISMR) at least one season in advance has great socio-economic value. It represents a lifeline for about a sixth of the world's population. The ISMR prediction remained a challenging problem with the sub-critical skills of the dynamical models attributable to limited understanding of the interaction among clouds, convection, a…
▽ More
Skilful prediction of the seasonal Indian summer monsoon (ISM) rainfall (ISMR) at least one season in advance has great socio-economic value. It represents a lifeline for about a sixth of the world's population. The ISMR prediction remained a challenging problem with the sub-critical skills of the dynamical models attributable to limited understanding of the interaction among clouds, convection, and circulation. The variability of cloud hydrometeors (cloud ice and cloud water) in different time scales (3-7 days, 10-20 days and 30-60 days bands) are examined from re-analysis data during Indian summer monsoon (ISM). Here, we also show that the 'internal' variability of cloud hydrometeors (particularly cloud ice) associated with the ISM sub-seasonal (synoptic + intra-seasonal) fluctuations is partly predictable as they are found to be tied with slowly varying forcing (e.g., El NiƱo and Southern Oscillation). The representation of deep convective clouds, which involve ice phase processes in a coupled climate model, strongly modulates ISMR variability in association with global predictors. The results from the two sensitivity simulations using coupled global climate model (CGCM) are provided to demonstrate the importance of the cloud hydrometeors on ISM rainfall predictability. Therefore, this study provides a scientific basis for improving the simulation of the seasonal ISMR by improving the physical processes of the cloud on a sub-seasonal time scale and motivating further research in this direction.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
Modeling RIS Empowered Outdoor-to-Indoor Communication in mmWave Cellular Networks
Authors:
Mahyar Nemati,
Behrouz Maham,
Shiva Raj Pokhrel,
**ho Choi
Abstract:
With the increasing adoption of millimeter-waves (mmWave) over cellular networks, outdoor-to-indoor (O2I) communication has been one of the challenging research problems due to high penetration loss of buildings. To address this, we investigate the practicability of utilizing reconfigurable intelligent surfaces (RISs) for assisting such O2I communication. We propose a new notion of prefabricated R…
▽ More
With the increasing adoption of millimeter-waves (mmWave) over cellular networks, outdoor-to-indoor (O2I) communication has been one of the challenging research problems due to high penetration loss of buildings. To address this, we investigate the practicability of utilizing reconfigurable intelligent surfaces (RISs) for assisting such O2I communication. We propose a new notion of prefabricated RIS-empowered wall consisting of a large number of chipless radio frequency identification (RFID) sensors. Each sensor maintains its own bank of delay lines. These sensors which are built within the building walls can potentially be controlled by a main integrated circuit (IC) to regulate the phase of im**ing signals. To evaluate our idea, we develop a thorough performance analysis of the RIS-based O2I communication in the mmWave network using stochastic-geometry tools for blockage models. Our analysis facilitates two closed-form approximations of the downlink signal-to-noise ratio (SNR) coverage probability for RIS-based O2I communication. We perform extensive simulations to evaluate the accuracy of the derived expressions, thus providing new observations and findings.
△ Less
Submitted 3 January, 2021;
originally announced January 2021.
-
Percolation in metal-insulator composites of randomly packed spherocylindrical nanoparticles
Authors:
Shiva Pokhrel,
Brendon Waters,
Solveig Felton,
Zhi-Feng Huang,
Boris Nadgorny
Abstract:
While classical percolation is well understood, percolation effects in randomly packed or jammed structures are much less explored. Here we investigate both experimentally and theoretically the electrical percolation in a binary composite system of disordered spherocylinders, to identify the relation between structural (percolation) and functional properties of nanocomposites. Experimentally, we d…
▽ More
While classical percolation is well understood, percolation effects in randomly packed or jammed structures are much less explored. Here we investigate both experimentally and theoretically the electrical percolation in a binary composite system of disordered spherocylinders, to identify the relation between structural (percolation) and functional properties of nanocomposites. Experimentally, we determine the percolation threshold $p_c$ and the conductivity critical exponent $t$ for composites of conducting (CrO$_2$) and insulating (Cr$_2$O$_3$) rodlike nanoparticles that are nominally geometrically identical, yielding $p_c=0.305 \pm 0.026$ and $t=2.52 \pm 0.03$ respectively. Simulations and modeling are implemented through a combination of the mechanical contraction method and a variant of random walk (de Gennes ant) approach, in which charge diffusion is correlated with the system conductivity via the Nernst-Einstein relation. The percolation threshold and critical exponents identified through finite size scaling are in good agreement with the experimental values. Curiously, the calculated percolation threshold for spherocylinders with an aspect ratio of 6.5, $p_c=0.312 \pm 0.002$, is very close (within numerical errors) to the one found previously in two other distinct systems of disordered jammed spheres and simple cubic lattice, an intriguing and surprising result.
△ Less
Submitted 30 March, 2021; v1 submitted 16 November, 2020;
originally announced November 2020.
-
Explore-Before-Talk: Multichannel Selection Diversity for Uplink Transmissions in Machine-Type Communication
Authors:
**ho Choi,
Jihong Park,
Shiva Pokhrel
Abstract:
Improving the data rate of machine-type communication (MTC) is essential in supporting emerging Internet of things (IoT) applications ranging from real-time surveillance to edge machine learning. To this end, in this paper we propose a resource allocation approach for uplink transmissions within a random access procedure in MTC by exploiting multichannel selection diversity, coined explore-before-…
▽ More
Improving the data rate of machine-type communication (MTC) is essential in supporting emerging Internet of things (IoT) applications ranging from real-time surveillance to edge machine learning. To this end, in this paper we propose a resource allocation approach for uplink transmissions within a random access procedure in MTC by exploiting multichannel selection diversity, coined explore-before-talk (EBT). Each user in EBT first sends pilot signals through multiple channels that are initially allocated by a base station (BS) for exploration, and then the BS informs a subset of initially allocated channels that are associated with high signal-to-noise ratios (SNRs) for data packet transmission by the user while releasing the rest of the channels for other users. Consequently, EBT exploits a multichannel selection diversity gain during data packet transmission, at the cost of exploration during pilot transmission. We optimize this exploration-exploitation trade-off, by deriving closed-form mean data rate and resource outage probability expressions. Numerical results corroborate that EBT achieves a higher mean data rate while satisfying the same outage constraint, compared to a conventional MTC protocol without exploration.
△ Less
Submitted 28 October, 2020;
originally announced October 2020.
-
Towards Enabling Critical mMTC: A Review of URLLC within mMTC
Authors:
Shiva Raj Pokhrel,
Jie Ding,
Jihong Park,
Ok-Sun Park,
**ho Choi
Abstract:
Massive machine-type communication (mMTC) and ultra-reliable and low-latency communication (URLLC) are two key service types in the fifth-generation (5G) communication systems, pursuing scalability and reliability with low-latency, respectively. These two extreme services are envisaged to agglomerate together into \emph{critical mMTC} shortly with emerging use cases (e.g., wide-area disaster monit…
▽ More
Massive machine-type communication (mMTC) and ultra-reliable and low-latency communication (URLLC) are two key service types in the fifth-generation (5G) communication systems, pursuing scalability and reliability with low-latency, respectively. These two extreme services are envisaged to agglomerate together into \emph{critical mMTC} shortly with emerging use cases (e.g., wide-area disaster monitoring, wireless factory automation), creating new challenges to designing wireless systems beyond 5G. While conventional network slicing is effective in supporting a simple mixture of mMTC and URLLC, it is difficult to simultaneously guarantee the reliability, latency, and scalability requirements of critical mMTC (e.g., < 4ms latency, $10^6$ devices/km$^2$ for factory automation) with limited radio resources. Furthermore, recently proposed solutions to scalable URLLC (e.g., machine learning aided URLLC for driverless vehicles) are ill-suited to critical mMTC whose machine type users have minimal energy budget and computing capability that should be (tightly) optimized for given tasks. To this end, our paper aims to characterize promising use cases of critical mMTC and search for their possible solutions. To this end, we first review the state-of-the-art (SOTA) technologies for separate mMTC and URLLC services and then identify key challenges from conflicting SOTA requirements, followed by potential approaches to prospective critical mMTC solutions at different layers.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Optimal Centralized Dynamic-Time-Division-Duplex
Authors:
Mohsen Mohammadkhani Razlighi,
Nikola Zlatanov,
Shiva Raj Pokhrel,
Petar Popovski
Abstract:
In this paper, we derive the optimal centralized dynamic-time-division-duplex (D-TDD) scheme for a wireless network comprised of $K$ full-duplex nodes impaired by self-interference and additive white Gaussian noise. As a special case, we also provide the optimal centralized D-TDD scheme when the nodes are half-duplex as well as when the wireless network is comprised of both half-duplex and full-du…
▽ More
In this paper, we derive the optimal centralized dynamic-time-division-duplex (D-TDD) scheme for a wireless network comprised of $K$ full-duplex nodes impaired by self-interference and additive white Gaussian noise. As a special case, we also provide the optimal centralized D-TDD scheme when the nodes are half-duplex as well as when the wireless network is comprised of both half-duplex and full-duplex nodes. Thereby, we derive the optimal adaptive scheduling of the reception, transmission, simultaneous reception and transmission, and silence at every node in the network in each time slot such that the rate region of the network is maximized. The performance of the optimal centralized D-TDD can serve as an upper-bound to any other TDD scheme, which is useful in qualifying the relative performance of TDD schemes. The numerical results show that the proposed centralized D-TDD scheme achieves significant rate gains over existing centralized D-TDD schemes.
△ Less
Submitted 6 February, 2020;
originally announced February 2020.
-
Federated learning with multichannel ALOHA
Authors:
**ho Choi,
Shiva Raj Pokhrel
Abstract:
In this paper, we study federated learning in a cellular system with a base station (BS) and a large number of users with local data sets. We show that multichannel random access can provide a better performance than sequential polling when some users are unable to compute local updates (due to other tasks) or in dormant state. In addition, for better aggregation in federated learning, the access…
▽ More
In this paper, we study federated learning in a cellular system with a base station (BS) and a large number of users with local data sets. We show that multichannel random access can provide a better performance than sequential polling when some users are unable to compute local updates (due to other tasks) or in dormant state. In addition, for better aggregation in federated learning, the access probabilities of users can be optimized for given local updates. To this end, we formulate an optimization problem and show that a distributed approach can be used within federated learning to adaptively decide the access probabilities.
△ Less
Submitted 12 December, 2019;
originally announced December 2019.
-
Unraveling the Mystery of Indian Summer Monsoon Prediction: Improved Estimate of Predictability Limit
Authors:
Subodh Kumar Saha,
Anupam Hazra,
Samir Pokhrel,
Hemantkumar S. Chaudhari,
K. Sujith,
Archana Rai,
Hasibur Rahaman,
B. N. Goswami
Abstract:
Large socio-economic impact of the Indian Summer Monsoon (ISM) extremes motivated numerous attempts at its long range prediction over the past century. However, a rather estimated low potential predictability limit (PPL) of seasonal prediction of the ISM, contributed significantly by 'internal' interannual variability was considered insurmountable. Here we show that the 'internal' variability cont…
▽ More
Large socio-economic impact of the Indian Summer Monsoon (ISM) extremes motivated numerous attempts at its long range prediction over the past century. However, a rather estimated low potential predictability limit (PPL) of seasonal prediction of the ISM, contributed significantly by 'internal' interannual variability was considered insurmountable. Here we show that the 'internal' variability contributed by the ISM sub-seasonal (synoptic + intra-seasonal) fluctuations, so far considered chaotic, is partly predictable as found to be tied to slowly varying forcing (e.g. El Nino and Southern Oscillation). This provides a scientific basis for predictability of the ISM rainfall beyond the conventional estimates of PPL. We establish a much higher actual limit of predictability (r~0.82) through an extensive re-forecast experiment (1920 years of simulation) by improving two major physics in a global coupled climate model, which raises a hope for a very reliable dynamical seasonal ISM forecasting in the near future.
△ Less
Submitted 4 September, 2018;
originally announced September 2018.