-
Testing spatial curvature in an anisotropic extension of $w$CDM model with low redshift data
Authors:
Vikrant Yadav,
Rajpal,
Pardeep,
Manish Yadav,
Santosh Kumar Yadav
Abstract:
In this letter, we report the observational constraints on a Bianchi type I anisotropic extension of $w$CDM model with spatial curvature from observational data including Baryon Acoustic Oscillations (BAO), Cosmic chronometers (CC), Big Bang nucleosynthesis (BBN), Pantheon+ (PP) compilation of SNe Ia and SH0ES Cepheid host distance anchors. The anisotropy is found to be of the order $10^{-13}$, wh…
▽ More
In this letter, we report the observational constraints on a Bianchi type I anisotropic extension of $w$CDM model with spatial curvature from observational data including Baryon Acoustic Oscillations (BAO), Cosmic chronometers (CC), Big Bang nucleosynthesis (BBN), Pantheon+ (PP) compilation of SNe Ia and SH0ES Cepheid host distance anchors. The anisotropy is found to be of the order $10^{-13}$, which interplay with spatial curvature to reduce $H_0$ tension by $\sim 1σ$ as found in the analyses with BAO+CC+BBN+PP combination of data, while no significant effect of anisotropy is observed with BAO+CC+BBN+PPSH0ES combination of data. A closed Universe is favored by $w$CDM as well as anisotropic $w$CDM models with spatial curvature in analyses with BAO+CC+BBN+PP combination of data. An observation of an open Universe from $w$CDM model with spatial curvature in analyses with BAO+CC+BBN+PPSH0ES combination of data and a closed Universe from anisotropic $w$CDM model with curvature in analyses with same combination of data is made. The quintessence form of dark energy is favored at 95\% CL in both analyses.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
Adaptive Koopman Embedding for Robust Control of Complex Nonlinear Dynamical Systems
Authors:
Rajpal Singh,
Chandan Kumar Sah,
Jishnu Keshavan
Abstract:
The discovery of linear embedding is the key to the synthesis of linear control techniques for nonlinear systems. In recent years, while Koopman operator theory has become a prominent approach for learning these linear embeddings through data-driven methods, these algorithms often exhibit limitations in generalizability beyond the distribution captured by training data and are not robust to change…
▽ More
The discovery of linear embedding is the key to the synthesis of linear control techniques for nonlinear systems. In recent years, while Koopman operator theory has become a prominent approach for learning these linear embeddings through data-driven methods, these algorithms often exhibit limitations in generalizability beyond the distribution captured by training data and are not robust to changes in the nominal system dynamics induced by intrinsic or environmental factors. To overcome these limitations, this study presents an adaptive Koopman architecture capable of responding to the changes in system dynamics online. The proposed framework initially employs an autoencoder-based neural network that utilizes input-output information from the nominal system to learn the corresponding Koopman embedding offline. Subsequently, we augment this nominal Koopman architecture with a feed-forward neural network that learns to modify the nominal dynamics in response to any deviation between the predicted and observed lifted states, leading to improved generalization and robustness to a wide range of uncertainties and disturbances compared to contemporary methods. Extensive tracking control simulations, which are undertaken by integrating the proposed scheme within a Model Predictive Control framework, are used to highlight its robustness against measurement noise, disturbances, and parametric variations in system dynamics.
△ Less
Submitted 20 May, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
A Collision Cone Approach for Control Barrier Functions
Authors:
Manan Tayal,
Bhavya Giri Goswami,
Karthik Rajgopal,
Rajpal Singh,
Tejas Rao,
Jishnu Keshavan,
Pushpak Jagtap,
Shishir Kolathaya
Abstract:
This work presents a unified approach for collision avoidance using Collision-Cone Control Barrier Functions (CBFs) in both ground (UGV) and aerial (UAV) unmanned vehicles. We propose a novel CBF formulation inspired by collision cones, to ensure safety by constraining the relative velocity between the vehicle and the obstacle to always point away from each other. The efficacy of this approach is…
▽ More
This work presents a unified approach for collision avoidance using Collision-Cone Control Barrier Functions (CBFs) in both ground (UGV) and aerial (UAV) unmanned vehicles. We propose a novel CBF formulation inspired by collision cones, to ensure safety by constraining the relative velocity between the vehicle and the obstacle to always point away from each other. The efficacy of this approach is demonstrated through simulations and hardware implementations on the TurtleBot, Stoch-Jeep, and Crazyflie 2.1 quadrotor robot, showcasing its effectiveness in avoiding collisions with dynamic obstacles in both ground and aerial settings. The real-time controller is developed using CBF Quadratic Programs (CBF-QPs). Comparative analysis with the state-of-the-art CBFs highlights the less conservative nature of the proposed approach. Overall, this research contributes to a novel control formation that can give a guarantee for collision avoidance in unmanned vehicles by modifying the control inputs from existing path-planning controllers.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
Effects of anisotropy in an anisotropic extension of $w$CDM model
Authors:
Vikrant Yadav,
Santosh Kumar Yadav,
Rajpal
Abstract:
In this paper, we derive observational constraints on an anisotropic $w$CDM model from observational data including Baryonic Acoustic Oscillations (BAOs), Cosmic Chronometer (CC), Big Bang Nucleosynthesis (BBN), Pantheon Plus (PP) compilation of Type Ia supernovae, and SH0ES Cepheid host distance anchors. We find that anisotropy is of the order $10^{-13}$, and its presence in the $w$CDM model redu…
▽ More
In this paper, we derive observational constraints on an anisotropic $w$CDM model from observational data including Baryonic Acoustic Oscillations (BAOs), Cosmic Chronometer (CC), Big Bang Nucleosynthesis (BBN), Pantheon Plus (PP) compilation of Type Ia supernovae, and SH0ES Cepheid host distance anchors. We find that anisotropy is of the order $10^{-13}$, and its presence in the $w$CDM model reduces $H_0$ tension by $\sim 2σ$ and $\sim 1σ$ in the analyses with BAO+CC+BBN+PP and BAO+CC+BBN+PPSH0ES data combinations, respectively. In both analyses, the quintessence form of dark energy is favored at 95\% CL.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Who is driving the conversation? Analysing the nodality of British MPs and journalists on Twitter
Authors:
Leonardo Castro-Gonzalez,
Sukankana Chakraborty,
Helen Margetts,
Hardik Rajpal,
Daniele Guariso,
Jonathan Bright
Abstract:
Who sets the policy agenda? In this paper, we explore the roles of policy actors in agenda setting by studying their relative influence in policy-related discussions. Our approach builds on ``nodality'' \textemdash a concept in political science that determines the capacity of an actor to share information and to be at the centre of information networks. We propose a novel methodology that quantif…
▽ More
Who sets the policy agenda? In this paper, we explore the roles of policy actors in agenda setting by studying their relative influence in policy-related discussions. Our approach builds on ``nodality'' \textemdash a concept in political science that determines the capacity of an actor to share information and to be at the centre of information networks. We propose a novel methodology that quantifies the nodality of all individual actors in any conversation by analysing a comprehensive set of their centrality measures in the related information network. We combine this with the analysis of the activity time-series, of the related conversation (or topic), to demonstrate how nodality scores relate to the capacity to drive topic-related activity. Here we analyse policy-related discussions on X (previously Twitter) and quantify the nodality of two sets of actors in the UK political system \textemdash Members of Parliament (MPs) and accredited journalists - on four policy topics: The Russia-Ukraine War, the Cost-of-Living Crisis, Brexit and COVID-19. Our results show that the capacity to influence the activity related to a topic is significantly and positively associated with nodality. In particular, we identify two dimensions of nodality that drive the capacity to influence topic-related activity. The first is ``active nodality", which reflects the level of topic-related engagement an individual actor has on the platform. The second dimension is ``inherent nodality" which is entirely independent of the platform and reflects the actor's institutional position (such as an MP in a front-bench role, or a journalist's position at a prominent media outlet).
△ Less
Submitted 12 June, 2024; v1 submitted 13 February, 2024;
originally announced February 2024.
-
BERTologyNavigator: Advanced Question Answering with BERT-based Semantics
Authors:
Shreya Rajpal,
Ricardo Usbeck
Abstract:
The development and integration of knowledge graphs and language models has significance in artificial intelligence and natural language processing. In this study, we introduce the BERTologyNavigator -- a two-phased system that combines relation extraction techniques and BERT embeddings to navigate the relationships within the DBLP Knowledge Graph (KG). Our approach focuses on extracting one-hop r…
▽ More
The development and integration of knowledge graphs and language models has significance in artificial intelligence and natural language processing. In this study, we introduce the BERTologyNavigator -- a two-phased system that combines relation extraction techniques and BERT embeddings to navigate the relationships within the DBLP Knowledge Graph (KG). Our approach focuses on extracting one-hop relations and labelled candidate pairs in the first phases. This is followed by employing BERT's CLS embeddings and additional heuristics for relation selection in the second phase. Our system reaches an F1 score of 0.2175 on the DBLP QuAD Final test dataset for Scholarly QALD and 0.98 F1 score on the subset of the DBLP QuAD test dataset during the QA phase.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Understanding Crypto-Ransomware
Authors:
Vadim Kotov,
Mantej Rajpal
Abstract:
Crypto-Ransomware has been increasing in sophistication since it first appeared in September 2013, leveraging new attack vectors, incorporating advanced encryption algorithms, and expanding the number of file types it targets. In this report, we dissect nearly 30 samples of ransomware variants that have been encountered since September 2013, revealing a trend of increasing sophistication.
Crypto-Ransomware has been increasing in sophistication since it first appeared in September 2013, leveraging new attack vectors, incorporating advanced encryption algorithms, and expanding the number of file types it targets. In this report, we dissect nearly 30 samples of ransomware variants that have been encountered since September 2013, revealing a trend of increasing sophistication.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Quantifying Hierarchical Selection
Authors:
Hardik Rajpal,
Clem von Stengel,
Pedro A. M. Mediano,
Fernando E. Rosas,
Eduardo Viegas,
Pablo A. Marquet,
Henrik J. Jensen
Abstract:
At what level does selective pressure effectively act? When considering the reproductive dynamics of interacting and mutating agents, it has long been debated whether selection is better understood by focusing on the individual or if hierarchical selection emerges as a consequence of joint adaptation. Despite longstanding efforts in theoretical ecology there is still no consensus on this fundament…
▽ More
At what level does selective pressure effectively act? When considering the reproductive dynamics of interacting and mutating agents, it has long been debated whether selection is better understood by focusing on the individual or if hierarchical selection emerges as a consequence of joint adaptation. Despite longstanding efforts in theoretical ecology there is still no consensus on this fundamental issue, most likely due to the difficulty in obtaining adequate data spanning sufficient number of generations and the lack of adequate tools to quantify the effect of hierarchical selection. Here we capitalise on recent advances in information-theoretic data analysis to advance this state of affairs by investigating the emergence of high-order structures -- such as groups of species -- in the collective dynamics of the Tangled Nature model of evolutionary ecology. Our results show that evolutionary dynamics can lead to clusters of species that act as a selective group, that acquire information-theoretic agency. Overall, our findings provide quantitative evidence supporting the relevance of high-order structures in evolutionary ecology, which can emerge even from relatively simple processes of adaptation and selection.
△ Less
Submitted 1 November, 2023; v1 submitted 31 October, 2023;
originally announced October 2023.
-
AbDiffuser: Full-Atom Generation of in vitro Functioning Antibodies
Authors:
Karolis Martinkus,
Jan Ludwiczak,
Kyunghyun Cho,
Wei-Ching Liang,
Julien Lafrance-Vanasse,
Isidro Hotzel,
Arvind Rajpal,
Yan Wu,
Richard Bonneau,
Vladimir Gligorijevic,
Andreas Loukas
Abstract:
We introduce AbDiffuser, an equivariant and physics-informed diffusion model for the joint generation of antibody 3D structures and sequences. AbDiffuser is built on top of a new representation of protein structure, relies on a novel architecture for aligned proteins, and utilizes strong diffusion priors to improve the denoising process. Our approach improves protein diffusion by taking advantage…
▽ More
We introduce AbDiffuser, an equivariant and physics-informed diffusion model for the joint generation of antibody 3D structures and sequences. AbDiffuser is built on top of a new representation of protein structure, relies on a novel architecture for aligned proteins, and utilizes strong diffusion priors to improve the denoising process. Our approach improves protein diffusion by taking advantage of domain knowledge and physics-based constraints; handles sequence-length changes; and reduces memory complexity by an order of magnitude, enabling backbone and side chain generation. We validate AbDiffuser in silico and in vitro. Numerical experiments showcase the ability of AbDiffuser to generate antibodies that closely track the sequence and structural properties of a reference set. Laboratory experiments confirm that all 16 HER2 antibodies discovered were expressed at high levels and that 57.1% of the selected designs were tight binders.
△ Less
Submitted 6 March, 2024; v1 submitted 28 July, 2023;
originally announced August 2023.
-
Hessian-Aware Bayesian Optimization for Decision Making Systems
Authors:
Mohit Rajpal,
Lac Gia Tran,
Yehong Zhang,
Bryan Kian Hsiang Low
Abstract:
Many approaches for optimizing decision making systems rely on gradient based methods requiring informative feedback from the environment. However, in the case where such feedback is sparse or uninformative, such approaches may result in poor performance. Derivative-free approaches such as Bayesian Optimization mitigate the dependency on the quality of gradient feedback, but are known to scale poo…
▽ More
Many approaches for optimizing decision making systems rely on gradient based methods requiring informative feedback from the environment. However, in the case where such feedback is sparse or uninformative, such approaches may result in poor performance. Derivative-free approaches such as Bayesian Optimization mitigate the dependency on the quality of gradient feedback, but are known to scale poorly in the high-dimension setting of complex decision making systems. This problem is exacerbated if the system requires interactions between several actors cooperating to accomplish a shared goal. To address the dimensionality challenge, we propose a compact multi-layered architecture modeling the dynamics of actor interactions through the concept of role. We introduce Hessian-aware Bayesian Optimization to efficiently optimize the multi-layered architecture parameterized by a large number of parameters, and give the first improved regret bound in additive high-dimensional Bayesian Optimization since Mutny & Krause (2018). Our approach shows strong empirical results under malformed or sparse reward.
△ Less
Submitted 1 December, 2023; v1 submitted 1 August, 2023;
originally announced August 2023.
-
Protein Design with Guided Discrete Diffusion
Authors:
Nate Gruver,
Samuel Stanton,
Nathan C. Frey,
Tim G. J. Rudner,
Isidro Hotzel,
Julien Lafrance-Vanasse,
Arvind Rajpal,
Kyunghyun Cho,
Andrew Gordon Wilson
Abstract:
A popular approach to protein design is to combine a generative model with a discriminative model for conditional sampling. The generative model samples plausible sequences while the discriminative model guides a search for sequences with high fitness. Given its broad success in conditional sampling, classifier-guided diffusion modeling is a promising foundation for protein design, leading many to…
▽ More
A popular approach to protein design is to combine a generative model with a discriminative model for conditional sampling. The generative model samples plausible sequences while the discriminative model guides a search for sequences with high fitness. Given its broad success in conditional sampling, classifier-guided diffusion modeling is a promising foundation for protein design, leading many to develop guided diffusion models for structure with inverse folding to recover sequences. In this work, we propose diffusioN Optimized Sampling (NOS), a guidance method for discrete diffusion models that follows gradients in the hidden states of the denoising network. NOS makes it possible to perform design directly in sequence space, circumventing significant limitations of structure-based methods, including scarce data and challenging inverse design. Moreover, we use NOS to generalize LaMBO, a Bayesian optimization procedure for sequence design that facilitates multiple objectives and edit-based constraints. The resulting method, LaMBO-2, enables discrete diffusions and stronger performance with limited edits through a novel application of saliency maps. We apply LaMBO-2 to a real-world protein design task, optimizing antibodies for higher expression yield and binding affinity to several therapeutic targets under locality and developability constraints, attaining a 99% expression rate and 40% binding rate in exploratory in vitro experiments.
△ Less
Submitted 12 December, 2023; v1 submitted 31 May, 2023;
originally announced May 2023.
-
High-Resolution Synthetic RGB-D Datasets for Monocular Depth Estimation
Authors:
Aakash Rajpal,
Noshaba Cheema,
Klaus Illgner-Fehns,
Philipp Slusallek,
Sunil Jaiswal
Abstract:
Accurate depth maps are essential in various applications, such as autonomous driving, scene reconstruction, point-cloud creation, etc. However, monocular-depth estimation (MDE) algorithms often fail to provide enough texture & sharpness, and also are inconsistent for homogeneous scenes. These algorithms mostly use CNN or vision transformer-based architectures requiring large datasets for supervis…
▽ More
Accurate depth maps are essential in various applications, such as autonomous driving, scene reconstruction, point-cloud creation, etc. However, monocular-depth estimation (MDE) algorithms often fail to provide enough texture & sharpness, and also are inconsistent for homogeneous scenes. These algorithms mostly use CNN or vision transformer-based architectures requiring large datasets for supervised training. But, MDE algorithms trained on available depth datasets do not generalize well and hence fail to perform accurately in diverse real-world scenes. Moreover, the ground-truth depth maps are either lower resolution or sparse leading to relatively inconsistent depth maps. In general, acquiring a high-resolution ground truth dataset with pixel-level precision for accurate depth prediction is an expensive, and time-consuming challenge.
In this paper, we generate a high-resolution synthetic depth dataset (HRSD) of dimension 1920 X 1080 from Grand Theft Auto (GTA-V), which contains 100,000 color images and corresponding dense ground truth depth maps. The generated datasets are diverse and have scenes from indoors to outdoors, from homogeneous surfaces to textures. For experiments and analysis, we train the DPT algorithm, a state-of-the-art transformer-based MDE algorithm on the proposed synthetic dataset, which significantly increases the accuracy of depth maps on different scenes by 9 %. Since the synthetic datasets are of higher resolution, we propose adding a feature extraction module in the transformer encoder and incorporating an attention-based loss, further improving the accuracy by 15 %.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Control Barrier Functions in Dynamic UAVs for Kinematic Obstacle Avoidance: A Collision Cone Approach
Authors:
Manan Tayal,
Rajpal Singh,
Jishnu Keshavan,
Shishir Kolathaya
Abstract:
Unmanned aerial vehicles (UAVs), specifically quadrotors, have revolutionized various industries with their maneuverability and versatility, but their safe operation in dynamic environments heavily relies on effective collision avoidance techniques. This paper introduces a novel technique for safely navigating a quadrotor along a desired route while avoiding kinematic obstacles. We propose a new c…
▽ More
Unmanned aerial vehicles (UAVs), specifically quadrotors, have revolutionized various industries with their maneuverability and versatility, but their safe operation in dynamic environments heavily relies on effective collision avoidance techniques. This paper introduces a novel technique for safely navigating a quadrotor along a desired route while avoiding kinematic obstacles. We propose a new constraint formulation that employs control barrier functions (CBFs) and collision cones to ensure that the relative velocity between the quadrotor and the obstacle always avoids a cone of vectors that may lead to a collision. By showing that the proposed constraint is a valid CBF for quadrotors, we are able to leverage its real-time implementation via Quadratic Programs (QPs), called the CBF-QPs. Validation includes PyBullet simulations and hardware experiments on Crazyflie 2.1, demonstrating effectiveness in static and moving obstacle scenarios. Comparative analysis with literature, especially higher order CBF-QPs, highlights the proposed approach's less conservative nature. Simulation and Hardware videos are available here: https://tayalmanan28.github.io/C3BF-UAV/
△ Less
Submitted 15 March, 2024; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Synergistic Small Worlds that Drive Technological Sophistication
Authors:
Hardik Rajpal,
Omar A Guerrero
Abstract:
Advanced economies exhibit a high degree of sophistication in the creation of various products. While critical to such sophistication, the nature and underlying structure of the interactions taking place inside production processes remain opaque when studying large systems such as industries or entire economies. Using partial information decomposition, we quantify the nature of these interactions,…
▽ More
Advanced economies exhibit a high degree of sophistication in the creation of various products. While critical to such sophistication, the nature and underlying structure of the interactions taking place inside production processes remain opaque when studying large systems such as industries or entire economies. Using partial information decomposition, we quantify the nature of these interactions, allowing us to infer how much innovation stems form specific input interactions and how they are structured. These estimates yield a novel picture of the nuanced interactions underpinning technological sophistication. By analyzing networks of synergistic interactions, we find that more sophisticated industries tend to exhibit highly modular small-world topologies; with the tertiary sector as its central connective core. Countries and industries that have a well-established connective core and specialized modules exhibit higher economic complexity and output efficiency. Similar modular networks have been found to be responsible for maintaining a balance between integration and segregation of information in the human brain, suggesting a universal principle underlying the organization of sophisticated production processes.
△ Less
Submitted 31 July, 2023; v1 submitted 11 January, 2023;
originally announced January 2023.
-
A Pareto-optimal compositional energy-based model for sampling and optimization of protein sequences
Authors:
Nataša Tagasovska,
Nathan C. Frey,
Andreas Loukas,
Isidro Hötzel,
Julien Lafrance-Vanasse,
Ryan Lewis Kelly,
Yan Wu,
Arvind Rajpal,
Richard Bonneau,
Kyunghyun Cho,
Stephen Ra,
Vladimir Gligorijević
Abstract:
Deep generative models have emerged as a popular machine learning-based approach for inverse design problems in the life sciences. However, these problems often require sampling new designs that satisfy multiple properties of interest in addition to learning the data distribution. This multi-objective optimization becomes more challenging when properties are independent or orthogonal to each other…
▽ More
Deep generative models have emerged as a popular machine learning-based approach for inverse design problems in the life sciences. However, these problems often require sampling new designs that satisfy multiple properties of interest in addition to learning the data distribution. This multi-objective optimization becomes more challenging when properties are independent or orthogonal to each other. In this work, we propose a Pareto-compositional energy-based model (pcEBM), a framework that uses multiple gradient descent for sampling new designs that adhere to various constraints in optimizing distinct properties. We demonstrate its ability to learn non-convex Pareto fronts and generate sequences that simultaneously satisfy multiple desired properties across a series of real-world antibody design tasks.
△ Less
Submitted 19 October, 2022;
originally announced October 2022.
-
A Comprehensive Review on Digital Image Watermarking
Authors:
Shweta Wadhera,
Deepa Kamra,
Ankit Rajpal,
Aruna Jain,
Vishal Jain
Abstract:
The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the waterma…
▽ More
The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the watermark. The detailed classification along with the basic characteristics, namely visual imperceptibility, robustness, capacity, security of digital watermarking is also presented in this work. Further, we have also discussed the recent application areas of digital watermarking such as healthcare, remote education, electronic voting systems, and the military. The robustness is evaluated by examining the effect of image processing attacks on the signed content and the watermark recoverability. The authors believe that the comprehensive survey presented in this paper will help the new researchers to gather knowledge in this domain. Further, the comparative analysis can enkindle ideas to improve upon the already mentioned techniques.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Common Fixed Point Theorems for Self Map**s on a Complete Vector S-metric Space
Authors:
Pooja Yadav,
Mamta Kamra,
Rajpal
Abstract:
S-metric space was introduced by Sedghi et al. in 2012. We derive some common fixed point results for self-map**s on vector valued complete S-metric space. In support of our results, we also give some examples.
S-metric space was introduced by Sedghi et al. in 2012. We derive some common fixed point results for self-map**s on vector valued complete S-metric space. In support of our results, we also give some examples.
△ Less
Submitted 1 April, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
Biomarker Gene Identification for Breast Cancer Classification
Authors:
Sheetal Rajpal,
Ankit Rajpal,
Manoj Agarwal,
Naveen Kumar
Abstract:
BACKGROUND: Breast cancer has emerged as one of the most prevalent cancers among women leading to a high mortality rate. Due to the heterogeneous nature of breast cancer, there is a need to identify differentially expressed genes associated with breast cancer subtypes for its timely diagnosis and treatment. OBJECTIVE: To identify a small gene set for each of the four breast cancer subtypes that co…
▽ More
BACKGROUND: Breast cancer has emerged as one of the most prevalent cancers among women leading to a high mortality rate. Due to the heterogeneous nature of breast cancer, there is a need to identify differentially expressed genes associated with breast cancer subtypes for its timely diagnosis and treatment. OBJECTIVE: To identify a small gene set for each of the four breast cancer subtypes that could act as its signature, the paper proposes a novel algorithm for gene signature identification. METHODS: The present work uses interpretable AI methods to investigate the predictions made by the deep neural network employed for subtype classification to identify biomarkers using the TCGA breast cancer RNA Sequence data. RESULTS: The proposed algorithm led to the discovery of a set of 43 differentially expressed gene signatures. We achieved a competitive average 10-fold accuracy of 0.91, using neural network classifier. Further, gene set analysis revealed several relevant pathways, such as GRB7 events in ERBB2 and p53 signaling pathway. Using the Pearson correlation matrix, we noted that the subtype-specific genes are correlated within each subtype. CONCLUSIONS: The proposed technique enables us to find a concise and clinically relevant gene signature set.
△ Less
Submitted 29 November, 2021; v1 submitted 10 November, 2021;
originally announced November 2021.
-
Deep Learning Based Model for Breast Cancer Subtype Classification
Authors:
Sheetal Rajpal,
Virendra Kumar,
Manoj Agarwal,
Naveen Kumar
Abstract:
Breast cancer has long been a prominent cause of mortality among women. Diagnosis, therapy, and prognosis are now possible, thanks to the availability of RNA sequencing tools capable of recording gene expression data. Molecular subty** being closely related to devising clinical strategy and prognosis, this paper focuses on the use of gene expression data for the classification of breast cancer i…
▽ More
Breast cancer has long been a prominent cause of mortality among women. Diagnosis, therapy, and prognosis are now possible, thanks to the availability of RNA sequencing tools capable of recording gene expression data. Molecular subty** being closely related to devising clinical strategy and prognosis, this paper focuses on the use of gene expression data for the classification of breast cancer into four subtypes, namely, Basal, Her2, LumA, and LumB. In stage 1, we suggested a deep learning-based model that uses an autoencoder to reduce dimensionality. The size of the feature set is reduced from 20,530 gene expression values to 500 by using an autoencoder. This encoded representation is passed to the deep neural network of the second stage for the classification of patients into four molecular subtypes of breast cancer. By deploying the combined network of stages 1 and 2, we have been able to attain a mean 10-fold test accuracy of 0.907 on the TCGA breast cancer dataset. The proposed framework is fairly robust throughout 10 different runs, as shown by the boxplot for classification accuracy. Compared to related work reported in the literature, we have achieved a competitive outcome. In conclusion, the proposed two-stage deep learning-based model is able to accurately classify four breast cancer subtypes, highlighting the autoencoder's capacity to deduce the compact representation and the neural network classifier's ability to correctly label breast cancer patients.
△ Less
Submitted 9 November, 2021; v1 submitted 6 November, 2021;
originally announced November 2021.
-
Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry
Authors:
Zhen Yu Ding,
Benjamin Khakshoor,
Justin Paglierani,
Mantej Rajpal
Abstract:
Leaked secrets, such as passwords and API keys, in codebases were responsible for numerous security breaches. Existing heuristic techniques, such as pattern matching, entropy analysis, and machine learning, exist to detect and alert developers of such leaks. Heuristics, however, naturally exhibit false positives, which require triaging and can lead to developer frustration. We propose to use known…
▽ More
Leaked secrets, such as passwords and API keys, in codebases were responsible for numerous security breaches. Existing heuristic techniques, such as pattern matching, entropy analysis, and machine learning, exist to detect and alert developers of such leaks. Heuristics, however, naturally exhibit false positives, which require triaging and can lead to developer frustration. We propose to use known production secrets as a source of ground truth for sniffing secret leaks in codebases. We develop techniques for using known secrets to sniff whole codebases and continuously sniff differential code revisions. We uncover different performance and security needs when sniffing for known secrets in these two situations in an industrial environment.
△ Less
Submitted 13 August, 2020;
originally announced August 2020.
-
COV-ELM classifier: An Extreme Learning Machine based identification of COVID-19 using Chest X-Ray Images
Authors:
Sheetal Rajpal,
Manoj Agarwal,
Ankit Rajpal,
Navin Lakhyani,
Arpita Saggar,
Naveen Kumar
Abstract:
Coronaviruses constitute a family of viruses that gives rise to respiratory diseases. As COVID-19 is highly contagious, early diagnosis of COVID-19 is crucial for an effective treatment strategy. However, the RT-PCR test which is considered to be a gold standard in the diagnosis of COVID-19 suffers from a high false-negative rate. Chest X-ray (CXR) image analysis has emerged as a feasible and effe…
▽ More
Coronaviruses constitute a family of viruses that gives rise to respiratory diseases. As COVID-19 is highly contagious, early diagnosis of COVID-19 is crucial for an effective treatment strategy. However, the RT-PCR test which is considered to be a gold standard in the diagnosis of COVID-19 suffers from a high false-negative rate. Chest X-ray (CXR) image analysis has emerged as a feasible and effective diagnostic technique towards this objective. In this work, we propose the COVID-19 classification problem as a three-class classification problem to distinguish between COVID-19, normal, and pneumonia classes. We propose a three-stage framework, named COV-ELM. Stage one deals with preprocessing and transformation while stage two deals with feature extraction. These extracted features are passed as an input to the ELM at the third stage, resulting in the identification of COVID-19. The choice of ELM in this work has been motivated by its faster convergence, better generalization capability, and shorter training time in comparison to the conventional gradient-based learning algorithms. As bigger and diverse datasets become available, ELM can be quickly retrained as compared to its gradient-based competitor models. The proposed model achieved a macro average F1-score of 0.95 and the overall sensitivity of ${0.94 \pm 0.02} at a 95% confidence interval. When compared to state-of-the-art machine learning algorithms, the COV-ELM is found to outperform its competitors in this three-class classification scenario. Further, LIME has been integrated with the proposed COV-ELM model to generate annotated CXR images. The annotations are based on the superpixels that have contributed to distinguish between the different classes. It was observed that the superpixels correspond to the regions of the human lungs that are clinically observed in COVID-19 and Pneumonia cases.
△ Less
Submitted 28 September, 2021; v1 submitted 16 July, 2020;
originally announced July 2020.
-
Fully Self-Gated Whole-Heart 4D Flow Imaging from a Five-Minute Scan
Authors:
Aaron Pruitt,
Adam Rich,
Yingmin Liu,
Ning **,
Lee Potter,
Matthew Tong,
Saurabh Rajpal,
Orlando Simonetti,
Rizwan Ahmad
Abstract:
Purpose: To develop and validate an acquisition and processing technique that enables fully self-gated 4D flow imaging with whole-heart coverage in a fixed five-minute scan.
Theory and Methods: The data are acquired continuously using Cartesian sampling and sorted into respiratory and cardiac bins using the self-gating signal. The reconstruction is performed using a recently proposed Bayesian me…
▽ More
Purpose: To develop and validate an acquisition and processing technique that enables fully self-gated 4D flow imaging with whole-heart coverage in a fixed five-minute scan.
Theory and Methods: The data are acquired continuously using Cartesian sampling and sorted into respiratory and cardiac bins using the self-gating signal. The reconstruction is performed using a recently proposed Bayesian method called ReVEAL4D. ReVEAL4D is validated using data from eight healthy volunteers and two patients and compared with a compressed sensing technique, L1-SENSE.
Results: Healthy subjects -- Compared to 2D phase-contrast MRI (2D-PC), flow quantification from ReVEAL4D shows no significant bias. In contrast, the peak velocity and peak flow rate for L1-SENSE are significantly underestimated. Compared to traditional parallel MRI-based 4D flow imaging, ReVEAL4D demonstrates small but significant biases in net flow and peak flow rate, with no significant bias in peak velocity. All three indices are significantly and more markedly underestimated by L1-SENSE. Patients -- Flow quantification from ReVEAL4D agrees well with the 2D-PC reference. In contrast, L1-SENSE markedly underestimated peak velocity.
Conclusions: The combination of highly accelerated five-minute Cartesian acquisition, self-gating, and ReVEAL4D enables whole-heart 4D flow imaging with accurate flow quantification.
△ Less
Submitted 5 August, 2020; v1 submitted 19 April, 2020;
originally announced April 2020.
-
A Unifying Framework of Bilinear LSTMs
Authors:
Mohit Rajpal,
Bryan Kian Hsiang Low
Abstract:
This paper presents a novel unifying framework of bilinear LSTMs that can represent and utilize the nonlinear interaction of the input features present in sequence datasets for achieving superior performance over a linear LSTM and yet not incur more parameters to be learned. To realize this, our unifying framework allows the expressivity of the linear vs. bilinear terms to be balanced by correspon…
▽ More
This paper presents a novel unifying framework of bilinear LSTMs that can represent and utilize the nonlinear interaction of the input features present in sequence datasets for achieving superior performance over a linear LSTM and yet not incur more parameters to be learned. To realize this, our unifying framework allows the expressivity of the linear vs. bilinear terms to be balanced by correspondingly trading off between the hidden state vector size vs. approximation quality of the weight matrix in the bilinear term so as to optimize the performance of our bilinear LSTM, while not incurring more parameters to be learned. We empirically evaluate the performance of our bilinear LSTM in several language-based sequence learning tasks to demonstrate its general applicability.
△ Less
Submitted 10 September, 2023; v1 submitted 22 October, 2019;
originally announced October 2019.
-
Tangled Worldview Model of Opinion Dynamics
Authors:
Hardik Rajpal,
Fernando Rosas,
Henrik Jeldtoft Jensen
Abstract:
We study the joint evolution of worldviews by proposing a model of opinion dynamics, which is inspired in notions from evolutionary ecology. Agents update their opinion on a specific issue based on their propensity to change -- asserted by the social neighbours -- weighted by their mutual similarity on other issues. Agents are, therefore, more influenced by neighbours with similar worldviews (set…
▽ More
We study the joint evolution of worldviews by proposing a model of opinion dynamics, which is inspired in notions from evolutionary ecology. Agents update their opinion on a specific issue based on their propensity to change -- asserted by the social neighbours -- weighted by their mutual similarity on other issues. Agents are, therefore, more influenced by neighbours with similar worldviews (set of opinions on various issues), resulting in a complex co-evolution of each opinion. Simulations show that the worldview evolution exhibits events of intermittent polarization when the social network is scale-free. This, in turn, trigger extreme crashes and surges in the popularity of various opinions. Using the proposed model, we highlight the role of network structure, bounded rationality of agents, and the role of key influential agents in causing polarization and intermittent reformation of worldviews on scale-free networks.
△ Less
Submitted 23 January, 2019; v1 submitted 18 January, 2019;
originally announced January 2019.
-
Learning Type-Aware Embeddings for Fashion Compatibility
Authors:
Mariya I. Vasileva,
Bryan A. Plummer,
Krishna Dusad,
Shreya Rajpal,
Ranjitha Kumar,
David Forsyth
Abstract:
Outfits in online fashion data are composed of items of many different types (e.g. top, bottom, shoes) that share some stylistic relationship with one another. A representation for building outfits requires a method that can learn both notions of similarity (for example, when two tops are interchangeable) and compatibility (items of possibly different type that can go together in an outfit). This…
▽ More
Outfits in online fashion data are composed of items of many different types (e.g. top, bottom, shoes) that share some stylistic relationship with one another. A representation for building outfits requires a method that can learn both notions of similarity (for example, when two tops are interchangeable) and compatibility (items of possibly different type that can go together in an outfit). This paper presents an approach to learning an image embedding that respects item type, and jointly learns notions of item similarity and compatibility in an end-to-end model. To evaluate the learned representation, we crawled 68,306 outfits created by users on the Polyvore website. Our approach obtains 3-5% improvement over the state-of-the-art on outfit compatibility prediction and fill-in-the-blank tasks using our dataset, as well as an established smaller dataset, while supporting a variety of useful queries.
△ Less
Submitted 27 July, 2018; v1 submitted 24 March, 2018;
originally announced March 2018.
-
Achieving perfect coordination amongst agents in the co-action minority game
Authors:
Hardik Rajpal,
Deepak Dhar
Abstract:
We discuss the strategy that rational agents can use to maximize their expected long-term payoff in the co-action minority game. We argue that the agents will try to get into a cyclic state, where each of the $(2N +1)$ agent wins exactly $N$ times in any continuous stretch of $(2N+1)$ days. We propose and analyse a strategy for reaching such a cyclic state quickly, when any direct communication be…
▽ More
We discuss the strategy that rational agents can use to maximize their expected long-term payoff in the co-action minority game. We argue that the agents will try to get into a cyclic state, where each of the $(2N +1)$ agent wins exactly $N$ times in any continuous stretch of $(2N+1)$ days. We propose and analyse a strategy for reaching such a cyclic state quickly, when any direct communication between agents is not allowed, and only the publicly available common information is the record of total number of people choosing the first restaurant in the past. We determine exactly the average time required to reach the periodic state for this strategy. We show that it varies as $(N/\ln 2) [1 + α\cos (2 π\log_2 N)$], for large $N$, where the amplitude $α$ of the leading term in the log-periodic oscillations is found be $\frac{8 π^2}{(\ln 2)^2} \exp{(- 2 π^2/\ln 2)} \approx {\color{blue}7 \times 10^{-11}}$.
△ Less
Submitted 24 May, 2018; v1 submitted 17 February, 2018;
originally announced February 2018.
-
Not all bytes are equal: Neural byte sieve for fuzzing
Authors:
Mohit Rajpal,
William Blum,
Rishabh Singh
Abstract:
Fuzzing is a popular dynamic program analysis technique used to find vulnerabilities in complex software. Fuzzing involves presenting a target program with crafted malicious input designed to cause crashes, buffer overflows, memory errors, and exceptions. Crafting malicious inputs in an efficient manner is a difficult open problem and often the best approach to generating such inputs is through ap…
▽ More
Fuzzing is a popular dynamic program analysis technique used to find vulnerabilities in complex software. Fuzzing involves presenting a target program with crafted malicious input designed to cause crashes, buffer overflows, memory errors, and exceptions. Crafting malicious inputs in an efficient manner is a difficult open problem and often the best approach to generating such inputs is through applying uniform random mutations to pre-existing valid inputs (seed files). We present a learning technique that uses neural networks to learn patterns in the input files from past fuzzing explorations to guide future fuzzing explorations. In particular, the neural models learn a function to predict good (and bad) locations in input files to perform fuzzing mutations based on the past mutations and corresponding code coverage information. We implement several neural models including LSTMs and sequence-to-sequence models that can encode variable length input files. We incorporate our models in the state-of-the-art AFL (American Fuzzy Lop) fuzzer and show significant improvements in terms of code coverage, unique code paths, and crashes for various input formats including ELF, PNG, PDF, and XML.
△ Less
Submitted 9 November, 2017;
originally announced November 2017.
-
Polynomials in operator space theory: matrix ordering and algebraic aspects
Authors:
Preeti Luthra,
Ajay Kumar,
Vandana Rajpal
Abstract:
We extend the $λ$-theory of operator spaces given by Defant and Wiesner (2014), that generalizes the notion of the projective, Haagerup and Schur tensor norm for operator spaces to matrix ordered spaces and Banach $*$-algebras. Given matrix regular operator spaces and operator systems, we introduce cones related to $λ$ for the algebraic tensor product that respect the matricial structure of matrix…
▽ More
We extend the $λ$-theory of operator spaces given by Defant and Wiesner (2014), that generalizes the notion of the projective, Haagerup and Schur tensor norm for operator spaces to matrix ordered spaces and Banach $*$-algebras. Given matrix regular operator spaces and operator systems, we introduce cones related to $λ$ for the algebraic tensor product that respect the matricial structure of matrix regular operator spaces and operator systems, respectively. The ideal structure of $λ$-tensor product of $C^*$-algebras has also been discussed.
△ Less
Submitted 10 October, 2017; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Coherent control in quantum transport: amplification, filtering and switching at finite bias
Authors:
Rajpal Thethi,
Clive Emary
Abstract:
We consider coherent feedback control of quantum transport and focus on the application of simple controllers and the effects of a finite bias voltage. We show that simple single-parameter controllers can give rise to a range of useful effects such as amplification of changes in plant transmission, increased resolution of energy filtration, and the detection of differences between otherwise indist…
▽ More
We consider coherent feedback control of quantum transport and focus on the application of simple controllers and the effects of a finite bias voltage. We show that simple single-parameter controllers can give rise to a range of useful effects such as amplification of changes in plant transmission, increased resolution of energy filtration, and the detection of differences between otherwise indistinguishable plants. We explore how these effects are impacted by the phase-averaging effects associated with the application of a finite bias and identify important voltage scales for the maintenance of the functionalities achieved through feedback control.
△ Less
Submitted 19 June, 2017; v1 submitted 10 March, 2017;
originally announced March 2017.
-
Octopus: A Framework for Cost-Quality-Time Optimization in Crowdsourcing
Authors:
Karan Goel,
Shreya Rajpal,
Mausam
Abstract:
We present Octopus, an AI agent to jointly balance three conflicting task objectives on a micro-crowdsourcing marketplace - the quality of work, total cost incurred, and time to completion. Previous control agents have mostly focused on cost-quality, or cost-time tradeoffs, but not on directly controlling all three in concert. A naive formulation of three-objective optimization is intractable; Oct…
▽ More
We present Octopus, an AI agent to jointly balance three conflicting task objectives on a micro-crowdsourcing marketplace - the quality of work, total cost incurred, and time to completion. Previous control agents have mostly focused on cost-quality, or cost-time tradeoffs, but not on directly controlling all three in concert. A naive formulation of three-objective optimization is intractable; Octopus takes a hierarchical POMDP approach, with three different components responsible for setting the pay per task, selecting the next task, and controlling task-level quality. We demonstrate that Octopus significantly outperforms existing state-of-the-art approaches on real experiments. We also deploy Octopus on Amazon Mechanical Turk, showing its ability to manage tasks in a real-world dynamic setting.
△ Less
Submitted 15 August, 2017; v1 submitted 11 February, 2017;
originally announced February 2017.
-
Quality assessment of voice converted speech using articulatory features
Authors:
Avni Rajpal,
Nirmesh J. Shah,
Mohammadi Zaki,
Hemant A. Patil
Abstract:
We propose a novel application based on acoustic-to-articulatory inversion towards quality assessment of voice converted speech. The ability of humans to speak effortlessly requires coordinated movements of various articulators, muscles, etc. This effortless movement contributes towards naturalness, intelligibility and speakers identity which is partially present in voice converted speech. Hence,…
▽ More
We propose a novel application based on acoustic-to-articulatory inversion towards quality assessment of voice converted speech. The ability of humans to speak effortlessly requires coordinated movements of various articulators, muscles, etc. This effortless movement contributes towards naturalness, intelligibility and speakers identity which is partially present in voice converted speech. Hence, during voice conversion, the information related to speech production is lost. In this paper, this loss is quantified for male voice, by showing increase in RMSE error for voice converted speech followed by showing decrease in mutual information. Similar results are obtained in case of female voice. This observation is extended by showing that articulatory features can be used as an objective measure. The effectiveness of proposed measure over MCD is illustrated by comparing their correlation with Mean Opinion Score.
△ Less
Submitted 23 November, 2015; v1 submitted 16 November, 2015;
originally announced November 2015.
-
$λ$-tensor product of operator spaces
Authors:
Vandana Rajpal,
Ajay Kumar
Abstract:
We propose a theory of $λ$-tensor product of operator spaces which extends the theory of Blecher-Paulsen and Effros-Ruan for the operator space projective tensor product \cite{blecp}, \cite{effros}, \cite{eff} and that of Rajpal-Kumar-Itoh for the Schur tensor product \cite{vandee4} of operator spaces.
We propose a theory of $λ$-tensor product of operator spaces which extends the theory of Blecher-Paulsen and Effros-Ruan for the operator space projective tensor product \cite{blecp}, \cite{effros}, \cite{eff} and that of Rajpal-Kumar-Itoh for the Schur tensor product \cite{vandee4} of operator spaces.
△ Less
Submitted 2 March, 2017; v1 submitted 11 April, 2015;
originally announced April 2015.
-
Arens regularity of projective tensor products
Authors:
Ajay Kumar,
Vandana Rajpal
Abstract:
For completely contractive Banach algebras $A$ and $B$ (respectively operator algebras $A$ and $B$), the necessary and sufficient conditions for the operator space projective tensor product $A\widehat{\otimes}B$ (respectively the Haagerup tensor product $A\otimes^{h}B$) to be Arens regular are obtained. Using the non-commutative Grothendieck's inequality, we show that, for $C^*$-algebras $A$ and…
▽ More
For completely contractive Banach algebras $A$ and $B$ (respectively operator algebras $A$ and $B$), the necessary and sufficient conditions for the operator space projective tensor product $A\widehat{\otimes}B$ (respectively the Haagerup tensor product $A\otimes^{h}B$) to be Arens regular are obtained. Using the non-commutative Grothendieck's inequality, we show that, for $C^*$-algebras $A$ and $B$, the Arens regularity of Banach algebras
$A\otimes^{h}B$, $A\ot^γ B$, $A\ot^{s} B$ and $A\widehat{\otimes}B$ are equivalent, where $\otimes^h$, $\otimes^γ$, $\ot^s$ and $\widehat{\otimes}$ are the Haagerup, the Banach space projective tensor norm, the Schur tensor norm and the operator space projective tensor norm, respectively.
△ Less
Submitted 26 August, 2015; v1 submitted 9 January, 2014;
originally announced January 2014.
-
Schur tensor product of operator spaces
Authors:
Vandana Rajpal,
Ajay Kumar,
Takashi Itoh
Abstract:
We develop a systematic study of the schur tensor product both in the category of operator spaces and in that of $C^*$-algebras.
We develop a systematic study of the schur tensor product both in the category of operator spaces and in that of $C^*$-algebras.
△ Less
Submitted 21 August, 2013;
originally announced August 2013.
-
Projective Tensor Products of $C^*$-algebras
Authors:
Ajay Kumar,
Vandana Rajpal
Abstract:
For $C^*$-algebras $A$ and $B$, we study the bi-continuity of the canonical embedding of $A^{**}\ot_γ B^{**}$ ($A^{**}\hat{\ot} B^{**}$) into $(A \ot_γ B)^{**}$ (resp. $(A \hat{\ot} B)^{**}$), and its isomorphism. Ideal structure of $A\hat{\ot} B$ has been obtained in case $A$ or $B$ has only finitely many closed ideals.
For $C^*$-algebras $A$ and $B$, we study the bi-continuity of the canonical embedding of $A^{**}\ot_γ B^{**}$ ($A^{**}\hat{\ot} B^{**}$) into $(A \ot_γ B)^{**}$ (resp. $(A \hat{\ot} B)^{**}$), and its isomorphism. Ideal structure of $A\hat{\ot} B$ has been obtained in case $A$ or $B$ has only finitely many closed ideals.
△ Less
Submitted 3 May, 2013;
originally announced May 2013.
-
Symmetry and quasi-centrality of operator space projective tensor product
Authors:
Ajay Kumar,
Vandana Rajpal
Abstract:
For $C^{*}$-algebras $A$ and $B$, the operator space projective tensor product $A\hat{\otimes}B$ and the Banach space projective tensor product $A\otimes_γB$ are shown to be symmetric. We also show that $A\hat{\otimes}B$ is weakly Wiener algebra. Finally, quasi-centrality, and the unitary group of $A\hat{\otimes}B$ are discussed.
For $C^{*}$-algebras $A$ and $B$, the operator space projective tensor product $A\hat{\otimes}B$ and the Banach space projective tensor product $A\otimes_γB$ are shown to be symmetric. We also show that $A\hat{\otimes}B$ is weakly Wiener algebra. Finally, quasi-centrality, and the unitary group of $A\hat{\otimes}B$ are discussed.
△ Less
Submitted 8 May, 2012;
originally announced May 2012.
-
An Optimum Time Quantum Using Linguistic Synthesis for Round Robin Scheduling Algorithm
Authors:
Supriya Raheja,
Reena Dadhich,
Smita Rajpal
Abstract:
In Round Robin CPU scheduling algorithm the main concern is with the size of time quantum and the increased waiting and turnaround time. Decision for these is usually based on parameters which are assumed to be precise. However, in many cases the values of these parameters are vague and imprecise. The performance of fuzzy logic depends upon the ability to deal with Linguistic variables. With this…
▽ More
In Round Robin CPU scheduling algorithm the main concern is with the size of time quantum and the increased waiting and turnaround time. Decision for these is usually based on parameters which are assumed to be precise. However, in many cases the values of these parameters are vague and imprecise. The performance of fuzzy logic depends upon the ability to deal with Linguistic variables. With this intent, this paper attempts to generate an Optimal Time Quantum dynamically based on the parameters which are treated as Linguistic variables. This paper also includes Mamdani Fuzzy Inference System using Trapezoidal membership function, results in LRRTQ Fuzzy Inference System. In this paper, we present an algorithm to improve the performance of round robin scheduling algorithm. Numerical analysis based on LRRTQ results on proposed algorithm show the improvement in the performance of the system by reducing unnecessary context switches and also by providing reasonable turnaround time.
△ Less
Submitted 10 March, 2012;
originally announced March 2012.
-
An Alternative Interpretation of Linguistic Variables as Linguistic Finite Automata
Authors:
Supriya Raheja,
Reena Dhadich,
Smita Rajpal
Abstract:
Linguistic variables represent crisp information in a form and precision appropriate for the problem. For example, to answer the question "How are you?" one may say "I am fine." the linguistic variables like "fine", so common in everyday speech. In this paper an alternative interpretation of linguistic variables is introduced with the notion of a linguistic description of a value or set of values.…
▽ More
Linguistic variables represent crisp information in a form and precision appropriate for the problem. For example, to answer the question "How are you?" one may say "I am fine." the linguistic variables like "fine", so common in everyday speech. In this paper an alternative interpretation of linguistic variables is introduced with the notion of a linguistic description of a value or set of values. The use of linguistic variables in many applications reduces the overall computation complexity of the application. Linguistic variables have been shown to be particularly useful in complex non-linear applications. Here we are applying the concept of reasoning with Linguistic Quantifiers to define the Linguistic Finite Automata along with the expansion of δ^{\box} and λ^{\box} over δand λ.
△ Less
Submitted 15 December, 2011;
originally announced December 2011.
-
$^{*}$-Regularity of Operator Space Projective Tensor Product of C$^{*}$-Algebras
Authors:
Ajay Kumar,
Vandana Rajpal
Abstract:
The Banach $^{*}$-algebra $A\hat{\otimes}B$, the operator space projective tensor product of $C^{*}$-algebras $A$ and $B$, is shown to be $^{*}$-regular if Tomiyama's property ($F$) holds for $A\otimes_{\min}B$ and $A \otimes_{\min}B=A \otimes_{\max}B$, where $\otimes_{\min}$ and $\otimes_{\max}$ are the injective and projective $C^{*}$-cross norm, respectively. However, $A\hat{\otimes}B$ has a un…
▽ More
The Banach $^{*}$-algebra $A\hat{\otimes}B$, the operator space projective tensor product of $C^{*}$-algebras $A$ and $B$, is shown to be $^{*}$-regular if Tomiyama's property ($F$) holds for $A\otimes_{\min}B$ and $A \otimes_{\min}B=A \otimes_{\max}B$, where $\otimes_{\min}$ and $\otimes_{\max}$ are the injective and projective $C^{*}$-cross norm, respectively. However, $A\hat{\otimes}B$ has a unique $C^{*}$-norm if and only if $A\otimes B$ has. We also discuss the property ($F$) of $A\hat{\otimes}B$ and $A\otimes_{h}B$, the Haagerup tensor product of $A$ and $B$.
△ Less
Submitted 2 December, 2011;
originally announced December 2011.
-
Vagueness of Linguistic variable
Authors:
Supriya Raheja,
Smita Rajpal
Abstract:
In the area of computer science focusing on creating machines that can engage on behaviors that humans consider intelligent. The ability to create intelligent machines has intrigued humans since ancient times and today with the advent of the computer and 50 years of research into various programming techniques, the dream of smart machines is becoming a reality. Researchers are creating systems whi…
▽ More
In the area of computer science focusing on creating machines that can engage on behaviors that humans consider intelligent. The ability to create intelligent machines has intrigued humans since ancient times and today with the advent of the computer and 50 years of research into various programming techniques, the dream of smart machines is becoming a reality. Researchers are creating systems which can mimic human thought, understand speech, beat the best human chessplayer, and countless other feats never before possible. Ability of the human to estimate the information is most brightly shown in using of natural languages. Using words of a natural language for valuation qualitative attributes, for example, the person pawns uncertainty in form of vagueness in itself estimations. Vague sets, vague judgments, vague conclusions takes place there and then, where and when the reasonable subject exists and also is interested in something. The vague sets theory has arisen as the answer to an illegibility of language the reasonable subject speaks. Language of a reasonable subject is generated by vague events which are created by the reason and which are operated by the mind. The theory of vague sets represents an attempt to find such approximation of vague grou** which would be more convenient, than the classical theory of sets in situations where the natural language plays a significant role. Such theory has been offered by known American mathematician Gau and Buehrer .In our paper we are describing how vagueness of linguistic variables can be solved by using the vague set theory.This paper is mainly designed for one of directions of the eventology (the theory of the random vague events), which has arisen within the limits of the probability theory and which pursue the unique purpose to describe eventologically a movement of reason.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.