-
AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks
Authors:
Muralikrishnan Srinivasan,
Linda Senigagliesi,
Hui Chen,
Arsenia Chorti,
Marco Baldi,
Henk Wymeersch
Abstract:
We discuss the use of angle of arrival (AoA) as an authentication measure in analog array multiple-input multiple-output (MIMO) systems. A base station equipped with an analog array authenticates users based on the AoA estimated from certified pilot transmissions, while active attackers manipulate their transmitted signals to mount impersonation attacks. We study several attacks of increasing inte…
▽ More
We discuss the use of angle of arrival (AoA) as an authentication measure in analog array multiple-input multiple-output (MIMO) systems. A base station equipped with an analog array authenticates users based on the AoA estimated from certified pilot transmissions, while active attackers manipulate their transmitted signals to mount impersonation attacks. We study several attacks of increasing intensity (captured through the availability of side information at the attackers) and assess the performance of AoA-based authentication using one-class classifiers. Our results show that some attack techniques with knowledge of the combiners at the verifier are effective in falsifying the AoA and compromising the security of the considered type of physical layer authentication.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Subspaces, subsets, and Motzkin paths
Authors:
Jonathan D. Farley,
Murali K. Srinivasan
Abstract:
We define a map from subspaces to Motzkin paths and show that the inverse image of every path is a disjoint union of symmetric Boolean subsets yielding an explicit symmetric Boolean decomposition of the subspace lattice.
We define a map from subspaces to Motzkin paths and show that the inverse image of every path is a disjoint union of symmetric Boolean subsets yielding an explicit symmetric Boolean decomposition of the subspace lattice.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild
Authors:
Giuseppe Siracusano,
Davide Sanvito,
Roberto Gonzalez,
Manikantan Srinivasan,
Sivakaman Kamatchi,
Wataru Takahashi,
Masaru Kawakita,
Takahiro Kakumaru,
Roberto Bifulco
Abstract:
Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks and enhancing security for organizations. However, the process of extracting relevant information from unstructured text sources can be expensive and time-consuming. Our empirical experience shows that existing tools for automated structured CTI extraction have performance limitations. Furthermore, the community lacks a common…
▽ More
Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks and enhancing security for organizations. However, the process of extracting relevant information from unstructured text sources can be expensive and time-consuming. Our empirical experience shows that existing tools for automated structured CTI extraction have performance limitations. Furthermore, the community lacks a common benchmark to quantitatively assess their performance. We fill these gaps providing a new large open benchmark dataset and aCTIon, a structured CTI information extraction tool. The dataset includes 204 real-world publicly available reports and their corresponding structured CTI information in STIX format. Our team curated the dataset involving three independent groups of CTI analysts working over the course of several months. To the best of our knowledge, this dataset is two orders of magnitude larger than previously released open source datasets. We then design aCTIon, leveraging recently introduced large language models (GPT3.5) in the context of two custom information extraction pipelines. We compare our method with 10 solutions presented in previous work, for which we develop our own implementations when open-source implementations were lacking. Our results show that aCTIon outperforms previous work for structured CTI extraction with an improvement of the F1-score from 10%points to 50%points across all tasks.
△ Less
Submitted 14 July, 2023;
originally announced July 2023.
-
End-to-End Learning for VCSEL-based Optical Interconnects: State-of-the-Art, Challenges, and Opportunities
Authors:
Muralikrishnan Srinivasan,
**xiang Song,
Alexander Grabowski,
Krzysztof Szczerba,
Holger K. Iversen,
Mikkel N. Schmidt,
Darko Zibar,
Jochen Schröder,
Anders Larsson,
Christian Häger,
Henk Wymeersch
Abstract:
Optical interconnects (OIs) based on vertical-cavity surface-emitting lasers (VCSELs) are the main workhorse within data centers, supercomputers, and even vehicles, providing low-cost, high-rate connectivity. VCSELs must operate under extremely harsh and time-varying conditions, thus requiring adaptive and flexible designs of the communication chain. Such designs can be built based on mathematical…
▽ More
Optical interconnects (OIs) based on vertical-cavity surface-emitting lasers (VCSELs) are the main workhorse within data centers, supercomputers, and even vehicles, providing low-cost, high-rate connectivity. VCSELs must operate under extremely harsh and time-varying conditions, thus requiring adaptive and flexible designs of the communication chain. Such designs can be built based on mathematical models (model-based design) or learned from data (machine learning (ML) based design). Various ML techniques have recently come to the forefront, replacing individual components in the transmitters and receivers with deep neural networks. Beyond such component-wise learning, end-to-end (E2E) autoencoder approaches can reach the ultimate performance through co-optimizing entire parameterized transmitters and receivers. This tutorial paper aims to provide an overview of ML for VCSEL-based OIs, with a focus on E2E approaches, dealing specifically with the unique challenges facing VCSELs, such as the wide temperature variations and complex models.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
Geometry of Radial Basis Neural Networks for Safety Biased Approximation of Unsafe Regions
Authors:
Ahmad Abuaish,
Mohit Srinivasan,
Patricio A. Vela
Abstract:
Barrier function-based inequality constraints are a means to enforce safety specifications for control systems. When used in conjunction with a convex optimization program, they provide a computationally efficient method to enforce safety for the general class of control-affine systems. One of the main assumptions when taking this approach is the a priori knowledge of the barrier function itself,…
▽ More
Barrier function-based inequality constraints are a means to enforce safety specifications for control systems. When used in conjunction with a convex optimization program, they provide a computationally efficient method to enforce safety for the general class of control-affine systems. One of the main assumptions when taking this approach is the a priori knowledge of the barrier function itself, i.e., knowledge of the safe set. In the context of navigation through unknown environments where the locally safe set evolves with time, such knowledge does not exist. This manuscript focuses on the synthesis of a zeroing barrier function characterizing the safe set based on safe and unsafe sample measurements, e.g., from perception data in navigation applications. Prior work formulated a supervised machine learning algorithm whose solution guaranteed the construction of a zeroing barrier function with specific level-set properties. However, it did not explore the geometry of the neural network design used for the synthesis process. This manuscript describes the specific geometry of the neural network used for zeroing barrier function synthesis, and shows how the network provides the necessary representation for splitting the state space into safe and unsafe regions.
△ Less
Submitted 28 March, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Prioritization of Metamorphic Relations to reduce the cost of testing
Authors:
Madhusudan Srinivasan,
Upulee Kanewala
Abstract:
An oracle is a mechanism to decide whether the outputs of the program for the executed test cases are correct. For machine learning programs, such oracle is not available or too difficult to apply. Metamorphic testing is a testing approach that uses metamorphic relations, which are necessary properties of the software under test to help verify the correctness of a program. Prioritization of metamo…
▽ More
An oracle is a mechanism to decide whether the outputs of the program for the executed test cases are correct. For machine learning programs, such oracle is not available or too difficult to apply. Metamorphic testing is a testing approach that uses metamorphic relations, which are necessary properties of the software under test to help verify the correctness of a program. Prioritization of metamorphic relations helps to reduce the cost of metamorphic testing [1]. However, prioritizing metamorphic relations based on code coverage is often not effective for prioritizing MRs for machine learning programs, since the decision logic of a machine learning model is learned from training data, and 100% code coverage can be easily achieved with a single test input. To this end, in this work, we propose a cost-effective approach based on diversity in the source and follow-up data set to prioritize metamorphic relations for machine learning programs. We show that the proposed data diversity-based prioritization approach increase the fault detection effectiveness by up to 40% when compared to the code coverage-based approach and reduce the time taken to detect a fault by 29% when compared to random execution of MRs. Overall, our approach leads to saving time and cost during testing.
△ Less
Submitted 31 August, 2022;
originally announced September 2022.
-
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Authors:
Muralikrishnan Srinivasan,
Sotiris Skaperas,
Arsenia Chorti,
Mahdi Shakiba Herfeh,
Muhammad K. Shehzad,
Philippe Sehier
Abstract:
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processi…
▽ More
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processing schemes to decompose channel state information (CSI) observation vectors into "predictable" and "unpredictable" components. The former, primarily due to large-scale fading, can be used for node authentication through RF fingerprinting. The latter, primarily due to small-scale fading, could be used for semantically secure secret key generation (SKG). To perform the decomposition, we propose: (i) a fingerprint "separability" criterion, expressed through the maximisation of the total variation distance between the empirical fingerprint measures; (ii) a statistical independence metric for observations collected at different users, expressed through a normalised version of the $d$-dimensional Hilbert Schmidt independence criterion (dHSIC) test statistic. We propose both explicit implementations, using principal component analysis (PCA) and kernel PCA and black-box, unsupervised learning, using autoencoders. Our experiments on synthetic and real CSI datasets showcase that the incorporation of RF fingerprinting and SKG, with explicit security guarantees, is tangible in future generations of wireless.
△ Less
Submitted 1 June, 2022;
originally announced June 2022.
-
A q-analog of the adjacency matrix of the n-cube
Authors:
Subhajit Ghosh,
Murali K. Srinivasan
Abstract:
We define a q-analog of the adjacency matrix of the n-cube, determine its eigenvalues and write down a canonical eigenbasis. We give a weighted count of the number of rooted spanning trees in the q-analog of the n-cube.
Remarks on the previous version: The q-analog of the Kac matrix appears in Terwilliger's classification of Leonard pairs and as such its eigenvalues and eigenvectors were known.…
▽ More
We define a q-analog of the adjacency matrix of the n-cube, determine its eigenvalues and write down a canonical eigenbasis. We give a weighted count of the number of rooted spanning trees in the q-analog of the n-cube.
Remarks on the previous version: The q-analog of the Kac matrix appears in Terwilliger's classification of Leonard pairs and as such its eigenvalues and eigenvectors were known. Reference added to Terwilliger's papers and also to a paper of Johnson. Title changed to reflect this.
△ Less
Submitted 27 April, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
Towards skin-acetone monitors with selective sensitivity: dynamics of PANI-CA films
Authors:
Anthony Annerino,
Michael Faltas,
Manoj Srinivasan,
Pelagia-Irene Gouma
Abstract:
Most research aimed at measuring biomarkers on the skin is only concerned with sensing chemicals in sweat using electrical signals, but these methods are not truly non-invasive nor non-intrusive because they require substantial amounts of sweat to get a reading. This project aims to create a truly non-invasive wearable sensor that continuously detects the gaseous acetone (a biomarker related to me…
▽ More
Most research aimed at measuring biomarkers on the skin is only concerned with sensing chemicals in sweat using electrical signals, but these methods are not truly non-invasive nor non-intrusive because they require substantial amounts of sweat to get a reading. This project aims to create a truly non-invasive wearable sensor that continuously detects the gaseous acetone (a biomarker related to metabolic disorders) that ambiently comes out of the skin. Composite films of polyaniline and cellulose acetate, exhibiting chemo-mechanical actuation upon exposure to gaseous acetone, were tested in the headspaces above multiple solutions containing acetone, ethanol, and water to gauge response sensitivity, selectivity, and repeatability. The bending of the films in response to exposures to these environments was tracked by an automatic video processing code, which was found to out-perform an off-the-shelf deep neural network-based tracker. Using principal component analysis, we showed that the film bending is low dimensional with over 90% of the shape changes being captured with just two parameters. We constructed forward models to predict shape changes from the known exposure history and found that a linear model can explain 40% of the observed variance in film tip angle changes. We constructed inverse models, going from third order fits of shape changes to acetone concentrations where about 45% of the acetone variation and about 30% of ethanol variation are captured by linear models, and non-linear models did not perform substantially better. This suggests there is sufficient sensitivity and inherent selectivity of the films. These models, however, provide evidence for substantial hysteretic or long-time-scale responses of the PANI films, seemingly due to the presence of water. Further experiments will allow more accurate discrimination of unknown exposure environments.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Detecting Discussions of Technical Debt
Authors:
Ipek Ozkaya,
Zachary Kurtz,
Robert L. Nord,
Raghvinder S. Sangwan,
Satish M. Srinivasan
Abstract:
Technical debt (TD) refers to suboptimal choices during software development that achieve short-term goals at the expense of long-term quality. Although developers often informally discuss TD, the concept has not yet crystalized into a consistently applied label when describing issues in most repositories. We apply machine learning to understand developer insights into TD when discussing tickets i…
▽ More
Technical debt (TD) refers to suboptimal choices during software development that achieve short-term goals at the expense of long-term quality. Although developers often informally discuss TD, the concept has not yet crystalized into a consistently applied label when describing issues in most repositories. We apply machine learning to understand developer insights into TD when discussing tickets in an issue tracker. We generate expert labels that indicate whether discussion of TD occurs in the free text associated with each ticket in a sample of more than 1,900 tickets in the Chromium issue tracker. We then use these labels to train a classifier that estimates labels for the remaining 475,000 tickets. We conclude that discussion of TD appears in about 16% of the tracked Chromium issues. If we can effectively classify TD-related issues, we can focus on what practices could be most useful for their timely resolution.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Joint Power-control and Antenna Selection in User-Centric Cell-Free Systems with Mixed Resolution ADC
Authors:
Shashank Shekhar,
Athira Subhash,
Muralikrishnan Srinivasan,
Sheetal Kalyani
Abstract:
In this paper, we propose a scheme for the joint optimization of the user transmit power and the antenna selection at the access points (AP)s of a user-centric cell-free massive multiple-input-multiple-output (UC CF-mMIMO) system. We derive an approximate expression for the achievable uplink rate of the users in a UC CF-mMIMO system in the presence of a mixed analog-to-digital converter (ADC) reso…
▽ More
In this paper, we propose a scheme for the joint optimization of the user transmit power and the antenna selection at the access points (AP)s of a user-centric cell-free massive multiple-input-multiple-output (UC CF-mMIMO) system. We derive an approximate expression for the achievable uplink rate of the users in a UC CF-mMIMO system in the presence of a mixed analog-to-digital converter (ADC) resolution profile at the APs. Using the derived approximation, we propose to maximize the uplink sum rate of UC CF-mMIMO systems subject to energy constraints at the APs. An alternating-optimization solution is proposed using binary particle swarm optimization (BPSO) and successive convex approximation (SCA). We also study the impact of various system parameters on the performance of the system.
△ Less
Submitted 18 July, 2022; v1 submitted 16 December, 2021;
originally announced December 2021.
-
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Authors:
Muralikrishnan Srinivasan,
Sotiris Skaperas,
Arsenia Chorti
Abstract:
This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret ke…
▽ More
This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret key generation (SKG). The ML-based approaches are completely unsupervised and hence avoid exhaustive measurement campaigns. We also propose using the Hilbert Schmidt independence criterion (HSIC); our simulation results demonstrate that the extracted stochastic part of the channel state information (CSI) vectors are statistically independent.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Metamorphic Relation Prioritization for Effective Regression Testing
Authors:
Madhusudan Srinivasan,
Upulee Kanewala
Abstract:
Metamorphic testing (MT) is widely used for testing programs that face the oracle problem. It uses a set of metamorphic relations (MRs), which are relations among multiple inputs and their corresponding outputs to determine whether the program under test is faulty. Typically, MRs vary in their ability to detect faults in the program under test, and some MRs tend to detect the same set of faults. I…
▽ More
Metamorphic testing (MT) is widely used for testing programs that face the oracle problem. It uses a set of metamorphic relations (MRs), which are relations among multiple inputs and their corresponding outputs to determine whether the program under test is faulty. Typically, MRs vary in their ability to detect faults in the program under test, and some MRs tend to detect the same set of faults. In this paper, we propose approaches to prioritize MRs to improve the efficiency and effectiveness of MT for regression testing. We present two MR prioritization approaches: (1) fault-based and (2) coverage-based. To evaluate these MR prioritization approaches, we conduct experiments on three complex open-source software systems. Our results show that the MR prioritization approaches developed by us significantly outperform the current practice of executing the source and follow-up test cases of the MRs in an ad-hoc manner in terms of fault detection effectiveness. Further, fault-based MR prioritization leads to reducing the number of source and follow-up test cases that needs to be executed as well as reducing the average time taken to detect a fault, which would result in saving time and cost during the testing process.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Outage Probability Analysis of Uplink Cell-Free Massive MIMO Network with and without Pilot Contamination
Authors:
Shashank Shekhar,
Muralikrishnan Srinivasan,
Sheetal Kalyani,
Mohamed-Slim Alouini
Abstract:
This paper derives approximate outage probability (OP) expressions for uplink cell-free massive multiple-input-multiple-output (CF-mMIMO) systems with and without pilot contamination. The system's access points (APs) are considered to have imperfect channel state information (CSI). The signal-to-interference-plus-noise ratio (SINR) of the CF-mMIMO system is approximated via a Log-normal distributi…
▽ More
This paper derives approximate outage probability (OP) expressions for uplink cell-free massive multiple-input-multiple-output (CF-mMIMO) systems with and without pilot contamination. The system's access points (APs) are considered to have imperfect channel state information (CSI). The signal-to-interference-plus-noise ratio (SINR) of the CF-mMIMO system is approximated via a Log-normal distribution using a two-step moment matching method. OP and ergodic rate expressions are derived with the help of the approximated Log-normal distribution. For the no-pilot contamination scenario, an exact expression is first derived using conditional expectations in terms of a multi-fold integral. Then, a novel dimension reduction method is used to approximate it by the sum of single-variable integrations. Both the approximations derived for the CF-mMIMO systems are also useful for single-cell collocated massive MIMO (mMIMO) systems and lead to closed-form expression. The derived expressions closely match the simulated numerical values for OP and ergodic rate.
△ Less
Submitted 27 June, 2023; v1 submitted 19 January, 2021;
originally announced January 2021.
-
Airplane-Aided Integrated Next-Generation Networking
Authors:
Muralikrishnan Srinivasan,
Sarath Gopi,
Sheetal Kalyani,
Xiao**g Huang,
Lajos Hanzo
Abstract:
A high-rate yet low-cost air-to-ground (A2G) communication backbone is conceived for integrating the space and terrestrial network by harnessing the opportunistic assistance of the passenger planes or high altitude platforms (HAPs) as mobile base stations (BSs) and millimetre wave communication. The airliners act as the network-provider for the terrestrial users while relying on satellite backhaul…
▽ More
A high-rate yet low-cost air-to-ground (A2G) communication backbone is conceived for integrating the space and terrestrial network by harnessing the opportunistic assistance of the passenger planes or high altitude platforms (HAPs) as mobile base stations (BSs) and millimetre wave communication. The airliners act as the network-provider for the terrestrial users while relying on satellite backhaul. Three different beamforming techniques relying on a large-scale planar array are used for transmission by the airliner/HAP for achieving a high directional gain, hence minimizing the interference among the users. Furthermore, approximate spectral efficiency (SE) and area spectral efficiency (ASE) expressions are derived and quantified for diverse system parameters.
△ Less
Submitted 31 July, 2021; v1 submitted 3 January, 2021;
originally announced January 2021.
-
Contextualized Word Embeddings Encode Aspects of Human-Like Word Sense Knowledge
Authors:
Sathvik Nair,
Mahesh Srinivasan,
Stephan Meylan
Abstract:
Understanding context-dependent variation in word meanings is a key aspect of human language comprehension supported by the lexicon. Lexicographic resources (e.g., WordNet) capture only some of this context-dependent variation; for example, they often do not encode how closely senses, or discretized word meanings, are related to one another. Our work investigates whether recent advances in NLP, sp…
▽ More
Understanding context-dependent variation in word meanings is a key aspect of human language comprehension supported by the lexicon. Lexicographic resources (e.g., WordNet) capture only some of this context-dependent variation; for example, they often do not encode how closely senses, or discretized word meanings, are related to one another. Our work investigates whether recent advances in NLP, specifically contextualized word embeddings, capture human-like distinctions between English word senses, such as polysemy and homonymy. We collect data from a behavioral, web-based experiment, in which participants provide judgments of the relatedness of multiple WordNet senses of a word in a two-dimensional spatial arrangement task. We find that participants' judgments of the relatedness between senses are correlated with distances between senses in the BERT embedding space. Homonymous senses (e.g., bat as mammal vs. bat as sports equipment) are reliably more distant from one another in the embedding space than polysemous ones (e.g., chicken as animal vs. chicken as meat). Our findings point towards the potential utility of continuous-space representations of sense meanings.
△ Less
Submitted 25 October, 2020;
originally announced October 2020.
-
Continuous Reachability Task Transition Using Control Barrier Functions
Authors:
Mohit Srinivasan,
Cesar Santoyo,
Samuel Coogan
Abstract:
In this paper, a method to achieve smooth transitions between sequential reachability tasks for a continuous time mobile robotic system is presented. Control barrier functions provide formal guarantees of forward invariance of safe sets and finite-time reachability and are able to enforce task execution. Barrier functions used in quadratic programs result in implementation of controllers with real…
▽ More
In this paper, a method to achieve smooth transitions between sequential reachability tasks for a continuous time mobile robotic system is presented. Control barrier functions provide formal guarantees of forward invariance of safe sets and finite-time reachability and are able to enforce task execution. Barrier functions used in quadratic programs result in implementation of controllers with real-time performance guarantees. Existing approaches for multi-objective task execution using control barrier functions leverage discretely switched, sequential quadratic programs to achieve successive tasks. However, discrete switching can lead to control input discontinuities which can affect a robot's performance. Hence, we propose a method which ensures continuous transitions between sequential quadratic programs. In particular, a time varying component to the barrier function constraint is introduced which allows for a smooth transition between objectives. Robotic implementation results are also provided.
△ Less
Submitted 25 May, 2020;
originally announced May 2020.
-
Green DetNet: Computation and Memory efficient DetNet using Smart Compression and Training
Authors:
Nancy Nayak,
Thulasi Tholeti,
Muralikrishnan Srinivasan,
Sheetal Kalyani
Abstract:
This paper introduces an incremental training framework for compressing popular Deep Neural Network (DNN) based unfolded multiple-input-multiple-output (MIMO) detection algorithms like DetNet. The idea of incremental training is explored to select the optimal depth while training. To reduce the computation requirements or the number of FLoating point OPerations (FLOPs) and enforce sparsity in weig…
▽ More
This paper introduces an incremental training framework for compressing popular Deep Neural Network (DNN) based unfolded multiple-input-multiple-output (MIMO) detection algorithms like DetNet. The idea of incremental training is explored to select the optimal depth while training. To reduce the computation requirements or the number of FLoating point OPerations (FLOPs) and enforce sparsity in weights, the concept of structured regularization is explored using group LASSO and sparse group LASSO. Our methods lead to an astounding $98.9\%$ reduction in memory requirement and $81.63\%$ reduction in FLOPs when compared with DetNet without compromising on BER performance.
△ Less
Submitted 16 April, 2021; v1 submitted 20 March, 2020;
originally announced March 2020.
-
Synthesis of Control Barrier Functions Using a Supervised Machine Learning Approach
Authors:
Mohit Srinivasan,
Amogh Dabholkar,
Samuel Coogan,
Patricio Vela
Abstract:
Control barrier functions are mathematical constructs used to guarantee safety for robotic systems. When integrated as constraints in a quadratic programming optimization problem, instantaneous control synthesis with real-time performance demands can be achieved for robotics applications. Prevailing use has assumed full knowledge of the safety barrier functions, however there are cases where the s…
▽ More
Control barrier functions are mathematical constructs used to guarantee safety for robotic systems. When integrated as constraints in a quadratic programming optimization problem, instantaneous control synthesis with real-time performance demands can be achieved for robotics applications. Prevailing use has assumed full knowledge of the safety barrier functions, however there are cases where the safe regions must be estimated online from sensor measurements. In these cases, the corresponding barrier function must be synthesized online. This paper describes a learning framework for estimating control barrier functions from sensor data. Doing so affords system operation in unknown state space regions without compromising safety. Here, a support vector machine classifier provides the barrier function specification as determined by sets of safe and unsafe states obtained from sensor measurements. Theoretical safety guarantees are provided. Experimental ROS-based simulation results for an omnidirectional robot equipped with LiDAR demonstrate safe operation.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
Extent-Compatible Control Barrier Functions
Authors:
Mohit Srinivasan,
Matthew Abate,
Gustav Nilsson,
Samuel Coogan
Abstract:
Safety requirements in dynamical systems are commonly enforced with set invariance constraints over a safe region of the state space. Control barrier functions, which are Lyapunov-like functions for guaranteeing set invariance, are an effective tool to enforce such constraints and guarantee safety when the system is represented as a point in the state space. In this paper, we introduce extent-comp…
▽ More
Safety requirements in dynamical systems are commonly enforced with set invariance constraints over a safe region of the state space. Control barrier functions, which are Lyapunov-like functions for guaranteeing set invariance, are an effective tool to enforce such constraints and guarantee safety when the system is represented as a point in the state space. In this paper, we introduce extent-compatible control barrier functions as a tool to enforce safety for the system including its volume (extent) in the physical world. In order to implement the extent-compatible control barrier functions framework, a sum-of-squares based optimization program is proposed. Since sum-of-squares programs can be computationally prohibitive, we additionally introduce a sampling based method in order to retain the computational advantage of a traditional barrier function based quadratic program controller. We prove that the proposed sampling based controller retains the guarantee for safety. Simulation and robotic implementation results are also provided.
△ Less
Submitted 20 January, 2020;
originally announced January 2020.
-
A unified energy optimality criterion predicts human navigation paths and speeds
Authors:
Geoffrey L. Brown,
Nidhi Seethapathi,
Manoj Srinivasan
Abstract:
Navigating our physical environment requires changing directions and turning. Despite its ecological importance, we do not have a unified theoretical account of non-straight-line human movement. Here, we present a unified optimality criterion that predicts disparate non-straight-line walking phenomena, with straight-line walking as a special case. We first characterized the metabolic cost of turni…
▽ More
Navigating our physical environment requires changing directions and turning. Despite its ecological importance, we do not have a unified theoretical account of non-straight-line human movement. Here, we present a unified optimality criterion that predicts disparate non-straight-line walking phenomena, with straight-line walking as a special case. We first characterized the metabolic cost of turning, deriving the cost landscape as a function of turning radius and rate. We then generalized this cost landscape to arbitrarily complex trajectories, allowing the velocity direction to deviate from body orientation (holonomic walking). We used this generalized optimality criterion to mathematically predict movement patterns in multiple contexts of varying complexity: walking on prescribed paths, turning in place, navigating an angled corridor, navigating freely with end-point constraints, walking through doors, and navigating around obstacles. In these tasks, humans moved at speeds and paths predicted by our optimality criterion, slowing down to turn and never using sharp turns. We show that the shortest path between two points is, counterintuitively, often not energy optimal, and indeed, humans do not use the shortest path in such cases. Thus, we have obtained a unified theoretical account that predicts human walking paths and speeds in diverse contexts. Our model focuses on walking in healthy adults; future work could generalize this model to other human populations, other animals, and other locomotor tasks.
△ Less
Submitted 1 November, 2021; v1 submitted 7 January, 2020;
originally announced January 2020.
-
Walking for short distances and turning in lower-limb amputees: a study in low-cost prosthesis users
Authors:
Nidhi Seethapathi,
Anil Kumar Jain,
Manoj Srinivasan
Abstract:
Preferred walking speed is a widely-used performance measure for people with mobility issues, but is usually measured in straight line walking for fixed distances or durations. However, daily walking involves walking for bouts of different distances and walking with turning. Here, we studied walking for short distances and walking in circles in unilateral lower-limb amputees wearing an above or be…
▽ More
Preferred walking speed is a widely-used performance measure for people with mobility issues, but is usually measured in straight line walking for fixed distances or durations. However, daily walking involves walking for bouts of different distances and walking with turning. Here, we studied walking for short distances and walking in circles in unilateral lower-limb amputees wearing an above or below-knee passive prosthesis, specifically, a Jaipur foot prosthesis. Analogous to earlier results in non-amputees, we found that their preferred walking speeds are lower for short distances and lower for circles of smaller radii. Using inverse optimization, we estimated the cost of changing speeds and turning such that the observed preferred walking speeds in our experiments minimizes the total energy cost. The inferred costs of changing speeds and turning were much larger than for non-amputees. These findings could inform prosthesis design and rehabilitation therapy to better assist changing speeds and turning tasks in amputee walking. Further, measuring the preferred speed for a range of distances and radii is a more robust subject-specific measure of walking performance.
△ Less
Submitted 26 April, 2022; v1 submitted 6 September, 2019;
originally announced September 2019.
-
Control of Mobile Robots Using Barrier Functions Under Temporal Logic Specifications
Authors:
Mohit Srinivasan,
Samuel Coogan
Abstract:
In this paper, we propose a framework for the control of mobile robots subject to temporal logic specifications using barrier functions. Complex task specifications can be conveniently encoded using linear temporal logic. In particular, we consider a fragment of linear temporal logic which encompasses a large class of motion planning specifications for a robotic system. Control barrier functions h…
▽ More
In this paper, we propose a framework for the control of mobile robots subject to temporal logic specifications using barrier functions. Complex task specifications can be conveniently encoded using linear temporal logic. In particular, we consider a fragment of linear temporal logic which encompasses a large class of motion planning specifications for a robotic system. Control barrier functions have recently emerged as a convenient tool to guarantee reachability and safety for a system. In addition, they can be encoded as affine constraints in a quadratic program. In this paper, a fully automatic framework which translates a user defined specification in temporal logic to a sequence of barrier function based quadratic programs is presented. In addition, with the aim of alleviating infeasibility scenarios, we propose methods for composition of barrier functions as well as a prioritization based control method to guarantee feasibility of the controller. We prove that the resulting system trajectory synthesized by the proposed controller satisfies the given specification. Robotic simulation and experimental results are provided in addition to the theoretical framework.
△ Less
Submitted 28 March, 2020; v1 submitted 13 August, 2019;
originally announced August 2019.
-
A Sequential Composition Framework for Coordinating Multi-Robot Behaviors
Authors:
Pietro Pierpaoli,
Anqi Li,
Mohit Srinivasan,
Xiaoyi Cai,
Samuel Coogan,
Magnus Egerstedt
Abstract:
A number of coordinated behaviors have been proposed for achieving specific tasks for multi-robot systems. However, since most applications require more than one such behavior, one needs to be able to compose together sequences of behaviors while respecting local information flow constraints. Specifically, when the inter-agent communication depends on inter-robot distances, these constraints trans…
▽ More
A number of coordinated behaviors have been proposed for achieving specific tasks for multi-robot systems. However, since most applications require more than one such behavior, one needs to be able to compose together sequences of behaviors while respecting local information flow constraints. Specifically, when the inter-agent communication depends on inter-robot distances, these constraints translate into particular configurations that must be reached in finite time in order for the system to be able to transition between the behaviors. To this end, we develop a distributed framework based on finite-time convergence control barrier functions that enables a team of robots to adjust its configuration in order to meet the communication requirements for the different tasks. In order to demonstrate the significance of the proposed framework, we implemented a full-scale scenario where a team of eight planar robots explore an urban environment in order to localize and rescue a subject.
△ Less
Submitted 2 March, 2020; v1 submitted 17 July, 2019;
originally announced July 2019.
-
Debunking the Myth that Upfront Requirements are Infeasible for Scientific Computing Software
Authors:
Spencer Smith,
Malavika Srinivasan,
Sumanth Shankar
Abstract:
Many in the Scientific Computing Software community believe that upfront requirements are impossible, or at least infeasible. This paper shows requirements are feasible with the following: i) an appropriate perspective ("faking" the final documentation as if requirements were correct and complete from the start, and gathering requirements as if for a family of programs); ii) the aid of the right p…
▽ More
Many in the Scientific Computing Software community believe that upfront requirements are impossible, or at least infeasible. This paper shows requirements are feasible with the following: i) an appropriate perspective ("faking" the final documentation as if requirements were correct and complete from the start, and gathering requirements as if for a family of programs); ii) the aid of the right principles (abstraction, separation of concerns, anticipation of change, and generality); iii) employing SCS specific templates (for Software Requirements and Module Interface Specification); iv) using a design process that enables change (information hiding); and, v) the aid of modern tools (version control, issue tracking, checking, generation and automation tools). Not only are upfront requirements feasible, they provide significant benefits, including facilitating communication, early identification of errors, better design decisions and enabling replicability. The topics listed above are explained, justified and illustrated via an example of software developed by a small team of software and mechanical engineers for modelling the solidification of a metal alloy.
△ Less
Submitted 18 June, 2019;
originally announced June 2019.
-
Data-Driven Malaria Prevalence Prediction in Large Densely-Populated Urban Holoendemic sub-Saharan West Africa: Harnessing Machine Learning Approaches and 22-years of Prospectively Collected Data
Authors:
Biobele J. Brown,
Alexander A. Przybylski,
Petru Manescu,
Fabio Caccioli,
Gbeminiyi Oyinloye,
Muna Elmi,
Michael J. Shaw,
Vijay Pawar,
Remy Claveau,
John Shawe-Taylor,
Mandayam A. Srinivasan,
Nathaniel K. Afolabi,
Adebola E. Orimadegun,
Wasiu A. Ajetunmobi,
Francis Akinkunmi,
Olayinka Kowobari,
Kikelomo Osinusi,
Felix O. Akinbami,
Samuel Omokhodion,
Wuraola A. Shokunbi,
Ikeoluwa Lagunju,
Olugbemiro Sodeinde,
Delmiro Fernandez-Reyes
Abstract:
Plasmodium falciparum malaria still poses one of the greatest threats to human life with over 200 million cases globally leading to half-million deaths annually. Of these, 90% of cases and of the mortality occurs in sub-Saharan Africa, mostly among children. Although malaria prediction systems are central to the 2016-2030 malaria Global Technical Strategy, currently these are inadequate at capturi…
▽ More
Plasmodium falciparum malaria still poses one of the greatest threats to human life with over 200 million cases globally leading to half-million deaths annually. Of these, 90% of cases and of the mortality occurs in sub-Saharan Africa, mostly among children. Although malaria prediction systems are central to the 2016-2030 malaria Global Technical Strategy, currently these are inadequate at capturing and estimating the burden of disease in highly endemic countries. We developed and validated a computational system that exploits the predictive power of current Machine Learning approaches on 22-years of prospective data from the high-transmission holoendemic malaria urban-densely-populated sub-Saharan West-Africa metropolis of Ibadan. Our dataset of >9x104 screened study participants attending our clinical and community services from 1996 to 2017 contains monthly prevalence, temporal, environmental and host features. Our Locality-specific Elastic-Net based Malaria Prediction System (LEMPS) achieves good generalization performance, both in magnitude and direction of the prediction, when tasked to predict monthly prevalence on previously unseen validation data (MAE<=6x10-2, MSE<=7x10-3) within a range of (+0.1 to -0.05) error-tolerance which is relevant and usable for aiding decision-support in a holoendemic setting. LEMPS is well-suited for malaria prediction, where there are multiple features which are correlated with one another, and trading-off between regularization-strength L1-norm and L2-norm allows the system to retain stability. Data-driven systems are critical for regionally-adaptable surveillance, management of control strategies and resource allocation across stretched healthcare systems.
△ Less
Submitted 18 June, 2019;
originally announced June 2019.
-
Deep Learning Enhanced Extended Depth-of-Field for Thick Blood-Film Malaria High-Throughput Microscopy
Authors:
Petru Manescu,
Lydia Neary- Zajiczek,
Michael J. Shaw,
Muna Elmi,
Remy Claveau,
Vijay Pawar,
John Shawe-Taylor,
Iasonas Kokkinos,
Mandayam A. Srinivasan,
Ikeoluwa Lagunju,
Olugbemiro Sodeinde,
Biobele J. Brown,
Delmiro Fernandez-Reyes
Abstract:
Fast accurate diagnosis of malaria is still a global health challenge for which automated digital-pathology approaches could provide scalable solutions amenable to be deployed in low-to-middle income countries. Here we address the problem of Extended Depth-of-Field (EDoF) in thick blood film microscopy for rapid automated malaria diagnosis. High magnification oil-objectives (100x) with large numer…
▽ More
Fast accurate diagnosis of malaria is still a global health challenge for which automated digital-pathology approaches could provide scalable solutions amenable to be deployed in low-to-middle income countries. Here we address the problem of Extended Depth-of-Field (EDoF) in thick blood film microscopy for rapid automated malaria diagnosis. High magnification oil-objectives (100x) with large numerical aperture are usually preferred to resolve the fine structural details that help separate true parasites from distractors. However, such objectives have a very limited depth-of-field requiring the acquisition of a series of images at different focal planes per field of view (FOV). Current EDoF techniques based on multi-scale decompositions are time consuming and therefore not suited for high-throughput analysis of specimens. To overcome this challenge, we developed a new deep learning method based on Convolutional Neural Networks (EDoF-CNN) that is able to rapidly perform the extended depth-of-field while also enhancing the spatial resolution of the resulting fused image. We evaluated our approach using simulated low-resolution z-stacks from Giemsa-stained thick blood smears from patients presenting with Plasmodium falciparum malaria. The EDoF-CNN allows speed-up of our digital-pathology acquisition platform and significantly improves the quality of the EDoF compared to the traditional multi-scaled approaches when applied to lower resolution stacks corresponding to acquisitions with fewer focal planes, large camera pixel binning or lower magnification objectives (larger FOV). We use the parasite detection accuracy of a deep learning model on the EDoFs as a concrete, task-specific measure of performance of this approach.
△ Less
Submitted 18 June, 2019;
originally announced June 2019.
-
Transmit Power Policy and Ergodic Multicast Rate Analysis of Cognitive Radio Networks in Generalized Fading
Authors:
Athira Subhash,
Muralikrishnan Srinivasan,
Sheetal Kalyani,
Lajos Hanzo
Abstract:
This paper determines the optimum secondary user power allocation and ergodic multicast rate of point-to-multipoint communication in a cognitive radio network in the presence of outage constraints for the primary users.
Using tools from extreme value theory (EVT), it is first proved that the limiting distribution of the minimum of independent and identically distributed (i.i.d.) signal-to-interf…
▽ More
This paper determines the optimum secondary user power allocation and ergodic multicast rate of point-to-multipoint communication in a cognitive radio network in the presence of outage constraints for the primary users.
Using tools from extreme value theory (EVT), it is first proved that the limiting distribution of the minimum of independent and identically distributed (i.i.d.) signal-to-interference ratio (SIR) random variables (RVs) is a Weibull distribution, when the user signal and the interferer signals undergo independent and non-identically distributed (i.n.i.d.) $κ-μ$ shadowed fading. Also, the rate of convergence of the actual minimum distribution to the Weibull distribution is derived. This limiting distribution is then used for determining the optimum transmit power of a secondary network in an underlay cognitive radio network subject to outage constraints at the primary network in a generalized fading scenario. Furthermore, the asymptotic ergodic multicast rate of secondary users is analyzed for varying channel fading parameters.
△ Less
Submitted 27 October, 2019; v1 submitted 3 June, 2019;
originally announced June 2019.
-
Joint power and resource allocation of D2D communication with low-resolution ADC
Authors:
Muralikrishnan Srinivasan,
Athira Subhash,
Sheetal Kalyani
Abstract:
This paper considers the joint power control and resource allocation for a device-to-device (D2D) underlay cellular system with a multi-antenna BS employing ADCs with different resolutions. We propose a four-step algorithm that optimizes the ADC resolution profile at the base station (BS) to reduce the energy consumption and perform joint power control and resource allocation of D2D communication…
▽ More
This paper considers the joint power control and resource allocation for a device-to-device (D2D) underlay cellular system with a multi-antenna BS employing ADCs with different resolutions. We propose a four-step algorithm that optimizes the ADC resolution profile at the base station (BS) to reduce the energy consumption and perform joint power control and resource allocation of D2D communication users (DUEs) and cellular users (CUEs) to improve the D2D reliability.
△ Less
Submitted 9 May, 2019;
originally announced May 2019.
-
Metamorphic Testing for Quality Assurance of Protein Function Prediction Tools
Authors:
Morteza Pourreza Shahri,
Madhusudan Srinivasan,
Gillian Reynolds,
Diane Bimczok,
Indika Kahanda,
Upulee Kanewala
Abstract:
Proteins are the workhorses of life and gaining insight on their functions is of paramount importance for applications such as drug design. However, the experimental validation of functions of proteins is highly-resource consuming. Therefore, recently, automated protein function prediction (AFP) using machine learning has gained significant interest. Many of these AFP tools are based on supervised…
▽ More
Proteins are the workhorses of life and gaining insight on their functions is of paramount importance for applications such as drug design. However, the experimental validation of functions of proteins is highly-resource consuming. Therefore, recently, automated protein function prediction (AFP) using machine learning has gained significant interest. Many of these AFP tools are based on supervised learning models trained using existing gold-standard functional annotations, which are known to be incomplete. The main challenge associated with conducting systematic testing on AFP software is the lack of a test oracle, which determines passing or failing of a test case; unfortunately, due to the incompleteness of gold-standard data, the exact expected outcomes are not well defined for the AFP task. Thus, AFP tools face the \emph{oracle problem}. In this work, we use metamorphic testing (MT) to test nine state-of-the-art AFP tools by defining a set of metamorphic relations (MRs) that apply input transformations to protein sequences. According to our results, we observe that several AFP tools fail all the test cases causing concerns over the quality of their predictions.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Efficient Video Classification Using Fewer Frames
Authors:
Shweta Bhardwaj,
Mukundhan Srinivasan,
Mitesh M. Khapra
Abstract:
Recently,there has been a lot of interest in building compact models for video classification which have a small memory footprint (<1 GB). While these models are compact, they typically operate by repeated application of a small weight matrix to all the frames in a video. E.g. recurrent neural network based methods compute a hidden state for every frame of the video using a recurrent weight matrix…
▽ More
Recently,there has been a lot of interest in building compact models for video classification which have a small memory footprint (<1 GB). While these models are compact, they typically operate by repeated application of a small weight matrix to all the frames in a video. E.g. recurrent neural network based methods compute a hidden state for every frame of the video using a recurrent weight matrix. Similarly, cluster-and-aggregate based methods such as NetVLAD, have a learnable clustering matrix which is used to assign soft-clusters to every frame in the video. Since these models look at every frame in the video, the number of floating point operations (FLOPs) is still large even though the memory footprint is small. We focus on building compute-efficient video classification models which process fewer frames and hence have less number of FLOPs. Similar to memory efficient models, we use the idea of distillation albeit in a different setting. Specifically, in our case, a compute-heavy teacher which looks at all the frames in the video is used to train a compute-efficient student which looks at only a small fraction of frames in the video. This is in contrast to a typical memory efficient Teacher-Student setting, wherein both the teacher and the student look at all the frames in the video but the student has fewer parameters. Our work thus complements the research on memory efficient video classification. We do an extensive evaluation with three types of models for video classification,viz.(i) recurrent models (ii) cluster-and-aggregate models and (iii) memory-efficient cluster-and-aggregate models and show that in each of these cases, a see-it-all teacher can be used to train a compute efficient see-very-little student. We show that the proposed student network can reduce the inference time by 30% and the number of FLOPs by approximately 90% with a negligible drop in the performance.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
Re-evaluating ADEM: A Deeper Look at Scoring Dialogue Responses
Authors:
Ananya B. Sai,
Mithun Das Gupta,
Mitesh M. Khapra,
Mukundhan Srinivasan
Abstract:
Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. ADEM(Lowe et al. 2017) formulated the automatic evaluation of dialogue systems as a learning problem and showed that such a model was able to predict responses which correlate significantly with human judgements, both at utterance and system level. Their system was shown to have beaten wor…
▽ More
Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. ADEM(Lowe et al. 2017) formulated the automatic evaluation of dialogue systems as a learning problem and showed that such a model was able to predict responses which correlate significantly with human judgements, both at utterance and system level. Their system was shown to have beaten word-overlap metrics such as BLEU with large margins. We start with the question of whether an adversary can game the ADEM model. We design a battery of targeted attacks at the neural network based ADEM evaluation system and show that automatic evaluation of dialogue systems still has a long way to go. ADEM can get confused with a variation as simple as reversing the word order in the text! We report experiments on several such adversarial scenarios that draw out counterintuitive scores on the dialogue responses. We take a systematic look at the scoring function proposed by ADEM and connect it to linear system theory to predict the shortcomings evident in the system. We also devise an attack that can fool such a system to rate a response generation system as favorable. Finally, we allude to future research directions of using the adversarial attacks to design a truly automated dialogue evaluation system.
△ Less
Submitted 23 February, 2019;
originally announced February 2019.
-
UltraCompression: Framework for High Density Compression of Ultrasound Volumes using Physics Modeling Deep Neural Networks
Authors:
Debarghya China,
Francis Tom,
Sumanth Nandamuri,
Aupendu Kar,
Mukundhan Srinivasan,
Pabitra Mitra,
Debdoot Sheet
Abstract:
Ultrasound image compression by preserving speckle-based key information is a challenging task. In this paper, we introduce an ultrasound image compression framework with the ability to retain realism of speckle appearance despite achieving very high-density compression factors. The compressor employs a tissue segmentation method, transmitting segments along with transducer frequency, number of sa…
▽ More
Ultrasound image compression by preserving speckle-based key information is a challenging task. In this paper, we introduce an ultrasound image compression framework with the ability to retain realism of speckle appearance despite achieving very high-density compression factors. The compressor employs a tissue segmentation method, transmitting segments along with transducer frequency, number of samples and image size as essential information required for decompression. The decompressor is based on a convolutional network trained to generate patho-realistic ultrasound images which convey essential information pertinent to tissue pathology visible in the images. We demonstrate generalizability of the building blocks using two variants to build the compressor. We have evaluated the quality of decompressed images using distortion losses as well as perception loss and compared it with other off the shelf solutions. The proposed method achieves a compression ratio of $725:1$ while preserving the statistical distribution of speckles. This enables image segmentation on decompressed images to achieve dice score of $0.89 \pm 0.11$, which evidently is not so accurately achievable when images are compressed with current standards like JPEG, JPEG 2000, WebP and BPG. We envision this frame work to serve as a roadmap for speckle image compression standards.
△ Less
Submitted 17 January, 2019;
originally announced January 2019.
-
Machine Learning-based Link Fault Identification and Localization in Complex Networks
Authors:
Srinikethan Madapuzi Srinivasan,
Tram Truong-Huu,
Mohan Gurusamy
Abstract:
With the proliferation of network devices and rapid development in information technology, networks such as Internet of Things are increasing in size and becoming more complex with heterogeneous wired and wireless links. In such networks, link faults may result in a link disconnection without immediate replacement or a link reconnection, e.g., a wireless node changes its access point. Identifying…
▽ More
With the proliferation of network devices and rapid development in information technology, networks such as Internet of Things are increasing in size and becoming more complex with heterogeneous wired and wireless links. In such networks, link faults may result in a link disconnection without immediate replacement or a link reconnection, e.g., a wireless node changes its access point. Identifying whether a link disconnection or a link reconnection has occurred and localizing the failed link become a challenging problem. An active probing approach requires a long time to probe the network by sending signaling messages on different paths, thus incurring significant communication delay and overhead. In this paper, we adopt a passive approach and develop a three-stage machine learning-based technique, namely ML-LFIL that identifies and localizes link faults by analyzing the measurements captured from the normal traffic flows, including aggregate flow rate, end-to-end delay and packet loss. ML-LFIL learns the traffic behavior in normal working conditions and different link fault scenarios. We train the learning model using support vector machine, multi-layer perceptron and random forest. We implement ML-LFIL and carry out extensive experiments using Mininet platform. Performance studies show that ML-LFIL achieves high accuracy while requiring much lower fault localization time compared to the active probing approach.
△ Less
Submitted 26 March, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Control of Multi-Agent Systems with Finite Time Control Barrier Certificates and Temporal Logic
Authors:
Mohit Srinivasan,
Samuel Coogan,
Magnus Egerstedt
Abstract:
In this paper, a method to synthesize controllers using finite time convergence control barrier functions guided by linear temporal logic specifications for continuous time multi-agent dynamical systems is proposed. Finite time convergence to a desired set in the state space is guaranteed under the existence of a suitable finite time convergence control barrier function. In addition, these barrier…
▽ More
In this paper, a method to synthesize controllers using finite time convergence control barrier functions guided by linear temporal logic specifications for continuous time multi-agent dynamical systems is proposed. Finite time convergence to a desired set in the state space is guaranteed under the existence of a suitable finite time convergence control barrier function. In addition, these barrier functions also guarantee forward invariance once the system converges to the desired set. This allows us to formulate a theoretical framework which synthesizes controllers for the multi-agent system. These properties also enable us to solve the reachability problem in continuous time by formulating a theorem on the composition of multiple finite time convergence control barrier functions. This approach is more flexible than existing methods and also allows for a greater set of feasible control laws. Linear temporal logic is used to specify complex task specifications that need to be satisfied by the multi-agent system. With this solution methodology, a control law is synthesized that satisfies the given temporal logic task specification. Robotic experiments are provided which were performed on the Robotarium multi-robot testbed at Georgia Tech.
△ Less
Submitted 7 August, 2018;
originally announced August 2018.
-
The perfect matching association scheme
Authors:
Murali K. Srinivasan
Abstract:
We revisit the Bose-Mesner algebra of the perfect matching association scheme. Our main results are:
1. An inductive algorithm, based on solving linear equations, to compute the eigenvalues of the orbital basis elements given the central characters of the symmetric groups.
2. Universal formulas, as content evaluations of symmetric functions, for the eigenvalues of fixed orbitals.
3. An induc…
▽ More
We revisit the Bose-Mesner algebra of the perfect matching association scheme. Our main results are:
1. An inductive algorithm, based on solving linear equations, to compute the eigenvalues of the orbital basis elements given the central characters of the symmetric groups.
2. Universal formulas, as content evaluations of symmetric functions, for the eigenvalues of fixed orbitals.
3. An inductive construction of an eigenvector (the so called first Gelfand-Tsetlin vector) in each eigenspace leading to a different inductive algorithm (not using central characters) for the eigenvalues of the orbital basis elements.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Asymptotic maximum order statistic for SIR in $κ-μ$ shadowed fading
Authors:
Athira Subhash,
Muralikrishnan Srinivasan,
Sheetal Kalyani
Abstract:
Using tools from extreme value theory (EVT), it is proved that, when the user signal and the interferer signals undergo independent and non-identically distributed (i.n.i.d.) $κ-μ$ shadowed fading, the limiting distribution of the maximum of $L$ independent and identically distributed (i.i.d.) signal-to-interference ratio (SIR) random variables (RVs) is a Frechet distribution. It is observed that…
▽ More
Using tools from extreme value theory (EVT), it is proved that, when the user signal and the interferer signals undergo independent and non-identically distributed (i.n.i.d.) $κ-μ$ shadowed fading, the limiting distribution of the maximum of $L$ independent and identically distributed (i.i.d.) signal-to-interference ratio (SIR) random variables (RVs) is a Frechet distribution. It is observed that this limiting distribution is close to the true distribution of maximum, for maximum SIR evaluated over moderate $L$. Further, moments of the maximum RV is shown to converge to the moments of the Frechet RV. Also, the rate of convergence of the actual distribution of the maximum to the Frechet distribution is derived and is analyzed for different $κ$ and $μ$ parameters. Finally, results from stochastic ordering are used to analyze the variation in the limiting distribution with respect to the variation in source fading parameters. These results are then used to derive upper bound for the rate in Full Array Selection (FAS) schemes for antenna selection and the asymptotic outage probability and the ergodic rate in maximum-sum-capacity (MSC) scheduling systems.
△ Less
Submitted 27 October, 2019; v1 submitted 14 June, 2018;
originally announced June 2018.
-
Analysis of Outage Probability of MRC with $η-μ$ co-channel interference
Authors:
Muralikrishnan Srinivasan,
Sheetal Kalyani
Abstract:
Approximate outage probability expressions are derived for systems employing maximum ratio combining, when both the desired signal and the interfering signals are subjected to $η-μ$ fading, with the interferers having unequal power. The approximations are in terms of the Appell Function and Gauss hypergeometric function. A close match is observed between the outage probability result obtained thro…
▽ More
Approximate outage probability expressions are derived for systems employing maximum ratio combining, when both the desired signal and the interfering signals are subjected to $η-μ$ fading, with the interferers having unequal power. The approximations are in terms of the Appell Function and Gauss hypergeometric function. A close match is observed between the outage probability result obtained through the derived analytical expression and the one obtained through Monte-Carlo simulations.
△ Less
Submitted 20 May, 2018;
originally announced May 2018.
-
Quality Assurance of Bioinformatics Software: A Case Study of Testing a Biomedical Text Processing Tool Using Metamorphic Testing
Authors:
Madhusudan Srinivasan,
Morteza Pourreza Shahri,
Upulee Kanewala,
Indika Kahanda
Abstract:
Bioinformatics software plays a very important role in making critical decisions within many areas including medicine and health care. However, most of the research is directed towards develo** tools, and little time and effort is spent on testing the software to assure its quality. In testing, a test oracle is used to determine whether a test is passed or failed during testing, and unfortunatel…
▽ More
Bioinformatics software plays a very important role in making critical decisions within many areas including medicine and health care. However, most of the research is directed towards develo** tools, and little time and effort is spent on testing the software to assure its quality. In testing, a test oracle is used to determine whether a test is passed or failed during testing, and unfortunately, for much of bioinformatics software, the exact expected outcomes are not well defined. Thus, the main challenge associated with conducting systematic testing on bioinformatics software is the oracle problem.
Metamorphic testing (MT) is a technique used to test programs that face the oracle problem. MT uses metamorphic relations (MRs) to determine whether a test has passed or failed and specifies how the output should change according to a specific change made to the input. In this work, we use MT to test LingPipe, a tool for processing text using computational linguistics, often used in bioinformatics for bio-entity recognition from biomedical literature.
First, we identify a set of MRs for testing any bio-entity recognition program. Then we develop a set of test cases that can be used to test LingPipe's bio-entity recognition functionality using these MRs. To evaluate the effectiveness of this testing process, we automatically generate a set of faulty versions of LingPipe. According to our analysis of the experimental results, we observe that our MRs can detect the majority of these faulty versions, which shows the utility of this testing technique for quality assurance of bioinformatics software.
△ Less
Submitted 20 February, 2018;
originally announced February 2018.
-
Analysis of Optimal Combining in Rician Fading with Co-channel Interference
Authors:
Muralikrishnan Srinivasan,
Sheetal Kalyani
Abstract:
Approximate Symbol error rate (SER), outage probability and rate expressions are derived for receive diversity system employing optimum combining when both the desired and the interfering signals are subjected to Rician fading, for the cases of a) equal power uncorrelated interferers b) unequal power interferers c) interferer correlation. The derived expressions are applicable for an arbitrary num…
▽ More
Approximate Symbol error rate (SER), outage probability and rate expressions are derived for receive diversity system employing optimum combining when both the desired and the interfering signals are subjected to Rician fading, for the cases of a) equal power uncorrelated interferers b) unequal power interferers c) interferer correlation. The derived expressions are applicable for an arbitrary number of receive antennas and interferers and for any quadrature amplitude modulation (QAM) constellation. Furthermore, we derive a simple closed form expression for SER in the interference-limited regime, for the special case of Rayleigh faded interferers. A close match is observed between the SER, outage probability and rate results obtained through the derived analytical expressions and the ones obtained from Monte-Carlo simulations.
△ Less
Submitted 9 May, 2019; v1 submitted 14 August, 2017;
originally announced August 2017.
-
Approximate Random Matrix Models for Generalized Fading MIMO Channels
Authors:
Muralikrishnan Srinivasan,
Sheetal Kalyani
Abstract:
Approximate random matrix models for $κ-μ$ and $η-μ$ faded multiple input multiple output (MIMO) communication channels are derived in terms of a complex Wishart matrix. The proposed approximation has the least Kullback-Leibler (KL) divergence from the original matrix distribution. The utility of the results are demonstrated in a) computing the average capacity/rate expressions of $κ-μ$/$η-μ$ MIMO…
▽ More
Approximate random matrix models for $κ-μ$ and $η-μ$ faded multiple input multiple output (MIMO) communication channels are derived in terms of a complex Wishart matrix. The proposed approximation has the least Kullback-Leibler (KL) divergence from the original matrix distribution. The utility of the results are demonstrated in a) computing the average capacity/rate expressions of $κ-μ$/$η-μ$ MIMO systems b) computing outage probability (OP) expressions for maximum ratio combining (MRC) for $κ-μ$/$η-μ$ faded MIMO channels c) ergodic rate expressions for zero-forcing (ZF) receiver in an uplink single cell massive MIMO scenario with low resolution analog-to-digital converters (ADCs) in the antennas. These approximate expressions are compared with Monte-Carlo simulations and a close match is observed.
△ Less
Submitted 22 October, 2019; v1 submitted 31 July, 2017;
originally announced July 2017.
-
Shape-independent Hardness Estimation Using Deep Learning and a GelSight Tactile Sensor
Authors:
Wenzhen Yuan,
Chenzhuo Zhu,
Andrew Owens,
Mandayam A. Srinivasan,
Edward H. Adelson
Abstract:
Hardness is among the most important attributes of an object that humans learn about through touch. However, approaches for robots to estimate hardness are limited, due to the lack of information provided by current tactile sensors. In this work, we address these limitations by introducing a novel method for hardness estimation, based on the GelSight tactile sensor, and the method does not require…
▽ More
Hardness is among the most important attributes of an object that humans learn about through touch. However, approaches for robots to estimate hardness are limited, due to the lack of information provided by current tactile sensors. In this work, we address these limitations by introducing a novel method for hardness estimation, based on the GelSight tactile sensor, and the method does not require accurate control of contact conditions or the shape of objects. A GelSight has a soft contact interface, and provides high resolution tactile images of contact geometry, as well as contact force and slip conditions. In this paper, we try to use the sensor to measure hardness of objects with multiple shapes, under a loosely controlled contact condition. The contact is made manually or by a robot hand, while the force and trajectory are unknown and uneven. We analyze the data using a deep constitutional (and recurrent) neural network. Experiments show that the neural net model can estimate the hardness of objects with different shapes and hardness ranging from 8 to 87 in Shore 00 scale.
△ Less
Submitted 12 April, 2017;
originally announced April 2017.
-
Large Enhancement of Electronic Thermal Conductivity and Lorenz Number in Topological Insulator Bi2Te2Se Thin Films
Authors:
Zhe Luo,
Jifa Tian,
Mithun Srinivasan,
Yong P. Chen,
Xianfan Xu
Abstract:
Topological insulators (TI) have attracted extensive research effort due to their insulating bulk states but conducting surface states. However, investigation and understanding of thermal transport in topological insulators, particularly the effect of surface states are lacking. In this work, we studied thickness-dependent in-plane thermal conductivity of Bi2Te2Se TI thin films. A large enhancemen…
▽ More
Topological insulators (TI) have attracted extensive research effort due to their insulating bulk states but conducting surface states. However, investigation and understanding of thermal transport in topological insulators, particularly the effect of surface states are lacking. In this work, we studied thickness-dependent in-plane thermal conductivity of Bi2Te2Se TI thin films. A large enhancement of both thermal and electrical conductivity was observed for films with thicknesses below 20 nm, which is attributed to the surface states and bulk-insulating nature of these films. Surprisingly, a surface Lorenz number of over 10 times the Sommerfeld value was found. Transport measurements indicated that the surface is near the charge neutrality point when the film thickness is below 20 nm. Possible reasons for the large Lorenz number include the electrical and thermal current decoupling in the surface state Dirac fluid and the bipolar diffusion transport involving surface states.
△ Less
Submitted 6 February, 2017;
originally announced February 2017.
-
On the representation theory of $G\sim S_n$
Authors:
Ashish Mishra,
Murali K. Srinivasan
Abstract:
In the Vershik-Okounkov approach to the complex irreducible representations of $S_n$ and $G\sim S_n$ we parametrize the irreducible representations and their bases by spectral objects rather than combinatorial objects and then, at the end, give a bijection between the spectral and combinatorial objects. The fundamental ideas are similar in both cases but there are additional technicalities involve…
▽ More
In the Vershik-Okounkov approach to the complex irreducible representations of $S_n$ and $G\sim S_n$ we parametrize the irreducible representations and their bases by spectral objects rather than combinatorial objects and then, at the end, give a bijection between the spectral and combinatorial objects. The fundamental ideas are similar in both cases but there are additional technicalities involved in the $G\sim S_n$ case. This was carried out by Pushkarev.
The present work gives a fully detailed exposition of Pushkarev's theory. For the most part we follow the original but our definition of a Gelfand-Tsetlin subspace, based on a multiplicity free chain of subgroups, is slightly different and leads to a more natural development of the theory. We also work out in detail an example, the generalized Johnson scheme, from this viewpoint.
△ Less
Submitted 18 April, 2015;
originally announced April 2015.
-
Wreath product action on generalized Boolean algebras
Authors:
Ashish Mishra,
Murali K. Srinivasan
Abstract:
Let G be a finite group acting on the finite set X such that the corresponding (complex) permutation representation is multiplicity free. There is a natural rank and order preserving action of the wreath product G~S_n on the generalized Boolean algebra B_X(n). We explicitly block diagonalize the commutant of this action.
Let G be a finite group acting on the finite set X such that the corresponding (complex) permutation representation is multiplicity free. There is a natural rank and order preserving action of the wreath product G~S_n on the generalized Boolean algebra B_X(n). We explicitly block diagonalize the commutant of this action.
△ Less
Submitted 30 October, 2014;
originally announced October 2014.
-
Transport properties of beta-Ga2O3 Nanoparticles embedded in Nb thin films
Authors:
L. S. Vaidhyanathan,
M. P. Srinivasan,
P. Chandra Mohan,
D. K. Baisnab,
R. Mythili,
M. P. Janawadkar
Abstract:
The origin of ferromagnetism in nanoparticles of nonmagnetic oxides is an interesting area of research. In the present work, transport properties of niobium thin films, with beta-Ga2O3 nanoparticles embedded within them, are presented. Nanoparticles of beta-Ga2O3 embedded in a Nb matrix were prepared at room temperature by radio frequency co-sputtering technique on Si (100) and glass substrates he…
▽ More
The origin of ferromagnetism in nanoparticles of nonmagnetic oxides is an interesting area of research. In the present work, transport properties of niobium thin films, with beta-Ga2O3 nanoparticles embedded within them, are presented. Nanoparticles of beta-Ga2O3 embedded in a Nb matrix were prepared at room temperature by radio frequency co-sputtering technique on Si (100) and glass substrates held at room temperature. The thin films deposited on Si substrates were subjected to Ar annealing at a temperature range of 600-650 C for 1 hour. Films were characterized by X-ray diffraction (XRD), Micro-Raman and elemental identification was performed with an Energy Dispersive X-ray Spectroscopy (EDS). Transport measurements were performed down to liquid helium temperatures by four-probe contact technique, showed characteristics analogous to those observed in the context of a Kondo system. A comparison of the experimental data with the theoretical formalism of Kondo and Hamann is presented. It is suggested that this behavior arises from the existence of magnetic moments associated with the oxygen vacancy defects in the nanoparticles of the nonmagnetic oxide Ga2O3.
△ Less
Submitted 8 October, 2014;
originally announced October 2014.
-
The Goldman-Rota identity and the Grassmann scheme
Authors:
Murali K. Srinivasan
Abstract:
We inductively construct an explicit (common) orthogonal eigenbasis for the elements of the Bose-Mesner algebra of the Grassmann scheme. The main step is a constructive, linear algebraic interpretation of the Goldman-Rota recurrence for the number of subspaces of a finite vector space. This interpretation shows that the up operator on subspaces has an explicitly given recursive structure. Using th…
▽ More
We inductively construct an explicit (common) orthogonal eigenbasis for the elements of the Bose-Mesner algebra of the Grassmann scheme. The main step is a constructive, linear algebraic interpretation of the Goldman-Rota recurrence for the number of subspaces of a finite vector space. This interpretation shows that the up operator on subspaces has an explicitly given recursive structure. Using this we inductively construct an explicit orthogonal symmetric Jordan basis with respect to the up operator and write down the singular values, i.e., the ratio of the lengths of the successive vectors in the Jordan chains. The collection of all vectors in this basis of a fixed rank forms a (common) orthogonal eigenbasis for the elements of the Bose-Mesner algebra of the Grassmann scheme. We also pose a bijective proof problem on the spanning trees of the Grassmann graphs.
△ Less
Submitted 23 April, 2013;
originally announced April 2013.
-
The complexity of the $q$-analog of the $n$-cube
Authors:
Murali K. Srinivasan
Abstract:
We present a positive, combinatorial, good formula for the complexity (= number of spanning trees) of the $q$-analog of the $n$-cube. Our method also yields the explicit block diagonalization of the commutant of the $GL(n,F_q)$ action on the $q$-analog of the Boolean algebra.
We present a positive, combinatorial, good formula for the complexity (= number of spanning trees) of the $q$-analog of the $n$-cube. Our method also yields the explicit block diagonalization of the commutant of the $GL(n,F_q)$ action on the $q$-analog of the Boolean algebra.
△ Less
Submitted 12 November, 2011; v1 submitted 7 November, 2011;
originally announced November 2011.
-
Counting spanning trees of the hypercube and its $q$-analogs by explicit block diagonalization
Authors:
Murali K. Srinivasan
Abstract:
The number of spanning trees of a graph $G$ is called the {\em complexity} of $G$ and is denoted $c(G)$. Let C(n) denote the {\em (binary) hypercube} of dimension $n$. A classical result in enumerative combinatorics (based on explicit diagonalization) states that $c(C(n)) = \prod_{k=2}^n (2k)^{n\choose k}$.
In this paper we use the explicit block diagonalization methodology to derive formulas fo…
▽ More
The number of spanning trees of a graph $G$ is called the {\em complexity} of $G$ and is denoted $c(G)$. Let C(n) denote the {\em (binary) hypercube} of dimension $n$. A classical result in enumerative combinatorics (based on explicit diagonalization) states that $c(C(n)) = \prod_{k=2}^n (2k)^{n\choose k}$.
In this paper we use the explicit block diagonalization methodology to derive formulas for the complexity of two $q$-analogs of C(n), the {\em nonbinary hypercube} $\Cq(n)$, defined for $q\geq 2$, and the {\em vector space analog of the hypercube} $\Cfq(n)$, defined for prime powers $q$.
We consider the nonbinary and vector space analogs of the Boolean algebra. We show the existence, in both cases, of a graded Jordan basis (with respect to the up operator) that is orthogonal (with respect to the standard inner product) and we write down explicit formulas for the ratio of the lengths of the successive vectors in the Jordan chains (i.e., the singular values). With respect to (the normalizations of) these bases the Laplacians of $\Cq(n)$ and $\Cfq(n)$ block diagonalize, with quadratically many distinct blocks in the nonbinary case and linearly many distinct blocks in the vector space case, and with each block an explicitly written down real, symmetric, tridiagonal matrix of known multiplicity and size at most $n+1$. In the nonbinary case we further determine the eigenvalues of the blocks, by explicitly writing out the eigenvectors, yielding an explicit formula for $c(\Cq(n))$ (this proof yields new information even in the binary case). In the vector space case we have been unable to determine the eigenvalues of the blocks but we give a useful formula for $c(\Cfq(n))$ involving "small" determinants (of size at most $n$).
△ Less
Submitted 8 April, 2011;
originally announced April 2011.
-
Note on Doron Zeilberger's paper: ${5 \choose 2}$ proofs that ${n \choose k} \leq {n \choose {k+1}}$ if $k < n/2$
Authors:
Murali K. Srinivasan
Abstract:
We present yet another algebraic proof of the unimodality of the binomial coefficients.
We present yet another algebraic proof of the unimodality of the binomial coefficients.
△ Less
Submitted 16 April, 2010;
originally announced April 2010.