-
Enhancing key rates of QKD protocol by Coincidence Detection
Authors:
Tanya Sharma,
Rutvij Bhavsar,
Jayanth Ramakrishnan,
Pooja Chandravanshi,
Shashi Prabhakar,
Ayan Biswas,
R. P. Singh
Abstract:
In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Addition…
▽ More
In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Additionally, we introduce an easy-to-implement algorithm to compute asymptotic key rates for the protocol. Furthermore, we have carried out an experimental implementation of the protocol, where we demonstrate that monitoring coincidences in the decoy state protocol leads to enhanced key rates under realistic experimental conditions.
△ Less
Submitted 10 May, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Efficient Online Crowdsourcing with Complex Annotations
Authors:
Reshef Meir,
Viet-An Nguyen,
Xu Chen,
Jagdish Ramakrishnan,
Udi Weinsberg
Abstract:
Crowdsourcing platforms use various truth discovery algorithms to aggregate annotations from multiple labelers. In an online setting, however, the main challenge is to decide whether to ask for more annotations for each item to efficiently trade off cost (i.e., the number of annotations) for quality of the aggregated annotations. In this paper, we propose a novel approach for general complex annot…
▽ More
Crowdsourcing platforms use various truth discovery algorithms to aggregate annotations from multiple labelers. In an online setting, however, the main challenge is to decide whether to ask for more annotations for each item to efficiently trade off cost (i.e., the number of annotations) for quality of the aggregated annotations. In this paper, we propose a novel approach for general complex annotation (such as bounding boxes and taxonomy paths), that works in an online crowdsourcing setting. We prove that the expected average similarity of a labeler is linear in their accuracy \emph{conditional on the reported label}. This enables us to infer reported label accuracy in a broad range of scenarios. We conduct extensive evaluations on real-world crowdsourcing data from Meta and show the effectiveness of our proposed online algorithms in improving the cost-quality trade-off.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Mitigating the source-side channel vulnerability by characterization of photon statistics
Authors:
Tanya Sharma,
Ayan Biswas,
Jayanth Ramakrishnan,
Pooja Chandravanshi,
Ravindra P. Singh
Abstract:
Quantum key distribution (QKD) theoretically offers unconditional security. Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems. Many well-known QKD protocols use weak coherent laser pulses to encode the quantum information. These sources differ from ideal single photon sources and follow Poisson statistics. Many protocols, such as decoy state…
▽ More
Quantum key distribution (QKD) theoretically offers unconditional security. Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems. Many well-known QKD protocols use weak coherent laser pulses to encode the quantum information. These sources differ from ideal single photon sources and follow Poisson statistics. Many protocols, such as decoy state and coincidence detection protocols, rely on monitoring the photon statistics to detect any information leakage. The accurate measurement and characterization of photon statistics enable the detection of adversarial attacks and the estimation of secure key rates, strengthening the overall security of the QKD system. We have rigorously characterized our source to estimate the mean photon number employing multiple detectors for comparison against measurements made with a single detector. Furthermore, we have also studied intensity fluctuations to help identify and mitigate any potential information leakage due to state preparation flaws. We aim to bridge the gap between theory and practice to achieve information-theoretic security.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
Free Space Continuous Variable Quantum Key Distribution with Discrete Phases
Authors:
Anju Rani,
Pooja Chandravanshi,
Jayanth Ramakrishnan,
Pravin Vaity,
P. Madhusudhan,
Tanya Sharma,
Pranav Bhardwaj,
Ayan Biswas,
R. P. Singh
Abstract:
Quantum Key Distribution (QKD) offers unconditional security in principle. Many QKD protocols have been proposed and demonstrated to ensure secure communication between two authenticated users. Continuous variable (CV) QKD offers many advantages over discrete variable (DV) QKD since it is cost-effective, compatible with current classical communication technologies, efficient even in daylight, and…
▽ More
Quantum Key Distribution (QKD) offers unconditional security in principle. Many QKD protocols have been proposed and demonstrated to ensure secure communication between two authenticated users. Continuous variable (CV) QKD offers many advantages over discrete variable (DV) QKD since it is cost-effective, compatible with current classical communication technologies, efficient even in daylight, and gives a higher secure key rate. Kee** this in view, we demonstrate a discrete modulated CVQKD protocol in the free space which is robust against polarization drift. We also present the simulation results with a noise model to account for the channel noise and the effects of various parameter changes on the secure key rate. These simulation results help us to verify the experimental values obtained for the implemented CVQKD.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Anomaly Detection for an E-commerce Pricing System
Authors:
Jagdish Ramakrishnan,
Elham Shaabani,
Chao Li,
Mátyás A. Sustik
Abstract:
Online retailers execute a very large number of price updates when compared to brick-and-mortar stores. Even a few mis-priced items can have a significant business impact and result in a loss of customer trust. Early detection of anomalies in an automated real-time fashion is an important part of such a pricing system. In this paper, we describe unsupervised and supervised anomaly detection approa…
▽ More
Online retailers execute a very large number of price updates when compared to brick-and-mortar stores. Even a few mis-priced items can have a significant business impact and result in a loss of customer trust. Early detection of anomalies in an automated real-time fashion is an important part of such a pricing system. In this paper, we describe unsupervised and supervised anomaly detection approaches we developed and deployed for a large-scale online pricing system at Walmart. Our system detects anomalies both in batch and real-time streaming settings, and the items flagged are reviewed and actioned based on priority and business impact. We found that having the right architecture design was critical to facilitate model performance at scale, and business impact and speed were important factors influencing model selection, parameter choice, and prioritization in a production environment for a large-scale system. We conducted analyses on the performance of various approaches on a test set using real-world retail data and fully deployed our approach into production. We found that our approach was able to detect the most important anomalies with high precision.
△ Less
Submitted 1 June, 2019; v1 submitted 25 February, 2019;
originally announced February 2019.
-
A Dual Approximate Dynamic Programming Approach to Multi-stage Stochastic Unit Commitment
Authors:
Jagdish Ramakrishnan,
James Luedtke
Abstract:
We study the multi-stage stochastic unit commitment problem in which commitment and generation decisions can be made and adjusted in each time period. We formulate this problem as a Markov decision process, which is "weakly-coupled" in the sense that if the demand constraint is relaxed, the problem decomposes into a separate, low-dimensional, Markov decision process for each generator. We demonstr…
▽ More
We study the multi-stage stochastic unit commitment problem in which commitment and generation decisions can be made and adjusted in each time period. We formulate this problem as a Markov decision process, which is "weakly-coupled" in the sense that if the demand constraint is relaxed, the problem decomposes into a separate, low-dimensional, Markov decision process for each generator. We demonstrate how the dual approximate dynamic programming method of Barty, Carpentier, and Girardeau (RAIRO Operations Research, 44:167-183, 2010) can be adapted to obtain bounds and a policy for this problem. Previous approaches have let the Lagrange multipliers depend only on time; this can result in weak lower bounds. Other approaches have let the multipliers depend on the entire history of past random observations; although this provides a strong lower bound, its ability to handle a large number of sample paths or scenarios is limited. We demonstrate how to bridge these approaches for the stochastic unit commitment problem by letting the multipliers depend on the current observed demand. This allows a good tradeoff between strong lower bounds and good scalability with the number of scenarios. We illustrate this approach numerically on a 168-stage stochastic unit commitment problem, including minimum uptime, downtime, and ram** constraints.
△ Less
Submitted 22 June, 2018; v1 submitted 7 January, 2018;
originally announced January 2018.
-
On the o-minimal Hilbert's fifth problem
Authors:
Mario J. Edmundo,
Marcello Mamino,
Luca Prelli,
Janak Ramakrishnan,
Giuseppina Terzo
Abstract:
Let ${\mathbb M}$ be an arbitrary o-minimal structure. Let $G$ be a definably compact definably connected abelian definable group of dimension $n$. Here we compute the new the intrinsic o-minimal fundamental group of $G;$ for each $k>0$, the $k$-torsion subgroups of $G;$ the o-minimal cohomology algebra over ${\mathbb Q}$ of $G.$ As a corollary we obtain a new uniform proof of Pillay's conjecture,…
▽ More
Let ${\mathbb M}$ be an arbitrary o-minimal structure. Let $G$ be a definably compact definably connected abelian definable group of dimension $n$. Here we compute the new the intrinsic o-minimal fundamental group of $G;$ for each $k>0$, the $k$-torsion subgroups of $G;$ the o-minimal cohomology algebra over ${\mathbb Q}$ of $G.$ As a corollary we obtain a new uniform proof of Pillay's conjecture, an o-minimal analogue of Hilbert's fifth problem, relating definably compact groups to compact real Lie groups, extending the proof already known in o-minimal expansions of ordered fields.
△ Less
Submitted 31 July, 2018; v1 submitted 13 July, 2015;
originally announced July 2015.
-
Minimizing Metastatic Risk in Radiotherapy Fractionation Schedules
Authors:
Hamidreza Badri,
Jagdish Ramakrishnan,
Kevin Leder
Abstract:
Metastasis is the process by which cells from a primary tumor disperse and form new tumors at distant anatomical locations. The treatment and prevention of metastatic cancer remains an extremely challenging problem. This work introduces a novel biologically motivated objective function to the radiation optimization community that takes into account metastatic risk instead of the status of the prim…
▽ More
Metastasis is the process by which cells from a primary tumor disperse and form new tumors at distant anatomical locations. The treatment and prevention of metastatic cancer remains an extremely challenging problem. This work introduces a novel biologically motivated objective function to the radiation optimization community that takes into account metastatic risk instead of the status of the primary tumor. In this work, we consider the problem of develo** fractionated irradiation schedules that minimize production of metastatic cancer cells while kee** normal tissue damage below an acceptable level. A dynamic programming framework is utilized to determine the optimal fractionation scheme. We evaluated our approach on a breast cancer case using the heart and the lung as organs-at-risk (OAR). For small tumor $α/β$ values, hypo-fractionated schedules were optimal, which is consistent with standard models. However, for relatively larger $α/β$ values, we found the type of schedule depended on various parameters such as the time when metastatic risk was evaluated, the $α/β$ values of the OARs, and the normal tissue sparing factors. Interestingly, in contrast to standard models, hypo-fractionated and semi-hypo-fractionated schedules (large initial doses with doses tapering off with time) were suggested even with large tumor $α$/$β$ values. Numerical results indicate potential for significant reduction in metastatic risk.
△ Less
Submitted 17 November, 2015; v1 submitted 27 December, 2013;
originally announced December 2013.
-
Optimization of Radiation Therapy Fractionation Schedules in the Presence of Tumor Repopulation
Authors:
Thomas Bortfeld,
Jagdish Ramakrishnan,
John N. Tsitsiklis,
Jan Unkelbach
Abstract:
We analyze the effect of tumor repopulation on optimal dose delivery in radiation therapy. We are primarily motivated by accelerated tumor repopulation towards the end of radiation treatment, which is believed to play a role in treatment failure for some tumor sites. A dynamic programming framework is developed to determine an optimal fractionation scheme based on a model of cell kill due to radia…
▽ More
We analyze the effect of tumor repopulation on optimal dose delivery in radiation therapy. We are primarily motivated by accelerated tumor repopulation towards the end of radiation treatment, which is believed to play a role in treatment failure for some tumor sites. A dynamic programming framework is developed to determine an optimal fractionation scheme based on a model of cell kill due to radiation and tumor growth in between treatment days. We find that faster tumor growth suggests shorter overall treatment duration. In addition, the presence of accelerated repopulation suggests larger dose fractions later in the treatment to compensate for the increased tumor proliferation. We prove that the optimal dose fractions are increasing over time. Numerical simulations indicate potential for improvement in treatment effectiveness.
△ Less
Submitted 24 April, 2015; v1 submitted 4 December, 2013;
originally announced December 2013.
-
Exploiting tumor shrinkage through temporal optimization of radiotherapy
Authors:
Jan Unkelbach,
David Craft,
Theodore Hong,
David Papp,
Jagdish Ramakrishnan,
Ehsan Salari,
John Wolfgang,
Thomas Bortfeld
Abstract:
In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which nor…
▽ More
In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment.
We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels.
We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one third of the dose should be delivered in the first stage. The projected benefit of multi-stage treatments depends on model assumptions. However, the model predicts large liver dose reductions by more than a factor of two for plausible model parameters.
The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at multi-stage radiotherapy for selected disease sites where substantial tumor regression translates into reduced target volumes.
△ Less
Submitted 9 May, 2014; v1 submitted 22 November, 2013;
originally announced November 2013.
-
An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique
Authors:
Josphineleela Ramakrishnan,
M. Ramakrishnan
Abstract:
Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual fro…
▽ More
Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm reconstructs the phase image from minutiae. The proposed reconstruction algorithm is used to automate the whole process of taking attendance, manually which is a laborious and troublesome work and waste a lot of time, with its managing and maintaining the records for a period of time is also a burdensome task. The proposed reconstruction algorithm has been evaluated with respect to the success rates of type-I attack (match the reconstructed fingerprint against the original fingerprint) and type-II attack (match the reconstructed fingerprint against different impressions of the original fingerprint) using a commercial fingerprint recognition system. Given the reconstructed image from our algorithm, we show that both types of attacks can be effectively launched against a fingerprint recognition system.
△ Less
Submitted 8 August, 2012;
originally announced August 2012.
-
Performance Measurement and Method Analysis (PMMA) for Fingerprint Reconstruction
Authors:
Josphineleela Ramakrishnan,
Ramakrishnan Malaisamy
Abstract:
Fingerprint reconstruction is one of the most well-known and publicized biometrics. Because of their uniqueness and consistency over time, fingerprints have been used for identification over a century, more recently becoming automated due to advancements in computed capabilities. Fingerprint reconstruction is popular because of the inherent ease of acquisition, the numerous sources (e.g. ten finge…
▽ More
Fingerprint reconstruction is one of the most well-known and publicized biometrics. Because of their uniqueness and consistency over time, fingerprints have been used for identification over a century, more recently becoming automated due to advancements in computed capabilities. Fingerprint reconstruction is popular because of the inherent ease of acquisition, the numerous sources (e.g. ten fingers) available for collection, and their established use and collections by law enforcement and immigration. Fingerprints have always been the most practical and positive means of identification. Offenders, being well aware of this, have been coming up with ways to escape identification by that means. Erasing left over fingerprints, using gloves, fingerprint forgery; are certain examples of methods tried by them, over the years. Failing to prevent themselves, they moved to an extent of mutilating their finger skin pattern, to remain unidentified. This article is based upon obliteration of finger ridge patterns and discusses some known cases in relation to the same, in chronological order; highlighting the reasons why offenders go to an extent of performing such act. The paper gives an overview of different methods and performance measurement of the fingerprint reconstruction.
△ Less
Submitted 8 August, 2012;
originally announced August 2012.
-
Interpretable groups are definable
Authors:
Janak Ramakrishnan,
Ya'acov Peterzil,
Pantelis Eleftheriou
Abstract:
We prove that in an arbitrary o-minimal structure, every interpretable group is definably isomorphic to a definable one. We also prove that every definable group lives in a cartesian product of one-dimensional definable group-intervals (or one-dimensional definable groups). We discuss the general open question of elimination of imaginaries in an o-minimal structure.
We prove that in an arbitrary o-minimal structure, every interpretable group is definably isomorphic to a definable one. We also prove that every definable group lives in a cartesian product of one-dimensional definable group-intervals (or one-dimensional definable groups). We discuss the general open question of elimination of imaginaries in an o-minimal structure.
△ Less
Submitted 30 October, 2011;
originally announced October 2011.
-
A Dynamic Programming Approach to Adaptive Fractionation
Authors:
Jagdish Ramakrishnan,
David Craft,
Thomas Bortfeld,
John N. Tsitsiklis
Abstract:
We conduct a theoretical study of various solution methods for the adaptive fractionation problem. The two messages of this paper are: (i) dynamic programming (DP) is a useful framework for adaptive radiation therapy, particularly adaptive fractionation, because it allows us to assess how close to optimal different methods are, and (ii) heuristic methods proposed in this paper are near-optimal, an…
▽ More
We conduct a theoretical study of various solution methods for the adaptive fractionation problem. The two messages of this paper are: (i) dynamic programming (DP) is a useful framework for adaptive radiation therapy, particularly adaptive fractionation, because it allows us to assess how close to optimal different methods are, and (ii) heuristic methods proposed in this paper are near-optimal, and therefore, can be used to evaluate the best possible benefit of using an adaptive fraction size.
The essence of adaptive fractionation is to increase the fraction size when the tumor and organ-at-risk (OAR) are far apart (a "favorable" anatomy) and to decrease the fraction size when they are close together. Given that a fixed prescribed dose must be delivered to the tumor over the course of the treatment, such an approach results in a lower cumulative dose to the OAR when compared to that resulting from standard fractionation. We first establish a benchmark by using the DP algorithm to solve the problem exactly. In this case, we characterize the structure of an optimal policy, which provides guidance for our choice of heuristics. We develop two intuitive, numerically near-optimal heuristic policies, which could be used for more complex, high-dimensional problems. Furthermore, one of the heuristics requires only a statistic of the motion probability distribution, making it a reasonable method for use in a realistic setting. Numerically, we find that the amount of decrease in dose to the OAR can vary significantly (5 - 85%) depending on the amount of motion in the anatomy, the number of fractions, and the range of fraction sizes allowed. In general, the decrease in dose to the OAR is more pronounced when: (i) we have a high probability of large tumor-OAR distances, (ii) we use many fractions (as in a hyper-fractionated setting), and (iii) we allow large daily fraction size deviations.
△ Less
Submitted 4 December, 2011; v1 submitted 21 September, 2011;
originally announced September 2011.
-
Definable linear orders definably embed into lexicographic orders in o-minimal structures
Authors:
Janak Ramakrishnan
Abstract:
We completely characterize definable linear orders in o-minimal structures expanding groups. For example, let (P,<_p) be a linear order definable in the real field R. Then (P,<_p) embeds definably in (R^{n+1},<_l), where <_l is the lexicographic order and n is the o-minimal dimension of P. This improves a result of Onshuus and Steinhorn in the o-minimal group context.
We completely characterize definable linear orders in o-minimal structures expanding groups. For example, let (P,<_p) be a linear order definable in the real field R. Then (P,<_p) embeds definably in (R^{n+1},<_l), where <_l is the lexicographic order and n is the o-minimal dimension of P. This improves a result of Onshuus and Steinhorn in the o-minimal group context.
△ Less
Submitted 8 November, 2010; v1 submitted 28 March, 2010;
originally announced March 2010.
-
Functions continuous on curves in o-minimal structures
Authors:
Janak Ramakrishnan
Abstract:
We give necessary and sufficient conditions on a non-oscillatory curve in an o-minimal field such that, for any bounded definable function, the germ of the function on an initial segment of the curve can be continuously extended to a closed definable set. This situation is translated into a question about types: What are the conditions on an $n$-type such that, for any bounded definable function,…
▽ More
We give necessary and sufficient conditions on a non-oscillatory curve in an o-minimal field such that, for any bounded definable function, the germ of the function on an initial segment of the curve can be continuously extended to a closed definable set. This situation is translated into a question about types: What are the conditions on an $n$-type such that, for any bounded definable function, there is a definable set containing the type on which the function is continuous, and can be extended continuously to the set's closure? All such types are definable, and we give the precise conditions that are equivalent to existence of a desired definable set.
△ Less
Submitted 21 April, 2011; v1 submitted 26 February, 2009;
originally announced February 2009.
-
Maximal small extensions of o-minimal structures
Authors:
Janak Ramakrishnan
Abstract:
A proper elementary extension of a model is called small if it realizes no new types over any finite set in the base model. We answer a question of Marker, and show that it is possible to have an o-minimal structure with a maximal small extension. Our construction yields such a structure for any cardinality. We show that in some cases, notably when the base structure is countable, the maximal smal…
▽ More
A proper elementary extension of a model is called small if it realizes no new types over any finite set in the base model. We answer a question of Marker, and show that it is possible to have an o-minimal structure with a maximal small extension. Our construction yields such a structure for any cardinality. We show that in some cases, notably when the base structure is countable, the maximal small extension has maximal possible cardinality.
△ Less
Submitted 30 March, 2010; v1 submitted 4 December, 2007;
originally announced December 2007.
-
Uniform bounds on growth in o-minimal structures
Authors:
Janak Ramakrishnan
Abstract:
We prove that a function definable with parameters in an o-minimal structure is bounded away from infinity as its argument goes to infinity by a function definable without parameters, and that this new function can be chosen independently of the parameters in the original function. This generalizes a result in a paper of Friedman and Miller. Moreover, this remains true if the argument is taken to…
▽ More
We prove that a function definable with parameters in an o-minimal structure is bounded away from infinity as its argument goes to infinity by a function definable without parameters, and that this new function can be chosen independently of the parameters in the original function. This generalizes a result in a paper of Friedman and Miller. Moreover, this remains true if the argument is taken to approach any element of the structure (or plus/minus infinity), and the function has limit any element of the structure (or plus/minus infinity).
△ Less
Submitted 30 March, 2010; v1 submitted 26 March, 2007;
originally announced March 2007.