Skip to main content

Showing 1–50 of 57 results for author: Srinivasan, M

.
  1. arXiv:2407.08282  [pdf, ps, other

    cs.CR cs.LG

    AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks

    Authors: Muralikrishnan Srinivasan, Linda Senigagliesi, Hui Chen, Arsenia Chorti, Marco Baldi, Henk Wymeersch

    Abstract: We discuss the use of angle of arrival (AoA) as an authentication measure in analog array multiple-input multiple-output (MIMO) systems. A base station equipped with an analog array authenticates users based on the AoA estimated from certified pilot transmissions, while active attackers manipulate their transmitted signals to mount impersonation attacks. We study several attacks of increasing inte… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2024)

  2. arXiv:2407.06559  [pdf, other

    math.CO

    Subspaces, subsets, and Motzkin paths

    Authors: Jonathan D. Farley, Murali K. Srinivasan

    Abstract: We define a map from subspaces to Motzkin paths and show that the inverse image of every path is a disjoint union of symmetric Boolean subsets yielding an explicit symmetric Boolean decomposition of the subspace lattice.

    Submitted 9 July, 2024; originally announced July 2024.

  3. arXiv:2307.10214  [pdf, other

    cs.CR cs.LG

    Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild

    Authors: Giuseppe Siracusano, Davide Sanvito, Roberto Gonzalez, Manikantan Srinivasan, Sivakaman Kamatchi, Wataru Takahashi, Masaru Kawakita, Takahiro Kakumaru, Roberto Bifulco

    Abstract: Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks and enhancing security for organizations. However, the process of extracting relevant information from unstructured text sources can be expensive and time-consuming. Our empirical experience shows that existing tools for automated structured CTI extraction have performance limitations. Furthermore, the community lacks a common… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  4. End-to-End Learning for VCSEL-based Optical Interconnects: State-of-the-Art, Challenges, and Opportunities

    Authors: Muralikrishnan Srinivasan, **xiang Song, Alexander Grabowski, Krzysztof Szczerba, Holger K. Iversen, Mikkel N. Schmidt, Darko Zibar, Jochen Schröder, Anders Larsson, Christian Häger, Henk Wymeersch

    Abstract: Optical interconnects (OIs) based on vertical-cavity surface-emitting lasers (VCSELs) are the main workhorse within data centers, supercomputers, and even vehicles, providing low-cost, high-rate connectivity. VCSELs must operate under extremely harsh and time-varying conditions, thus requiring adaptive and flexible designs of the communication chain. Such designs can be built based on mathematical… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  5. arXiv:2210.05596  [pdf, other

    eess.SY cs.LG cs.RO

    Geometry of Radial Basis Neural Networks for Safety Biased Approximation of Unsafe Regions

    Authors: Ahmad Abuaish, Mohit Srinivasan, Patricio A. Vela

    Abstract: Barrier function-based inequality constraints are a means to enforce safety specifications for control systems. When used in conjunction with a convex optimization program, they provide a computationally efficient method to enforce safety for the general class of control-affine systems. One of the main assumptions when taking this approach is the a priori knowledge of the barrier function itself,… ▽ More

    Submitted 28 March, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: Accepted into American Control Conference (ACC) 2023

  6. arXiv:2209.00162  [pdf, other

    cs.SE

    Prioritization of Metamorphic Relations to reduce the cost of testing

    Authors: Madhusudan Srinivasan, Upulee Kanewala

    Abstract: An oracle is a mechanism to decide whether the outputs of the program for the executed test cases are correct. For machine learning programs, such oracle is not available or too difficult to apply. Metamorphic testing is a testing approach that uses metamorphic relations, which are necessary properties of the software under test to help verify the correctness of a program. Prioritization of metamo… ▽ More

    Submitted 31 August, 2022; originally announced September 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2109.09798

  7. arXiv:2206.00332  [pdf, other

    eess.SP cs.CR cs.IT

    Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

    Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti, Mahdi Shakiba Herfeh, Muhammad K. Shehzad, Philippe Sehier

    Abstract: While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processi… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  8. arXiv:2204.05540  [pdf, ps, other

    math.CO

    A q-analog of the adjacency matrix of the n-cube

    Authors: Subhajit Ghosh, Murali K. Srinivasan

    Abstract: We define a q-analog of the adjacency matrix of the n-cube, determine its eigenvalues and write down a canonical eigenbasis. We give a weighted count of the number of rooted spanning trees in the q-analog of the n-cube. Remarks on the previous version: The q-analog of the Kac matrix appears in Terwilliger's classification of Leonard pairs and as such its eigenvalues and eigenvectors were known.… ▽ More

    Submitted 27 April, 2022; v1 submitted 12 April, 2022; originally announced April 2022.

    MSC Class: 05E18; 05C81; 20C30

  9. arXiv:2202.00869  [pdf

    physics.med-ph cond-mat.mtrl-sci

    Towards skin-acetone monitors with selective sensitivity: dynamics of PANI-CA films

    Authors: Anthony Annerino, Michael Faltas, Manoj Srinivasan, Pelagia-Irene Gouma

    Abstract: Most research aimed at measuring biomarkers on the skin is only concerned with sensing chemicals in sweat using electrical signals, but these methods are not truly non-invasive nor non-intrusive because they require substantial amounts of sweat to get a reading. This project aims to create a truly non-invasive wearable sensor that continuously detects the gaseous acetone (a biomarker related to me… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

    Comments: 15 pages, 7 figures, 1 table, submitted to PLOS ONE

  10. arXiv:2201.12177  [pdf

    cs.SE

    Detecting Discussions of Technical Debt

    Authors: Ipek Ozkaya, Zachary Kurtz, Robert L. Nord, Raghvinder S. Sangwan, Satish M. Srinivasan

    Abstract: Technical debt (TD) refers to suboptimal choices during software development that achieve short-term goals at the expense of long-term quality. Although developers often informally discuss TD, the concept has not yet crystalized into a consistently applied label when describing issues in most repositories. We apply machine learning to understand developer insights into TD when discussing tickets i… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Comments: 12 pages, 5 figures, 5 tables

    Report number: DM18-0447

  11. arXiv:2112.08665  [pdf, ps, other

    cs.IT eess.SP

    Joint Power-control and Antenna Selection in User-Centric Cell-Free Systems with Mixed Resolution ADC

    Authors: Shashank Shekhar, Athira Subhash, Muralikrishnan Srinivasan, Sheetal Kalyani

    Abstract: In this paper, we propose a scheme for the joint optimization of the user transmit power and the antenna selection at the access points (AP)s of a user-centric cell-free massive multiple-input-multiple-output (UC CF-mMIMO) system. We derive an approximate expression for the achievable uplink rate of the users in a UC CF-mMIMO system in the presence of a mixed analog-to-digital converter (ADC) reso… ▽ More

    Submitted 18 July, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

  12. arXiv:2110.15415  [pdf, other

    cs.IT cs.AI cs.CR

    On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

    Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti

    Abstract: This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret ke… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  13. arXiv:2109.09798  [pdf, other

    cs.SE cs.LG

    Metamorphic Relation Prioritization for Effective Regression Testing

    Authors: Madhusudan Srinivasan, Upulee Kanewala

    Abstract: Metamorphic testing (MT) is widely used for testing programs that face the oracle problem. It uses a set of metamorphic relations (MRs), which are relations among multiple inputs and their corresponding outputs to determine whether the program under test is faulty. Typically, MRs vary in their ability to detect faults in the program under test, and some MRs tend to detect the same set of faults. I… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  14. arXiv:2101.07737  [pdf, ps, other

    cs.IT

    Outage Probability Analysis of Uplink Cell-Free Massive MIMO Network with and without Pilot Contamination

    Authors: Shashank Shekhar, Muralikrishnan Srinivasan, Sheetal Kalyani, Mohamed-Slim Alouini

    Abstract: This paper derives approximate outage probability (OP) expressions for uplink cell-free massive multiple-input-multiple-output (CF-mMIMO) systems with and without pilot contamination. The system's access points (APs) are considered to have imperfect channel state information (CSI). The signal-to-interference-plus-noise ratio (SINR) of the CF-mMIMO system is approximated via a Log-normal distributi… ▽ More

    Submitted 27 June, 2023; v1 submitted 19 January, 2021; originally announced January 2021.

    Comments: In this version, we have extended our analysis to multiple antenna AP and the scenario with and without pilot contamination

  15. Airplane-Aided Integrated Next-Generation Networking

    Authors: Muralikrishnan Srinivasan, Sarath Gopi, Sheetal Kalyani, Xiao**g Huang, Lajos Hanzo

    Abstract: A high-rate yet low-cost air-to-ground (A2G) communication backbone is conceived for integrating the space and terrestrial network by harnessing the opportunistic assistance of the passenger planes or high altitude platforms (HAPs) as mobile base stations (BSs) and millimetre wave communication. The airliners act as the network-provider for the terrestrial users while relying on satellite backhaul… ▽ More

    Submitted 31 July, 2021; v1 submitted 3 January, 2021; originally announced January 2021.

  16. arXiv:2010.13057  [pdf, other

    cs.CL

    Contextualized Word Embeddings Encode Aspects of Human-Like Word Sense Knowledge

    Authors: Sathvik Nair, Mahesh Srinivasan, Stephan Meylan

    Abstract: Understanding context-dependent variation in word meanings is a key aspect of human language comprehension supported by the lexicon. Lexicographic resources (e.g., WordNet) capture only some of this context-dependent variation; for example, they often do not encode how closely senses, or discretized word meanings, are related to one another. Our work investigates whether recent advances in NLP, sp… ▽ More

    Submitted 25 October, 2020; originally announced October 2020.

    Comments: To appear in proceedings of the Cognitive Aspects of the Lexicon Workshop at the 28th International Conference on Computational Linguistics (COLING)

  17. arXiv:2005.12407  [pdf, other

    eess.SY

    Continuous Reachability Task Transition Using Control Barrier Functions

    Authors: Mohit Srinivasan, Cesar Santoyo, Samuel Coogan

    Abstract: In this paper, a method to achieve smooth transitions between sequential reachability tasks for a continuous time mobile robotic system is presented. Control barrier functions provide formal guarantees of forward invariance of safe sets and finite-time reachability and are able to enforce task execution. Barrier functions used in quadratic programs result in implementation of controllers with real… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: To appear in the 21st IFAC World Congress, 2020

  18. arXiv:2003.09446  [pdf, ps, other

    cs.IT cs.LG eess.SP

    Green DetNet: Computation and Memory efficient DetNet using Smart Compression and Training

    Authors: Nancy Nayak, Thulasi Tholeti, Muralikrishnan Srinivasan, Sheetal Kalyani

    Abstract: This paper introduces an incremental training framework for compressing popular Deep Neural Network (DNN) based unfolded multiple-input-multiple-output (MIMO) detection algorithms like DetNet. The idea of incremental training is explored to select the optimal depth while training. To reduce the computation requirements or the number of FLoating point OPerations (FLOPs) and enforce sparsity in weig… ▽ More

    Submitted 16 April, 2021; v1 submitted 20 March, 2020; originally announced March 2020.

  19. arXiv:2003.04950  [pdf, other

    cs.RO eess.SY

    Synthesis of Control Barrier Functions Using a Supervised Machine Learning Approach

    Authors: Mohit Srinivasan, Amogh Dabholkar, Samuel Coogan, Patricio Vela

    Abstract: Control barrier functions are mathematical constructs used to guarantee safety for robotic systems. When integrated as constraints in a quadratic programming optimization problem, instantaneous control synthesis with real-time performance demands can be achieved for robotics applications. Prevailing use has assumed full knowledge of the safety barrier functions, however there are cases where the s… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: Submitted to the 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  20. arXiv:2001.07210  [pdf, other

    eess.SY cs.RO

    Extent-Compatible Control Barrier Functions

    Authors: Mohit Srinivasan, Matthew Abate, Gustav Nilsson, Samuel Coogan

    Abstract: Safety requirements in dynamical systems are commonly enforced with set invariance constraints over a safe region of the state space. Control barrier functions, which are Lyapunov-like functions for guaranteeing set invariance, are an effective tool to enforce such constraints and guarantee safety when the system is represented as a point in the state space. In this paper, we introduce extent-comp… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

  21. arXiv:2001.02287  [pdf, ps, other

    q-bio.NC nlin.AO

    A unified energy optimality criterion predicts human navigation paths and speeds

    Authors: Geoffrey L. Brown, Nidhi Seethapathi, Manoj Srinivasan

    Abstract: Navigating our physical environment requires changing directions and turning. Despite its ecological importance, we do not have a unified theoretical account of non-straight-line human movement. Here, we present a unified optimality criterion that predicts disparate non-straight-line walking phenomena, with straight-line walking as a special case. We first characterized the metabolic cost of turni… ▽ More

    Submitted 1 November, 2021; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the National Academy of Sciences 118.29 (2021)

  22. arXiv:1909.03139  [pdf, ps, other

    q-bio.QM

    Walking for short distances and turning in lower-limb amputees: a study in low-cost prosthesis users

    Authors: Nidhi Seethapathi, Anil Kumar Jain, Manoj Srinivasan

    Abstract: Preferred walking speed is a widely-used performance measure for people with mobility issues, but is usually measured in straight line walking for fixed distances or durations. However, daily walking involves walking for bouts of different distances and walking with turning. Here, we studied walking for short distances and walking in circles in unilateral lower-limb amputees wearing an above or be… ▽ More

    Submitted 26 April, 2022; v1 submitted 6 September, 2019; originally announced September 2019.

    Comments: 5 figures

  23. arXiv:1908.04903  [pdf, other

    cs.RO

    Control of Mobile Robots Using Barrier Functions Under Temporal Logic Specifications

    Authors: Mohit Srinivasan, Samuel Coogan

    Abstract: In this paper, we propose a framework for the control of mobile robots subject to temporal logic specifications using barrier functions. Complex task specifications can be conveniently encoded using linear temporal logic. In particular, we consider a fragment of linear temporal logic which encompasses a large class of motion planning specifications for a robotic system. Control barrier functions h… ▽ More

    Submitted 28 March, 2020; v1 submitted 13 August, 2019; originally announced August 2019.

    Comments: Submitted to the IEEE Transactions on Robotics (T-RO)

  24. arXiv:1907.07718  [pdf, other

    cs.RO cs.MA

    A Sequential Composition Framework for Coordinating Multi-Robot Behaviors

    Authors: Pietro Pierpaoli, Anqi Li, Mohit Srinivasan, Xiaoyi Cai, Samuel Coogan, Magnus Egerstedt

    Abstract: A number of coordinated behaviors have been proposed for achieving specific tasks for multi-robot systems. However, since most applications require more than one such behavior, one needs to be able to compose together sequences of behaviors while respecting local information flow constraints. Specifically, when the inter-agent communication depends on inter-robot distances, these constraints trans… ▽ More

    Submitted 2 March, 2020; v1 submitted 17 July, 2019; originally announced July 2019.

    Comments: 11 pages, 4 figures

  25. arXiv:1906.07812  [pdf, other

    cs.SE

    Debunking the Myth that Upfront Requirements are Infeasible for Scientific Computing Software

    Authors: Spencer Smith, Malavika Srinivasan, Sumanth Shankar

    Abstract: Many in the Scientific Computing Software community believe that upfront requirements are impossible, or at least infeasible. This paper shows requirements are feasible with the following: i) an appropriate perspective ("faking" the final documentation as if requirements were correct and complete from the start, and gathering requirements as if for a family of programs); ii) the aid of the right p… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: 11 pages, 11 figures, Presented at the 2019 International Workshop on Software Engineering for Science (held in conjunction with ICSE'19), Montreal, Quebec, Canada

  26. arXiv:1906.07502  [pdf

    cs.LG stat.AP stat.ML

    Data-Driven Malaria Prevalence Prediction in Large Densely-Populated Urban Holoendemic sub-Saharan West Africa: Harnessing Machine Learning Approaches and 22-years of Prospectively Collected Data

    Authors: Biobele J. Brown, Alexander A. Przybylski, Petru Manescu, Fabio Caccioli, Gbeminiyi Oyinloye, Muna Elmi, Michael J. Shaw, Vijay Pawar, Remy Claveau, John Shawe-Taylor, Mandayam A. Srinivasan, Nathaniel K. Afolabi, Adebola E. Orimadegun, Wasiu A. Ajetunmobi, Francis Akinkunmi, Olayinka Kowobari, Kikelomo Osinusi, Felix O. Akinbami, Samuel Omokhodion, Wuraola A. Shokunbi, Ikeoluwa Lagunju, Olugbemiro Sodeinde, Delmiro Fernandez-Reyes

    Abstract: Plasmodium falciparum malaria still poses one of the greatest threats to human life with over 200 million cases globally leading to half-million deaths annually. Of these, 90% of cases and of the mortality occurs in sub-Saharan Africa, mostly among children. Although malaria prediction systems are central to the 2016-2030 malaria Global Technical Strategy, currently these are inadequate at capturi… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: 40 pages, 10 figures

    ACM Class: J.3; I.5.4

  27. arXiv:1906.07496  [pdf

    eess.IV cs.CV

    Deep Learning Enhanced Extended Depth-of-Field for Thick Blood-Film Malaria High-Throughput Microscopy

    Authors: Petru Manescu, Lydia Neary- Zajiczek, Michael J. Shaw, Muna Elmi, Remy Claveau, Vijay Pawar, John Shawe-Taylor, Iasonas Kokkinos, Mandayam A. Srinivasan, Ikeoluwa Lagunju, Olugbemiro Sodeinde, Biobele J. Brown, Delmiro Fernandez-Reyes

    Abstract: Fast accurate diagnosis of malaria is still a global health challenge for which automated digital-pathology approaches could provide scalable solutions amenable to be deployed in low-to-middle income countries. Here we address the problem of Extended Depth-of-Field (EDoF) in thick blood film microscopy for rapid automated malaria diagnosis. High magnification oil-objectives (100x) with large numer… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: 10 pages, 4 figures

  28. arXiv:1906.00598  [pdf, ps, other

    cs.IT

    Transmit Power Policy and Ergodic Multicast Rate Analysis of Cognitive Radio Networks in Generalized Fading

    Authors: Athira Subhash, Muralikrishnan Srinivasan, Sheetal Kalyani, Lajos Hanzo

    Abstract: This paper determines the optimum secondary user power allocation and ergodic multicast rate of point-to-multipoint communication in a cognitive radio network in the presence of outage constraints for the primary users. Using tools from extreme value theory (EVT), it is first proved that the limiting distribution of the minimum of independent and identically distributed (i.i.d.) signal-to-interf… ▽ More

    Submitted 27 October, 2019; v1 submitted 3 June, 2019; originally announced June 2019.

  29. arXiv:1905.03443  [pdf, ps, other

    cs.IT eess.SP

    Joint power and resource allocation of D2D communication with low-resolution ADC

    Authors: Muralikrishnan Srinivasan, Athira Subhash, Sheetal Kalyani

    Abstract: This paper considers the joint power control and resource allocation for a device-to-device (D2D) underlay cellular system with a multi-antenna BS employing ADCs with different resolutions. We propose a four-step algorithm that optimizes the ADC resolution profile at the base station (BS) to reduce the energy consumption and perform joint power control and resource allocation of D2D communication… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

  30. arXiv:1904.08007  [pdf, other

    cs.SE q-bio.QM

    Metamorphic Testing for Quality Assurance of Protein Function Prediction Tools

    Authors: Morteza Pourreza Shahri, Madhusudan Srinivasan, Gillian Reynolds, Diane Bimczok, Indika Kahanda, Upulee Kanewala

    Abstract: Proteins are the workhorses of life and gaining insight on their functions is of paramount importance for applications such as drug design. However, the experimental validation of functions of proteins is highly-resource consuming. Therefore, recently, automated protein function prediction (AFP) using machine learning has gained significant interest. Many of these AFP tools are based on supervised… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 8 pages, First IEEE International Conference On Artificial Intelligence Testing

  31. arXiv:1902.10640  [pdf, other

    cs.CV

    Efficient Video Classification Using Fewer Frames

    Authors: Shweta Bhardwaj, Mukundhan Srinivasan, Mitesh M. Khapra

    Abstract: Recently,there has been a lot of interest in building compact models for video classification which have a small memory footprint (<1 GB). While these models are compact, they typically operate by repeated application of a small weight matrix to all the frames in a video. E.g. recurrent neural network based methods compute a hidden state for every frame of the video using a recurrent weight matrix… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

    Comments: To Appear in Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition (CVPR'2019)

  32. arXiv:1902.08832  [pdf, other

    cs.CL

    Re-evaluating ADEM: A Deeper Look at Scoring Dialogue Responses

    Authors: Ananya B. Sai, Mithun Das Gupta, Mitesh M. Khapra, Mukundhan Srinivasan

    Abstract: Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. ADEM(Lowe et al. 2017) formulated the automatic evaluation of dialogue systems as a learning problem and showed that such a model was able to predict responses which correlate significantly with human judgements, both at utterance and system level. Their system was shown to have beaten wor… ▽ More

    Submitted 23 February, 2019; originally announced February 2019.

    Comments: Accepted as a long paper in the proceedings of AAAI-2019

  33. arXiv:1901.05880  [pdf, other

    cs.CV

    UltraCompression: Framework for High Density Compression of Ultrasound Volumes using Physics Modeling Deep Neural Networks

    Authors: Debarghya China, Francis Tom, Sumanth Nandamuri, Aupendu Kar, Mukundhan Srinivasan, Pabitra Mitra, Debdoot Sheet

    Abstract: Ultrasound image compression by preserving speckle-based key information is a challenging task. In this paper, we introduce an ultrasound image compression framework with the ability to retain realism of speckle appearance despite achieving very high-density compression factors. The compressor employs a tissue segmentation method, transmitting segments along with transducer frequency, number of sa… ▽ More

    Submitted 17 January, 2019; originally announced January 2019.

    Comments: To appear in the Proceedings of the 2019 IEEE International Symposium on Biomedical Imaging (ISBI 2019); First three authors contributed equally

  34. Machine Learning-based Link Fault Identification and Localization in Complex Networks

    Authors: Srinikethan Madapuzi Srinivasan, Tram Truong-Huu, Mohan Gurusamy

    Abstract: With the proliferation of network devices and rapid development in information technology, networks such as Internet of Things are increasing in size and becoming more complex with heterogeneous wired and wireless links. In such networks, link faults may result in a link disconnection without immediate replacement or a link reconnection, e.g., a wireless node changes its access point. Identifying… ▽ More

    Submitted 26 March, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: This paper has been accepted for publication in the IEEE Internet of Things Journal

  35. arXiv:1808.02393  [pdf, other

    eess.SY cs.RO math.OC

    Control of Multi-Agent Systems with Finite Time Control Barrier Certificates and Temporal Logic

    Authors: Mohit Srinivasan, Samuel Coogan, Magnus Egerstedt

    Abstract: In this paper, a method to synthesize controllers using finite time convergence control barrier functions guided by linear temporal logic specifications for continuous time multi-agent dynamical systems is proposed. Finite time convergence to a desired set in the state space is guaranteed under the existence of a suitable finite time convergence control barrier function. In addition, these barrier… ▽ More

    Submitted 7 August, 2018; originally announced August 2018.

    Comments: To appear in the 57th IEEE Conference on Decision and Control, Miami Beach, FL, USA, 2018

  36. arXiv:1807.00481  [pdf, ps, other

    math.CO

    The perfect matching association scheme

    Authors: Murali K. Srinivasan

    Abstract: We revisit the Bose-Mesner algebra of the perfect matching association scheme. Our main results are: 1. An inductive algorithm, based on solving linear equations, to compute the eigenvalues of the orbital basis elements given the central characters of the symmetric groups. 2. Universal formulas, as content evaluations of symmetric functions, for the eigenvalues of fixed orbitals. 3. An induc… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Comments: 33 pages

  37. arXiv:1806.05450  [pdf, ps, other

    cs.IT stat.AP

    Asymptotic maximum order statistic for SIR in $κ-μ$ shadowed fading

    Authors: Athira Subhash, Muralikrishnan Srinivasan, Sheetal Kalyani

    Abstract: Using tools from extreme value theory (EVT), it is proved that, when the user signal and the interferer signals undergo independent and non-identically distributed (i.n.i.d.) $κ-μ$ shadowed fading, the limiting distribution of the maximum of $L$ independent and identically distributed (i.i.d.) signal-to-interference ratio (SIR) random variables (RVs) is a Frechet distribution. It is observed that… ▽ More

    Submitted 27 October, 2019; v1 submitted 14 June, 2018; originally announced June 2018.

  38. arXiv:1805.07769  [pdf, ps, other

    cs.IT

    Analysis of Outage Probability of MRC with $η-μ$ co-channel interference

    Authors: Muralikrishnan Srinivasan, Sheetal Kalyani

    Abstract: Approximate outage probability expressions are derived for systems employing maximum ratio combining, when both the desired signal and the interfering signals are subjected to $η-μ$ fading, with the interferers having unequal power. The approximations are in terms of the Appell Function and Gauss hypergeometric function. A close match is observed between the outage probability result obtained thro… ▽ More

    Submitted 20 May, 2018; originally announced May 2018.

  39. arXiv:1802.07354  [pdf, other

    cs.SE

    Quality Assurance of Bioinformatics Software: A Case Study of Testing a Biomedical Text Processing Tool Using Metamorphic Testing

    Authors: Madhusudan Srinivasan, Morteza Pourreza Shahri, Upulee Kanewala, Indika Kahanda

    Abstract: Bioinformatics software plays a very important role in making critical decisions within many areas including medicine and health care. However, most of the research is directed towards develo** tools, and little time and effort is spent on testing the software to assure its quality. In testing, a test oracle is used to determine whether a test is passed or failed during testing, and unfortunatel… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

  40. arXiv:1708.06336  [pdf, ps, other

    eess.SP cs.IT

    Analysis of Optimal Combining in Rician Fading with Co-channel Interference

    Authors: Muralikrishnan Srinivasan, Sheetal Kalyani

    Abstract: Approximate Symbol error rate (SER), outage probability and rate expressions are derived for receive diversity system employing optimum combining when both the desired and the interfering signals are subjected to Rician fading, for the cases of a) equal power uncorrelated interferers b) unequal power interferers c) interferer correlation. The derived expressions are applicable for an arbitrary num… ▽ More

    Submitted 9 May, 2019; v1 submitted 14 August, 2017; originally announced August 2017.

  41. arXiv:1707.09734  [pdf, ps, other

    cs.IT stat.AP

    Approximate Random Matrix Models for Generalized Fading MIMO Channels

    Authors: Muralikrishnan Srinivasan, Sheetal Kalyani

    Abstract: Approximate random matrix models for $κ-μ$ and $η-μ$ faded multiple input multiple output (MIMO) communication channels are derived in terms of a complex Wishart matrix. The proposed approximation has the least Kullback-Leibler (KL) divergence from the original matrix distribution. The utility of the results are demonstrated in a) computing the average capacity/rate expressions of $κ-μ$/$η-μ$ MIMO… ▽ More

    Submitted 22 October, 2019; v1 submitted 31 July, 2017; originally announced July 2017.

  42. Shape-independent Hardness Estimation Using Deep Learning and a GelSight Tactile Sensor

    Authors: Wenzhen Yuan, Chenzhuo Zhu, Andrew Owens, Mandayam A. Srinivasan, Edward H. Adelson

    Abstract: Hardness is among the most important attributes of an object that humans learn about through touch. However, approaches for robots to estimate hardness are limited, due to the lack of information provided by current tactile sensors. In this work, we address these limitations by introducing a novel method for hardness estimation, based on the GelSight tactile sensor, and the method does not require… ▽ More

    Submitted 12 April, 2017; originally announced April 2017.

  43. arXiv:1702.01716  [pdf

    cond-mat.mes-hall

    Large Enhancement of Electronic Thermal Conductivity and Lorenz Number in Topological Insulator Bi2Te2Se Thin Films

    Authors: Zhe Luo, Jifa Tian, Mithun Srinivasan, Yong P. Chen, Xianfan Xu

    Abstract: Topological insulators (TI) have attracted extensive research effort due to their insulating bulk states but conducting surface states. However, investigation and understanding of thermal transport in topological insulators, particularly the effect of surface states are lacking. In this work, we studied thickness-dependent in-plane thermal conductivity of Bi2Te2Se TI thin films. A large enhancemen… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

  44. arXiv:1504.04685  [pdf, ps, other

    math.CO math.RT

    On the representation theory of $G\sim S_n$

    Authors: Ashish Mishra, Murali K. Srinivasan

    Abstract: In the Vershik-Okounkov approach to the complex irreducible representations of $S_n$ and $G\sim S_n$ we parametrize the irreducible representations and their bases by spectral objects rather than combinatorial objects and then, at the end, give a bijection between the spectral and combinatorial objects. The fundamental ideas are similar in both cases but there are additional technicalities involve… ▽ More

    Submitted 18 April, 2015; originally announced April 2015.

    Comments: 41 pages

  45. arXiv:1410.8270  [pdf, ps, other

    math.RT math.CO

    Wreath product action on generalized Boolean algebras

    Authors: Ashish Mishra, Murali K. Srinivasan

    Abstract: Let G be a finite group acting on the finite set X such that the corresponding (complex) permutation representation is multiplicity free. There is a natural rank and order preserving action of the wreath product G~S_n on the generalized Boolean algebra B_X(n). We explicitly block diagonalize the commutant of this action.

    Submitted 30 October, 2014; originally announced October 2014.

    Comments: 18 pages

  46. arXiv:1410.2047  [pdf

    cond-mat.mtrl-sci

    Transport properties of beta-Ga2O3 Nanoparticles embedded in Nb thin films

    Authors: L. S. Vaidhyanathan, M. P. Srinivasan, P. Chandra Mohan, D. K. Baisnab, R. Mythili, M. P. Janawadkar

    Abstract: The origin of ferromagnetism in nanoparticles of nonmagnetic oxides is an interesting area of research. In the present work, transport properties of niobium thin films, with beta-Ga2O3 nanoparticles embedded within them, are presented. Nanoparticles of beta-Ga2O3 embedded in a Nb matrix were prepared at room temperature by radio frequency co-sputtering technique on Si (100) and glass substrates he… ▽ More

    Submitted 8 October, 2014; originally announced October 2014.

    Comments: 15 pages, 4 figures

  47. arXiv:1304.6244  [pdf, ps, other

    math.CO

    The Goldman-Rota identity and the Grassmann scheme

    Authors: Murali K. Srinivasan

    Abstract: We inductively construct an explicit (common) orthogonal eigenbasis for the elements of the Bose-Mesner algebra of the Grassmann scheme. The main step is a constructive, linear algebraic interpretation of the Goldman-Rota recurrence for the number of subspaces of a finite vector space. This interpretation shows that the up operator on subspaces has an explicitly given recursive structure. Using th… ▽ More

    Submitted 23 April, 2013; originally announced April 2013.

    Comments: 19 Pages

  48. arXiv:1111.1799  [pdf, ps, other

    math.CO

    The complexity of the $q$-analog of the $n$-cube

    Authors: Murali K. Srinivasan

    Abstract: We present a positive, combinatorial, good formula for the complexity (= number of spanning trees) of the $q$-analog of the $n$-cube. Our method also yields the explicit block diagonalization of the commutant of the $GL(n,F_q)$ action on the $q$-analog of the Boolean algebra.

    Submitted 12 November, 2011; v1 submitted 7 November, 2011; originally announced November 2011.

    Comments: 12 pages. This paper is a revised and expanded version of part of the author's previous paper " Counting spanning trees of the hypercube and its $q$-analogs by explicit block diagonalization" (arXiv:1104.1481), to which a reference has been added

  49. arXiv:1104.1481  [pdf, ps, other

    math.CO

    Counting spanning trees of the hypercube and its $q$-analogs by explicit block diagonalization

    Authors: Murali K. Srinivasan

    Abstract: The number of spanning trees of a graph $G$ is called the {\em complexity} of $G$ and is denoted $c(G)$. Let C(n) denote the {\em (binary) hypercube} of dimension $n$. A classical result in enumerative combinatorics (based on explicit diagonalization) states that $c(C(n)) = \prod_{k=2}^n (2k)^{n\choose k}$. In this paper we use the explicit block diagonalization methodology to derive formulas fo… ▽ More

    Submitted 8 April, 2011; originally announced April 2011.

    MSC Class: 05C50; 05E25

  50. arXiv:1004.2759  [pdf, ps, other

    math.CO

    Note on Doron Zeilberger's paper: ${5 \choose 2}$ proofs that ${n \choose k} \leq {n \choose {k+1}}$ if $k < n/2$

    Authors: Murali K. Srinivasan

    Abstract: We present yet another algebraic proof of the unimodality of the binomial coefficients.

    Submitted 16 April, 2010; originally announced April 2010.